Date
July 22, 2025, 2:40 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.775635] ================================================================== [ 19.775687] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 19.775754] Write of size 4 at addr fff00000c7a1ae30 by task kunit_try_catch/267 [ 19.775846] [ 19.775884] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 19.775967] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.776020] Hardware name: linux,dummy-virt (DT) [ 19.776054] Call trace: [ 19.776079] show_stack+0x20/0x38 (C) [ 19.776126] dump_stack_lvl+0x8c/0xd0 [ 19.776177] print_report+0x118/0x5d0 [ 19.776223] kasan_report+0xdc/0x128 [ 19.776318] kasan_check_range+0x100/0x1a8 [ 19.776371] __kasan_check_write+0x20/0x30 [ 19.776420] kasan_atomics_helper+0xa6c/0x4858 [ 19.776579] kasan_atomics+0x198/0x2e0 [ 19.776640] kunit_try_run_case+0x170/0x3f0 [ 19.776690] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.776742] kthread+0x328/0x630 [ 19.776787] ret_from_fork+0x10/0x20 [ 19.776836] [ 19.776869] Allocated by task 267: [ 19.776899] kasan_save_stack+0x3c/0x68 [ 19.776949] kasan_save_track+0x20/0x40 [ 19.777188] kasan_save_alloc_info+0x40/0x58 [ 19.777300] __kasan_kmalloc+0xd4/0xd8 [ 19.777342] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.777382] kasan_atomics+0xb8/0x2e0 [ 19.777426] kunit_try_run_case+0x170/0x3f0 [ 19.777469] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.777513] kthread+0x328/0x630 [ 19.777551] ret_from_fork+0x10/0x20 [ 19.777590] [ 19.777747] The buggy address belongs to the object at fff00000c7a1ae00 [ 19.777747] which belongs to the cache kmalloc-64 of size 64 [ 19.777842] The buggy address is located 0 bytes to the right of [ 19.777842] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 19.777947] [ 19.777970] The buggy address belongs to the physical page: [ 19.778029] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a [ 19.778147] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.778306] page_type: f5(slab) [ 19.778356] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.778409] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.778451] page dumped because: kasan: bad access detected [ 19.778486] [ 19.778506] Memory state around the buggy address: [ 19.778539] fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.778626] fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.778672] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.778825] ^ [ 19.778888] fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.778988] fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.779102] ================================================================== [ 20.010070] ================================================================== [ 20.010139] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 20.010866] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267 [ 20.010943] [ 20.010997] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 20.011771] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.011838] Hardware name: linux,dummy-virt (DT) [ 20.011873] Call trace: [ 20.011897] show_stack+0x20/0x38 (C) [ 20.011950] dump_stack_lvl+0x8c/0xd0 [ 20.012240] print_report+0x118/0x5d0 [ 20.012590] kasan_report+0xdc/0x128 [ 20.012771] kasan_check_range+0x100/0x1a8 [ 20.012883] __kasan_check_write+0x20/0x30 [ 20.012934] kasan_atomics_helper+0x1190/0x4858 [ 20.013241] kasan_atomics+0x198/0x2e0 [ 20.013718] kunit_try_run_case+0x170/0x3f0 [ 20.013912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.014004] kthread+0x328/0x630 [ 20.014458] ret_from_fork+0x10/0x20 [ 20.014878] [ 20.014978] Allocated by task 267: [ 20.015054] kasan_save_stack+0x3c/0x68 [ 20.015131] kasan_save_track+0x20/0x40 [ 20.015321] kasan_save_alloc_info+0x40/0x58 [ 20.015568] __kasan_kmalloc+0xd4/0xd8 [ 20.015844] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.015916] kasan_atomics+0xb8/0x2e0 [ 20.015979] kunit_try_run_case+0x170/0x3f0 [ 20.016857] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.016937] kthread+0x328/0x630 [ 20.016998] ret_from_fork+0x10/0x20 [ 20.017071] [ 20.017120] The buggy address belongs to the object at fff00000c7a1ae00 [ 20.017120] which belongs to the cache kmalloc-64 of size 64 [ 20.017554] The buggy address is located 0 bytes to the right of [ 20.017554] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 20.017650] [ 20.017809] The buggy address belongs to the physical page: [ 20.018125] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a [ 20.018291] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.018344] page_type: f5(slab) [ 20.018384] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.018736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.019091] page dumped because: kasan: bad access detected [ 20.019262] [ 20.019301] Memory state around the buggy address: [ 20.019338] fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.019686] fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.019935] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.020143] ^ [ 20.020193] fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.020391] fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.020550] ================================================================== [ 20.069896] ================================================================== [ 20.070231] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 20.070309] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267 [ 20.070362] [ 20.070527] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 20.070657] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.071047] Hardware name: linux,dummy-virt (DT) [ 20.071102] Call trace: [ 20.071314] show_stack+0x20/0x38 (C) [ 20.071692] dump_stack_lvl+0x8c/0xd0 [ 20.071799] print_report+0x118/0x5d0 [ 20.071963] kasan_report+0xdc/0x128 [ 20.072181] kasan_check_range+0x100/0x1a8 [ 20.072337] __kasan_check_write+0x20/0x30 [ 20.072549] kasan_atomics_helper+0x1414/0x4858 [ 20.072623] kasan_atomics+0x198/0x2e0 [ 20.072668] kunit_try_run_case+0x170/0x3f0 [ 20.072888] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.073020] kthread+0x328/0x630 [ 20.073434] ret_from_fork+0x10/0x20 [ 20.073671] [ 20.073797] Allocated by task 267: [ 20.073864] kasan_save_stack+0x3c/0x68 [ 20.074621] kasan_save_track+0x20/0x40 [ 20.074806] kasan_save_alloc_info+0x40/0x58 [ 20.074894] __kasan_kmalloc+0xd4/0xd8 [ 20.075046] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.075238] kasan_atomics+0xb8/0x2e0 [ 20.075469] kunit_try_run_case+0x170/0x3f0 [ 20.075542] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.076405] kthread+0x328/0x630 [ 20.076507] ret_from_fork+0x10/0x20 [ 20.076568] [ 20.076623] The buggy address belongs to the object at fff00000c7a1ae00 [ 20.076623] which belongs to the cache kmalloc-64 of size 64 [ 20.076729] The buggy address is located 0 bytes to the right of [ 20.076729] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 20.077175] [ 20.077227] The buggy address belongs to the physical page: [ 20.077304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a [ 20.077540] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.077597] page_type: f5(slab) [ 20.077990] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.078383] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.078535] page dumped because: kasan: bad access detected [ 20.078888] [ 20.078949] Memory state around the buggy address: [ 20.079108] fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.079300] fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.079697] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.079903] ^ [ 20.079945] fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.080408] fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.080717] ================================================================== [ 20.138991] ================================================================== [ 20.139312] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 20.139376] Read of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267 [ 20.139586] [ 20.139808] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 20.140025] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.140060] Hardware name: linux,dummy-virt (DT) [ 20.140106] Call trace: [ 20.140138] show_stack+0x20/0x38 (C) [ 20.140365] dump_stack_lvl+0x8c/0xd0 [ 20.140437] print_report+0x118/0x5d0 [ 20.140738] kasan_report+0xdc/0x128 [ 20.141026] __asan_report_load8_noabort+0x20/0x30 [ 20.141095] kasan_atomics_helper+0x3df4/0x4858 [ 20.141344] kasan_atomics+0x198/0x2e0 [ 20.141646] kunit_try_run_case+0x170/0x3f0 [ 20.141754] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.141932] kthread+0x328/0x630 [ 20.142032] ret_from_fork+0x10/0x20 [ 20.142085] [ 20.142169] Allocated by task 267: [ 20.142213] kasan_save_stack+0x3c/0x68 [ 20.142255] kasan_save_track+0x20/0x40 [ 20.142442] kasan_save_alloc_info+0x40/0x58 [ 20.142610] __kasan_kmalloc+0xd4/0xd8 [ 20.142902] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.142968] kasan_atomics+0xb8/0x2e0 [ 20.143123] kunit_try_run_case+0x170/0x3f0 [ 20.143307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.143537] kthread+0x328/0x630 [ 20.143590] ret_from_fork+0x10/0x20 [ 20.143840] [ 20.143886] The buggy address belongs to the object at fff00000c7a1ae00 [ 20.143886] which belongs to the cache kmalloc-64 of size 64 [ 20.144118] The buggy address is located 0 bytes to the right of [ 20.144118] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 20.144299] [ 20.144795] The buggy address belongs to the physical page: [ 20.144912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a [ 20.145357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.145694] page_type: f5(slab) [ 20.145749] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.146129] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.146447] page dumped because: kasan: bad access detected [ 20.146620] [ 20.146667] Memory state around the buggy address: [ 20.146705] fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.146985] fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.147039] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.147089] ^ [ 20.147127] fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.147331] fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.147461] ================================================================== [ 20.001787] ================================================================== [ 20.002041] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 20.002126] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267 [ 20.002180] [ 20.002241] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 20.002396] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.002428] Hardware name: linux,dummy-virt (DT) [ 20.002492] Call trace: [ 20.002517] show_stack+0x20/0x38 (C) [ 20.002783] dump_stack_lvl+0x8c/0xd0 [ 20.003219] print_report+0x118/0x5d0 [ 20.003556] kasan_report+0xdc/0x128 [ 20.003639] kasan_check_range+0x100/0x1a8 [ 20.003844] __kasan_check_write+0x20/0x30 [ 20.004000] kasan_atomics_helper+0x1128/0x4858 [ 20.004205] kasan_atomics+0x198/0x2e0 [ 20.004299] kunit_try_run_case+0x170/0x3f0 [ 20.004423] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.004679] kthread+0x328/0x630 [ 20.005056] ret_from_fork+0x10/0x20 [ 20.005345] [ 20.005454] Allocated by task 267: [ 20.005549] kasan_save_stack+0x3c/0x68 [ 20.005820] kasan_save_track+0x20/0x40 [ 20.006098] kasan_save_alloc_info+0x40/0x58 [ 20.006215] __kasan_kmalloc+0xd4/0xd8 [ 20.006429] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.006613] kasan_atomics+0xb8/0x2e0 [ 20.006706] kunit_try_run_case+0x170/0x3f0 [ 20.006786] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.007114] kthread+0x328/0x630 [ 20.007352] ret_from_fork+0x10/0x20 [ 20.007419] [ 20.007653] The buggy address belongs to the object at fff00000c7a1ae00 [ 20.007653] which belongs to the cache kmalloc-64 of size 64 [ 20.007848] The buggy address is located 0 bytes to the right of [ 20.007848] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 20.008249] [ 20.008313] The buggy address belongs to the physical page: [ 20.008635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a [ 20.008855] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.008915] page_type: f5(slab) [ 20.008955] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.009139] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.009215] page dumped because: kasan: bad access detected [ 20.009252] [ 20.009272] Memory state around the buggy address: [ 20.009327] fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.009385] fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.009433] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.009474] ^ [ 20.009510] fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.009553] fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.009594] ================================================================== [ 19.624115] ================================================================== [ 19.624964] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 19.625128] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 19.626054] ret_from_fork+0x10/0x20 [ 19.626655] kasan_atomics+0xb8/0x2e0 [ 19.627265] The buggy address is located 0 bytes to the right of [ 19.627265] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 19.627625] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.627887] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.628063] ================================================================== [ 20.119781] ================================================================== [ 20.120014] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 20.120076] Read of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267 [ 20.120130] [ 20.120390] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 20.120538] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.120569] Hardware name: linux,dummy-virt (DT) [ 20.120603] Call trace: [ 20.120626] show_stack+0x20/0x38 (C) [ 20.120842] dump_stack_lvl+0x8c/0xd0 [ 20.121190] print_report+0x118/0x5d0 [ 20.121261] kasan_report+0xdc/0x128 [ 20.121324] __asan_report_load8_noabort+0x20/0x30 [ 20.121523] kasan_atomics_helper+0x3db0/0x4858 [ 20.121635] kasan_atomics+0x198/0x2e0 [ 20.121772] kunit_try_run_case+0x170/0x3f0 [ 20.122045] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.122360] kthread+0x328/0x630 [ 20.122535] ret_from_fork+0x10/0x20 [ 20.122589] [ 20.122660] Allocated by task 267: [ 20.122709] kasan_save_stack+0x3c/0x68 [ 20.122778] kasan_save_track+0x20/0x40 [ 20.123003] kasan_save_alloc_info+0x40/0x58 [ 20.123072] __kasan_kmalloc+0xd4/0xd8 [ 20.123318] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.123563] kasan_atomics+0xb8/0x2e0 [ 20.123779] kunit_try_run_case+0x170/0x3f0 [ 20.123912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.124201] kthread+0x328/0x630 [ 20.124337] ret_from_fork+0x10/0x20 [ 20.124789] [ 20.124955] The buggy address belongs to the object at fff00000c7a1ae00 [ 20.124955] which belongs to the cache kmalloc-64 of size 64 [ 20.125173] The buggy address is located 0 bytes to the right of [ 20.125173] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 20.125463] [ 20.125603] The buggy address belongs to the physical page: [ 20.125912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a [ 20.125989] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.126480] page_type: f5(slab) [ 20.126637] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.126959] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.127032] page dumped because: kasan: bad access detected [ 20.127075] [ 20.127235] Memory state around the buggy address: [ 20.127474] fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.127931] fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.128047] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.128118] ^ [ 20.128336] fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.128593] fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.128836] ================================================================== [ 20.081688] ================================================================== [ 20.081761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 20.081875] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267 [ 20.082123] [ 20.082269] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 20.082687] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.082820] Hardware name: linux,dummy-virt (DT) [ 20.082938] Call trace: [ 20.082999] show_stack+0x20/0x38 (C) [ 20.083156] dump_stack_lvl+0x8c/0xd0 [ 20.083211] print_report+0x118/0x5d0 [ 20.083259] kasan_report+0xdc/0x128 [ 20.083320] kasan_check_range+0x100/0x1a8 [ 20.083496] __kasan_check_write+0x20/0x30 [ 20.083714] kasan_atomics_helper+0x147c/0x4858 [ 20.084011] kasan_atomics+0x198/0x2e0 [ 20.084222] kunit_try_run_case+0x170/0x3f0 [ 20.084277] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.084344] kthread+0x328/0x630 [ 20.084391] ret_from_fork+0x10/0x20 [ 20.084476] [ 20.084505] Allocated by task 267: [ 20.084537] kasan_save_stack+0x3c/0x68 [ 20.084595] kasan_save_track+0x20/0x40 [ 20.084655] kasan_save_alloc_info+0x40/0x58 [ 20.084705] __kasan_kmalloc+0xd4/0xd8 [ 20.084743] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.084783] kasan_atomics+0xb8/0x2e0 [ 20.084820] kunit_try_run_case+0x170/0x3f0 [ 20.084860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.084912] kthread+0x328/0x630 [ 20.084956] ret_from_fork+0x10/0x20 [ 20.084992] [ 20.085015] The buggy address belongs to the object at fff00000c7a1ae00 [ 20.085015] which belongs to the cache kmalloc-64 of size 64 [ 20.085074] The buggy address is located 0 bytes to the right of [ 20.085074] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 20.085139] [ 20.085180] The buggy address belongs to the physical page: [ 20.085221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a [ 20.085275] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.085334] page_type: f5(slab) [ 20.085378] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.085437] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.088358] page dumped because: kasan: bad access detected [ 20.088639] [ 20.088983] Memory state around the buggy address: [ 20.089041] fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.089151] fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.089588] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.089785] ^ [ 20.090058] fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.090408] fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.090756] ================================================================== [ 19.764125] ================================================================== [ 19.764183] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 19.764234] Write of size 4 at addr fff00000c7a1ae30 by task kunit_try_catch/267 [ 19.764381] [ 19.764432] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 19.764515] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.764655] Hardware name: linux,dummy-virt (DT) [ 19.764693] Call trace: [ 19.764798] show_stack+0x20/0x38 (C) [ 19.764897] dump_stack_lvl+0x8c/0xd0 [ 19.764956] print_report+0x118/0x5d0 [ 19.765011] kasan_report+0xdc/0x128 [ 19.765058] kasan_check_range+0x100/0x1a8 [ 19.765134] __kasan_check_write+0x20/0x30 [ 19.765211] kasan_atomics_helper+0x99c/0x4858 [ 19.765261] kasan_atomics+0x198/0x2e0 [ 19.765320] kunit_try_run_case+0x170/0x3f0 [ 19.765370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.765540] kthread+0x328/0x630 [ 19.765593] ret_from_fork+0x10/0x20 [ 19.765642] [ 19.765662] Allocated by task 267: [ 19.765728] kasan_save_stack+0x3c/0x68 [ 19.765799] kasan_save_track+0x20/0x40 [ 19.765857] kasan_save_alloc_info+0x40/0x58 [ 19.765913] __kasan_kmalloc+0xd4/0xd8 [ 19.765950] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.766006] kasan_atomics+0xb8/0x2e0 [ 19.766053] kunit_try_run_case+0x170/0x3f0 [ 19.766301] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.766360] kthread+0x328/0x630 [ 19.766398] ret_from_fork+0x10/0x20 [ 19.766543] [ 19.766592] The buggy address belongs to the object at fff00000c7a1ae00 [ 19.766592] which belongs to the cache kmalloc-64 of size 64 [ 19.766652] The buggy address is located 0 bytes to the right of [ 19.766652] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 19.766725] [ 19.766748] The buggy address belongs to the physical page: [ 19.767933] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a [ 19.768023] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.768134] page_type: f5(slab) [ 19.768232] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.768474] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.768589] page dumped because: kasan: bad access detected [ 19.768645] [ 19.768666] Memory state around the buggy address: [ 19.768908] fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.768969] fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.769074] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.769163] ^ [ 19.769309] fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.769411] fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.769493] ================================================================== [ 20.062555] ================================================================== [ 20.062652] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 20.062738] Read of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267 [ 20.062854] [ 20.062928] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 20.063137] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.063411] Hardware name: linux,dummy-virt (DT) [ 20.063772] Call trace: [ 20.063932] show_stack+0x20/0x38 (C) [ 20.064063] dump_stack_lvl+0x8c/0xd0 [ 20.064120] print_report+0x118/0x5d0 [ 20.064692] kasan_report+0xdc/0x128 [ 20.064862] __asan_report_load8_noabort+0x20/0x30 [ 20.065047] kasan_atomics_helper+0x3f04/0x4858 [ 20.065219] kasan_atomics+0x198/0x2e0 [ 20.065310] kunit_try_run_case+0x170/0x3f0 [ 20.065365] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.065418] kthread+0x328/0x630 [ 20.065515] ret_from_fork+0x10/0x20 [ 20.065585] [ 20.065616] Allocated by task 267: [ 20.065661] kasan_save_stack+0x3c/0x68 [ 20.065710] kasan_save_track+0x20/0x40 [ 20.065747] kasan_save_alloc_info+0x40/0x58 [ 20.065796] __kasan_kmalloc+0xd4/0xd8 [ 20.065832] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.065881] kasan_atomics+0xb8/0x2e0 [ 20.065918] kunit_try_run_case+0x170/0x3f0 [ 20.065958] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.065999] kthread+0x328/0x630 [ 20.066053] ret_from_fork+0x10/0x20 [ 20.066093] [ 20.066115] The buggy address belongs to the object at fff00000c7a1ae00 [ 20.066115] which belongs to the cache kmalloc-64 of size 64 [ 20.066180] The buggy address is located 0 bytes to the right of [ 20.066180] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 20.066260] [ 20.066301] The buggy address belongs to the physical page: [ 20.066335] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a [ 20.066389] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.066439] page_type: f5(slab) [ 20.066479] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.066552] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.066596] page dumped because: kasan: bad access detected [ 20.066650] [ 20.066671] Memory state around the buggy address: [ 20.067134] fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.067632] fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.067706] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.067781] ^ [ 20.067858] fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.067966] fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.068007] ================================================================== [ 19.883618] ================================================================== [ 19.883680] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 19.883735] Read of size 4 at addr fff00000c7a1ae30 by task kunit_try_catch/267 [ 19.884032] [ 19.884203] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 19.884377] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.884412] Hardware name: linux,dummy-virt (DT) [ 19.884513] Call trace: [ 19.885068] show_stack+0x20/0x38 (C) [ 19.885299] dump_stack_lvl+0x8c/0xd0 [ 19.885361] print_report+0x118/0x5d0 [ 19.885440] kasan_report+0xdc/0x128 [ 19.885507] __asan_report_load4_noabort+0x20/0x30 [ 19.885560] kasan_atomics_helper+0x3dd8/0x4858 [ 19.885709] kasan_atomics+0x198/0x2e0 [ 19.885755] kunit_try_run_case+0x170/0x3f0 [ 19.886003] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.886120] kthread+0x328/0x630 [ 19.886428] ret_from_fork+0x10/0x20 [ 19.886624] [ 19.886653] Allocated by task 267: [ 19.886686] kasan_save_stack+0x3c/0x68 [ 19.886729] kasan_save_track+0x20/0x40 [ 19.886837] kasan_save_alloc_info+0x40/0x58 [ 19.886969] __kasan_kmalloc+0xd4/0xd8 [ 19.887028] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.887381] kasan_atomics+0xb8/0x2e0 [ 19.887444] kunit_try_run_case+0x170/0x3f0 [ 19.887487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.887638] kthread+0x328/0x630 [ 19.887693] ret_from_fork+0x10/0x20 [ 19.887731] [ 19.887761] The buggy address belongs to the object at fff00000c7a1ae00 [ 19.887761] which belongs to the cache kmalloc-64 of size 64 [ 19.887822] The buggy address is located 0 bytes to the right of [ 19.887822] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 19.887887] [ 19.887919] The buggy address belongs to the physical page: [ 19.887962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a [ 19.888032] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.888082] page_type: f5(slab) [ 19.888144] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.888197] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.888242] page dumped because: kasan: bad access detected [ 19.888305] [ 19.888327] Memory state around the buggy address: [ 19.888368] fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.888429] fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.888481] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.888523] ^ [ 19.888562] fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.888607] fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.888650] ================================================================== [ 19.984102] ================================================================== [ 19.984155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 19.984493] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267 [ 19.984625] [ 19.984662] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 19.984770] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.984815] Hardware name: linux,dummy-virt (DT) [ 19.984849] Call trace: [ 19.984878] show_stack+0x20/0x38 (C) [ 19.984930] dump_stack_lvl+0x8c/0xd0 [ 19.984982] print_report+0x118/0x5d0 [ 19.985029] kasan_report+0xdc/0x128 [ 19.985072] kasan_check_range+0x100/0x1a8 [ 19.985129] __kasan_check_write+0x20/0x30 [ 19.985177] kasan_atomics_helper+0x1058/0x4858 [ 19.985225] kasan_atomics+0x198/0x2e0 [ 19.985268] kunit_try_run_case+0x170/0x3f0 [ 19.985329] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.985378] kthread+0x328/0x630 [ 19.985431] ret_from_fork+0x10/0x20 [ 19.985488] [ 19.985510] Allocated by task 267: [ 19.985539] kasan_save_stack+0x3c/0x68 [ 19.985580] kasan_save_track+0x20/0x40 [ 19.985617] kasan_save_alloc_info+0x40/0x58 [ 19.985665] __kasan_kmalloc+0xd4/0xd8 [ 19.985709] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.985748] kasan_atomics+0xb8/0x2e0 [ 19.985787] kunit_try_run_case+0x170/0x3f0 [ 19.985835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.985878] kthread+0x328/0x630 [ 19.985914] ret_from_fork+0x10/0x20 [ 19.985961] [ 19.985983] The buggy address belongs to the object at fff00000c7a1ae00 [ 19.985983] which belongs to the cache kmalloc-64 of size 64 [ 19.986050] The buggy address is located 0 bytes to the right of [ 19.986050] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 19.986123] [ 19.986153] The buggy address belongs to the physical page: [ 19.986186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a [ 19.986247] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.987171] page_type: f5(slab) [ 19.987221] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.987275] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.987331] page dumped because: kasan: bad access detected [ 19.987378] [ 19.987421] Memory state around the buggy address: [ 19.987470] fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.987898] fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.988252] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.988607] ^ [ 19.988671] fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.988730] fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.989080] ================================================================== [ 20.148785] ================================================================== [ 20.148847] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 20.149156] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267 [ 20.149301] [ 20.149360] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 20.149470] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.149552] Hardware name: linux,dummy-virt (DT) [ 20.149588] Call trace: [ 20.149642] show_stack+0x20/0x38 (C) [ 20.149705] dump_stack_lvl+0x8c/0xd0 [ 20.149759] print_report+0x118/0x5d0 [ 20.149995] kasan_report+0xdc/0x128 [ 20.150050] kasan_check_range+0x100/0x1a8 [ 20.150109] __kasan_check_write+0x20/0x30 [ 20.150269] kasan_atomics_helper+0x16d0/0x4858 [ 20.150687] kasan_atomics+0x198/0x2e0 [ 20.150933] kunit_try_run_case+0x170/0x3f0 [ 20.150992] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.151045] kthread+0x328/0x630 [ 20.151483] ret_from_fork+0x10/0x20 [ 20.151841] [ 20.151944] Allocated by task 267: [ 20.151992] kasan_save_stack+0x3c/0x68 [ 20.152082] kasan_save_track+0x20/0x40 [ 20.152124] kasan_save_alloc_info+0x40/0x58 [ 20.152169] __kasan_kmalloc+0xd4/0xd8 [ 20.152222] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.152261] kasan_atomics+0xb8/0x2e0 [ 20.152307] kunit_try_run_case+0x170/0x3f0 [ 20.152370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.152413] kthread+0x328/0x630 [ 20.152450] ret_from_fork+0x10/0x20 [ 20.152488] [ 20.152516] The buggy address belongs to the object at fff00000c7a1ae00 [ 20.152516] which belongs to the cache kmalloc-64 of size 64 [ 20.152577] The buggy address is located 0 bytes to the right of [ 20.152577] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 20.152658] [ 20.152698] The buggy address belongs to the physical page: [ 20.152740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a [ 20.152793] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.152842] page_type: f5(slab) [ 20.152890] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.152943] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.152987] page dumped because: kasan: bad access detected [ 20.153030] [ 20.153066] Memory state around the buggy address: [ 20.153099] fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.153143] fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.153189] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.153230] ^ [ 20.153265] fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.153340] fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.154178] ================================================================== [ 20.091922] ================================================================== [ 20.091985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 20.092040] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267 [ 20.092101] [ 20.092135] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 20.092395] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.092438] Hardware name: linux,dummy-virt (DT) [ 20.092474] Call trace: [ 20.092499] show_stack+0x20/0x38 (C) [ 20.092956] dump_stack_lvl+0x8c/0xd0 [ 20.093122] print_report+0x118/0x5d0 [ 20.093194] kasan_report+0xdc/0x128 [ 20.093240] kasan_check_range+0x100/0x1a8 [ 20.093345] __kasan_check_write+0x20/0x30 [ 20.093393] kasan_atomics_helper+0x14e4/0x4858 [ 20.093449] kasan_atomics+0x198/0x2e0 [ 20.093500] kunit_try_run_case+0x170/0x3f0 [ 20.093683] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.093909] kthread+0x328/0x630 [ 20.093972] ret_from_fork+0x10/0x20 [ 20.094194] [ 20.094230] Allocated by task 267: [ 20.094361] kasan_save_stack+0x3c/0x68 [ 20.095401] kasan_save_track+0x20/0x40 [ 20.095696] kasan_save_alloc_info+0x40/0x58 [ 20.095816] __kasan_kmalloc+0xd4/0xd8 [ 20.095895] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.096539] kasan_atomics+0xb8/0x2e0 [ 20.096614] kunit_try_run_case+0x170/0x3f0 [ 20.096667] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.096761] kthread+0x328/0x630 [ 20.096827] ret_from_fork+0x10/0x20 [ 20.096899] [ 20.097459] The buggy address belongs to the object at fff00000c7a1ae00 [ 20.097459] which belongs to the cache kmalloc-64 of size 64 [ 20.097525] The buggy address is located 0 bytes to the right of [ 20.097525] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 20.098181] [ 20.098314] The buggy address belongs to the physical page: [ 20.098354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a [ 20.098437] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.098809] page_type: f5(slab) [ 20.099042] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.099301] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.099358] page dumped because: kasan: bad access detected [ 20.099539] [ 20.099633] Memory state around the buggy address: [ 20.099799] fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.099861] fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.100091] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.100429] ^ [ 20.100540] fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.101001] fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.101181] ================================================================== [ 20.102020] ================================================================== [ 20.102597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 20.102669] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267 [ 20.102934] [ 20.103349] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 20.103463] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.103492] Hardware name: linux,dummy-virt (DT) [ 20.103528] Call trace: [ 20.103552] show_stack+0x20/0x38 (C) [ 20.103604] dump_stack_lvl+0x8c/0xd0 [ 20.103656] print_report+0x118/0x5d0 [ 20.104085] kasan_report+0xdc/0x128 [ 20.104443] kasan_check_range+0x100/0x1a8 [ 20.104568] __kasan_check_write+0x20/0x30 [ 20.104688] kasan_atomics_helper+0x154c/0x4858 [ 20.104827] kasan_atomics+0x198/0x2e0 [ 20.104875] kunit_try_run_case+0x170/0x3f0 [ 20.104981] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.105328] kthread+0x328/0x630 [ 20.105581] ret_from_fork+0x10/0x20 [ 20.105853] [ 20.105911] Allocated by task 267: [ 20.105990] kasan_save_stack+0x3c/0x68 [ 20.106053] kasan_save_track+0x20/0x40 [ 20.106254] kasan_save_alloc_info+0x40/0x58 [ 20.106480] __kasan_kmalloc+0xd4/0xd8 [ 20.106678] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.106853] kasan_atomics+0xb8/0x2e0 [ 20.106942] kunit_try_run_case+0x170/0x3f0 [ 20.107049] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.107233] kthread+0x328/0x630 [ 20.107598] ret_from_fork+0x10/0x20 [ 20.107732] [ 20.107858] The buggy address belongs to the object at fff00000c7a1ae00 [ 20.107858] which belongs to the cache kmalloc-64 of size 64 [ 20.108075] The buggy address is located 0 bytes to the right of [ 20.108075] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 20.108148] [ 20.108394] The buggy address belongs to the physical page: [ 20.108967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a [ 20.109470] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.109750] page_type: f5(slab) [ 20.109821] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.110138] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.110330] page dumped because: kasan: bad access detected [ 20.110562] [ 20.110761] Memory state around the buggy address: [ 20.110802] fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.110849] fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.110894] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.111494] ^ [ 20.111663] fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.111890] fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.112175] ================================================================== [ 20.184815] ================================================================== [ 20.185230] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 20.185310] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267 [ 20.185361] [ 20.185461] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 20.185557] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.185586] Hardware name: linux,dummy-virt (DT) [ 20.185827] Call trace: [ 20.186133] show_stack+0x20/0x38 (C) [ 20.186207] dump_stack_lvl+0x8c/0xd0 [ 20.186354] print_report+0x118/0x5d0 [ 20.186425] kasan_report+0xdc/0x128 [ 20.186753] kasan_check_range+0x100/0x1a8 [ 20.187022] __kasan_check_write+0x20/0x30 [ 20.187243] kasan_atomics_helper+0x17ec/0x4858 [ 20.187314] kasan_atomics+0x198/0x2e0 [ 20.187486] kunit_try_run_case+0x170/0x3f0 [ 20.187570] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.187624] kthread+0x328/0x630 [ 20.187966] ret_from_fork+0x10/0x20 [ 20.188376] [ 20.188469] Allocated by task 267: [ 20.188538] kasan_save_stack+0x3c/0x68 [ 20.188582] kasan_save_track+0x20/0x40 [ 20.188659] kasan_save_alloc_info+0x40/0x58 [ 20.189057] __kasan_kmalloc+0xd4/0xd8 [ 20.189397] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.189587] kasan_atomics+0xb8/0x2e0 [ 20.189706] kunit_try_run_case+0x170/0x3f0 [ 20.189832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.190494] kthread+0x328/0x630 [ 20.190749] ret_from_fork+0x10/0x20 [ 20.190833] [ 20.190867] The buggy address belongs to the object at fff00000c7a1ae00 [ 20.190867] which belongs to the cache kmalloc-64 of size 64 [ 20.190987] The buggy address is located 0 bytes to the right of [ 20.190987] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 20.191142] [ 20.191232] The buggy address belongs to the physical page: [ 20.191385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a [ 20.191484] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.191589] page_type: f5(slab) [ 20.191797] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.192052] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.192319] page dumped because: kasan: bad access detected [ 20.192512] [ 20.192577] Memory state around the buggy address: [ 20.192660] fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.192707] fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.192753] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.192804] ^ [ 20.192841] fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.192897] fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.192936] ================================================================== [ 20.027500] ================================================================== [ 20.028025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 20.028150] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267 [ 20.028323] [ 20.028360] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 20.028982] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.029032] Hardware name: linux,dummy-virt (DT) [ 20.029087] Call trace: [ 20.029138] show_stack+0x20/0x38 (C) [ 20.029316] dump_stack_lvl+0x8c/0xd0 [ 20.029578] print_report+0x118/0x5d0 [ 20.029771] kasan_report+0xdc/0x128 [ 20.029982] kasan_check_range+0x100/0x1a8 [ 20.030259] __kasan_check_write+0x20/0x30 [ 20.031854] kasan_atomics_helper+0x126c/0x4858 [ 20.031971] kasan_atomics+0x198/0x2e0 [ 20.032532] kunit_try_run_case+0x170/0x3f0 [ 20.032830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.035162] kthread+0x328/0x630 [ 20.035386] ret_from_fork+0x10/0x20 [ 20.035439] [ 20.035460] Allocated by task 267: [ 20.035638] kasan_save_stack+0x3c/0x68 [ 20.035971] kasan_save_track+0x20/0x40 [ 20.036574] kasan_save_alloc_info+0x40/0x58 [ 20.036855] __kasan_kmalloc+0xd4/0xd8 [ 20.036916] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.037030] kasan_atomics+0xb8/0x2e0 [ 20.037126] kunit_try_run_case+0x170/0x3f0 [ 20.037255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.037669] kthread+0x328/0x630 [ 20.037831] ret_from_fork+0x10/0x20 [ 20.038001] [ 20.038034] The buggy address belongs to the object at fff00000c7a1ae00 [ 20.038034] which belongs to the cache kmalloc-64 of size 64 [ 20.038148] The buggy address is located 0 bytes to the right of [ 20.038148] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 20.038354] [ 20.038644] The buggy address belongs to the physical page: [ 20.038962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a [ 20.039051] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.039720] page_type: f5(slab) [ 20.039773] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.040317] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.040515] page dumped because: kasan: bad access detected [ 20.040558] [ 20.040692] Memory state around the buggy address: [ 20.040959] fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.041138] fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.041399] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.041454] ^ [ 20.041492] fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.042317] fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.042441] ================================================================== [ 19.756381] ================================================================== [ 19.756433] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 19.756482] Read of size 4 at addr fff00000c7a1ae30 by task kunit_try_catch/267 [ 19.756532] [ 19.756562] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 19.756641] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.756669] Hardware name: linux,dummy-virt (DT) [ 19.756701] Call trace: [ 19.756724] show_stack+0x20/0x38 (C) [ 19.756772] dump_stack_lvl+0x8c/0xd0 [ 19.756823] print_report+0x118/0x5d0 [ 19.756873] kasan_report+0xdc/0x128 [ 19.756918] __asan_report_load4_noabort+0x20/0x30 [ 19.757105] kasan_atomics_helper+0x42d8/0x4858 [ 19.757161] kasan_atomics+0x198/0x2e0 [ 19.757205] kunit_try_run_case+0x170/0x3f0 [ 19.757255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.757321] kthread+0x328/0x630 [ 19.757375] ret_from_fork+0x10/0x20 [ 19.757430] [ 19.757450] Allocated by task 267: [ 19.757478] kasan_save_stack+0x3c/0x68 [ 19.757654] kasan_save_track+0x20/0x40 [ 19.757694] kasan_save_alloc_info+0x40/0x58 [ 19.757734] __kasan_kmalloc+0xd4/0xd8 [ 19.758026] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.758118] kasan_atomics+0xb8/0x2e0 [ 19.758175] kunit_try_run_case+0x170/0x3f0 [ 19.758215] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.758271] kthread+0x328/0x630 [ 19.758320] ret_from_fork+0x10/0x20 [ 19.758368] [ 19.758391] The buggy address belongs to the object at fff00000c7a1ae00 [ 19.758391] which belongs to the cache kmalloc-64 of size 64 [ 19.758449] The buggy address is located 0 bytes to the right of [ 19.758449] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 19.758777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.759065] ^ [ 19.759193] ================================================================== [ 19.946184] ================================================================== [ 19.946315] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 19.946535] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267 [ 19.946648] [ 19.946698] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 19.946855] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.946902] Hardware name: linux,dummy-virt (DT) [ 19.946935] Call trace: [ 19.947099] show_stack+0x20/0x38 (C) [ 19.947159] dump_stack_lvl+0x8c/0xd0 [ 19.947467] print_report+0x118/0x5d0 [ 19.947916] kasan_report+0xdc/0x128 [ 19.948073] kasan_check_range+0x100/0x1a8 [ 19.948181] __kasan_check_write+0x20/0x30 [ 19.948367] kasan_atomics_helper+0xeb8/0x4858 [ 19.948437] kasan_atomics+0x198/0x2e0 [ 19.948659] kunit_try_run_case+0x170/0x3f0 [ 19.949069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.949183] kthread+0x328/0x630 [ 19.949465] ret_from_fork+0x10/0x20 [ 19.949644] [ 19.949669] Allocated by task 267: [ 19.949759] kasan_save_stack+0x3c/0x68 [ 19.950017] kasan_save_track+0x20/0x40 [ 19.950295] kasan_save_alloc_info+0x40/0x58 [ 19.951100] __kasan_kmalloc+0xd4/0xd8 [ 19.951152] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.951192] kasan_atomics+0xb8/0x2e0 [ 19.951227] kunit_try_run_case+0x170/0x3f0 [ 19.951269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.951324] kthread+0x328/0x630 [ 19.951363] ret_from_fork+0x10/0x20 [ 19.951401] [ 19.951647] The buggy address belongs to the object at fff00000c7a1ae00 [ 19.951647] which belongs to the cache kmalloc-64 of size 64 [ 19.951973] The buggy address is located 0 bytes to the right of [ 19.951973] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 19.952211] [ 19.952245] The buggy address belongs to the physical page: [ 19.952719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a [ 19.952964] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.953083] page_type: f5(slab) [ 19.953124] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.953726] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.953823] page dumped because: kasan: bad access detected [ 19.953908] [ 19.953930] Memory state around the buggy address: [ 19.954148] fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.954236] fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.954636] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.954798] ^ [ 19.954926] fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.954989] fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.955191] ================================================================== [ 19.769864] ================================================================== [ 19.769940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 19.770054] Write of size 4 at addr fff00000c7a1ae30 by task kunit_try_catch/267 [ 19.770106] [ 19.770166] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 19.770275] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.770335] Hardware name: linux,dummy-virt (DT) [ 19.770390] Call trace: [ 19.770415] show_stack+0x20/0x38 (C) [ 19.770482] dump_stack_lvl+0x8c/0xd0 [ 19.770573] print_report+0x118/0x5d0 [ 19.770618] kasan_report+0xdc/0x128 [ 19.770664] kasan_check_range+0x100/0x1a8 [ 19.770711] __kasan_check_write+0x20/0x30 [ 19.770760] kasan_atomics_helper+0xa04/0x4858 [ 19.770807] kasan_atomics+0x198/0x2e0 [ 19.771475] kunit_try_run_case+0x170/0x3f0 [ 19.771588] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.771905] kthread+0x328/0x630 [ 19.772000] ret_from_fork+0x10/0x20 [ 19.772080] [ 19.772129] Allocated by task 267: [ 19.772218] kasan_save_stack+0x3c/0x68 [ 19.772332] kasan_save_track+0x20/0x40 [ 19.772398] kasan_save_alloc_info+0x40/0x58 [ 19.772439] __kasan_kmalloc+0xd4/0xd8 [ 19.772476] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.772629] kasan_atomics+0xb8/0x2e0 [ 19.772673] kunit_try_run_case+0x170/0x3f0 [ 19.772715] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.772759] kthread+0x328/0x630 [ 19.772840] ret_from_fork+0x10/0x20 [ 19.772945] [ 19.772976] The buggy address belongs to the object at fff00000c7a1ae00 [ 19.772976] which belongs to the cache kmalloc-64 of size 64 [ 19.773157] The buggy address is located 0 bytes to the right of [ 19.773157] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 19.773291] [ 19.773314] The buggy address belongs to the physical page: [ 19.773346] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a [ 19.773521] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.773579] page_type: f5(slab) [ 19.773616] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.773701] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.773846] page dumped because: kasan: bad access detected [ 19.773923] [ 19.774009] Memory state around the buggy address: [ 19.774065] fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.774137] fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.774182] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.774384] ^ [ 19.774452] fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.774498] fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.774785] ================================================================== [ 19.967647] ================================================================== [ 19.967700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 19.967754] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267 [ 19.968162] [ 19.968305] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 19.968434] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.968614] Hardware name: linux,dummy-virt (DT) [ 19.968660] Call trace: [ 19.968865] show_stack+0x20/0x38 (C) [ 19.968935] dump_stack_lvl+0x8c/0xd0 [ 19.968988] print_report+0x118/0x5d0 [ 19.969041] kasan_report+0xdc/0x128 [ 19.969087] kasan_check_range+0x100/0x1a8 [ 19.969201] __kasan_check_write+0x20/0x30 [ 19.969256] kasan_atomics_helper+0xf88/0x4858 [ 19.969596] kasan_atomics+0x198/0x2e0 [ 19.969648] kunit_try_run_case+0x170/0x3f0 [ 19.969995] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.970098] kthread+0x328/0x630 [ 19.970209] ret_from_fork+0x10/0x20 [ 19.970263] [ 19.970296] Allocated by task 267: [ 19.970361] kasan_save_stack+0x3c/0x68 [ 19.970431] kasan_save_track+0x20/0x40 [ 19.970469] kasan_save_alloc_info+0x40/0x58 [ 19.970632] __kasan_kmalloc+0xd4/0xd8 [ 19.970813] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.971144] kasan_atomics+0xb8/0x2e0 [ 19.971212] kunit_try_run_case+0x170/0x3f0 [ 19.971459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.971605] kthread+0x328/0x630 [ 19.971682] ret_from_fork+0x10/0x20 [ 19.971739] [ 19.971761] The buggy address belongs to the object at fff00000c7a1ae00 [ 19.971761] which belongs to the cache kmalloc-64 of size 64 [ 19.971822] The buggy address is located 0 bytes to the right of [ 19.971822] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 19.971887] [ 19.972171] The buggy address belongs to the physical page: [ 19.972547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a [ 19.972835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.973057] page_type: f5(slab) [ 19.973123] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.973317] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.973489] page dumped because: kasan: bad access detected [ 19.973757] [ 19.973818] Memory state around the buggy address: [ 19.973977] fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.974026] fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.974081] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.974129] ^ [ 19.974178] fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.974239] fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.974292] ================================================================== [ 19.912987] ================================================================== [ 19.913135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 19.913188] Read of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267 [ 19.913632] [ 19.913716] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 19.914076] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.914231] Hardware name: linux,dummy-virt (DT) [ 19.914279] Call trace: [ 19.914318] show_stack+0x20/0x38 (C) [ 19.914578] dump_stack_lvl+0x8c/0xd0 [ 19.914811] print_report+0x118/0x5d0 [ 19.914961] kasan_report+0xdc/0x128 [ 19.915069] kasan_check_range+0x100/0x1a8 [ 19.915131] __kasan_check_read+0x20/0x30 [ 19.915386] kasan_atomics_helper+0xdd4/0x4858 [ 19.915579] kasan_atomics+0x198/0x2e0 [ 19.915996] kunit_try_run_case+0x170/0x3f0 [ 19.916112] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.916237] kthread+0x328/0x630 [ 19.916371] ret_from_fork+0x10/0x20 [ 19.916485] [ 19.916513] Allocated by task 267: [ 19.916677] kasan_save_stack+0x3c/0x68 [ 19.916930] kasan_save_track+0x20/0x40 [ 19.916994] kasan_save_alloc_info+0x40/0x58 [ 19.917234] __kasan_kmalloc+0xd4/0xd8 [ 19.917297] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.917341] kasan_atomics+0xb8/0x2e0 [ 19.917379] kunit_try_run_case+0x170/0x3f0 [ 19.917616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.917700] kthread+0x328/0x630 [ 19.917741] ret_from_fork+0x10/0x20 [ 19.917780] [ 19.917812] The buggy address belongs to the object at fff00000c7a1ae00 [ 19.917812] which belongs to the cache kmalloc-64 of size 64 [ 19.917872] The buggy address is located 0 bytes to the right of [ 19.917872] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 19.917937] [ 19.917968] The buggy address belongs to the physical page: [ 19.918010] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a [ 19.918066] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.918115] page_type: f5(slab) [ 19.918163] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.918215] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.918267] page dumped because: kasan: bad access detected [ 19.918334] [ 19.918361] Memory state around the buggy address: [ 19.918412] fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.918469] fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.918514] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.918554] ^ [ 19.918598] fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.918650] fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.918700] ================================================================== [ 19.920653] ================================================================== [ 19.920833] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 19.920895] Read of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267 [ 19.921333] [ 19.921386] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 19.921475] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.921504] Hardware name: linux,dummy-virt (DT) [ 19.921537] Call trace: [ 19.921885] show_stack+0x20/0x38 (C) [ 19.921957] dump_stack_lvl+0x8c/0xd0 [ 19.922012] print_report+0x118/0x5d0 [ 19.922390] kasan_report+0xdc/0x128 [ 19.922530] __asan_report_load8_noabort+0x20/0x30 [ 19.922587] kasan_atomics_helper+0x3f58/0x4858 [ 19.922839] kasan_atomics+0x198/0x2e0 [ 19.922906] kunit_try_run_case+0x170/0x3f0 [ 19.922959] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.923274] kthread+0x328/0x630 [ 19.923401] ret_from_fork+0x10/0x20 [ 19.923757] [ 19.923812] Allocated by task 267: [ 19.923946] kasan_save_stack+0x3c/0x68 [ 19.924042] kasan_save_track+0x20/0x40 [ 19.924344] kasan_save_alloc_info+0x40/0x58 [ 19.924395] __kasan_kmalloc+0xd4/0xd8 [ 19.924801] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.925071] kasan_atomics+0xb8/0x2e0 [ 19.925217] kunit_try_run_case+0x170/0x3f0 [ 19.925472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.926029] kthread+0x328/0x630 [ 19.926080] ret_from_fork+0x10/0x20 [ 19.926420] [ 19.926627] The buggy address belongs to the object at fff00000c7a1ae00 [ 19.926627] which belongs to the cache kmalloc-64 of size 64 [ 19.926994] The buggy address is located 0 bytes to the right of [ 19.926994] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 19.927224] [ 19.927315] The buggy address belongs to the physical page: [ 19.927435] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a [ 19.927547] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.927760] page_type: f5(slab) [ 19.927969] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.928208] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.928302] page dumped because: kasan: bad access detected [ 19.928576] [ 19.928674] Memory state around the buggy address: [ 19.929003] fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.929203] fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.929532] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.929764] ^ [ 19.929835] fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.930049] fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.930231] ================================================================== [ 19.931494] ================================================================== [ 19.931557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 19.931608] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267 [ 19.931658] [ 19.931689] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 19.931771] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.931799] Hardware name: linux,dummy-virt (DT) [ 19.931832] Call trace: [ 19.931855] show_stack+0x20/0x38 (C) [ 19.931905] dump_stack_lvl+0x8c/0xd0 [ 19.931956] print_report+0x118/0x5d0 [ 19.932003] kasan_report+0xdc/0x128 [ 19.932049] kasan_check_range+0x100/0x1a8 [ 19.932096] __kasan_check_write+0x20/0x30 [ 19.932144] kasan_atomics_helper+0xe44/0x4858 [ 19.932192] kasan_atomics+0x198/0x2e0 [ 19.932235] kunit_try_run_case+0x170/0x3f0 [ 19.932299] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.932360] kthread+0x328/0x630 [ 19.932420] ret_from_fork+0x10/0x20 [ 19.932469] [ 19.932489] Allocated by task 267: [ 19.932528] kasan_save_stack+0x3c/0x68 [ 19.932574] kasan_save_track+0x20/0x40 [ 19.932614] kasan_save_alloc_info+0x40/0x58 [ 19.932653] __kasan_kmalloc+0xd4/0xd8 [ 19.932688] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.932737] kasan_atomics+0xb8/0x2e0 [ 19.932774] kunit_try_run_case+0x170/0x3f0 [ 19.932815] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.932868] kthread+0x328/0x630 [ 19.932916] ret_from_fork+0x10/0x20 [ 19.932955] [ 19.932981] The buggy address belongs to the object at fff00000c7a1ae00 [ 19.932981] which belongs to the cache kmalloc-64 of size 64 [ 19.933039] The buggy address is located 0 bytes to the right of [ 19.933039] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 19.933103] [ 19.933125] The buggy address belongs to the physical page: [ 19.933157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a [ 19.933210] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.933260] page_type: f5(slab) [ 19.933905] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.934522] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.934582] page dumped because: kasan: bad access detected [ 19.934617] [ 19.934794] Memory state around the buggy address: [ 19.935077] fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.935200] fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.935258] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.935355] ^ [ 19.935391] fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.935454] fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.935495] ================================================================== [ 20.021631] ================================================================== [ 20.021732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 20.021782] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267 [ 20.021836] [ 20.022363] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 20.022615] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.022674] Hardware name: linux,dummy-virt (DT) [ 20.022830] Call trace: [ 20.022890] show_stack+0x20/0x38 (C) [ 20.023046] dump_stack_lvl+0x8c/0xd0 [ 20.023120] print_report+0x118/0x5d0 [ 20.023174] kasan_report+0xdc/0x128 [ 20.023221] kasan_check_range+0x100/0x1a8 [ 20.023406] __kasan_check_write+0x20/0x30 [ 20.023585] kasan_atomics_helper+0x11f8/0x4858 [ 20.023854] kasan_atomics+0x198/0x2e0 [ 20.024065] kunit_try_run_case+0x170/0x3f0 [ 20.024182] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.024365] kthread+0x328/0x630 [ 20.024431] ret_from_fork+0x10/0x20 [ 20.024638] [ 20.024857] Allocated by task 267: [ 20.024899] kasan_save_stack+0x3c/0x68 [ 20.024945] kasan_save_track+0x20/0x40 [ 20.024995] kasan_save_alloc_info+0x40/0x58 [ 20.025061] __kasan_kmalloc+0xd4/0xd8 [ 20.025112] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.025161] kasan_atomics+0xb8/0x2e0 [ 20.025198] kunit_try_run_case+0x170/0x3f0 [ 20.025240] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.025293] kthread+0x328/0x630 [ 20.025337] ret_from_fork+0x10/0x20 [ 20.025376] [ 20.025412] The buggy address belongs to the object at fff00000c7a1ae00 [ 20.025412] which belongs to the cache kmalloc-64 of size 64 [ 20.025492] The buggy address is located 0 bytes to the right of [ 20.025492] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 20.025568] [ 20.025608] The buggy address belongs to the physical page: [ 20.025664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a [ 20.025718] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.025768] page_type: f5(slab) [ 20.025807] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.025868] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.025926] page dumped because: kasan: bad access detected [ 20.025966] [ 20.025997] Memory state around the buggy address: [ 20.026040] fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.026087] fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.026132] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.026188] ^ [ 20.026223] fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.026267] fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.026747] ================================================================== [ 19.975644] ================================================================== [ 19.975728] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 19.975781] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267 [ 19.976159] [ 19.976222] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 19.976320] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.976501] Hardware name: linux,dummy-virt (DT) [ 19.976546] Call trace: [ 19.976764] show_stack+0x20/0x38 (C) [ 19.976826] dump_stack_lvl+0x8c/0xd0 [ 19.976888] print_report+0x118/0x5d0 [ 19.976934] kasan_report+0xdc/0x128 [ 19.977060] kasan_check_range+0x100/0x1a8 [ 19.977145] __kasan_check_write+0x20/0x30 [ 19.977196] kasan_atomics_helper+0xff0/0x4858 [ 19.977408] kasan_atomics+0x198/0x2e0 [ 19.977464] kunit_try_run_case+0x170/0x3f0 [ 19.977645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.977914] kthread+0x328/0x630 [ 19.978095] ret_from_fork+0x10/0x20 [ 19.978156] [ 19.978176] Allocated by task 267: [ 19.978267] kasan_save_stack+0x3c/0x68 [ 19.978331] kasan_save_track+0x20/0x40 [ 19.978369] kasan_save_alloc_info+0x40/0x58 [ 19.978577] __kasan_kmalloc+0xd4/0xd8 [ 19.978752] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.979082] kasan_atomics+0xb8/0x2e0 [ 19.979178] kunit_try_run_case+0x170/0x3f0 [ 19.979329] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.979493] kthread+0x328/0x630 [ 19.979579] ret_from_fork+0x10/0x20 [ 19.979627] [ 19.979650] The buggy address belongs to the object at fff00000c7a1ae00 [ 19.979650] which belongs to the cache kmalloc-64 of size 64 [ 19.979712] The buggy address is located 0 bytes to the right of [ 19.979712] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 19.980055] [ 19.980133] The buggy address belongs to the physical page: [ 19.980487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a [ 19.980898] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.981367] page_type: f5(slab) [ 19.981436] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.981633] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.981862] page dumped because: kasan: bad access detected [ 19.981923] [ 19.982396] Memory state around the buggy address: [ 19.982465] fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.982522] fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.982861] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.983097] ^ [ 19.983148] fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.983341] fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.983440] ================================================================== [ 20.053438] ================================================================== [ 20.053501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 20.053815] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267 [ 20.054011] [ 20.054056] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 20.054146] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.054266] Hardware name: linux,dummy-virt (DT) [ 20.054327] Call trace: [ 20.054354] show_stack+0x20/0x38 (C) [ 20.054406] dump_stack_lvl+0x8c/0xd0 [ 20.054459] print_report+0x118/0x5d0 [ 20.054504] kasan_report+0xdc/0x128 [ 20.054550] kasan_check_range+0x100/0x1a8 [ 20.054597] __kasan_check_write+0x20/0x30 [ 20.054645] kasan_atomics_helper+0x1384/0x4858 [ 20.054716] kasan_atomics+0x198/0x2e0 [ 20.054771] kunit_try_run_case+0x170/0x3f0 [ 20.054821] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.054873] kthread+0x328/0x630 [ 20.054919] ret_from_fork+0x10/0x20 [ 20.054968] [ 20.054989] Allocated by task 267: [ 20.055023] kasan_save_stack+0x3c/0x68 [ 20.055065] kasan_save_track+0x20/0x40 [ 20.055103] kasan_save_alloc_info+0x40/0x58 [ 20.055144] __kasan_kmalloc+0xd4/0xd8 [ 20.055795] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.056107] kasan_atomics+0xb8/0x2e0 [ 20.056297] kunit_try_run_case+0x170/0x3f0 [ 20.056879] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.056996] kthread+0x328/0x630 [ 20.057197] ret_from_fork+0x10/0x20 [ 20.057391] [ 20.057593] The buggy address belongs to the object at fff00000c7a1ae00 [ 20.057593] which belongs to the cache kmalloc-64 of size 64 [ 20.057690] The buggy address is located 0 bytes to the right of [ 20.057690] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 20.058180] [ 20.058475] The buggy address belongs to the physical page: [ 20.058627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a [ 20.059039] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.059131] page_type: f5(slab) [ 20.059172] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.059233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.059276] page dumped because: kasan: bad access detected [ 20.059859] [ 20.060069] Memory state around the buggy address: [ 20.060142] fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.060357] fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.060734] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.061159] ^ [ 20.061320] fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.061519] fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.061820] ================================================================== [ 20.166001] ================================================================== [ 20.166064] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 20.166244] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267 [ 20.166374] [ 20.166427] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 20.166704] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.166774] Hardware name: linux,dummy-virt (DT) [ 20.166857] Call trace: [ 20.166883] show_stack+0x20/0x38 (C) [ 20.166937] dump_stack_lvl+0x8c/0xd0 [ 20.166988] print_report+0x118/0x5d0 [ 20.167273] kasan_report+0xdc/0x128 [ 20.167669] kasan_check_range+0x100/0x1a8 [ 20.167795] __kasan_check_write+0x20/0x30 [ 20.167889] kasan_atomics_helper+0x175c/0x4858 [ 20.168069] kasan_atomics+0x198/0x2e0 [ 20.168295] kunit_try_run_case+0x170/0x3f0 [ 20.168386] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.168751] kthread+0x328/0x630 [ 20.169063] ret_from_fork+0x10/0x20 [ 20.169415] [ 20.169577] Allocated by task 267: [ 20.169624] kasan_save_stack+0x3c/0x68 [ 20.169703] kasan_save_track+0x20/0x40 [ 20.169741] kasan_save_alloc_info+0x40/0x58 [ 20.169781] __kasan_kmalloc+0xd4/0xd8 [ 20.169819] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.169887] kasan_atomics+0xb8/0x2e0 [ 20.169943] kunit_try_run_case+0x170/0x3f0 [ 20.169985] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.170029] kthread+0x328/0x630 [ 20.170066] ret_from_fork+0x10/0x20 [ 20.170103] [ 20.170139] The buggy address belongs to the object at fff00000c7a1ae00 [ 20.170139] which belongs to the cache kmalloc-64 of size 64 [ 20.170199] The buggy address is located 0 bytes to the right of [ 20.170199] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 20.170273] [ 20.170316] The buggy address belongs to the physical page: [ 20.170358] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a [ 20.170411] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.170471] page_type: f5(slab) [ 20.170511] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.170562] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.170605] page dumped because: kasan: bad access detected [ 20.170652] [ 20.170681] Memory state around the buggy address: [ 20.170715] fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.171074] fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.171522] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.171620] ^ [ 20.171669] fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.171725] fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.171807] ================================================================== [ 20.043232] ================================================================== [ 20.043359] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 20.043413] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267 [ 20.043602] [ 20.043650] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 20.043933] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.043977] Hardware name: linux,dummy-virt (DT) [ 20.044323] Call trace: [ 20.044428] show_stack+0x20/0x38 (C) [ 20.044526] dump_stack_lvl+0x8c/0xd0 [ 20.044623] print_report+0x118/0x5d0 [ 20.044812] kasan_report+0xdc/0x128 [ 20.044929] kasan_check_range+0x100/0x1a8 [ 20.044990] __kasan_check_write+0x20/0x30 [ 20.045152] kasan_atomics_helper+0x12d8/0x4858 [ 20.045450] kasan_atomics+0x198/0x2e0 [ 20.045602] kunit_try_run_case+0x170/0x3f0 [ 20.045731] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.045816] kthread+0x328/0x630 [ 20.046045] ret_from_fork+0x10/0x20 [ 20.046138] [ 20.046219] Allocated by task 267: [ 20.046443] kasan_save_stack+0x3c/0x68 [ 20.046559] kasan_save_track+0x20/0x40 [ 20.046602] kasan_save_alloc_info+0x40/0x58 [ 20.046868] __kasan_kmalloc+0xd4/0xd8 [ 20.046980] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.047091] kasan_atomics+0xb8/0x2e0 [ 20.047363] kunit_try_run_case+0x170/0x3f0 [ 20.047505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.048363] kthread+0x328/0x630 [ 20.048443] ret_from_fork+0x10/0x20 [ 20.048517] [ 20.048562] The buggy address belongs to the object at fff00000c7a1ae00 [ 20.048562] which belongs to the cache kmalloc-64 of size 64 [ 20.048646] The buggy address is located 0 bytes to the right of [ 20.048646] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 20.048714] [ 20.048736] The buggy address belongs to the physical page: [ 20.049103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a [ 20.049260] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.049639] page_type: f5(slab) [ 20.050053] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.050400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.050682] page dumped because: kasan: bad access detected [ 20.050864] [ 20.051330] Memory state around the buggy address: [ 20.051406] fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.051487] fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.051543] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.051583] ^ [ 20.051620] fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.051972] fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.052175] ================================================================== [ 19.903131] ================================================================== [ 19.903612] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 19.903682] Read of size 4 at addr fff00000c7a1ae30 by task kunit_try_catch/267 [ 19.903736] [ 19.903773] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 19.903852] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.903881] Hardware name: linux,dummy-virt (DT) [ 19.904080] Call trace: [ 19.904215] show_stack+0x20/0x38 (C) [ 19.904357] dump_stack_lvl+0x8c/0xd0 [ 19.904416] print_report+0x118/0x5d0 [ 19.904464] kasan_report+0xdc/0x128 [ 19.904901] __asan_report_load4_noabort+0x20/0x30 [ 19.905221] kasan_atomics_helper+0x3e04/0x4858 [ 19.905303] kasan_atomics+0x198/0x2e0 [ 19.905436] kunit_try_run_case+0x170/0x3f0 [ 19.905520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.905574] kthread+0x328/0x630 [ 19.905889] ret_from_fork+0x10/0x20 [ 19.906133] [ 19.906167] Allocated by task 267: [ 19.906332] kasan_save_stack+0x3c/0x68 [ 19.906380] kasan_save_track+0x20/0x40 [ 19.906418] kasan_save_alloc_info+0x40/0x58 [ 19.906460] __kasan_kmalloc+0xd4/0xd8 [ 19.906497] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.906537] kasan_atomics+0xb8/0x2e0 [ 19.906591] kunit_try_run_case+0x170/0x3f0 [ 19.906643] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.906689] kthread+0x328/0x630 [ 19.906744] ret_from_fork+0x10/0x20 [ 19.906799] [ 19.906854] The buggy address belongs to the object at fff00000c7a1ae00 [ 19.906854] which belongs to the cache kmalloc-64 of size 64 [ 19.906915] The buggy address is located 0 bytes to the right of [ 19.906915] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 19.907239] [ 19.907339] The buggy address belongs to the physical page: [ 19.907660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a [ 19.908103] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.908504] page_type: f5(slab) [ 19.908604] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.908769] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.909071] page dumped because: kasan: bad access detected [ 19.909488] [ 19.909659] Memory state around the buggy address: [ 19.909725] fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.910150] fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.910390] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.910436] ^ [ 19.910695] fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.911092] fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.911150] ================================================================== [ 19.633071] ================================================================== [ 19.633143] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 19.633271] Write of size 4 at addr fff00000c7a1ae30 by task kunit_try_catch/267 [ 19.633950] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.634376] print_report+0x118/0x5d0 [ 19.635182] kasan_atomics+0x198/0x2e0 [ 19.635775] ret_from_fork+0x10/0x20 [ 19.636661] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.637249] The buggy address is located 0 bytes to the right of [ 19.637249] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 19.637670] page dumped because: kasan: bad access detected [ 19.637825] fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.638056] ================================================================== [ 20.154466] ================================================================== [ 20.155009] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 20.155277] Read of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267 [ 20.155346] [ 20.155619] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 20.156068] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.156303] Hardware name: linux,dummy-virt (DT) [ 20.156632] Call trace: [ 20.156912] show_stack+0x20/0x38 (C) [ 20.157063] dump_stack_lvl+0x8c/0xd0 [ 20.157120] print_report+0x118/0x5d0 [ 20.157236] kasan_report+0xdc/0x128 [ 20.157728] __asan_report_load8_noabort+0x20/0x30 [ 20.158077] kasan_atomics_helper+0x3e10/0x4858 [ 20.158374] kasan_atomics+0x198/0x2e0 [ 20.158630] kunit_try_run_case+0x170/0x3f0 [ 20.158861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.159155] kthread+0x328/0x630 [ 20.159343] ret_from_fork+0x10/0x20 [ 20.159402] [ 20.159436] Allocated by task 267: [ 20.159467] kasan_save_stack+0x3c/0x68 [ 20.159717] kasan_save_track+0x20/0x40 [ 20.160011] kasan_save_alloc_info+0x40/0x58 [ 20.160322] __kasan_kmalloc+0xd4/0xd8 [ 20.160478] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.160610] kasan_atomics+0xb8/0x2e0 [ 20.160694] kunit_try_run_case+0x170/0x3f0 [ 20.160742] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.161067] kthread+0x328/0x630 [ 20.161484] ret_from_fork+0x10/0x20 [ 20.161716] [ 20.161772] The buggy address belongs to the object at fff00000c7a1ae00 [ 20.161772] which belongs to the cache kmalloc-64 of size 64 [ 20.161852] The buggy address is located 0 bytes to the right of [ 20.161852] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 20.162413] [ 20.162484] The buggy address belongs to the physical page: [ 20.162820] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a [ 20.162919] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.163002] page_type: f5(slab) [ 20.163046] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.163297] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.163568] page dumped because: kasan: bad access detected [ 20.163826] [ 20.164026] Memory state around the buggy address: [ 20.164069] fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.164139] fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.164501] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.164585] ^ [ 20.164912] fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.164968] fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.165321] ================================================================== [ 19.890105] ================================================================== [ 19.890162] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 19.890577] Write of size 4 at addr fff00000c7a1ae30 by task kunit_try_catch/267 [ 19.890649] [ 19.890772] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 19.890860] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.891082] Hardware name: linux,dummy-virt (DT) [ 19.891337] Call trace: [ 19.891749] show_stack+0x20/0x38 (C) [ 19.892004] dump_stack_lvl+0x8c/0xd0 [ 19.892315] print_report+0x118/0x5d0 [ 19.892482] kasan_report+0xdc/0x128 [ 19.892942] kasan_check_range+0x100/0x1a8 [ 19.893054] __kasan_check_write+0x20/0x30 [ 19.893432] kasan_atomics_helper+0xd3c/0x4858 [ 19.893804] kasan_atomics+0x198/0x2e0 [ 19.894133] kunit_try_run_case+0x170/0x3f0 [ 19.894278] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.894508] kthread+0x328/0x630 [ 19.895143] ret_from_fork+0x10/0x20 [ 19.895542] [ 19.895574] Allocated by task 267: [ 19.895606] kasan_save_stack+0x3c/0x68 [ 19.895650] kasan_save_track+0x20/0x40 [ 19.895689] kasan_save_alloc_info+0x40/0x58 [ 19.896431] __kasan_kmalloc+0xd4/0xd8 [ 19.896604] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.896653] kasan_atomics+0xb8/0x2e0 [ 19.896888] kunit_try_run_case+0x170/0x3f0 [ 19.896961] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.897101] kthread+0x328/0x630 [ 19.897437] ret_from_fork+0x10/0x20 [ 19.897699] [ 19.897910] The buggy address belongs to the object at fff00000c7a1ae00 [ 19.897910] which belongs to the cache kmalloc-64 of size 64 [ 19.898349] The buggy address is located 0 bytes to the right of [ 19.898349] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 19.898471] [ 19.898704] The buggy address belongs to the physical page: [ 19.898861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a [ 19.899109] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.899166] page_type: f5(slab) [ 19.899400] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.900023] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.900361] page dumped because: kasan: bad access detected [ 19.900572] [ 19.900633] Memory state around the buggy address: [ 19.900993] fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.901294] fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.901834] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.901980] ^ [ 19.902065] fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.902305] fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.902577] ================================================================== [ 19.990531] ================================================================== [ 19.990584] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 19.990636] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267 [ 19.991025] [ 19.991107] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 19.991392] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.991453] Hardware name: linux,dummy-virt (DT) [ 19.991706] Call trace: [ 19.991916] show_stack+0x20/0x38 (C) [ 19.992006] dump_stack_lvl+0x8c/0xd0 [ 19.992324] print_report+0x118/0x5d0 [ 19.992517] kasan_report+0xdc/0x128 [ 19.992673] kasan_check_range+0x100/0x1a8 [ 19.992950] __kasan_check_write+0x20/0x30 [ 19.993095] kasan_atomics_helper+0x10c0/0x4858 [ 19.993445] kasan_atomics+0x198/0x2e0 [ 19.993619] kunit_try_run_case+0x170/0x3f0 [ 19.993875] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.994082] kthread+0x328/0x630 [ 19.994340] ret_from_fork+0x10/0x20 [ 19.994557] [ 19.994600] Allocated by task 267: [ 19.994708] kasan_save_stack+0x3c/0x68 [ 19.994800] kasan_save_track+0x20/0x40 [ 19.994839] kasan_save_alloc_info+0x40/0x58 [ 19.995085] __kasan_kmalloc+0xd4/0xd8 [ 19.995202] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.995380] kasan_atomics+0xb8/0x2e0 [ 19.995800] kunit_try_run_case+0x170/0x3f0 [ 19.995948] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.996052] kthread+0x328/0x630 [ 19.996880] ret_from_fork+0x10/0x20 [ 19.996966] [ 19.997078] The buggy address belongs to the object at fff00000c7a1ae00 [ 19.997078] which belongs to the cache kmalloc-64 of size 64 [ 19.997143] The buggy address is located 0 bytes to the right of [ 19.997143] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 19.997473] [ 19.997563] The buggy address belongs to the physical page: [ 19.997865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a [ 19.997977] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.998460] page_type: f5(slab) [ 19.998524] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.998870] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.999255] page dumped because: kasan: bad access detected [ 19.999527] [ 19.999576] Memory state around the buggy address: [ 19.999726] fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.999988] fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.000245] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.000430] ^ [ 20.000490] fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.000727] fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.000924] ================================================================== [ 20.112746] ================================================================== [ 20.112799] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 20.112849] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267 [ 20.112900] [ 20.112931] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 20.113012] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.113042] Hardware name: linux,dummy-virt (DT) [ 20.113095] Call trace: [ 20.113119] show_stack+0x20/0x38 (C) [ 20.113178] dump_stack_lvl+0x8c/0xd0 [ 20.113237] print_report+0x118/0x5d0 [ 20.113298] kasan_report+0xdc/0x128 [ 20.113352] kasan_check_range+0x100/0x1a8 [ 20.113410] __kasan_check_write+0x20/0x30 [ 20.113473] kasan_atomics_helper+0x15b4/0x4858 [ 20.113530] kasan_atomics+0x198/0x2e0 [ 20.113576] kunit_try_run_case+0x170/0x3f0 [ 20.113632] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.113708] kthread+0x328/0x630 [ 20.113764] ret_from_fork+0x10/0x20 [ 20.113813] [ 20.113834] Allocated by task 267: [ 20.113864] kasan_save_stack+0x3c/0x68 [ 20.113910] kasan_save_track+0x20/0x40 [ 20.113957] kasan_save_alloc_info+0x40/0x58 [ 20.114006] __kasan_kmalloc+0xd4/0xd8 [ 20.114044] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.114085] kasan_atomics+0xb8/0x2e0 [ 20.114126] kunit_try_run_case+0x170/0x3f0 [ 20.114166] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.114208] kthread+0x328/0x630 [ 20.114246] ret_from_fork+0x10/0x20 [ 20.114725] [ 20.115212] The buggy address belongs to the object at fff00000c7a1ae00 [ 20.115212] which belongs to the cache kmalloc-64 of size 64 [ 20.115312] The buggy address is located 0 bytes to the right of [ 20.115312] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 20.115412] [ 20.115523] The buggy address belongs to the physical page: [ 20.115558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a [ 20.115893] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.116121] page_type: f5(slab) [ 20.116514] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.116741] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.117319] page dumped because: kasan: bad access detected [ 20.117699] [ 20.117794] Memory state around the buggy address: [ 20.117899] fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.118139] fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.118508] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.118654] ^ [ 20.118909] fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.118981] fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.119251] ================================================================== [ 20.129582] ================================================================== [ 20.129714] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 20.130083] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267 [ 20.130322] [ 20.130368] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 20.130451] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.130662] Hardware name: linux,dummy-virt (DT) [ 20.130723] Call trace: [ 20.130751] show_stack+0x20/0x38 (C) [ 20.131068] dump_stack_lvl+0x8c/0xd0 [ 20.131457] print_report+0x118/0x5d0 [ 20.131532] kasan_report+0xdc/0x128 [ 20.131631] kasan_check_range+0x100/0x1a8 [ 20.131694] __kasan_check_write+0x20/0x30 [ 20.131743] kasan_atomics_helper+0x1644/0x4858 [ 20.131792] kasan_atomics+0x198/0x2e0 [ 20.131838] kunit_try_run_case+0x170/0x3f0 [ 20.132410] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.132596] kthread+0x328/0x630 [ 20.132796] ret_from_fork+0x10/0x20 [ 20.132966] [ 20.132999] Allocated by task 267: [ 20.133029] kasan_save_stack+0x3c/0x68 [ 20.133633] kasan_save_track+0x20/0x40 [ 20.133974] kasan_save_alloc_info+0x40/0x58 [ 20.134087] __kasan_kmalloc+0xd4/0xd8 [ 20.134144] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.134257] kasan_atomics+0xb8/0x2e0 [ 20.134308] kunit_try_run_case+0x170/0x3f0 [ 20.134412] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.134687] kthread+0x328/0x630 [ 20.134835] ret_from_fork+0x10/0x20 [ 20.135065] [ 20.135260] The buggy address belongs to the object at fff00000c7a1ae00 [ 20.135260] which belongs to the cache kmalloc-64 of size 64 [ 20.136011] The buggy address is located 0 bytes to the right of [ 20.136011] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 20.136124] [ 20.136179] The buggy address belongs to the physical page: [ 20.136232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a [ 20.136571] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.136650] page_type: f5(slab) [ 20.137178] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.137548] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.137598] page dumped because: kasan: bad access detected [ 20.137878] [ 20.137999] Memory state around the buggy address: [ 20.138046] fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.138093] fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.138147] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.138208] ^ [ 20.138245] fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.138298] fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.138337] ================================================================== [ 19.936554] ================================================================== [ 19.936888] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 19.937300] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267 [ 19.937371] [ 19.937508] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 19.937628] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.937702] Hardware name: linux,dummy-virt (DT) [ 19.937736] Call trace: [ 19.937774] show_stack+0x20/0x38 (C) [ 19.937829] dump_stack_lvl+0x8c/0xd0 [ 19.937886] print_report+0x118/0x5d0 [ 19.938086] kasan_report+0xdc/0x128 [ 19.938140] __asan_report_store8_noabort+0x20/0x30 [ 19.938296] kasan_atomics_helper+0x3e5c/0x4858 [ 19.938688] kasan_atomics+0x198/0x2e0 [ 19.938763] kunit_try_run_case+0x170/0x3f0 [ 19.938926] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.939079] kthread+0x328/0x630 [ 19.939176] ret_from_fork+0x10/0x20 [ 19.939237] [ 19.939504] Allocated by task 267: [ 19.939757] kasan_save_stack+0x3c/0x68 [ 19.940043] kasan_save_track+0x20/0x40 [ 19.940239] kasan_save_alloc_info+0x40/0x58 [ 19.940382] __kasan_kmalloc+0xd4/0xd8 [ 19.940461] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.940593] kasan_atomics+0xb8/0x2e0 [ 19.940632] kunit_try_run_case+0x170/0x3f0 [ 19.940835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.941070] kthread+0x328/0x630 [ 19.941147] ret_from_fork+0x10/0x20 [ 19.941331] [ 19.941400] The buggy address belongs to the object at fff00000c7a1ae00 [ 19.941400] which belongs to the cache kmalloc-64 of size 64 [ 19.941841] The buggy address is located 0 bytes to the right of [ 19.941841] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 19.942022] [ 19.942331] The buggy address belongs to the physical page: [ 19.942385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a [ 19.942546] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.942637] page_type: f5(slab) [ 19.942678] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.942943] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.943434] page dumped because: kasan: bad access detected [ 19.943653] [ 19.943681] Memory state around the buggy address: [ 19.943895] fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.944069] fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.944175] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.944427] ^ [ 19.944607] fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.944711] fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.944754] ================================================================== [ 19.779690] ================================================================== [ 19.779741] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 19.779790] Write of size 4 at addr fff00000c7a1ae30 by task kunit_try_catch/267 [ 19.779840] [ 19.780065] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 19.780180] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.780218] Hardware name: linux,dummy-virt (DT) [ 19.780261] Call trace: [ 19.780296] show_stack+0x20/0x38 (C) [ 19.780346] dump_stack_lvl+0x8c/0xd0 [ 19.780396] print_report+0x118/0x5d0 [ 19.780442] kasan_report+0xdc/0x128 [ 19.780489] kasan_check_range+0x100/0x1a8 [ 19.780538] __kasan_check_write+0x20/0x30 [ 19.780694] kunit_try_run_case+0x170/0x3f0 [ 19.780964] kasan_save_stack+0x3c/0x68 [ 19.781016] kasan_save_track+0x20/0x40 [ 19.781063] kasan_save_alloc_info+0x40/0x58 [ 19.781105] __kasan_kmalloc+0xd4/0xd8 [ 19.781142] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.781191] kasan_atomics+0xb8/0x2e0 [ 19.781228] kunit_try_run_case+0x170/0x3f0 [ 19.781269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.781847] kthread+0x328/0x630 [ 19.781907] ret_from_fork+0x10/0x20 [ 19.782040] [ 19.782087] The buggy address belongs to the object at fff00000c7a1ae00 [ 19.782087] which belongs to the cache kmalloc-64 of size 64 [ 19.782149] The buggy address is located 0 bytes to the right of [ 19.782149] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 19.782215] [ 19.782273] The buggy address belongs to the physical page: [ 19.782321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a [ 19.782374] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.782423] page_type: f5(slab) [ 19.782498] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.782681] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.782815] [ 19.783188] fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.783644] fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.784896] [ 19.785038] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.785098] Call trace: [ 19.785516] kasan_atomics_helper+0x3dcc/0x4858 [ 19.785772] kthread+0x328/0x630 [ 19.786313] kasan_save_alloc_info+0x40/0x58 [ 19.786353] __kasan_kmalloc+0xd4/0xd8 [ 19.786390] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.786698] [ 19.786779] The buggy address is located 0 bytes to the right of [ 19.786779] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 19.787392] page_type: f5(slab) [ 19.787792] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.787902] page dumped because: kasan: bad access detected [ 19.788343] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.788417] fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.789140] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.789697] kasan_report+0xdc/0x128 [ 19.790416] [ 19.792307] kasan_save_alloc_info+0x40/0x58 [ 19.792464] __kasan_kmalloc+0xd4/0xd8 [ 19.792505] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.793337] kasan_atomics+0xb8/0x2e0 [ 19.793529] kunit_try_run_case+0x170/0x3f0 [ 19.794038] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.794415] kthread+0x328/0x630 [ 19.796682] [ 19.797534] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.798169] [ 19.799599] fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.801453] fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.804821] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.805008] print_report+0x118/0x5d0 [ 19.809247] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.809372] kasan_atomics+0xb8/0x2e0 [ 19.809572] kunit_try_run_case+0x170/0x3f0 [ 19.810595] [ 19.810753] [ 19.810775] The buggy address belongs to the physical page: [ 19.811978] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.812493] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.814998] fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.815858] fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.824333] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.826825] kasan_report+0xdc/0x128 [ 19.828379] kunit_try_run_case+0x170/0x3f0 [ 19.829994] kasan_save_stack+0x3c/0x68 [ 19.831527] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.832495] kasan_atomics+0xb8/0x2e0 [ 19.832551] kunit_try_run_case+0x170/0x3f0 [ 19.833254] kthread+0x328/0x630 [ 19.833605] [ 19.833801] The buggy address is located 0 bytes to the right of [ 19.833801] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 19.837261] page dumped because: kasan: bad access detected [ 19.838446] fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.838628] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.841593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 19.845319] dump_stack_lvl+0x8c/0xd0 [ 19.847410] kasan_atomics+0x198/0x2e0 [ 19.852478] kasan_atomics+0xb8/0x2e0 [ 19.853582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.853740] kthread+0x328/0x630 [ 19.854184] ret_from_fork+0x10/0x20 [ 19.854677] The buggy address is located 0 bytes to the right of [ 19.854677] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 19.856738] page dumped because: kasan: bad access detected [ 19.857723] fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.865458] ================================================================== [ 19.956507] ================================================================== [ 19.956702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 19.956756] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267 [ 19.956807] [ 19.957076] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 19.957542] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.957720] Hardware name: linux,dummy-virt (DT) [ 19.957788] Call trace: [ 19.957815] show_stack+0x20/0x38 (C) [ 19.958023] dump_stack_lvl+0x8c/0xd0 [ 19.958222] print_report+0x118/0x5d0 [ 19.958277] kasan_report+0xdc/0x128 [ 19.958337] kasan_check_range+0x100/0x1a8 [ 19.958385] __kasan_check_write+0x20/0x30 [ 19.958434] kasan_atomics_helper+0xf20/0x4858 [ 19.958482] kasan_atomics+0x198/0x2e0 [ 19.958562] kunit_try_run_case+0x170/0x3f0 [ 19.958624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.958686] kthread+0x328/0x630 [ 19.959330] ret_from_fork+0x10/0x20 [ 19.959504] [ 19.959545] Allocated by task 267: [ 19.959986] kasan_save_stack+0x3c/0x68 [ 19.960221] kasan_save_track+0x20/0x40 [ 19.960555] kasan_save_alloc_info+0x40/0x58 [ 19.960834] __kasan_kmalloc+0xd4/0xd8 [ 19.961070] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.961141] kasan_atomics+0xb8/0x2e0 [ 19.961481] kunit_try_run_case+0x170/0x3f0 [ 19.961924] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.961981] kthread+0x328/0x630 [ 19.962690] ret_from_fork+0x10/0x20 [ 19.962946] [ 19.963014] The buggy address belongs to the object at fff00000c7a1ae00 [ 19.963014] which belongs to the cache kmalloc-64 of size 64 [ 19.963360] The buggy address is located 0 bytes to the right of [ 19.963360] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 19.963655] [ 19.963771] The buggy address belongs to the physical page: [ 19.963825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a [ 19.964234] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.964387] page_type: f5(slab) [ 19.964515] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.964756] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.964899] page dumped because: kasan: bad access detected [ 19.965062] [ 19.965315] Memory state around the buggy address: [ 19.965659] fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.965828] fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.966016] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.966202] ^ [ 19.966244] fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.966300] fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.966342] ================================================================== [ 20.173996] ================================================================== [ 20.174072] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 20.174124] Read of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267 [ 20.174183] [ 20.174397] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 20.174861] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.175027] Hardware name: linux,dummy-virt (DT) [ 20.175180] Call trace: [ 20.175305] show_stack+0x20/0x38 (C) [ 20.175773] dump_stack_lvl+0x8c/0xd0 [ 20.175990] print_report+0x118/0x5d0 [ 20.176089] kasan_report+0xdc/0x128 [ 20.176139] __asan_report_load8_noabort+0x20/0x30 [ 20.176399] kasan_atomics_helper+0x3e20/0x4858 [ 20.176749] kasan_atomics+0x198/0x2e0 [ 20.176976] kunit_try_run_case+0x170/0x3f0 [ 20.177100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.177230] kthread+0x328/0x630 [ 20.177693] ret_from_fork+0x10/0x20 [ 20.177851] [ 20.178047] Allocated by task 267: [ 20.178340] kasan_save_stack+0x3c/0x68 [ 20.178408] kasan_save_track+0x20/0x40 [ 20.178602] kasan_save_alloc_info+0x40/0x58 [ 20.178645] __kasan_kmalloc+0xd4/0xd8 [ 20.178993] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.179131] kasan_atomics+0xb8/0x2e0 [ 20.179431] kunit_try_run_case+0x170/0x3f0 [ 20.179632] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.179749] kthread+0x328/0x630 [ 20.179868] ret_from_fork+0x10/0x20 [ 20.179925] [ 20.179947] The buggy address belongs to the object at fff00000c7a1ae00 [ 20.179947] which belongs to the cache kmalloc-64 of size 64 [ 20.180007] The buggy address is located 0 bytes to the right of [ 20.180007] allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30) [ 20.180253] [ 20.180395] The buggy address belongs to the physical page: [ 20.180638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a [ 20.181008] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.181496] page_type: f5(slab) [ 20.181671] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.181777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.181823] page dumped because: kasan: bad access detected [ 20.182600] [ 20.182635] Memory state around the buggy address: [ 20.182675] fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.182967] fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.183199] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.183342] ^ [ 20.183492] fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.183548] fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.183967] ==================================================================
[ 14.218503] ================================================================== [ 14.218878] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 14.219258] Read of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.219645] [ 14.219771] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.219812] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.219824] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.219844] Call Trace: [ 14.219859] <TASK> [ 14.219873] dump_stack_lvl+0x73/0xb0 [ 14.219899] print_report+0xd1/0x610 [ 14.219922] ? __virt_addr_valid+0x1db/0x2d0 [ 14.219943] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.219964] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.219988] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.220010] kasan_report+0x141/0x180 [ 14.220034] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.220063] __asan_report_load4_noabort+0x18/0x20 [ 14.220085] kasan_atomics_helper+0x4a02/0x5450 [ 14.220109] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.220132] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.220154] ? kasan_atomics+0x152/0x310 [ 14.220180] kasan_atomics+0x1dc/0x310 [ 14.220199] ? __pfx_kasan_atomics+0x10/0x10 [ 14.220221] ? __pfx_read_tsc+0x10/0x10 [ 14.220251] ? ktime_get_ts64+0x86/0x230 [ 14.220275] kunit_try_run_case+0x1a5/0x480 [ 14.220297] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.220316] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.220336] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.220382] ? __kthread_parkme+0x82/0x180 [ 14.220404] ? preempt_count_sub+0x50/0x80 [ 14.220429] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.220451] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.220475] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.220499] kthread+0x337/0x6f0 [ 14.220516] ? trace_preempt_on+0x20/0xc0 [ 14.220540] ? __pfx_kthread+0x10/0x10 [ 14.220559] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.220581] ? calculate_sigpending+0x7b/0xa0 [ 14.220603] ? __pfx_kthread+0x10/0x10 [ 14.220622] ret_from_fork+0x41/0x80 [ 14.220644] ? __pfx_kthread+0x10/0x10 [ 14.220662] ret_from_fork_asm+0x1a/0x30 [ 14.220694] </TASK> [ 14.220705] [ 14.227703] Allocated by task 285: [ 14.227883] kasan_save_stack+0x45/0x70 [ 14.228079] kasan_save_track+0x18/0x40 [ 14.228303] kasan_save_alloc_info+0x3b/0x50 [ 14.228535] __kasan_kmalloc+0xb7/0xc0 [ 14.228721] __kmalloc_cache_noprof+0x189/0x420 [ 14.228922] kasan_atomics+0x95/0x310 [ 14.229129] kunit_try_run_case+0x1a5/0x480 [ 14.229313] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.229509] kthread+0x337/0x6f0 [ 14.229629] ret_from_fork+0x41/0x80 [ 14.229760] ret_from_fork_asm+0x1a/0x30 [ 14.229898] [ 14.229968] The buggy address belongs to the object at ffff888103d00c80 [ 14.229968] which belongs to the cache kmalloc-64 of size 64 [ 14.230474] The buggy address is located 0 bytes to the right of [ 14.230474] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.231046] [ 14.231163] The buggy address belongs to the physical page: [ 14.231458] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.231851] flags: 0x200000000000000(node=0|zone=2) [ 14.232082] page_type: f5(slab) [ 14.232289] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.232648] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.232985] page dumped because: kasan: bad access detected [ 14.233208] [ 14.233314] Memory state around the buggy address: [ 14.233552] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.233855] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.234159] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.234498] ^ [ 14.234723] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.234939] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.235287] ================================================================== [ 14.146974] ================================================================== [ 14.147363] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 14.147912] Read of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.148192] [ 14.148286] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.148328] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.148340] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.148360] Call Trace: [ 14.148375] <TASK> [ 14.148405] dump_stack_lvl+0x73/0xb0 [ 14.148430] print_report+0xd1/0x610 [ 14.148452] ? __virt_addr_valid+0x1db/0x2d0 [ 14.148474] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.148495] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.148528] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.148551] kasan_report+0x141/0x180 [ 14.148585] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.148612] __asan_report_load4_noabort+0x18/0x20 [ 14.148634] kasan_atomics_helper+0x4a36/0x5450 [ 14.148658] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.148681] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.148712] ? kasan_atomics+0x152/0x310 [ 14.148735] kasan_atomics+0x1dc/0x310 [ 14.148755] ? __pfx_kasan_atomics+0x10/0x10 [ 14.148787] ? __pfx_read_tsc+0x10/0x10 [ 14.148808] ? ktime_get_ts64+0x86/0x230 [ 14.148833] kunit_try_run_case+0x1a5/0x480 [ 14.148855] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.148883] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.148904] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.148935] ? __kthread_parkme+0x82/0x180 [ 14.148967] ? preempt_count_sub+0x50/0x80 [ 14.148994] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.149016] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.149048] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.149072] kthread+0x337/0x6f0 [ 14.149090] ? trace_preempt_on+0x20/0xc0 [ 14.149124] ? __pfx_kthread+0x10/0x10 [ 14.149143] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.149165] ? calculate_sigpending+0x7b/0xa0 [ 14.149187] ? __pfx_kthread+0x10/0x10 [ 14.149206] ret_from_fork+0x41/0x80 [ 14.149243] ? __pfx_kthread+0x10/0x10 [ 14.149262] ret_from_fork_asm+0x1a/0x30 [ 14.149305] </TASK> [ 14.149316] [ 14.156694] Allocated by task 285: [ 14.156848] kasan_save_stack+0x45/0x70 [ 14.157035] kasan_save_track+0x18/0x40 [ 14.157202] kasan_save_alloc_info+0x3b/0x50 [ 14.157457] __kasan_kmalloc+0xb7/0xc0 [ 14.157632] __kmalloc_cache_noprof+0x189/0x420 [ 14.157857] kasan_atomics+0x95/0x310 [ 14.158057] kunit_try_run_case+0x1a5/0x480 [ 14.158247] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.158447] kthread+0x337/0x6f0 [ 14.158569] ret_from_fork+0x41/0x80 [ 14.158700] ret_from_fork_asm+0x1a/0x30 [ 14.158839] [ 14.158908] The buggy address belongs to the object at ffff888103d00c80 [ 14.158908] which belongs to the cache kmalloc-64 of size 64 [ 14.159281] The buggy address is located 0 bytes to the right of [ 14.159281] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.159865] [ 14.159959] The buggy address belongs to the physical page: [ 14.160205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.160585] flags: 0x200000000000000(node=0|zone=2) [ 14.160813] page_type: f5(slab) [ 14.160984] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.161250] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.161506] page dumped because: kasan: bad access detected [ 14.161761] [ 14.161868] Memory state around the buggy address: [ 14.162100] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.162471] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.162761] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.163058] ^ [ 14.163298] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.163634] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.163926] ================================================================== [ 14.623010] ================================================================== [ 14.623325] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 14.623644] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.624320] [ 14.624435] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.624481] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.624495] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.624517] Call Trace: [ 14.624532] <TASK> [ 14.624545] dump_stack_lvl+0x73/0xb0 [ 14.624572] print_report+0xd1/0x610 [ 14.624595] ? __virt_addr_valid+0x1db/0x2d0 [ 14.624616] ? kasan_atomics_helper+0x1c18/0x5450 [ 14.624638] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.624661] ? kasan_atomics_helper+0x1c18/0x5450 [ 14.624684] kasan_report+0x141/0x180 [ 14.624708] ? kasan_atomics_helper+0x1c18/0x5450 [ 14.624736] kasan_check_range+0x10c/0x1c0 [ 14.624756] __kasan_check_write+0x18/0x20 [ 14.624776] kasan_atomics_helper+0x1c18/0x5450 [ 14.624800] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.624823] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.624845] ? kasan_atomics+0x152/0x310 [ 14.624869] kasan_atomics+0x1dc/0x310 [ 14.624889] ? __pfx_kasan_atomics+0x10/0x10 [ 14.624910] ? __pfx_read_tsc+0x10/0x10 [ 14.624935] ? ktime_get_ts64+0x86/0x230 [ 14.624961] kunit_try_run_case+0x1a5/0x480 [ 14.624982] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.625001] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.625023] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.625047] ? __kthread_parkme+0x82/0x180 [ 14.625069] ? preempt_count_sub+0x50/0x80 [ 14.625095] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.625116] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.625140] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.625163] kthread+0x337/0x6f0 [ 14.625181] ? trace_preempt_on+0x20/0xc0 [ 14.625204] ? __pfx_kthread+0x10/0x10 [ 14.625233] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.625256] ? calculate_sigpending+0x7b/0xa0 [ 14.625277] ? __pfx_kthread+0x10/0x10 [ 14.625296] ret_from_fork+0x41/0x80 [ 14.625317] ? __pfx_kthread+0x10/0x10 [ 14.625335] ret_from_fork_asm+0x1a/0x30 [ 14.625467] </TASK> [ 14.625482] [ 14.632701] Allocated by task 285: [ 14.632843] kasan_save_stack+0x45/0x70 [ 14.633031] kasan_save_track+0x18/0x40 [ 14.633201] kasan_save_alloc_info+0x3b/0x50 [ 14.633350] __kasan_kmalloc+0xb7/0xc0 [ 14.633478] __kmalloc_cache_noprof+0x189/0x420 [ 14.633626] kasan_atomics+0x95/0x310 [ 14.633749] kunit_try_run_case+0x1a5/0x480 [ 14.633886] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.634103] kthread+0x337/0x6f0 [ 14.634272] ret_from_fork+0x41/0x80 [ 14.634450] ret_from_fork_asm+0x1a/0x30 [ 14.634638] [ 14.634728] The buggy address belongs to the object at ffff888103d00c80 [ 14.634728] which belongs to the cache kmalloc-64 of size 64 [ 14.635375] The buggy address is located 0 bytes to the right of [ 14.635375] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.635744] [ 14.635814] The buggy address belongs to the physical page: [ 14.636023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.636380] flags: 0x200000000000000(node=0|zone=2) [ 14.636614] page_type: f5(slab) [ 14.636776] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.637125] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.637368] page dumped because: kasan: bad access detected [ 14.637627] [ 14.637718] Memory state around the buggy address: [ 14.637923] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.638192] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.638508] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.638727] ^ [ 14.638906] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.639242] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.639816] ================================================================== [ 14.868753] ================================================================== [ 14.869113] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 14.869496] Read of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.869845] [ 14.869951] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.869991] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.870003] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.870023] Call Trace: [ 14.870036] <TASK> [ 14.870051] dump_stack_lvl+0x73/0xb0 [ 14.870075] print_report+0xd1/0x610 [ 14.870098] ? __virt_addr_valid+0x1db/0x2d0 [ 14.870122] ? kasan_atomics_helper+0x4fa5/0x5450 [ 14.870147] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.870174] ? kasan_atomics_helper+0x4fa5/0x5450 [ 14.870196] kasan_report+0x141/0x180 [ 14.870219] ? kasan_atomics_helper+0x4fa5/0x5450 [ 14.870258] __asan_report_load8_noabort+0x18/0x20 [ 14.870281] kasan_atomics_helper+0x4fa5/0x5450 [ 14.870304] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.870328] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.870370] ? kasan_atomics+0x152/0x310 [ 14.870394] kasan_atomics+0x1dc/0x310 [ 14.870413] ? __pfx_kasan_atomics+0x10/0x10 [ 14.870435] ? __pfx_read_tsc+0x10/0x10 [ 14.870456] ? ktime_get_ts64+0x86/0x230 [ 14.870481] kunit_try_run_case+0x1a5/0x480 [ 14.870503] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.870522] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.870544] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.870569] ? __kthread_parkme+0x82/0x180 [ 14.870591] ? preempt_count_sub+0x50/0x80 [ 14.870617] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.870638] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.870662] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.870685] kthread+0x337/0x6f0 [ 14.870703] ? trace_preempt_on+0x20/0xc0 [ 14.870726] ? __pfx_kthread+0x10/0x10 [ 14.870745] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.870768] ? calculate_sigpending+0x7b/0xa0 [ 14.870789] ? __pfx_kthread+0x10/0x10 [ 14.870808] ret_from_fork+0x41/0x80 [ 14.870829] ? __pfx_kthread+0x10/0x10 [ 14.870847] ret_from_fork_asm+0x1a/0x30 [ 14.870878] </TASK> [ 14.870888] [ 14.880536] Allocated by task 285: [ 14.880730] kasan_save_stack+0x45/0x70 [ 14.880940] kasan_save_track+0x18/0x40 [ 14.881132] kasan_save_alloc_info+0x3b/0x50 [ 14.881656] __kasan_kmalloc+0xb7/0xc0 [ 14.881927] __kmalloc_cache_noprof+0x189/0x420 [ 14.882380] kasan_atomics+0x95/0x310 [ 14.882623] kunit_try_run_case+0x1a5/0x480 [ 14.882933] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.883189] kthread+0x337/0x6f0 [ 14.883596] ret_from_fork+0x41/0x80 [ 14.883841] ret_from_fork_asm+0x1a/0x30 [ 14.884149] [ 14.884261] The buggy address belongs to the object at ffff888103d00c80 [ 14.884261] which belongs to the cache kmalloc-64 of size 64 [ 14.884943] The buggy address is located 0 bytes to the right of [ 14.884943] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.885738] [ 14.885976] The buggy address belongs to the physical page: [ 14.886494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.886959] flags: 0x200000000000000(node=0|zone=2) [ 14.887459] page_type: f5(slab) [ 14.887704] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.888147] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.888614] page dumped because: kasan: bad access detected [ 14.889056] [ 14.889159] Memory state around the buggy address: [ 14.889584] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.890033] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.890482] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.890920] ^ [ 14.891140] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.891663] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.892334] ================================================================== [ 14.722247] ================================================================== [ 14.722634] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 14.722973] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.723282] [ 14.723409] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.723454] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.723468] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.723490] Call Trace: [ 14.723506] <TASK> [ 14.723522] dump_stack_lvl+0x73/0xb0 [ 14.723548] print_report+0xd1/0x610 [ 14.723571] ? __virt_addr_valid+0x1db/0x2d0 [ 14.723593] ? kasan_atomics_helper+0x1eaa/0x5450 [ 14.723615] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.723639] ? kasan_atomics_helper+0x1eaa/0x5450 [ 14.723662] kasan_report+0x141/0x180 [ 14.723685] ? kasan_atomics_helper+0x1eaa/0x5450 [ 14.723713] kasan_check_range+0x10c/0x1c0 [ 14.723734] __kasan_check_write+0x18/0x20 [ 14.723755] kasan_atomics_helper+0x1eaa/0x5450 [ 14.723779] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.723802] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.723824] ? kasan_atomics+0x152/0x310 [ 14.723848] kasan_atomics+0x1dc/0x310 [ 14.723868] ? __pfx_kasan_atomics+0x10/0x10 [ 14.723890] ? __pfx_read_tsc+0x10/0x10 [ 14.723911] ? ktime_get_ts64+0x86/0x230 [ 14.723936] kunit_try_run_case+0x1a5/0x480 [ 14.723958] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.723978] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.724000] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.724025] ? __kthread_parkme+0x82/0x180 [ 14.724047] ? preempt_count_sub+0x50/0x80 [ 14.724073] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.724094] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.724118] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.724142] kthread+0x337/0x6f0 [ 14.724160] ? trace_preempt_on+0x20/0xc0 [ 14.724185] ? __pfx_kthread+0x10/0x10 [ 14.724204] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.724237] ? calculate_sigpending+0x7b/0xa0 [ 14.724259] ? __pfx_kthread+0x10/0x10 [ 14.724278] ret_from_fork+0x41/0x80 [ 14.724300] ? __pfx_kthread+0x10/0x10 [ 14.724320] ret_from_fork_asm+0x1a/0x30 [ 14.724372] </TASK> [ 14.724385] [ 14.731418] Allocated by task 285: [ 14.731551] kasan_save_stack+0x45/0x70 [ 14.731750] kasan_save_track+0x18/0x40 [ 14.731941] kasan_save_alloc_info+0x3b/0x50 [ 14.732146] __kasan_kmalloc+0xb7/0xc0 [ 14.732340] __kmalloc_cache_noprof+0x189/0x420 [ 14.732577] kasan_atomics+0x95/0x310 [ 14.732763] kunit_try_run_case+0x1a5/0x480 [ 14.732969] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.733216] kthread+0x337/0x6f0 [ 14.733396] ret_from_fork+0x41/0x80 [ 14.733558] ret_from_fork_asm+0x1a/0x30 [ 14.733696] [ 14.733766] The buggy address belongs to the object at ffff888103d00c80 [ 14.733766] which belongs to the cache kmalloc-64 of size 64 [ 14.734219] The buggy address is located 0 bytes to the right of [ 14.734219] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.734827] [ 14.734925] The buggy address belongs to the physical page: [ 14.735144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.735497] flags: 0x200000000000000(node=0|zone=2) [ 14.735662] page_type: f5(slab) [ 14.735817] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.736167] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.736501] page dumped because: kasan: bad access detected [ 14.736723] [ 14.736819] Memory state around the buggy address: [ 14.737019] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.737285] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.737624] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.737911] ^ [ 14.738099] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.738324] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.738555] ================================================================== [ 14.757258] ================================================================== [ 14.757785] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 14.758154] Read of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.758519] [ 14.758632] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.758700] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.758713] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.758750] Call Trace: [ 14.758766] <TASK> [ 14.758794] dump_stack_lvl+0x73/0xb0 [ 14.758835] print_report+0xd1/0x610 [ 14.758872] ? __virt_addr_valid+0x1db/0x2d0 [ 14.758907] ? kasan_atomics_helper+0x4f71/0x5450 [ 14.758942] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.758979] ? kasan_atomics_helper+0x4f71/0x5450 [ 14.759003] kasan_report+0x141/0x180 [ 14.759027] ? kasan_atomics_helper+0x4f71/0x5450 [ 14.759056] __asan_report_load8_noabort+0x18/0x20 [ 14.759077] kasan_atomics_helper+0x4f71/0x5450 [ 14.759102] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.759125] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.759147] ? kasan_atomics+0x152/0x310 [ 14.759171] kasan_atomics+0x1dc/0x310 [ 14.759191] ? __pfx_kasan_atomics+0x10/0x10 [ 14.759213] ? __pfx_read_tsc+0x10/0x10 [ 14.759243] ? ktime_get_ts64+0x86/0x230 [ 14.759269] kunit_try_run_case+0x1a5/0x480 [ 14.759291] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.759311] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.759332] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.759391] ? __kthread_parkme+0x82/0x180 [ 14.759414] ? preempt_count_sub+0x50/0x80 [ 14.759439] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.759461] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.759485] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.759511] kthread+0x337/0x6f0 [ 14.759529] ? trace_preempt_on+0x20/0xc0 [ 14.759553] ? __pfx_kthread+0x10/0x10 [ 14.759572] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.759596] ? calculate_sigpending+0x7b/0xa0 [ 14.759618] ? __pfx_kthread+0x10/0x10 [ 14.759637] ret_from_fork+0x41/0x80 [ 14.759658] ? __pfx_kthread+0x10/0x10 [ 14.759677] ret_from_fork_asm+0x1a/0x30 [ 14.759709] </TASK> [ 14.759722] [ 14.767156] Allocated by task 285: [ 14.767321] kasan_save_stack+0x45/0x70 [ 14.767559] kasan_save_track+0x18/0x40 [ 14.767752] kasan_save_alloc_info+0x3b/0x50 [ 14.767936] __kasan_kmalloc+0xb7/0xc0 [ 14.768125] __kmalloc_cache_noprof+0x189/0x420 [ 14.768330] kasan_atomics+0x95/0x310 [ 14.768544] kunit_try_run_case+0x1a5/0x480 [ 14.768729] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.768927] kthread+0x337/0x6f0 [ 14.769046] ret_from_fork+0x41/0x80 [ 14.769177] ret_from_fork_asm+0x1a/0x30 [ 14.769414] [ 14.769528] The buggy address belongs to the object at ffff888103d00c80 [ 14.769528] which belongs to the cache kmalloc-64 of size 64 [ 14.770051] The buggy address is located 0 bytes to the right of [ 14.770051] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.770666] [ 14.770763] The buggy address belongs to the physical page: [ 14.771006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.771401] flags: 0x200000000000000(node=0|zone=2) [ 14.771640] page_type: f5(slab) [ 14.771807] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.772077] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.772316] page dumped because: kasan: bad access detected [ 14.772515] [ 14.772591] Memory state around the buggy address: [ 14.772816] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.773164] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.773536] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.773888] ^ [ 14.774136] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.774541] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.774793] ================================================================== [ 13.674308] ================================================================== [ 13.674576] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 13.675036] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 13.675314] [ 13.675460] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 13.675509] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.675522] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.675546] Call Trace: [ 13.675567] <TASK> [ 13.675587] dump_stack_lvl+0x73/0xb0 [ 13.675615] print_report+0xd1/0x610 [ 13.675639] ? __virt_addr_valid+0x1db/0x2d0 [ 13.675663] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.675686] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.675710] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.675733] kasan_report+0x141/0x180 [ 13.675756] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.675784] __asan_report_store4_noabort+0x1b/0x30 [ 13.675807] kasan_atomics_helper+0x4b6e/0x5450 [ 13.675830] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.675854] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.675876] ? kasan_atomics+0x152/0x310 [ 13.675901] kasan_atomics+0x1dc/0x310 [ 13.675921] ? __pfx_kasan_atomics+0x10/0x10 [ 13.675942] ? __pfx_read_tsc+0x10/0x10 [ 13.675964] ? ktime_get_ts64+0x86/0x230 [ 13.675990] kunit_try_run_case+0x1a5/0x480 [ 13.676013] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.676032] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.676054] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.676080] ? __kthread_parkme+0x82/0x180 [ 13.676102] ? preempt_count_sub+0x50/0x80 [ 13.676128] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.676150] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.676173] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.676198] kthread+0x337/0x6f0 [ 13.676216] ? trace_preempt_on+0x20/0xc0 [ 13.676253] ? __pfx_kthread+0x10/0x10 [ 13.676272] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.676295] ? calculate_sigpending+0x7b/0xa0 [ 13.676318] ? __pfx_kthread+0x10/0x10 [ 13.676336] ret_from_fork+0x41/0x80 [ 13.676381] ? __pfx_kthread+0x10/0x10 [ 13.676401] ret_from_fork_asm+0x1a/0x30 [ 13.676449] </TASK> [ 13.676461] [ 13.687532] Allocated by task 285: [ 13.688017] kasan_save_stack+0x45/0x70 [ 13.688720] kasan_save_track+0x18/0x40 [ 13.688908] kasan_save_alloc_info+0x3b/0x50 [ 13.689221] __kasan_kmalloc+0xb7/0xc0 [ 13.689395] __kmalloc_cache_noprof+0x189/0x420 [ 13.689851] kasan_atomics+0x95/0x310 [ 13.690200] kunit_try_run_case+0x1a5/0x480 [ 13.690469] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.690909] kthread+0x337/0x6f0 [ 13.691107] ret_from_fork+0x41/0x80 [ 13.691390] ret_from_fork_asm+0x1a/0x30 [ 13.691603] [ 13.691697] The buggy address belongs to the object at ffff888103d00c80 [ 13.691697] which belongs to the cache kmalloc-64 of size 64 [ 13.692594] The buggy address is located 0 bytes to the right of [ 13.692594] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 13.693315] [ 13.693559] The buggy address belongs to the physical page: [ 13.694055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 13.694537] flags: 0x200000000000000(node=0|zone=2) [ 13.694832] page_type: f5(slab) [ 13.695006] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.695495] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.695928] page dumped because: kasan: bad access detected [ 13.696285] [ 13.696467] Memory state around the buggy address: [ 13.696861] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.697160] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.697476] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.697997] ^ [ 13.698178] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.698755] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.699058] ================================================================== [ 14.164547] ================================================================== [ 14.164923] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 14.165297] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.165637] [ 14.165741] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.165784] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.165796] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.165816] Call Trace: [ 14.165831] <TASK> [ 14.165845] dump_stack_lvl+0x73/0xb0 [ 14.165869] print_report+0xd1/0x610 [ 14.165892] ? __virt_addr_valid+0x1db/0x2d0 [ 14.165913] ? kasan_atomics_helper+0x1079/0x5450 [ 14.165935] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.165957] ? kasan_atomics_helper+0x1079/0x5450 [ 14.165980] kasan_report+0x141/0x180 [ 14.166003] ? kasan_atomics_helper+0x1079/0x5450 [ 14.166030] kasan_check_range+0x10c/0x1c0 [ 14.166051] __kasan_check_write+0x18/0x20 [ 14.166071] kasan_atomics_helper+0x1079/0x5450 [ 14.166095] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.166117] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.166139] ? kasan_atomics+0x152/0x310 [ 14.166163] kasan_atomics+0x1dc/0x310 [ 14.166184] ? __pfx_kasan_atomics+0x10/0x10 [ 14.166205] ? __pfx_read_tsc+0x10/0x10 [ 14.166236] ? ktime_get_ts64+0x86/0x230 [ 14.166271] kunit_try_run_case+0x1a5/0x480 [ 14.166293] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.166312] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.166369] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.166394] ? __kthread_parkme+0x82/0x180 [ 14.166416] ? preempt_count_sub+0x50/0x80 [ 14.166453] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.166474] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.166498] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.166522] kthread+0x337/0x6f0 [ 14.166539] ? trace_preempt_on+0x20/0xc0 [ 14.166563] ? __pfx_kthread+0x10/0x10 [ 14.166582] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.166614] ? calculate_sigpending+0x7b/0xa0 [ 14.166636] ? __pfx_kthread+0x10/0x10 [ 14.166655] ret_from_fork+0x41/0x80 [ 14.166687] ? __pfx_kthread+0x10/0x10 [ 14.166706] ret_from_fork_asm+0x1a/0x30 [ 14.166738] </TASK> [ 14.166748] [ 14.174215] Allocated by task 285: [ 14.174412] kasan_save_stack+0x45/0x70 [ 14.174614] kasan_save_track+0x18/0x40 [ 14.174773] kasan_save_alloc_info+0x3b/0x50 [ 14.175000] __kasan_kmalloc+0xb7/0xc0 [ 14.175172] __kmalloc_cache_noprof+0x189/0x420 [ 14.175422] kasan_atomics+0x95/0x310 [ 14.175621] kunit_try_run_case+0x1a5/0x480 [ 14.175823] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.176000] kthread+0x337/0x6f0 [ 14.176117] ret_from_fork+0x41/0x80 [ 14.176264] ret_from_fork_asm+0x1a/0x30 [ 14.176496] [ 14.176590] The buggy address belongs to the object at ffff888103d00c80 [ 14.176590] which belongs to the cache kmalloc-64 of size 64 [ 14.177147] The buggy address is located 0 bytes to the right of [ 14.177147] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.177684] [ 14.177757] The buggy address belongs to the physical page: [ 14.177928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.178259] flags: 0x200000000000000(node=0|zone=2) [ 14.178539] page_type: f5(slab) [ 14.178734] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.179081] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.179454] page dumped because: kasan: bad access detected [ 14.179685] [ 14.179780] Memory state around the buggy address: [ 14.179949] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.180291] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.180616] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.180901] ^ [ 14.181125] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.181459] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.181760] ================================================================== [ 14.007313] ================================================================== [ 14.007683] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 14.008011] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.008318] [ 14.008446] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.008491] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.008503] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.008525] Call Trace: [ 14.008541] <TASK> [ 14.008556] dump_stack_lvl+0x73/0xb0 [ 14.008580] print_report+0xd1/0x610 [ 14.008603] ? __virt_addr_valid+0x1db/0x2d0 [ 14.008624] ? kasan_atomics_helper+0xc70/0x5450 [ 14.008646] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.008669] ? kasan_atomics_helper+0xc70/0x5450 [ 14.008692] kasan_report+0x141/0x180 [ 14.008715] ? kasan_atomics_helper+0xc70/0x5450 [ 14.008743] kasan_check_range+0x10c/0x1c0 [ 14.008764] __kasan_check_write+0x18/0x20 [ 14.008785] kasan_atomics_helper+0xc70/0x5450 [ 14.008808] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.008831] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.008853] ? kasan_atomics+0x152/0x310 [ 14.008876] kasan_atomics+0x1dc/0x310 [ 14.008897] ? __pfx_kasan_atomics+0x10/0x10 [ 14.008923] ? __pfx_read_tsc+0x10/0x10 [ 14.008943] ? ktime_get_ts64+0x86/0x230 [ 14.008969] kunit_try_run_case+0x1a5/0x480 [ 14.008990] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.009009] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.009030] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.009056] ? __kthread_parkme+0x82/0x180 [ 14.009077] ? preempt_count_sub+0x50/0x80 [ 14.009103] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.009125] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.009148] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.009172] kthread+0x337/0x6f0 [ 14.009189] ? trace_preempt_on+0x20/0xc0 [ 14.009215] ? __pfx_kthread+0x10/0x10 [ 14.009245] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.009268] ? calculate_sigpending+0x7b/0xa0 [ 14.009289] ? __pfx_kthread+0x10/0x10 [ 14.009309] ret_from_fork+0x41/0x80 [ 14.009330] ? __pfx_kthread+0x10/0x10 [ 14.009348] ret_from_fork_asm+0x1a/0x30 [ 14.009380] </TASK> [ 14.009391] [ 14.016546] Allocated by task 285: [ 14.016725] kasan_save_stack+0x45/0x70 [ 14.016967] kasan_save_track+0x18/0x40 [ 14.017160] kasan_save_alloc_info+0x3b/0x50 [ 14.017375] __kasan_kmalloc+0xb7/0xc0 [ 14.017645] __kmalloc_cache_noprof+0x189/0x420 [ 14.018091] kasan_atomics+0x95/0x310 [ 14.018235] kunit_try_run_case+0x1a5/0x480 [ 14.018426] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.018685] kthread+0x337/0x6f0 [ 14.018850] ret_from_fork+0x41/0x80 [ 14.019005] ret_from_fork_asm+0x1a/0x30 [ 14.019175] [ 14.019270] The buggy address belongs to the object at ffff888103d00c80 [ 14.019270] which belongs to the cache kmalloc-64 of size 64 [ 14.019723] The buggy address is located 0 bytes to the right of [ 14.019723] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.020205] [ 14.020314] The buggy address belongs to the physical page: [ 14.020739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.021061] flags: 0x200000000000000(node=0|zone=2) [ 14.021273] page_type: f5(slab) [ 14.021513] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.021812] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.022112] page dumped because: kasan: bad access detected [ 14.022345] [ 14.022450] Memory state around the buggy address: [ 14.022654] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.022936] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.023213] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.023545] ^ [ 14.023743] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.024003] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.024296] ================================================================== [ 14.257601] ================================================================== [ 14.258300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 14.258962] Read of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.259553] [ 14.259646] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.259692] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.259704] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.259727] Call Trace: [ 14.259746] <TASK> [ 14.259763] dump_stack_lvl+0x73/0xb0 [ 14.259790] print_report+0xd1/0x610 [ 14.259814] ? __virt_addr_valid+0x1db/0x2d0 [ 14.259836] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.259858] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.259881] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.259904] kasan_report+0x141/0x180 [ 14.259927] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.259955] __asan_report_load4_noabort+0x18/0x20 [ 14.259976] kasan_atomics_helper+0x49e8/0x5450 [ 14.260000] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.260022] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.260044] ? kasan_atomics+0x152/0x310 [ 14.260068] kasan_atomics+0x1dc/0x310 [ 14.260088] ? __pfx_kasan_atomics+0x10/0x10 [ 14.260109] ? __pfx_read_tsc+0x10/0x10 [ 14.260129] ? ktime_get_ts64+0x86/0x230 [ 14.260155] kunit_try_run_case+0x1a5/0x480 [ 14.260177] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.260196] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.260217] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.260261] ? __kthread_parkme+0x82/0x180 [ 14.260283] ? preempt_count_sub+0x50/0x80 [ 14.260309] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.260330] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.260384] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.260408] kthread+0x337/0x6f0 [ 14.260426] ? trace_preempt_on+0x20/0xc0 [ 14.260470] ? __pfx_kthread+0x10/0x10 [ 14.260489] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.260512] ? calculate_sigpending+0x7b/0xa0 [ 14.260544] ? __pfx_kthread+0x10/0x10 [ 14.260564] ret_from_fork+0x41/0x80 [ 14.260584] ? __pfx_kthread+0x10/0x10 [ 14.260603] ret_from_fork_asm+0x1a/0x30 [ 14.260635] </TASK> [ 14.260646] [ 14.274193] Allocated by task 285: [ 14.274363] kasan_save_stack+0x45/0x70 [ 14.274752] kasan_save_track+0x18/0x40 [ 14.275128] kasan_save_alloc_info+0x3b/0x50 [ 14.275546] __kasan_kmalloc+0xb7/0xc0 [ 14.275903] __kmalloc_cache_noprof+0x189/0x420 [ 14.276321] kasan_atomics+0x95/0x310 [ 14.276659] kunit_try_run_case+0x1a5/0x480 [ 14.276984] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.277160] kthread+0x337/0x6f0 [ 14.277435] ret_from_fork+0x41/0x80 [ 14.277779] ret_from_fork_asm+0x1a/0x30 [ 14.278142] [ 14.278315] The buggy address belongs to the object at ffff888103d00c80 [ 14.278315] which belongs to the cache kmalloc-64 of size 64 [ 14.279267] The buggy address is located 0 bytes to the right of [ 14.279267] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.279880] [ 14.279954] The buggy address belongs to the physical page: [ 14.280127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.280724] flags: 0x200000000000000(node=0|zone=2) [ 14.281188] page_type: f5(slab) [ 14.281535] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.282189] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.282864] page dumped because: kasan: bad access detected [ 14.283391] [ 14.283559] Memory state around the buggy address: [ 14.283992] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.284474] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.284693] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.284909] ^ [ 14.285077] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.285474] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.286081] ================================================================== [ 13.823664] ================================================================== [ 13.824365] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 13.825105] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 13.825430] [ 13.825552] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 13.825600] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.825613] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.825637] Call Trace: [ 13.825658] <TASK> [ 13.825677] dump_stack_lvl+0x73/0xb0 [ 13.825705] print_report+0xd1/0x610 [ 13.825728] ? __virt_addr_valid+0x1db/0x2d0 [ 13.825751] ? kasan_atomics_helper+0x697/0x5450 [ 13.825772] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.825795] ? kasan_atomics_helper+0x697/0x5450 [ 13.825818] kasan_report+0x141/0x180 [ 13.825842] ? kasan_atomics_helper+0x697/0x5450 [ 13.825870] kasan_check_range+0x10c/0x1c0 [ 13.825891] __kasan_check_write+0x18/0x20 [ 13.825911] kasan_atomics_helper+0x697/0x5450 [ 13.825935] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.825957] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.825980] ? kasan_atomics+0x152/0x310 [ 13.826003] kasan_atomics+0x1dc/0x310 [ 13.826023] ? __pfx_kasan_atomics+0x10/0x10 [ 13.826045] ? __pfx_read_tsc+0x10/0x10 [ 13.826066] ? ktime_get_ts64+0x86/0x230 [ 13.826092] kunit_try_run_case+0x1a5/0x480 [ 13.826114] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.826133] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.826155] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.826179] ? __kthread_parkme+0x82/0x180 [ 13.826202] ? preempt_count_sub+0x50/0x80 [ 13.826239] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.826260] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.826284] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.826307] kthread+0x337/0x6f0 [ 13.826324] ? trace_preempt_on+0x20/0xc0 [ 13.826349] ? __pfx_kthread+0x10/0x10 [ 13.826379] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.826402] ? calculate_sigpending+0x7b/0xa0 [ 13.826424] ? __pfx_kthread+0x10/0x10 [ 13.826442] ret_from_fork+0x41/0x80 [ 13.826465] ? __pfx_kthread+0x10/0x10 [ 13.826483] ret_from_fork_asm+0x1a/0x30 [ 13.826514] </TASK> [ 13.826525] [ 13.835375] Allocated by task 285: [ 13.835539] kasan_save_stack+0x45/0x70 [ 13.835749] kasan_save_track+0x18/0x40 [ 13.835952] kasan_save_alloc_info+0x3b/0x50 [ 13.836127] __kasan_kmalloc+0xb7/0xc0 [ 13.836330] __kmalloc_cache_noprof+0x189/0x420 [ 13.836530] kasan_atomics+0x95/0x310 [ 13.836710] kunit_try_run_case+0x1a5/0x480 [ 13.836856] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.837039] kthread+0x337/0x6f0 [ 13.837185] ret_from_fork+0x41/0x80 [ 13.837375] ret_from_fork_asm+0x1a/0x30 [ 13.837601] [ 13.837694] The buggy address belongs to the object at ffff888103d00c80 [ 13.837694] which belongs to the cache kmalloc-64 of size 64 [ 13.838121] The buggy address is located 0 bytes to the right of [ 13.838121] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 13.838818] [ 13.838915] The buggy address belongs to the physical page: [ 13.839136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 13.839503] flags: 0x200000000000000(node=0|zone=2) [ 13.839723] page_type: f5(slab) [ 13.839907] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.840208] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.840496] page dumped because: kasan: bad access detected [ 13.840752] [ 13.840866] Memory state around the buggy address: [ 13.841119] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.841406] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.841770] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.842068] ^ [ 13.842266] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.842605] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.842854] ================================================================== [ 14.129302] ================================================================== [ 14.129605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 14.129908] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.130199] [ 14.130529] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.130575] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.130588] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.130610] Call Trace: [ 14.130627] <TASK> [ 14.130643] dump_stack_lvl+0x73/0xb0 [ 14.130668] print_report+0xd1/0x610 [ 14.130690] ? __virt_addr_valid+0x1db/0x2d0 [ 14.130712] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.130746] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.130770] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.130793] kasan_report+0x141/0x180 [ 14.130827] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.130855] kasan_check_range+0x10c/0x1c0 [ 14.130876] __kasan_check_write+0x18/0x20 [ 14.130897] kasan_atomics_helper+0xfa9/0x5450 [ 14.130929] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.130952] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.130974] ? kasan_atomics+0x152/0x310 [ 14.131008] kasan_atomics+0x1dc/0x310 [ 14.131028] ? __pfx_kasan_atomics+0x10/0x10 [ 14.131051] ? __pfx_read_tsc+0x10/0x10 [ 14.131072] ? ktime_get_ts64+0x86/0x230 [ 14.131106] kunit_try_run_case+0x1a5/0x480 [ 14.131127] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.131147] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.131178] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.131203] ? __kthread_parkme+0x82/0x180 [ 14.131235] ? preempt_count_sub+0x50/0x80 [ 14.131262] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.131283] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.131308] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.131331] kthread+0x337/0x6f0 [ 14.131370] ? trace_preempt_on+0x20/0xc0 [ 14.131394] ? __pfx_kthread+0x10/0x10 [ 14.131412] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.131436] ? calculate_sigpending+0x7b/0xa0 [ 14.131458] ? __pfx_kthread+0x10/0x10 [ 14.131478] ret_from_fork+0x41/0x80 [ 14.131509] ? __pfx_kthread+0x10/0x10 [ 14.131528] ret_from_fork_asm+0x1a/0x30 [ 14.131561] </TASK> [ 14.131583] [ 14.138975] Allocated by task 285: [ 14.139110] kasan_save_stack+0x45/0x70 [ 14.139269] kasan_save_track+0x18/0x40 [ 14.139474] kasan_save_alloc_info+0x3b/0x50 [ 14.139686] __kasan_kmalloc+0xb7/0xc0 [ 14.139894] __kmalloc_cache_noprof+0x189/0x420 [ 14.140113] kasan_atomics+0x95/0x310 [ 14.140318] kunit_try_run_case+0x1a5/0x480 [ 14.140548] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.140813] kthread+0x337/0x6f0 [ 14.140982] ret_from_fork+0x41/0x80 [ 14.141164] ret_from_fork_asm+0x1a/0x30 [ 14.141402] [ 14.141488] The buggy address belongs to the object at ffff888103d00c80 [ 14.141488] which belongs to the cache kmalloc-64 of size 64 [ 14.141974] The buggy address is located 0 bytes to the right of [ 14.141974] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.142495] [ 14.142614] The buggy address belongs to the physical page: [ 14.142842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.143168] flags: 0x200000000000000(node=0|zone=2) [ 14.143456] page_type: f5(slab) [ 14.143615] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.143854] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.144080] page dumped because: kasan: bad access detected [ 14.144270] [ 14.144381] Memory state around the buggy address: [ 14.144677] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.145000] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.145324] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.145701] ^ [ 14.145857] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.146074] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.146349] ================================================================== [ 14.364399] ================================================================== [ 14.364845] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 14.365238] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.365792] [ 14.365914] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.365970] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.365982] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.366003] Call Trace: [ 14.366017] <TASK> [ 14.366030] dump_stack_lvl+0x73/0xb0 [ 14.366055] print_report+0xd1/0x610 [ 14.366079] ? __virt_addr_valid+0x1db/0x2d0 [ 14.366101] ? kasan_atomics_helper+0x1467/0x5450 [ 14.366122] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.366146] ? kasan_atomics_helper+0x1467/0x5450 [ 14.366168] kasan_report+0x141/0x180 [ 14.366191] ? kasan_atomics_helper+0x1467/0x5450 [ 14.366219] kasan_check_range+0x10c/0x1c0 [ 14.366250] __kasan_check_write+0x18/0x20 [ 14.366270] kasan_atomics_helper+0x1467/0x5450 [ 14.366294] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.366317] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.366339] ? kasan_atomics+0x152/0x310 [ 14.366371] kasan_atomics+0x1dc/0x310 [ 14.366391] ? __pfx_kasan_atomics+0x10/0x10 [ 14.366413] ? __pfx_read_tsc+0x10/0x10 [ 14.366434] ? ktime_get_ts64+0x86/0x230 [ 14.366459] kunit_try_run_case+0x1a5/0x480 [ 14.366481] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.366501] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.366523] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.366548] ? __kthread_parkme+0x82/0x180 [ 14.366570] ? preempt_count_sub+0x50/0x80 [ 14.366597] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.366618] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.366642] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.366666] kthread+0x337/0x6f0 [ 14.366683] ? trace_preempt_on+0x20/0xc0 [ 14.366708] ? __pfx_kthread+0x10/0x10 [ 14.366727] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.366750] ? calculate_sigpending+0x7b/0xa0 [ 14.366772] ? __pfx_kthread+0x10/0x10 [ 14.366791] ret_from_fork+0x41/0x80 [ 14.366818] ? __pfx_kthread+0x10/0x10 [ 14.366840] ret_from_fork_asm+0x1a/0x30 [ 14.366872] </TASK> [ 14.366883] [ 14.374580] Allocated by task 285: [ 14.374739] kasan_save_stack+0x45/0x70 [ 14.374939] kasan_save_track+0x18/0x40 [ 14.375122] kasan_save_alloc_info+0x3b/0x50 [ 14.375278] __kasan_kmalloc+0xb7/0xc0 [ 14.375412] __kmalloc_cache_noprof+0x189/0x420 [ 14.375563] kasan_atomics+0x95/0x310 [ 14.375692] kunit_try_run_case+0x1a5/0x480 [ 14.375836] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.376012] kthread+0x337/0x6f0 [ 14.376132] ret_from_fork+0x41/0x80 [ 14.376288] ret_from_fork_asm+0x1a/0x30 [ 14.376483] [ 14.376574] The buggy address belongs to the object at ffff888103d00c80 [ 14.376574] which belongs to the cache kmalloc-64 of size 64 [ 14.377101] The buggy address is located 0 bytes to the right of [ 14.377101] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.378177] [ 14.378283] The buggy address belongs to the physical page: [ 14.378555] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.378872] flags: 0x200000000000000(node=0|zone=2) [ 14.379036] page_type: f5(slab) [ 14.379156] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.379803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.380120] page dumped because: kasan: bad access detected [ 14.380335] [ 14.380502] Memory state around the buggy address: [ 14.380723] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.380944] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.381159] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.381413] ^ [ 14.381636] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.381957] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.382307] ================================================================== [ 13.759967] ================================================================== [ 13.760207] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 13.760714] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 13.761342] [ 13.761551] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 13.761596] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.761609] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.761631] Call Trace: [ 13.761649] <TASK> [ 13.761666] dump_stack_lvl+0x73/0xb0 [ 13.761693] print_report+0xd1/0x610 [ 13.761716] ? __virt_addr_valid+0x1db/0x2d0 [ 13.761738] ? kasan_atomics_helper+0x4b3a/0x5450 [ 13.761761] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.761784] ? kasan_atomics_helper+0x4b3a/0x5450 [ 13.761807] kasan_report+0x141/0x180 [ 13.761830] ? kasan_atomics_helper+0x4b3a/0x5450 [ 13.761858] __asan_report_store4_noabort+0x1b/0x30 [ 13.761880] kasan_atomics_helper+0x4b3a/0x5450 [ 13.761904] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.761927] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.761950] ? kasan_atomics+0x152/0x310 [ 13.761974] kasan_atomics+0x1dc/0x310 [ 13.761994] ? __pfx_kasan_atomics+0x10/0x10 [ 13.762015] ? __pfx_read_tsc+0x10/0x10 [ 13.762064] ? ktime_get_ts64+0x86/0x230 [ 13.762090] kunit_try_run_case+0x1a5/0x480 [ 13.762112] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.762132] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.762153] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.762179] ? __kthread_parkme+0x82/0x180 [ 13.762200] ? preempt_count_sub+0x50/0x80 [ 13.762236] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.762278] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.762301] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.762326] kthread+0x337/0x6f0 [ 13.762344] ? trace_preempt_on+0x20/0xc0 [ 13.762376] ? __pfx_kthread+0x10/0x10 [ 13.762395] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.762418] ? calculate_sigpending+0x7b/0xa0 [ 13.762440] ? __pfx_kthread+0x10/0x10 [ 13.762460] ret_from_fork+0x41/0x80 [ 13.762481] ? __pfx_kthread+0x10/0x10 [ 13.762500] ret_from_fork_asm+0x1a/0x30 [ 13.762532] </TASK> [ 13.762544] [ 13.770909] Allocated by task 285: [ 13.771153] kasan_save_stack+0x45/0x70 [ 13.771389] kasan_save_track+0x18/0x40 [ 13.771586] kasan_save_alloc_info+0x3b/0x50 [ 13.771796] __kasan_kmalloc+0xb7/0xc0 [ 13.771956] __kmalloc_cache_noprof+0x189/0x420 [ 13.772105] kasan_atomics+0x95/0x310 [ 13.772242] kunit_try_run_case+0x1a5/0x480 [ 13.772427] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.772681] kthread+0x337/0x6f0 [ 13.772809] ret_from_fork+0x41/0x80 [ 13.772941] ret_from_fork_asm+0x1a/0x30 [ 13.773079] [ 13.773148] The buggy address belongs to the object at ffff888103d00c80 [ 13.773148] which belongs to the cache kmalloc-64 of size 64 [ 13.773717] The buggy address is located 0 bytes to the right of [ 13.773717] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 13.774258] [ 13.774394] The buggy address belongs to the physical page: [ 13.774644] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 13.774884] flags: 0x200000000000000(node=0|zone=2) [ 13.775043] page_type: f5(slab) [ 13.775162] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.775452] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.775783] page dumped because: kasan: bad access detected [ 13.776027] [ 13.776117] Memory state around the buggy address: [ 13.776366] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.776703] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.777031] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.777357] ^ [ 13.777554] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.777876] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.778206] ================================================================== [ 14.420187] ================================================================== [ 14.420490] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 14.420875] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.421600] [ 14.421725] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.421794] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.421807] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.421840] Call Trace: [ 14.421855] <TASK> [ 14.421882] dump_stack_lvl+0x73/0xb0 [ 14.421920] print_report+0xd1/0x610 [ 14.421957] ? __virt_addr_valid+0x1db/0x2d0 [ 14.422003] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.422026] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.422050] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.422086] kasan_report+0x141/0x180 [ 14.422109] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.422137] kasan_check_range+0x10c/0x1c0 [ 14.422159] __kasan_check_write+0x18/0x20 [ 14.422179] kasan_atomics_helper+0x15b6/0x5450 [ 14.422203] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.422236] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.422258] ? kasan_atomics+0x152/0x310 [ 14.422282] kasan_atomics+0x1dc/0x310 [ 14.422301] ? __pfx_kasan_atomics+0x10/0x10 [ 14.422323] ? __pfx_read_tsc+0x10/0x10 [ 14.422344] ? ktime_get_ts64+0x86/0x230 [ 14.422370] kunit_try_run_case+0x1a5/0x480 [ 14.422391] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.422410] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.422431] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.422457] ? __kthread_parkme+0x82/0x180 [ 14.422478] ? preempt_count_sub+0x50/0x80 [ 14.422505] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.422527] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.422553] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.422577] kthread+0x337/0x6f0 [ 14.422595] ? trace_preempt_on+0x20/0xc0 [ 14.422619] ? __pfx_kthread+0x10/0x10 [ 14.422638] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.422661] ? calculate_sigpending+0x7b/0xa0 [ 14.422683] ? __pfx_kthread+0x10/0x10 [ 14.422703] ret_from_fork+0x41/0x80 [ 14.422724] ? __pfx_kthread+0x10/0x10 [ 14.422743] ret_from_fork_asm+0x1a/0x30 [ 14.422774] </TASK> [ 14.422786] [ 14.431205] Allocated by task 285: [ 14.431484] kasan_save_stack+0x45/0x70 [ 14.431699] kasan_save_track+0x18/0x40 [ 14.431961] kasan_save_alloc_info+0x3b/0x50 [ 14.432196] __kasan_kmalloc+0xb7/0xc0 [ 14.432383] __kmalloc_cache_noprof+0x189/0x420 [ 14.432607] kasan_atomics+0x95/0x310 [ 14.432825] kunit_try_run_case+0x1a5/0x480 [ 14.433025] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.433258] kthread+0x337/0x6f0 [ 14.433394] ret_from_fork+0x41/0x80 [ 14.433609] ret_from_fork_asm+0x1a/0x30 [ 14.433860] [ 14.433962] The buggy address belongs to the object at ffff888103d00c80 [ 14.433962] which belongs to the cache kmalloc-64 of size 64 [ 14.434506] The buggy address is located 0 bytes to the right of [ 14.434506] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.435064] [ 14.435136] The buggy address belongs to the physical page: [ 14.435409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.435775] flags: 0x200000000000000(node=0|zone=2) [ 14.436017] page_type: f5(slab) [ 14.436212] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.436577] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.436910] page dumped because: kasan: bad access detected [ 14.437179] [ 14.437290] Memory state around the buggy address: [ 14.437607] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.437949] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.438280] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.438674] ^ [ 14.438848] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.439219] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.439661] ================================================================== [ 13.989631] ================================================================== [ 13.990136] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 13.990642] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 13.990900] [ 13.990988] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 13.991033] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.991046] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.991068] Call Trace: [ 13.991083] <TASK> [ 13.991098] dump_stack_lvl+0x73/0xb0 [ 13.991122] print_report+0xd1/0x610 [ 13.991146] ? __virt_addr_valid+0x1db/0x2d0 [ 13.991167] ? kasan_atomics_helper+0xb6a/0x5450 [ 13.991189] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.991212] ? kasan_atomics_helper+0xb6a/0x5450 [ 13.991248] kasan_report+0x141/0x180 [ 13.991272] ? kasan_atomics_helper+0xb6a/0x5450 [ 13.991299] kasan_check_range+0x10c/0x1c0 [ 13.991320] __kasan_check_write+0x18/0x20 [ 13.991340] kasan_atomics_helper+0xb6a/0x5450 [ 13.991377] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.991401] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.991423] ? kasan_atomics+0x152/0x310 [ 13.991447] kasan_atomics+0x1dc/0x310 [ 13.991466] ? __pfx_kasan_atomics+0x10/0x10 [ 13.991488] ? __pfx_read_tsc+0x10/0x10 [ 13.991508] ? ktime_get_ts64+0x86/0x230 [ 13.991534] kunit_try_run_case+0x1a5/0x480 [ 13.991556] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.991575] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.991597] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.991622] ? __kthread_parkme+0x82/0x180 [ 13.991644] ? preempt_count_sub+0x50/0x80 [ 13.991671] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.991693] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.991717] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.991741] kthread+0x337/0x6f0 [ 13.991759] ? trace_preempt_on+0x20/0xc0 [ 13.991784] ? __pfx_kthread+0x10/0x10 [ 13.991802] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.991825] ? calculate_sigpending+0x7b/0xa0 [ 13.991847] ? __pfx_kthread+0x10/0x10 [ 13.991866] ret_from_fork+0x41/0x80 [ 13.991887] ? __pfx_kthread+0x10/0x10 [ 13.991906] ret_from_fork_asm+0x1a/0x30 [ 13.991937] </TASK> [ 13.991948] [ 13.999177] Allocated by task 285: [ 13.999366] kasan_save_stack+0x45/0x70 [ 13.999561] kasan_save_track+0x18/0x40 [ 13.999751] kasan_save_alloc_info+0x3b/0x50 [ 13.999958] __kasan_kmalloc+0xb7/0xc0 [ 14.000143] __kmalloc_cache_noprof+0x189/0x420 [ 14.000374] kasan_atomics+0x95/0x310 [ 14.000512] kunit_try_run_case+0x1a5/0x480 [ 14.000699] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.000958] kthread+0x337/0x6f0 [ 14.001076] ret_from_fork+0x41/0x80 [ 14.001208] ret_from_fork_asm+0x1a/0x30 [ 14.001367] [ 14.001461] The buggy address belongs to the object at ffff888103d00c80 [ 14.001461] which belongs to the cache kmalloc-64 of size 64 [ 14.001997] The buggy address is located 0 bytes to the right of [ 14.001997] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.002548] [ 14.002645] The buggy address belongs to the physical page: [ 14.002889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.003201] flags: 0x200000000000000(node=0|zone=2) [ 14.003440] page_type: f5(slab) [ 14.003570] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.003886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.004116] page dumped because: kasan: bad access detected [ 14.004296] [ 14.004377] Memory state around the buggy address: [ 14.004600] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.004913] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.005241] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.005727] ^ [ 14.005915] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.006150] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.006571] ================================================================== [ 14.518497] ================================================================== [ 14.519160] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 14.519627] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.520017] [ 14.520110] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.520154] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.520166] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.520214] Call Trace: [ 14.520247] <TASK> [ 14.520280] dump_stack_lvl+0x73/0xb0 [ 14.520314] print_report+0xd1/0x610 [ 14.520336] ? __virt_addr_valid+0x1db/0x2d0 [ 14.520370] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.520394] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.520416] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.520455] kasan_report+0x141/0x180 [ 14.520492] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.520533] kasan_check_range+0x10c/0x1c0 [ 14.520567] __kasan_check_write+0x18/0x20 [ 14.520588] kasan_atomics_helper+0x18b1/0x5450 [ 14.520626] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.520662] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.520697] ? kasan_atomics+0x152/0x310 [ 14.520734] kasan_atomics+0x1dc/0x310 [ 14.520768] ? __pfx_kasan_atomics+0x10/0x10 [ 14.520802] ? __pfx_read_tsc+0x10/0x10 [ 14.520837] ? ktime_get_ts64+0x86/0x230 [ 14.520881] kunit_try_run_case+0x1a5/0x480 [ 14.520905] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.520929] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.520951] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.520976] ? __kthread_parkme+0x82/0x180 [ 14.520997] ? preempt_count_sub+0x50/0x80 [ 14.521023] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.521044] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.521067] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.521092] kthread+0x337/0x6f0 [ 14.521109] ? trace_preempt_on+0x20/0xc0 [ 14.521133] ? __pfx_kthread+0x10/0x10 [ 14.521152] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.521176] ? calculate_sigpending+0x7b/0xa0 [ 14.521197] ? __pfx_kthread+0x10/0x10 [ 14.521217] ret_from_fork+0x41/0x80 [ 14.521249] ? __pfx_kthread+0x10/0x10 [ 14.521268] ret_from_fork_asm+0x1a/0x30 [ 14.521300] </TASK> [ 14.521312] [ 14.529396] Allocated by task 285: [ 14.529551] kasan_save_stack+0x45/0x70 [ 14.529776] kasan_save_track+0x18/0x40 [ 14.529980] kasan_save_alloc_info+0x3b/0x50 [ 14.530210] __kasan_kmalloc+0xb7/0xc0 [ 14.530452] __kmalloc_cache_noprof+0x189/0x420 [ 14.530673] kasan_atomics+0x95/0x310 [ 14.530860] kunit_try_run_case+0x1a5/0x480 [ 14.531113] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.531349] kthread+0x337/0x6f0 [ 14.531553] ret_from_fork+0x41/0x80 [ 14.531737] ret_from_fork_asm+0x1a/0x30 [ 14.531962] [ 14.532092] The buggy address belongs to the object at ffff888103d00c80 [ 14.532092] which belongs to the cache kmalloc-64 of size 64 [ 14.532626] The buggy address is located 0 bytes to the right of [ 14.532626] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.533174] [ 14.533316] The buggy address belongs to the physical page: [ 14.533635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.533887] flags: 0x200000000000000(node=0|zone=2) [ 14.534046] page_type: f5(slab) [ 14.534162] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.534420] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.534775] page dumped because: kasan: bad access detected [ 14.535047] [ 14.535138] Memory state around the buggy address: [ 14.535366] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.535674] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.535979] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.536278] ^ [ 14.536581] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.536854] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.537084] ================================================================== [ 14.834878] ================================================================== [ 14.835237] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 14.835605] Read of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.835953] [ 14.836064] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.836106] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.836118] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.836139] Call Trace: [ 14.836154] <TASK> [ 14.836168] dump_stack_lvl+0x73/0xb0 [ 14.836192] print_report+0xd1/0x610 [ 14.836215] ? __virt_addr_valid+0x1db/0x2d0 [ 14.836247] ? kasan_atomics_helper+0x4fb2/0x5450 [ 14.836269] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.836292] ? kasan_atomics_helper+0x4fb2/0x5450 [ 14.836315] kasan_report+0x141/0x180 [ 14.836338] ? kasan_atomics_helper+0x4fb2/0x5450 [ 14.836386] __asan_report_load8_noabort+0x18/0x20 [ 14.836407] kasan_atomics_helper+0x4fb2/0x5450 [ 14.836431] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.836453] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.836475] ? kasan_atomics+0x152/0x310 [ 14.836499] kasan_atomics+0x1dc/0x310 [ 14.836518] ? __pfx_kasan_atomics+0x10/0x10 [ 14.836540] ? __pfx_read_tsc+0x10/0x10 [ 14.836561] ? ktime_get_ts64+0x86/0x230 [ 14.836586] kunit_try_run_case+0x1a5/0x480 [ 14.836607] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.836627] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.836648] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.836673] ? __kthread_parkme+0x82/0x180 [ 14.836695] ? preempt_count_sub+0x50/0x80 [ 14.836720] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.836741] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.836765] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.836789] kthread+0x337/0x6f0 [ 14.836806] ? trace_preempt_on+0x20/0xc0 [ 14.836830] ? __pfx_kthread+0x10/0x10 [ 14.836848] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.836871] ? calculate_sigpending+0x7b/0xa0 [ 14.836893] ? __pfx_kthread+0x10/0x10 [ 14.836912] ret_from_fork+0x41/0x80 [ 14.836937] ? __pfx_kthread+0x10/0x10 [ 14.836956] ret_from_fork_asm+0x1a/0x30 [ 14.836987] </TASK> [ 14.836997] [ 14.844019] Allocated by task 285: [ 14.844202] kasan_save_stack+0x45/0x70 [ 14.844439] kasan_save_track+0x18/0x40 [ 14.844635] kasan_save_alloc_info+0x3b/0x50 [ 14.844839] __kasan_kmalloc+0xb7/0xc0 [ 14.845008] __kmalloc_cache_noprof+0x189/0x420 [ 14.845231] kasan_atomics+0x95/0x310 [ 14.845412] kunit_try_run_case+0x1a5/0x480 [ 14.845577] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.845797] kthread+0x337/0x6f0 [ 14.845945] ret_from_fork+0x41/0x80 [ 14.846103] ret_from_fork_asm+0x1a/0x30 [ 14.846279] [ 14.846398] The buggy address belongs to the object at ffff888103d00c80 [ 14.846398] which belongs to the cache kmalloc-64 of size 64 [ 14.846861] The buggy address is located 0 bytes to the right of [ 14.846861] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.847244] [ 14.847313] The buggy address belongs to the physical page: [ 14.847502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.847740] flags: 0x200000000000000(node=0|zone=2) [ 14.847985] page_type: f5(slab) [ 14.848154] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.848527] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.848858] page dumped because: kasan: bad access detected [ 14.849108] [ 14.849199] Memory state around the buggy address: [ 14.849450] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.849762] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.849983] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.850211] ^ [ 14.850467] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.850784] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.851061] ================================================================== [ 14.346499] ================================================================== [ 14.346887] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 14.347194] Read of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.347693] [ 14.347799] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.347843] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.347854] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.347888] Call Trace: [ 14.347905] <TASK> [ 14.347920] dump_stack_lvl+0x73/0xb0 [ 14.347947] print_report+0xd1/0x610 [ 14.347971] ? __virt_addr_valid+0x1db/0x2d0 [ 14.348001] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.348023] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.348057] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.348079] kasan_report+0x141/0x180 [ 14.348104] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.348134] __asan_report_load8_noabort+0x18/0x20 [ 14.348163] kasan_atomics_helper+0x4eae/0x5450 [ 14.348187] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.348211] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.348249] ? kasan_atomics+0x152/0x310 [ 14.348274] kasan_atomics+0x1dc/0x310 [ 14.348293] ? __pfx_kasan_atomics+0x10/0x10 [ 14.348315] ? __pfx_read_tsc+0x10/0x10 [ 14.348335] ? ktime_get_ts64+0x86/0x230 [ 14.348374] kunit_try_run_case+0x1a5/0x480 [ 14.348404] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.348424] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.348445] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.348481] ? __kthread_parkme+0x82/0x180 [ 14.348502] ? preempt_count_sub+0x50/0x80 [ 14.348529] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.348558] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.348582] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.348606] kthread+0x337/0x6f0 [ 14.348633] ? trace_preempt_on+0x20/0xc0 [ 14.348658] ? __pfx_kthread+0x10/0x10 [ 14.348677] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.348700] ? calculate_sigpending+0x7b/0xa0 [ 14.348723] ? __pfx_kthread+0x10/0x10 [ 14.348742] ret_from_fork+0x41/0x80 [ 14.348764] ? __pfx_kthread+0x10/0x10 [ 14.348782] ret_from_fork_asm+0x1a/0x30 [ 14.348815] </TASK> [ 14.348825] [ 14.356364] Allocated by task 285: [ 14.356550] kasan_save_stack+0x45/0x70 [ 14.356750] kasan_save_track+0x18/0x40 [ 14.356938] kasan_save_alloc_info+0x3b/0x50 [ 14.357086] __kasan_kmalloc+0xb7/0xc0 [ 14.357220] __kmalloc_cache_noprof+0x189/0x420 [ 14.357472] kasan_atomics+0x95/0x310 [ 14.357676] kunit_try_run_case+0x1a5/0x480 [ 14.357883] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.358134] kthread+0x337/0x6f0 [ 14.358306] ret_from_fork+0x41/0x80 [ 14.358646] ret_from_fork_asm+0x1a/0x30 [ 14.358812] [ 14.358884] The buggy address belongs to the object at ffff888103d00c80 [ 14.358884] which belongs to the cache kmalloc-64 of size 64 [ 14.359248] The buggy address is located 0 bytes to the right of [ 14.359248] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.359613] [ 14.359686] The buggy address belongs to the physical page: [ 14.359859] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.360097] flags: 0x200000000000000(node=0|zone=2) [ 14.360284] page_type: f5(slab) [ 14.360451] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.360785] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.361155] page dumped because: kasan: bad access detected [ 14.361520] [ 14.361613] Memory state around the buggy address: [ 14.361832] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.362145] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.362575] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.362795] ^ [ 14.362949] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.363168] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.363455] ================================================================== [ 14.575565] ================================================================== [ 14.576024] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 14.576363] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.576667] [ 14.576778] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.576821] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.576834] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.576866] Call Trace: [ 14.576880] <TASK> [ 14.576894] dump_stack_lvl+0x73/0xb0 [ 14.576926] print_report+0xd1/0x610 [ 14.576962] ? __virt_addr_valid+0x1db/0x2d0 [ 14.576985] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.577007] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.577030] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.577052] kasan_report+0x141/0x180 [ 14.577075] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.577103] kasan_check_range+0x10c/0x1c0 [ 14.577125] __kasan_check_write+0x18/0x20 [ 14.577145] kasan_atomics_helper+0x1a7f/0x5450 [ 14.577169] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.577192] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.577214] ? kasan_atomics+0x152/0x310 [ 14.577248] kasan_atomics+0x1dc/0x310 [ 14.577268] ? __pfx_kasan_atomics+0x10/0x10 [ 14.577289] ? __pfx_read_tsc+0x10/0x10 [ 14.577310] ? ktime_get_ts64+0x86/0x230 [ 14.577336] kunit_try_run_case+0x1a5/0x480 [ 14.577357] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.577376] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.577398] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.577423] ? __kthread_parkme+0x82/0x180 [ 14.577445] ? preempt_count_sub+0x50/0x80 [ 14.577471] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.577491] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.577515] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.577539] kthread+0x337/0x6f0 [ 14.577557] ? trace_preempt_on+0x20/0xc0 [ 14.577580] ? __pfx_kthread+0x10/0x10 [ 14.577599] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.577621] ? calculate_sigpending+0x7b/0xa0 [ 14.577643] ? __pfx_kthread+0x10/0x10 [ 14.577662] ret_from_fork+0x41/0x80 [ 14.577683] ? __pfx_kthread+0x10/0x10 [ 14.577701] ret_from_fork_asm+0x1a/0x30 [ 14.577733] </TASK> [ 14.577744] [ 14.585665] Allocated by task 285: [ 14.585826] kasan_save_stack+0x45/0x70 [ 14.586030] kasan_save_track+0x18/0x40 [ 14.586243] kasan_save_alloc_info+0x3b/0x50 [ 14.586526] __kasan_kmalloc+0xb7/0xc0 [ 14.586671] __kmalloc_cache_noprof+0x189/0x420 [ 14.586876] kasan_atomics+0x95/0x310 [ 14.587084] kunit_try_run_case+0x1a5/0x480 [ 14.587257] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.587534] kthread+0x337/0x6f0 [ 14.587698] ret_from_fork+0x41/0x80 [ 14.587892] ret_from_fork_asm+0x1a/0x30 [ 14.588071] [ 14.588181] The buggy address belongs to the object at ffff888103d00c80 [ 14.588181] which belongs to the cache kmalloc-64 of size 64 [ 14.588772] The buggy address is located 0 bytes to the right of [ 14.588772] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.589173] [ 14.589272] The buggy address belongs to the physical page: [ 14.589534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.590036] flags: 0x200000000000000(node=0|zone=2) [ 14.590198] page_type: f5(slab) [ 14.590347] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.590719] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.591016] page dumped because: kasan: bad access detected [ 14.591301] [ 14.591407] Memory state around the buggy address: [ 14.591610] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.591896] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.592180] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.593262] ^ [ 14.593628] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.594941] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.595524] ================================================================== [ 14.798119] ================================================================== [ 14.798641] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 14.798987] Read of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.799320] [ 14.799469] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.799528] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.799554] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.799576] Call Trace: [ 14.799606] <TASK> [ 14.799621] dump_stack_lvl+0x73/0xb0 [ 14.799647] print_report+0xd1/0x610 [ 14.799670] ? __virt_addr_valid+0x1db/0x2d0 [ 14.799706] ? kasan_atomics_helper+0x4f98/0x5450 [ 14.799741] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.799765] ? kasan_atomics_helper+0x4f98/0x5450 [ 14.799788] kasan_report+0x141/0x180 [ 14.799811] ? kasan_atomics_helper+0x4f98/0x5450 [ 14.799839] __asan_report_load8_noabort+0x18/0x20 [ 14.799861] kasan_atomics_helper+0x4f98/0x5450 [ 14.799885] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.799908] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.799930] ? kasan_atomics+0x152/0x310 [ 14.799954] kasan_atomics+0x1dc/0x310 [ 14.799974] ? __pfx_kasan_atomics+0x10/0x10 [ 14.799997] ? __pfx_read_tsc+0x10/0x10 [ 14.800018] ? ktime_get_ts64+0x86/0x230 [ 14.800045] kunit_try_run_case+0x1a5/0x480 [ 14.800066] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.800085] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.800107] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.800133] ? __kthread_parkme+0x82/0x180 [ 14.800173] ? preempt_count_sub+0x50/0x80 [ 14.800199] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.800220] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.800253] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.800277] kthread+0x337/0x6f0 [ 14.800294] ? trace_preempt_on+0x20/0xc0 [ 14.800318] ? __pfx_kthread+0x10/0x10 [ 14.800337] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.800379] ? calculate_sigpending+0x7b/0xa0 [ 14.800401] ? __pfx_kthread+0x10/0x10 [ 14.800438] ret_from_fork+0x41/0x80 [ 14.800461] ? __pfx_kthread+0x10/0x10 [ 14.800480] ret_from_fork_asm+0x1a/0x30 [ 14.800512] </TASK> [ 14.800524] [ 14.807954] Allocated by task 285: [ 14.808156] kasan_save_stack+0x45/0x70 [ 14.808391] kasan_save_track+0x18/0x40 [ 14.808580] kasan_save_alloc_info+0x3b/0x50 [ 14.808786] __kasan_kmalloc+0xb7/0xc0 [ 14.808968] __kmalloc_cache_noprof+0x189/0x420 [ 14.809173] kasan_atomics+0x95/0x310 [ 14.809389] kunit_try_run_case+0x1a5/0x480 [ 14.809586] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.809848] kthread+0x337/0x6f0 [ 14.810008] ret_from_fork+0x41/0x80 [ 14.810182] ret_from_fork_asm+0x1a/0x30 [ 14.810437] [ 14.810555] The buggy address belongs to the object at ffff888103d00c80 [ 14.810555] which belongs to the cache kmalloc-64 of size 64 [ 14.811086] The buggy address is located 0 bytes to the right of [ 14.811086] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.813363] [ 14.813476] The buggy address belongs to the physical page: [ 14.813681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.814079] flags: 0x200000000000000(node=0|zone=2) [ 14.814298] page_type: f5(slab) [ 14.814510] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.814844] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.815145] page dumped because: kasan: bad access detected [ 14.815432] [ 14.815520] Memory state around the buggy address: [ 14.815683] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.816025] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.816307] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.816663] ^ [ 14.816854] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.817195] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.817492] ================================================================== [ 13.646506] ================================================================== [ 13.647138] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 13.647612] Read of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 13.647988] [ 13.648091] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 13.648137] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.648148] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.648169] Call Trace: [ 13.648182] <TASK> [ 13.648197] dump_stack_lvl+0x73/0xb0 [ 13.648235] print_report+0xd1/0x610 [ 13.648257] ? __virt_addr_valid+0x1db/0x2d0 [ 13.648279] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.648300] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.648323] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.648345] kasan_report+0x141/0x180 [ 13.648367] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.648394] __asan_report_load4_noabort+0x18/0x20 [ 13.648414] kasan_atomics_helper+0x4b88/0x5450 [ 13.648437] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.648459] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.648480] ? kasan_atomics+0x152/0x310 [ 13.648503] kasan_atomics+0x1dc/0x310 [ 13.648522] ? __pfx_kasan_atomics+0x10/0x10 [ 13.648543] ? __pfx_read_tsc+0x10/0x10 [ 13.648677] ? ktime_get_ts64+0x86/0x230 [ 13.648704] kunit_try_run_case+0x1a5/0x480 [ 13.648744] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.648764] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.648786] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.648812] ? __kthread_parkme+0x82/0x180 [ 13.648834] ? preempt_count_sub+0x50/0x80 [ 13.648860] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.648881] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.648906] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.648936] kthread+0x337/0x6f0 [ 13.648954] ? trace_preempt_on+0x20/0xc0 [ 13.648979] ? __pfx_kthread+0x10/0x10 [ 13.648998] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.649021] ? calculate_sigpending+0x7b/0xa0 [ 13.649044] ? __pfx_kthread+0x10/0x10 [ 13.649063] ret_from_fork+0x41/0x80 [ 13.649085] ? __pfx_kthread+0x10/0x10 [ 13.649104] ret_from_fork_asm+0x1a/0x30 [ 13.649135] </TASK> [ 13.649147] [ 13.659996] Allocated by task 285: [ 13.660319] kasan_save_stack+0x45/0x70 [ 13.660783] kasan_save_track+0x18/0x40 [ 13.660988] kasan_save_alloc_info+0x3b/0x50 [ 13.661184] __kasan_kmalloc+0xb7/0xc0 [ 13.661366] __kmalloc_cache_noprof+0x189/0x420 [ 13.661571] kasan_atomics+0x95/0x310 [ 13.662250] kunit_try_run_case+0x1a5/0x480 [ 13.662981] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.663441] kthread+0x337/0x6f0 [ 13.663731] ret_from_fork+0x41/0x80 [ 13.664046] ret_from_fork_asm+0x1a/0x30 [ 13.664386] [ 13.664480] The buggy address belongs to the object at ffff888103d00c80 [ 13.664480] which belongs to the cache kmalloc-64 of size 64 [ 13.665209] The buggy address is located 0 bytes to the right of [ 13.665209] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 13.666195] [ 13.666298] The buggy address belongs to the physical page: [ 13.667157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 13.668206] flags: 0x200000000000000(node=0|zone=2) [ 13.668825] page_type: f5(slab) [ 13.669152] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.669863] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.670318] page dumped because: kasan: bad access detected [ 13.670559] [ 13.670644] Memory state around the buggy address: [ 13.671191] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.671542] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.672085] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.672624] ^ [ 13.673058] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.673368] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.673658] ================================================================== [ 14.498892] ================================================================== [ 14.499275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 14.499569] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.500105] [ 14.500243] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.500286] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.500310] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.500331] Call Trace: [ 14.500347] <TASK> [ 14.500372] dump_stack_lvl+0x73/0xb0 [ 14.500397] print_report+0xd1/0x610 [ 14.500449] ? __virt_addr_valid+0x1db/0x2d0 [ 14.500472] ? kasan_atomics_helper+0x1818/0x5450 [ 14.500493] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.500528] ? kasan_atomics_helper+0x1818/0x5450 [ 14.500551] kasan_report+0x141/0x180 [ 14.500601] ? kasan_atomics_helper+0x1818/0x5450 [ 14.500629] kasan_check_range+0x10c/0x1c0 [ 14.500650] __kasan_check_write+0x18/0x20 [ 14.500681] kasan_atomics_helper+0x1818/0x5450 [ 14.500705] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.500753] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.500776] ? kasan_atomics+0x152/0x310 [ 14.500802] kasan_atomics+0x1dc/0x310 [ 14.500832] ? __pfx_kasan_atomics+0x10/0x10 [ 14.500854] ? __pfx_read_tsc+0x10/0x10 [ 14.500899] ? ktime_get_ts64+0x86/0x230 [ 14.500930] kunit_try_run_case+0x1a5/0x480 [ 14.500978] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.501011] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.501033] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.501071] ? __kthread_parkme+0x82/0x180 [ 14.501107] ? preempt_count_sub+0x50/0x80 [ 14.501146] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.501179] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.501216] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.501263] kthread+0x337/0x6f0 [ 14.501294] ? trace_preempt_on+0x20/0xc0 [ 14.501332] ? __pfx_kthread+0x10/0x10 [ 14.501351] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.501387] ? calculate_sigpending+0x7b/0xa0 [ 14.501423] ? __pfx_kthread+0x10/0x10 [ 14.501455] ret_from_fork+0x41/0x80 [ 14.501489] ? __pfx_kthread+0x10/0x10 [ 14.501508] ret_from_fork_asm+0x1a/0x30 [ 14.501565] </TASK> [ 14.501576] [ 14.509492] Allocated by task 285: [ 14.509622] kasan_save_stack+0x45/0x70 [ 14.509765] kasan_save_track+0x18/0x40 [ 14.509897] kasan_save_alloc_info+0x3b/0x50 [ 14.510039] __kasan_kmalloc+0xb7/0xc0 [ 14.510284] __kmalloc_cache_noprof+0x189/0x420 [ 14.510523] kasan_atomics+0x95/0x310 [ 14.510741] kunit_try_run_case+0x1a5/0x480 [ 14.510954] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.511200] kthread+0x337/0x6f0 [ 14.511369] ret_from_fork+0x41/0x80 [ 14.511547] ret_from_fork_asm+0x1a/0x30 [ 14.511740] [ 14.511832] The buggy address belongs to the object at ffff888103d00c80 [ 14.511832] which belongs to the cache kmalloc-64 of size 64 [ 14.512351] The buggy address is located 0 bytes to the right of [ 14.512351] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.513291] [ 14.513362] The buggy address belongs to the physical page: [ 14.513527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.513756] flags: 0x200000000000000(node=0|zone=2) [ 14.513983] page_type: f5(slab) [ 14.514149] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.514666] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.515090] page dumped because: kasan: bad access detected [ 14.515370] [ 14.515453] Memory state around the buggy address: [ 14.515632] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.515982] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.516296] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.516562] ^ [ 14.516801] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.517121] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.517523] ================================================================== [ 14.912436] ================================================================== [ 14.912805] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 14.913089] Read of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.913321] [ 14.913422] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.913466] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.913478] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.913499] Call Trace: [ 14.913513] <TASK> [ 14.913526] dump_stack_lvl+0x73/0xb0 [ 14.913551] print_report+0xd1/0x610 [ 14.913574] ? __virt_addr_valid+0x1db/0x2d0 [ 14.913595] ? kasan_atomics_helper+0x5115/0x5450 [ 14.913617] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.913640] ? kasan_atomics_helper+0x5115/0x5450 [ 14.913662] kasan_report+0x141/0x180 [ 14.913686] ? kasan_atomics_helper+0x5115/0x5450 [ 14.913714] __asan_report_load8_noabort+0x18/0x20 [ 14.913735] kasan_atomics_helper+0x5115/0x5450 [ 14.913759] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.913783] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.913805] ? kasan_atomics+0x152/0x310 [ 14.913829] kasan_atomics+0x1dc/0x310 [ 14.913849] ? __pfx_kasan_atomics+0x10/0x10 [ 14.913870] ? __pfx_read_tsc+0x10/0x10 [ 14.913891] ? ktime_get_ts64+0x86/0x230 [ 14.913917] kunit_try_run_case+0x1a5/0x480 [ 14.913938] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.913957] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.913979] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.914004] ? __kthread_parkme+0x82/0x180 [ 14.914026] ? preempt_count_sub+0x50/0x80 [ 14.914051] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.914072] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.914096] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.914120] kthread+0x337/0x6f0 [ 14.914137] ? trace_preempt_on+0x20/0xc0 [ 14.914161] ? __pfx_kthread+0x10/0x10 [ 14.914180] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.914203] ? calculate_sigpending+0x7b/0xa0 [ 14.914235] ? __pfx_kthread+0x10/0x10 [ 14.914254] ret_from_fork+0x41/0x80 [ 14.914275] ? __pfx_kthread+0x10/0x10 [ 14.914293] ret_from_fork_asm+0x1a/0x30 [ 14.914325] </TASK> [ 14.914336] [ 14.921526] Allocated by task 285: [ 14.921700] kasan_save_stack+0x45/0x70 [ 14.921895] kasan_save_track+0x18/0x40 [ 14.922086] kasan_save_alloc_info+0x3b/0x50 [ 14.922252] __kasan_kmalloc+0xb7/0xc0 [ 14.922412] __kmalloc_cache_noprof+0x189/0x420 [ 14.922567] kasan_atomics+0x95/0x310 [ 14.922754] kunit_try_run_case+0x1a5/0x480 [ 14.922957] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.923207] kthread+0x337/0x6f0 [ 14.923410] ret_from_fork+0x41/0x80 [ 14.923602] ret_from_fork_asm+0x1a/0x30 [ 14.923798] [ 14.923880] The buggy address belongs to the object at ffff888103d00c80 [ 14.923880] which belongs to the cache kmalloc-64 of size 64 [ 14.924362] The buggy address is located 0 bytes to the right of [ 14.924362] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.924835] [ 14.924934] The buggy address belongs to the physical page: [ 14.925147] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.925508] flags: 0x200000000000000(node=0|zone=2) [ 14.925700] page_type: f5(slab) [ 14.925820] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.926050] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.926424] page dumped because: kasan: bad access detected [ 14.926679] [ 14.926770] Memory state around the buggy address: [ 14.926992] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.927286] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.927601] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.927834] ^ [ 14.928057] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.928409] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.928674] ================================================================== [ 13.882024] ================================================================== [ 13.882396] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 13.882923] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 13.883258] [ 13.883388] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 13.883431] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.883444] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.883467] Call Trace: [ 13.883484] <TASK> [ 13.883500] dump_stack_lvl+0x73/0xb0 [ 13.883526] print_report+0xd1/0x610 [ 13.883551] ? __virt_addr_valid+0x1db/0x2d0 [ 13.883574] ? kasan_atomics_helper+0x860/0x5450 [ 13.883597] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.883621] ? kasan_atomics_helper+0x860/0x5450 [ 13.883643] kasan_report+0x141/0x180 [ 13.883668] ? kasan_atomics_helper+0x860/0x5450 [ 13.883695] kasan_check_range+0x10c/0x1c0 [ 13.883718] __kasan_check_write+0x18/0x20 [ 13.883740] kasan_atomics_helper+0x860/0x5450 [ 13.883765] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.883791] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.883816] ? kasan_atomics+0x152/0x310 [ 13.883841] kasan_atomics+0x1dc/0x310 [ 13.883860] ? __pfx_kasan_atomics+0x10/0x10 [ 13.883883] ? __pfx_read_tsc+0x10/0x10 [ 13.883904] ? ktime_get_ts64+0x86/0x230 [ 13.884387] kunit_try_run_case+0x1a5/0x480 [ 13.884420] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.884441] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.884462] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.884488] ? __kthread_parkme+0x82/0x180 [ 13.884513] ? preempt_count_sub+0x50/0x80 [ 13.884542] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.884563] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.884587] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.884611] kthread+0x337/0x6f0 [ 13.884630] ? trace_preempt_on+0x20/0xc0 [ 13.884654] ? __pfx_kthread+0x10/0x10 [ 13.884673] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.884695] ? calculate_sigpending+0x7b/0xa0 [ 13.884718] ? __pfx_kthread+0x10/0x10 [ 13.884737] ret_from_fork+0x41/0x80 [ 13.884759] ? __pfx_kthread+0x10/0x10 [ 13.884778] ret_from_fork_asm+0x1a/0x30 [ 13.884811] </TASK> [ 13.884822] [ 13.895418] Allocated by task 285: [ 13.895736] kasan_save_stack+0x45/0x70 [ 13.896043] kasan_save_track+0x18/0x40 [ 13.896336] kasan_save_alloc_info+0x3b/0x50 [ 13.896684] __kasan_kmalloc+0xb7/0xc0 [ 13.896875] __kmalloc_cache_noprof+0x189/0x420 [ 13.897206] kasan_atomics+0x95/0x310 [ 13.897396] kunit_try_run_case+0x1a5/0x480 [ 13.897668] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.898082] kthread+0x337/0x6f0 [ 13.898349] ret_from_fork+0x41/0x80 [ 13.898515] ret_from_fork_asm+0x1a/0x30 [ 13.898803] [ 13.898883] The buggy address belongs to the object at ffff888103d00c80 [ 13.898883] which belongs to the cache kmalloc-64 of size 64 [ 13.899384] The buggy address is located 0 bytes to the right of [ 13.899384] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 13.900213] [ 13.900308] The buggy address belongs to the physical page: [ 13.900770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 13.901174] flags: 0x200000000000000(node=0|zone=2) [ 13.901563] page_type: f5(slab) [ 13.901716] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.902203] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.902704] page dumped because: kasan: bad access detected [ 13.903023] [ 13.903097] Memory state around the buggy address: [ 13.903328] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.903843] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.904211] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.904650] ^ [ 13.904965] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.905364] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.905729] ================================================================== [ 14.383256] ================================================================== [ 14.383630] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 14.383979] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.384203] [ 14.384300] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.384342] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.384355] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.384375] Call Trace: [ 14.384391] <TASK> [ 14.384405] dump_stack_lvl+0x73/0xb0 [ 14.384428] print_report+0xd1/0x610 [ 14.384451] ? __virt_addr_valid+0x1db/0x2d0 [ 14.384473] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.384495] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.384519] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.384541] kasan_report+0x141/0x180 [ 14.384565] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.384592] __asan_report_store8_noabort+0x1b/0x30 [ 14.384614] kasan_atomics_helper+0x50d4/0x5450 [ 14.384638] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.384661] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.384683] ? kasan_atomics+0x152/0x310 [ 14.384707] kasan_atomics+0x1dc/0x310 [ 14.384727] ? __pfx_kasan_atomics+0x10/0x10 [ 14.384760] ? __pfx_read_tsc+0x10/0x10 [ 14.384782] ? ktime_get_ts64+0x86/0x230 [ 14.384808] kunit_try_run_case+0x1a5/0x480 [ 14.384840] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.384860] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.384881] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.384906] ? __kthread_parkme+0x82/0x180 [ 14.384933] ? preempt_count_sub+0x50/0x80 [ 14.384959] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.384980] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.385004] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.385028] kthread+0x337/0x6f0 [ 14.385045] ? trace_preempt_on+0x20/0xc0 [ 14.385069] ? __pfx_kthread+0x10/0x10 [ 14.385088] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.385111] ? calculate_sigpending+0x7b/0xa0 [ 14.385134] ? __pfx_kthread+0x10/0x10 [ 14.385154] ret_from_fork+0x41/0x80 [ 14.385175] ? __pfx_kthread+0x10/0x10 [ 14.385194] ret_from_fork_asm+0x1a/0x30 [ 14.385235] </TASK> [ 14.385246] [ 14.392757] Allocated by task 285: [ 14.392948] kasan_save_stack+0x45/0x70 [ 14.393150] kasan_save_track+0x18/0x40 [ 14.393377] kasan_save_alloc_info+0x3b/0x50 [ 14.393605] __kasan_kmalloc+0xb7/0xc0 [ 14.393793] __kmalloc_cache_noprof+0x189/0x420 [ 14.394009] kasan_atomics+0x95/0x310 [ 14.394191] kunit_try_run_case+0x1a5/0x480 [ 14.394399] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.394648] kthread+0x337/0x6f0 [ 14.394809] ret_from_fork+0x41/0x80 [ 14.394989] ret_from_fork_asm+0x1a/0x30 [ 14.395190] [ 14.395271] The buggy address belongs to the object at ffff888103d00c80 [ 14.395271] which belongs to the cache kmalloc-64 of size 64 [ 14.395617] The buggy address is located 0 bytes to the right of [ 14.395617] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.396328] [ 14.396494] The buggy address belongs to the physical page: [ 14.396747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.397104] flags: 0x200000000000000(node=0|zone=2) [ 14.397366] page_type: f5(slab) [ 14.397599] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.397949] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.398181] page dumped because: kasan: bad access detected [ 14.398529] [ 14.398623] Memory state around the buggy address: [ 14.398850] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.399165] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.399512] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.399794] ^ [ 14.400017] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.400333] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.400620] ================================================================== [ 14.893505] ================================================================== [ 14.894019] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 14.894754] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.895122] [ 14.895417] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.895469] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.895483] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.895504] Call Trace: [ 14.895522] <TASK> [ 14.895540] dump_stack_lvl+0x73/0xb0 [ 14.895574] print_report+0xd1/0x610 [ 14.895598] ? __virt_addr_valid+0x1db/0x2d0 [ 14.895619] ? kasan_atomics_helper+0x224c/0x5450 [ 14.895641] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.895664] ? kasan_atomics_helper+0x224c/0x5450 [ 14.895687] kasan_report+0x141/0x180 [ 14.895710] ? kasan_atomics_helper+0x224c/0x5450 [ 14.895739] kasan_check_range+0x10c/0x1c0 [ 14.895760] __kasan_check_write+0x18/0x20 [ 14.895781] kasan_atomics_helper+0x224c/0x5450 [ 14.895805] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.895828] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.895850] ? kasan_atomics+0x152/0x310 [ 14.895873] kasan_atomics+0x1dc/0x310 [ 14.895893] ? __pfx_kasan_atomics+0x10/0x10 [ 14.895915] ? __pfx_read_tsc+0x10/0x10 [ 14.895936] ? ktime_get_ts64+0x86/0x230 [ 14.895961] kunit_try_run_case+0x1a5/0x480 [ 14.895982] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.896002] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.896023] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.896047] ? __kthread_parkme+0x82/0x180 [ 14.896069] ? preempt_count_sub+0x50/0x80 [ 14.896095] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.896116] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.896140] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.896164] kthread+0x337/0x6f0 [ 14.896181] ? trace_preempt_on+0x20/0xc0 [ 14.896204] ? __pfx_kthread+0x10/0x10 [ 14.896233] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.896256] ? calculate_sigpending+0x7b/0xa0 [ 14.896277] ? __pfx_kthread+0x10/0x10 [ 14.896296] ret_from_fork+0x41/0x80 [ 14.896317] ? __pfx_kthread+0x10/0x10 [ 14.896335] ret_from_fork_asm+0x1a/0x30 [ 14.896426] </TASK> [ 14.896438] [ 14.904612] Allocated by task 285: [ 14.904798] kasan_save_stack+0x45/0x70 [ 14.905010] kasan_save_track+0x18/0x40 [ 14.905183] kasan_save_alloc_info+0x3b/0x50 [ 14.905420] __kasan_kmalloc+0xb7/0xc0 [ 14.905581] __kmalloc_cache_noprof+0x189/0x420 [ 14.905800] kasan_atomics+0x95/0x310 [ 14.905956] kunit_try_run_case+0x1a5/0x480 [ 14.906154] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.906428] kthread+0x337/0x6f0 [ 14.906587] ret_from_fork+0x41/0x80 [ 14.906720] ret_from_fork_asm+0x1a/0x30 [ 14.906860] [ 14.906930] The buggy address belongs to the object at ffff888103d00c80 [ 14.906930] which belongs to the cache kmalloc-64 of size 64 [ 14.907334] The buggy address is located 0 bytes to the right of [ 14.907334] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.907905] [ 14.908002] The buggy address belongs to the physical page: [ 14.908261] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.908637] flags: 0x200000000000000(node=0|zone=2) [ 14.908842] page_type: f5(slab) [ 14.908970] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.909201] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.909576] page dumped because: kasan: bad access detected [ 14.909832] [ 14.909927] Memory state around the buggy address: [ 14.910149] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.910472] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.910763] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.911062] ^ [ 14.911270] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.911569] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.911864] ================================================================== [ 13.864271] ================================================================== [ 13.864533] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 13.864762] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 13.865330] [ 13.865526] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 13.865572] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.865585] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.865608] Call Trace: [ 13.865626] <TASK> [ 13.865641] dump_stack_lvl+0x73/0xb0 [ 13.865668] print_report+0xd1/0x610 [ 13.865692] ? __virt_addr_valid+0x1db/0x2d0 [ 13.865715] ? kasan_atomics_helper+0x7c7/0x5450 [ 13.865737] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.865760] ? kasan_atomics_helper+0x7c7/0x5450 [ 13.865783] kasan_report+0x141/0x180 [ 13.865807] ? kasan_atomics_helper+0x7c7/0x5450 [ 13.865834] kasan_check_range+0x10c/0x1c0 [ 13.865855] __kasan_check_write+0x18/0x20 [ 13.865875] kasan_atomics_helper+0x7c7/0x5450 [ 13.865898] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.865923] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.865945] ? kasan_atomics+0x152/0x310 [ 13.865969] kasan_atomics+0x1dc/0x310 [ 13.866010] ? __pfx_kasan_atomics+0x10/0x10 [ 13.866032] ? __pfx_read_tsc+0x10/0x10 [ 13.866053] ? ktime_get_ts64+0x86/0x230 [ 13.866079] kunit_try_run_case+0x1a5/0x480 [ 13.866102] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.866121] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.866143] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.866168] ? __kthread_parkme+0x82/0x180 [ 13.866190] ? preempt_count_sub+0x50/0x80 [ 13.866218] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.866254] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.866278] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.866302] kthread+0x337/0x6f0 [ 13.866320] ? trace_preempt_on+0x20/0xc0 [ 13.866344] ? __pfx_kthread+0x10/0x10 [ 13.866363] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.866386] ? calculate_sigpending+0x7b/0xa0 [ 13.866409] ? __pfx_kthread+0x10/0x10 [ 13.866428] ret_from_fork+0x41/0x80 [ 13.866459] ? __pfx_kthread+0x10/0x10 [ 13.866478] ret_from_fork_asm+0x1a/0x30 [ 13.866510] </TASK> [ 13.866522] [ 13.873738] Allocated by task 285: [ 13.873862] kasan_save_stack+0x45/0x70 [ 13.874005] kasan_save_track+0x18/0x40 [ 13.874194] kasan_save_alloc_info+0x3b/0x50 [ 13.874410] __kasan_kmalloc+0xb7/0xc0 [ 13.874595] __kmalloc_cache_noprof+0x189/0x420 [ 13.874900] kasan_atomics+0x95/0x310 [ 13.875081] kunit_try_run_case+0x1a5/0x480 [ 13.875288] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.875577] kthread+0x337/0x6f0 [ 13.875694] ret_from_fork+0x41/0x80 [ 13.875822] ret_from_fork_asm+0x1a/0x30 [ 13.875979] [ 13.876074] The buggy address belongs to the object at ffff888103d00c80 [ 13.876074] which belongs to the cache kmalloc-64 of size 64 [ 13.876618] The buggy address is located 0 bytes to the right of [ 13.876618] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 13.877096] [ 13.877167] The buggy address belongs to the physical page: [ 13.877609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 13.877901] flags: 0x200000000000000(node=0|zone=2) [ 13.878061] page_type: f5(slab) [ 13.878181] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.878494] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.878819] page dumped because: kasan: bad access detected [ 13.879139] [ 13.879335] Memory state around the buggy address: [ 13.879504] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.879715] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.879926] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.880131] ^ [ 13.880319] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.880637] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.880957] ================================================================== [ 13.742137] ================================================================== [ 13.742444] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 13.742774] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 13.743279] [ 13.743368] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 13.743429] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.743442] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.743463] Call Trace: [ 13.743481] <TASK> [ 13.743497] dump_stack_lvl+0x73/0xb0 [ 13.743522] print_report+0xd1/0x610 [ 13.743545] ? __virt_addr_valid+0x1db/0x2d0 [ 13.743568] ? kasan_atomics_helper+0x4a0/0x5450 [ 13.743589] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.743615] ? kasan_atomics_helper+0x4a0/0x5450 [ 13.743672] kasan_report+0x141/0x180 [ 13.743697] ? kasan_atomics_helper+0x4a0/0x5450 [ 13.743724] kasan_check_range+0x10c/0x1c0 [ 13.743745] __kasan_check_write+0x18/0x20 [ 13.743765] kasan_atomics_helper+0x4a0/0x5450 [ 13.743806] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.743830] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.743851] ? kasan_atomics+0x152/0x310 [ 13.743890] kasan_atomics+0x1dc/0x310 [ 13.743910] ? __pfx_kasan_atomics+0x10/0x10 [ 13.743931] ? __pfx_read_tsc+0x10/0x10 [ 13.743953] ? ktime_get_ts64+0x86/0x230 [ 13.743978] kunit_try_run_case+0x1a5/0x480 [ 13.744000] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.744020] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.744042] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.744067] ? __kthread_parkme+0x82/0x180 [ 13.744089] ? preempt_count_sub+0x50/0x80 [ 13.744115] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.744135] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.744178] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.744203] kthread+0x337/0x6f0 [ 13.744221] ? trace_preempt_on+0x20/0xc0 [ 13.744256] ? __pfx_kthread+0x10/0x10 [ 13.744274] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.744297] ? calculate_sigpending+0x7b/0xa0 [ 13.744320] ? __pfx_kthread+0x10/0x10 [ 13.744339] ret_from_fork+0x41/0x80 [ 13.744362] ? __pfx_kthread+0x10/0x10 [ 13.744381] ret_from_fork_asm+0x1a/0x30 [ 13.744432] </TASK> [ 13.744443] [ 13.752150] Allocated by task 285: [ 13.752351] kasan_save_stack+0x45/0x70 [ 13.752560] kasan_save_track+0x18/0x40 [ 13.752735] kasan_save_alloc_info+0x3b/0x50 [ 13.752947] __kasan_kmalloc+0xb7/0xc0 [ 13.753139] __kmalloc_cache_noprof+0x189/0x420 [ 13.753328] kasan_atomics+0x95/0x310 [ 13.753534] kunit_try_run_case+0x1a5/0x480 [ 13.753711] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.753962] kthread+0x337/0x6f0 [ 13.754104] ret_from_fork+0x41/0x80 [ 13.754321] ret_from_fork_asm+0x1a/0x30 [ 13.754540] [ 13.754636] The buggy address belongs to the object at ffff888103d00c80 [ 13.754636] which belongs to the cache kmalloc-64 of size 64 [ 13.755097] The buggy address is located 0 bytes to the right of [ 13.755097] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 13.755649] [ 13.755769] The buggy address belongs to the physical page: [ 13.755990] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 13.756243] flags: 0x200000000000000(node=0|zone=2) [ 13.756409] page_type: f5(slab) [ 13.756530] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.756761] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.756992] page dumped because: kasan: bad access detected [ 13.757163] [ 13.757256] Memory state around the buggy address: [ 13.757482] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.757798] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.758112] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.758431] ^ [ 13.758650] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.758960] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.759402] ================================================================== [ 14.658081] ================================================================== [ 14.658340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 14.658699] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.659026] [ 14.659132] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.659173] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.659185] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.659205] Call Trace: [ 14.659219] <TASK> [ 14.659245] dump_stack_lvl+0x73/0xb0 [ 14.659271] print_report+0xd1/0x610 [ 14.659295] ? __virt_addr_valid+0x1db/0x2d0 [ 14.659316] ? kasan_atomics_helper+0x1ce1/0x5450 [ 14.659339] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.659372] ? kasan_atomics_helper+0x1ce1/0x5450 [ 14.659396] kasan_report+0x141/0x180 [ 14.659419] ? kasan_atomics_helper+0x1ce1/0x5450 [ 14.659447] kasan_check_range+0x10c/0x1c0 [ 14.659468] __kasan_check_write+0x18/0x20 [ 14.659489] kasan_atomics_helper+0x1ce1/0x5450 [ 14.659513] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.659536] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.659558] ? kasan_atomics+0x152/0x310 [ 14.659582] kasan_atomics+0x1dc/0x310 [ 14.659602] ? __pfx_kasan_atomics+0x10/0x10 [ 14.659623] ? __pfx_read_tsc+0x10/0x10 [ 14.659644] ? ktime_get_ts64+0x86/0x230 [ 14.659669] kunit_try_run_case+0x1a5/0x480 [ 14.659690] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.659709] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.659730] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.659758] ? __kthread_parkme+0x82/0x180 [ 14.659780] ? preempt_count_sub+0x50/0x80 [ 14.659806] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.659827] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.659850] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.659874] kthread+0x337/0x6f0 [ 14.659891] ? trace_preempt_on+0x20/0xc0 [ 14.659915] ? __pfx_kthread+0x10/0x10 [ 14.659934] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.659956] ? calculate_sigpending+0x7b/0xa0 [ 14.659978] ? __pfx_kthread+0x10/0x10 [ 14.659998] ret_from_fork+0x41/0x80 [ 14.660018] ? __pfx_kthread+0x10/0x10 [ 14.660037] ret_from_fork_asm+0x1a/0x30 [ 14.660068] </TASK> [ 14.660079] [ 14.667877] Allocated by task 285: [ 14.668010] kasan_save_stack+0x45/0x70 [ 14.668202] kasan_save_track+0x18/0x40 [ 14.668419] kasan_save_alloc_info+0x3b/0x50 [ 14.668585] __kasan_kmalloc+0xb7/0xc0 [ 14.668765] __kmalloc_cache_noprof+0x189/0x420 [ 14.668958] kasan_atomics+0x95/0x310 [ 14.669146] kunit_try_run_case+0x1a5/0x480 [ 14.669351] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.669583] kthread+0x337/0x6f0 [ 14.669726] ret_from_fork+0x41/0x80 [ 14.669908] ret_from_fork_asm+0x1a/0x30 [ 14.670060] [ 14.670154] The buggy address belongs to the object at ffff888103d00c80 [ 14.670154] which belongs to the cache kmalloc-64 of size 64 [ 14.670620] The buggy address is located 0 bytes to the right of [ 14.670620] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.671103] [ 14.671198] The buggy address belongs to the physical page: [ 14.671512] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.671833] flags: 0x200000000000000(node=0|zone=2) [ 14.672059] page_type: f5(slab) [ 14.672200] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.672530] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.672767] page dumped because: kasan: bad access detected [ 14.672942] [ 14.673012] Memory state around the buggy address: [ 14.673166] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.673472] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.673802] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.674113] ^ [ 14.674344] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.674658] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.674924] ================================================================== [ 13.844602] ================================================================== [ 13.845040] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 13.845702] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 13.845948] [ 13.846041] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 13.846087] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.846100] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.846123] Call Trace: [ 13.846142] <TASK> [ 13.846159] dump_stack_lvl+0x73/0xb0 [ 13.846186] print_report+0xd1/0x610 [ 13.846209] ? __virt_addr_valid+0x1db/0x2d0 [ 13.846571] ? kasan_atomics_helper+0x72f/0x5450 [ 13.846603] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.846627] ? kasan_atomics_helper+0x72f/0x5450 [ 13.846651] kasan_report+0x141/0x180 [ 13.846693] ? kasan_atomics_helper+0x72f/0x5450 [ 13.846721] kasan_check_range+0x10c/0x1c0 [ 13.846742] __kasan_check_write+0x18/0x20 [ 13.846762] kasan_atomics_helper+0x72f/0x5450 [ 13.846786] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.846809] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.846832] ? kasan_atomics+0x152/0x310 [ 13.846856] kasan_atomics+0x1dc/0x310 [ 13.846877] ? __pfx_kasan_atomics+0x10/0x10 [ 13.846898] ? __pfx_read_tsc+0x10/0x10 [ 13.846920] ? ktime_get_ts64+0x86/0x230 [ 13.846947] kunit_try_run_case+0x1a5/0x480 [ 13.846969] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.846989] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.847011] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.847036] ? __kthread_parkme+0x82/0x180 [ 13.847058] ? preempt_count_sub+0x50/0x80 [ 13.847084] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.847106] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.847145] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.847170] kthread+0x337/0x6f0 [ 13.847187] ? trace_preempt_on+0x20/0xc0 [ 13.847212] ? __pfx_kthread+0x10/0x10 [ 13.847241] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.847263] ? calculate_sigpending+0x7b/0xa0 [ 13.847286] ? __pfx_kthread+0x10/0x10 [ 13.847305] ret_from_fork+0x41/0x80 [ 13.847327] ? __pfx_kthread+0x10/0x10 [ 13.847345] ret_from_fork_asm+0x1a/0x30 [ 13.847389] </TASK> [ 13.847401] [ 13.854671] Allocated by task 285: [ 13.854848] kasan_save_stack+0x45/0x70 [ 13.855064] kasan_save_track+0x18/0x40 [ 13.855331] kasan_save_alloc_info+0x3b/0x50 [ 13.855537] __kasan_kmalloc+0xb7/0xc0 [ 13.855777] __kmalloc_cache_noprof+0x189/0x420 [ 13.855989] kasan_atomics+0x95/0x310 [ 13.856170] kunit_try_run_case+0x1a5/0x480 [ 13.856342] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.856589] kthread+0x337/0x6f0 [ 13.856768] ret_from_fork+0x41/0x80 [ 13.856898] ret_from_fork_asm+0x1a/0x30 [ 13.857038] [ 13.857106] The buggy address belongs to the object at ffff888103d00c80 [ 13.857106] which belongs to the cache kmalloc-64 of size 64 [ 13.857988] The buggy address is located 0 bytes to the right of [ 13.857988] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 13.858521] [ 13.858593] The buggy address belongs to the physical page: [ 13.858833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 13.859174] flags: 0x200000000000000(node=0|zone=2) [ 13.859457] page_type: f5(slab) [ 13.859603] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.859900] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.860214] page dumped because: kasan: bad access detected [ 13.860447] [ 13.860567] Memory state around the buggy address: [ 13.860759] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.861064] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.861286] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.861787] ^ [ 13.861980] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.862203] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.862767] ================================================================== [ 14.328112] ================================================================== [ 14.328748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 14.329293] Read of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.329658] [ 14.329747] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.329793] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.329805] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.329828] Call Trace: [ 14.329846] <TASK> [ 14.329863] dump_stack_lvl+0x73/0xb0 [ 14.329890] print_report+0xd1/0x610 [ 14.329913] ? __virt_addr_valid+0x1db/0x2d0 [ 14.329936] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.329957] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.329981] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.330005] kasan_report+0x141/0x180 [ 14.330040] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.330068] kasan_check_range+0x10c/0x1c0 [ 14.330100] __kasan_check_read+0x15/0x20 [ 14.330129] kasan_atomics_helper+0x13b5/0x5450 [ 14.330152] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.330176] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.330209] ? kasan_atomics+0x152/0x310 [ 14.330241] kasan_atomics+0x1dc/0x310 [ 14.330262] ? __pfx_kasan_atomics+0x10/0x10 [ 14.330283] ? __pfx_read_tsc+0x10/0x10 [ 14.330304] ? ktime_get_ts64+0x86/0x230 [ 14.330330] kunit_try_run_case+0x1a5/0x480 [ 14.330353] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.330374] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.330395] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.330420] ? __kthread_parkme+0x82/0x180 [ 14.330443] ? preempt_count_sub+0x50/0x80 [ 14.330469] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.330490] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.330514] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.330539] kthread+0x337/0x6f0 [ 14.330557] ? trace_preempt_on+0x20/0xc0 [ 14.330590] ? __pfx_kthread+0x10/0x10 [ 14.330610] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.330633] ? calculate_sigpending+0x7b/0xa0 [ 14.330666] ? __pfx_kthread+0x10/0x10 [ 14.330685] ret_from_fork+0x41/0x80 [ 14.330706] ? __pfx_kthread+0x10/0x10 [ 14.330725] ret_from_fork_asm+0x1a/0x30 [ 14.330757] </TASK> [ 14.330768] [ 14.338514] Allocated by task 285: [ 14.338682] kasan_save_stack+0x45/0x70 [ 14.338887] kasan_save_track+0x18/0x40 [ 14.339078] kasan_save_alloc_info+0x3b/0x50 [ 14.339300] __kasan_kmalloc+0xb7/0xc0 [ 14.339542] __kmalloc_cache_noprof+0x189/0x420 [ 14.339756] kasan_atomics+0x95/0x310 [ 14.339927] kunit_try_run_case+0x1a5/0x480 [ 14.340138] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.340340] kthread+0x337/0x6f0 [ 14.340519] ret_from_fork+0x41/0x80 [ 14.340701] ret_from_fork_asm+0x1a/0x30 [ 14.340878] [ 14.340996] The buggy address belongs to the object at ffff888103d00c80 [ 14.340996] which belongs to the cache kmalloc-64 of size 64 [ 14.341360] The buggy address is located 0 bytes to the right of [ 14.341360] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.341910] [ 14.342003] The buggy address belongs to the physical page: [ 14.342236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.342617] flags: 0x200000000000000(node=0|zone=2) [ 14.342828] page_type: f5(slab) [ 14.343014] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.343332] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.343649] page dumped because: kasan: bad access detected [ 14.343867] [ 14.343956] Memory state around the buggy address: [ 14.344156] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.344498] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.344730] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.344951] ^ [ 14.345104] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.345375] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.345748] ================================================================== [ 13.954784] ================================================================== [ 13.955069] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 13.955701] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 13.956028] [ 13.956140] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 13.956185] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.956197] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.956219] Call Trace: [ 13.956243] <TASK> [ 13.956257] dump_stack_lvl+0x73/0xb0 [ 13.956284] print_report+0xd1/0x610 [ 13.956308] ? __virt_addr_valid+0x1db/0x2d0 [ 13.956329] ? kasan_atomics_helper+0xa2b/0x5450 [ 13.956351] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.956375] ? kasan_atomics_helper+0xa2b/0x5450 [ 13.956397] kasan_report+0x141/0x180 [ 13.956430] ? kasan_atomics_helper+0xa2b/0x5450 [ 13.956458] kasan_check_range+0x10c/0x1c0 [ 13.956479] __kasan_check_write+0x18/0x20 [ 13.956500] kasan_atomics_helper+0xa2b/0x5450 [ 13.956524] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.956547] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.956569] ? kasan_atomics+0x152/0x310 [ 13.956595] kasan_atomics+0x1dc/0x310 [ 13.956615] ? __pfx_kasan_atomics+0x10/0x10 [ 13.956637] ? __pfx_read_tsc+0x10/0x10 [ 13.956657] ? ktime_get_ts64+0x86/0x230 [ 13.956684] kunit_try_run_case+0x1a5/0x480 [ 13.956705] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.956725] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.956747] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.956772] ? __kthread_parkme+0x82/0x180 [ 13.956794] ? preempt_count_sub+0x50/0x80 [ 13.956822] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.956844] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.956867] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.956892] kthread+0x337/0x6f0 [ 13.956909] ? trace_preempt_on+0x20/0xc0 [ 13.956939] ? __pfx_kthread+0x10/0x10 [ 13.956958] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.956981] ? calculate_sigpending+0x7b/0xa0 [ 13.957003] ? __pfx_kthread+0x10/0x10 [ 13.957023] ret_from_fork+0x41/0x80 [ 13.957045] ? __pfx_kthread+0x10/0x10 [ 13.957065] ret_from_fork_asm+0x1a/0x30 [ 13.957097] </TASK> [ 13.957108] [ 13.964345] Allocated by task 285: [ 13.964502] kasan_save_stack+0x45/0x70 [ 13.964705] kasan_save_track+0x18/0x40 [ 13.964862] kasan_save_alloc_info+0x3b/0x50 [ 13.965063] __kasan_kmalloc+0xb7/0xc0 [ 13.965219] __kmalloc_cache_noprof+0x189/0x420 [ 13.965454] kasan_atomics+0x95/0x310 [ 13.965613] kunit_try_run_case+0x1a5/0x480 [ 13.965788] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.966010] kthread+0x337/0x6f0 [ 13.966165] ret_from_fork+0x41/0x80 [ 13.966333] ret_from_fork_asm+0x1a/0x30 [ 13.966512] [ 13.966606] The buggy address belongs to the object at ffff888103d00c80 [ 13.966606] which belongs to the cache kmalloc-64 of size 64 [ 13.967076] The buggy address is located 0 bytes to the right of [ 13.967076] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 13.967623] [ 13.967715] The buggy address belongs to the physical page: [ 13.967906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 13.968263] flags: 0x200000000000000(node=0|zone=2) [ 13.968580] page_type: f5(slab) [ 13.968712] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.969039] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.969324] page dumped because: kasan: bad access detected [ 13.969693] [ 13.969796] Memory state around the buggy address: [ 13.970000] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.970261] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.970478] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.970693] ^ [ 13.970848] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.971064] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.971312] ================================================================== [ 13.723493] ================================================================== [ 13.723931] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 13.724195] Read of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 13.724531] [ 13.724714] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 13.724761] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.724774] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.724797] Call Trace: [ 13.724815] <TASK> [ 13.724833] dump_stack_lvl+0x73/0xb0 [ 13.724860] print_report+0xd1/0x610 [ 13.724883] ? __virt_addr_valid+0x1db/0x2d0 [ 13.724905] ? kasan_atomics_helper+0x4b54/0x5450 [ 13.724933] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.724955] ? kasan_atomics_helper+0x4b54/0x5450 [ 13.724978] kasan_report+0x141/0x180 [ 13.725001] ? kasan_atomics_helper+0x4b54/0x5450 [ 13.725029] __asan_report_load4_noabort+0x18/0x20 [ 13.725051] kasan_atomics_helper+0x4b54/0x5450 [ 13.725074] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.725097] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.725120] ? kasan_atomics+0x152/0x310 [ 13.725144] kasan_atomics+0x1dc/0x310 [ 13.725164] ? __pfx_kasan_atomics+0x10/0x10 [ 13.725185] ? __pfx_read_tsc+0x10/0x10 [ 13.725207] ? ktime_get_ts64+0x86/0x230 [ 13.725244] kunit_try_run_case+0x1a5/0x480 [ 13.725266] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.725286] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.725308] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.725333] ? __kthread_parkme+0x82/0x180 [ 13.725367] ? preempt_count_sub+0x50/0x80 [ 13.725393] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.725414] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.725438] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.725462] kthread+0x337/0x6f0 [ 13.725480] ? trace_preempt_on+0x20/0xc0 [ 13.725506] ? __pfx_kthread+0x10/0x10 [ 13.725525] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.725548] ? calculate_sigpending+0x7b/0xa0 [ 13.725571] ? __pfx_kthread+0x10/0x10 [ 13.725611] ret_from_fork+0x41/0x80 [ 13.725634] ? __pfx_kthread+0x10/0x10 [ 13.725653] ret_from_fork_asm+0x1a/0x30 [ 13.725685] </TASK> [ 13.725697] [ 13.733422] Allocated by task 285: [ 13.733595] kasan_save_stack+0x45/0x70 [ 13.733738] kasan_save_track+0x18/0x40 [ 13.733871] kasan_save_alloc_info+0x3b/0x50 [ 13.734044] __kasan_kmalloc+0xb7/0xc0 [ 13.734327] __kmalloc_cache_noprof+0x189/0x420 [ 13.734783] kasan_atomics+0x95/0x310 [ 13.734968] kunit_try_run_case+0x1a5/0x480 [ 13.735147] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.735429] kthread+0x337/0x6f0 [ 13.735591] ret_from_fork+0x41/0x80 [ 13.735749] ret_from_fork_asm+0x1a/0x30 [ 13.735954] [ 13.736067] The buggy address belongs to the object at ffff888103d00c80 [ 13.736067] which belongs to the cache kmalloc-64 of size 64 [ 13.736614] The buggy address is located 0 bytes to the right of [ 13.736614] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 13.737177] [ 13.737280] The buggy address belongs to the physical page: [ 13.737524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 13.737867] flags: 0x200000000000000(node=0|zone=2) [ 13.738096] page_type: f5(slab) [ 13.738269] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.738494] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.738711] page dumped because: kasan: bad access detected [ 13.739113] [ 13.739207] Memory state around the buggy address: [ 13.739534] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.739874] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.740207] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.740563] ^ [ 13.740718] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.740988] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.741306] ================================================================== [ 13.931794] ================================================================== [ 13.932358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 13.933128] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 13.933602] [ 13.933704] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 13.933755] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.933768] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.933790] Call Trace: [ 13.933810] <TASK> [ 13.933829] dump_stack_lvl+0x73/0xb0 [ 13.934066] print_report+0xd1/0x610 [ 13.934095] ? __virt_addr_valid+0x1db/0x2d0 [ 13.934118] ? kasan_atomics_helper+0x992/0x5450 [ 13.934140] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.934166] ? kasan_atomics_helper+0x992/0x5450 [ 13.934189] kasan_report+0x141/0x180 [ 13.934213] ? kasan_atomics_helper+0x992/0x5450 [ 13.934252] kasan_check_range+0x10c/0x1c0 [ 13.934273] __kasan_check_write+0x18/0x20 [ 13.934293] kasan_atomics_helper+0x992/0x5450 [ 13.934318] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.934341] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.934422] ? kasan_atomics+0x152/0x310 [ 13.934449] kasan_atomics+0x1dc/0x310 [ 13.934470] ? __pfx_kasan_atomics+0x10/0x10 [ 13.934492] ? __pfx_read_tsc+0x10/0x10 [ 13.934514] ? ktime_get_ts64+0x86/0x230 [ 13.934540] kunit_try_run_case+0x1a5/0x480 [ 13.934563] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.934582] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.934605] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.934631] ? __kthread_parkme+0x82/0x180 [ 13.934653] ? preempt_count_sub+0x50/0x80 [ 13.934682] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.934704] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.934729] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.934753] kthread+0x337/0x6f0 [ 13.934771] ? trace_preempt_on+0x20/0xc0 [ 13.934795] ? __pfx_kthread+0x10/0x10 [ 13.934814] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.934838] ? calculate_sigpending+0x7b/0xa0 [ 13.934860] ? __pfx_kthread+0x10/0x10 [ 13.934880] ret_from_fork+0x41/0x80 [ 13.934902] ? __pfx_kthread+0x10/0x10 [ 13.934920] ret_from_fork_asm+0x1a/0x30 [ 13.934952] </TASK> [ 13.934964] [ 13.944706] Allocated by task 285: [ 13.944881] kasan_save_stack+0x45/0x70 [ 13.945080] kasan_save_track+0x18/0x40 [ 13.945275] kasan_save_alloc_info+0x3b/0x50 [ 13.945446] __kasan_kmalloc+0xb7/0xc0 [ 13.945636] __kmalloc_cache_noprof+0x189/0x420 [ 13.945844] kasan_atomics+0x95/0x310 [ 13.946034] kunit_try_run_case+0x1a5/0x480 [ 13.946220] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.947049] kthread+0x337/0x6f0 [ 13.947185] ret_from_fork+0x41/0x80 [ 13.947501] ret_from_fork_asm+0x1a/0x30 [ 13.947769] [ 13.947932] The buggy address belongs to the object at ffff888103d00c80 [ 13.947932] which belongs to the cache kmalloc-64 of size 64 [ 13.948594] The buggy address is located 0 bytes to the right of [ 13.948594] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 13.949216] [ 13.949307] The buggy address belongs to the physical page: [ 13.949726] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 13.950021] flags: 0x200000000000000(node=0|zone=2) [ 13.950362] page_type: f5(slab) [ 13.950532] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.950978] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.951320] page dumped because: kasan: bad access detected [ 13.951557] [ 13.951656] Memory state around the buggy address: [ 13.952000] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.952422] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.952794] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.953088] ^ [ 13.953466] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.953768] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.954054] ================================================================== [ 14.479092] ================================================================== [ 14.479335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 14.479817] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.480277] [ 14.480466] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.480537] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.480550] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.480597] Call Trace: [ 14.480613] <TASK> [ 14.480645] dump_stack_lvl+0x73/0xb0 [ 14.480708] print_report+0xd1/0x610 [ 14.480747] ? __virt_addr_valid+0x1db/0x2d0 [ 14.480804] ? kasan_atomics_helper+0x177f/0x5450 [ 14.480826] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.480849] ? kasan_atomics_helper+0x177f/0x5450 [ 14.480883] kasan_report+0x141/0x180 [ 14.480906] ? kasan_atomics_helper+0x177f/0x5450 [ 14.480937] kasan_check_range+0x10c/0x1c0 [ 14.480958] __kasan_check_write+0x18/0x20 [ 14.480978] kasan_atomics_helper+0x177f/0x5450 [ 14.481002] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.481025] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.481047] ? kasan_atomics+0x152/0x310 [ 14.481072] kasan_atomics+0x1dc/0x310 [ 14.481092] ? __pfx_kasan_atomics+0x10/0x10 [ 14.481113] ? __pfx_read_tsc+0x10/0x10 [ 14.481134] ? ktime_get_ts64+0x86/0x230 [ 14.481160] kunit_try_run_case+0x1a5/0x480 [ 14.481181] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.481200] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.481232] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.481257] ? __kthread_parkme+0x82/0x180 [ 14.481279] ? preempt_count_sub+0x50/0x80 [ 14.481305] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.481326] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.481350] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.481374] kthread+0x337/0x6f0 [ 14.481391] ? trace_preempt_on+0x20/0xc0 [ 14.481415] ? __pfx_kthread+0x10/0x10 [ 14.481434] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.481457] ? calculate_sigpending+0x7b/0xa0 [ 14.481479] ? __pfx_kthread+0x10/0x10 [ 14.481497] ret_from_fork+0x41/0x80 [ 14.481518] ? __pfx_kthread+0x10/0x10 [ 14.481565] ret_from_fork_asm+0x1a/0x30 [ 14.481598] </TASK> [ 14.481608] [ 14.489351] Allocated by task 285: [ 14.489503] kasan_save_stack+0x45/0x70 [ 14.489645] kasan_save_track+0x18/0x40 [ 14.489815] kasan_save_alloc_info+0x3b/0x50 [ 14.490063] __kasan_kmalloc+0xb7/0xc0 [ 14.490264] __kmalloc_cache_noprof+0x189/0x420 [ 14.490614] kasan_atomics+0x95/0x310 [ 14.490790] kunit_try_run_case+0x1a5/0x480 [ 14.491022] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.491305] kthread+0x337/0x6f0 [ 14.491545] ret_from_fork+0x41/0x80 [ 14.491768] ret_from_fork_asm+0x1a/0x30 [ 14.491959] [ 14.492077] The buggy address belongs to the object at ffff888103d00c80 [ 14.492077] which belongs to the cache kmalloc-64 of size 64 [ 14.492686] The buggy address is located 0 bytes to the right of [ 14.492686] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.493266] [ 14.493381] The buggy address belongs to the physical page: [ 14.493658] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.494041] flags: 0x200000000000000(node=0|zone=2) [ 14.494301] page_type: f5(slab) [ 14.494593] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.494930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.495203] page dumped because: kasan: bad access detected [ 14.495565] [ 14.495695] Memory state around the buggy address: [ 14.495900] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.496256] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.496581] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.497046] ^ [ 14.497195] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.497813] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.498102] ================================================================== [ 14.024912] ================================================================== [ 14.025257] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 14.025580] Read of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.025995] [ 14.026097] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.026140] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.026152] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.026173] Call Trace: [ 14.026187] <TASK> [ 14.026201] dump_stack_lvl+0x73/0xb0 [ 14.026236] print_report+0xd1/0x610 [ 14.026259] ? __virt_addr_valid+0x1db/0x2d0 [ 14.026280] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.026302] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.026326] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.026348] kasan_report+0x141/0x180 [ 14.026384] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.026412] __asan_report_load4_noabort+0x18/0x20 [ 14.026433] kasan_atomics_helper+0x4a84/0x5450 [ 14.026458] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.026481] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.026502] ? kasan_atomics+0x152/0x310 [ 14.026526] kasan_atomics+0x1dc/0x310 [ 14.026546] ? __pfx_kasan_atomics+0x10/0x10 [ 14.026568] ? __pfx_read_tsc+0x10/0x10 [ 14.026588] ? ktime_get_ts64+0x86/0x230 [ 14.026613] kunit_try_run_case+0x1a5/0x480 [ 14.026634] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.026653] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.026675] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.026700] ? __kthread_parkme+0x82/0x180 [ 14.026720] ? preempt_count_sub+0x50/0x80 [ 14.026748] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.026769] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.026792] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.026817] kthread+0x337/0x6f0 [ 14.026834] ? trace_preempt_on+0x20/0xc0 [ 14.026858] ? __pfx_kthread+0x10/0x10 [ 14.026876] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.026899] ? calculate_sigpending+0x7b/0xa0 [ 14.026920] ? __pfx_kthread+0x10/0x10 [ 14.026939] ret_from_fork+0x41/0x80 [ 14.026960] ? __pfx_kthread+0x10/0x10 [ 14.026979] ret_from_fork_asm+0x1a/0x30 [ 14.027009] </TASK> [ 14.027021] [ 14.033838] Allocated by task 285: [ 14.034028] kasan_save_stack+0x45/0x70 [ 14.034233] kasan_save_track+0x18/0x40 [ 14.034495] kasan_save_alloc_info+0x3b/0x50 [ 14.034700] __kasan_kmalloc+0xb7/0xc0 [ 14.034884] __kmalloc_cache_noprof+0x189/0x420 [ 14.035098] kasan_atomics+0x95/0x310 [ 14.035291] kunit_try_run_case+0x1a5/0x480 [ 14.035668] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.035924] kthread+0x337/0x6f0 [ 14.036090] ret_from_fork+0x41/0x80 [ 14.036279] ret_from_fork_asm+0x1a/0x30 [ 14.036610] [ 14.036683] The buggy address belongs to the object at ffff888103d00c80 [ 14.036683] which belongs to the cache kmalloc-64 of size 64 [ 14.037038] The buggy address is located 0 bytes to the right of [ 14.037038] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.037705] [ 14.037802] The buggy address belongs to the physical page: [ 14.038054] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.038383] flags: 0x200000000000000(node=0|zone=2) [ 14.038578] page_type: f5(slab) [ 14.038738] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.039044] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.039342] page dumped because: kasan: bad access detected [ 14.039556] [ 14.039624] Memory state around the buggy address: [ 14.039779] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.040002] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.040332] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.040666] ^ [ 14.040893] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.041183] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.041531] ================================================================== [ 14.096972] ================================================================== [ 14.097847] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 14.098704] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.099551] [ 14.099780] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.099964] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.099978] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.100120] Call Trace: [ 14.100151] <TASK> [ 14.100167] dump_stack_lvl+0x73/0xb0 [ 14.100407] print_report+0xd1/0x610 [ 14.100447] ? __virt_addr_valid+0x1db/0x2d0 [ 14.100469] ? kasan_atomics_helper+0xf10/0x5450 [ 14.100507] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.100531] ? kasan_atomics_helper+0xf10/0x5450 [ 14.100565] kasan_report+0x141/0x180 [ 14.100588] ? kasan_atomics_helper+0xf10/0x5450 [ 14.100692] kasan_check_range+0x10c/0x1c0 [ 14.100719] __kasan_check_write+0x18/0x20 [ 14.100740] kasan_atomics_helper+0xf10/0x5450 [ 14.100844] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.100948] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.100976] ? kasan_atomics+0x152/0x310 [ 14.101001] kasan_atomics+0x1dc/0x310 [ 14.101432] ? __pfx_kasan_atomics+0x10/0x10 [ 14.101462] ? __pfx_read_tsc+0x10/0x10 [ 14.101484] ? ktime_get_ts64+0x86/0x230 [ 14.101527] kunit_try_run_case+0x1a5/0x480 [ 14.101549] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.101581] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.101602] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.101627] ? __kthread_parkme+0x82/0x180 [ 14.101667] ? preempt_count_sub+0x50/0x80 [ 14.101695] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.101730] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.101755] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.101862] kthread+0x337/0x6f0 [ 14.101886] ? trace_preempt_on+0x20/0xc0 [ 14.101992] ? __pfx_kthread+0x10/0x10 [ 14.102014] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.102115] ? calculate_sigpending+0x7b/0xa0 [ 14.102142] ? __pfx_kthread+0x10/0x10 [ 14.102162] ret_from_fork+0x41/0x80 [ 14.102289] ? __pfx_kthread+0x10/0x10 [ 14.102309] ret_from_fork_asm+0x1a/0x30 [ 14.102342] </TASK> [ 14.102496] [ 14.117502] Allocated by task 285: [ 14.117866] kasan_save_stack+0x45/0x70 [ 14.118019] kasan_save_track+0x18/0x40 [ 14.118155] kasan_save_alloc_info+0x3b/0x50 [ 14.118313] __kasan_kmalloc+0xb7/0xc0 [ 14.118697] __kmalloc_cache_noprof+0x189/0x420 [ 14.119124] kasan_atomics+0x95/0x310 [ 14.119490] kunit_try_run_case+0x1a5/0x480 [ 14.119882] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.120399] kthread+0x337/0x6f0 [ 14.120712] ret_from_fork+0x41/0x80 [ 14.121044] ret_from_fork_asm+0x1a/0x30 [ 14.121441] [ 14.121580] The buggy address belongs to the object at ffff888103d00c80 [ 14.121580] which belongs to the cache kmalloc-64 of size 64 [ 14.122144] The buggy address is located 0 bytes to the right of [ 14.122144] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.122946] [ 14.123104] The buggy address belongs to the physical page: [ 14.123625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.124292] flags: 0x200000000000000(node=0|zone=2) [ 14.124758] page_type: f5(slab) [ 14.125045] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.125291] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.125934] page dumped because: kasan: bad access detected [ 14.126448] [ 14.126601] Memory state around the buggy address: [ 14.127041] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.127514] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.127737] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.127950] ^ [ 14.128104] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.128335] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.128640] ================================================================== [ 14.537942] ================================================================== [ 14.538339] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 14.538714] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.539060] [ 14.539182] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.539268] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.539281] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.539325] Call Trace: [ 14.539339] <TASK> [ 14.539353] dump_stack_lvl+0x73/0xb0 [ 14.539399] print_report+0xd1/0x610 [ 14.539423] ? __virt_addr_valid+0x1db/0x2d0 [ 14.539445] ? kasan_atomics_helper+0x194a/0x5450 [ 14.539467] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.539491] ? kasan_atomics_helper+0x194a/0x5450 [ 14.539514] kasan_report+0x141/0x180 [ 14.539564] ? kasan_atomics_helper+0x194a/0x5450 [ 14.539593] kasan_check_range+0x10c/0x1c0 [ 14.539614] __kasan_check_write+0x18/0x20 [ 14.539646] kasan_atomics_helper+0x194a/0x5450 [ 14.539670] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.539719] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.539741] ? kasan_atomics+0x152/0x310 [ 14.539764] kasan_atomics+0x1dc/0x310 [ 14.539796] ? __pfx_kasan_atomics+0x10/0x10 [ 14.539817] ? __pfx_read_tsc+0x10/0x10 [ 14.539851] ? ktime_get_ts64+0x86/0x230 [ 14.539902] kunit_try_run_case+0x1a5/0x480 [ 14.539948] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.539981] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.540027] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.540066] ? __kthread_parkme+0x82/0x180 [ 14.540126] ? preempt_count_sub+0x50/0x80 [ 14.540164] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.540209] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.540263] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.540287] kthread+0x337/0x6f0 [ 14.540304] ? trace_preempt_on+0x20/0xc0 [ 14.540339] ? __pfx_kthread+0x10/0x10 [ 14.540370] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.540393] ? calculate_sigpending+0x7b/0xa0 [ 14.540415] ? __pfx_kthread+0x10/0x10 [ 14.540434] ret_from_fork+0x41/0x80 [ 14.540456] ? __pfx_kthread+0x10/0x10 [ 14.540474] ret_from_fork_asm+0x1a/0x30 [ 14.540505] </TASK> [ 14.540517] [ 14.548719] Allocated by task 285: [ 14.548843] kasan_save_stack+0x45/0x70 [ 14.549026] kasan_save_track+0x18/0x40 [ 14.549159] kasan_save_alloc_info+0x3b/0x50 [ 14.549329] __kasan_kmalloc+0xb7/0xc0 [ 14.549703] __kmalloc_cache_noprof+0x189/0x420 [ 14.549923] kasan_atomics+0x95/0x310 [ 14.550094] kunit_try_run_case+0x1a5/0x480 [ 14.550245] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.550427] kthread+0x337/0x6f0 [ 14.550615] ret_from_fork+0x41/0x80 [ 14.550796] ret_from_fork_asm+0x1a/0x30 [ 14.550993] [ 14.551110] The buggy address belongs to the object at ffff888103d00c80 [ 14.551110] which belongs to the cache kmalloc-64 of size 64 [ 14.551537] The buggy address is located 0 bytes to the right of [ 14.551537] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.552499] [ 14.552579] The buggy address belongs to the physical page: [ 14.552806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.553165] flags: 0x200000000000000(node=0|zone=2) [ 14.553426] page_type: f5(slab) [ 14.553553] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.553787] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.554015] page dumped because: kasan: bad access detected [ 14.554264] [ 14.554357] Memory state around the buggy address: [ 14.554579] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.554896] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.555216] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.555445] ^ [ 14.555603] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.556126] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.556564] ================================================================== [ 14.818109] ================================================================== [ 14.818603] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 14.818901] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.819173] [ 14.819291] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.819336] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.819368] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.819390] Call Trace: [ 14.819408] <TASK> [ 14.819423] dump_stack_lvl+0x73/0xb0 [ 14.819450] print_report+0xd1/0x610 [ 14.819473] ? __virt_addr_valid+0x1db/0x2d0 [ 14.819495] ? kasan_atomics_helper+0x20c8/0x5450 [ 14.819517] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.819540] ? kasan_atomics_helper+0x20c8/0x5450 [ 14.819563] kasan_report+0x141/0x180 [ 14.819586] ? kasan_atomics_helper+0x20c8/0x5450 [ 14.819613] kasan_check_range+0x10c/0x1c0 [ 14.819634] __kasan_check_write+0x18/0x20 [ 14.819655] kasan_atomics_helper+0x20c8/0x5450 [ 14.819678] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.819701] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.819723] ? kasan_atomics+0x152/0x310 [ 14.819747] kasan_atomics+0x1dc/0x310 [ 14.819767] ? __pfx_kasan_atomics+0x10/0x10 [ 14.819789] ? __pfx_read_tsc+0x10/0x10 [ 14.819810] ? ktime_get_ts64+0x86/0x230 [ 14.819835] kunit_try_run_case+0x1a5/0x480 [ 14.819858] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.819877] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.819898] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.819923] ? __kthread_parkme+0x82/0x180 [ 14.819945] ? preempt_count_sub+0x50/0x80 [ 14.819973] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.819994] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.820017] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.820041] kthread+0x337/0x6f0 [ 14.820059] ? trace_preempt_on+0x20/0xc0 [ 14.820083] ? __pfx_kthread+0x10/0x10 [ 14.820102] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.820124] ? calculate_sigpending+0x7b/0xa0 [ 14.820146] ? __pfx_kthread+0x10/0x10 [ 14.820165] ret_from_fork+0x41/0x80 [ 14.820187] ? __pfx_kthread+0x10/0x10 [ 14.820205] ret_from_fork_asm+0x1a/0x30 [ 14.820246] </TASK> [ 14.820258] [ 14.827464] Allocated by task 285: [ 14.827623] kasan_save_stack+0x45/0x70 [ 14.827795] kasan_save_track+0x18/0x40 [ 14.827988] kasan_save_alloc_info+0x3b/0x50 [ 14.828162] __kasan_kmalloc+0xb7/0xc0 [ 14.828387] __kmalloc_cache_noprof+0x189/0x420 [ 14.828582] kasan_atomics+0x95/0x310 [ 14.828742] kunit_try_run_case+0x1a5/0x480 [ 14.828929] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.829153] kthread+0x337/0x6f0 [ 14.829303] ret_from_fork+0x41/0x80 [ 14.829501] ret_from_fork_asm+0x1a/0x30 [ 14.829642] [ 14.829712] The buggy address belongs to the object at ffff888103d00c80 [ 14.829712] which belongs to the cache kmalloc-64 of size 64 [ 14.830242] The buggy address is located 0 bytes to the right of [ 14.830242] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.830674] [ 14.830769] The buggy address belongs to the physical page: [ 14.831022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.831357] flags: 0x200000000000000(node=0|zone=2) [ 14.831523] page_type: f5(slab) [ 14.831644] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.831875] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.832100] page dumped because: kasan: bad access detected [ 14.832391] [ 14.832486] Memory state around the buggy address: [ 14.832703] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.833021] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.833360] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.833673] ^ [ 14.833831] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.834047] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.834278] ================================================================== [ 13.622070] ================================================================== [ 13.622514] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 13.622859] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 13.623433] [ 13.623525] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 13.623569] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.623580] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.623600] Call Trace: [ 13.623613] <TASK> [ 13.623626] dump_stack_lvl+0x73/0xb0 [ 13.623652] print_report+0xd1/0x610 [ 13.623790] ? __virt_addr_valid+0x1db/0x2d0 [ 13.623813] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.623863] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.623887] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.623909] kasan_report+0x141/0x180 [ 13.623933] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.623960] __asan_report_store4_noabort+0x1b/0x30 [ 13.623981] kasan_atomics_helper+0x4ba2/0x5450 [ 13.624020] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.624043] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.624077] ? kasan_atomics+0x152/0x310 [ 13.624100] kasan_atomics+0x1dc/0x310 [ 13.624133] ? __pfx_kasan_atomics+0x10/0x10 [ 13.624167] ? __pfx_read_tsc+0x10/0x10 [ 13.624200] ? ktime_get_ts64+0x86/0x230 [ 13.624248] kunit_try_run_case+0x1a5/0x480 [ 13.624270] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.624302] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.624336] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.624371] ? __kthread_parkme+0x82/0x180 [ 13.624392] ? preempt_count_sub+0x50/0x80 [ 13.624417] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.624438] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.624461] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.624484] kthread+0x337/0x6f0 [ 13.624501] ? trace_preempt_on+0x20/0xc0 [ 13.624525] ? __pfx_kthread+0x10/0x10 [ 13.624543] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.624564] ? calculate_sigpending+0x7b/0xa0 [ 13.624586] ? __pfx_kthread+0x10/0x10 [ 13.624621] ret_from_fork+0x41/0x80 [ 13.624641] ? __pfx_kthread+0x10/0x10 [ 13.624659] ret_from_fork_asm+0x1a/0x30 [ 13.624703] </TASK> [ 13.624713] [ 13.635926] Allocated by task 285: [ 13.636125] kasan_save_stack+0x45/0x70 [ 13.636332] kasan_save_track+0x18/0x40 [ 13.636505] kasan_save_alloc_info+0x3b/0x50 [ 13.637086] __kasan_kmalloc+0xb7/0xc0 [ 13.637468] __kmalloc_cache_noprof+0x189/0x420 [ 13.637764] kasan_atomics+0x95/0x310 [ 13.637934] kunit_try_run_case+0x1a5/0x480 [ 13.638117] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.638350] kthread+0x337/0x6f0 [ 13.638501] ret_from_fork+0x41/0x80 [ 13.639241] ret_from_fork_asm+0x1a/0x30 [ 13.639457] [ 13.639529] The buggy address belongs to the object at ffff888103d00c80 [ 13.639529] which belongs to the cache kmalloc-64 of size 64 [ 13.640187] The buggy address is located 0 bytes to the right of [ 13.640187] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 13.640718] [ 13.640821] The buggy address belongs to the physical page: [ 13.641055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 13.641386] flags: 0x200000000000000(node=0|zone=2) [ 13.641742] page_type: f5(slab) [ 13.641889] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.642217] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.642577] page dumped because: kasan: bad access detected [ 13.642800] [ 13.642884] Memory state around the buggy address: [ 13.643278] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.643850] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.644147] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.644501] ^ [ 13.644744] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.645242] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.645579] ================================================================== [ 13.797676] ================================================================== [ 13.798155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 13.798549] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 13.798874] [ 13.799022] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 13.799068] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.799081] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.799131] Call Trace: [ 13.799152] <TASK> [ 13.799169] dump_stack_lvl+0x73/0xb0 [ 13.799196] print_report+0xd1/0x610 [ 13.799220] ? __virt_addr_valid+0x1db/0x2d0 [ 13.799254] ? kasan_atomics_helper+0x5fe/0x5450 [ 13.799276] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.799299] ? kasan_atomics_helper+0x5fe/0x5450 [ 13.799323] kasan_report+0x141/0x180 [ 13.799346] ? kasan_atomics_helper+0x5fe/0x5450 [ 13.799410] kasan_check_range+0x10c/0x1c0 [ 13.799432] __kasan_check_write+0x18/0x20 [ 13.799453] kasan_atomics_helper+0x5fe/0x5450 [ 13.799476] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.799500] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.799522] ? kasan_atomics+0x152/0x310 [ 13.799576] kasan_atomics+0x1dc/0x310 [ 13.799596] ? __pfx_kasan_atomics+0x10/0x10 [ 13.799618] ? __pfx_read_tsc+0x10/0x10 [ 13.799640] ? ktime_get_ts64+0x86/0x230 [ 13.799666] kunit_try_run_case+0x1a5/0x480 [ 13.799717] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.799738] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.799761] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.799786] ? __kthread_parkme+0x82/0x180 [ 13.799808] ? preempt_count_sub+0x50/0x80 [ 13.799838] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.799891] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.799917] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.799945] kthread+0x337/0x6f0 [ 13.799964] ? trace_preempt_on+0x20/0xc0 [ 13.799988] ? __pfx_kthread+0x10/0x10 [ 13.800037] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.800060] ? calculate_sigpending+0x7b/0xa0 [ 13.800082] ? __pfx_kthread+0x10/0x10 [ 13.800101] ret_from_fork+0x41/0x80 [ 13.800123] ? __pfx_kthread+0x10/0x10 [ 13.800168] ret_from_fork_asm+0x1a/0x30 [ 13.800202] </TASK> [ 13.800213] [ 13.813042] Allocated by task 285: [ 13.813389] kasan_save_stack+0x45/0x70 [ 13.813750] kasan_save_track+0x18/0x40 [ 13.814101] kasan_save_alloc_info+0x3b/0x50 [ 13.814545] __kasan_kmalloc+0xb7/0xc0 [ 13.814889] __kmalloc_cache_noprof+0x189/0x420 [ 13.815300] kasan_atomics+0x95/0x310 [ 13.815692] kunit_try_run_case+0x1a5/0x480 [ 13.816063] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.816609] kthread+0x337/0x6f0 [ 13.816911] ret_from_fork+0x41/0x80 [ 13.817267] ret_from_fork_asm+0x1a/0x30 [ 13.817669] [ 13.817826] The buggy address belongs to the object at ffff888103d00c80 [ 13.817826] which belongs to the cache kmalloc-64 of size 64 [ 13.818484] The buggy address is located 0 bytes to the right of [ 13.818484] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 13.818851] [ 13.818925] The buggy address belongs to the physical page: [ 13.819097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 13.819350] flags: 0x200000000000000(node=0|zone=2) [ 13.819541] page_type: f5(slab) [ 13.819712] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.820002] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.820236] page dumped because: kasan: bad access detected [ 13.820511] [ 13.820606] Memory state around the buggy address: [ 13.820833] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.821151] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.821385] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.821706] ^ [ 13.822097] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.822559] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.822915] ================================================================== [ 14.310041] ================================================================== [ 14.310512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 14.310849] Read of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.311186] [ 14.311368] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.311413] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.311425] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.311447] Call Trace: [ 14.311476] <TASK> [ 14.311494] dump_stack_lvl+0x73/0xb0 [ 14.311520] print_report+0xd1/0x610 [ 14.311555] ? __virt_addr_valid+0x1db/0x2d0 [ 14.311577] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.311602] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.311626] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.311658] kasan_report+0x141/0x180 [ 14.311681] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.311709] __asan_report_load4_noabort+0x18/0x20 [ 14.311741] kasan_atomics_helper+0x49ce/0x5450 [ 14.311765] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.311788] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.311810] ? kasan_atomics+0x152/0x310 [ 14.311835] kasan_atomics+0x1dc/0x310 [ 14.311855] ? __pfx_kasan_atomics+0x10/0x10 [ 14.311876] ? __pfx_read_tsc+0x10/0x10 [ 14.311897] ? ktime_get_ts64+0x86/0x230 [ 14.311923] kunit_try_run_case+0x1a5/0x480 [ 14.311945] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.311965] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.311987] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.312012] ? __kthread_parkme+0x82/0x180 [ 14.312034] ? preempt_count_sub+0x50/0x80 [ 14.312060] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.312081] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.312105] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.312129] kthread+0x337/0x6f0 [ 14.312156] ? trace_preempt_on+0x20/0xc0 [ 14.312180] ? __pfx_kthread+0x10/0x10 [ 14.312199] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.312243] ? calculate_sigpending+0x7b/0xa0 [ 14.312265] ? __pfx_kthread+0x10/0x10 [ 14.312284] ret_from_fork+0x41/0x80 [ 14.312311] ? __pfx_kthread+0x10/0x10 [ 14.312330] ret_from_fork_asm+0x1a/0x30 [ 14.312362] </TASK> [ 14.312373] [ 14.320065] Allocated by task 285: [ 14.320263] kasan_save_stack+0x45/0x70 [ 14.320534] kasan_save_track+0x18/0x40 [ 14.320750] kasan_save_alloc_info+0x3b/0x50 [ 14.320897] __kasan_kmalloc+0xb7/0xc0 [ 14.321037] __kmalloc_cache_noprof+0x189/0x420 [ 14.321288] kasan_atomics+0x95/0x310 [ 14.321602] kunit_try_run_case+0x1a5/0x480 [ 14.321806] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.322034] kthread+0x337/0x6f0 [ 14.322154] ret_from_fork+0x41/0x80 [ 14.322326] ret_from_fork_asm+0x1a/0x30 [ 14.322533] [ 14.322629] The buggy address belongs to the object at ffff888103d00c80 [ 14.322629] which belongs to the cache kmalloc-64 of size 64 [ 14.323058] The buggy address is located 0 bytes to the right of [ 14.323058] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.323688] [ 14.323797] The buggy address belongs to the physical page: [ 14.324031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.324383] flags: 0x200000000000000(node=0|zone=2) [ 14.324593] page_type: f5(slab) [ 14.324773] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.325101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.325477] page dumped because: kasan: bad access detected [ 14.325650] [ 14.325720] Memory state around the buggy address: [ 14.325875] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.326092] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.326318] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.326581] ^ [ 14.326815] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.327127] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.327446] ================================================================== [ 14.640392] ================================================================== [ 14.640753] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 14.641016] Read of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.641253] [ 14.641337] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.641379] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.641391] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.641412] Call Trace: [ 14.641429] <TASK> [ 14.641446] dump_stack_lvl+0x73/0xb0 [ 14.641469] print_report+0xd1/0x610 [ 14.641492] ? __virt_addr_valid+0x1db/0x2d0 [ 14.641514] ? kasan_atomics_helper+0x4f30/0x5450 [ 14.641536] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.641559] ? kasan_atomics_helper+0x4f30/0x5450 [ 14.641582] kasan_report+0x141/0x180 [ 14.641605] ? kasan_atomics_helper+0x4f30/0x5450 [ 14.641633] __asan_report_load8_noabort+0x18/0x20 [ 14.641655] kasan_atomics_helper+0x4f30/0x5450 [ 14.641678] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.641702] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.641724] ? kasan_atomics+0x152/0x310 [ 14.641747] kasan_atomics+0x1dc/0x310 [ 14.641767] ? __pfx_kasan_atomics+0x10/0x10 [ 14.641788] ? __pfx_read_tsc+0x10/0x10 [ 14.641809] ? ktime_get_ts64+0x86/0x230 [ 14.641834] kunit_try_run_case+0x1a5/0x480 [ 14.641855] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.641874] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.641896] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.641920] ? __kthread_parkme+0x82/0x180 [ 14.641943] ? preempt_count_sub+0x50/0x80 [ 14.641968] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.641988] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.642012] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.642036] kthread+0x337/0x6f0 [ 14.642054] ? trace_preempt_on+0x20/0xc0 [ 14.642078] ? __pfx_kthread+0x10/0x10 [ 14.642096] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.642119] ? calculate_sigpending+0x7b/0xa0 [ 14.642141] ? __pfx_kthread+0x10/0x10 [ 14.642159] ret_from_fork+0x41/0x80 [ 14.642180] ? __pfx_kthread+0x10/0x10 [ 14.642199] ret_from_fork_asm+0x1a/0x30 [ 14.642241] </TASK> [ 14.642251] [ 14.650155] Allocated by task 285: [ 14.650464] kasan_save_stack+0x45/0x70 [ 14.650610] kasan_save_track+0x18/0x40 [ 14.650787] kasan_save_alloc_info+0x3b/0x50 [ 14.651007] __kasan_kmalloc+0xb7/0xc0 [ 14.651195] __kmalloc_cache_noprof+0x189/0x420 [ 14.651376] kasan_atomics+0x95/0x310 [ 14.651561] kunit_try_run_case+0x1a5/0x480 [ 14.651746] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.651929] kthread+0x337/0x6f0 [ 14.652048] ret_from_fork+0x41/0x80 [ 14.652244] ret_from_fork_asm+0x1a/0x30 [ 14.652539] [ 14.652637] The buggy address belongs to the object at ffff888103d00c80 [ 14.652637] which belongs to the cache kmalloc-64 of size 64 [ 14.653125] The buggy address is located 0 bytes to the right of [ 14.653125] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.653669] [ 14.653767] The buggy address belongs to the physical page: [ 14.653985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.654306] flags: 0x200000000000000(node=0|zone=2) [ 14.654578] page_type: f5(slab) [ 14.654736] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.655022] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.655282] page dumped because: kasan: bad access detected [ 14.655454] [ 14.655522] Memory state around the buggy address: [ 14.655676] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.655891] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.656106] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.656381] ^ [ 14.656712] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.657032] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.657354] ================================================================== [ 13.601493] ================================================================== [ 13.602470] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 13.602826] Read of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 13.603155] [ 13.603351] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 13.603404] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.603416] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.603459] Call Trace: [ 13.603473] <TASK> [ 13.603507] dump_stack_lvl+0x73/0xb0 [ 13.603551] print_report+0xd1/0x610 [ 13.603576] ? __virt_addr_valid+0x1db/0x2d0 [ 13.603600] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.603622] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.603644] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.603666] kasan_report+0x141/0x180 [ 13.603689] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.603716] __asan_report_load4_noabort+0x18/0x20 [ 13.603736] kasan_atomics_helper+0x4bbc/0x5450 [ 13.603759] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.603829] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.603852] ? kasan_atomics+0x152/0x310 [ 13.603876] kasan_atomics+0x1dc/0x310 [ 13.603916] ? __pfx_kasan_atomics+0x10/0x10 [ 13.603937] ? __pfx_read_tsc+0x10/0x10 [ 13.603973] ? ktime_get_ts64+0x86/0x230 [ 13.604000] kunit_try_run_case+0x1a5/0x480 [ 13.604023] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.604042] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.604064] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.604089] ? __kthread_parkme+0x82/0x180 [ 13.604111] ? preempt_count_sub+0x50/0x80 [ 13.604137] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.604158] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.604181] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.604205] kthread+0x337/0x6f0 [ 13.604234] ? trace_preempt_on+0x20/0xc0 [ 13.604259] ? __pfx_kthread+0x10/0x10 [ 13.604277] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.604300] ? calculate_sigpending+0x7b/0xa0 [ 13.604322] ? __pfx_kthread+0x10/0x10 [ 13.604340] ret_from_fork+0x41/0x80 [ 13.604371] ? __pfx_kthread+0x10/0x10 [ 13.604389] ret_from_fork_asm+0x1a/0x30 [ 13.604420] </TASK> [ 13.604432] [ 13.612888] Allocated by task 285: [ 13.613081] kasan_save_stack+0x45/0x70 [ 13.613302] kasan_save_track+0x18/0x40 [ 13.613507] kasan_save_alloc_info+0x3b/0x50 [ 13.613827] __kasan_kmalloc+0xb7/0xc0 [ 13.614026] __kmalloc_cache_noprof+0x189/0x420 [ 13.614272] kasan_atomics+0x95/0x310 [ 13.614459] kunit_try_run_case+0x1a5/0x480 [ 13.614687] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.614937] kthread+0x337/0x6f0 [ 13.615102] ret_from_fork+0x41/0x80 [ 13.615342] ret_from_fork_asm+0x1a/0x30 [ 13.615549] [ 13.615719] The buggy address belongs to the object at ffff888103d00c80 [ 13.615719] which belongs to the cache kmalloc-64 of size 64 [ 13.616095] The buggy address is located 0 bytes to the right of [ 13.616095] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 13.617046] [ 13.617148] The buggy address belongs to the physical page: [ 13.617416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 13.617912] flags: 0x200000000000000(node=0|zone=2) [ 13.618142] page_type: f5(slab) [ 13.618321] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.618698] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.618957] page dumped because: kasan: bad access detected [ 13.619131] [ 13.619198] Memory state around the buggy address: [ 13.619485] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.619806] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.620131] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.620528] ^ [ 13.620803] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.621028] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.621255] ================================================================== [ 14.440451] ================================================================== [ 14.440795] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 14.441377] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.441648] [ 14.441781] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.441837] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.441849] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.441871] Call Trace: [ 14.441886] <TASK> [ 14.441929] dump_stack_lvl+0x73/0xb0 [ 14.441954] print_report+0xd1/0x610 [ 14.441977] ? __virt_addr_valid+0x1db/0x2d0 [ 14.442009] ? kasan_atomics_helper+0x164f/0x5450 [ 14.442031] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.442071] ? kasan_atomics_helper+0x164f/0x5450 [ 14.442107] kasan_report+0x141/0x180 [ 14.442131] ? kasan_atomics_helper+0x164f/0x5450 [ 14.442172] kasan_check_range+0x10c/0x1c0 [ 14.442207] __kasan_check_write+0x18/0x20 [ 14.442250] kasan_atomics_helper+0x164f/0x5450 [ 14.442275] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.442312] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.442347] ? kasan_atomics+0x152/0x310 [ 14.442383] kasan_atomics+0x1dc/0x310 [ 14.442403] ? __pfx_kasan_atomics+0x10/0x10 [ 14.442425] ? __pfx_read_tsc+0x10/0x10 [ 14.442445] ? ktime_get_ts64+0x86/0x230 [ 14.442481] kunit_try_run_case+0x1a5/0x480 [ 14.442502] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.442521] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.442554] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.442579] ? __kthread_parkme+0x82/0x180 [ 14.442602] ? preempt_count_sub+0x50/0x80 [ 14.442629] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.442650] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.442675] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.442699] kthread+0x337/0x6f0 [ 14.442716] ? trace_preempt_on+0x20/0xc0 [ 14.442740] ? __pfx_kthread+0x10/0x10 [ 14.442759] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.442782] ? calculate_sigpending+0x7b/0xa0 [ 14.442804] ? __pfx_kthread+0x10/0x10 [ 14.442824] ret_from_fork+0x41/0x80 [ 14.442846] ? __pfx_kthread+0x10/0x10 [ 14.442865] ret_from_fork_asm+0x1a/0x30 [ 14.442897] </TASK> [ 14.442909] [ 14.450804] Allocated by task 285: [ 14.451036] kasan_save_stack+0x45/0x70 [ 14.451249] kasan_save_track+0x18/0x40 [ 14.451469] kasan_save_alloc_info+0x3b/0x50 [ 14.451702] __kasan_kmalloc+0xb7/0xc0 [ 14.451833] __kmalloc_cache_noprof+0x189/0x420 [ 14.451981] kasan_atomics+0x95/0x310 [ 14.452106] kunit_try_run_case+0x1a5/0x480 [ 14.452313] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.452837] kthread+0x337/0x6f0 [ 14.453072] ret_from_fork+0x41/0x80 [ 14.453300] ret_from_fork_asm+0x1a/0x30 [ 14.453565] [ 14.453653] The buggy address belongs to the object at ffff888103d00c80 [ 14.453653] which belongs to the cache kmalloc-64 of size 64 [ 14.454123] The buggy address is located 0 bytes to the right of [ 14.454123] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.454744] [ 14.454870] The buggy address belongs to the physical page: [ 14.455122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.455527] flags: 0x200000000000000(node=0|zone=2) [ 14.455844] page_type: f5(slab) [ 14.456050] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.456407] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.456731] page dumped because: kasan: bad access detected [ 14.457007] [ 14.457137] Memory state around the buggy address: [ 14.457333] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.457607] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.457888] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.458192] ^ [ 14.458427] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.458756] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.459060] ================================================================== [ 14.596007] ================================================================== [ 14.596262] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 14.597239] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.598478] [ 14.598860] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.598906] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.598919] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.598940] Call Trace: [ 14.598958] <TASK> [ 14.598973] dump_stack_lvl+0x73/0xb0 [ 14.598999] print_report+0xd1/0x610 [ 14.599022] ? __virt_addr_valid+0x1db/0x2d0 [ 14.599044] ? kasan_atomics_helper+0x1b22/0x5450 [ 14.599066] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.599090] ? kasan_atomics_helper+0x1b22/0x5450 [ 14.599113] kasan_report+0x141/0x180 [ 14.599136] ? kasan_atomics_helper+0x1b22/0x5450 [ 14.599164] kasan_check_range+0x10c/0x1c0 [ 14.599184] __kasan_check_write+0x18/0x20 [ 14.599204] kasan_atomics_helper+0x1b22/0x5450 [ 14.599239] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.599262] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.599284] ? kasan_atomics+0x152/0x310 [ 14.599307] kasan_atomics+0x1dc/0x310 [ 14.599327] ? __pfx_kasan_atomics+0x10/0x10 [ 14.599369] ? __pfx_read_tsc+0x10/0x10 [ 14.599390] ? ktime_get_ts64+0x86/0x230 [ 14.599416] kunit_try_run_case+0x1a5/0x480 [ 14.599437] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.599456] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.599478] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.599503] ? __kthread_parkme+0x82/0x180 [ 14.599524] ? preempt_count_sub+0x50/0x80 [ 14.599550] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.599571] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.599594] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.599618] kthread+0x337/0x6f0 [ 14.599635] ? trace_preempt_on+0x20/0xc0 [ 14.599659] ? __pfx_kthread+0x10/0x10 [ 14.599678] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.599700] ? calculate_sigpending+0x7b/0xa0 [ 14.599722] ? __pfx_kthread+0x10/0x10 [ 14.599741] ret_from_fork+0x41/0x80 [ 14.599762] ? __pfx_kthread+0x10/0x10 [ 14.599783] ret_from_fork_asm+0x1a/0x30 [ 14.599815] </TASK> [ 14.599825] [ 14.612129] Allocated by task 285: [ 14.612272] kasan_save_stack+0x45/0x70 [ 14.612938] kasan_save_track+0x18/0x40 [ 14.613327] kasan_save_alloc_info+0x3b/0x50 [ 14.613739] __kasan_kmalloc+0xb7/0xc0 [ 14.614104] __kmalloc_cache_noprof+0x189/0x420 [ 14.614559] kasan_atomics+0x95/0x310 [ 14.614947] kunit_try_run_case+0x1a5/0x480 [ 14.615336] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.615816] kthread+0x337/0x6f0 [ 14.616119] ret_from_fork+0x41/0x80 [ 14.616534] ret_from_fork_asm+0x1a/0x30 [ 14.616908] [ 14.617043] The buggy address belongs to the object at ffff888103d00c80 [ 14.617043] which belongs to the cache kmalloc-64 of size 64 [ 14.617685] The buggy address is located 0 bytes to the right of [ 14.617685] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.618038] [ 14.618109] The buggy address belongs to the physical page: [ 14.618358] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.619059] flags: 0x200000000000000(node=0|zone=2) [ 14.619535] page_type: f5(slab) [ 14.619707] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.619933] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.620152] page dumped because: kasan: bad access detected [ 14.620369] [ 14.620437] Memory state around the buggy address: [ 14.620645] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.620918] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.621220] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.621513] ^ [ 14.621663] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.621967] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.622250] ================================================================== [ 13.699929] ================================================================== [ 13.700563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 13.701049] Read of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 13.701489] [ 13.701803] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 13.701856] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.701870] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.701892] Call Trace: [ 13.701908] <TASK> [ 13.701926] dump_stack_lvl+0x73/0xb0 [ 13.701955] print_report+0xd1/0x610 [ 13.702174] ? __virt_addr_valid+0x1db/0x2d0 [ 13.702203] ? kasan_atomics_helper+0x3df/0x5450 [ 13.702238] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.702262] ? kasan_atomics_helper+0x3df/0x5450 [ 13.702285] kasan_report+0x141/0x180 [ 13.702310] ? kasan_atomics_helper+0x3df/0x5450 [ 13.702337] kasan_check_range+0x10c/0x1c0 [ 13.702370] __kasan_check_read+0x15/0x20 [ 13.702390] kasan_atomics_helper+0x3df/0x5450 [ 13.702414] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.702437] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.702461] ? kasan_atomics+0x152/0x310 [ 13.702485] kasan_atomics+0x1dc/0x310 [ 13.702505] ? __pfx_kasan_atomics+0x10/0x10 [ 13.702527] ? __pfx_read_tsc+0x10/0x10 [ 13.702549] ? ktime_get_ts64+0x86/0x230 [ 13.702575] kunit_try_run_case+0x1a5/0x480 [ 13.702598] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.702618] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.702640] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.702665] ? __kthread_parkme+0x82/0x180 [ 13.702687] ? preempt_count_sub+0x50/0x80 [ 13.702713] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.702734] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.702758] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.702782] kthread+0x337/0x6f0 [ 13.702800] ? trace_preempt_on+0x20/0xc0 [ 13.702824] ? __pfx_kthread+0x10/0x10 [ 13.702843] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.702868] ? calculate_sigpending+0x7b/0xa0 [ 13.702890] ? __pfx_kthread+0x10/0x10 [ 13.702910] ret_from_fork+0x41/0x80 [ 13.702932] ? __pfx_kthread+0x10/0x10 [ 13.702950] ret_from_fork_asm+0x1a/0x30 [ 13.702983] </TASK> [ 13.702995] [ 13.713584] Allocated by task 285: [ 13.713768] kasan_save_stack+0x45/0x70 [ 13.714088] kasan_save_track+0x18/0x40 [ 13.714444] kasan_save_alloc_info+0x3b/0x50 [ 13.714733] __kasan_kmalloc+0xb7/0xc0 [ 13.715007] __kmalloc_cache_noprof+0x189/0x420 [ 13.715258] kasan_atomics+0x95/0x310 [ 13.715625] kunit_try_run_case+0x1a5/0x480 [ 13.715931] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.716191] kthread+0x337/0x6f0 [ 13.716454] ret_from_fork+0x41/0x80 [ 13.716761] ret_from_fork_asm+0x1a/0x30 [ 13.716934] [ 13.717034] The buggy address belongs to the object at ffff888103d00c80 [ 13.717034] which belongs to the cache kmalloc-64 of size 64 [ 13.717786] The buggy address is located 0 bytes to the right of [ 13.717786] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 13.718550] [ 13.718751] The buggy address belongs to the physical page: [ 13.718984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 13.719306] flags: 0x200000000000000(node=0|zone=2) [ 13.719565] page_type: f5(slab) [ 13.719686] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.719991] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.720324] page dumped because: kasan: bad access detected [ 13.720579] [ 13.720749] Memory state around the buggy address: [ 13.720958] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.721233] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.721482] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.721815] ^ [ 13.722029] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.722471] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.722703] ================================================================== [ 14.459763] ================================================================== [ 14.460114] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 14.460692] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.460965] [ 14.461048] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.461089] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.461101] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.461121] Call Trace: [ 14.461163] <TASK> [ 14.461178] dump_stack_lvl+0x73/0xb0 [ 14.461203] print_report+0xd1/0x610 [ 14.461244] ? __virt_addr_valid+0x1db/0x2d0 [ 14.461266] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.461289] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.461338] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.461362] kasan_report+0x141/0x180 [ 14.461386] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.461433] kasan_check_range+0x10c/0x1c0 [ 14.461455] __kasan_check_write+0x18/0x20 [ 14.461476] kasan_atomics_helper+0x16e7/0x5450 [ 14.461499] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.461548] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.461571] ? kasan_atomics+0x152/0x310 [ 14.461595] kasan_atomics+0x1dc/0x310 [ 14.461626] ? __pfx_kasan_atomics+0x10/0x10 [ 14.461647] ? __pfx_read_tsc+0x10/0x10 [ 14.461694] ? ktime_get_ts64+0x86/0x230 [ 14.461720] kunit_try_run_case+0x1a5/0x480 [ 14.461741] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.461771] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.461793] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.461844] ? __kthread_parkme+0x82/0x180 [ 14.461866] ? preempt_count_sub+0x50/0x80 [ 14.461893] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.461924] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.461949] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.461998] kthread+0x337/0x6f0 [ 14.462016] ? trace_preempt_on+0x20/0xc0 [ 14.462040] ? __pfx_kthread+0x10/0x10 [ 14.462069] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.462093] ? calculate_sigpending+0x7b/0xa0 [ 14.462140] ? __pfx_kthread+0x10/0x10 [ 14.462159] ret_from_fork+0x41/0x80 [ 14.462181] ? __pfx_kthread+0x10/0x10 [ 14.462200] ret_from_fork_asm+0x1a/0x30 [ 14.462250] </TASK> [ 14.462260] [ 14.470605] Allocated by task 285: [ 14.470778] kasan_save_stack+0x45/0x70 [ 14.470997] kasan_save_track+0x18/0x40 [ 14.471246] kasan_save_alloc_info+0x3b/0x50 [ 14.471559] __kasan_kmalloc+0xb7/0xc0 [ 14.471760] __kmalloc_cache_noprof+0x189/0x420 [ 14.471953] kasan_atomics+0x95/0x310 [ 14.472082] kunit_try_run_case+0x1a5/0x480 [ 14.472340] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.472653] kthread+0x337/0x6f0 [ 14.472844] ret_from_fork+0x41/0x80 [ 14.473058] ret_from_fork_asm+0x1a/0x30 [ 14.473263] [ 14.473366] The buggy address belongs to the object at ffff888103d00c80 [ 14.473366] which belongs to the cache kmalloc-64 of size 64 [ 14.473845] The buggy address is located 0 bytes to the right of [ 14.473845] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.474309] [ 14.474444] The buggy address belongs to the physical page: [ 14.474708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.475066] flags: 0x200000000000000(node=0|zone=2) [ 14.475313] page_type: f5(slab) [ 14.475497] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.475849] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.476171] page dumped because: kasan: bad access detected [ 14.476436] [ 14.476539] Memory state around the buggy address: [ 14.476734] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.476951] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.477160] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.477572] ^ [ 14.477800] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.478123] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.478647] ================================================================== [ 14.699212] ================================================================== [ 14.700415] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 14.700852] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.701086] [ 14.701174] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.701219] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.701250] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.701272] Call Trace: [ 14.701290] <TASK> [ 14.701306] dump_stack_lvl+0x73/0xb0 [ 14.701332] print_report+0xd1/0x610 [ 14.701355] ? __virt_addr_valid+0x1db/0x2d0 [ 14.701377] ? kasan_atomics_helper+0x1e12/0x5450 [ 14.701400] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.701423] ? kasan_atomics_helper+0x1e12/0x5450 [ 14.701446] kasan_report+0x141/0x180 [ 14.701470] ? kasan_atomics_helper+0x1e12/0x5450 [ 14.701498] kasan_check_range+0x10c/0x1c0 [ 14.701519] __kasan_check_write+0x18/0x20 [ 14.701540] kasan_atomics_helper+0x1e12/0x5450 [ 14.701564] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.701588] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.701610] ? kasan_atomics+0x152/0x310 [ 14.701635] kasan_atomics+0x1dc/0x310 [ 14.701655] ? __pfx_kasan_atomics+0x10/0x10 [ 14.701677] ? __pfx_read_tsc+0x10/0x10 [ 14.701698] ? ktime_get_ts64+0x86/0x230 [ 14.701724] kunit_try_run_case+0x1a5/0x480 [ 14.701746] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.701765] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.701804] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.701830] ? __kthread_parkme+0x82/0x180 [ 14.701852] ? preempt_count_sub+0x50/0x80 [ 14.701878] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.701899] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.701923] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.701946] kthread+0x337/0x6f0 [ 14.701964] ? trace_preempt_on+0x20/0xc0 [ 14.701988] ? __pfx_kthread+0x10/0x10 [ 14.702007] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.702030] ? calculate_sigpending+0x7b/0xa0 [ 14.702052] ? __pfx_kthread+0x10/0x10 [ 14.702072] ret_from_fork+0x41/0x80 [ 14.702093] ? __pfx_kthread+0x10/0x10 [ 14.702112] ret_from_fork_asm+0x1a/0x30 [ 14.702143] </TASK> [ 14.702154] [ 14.713718] Allocated by task 285: [ 14.713882] kasan_save_stack+0x45/0x70 [ 14.714088] kasan_save_track+0x18/0x40 [ 14.714254] kasan_save_alloc_info+0x3b/0x50 [ 14.714532] __kasan_kmalloc+0xb7/0xc0 [ 14.714708] __kmalloc_cache_noprof+0x189/0x420 [ 14.714889] kasan_atomics+0x95/0x310 [ 14.715064] kunit_try_run_case+0x1a5/0x480 [ 14.715249] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.715425] kthread+0x337/0x6f0 [ 14.715543] ret_from_fork+0x41/0x80 [ 14.715675] ret_from_fork_asm+0x1a/0x30 [ 14.715813] [ 14.715885] The buggy address belongs to the object at ffff888103d00c80 [ 14.715885] which belongs to the cache kmalloc-64 of size 64 [ 14.716630] The buggy address is located 0 bytes to the right of [ 14.716630] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.716999] [ 14.717070] The buggy address belongs to the physical page: [ 14.717485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.717813] flags: 0x200000000000000(node=0|zone=2) [ 14.718027] page_type: f5(slab) [ 14.718185] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.719021] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.719363] page dumped because: kasan: bad access detected [ 14.719592] [ 14.719688] Memory state around the buggy address: [ 14.719918] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.720210] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.720536] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.720799] ^ [ 14.720962] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.721207] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.721558] ================================================================== [ 13.778883] ================================================================== [ 13.779248] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 13.779592] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 13.779923] [ 13.780038] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 13.780083] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.780096] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.780118] Call Trace: [ 13.780138] <TASK> [ 13.780155] dump_stack_lvl+0x73/0xb0 [ 13.780179] print_report+0xd1/0x610 [ 13.780203] ? __virt_addr_valid+0x1db/0x2d0 [ 13.780235] ? kasan_atomics_helper+0x565/0x5450 [ 13.780258] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.780282] ? kasan_atomics_helper+0x565/0x5450 [ 13.780304] kasan_report+0x141/0x180 [ 13.780327] ? kasan_atomics_helper+0x565/0x5450 [ 13.780354] kasan_check_range+0x10c/0x1c0 [ 13.780375] __kasan_check_write+0x18/0x20 [ 13.780395] kasan_atomics_helper+0x565/0x5450 [ 13.780419] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.780441] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.780463] ? kasan_atomics+0x152/0x310 [ 13.780487] kasan_atomics+0x1dc/0x310 [ 13.780506] ? __pfx_kasan_atomics+0x10/0x10 [ 13.780528] ? __pfx_read_tsc+0x10/0x10 [ 13.780549] ? ktime_get_ts64+0x86/0x230 [ 13.780575] kunit_try_run_case+0x1a5/0x480 [ 13.780596] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.780615] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.780637] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.780661] ? __kthread_parkme+0x82/0x180 [ 13.780684] ? preempt_count_sub+0x50/0x80 [ 13.780711] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.780732] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.780756] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.780779] kthread+0x337/0x6f0 [ 13.780797] ? trace_preempt_on+0x20/0xc0 [ 13.780820] ? __pfx_kthread+0x10/0x10 [ 13.780839] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.780862] ? calculate_sigpending+0x7b/0xa0 [ 13.780884] ? __pfx_kthread+0x10/0x10 [ 13.780940] ret_from_fork+0x41/0x80 [ 13.780964] ? __pfx_kthread+0x10/0x10 [ 13.780983] ret_from_fork_asm+0x1a/0x30 [ 13.781017] </TASK> [ 13.781029] [ 13.788765] Allocated by task 285: [ 13.788954] kasan_save_stack+0x45/0x70 [ 13.789158] kasan_save_track+0x18/0x40 [ 13.789374] kasan_save_alloc_info+0x3b/0x50 [ 13.789609] __kasan_kmalloc+0xb7/0xc0 [ 13.789753] __kmalloc_cache_noprof+0x189/0x420 [ 13.789906] kasan_atomics+0x95/0x310 [ 13.790037] kunit_try_run_case+0x1a5/0x480 [ 13.790264] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.790729] kthread+0x337/0x6f0 [ 13.790897] ret_from_fork+0x41/0x80 [ 13.791114] ret_from_fork_asm+0x1a/0x30 [ 13.791332] [ 13.791486] The buggy address belongs to the object at ffff888103d00c80 [ 13.791486] which belongs to the cache kmalloc-64 of size 64 [ 13.792005] The buggy address is located 0 bytes to the right of [ 13.792005] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 13.792593] [ 13.792691] The buggy address belongs to the physical page: [ 13.792952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 13.793312] flags: 0x200000000000000(node=0|zone=2) [ 13.793628] page_type: f5(slab) [ 13.793793] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.794162] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.794546] page dumped because: kasan: bad access detected [ 13.794790] [ 13.794883] Memory state around the buggy address: [ 13.795107] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.795453] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.795786] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.796093] ^ [ 13.796352] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.796662] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.796971] ================================================================== [ 14.200422] ================================================================== [ 14.200687] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 14.201056] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.201480] [ 14.201612] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.201656] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.201680] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.201703] Call Trace: [ 14.201717] <TASK> [ 14.201730] dump_stack_lvl+0x73/0xb0 [ 14.201767] print_report+0xd1/0x610 [ 14.201790] ? __virt_addr_valid+0x1db/0x2d0 [ 14.201811] ? kasan_atomics_helper+0x1148/0x5450 [ 14.201844] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.201868] ? kasan_atomics_helper+0x1148/0x5450 [ 14.201891] kasan_report+0x141/0x180 [ 14.201924] ? kasan_atomics_helper+0x1148/0x5450 [ 14.201952] kasan_check_range+0x10c/0x1c0 [ 14.201985] __kasan_check_write+0x18/0x20 [ 14.202005] kasan_atomics_helper+0x1148/0x5450 [ 14.202029] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.202062] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.202084] ? kasan_atomics+0x152/0x310 [ 14.202108] kasan_atomics+0x1dc/0x310 [ 14.202139] ? __pfx_kasan_atomics+0x10/0x10 [ 14.202161] ? __pfx_read_tsc+0x10/0x10 [ 14.202181] ? ktime_get_ts64+0x86/0x230 [ 14.202216] kunit_try_run_case+0x1a5/0x480 [ 14.202246] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.202265] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.202296] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.202321] ? __kthread_parkme+0x82/0x180 [ 14.202366] ? preempt_count_sub+0x50/0x80 [ 14.202393] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.202415] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.202450] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.202474] kthread+0x337/0x6f0 [ 14.202491] ? trace_preempt_on+0x20/0xc0 [ 14.202526] ? __pfx_kthread+0x10/0x10 [ 14.202544] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.202567] ? calculate_sigpending+0x7b/0xa0 [ 14.202601] ? __pfx_kthread+0x10/0x10 [ 14.202620] ret_from_fork+0x41/0x80 [ 14.202641] ? __pfx_kthread+0x10/0x10 [ 14.202671] ret_from_fork_asm+0x1a/0x30 [ 14.202702] </TASK> [ 14.202713] [ 14.210768] Allocated by task 285: [ 14.210942] kasan_save_stack+0x45/0x70 [ 14.211147] kasan_save_track+0x18/0x40 [ 14.211371] kasan_save_alloc_info+0x3b/0x50 [ 14.211597] __kasan_kmalloc+0xb7/0xc0 [ 14.211742] __kmalloc_cache_noprof+0x189/0x420 [ 14.211895] kasan_atomics+0x95/0x310 [ 14.212083] kunit_try_run_case+0x1a5/0x480 [ 14.212306] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.212584] kthread+0x337/0x6f0 [ 14.212747] ret_from_fork+0x41/0x80 [ 14.212905] ret_from_fork_asm+0x1a/0x30 [ 14.213050] [ 14.213143] The buggy address belongs to the object at ffff888103d00c80 [ 14.213143] which belongs to the cache kmalloc-64 of size 64 [ 14.213660] The buggy address is located 0 bytes to the right of [ 14.213660] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.214027] [ 14.214098] The buggy address belongs to the physical page: [ 14.214279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.214546] flags: 0x200000000000000(node=0|zone=2) [ 14.214709] page_type: f5(slab) [ 14.214831] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.215062] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.215409] page dumped because: kasan: bad access detected [ 14.215658] [ 14.215748] Memory state around the buggy address: [ 14.215968] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.216290] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.216632] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.216947] ^ [ 14.217190] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.217544] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.217879] ================================================================== [ 14.078141] ================================================================== [ 14.078600] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 14.079324] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.079665] [ 14.079769] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.079811] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.079823] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.079845] Call Trace: [ 14.079859] <TASK> [ 14.079875] dump_stack_lvl+0x73/0xb0 [ 14.079898] print_report+0xd1/0x610 [ 14.079921] ? __virt_addr_valid+0x1db/0x2d0 [ 14.079943] ? kasan_atomics_helper+0xe78/0x5450 [ 14.079965] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.079988] ? kasan_atomics_helper+0xe78/0x5450 [ 14.080011] kasan_report+0x141/0x180 [ 14.080034] ? kasan_atomics_helper+0xe78/0x5450 [ 14.080061] kasan_check_range+0x10c/0x1c0 [ 14.080083] __kasan_check_write+0x18/0x20 [ 14.080103] kasan_atomics_helper+0xe78/0x5450 [ 14.080127] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.080150] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.080172] ? kasan_atomics+0x152/0x310 [ 14.080196] kasan_atomics+0x1dc/0x310 [ 14.080216] ? __pfx_kasan_atomics+0x10/0x10 [ 14.080250] ? __pfx_read_tsc+0x10/0x10 [ 14.080270] ? ktime_get_ts64+0x86/0x230 [ 14.080296] kunit_try_run_case+0x1a5/0x480 [ 14.080318] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.080337] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.080359] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.080395] ? __kthread_parkme+0x82/0x180 [ 14.080417] ? preempt_count_sub+0x50/0x80 [ 14.080443] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.080464] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.080488] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.080512] kthread+0x337/0x6f0 [ 14.080529] ? trace_preempt_on+0x20/0xc0 [ 14.080553] ? __pfx_kthread+0x10/0x10 [ 14.080572] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.080595] ? calculate_sigpending+0x7b/0xa0 [ 14.080617] ? __pfx_kthread+0x10/0x10 [ 14.080636] ret_from_fork+0x41/0x80 [ 14.080657] ? __pfx_kthread+0x10/0x10 [ 14.080676] ret_from_fork_asm+0x1a/0x30 [ 14.080707] </TASK> [ 14.080718] [ 14.087917] Allocated by task 285: [ 14.088112] kasan_save_stack+0x45/0x70 [ 14.088264] kasan_save_track+0x18/0x40 [ 14.088482] kasan_save_alloc_info+0x3b/0x50 [ 14.088685] __kasan_kmalloc+0xb7/0xc0 [ 14.088884] __kmalloc_cache_noprof+0x189/0x420 [ 14.089039] kasan_atomics+0x95/0x310 [ 14.089166] kunit_try_run_case+0x1a5/0x480 [ 14.089316] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.089822] kthread+0x337/0x6f0 [ 14.089988] ret_from_fork+0x41/0x80 [ 14.090164] ret_from_fork_asm+0x1a/0x30 [ 14.090771] [ 14.091039] The buggy address belongs to the object at ffff888103d00c80 [ 14.091039] which belongs to the cache kmalloc-64 of size 64 [ 14.092034] The buggy address is located 0 bytes to the right of [ 14.092034] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.092534] [ 14.092634] The buggy address belongs to the physical page: [ 14.092878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.093169] flags: 0x200000000000000(node=0|zone=2) [ 14.093481] page_type: f5(slab) [ 14.093665] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.093897] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.094117] page dumped because: kasan: bad access detected [ 14.094292] [ 14.094359] Memory state around the buggy address: [ 14.094509] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.094716] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.095005] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.095319] ^ [ 14.095538] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.095846] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.096142] ================================================================== [ 14.236045] ================================================================== [ 14.236473] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 14.236797] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.237029] [ 14.237114] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.237157] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.237170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.237191] Call Trace: [ 14.237206] <TASK> [ 14.237233] dump_stack_lvl+0x73/0xb0 [ 14.237257] print_report+0xd1/0x610 [ 14.237281] ? __virt_addr_valid+0x1db/0x2d0 [ 14.237302] ? kasan_atomics_helper+0x1217/0x5450 [ 14.237324] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.237369] ? kasan_atomics_helper+0x1217/0x5450 [ 14.237393] kasan_report+0x141/0x180 [ 14.237417] ? kasan_atomics_helper+0x1217/0x5450 [ 14.237444] kasan_check_range+0x10c/0x1c0 [ 14.237464] __kasan_check_write+0x18/0x20 [ 14.237485] kasan_atomics_helper+0x1217/0x5450 [ 14.237508] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.237531] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.237553] ? kasan_atomics+0x152/0x310 [ 14.237577] kasan_atomics+0x1dc/0x310 [ 14.237596] ? __pfx_kasan_atomics+0x10/0x10 [ 14.237618] ? __pfx_read_tsc+0x10/0x10 [ 14.237640] ? ktime_get_ts64+0x86/0x230 [ 14.237675] kunit_try_run_case+0x1a5/0x480 [ 14.237696] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.237716] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.237749] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.237774] ? __kthread_parkme+0x82/0x180 [ 14.237796] ? preempt_count_sub+0x50/0x80 [ 14.237834] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.237856] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.237879] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.237915] kthread+0x337/0x6f0 [ 14.237933] ? trace_preempt_on+0x20/0xc0 [ 14.237957] ? __pfx_kthread+0x10/0x10 [ 14.237986] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.238009] ? calculate_sigpending+0x7b/0xa0 [ 14.238031] ? __pfx_kthread+0x10/0x10 [ 14.238061] ret_from_fork+0x41/0x80 [ 14.238083] ? __pfx_kthread+0x10/0x10 [ 14.238101] ret_from_fork_asm+0x1a/0x30 [ 14.238144] </TASK> [ 14.238155] [ 14.245726] Allocated by task 285: [ 14.245928] kasan_save_stack+0x45/0x70 [ 14.246161] kasan_save_track+0x18/0x40 [ 14.246413] kasan_save_alloc_info+0x3b/0x50 [ 14.246620] __kasan_kmalloc+0xb7/0xc0 [ 14.246807] __kmalloc_cache_noprof+0x189/0x420 [ 14.247035] kasan_atomics+0x95/0x310 [ 14.247248] kunit_try_run_case+0x1a5/0x480 [ 14.247478] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.247655] kthread+0x337/0x6f0 [ 14.247774] ret_from_fork+0x41/0x80 [ 14.247959] ret_from_fork_asm+0x1a/0x30 [ 14.248183] [ 14.248365] The buggy address belongs to the object at ffff888103d00c80 [ 14.248365] which belongs to the cache kmalloc-64 of size 64 [ 14.249374] The buggy address is located 0 bytes to the right of [ 14.249374] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.250005] [ 14.250162] The buggy address belongs to the physical page: [ 14.250653] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.251292] flags: 0x200000000000000(node=0|zone=2) [ 14.251536] page_type: f5(slab) [ 14.251658] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.251892] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.252118] page dumped because: kasan: bad access detected [ 14.252299] [ 14.252426] Memory state around the buggy address: [ 14.252876] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.253535] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.254155] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.254793] ^ [ 14.255232] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.255881] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.256524] ================================================================== [ 14.675497] ================================================================== [ 14.675975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 14.676303] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.676621] [ 14.676731] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.676773] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.676785] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.676806] Call Trace: [ 14.676820] <TASK> [ 14.676835] dump_stack_lvl+0x73/0xb0 [ 14.676860] print_report+0xd1/0x610 [ 14.676883] ? __virt_addr_valid+0x1db/0x2d0 [ 14.676905] ? kasan_atomics_helper+0x1d7a/0x5450 [ 14.676933] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.676956] ? kasan_atomics_helper+0x1d7a/0x5450 [ 14.676980] kasan_report+0x141/0x180 [ 14.677004] ? kasan_atomics_helper+0x1d7a/0x5450 [ 14.677032] kasan_check_range+0x10c/0x1c0 [ 14.677053] __kasan_check_write+0x18/0x20 [ 14.677074] kasan_atomics_helper+0x1d7a/0x5450 [ 14.677098] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.677122] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.677144] ? kasan_atomics+0x152/0x310 [ 14.677168] kasan_atomics+0x1dc/0x310 [ 14.677188] ? __pfx_kasan_atomics+0x10/0x10 [ 14.677210] ? __pfx_read_tsc+0x10/0x10 [ 14.677242] ? ktime_get_ts64+0x86/0x230 [ 14.677267] kunit_try_run_case+0x1a5/0x480 [ 14.677289] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.677308] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.677329] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.677365] ? __kthread_parkme+0x82/0x180 [ 14.677386] ? preempt_count_sub+0x50/0x80 [ 14.677412] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.677433] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.677456] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.677480] kthread+0x337/0x6f0 [ 14.677498] ? trace_preempt_on+0x20/0xc0 [ 14.677522] ? __pfx_kthread+0x10/0x10 [ 14.677541] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.677564] ? calculate_sigpending+0x7b/0xa0 [ 14.677585] ? __pfx_kthread+0x10/0x10 [ 14.677605] ret_from_fork+0x41/0x80 [ 14.677626] ? __pfx_kthread+0x10/0x10 [ 14.677645] ret_from_fork_asm+0x1a/0x30 [ 14.677677] </TASK> [ 14.677688] [ 14.685176] Allocated by task 285: [ 14.685349] kasan_save_stack+0x45/0x70 [ 14.685540] kasan_save_track+0x18/0x40 [ 14.685708] kasan_save_alloc_info+0x3b/0x50 [ 14.685892] __kasan_kmalloc+0xb7/0xc0 [ 14.686043] __kmalloc_cache_noprof+0x189/0x420 [ 14.686196] kasan_atomics+0x95/0x310 [ 14.686937] kunit_try_run_case+0x1a5/0x480 [ 14.688052] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.688461] kthread+0x337/0x6f0 [ 14.688586] ret_from_fork+0x41/0x80 [ 14.688726] ret_from_fork_asm+0x1a/0x30 [ 14.688867] [ 14.688944] The buggy address belongs to the object at ffff888103d00c80 [ 14.688944] which belongs to the cache kmalloc-64 of size 64 [ 14.689934] The buggy address is located 0 bytes to the right of [ 14.689934] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.691077] [ 14.691245] The buggy address belongs to the physical page: [ 14.691853] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.692547] flags: 0x200000000000000(node=0|zone=2) [ 14.692943] page_type: f5(slab) [ 14.693066] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.693310] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.693538] page dumped because: kasan: bad access detected [ 14.693826] [ 14.693980] Memory state around the buggy address: [ 14.694410] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.694990] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.695698] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.696309] ^ [ 14.696824] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.697469] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.698163] ================================================================== [ 13.971981] ================================================================== [ 13.972344] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 13.972687] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 13.973023] [ 13.973129] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 13.973171] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.973182] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.973203] Call Trace: [ 13.973220] <TASK> [ 13.973249] dump_stack_lvl+0x73/0xb0 [ 13.973273] print_report+0xd1/0x610 [ 13.973296] ? __virt_addr_valid+0x1db/0x2d0 [ 13.973318] ? kasan_atomics_helper+0xac7/0x5450 [ 13.973340] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.973365] ? kasan_atomics_helper+0xac7/0x5450 [ 13.973387] kasan_report+0x141/0x180 [ 13.973411] ? kasan_atomics_helper+0xac7/0x5450 [ 13.973438] kasan_check_range+0x10c/0x1c0 [ 13.973459] __kasan_check_write+0x18/0x20 [ 13.973479] kasan_atomics_helper+0xac7/0x5450 [ 13.973502] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.973527] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.973549] ? kasan_atomics+0x152/0x310 [ 13.973573] kasan_atomics+0x1dc/0x310 [ 13.973592] ? __pfx_kasan_atomics+0x10/0x10 [ 13.973614] ? __pfx_read_tsc+0x10/0x10 [ 13.973634] ? ktime_get_ts64+0x86/0x230 [ 13.973659] kunit_try_run_case+0x1a5/0x480 [ 13.973681] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.973700] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.973721] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.973746] ? __kthread_parkme+0x82/0x180 [ 13.973768] ? preempt_count_sub+0x50/0x80 [ 13.973794] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.973815] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.973839] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.973864] kthread+0x337/0x6f0 [ 13.973882] ? trace_preempt_on+0x20/0xc0 [ 13.973906] ? __pfx_kthread+0x10/0x10 [ 13.973925] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.973950] ? calculate_sigpending+0x7b/0xa0 [ 13.973975] ? __pfx_kthread+0x10/0x10 [ 13.973995] ret_from_fork+0x41/0x80 [ 13.974017] ? __pfx_kthread+0x10/0x10 [ 13.974036] ret_from_fork_asm+0x1a/0x30 [ 13.974067] </TASK> [ 13.974078] [ 13.981374] Allocated by task 285: [ 13.981538] kasan_save_stack+0x45/0x70 [ 13.981752] kasan_save_track+0x18/0x40 [ 13.981946] kasan_save_alloc_info+0x3b/0x50 [ 13.982160] __kasan_kmalloc+0xb7/0xc0 [ 13.982360] __kmalloc_cache_noprof+0x189/0x420 [ 13.982580] kasan_atomics+0x95/0x310 [ 13.982766] kunit_try_run_case+0x1a5/0x480 [ 13.982979] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.983238] kthread+0x337/0x6f0 [ 13.983448] ret_from_fork+0x41/0x80 [ 13.983642] ret_from_fork_asm+0x1a/0x30 [ 13.983817] [ 13.983902] The buggy address belongs to the object at ffff888103d00c80 [ 13.983902] which belongs to the cache kmalloc-64 of size 64 [ 13.984328] The buggy address is located 0 bytes to the right of [ 13.984328] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 13.984865] [ 13.984953] The buggy address belongs to the physical page: [ 13.985171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 13.985639] flags: 0x200000000000000(node=0|zone=2) [ 13.985853] page_type: f5(slab) [ 13.985983] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.986312] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.986758] page dumped because: kasan: bad access detected [ 13.986966] [ 13.987052] Memory state around the buggy address: [ 13.987255] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.987471] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.987686] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.987899] ^ [ 13.988053] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.988296] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.988939] ================================================================== [ 14.775495] ================================================================== [ 14.775869] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 14.776207] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.776475] [ 14.776561] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.776603] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.776616] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.776637] Call Trace: [ 14.776654] <TASK> [ 14.776669] dump_stack_lvl+0x73/0xb0 [ 14.776693] print_report+0xd1/0x610 [ 14.776715] ? __virt_addr_valid+0x1db/0x2d0 [ 14.776736] ? kasan_atomics_helper+0x2006/0x5450 [ 14.776758] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.776781] ? kasan_atomics_helper+0x2006/0x5450 [ 14.776804] kasan_report+0x141/0x180 [ 14.776827] ? kasan_atomics_helper+0x2006/0x5450 [ 14.776854] kasan_check_range+0x10c/0x1c0 [ 14.776875] __kasan_check_write+0x18/0x20 [ 14.776896] kasan_atomics_helper+0x2006/0x5450 [ 14.776924] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.776947] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.776969] ? kasan_atomics+0x152/0x310 [ 14.776992] kasan_atomics+0x1dc/0x310 [ 14.777012] ? __pfx_kasan_atomics+0x10/0x10 [ 14.777034] ? __pfx_read_tsc+0x10/0x10 [ 14.777054] ? ktime_get_ts64+0x86/0x230 [ 14.777079] kunit_try_run_case+0x1a5/0x480 [ 14.777100] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.777120] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.777140] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.777165] ? __kthread_parkme+0x82/0x180 [ 14.777187] ? preempt_count_sub+0x50/0x80 [ 14.777212] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.777294] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.777320] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.777362] kthread+0x337/0x6f0 [ 14.777380] ? trace_preempt_on+0x20/0xc0 [ 14.777405] ? __pfx_kthread+0x10/0x10 [ 14.777424] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.777447] ? calculate_sigpending+0x7b/0xa0 [ 14.777470] ? __pfx_kthread+0x10/0x10 [ 14.777489] ret_from_fork+0x41/0x80 [ 14.777511] ? __pfx_kthread+0x10/0x10 [ 14.777529] ret_from_fork_asm+0x1a/0x30 [ 14.777561] </TASK> [ 14.777572] [ 14.788744] Allocated by task 285: [ 14.788930] kasan_save_stack+0x45/0x70 [ 14.789135] kasan_save_track+0x18/0x40 [ 14.789546] kasan_save_alloc_info+0x3b/0x50 [ 14.789846] __kasan_kmalloc+0xb7/0xc0 [ 14.790130] __kmalloc_cache_noprof+0x189/0x420 [ 14.790524] kasan_atomics+0x95/0x310 [ 14.790727] kunit_try_run_case+0x1a5/0x480 [ 14.791046] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.791329] kthread+0x337/0x6f0 [ 14.791665] ret_from_fork+0x41/0x80 [ 14.791942] ret_from_fork_asm+0x1a/0x30 [ 14.792112] [ 14.792212] The buggy address belongs to the object at ffff888103d00c80 [ 14.792212] which belongs to the cache kmalloc-64 of size 64 [ 14.792888] The buggy address is located 0 bytes to the right of [ 14.792888] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.793441] [ 14.793543] The buggy address belongs to the physical page: [ 14.793765] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.794130] flags: 0x200000000000000(node=0|zone=2) [ 14.794387] page_type: f5(slab) [ 14.794555] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.794885] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.795219] page dumped because: kasan: bad access detected [ 14.795455] [ 14.795550] Memory state around the buggy address: [ 14.795784] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.796096] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.796461] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.796742] ^ [ 14.796957] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.797281] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.797595] ================================================================== [ 14.852130] ================================================================== [ 14.852494] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 14.852830] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.853131] [ 14.853217] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.853269] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.853280] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.853301] Call Trace: [ 14.853406] <TASK> [ 14.853421] dump_stack_lvl+0x73/0xb0 [ 14.853448] print_report+0xd1/0x610 [ 14.853471] ? __virt_addr_valid+0x1db/0x2d0 [ 14.853493] ? kasan_atomics_helper+0x218a/0x5450 [ 14.853514] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.853537] ? kasan_atomics_helper+0x218a/0x5450 [ 14.853560] kasan_report+0x141/0x180 [ 14.853583] ? kasan_atomics_helper+0x218a/0x5450 [ 14.853610] kasan_check_range+0x10c/0x1c0 [ 14.853632] __kasan_check_write+0x18/0x20 [ 14.853652] kasan_atomics_helper+0x218a/0x5450 [ 14.853676] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.853699] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.853721] ? kasan_atomics+0x152/0x310 [ 14.853745] kasan_atomics+0x1dc/0x310 [ 14.853764] ? __pfx_kasan_atomics+0x10/0x10 [ 14.853786] ? __pfx_read_tsc+0x10/0x10 [ 14.853806] ? ktime_get_ts64+0x86/0x230 [ 14.853831] kunit_try_run_case+0x1a5/0x480 [ 14.853852] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.853872] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.853892] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.853917] ? __kthread_parkme+0x82/0x180 [ 14.853939] ? preempt_count_sub+0x50/0x80 [ 14.853964] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.853985] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.854009] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.854032] kthread+0x337/0x6f0 [ 14.854050] ? trace_preempt_on+0x20/0xc0 [ 14.854073] ? __pfx_kthread+0x10/0x10 [ 14.854092] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.854115] ? calculate_sigpending+0x7b/0xa0 [ 14.854137] ? __pfx_kthread+0x10/0x10 [ 14.854155] ret_from_fork+0x41/0x80 [ 14.854177] ? __pfx_kthread+0x10/0x10 [ 14.854195] ret_from_fork_asm+0x1a/0x30 [ 14.854238] </TASK> [ 14.854250] [ 14.861436] Allocated by task 285: [ 14.861592] kasan_save_stack+0x45/0x70 [ 14.861763] kasan_save_track+0x18/0x40 [ 14.861936] kasan_save_alloc_info+0x3b/0x50 [ 14.862120] __kasan_kmalloc+0xb7/0xc0 [ 14.862297] __kmalloc_cache_noprof+0x189/0x420 [ 14.862519] kasan_atomics+0x95/0x310 [ 14.862667] kunit_try_run_case+0x1a5/0x480 [ 14.862866] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.863080] kthread+0x337/0x6f0 [ 14.863242] ret_from_fork+0x41/0x80 [ 14.863426] ret_from_fork_asm+0x1a/0x30 [ 14.863598] [ 14.863691] The buggy address belongs to the object at ffff888103d00c80 [ 14.863691] which belongs to the cache kmalloc-64 of size 64 [ 14.864150] The buggy address is located 0 bytes to the right of [ 14.864150] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.864550] [ 14.864622] The buggy address belongs to the physical page: [ 14.864794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.865038] flags: 0x200000000000000(node=0|zone=2) [ 14.865199] page_type: f5(slab) [ 14.865400] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.865739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.866072] page dumped because: kasan: bad access detected [ 14.866334] [ 14.866445] Memory state around the buggy address: [ 14.866664] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.866979] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.867285] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.867575] ^ [ 14.867777] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.867993] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.868206] ================================================================== [ 14.557039] ================================================================== [ 14.557419] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 14.558154] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.558532] [ 14.558637] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.558680] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.558694] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.558716] Call Trace: [ 14.558734] <TASK> [ 14.558750] dump_stack_lvl+0x73/0xb0 [ 14.558774] print_report+0xd1/0x610 [ 14.558808] ? __virt_addr_valid+0x1db/0x2d0 [ 14.558830] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.558852] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.558887] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.558911] kasan_report+0x141/0x180 [ 14.558934] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.558962] kasan_check_range+0x10c/0x1c0 [ 14.558983] __kasan_check_write+0x18/0x20 [ 14.559012] kasan_atomics_helper+0x19e3/0x5450 [ 14.559035] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.559059] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.559092] ? kasan_atomics+0x152/0x310 [ 14.559117] kasan_atomics+0x1dc/0x310 [ 14.559138] ? __pfx_kasan_atomics+0x10/0x10 [ 14.559160] ? __pfx_read_tsc+0x10/0x10 [ 14.559187] ? ktime_get_ts64+0x86/0x230 [ 14.559212] kunit_try_run_case+0x1a5/0x480 [ 14.559249] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.559269] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.559290] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.559315] ? __kthread_parkme+0x82/0x180 [ 14.559337] ? preempt_count_sub+0x50/0x80 [ 14.559376] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.559406] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.559430] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.559454] kthread+0x337/0x6f0 [ 14.559481] ? trace_preempt_on+0x20/0xc0 [ 14.559505] ? __pfx_kthread+0x10/0x10 [ 14.559523] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.559546] ? calculate_sigpending+0x7b/0xa0 [ 14.559576] ? __pfx_kthread+0x10/0x10 [ 14.559596] ret_from_fork+0x41/0x80 [ 14.559617] ? __pfx_kthread+0x10/0x10 [ 14.559636] ret_from_fork_asm+0x1a/0x30 [ 14.559678] </TASK> [ 14.559688] [ 14.567306] Allocated by task 285: [ 14.567536] kasan_save_stack+0x45/0x70 [ 14.567723] kasan_save_track+0x18/0x40 [ 14.567863] kasan_save_alloc_info+0x3b/0x50 [ 14.568095] __kasan_kmalloc+0xb7/0xc0 [ 14.568277] __kmalloc_cache_noprof+0x189/0x420 [ 14.568581] kasan_atomics+0x95/0x310 [ 14.568794] kunit_try_run_case+0x1a5/0x480 [ 14.568962] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.569140] kthread+0x337/0x6f0 [ 14.569270] ret_from_fork+0x41/0x80 [ 14.569495] ret_from_fork_asm+0x1a/0x30 [ 14.569716] [ 14.569809] The buggy address belongs to the object at ffff888103d00c80 [ 14.569809] which belongs to the cache kmalloc-64 of size 64 [ 14.570339] The buggy address is located 0 bytes to the right of [ 14.570339] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.570735] [ 14.570829] The buggy address belongs to the physical page: [ 14.571100] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.571459] flags: 0x200000000000000(node=0|zone=2) [ 14.571695] page_type: f5(slab) [ 14.571854] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.572151] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.572441] page dumped because: kasan: bad access detected [ 14.572712] [ 14.572804] Memory state around the buggy address: [ 14.573030] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.573274] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.573745] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.574009] ^ [ 14.574166] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.574504] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.574891] ================================================================== [ 14.042121] ================================================================== [ 14.042532] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 14.042907] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.043385] [ 14.043522] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.043566] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.043578] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.043599] Call Trace: [ 14.043613] <TASK> [ 14.043627] dump_stack_lvl+0x73/0xb0 [ 14.043652] print_report+0xd1/0x610 [ 14.043675] ? __virt_addr_valid+0x1db/0x2d0 [ 14.043697] ? kasan_atomics_helper+0xd47/0x5450 [ 14.043719] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.043743] ? kasan_atomics_helper+0xd47/0x5450 [ 14.043766] kasan_report+0x141/0x180 [ 14.043789] ? kasan_atomics_helper+0xd47/0x5450 [ 14.043817] kasan_check_range+0x10c/0x1c0 [ 14.043838] __kasan_check_write+0x18/0x20 [ 14.043858] kasan_atomics_helper+0xd47/0x5450 [ 14.043882] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.043905] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.043927] ? kasan_atomics+0x152/0x310 [ 14.043951] kasan_atomics+0x1dc/0x310 [ 14.043971] ? __pfx_kasan_atomics+0x10/0x10 [ 14.043993] ? __pfx_read_tsc+0x10/0x10 [ 14.044013] ? ktime_get_ts64+0x86/0x230 [ 14.044039] kunit_try_run_case+0x1a5/0x480 [ 14.044060] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.044080] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.044101] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.044126] ? __kthread_parkme+0x82/0x180 [ 14.044148] ? preempt_count_sub+0x50/0x80 [ 14.044174] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.044196] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.044220] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.044255] kthread+0x337/0x6f0 [ 14.044273] ? trace_preempt_on+0x20/0xc0 [ 14.044296] ? __pfx_kthread+0x10/0x10 [ 14.044314] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.044338] ? calculate_sigpending+0x7b/0xa0 [ 14.044370] ? __pfx_kthread+0x10/0x10 [ 14.044389] ret_from_fork+0x41/0x80 [ 14.044410] ? __pfx_kthread+0x10/0x10 [ 14.044428] ret_from_fork_asm+0x1a/0x30 [ 14.044460] </TASK> [ 14.044471] [ 14.051853] Allocated by task 285: [ 14.052025] kasan_save_stack+0x45/0x70 [ 14.052201] kasan_save_track+0x18/0x40 [ 14.052373] kasan_save_alloc_info+0x3b/0x50 [ 14.052521] __kasan_kmalloc+0xb7/0xc0 [ 14.052654] __kmalloc_cache_noprof+0x189/0x420 [ 14.052882] kasan_atomics+0x95/0x310 [ 14.053068] kunit_try_run_case+0x1a5/0x480 [ 14.053283] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.053634] kthread+0x337/0x6f0 [ 14.053783] ret_from_fork+0x41/0x80 [ 14.053939] ret_from_fork_asm+0x1a/0x30 [ 14.054102] [ 14.054196] The buggy address belongs to the object at ffff888103d00c80 [ 14.054196] which belongs to the cache kmalloc-64 of size 64 [ 14.054665] The buggy address is located 0 bytes to the right of [ 14.054665] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.055106] [ 14.055178] The buggy address belongs to the physical page: [ 14.055363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.055626] flags: 0x200000000000000(node=0|zone=2) [ 14.055864] page_type: f5(slab) [ 14.056029] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.056534] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.056761] page dumped because: kasan: bad access detected [ 14.056937] [ 14.057006] Memory state around the buggy address: [ 14.057232] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.057780] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.058112] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.058418] ^ [ 14.058642] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.058905] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.059175] ================================================================== [ 13.907536] ================================================================== [ 13.907947] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 13.908433] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 13.908825] [ 13.908930] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 13.909219] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.909246] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.909269] Call Trace: [ 13.909291] <TASK> [ 13.909311] dump_stack_lvl+0x73/0xb0 [ 13.909339] print_report+0xd1/0x610 [ 13.909375] ? __virt_addr_valid+0x1db/0x2d0 [ 13.909399] ? kasan_atomics_helper+0x8f9/0x5450 [ 13.909421] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.909445] ? kasan_atomics_helper+0x8f9/0x5450 [ 13.909468] kasan_report+0x141/0x180 [ 13.909493] ? kasan_atomics_helper+0x8f9/0x5450 [ 13.909523] kasan_check_range+0x10c/0x1c0 [ 13.909546] __kasan_check_write+0x18/0x20 [ 13.909566] kasan_atomics_helper+0x8f9/0x5450 [ 13.909590] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.909614] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.909637] ? kasan_atomics+0x152/0x310 [ 13.909661] kasan_atomics+0x1dc/0x310 [ 13.909681] ? __pfx_kasan_atomics+0x10/0x10 [ 13.909703] ? __pfx_read_tsc+0x10/0x10 [ 13.909725] ? ktime_get_ts64+0x86/0x230 [ 13.909753] kunit_try_run_case+0x1a5/0x480 [ 13.909775] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.909794] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.909816] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.909841] ? __kthread_parkme+0x82/0x180 [ 13.909864] ? preempt_count_sub+0x50/0x80 [ 13.909890] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.909911] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.909935] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.909960] kthread+0x337/0x6f0 [ 13.909977] ? trace_preempt_on+0x20/0xc0 [ 13.910001] ? __pfx_kthread+0x10/0x10 [ 13.910020] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.910042] ? calculate_sigpending+0x7b/0xa0 [ 13.910064] ? __pfx_kthread+0x10/0x10 [ 13.910084] ret_from_fork+0x41/0x80 [ 13.910105] ? __pfx_kthread+0x10/0x10 [ 13.910123] ret_from_fork_asm+0x1a/0x30 [ 13.910155] </TASK> [ 13.910167] [ 13.920727] Allocated by task 285: [ 13.920927] kasan_save_stack+0x45/0x70 [ 13.921128] kasan_save_track+0x18/0x40 [ 13.921323] kasan_save_alloc_info+0x3b/0x50 [ 13.921832] __kasan_kmalloc+0xb7/0xc0 [ 13.922136] __kmalloc_cache_noprof+0x189/0x420 [ 13.922367] kasan_atomics+0x95/0x310 [ 13.922613] kunit_try_run_case+0x1a5/0x480 [ 13.922968] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.923289] kthread+0x337/0x6f0 [ 13.923469] ret_from_fork+0x41/0x80 [ 13.923792] ret_from_fork_asm+0x1a/0x30 [ 13.924087] [ 13.924189] The buggy address belongs to the object at ffff888103d00c80 [ 13.924189] which belongs to the cache kmalloc-64 of size 64 [ 13.924893] The buggy address is located 0 bytes to the right of [ 13.924893] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 13.925598] [ 13.925698] The buggy address belongs to the physical page: [ 13.925887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 13.926259] flags: 0x200000000000000(node=0|zone=2) [ 13.926578] page_type: f5(slab) [ 13.926724] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.927053] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.927740] page dumped because: kasan: bad access detected [ 13.927926] [ 13.928192] Memory state around the buggy address: [ 13.928467] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.928834] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.929215] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.929684] ^ [ 13.929933] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.930239] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.930700] ================================================================== [ 14.182670] ================================================================== [ 14.183007] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 14.183327] Read of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.184063] [ 14.184178] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.184249] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.184262] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.184284] Call Trace: [ 14.184302] <TASK> [ 14.184317] dump_stack_lvl+0x73/0xb0 [ 14.184363] print_report+0xd1/0x610 [ 14.184386] ? __virt_addr_valid+0x1db/0x2d0 [ 14.184417] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.184439] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.184462] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.184496] kasan_report+0x141/0x180 [ 14.184519] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.184546] __asan_report_load4_noabort+0x18/0x20 [ 14.184568] kasan_atomics_helper+0x4a1c/0x5450 [ 14.184592] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.184615] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.184636] ? kasan_atomics+0x152/0x310 [ 14.184660] kasan_atomics+0x1dc/0x310 [ 14.184680] ? __pfx_kasan_atomics+0x10/0x10 [ 14.184701] ? __pfx_read_tsc+0x10/0x10 [ 14.184722] ? ktime_get_ts64+0x86/0x230 [ 14.184747] kunit_try_run_case+0x1a5/0x480 [ 14.184769] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.184788] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.184809] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.184834] ? __kthread_parkme+0x82/0x180 [ 14.184856] ? preempt_count_sub+0x50/0x80 [ 14.184884] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.184906] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.184934] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.184958] kthread+0x337/0x6f0 [ 14.184975] ? trace_preempt_on+0x20/0xc0 [ 14.185000] ? __pfx_kthread+0x10/0x10 [ 14.185087] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.185111] ? calculate_sigpending+0x7b/0xa0 [ 14.185133] ? __pfx_kthread+0x10/0x10 [ 14.185153] ret_from_fork+0x41/0x80 [ 14.185175] ? __pfx_kthread+0x10/0x10 [ 14.185193] ret_from_fork_asm+0x1a/0x30 [ 14.185235] </TASK> [ 14.185247] [ 14.192658] Allocated by task 285: [ 14.192791] kasan_save_stack+0x45/0x70 [ 14.192938] kasan_save_track+0x18/0x40 [ 14.193074] kasan_save_alloc_info+0x3b/0x50 [ 14.193220] __kasan_kmalloc+0xb7/0xc0 [ 14.193460] __kmalloc_cache_noprof+0x189/0x420 [ 14.193679] kasan_atomics+0x95/0x310 [ 14.193860] kunit_try_run_case+0x1a5/0x480 [ 14.194064] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.194319] kthread+0x337/0x6f0 [ 14.194498] ret_from_fork+0x41/0x80 [ 14.194679] ret_from_fork_asm+0x1a/0x30 [ 14.194874] [ 14.194966] The buggy address belongs to the object at ffff888103d00c80 [ 14.194966] which belongs to the cache kmalloc-64 of size 64 [ 14.195503] The buggy address is located 0 bytes to the right of [ 14.195503] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.195870] [ 14.195942] The buggy address belongs to the physical page: [ 14.196117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.196537] flags: 0x200000000000000(node=0|zone=2) [ 14.196773] page_type: f5(slab) [ 14.196949] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.197315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.197691] page dumped because: kasan: bad access detected [ 14.197904] [ 14.198016] Memory state around the buggy address: [ 14.198196] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.198468] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.198792] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.199117] ^ [ 14.199319] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.199602] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.199815] ================================================================== [ 14.287250] ================================================================== [ 14.288411] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 14.289115] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.289918] [ 14.290112] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.290171] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.290185] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.290219] Call Trace: [ 14.290248] <TASK> [ 14.290265] dump_stack_lvl+0x73/0xb0 [ 14.290304] print_report+0xd1/0x610 [ 14.290327] ? __virt_addr_valid+0x1db/0x2d0 [ 14.290369] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.290392] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.290416] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.290439] kasan_report+0x141/0x180 [ 14.290462] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.290499] kasan_check_range+0x10c/0x1c0 [ 14.290520] __kasan_check_write+0x18/0x20 [ 14.290541] kasan_atomics_helper+0x12e6/0x5450 [ 14.290577] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.290600] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.290623] ? kasan_atomics+0x152/0x310 [ 14.290657] kasan_atomics+0x1dc/0x310 [ 14.290677] ? __pfx_kasan_atomics+0x10/0x10 [ 14.290698] ? __pfx_read_tsc+0x10/0x10 [ 14.290719] ? ktime_get_ts64+0x86/0x230 [ 14.290745] kunit_try_run_case+0x1a5/0x480 [ 14.290768] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.290787] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.290809] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.290834] ? __kthread_parkme+0x82/0x180 [ 14.290856] ? preempt_count_sub+0x50/0x80 [ 14.290883] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.290904] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.290928] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.290951] kthread+0x337/0x6f0 [ 14.290968] ? trace_preempt_on+0x20/0xc0 [ 14.290993] ? __pfx_kthread+0x10/0x10 [ 14.291012] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.291034] ? calculate_sigpending+0x7b/0xa0 [ 14.291057] ? __pfx_kthread+0x10/0x10 [ 14.291076] ret_from_fork+0x41/0x80 [ 14.291097] ? __pfx_kthread+0x10/0x10 [ 14.291116] ret_from_fork_asm+0x1a/0x30 [ 14.291148] </TASK> [ 14.291159] [ 14.301810] Allocated by task 285: [ 14.302006] kasan_save_stack+0x45/0x70 [ 14.302198] kasan_save_track+0x18/0x40 [ 14.302432] kasan_save_alloc_info+0x3b/0x50 [ 14.302581] __kasan_kmalloc+0xb7/0xc0 [ 14.302715] __kmalloc_cache_noprof+0x189/0x420 [ 14.302928] kasan_atomics+0x95/0x310 [ 14.303114] kunit_try_run_case+0x1a5/0x480 [ 14.303367] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.303573] kthread+0x337/0x6f0 [ 14.303692] ret_from_fork+0x41/0x80 [ 14.303832] ret_from_fork_asm+0x1a/0x30 [ 14.304029] [ 14.304133] The buggy address belongs to the object at ffff888103d00c80 [ 14.304133] which belongs to the cache kmalloc-64 of size 64 [ 14.304814] The buggy address is located 0 bytes to the right of [ 14.304814] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.305343] [ 14.305445] The buggy address belongs to the physical page: [ 14.305691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.306023] flags: 0x200000000000000(node=0|zone=2) [ 14.306282] page_type: f5(slab) [ 14.306441] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.306796] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.307022] page dumped because: kasan: bad access detected [ 14.307199] [ 14.307379] Memory state around the buggy address: [ 14.307626] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.307941] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.308266] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.308586] ^ [ 14.308741] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.309007] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.309351] ================================================================== [ 14.739173] ================================================================== [ 14.739895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 14.740256] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.740616] [ 14.740726] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.740769] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.740781] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.740802] Call Trace: [ 14.740817] <TASK> [ 14.740832] dump_stack_lvl+0x73/0xb0 [ 14.740857] print_report+0xd1/0x610 [ 14.740879] ? __virt_addr_valid+0x1db/0x2d0 [ 14.740901] ? kasan_atomics_helper+0x1f43/0x5450 [ 14.740928] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.740951] ? kasan_atomics_helper+0x1f43/0x5450 [ 14.740974] kasan_report+0x141/0x180 [ 14.740997] ? kasan_atomics_helper+0x1f43/0x5450 [ 14.741025] kasan_check_range+0x10c/0x1c0 [ 14.741046] __kasan_check_write+0x18/0x20 [ 14.741067] kasan_atomics_helper+0x1f43/0x5450 [ 14.741090] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.741114] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.741136] ? kasan_atomics+0x152/0x310 [ 14.741160] kasan_atomics+0x1dc/0x310 [ 14.741180] ? __pfx_kasan_atomics+0x10/0x10 [ 14.741202] ? __pfx_read_tsc+0x10/0x10 [ 14.741233] ? ktime_get_ts64+0x86/0x230 [ 14.741259] kunit_try_run_case+0x1a5/0x480 [ 14.741281] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.741301] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.741323] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.741368] ? __kthread_parkme+0x82/0x180 [ 14.741390] ? preempt_count_sub+0x50/0x80 [ 14.741416] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.741437] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.741461] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.741485] kthread+0x337/0x6f0 [ 14.741503] ? trace_preempt_on+0x20/0xc0 [ 14.741527] ? __pfx_kthread+0x10/0x10 [ 14.741546] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.741569] ? calculate_sigpending+0x7b/0xa0 [ 14.741591] ? __pfx_kthread+0x10/0x10 [ 14.741609] ret_from_fork+0x41/0x80 [ 14.741631] ? __pfx_kthread+0x10/0x10 [ 14.741649] ret_from_fork_asm+0x1a/0x30 [ 14.741680] </TASK> [ 14.741690] [ 14.748802] Allocated by task 285: [ 14.748985] kasan_save_stack+0x45/0x70 [ 14.749200] kasan_save_track+0x18/0x40 [ 14.749503] kasan_save_alloc_info+0x3b/0x50 [ 14.749681] __kasan_kmalloc+0xb7/0xc0 [ 14.749846] __kmalloc_cache_noprof+0x189/0x420 [ 14.750087] kasan_atomics+0x95/0x310 [ 14.750326] kunit_try_run_case+0x1a5/0x480 [ 14.750590] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.750877] kthread+0x337/0x6f0 [ 14.751051] ret_from_fork+0x41/0x80 [ 14.751241] ret_from_fork_asm+0x1a/0x30 [ 14.751465] [ 14.751558] The buggy address belongs to the object at ffff888103d00c80 [ 14.751558] which belongs to the cache kmalloc-64 of size 64 [ 14.752075] The buggy address is located 0 bytes to the right of [ 14.752075] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.752651] [ 14.752747] The buggy address belongs to the physical page: [ 14.752999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.753371] flags: 0x200000000000000(node=0|zone=2) [ 14.753600] page_type: f5(slab) [ 14.753767] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.754020] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.754382] page dumped because: kasan: bad access detected [ 14.754652] [ 14.754733] Memory state around the buggy address: [ 14.754961] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.755263] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.755583] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.755890] ^ [ 14.756125] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.756444] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.756744] ================================================================== [ 14.401191] ================================================================== [ 14.402068] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 14.402410] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.402714] [ 14.402835] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.402886] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.402899] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.402920] Call Trace: [ 14.402935] <TASK> [ 14.402961] dump_stack_lvl+0x73/0xb0 [ 14.402986] print_report+0xd1/0x610 [ 14.403009] ? __virt_addr_valid+0x1db/0x2d0 [ 14.403042] ? kasan_atomics_helper+0x151d/0x5450 [ 14.403065] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.403088] ? kasan_atomics_helper+0x151d/0x5450 [ 14.403123] kasan_report+0x141/0x180 [ 14.403146] ? kasan_atomics_helper+0x151d/0x5450 [ 14.403174] kasan_check_range+0x10c/0x1c0 [ 14.403205] __kasan_check_write+0x18/0x20 [ 14.403241] kasan_atomics_helper+0x151d/0x5450 [ 14.403264] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.403287] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.403321] ? kasan_atomics+0x152/0x310 [ 14.403345] kasan_atomics+0x1dc/0x310 [ 14.403374] ? __pfx_kasan_atomics+0x10/0x10 [ 14.403415] ? __pfx_read_tsc+0x10/0x10 [ 14.403436] ? ktime_get_ts64+0x86/0x230 [ 14.403462] kunit_try_run_case+0x1a5/0x480 [ 14.403494] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.403514] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.403535] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.403561] ? __kthread_parkme+0x82/0x180 [ 14.403583] ? preempt_count_sub+0x50/0x80 [ 14.403610] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.403630] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.403711] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.403739] kthread+0x337/0x6f0 [ 14.403758] ? trace_preempt_on+0x20/0xc0 [ 14.403782] ? __pfx_kthread+0x10/0x10 [ 14.403801] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.403825] ? calculate_sigpending+0x7b/0xa0 [ 14.403847] ? __pfx_kthread+0x10/0x10 [ 14.403866] ret_from_fork+0x41/0x80 [ 14.403887] ? __pfx_kthread+0x10/0x10 [ 14.403917] ret_from_fork_asm+0x1a/0x30 [ 14.403948] </TASK> [ 14.403958] [ 14.411903] Allocated by task 285: [ 14.412118] kasan_save_stack+0x45/0x70 [ 14.412357] kasan_save_track+0x18/0x40 [ 14.412587] kasan_save_alloc_info+0x3b/0x50 [ 14.412788] __kasan_kmalloc+0xb7/0xc0 [ 14.413027] __kmalloc_cache_noprof+0x189/0x420 [ 14.413283] kasan_atomics+0x95/0x310 [ 14.413543] kunit_try_run_case+0x1a5/0x480 [ 14.413733] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.413904] kthread+0x337/0x6f0 [ 14.414018] ret_from_fork+0x41/0x80 [ 14.414196] ret_from_fork_asm+0x1a/0x30 [ 14.414430] [ 14.414525] The buggy address belongs to the object at ffff888103d00c80 [ 14.414525] which belongs to the cache kmalloc-64 of size 64 [ 14.415078] The buggy address is located 0 bytes to the right of [ 14.415078] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.415671] [ 14.415794] The buggy address belongs to the physical page: [ 14.416011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.416429] flags: 0x200000000000000(node=0|zone=2) [ 14.416589] page_type: f5(slab) [ 14.416704] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.416931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.417150] page dumped because: kasan: bad access detected [ 14.417373] [ 14.417466] Memory state around the buggy address: [ 14.417689] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.418010] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.418384] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.418758] ^ [ 14.419013] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.419365] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.419694] ================================================================== [ 14.060546] ================================================================== [ 14.060798] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 14.061043] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285 [ 14.061714] [ 14.061959] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 14.062004] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.062018] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.062038] Call Trace: [ 14.062055] <TASK> [ 14.062070] dump_stack_lvl+0x73/0xb0 [ 14.062096] print_report+0xd1/0x610 [ 14.062119] ? __virt_addr_valid+0x1db/0x2d0 [ 14.062140] ? kasan_atomics_helper+0xde0/0x5450 [ 14.062162] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.062186] ? kasan_atomics_helper+0xde0/0x5450 [ 14.062208] kasan_report+0x141/0x180 [ 14.062244] ? kasan_atomics_helper+0xde0/0x5450 [ 14.062273] kasan_check_range+0x10c/0x1c0 [ 14.062294] __kasan_check_write+0x18/0x20 [ 14.062314] kasan_atomics_helper+0xde0/0x5450 [ 14.062338] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.062371] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.062393] ? kasan_atomics+0x152/0x310 [ 14.062418] kasan_atomics+0x1dc/0x310 [ 14.062438] ? __pfx_kasan_atomics+0x10/0x10 [ 14.062460] ? __pfx_read_tsc+0x10/0x10 [ 14.062481] ? ktime_get_ts64+0x86/0x230 [ 14.062506] kunit_try_run_case+0x1a5/0x480 [ 14.062528] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.062547] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.062569] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.062594] ? __kthread_parkme+0x82/0x180 [ 14.062616] ? preempt_count_sub+0x50/0x80 [ 14.062642] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.062663] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.062687] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.062712] kthread+0x337/0x6f0 [ 14.062730] ? trace_preempt_on+0x20/0xc0 [ 14.062754] ? __pfx_kthread+0x10/0x10 [ 14.062773] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.062796] ? calculate_sigpending+0x7b/0xa0 [ 14.062817] ? __pfx_kthread+0x10/0x10 [ 14.062837] ret_from_fork+0x41/0x80 [ 14.062858] ? __pfx_kthread+0x10/0x10 [ 14.062876] ret_from_fork_asm+0x1a/0x30 [ 14.062908] </TASK> [ 14.062920] [ 14.070164] Allocated by task 285: [ 14.070306] kasan_save_stack+0x45/0x70 [ 14.070679] kasan_save_track+0x18/0x40 [ 14.070870] kasan_save_alloc_info+0x3b/0x50 [ 14.071076] __kasan_kmalloc+0xb7/0xc0 [ 14.071274] __kmalloc_cache_noprof+0x189/0x420 [ 14.071573] kasan_atomics+0x95/0x310 [ 14.071840] kunit_try_run_case+0x1a5/0x480 [ 14.072032] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.072205] kthread+0x337/0x6f0 [ 14.072331] ret_from_fork+0x41/0x80 [ 14.072462] ret_from_fork_asm+0x1a/0x30 [ 14.072671] [ 14.072765] The buggy address belongs to the object at ffff888103d00c80 [ 14.072765] which belongs to the cache kmalloc-64 of size 64 [ 14.073308] The buggy address is located 0 bytes to the right of [ 14.073308] allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0) [ 14.073904] [ 14.074008] The buggy address belongs to the physical page: [ 14.074268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00 [ 14.074527] flags: 0x200000000000000(node=0|zone=2) [ 14.074691] page_type: f5(slab) [ 14.074812] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.075042] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.075356] page dumped because: kasan: bad access detected [ 14.075604] [ 14.075696] Memory state around the buggy address: [ 14.075914] ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.076237] ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.076805] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.077031] ^ [ 14.077185] ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.077415] ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.077629] ==================================================================