- cgroup (gcc-13-lkftconfig-compat)
memcg_test_3 memcg_test_3
getrusage04 getrusage04
getrusage04 0 TINFO : Expected timers granularity is 4000 us
getrusage04 0 TINFO : Using 1 as multiply factor for max [us]time increment (1000+4000us)!
getrusage04 0 TINFO : utime: 6923us; stime: 43475us
getrusage04 0 TINFO : utime: 6935us; stime: 46943us
getrusage04 0 TINFO : utime: 6948us; stime: 50570us
getrusage04 0 TINFO : utime: 6958us; stime: 54359us
getrusage04 0 TINFO : utime: 9553us; stime: 54447us
getrusage04 0 TINFO : utime: 9559us; stime: 58099us
getrusage04 0 TINFO : utime: 9575us; stime: 61555us
getrusage04 0 TINFO : utime: 9581us; stime: 65217us
getrusage04 0 TINFO : utime: 13285us; stime: 65323us
getrusage04 0 TINFO : utime: 16905us; stime: 65324us
getrusage04 0 TINFO : utime: 20488us; stime: 65360us
getrusage04 0 TINFO : utime: 20881us; stime: 70438us
getrusage04 1 TFAIL : getrusage04.c:133: stime increased > 5000us:
getrusage04 getrusage04
getrusage04 0 TINFO : Expected timers granularity is 4000 us
getrusage04 0 TINFO : Using 1 as multiply factor for max [us]time increment (1000+4000us)!
getrusage04 0 TINFO : utime: 18545us; stime: 9573us
getrusage04 0 TINFO : utime: 23793us; stime: 9806us
getrusage04 1 TFAIL : getrusage04.c:126: utime increased > 5000us:
cgroup_test_kmem_test_kmem_dead_cgroups fail
epoll_wait04 epoll_wait04
epoll_wait04.c:37: TFAIL: epoll_wait() waited for 3017us with a timeout equal to zero
cgroup_test_cpu_test_cpucg_subtree_control pass
cgroup_test_cpu_test_cpucg_stats pass
cgroup_test_cpu_test_cpucg_nice pass
cgroup_test_cpu_test_cpucg_weight_overprovisioned pass
cgroup_test_cpu_test_cpucg_weight_underprovisioned skip
cgroup_test_cpu_test_cpucg_nested_weight_overprovisioned fail
cgroup_test_cpu_test_cpucg_nested_weight_underprovisioned skip
cgroup_test_cpu_test_cpucg_max pass
cgroup_test_cpu_test_cpucg_max_nested pass
cgroup_test_cpu fail
cgroup_test_cpuset skip
cgroup_test_cpuset_prs_sh skip
cgroup_test_cpuset_v1_hp_sh skip
cgroup_test_cpu_test_cpucg_nested_weight_overprovisioned fail
fs_fill fs_fill
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 30331ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file2
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 38399ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 29037ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 15957ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file4
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file4
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file4
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file4
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 20071ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 10165ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file4
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file5
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file5
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file5
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 13394ms
utime01 utime01
utime01.c:41: TPASS: stat_buf.st_atime == utbuf.actime (1737981862)
utime01.c:42: TPASS: stat_buf.st_mtime == utbuf.modtime (1737981861)
utime01.c:45: TPASS: utime(mntpoint/tmp_file, NULL) passed
utime01.c:41: TPASS: stat_buf.st_atime == utbuf.actime (1737981864)
utime01.c:42: TPASS: stat_buf.st_mtime == utbuf.modtime (1737981863)
utime01.c:45: TPASS: utime(mntpoint/tmp_file, NULL) passed
utime01.c:41: TPASS: stat_buf.st_atime == utbuf.actime (1737981865)
utime01.c:42: TPASS: stat_buf.st_mtime == utbuf.modtime (1737981864)
utime01.c:45: TPASS: utime(mntpoint/tmp_file, NULL) passed
utime01.c:41: TPASS: stat_buf.st_atime == utbuf.actime (1737981865)
utime01.c:42: TPASS: stat_buf.st_mtime == utbuf.modtime (1737981864)
utime01.c:45: TPASS: utime(mntpoint/tmp_file, NULL) passed
utime01.c:52: TFAIL: utime() did not set expected mtime, pre_time: 1737981869, post_time: 0, st_mtime: 1737981869
utime01.c:57: TFAIL: utime() did not set expected atime, pre_time: 1737981869, post_time: 0, st_atime: 1737981869
epoll_wait04 epoll_wait04
epoll_wait04.c:37: TFAIL: epoll_wait() waited for 2013us with a timeout equal to zero
memcg_test_3 memcg_test_3
fs_fill fs_fill
fs_fill.c:115: TINFO: Running 8 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread7/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread8/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread6/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread5/AOF
fs_fill.c:93: TPASS: Got 8 ENOSPC runtime 1035ms
fs_fill.c:115: TINFO: Running 8 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread7/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread5/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread8/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread6/AOF
fs_fill.c:93: TPASS: Got 8 ENOSPC runtime 1133ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file1
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread5/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread8/file1
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread6/file5
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread7/file5
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file5
fs_fill.c:93: TPASS: Got 8 ENOSPC runtime 1555ms
fs_fill.c:115: TINFO: Running 8 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread6/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread5/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread8/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread7/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread6/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread8/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread7/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread5/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:93: TPASS: Got 16 ENOSPC runtime 1000ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread7/file1
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread8/file1
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file4
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread6/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread5/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file1
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread5/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread8/file1
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file4
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file3
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file4
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread7/file4
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread6/file2
fs_fill.c:93: TPASS: Got 14 ENOSPC runtime 1000ms
fs_fill.c:115: TINFO: Running 8 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread8/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread6/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread5/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread7/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:93: TPASS: Got 8 ENOSPC runtime 4918ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread6/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread7/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread5/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread8/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file0
fs_fill.c:93: TPASS: Got 8 ENOSPC runtime 77656ms
cgroup_test_cpu_test_cpucg_weight_overprovisioned fail
cgroup_test_kmem_test_kmem_dead_cgroups fail
cgroup_test_kmem_test_kmem_dead_cgroups fail
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arc CROSS_COMPILE=arc-elf32- 'CC=sccache arc-elf32-gcc' 'HOSTCC=sccache gcc'
In file included from <command-line>:
In function 'nfsd4_get_drc_mem',
inlined from 'check_forechannel_attrs' at /builds/linux/fs/nfsd/nfs4state.c:3791:16,
inlined from 'nfsd4_create_session' at /builds/linux/fs/nfsd/nfs4state.c:3864:11:
/builds/linux/include/linux/compiler_types.h:542:38: error: call to '__compiletime_assert_945' declared with attribute error: clamp() low limit slotsize greater than high limit total_avail/scale_factor
542 | _compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
| ^
/builds/linux/include/linux/compiler_types.h:523:4: note: in definition of macro '__compiletime_assert'
523 | prefix ## suffix(); \
| ^~~~~~
/builds/linux/include/linux/compiler_types.h:542:2: note: in expansion of macro '_compiletime_assert'
542 | _compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
| ^~~~~~~~~~~~~~~~~~~
/builds/linux/include/linux/build_bug.h:39:37: note: in expansion of macro 'compiletime_assert'
39 | #define BUILD_BUG_ON_MSG(cond, msg) compiletime_assert(!(cond), msg)
| ^~~~~~~~~~~~~~~~~~
/builds/linux/include/linux/minmax.h:188:2: note: in expansion of macro 'BUILD_BUG_ON_MSG'
188 | BUILD_BUG_ON_MSG(statically_true(ulo > uhi), \
| ^~~~~~~~~~~~~~~~
/builds/linux/include/linux/minmax.h:195:2: note: in expansion of macro '__clamp_once'
195 | __clamp_once(type, val, lo, hi, __UNIQUE_ID(v_), __UNIQUE_ID(l_), __UNIQUE_ID(h_))
| ^~~~~~~~~~~~
/builds/linux/include/linux/minmax.h:218:36: note: in expansion of macro '__careful_clamp'
218 | #define clamp_t(type, val, lo, hi) __careful_clamp(type, val, lo, hi)
| ^~~~~~~~~~~~~~~
/builds/linux/fs/nfsd/nfs4state.c:1972:10: note: in expansion of macro 'clamp_t'
1972 | avail = clamp_t(unsigned long, avail, slotsize,
| ^~~~~~~
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=arm CROSS_COMPILE=arm-linux-gnueabihf- 'HOSTCC=sccache clang' 'CC=sccache clang' LLVM=1 LLVM_IAS=1 kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/mm'
uffd-wp-mremap.c:144:12: warning: format specifies type 'unsigned long' but the argument has type 'size_t' (aka 'unsigned int') [-Wformat]
142 | ksft_test_result_fail("uffd-wp not %s for pte %lu!\n",
| ~~~
| %zu
143 | expect ? "set" : "clear",
144 | (addr - mem) / pagesize);
| ^~~~~~~~~~~~~~~~~~~~~~~
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=arm CROSS_COMPILE=arm-linux-gnueabihf- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1 kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/mm'
uffd-wp-mremap.c:144:12: warning: format specifies type 'unsigned long' but the argument has type 'size_t' (aka 'unsigned int') [-Wformat]
142 | ksft_test_result_fail("uffd-wp not %s for pte %lu!\n",
| ~~~
| %zu
143 | expect ? "set" : "clear",
144 | (addr - mem) / pagesize);
| ^~~~~~~~~~~~~~~~~~~~~~~
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=arm CROSS_COMPILE=arm-linux-gnueabihf- 'CC=sccache arm-linux-gnueabihf-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/mm'
cow.c: In function 'do_test_vmsplice_in_parent':
cow.c:365:61: warning: 'transferred' may be used uninitialized [-Wmaybe-uninitialized]
365 | cur = read(fds[0], new + total, transferred - total);
| ~~~~~~~~~~~~^~~~~~~
cow.c:296:29: note: 'transferred' was declared here
296 | ssize_t cur, total, transferred;
| ^~~~~~~~~~~
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=arm CROSS_COMPILE=arm-linux-gnueabihf- 'CC=sccache arm-linux-gnueabihf-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/mm'
In file included from migration.c:7:
uffd-wp-mremap.c: In function 'check_uffd_wp_state':
uffd-wp-mremap.c:142:73: warning: format '%lu' expects argument of type 'long unsigned int', but argument 3 has type 'size_t' {aka 'unsigned int'} [-Wformat=]
142 | ksft_test_result_fail("uffd-wp not %s for pte %lu!\n",
| ~~^
| |
| long unsigned int
| %u
143 | expect ? "set" : "clear",
144 | (addr - mem) / pagesize);
| ~~~~~~~~~~~~~~~~~~~~~~~
| |
| size_t {aka unsigned int}
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=arm CROSS_COMPILE=arm-linux-gnueabihf- 'CC=sccache arm-linux-gnueabihf-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/mm'
cow.c: In function 'do_test_vmsplice_in_parent':
cow.c:365:61: warning: 'transferred' may be used uninitialized [-Wmaybe-uninitialized]
365 | cur = read(fds[0], new + total, transferred - total);
| ~~~~~~~~~~~~^~~~~~~
cow.c:296:29: note: 'transferred' was declared here
296 | ssize_t cur, total, transferred;
| ^~~~~~~~~~~
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=arm CROSS_COMPILE=arm-linux-gnueabihf- 'CC=sccache arm-linux-gnueabihf-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/mm'
In file included from migration.c:7:
uffd-wp-mremap.c: In function 'check_uffd_wp_state':
uffd-wp-mremap.c:142:73: warning: format '%lu' expects argument of type 'long unsigned int', but argument 3 has type 'size_t' {aka 'unsigned int'} [-Wformat=]
142 | ksft_test_result_fail("uffd-wp not %s for pte %lu!\n",
| ~~^
| |
| long unsigned int
| %u
143 | expect ? "set" : "clear",
144 | (addr - mem) / pagesize);
| ~~~~~~~~~~~~~~~~~~~~~~~
| |
| size_t {aka unsigned int}
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/firmware/cirrus/cs_dsp.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/firmware/cirrus/test/cs_dsp_mock_bin.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/firmware/cirrus/test/cs_dsp_mock_mem_maps.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/firmware/cirrus/test/cs_dsp_mock_regmap.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/firmware/cirrus/test/cs_dsp_mock_utils.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/firmware/cirrus/test/cs_dsp_mock_wmfw.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/firmware/cirrus/test/cs_dsp_test_bin_error.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/firmware/cirrus/test/cs_dsp_test_bin.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/firmware/cirrus/test/cs_dsp_test_callbacks.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/firmware/cirrus/test/cs_dsp_test_control_cache.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/firmware/cirrus/test/cs_dsp_test_control_parse.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/firmware/cirrus/test/cs_dsp_test_control_rw.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/firmware/cirrus/test/cs_dsp_test_wmfw_error.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/firmware/cirrus/test/cs_dsp_test_wmfw.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/firmware/cirrus/test/cs_dsp_tests.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/interconnect/qcom/qcs615.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/interconnect/qcom/qcs8300.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/mtd/nand/qpic_common.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/pci/pcie/tlp.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/pmdomain/mediatek/airoha-cpu-pmdomain.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/soc/imx/soc-imx9.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/watchdog/rzv2h_wdt.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(lib/math/tests/int_sqrt_kunit.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(lib/test_xarray.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/interconnect/qcom/qcs615.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/interconnect/qcom/qcs8300.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/mtd/nand/qpic_common.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/pci/pcie/tlp.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/pmdomain/mediatek/airoha-cpu-pmdomain.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/soc/imx/soc-imx9.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/watchdog/rzv2h_wdt.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/interconnect/qcom/qcs615.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/interconnect/qcom/qcs8300.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/mtd/nand/qpic_common.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/pci/pcie/tlp.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/pmdomain/mediatek/airoha-cpu-pmdomain.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/soc/imx/soc-imx9.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/watchdog/rzv2h_wdt.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/interconnect/qcom/qcs8300.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/interconnect/qcom/qcs615.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/mtd/nand/qpic_common.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/pci/pcie/tlp.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/pmdomain/mediatek/airoha-cpu-pmdomain.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/soc/imx/soc-imx9.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/watchdog/rzv2h_wdt.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/interconnect/qcom/qcs615.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/interconnect/qcom/qcs8300.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/mtd/nand/qpic_common.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/pci/pcie/tlp.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/pmdomain/mediatek/airoha-cpu-pmdomain.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/soc/imx/soc-imx9.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/watchdog/rzv2h_wdt.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/interconnect/qcom/qcs8300.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/interconnect/qcom/qcs615.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/mtd/nand/qpic_common.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/pci/pcie/tlp.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/pmdomain/mediatek/airoha-cpu-pmdomain.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/soc/imx/soc-imx9.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/watchdog/rzv2h_wdt.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make -C /builds/linux/tools/testing/selftests/../../../tools/arch/arm64/tools/ OUTPUT=/builds/linux/tools/testing/selftests/../../../tools/
make[4]: Entering directory '/builds/linux/tools/testing/selftests/mm'
cow.c: In function 'do_test_vmsplice_in_parent':
cow.c:365:61: warning: 'transferred' may be used uninitialized [-Wmaybe-uninitialized]
365 | cur = read(fds[0], new + total, transferred - total);
| ~~~~~~~~~~~~^~~~~~~
cow.c:296:29: note: 'transferred' was declared here
296 | ssize_t cur, total, transferred;
| ^~~~~~~~~~~
make -C /builds/linux/tools/testing/selftests/../../../tools/arch/arm64/tools/ OUTPUT=/builds/linux/tools/testing/selftests/../../../tools/
make[4]: Entering directory '/builds/linux/tools/testing/selftests/mm'
cow.c: In function 'do_test_vmsplice_in_parent':
cow.c:365:61: warning: 'transferred' may be used uninitialized [-Wmaybe-uninitialized]
365 | cur = read(fds[0], new + total, transferred - total);
| ~~~~~~~~~~~~^~~~~~~
cow.c:296:29: note: 'transferred' was declared here
296 | ssize_t cur, total, transferred;
| ^~~~~~~~~~~
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=i386 SRCARCH=x86 CROSS_COMPILE=i686-linux-gnu- 'CC=sccache i686-linux-gnu-gcc' 'HOSTCC=sccache gcc'
In file included from <command-line>:
In function 'intel_dp_dsc_compute_pipe_bpp_limits.isra.43',
inlined from 'intel_dp_compute_config_limits' at /builds/linux/drivers/gpu/drm/i915/display/intel_dp.c:2547:3:
/builds/linux/include/linux/compiler_types.h:542:38: error: call to '__compiletime_assert_850' declared with attribute error: clamp() low limit dsc_min_bpc * 3 greater than high limit dsc_max_bpc * 3
_compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
^
/builds/linux/include/linux/compiler_types.h:523:4: note: in definition of macro '__compiletime_assert'
prefix ## suffix(); \
^~~~~~
/builds/linux/include/linux/compiler_types.h:542:2: note: in expansion of macro '_compiletime_assert'
_compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
^~~~~~~~~~~~~~~~~~~
/builds/linux/include/linux/build_bug.h:39:37: note: in expansion of macro 'compiletime_assert'
#define BUILD_BUG_ON_MSG(cond, msg) compiletime_assert(!(cond), msg)
^~~~~~~~~~~~~~~~~~
/builds/linux/include/linux/minmax.h:188:2: note: in expansion of macro 'BUILD_BUG_ON_MSG'
BUILD_BUG_ON_MSG(statically_true(ulo > uhi), \
^~~~~~~~~~~~~~~~
/builds/linux/include/linux/minmax.h:195:2: note: in expansion of macro '__clamp_once'
__clamp_once(type, val, lo, hi, __UNIQUE_ID(v_), __UNIQUE_ID(l_), __UNIQUE_ID(h_))
^~~~~~~~~~~~
/builds/linux/include/linux/minmax.h:206:28: note: in expansion of macro '__careful_clamp'
#define clamp(val, lo, hi) __careful_clamp(__auto_type, val, lo, hi)
^~~~~~~~~~~~~~~
/builds/linux/drivers/gpu/drm/i915/display/intel_dp.c:2506:25: note: in expansion of macro 'clamp'
limits->pipe.max_bpp = clamp(limits->pipe.max_bpp, dsc_min_bpc * 3, dsc_max_bpc * 3);
^~~~~
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- 'CC=sccache s390x-linux-gnu-gcc' 'HOSTCC=sccache gcc'
s390x-linux-gnu-objcopy: st2913HS: warning: allocated section `.got.plt' not in segment
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- 'CC=sccache s390x-linux-gnu-gcc' 'HOSTCC=sccache gcc'
s390x-linux-gnu-objcopy: stYX1F1t: warning: allocated section `.got.plt' not in segment
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- 'CC=sccache s390x-linux-gnu-gcc' 'HOSTCC=sccache gcc'
s390x-linux-gnu-objcopy: st3Y3ofJ: warning: allocated section `.got.plt' not in segment
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- 'CC=sccache s390x-linux-gnu-gcc' 'HOSTCC=sccache gcc'
s390x-linux-gnu-objcopy: stYx1ACV: warning: allocated section `.got.plt' not in segment
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'HOSTCC=sccache clang' 'CC=sccache clang' LLVM=1 LLVM_IAS=1 kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/sgx'
/usr/bin/x86_64-linux-gnu-ld: warning: /tmp/test_encl_bootstrap-2ce51f.o: missing .note.GNU-stack section implies executable stack
/usr/bin/x86_64-linux-gnu-ld: NOTE: This behaviour is deprecated and will be removed in a future version of the linker
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1 kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/sgx'
/usr/bin/x86_64-linux-gnu-ld: warning: /tmp/test_encl_bootstrap-dbb031.o: missing .note.GNU-stack section implies executable stack
/usr/bin/x86_64-linux-gnu-ld: NOTE: This behaviour is deprecated and will be removed in a future version of the linker
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'CC=sccache x86_64-linux-gnu-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/mm'
cow.c: In function 'do_test_vmsplice_in_parent':
cow.c:365:61: warning: 'transferred' may be used uninitialized [-Wmaybe-uninitialized]
365 | cur = read(fds[0], new + total, transferred - total);
| ~~~~~~~~~~~~^~~~~~~
cow.c:296:29: note: 'transferred' was declared here
296 | ssize_t cur, total, transferred;
| ^~~~~~~~~~~
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'CC=sccache x86_64-linux-gnu-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/sgx'
/usr/bin/ld: warning: /tmp/ccFjBoFb.o: missing .note.GNU-stack section implies executable stack
/usr/bin/ld: NOTE: This behaviour is deprecated and will be removed in a future version of the linker
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'CC=sccache x86_64-linux-gnu-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/mm'
cow.c: In function 'do_test_vmsplice_in_parent':
cow.c:365:61: warning: 'transferred' may be used uninitialized [-Wmaybe-uninitialized]
365 | cur = read(fds[0], new + total, transferred - total);
| ~~~~~~~~~~~~^~~~~~~
cow.c:296:29: note: 'transferred' was declared here
296 | ssize_t cur, total, transferred;
| ^~~~~~~~~~~
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'CC=sccache x86_64-linux-gnu-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/sgx'
/usr/bin/ld: warning: /tmp/cc6cMp8b.o: missing .note.GNU-stack section implies executable stack
/usr/bin/ld: NOTE: This behaviour is deprecated and will be removed in a future version of the linker
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'CC=sccache x86_64-linux-gnu-gcc' 'HOSTCC=sccache gcc'
In file included from <command-line>:
In function 'intel_dp_dsc_compute_pipe_bpp_limits.isra.44',
inlined from 'intel_dp_compute_config_limits' at /builds/linux/drivers/gpu/drm/i915/display/intel_dp.c:2547:3:
/builds/linux/include/linux/compiler_types.h:542:38: error: call to '__compiletime_assert_1689' declared with attribute error: clamp() low limit dsc_min_bpc * 3 greater than high limit dsc_max_bpc * 3
_compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
^
/builds/linux/include/linux/compiler_types.h:523:4: note: in definition of macro '__compiletime_assert'
prefix ## suffix(); \
^~~~~~
/builds/linux/include/linux/compiler_types.h:542:2: note: in expansion of macro '_compiletime_assert'
_compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
^~~~~~~~~~~~~~~~~~~
/builds/linux/include/linux/build_bug.h:39:37: note: in expansion of macro 'compiletime_assert'
#define BUILD_BUG_ON_MSG(cond, msg) compiletime_assert(!(cond), msg)
^~~~~~~~~~~~~~~~~~
/builds/linux/include/linux/minmax.h:188:2: note: in expansion of macro 'BUILD_BUG_ON_MSG'
BUILD_BUG_ON_MSG(statically_true(ulo > uhi), \
^~~~~~~~~~~~~~~~
/builds/linux/include/linux/minmax.h:195:2: note: in expansion of macro '__clamp_once'
__clamp_once(type, val, lo, hi, __UNIQUE_ID(v_), __UNIQUE_ID(l_), __UNIQUE_ID(h_))
^~~~~~~~~~~~
/builds/linux/include/linux/minmax.h:206:28: note: in expansion of macro '__careful_clamp'
#define clamp(val, lo, hi) __careful_clamp(__auto_type, val, lo, hi)
^~~~~~~~~~~~~~~
/builds/linux/drivers/gpu/drm/i915/display/intel_dp.c:2506:25: note: in expansion of macro 'clamp'
limits->pipe.max_bpp = clamp(limits->pipe.max_bpp, dsc_min_bpc * 3, dsc_max_bpc * 3);
^~~~~
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'CC=sccache x86_64-linux-gnu-gcc' 'HOSTCC=sccache gcc'
In file included from <command-line>:
In function 'intel_dp_dsc_compute_pipe_bpp_limits.isra.80',
inlined from 'intel_dp_compute_config_limits' at /builds/linux/drivers/gpu/drm/i915/display/intel_dp.c:2547:3:
/builds/linux/include/linux/compiler_types.h:542:38: error: call to '__compiletime_assert_1219' declared with attribute error: clamp() low limit dsc_min_bpc * 3 greater than high limit dsc_max_bpc * 3
_compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
^
/builds/linux/include/linux/compiler_types.h:523:4: note: in definition of macro '__compiletime_assert'
prefix ## suffix(); \
^~~~~~
/builds/linux/include/linux/compiler_types.h:542:2: note: in expansion of macro '_compiletime_assert'
_compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
^~~~~~~~~~~~~~~~~~~
/builds/linux/include/linux/build_bug.h:39:37: note: in expansion of macro 'compiletime_assert'
#define BUILD_BUG_ON_MSG(cond, msg) compiletime_assert(!(cond), msg)
^~~~~~~~~~~~~~~~~~
/builds/linux/include/linux/minmax.h:188:2: note: in expansion of macro 'BUILD_BUG_ON_MSG'
BUILD_BUG_ON_MSG(statically_true(ulo > uhi), \
^~~~~~~~~~~~~~~~
/builds/linux/include/linux/minmax.h:195:2: note: in expansion of macro '__clamp_once'
__clamp_once(type, val, lo, hi, __UNIQUE_ID(v_), __UNIQUE_ID(l_), __UNIQUE_ID(h_))
^~~~~~~~~~~~
/builds/linux/include/linux/minmax.h:206:28: note: in expansion of macro '__careful_clamp'
#define clamp(val, lo, hi) __careful_clamp(__auto_type, val, lo, hi)
^~~~~~~~~~~~~~~
/builds/linux/drivers/gpu/drm/i915/display/intel_dp.c:2506:25: note: in expansion of macro 'clamp'
limits->pipe.max_bpp = clamp(limits->pipe.max_bpp, dsc_min_bpc * 3, dsc_max_bpc * 3);
^~~~~
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'CC=sccache x86_64-linux-gnu-gcc' 'HOSTCC=sccache gcc' modules_install
make[3]: *** No rule to make target 'modules.builtin', needed by '/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall/lib/modules/6.13.0/modules.builtin'.
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'CC=sccache x86_64-linux-gnu-gcc' 'HOSTCC=sccache gcc' modules_install
make[3]: *** No rule to make target 'modules.builtin.modinfo', needed by '/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall/lib/modules/6.13.0/modules.builtin.modinfo'.
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'CC=sccache x86_64-linux-gnu-gcc' 'HOSTCC=sccache gcc' modules_install
make[3]: *** No rule to make target 'modules.order', needed by '/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall/lib/modules/6.13.0/modules.order'.
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'CC=sccache x86_64-linux-gnu-gcc' 'HOSTCC=sccache gcc'
In file included from <command-line>:
In function 'intel_dp_dsc_compute_pipe_bpp_limits.isra.80',
inlined from 'intel_dp_compute_config_limits' at /builds/linux/drivers/gpu/drm/i915/display/intel_dp.c:2547:3:
/builds/linux/include/linux/compiler_types.h:542:38: error: call to '__compiletime_assert_907' declared with attribute error: clamp() low limit dsc_min_bpc * 3 greater than high limit dsc_max_bpc * 3
_compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
^
/builds/linux/include/linux/compiler_types.h:523:4: note: in definition of macro '__compiletime_assert'
prefix ## suffix(); \
^~~~~~
/builds/linux/include/linux/compiler_types.h:542:2: note: in expansion of macro '_compiletime_assert'
_compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
^~~~~~~~~~~~~~~~~~~
/builds/linux/include/linux/build_bug.h:39:37: note: in expansion of macro 'compiletime_assert'
#define BUILD_BUG_ON_MSG(cond, msg) compiletime_assert(!(cond), msg)
^~~~~~~~~~~~~~~~~~
/builds/linux/include/linux/minmax.h:188:2: note: in expansion of macro 'BUILD_BUG_ON_MSG'
BUILD_BUG_ON_MSG(statically_true(ulo > uhi), \
^~~~~~~~~~~~~~~~
/builds/linux/include/linux/minmax.h:195:2: note: in expansion of macro '__clamp_once'
__clamp_once(type, val, lo, hi, __UNIQUE_ID(v_), __UNIQUE_ID(l_), __UNIQUE_ID(h_))
^~~~~~~~~~~~
/builds/linux/include/linux/minmax.h:206:28: note: in expansion of macro '__careful_clamp'
#define clamp(val, lo, hi) __careful_clamp(__auto_type, val, lo, hi)
^~~~~~~~~~~~~~~
/builds/linux/drivers/gpu/drm/i915/display/intel_dp.c:2506:25: note: in expansion of macro 'clamp'
limits->pipe.max_bpp = clamp(limits->pipe.max_bpp, dsc_min_bpc * 3, dsc_max_bpc * 3);
^~~~~
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'CC=sccache x86_64-linux-gnu-gcc' 'HOSTCC=sccache gcc' modules_install
make[3]: *** No rule to make target 'modules.builtin', needed by '/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall/lib/modules/6.13.0/modules.builtin'.
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'CC=sccache x86_64-linux-gnu-gcc' 'HOSTCC=sccache gcc' modules_install
make[3]: *** No rule to make target 'modules.builtin.modinfo', needed by '/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall/lib/modules/6.13.0/modules.builtin.modinfo'.
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'CC=sccache x86_64-linux-gnu-gcc' 'HOSTCC=sccache gcc' modules_install
make[3]: *** No rule to make target 'modules.order', needed by '/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall/lib/modules/6.13.0/modules.order'.
[ 401.202842] ==================================================================
[ 401.204709] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info+0x144/0x620
[ 401.206154] Read of size 12 at addr ffffa4b4ccbf6f80 by task kunit_try_catch/2841
[ 401.206982]
[ 401.207336] CPU: 1 UID: 0 PID: 2841 Comm: kunit_try_catch Tainted: G D N 6.13.0 #1
[ 401.207513] Tainted: [D]=DIE, [N]=TEST
[ 401.207599] Hardware name: linux,dummy-virt (DT)
[ 401.207687] Call trace:
[ 401.207770] show_stack+0x18/0x24 (C)
[ 401.207933] dump_stack_lvl+0x40/0x84
[ 401.208127] print_report+0x16c/0x728
[ 401.208271] kasan_report+0xd8/0x134
[ 401.208405] kasan_check_range+0x264/0x2a4
[ 401.208529] __asan_memcpy+0x3c/0x84
[ 401.208664] cs_dsp_mock_bin_add_name_or_info+0x144/0x620
[ 401.208831] cs_dsp_mock_bin_add_info+0x10/0x1c
[ 401.208944] bin_patch_name_and_info+0xfc/0x550
[ 401.209060] kunit_try_run_case+0x118/0x31c
[ 401.209177] kunit_generic_run_threadfn_adapter+0x84/0x104
[ 401.209290] kthread+0x3f4/0x518
[ 401.209399] ret_from_fork+0x10/0x20
[ 401.209502]
[ 401.218745] The buggy address belongs to the variable:
[ 401.219427] .str.271+0x0/0x20
[ 401.220603]
[ 401.221697] The buggy address belongs to the virtual mapping at
[ 401.221697] [ffffa4b4cbdf0000, ffffa4b4cd4d0000) created by:
[ 401.221697] declare_kernel_vmas+0x54/0xb4
[ 401.223159]
[ 401.223630] The buggy address belongs to the physical page:
[ 401.224704] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x43bf6
[ 401.226622] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[ 401.228679] raw: 03fffe0000002000 ffffedeb560efd88 ffffedeb560efd88 0000000000000000
[ 401.229603] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 401.230455] page dumped because: kasan: bad access detected
[ 401.231175]
[ 401.231506] Memory state around the buggy address:
[ 401.232975] ffffa4b4ccbf6e80: 00 00 f9 f9 00 00 f9 f9 00 00 00 00 00 00 00 00
[ 401.233855] ffffa4b4ccbf6f00: 00 00 f9 f9 f9 f9 f9 f9 03 f9 f9 f9 00 01 f9 f9
[ 401.234776] >ffffa4b4ccbf6f80: 00 02 f9 f9 00 00 f9 f9 00 f9 f9 f9 00 06 f9 f9
[ 401.235548] ^
[ 401.236373] ffffa4b4ccbf7000: 00 00 00 f9 f9 f9 f9 f9 00 00 f9 f9 00 00 00 f9
[ 401.237345] ffffa4b4ccbf7080: f9 f9 f9 f9 00 00 f9 f9 00 00 00 f9 f9 f9 f9 f9
[ 401.238268] ==================================================================
[ 401.202842] ==================================================================
[ 401.204709] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info+0x144/0x620
[ 401.206154] Read of size 12 at addr ffffa4b4ccbf6f80 by task kunit_try_catch/2841
[ 401.206982]
[ 401.207336] CPU: 1 UID: 0 PID: 2841 Comm: kunit_try_catch Tainted: G D N 6.13.0 #1
[ 401.207513] Tainted: [D]=DIE, [N]=TEST
[ 401.207599] Hardware name: linux,dummy-virt (DT)
[ 401.207687] Call trace:
[ 401.207770] show_stack+0x18/0x24 (C)
[ 401.207933] dump_stack_lvl+0x40/0x84
[ 401.208127] print_report+0x16c/0x728
[ 401.208271] kasan_report+0xd8/0x134
[ 401.208405] kasan_check_range+0x264/0x2a4
[ 401.208529] __asan_memcpy+0x3c/0x84
[ 401.208664] cs_dsp_mock_bin_add_name_or_info+0x144/0x620
[ 401.208831] cs_dsp_mock_bin_add_info+0x10/0x1c
[ 401.208944] bin_patch_name_and_info+0xfc/0x550
[ 401.209060] kunit_try_run_case+0x118/0x31c
[ 401.209177] kunit_generic_run_threadfn_adapter+0x84/0x104
[ 401.209290] kthread+0x3f4/0x518
[ 401.209399] ret_from_fork+0x10/0x20
[ 401.209502]
[ 401.218745] The buggy address belongs to the variable:
[ 401.219427] .str.271+0x0/0x20
[ 401.220603]
[ 401.221697] The buggy address belongs to the virtual mapping at
[ 401.221697] [ffffa4b4cbdf0000, ffffa4b4cd4d0000) created by:
[ 401.221697] declare_kernel_vmas+0x54/0xb4
[ 401.223159]
[ 401.223630] The buggy address belongs to the physical page:
[ 401.224704] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x43bf6
[ 401.226622] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[ 401.228679] raw: 03fffe0000002000 ffffedeb560efd88 ffffedeb560efd88 0000000000000000
[ 401.229603] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 401.230455] page dumped because: kasan: bad access detected
[ 401.231175]
[ 401.231506] Memory state around the buggy address:
[ 401.232975] ffffa4b4ccbf6e80: 00 00 f9 f9 00 00 f9 f9 00 00 00 00 00 00 00 00
[ 401.233855] ffffa4b4ccbf6f00: 00 00 f9 f9 f9 f9 f9 f9 03 f9 f9 f9 00 01 f9 f9
[ 401.234776] >ffffa4b4ccbf6f80: 00 02 f9 f9 00 00 f9 f9 00 f9 f9 f9 00 06 f9 f9
[ 401.235548] ^
[ 401.236373] ffffa4b4ccbf7000: 00 00 00 f9 f9 f9 f9 f9 00 00 f9 f9 00 00 00 f9
[ 401.237345] ffffa4b4ccbf7080: f9 f9 f9 f9 00 00 f9 f9 00 00 00 f9 f9 f9 f9 f9
[ 401.238268] ==================================================================
[ 439.913277] ==================================================================
[ 439.915347] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info+0x144/0x620
[ 439.916251] Read of size 12 at addr ffff911dc31f6c00 by task kunit_try_catch/2841
[ 439.917123]
[ 439.919559] CPU: 0 UID: 0 PID: 2841 Comm: kunit_try_catch Tainted: G D N 6.13.0 #1
[ 439.919788] Tainted: [D]=DIE, [N]=TEST
[ 439.919891] Hardware name: linux,dummy-virt (DT)
[ 439.919997] Call trace:
[ 439.920085] show_stack+0x18/0x24 (C)
[ 439.920246] __dump_stack+0x28/0x38
[ 439.920402] dump_stack_lvl+0x54/0x6c
[ 439.920553] print_address_description+0x90/0x220
[ 439.920703] print_report+0x68/0x84
[ 439.920825] kasan_report+0xd8/0x134
[ 439.920955] kasan_check_range+0x264/0x2a4
[ 439.921084] __asan_memcpy+0x3c/0x84
[ 439.921206] cs_dsp_mock_bin_add_name_or_info+0x144/0x620
[ 439.921333] cs_dsp_mock_bin_add_info+0x10/0x1c
[ 439.921413] bin_patch_name_and_info+0xfc/0x550
[ 439.921496] kunit_try_run_case+0x118/0x31c
[ 439.921584] kunit_generic_run_threadfn_adapter+0x84/0x104
[ 439.921670] kthread+0x3f4/0x518
[ 439.921749] ret_from_fork+0x10/0x20
[ 439.921866]
[ 439.931719] The buggy address belongs to the variable:
[ 439.933052] .str.279+0x0/0x20
[ 439.933677]
[ 439.934284] The buggy address belongs to the virtual mapping at
[ 439.934284] [ffff911dc23f0000, ffff911dc3ad0000) created by:
[ 439.934284] declare_kernel_vmas+0x54/0xb4
[ 439.935783]
[ 439.937428] The buggy address belongs to the physical page:
[ 439.938665] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x43bf6
[ 439.939753] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[ 439.941924] raw: 03fffe0000002000 ffffc585ed0efd88 ffffc585ed0efd88 0000000000000000
[ 439.942854] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 439.943791] page dumped because: kasan: bad access detected
[ 439.945342]
[ 439.945779] Memory state around the buggy address:
[ 439.946833] ffff911dc31f6b00: 00 00 f9 f9 00 00 f9 f9 00 00 00 00 00 00 00 00
[ 439.947706] ffff911dc31f6b80: 00 00 f9 f9 f9 f9 f9 f9 03 f9 f9 f9 00 01 f9 f9
[ 439.949174] >ffff911dc31f6c00: 00 02 f9 f9 00 00 f9 f9 00 f9 f9 f9 00 06 f9 f9
[ 439.949951] ^
[ 439.950835] ffff911dc31f6c80: 00 00 00 f9 f9 f9 f9 f9 00 00 f9 f9 00 00 00 f9
[ 439.952019] ffff911dc31f6d00: f9 f9 f9 f9 00 00 f9 f9 00 00 00 f9 f9 f9 f9 f9
[ 439.952857] ==================================================================
[ 439.913277] ==================================================================
[ 439.915347] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info+0x144/0x620
[ 439.916251] Read of size 12 at addr ffff911dc31f6c00 by task kunit_try_catch/2841
[ 439.917123]
[ 439.919559] CPU: 0 UID: 0 PID: 2841 Comm: kunit_try_catch Tainted: G D N 6.13.0 #1
[ 439.919788] Tainted: [D]=DIE, [N]=TEST
[ 439.919891] Hardware name: linux,dummy-virt (DT)
[ 439.919997] Call trace:
[ 439.920085] show_stack+0x18/0x24 (C)
[ 439.920246] __dump_stack+0x28/0x38
[ 439.920402] dump_stack_lvl+0x54/0x6c
[ 439.920553] print_address_description+0x90/0x220
[ 439.920703] print_report+0x68/0x84
[ 439.920825] kasan_report+0xd8/0x134
[ 439.920955] kasan_check_range+0x264/0x2a4
[ 439.921084] __asan_memcpy+0x3c/0x84
[ 439.921206] cs_dsp_mock_bin_add_name_or_info+0x144/0x620
[ 439.921333] cs_dsp_mock_bin_add_info+0x10/0x1c
[ 439.921413] bin_patch_name_and_info+0xfc/0x550
[ 439.921496] kunit_try_run_case+0x118/0x31c
[ 439.921584] kunit_generic_run_threadfn_adapter+0x84/0x104
[ 439.921670] kthread+0x3f4/0x518
[ 439.921749] ret_from_fork+0x10/0x20
[ 439.921866]
[ 439.931719] The buggy address belongs to the variable:
[ 439.933052] .str.279+0x0/0x20
[ 439.933677]
[ 439.934284] The buggy address belongs to the virtual mapping at
[ 439.934284] [ffff911dc23f0000, ffff911dc3ad0000) created by:
[ 439.934284] declare_kernel_vmas+0x54/0xb4
[ 439.935783]
[ 439.937428] The buggy address belongs to the physical page:
[ 439.938665] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x43bf6
[ 439.939753] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[ 439.941924] raw: 03fffe0000002000 ffffc585ed0efd88 ffffc585ed0efd88 0000000000000000
[ 439.942854] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 439.943791] page dumped because: kasan: bad access detected
[ 439.945342]
[ 439.945779] Memory state around the buggy address:
[ 439.946833] ffff911dc31f6b00: 00 00 f9 f9 00 00 f9 f9 00 00 00 00 00 00 00 00
[ 439.947706] ffff911dc31f6b80: 00 00 f9 f9 f9 f9 f9 f9 03 f9 f9 f9 00 01 f9 f9
[ 439.949174] >ffff911dc31f6c00: 00 02 f9 f9 00 00 f9 f9 00 f9 f9 f9 00 06 f9 f9
[ 439.949951] ^
[ 439.950835] ffff911dc31f6c80: 00 00 00 f9 f9 f9 f9 f9 00 00 f9 f9 00 00 00 f9
[ 439.952019] ffff911dc31f6d00: f9 f9 f9 f9 00 00 f9 f9 00 00 00 f9 f9 f9 f9 f9
[ 439.952857] ==================================================================
[ 57.195181] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[ 57.196367] Modules linked in:
[ 57.200517] CPU: 1 UID: 0 PID: 388 Comm: kunit_try_catch Tainted: G N 6.13.0 #1
[ 57.202246] Tainted: [N]=TEST
[ 57.202620] Hardware name: linux,dummy-virt (DT)
[ 57.203948] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[ 57.205332] pc : kunit_test_null_dereference+0x68/0x160
[ 57.207448] lr : kunit_generic_run_threadfn_adapter+0x80/0xec
[ 57.208436] sp : ffff800080fb7d30
[ 57.209045] x29: ffff800080fb7d90 x28: 0000000000000000 x27: 0000000000000000
[ 57.210703] x26: 1fff1c5140bcb8c1 x25: fff8e28a07f7b780 x24: 0000000000000004
[ 57.211766] x23: fff8e28a07c88b80 x22: ffffa8e3ddbc9f4c x21: fff8e28a07c88b88
[ 57.212840] x20: 1ffff000101f6fa6 x19: ffff8000800879b0 x18: 00000000618b3347
[ 57.213803] x17: 0000000030006918 x16: 0000000000000100 x15: fff8e28a3f80de40
[ 57.215223] x14: 1fff1c51435268cb x13: 00000000f1f1f1f1 x12: fffe9c5140fef7e4
[ 57.216715] x11: 1fff1c5140fef7e3 x10: fffe9c5140fef7e3 x9 : dfff800000000000
[ 57.218074] x8 : fff8e28a07f7bf1c x7 : 0000000000000001 x6 : 0000000041b58ab3
[ 57.219161] x5 : ffff7000101f6fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[ 57.220181] x2 : dfff800000000000 x1 : fff8e28a07f7b780 x0 : ffff8000800879b0
[ 57.222223] Call trace:
[ 57.223144] kunit_test_null_dereference+0x68/0x160 (P)
[ 57.224094] kunit_generic_run_threadfn_adapter+0x80/0xec
[ 57.225074] kthread+0x37c/0x67c
[ 57.225955] ret_from_fork+0x10/0x20
[ 57.227026] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042)
[ 57.227760] ---[ end trace 0000000000000000 ]---
[ 382.991334] ==================================================================
[ 382.993032] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info.isra.0+0x194/0x338
[ 382.994372] Read of size 12 at addr ffffa8e3e0d2b660 by task kunit_try_catch/2841
[ 382.995059]
[ 382.995435] CPU: 1 UID: 0 PID: 2841 Comm: kunit_try_catch Tainted: G D N 6.13.0 #1
[ 382.995593] Tainted: [D]=DIE, [N]=TEST
[ 382.995657] Hardware name: linux,dummy-virt (DT)
[ 382.995725] Call trace:
[ 382.995793] show_stack+0x18/0x24 (C)
[ 382.995931] dump_stack_lvl+0x74/0x8c
[ 382.996043] print_report+0x300/0x5e0
[ 382.996164] kasan_report+0xc4/0x108
[ 382.996278] kasan_check_range+0x100/0x1a8
[ 382.996419] __asan_memcpy+0x3c/0x94
[ 382.996537] cs_dsp_mock_bin_add_name_or_info.isra.0+0x194/0x338
[ 382.996649] cs_dsp_mock_bin_add_info+0x10/0x1c
[ 382.996765] bin_patch_name_and_info+0x15c/0x6a0
[ 382.996864] kunit_try_run_case+0x144/0x3bc
[ 382.996956] kunit_generic_run_threadfn_adapter+0x80/0xec
[ 382.997023] kthread+0x37c/0x67c
[ 382.997088] ret_from_fork+0x10/0x20
[ 382.997175]
[ 383.005422] The buggy address belongs to the variable:
[ 383.006113] __loc.0+0x2c0/0x3a0
[ 383.006636]
[ 383.007198] The buggy address belongs to the virtual mapping at
[ 383.007198] [ffffa8e3dfcb0000, ffffa8e3e14f0000) created by:
[ 383.007198] paging_init+0x4d4/0x640
[ 383.008745]
[ 383.009212] The buggy address belongs to the physical page:
[ 383.010215] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x4412b
[ 383.011634] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[ 383.013469] raw: 03fffe0000002000 ffffe589e5104ac8 ffffe589e5104ac8 0000000000000000
[ 383.014314] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 383.015281] page dumped because: kasan: bad access detected
[ 383.016013]
[ 383.016360] Memory state around the buggy address:
[ 383.017486] ffffa8e3e0d2b500: f9 f9 f9 f9 00 00 00 01 f9 f9 f9 f9 03 f9 f9 f9
[ 383.018417] ffffa8e3e0d2b580: f9 f9 f9 f9 00 00 06 f9 f9 f9 f9 f9 02 f9 f9 f9
[ 383.019242] >ffffa8e3e0d2b600: f9 f9 f9 f9 00 01 f9 f9 f9 f9 f9 f9 00 02 f9 f9
[ 383.020065] ^
[ 383.021026] ffffa8e3e0d2b680: f9 f9 f9 f9 00 00 00 00 00 07 f9 f9 f9 f9 f9 f9
[ 383.021837] ffffa8e3e0d2b700: 00 f9 f9 f9 f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9
[ 383.022674] ==================================================================
[ 382.991334] ==================================================================
[ 382.993032] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info.isra.0+0x194/0x338
[ 382.994372] Read of size 12 at addr ffffa8e3e0d2b660 by task kunit_try_catch/2841
[ 382.995059]
[ 382.995435] CPU: 1 UID: 0 PID: 2841 Comm: kunit_try_catch Tainted: G D N 6.13.0 #1
[ 382.995593] Tainted: [D]=DIE, [N]=TEST
[ 382.995657] Hardware name: linux,dummy-virt (DT)
[ 382.995725] Call trace:
[ 382.995793] show_stack+0x18/0x24 (C)
[ 382.995931] dump_stack_lvl+0x74/0x8c
[ 382.996043] print_report+0x300/0x5e0
[ 382.996164] kasan_report+0xc4/0x108
[ 382.996278] kasan_check_range+0x100/0x1a8
[ 382.996419] __asan_memcpy+0x3c/0x94
[ 382.996537] cs_dsp_mock_bin_add_name_or_info.isra.0+0x194/0x338
[ 382.996649] cs_dsp_mock_bin_add_info+0x10/0x1c
[ 382.996765] bin_patch_name_and_info+0x15c/0x6a0
[ 382.996864] kunit_try_run_case+0x144/0x3bc
[ 382.996956] kunit_generic_run_threadfn_adapter+0x80/0xec
[ 382.997023] kthread+0x37c/0x67c
[ 382.997088] ret_from_fork+0x10/0x20
[ 382.997175]
[ 383.005422] The buggy address belongs to the variable:
[ 383.006113] __loc.0+0x2c0/0x3a0
[ 383.006636]
[ 383.007198] The buggy address belongs to the virtual mapping at
[ 383.007198] [ffffa8e3dfcb0000, ffffa8e3e14f0000) created by:
[ 383.007198] paging_init+0x4d4/0x640
[ 383.008745]
[ 383.009212] The buggy address belongs to the physical page:
[ 383.010215] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x4412b
[ 383.011634] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[ 383.013469] raw: 03fffe0000002000 ffffe589e5104ac8 ffffe589e5104ac8 0000000000000000
[ 383.014314] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 383.015281] page dumped because: kasan: bad access detected
[ 383.016013]
[ 383.016360] Memory state around the buggy address:
[ 383.017486] ffffa8e3e0d2b500: f9 f9 f9 f9 00 00 00 01 f9 f9 f9 f9 03 f9 f9 f9
[ 383.018417] ffffa8e3e0d2b580: f9 f9 f9 f9 00 00 06 f9 f9 f9 f9 f9 02 f9 f9 f9
[ 383.019242] >ffffa8e3e0d2b600: f9 f9 f9 f9 00 01 f9 f9 f9 f9 f9 f9 00 02 f9 f9
[ 383.020065] ^
[ 383.021026] ffffa8e3e0d2b680: f9 f9 f9 f9 00 00 00 00 00 07 f9 f9 f9 f9 f9 f9
[ 383.021837] ffffa8e3e0d2b700: 00 f9 f9 f9 f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9
[ 383.022674] ==================================================================
[ 417.978486] ==================================================================
[ 417.980258] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info.isra.1+0x198/0x33c
[ 417.981524] Read of size 12 at addr ffffa534daba9180 by task kunit_try_catch/2841
[ 417.982287]
[ 417.982715] CPU: 1 UID: 0 PID: 2841 Comm: kunit_try_catch Tainted: G D N 6.13.0 #1
[ 417.982926] Tainted: [D]=DIE, [N]=TEST
[ 417.983015] Hardware name: linux,dummy-virt (DT)
[ 417.983114] Call trace:
[ 417.984462] show_stack+0x18/0x24 (C)
[ 417.984639] dump_stack_lvl+0x78/0x90
[ 417.984790] print_report+0x1d4/0x5c8
[ 417.984895] kasan_report+0x78/0xc0
[ 417.984974] kasan_check_range+0x180/0x210
[ 417.985050] memcpy+0x3c/0xa4
[ 417.985121] cs_dsp_mock_bin_add_name_or_info.isra.1+0x198/0x33c
[ 417.985228] cs_dsp_mock_bin_add_info+0x10/0x1c
[ 417.985303] bin_patch_name_and_info+0x164/0x6a8
[ 417.985375] kunit_try_run_case+0x144/0x3bc
[ 417.985467] kunit_generic_run_threadfn_adapter+0x80/0xec
[ 417.985548] kthread+0x3f0/0x744
[ 417.985661] ret_from_fork+0x10/0x20
[ 417.985838]
[ 417.995789] The buggy address belongs to the variable:
[ 417.996521] __loc.44021+0x280/0x420
[ 417.997234]
[ 417.998283] The buggy address belongs to the virtual mapping at
[ 417.998283] [ffffa534d9b20000, ffffa534db360000) created by:
[ 417.998283] paging_init+0x474/0x61c
[ 417.999703]
[ 418.000247] The buggy address belongs to the physical page:
[ 418.001296] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x441a9
[ 418.003124] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[ 418.005126] raw: 03fffe0000002000 ffffc30a95106a48 ffffc30a95106a48 0000000000000000
[ 418.006092] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 418.007081] page dumped because: kasan: bad access detected
[ 418.007642]
[ 418.008048] Memory state around the buggy address:
[ 418.009305] ffffa534daba9080: 03 f9 f9 f9 f9 f9 f9 f9 00 00 06 f9 f9 f9 f9 f9
[ 418.010849] ffffa534daba9100: 02 f9 f9 f9 f9 f9 f9 f9 00 01 f9 f9 f9 f9 f9 f9
[ 418.011745] >ffffa534daba9180: 00 02 f9 f9 f9 f9 f9 f9 00 00 00 00 00 07 f9 f9
[ 418.012802] ^
[ 418.013614] ffffa534daba9200: f9 f9 f9 f9 00 06 f9 f9 f9 f9 f9 f9 05 f9 f9 f9
[ 418.014577] ffffa534daba9280: f9 f9 f9 f9 00 01 f9 f9 f9 f9 f9 f9 00 02 f9 f9
[ 418.015456] ==================================================================
[ 417.978486] ==================================================================
[ 417.980258] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info.isra.1+0x198/0x33c
[ 417.981524] Read of size 12 at addr ffffa534daba9180 by task kunit_try_catch/2841
[ 417.982287]
[ 417.982715] CPU: 1 UID: 0 PID: 2841 Comm: kunit_try_catch Tainted: G D N 6.13.0 #1
[ 417.982926] Tainted: [D]=DIE, [N]=TEST
[ 417.983015] Hardware name: linux,dummy-virt (DT)
[ 417.983114] Call trace:
[ 417.984462] show_stack+0x18/0x24 (C)
[ 417.984639] dump_stack_lvl+0x78/0x90
[ 417.984790] print_report+0x1d4/0x5c8
[ 417.984895] kasan_report+0x78/0xc0
[ 417.984974] kasan_check_range+0x180/0x210
[ 417.985050] memcpy+0x3c/0xa4
[ 417.985121] cs_dsp_mock_bin_add_name_or_info.isra.1+0x198/0x33c
[ 417.985228] cs_dsp_mock_bin_add_info+0x10/0x1c
[ 417.985303] bin_patch_name_and_info+0x164/0x6a8
[ 417.985375] kunit_try_run_case+0x144/0x3bc
[ 417.985467] kunit_generic_run_threadfn_adapter+0x80/0xec
[ 417.985548] kthread+0x3f0/0x744
[ 417.985661] ret_from_fork+0x10/0x20
[ 417.985838]
[ 417.995789] The buggy address belongs to the variable:
[ 417.996521] __loc.44021+0x280/0x420
[ 417.997234]
[ 417.998283] The buggy address belongs to the virtual mapping at
[ 417.998283] [ffffa534d9b20000, ffffa534db360000) created by:
[ 417.998283] paging_init+0x474/0x61c
[ 417.999703]
[ 418.000247] The buggy address belongs to the physical page:
[ 418.001296] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x441a9
[ 418.003124] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[ 418.005126] raw: 03fffe0000002000 ffffc30a95106a48 ffffc30a95106a48 0000000000000000
[ 418.006092] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 418.007081] page dumped because: kasan: bad access detected
[ 418.007642]
[ 418.008048] Memory state around the buggy address:
[ 418.009305] ffffa534daba9080: 03 f9 f9 f9 f9 f9 f9 f9 00 00 06 f9 f9 f9 f9 f9
[ 418.010849] ffffa534daba9100: 02 f9 f9 f9 f9 f9 f9 f9 00 01 f9 f9 f9 f9 f9 f9
[ 418.011745] >ffffa534daba9180: 00 02 f9 f9 f9 f9 f9 f9 00 00 00 00 00 07 f9 f9
[ 418.012802] ^
[ 418.013614] ffffa534daba9200: f9 f9 f9 f9 00 06 f9 f9 f9 f9 f9 f9 05 f9 f9 f9
[ 418.014577] ffffa534daba9280: f9 f9 f9 f9 00 01 f9 f9 f9 f9 f9 f9 00 02 f9 f9
[ 418.015456] ==================================================================
[ 25.557639] ==================================================================
[ 25.558603] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x31f/0x380
[ 25.559252] Read of size 1 at addr ffff888102ddfc3f by task kunit_try_catch/259
[ 25.559771]
[ 25.559987] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 25.560085] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.560104] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.560139] Call Trace:
[ 25.561138] <TASK>
[ 25.561221] dump_stack_lvl+0x73/0xb0
[ 25.561336] print_report+0xd1/0x640
[ 25.561381] ? __virt_addr_valid+0x1db/0x2d0
[ 25.561419] ? kasan_addr_to_slab+0x11/0xa0
[ 25.561454] kasan_report+0x102/0x140
[ 25.561482] ? kasan_alloca_oob_left+0x31f/0x380
[ 25.561513] ? kasan_alloca_oob_left+0x31f/0x380
[ 25.561549] __asan_report_load1_noabort+0x18/0x20
[ 25.561580] kasan_alloca_oob_left+0x31f/0x380
[ 25.561612] ? finish_task_switch.isra.0+0x153/0x700
[ 25.561648] ? __vmx_vcpu_run+0x20/0xa0
[ 25.561676] ? trace_hardirqs_on+0x37/0xe0
[ 25.561712] ? __pfx_kasan_alloca_oob_left+0x10/0x10
[ 25.561744] ? __schedule+0xcdc/0x2830
[ 25.561777] ? __pfx_read_tsc+0x10/0x10
[ 25.561809] ? ktime_get_ts64+0x86/0x230
[ 25.561843] kunit_try_run_case+0x1b3/0x490
[ 25.561875] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.561902] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 25.561935] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 25.561967] ? __kthread_parkme+0x82/0x160
[ 25.561999] ? preempt_count_sub+0x50/0x80
[ 25.562030] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.562060] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.562117] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 25.562177] kthread+0x324/0x6d0
[ 25.562209] ? trace_preempt_on+0x20/0xc0
[ 25.562239] ? __pfx_kthread+0x10/0x10
[ 25.562313] ? _raw_spin_unlock_irq+0x47/0x80
[ 25.562371] ? calculate_sigpending+0x7b/0xa0
[ 25.562407] ? __pfx_kthread+0x10/0x10
[ 25.562437] ret_from_fork+0x41/0x80
[ 25.562466] ? __pfx_kthread+0x10/0x10
[ 25.562495] ret_from_fork_asm+0x1a/0x30
[ 25.562539] </TASK>
[ 25.562556]
[ 25.582317] The buggy address belongs to stack of task kunit_try_catch/259
[ 25.583175]
[ 25.583486] The buggy address belongs to the physical page:
[ 25.584331] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ddf
[ 25.585215] flags: 0x200000000000000(node=0|zone=2)
[ 25.585902] raw: 0200000000000000 ffffea00040b77c8 ffffea00040b77c8 0000000000000000
[ 25.586863] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[ 25.587760] page dumped because: kasan: bad access detected
[ 25.587956]
[ 25.588039] Memory state around the buggy address:
[ 25.588339] ffff888102ddfb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 25.589027] ffff888102ddfb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 25.590078] >ffff888102ddfc00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[ 25.590974] ^
[ 25.591978] ffff888102ddfc80: 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00
[ 25.592690] ffff888102ddfd00: 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1
[ 25.593078] ==================================================================
[ 25.600189] ==================================================================
[ 25.602377] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x328/0x390
[ 25.602923] Read of size 1 at addr ffff888102d57c4a by task kunit_try_catch/261
[ 25.603992]
[ 25.604757] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 25.604873] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.604906] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.604960] Call Trace:
[ 25.604980] <TASK>
[ 25.605011] dump_stack_lvl+0x73/0xb0
[ 25.605066] print_report+0xd1/0x640
[ 25.605101] ? __virt_addr_valid+0x1db/0x2d0
[ 25.605523] ? kasan_addr_to_slab+0x11/0xa0
[ 25.605565] kasan_report+0x102/0x140
[ 25.605594] ? kasan_alloca_oob_right+0x328/0x390
[ 25.605628] ? kasan_alloca_oob_right+0x328/0x390
[ 25.605663] __asan_report_load1_noabort+0x18/0x20
[ 25.605695] kasan_alloca_oob_right+0x328/0x390
[ 25.605727] ? finish_task_switch.isra.0+0x153/0x700
[ 25.605763] ? __vmx_vcpu_run+0x20/0xa0
[ 25.605794] ? trace_hardirqs_on+0x37/0xe0
[ 25.605827] ? __pfx_kasan_alloca_oob_right+0x10/0x10
[ 25.605860] ? __schedule+0xcdc/0x2830
[ 25.605891] ? __pfx_read_tsc+0x10/0x10
[ 25.605921] ? ktime_get_ts64+0x86/0x230
[ 25.605956] kunit_try_run_case+0x1b3/0x490
[ 25.605987] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.606015] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 25.606047] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 25.606078] ? __kthread_parkme+0x82/0x160
[ 25.606126] ? preempt_count_sub+0x50/0x80
[ 25.606195] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.606240] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.606328] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 25.606389] kthread+0x324/0x6d0
[ 25.606420] ? trace_preempt_on+0x20/0xc0
[ 25.606452] ? __pfx_kthread+0x10/0x10
[ 25.606482] ? _raw_spin_unlock_irq+0x47/0x80
[ 25.606514] ? calculate_sigpending+0x7b/0xa0
[ 25.606545] ? __pfx_kthread+0x10/0x10
[ 25.606576] ret_from_fork+0x41/0x80
[ 25.606602] ? __pfx_kthread+0x10/0x10
[ 25.606631] ret_from_fork_asm+0x1a/0x30
[ 25.606677] </TASK>
[ 25.606695]
[ 25.625682] The buggy address belongs to stack of task kunit_try_catch/261
[ 25.626905]
[ 25.627394] The buggy address belongs to the physical page:
[ 25.627729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d57
[ 25.628703] flags: 0x200000000000000(node=0|zone=2)
[ 25.629946] raw: 0200000000000000 ffffea00040b55c8 ffffea00040b55c8 0000000000000000
[ 25.630413] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[ 25.631194] page dumped because: kasan: bad access detected
[ 25.631520]
[ 25.631732] Memory state around the buggy address:
[ 25.632660] ffff888102d57b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 25.633274] ffff888102d57b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 25.633700] >ffff888102d57c00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[ 25.634644] ^
[ 25.635038] ffff888102d57c80: 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00
[ 25.635835] ffff888102d57d00: 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1
[ 25.636575] ==================================================================
[ 23.345558] ==================================================================
[ 23.346509] BUG: KASAN: double-free in kfree_sensitive+0x2e/0x90
[ 23.347195] Free of addr ffff8881027b6340 by task kunit_try_catch/200
[ 23.347743]
[ 23.348194] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 23.348442] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.348500] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 23.348561] Call Trace:
[ 23.348594] <TASK>
[ 23.348635] dump_stack_lvl+0x73/0xb0
[ 23.348718] print_report+0xd1/0x640
[ 23.348775] ? __virt_addr_valid+0x1db/0x2d0
[ 23.348827] ? kfree_sensitive+0x2e/0x90
[ 23.348873] ? kasan_complete_mode_report_info+0x64/0x200
[ 23.348936] ? kfree_sensitive+0x2e/0x90
[ 23.348983] kasan_report_invalid_free+0xc0/0xf0
[ 23.349063] ? kfree_sensitive+0x2e/0x90
[ 23.349186] ? kfree_sensitive+0x2e/0x90
[ 23.349382] check_slab_allocation+0x101/0x130
[ 23.349472] __kasan_slab_pre_free+0x28/0x40
[ 23.349539] kfree+0xf1/0x3f0
[ 23.349644] ? kfree_sensitive+0x2e/0x90
[ 23.349677] kfree_sensitive+0x2e/0x90
[ 23.349704] kmalloc_double_kzfree+0x19d/0x360
[ 23.349735] ? __pfx_kmalloc_double_kzfree+0x10/0x10
[ 23.349768] ? __pfx_kmalloc_double_kzfree+0x10/0x10
[ 23.349803] kunit_try_run_case+0x1b3/0x490
[ 23.349833] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.349861] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 23.349895] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 23.349926] ? __kthread_parkme+0x82/0x160
[ 23.349957] ? preempt_count_sub+0x50/0x80
[ 23.349992] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.350022] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.350055] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 23.350106] kthread+0x324/0x6d0
[ 23.350153] ? trace_preempt_on+0x20/0xc0
[ 23.350208] ? __pfx_kthread+0x10/0x10
[ 23.350237] ? _raw_spin_unlock_irq+0x47/0x80
[ 23.350305] ? calculate_sigpending+0x7b/0xa0
[ 23.350366] ? __pfx_kthread+0x10/0x10
[ 23.350406] ret_from_fork+0x41/0x80
[ 23.350433] ? __pfx_kthread+0x10/0x10
[ 23.350463] ret_from_fork_asm+0x1a/0x30
[ 23.350508] </TASK>
[ 23.350524]
[ 23.370763] Allocated by task 200:
[ 23.371390] kasan_save_stack+0x3d/0x60
[ 23.371931] kasan_save_track+0x18/0x40
[ 23.372457] kasan_save_alloc_info+0x3b/0x50
[ 23.373149] __kasan_kmalloc+0xb7/0xc0
[ 23.373718] __kmalloc_cache_noprof+0x184/0x410
[ 23.374255] kmalloc_double_kzfree+0xaa/0x360
[ 23.374866] kunit_try_run_case+0x1b3/0x490
[ 23.375482] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.376324] kthread+0x324/0x6d0
[ 23.376656] ret_from_fork+0x41/0x80
[ 23.377022] ret_from_fork_asm+0x1a/0x30
[ 23.377324]
[ 23.378248] Freed by task 200:
[ 23.378842] kasan_save_stack+0x3d/0x60
[ 23.379723] kasan_save_track+0x18/0x40
[ 23.380046] kasan_save_free_info+0x3f/0x60
[ 23.381062] __kasan_slab_free+0x56/0x70
[ 23.381569] kfree+0x224/0x3f0
[ 23.381922] kfree_sensitive+0x67/0x90
[ 23.382411] kmalloc_double_kzfree+0x12c/0x360
[ 23.382969] kunit_try_run_case+0x1b3/0x490
[ 23.383513] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.384053] kthread+0x324/0x6d0
[ 23.384440] ret_from_fork+0x41/0x80
[ 23.384811] ret_from_fork_asm+0x1a/0x30
[ 23.386182]
[ 23.386687] The buggy address belongs to the object at ffff8881027b6340
[ 23.386687] which belongs to the cache kmalloc-16 of size 16
[ 23.387575] The buggy address is located 0 bytes inside of
[ 23.387575] 16-byte region [ffff8881027b6340, ffff8881027b6350)
[ 23.388625]
[ 23.388854] The buggy address belongs to the physical page:
[ 23.389858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b6
[ 23.390526] flags: 0x200000000000000(node=0|zone=2)
[ 23.391398] page_type: f5(slab)
[ 23.391792] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 23.392536] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[ 23.393040] page dumped because: kasan: bad access detected
[ 23.393740]
[ 23.393960] Memory state around the buggy address:
[ 23.395034] ffff8881027b6200: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[ 23.395763] ffff8881027b6280: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[ 23.396558] >ffff8881027b6300: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[ 23.397058] ^
[ 23.397760] ffff8881027b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.398216] ffff8881027b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.398994] ==================================================================
[ 25.245918] ==================================================================
[ 25.246976] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370
[ 25.248142] Free of addr ffff888102da0000 by task kunit_try_catch/245
[ 25.249246]
[ 25.249855] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 25.249978] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.250014] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.250074] Call Trace:
[ 25.250106] <TASK>
[ 25.250238] dump_stack_lvl+0x73/0xb0
[ 25.250523] print_report+0xd1/0x640
[ 25.250559] ? __virt_addr_valid+0x1db/0x2d0
[ 25.250595] ? mempool_double_free_helper+0x185/0x370
[ 25.250628] ? kasan_addr_to_slab+0x11/0xa0
[ 25.250663] ? mempool_double_free_helper+0x185/0x370
[ 25.250695] kasan_report_invalid_free+0xc0/0xf0
[ 25.250728] ? mempool_double_free_helper+0x185/0x370
[ 25.250764] ? mempool_double_free_helper+0x185/0x370
[ 25.250795] __kasan_mempool_poison_object+0x1b3/0x1d0
[ 25.250828] mempool_free+0x2ec/0x380
[ 25.250868] mempool_double_free_helper+0x185/0x370
[ 25.250900] ? __pfx_mempool_double_free_helper+0x10/0x10
[ 25.250938] ? finish_task_switch.isra.0+0x153/0x700
[ 25.250976] mempool_kmalloc_large_double_free+0xb1/0x100
[ 25.251010] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[ 25.251043] ? __switch_to+0x5d9/0xf60
[ 25.251077] ? __pfx_mempool_kmalloc+0x10/0x10
[ 25.251141] ? __pfx_mempool_kfree+0x10/0x10
[ 25.251201] ? __pfx_read_tsc+0x10/0x10
[ 25.251234] ? ktime_get_ts64+0x86/0x230
[ 25.251288] kunit_try_run_case+0x1b3/0x490
[ 25.251359] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.251404] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 25.251442] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 25.251475] ? __kthread_parkme+0x82/0x160
[ 25.251508] ? preempt_count_sub+0x50/0x80
[ 25.251542] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.251574] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.251610] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 25.251646] kthread+0x324/0x6d0
[ 25.251675] ? trace_preempt_on+0x20/0xc0
[ 25.251709] ? __pfx_kthread+0x10/0x10
[ 25.251740] ? _raw_spin_unlock_irq+0x47/0x80
[ 25.251769] ? calculate_sigpending+0x7b/0xa0
[ 25.251800] ? __pfx_kthread+0x10/0x10
[ 25.251831] ret_from_fork+0x41/0x80
[ 25.251857] ? __pfx_kthread+0x10/0x10
[ 25.251900] ret_from_fork_asm+0x1a/0x30
[ 25.251947] </TASK>
[ 25.251962]
[ 25.270734] The buggy address belongs to the physical page:
[ 25.271819] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102da0
[ 25.273074] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 25.274230] flags: 0x200000000000040(head|node=0|zone=2)
[ 25.274606] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 25.274993] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 25.275646] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 25.276522] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 25.278013] head: 0200000000000002 ffffea00040b6801 ffffffffffffffff 0000000000000000
[ 25.278936] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[ 25.279942] page dumped because: kasan: bad access detected
[ 25.280290]
[ 25.280598] Memory state around the buggy address:
[ 25.281907] ffff888102d9ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 25.283022] ffff888102d9ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 25.283395] >ffff888102da0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 25.284420] ^
[ 25.284850] ffff888102da0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 25.285786] ffff888102da0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 25.286765] ==================================================================
[ 25.294575] ==================================================================
[ 25.295279] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370
[ 25.297008] Free of addr ffff888102d68000 by task kunit_try_catch/247
[ 25.297823]
[ 25.298027] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 25.298140] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.298188] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.298247] Call Trace:
[ 25.298281] <TASK>
[ 25.298325] dump_stack_lvl+0x73/0xb0
[ 25.298423] print_report+0xd1/0x640
[ 25.298480] ? __virt_addr_valid+0x1db/0x2d0
[ 25.298542] ? mempool_double_free_helper+0x185/0x370
[ 25.298603] ? kasan_addr_to_slab+0x11/0xa0
[ 25.298660] ? mempool_double_free_helper+0x185/0x370
[ 25.298879] kasan_report_invalid_free+0xc0/0xf0
[ 25.298949] ? mempool_double_free_helper+0x185/0x370
[ 25.299018] ? mempool_double_free_helper+0x185/0x370
[ 25.299072] __kasan_mempool_poison_pages+0x115/0x130
[ 25.299124] mempool_free+0x290/0x380
[ 25.299189] mempool_double_free_helper+0x185/0x370
[ 25.299224] ? __pfx_mempool_double_free_helper+0x10/0x10
[ 25.299292] ? finish_task_switch.isra.0+0x153/0x700
[ 25.299369] mempool_page_alloc_double_free+0xac/0x100
[ 25.299408] ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[ 25.299442] ? __switch_to+0x5d9/0xf60
[ 25.299478] ? __pfx_mempool_alloc_pages+0x10/0x10
[ 25.299512] ? __pfx_mempool_free_pages+0x10/0x10
[ 25.299549] ? __pfx_read_tsc+0x10/0x10
[ 25.299584] ? ktime_get_ts64+0x86/0x230
[ 25.299642] kunit_try_run_case+0x1b3/0x490
[ 25.299678] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.299707] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 25.299745] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 25.299778] ? __kthread_parkme+0x82/0x160
[ 25.299811] ? preempt_count_sub+0x50/0x80
[ 25.299844] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.299874] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.299925] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 25.299961] kthread+0x324/0x6d0
[ 25.299989] ? trace_preempt_on+0x20/0xc0
[ 25.300023] ? __pfx_kthread+0x10/0x10
[ 25.300053] ? _raw_spin_unlock_irq+0x47/0x80
[ 25.300084] ? calculate_sigpending+0x7b/0xa0
[ 25.300148] ? __pfx_kthread+0x10/0x10
[ 25.300203] ret_from_fork+0x41/0x80
[ 25.300231] ? __pfx_kthread+0x10/0x10
[ 25.300271] ret_from_fork_asm+0x1a/0x30
[ 25.300344] </TASK>
[ 25.300373]
[ 25.322472] The buggy address belongs to the physical page:
[ 25.323488] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d68
[ 25.324139] flags: 0x200000000000000(node=0|zone=2)
[ 25.324830] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[ 25.325210] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 25.325947] page dumped because: kasan: bad access detected
[ 25.326767]
[ 25.326980] Memory state around the buggy address:
[ 25.327649] ffff888102d67f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 25.328569] ffff888102d67f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 25.329711] >ffff888102d68000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 25.330367] ^
[ 25.330952] ffff888102d68080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 25.331569] ffff888102d68100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 25.332214] ==================================================================
[ 25.189805] ==================================================================
[ 25.190585] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370
[ 25.191443] Free of addr ffff888102a5fd00 by task kunit_try_catch/243
[ 25.191995]
[ 25.193080] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 25.193255] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.193291] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.193715] Call Trace:
[ 25.193763] <TASK>
[ 25.193797] dump_stack_lvl+0x73/0xb0
[ 25.193859] print_report+0xd1/0x640
[ 25.193892] ? __virt_addr_valid+0x1db/0x2d0
[ 25.193927] ? mempool_double_free_helper+0x185/0x370
[ 25.193959] ? kasan_complete_mode_report_info+0x64/0x200
[ 25.193994] ? mempool_double_free_helper+0x185/0x370
[ 25.194024] kasan_report_invalid_free+0xc0/0xf0
[ 25.194056] ? mempool_double_free_helper+0x185/0x370
[ 25.194096] ? mempool_double_free_helper+0x185/0x370
[ 25.194180] ? mempool_double_free_helper+0x185/0x370
[ 25.194216] check_slab_allocation+0x101/0x130
[ 25.194252] __kasan_mempool_poison_object+0x91/0x1d0
[ 25.194285] mempool_free+0x2ec/0x380
[ 25.194323] mempool_double_free_helper+0x185/0x370
[ 25.194355] ? __pfx_mempool_double_free_helper+0x10/0x10
[ 25.194392] ? finish_task_switch.isra.0+0x153/0x700
[ 25.194430] mempool_kmalloc_double_free+0xb1/0x100
[ 25.194462] ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[ 25.194492] ? __switch_to+0x5d9/0xf60
[ 25.194527] ? __pfx_mempool_kmalloc+0x10/0x10
[ 25.194558] ? __pfx_mempool_kfree+0x10/0x10
[ 25.194592] ? __pfx_read_tsc+0x10/0x10
[ 25.194621] ? ktime_get_ts64+0x86/0x230
[ 25.194657] kunit_try_run_case+0x1b3/0x490
[ 25.194690] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.194720] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 25.194754] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 25.194787] ? __kthread_parkme+0x82/0x160
[ 25.194820] ? preempt_count_sub+0x50/0x80
[ 25.194854] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.194886] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.194921] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 25.194958] kthread+0x324/0x6d0
[ 25.194987] ? trace_preempt_on+0x20/0xc0
[ 25.195021] ? __pfx_kthread+0x10/0x10
[ 25.195052] ? _raw_spin_unlock_irq+0x47/0x80
[ 25.195084] ? calculate_sigpending+0x7b/0xa0
[ 25.195145] ? __pfx_kthread+0x10/0x10
[ 25.195197] ret_from_fork+0x41/0x80
[ 25.195223] ? __pfx_kthread+0x10/0x10
[ 25.195255] ret_from_fork_asm+0x1a/0x30
[ 25.195303] </TASK>
[ 25.195320]
[ 25.213666] Allocated by task 243:
[ 25.213950] kasan_save_stack+0x3d/0x60
[ 25.214438] kasan_save_track+0x18/0x40
[ 25.214888] kasan_save_alloc_info+0x3b/0x50
[ 25.215451] __kasan_mempool_unpoison_object+0x1a9/0x200
[ 25.215906] remove_element+0x11e/0x190
[ 25.216254] mempool_alloc_preallocated+0x4d/0x90
[ 25.216788] mempool_double_free_helper+0x8b/0x370
[ 25.217338] mempool_kmalloc_double_free+0xb1/0x100
[ 25.217847] kunit_try_run_case+0x1b3/0x490
[ 25.218283] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.218801] kthread+0x324/0x6d0
[ 25.219044] ret_from_fork+0x41/0x80
[ 25.219547] ret_from_fork_asm+0x1a/0x30
[ 25.220471]
[ 25.220696] Freed by task 243:
[ 25.221035] kasan_save_stack+0x3d/0x60
[ 25.221466] kasan_save_track+0x18/0x40
[ 25.221729] kasan_save_free_info+0x3f/0x60
[ 25.222038] __kasan_mempool_poison_object+0x131/0x1d0
[ 25.222397] mempool_free+0x2ec/0x380
[ 25.222655] mempool_double_free_helper+0x10a/0x370
[ 25.223175] mempool_kmalloc_double_free+0xb1/0x100
[ 25.223633] kunit_try_run_case+0x1b3/0x490
[ 25.224053] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.224448] kthread+0x324/0x6d0
[ 25.224694] ret_from_fork+0x41/0x80
[ 25.224937] ret_from_fork_asm+0x1a/0x30
[ 25.225259]
[ 25.225416] The buggy address belongs to the object at ffff888102a5fd00
[ 25.225416] which belongs to the cache kmalloc-128 of size 128
[ 25.226302] The buggy address is located 0 bytes inside of
[ 25.226302] 128-byte region [ffff888102a5fd00, ffff888102a5fd80)
[ 25.227312]
[ 25.227542] The buggy address belongs to the physical page:
[ 25.228048] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[ 25.228692] flags: 0x200000000000000(node=0|zone=2)
[ 25.229066] page_type: f5(slab)
[ 25.229370] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[ 25.229813] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 25.230403] page dumped because: kasan: bad access detected
[ 25.230907]
[ 25.231152] Memory state around the buggy address:
[ 25.231603] ffff888102a5fc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 25.232306] ffff888102a5fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.232914] >ffff888102a5fd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 25.233618] ^
[ 25.233958] ffff888102a5fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.234556] ffff888102a5fe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 25.234910] ==================================================================
[ 330.498578] ==================================================================
[ 330.499398] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info.isra.0+0x1c2/0x3d0
[ 330.500039] Read of size 12 at addr ffffffff95ec17e0 by task kunit_try_catch/3914
[ 330.500323]
[ 330.500432] CPU: 0 UID: 0 PID: 3914 Comm: kunit_try_catch Tainted: G B D W N 6.13.0 #1
[ 330.500492] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[ 330.500509] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 330.500533] Call Trace:
[ 330.500551] <TASK>
[ 330.500583] dump_stack_lvl+0x73/0xb0
[ 330.500629] print_report+0xd1/0x640
[ 330.500663] ? __virt_addr_valid+0x1db/0x2d0
[ 330.500700] ? kasan_addr_to_slab+0x11/0xa0
[ 330.500841] kasan_report+0x102/0x140
[ 330.500893] ? cs_dsp_mock_bin_add_name_or_info.isra.0+0x1c2/0x3d0
[ 330.500988] ? cs_dsp_mock_bin_add_name_or_info.isra.0+0x1c2/0x3d0
[ 330.501091] kasan_check_range+0x10c/0x1c0
[ 330.501162] __asan_memcpy+0x27/0x70
[ 330.501256] cs_dsp_mock_bin_add_name_or_info.isra.0+0x1c2/0x3d0
[ 330.501318] ? __pfx_cs_dsp_mock_bin_add_name_or_info.isra.0+0x10/0x10
[ 330.501372] ? __pfx_cs_dsp_mock_reg_addr_inc_per_unpacked_word+0x10/0x10
[ 330.501424] ? __pfx__cs_dsp_remove_wrapper+0x10/0x10
[ 330.501493] cs_dsp_mock_bin_add_info+0x12/0x20
[ 330.501549] bin_patch_name_and_info+0x1a2/0x8d0
[ 330.501615] ? __pfx_bin_patch_name_and_info+0x10/0x10
[ 330.501680] ? __pfx_kfree_action_wrapper+0x10/0x10
[ 330.501793] ? kunit_add_action_or_reset+0x1d/0x40
[ 330.501853] ? __pfx_read_tsc+0x10/0x10
[ 330.501900] ? ktime_get_ts64+0x86/0x230
[ 330.501965] kunit_try_run_case+0x1b3/0x490
[ 330.502018] ? __pfx_kunit_try_run_case+0x10/0x10
[ 330.502060] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 330.502128] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 330.502181] ? __kthread_parkme+0x82/0x160
[ 330.502236] ? preempt_count_sub+0x50/0x80
[ 330.502298] ? __pfx_kunit_try_run_case+0x10/0x10
[ 330.502394] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 330.502484] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 330.502544] kthread+0x324/0x6d0
[ 330.502596] ? trace_preempt_on+0x20/0xc0
[ 330.502658] ? __pfx_kthread+0x10/0x10
[ 330.502715] ? _raw_spin_unlock_irq+0x47/0x80
[ 330.502824] ? calculate_sigpending+0x7b/0xa0
[ 330.502880] ? __pfx_kthread+0x10/0x10
[ 330.502935] ret_from_fork+0x41/0x80
[ 330.502986] ? __pfx_kthread+0x10/0x10
[ 330.503041] ret_from_fork_asm+0x1a/0x30
[ 330.503127] </TASK>
[ 330.503164]
[ 330.523010] The buggy address belongs to the variable:
[ 330.523470] __loc.16+0x80/0x540
[ 330.523934]
[ 330.524159] The buggy address belongs to the physical page:
[ 330.524592] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x386c1
[ 330.526088] flags: 0x100000000002000(reserved|node=0|zone=1)
[ 330.526936] raw: 0100000000002000 ffffea0000e1b048 ffffea0000e1b048 0000000000000000
[ 330.527694] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 330.528556] page dumped because: kasan: bad access detected
[ 330.528969]
[ 330.529175] Memory state around the buggy address:
[ 330.529622] ffffffff95ec1680: f9 f9 f9 f9 00 00 00 f9 f9 f9 f9 f9 00 00 f9 f9
[ 330.530191] ffffffff95ec1700: f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9 00 00 f9 f9
[ 330.530674] >ffffffff95ec1780: f9 f9 f9 f9 00 01 f9 f9 f9 f9 f9 f9 00 02 f9 f9
[ 330.531303] ^
[ 330.531658] ffffffff95ec1800: f9 f9 f9 f9 00 00 00 00 00 07 f9 f9 f9 f9 f9 f9
[ 330.532261] ffffffff95ec1880: 00 f9 f9 f9 f9 f9 f9 f9 00 06 f9 f9 f9 f9 f9 f9
[ 330.532760] ==================================================================
[ 330.498578] ==================================================================
[ 330.499398] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info.isra.0+0x1c2/0x3d0
[ 330.500039] Read of size 12 at addr ffffffff95ec17e0 by task kunit_try_catch/3914
[ 330.500323]
[ 330.500432] CPU: 0 UID: 0 PID: 3914 Comm: kunit_try_catch Tainted: G B D W N 6.13.0 #1
[ 330.500492] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[ 330.500509] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 330.500533] Call Trace:
[ 330.500551] <TASK>
[ 330.500583] dump_stack_lvl+0x73/0xb0
[ 330.500629] print_report+0xd1/0x640
[ 330.500663] ? __virt_addr_valid+0x1db/0x2d0
[ 330.500700] ? kasan_addr_to_slab+0x11/0xa0
[ 330.500841] kasan_report+0x102/0x140
[ 330.500893] ? cs_dsp_mock_bin_add_name_or_info.isra.0+0x1c2/0x3d0
[ 330.500988] ? cs_dsp_mock_bin_add_name_or_info.isra.0+0x1c2/0x3d0
[ 330.501091] kasan_check_range+0x10c/0x1c0
[ 330.501162] __asan_memcpy+0x27/0x70
[ 330.501256] cs_dsp_mock_bin_add_name_or_info.isra.0+0x1c2/0x3d0
[ 330.501318] ? __pfx_cs_dsp_mock_bin_add_name_or_info.isra.0+0x10/0x10
[ 330.501372] ? __pfx_cs_dsp_mock_reg_addr_inc_per_unpacked_word+0x10/0x10
[ 330.501424] ? __pfx__cs_dsp_remove_wrapper+0x10/0x10
[ 330.501493] cs_dsp_mock_bin_add_info+0x12/0x20
[ 330.501549] bin_patch_name_and_info+0x1a2/0x8d0
[ 330.501615] ? __pfx_bin_patch_name_and_info+0x10/0x10
[ 330.501680] ? __pfx_kfree_action_wrapper+0x10/0x10
[ 330.501793] ? kunit_add_action_or_reset+0x1d/0x40
[ 330.501853] ? __pfx_read_tsc+0x10/0x10
[ 330.501900] ? ktime_get_ts64+0x86/0x230
[ 330.501965] kunit_try_run_case+0x1b3/0x490
[ 330.502018] ? __pfx_kunit_try_run_case+0x10/0x10
[ 330.502060] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 330.502128] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 330.502181] ? __kthread_parkme+0x82/0x160
[ 330.502236] ? preempt_count_sub+0x50/0x80
[ 330.502298] ? __pfx_kunit_try_run_case+0x10/0x10
[ 330.502394] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 330.502484] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 330.502544] kthread+0x324/0x6d0
[ 330.502596] ? trace_preempt_on+0x20/0xc0
[ 330.502658] ? __pfx_kthread+0x10/0x10
[ 330.502715] ? _raw_spin_unlock_irq+0x47/0x80
[ 330.502824] ? calculate_sigpending+0x7b/0xa0
[ 330.502880] ? __pfx_kthread+0x10/0x10
[ 330.502935] ret_from_fork+0x41/0x80
[ 330.502986] ? __pfx_kthread+0x10/0x10
[ 330.503041] ret_from_fork_asm+0x1a/0x30
[ 330.503127] </TASK>
[ 330.503164]
[ 330.523010] The buggy address belongs to the variable:
[ 330.523470] __loc.16+0x80/0x540
[ 330.523934]
[ 330.524159] The buggy address belongs to the physical page:
[ 330.524592] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x386c1
[ 330.526088] flags: 0x100000000002000(reserved|node=0|zone=1)
[ 330.526936] raw: 0100000000002000 ffffea0000e1b048 ffffea0000e1b048 0000000000000000
[ 330.527694] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 330.528556] page dumped because: kasan: bad access detected
[ 330.528969]
[ 330.529175] Memory state around the buggy address:
[ 330.529622] ffffffff95ec1680: f9 f9 f9 f9 00 00 00 f9 f9 f9 f9 f9 00 00 f9 f9
[ 330.530191] ffffffff95ec1700: f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9 00 00 f9 f9
[ 330.530674] >ffffffff95ec1780: f9 f9 f9 f9 00 01 f9 f9 f9 f9 f9 f9 00 02 f9 f9
[ 330.531303] ^
[ 330.531658] ffffffff95ec1800: f9 f9 f9 f9 00 00 00 00 00 07 f9 f9 f9 f9 f9 f9
[ 330.532261] ffffffff95ec1880: 00 f9 f9 f9 f9 f9 f9 f9 00 06 f9 f9 f9 f9 f9 f9
[ 330.532760] ==================================================================
[ 25.460582] ==================================================================
[ 25.461375] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x288/0x2d0
[ 25.462310] Read of size 1 at addr ffffffff97c89ced by task kunit_try_catch/253
[ 25.463753]
[ 25.464148] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 25.464273] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.464295] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.464329] Call Trace:
[ 25.464349] <TASK>
[ 25.464377] dump_stack_lvl+0x73/0xb0
[ 25.464431] print_report+0xd1/0x640
[ 25.464461] ? __virt_addr_valid+0x1db/0x2d0
[ 25.464495] ? kasan_addr_to_slab+0x11/0xa0
[ 25.464531] kasan_report+0x102/0x140
[ 25.464558] ? kasan_global_oob_right+0x288/0x2d0
[ 25.464592] ? kasan_global_oob_right+0x288/0x2d0
[ 25.464633] __asan_report_load1_noabort+0x18/0x20
[ 25.464663] kasan_global_oob_right+0x288/0x2d0
[ 25.464715] ? __pfx_kasan_global_oob_right+0x10/0x10
[ 25.464777] ? __pfx_kasan_global_oob_right+0x10/0x10
[ 25.464837] kunit_try_run_case+0x1b3/0x490
[ 25.464886] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.464928] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 25.464977] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 25.465026] ? __kthread_parkme+0x82/0x160
[ 25.465074] ? preempt_count_sub+0x50/0x80
[ 25.465128] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.465244] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.465321] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 25.465384] kthread+0x324/0x6d0
[ 25.465439] ? trace_preempt_on+0x20/0xc0
[ 25.465505] ? __pfx_kthread+0x10/0x10
[ 25.465563] ? _raw_spin_unlock_irq+0x47/0x80
[ 25.465682] ? calculate_sigpending+0x7b/0xa0
[ 25.465761] ? __pfx_kthread+0x10/0x10
[ 25.465823] ret_from_fork+0x41/0x80
[ 25.465876] ? __pfx_kthread+0x10/0x10
[ 25.465934] ret_from_fork_asm+0x1a/0x30
[ 25.466014] </TASK>
[ 25.466046]
[ 25.483529] The buggy address belongs to the variable:
[ 25.484066] global_array+0xd/0x40
[ 25.485300]
[ 25.485580] The buggy address belongs to the physical page:
[ 25.486735] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x3a489
[ 25.488000] flags: 0x100000000002000(reserved|node=0|zone=1)
[ 25.489039] raw: 0100000000002000 ffffea0000e92248 ffffea0000e92248 0000000000000000
[ 25.489452] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 25.489722] page dumped because: kasan: bad access detected
[ 25.489893]
[ 25.489972] Memory state around the buggy address:
[ 25.490128] ffffffff97c89b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 25.491377] ffffffff97c89c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 25.493270] >ffffffff97c89c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 f9
[ 25.493900] ^
[ 25.494528] ffffffff97c89d00: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9
[ 25.494790] ffffffff97c89d80: f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9
[ 25.494996] ==================================================================
[ 23.006667] ==================================================================
[ 23.007615] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x172/0x330
[ 23.008418] Read of size 18446744073709551614 at addr ffff888101b8fd04 by task kunit_try_catch/188
[ 23.009752]
[ 23.009949] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 23.010061] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.010129] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 23.010213] Call Trace:
[ 23.010247] <TASK>
[ 23.010334] dump_stack_lvl+0x73/0xb0
[ 23.010425] print_report+0xd1/0x640
[ 23.010481] ? __virt_addr_valid+0x1db/0x2d0
[ 23.010539] ? kasan_complete_mode_report_info+0x2a/0x200
[ 23.010642] kasan_report+0x102/0x140
[ 23.010698] ? kmalloc_memmove_negative_size+0x172/0x330
[ 23.010762] ? kmalloc_memmove_negative_size+0x172/0x330
[ 23.010835] kasan_check_range+0x10c/0x1c0
[ 23.010894] __asan_memmove+0x27/0x70
[ 23.010953] kmalloc_memmove_negative_size+0x172/0x330
[ 23.011014] ? __pfx_kmalloc_memmove_negative_size+0x10/0x10
[ 23.011082] ? __pfx_kmalloc_memmove_negative_size+0x10/0x10
[ 23.011222] kunit_try_run_case+0x1b3/0x490
[ 23.011325] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.011380] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 23.011423] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 23.011456] ? __kthread_parkme+0x82/0x160
[ 23.011487] ? preempt_count_sub+0x50/0x80
[ 23.011523] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.011552] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.011587] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 23.011621] kthread+0x324/0x6d0
[ 23.011648] ? trace_preempt_on+0x20/0xc0
[ 23.011680] ? __pfx_kthread+0x10/0x10
[ 23.011709] ? _raw_spin_unlock_irq+0x47/0x80
[ 23.011739] ? calculate_sigpending+0x7b/0xa0
[ 23.011769] ? __pfx_kthread+0x10/0x10
[ 23.011798] ret_from_fork+0x41/0x80
[ 23.011823] ? __pfx_kthread+0x10/0x10
[ 23.011852] ret_from_fork_asm+0x1a/0x30
[ 23.011908] </TASK>
[ 23.011924]
[ 23.027991] Allocated by task 188:
[ 23.028541] kasan_save_stack+0x3d/0x60
[ 23.028896] kasan_save_track+0x18/0x40
[ 23.029309] kasan_save_alloc_info+0x3b/0x50
[ 23.029709] __kasan_kmalloc+0xb7/0xc0
[ 23.030030] __kmalloc_cache_noprof+0x184/0x410
[ 23.030578] kmalloc_memmove_negative_size+0xad/0x330
[ 23.031047] kunit_try_run_case+0x1b3/0x490
[ 23.031572] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.031837] kthread+0x324/0x6d0
[ 23.032037] ret_from_fork+0x41/0x80
[ 23.032493] ret_from_fork_asm+0x1a/0x30
[ 23.032905]
[ 23.033182] The buggy address belongs to the object at ffff888101b8fd00
[ 23.033182] which belongs to the cache kmalloc-64 of size 64
[ 23.034291] The buggy address is located 4 bytes inside of
[ 23.034291] 64-byte region [ffff888101b8fd00, ffff888101b8fd40)
[ 23.034955]
[ 23.035152] The buggy address belongs to the physical page:
[ 23.035683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b8f
[ 23.036629] flags: 0x200000000000000(node=0|zone=2)
[ 23.037484] page_type: f5(slab)
[ 23.037757] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 23.041295] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 23.042111] page dumped because: kasan: bad access detected
[ 23.042768]
[ 23.042994] Memory state around the buggy address:
[ 23.043756] ffff888101b8fc00: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[ 23.044531] ffff888101b8fc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 23.045064] >ffff888101b8fd00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[ 23.045531] ^
[ 23.045889] ffff888101b8fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.046526] ffff888101b8fe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.046878] ==================================================================
[ 29.475031] ==================================================================
[ 29.476132] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260
[ 29.476918] Read of size 8 at addr ffff888101bab178 by task kunit_try_catch/289
[ 29.477380]
[ 29.477640] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 29.477802] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.477842] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 29.477902] Call Trace:
[ 29.477940] <TASK>
[ 29.477987] dump_stack_lvl+0x73/0xb0
[ 29.478074] print_report+0xd1/0x640
[ 29.478243] ? __virt_addr_valid+0x1db/0x2d0
[ 29.478349] ? kasan_complete_mode_report_info+0x2a/0x200
[ 29.478427] kasan_report+0x102/0x140
[ 29.478488] ? copy_to_kernel_nofault+0x225/0x260
[ 29.478560] ? copy_to_kernel_nofault+0x225/0x260
[ 29.478640] __asan_report_load8_noabort+0x18/0x20
[ 29.478706] copy_to_kernel_nofault+0x225/0x260
[ 29.478835] copy_to_kernel_nofault_oob+0x179/0x4e0
[ 29.478909] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[ 29.479352] ? irqentry_exit+0x2a/0x60
[ 29.479443] ? sysvec_apic_timer_interrupt+0x50/0x90
[ 29.479513] ? trace_hardirqs_on+0x37/0xe0
[ 29.479591] ? __pfx_read_tsc+0x10/0x10
[ 29.479629] ? ktime_get_ts64+0x86/0x230
[ 29.479715] kunit_try_run_case+0x1b3/0x490
[ 29.479752] ? __pfx_kunit_try_run_case+0x10/0x10
[ 29.479783] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 29.479819] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 29.479854] ? __kthread_parkme+0x82/0x160
[ 29.479896] ? preempt_count_sub+0x50/0x80
[ 29.479935] ? __pfx_kunit_try_run_case+0x10/0x10
[ 29.479967] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 29.480004] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 29.480041] kthread+0x324/0x6d0
[ 29.480071] ? trace_preempt_on+0x20/0xc0
[ 29.480128] ? __pfx_kthread+0x10/0x10
[ 29.480182] ? _raw_spin_unlock_irq+0x47/0x80
[ 29.480219] ? calculate_sigpending+0x7b/0xa0
[ 29.480257] ? __pfx_kthread+0x10/0x10
[ 29.480340] ret_from_fork+0x41/0x80
[ 29.480387] ? __pfx_kthread+0x10/0x10
[ 29.480433] ret_from_fork_asm+0x1a/0x30
[ 29.480504] </TASK>
[ 29.480531]
[ 29.500540] Allocated by task 289:
[ 29.501376] kasan_save_stack+0x3d/0x60
[ 29.501826] kasan_save_track+0x18/0x40
[ 29.502313] kasan_save_alloc_info+0x3b/0x50
[ 29.502728] __kasan_kmalloc+0xb7/0xc0
[ 29.503005] __kmalloc_cache_noprof+0x184/0x410
[ 29.504406] copy_to_kernel_nofault_oob+0xc5/0x4e0
[ 29.504834] kunit_try_run_case+0x1b3/0x490
[ 29.505565] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 29.506667] kthread+0x324/0x6d0
[ 29.506917] ret_from_fork+0x41/0x80
[ 29.507664] ret_from_fork_asm+0x1a/0x30
[ 29.508077]
[ 29.508402] The buggy address belongs to the object at ffff888101bab100
[ 29.508402] which belongs to the cache kmalloc-128 of size 128
[ 29.509089] The buggy address is located 0 bytes to the right of
[ 29.509089] allocated 120-byte region [ffff888101bab100, ffff888101bab178)
[ 29.510761]
[ 29.511624] The buggy address belongs to the physical page:
[ 29.511946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bab
[ 29.513067] flags: 0x200000000000000(node=0|zone=2)
[ 29.513638] page_type: f5(slab)
[ 29.514182] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[ 29.514907] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 29.516007] page dumped because: kasan: bad access detected
[ 29.516481]
[ 29.517218] Memory state around the buggy address:
[ 29.517820] ffff888101bab000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 29.518796] ffff888101bab080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.519460] >ffff888101bab100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 29.520197] ^
[ 29.520879] ffff888101bab180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.522422] ffff888101bab200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.522870] ==================================================================
[ 29.524047] ==================================================================
[ 29.525504] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260
[ 29.526737] Write of size 8 at addr ffff888101bab178 by task kunit_try_catch/289
[ 29.527575]
[ 29.528329] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 29.528481] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.528520] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 29.528576] Call Trace:
[ 29.528617] <TASK>
[ 29.528666] dump_stack_lvl+0x73/0xb0
[ 29.528798] print_report+0xd1/0x640
[ 29.528834] ? __virt_addr_valid+0x1db/0x2d0
[ 29.528889] ? kasan_complete_mode_report_info+0x2a/0x200
[ 29.528945] kasan_report+0x102/0x140
[ 29.528974] ? copy_to_kernel_nofault+0x99/0x260
[ 29.529012] ? copy_to_kernel_nofault+0x99/0x260
[ 29.529054] kasan_check_range+0x10c/0x1c0
[ 29.529086] __kasan_check_write+0x18/0x20
[ 29.529206] copy_to_kernel_nofault+0x99/0x260
[ 29.529292] copy_to_kernel_nofault_oob+0x214/0x4e0
[ 29.529366] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[ 29.529426] ? irqentry_exit+0x2a/0x60
[ 29.529476] ? sysvec_apic_timer_interrupt+0x50/0x90
[ 29.529530] ? trace_hardirqs_on+0x37/0xe0
[ 29.529596] ? __pfx_read_tsc+0x10/0x10
[ 29.529684] ? ktime_get_ts64+0x86/0x230
[ 29.529744] kunit_try_run_case+0x1b3/0x490
[ 29.529794] ? __pfx_kunit_try_run_case+0x10/0x10
[ 29.529837] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 29.529889] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 29.529925] ? __kthread_parkme+0x82/0x160
[ 29.529960] ? preempt_count_sub+0x50/0x80
[ 29.529997] ? __pfx_kunit_try_run_case+0x10/0x10
[ 29.530030] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 29.530068] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 29.530119] kthread+0x324/0x6d0
[ 29.530153] ? trace_preempt_on+0x20/0xc0
[ 29.530209] ? __pfx_kthread+0x10/0x10
[ 29.530242] ? _raw_spin_unlock_irq+0x47/0x80
[ 29.530329] ? calculate_sigpending+0x7b/0xa0
[ 29.530383] ? __pfx_kthread+0x10/0x10
[ 29.530418] ret_from_fork+0x41/0x80
[ 29.530448] ? __pfx_kthread+0x10/0x10
[ 29.530480] ret_from_fork_asm+0x1a/0x30
[ 29.530527] </TASK>
[ 29.530545]
[ 29.549439] Allocated by task 289:
[ 29.550121] kasan_save_stack+0x3d/0x60
[ 29.550809] kasan_save_track+0x18/0x40
[ 29.551659] kasan_save_alloc_info+0x3b/0x50
[ 29.551939] __kasan_kmalloc+0xb7/0xc0
[ 29.552807] __kmalloc_cache_noprof+0x184/0x410
[ 29.553548] copy_to_kernel_nofault_oob+0xc5/0x4e0
[ 29.553957] kunit_try_run_case+0x1b3/0x490
[ 29.554653] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 29.555030] kthread+0x324/0x6d0
[ 29.555652] ret_from_fork+0x41/0x80
[ 29.555910] ret_from_fork_asm+0x1a/0x30
[ 29.556411]
[ 29.557503] The buggy address belongs to the object at ffff888101bab100
[ 29.557503] which belongs to the cache kmalloc-128 of size 128
[ 29.558484] The buggy address is located 0 bytes to the right of
[ 29.558484] allocated 120-byte region [ffff888101bab100, ffff888101bab178)
[ 29.560129]
[ 29.560696] The buggy address belongs to the physical page:
[ 29.561036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bab
[ 29.562354] flags: 0x200000000000000(node=0|zone=2)
[ 29.562914] page_type: f5(slab)
[ 29.563793] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[ 29.564711] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 29.565455] page dumped because: kasan: bad access detected
[ 29.566133]
[ 29.566787] Memory state around the buggy address:
[ 29.567599] ffff888101bab000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 29.568114] ffff888101bab080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.569525] >ffff888101bab100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 29.569974] ^
[ 29.570876] ffff888101bab180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.572063] ffff888101bab200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.573189] ==================================================================
[ 28.933817] ==================================================================
[ 28.935507] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eab/0x5450
[ 28.936238] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 28.936844]
[ 28.937048] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 28.937132] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.937153] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 28.937207] Call Trace:
[ 28.937232] <TASK>
[ 28.937261] dump_stack_lvl+0x73/0xb0
[ 28.937312] print_report+0xd1/0x640
[ 28.937343] ? __virt_addr_valid+0x1db/0x2d0
[ 28.937376] ? kasan_complete_mode_report_info+0x2a/0x200
[ 28.937416] kasan_report+0x102/0x140
[ 28.937442] ? kasan_atomics_helper+0x1eab/0x5450
[ 28.937479] ? kasan_atomics_helper+0x1eab/0x5450
[ 28.937521] kasan_check_range+0x10c/0x1c0
[ 28.937553] __kasan_check_write+0x18/0x20
[ 28.937584] kasan_atomics_helper+0x1eab/0x5450
[ 28.937620] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 28.937655] ? __kmalloc_cache_noprof+0x184/0x410
[ 28.937690] ? kasan_atomics+0x153/0x310
[ 28.937726] kasan_atomics+0x1dd/0x310
[ 28.937757] ? __pfx_kasan_atomics+0x10/0x10
[ 28.937788] ? __pfx_read_tsc+0x10/0x10
[ 28.937819] ? ktime_get_ts64+0x86/0x230
[ 28.937855] kunit_try_run_case+0x1b3/0x490
[ 28.937886] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.937916] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 28.937950] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 28.937984] ? __kthread_parkme+0x82/0x160
[ 28.938015] ? preempt_count_sub+0x50/0x80
[ 28.938051] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.938083] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.938204] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 28.938281] kthread+0x324/0x6d0
[ 28.938675] ? trace_preempt_on+0x20/0xc0
[ 28.938774] ? __pfx_kthread+0x10/0x10
[ 28.938888] ? _raw_spin_unlock_irq+0x47/0x80
[ 28.938972] ? calculate_sigpending+0x7b/0xa0
[ 28.939039] ? __pfx_kthread+0x10/0x10
[ 28.939104] ret_from_fork+0x41/0x80
[ 28.939180] ? __pfx_kthread+0x10/0x10
[ 28.939361] ret_from_fork_asm+0x1a/0x30
[ 28.939441] </TASK>
[ 28.939465]
[ 28.958392] Allocated by task 273:
[ 28.958712] kasan_save_stack+0x3d/0x60
[ 28.959269] kasan_save_track+0x18/0x40
[ 28.959610] kasan_save_alloc_info+0x3b/0x50
[ 28.960154] __kasan_kmalloc+0xb7/0xc0
[ 28.960603] __kmalloc_cache_noprof+0x184/0x410
[ 28.961020] kasan_atomics+0x96/0x310
[ 28.961448] kunit_try_run_case+0x1b3/0x490
[ 28.961724] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.962386] kthread+0x324/0x6d0
[ 28.962847] ret_from_fork+0x41/0x80
[ 28.963367] ret_from_fork_asm+0x1a/0x30
[ 28.963898]
[ 28.964216] The buggy address belongs to the object at ffff888102a6c880
[ 28.964216] which belongs to the cache kmalloc-64 of size 64
[ 28.965452] The buggy address is located 0 bytes to the right of
[ 28.965452] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 28.966682]
[ 28.966929] The buggy address belongs to the physical page:
[ 28.967590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 28.968187] flags: 0x200000000000000(node=0|zone=2)
[ 28.968783] page_type: f5(slab)
[ 28.969278] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 28.970098] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 28.970638] page dumped because: kasan: bad access detected
[ 28.970948]
[ 28.971207] Memory state around the buggy address:
[ 28.971582] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.972098] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.972654] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.973018] ^
[ 28.973535] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.974262] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.974912] ==================================================================
---
[ 29.339903] ==================================================================
[ 29.341218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224d/0x5450
[ 29.341816] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 29.342408]
[ 29.342660] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 29.342776] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.342812] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 29.342878] Call Trace:
[ 29.342920] <TASK>
[ 29.342970] dump_stack_lvl+0x73/0xb0
[ 29.343056] print_report+0xd1/0x640
[ 29.343208] ? __virt_addr_valid+0x1db/0x2d0
[ 29.343276] ? kasan_complete_mode_report_info+0x2a/0x200
[ 29.343352] kasan_report+0x102/0x140
[ 29.343405] ? kasan_atomics_helper+0x224d/0x5450
[ 29.343476] ? kasan_atomics_helper+0x224d/0x5450
[ 29.343557] kasan_check_range+0x10c/0x1c0
[ 29.343622] __kasan_check_write+0x18/0x20
[ 29.343681] kasan_atomics_helper+0x224d/0x5450
[ 29.343745] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 29.343812] ? __kmalloc_cache_noprof+0x184/0x410
[ 29.343890] ? kasan_atomics+0x153/0x310
[ 29.344005] kasan_atomics+0x1dd/0x310
[ 29.344071] ? __pfx_kasan_atomics+0x10/0x10
[ 29.344201] ? __pfx_read_tsc+0x10/0x10
[ 29.344263] ? ktime_get_ts64+0x86/0x230
[ 29.344356] kunit_try_run_case+0x1b3/0x490
[ 29.344443] ? __pfx_kunit_try_run_case+0x10/0x10
[ 29.344502] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 29.344562] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 29.344616] ? __kthread_parkme+0x82/0x160
[ 29.344653] ? preempt_count_sub+0x50/0x80
[ 29.344692] ? __pfx_kunit_try_run_case+0x10/0x10
[ 29.344725] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 29.344763] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 29.344801] kthread+0x324/0x6d0
[ 29.344831] ? trace_preempt_on+0x20/0xc0
[ 29.344867] ? __pfx_kthread+0x10/0x10
[ 29.344898] ? _raw_spin_unlock_irq+0x47/0x80
[ 29.344931] ? calculate_sigpending+0x7b/0xa0
[ 29.344964] ? __pfx_kthread+0x10/0x10
[ 29.344997] ret_from_fork+0x41/0x80
[ 29.345024] ? __pfx_kthread+0x10/0x10
[ 29.345056] ret_from_fork_asm+0x1a/0x30
[ 29.345130] </TASK>
[ 29.345151]
[ 29.362711] Allocated by task 273:
[ 29.363297] kasan_save_stack+0x3d/0x60
[ 29.363934] kasan_save_track+0x18/0x40
[ 29.364354] kasan_save_alloc_info+0x3b/0x50
[ 29.364936] __kasan_kmalloc+0xb7/0xc0
[ 29.365644] __kmalloc_cache_noprof+0x184/0x410
[ 29.366085] kasan_atomics+0x96/0x310
[ 29.366441] kunit_try_run_case+0x1b3/0x490
[ 29.367135] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 29.368287] kthread+0x324/0x6d0
[ 29.368827] ret_from_fork+0x41/0x80
[ 29.369341] ret_from_fork_asm+0x1a/0x30
[ 29.369714]
[ 29.369893] The buggy address belongs to the object at ffff888102a6c880
[ 29.369893] which belongs to the cache kmalloc-64 of size 64
[ 29.370541] The buggy address is located 0 bytes to the right of
[ 29.370541] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 29.371266]
[ 29.371434] The buggy address belongs to the physical page:
[ 29.372269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 29.372979] flags: 0x200000000000000(node=0|zone=2)
[ 29.374010] page_type: f5(slab)
[ 29.374900] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 29.375578] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 29.376222] page dumped because: kasan: bad access detected
[ 29.376724]
[ 29.376891] Memory state around the buggy address:
[ 29.377861] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.378564] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.379398] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 29.380052] ^
[ 29.380574] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.381351] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.381572] ==================================================================
---
[ 28.642757] ==================================================================
[ 28.643444] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a80/0x5450
[ 28.643847] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 28.644303]
[ 28.644479] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 28.644589] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.644624] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 28.644714] Call Trace:
[ 28.644760] <TASK>
[ 28.644808] dump_stack_lvl+0x73/0xb0
[ 28.644887] print_report+0xd1/0x640
[ 28.644947] ? __virt_addr_valid+0x1db/0x2d0
[ 28.645010] ? kasan_complete_mode_report_info+0x2a/0x200
[ 28.645121] kasan_report+0x102/0x140
[ 28.645214] ? kasan_atomics_helper+0x1a80/0x5450
[ 28.645288] ? kasan_atomics_helper+0x1a80/0x5450
[ 28.645369] kasan_check_range+0x10c/0x1c0
[ 28.645432] __kasan_check_write+0x18/0x20
[ 28.645494] kasan_atomics_helper+0x1a80/0x5450
[ 28.645562] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 28.645627] ? __kmalloc_cache_noprof+0x184/0x410
[ 28.645696] ? kasan_atomics+0x153/0x310
[ 28.645764] kasan_atomics+0x1dd/0x310
[ 28.645823] ? __pfx_kasan_atomics+0x10/0x10
[ 28.645889] ? __pfx_read_tsc+0x10/0x10
[ 28.645950] ? ktime_get_ts64+0x86/0x230
[ 28.646019] kunit_try_run_case+0x1b3/0x490
[ 28.646081] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.648308] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 28.648380] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 28.648451] ? __kthread_parkme+0x82/0x160
[ 28.648515] ? preempt_count_sub+0x50/0x80
[ 28.648586] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.648649] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.648722] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 28.648794] kthread+0x324/0x6d0
[ 28.648854] ? trace_preempt_on+0x20/0xc0
[ 28.648920] ? __pfx_kthread+0x10/0x10
[ 28.648984] ? _raw_spin_unlock_irq+0x47/0x80
[ 28.649043] ? calculate_sigpending+0x7b/0xa0
[ 28.649299] ? __pfx_kthread+0x10/0x10
[ 28.649381] ret_from_fork+0x41/0x80
[ 28.649431] ? __pfx_kthread+0x10/0x10
[ 28.649490] ret_from_fork_asm+0x1a/0x30
[ 28.649572] </TASK>
[ 28.649603]
[ 28.666862] Allocated by task 273:
[ 28.667201] kasan_save_stack+0x3d/0x60
[ 28.667677] kasan_save_track+0x18/0x40
[ 28.668216] kasan_save_alloc_info+0x3b/0x50
[ 28.668707] __kasan_kmalloc+0xb7/0xc0
[ 28.669205] __kmalloc_cache_noprof+0x184/0x410
[ 28.669752] kasan_atomics+0x96/0x310
[ 28.670241] kunit_try_run_case+0x1b3/0x490
[ 28.670715] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.671348] kthread+0x324/0x6d0
[ 28.671756] ret_from_fork+0x41/0x80
[ 28.672252] ret_from_fork_asm+0x1a/0x30
[ 28.672711]
[ 28.672953] The buggy address belongs to the object at ffff888102a6c880
[ 28.672953] which belongs to the cache kmalloc-64 of size 64
[ 28.674078] The buggy address is located 0 bytes to the right of
[ 28.674078] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 28.675317]
[ 28.675558] The buggy address belongs to the physical page:
[ 28.676138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 28.676804] flags: 0x200000000000000(node=0|zone=2)
[ 28.677183] page_type: f5(slab)
[ 28.677548] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 28.678070] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 28.678640] page dumped because: kasan: bad access detected
[ 28.678962]
[ 28.679250] Memory state around the buggy address:
[ 28.679714] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.680248] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.680883] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.681319] ^
[ 28.681769] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.682815] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.683825] ==================================================================
---
[ 28.026889] ==================================================================
[ 28.028013] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e7/0x5450
[ 28.028862] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 28.029461]
[ 28.030395] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 28.030470] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.030491] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 28.030526] Call Trace:
[ 28.030550] <TASK>
[ 28.030577] dump_stack_lvl+0x73/0xb0
[ 28.030624] print_report+0xd1/0x640
[ 28.030655] ? __virt_addr_valid+0x1db/0x2d0
[ 28.030688] ? kasan_complete_mode_report_info+0x2a/0x200
[ 28.030727] kasan_report+0x102/0x140
[ 28.030755] ? kasan_atomics_helper+0x12e7/0x5450
[ 28.030791] ? kasan_atomics_helper+0x12e7/0x5450
[ 28.030833] kasan_check_range+0x10c/0x1c0
[ 28.030865] __kasan_check_write+0x18/0x20
[ 28.030896] kasan_atomics_helper+0x12e7/0x5450
[ 28.030932] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 28.030968] ? __kmalloc_cache_noprof+0x184/0x410
[ 28.031003] ? kasan_atomics+0x153/0x310
[ 28.031039] kasan_atomics+0x1dd/0x310
[ 28.031070] ? __pfx_kasan_atomics+0x10/0x10
[ 28.031115] ? __pfx_read_tsc+0x10/0x10
[ 28.031198] ? ktime_get_ts64+0x86/0x230
[ 28.031240] kunit_try_run_case+0x1b3/0x490
[ 28.031274] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.031304] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 28.031339] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 28.031373] ? __kthread_parkme+0x82/0x160
[ 28.031405] ? preempt_count_sub+0x50/0x80
[ 28.031443] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.031474] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.031511] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 28.031548] kthread+0x324/0x6d0
[ 28.031579] ? trace_preempt_on+0x20/0xc0
[ 28.031614] ? __pfx_kthread+0x10/0x10
[ 28.031646] ? _raw_spin_unlock_irq+0x47/0x80
[ 28.031678] ? calculate_sigpending+0x7b/0xa0
[ 28.031709] ? __pfx_kthread+0x10/0x10
[ 28.031742] ret_from_fork+0x41/0x80
[ 28.031770] ? __pfx_kthread+0x10/0x10
[ 28.031801] ret_from_fork_asm+0x1a/0x30
[ 28.031847] </TASK>
[ 28.031863]
[ 28.051444] Allocated by task 273:
[ 28.051834] kasan_save_stack+0x3d/0x60
[ 28.053688] kasan_save_track+0x18/0x40
[ 28.054411] kasan_save_alloc_info+0x3b/0x50
[ 28.054704] __kasan_kmalloc+0xb7/0xc0
[ 28.054970] __kmalloc_cache_noprof+0x184/0x410
[ 28.057051] kasan_atomics+0x96/0x310
[ 28.058475] kunit_try_run_case+0x1b3/0x490
[ 28.059861] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.060732] kthread+0x324/0x6d0
[ 28.062112] ret_from_fork+0x41/0x80
[ 28.062754] ret_from_fork_asm+0x1a/0x30
[ 28.063140]
[ 28.063368] The buggy address belongs to the object at ffff888102a6c880
[ 28.063368] which belongs to the cache kmalloc-64 of size 64
[ 28.064393] The buggy address is located 0 bytes to the right of
[ 28.064393] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 28.065488]
[ 28.066303] The buggy address belongs to the physical page:
[ 28.066759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 28.067289] flags: 0x200000000000000(node=0|zone=2)
[ 28.068093] page_type: f5(slab)
[ 28.068615] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 28.069430] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 28.070013] page dumped because: kasan: bad access detected
[ 28.070666]
[ 28.070962] Memory state around the buggy address:
[ 28.071440] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.072076] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.072683] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.073242] ^
[ 28.073710] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.074097] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.074809] ==================================================================
---
[ 27.858570] ==================================================================
[ 27.859857] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1149/0x5450
[ 27.860452] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 27.861038]
[ 27.861322] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 27.861434] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.861473] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.861532] Call Trace:
[ 27.861574] <TASK>
[ 27.861622] dump_stack_lvl+0x73/0xb0
[ 27.861709] print_report+0xd1/0x640
[ 27.861773] ? __virt_addr_valid+0x1db/0x2d0
[ 27.861920] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.862000] kasan_report+0x102/0x140
[ 27.862059] ? kasan_atomics_helper+0x1149/0x5450
[ 27.862127] ? kasan_atomics_helper+0x1149/0x5450
[ 27.862221] kasan_check_range+0x10c/0x1c0
[ 27.862287] __kasan_check_write+0x18/0x20
[ 27.862349] kasan_atomics_helper+0x1149/0x5450
[ 27.862420] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 27.862488] ? __kmalloc_cache_noprof+0x184/0x410
[ 27.862557] ? kasan_atomics+0x153/0x310
[ 27.862628] kasan_atomics+0x1dd/0x310
[ 27.862688] ? __pfx_kasan_atomics+0x10/0x10
[ 27.862754] ? __pfx_read_tsc+0x10/0x10
[ 27.862815] ? ktime_get_ts64+0x86/0x230
[ 27.862885] kunit_try_run_case+0x1b3/0x490
[ 27.862949] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.863006] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.863076] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.863198] ? __kthread_parkme+0x82/0x160
[ 27.863249] ? preempt_count_sub+0x50/0x80
[ 27.863291] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.863324] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.863363] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.863401] kthread+0x324/0x6d0
[ 27.863430] ? trace_preempt_on+0x20/0xc0
[ 27.863466] ? __pfx_kthread+0x10/0x10
[ 27.863498] ? _raw_spin_unlock_irq+0x47/0x80
[ 27.863531] ? calculate_sigpending+0x7b/0xa0
[ 27.863563] ? __pfx_kthread+0x10/0x10
[ 27.863595] ret_from_fork+0x41/0x80
[ 27.863623] ? __pfx_kthread+0x10/0x10
[ 27.863655] ret_from_fork_asm+0x1a/0x30
[ 27.863701] </TASK>
[ 27.863719]
[ 27.879678] Allocated by task 273:
[ 27.880215] kasan_save_stack+0x3d/0x60
[ 27.880747] kasan_save_track+0x18/0x40
[ 27.881295] kasan_save_alloc_info+0x3b/0x50
[ 27.881809] __kasan_kmalloc+0xb7/0xc0
[ 27.882350] __kmalloc_cache_noprof+0x184/0x410
[ 27.882861] kasan_atomics+0x96/0x310
[ 27.883373] kunit_try_run_case+0x1b3/0x490
[ 27.883874] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.884576] kthread+0x324/0x6d0
[ 27.885019] ret_from_fork+0x41/0x80
[ 27.885536] ret_from_fork_asm+0x1a/0x30
[ 27.886019]
[ 27.886324] The buggy address belongs to the object at ffff888102a6c880
[ 27.886324] which belongs to the cache kmalloc-64 of size 64
[ 27.887217] The buggy address is located 0 bytes to the right of
[ 27.887217] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 27.888486]
[ 27.888655] The buggy address belongs to the physical page:
[ 27.889299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 27.890049] flags: 0x200000000000000(node=0|zone=2)
[ 27.890730] page_type: f5(slab)
[ 27.891460] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 27.892187] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 27.892847] page dumped because: kasan: bad access detected
[ 27.893844]
[ 27.894104] Memory state around the buggy address:
[ 27.894616] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.895202] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.896021] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 27.896687] ^
[ 27.897093] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.897901] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.898633] ==================================================================
---
[ 29.170023] ==================================================================
[ 29.170934] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c9/0x5450
[ 29.171577] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 29.172202]
[ 29.172513] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 29.172653] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.172693] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 29.172754] Call Trace:
[ 29.172797] <TASK>
[ 29.172846] dump_stack_lvl+0x73/0xb0
[ 29.172933] print_report+0xd1/0x640
[ 29.172991] ? __virt_addr_valid+0x1db/0x2d0
[ 29.173057] ? kasan_complete_mode_report_info+0x2a/0x200
[ 29.173127] kasan_report+0x102/0x140
[ 29.173205] ? kasan_atomics_helper+0x20c9/0x5450
[ 29.173327] ? kasan_atomics_helper+0x20c9/0x5450
[ 29.173452] kasan_check_range+0x10c/0x1c0
[ 29.173599] __kasan_check_write+0x18/0x20
[ 29.173725] kasan_atomics_helper+0x20c9/0x5450
[ 29.173871] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 29.174017] ? __kmalloc_cache_noprof+0x184/0x410
[ 29.174126] ? kasan_atomics+0x153/0x310
[ 29.174222] kasan_atomics+0x1dd/0x310
[ 29.174288] ? __pfx_kasan_atomics+0x10/0x10
[ 29.174352] ? __pfx_read_tsc+0x10/0x10
[ 29.174411] ? ktime_get_ts64+0x86/0x230
[ 29.174501] kunit_try_run_case+0x1b3/0x490
[ 29.174559] ? __pfx_kunit_try_run_case+0x10/0x10
[ 29.174617] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 29.174682] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 29.174750] ? __kthread_parkme+0x82/0x160
[ 29.174813] ? preempt_count_sub+0x50/0x80
[ 29.174884] ? __pfx_kunit_try_run_case+0x10/0x10
[ 29.174948] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 29.175020] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 29.175093] kthread+0x324/0x6d0
[ 29.175760] ? trace_preempt_on+0x20/0xc0
[ 29.175927] ? __pfx_kthread+0x10/0x10
[ 29.175989] ? _raw_spin_unlock_irq+0x47/0x80
[ 29.178319] ? calculate_sigpending+0x7b/0xa0
[ 29.178421] ? __pfx_kthread+0x10/0x10
[ 29.178490] ret_from_fork+0x41/0x80
[ 29.178548] ? __pfx_kthread+0x10/0x10
[ 29.178611] ret_from_fork_asm+0x1a/0x30
[ 29.178702] </TASK>
[ 29.178736]
[ 29.204039] Allocated by task 273:
[ 29.205270] kasan_save_stack+0x3d/0x60
[ 29.205649] kasan_save_track+0x18/0x40
[ 29.206127] kasan_save_alloc_info+0x3b/0x50
[ 29.206728] __kasan_kmalloc+0xb7/0xc0
[ 29.207268] __kmalloc_cache_noprof+0x184/0x410
[ 29.207705] kasan_atomics+0x96/0x310
[ 29.208065] kunit_try_run_case+0x1b3/0x490
[ 29.208567] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 29.209042] kthread+0x324/0x6d0
[ 29.209457] ret_from_fork+0x41/0x80
[ 29.209920] ret_from_fork_asm+0x1a/0x30
[ 29.210302]
[ 29.210471] The buggy address belongs to the object at ffff888102a6c880
[ 29.210471] which belongs to the cache kmalloc-64 of size 64
[ 29.211470] The buggy address is located 0 bytes to the right of
[ 29.211470] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 29.212396]
[ 29.212666] The buggy address belongs to the physical page:
[ 29.213035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 29.213706] flags: 0x200000000000000(node=0|zone=2)
[ 29.214194] page_type: f5(slab)
[ 29.214590] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 29.215218] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 29.215714] page dumped because: kasan: bad access detected
[ 29.216330]
[ 29.216547] Memory state around the buggy address:
[ 29.217036] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.217513] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.218149] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 29.218534] ^
[ 29.218814] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.219553] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.220300] ==================================================================
---
[ 27.326182] ==================================================================
[ 27.326524] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2c/0x5450
[ 27.327269] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 27.327724]
[ 27.327918] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 27.328033] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.328072] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.328133] Call Trace:
[ 27.328247] <TASK>
[ 27.328297] dump_stack_lvl+0x73/0xb0
[ 27.328832] print_report+0xd1/0x640
[ 27.328915] ? __virt_addr_valid+0x1db/0x2d0
[ 27.328987] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.329064] kasan_report+0x102/0x140
[ 27.329579] ? kasan_atomics_helper+0xa2c/0x5450
[ 27.329670] ? kasan_atomics_helper+0xa2c/0x5450
[ 27.329757] kasan_check_range+0x10c/0x1c0
[ 27.329822] __kasan_check_write+0x18/0x20
[ 27.329883] kasan_atomics_helper+0xa2c/0x5450
[ 27.329955] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 27.330024] ? __kmalloc_cache_noprof+0x184/0x410
[ 27.330132] ? kasan_atomics+0x153/0x310
[ 27.330207] kasan_atomics+0x1dd/0x310
[ 27.330241] ? __pfx_kasan_atomics+0x10/0x10
[ 27.330276] ? __pfx_read_tsc+0x10/0x10
[ 27.330308] ? ktime_get_ts64+0x86/0x230
[ 27.330347] kunit_try_run_case+0x1b3/0x490
[ 27.330380] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.330410] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.330447] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.330482] ? __kthread_parkme+0x82/0x160
[ 27.330514] ? preempt_count_sub+0x50/0x80
[ 27.330550] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.330582] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.330620] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.330657] kthread+0x324/0x6d0
[ 27.330688] ? trace_preempt_on+0x20/0xc0
[ 27.330721] ? __pfx_kthread+0x10/0x10
[ 27.330753] ? _raw_spin_unlock_irq+0x47/0x80
[ 27.330785] ? calculate_sigpending+0x7b/0xa0
[ 27.330816] ? __pfx_kthread+0x10/0x10
[ 27.330848] ret_from_fork+0x41/0x80
[ 27.330874] ? __pfx_kthread+0x10/0x10
[ 27.330905] ret_from_fork_asm+0x1a/0x30
[ 27.330951] </TASK>
[ 27.330969]
[ 27.348023] Allocated by task 273:
[ 27.348426] kasan_save_stack+0x3d/0x60
[ 27.348722] kasan_save_track+0x18/0x40
[ 27.348974] kasan_save_alloc_info+0x3b/0x50
[ 27.349545] __kasan_kmalloc+0xb7/0xc0
[ 27.350069] __kmalloc_cache_noprof+0x184/0x410
[ 27.350842] kasan_atomics+0x96/0x310
[ 27.351412] kunit_try_run_case+0x1b3/0x490
[ 27.351903] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.352519] kthread+0x324/0x6d0
[ 27.352842] ret_from_fork+0x41/0x80
[ 27.353191] ret_from_fork_asm+0x1a/0x30
[ 27.353649]
[ 27.353876] The buggy address belongs to the object at ffff888102a6c880
[ 27.353876] which belongs to the cache kmalloc-64 of size 64
[ 27.354916] The buggy address is located 0 bytes to the right of
[ 27.354916] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 27.355854]
[ 27.356030] The buggy address belongs to the physical page:
[ 27.356535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 27.357416] flags: 0x200000000000000(node=0|zone=2)
[ 27.357951] page_type: f5(slab)
[ 27.358426] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 27.359013] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 27.359935] page dumped because: kasan: bad access detected
[ 27.360612]
[ 27.360926] Memory state around the buggy address:
[ 27.361591] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.362483] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.363375] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 27.364149] ^
[ 27.364674] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.365362] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.365929] ==================================================================
---
[ 27.611990] ==================================================================
[ 27.614632] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe79/0x5450
[ 27.615334] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 27.615995]
[ 27.616771] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 27.616891] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.616930] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.616992] Call Trace:
[ 27.617036] <TASK>
[ 27.618132] dump_stack_lvl+0x73/0xb0
[ 27.618275] print_report+0xd1/0x640
[ 27.618342] ? __virt_addr_valid+0x1db/0x2d0
[ 27.618408] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.618478] kasan_report+0x102/0x140
[ 27.618531] ? kasan_atomics_helper+0xe79/0x5450
[ 27.618598] ? kasan_atomics_helper+0xe79/0x5450
[ 27.618678] kasan_check_range+0x10c/0x1c0
[ 27.618741] __kasan_check_write+0x18/0x20
[ 27.618801] kasan_atomics_helper+0xe79/0x5450
[ 27.618868] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 27.618932] ? __kmalloc_cache_noprof+0x184/0x410
[ 27.619005] ? kasan_atomics+0x153/0x310
[ 27.619077] kasan_atomics+0x1dd/0x310
[ 27.619568] ? __pfx_kasan_atomics+0x10/0x10
[ 27.619670] ? __pfx_read_tsc+0x10/0x10
[ 27.619733] ? ktime_get_ts64+0x86/0x230
[ 27.619809] kunit_try_run_case+0x1b3/0x490
[ 27.619875] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.619945] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.619988] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.620024] ? __kthread_parkme+0x82/0x160
[ 27.620058] ? preempt_count_sub+0x50/0x80
[ 27.620118] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.621235] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.621315] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.621389] kthread+0x324/0x6d0
[ 27.621450] ? trace_preempt_on+0x20/0xc0
[ 27.621518] ? __pfx_kthread+0x10/0x10
[ 27.621581] ? _raw_spin_unlock_irq+0x47/0x80
[ 27.621643] ? calculate_sigpending+0x7b/0xa0
[ 27.621680] ? __pfx_kthread+0x10/0x10
[ 27.621715] ret_from_fork+0x41/0x80
[ 27.621745] ? __pfx_kthread+0x10/0x10
[ 27.621778] ret_from_fork_asm+0x1a/0x30
[ 27.621824] </TASK>
[ 27.621842]
[ 27.634985] Allocated by task 273:
[ 27.635429] kasan_save_stack+0x3d/0x60
[ 27.635859] kasan_save_track+0x18/0x40
[ 27.637504] kasan_save_alloc_info+0x3b/0x50
[ 27.637804] __kasan_kmalloc+0xb7/0xc0
[ 27.638062] __kmalloc_cache_noprof+0x184/0x410
[ 27.638366] kasan_atomics+0x96/0x310
[ 27.638604] kunit_try_run_case+0x1b3/0x490
[ 27.638765] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.638944] kthread+0x324/0x6d0
[ 27.639076] ret_from_fork+0x41/0x80
[ 27.639491] ret_from_fork_asm+0x1a/0x30
[ 27.640144]
[ 27.640415] The buggy address belongs to the object at ffff888102a6c880
[ 27.640415] which belongs to the cache kmalloc-64 of size 64
[ 27.641949] The buggy address is located 0 bytes to the right of
[ 27.641949] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 27.643333]
[ 27.643660] The buggy address belongs to the physical page:
[ 27.644342] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 27.645103] flags: 0x200000000000000(node=0|zone=2)
[ 27.645730] page_type: f5(slab)
[ 27.646234] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 27.647017] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 27.647907] page dumped because: kasan: bad access detected
[ 27.648577]
[ 27.648814] Memory state around the buggy address:
[ 27.649472] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.650364] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.651199] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 27.651830] ^
[ 27.652621] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.653494] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.654402] ==================================================================
---
[ 27.456724] ==================================================================
[ 27.457878] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc71/0x5450
[ 27.458300] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 27.459089]
[ 27.460385] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 27.460533] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.460567] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.460615] Call Trace:
[ 27.460654] <TASK>
[ 27.460695] dump_stack_lvl+0x73/0xb0
[ 27.460763] print_report+0xd1/0x640
[ 27.460797] ? __virt_addr_valid+0x1db/0x2d0
[ 27.460838] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.460899] kasan_report+0x102/0x140
[ 27.460929] ? kasan_atomics_helper+0xc71/0x5450
[ 27.460967] ? kasan_atomics_helper+0xc71/0x5450
[ 27.461008] kasan_check_range+0x10c/0x1c0
[ 27.461042] __kasan_check_write+0x18/0x20
[ 27.461073] kasan_atomics_helper+0xc71/0x5450
[ 27.461124] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 27.461185] ? __kmalloc_cache_noprof+0x184/0x410
[ 27.461252] ? kasan_atomics+0x153/0x310
[ 27.461320] kasan_atomics+0x1dd/0x310
[ 27.461378] ? __pfx_kasan_atomics+0x10/0x10
[ 27.461415] ? __pfx_read_tsc+0x10/0x10
[ 27.461448] ? ktime_get_ts64+0x86/0x230
[ 27.461487] kunit_try_run_case+0x1b3/0x490
[ 27.461521] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.461550] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.461584] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.461619] ? __kthread_parkme+0x82/0x160
[ 27.461650] ? preempt_count_sub+0x50/0x80
[ 27.461687] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.461718] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.461755] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.461792] kthread+0x324/0x6d0
[ 27.461823] ? trace_preempt_on+0x20/0xc0
[ 27.461857] ? __pfx_kthread+0x10/0x10
[ 27.461888] ? _raw_spin_unlock_irq+0x47/0x80
[ 27.461921] ? calculate_sigpending+0x7b/0xa0
[ 27.461952] ? __pfx_kthread+0x10/0x10
[ 27.461984] ret_from_fork+0x41/0x80
[ 27.462012] ? __pfx_kthread+0x10/0x10
[ 27.462045] ret_from_fork_asm+0x1a/0x30
[ 27.462098] </TASK>
[ 27.462145]
[ 27.478863] Allocated by task 273:
[ 27.479364] kasan_save_stack+0x3d/0x60
[ 27.479830] kasan_save_track+0x18/0x40
[ 27.480444] kasan_save_alloc_info+0x3b/0x50
[ 27.480824] __kasan_kmalloc+0xb7/0xc0
[ 27.481404] __kmalloc_cache_noprof+0x184/0x410
[ 27.481782] kasan_atomics+0x96/0x310
[ 27.482269] kunit_try_run_case+0x1b3/0x490
[ 27.482712] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.483291] kthread+0x324/0x6d0
[ 27.483544] ret_from_fork+0x41/0x80
[ 27.483984] ret_from_fork_asm+0x1a/0x30
[ 27.484603]
[ 27.484869] The buggy address belongs to the object at ffff888102a6c880
[ 27.484869] which belongs to the cache kmalloc-64 of size 64
[ 27.485692] The buggy address is located 0 bytes to the right of
[ 27.485692] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 27.486909]
[ 27.487190] The buggy address belongs to the physical page:
[ 27.487768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 27.488315] flags: 0x200000000000000(node=0|zone=2)
[ 27.488843] page_type: f5(slab)
[ 27.489357] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 27.490130] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 27.490755] page dumped because: kasan: bad access detected
[ 27.491352]
[ 27.491510] Memory state around the buggy address:
[ 27.491786] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.492338] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.492994] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 27.493700] ^
[ 27.494179] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.494553] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.495254] ==================================================================
---
[ 27.768645] ==================================================================
[ 27.769375] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x107a/0x5450
[ 27.770050] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 27.770818]
[ 27.771120] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 27.771320] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.771363] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.771427] Call Trace:
[ 27.771470] <TASK>
[ 27.771519] dump_stack_lvl+0x73/0xb0
[ 27.771693] print_report+0xd1/0x640
[ 27.771759] ? __virt_addr_valid+0x1db/0x2d0
[ 27.771818] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.771904] kasan_report+0x102/0x140
[ 27.772027] ? kasan_atomics_helper+0x107a/0x5450
[ 27.772172] ? kasan_atomics_helper+0x107a/0x5450
[ 27.772264] kasan_check_range+0x10c/0x1c0
[ 27.772330] __kasan_check_write+0x18/0x20
[ 27.772473] kasan_atomics_helper+0x107a/0x5450
[ 27.772548] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 27.772616] ? __kmalloc_cache_noprof+0x184/0x410
[ 27.772682] ? kasan_atomics+0x153/0x310
[ 27.772832] kasan_atomics+0x1dd/0x310
[ 27.772896] ? __pfx_kasan_atomics+0x10/0x10
[ 27.772961] ? __pfx_read_tsc+0x10/0x10
[ 27.773019] ? ktime_get_ts64+0x86/0x230
[ 27.773216] kunit_try_run_case+0x1b3/0x490
[ 27.773304] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.773361] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.773428] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.773573] ? __kthread_parkme+0x82/0x160
[ 27.773637] ? preempt_count_sub+0x50/0x80
[ 27.773707] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.773771] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.773905] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.773994] kthread+0x324/0x6d0
[ 27.774056] ? trace_preempt_on+0x20/0xc0
[ 27.774187] ? __pfx_kthread+0x10/0x10
[ 27.774326] ? _raw_spin_unlock_irq+0x47/0x80
[ 27.774393] ? calculate_sigpending+0x7b/0xa0
[ 27.774457] ? __pfx_kthread+0x10/0x10
[ 27.774518] ret_from_fork+0x41/0x80
[ 27.774629] ? __pfx_kthread+0x10/0x10
[ 27.774708] ret_from_fork_asm+0x1a/0x30
[ 27.774800] </TASK>
[ 27.774833]
[ 27.788775] Allocated by task 273:
[ 27.789329] kasan_save_stack+0x3d/0x60
[ 27.789747] kasan_save_track+0x18/0x40
[ 27.790277] kasan_save_alloc_info+0x3b/0x50
[ 27.790783] __kasan_kmalloc+0xb7/0xc0
[ 27.791154] __kmalloc_cache_noprof+0x184/0x410
[ 27.791649] kasan_atomics+0x96/0x310
[ 27.792065] kunit_try_run_case+0x1b3/0x490
[ 27.792780] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.793333] kthread+0x324/0x6d0
[ 27.793584] ret_from_fork+0x41/0x80
[ 27.793839] ret_from_fork_asm+0x1a/0x30
[ 27.794102]
[ 27.794449] The buggy address belongs to the object at ffff888102a6c880
[ 27.794449] which belongs to the cache kmalloc-64 of size 64
[ 27.795499] The buggy address is located 0 bytes to the right of
[ 27.795499] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 27.796607]
[ 27.796900] The buggy address belongs to the physical page:
[ 27.797480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 27.798194] flags: 0x200000000000000(node=0|zone=2)
[ 27.798639] page_type: f5(slab)
[ 27.799079] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 27.799710] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 27.800405] page dumped because: kasan: bad access detected
[ 27.800885]
[ 27.801248] Memory state around the buggy address:
[ 27.801728] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.802336] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.802927] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 27.803558] ^
[ 27.804071] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.804726] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.805453] ==================================================================
---
[ 28.845652] ==================================================================
[ 28.846718] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7b/0x5450
[ 28.847492] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 28.848220]
[ 28.848498] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 28.848615] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.848652] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 28.848718] Call Trace:
[ 28.848763] <TASK>
[ 28.848809] dump_stack_lvl+0x73/0xb0
[ 28.848891] print_report+0xd1/0x640
[ 28.848948] ? __virt_addr_valid+0x1db/0x2d0
[ 28.849007] ? kasan_complete_mode_report_info+0x2a/0x200
[ 28.849140] kasan_report+0x102/0x140
[ 28.849231] ? kasan_atomics_helper+0x1d7b/0x5450
[ 28.849299] ? kasan_atomics_helper+0x1d7b/0x5450
[ 28.849378] kasan_check_range+0x10c/0x1c0
[ 28.849439] __kasan_check_write+0x18/0x20
[ 28.849545] kasan_atomics_helper+0x1d7b/0x5450
[ 28.849619] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 28.849738] ? __kmalloc_cache_noprof+0x184/0x410
[ 28.849808] ? kasan_atomics+0x153/0x310
[ 28.849901] kasan_atomics+0x1dd/0x310
[ 28.849990] ? __pfx_kasan_atomics+0x10/0x10
[ 28.850052] ? __pfx_read_tsc+0x10/0x10
[ 28.850173] ? ktime_get_ts64+0x86/0x230
[ 28.850268] kunit_try_run_case+0x1b3/0x490
[ 28.850361] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.850424] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 28.850488] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 28.850554] ? __kthread_parkme+0x82/0x160
[ 28.850612] ? preempt_count_sub+0x50/0x80
[ 28.850728] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.850797] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.850865] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 28.850931] kthread+0x324/0x6d0
[ 28.850990] ? trace_preempt_on+0x20/0xc0
[ 28.851067] ? __pfx_kthread+0x10/0x10
[ 28.851216] ? _raw_spin_unlock_irq+0x47/0x80
[ 28.851288] ? calculate_sigpending+0x7b/0xa0
[ 28.851326] ? __pfx_kthread+0x10/0x10
[ 28.851361] ret_from_fork+0x41/0x80
[ 28.851391] ? __pfx_kthread+0x10/0x10
[ 28.851423] ret_from_fork_asm+0x1a/0x30
[ 28.851469] </TASK>
[ 28.851488]
[ 28.864442] Allocated by task 273:
[ 28.864879] kasan_save_stack+0x3d/0x60
[ 28.865326] kasan_save_track+0x18/0x40
[ 28.865695] kasan_save_alloc_info+0x3b/0x50
[ 28.866118] __kasan_kmalloc+0xb7/0xc0
[ 28.866573] __kmalloc_cache_noprof+0x184/0x410
[ 28.866977] kasan_atomics+0x96/0x310
[ 28.867458] kunit_try_run_case+0x1b3/0x490
[ 28.867761] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.868321] kthread+0x324/0x6d0
[ 28.868743] ret_from_fork+0x41/0x80
[ 28.869042] ret_from_fork_asm+0x1a/0x30
[ 28.869488]
[ 28.869799] The buggy address belongs to the object at ffff888102a6c880
[ 28.869799] which belongs to the cache kmalloc-64 of size 64
[ 28.870630] The buggy address is located 0 bytes to the right of
[ 28.870630] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 28.871483]
[ 28.871711] The buggy address belongs to the physical page:
[ 28.872118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 28.872693] flags: 0x200000000000000(node=0|zone=2)
[ 28.873249] page_type: f5(slab)
[ 28.873528] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 28.874118] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 28.874687] page dumped because: kasan: bad access detected
[ 28.875213]
[ 28.875424] Memory state around the buggy address:
[ 28.875908] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.876487] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.877198] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.877690] ^
[ 28.878246] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.878732] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.879456] ==================================================================
---
[ 27.272522] ==================================================================
[ 27.273246] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x993/0x5450
[ 27.274034] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 27.274937]
[ 27.275293] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 27.275404] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.275493] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.275558] Call Trace:
[ 27.275599] <TASK>
[ 27.275650] dump_stack_lvl+0x73/0xb0
[ 27.275734] print_report+0xd1/0x640
[ 27.275791] ? __virt_addr_valid+0x1db/0x2d0
[ 27.275854] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.275944] kasan_report+0x102/0x140
[ 27.276001] ? kasan_atomics_helper+0x993/0x5450
[ 27.276073] ? kasan_atomics_helper+0x993/0x5450
[ 27.276243] kasan_check_range+0x10c/0x1c0
[ 27.276322] __kasan_check_write+0x18/0x20
[ 27.276386] kasan_atomics_helper+0x993/0x5450
[ 27.276456] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 27.276526] ? __kmalloc_cache_noprof+0x184/0x410
[ 27.276596] ? kasan_atomics+0x153/0x310
[ 27.276668] kasan_atomics+0x1dd/0x310
[ 27.276731] ? __pfx_kasan_atomics+0x10/0x10
[ 27.276797] ? __pfx_read_tsc+0x10/0x10
[ 27.276859] ? ktime_get_ts64+0x86/0x230
[ 27.276929] kunit_try_run_case+0x1b3/0x490
[ 27.276994] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.277052] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.277118] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.277224] ? __kthread_parkme+0x82/0x160
[ 27.277286] ? preempt_count_sub+0x50/0x80
[ 27.277436] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.277563] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.277696] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.277787] kthread+0x324/0x6d0
[ 27.277848] ? trace_preempt_on+0x20/0xc0
[ 27.277988] ? __pfx_kthread+0x10/0x10
[ 27.278052] ? _raw_spin_unlock_irq+0x47/0x80
[ 27.278117] ? calculate_sigpending+0x7b/0xa0
[ 27.278224] ? __pfx_kthread+0x10/0x10
[ 27.278287] ret_from_fork+0x41/0x80
[ 27.278343] ? __pfx_kthread+0x10/0x10
[ 27.278404] ret_from_fork_asm+0x1a/0x30
[ 27.278493] </TASK>
[ 27.278528]
[ 27.305557] Allocated by task 273:
[ 27.306010] kasan_save_stack+0x3d/0x60
[ 27.306488] kasan_save_track+0x18/0x40
[ 27.306795] kasan_save_alloc_info+0x3b/0x50
[ 27.307330] __kasan_kmalloc+0xb7/0xc0
[ 27.307751] __kmalloc_cache_noprof+0x184/0x410
[ 27.308189] kasan_atomics+0x96/0x310
[ 27.308552] kunit_try_run_case+0x1b3/0x490
[ 27.308898] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.309574] kthread+0x324/0x6d0
[ 27.309921] ret_from_fork+0x41/0x80
[ 27.310451] ret_from_fork_asm+0x1a/0x30
[ 27.310758]
[ 27.311023] The buggy address belongs to the object at ffff888102a6c880
[ 27.311023] which belongs to the cache kmalloc-64 of size 64
[ 27.311627] The buggy address is located 0 bytes to the right of
[ 27.311627] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 27.312329]
[ 27.312558] The buggy address belongs to the physical page:
[ 27.313062] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 27.313770] flags: 0x200000000000000(node=0|zone=2)
[ 27.314070] page_type: f5(slab)
[ 27.314513] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 27.315433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 27.316106] page dumped because: kasan: bad access detected
[ 27.316592]
[ 27.316750] Memory state around the buggy address:
[ 27.317027] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.317909] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.318853] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 27.320925] ^
[ 27.321432] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.322081] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.323777] ==================================================================
---
[ 28.365919] ==================================================================
[ 28.367579] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1650/0x5450
[ 28.367999] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 28.370739]
[ 28.370946] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 28.371063] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.371101] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 28.371437] Call Trace:
[ 28.371626] <TASK>
[ 28.371674] dump_stack_lvl+0x73/0xb0
[ 28.371759] print_report+0xd1/0x640
[ 28.371814] ? __virt_addr_valid+0x1db/0x2d0
[ 28.371873] ? kasan_complete_mode_report_info+0x2a/0x200
[ 28.371955] kasan_report+0x102/0x140
[ 28.372007] ? kasan_atomics_helper+0x1650/0x5450
[ 28.372072] ? kasan_atomics_helper+0x1650/0x5450
[ 28.372447] kasan_check_range+0x10c/0x1c0
[ 28.372527] __kasan_check_write+0x18/0x20
[ 28.372586] kasan_atomics_helper+0x1650/0x5450
[ 28.372651] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 28.372712] ? __kmalloc_cache_noprof+0x184/0x410
[ 28.372768] ? kasan_atomics+0x153/0x310
[ 28.372834] kasan_atomics+0x1dd/0x310
[ 28.372889] ? __pfx_kasan_atomics+0x10/0x10
[ 28.372951] ? __pfx_read_tsc+0x10/0x10
[ 28.373006] ? ktime_get_ts64+0x86/0x230
[ 28.373072] kunit_try_run_case+0x1b3/0x490
[ 28.373146] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.373220] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 28.373280] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 28.373338] ? __kthread_parkme+0x82/0x160
[ 28.373388] ? preempt_count_sub+0x50/0x80
[ 28.373451] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.373500] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.373561] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 28.373617] kthread+0x324/0x6d0
[ 28.373663] ? trace_preempt_on+0x20/0xc0
[ 28.373719] ? __pfx_kthread+0x10/0x10
[ 28.373771] ? _raw_spin_unlock_irq+0x47/0x80
[ 28.373823] ? calculate_sigpending+0x7b/0xa0
[ 28.373874] ? __pfx_kthread+0x10/0x10
[ 28.373928] ret_from_fork+0x41/0x80
[ 28.373979] ? __pfx_kthread+0x10/0x10
[ 28.374031] ret_from_fork_asm+0x1a/0x30
[ 28.374115] </TASK>
[ 28.374145]
[ 28.389687] Allocated by task 273:
[ 28.390196] kasan_save_stack+0x3d/0x60
[ 28.390752] kasan_save_track+0x18/0x40
[ 28.391289] kasan_save_alloc_info+0x3b/0x50
[ 28.391801] __kasan_kmalloc+0xb7/0xc0
[ 28.392372] __kmalloc_cache_noprof+0x184/0x410
[ 28.392697] kasan_atomics+0x96/0x310
[ 28.393263] kunit_try_run_case+0x1b3/0x490
[ 28.393766] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.394462] kthread+0x324/0x6d0
[ 28.394902] ret_from_fork+0x41/0x80
[ 28.395251] ret_from_fork_asm+0x1a/0x30
[ 28.395714]
[ 28.395953] The buggy address belongs to the object at ffff888102a6c880
[ 28.395953] which belongs to the cache kmalloc-64 of size 64
[ 28.396571] The buggy address is located 0 bytes to the right of
[ 28.396571] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 28.397248]
[ 28.397483] The buggy address belongs to the physical page:
[ 28.397992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 28.398741] flags: 0x200000000000000(node=0|zone=2)
[ 28.399309] page_type: f5(slab)
[ 28.399735] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 28.400480] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 28.401051] page dumped because: kasan: bad access detected
[ 28.401623]
[ 28.401872] Memory state around the buggy address:
[ 28.402360] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.402928] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.403579] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.403952] ^
[ 28.404283] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.404646] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.405375] ==================================================================
---
[ 27.947334] ==================================================================
[ 27.947938] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1218/0x5450
[ 27.949466] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 27.949865]
[ 27.950706] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 27.950787] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.950808] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.950842] Call Trace:
[ 27.950866] <TASK>
[ 27.950895] dump_stack_lvl+0x73/0xb0
[ 27.950949] print_report+0xd1/0x640
[ 27.950982] ? __virt_addr_valid+0x1db/0x2d0
[ 27.951016] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.951055] kasan_report+0x102/0x140
[ 27.951083] ? kasan_atomics_helper+0x1218/0x5450
[ 27.951197] ? kasan_atomics_helper+0x1218/0x5450
[ 27.951240] kasan_check_range+0x10c/0x1c0
[ 27.951274] __kasan_check_write+0x18/0x20
[ 27.951305] kasan_atomics_helper+0x1218/0x5450
[ 27.951342] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 27.951377] ? __kmalloc_cache_noprof+0x184/0x410
[ 27.951414] ? kasan_atomics+0x153/0x310
[ 27.951450] kasan_atomics+0x1dd/0x310
[ 27.951479] ? __pfx_kasan_atomics+0x10/0x10
[ 27.951513] ? __pfx_read_tsc+0x10/0x10
[ 27.951544] ? ktime_get_ts64+0x86/0x230
[ 27.951582] kunit_try_run_case+0x1b3/0x490
[ 27.951615] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.951645] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.951681] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.951715] ? __kthread_parkme+0x82/0x160
[ 27.951746] ? preempt_count_sub+0x50/0x80
[ 27.951781] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.951813] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.951850] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.951897] kthread+0x324/0x6d0
[ 27.951928] ? trace_preempt_on+0x20/0xc0
[ 27.951963] ? __pfx_kthread+0x10/0x10
[ 27.951995] ? _raw_spin_unlock_irq+0x47/0x80
[ 27.952027] ? calculate_sigpending+0x7b/0xa0
[ 27.952059] ? __pfx_kthread+0x10/0x10
[ 27.952095] ret_from_fork+0x41/0x80
[ 27.952148] ? __pfx_kthread+0x10/0x10
[ 27.952203] ret_from_fork_asm+0x1a/0x30
[ 27.952249] </TASK>
[ 27.952269]
[ 27.968643] Allocated by task 273:
[ 27.969042] kasan_save_stack+0x3d/0x60
[ 27.969579] kasan_save_track+0x18/0x40
[ 27.969895] kasan_save_alloc_info+0x3b/0x50
[ 27.970393] __kasan_kmalloc+0xb7/0xc0
[ 27.970768] __kmalloc_cache_noprof+0x184/0x410
[ 27.971271] kasan_atomics+0x96/0x310
[ 27.971626] kunit_try_run_case+0x1b3/0x490
[ 27.971965] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.972504] kthread+0x324/0x6d0
[ 27.972905] ret_from_fork+0x41/0x80
[ 27.973340] ret_from_fork_asm+0x1a/0x30
[ 27.973706]
[ 27.973871] The buggy address belongs to the object at ffff888102a6c880
[ 27.973871] which belongs to the cache kmalloc-64 of size 64
[ 27.975114] The buggy address is located 0 bytes to the right of
[ 27.975114] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 27.976146]
[ 27.976335] The buggy address belongs to the physical page:
[ 27.976901] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 27.977595] flags: 0x200000000000000(node=0|zone=2)
[ 27.977927] page_type: f5(slab)
[ 27.978395] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 27.979051] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 27.979735] page dumped because: kasan: bad access detected
[ 27.980322]
[ 27.980503] Memory state around the buggy address:
[ 27.981059] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.981864] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.982662] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 27.983312] ^
[ 27.983829] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.984399] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.985188] ==================================================================
---
[ 27.235984] ==================================================================
[ 27.236682] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8fa/0x5450
[ 27.237451] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 27.238339]
[ 27.238582] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 27.238701] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.238739] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.238799] Call Trace:
[ 27.238842] <TASK>
[ 27.238891] dump_stack_lvl+0x73/0xb0
[ 27.238971] print_report+0xd1/0x640
[ 27.239028] ? __virt_addr_valid+0x1db/0x2d0
[ 27.239095] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.239220] kasan_report+0x102/0x140
[ 27.239315] ? kasan_atomics_helper+0x8fa/0x5450
[ 27.239401] ? kasan_atomics_helper+0x8fa/0x5450
[ 27.239479] kasan_check_range+0x10c/0x1c0
[ 27.239542] __kasan_check_write+0x18/0x20
[ 27.239707] kasan_atomics_helper+0x8fa/0x5450
[ 27.239794] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 27.239906] ? __kmalloc_cache_noprof+0x184/0x410
[ 27.240009] ? kasan_atomics+0x153/0x310
[ 27.240078] kasan_atomics+0x1dd/0x310
[ 27.240194] ? __pfx_kasan_atomics+0x10/0x10
[ 27.240291] ? __pfx_read_tsc+0x10/0x10
[ 27.240379] ? ktime_get_ts64+0x86/0x230
[ 27.240478] kunit_try_run_case+0x1b3/0x490
[ 27.240553] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.240639] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.240729] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.240802] ? __kthread_parkme+0x82/0x160
[ 27.240863] ? preempt_count_sub+0x50/0x80
[ 27.240932] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.240996] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.241069] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.241143] kthread+0x324/0x6d0
[ 27.241226] ? trace_preempt_on+0x20/0xc0
[ 27.241293] ? __pfx_kthread+0x10/0x10
[ 27.241357] ? _raw_spin_unlock_irq+0x47/0x80
[ 27.241423] ? calculate_sigpending+0x7b/0xa0
[ 27.241487] ? __pfx_kthread+0x10/0x10
[ 27.241551] ret_from_fork+0x41/0x80
[ 27.241606] ? __pfx_kthread+0x10/0x10
[ 27.241669] ret_from_fork_asm+0x1a/0x30
[ 27.241758] </TASK>
[ 27.241791]
[ 27.255270] Allocated by task 273:
[ 27.255533] kasan_save_stack+0x3d/0x60
[ 27.255812] kasan_save_track+0x18/0x40
[ 27.256077] kasan_save_alloc_info+0x3b/0x50
[ 27.256537] __kasan_kmalloc+0xb7/0xc0
[ 27.257070] __kmalloc_cache_noprof+0x184/0x410
[ 27.257635] kasan_atomics+0x96/0x310
[ 27.258039] kunit_try_run_case+0x1b3/0x490
[ 27.258575] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.259088] kthread+0x324/0x6d0
[ 27.259485] ret_from_fork+0x41/0x80
[ 27.259982] ret_from_fork_asm+0x1a/0x30
[ 27.260542]
[ 27.260828] The buggy address belongs to the object at ffff888102a6c880
[ 27.260828] which belongs to the cache kmalloc-64 of size 64
[ 27.262371] The buggy address is located 0 bytes to the right of
[ 27.262371] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 27.262949]
[ 27.263107] The buggy address belongs to the physical page:
[ 27.263423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 27.263814] flags: 0x200000000000000(node=0|zone=2)
[ 27.264118] page_type: f5(slab)
[ 27.264545] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 27.265348] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 27.266257] page dumped because: kasan: bad access detected
[ 27.266909]
[ 27.267223] Memory state around the buggy address:
[ 27.267915] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.268798] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.269696] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 27.270320] ^
[ 27.270743] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.271112] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.271491] ==================================================================
---
[ 27.573554] ==================================================================
[ 27.574305] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde1/0x5450
[ 27.574948] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 27.575802]
[ 27.576062] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 27.576247] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.576283] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.576340] Call Trace:
[ 27.576384] <TASK>
[ 27.576431] dump_stack_lvl+0x73/0xb0
[ 27.576520] print_report+0xd1/0x640
[ 27.576581] ? __virt_addr_valid+0x1db/0x2d0
[ 27.576647] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.576722] kasan_report+0x102/0x140
[ 27.576778] ? kasan_atomics_helper+0xde1/0x5450
[ 27.576849] ? kasan_atomics_helper+0xde1/0x5450
[ 27.576929] kasan_check_range+0x10c/0x1c0
[ 27.576992] __kasan_check_write+0x18/0x20
[ 27.577054] kasan_atomics_helper+0xde1/0x5450
[ 27.577196] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 27.577263] ? __kmalloc_cache_noprof+0x184/0x410
[ 27.577323] ? kasan_atomics+0x153/0x310
[ 27.577381] kasan_atomics+0x1dd/0x310
[ 27.577427] ? __pfx_kasan_atomics+0x10/0x10
[ 27.577475] ? __pfx_read_tsc+0x10/0x10
[ 27.577530] ? ktime_get_ts64+0x86/0x230
[ 27.577591] kunit_try_run_case+0x1b3/0x490
[ 27.577647] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.577700] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.577765] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.577828] ? __kthread_parkme+0x82/0x160
[ 27.577889] ? preempt_count_sub+0x50/0x80
[ 27.577962] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.578026] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.578153] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.578262] kthread+0x324/0x6d0
[ 27.578328] ? trace_preempt_on+0x20/0xc0
[ 27.578398] ? __pfx_kthread+0x10/0x10
[ 27.578462] ? _raw_spin_unlock_irq+0x47/0x80
[ 27.578527] ? calculate_sigpending+0x7b/0xa0
[ 27.578593] ? __pfx_kthread+0x10/0x10
[ 27.578657] ret_from_fork+0x41/0x80
[ 27.578711] ? __pfx_kthread+0x10/0x10
[ 27.578777] ret_from_fork_asm+0x1a/0x30
[ 27.578866] </TASK>
[ 27.578904]
[ 27.590924] Allocated by task 273:
[ 27.591372] kasan_save_stack+0x3d/0x60
[ 27.591679] kasan_save_track+0x18/0x40
[ 27.591949] kasan_save_alloc_info+0x3b/0x50
[ 27.592454] __kasan_kmalloc+0xb7/0xc0
[ 27.592868] __kmalloc_cache_noprof+0x184/0x410
[ 27.593387] kasan_atomics+0x96/0x310
[ 27.593789] kunit_try_run_case+0x1b3/0x490
[ 27.594222] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.594550] kthread+0x324/0x6d0
[ 27.594838] ret_from_fork+0x41/0x80
[ 27.595067] ret_from_fork_asm+0x1a/0x30
[ 27.595555]
[ 27.595779] The buggy address belongs to the object at ffff888102a6c880
[ 27.595779] which belongs to the cache kmalloc-64 of size 64
[ 27.596537] The buggy address is located 0 bytes to the right of
[ 27.596537] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 27.597591]
[ 27.597763] The buggy address belongs to the physical page:
[ 27.598288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 27.598684] flags: 0x200000000000000(node=0|zone=2)
[ 27.598985] page_type: f5(slab)
[ 27.599361] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 27.599977] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 27.600716] page dumped because: kasan: bad access detected
[ 27.601255]
[ 27.601478] Memory state around the buggy address:
[ 27.601915] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.604478] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.604857] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 27.606867] ^
[ 27.607407] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.608054] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.609721] ==================================================================
---
[ 28.976054] ==================================================================
[ 28.977122] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f44/0x5450
[ 28.977745] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 28.978458]
[ 28.978693] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 28.978807] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.978848] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 28.978909] Call Trace:
[ 28.978951] <TASK>
[ 28.979001] dump_stack_lvl+0x73/0xb0
[ 28.979186] print_report+0xd1/0x640
[ 28.979259] ? __virt_addr_valid+0x1db/0x2d0
[ 28.979323] ? kasan_complete_mode_report_info+0x2a/0x200
[ 28.979399] kasan_report+0x102/0x140
[ 28.979454] ? kasan_atomics_helper+0x1f44/0x5450
[ 28.979524] ? kasan_atomics_helper+0x1f44/0x5450
[ 28.979604] kasan_check_range+0x10c/0x1c0
[ 28.979718] __kasan_check_write+0x18/0x20
[ 28.979783] kasan_atomics_helper+0x1f44/0x5450
[ 28.979849] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 28.979929] ? __kmalloc_cache_noprof+0x184/0x410
[ 28.980033] ? kasan_atomics+0x153/0x310
[ 28.980154] kasan_atomics+0x1dd/0x310
[ 28.980241] ? __pfx_kasan_atomics+0x10/0x10
[ 28.980307] ? __pfx_read_tsc+0x10/0x10
[ 28.980397] ? ktime_get_ts64+0x86/0x230
[ 28.980476] kunit_try_run_case+0x1b3/0x490
[ 28.980541] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.980599] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 28.980698] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 28.980773] ? __kthread_parkme+0x82/0x160
[ 28.980836] ? preempt_count_sub+0x50/0x80
[ 28.980908] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.980973] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.981042] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 28.981147] kthread+0x324/0x6d0
[ 28.981211] ? trace_preempt_on+0x20/0xc0
[ 28.981251] ? __pfx_kthread+0x10/0x10
[ 28.981285] ? _raw_spin_unlock_irq+0x47/0x80
[ 28.981320] ? calculate_sigpending+0x7b/0xa0
[ 28.981353] ? __pfx_kthread+0x10/0x10
[ 28.981387] ret_from_fork+0x41/0x80
[ 28.981415] ? __pfx_kthread+0x10/0x10
[ 28.981447] ret_from_fork_asm+0x1a/0x30
[ 28.981494] </TASK>
[ 28.981511]
[ 28.999511] Allocated by task 273:
[ 29.000485] kasan_save_stack+0x3d/0x60
[ 29.001350] kasan_save_track+0x18/0x40
[ 29.002324] kasan_save_alloc_info+0x3b/0x50
[ 29.002924] __kasan_kmalloc+0xb7/0xc0
[ 29.003457] __kmalloc_cache_noprof+0x184/0x410
[ 29.003824] kasan_atomics+0x96/0x310
[ 29.004305] kunit_try_run_case+0x1b3/0x490
[ 29.005408] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 29.005910] kthread+0x324/0x6d0
[ 29.006265] ret_from_fork+0x41/0x80
[ 29.007460] ret_from_fork_asm+0x1a/0x30
[ 29.007938]
[ 29.008260] The buggy address belongs to the object at ffff888102a6c880
[ 29.008260] which belongs to the cache kmalloc-64 of size 64
[ 29.008943] The buggy address is located 0 bytes to the right of
[ 29.008943] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 29.011460]
[ 29.011716] The buggy address belongs to the physical page:
[ 29.012356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 29.013272] flags: 0x200000000000000(node=0|zone=2)
[ 29.014188] page_type: f5(slab)
[ 29.014594] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 29.015325] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 29.016661] page dumped because: kasan: bad access detected
[ 29.016967]
[ 29.017106] Memory state around the buggy address:
[ 29.017404] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.017764] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.018125] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 29.020396] ^
[ 29.020919] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.022252] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.022951] ==================================================================
---
[ 28.603966] ==================================================================
[ 28.605011] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e4/0x5450
[ 28.605620] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 28.605995]
[ 28.606251] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 28.606361] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.606400] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 28.606461] Call Trace:
[ 28.606505] <TASK>
[ 28.606555] dump_stack_lvl+0x73/0xb0
[ 28.606636] print_report+0xd1/0x640
[ 28.606696] ? __virt_addr_valid+0x1db/0x2d0
[ 28.606757] ? kasan_complete_mode_report_info+0x2a/0x200
[ 28.606829] kasan_report+0x102/0x140
[ 28.606884] ? kasan_atomics_helper+0x19e4/0x5450
[ 28.606955] ? kasan_atomics_helper+0x19e4/0x5450
[ 28.607036] kasan_check_range+0x10c/0x1c0
[ 28.607145] __kasan_check_write+0x18/0x20
[ 28.607240] kasan_atomics_helper+0x19e4/0x5450
[ 28.607314] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 28.607384] ? __kmalloc_cache_noprof+0x184/0x410
[ 28.607452] ? kasan_atomics+0x153/0x310
[ 28.607521] kasan_atomics+0x1dd/0x310
[ 28.607576] ? __pfx_kasan_atomics+0x10/0x10
[ 28.607636] ? __pfx_read_tsc+0x10/0x10
[ 28.607693] ? ktime_get_ts64+0x86/0x230
[ 28.607759] kunit_try_run_case+0x1b3/0x490
[ 28.607823] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.607884] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 28.607952] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 28.608014] ? __kthread_parkme+0x82/0x160
[ 28.608069] ? preempt_count_sub+0x50/0x80
[ 28.608208] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.608273] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.608341] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 28.608409] kthread+0x324/0x6d0
[ 28.608465] ? trace_preempt_on+0x20/0xc0
[ 28.608531] ? __pfx_kthread+0x10/0x10
[ 28.608592] ? _raw_spin_unlock_irq+0x47/0x80
[ 28.608652] ? calculate_sigpending+0x7b/0xa0
[ 28.608709] ? __pfx_kthread+0x10/0x10
[ 28.608755] ret_from_fork+0x41/0x80
[ 28.608785] ? __pfx_kthread+0x10/0x10
[ 28.608817] ret_from_fork_asm+0x1a/0x30
[ 28.608869] </TASK>
[ 28.608898]
[ 28.622378] Allocated by task 273:
[ 28.622699] kasan_save_stack+0x3d/0x60
[ 28.623018] kasan_save_track+0x18/0x40
[ 28.625389] kasan_save_alloc_info+0x3b/0x50
[ 28.625720] __kasan_kmalloc+0xb7/0xc0
[ 28.626135] __kmalloc_cache_noprof+0x184/0x410
[ 28.626541] kasan_atomics+0x96/0x310
[ 28.626925] kunit_try_run_case+0x1b3/0x490
[ 28.627380] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.627727] kthread+0x324/0x6d0
[ 28.628139] ret_from_fork+0x41/0x80
[ 28.628552] ret_from_fork_asm+0x1a/0x30
[ 28.628838]
[ 28.629055] The buggy address belongs to the object at ffff888102a6c880
[ 28.629055] which belongs to the cache kmalloc-64 of size 64
[ 28.629814] The buggy address is located 0 bytes to the right of
[ 28.629814] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 28.630802]
[ 28.631032] The buggy address belongs to the physical page:
[ 28.631575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 28.632152] flags: 0x200000000000000(node=0|zone=2)
[ 28.632597] page_type: f5(slab)
[ 28.632834] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 28.633475] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 28.634174] page dumped because: kasan: bad access detected
[ 28.634557]
[ 28.634709] Memory state around the buggy address:
[ 28.635194] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.635822] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.636508] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.636920] ^
[ 28.637451] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.637816] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.640331] ==================================================================
---
[ 26.906634] ==================================================================
[ 26.908507] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1/0x5450
[ 26.909684] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 26.912658]
[ 26.912853] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 26.912971] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.913008] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.913071] Call Trace:
[ 26.913117] <TASK>
[ 26.913188] dump_stack_lvl+0x73/0xb0
[ 26.913279] print_report+0xd1/0x640
[ 26.913340] ? __virt_addr_valid+0x1db/0x2d0
[ 26.913404] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.913480] kasan_report+0x102/0x140
[ 26.913536] ? kasan_atomics_helper+0x4a1/0x5450
[ 26.913607] ? kasan_atomics_helper+0x4a1/0x5450
[ 26.913687] kasan_check_range+0x10c/0x1c0
[ 26.913857] __kasan_check_write+0x18/0x20
[ 26.914010] kasan_atomics_helper+0x4a1/0x5450
[ 26.914094] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 26.914475] ? __kmalloc_cache_noprof+0x184/0x410
[ 26.914555] ? kasan_atomics+0x153/0x310
[ 26.914626] kasan_atomics+0x1dd/0x310
[ 26.914690] ? __pfx_kasan_atomics+0x10/0x10
[ 26.914754] ? __pfx_read_tsc+0x10/0x10
[ 26.914813] ? ktime_get_ts64+0x86/0x230
[ 26.914886] kunit_try_run_case+0x1b3/0x490
[ 26.914950] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.915009] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 26.915075] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.916866] ? __kthread_parkme+0x82/0x160
[ 26.916950] ? preempt_count_sub+0x50/0x80
[ 26.917025] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.917093] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.917209] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.917286] kthread+0x324/0x6d0
[ 26.917347] ? trace_preempt_on+0x20/0xc0
[ 26.917415] ? __pfx_kthread+0x10/0x10
[ 26.917477] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.917542] ? calculate_sigpending+0x7b/0xa0
[ 26.917604] ? __pfx_kthread+0x10/0x10
[ 26.917668] ret_from_fork+0x41/0x80
[ 26.917721] ? __pfx_kthread+0x10/0x10
[ 26.917785] ret_from_fork_asm+0x1a/0x30
[ 26.917872] </TASK>
[ 26.917906]
[ 26.934152] Allocated by task 273:
[ 26.934591] kasan_save_stack+0x3d/0x60
[ 26.935023] kasan_save_track+0x18/0x40
[ 26.935508] kasan_save_alloc_info+0x3b/0x50
[ 26.935835] __kasan_kmalloc+0xb7/0xc0
[ 26.936267] __kmalloc_cache_noprof+0x184/0x410
[ 26.936723] kasan_atomics+0x96/0x310
[ 26.937179] kunit_try_run_case+0x1b3/0x490
[ 26.937612] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.938215] kthread+0x324/0x6d0
[ 26.938466] ret_from_fork+0x41/0x80
[ 26.938874] ret_from_fork_asm+0x1a/0x30
[ 26.939381]
[ 26.939608] The buggy address belongs to the object at ffff888102a6c880
[ 26.939608] which belongs to the cache kmalloc-64 of size 64
[ 26.940520] The buggy address is located 0 bytes to the right of
[ 26.940520] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 26.941296]
[ 26.941512] The buggy address belongs to the physical page:
[ 26.941904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 26.942653] flags: 0x200000000000000(node=0|zone=2)
[ 26.943186] page_type: f5(slab)
[ 26.943562] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 26.944295] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 26.944869] page dumped because: kasan: bad access detected
[ 26.945274]
[ 26.945505] Memory state around the buggy address:
[ 26.945950] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.946713] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.947127] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 26.947618] ^
[ 26.948204] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.948862] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.949408] ==================================================================
---
[ 27.032064] ==================================================================
[ 27.032969] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5ff/0x5450
[ 27.033879] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 27.034431]
[ 27.034644] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 27.034759] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.034796] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.034860] Call Trace:
[ 27.034902] <TASK>
[ 27.034950] dump_stack_lvl+0x73/0xb0
[ 27.035029] print_report+0xd1/0x640
[ 27.035091] ? __virt_addr_valid+0x1db/0x2d0
[ 27.035210] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.035315] kasan_report+0x102/0x140
[ 27.035382] ? kasan_atomics_helper+0x5ff/0x5450
[ 27.035486] ? kasan_atomics_helper+0x5ff/0x5450
[ 27.035594] kasan_check_range+0x10c/0x1c0
[ 27.035687] __kasan_check_write+0x18/0x20
[ 27.035775] kasan_atomics_helper+0x5ff/0x5450
[ 27.035856] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 27.035973] ? __kmalloc_cache_noprof+0x184/0x410
[ 27.036075] ? kasan_atomics+0x153/0x310
[ 27.036198] kasan_atomics+0x1dd/0x310
[ 27.036272] ? __pfx_kasan_atomics+0x10/0x10
[ 27.036338] ? __pfx_read_tsc+0x10/0x10
[ 27.036398] ? ktime_get_ts64+0x86/0x230
[ 27.036470] kunit_try_run_case+0x1b3/0x490
[ 27.036536] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.036596] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.036664] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.036731] ? __kthread_parkme+0x82/0x160
[ 27.036793] ? preempt_count_sub+0x50/0x80
[ 27.036864] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.036928] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.037001] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.037073] kthread+0x324/0x6d0
[ 27.037179] ? trace_preempt_on+0x20/0xc0
[ 27.037290] ? __pfx_kthread+0x10/0x10
[ 27.037367] ? _raw_spin_unlock_irq+0x47/0x80
[ 27.037431] ? calculate_sigpending+0x7b/0xa0
[ 27.037537] ? __pfx_kthread+0x10/0x10
[ 27.037599] ret_from_fork+0x41/0x80
[ 27.037654] ? __pfx_kthread+0x10/0x10
[ 27.037750] ret_from_fork_asm+0x1a/0x30
[ 27.037845] </TASK>
[ 27.037880]
[ 27.050733] Allocated by task 273:
[ 27.051151] kasan_save_stack+0x3d/0x60
[ 27.053615] kasan_save_track+0x18/0x40
[ 27.053999] kasan_save_alloc_info+0x3b/0x50
[ 27.056135] __kasan_kmalloc+0xb7/0xc0
[ 27.058545] __kmalloc_cache_noprof+0x184/0x410
[ 27.059098] kasan_atomics+0x96/0x310
[ 27.059591] kunit_try_run_case+0x1b3/0x490
[ 27.060046] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.060840] kthread+0x324/0x6d0
[ 27.061694] ret_from_fork+0x41/0x80
[ 27.061950] ret_from_fork_asm+0x1a/0x30
[ 27.063251]
[ 27.063894] The buggy address belongs to the object at ffff888102a6c880
[ 27.063894] which belongs to the cache kmalloc-64 of size 64
[ 27.065456] The buggy address is located 0 bytes to the right of
[ 27.065456] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 27.066025]
[ 27.066228] The buggy address belongs to the physical page:
[ 27.066528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 27.068222] flags: 0x200000000000000(node=0|zone=2)
[ 27.068701] page_type: f5(slab)
[ 27.069061] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 27.069875] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 27.070597] page dumped because: kasan: bad access detected
[ 27.071222]
[ 27.071526] Memory state around the buggy address:
[ 27.071997] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.072743] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.073340] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 27.073971] ^
[ 27.074505] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.075190] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.075801] ==================================================================
---
[ 28.685229] ==================================================================
[ 28.685806] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b23/0x5450
[ 28.688153] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 28.688812]
[ 28.689330] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 28.689408] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.689429] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 28.689463] Call Trace:
[ 28.689497] <TASK>
[ 28.689538] dump_stack_lvl+0x73/0xb0
[ 28.689588] print_report+0xd1/0x640
[ 28.689618] ? __virt_addr_valid+0x1db/0x2d0
[ 28.689670] ? kasan_complete_mode_report_info+0x2a/0x200
[ 28.689712] kasan_report+0x102/0x140
[ 28.689741] ? kasan_atomics_helper+0x1b23/0x5450
[ 28.689777] ? kasan_atomics_helper+0x1b23/0x5450
[ 28.689820] kasan_check_range+0x10c/0x1c0
[ 28.689853] __kasan_check_write+0x18/0x20
[ 28.689885] kasan_atomics_helper+0x1b23/0x5450
[ 28.689921] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 28.689957] ? __kmalloc_cache_noprof+0x184/0x410
[ 28.689992] ? kasan_atomics+0x153/0x310
[ 28.690028] kasan_atomics+0x1dd/0x310
[ 28.690058] ? __pfx_kasan_atomics+0x10/0x10
[ 28.690098] ? __pfx_read_tsc+0x10/0x10
[ 28.690211] ? ktime_get_ts64+0x86/0x230
[ 28.690286] kunit_try_run_case+0x1b3/0x490
[ 28.690350] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.690408] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 28.690449] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 28.690485] ? __kthread_parkme+0x82/0x160
[ 28.690516] ? preempt_count_sub+0x50/0x80
[ 28.690552] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.690585] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.690624] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 28.690661] kthread+0x324/0x6d0
[ 28.690691] ? trace_preempt_on+0x20/0xc0
[ 28.690727] ? __pfx_kthread+0x10/0x10
[ 28.690758] ? _raw_spin_unlock_irq+0x47/0x80
[ 28.690791] ? calculate_sigpending+0x7b/0xa0
[ 28.690822] ? __pfx_kthread+0x10/0x10
[ 28.690855] ret_from_fork+0x41/0x80
[ 28.690881] ? __pfx_kthread+0x10/0x10
[ 28.690914] ret_from_fork_asm+0x1a/0x30
[ 28.690958] </TASK>
[ 28.690976]
[ 28.707450] Allocated by task 273:
[ 28.707850] kasan_save_stack+0x3d/0x60
[ 28.708424] kasan_save_track+0x18/0x40
[ 28.708844] kasan_save_alloc_info+0x3b/0x50
[ 28.709521] __kasan_kmalloc+0xb7/0xc0
[ 28.710185] __kmalloc_cache_noprof+0x184/0x410
[ 28.710518] kasan_atomics+0x96/0x310
[ 28.710778] kunit_try_run_case+0x1b3/0x490
[ 28.711041] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.711721] kthread+0x324/0x6d0
[ 28.712236] ret_from_fork+0x41/0x80
[ 28.712849] ret_from_fork_asm+0x1a/0x30
[ 28.713360]
[ 28.713595] The buggy address belongs to the object at ffff888102a6c880
[ 28.713595] which belongs to the cache kmalloc-64 of size 64
[ 28.714674] The buggy address is located 0 bytes to the right of
[ 28.714674] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 28.715314]
[ 28.715742] The buggy address belongs to the physical page:
[ 28.716716] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 28.717564] flags: 0x200000000000000(node=0|zone=2)
[ 28.718042] page_type: f5(slab)
[ 28.718539] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 28.719436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 28.719824] page dumped because: kasan: bad access detected
[ 28.720202]
[ 28.720417] Memory state around the buggy address:
[ 28.721044] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.721968] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.722664] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.723344] ^
[ 28.724000] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.724522] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.725399] ==================================================================
---
[ 28.809174] ==================================================================
[ 28.809762] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce2/0x5450
[ 28.810501] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 28.811293]
[ 28.812108] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 28.812223] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.812253] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 28.812300] Call Trace:
[ 28.812337] <TASK>
[ 28.812375] dump_stack_lvl+0x73/0xb0
[ 28.812445] print_report+0xd1/0x640
[ 28.812488] ? __virt_addr_valid+0x1db/0x2d0
[ 28.812536] ? kasan_complete_mode_report_info+0x2a/0x200
[ 28.812595] kasan_report+0x102/0x140
[ 28.812646] ? kasan_atomics_helper+0x1ce2/0x5450
[ 28.812709] ? kasan_atomics_helper+0x1ce2/0x5450
[ 28.812787] kasan_check_range+0x10c/0x1c0
[ 28.812852] __kasan_check_write+0x18/0x20
[ 28.812914] kasan_atomics_helper+0x1ce2/0x5450
[ 28.812987] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 28.813057] ? __kmalloc_cache_noprof+0x184/0x410
[ 28.813127] ? kasan_atomics+0x153/0x310
[ 28.813218] kasan_atomics+0x1dd/0x310
[ 28.813772] ? __pfx_kasan_atomics+0x10/0x10
[ 28.813853] ? __pfx_read_tsc+0x10/0x10
[ 28.813916] ? ktime_get_ts64+0x86/0x230
[ 28.813989] kunit_try_run_case+0x1b3/0x490
[ 28.814055] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.814185] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 28.814249] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 28.814287] ? __kthread_parkme+0x82/0x160
[ 28.814321] ? preempt_count_sub+0x50/0x80
[ 28.814360] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.814393] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.814433] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 28.814471] kthread+0x324/0x6d0
[ 28.814502] ? trace_preempt_on+0x20/0xc0
[ 28.814536] ? __pfx_kthread+0x10/0x10
[ 28.814568] ? _raw_spin_unlock_irq+0x47/0x80
[ 28.814600] ? calculate_sigpending+0x7b/0xa0
[ 28.814632] ? __pfx_kthread+0x10/0x10
[ 28.814664] ret_from_fork+0x41/0x80
[ 28.814693] ? __pfx_kthread+0x10/0x10
[ 28.814725] ret_from_fork_asm+0x1a/0x30
[ 28.814771] </TASK>
[ 28.814788]
[ 28.829245] Allocated by task 273:
[ 28.829540] kasan_save_stack+0x3d/0x60
[ 28.829895] kasan_save_track+0x18/0x40
[ 28.830415] kasan_save_alloc_info+0x3b/0x50
[ 28.831025] __kasan_kmalloc+0xb7/0xc0
[ 28.831568] __kmalloc_cache_noprof+0x184/0x410
[ 28.832042] kasan_atomics+0x96/0x310
[ 28.832498] kunit_try_run_case+0x1b3/0x490
[ 28.832934] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.833548] kthread+0x324/0x6d0
[ 28.833936] ret_from_fork+0x41/0x80
[ 28.834260] ret_from_fork_asm+0x1a/0x30
[ 28.834531]
[ 28.834686] The buggy address belongs to the object at ffff888102a6c880
[ 28.834686] which belongs to the cache kmalloc-64 of size 64
[ 28.835771] The buggy address is located 0 bytes to the right of
[ 28.835771] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 28.836868]
[ 28.837146] The buggy address belongs to the physical page:
[ 28.837594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 28.838174] flags: 0x200000000000000(node=0|zone=2)
[ 28.838648] page_type: f5(slab)
[ 28.838985] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 28.839573] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 28.840308] page dumped because: kasan: bad access detected
[ 28.840717]
[ 28.840874] Memory state around the buggy address:
[ 28.841417] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.842134] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.842678] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.843195] ^
[ 28.843488] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.843856] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.844374] ==================================================================
---
[ 29.261520] ==================================================================
[ 29.262434] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218b/0x5450
[ 29.263072] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 29.263755]
[ 29.264050] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 29.264220] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.264261] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 29.264324] Call Trace:
[ 29.264366] <TASK>
[ 29.264416] dump_stack_lvl+0x73/0xb0
[ 29.264506] print_report+0xd1/0x640
[ 29.264566] ? __virt_addr_valid+0x1db/0x2d0
[ 29.264629] ? kasan_complete_mode_report_info+0x2a/0x200
[ 29.264762] kasan_report+0x102/0x140
[ 29.264855] ? kasan_atomics_helper+0x218b/0x5450
[ 29.264928] ? kasan_atomics_helper+0x218b/0x5450
[ 29.265009] kasan_check_range+0x10c/0x1c0
[ 29.265072] __kasan_check_write+0x18/0x20
[ 29.265208] kasan_atomics_helper+0x218b/0x5450
[ 29.265281] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 29.265353] ? __kmalloc_cache_noprof+0x184/0x410
[ 29.265422] ? kasan_atomics+0x153/0x310
[ 29.265493] kasan_atomics+0x1dd/0x310
[ 29.265555] ? __pfx_kasan_atomics+0x10/0x10
[ 29.265618] ? __pfx_read_tsc+0x10/0x10
[ 29.265677] ? ktime_get_ts64+0x86/0x230
[ 29.265751] kunit_try_run_case+0x1b3/0x490
[ 29.265814] ? __pfx_kunit_try_run_case+0x10/0x10
[ 29.265871] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 29.265933] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 29.265995] ? __kthread_parkme+0x82/0x160
[ 29.266053] ? preempt_count_sub+0x50/0x80
[ 29.266261] ? __pfx_kunit_try_run_case+0x10/0x10
[ 29.266326] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 29.266483] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 29.266562] kthread+0x324/0x6d0
[ 29.266625] ? trace_preempt_on+0x20/0xc0
[ 29.266676] ? __pfx_kthread+0x10/0x10
[ 29.266712] ? _raw_spin_unlock_irq+0x47/0x80
[ 29.266747] ? calculate_sigpending+0x7b/0xa0
[ 29.266780] ? __pfx_kthread+0x10/0x10
[ 29.266814] ret_from_fork+0x41/0x80
[ 29.266841] ? __pfx_kthread+0x10/0x10
[ 29.266874] ret_from_fork_asm+0x1a/0x30
[ 29.266921] </TASK>
[ 29.266939]
[ 29.280525] Allocated by task 273:
[ 29.280947] kasan_save_stack+0x3d/0x60
[ 29.281605] kasan_save_track+0x18/0x40
[ 29.281910] kasan_save_alloc_info+0x3b/0x50
[ 29.282480] __kasan_kmalloc+0xb7/0xc0
[ 29.282747] __kmalloc_cache_noprof+0x184/0x410
[ 29.283026] kasan_atomics+0x96/0x310
[ 29.283525] kunit_try_run_case+0x1b3/0x490
[ 29.284033] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 29.284746] kthread+0x324/0x6d0
[ 29.285135] ret_from_fork+0x41/0x80
[ 29.285532] ret_from_fork_asm+0x1a/0x30
[ 29.285807]
[ 29.285967] The buggy address belongs to the object at ffff888102a6c880
[ 29.285967] which belongs to the cache kmalloc-64 of size 64
[ 29.286929] The buggy address is located 0 bytes to the right of
[ 29.286929] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 29.288109]
[ 29.288486] The buggy address belongs to the physical page:
[ 29.288990] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 29.289612] flags: 0x200000000000000(node=0|zone=2)
[ 29.290103] page_type: f5(slab)
[ 29.290577] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 29.291142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 29.291676] page dumped because: kasan: bad access detected
[ 29.291991]
[ 29.292153] Memory state around the buggy address:
[ 29.292453] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.292820] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.293203] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 29.293824] ^
[ 29.294374] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.295088] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.295759] ==================================================================
---
[ 28.205403] ==================================================================
[ 28.205748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1468/0x5450
[ 28.206122] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 28.207602]
[ 28.207810] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 28.207934] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.207973] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 28.208034] Call Trace:
[ 28.208064] <TASK>
[ 28.208098] dump_stack_lvl+0x73/0xb0
[ 28.208181] print_report+0xd1/0x640
[ 28.208282] ? __virt_addr_valid+0x1db/0x2d0
[ 28.208334] ? kasan_complete_mode_report_info+0x2a/0x200
[ 28.208374] kasan_report+0x102/0x140
[ 28.208403] ? kasan_atomics_helper+0x1468/0x5450
[ 28.208440] ? kasan_atomics_helper+0x1468/0x5450
[ 28.208481] kasan_check_range+0x10c/0x1c0
[ 28.208514] __kasan_check_write+0x18/0x20
[ 28.208545] kasan_atomics_helper+0x1468/0x5450
[ 28.208582] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 28.208617] ? __kmalloc_cache_noprof+0x184/0x410
[ 28.208651] ? kasan_atomics+0x153/0x310
[ 28.208688] kasan_atomics+0x1dd/0x310
[ 28.208718] ? __pfx_kasan_atomics+0x10/0x10
[ 28.208751] ? __pfx_read_tsc+0x10/0x10
[ 28.208782] ? ktime_get_ts64+0x86/0x230
[ 28.208818] kunit_try_run_case+0x1b3/0x490
[ 28.208850] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.208881] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 28.208915] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 28.208950] ? __kthread_parkme+0x82/0x160
[ 28.208982] ? preempt_count_sub+0x50/0x80
[ 28.209018] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.209051] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.209094] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 28.209216] kthread+0x324/0x6d0
[ 28.209276] ? trace_preempt_on+0x20/0xc0
[ 28.209344] ? __pfx_kthread+0x10/0x10
[ 28.209405] ? _raw_spin_unlock_irq+0x47/0x80
[ 28.209472] ? calculate_sigpending+0x7b/0xa0
[ 28.209532] ? __pfx_kthread+0x10/0x10
[ 28.209597] ret_from_fork+0x41/0x80
[ 28.209695] ? __pfx_kthread+0x10/0x10
[ 28.209739] ret_from_fork_asm+0x1a/0x30
[ 28.209788] </TASK>
[ 28.209806]
[ 28.229371] Allocated by task 273:
[ 28.229877] kasan_save_stack+0x3d/0x60
[ 28.230459] kasan_save_track+0x18/0x40
[ 28.230950] kasan_save_alloc_info+0x3b/0x50
[ 28.231533] __kasan_kmalloc+0xb7/0xc0
[ 28.231834] __kmalloc_cache_noprof+0x184/0x410
[ 28.232466] kasan_atomics+0x96/0x310
[ 28.232935] kunit_try_run_case+0x1b3/0x490
[ 28.233510] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.233902] kthread+0x324/0x6d0
[ 28.234225] ret_from_fork+0x41/0x80
[ 28.234522] ret_from_fork_asm+0x1a/0x30
[ 28.234941]
[ 28.235214] The buggy address belongs to the object at ffff888102a6c880
[ 28.235214] which belongs to the cache kmalloc-64 of size 64
[ 28.236045] The buggy address is located 0 bytes to the right of
[ 28.236045] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 28.237154]
[ 28.237409] The buggy address belongs to the physical page:
[ 28.237927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 28.238394] flags: 0x200000000000000(node=0|zone=2)
[ 28.238920] page_type: f5(slab)
[ 28.239356] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 28.240073] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 28.240618] page dumped because: kasan: bad access detected
[ 28.241220]
[ 28.241440] Memory state around the buggy address:
[ 28.241809] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.242476] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.243046] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.243582] ^
[ 28.244081] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.244606] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.245189] ==================================================================
---
[ 27.655810] ==================================================================
[ 27.656406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf11/0x5450
[ 27.657047] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 27.657625]
[ 27.657830] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 27.657898] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.657918] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.657952] Call Trace:
[ 27.657976] <TASK>
[ 27.658006] dump_stack_lvl+0x73/0xb0
[ 27.658054] print_report+0xd1/0x640
[ 27.658084] ? __virt_addr_valid+0x1db/0x2d0
[ 27.658136] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.658212] kasan_report+0x102/0x140
[ 27.658263] ? kasan_atomics_helper+0xf11/0x5450
[ 27.658390] ? kasan_atomics_helper+0xf11/0x5450
[ 27.658506] kasan_check_range+0x10c/0x1c0
[ 27.658569] __kasan_check_write+0x18/0x20
[ 27.658632] kasan_atomics_helper+0xf11/0x5450
[ 27.658754] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 27.658857] ? __kmalloc_cache_noprof+0x184/0x410
[ 27.658926] ? kasan_atomics+0x153/0x310
[ 27.658987] kasan_atomics+0x1dd/0x310
[ 27.659048] ? __pfx_kasan_atomics+0x10/0x10
[ 27.659109] ? __pfx_read_tsc+0x10/0x10
[ 27.659492] ? ktime_get_ts64+0x86/0x230
[ 27.659576] kunit_try_run_case+0x1b3/0x490
[ 27.659709] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.659776] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.659844] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.659923] ? __kthread_parkme+0x82/0x160
[ 27.659986] ? preempt_count_sub+0x50/0x80
[ 27.660056] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.660188] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.660269] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.660339] kthread+0x324/0x6d0
[ 27.660399] ? trace_preempt_on+0x20/0xc0
[ 27.660465] ? __pfx_kthread+0x10/0x10
[ 27.660519] ? _raw_spin_unlock_irq+0x47/0x80
[ 27.660575] ? calculate_sigpending+0x7b/0xa0
[ 27.660635] ? __pfx_kthread+0x10/0x10
[ 27.660697] ret_from_fork+0x41/0x80
[ 27.660751] ? __pfx_kthread+0x10/0x10
[ 27.660813] ret_from_fork_asm+0x1a/0x30
[ 27.660902] </TASK>
[ 27.660934]
[ 27.676461] Allocated by task 273:
[ 27.676925] kasan_save_stack+0x3d/0x60
[ 27.677488] kasan_save_track+0x18/0x40
[ 27.677938] kasan_save_alloc_info+0x3b/0x50
[ 27.678486] __kasan_kmalloc+0xb7/0xc0
[ 27.678930] __kmalloc_cache_noprof+0x184/0x410
[ 27.679485] kasan_atomics+0x96/0x310
[ 27.680020] kunit_try_run_case+0x1b3/0x490
[ 27.680546] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.680874] kthread+0x324/0x6d0
[ 27.681181] ret_from_fork+0x41/0x80
[ 27.681570] ret_from_fork_asm+0x1a/0x30
[ 27.681843]
[ 27.682063] The buggy address belongs to the object at ffff888102a6c880
[ 27.682063] which belongs to the cache kmalloc-64 of size 64
[ 27.683004] The buggy address is located 0 bytes to the right of
[ 27.683004] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 27.683695]
[ 27.683858] The buggy address belongs to the physical page:
[ 27.684441] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 27.685195] flags: 0x200000000000000(node=0|zone=2)
[ 27.685606] page_type: f5(slab)
[ 27.685846] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 27.686573] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 27.687291] page dumped because: kasan: bad access detected
[ 27.687639]
[ 27.687796] Memory state around the buggy address:
[ 27.688138] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.688810] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.689497] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 27.690248] ^
[ 27.690661] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.691040] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.691716] ==================================================================
---
[ 28.726806] ==================================================================
[ 28.727495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c19/0x5450
[ 28.728318] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 28.729012]
[ 28.729273] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 28.729390] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.729428] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 28.729493] Call Trace:
[ 28.729536] <TASK>
[ 28.729584] dump_stack_lvl+0x73/0xb0
[ 28.729668] print_report+0xd1/0x640
[ 28.729730] ? __virt_addr_valid+0x1db/0x2d0
[ 28.729793] ? kasan_complete_mode_report_info+0x2a/0x200
[ 28.729863] kasan_report+0x102/0x140
[ 28.729919] ? kasan_atomics_helper+0x1c19/0x5450
[ 28.730067] ? kasan_atomics_helper+0x1c19/0x5450
[ 28.730318] kasan_check_range+0x10c/0x1c0
[ 28.730396] __kasan_check_write+0x18/0x20
[ 28.730525] kasan_atomics_helper+0x1c19/0x5450
[ 28.730706] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 28.730787] ? __kmalloc_cache_noprof+0x184/0x410
[ 28.730859] ? kasan_atomics+0x153/0x310
[ 28.730933] kasan_atomics+0x1dd/0x310
[ 28.730996] ? __pfx_kasan_atomics+0x10/0x10
[ 28.731061] ? __pfx_read_tsc+0x10/0x10
[ 28.731184] ? ktime_get_ts64+0x86/0x230
[ 28.731234] kunit_try_run_case+0x1b3/0x490
[ 28.731270] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.731303] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 28.731338] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 28.731373] ? __kthread_parkme+0x82/0x160
[ 28.731405] ? preempt_count_sub+0x50/0x80
[ 28.731440] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.731472] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.731507] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 28.731545] kthread+0x324/0x6d0
[ 28.731576] ? trace_preempt_on+0x20/0xc0
[ 28.731608] ? __pfx_kthread+0x10/0x10
[ 28.731641] ? _raw_spin_unlock_irq+0x47/0x80
[ 28.731672] ? calculate_sigpending+0x7b/0xa0
[ 28.731705] ? __pfx_kthread+0x10/0x10
[ 28.731737] ret_from_fork+0x41/0x80
[ 28.731764] ? __pfx_kthread+0x10/0x10
[ 28.731796] ret_from_fork_asm+0x1a/0x30
[ 28.731840] </TASK>
[ 28.731860]
[ 28.748327] Allocated by task 273:
[ 28.748815] kasan_save_stack+0x3d/0x60
[ 28.749404] kasan_save_track+0x18/0x40
[ 28.749911] kasan_save_alloc_info+0x3b/0x50
[ 28.750491] __kasan_kmalloc+0xb7/0xc0
[ 28.750964] __kmalloc_cache_noprof+0x184/0x410
[ 28.751570] kasan_atomics+0x96/0x310
[ 28.751993] kunit_try_run_case+0x1b3/0x490
[ 28.752462] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.753079] kthread+0x324/0x6d0
[ 28.753602] ret_from_fork+0x41/0x80
[ 28.754133] ret_from_fork_asm+0x1a/0x30
[ 28.754682]
[ 28.754901] The buggy address belongs to the object at ffff888102a6c880
[ 28.754901] which belongs to the cache kmalloc-64 of size 64
[ 28.755817] The buggy address is located 0 bytes to the right of
[ 28.755817] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 28.756683]
[ 28.756987] The buggy address belongs to the physical page:
[ 28.757354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 28.757975] flags: 0x200000000000000(node=0|zone=2)
[ 28.758581] page_type: f5(slab)
[ 28.758949] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 28.759753] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 28.760389] page dumped because: kasan: bad access detected
[ 28.760727]
[ 28.760883] Memory state around the buggy address:
[ 28.761234] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.762001] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.762763] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.763446] ^
[ 28.763732] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.764252] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.765026] ==================================================================
---
[ 27.119454] ==================================================================
[ 27.119975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x730/0x5450
[ 27.120411] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 27.120995]
[ 27.121288] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 27.121436] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.121478] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.121552] Call Trace:
[ 27.121613] <TASK>
[ 27.121664] dump_stack_lvl+0x73/0xb0
[ 27.121743] print_report+0xd1/0x640
[ 27.121803] ? __virt_addr_valid+0x1db/0x2d0
[ 27.121861] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.121932] kasan_report+0x102/0x140
[ 27.121986] ? kasan_atomics_helper+0x730/0x5450
[ 27.122064] ? kasan_atomics_helper+0x730/0x5450
[ 27.122222] kasan_check_range+0x10c/0x1c0
[ 27.122289] __kasan_check_write+0x18/0x20
[ 27.122354] kasan_atomics_helper+0x730/0x5450
[ 27.122420] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 27.122533] ? __kmalloc_cache_noprof+0x184/0x410
[ 27.122608] ? kasan_atomics+0x153/0x310
[ 27.122670] kasan_atomics+0x1dd/0x310
[ 27.122725] ? __pfx_kasan_atomics+0x10/0x10
[ 27.122788] ? __pfx_read_tsc+0x10/0x10
[ 27.122845] ? ktime_get_ts64+0x86/0x230
[ 27.122936] kunit_try_run_case+0x1b3/0x490
[ 27.123022] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.123082] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.123218] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.123290] ? __kthread_parkme+0x82/0x160
[ 27.123355] ? preempt_count_sub+0x50/0x80
[ 27.123426] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.123489] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.123580] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.123680] kthread+0x324/0x6d0
[ 27.123748] ? trace_preempt_on+0x20/0xc0
[ 27.123814] ? __pfx_kthread+0x10/0x10
[ 27.123872] ? _raw_spin_unlock_irq+0x47/0x80
[ 27.123948] ? calculate_sigpending+0x7b/0xa0
[ 27.124012] ? __pfx_kthread+0x10/0x10
[ 27.124074] ret_from_fork+0x41/0x80
[ 27.124191] ? __pfx_kthread+0x10/0x10
[ 27.124259] ret_from_fork_asm+0x1a/0x30
[ 27.124384] </TASK>
[ 27.124428]
[ 27.140940] Allocated by task 273:
[ 27.141466] kasan_save_stack+0x3d/0x60
[ 27.141905] kasan_save_track+0x18/0x40
[ 27.142565] kasan_save_alloc_info+0x3b/0x50
[ 27.143446] __kasan_kmalloc+0xb7/0xc0
[ 27.143872] __kmalloc_cache_noprof+0x184/0x410
[ 27.144436] kasan_atomics+0x96/0x310
[ 27.144834] kunit_try_run_case+0x1b3/0x490
[ 27.145125] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.145634] kthread+0x324/0x6d0
[ 27.145962] ret_from_fork+0x41/0x80
[ 27.146309] ret_from_fork_asm+0x1a/0x30
[ 27.146792]
[ 27.147039] The buggy address belongs to the object at ffff888102a6c880
[ 27.147039] which belongs to the cache kmalloc-64 of size 64
[ 27.148127] The buggy address is located 0 bytes to the right of
[ 27.148127] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 27.149141]
[ 27.149429] The buggy address belongs to the physical page:
[ 27.150036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 27.150874] flags: 0x200000000000000(node=0|zone=2)
[ 27.151605] page_type: f5(slab)
[ 27.152014] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 27.152553] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 27.153051] page dumped because: kasan: bad access detected
[ 27.153498]
[ 27.153716] Memory state around the buggy address:
[ 27.154220] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.154693] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.155410] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 27.155794] ^
[ 27.156327] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.156814] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.157445] ==================================================================
---
[ 26.997719] ==================================================================
[ 26.998856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x566/0x5450
[ 26.999668] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 27.000637]
[ 27.001043] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 27.001148] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.001198] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.001251] Call Trace:
[ 27.001294] <TASK>
[ 27.001335] dump_stack_lvl+0x73/0xb0
[ 27.001409] print_report+0xd1/0x640
[ 27.002278] ? __virt_addr_valid+0x1db/0x2d0
[ 27.002349] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.002425] kasan_report+0x102/0x140
[ 27.002480] ? kasan_atomics_helper+0x566/0x5450
[ 27.002550] ? kasan_atomics_helper+0x566/0x5450
[ 27.002613] kasan_check_range+0x10c/0x1c0
[ 27.002662] __kasan_check_write+0x18/0x20
[ 27.002696] kasan_atomics_helper+0x566/0x5450
[ 27.002735] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 27.002794] ? __kmalloc_cache_noprof+0x184/0x410
[ 27.002833] ? kasan_atomics+0x153/0x310
[ 27.002871] kasan_atomics+0x1dd/0x310
[ 27.002902] ? __pfx_kasan_atomics+0x10/0x10
[ 27.002936] ? __pfx_read_tsc+0x10/0x10
[ 27.002967] ? ktime_get_ts64+0x86/0x230
[ 27.003004] kunit_try_run_case+0x1b3/0x490
[ 27.003036] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.003067] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.003115] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.003201] ? __kthread_parkme+0x82/0x160
[ 27.003264] ? preempt_count_sub+0x50/0x80
[ 27.003332] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.003395] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.003466] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.003535] kthread+0x324/0x6d0
[ 27.003591] ? trace_preempt_on+0x20/0xc0
[ 27.003653] ? __pfx_kthread+0x10/0x10
[ 27.003705] ? _raw_spin_unlock_irq+0x47/0x80
[ 27.003761] ? calculate_sigpending+0x7b/0xa0
[ 27.003817] ? __pfx_kthread+0x10/0x10
[ 27.003872] ret_from_fork+0x41/0x80
[ 27.003933] ? __pfx_kthread+0x10/0x10
[ 27.003986] ret_from_fork_asm+0x1a/0x30
[ 27.004066] </TASK>
[ 27.004100]
[ 27.014082] Allocated by task 273:
[ 27.014436] kasan_save_stack+0x3d/0x60
[ 27.014699] kasan_save_track+0x18/0x40
[ 27.014946] kasan_save_alloc_info+0x3b/0x50
[ 27.017794] __kasan_kmalloc+0xb7/0xc0
[ 27.018067] __kmalloc_cache_noprof+0x184/0x410
[ 27.018406] kasan_atomics+0x96/0x310
[ 27.018665] kunit_try_run_case+0x1b3/0x490
[ 27.018937] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.019286] kthread+0x324/0x6d0
[ 27.019539] ret_from_fork+0x41/0x80
[ 27.019789] ret_from_fork_asm+0x1a/0x30
[ 27.020077]
[ 27.020359] The buggy address belongs to the object at ffff888102a6c880
[ 27.020359] which belongs to the cache kmalloc-64 of size 64
[ 27.020906] The buggy address is located 0 bytes to the right of
[ 27.020906] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 27.021657]
[ 27.021808] The buggy address belongs to the physical page:
[ 27.022089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 27.022753] flags: 0x200000000000000(node=0|zone=2)
[ 27.023062] page_type: f5(slab)
[ 27.023321] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 27.023703] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 27.024080] page dumped because: kasan: bad access detected
[ 27.024586]
[ 27.024792] Memory state around the buggy address:
[ 27.025259] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.027338] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.028312] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 27.029200] ^
[ 27.029672] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.030466] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.030955] ==================================================================
---
[ 27.077463] ==================================================================
[ 27.078238] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x698/0x5450
[ 27.078954] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 27.079809]
[ 27.080010] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 27.080139] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.080196] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.080257] Call Trace:
[ 27.080300] <TASK>
[ 27.080346] dump_stack_lvl+0x73/0xb0
[ 27.080430] print_report+0xd1/0x640
[ 27.080488] ? __virt_addr_valid+0x1db/0x2d0
[ 27.080553] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.080629] kasan_report+0x102/0x140
[ 27.080680] ? kasan_atomics_helper+0x698/0x5450
[ 27.080750] ? kasan_atomics_helper+0x698/0x5450
[ 27.080830] kasan_check_range+0x10c/0x1c0
[ 27.080895] __kasan_check_write+0x18/0x20
[ 27.080959] kasan_atomics_helper+0x698/0x5450
[ 27.081030] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 27.081100] ? __kmalloc_cache_noprof+0x184/0x410
[ 27.081191] ? kasan_atomics+0x153/0x310
[ 27.081267] kasan_atomics+0x1dd/0x310
[ 27.081327] ? __pfx_kasan_atomics+0x10/0x10
[ 27.081393] ? __pfx_read_tsc+0x10/0x10
[ 27.081454] ? ktime_get_ts64+0x86/0x230
[ 27.081526] kunit_try_run_case+0x1b3/0x490
[ 27.081585] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.081627] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.081673] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.081722] ? __kthread_parkme+0x82/0x160
[ 27.081767] ? preempt_count_sub+0x50/0x80
[ 27.081818] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.081863] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.081917] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.081970] kthread+0x324/0x6d0
[ 27.082018] ? trace_preempt_on+0x20/0xc0
[ 27.082080] ? __pfx_kthread+0x10/0x10
[ 27.082136] ? _raw_spin_unlock_irq+0x47/0x80
[ 27.082324] ? calculate_sigpending+0x7b/0xa0
[ 27.082398] ? __pfx_kthread+0x10/0x10
[ 27.082463] ret_from_fork+0x41/0x80
[ 27.082559] ? __pfx_kthread+0x10/0x10
[ 27.082652] ret_from_fork_asm+0x1a/0x30
[ 27.082924] </TASK>
[ 27.082995]
[ 27.100406] Allocated by task 273:
[ 27.100808] kasan_save_stack+0x3d/0x60
[ 27.101353] kasan_save_track+0x18/0x40
[ 27.101775] kasan_save_alloc_info+0x3b/0x50
[ 27.102346] __kasan_kmalloc+0xb7/0xc0
[ 27.102721] __kmalloc_cache_noprof+0x184/0x410
[ 27.103327] kasan_atomics+0x96/0x310
[ 27.103683] kunit_try_run_case+0x1b3/0x490
[ 27.103973] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.104621] kthread+0x324/0x6d0
[ 27.105001] ret_from_fork+0x41/0x80
[ 27.105911] ret_from_fork_asm+0x1a/0x30
[ 27.106910]
[ 27.107561] The buggy address belongs to the object at ffff888102a6c880
[ 27.107561] which belongs to the cache kmalloc-64 of size 64
[ 27.108490] The buggy address is located 0 bytes to the right of
[ 27.108490] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 27.109902]
[ 27.110143] The buggy address belongs to the physical page:
[ 27.110764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 27.111335] flags: 0x200000000000000(node=0|zone=2)
[ 27.111843] page_type: f5(slab)
[ 27.112306] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 27.112853] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 27.113414] page dumped because: kasan: bad access detected
[ 27.113948]
[ 27.114144] Memory state around the buggy address:
[ 27.114666] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.115221] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.115857] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 27.116416] ^
[ 27.116872] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.117494] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.118068] ==================================================================
---
[ 27.414636] ==================================================================
[ 27.415042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6b/0x5450
[ 27.415929] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 27.417813]
[ 27.417977] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 27.418050] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.418085] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.418146] Call Trace:
[ 27.418249] <TASK>
[ 27.418442] dump_stack_lvl+0x73/0xb0
[ 27.418555] print_report+0xd1/0x640
[ 27.418592] ? __virt_addr_valid+0x1db/0x2d0
[ 27.418628] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.418669] kasan_report+0x102/0x140
[ 27.418696] ? kasan_atomics_helper+0xb6b/0x5450
[ 27.418733] ? kasan_atomics_helper+0xb6b/0x5450
[ 27.418775] kasan_check_range+0x10c/0x1c0
[ 27.418807] __kasan_check_write+0x18/0x20
[ 27.418839] kasan_atomics_helper+0xb6b/0x5450
[ 27.418875] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 27.418911] ? __kmalloc_cache_noprof+0x184/0x410
[ 27.418946] ? kasan_atomics+0x153/0x310
[ 27.418983] kasan_atomics+0x1dd/0x310
[ 27.419014] ? __pfx_kasan_atomics+0x10/0x10
[ 27.419047] ? __pfx_read_tsc+0x10/0x10
[ 27.419078] ? ktime_get_ts64+0x86/0x230
[ 27.419153] kunit_try_run_case+0x1b3/0x490
[ 27.419211] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.419242] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.419277] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.419312] ? __kthread_parkme+0x82/0x160
[ 27.419344] ? preempt_count_sub+0x50/0x80
[ 27.419381] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.419412] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.419449] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.419486] kthread+0x324/0x6d0
[ 27.419516] ? trace_preempt_on+0x20/0xc0
[ 27.419550] ? __pfx_kthread+0x10/0x10
[ 27.419581] ? _raw_spin_unlock_irq+0x47/0x80
[ 27.419653] ? calculate_sigpending+0x7b/0xa0
[ 27.419686] ? __pfx_kthread+0x10/0x10
[ 27.419720] ret_from_fork+0x41/0x80
[ 27.419748] ? __pfx_kthread+0x10/0x10
[ 27.419780] ret_from_fork_asm+0x1a/0x30
[ 27.419827] </TASK>
[ 27.419845]
[ 27.432990] Allocated by task 273:
[ 27.433437] kasan_save_stack+0x3d/0x60
[ 27.434013] kasan_save_track+0x18/0x40
[ 27.434549] kasan_save_alloc_info+0x3b/0x50
[ 27.435068] __kasan_kmalloc+0xb7/0xc0
[ 27.435524] __kmalloc_cache_noprof+0x184/0x410
[ 27.436083] kasan_atomics+0x96/0x310
[ 27.436525] kunit_try_run_case+0x1b3/0x490
[ 27.436948] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.437572] kthread+0x324/0x6d0
[ 27.437821] ret_from_fork+0x41/0x80
[ 27.438066] ret_from_fork_asm+0x1a/0x30
[ 27.438630]
[ 27.438979] The buggy address belongs to the object at ffff888102a6c880
[ 27.438979] which belongs to the cache kmalloc-64 of size 64
[ 27.440227] The buggy address is located 0 bytes to the right of
[ 27.440227] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 27.440905]
[ 27.441066] The buggy address belongs to the physical page:
[ 27.441596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 27.442406] flags: 0x200000000000000(node=0|zone=2)
[ 27.442889] page_type: f5(slab)
[ 27.443433] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 27.443928] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 27.444877] page dumped because: kasan: bad access detected
[ 27.448242]
[ 27.448885] Memory state around the buggy address:
[ 27.449591] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.450030] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.450705] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 27.451996] ^
[ 27.452551] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.453401] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.454491] ==================================================================
---
[ 27.159102] ==================================================================
[ 27.160461] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c8/0x5450
[ 27.161249] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 27.161659]
[ 27.161814] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 27.161879] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.161898] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.161933] Call Trace:
[ 27.161955] <TASK>
[ 27.161981] dump_stack_lvl+0x73/0xb0
[ 27.162026] print_report+0xd1/0x640
[ 27.162056] ? __virt_addr_valid+0x1db/0x2d0
[ 27.162089] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.162128] kasan_report+0x102/0x140
[ 27.162218] ? kasan_atomics_helper+0x7c8/0x5450
[ 27.162300] ? kasan_atomics_helper+0x7c8/0x5450
[ 27.162378] kasan_check_range+0x10c/0x1c0
[ 27.162444] __kasan_check_write+0x18/0x20
[ 27.162506] kasan_atomics_helper+0x7c8/0x5450
[ 27.162578] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 27.162665] ? __kmalloc_cache_noprof+0x184/0x410
[ 27.162766] ? kasan_atomics+0x153/0x310
[ 27.162841] kasan_atomics+0x1dd/0x310
[ 27.162906] ? __pfx_kasan_atomics+0x10/0x10
[ 27.162971] ? __pfx_read_tsc+0x10/0x10
[ 27.163033] ? ktime_get_ts64+0x86/0x230
[ 27.163121] kunit_try_run_case+0x1b3/0x490
[ 27.163210] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.163268] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.163334] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.163397] ? __kthread_parkme+0x82/0x160
[ 27.163458] ? preempt_count_sub+0x50/0x80
[ 27.163526] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.163584] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.163652] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.163720] kthread+0x324/0x6d0
[ 27.163779] ? trace_preempt_on+0x20/0xc0
[ 27.163846] ? __pfx_kthread+0x10/0x10
[ 27.163920] ? _raw_spin_unlock_irq+0x47/0x80
[ 27.164008] ? calculate_sigpending+0x7b/0xa0
[ 27.164067] ? __pfx_kthread+0x10/0x10
[ 27.164117] ret_from_fork+0x41/0x80
[ 27.164149] ? __pfx_kthread+0x10/0x10
[ 27.164203] ret_from_fork_asm+0x1a/0x30
[ 27.164251] </TASK>
[ 27.164269]
[ 27.183040] Allocated by task 273:
[ 27.183404] kasan_save_stack+0x3d/0x60
[ 27.184032] kasan_save_track+0x18/0x40
[ 27.184650] kasan_save_alloc_info+0x3b/0x50
[ 27.185455] __kasan_kmalloc+0xb7/0xc0
[ 27.186183] __kmalloc_cache_noprof+0x184/0x410
[ 27.186601] kasan_atomics+0x96/0x310
[ 27.186893] kunit_try_run_case+0x1b3/0x490
[ 27.187657] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.188378] kthread+0x324/0x6d0
[ 27.189006] ret_from_fork+0x41/0x80
[ 27.189671] ret_from_fork_asm+0x1a/0x30
[ 27.190059]
[ 27.190641] The buggy address belongs to the object at ffff888102a6c880
[ 27.190641] which belongs to the cache kmalloc-64 of size 64
[ 27.191735] The buggy address is located 0 bytes to the right of
[ 27.191735] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 27.192650]
[ 27.192919] The buggy address belongs to the physical page:
[ 27.193426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 27.193934] flags: 0x200000000000000(node=0|zone=2)
[ 27.194628] page_type: f5(slab)
[ 27.194991] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 27.195405] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 27.196216] page dumped because: kasan: bad access detected
[ 27.196607]
[ 27.196760] Memory state around the buggy address:
[ 27.197044] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.197741] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.198432] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 27.198852] ^
[ 27.199418] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.199942] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.200694] ==================================================================
---
[ 28.406836] ==================================================================
[ 28.407989] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e8/0x5450
[ 28.408718] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 28.409247]
[ 28.409433] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 28.409544] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.409583] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 28.409682] Call Trace:
[ 28.409730] <TASK>
[ 28.409778] dump_stack_lvl+0x73/0xb0
[ 28.409859] print_report+0xd1/0x640
[ 28.409915] ? __virt_addr_valid+0x1db/0x2d0
[ 28.409971] ? kasan_complete_mode_report_info+0x2a/0x200
[ 28.410038] kasan_report+0x102/0x140
[ 28.410139] ? kasan_atomics_helper+0x16e8/0x5450
[ 28.410241] ? kasan_atomics_helper+0x16e8/0x5450
[ 28.410323] kasan_check_range+0x10c/0x1c0
[ 28.410390] __kasan_check_write+0x18/0x20
[ 28.410451] kasan_atomics_helper+0x16e8/0x5450
[ 28.410524] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 28.410594] ? __kmalloc_cache_noprof+0x184/0x410
[ 28.410665] ? kasan_atomics+0x153/0x310
[ 28.410736] kasan_atomics+0x1dd/0x310
[ 28.410798] ? __pfx_kasan_atomics+0x10/0x10
[ 28.410860] ? __pfx_read_tsc+0x10/0x10
[ 28.410959] ? ktime_get_ts64+0x86/0x230
[ 28.411038] kunit_try_run_case+0x1b3/0x490
[ 28.411140] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.411214] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 28.411280] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 28.411342] ? __kthread_parkme+0x82/0x160
[ 28.411403] ? preempt_count_sub+0x50/0x80
[ 28.411468] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.411531] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.411601] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 28.411672] kthread+0x324/0x6d0
[ 28.411727] ? trace_preempt_on+0x20/0xc0
[ 28.411791] ? __pfx_kthread+0x10/0x10
[ 28.411852] ? _raw_spin_unlock_irq+0x47/0x80
[ 28.411929] ? calculate_sigpending+0x7b/0xa0
[ 28.411988] ? __pfx_kthread+0x10/0x10
[ 28.412045] ret_from_fork+0x41/0x80
[ 28.412142] ? __pfx_kthread+0x10/0x10
[ 28.412235] ret_from_fork_asm+0x1a/0x30
[ 28.412327] </TASK>
[ 28.412364]
[ 28.425282] Allocated by task 273:
[ 28.425659] kasan_save_stack+0x3d/0x60
[ 28.426122] kasan_save_track+0x18/0x40
[ 28.426613] kasan_save_alloc_info+0x3b/0x50
[ 28.427123] __kasan_kmalloc+0xb7/0xc0
[ 28.427550] __kmalloc_cache_noprof+0x184/0x410
[ 28.427858] kasan_atomics+0x96/0x310
[ 28.428220] kunit_try_run_case+0x1b3/0x490
[ 28.428705] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.429320] kthread+0x324/0x6d0
[ 28.429751] ret_from_fork+0x41/0x80
[ 28.430144] ret_from_fork_asm+0x1a/0x30
[ 28.430674]
[ 28.430847] The buggy address belongs to the object at ffff888102a6c880
[ 28.430847] which belongs to the cache kmalloc-64 of size 64
[ 28.431642] The buggy address is located 0 bytes to the right of
[ 28.431642] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 28.432364]
[ 28.432590] The buggy address belongs to the physical page:
[ 28.433079] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 28.433863] flags: 0x200000000000000(node=0|zone=2)
[ 28.434437] page_type: f5(slab)
[ 28.434826] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 28.435468] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 28.436130] page dumped because: kasan: bad access detected
[ 28.436545]
[ 28.436778] Memory state around the buggy address:
[ 28.437260] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.437631] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.437996] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.438622] ^
[ 28.439123] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.439816] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.440536] ==================================================================
---
[ 27.366780] ==================================================================
[ 27.368681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac8/0x5450
[ 27.369326] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 27.370582]
[ 27.371001] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 27.371380] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.371410] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.371446] Call Trace:
[ 27.371471] <TASK>
[ 27.371501] dump_stack_lvl+0x73/0xb0
[ 27.371554] print_report+0xd1/0x640
[ 27.371586] ? __virt_addr_valid+0x1db/0x2d0
[ 27.371619] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.371659] kasan_report+0x102/0x140
[ 27.371686] ? kasan_atomics_helper+0xac8/0x5450
[ 27.371720] ? kasan_atomics_helper+0xac8/0x5450
[ 27.371762] kasan_check_range+0x10c/0x1c0
[ 27.371793] __kasan_check_write+0x18/0x20
[ 27.371825] kasan_atomics_helper+0xac8/0x5450
[ 27.371860] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 27.371908] ? __kmalloc_cache_noprof+0x184/0x410
[ 27.371945] ? kasan_atomics+0x153/0x310
[ 27.371981] kasan_atomics+0x1dd/0x310
[ 27.372012] ? __pfx_kasan_atomics+0x10/0x10
[ 27.372044] ? __pfx_read_tsc+0x10/0x10
[ 27.372076] ? ktime_get_ts64+0x86/0x230
[ 27.372180] kunit_try_run_case+0x1b3/0x490
[ 27.372218] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.372249] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.372283] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.372317] ? __kthread_parkme+0x82/0x160
[ 27.372349] ? preempt_count_sub+0x50/0x80
[ 27.372385] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.372416] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.372453] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.372490] kthread+0x324/0x6d0
[ 27.372519] ? trace_preempt_on+0x20/0xc0
[ 27.372553] ? __pfx_kthread+0x10/0x10
[ 27.372584] ? _raw_spin_unlock_irq+0x47/0x80
[ 27.372617] ? calculate_sigpending+0x7b/0xa0
[ 27.372647] ? __pfx_kthread+0x10/0x10
[ 27.372680] ret_from_fork+0x41/0x80
[ 27.372706] ? __pfx_kthread+0x10/0x10
[ 27.372738] ret_from_fork_asm+0x1a/0x30
[ 27.372783] </TASK>
[ 27.372802]
[ 27.392088] Allocated by task 273:
[ 27.392570] kasan_save_stack+0x3d/0x60
[ 27.393385] kasan_save_track+0x18/0x40
[ 27.393806] kasan_save_alloc_info+0x3b/0x50
[ 27.394286] __kasan_kmalloc+0xb7/0xc0
[ 27.395508] __kmalloc_cache_noprof+0x184/0x410
[ 27.395861] kasan_atomics+0x96/0x310
[ 27.396297] kunit_try_run_case+0x1b3/0x490
[ 27.397031] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.397814] kthread+0x324/0x6d0
[ 27.398360] ret_from_fork+0x41/0x80
[ 27.398781] ret_from_fork_asm+0x1a/0x30
[ 27.399537]
[ 27.399693] The buggy address belongs to the object at ffff888102a6c880
[ 27.399693] which belongs to the cache kmalloc-64 of size 64
[ 27.401095] The buggy address is located 0 bytes to the right of
[ 27.401095] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 27.402428]
[ 27.402898] The buggy address belongs to the physical page:
[ 27.403244] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 27.404223] flags: 0x200000000000000(node=0|zone=2)
[ 27.404747] page_type: f5(slab)
[ 27.405315] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 27.406143] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 27.406761] page dumped because: kasan: bad access detected
[ 27.407067]
[ 27.407795] Memory state around the buggy address:
[ 27.408111] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.408734] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.409907] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 27.410644] ^
[ 27.411355] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.412144] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.412764] ==================================================================
---
[ 29.080886] ==================================================================
[ 29.083710] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2007/0x5450
[ 29.084585] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 29.085375]
[ 29.085569] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 29.085688] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.085723] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 29.085781] Call Trace:
[ 29.085822] <TASK>
[ 29.085870] dump_stack_lvl+0x73/0xb0
[ 29.085954] print_report+0xd1/0x640
[ 29.086012] ? __virt_addr_valid+0x1db/0x2d0
[ 29.086072] ? kasan_complete_mode_report_info+0x2a/0x200
[ 29.087590] kasan_report+0x102/0x140
[ 29.087651] ? kasan_atomics_helper+0x2007/0x5450
[ 29.087721] ? kasan_atomics_helper+0x2007/0x5450
[ 29.087800] kasan_check_range+0x10c/0x1c0
[ 29.087863] __kasan_check_write+0x18/0x20
[ 29.087935] kasan_atomics_helper+0x2007/0x5450
[ 29.088004] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 29.088068] ? __kmalloc_cache_noprof+0x184/0x410
[ 29.088197] ? kasan_atomics+0x153/0x310
[ 29.088271] kasan_atomics+0x1dd/0x310
[ 29.088330] ? __pfx_kasan_atomics+0x10/0x10
[ 29.088393] ? __pfx_read_tsc+0x10/0x10
[ 29.088450] ? ktime_get_ts64+0x86/0x230
[ 29.088522] kunit_try_run_case+0x1b3/0x490
[ 29.088582] ? __pfx_kunit_try_run_case+0x10/0x10
[ 29.088638] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 29.088701] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 29.088765] ? __kthread_parkme+0x82/0x160
[ 29.088826] ? preempt_count_sub+0x50/0x80
[ 29.088894] ? __pfx_kunit_try_run_case+0x10/0x10
[ 29.088954] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 29.089025] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 29.089139] kthread+0x324/0x6d0
[ 29.089214] ? trace_preempt_on+0x20/0xc0
[ 29.089270] ? __pfx_kthread+0x10/0x10
[ 29.089328] ? _raw_spin_unlock_irq+0x47/0x80
[ 29.089391] ? calculate_sigpending+0x7b/0xa0
[ 29.089451] ? __pfx_kthread+0x10/0x10
[ 29.089512] ret_from_fork+0x41/0x80
[ 29.089565] ? __pfx_kthread+0x10/0x10
[ 29.089623] ret_from_fork_asm+0x1a/0x30
[ 29.089758] </TASK>
[ 29.089788]
[ 29.113922] Allocated by task 273:
[ 29.114245] kasan_save_stack+0x3d/0x60
[ 29.114524] kasan_save_track+0x18/0x40
[ 29.114767] kasan_save_alloc_info+0x3b/0x50
[ 29.115292] __kasan_kmalloc+0xb7/0xc0
[ 29.116064] __kmalloc_cache_noprof+0x184/0x410
[ 29.116904] kasan_atomics+0x96/0x310
[ 29.117413] kunit_try_run_case+0x1b3/0x490
[ 29.117883] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 29.118487] kthread+0x324/0x6d0
[ 29.118875] ret_from_fork+0x41/0x80
[ 29.119350] ret_from_fork_asm+0x1a/0x30
[ 29.119860]
[ 29.120148] The buggy address belongs to the object at ffff888102a6c880
[ 29.120148] which belongs to the cache kmalloc-64 of size 64
[ 29.121260] The buggy address is located 0 bytes to the right of
[ 29.121260] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 29.122902]
[ 29.123536] The buggy address belongs to the physical page:
[ 29.124346] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 29.125148] flags: 0x200000000000000(node=0|zone=2)
[ 29.125696] page_type: f5(slab)
[ 29.126331] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 29.126718] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 29.127399] page dumped because: kasan: bad access detected
[ 29.128015]
[ 29.128275] Memory state around the buggy address:
[ 29.128722] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.129574] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.130046] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 29.130824] ^
[ 29.131529] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.132266] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.132763] ==================================================================
---
[ 28.561608] ==================================================================
[ 28.562247] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194b/0x5450
[ 28.563317] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 28.563743]
[ 28.563938] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 28.564053] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.564094] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 28.564152] Call Trace:
[ 28.564254] <TASK>
[ 28.564302] dump_stack_lvl+0x73/0xb0
[ 28.564443] print_report+0xd1/0x640
[ 28.564533] ? __virt_addr_valid+0x1db/0x2d0
[ 28.564633] ? kasan_complete_mode_report_info+0x2a/0x200
[ 28.564735] kasan_report+0x102/0x140
[ 28.564801] ? kasan_atomics_helper+0x194b/0x5450
[ 28.564910] ? kasan_atomics_helper+0x194b/0x5450
[ 28.565064] kasan_check_range+0x10c/0x1c0
[ 28.565218] __kasan_check_write+0x18/0x20
[ 28.565289] kasan_atomics_helper+0x194b/0x5450
[ 28.565363] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 28.565430] ? __kmalloc_cache_noprof+0x184/0x410
[ 28.565501] ? kasan_atomics+0x153/0x310
[ 28.565570] kasan_atomics+0x1dd/0x310
[ 28.565631] ? __pfx_kasan_atomics+0x10/0x10
[ 28.565697] ? __pfx_read_tsc+0x10/0x10
[ 28.565753] ? ktime_get_ts64+0x86/0x230
[ 28.565827] kunit_try_run_case+0x1b3/0x490
[ 28.565879] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.565928] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 28.565993] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 28.566054] ? __kthread_parkme+0x82/0x160
[ 28.566255] ? preempt_count_sub+0x50/0x80
[ 28.566330] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.566394] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.566469] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 28.566535] kthread+0x324/0x6d0
[ 28.566593] ? trace_preempt_on+0x20/0xc0
[ 28.566658] ? __pfx_kthread+0x10/0x10
[ 28.566719] ? _raw_spin_unlock_irq+0x47/0x80
[ 28.566784] ? calculate_sigpending+0x7b/0xa0
[ 28.566900] ? __pfx_kthread+0x10/0x10
[ 28.566996] ret_from_fork+0x41/0x80
[ 28.567054] ? __pfx_kthread+0x10/0x10
[ 28.567179] ret_from_fork_asm+0x1a/0x30
[ 28.567277] </TASK>
[ 28.567314]
[ 28.585205] Allocated by task 273:
[ 28.586185] kasan_save_stack+0x3d/0x60
[ 28.586832] kasan_save_track+0x18/0x40
[ 28.587262] kasan_save_alloc_info+0x3b/0x50
[ 28.587816] __kasan_kmalloc+0xb7/0xc0
[ 28.588146] __kmalloc_cache_noprof+0x184/0x410
[ 28.588838] kasan_atomics+0x96/0x310
[ 28.589291] kunit_try_run_case+0x1b3/0x490
[ 28.590113] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.590727] kthread+0x324/0x6d0
[ 28.590976] ret_from_fork+0x41/0x80
[ 28.591654] ret_from_fork_asm+0x1a/0x30
[ 28.592362]
[ 28.592558] The buggy address belongs to the object at ffff888102a6c880
[ 28.592558] which belongs to the cache kmalloc-64 of size 64
[ 28.593794] The buggy address is located 0 bytes to the right of
[ 28.593794] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 28.595083]
[ 28.595432] The buggy address belongs to the physical page:
[ 28.596045] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 28.596682] flags: 0x200000000000000(node=0|zone=2)
[ 28.596982] page_type: f5(slab)
[ 28.597378] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 28.597932] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 28.598483] page dumped because: kasan: bad access detected
[ 28.598901]
[ 28.599181] Memory state around the buggy address:
[ 28.599592] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.600229] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.600855] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.601284] ^
[ 28.601741] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.602424] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.602924] ==================================================================
---
[ 28.324376] ==================================================================
[ 28.324913] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b7/0x5450
[ 28.325574] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 28.326074]
[ 28.326277] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 28.326391] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.326427] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 28.326489] Call Trace:
[ 28.326531] <TASK>
[ 28.326577] dump_stack_lvl+0x73/0xb0
[ 28.326656] print_report+0xd1/0x640
[ 28.326715] ? __virt_addr_valid+0x1db/0x2d0
[ 28.326774] ? kasan_complete_mode_report_info+0x2a/0x200
[ 28.326849] kasan_report+0x102/0x140
[ 28.326900] ? kasan_atomics_helper+0x15b7/0x5450
[ 28.326956] ? kasan_atomics_helper+0x15b7/0x5450
[ 28.327014] kasan_check_range+0x10c/0x1c0
[ 28.327061] __kasan_check_write+0x18/0x20
[ 28.327105] kasan_atomics_helper+0x15b7/0x5450
[ 28.327178] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 28.327230] ? __kmalloc_cache_noprof+0x184/0x410
[ 28.327282] ? kasan_atomics+0x153/0x310
[ 28.327332] kasan_atomics+0x1dd/0x310
[ 28.327382] ? __pfx_kasan_atomics+0x10/0x10
[ 28.327438] ? __pfx_read_tsc+0x10/0x10
[ 28.327498] ? ktime_get_ts64+0x86/0x230
[ 28.327611] kunit_try_run_case+0x1b3/0x490
[ 28.327706] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.327767] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 28.327837] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 28.327914] ? __kthread_parkme+0x82/0x160
[ 28.327976] ? preempt_count_sub+0x50/0x80
[ 28.328051] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.328115] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.328215] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 28.328287] kthread+0x324/0x6d0
[ 28.328347] ? trace_preempt_on+0x20/0xc0
[ 28.328458] ? __pfx_kthread+0x10/0x10
[ 28.328525] ? _raw_spin_unlock_irq+0x47/0x80
[ 28.328608] ? calculate_sigpending+0x7b/0xa0
[ 28.328697] ? __pfx_kthread+0x10/0x10
[ 28.328763] ret_from_fork+0x41/0x80
[ 28.328822] ? __pfx_kthread+0x10/0x10
[ 28.328885] ret_from_fork_asm+0x1a/0x30
[ 28.328974] </TASK>
[ 28.329008]
[ 28.346459] Allocated by task 273:
[ 28.346935] kasan_save_stack+0x3d/0x60
[ 28.347507] kasan_save_track+0x18/0x40
[ 28.347993] kasan_save_alloc_info+0x3b/0x50
[ 28.348534] __kasan_kmalloc+0xb7/0xc0
[ 28.348944] __kmalloc_cache_noprof+0x184/0x410
[ 28.349527] kasan_atomics+0x96/0x310
[ 28.349909] kunit_try_run_case+0x1b3/0x490
[ 28.350392] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.350949] kthread+0x324/0x6d0
[ 28.351393] ret_from_fork+0x41/0x80
[ 28.351785] ret_from_fork_asm+0x1a/0x30
[ 28.352282]
[ 28.352447] The buggy address belongs to the object at ffff888102a6c880
[ 28.352447] which belongs to the cache kmalloc-64 of size 64
[ 28.352992] The buggy address is located 0 bytes to the right of
[ 28.352992] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 28.354308]
[ 28.354630] The buggy address belongs to the physical page:
[ 28.355195] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 28.356121] flags: 0x200000000000000(node=0|zone=2)
[ 28.356627] page_type: f5(slab)
[ 28.356869] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 28.357300] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 28.357957] page dumped because: kasan: bad access detected
[ 28.358835]
[ 28.359352] Memory state around the buggy address:
[ 28.360148] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.361652] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.362386] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.362911] ^
[ 28.363474] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.364035] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.364708] ==================================================================
---
[ 27.201864] ==================================================================
[ 27.202738] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x861/0x5450
[ 27.204415] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 27.204822]
[ 27.205005] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 27.205116] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.205527] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.205596] Call Trace:
[ 27.205638] <TASK>
[ 27.205687] dump_stack_lvl+0x73/0xb0
[ 27.205770] print_report+0xd1/0x640
[ 27.205830] ? __virt_addr_valid+0x1db/0x2d0
[ 27.205895] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.205972] kasan_report+0x102/0x140
[ 27.206028] ? kasan_atomics_helper+0x861/0x5450
[ 27.206096] ? kasan_atomics_helper+0x861/0x5450
[ 27.206268] kasan_check_range+0x10c/0x1c0
[ 27.206337] __kasan_check_write+0x18/0x20
[ 27.206401] kasan_atomics_helper+0x861/0x5450
[ 27.206470] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 27.206537] ? __kmalloc_cache_noprof+0x184/0x410
[ 27.206604] ? kasan_atomics+0x153/0x310
[ 27.206673] kasan_atomics+0x1dd/0x310
[ 27.206734] ? __pfx_kasan_atomics+0x10/0x10
[ 27.206791] ? __pfx_read_tsc+0x10/0x10
[ 27.206849] ? ktime_get_ts64+0x86/0x230
[ 27.206919] kunit_try_run_case+0x1b3/0x490
[ 27.206981] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.207037] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.207114] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.207200] ? __kthread_parkme+0x82/0x160
[ 27.207264] ? preempt_count_sub+0x50/0x80
[ 27.207337] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.207401] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.207477] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.207549] kthread+0x324/0x6d0
[ 27.207610] ? trace_preempt_on+0x20/0xc0
[ 27.207673] ? __pfx_kthread+0x10/0x10
[ 27.207735] ? _raw_spin_unlock_irq+0x47/0x80
[ 27.207790] ? calculate_sigpending+0x7b/0xa0
[ 27.207827] ? __pfx_kthread+0x10/0x10
[ 27.207860] ret_from_fork+0x41/0x80
[ 27.207901] ? __pfx_kthread+0x10/0x10
[ 27.207934] ret_from_fork_asm+0x1a/0x30
[ 27.207981] </TASK>
[ 27.207999]
[ 27.219737] Allocated by task 273:
[ 27.220185] kasan_save_stack+0x3d/0x60
[ 27.220545] kasan_save_track+0x18/0x40
[ 27.220823] kasan_save_alloc_info+0x3b/0x50
[ 27.221295] __kasan_kmalloc+0xb7/0xc0
[ 27.221562] __kmalloc_cache_noprof+0x184/0x410
[ 27.221843] kasan_atomics+0x96/0x310
[ 27.222092] kunit_try_run_case+0x1b3/0x490
[ 27.222556] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.223080] kthread+0x324/0x6d0
[ 27.223494] ret_from_fork+0x41/0x80
[ 27.223872] ret_from_fork_asm+0x1a/0x30
[ 27.224413]
[ 27.224638] The buggy address belongs to the object at ffff888102a6c880
[ 27.224638] which belongs to the cache kmalloc-64 of size 64
[ 27.225486] The buggy address is located 0 bytes to the right of
[ 27.225486] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 27.226249]
[ 27.226467] The buggy address belongs to the physical page:
[ 27.226994] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 27.227417] flags: 0x200000000000000(node=0|zone=2)
[ 27.227710] page_type: f5(slab)
[ 27.227956] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 27.228777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 27.229462] page dumped because: kasan: bad access detected
[ 27.230069]
[ 27.230443] Memory state around the buggy address:
[ 27.230945] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.231852] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.232763] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 27.233470] ^
[ 27.233801] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.234429] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.234880] ==================================================================
---
[ 28.285600] ==================================================================
[ 28.286346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151e/0x5450
[ 28.286820] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 28.287384]
[ 28.287641] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 28.287755] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.287793] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 28.287858] Call Trace:
[ 28.287911] <TASK>
[ 28.287960] dump_stack_lvl+0x73/0xb0
[ 28.288040] print_report+0xd1/0x640
[ 28.288143] ? __virt_addr_valid+0x1db/0x2d0
[ 28.288235] ? kasan_complete_mode_report_info+0x2a/0x200
[ 28.288311] kasan_report+0x102/0x140
[ 28.288368] ? kasan_atomics_helper+0x151e/0x5450
[ 28.288439] ? kasan_atomics_helper+0x151e/0x5450
[ 28.288518] kasan_check_range+0x10c/0x1c0
[ 28.288583] __kasan_check_write+0x18/0x20
[ 28.288645] kasan_atomics_helper+0x151e/0x5450
[ 28.288716] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 28.288783] ? __kmalloc_cache_noprof+0x184/0x410
[ 28.288849] ? kasan_atomics+0x153/0x310
[ 28.288916] kasan_atomics+0x1dd/0x310
[ 28.289015] ? __pfx_kasan_atomics+0x10/0x10
[ 28.289131] ? __pfx_read_tsc+0x10/0x10
[ 28.289255] ? ktime_get_ts64+0x86/0x230
[ 28.289339] kunit_try_run_case+0x1b3/0x490
[ 28.289403] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.289463] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 28.289529] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 28.289594] ? __kthread_parkme+0x82/0x160
[ 28.289697] ? preempt_count_sub+0x50/0x80
[ 28.289815] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.289879] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.289948] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 28.290018] kthread+0x324/0x6d0
[ 28.290153] ? trace_preempt_on+0x20/0xc0
[ 28.290277] ? __pfx_kthread+0x10/0x10
[ 28.290340] ? _raw_spin_unlock_irq+0x47/0x80
[ 28.290405] ? calculate_sigpending+0x7b/0xa0
[ 28.290470] ? __pfx_kthread+0x10/0x10
[ 28.290531] ret_from_fork+0x41/0x80
[ 28.290584] ? __pfx_kthread+0x10/0x10
[ 28.290649] ret_from_fork_asm+0x1a/0x30
[ 28.290736] </TASK>
[ 28.290760]
[ 28.305982] Allocated by task 273:
[ 28.306534] kasan_save_stack+0x3d/0x60
[ 28.307010] kasan_save_track+0x18/0x40
[ 28.307476] kasan_save_alloc_info+0x3b/0x50
[ 28.307971] __kasan_kmalloc+0xb7/0xc0
[ 28.308426] __kmalloc_cache_noprof+0x184/0x410
[ 28.308929] kasan_atomics+0x96/0x310
[ 28.309388] kunit_try_run_case+0x1b3/0x490
[ 28.309915] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.310564] kthread+0x324/0x6d0
[ 28.310976] ret_from_fork+0x41/0x80
[ 28.311601] ret_from_fork_asm+0x1a/0x30
[ 28.312147]
[ 28.312372] The buggy address belongs to the object at ffff888102a6c880
[ 28.312372] which belongs to the cache kmalloc-64 of size 64
[ 28.312940] The buggy address is located 0 bytes to the right of
[ 28.312940] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 28.314225]
[ 28.314481] The buggy address belongs to the physical page:
[ 28.315303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 28.316133] flags: 0x200000000000000(node=0|zone=2)
[ 28.316731] page_type: f5(slab)
[ 28.317216] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 28.318043] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 28.318835] page dumped because: kasan: bad access detected
[ 28.319273]
[ 28.319452] Memory state around the buggy address:
[ 28.319967] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.320786] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.321782] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.322500] ^
[ 28.322674] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.322885] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.323089] ==================================================================
---
[ 28.881205] ==================================================================
[ 28.881731] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e13/0x5450
[ 28.882508] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 28.882980]
[ 28.883338] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 28.883456] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.883492] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 28.883556] Call Trace:
[ 28.883602] <TASK>
[ 28.883651] dump_stack_lvl+0x73/0xb0
[ 28.883740] print_report+0xd1/0x640
[ 28.883803] ? __virt_addr_valid+0x1db/0x2d0
[ 28.883868] ? kasan_complete_mode_report_info+0x2a/0x200
[ 28.883959] kasan_report+0x102/0x140
[ 28.884014] ? kasan_atomics_helper+0x1e13/0x5450
[ 28.884127] ? kasan_atomics_helper+0x1e13/0x5450
[ 28.884246] kasan_check_range+0x10c/0x1c0
[ 28.884315] __kasan_check_write+0x18/0x20
[ 28.884380] kasan_atomics_helper+0x1e13/0x5450
[ 28.884452] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 28.884524] ? __kmalloc_cache_noprof+0x184/0x410
[ 28.884596] ? kasan_atomics+0x153/0x310
[ 28.884670] kasan_atomics+0x1dd/0x310
[ 28.884731] ? __pfx_kasan_atomics+0x10/0x10
[ 28.884799] ? __pfx_read_tsc+0x10/0x10
[ 28.884861] ? ktime_get_ts64+0x86/0x230
[ 28.884933] kunit_try_run_case+0x1b3/0x490
[ 28.884999] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.885058] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 28.885198] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 28.885271] ? __kthread_parkme+0x82/0x160
[ 28.885331] ? preempt_count_sub+0x50/0x80
[ 28.885403] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.885512] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.885592] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 28.885665] kthread+0x324/0x6d0
[ 28.885726] ? trace_preempt_on+0x20/0xc0
[ 28.885793] ? __pfx_kthread+0x10/0x10
[ 28.885856] ? _raw_spin_unlock_irq+0x47/0x80
[ 28.885922] ? calculate_sigpending+0x7b/0xa0
[ 28.885986] ? __pfx_kthread+0x10/0x10
[ 28.886049] ret_from_fork+0x41/0x80
[ 28.886150] ? __pfx_kthread+0x10/0x10
[ 28.886244] ret_from_fork_asm+0x1a/0x30
[ 28.886334] </TASK>
[ 28.886369]
[ 28.900997] Allocated by task 273:
[ 28.901470] kasan_save_stack+0x3d/0x60
[ 28.901964] kasan_save_track+0x18/0x40
[ 28.902441] kasan_save_alloc_info+0x3b/0x50
[ 28.902888] __kasan_kmalloc+0xb7/0xc0
[ 28.903384] __kmalloc_cache_noprof+0x184/0x410
[ 28.903895] kasan_atomics+0x96/0x310
[ 28.904363] kunit_try_run_case+0x1b3/0x490
[ 28.904841] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.905346] kthread+0x324/0x6d0
[ 28.905597] ret_from_fork+0x41/0x80
[ 28.905840] ret_from_fork_asm+0x1a/0x30
[ 28.906146]
[ 28.906395] The buggy address belongs to the object at ffff888102a6c880
[ 28.906395] which belongs to the cache kmalloc-64 of size 64
[ 28.907450] The buggy address is located 0 bytes to the right of
[ 28.907450] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 28.910686]
[ 28.910938] The buggy address belongs to the physical page:
[ 28.912568] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 28.912968] flags: 0x200000000000000(node=0|zone=2)
[ 28.915531] page_type: f5(slab)
[ 28.915936] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 28.917832] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 28.921289] page dumped because: kasan: bad access detected
[ 28.922386]
[ 28.922659] Memory state around the buggy address:
[ 28.923640] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.925808] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.927144] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.928661] ^
[ 28.928904] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.930334] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.930945] ==================================================================
---
[ 28.441876] ==================================================================
[ 28.443351] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x5450
[ 28.443917] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 28.444462]
[ 28.444703] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 28.444819] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.444858] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 28.444921] Call Trace:
[ 28.444962] <TASK>
[ 28.445006] dump_stack_lvl+0x73/0xb0
[ 28.445086] print_report+0xd1/0x640
[ 28.445143] ? __virt_addr_valid+0x1db/0x2d0
[ 28.445482] ? kasan_complete_mode_report_info+0x2a/0x200
[ 28.445565] kasan_report+0x102/0x140
[ 28.445623] ? kasan_atomics_helper+0x1780/0x5450
[ 28.445691] ? kasan_atomics_helper+0x1780/0x5450
[ 28.445771] kasan_check_range+0x10c/0x1c0
[ 28.445837] __kasan_check_write+0x18/0x20
[ 28.445900] kasan_atomics_helper+0x1780/0x5450
[ 28.445972] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 28.446039] ? __kmalloc_cache_noprof+0x184/0x410
[ 28.446176] ? kasan_atomics+0x153/0x310
[ 28.446262] kasan_atomics+0x1dd/0x310
[ 28.446326] ? __pfx_kasan_atomics+0x10/0x10
[ 28.446392] ? __pfx_read_tsc+0x10/0x10
[ 28.446452] ? ktime_get_ts64+0x86/0x230
[ 28.446524] kunit_try_run_case+0x1b3/0x490
[ 28.446585] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.446645] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 28.446713] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 28.446780] ? __kthread_parkme+0x82/0x160
[ 28.446840] ? preempt_count_sub+0x50/0x80
[ 28.446912] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.446973] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.447047] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 28.447180] kthread+0x324/0x6d0
[ 28.447251] ? trace_preempt_on+0x20/0xc0
[ 28.447316] ? __pfx_kthread+0x10/0x10
[ 28.447379] ? _raw_spin_unlock_irq+0x47/0x80
[ 28.447440] ? calculate_sigpending+0x7b/0xa0
[ 28.447504] ? __pfx_kthread+0x10/0x10
[ 28.447569] ret_from_fork+0x41/0x80
[ 28.447623] ? __pfx_kthread+0x10/0x10
[ 28.447687] ret_from_fork_asm+0x1a/0x30
[ 28.447774] </TASK>
[ 28.447808]
[ 28.464282] Allocated by task 273:
[ 28.464690] kasan_save_stack+0x3d/0x60
[ 28.465134] kasan_save_track+0x18/0x40
[ 28.465598] kasan_save_alloc_info+0x3b/0x50
[ 28.466046] __kasan_kmalloc+0xb7/0xc0
[ 28.466465] __kmalloc_cache_noprof+0x184/0x410
[ 28.466753] kasan_atomics+0x96/0x310
[ 28.467176] kunit_try_run_case+0x1b3/0x490
[ 28.467642] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.468204] kthread+0x324/0x6d0
[ 28.468528] ret_from_fork+0x41/0x80
[ 28.468936] ret_from_fork_asm+0x1a/0x30
[ 28.469558]
[ 28.470080] The buggy address belongs to the object at ffff888102a6c880
[ 28.470080] which belongs to the cache kmalloc-64 of size 64
[ 28.471938] The buggy address is located 0 bytes to the right of
[ 28.471938] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 28.474065]
[ 28.475437] The buggy address belongs to the physical page:
[ 28.475906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 28.476601] flags: 0x200000000000000(node=0|zone=2)
[ 28.477259] page_type: f5(slab)
[ 28.477484] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 28.478350] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 28.478906] page dumped because: kasan: bad access detected
[ 28.479496]
[ 28.479701] Memory state around the buggy address:
[ 28.480265] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.480818] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.481491] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.482195] ^
[ 28.482687] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.483261] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.483830] ==================================================================
---
[ 28.524730] ==================================================================
[ 28.525346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b2/0x5450
[ 28.525750] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 28.526181]
[ 28.526425] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 28.526534] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.526572] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 28.526636] Call Trace:
[ 28.526677] <TASK>
[ 28.526723] dump_stack_lvl+0x73/0xb0
[ 28.526806] print_report+0xd1/0x640
[ 28.526867] ? __virt_addr_valid+0x1db/0x2d0
[ 28.526926] ? kasan_complete_mode_report_info+0x2a/0x200
[ 28.526995] kasan_report+0x102/0x140
[ 28.527049] ? kasan_atomics_helper+0x18b2/0x5450
[ 28.527194] ? kasan_atomics_helper+0x18b2/0x5450
[ 28.527285] kasan_check_range+0x10c/0x1c0
[ 28.527350] __kasan_check_write+0x18/0x20
[ 28.527415] kasan_atomics_helper+0x18b2/0x5450
[ 28.527484] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 28.527549] ? __kmalloc_cache_noprof+0x184/0x410
[ 28.527619] ? kasan_atomics+0x153/0x310
[ 28.527686] kasan_atomics+0x1dd/0x310
[ 28.527745] ? __pfx_kasan_atomics+0x10/0x10
[ 28.527811] ? __pfx_read_tsc+0x10/0x10
[ 28.527874] ? ktime_get_ts64+0x86/0x230
[ 28.527957] kunit_try_run_case+0x1b3/0x490
[ 28.528019] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.528078] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 28.528214] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 28.528286] ? __kthread_parkme+0x82/0x160
[ 28.528351] ? preempt_count_sub+0x50/0x80
[ 28.528423] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.528485] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.528554] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 28.528624] kthread+0x324/0x6d0
[ 28.528679] ? trace_preempt_on+0x20/0xc0
[ 28.528744] ? __pfx_kthread+0x10/0x10
[ 28.528803] ? _raw_spin_unlock_irq+0x47/0x80
[ 28.528861] ? calculate_sigpending+0x7b/0xa0
[ 28.528921] ? __pfx_kthread+0x10/0x10
[ 28.528980] ret_from_fork+0x41/0x80
[ 28.529033] ? __pfx_kthread+0x10/0x10
[ 28.529129] ret_from_fork_asm+0x1a/0x30
[ 28.529248] </TASK>
[ 28.529288]
[ 28.544503] Allocated by task 273:
[ 28.544925] kasan_save_stack+0x3d/0x60
[ 28.545460] kasan_save_track+0x18/0x40
[ 28.545902] kasan_save_alloc_info+0x3b/0x50
[ 28.546461] __kasan_kmalloc+0xb7/0xc0
[ 28.546907] __kmalloc_cache_noprof+0x184/0x410
[ 28.547465] kasan_atomics+0x96/0x310
[ 28.547912] kunit_try_run_case+0x1b3/0x490
[ 28.548440] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.549020] kthread+0x324/0x6d0
[ 28.549486] ret_from_fork+0x41/0x80
[ 28.549908] ret_from_fork_asm+0x1a/0x30
[ 28.550436]
[ 28.550615] The buggy address belongs to the object at ffff888102a6c880
[ 28.550615] which belongs to the cache kmalloc-64 of size 64
[ 28.551410] The buggy address is located 0 bytes to the right of
[ 28.551410] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 28.551998]
[ 28.552257] The buggy address belongs to the physical page:
[ 28.552851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 28.553719] flags: 0x200000000000000(node=0|zone=2)
[ 28.554365] page_type: f5(slab)
[ 28.554792] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 28.555615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 28.556430] page dumped because: kasan: bad access detected
[ 28.557027]
[ 28.557380] Memory state around the buggy address:
[ 28.557909] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.558705] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.559423] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.559663] ^
[ 28.559826] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.560044] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.560404] ==================================================================
---
[ 27.533792] ==================================================================
[ 27.534608] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd48/0x5450
[ 27.535311] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 27.536229]
[ 27.536467] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 27.536585] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.536623] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.536685] Call Trace:
[ 27.536729] <TASK>
[ 27.536777] dump_stack_lvl+0x73/0xb0
[ 27.536870] print_report+0xd1/0x640
[ 27.536931] ? __virt_addr_valid+0x1db/0x2d0
[ 27.536996] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.537062] kasan_report+0x102/0x140
[ 27.537192] ? kasan_atomics_helper+0xd48/0x5450
[ 27.537270] ? kasan_atomics_helper+0xd48/0x5450
[ 27.537348] kasan_check_range+0x10c/0x1c0
[ 27.537411] __kasan_check_write+0x18/0x20
[ 27.537473] kasan_atomics_helper+0xd48/0x5450
[ 27.537538] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 27.537604] ? __kmalloc_cache_noprof+0x184/0x410
[ 27.537669] ? kasan_atomics+0x153/0x310
[ 27.537735] kasan_atomics+0x1dd/0x310
[ 27.537797] ? __pfx_kasan_atomics+0x10/0x10
[ 27.537859] ? __pfx_read_tsc+0x10/0x10
[ 27.537915] ? ktime_get_ts64+0x86/0x230
[ 27.537976] kunit_try_run_case+0x1b3/0x490
[ 27.538038] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.538145] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.538242] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.538312] ? __kthread_parkme+0x82/0x160
[ 27.538374] ? preempt_count_sub+0x50/0x80
[ 27.538441] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.538503] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.538572] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.538641] kthread+0x324/0x6d0
[ 27.538700] ? trace_preempt_on+0x20/0xc0
[ 27.538769] ? __pfx_kthread+0x10/0x10
[ 27.538825] ? _raw_spin_unlock_irq+0x47/0x80
[ 27.538885] ? calculate_sigpending+0x7b/0xa0
[ 27.538946] ? __pfx_kthread+0x10/0x10
[ 27.539003] ret_from_fork+0x41/0x80
[ 27.539055] ? __pfx_kthread+0x10/0x10
[ 27.539187] ret_from_fork_asm+0x1a/0x30
[ 27.539280] </TASK>
[ 27.539320]
[ 27.553339] Allocated by task 273:
[ 27.553647] kasan_save_stack+0x3d/0x60
[ 27.554139] kasan_save_track+0x18/0x40
[ 27.554630] kasan_save_alloc_info+0x3b/0x50
[ 27.555070] __kasan_kmalloc+0xb7/0xc0
[ 27.555389] __kmalloc_cache_noprof+0x184/0x410
[ 27.555655] kasan_atomics+0x96/0x310
[ 27.555942] kunit_try_run_case+0x1b3/0x490
[ 27.556283] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.556806] kthread+0x324/0x6d0
[ 27.558407] ret_from_fork+0x41/0x80
[ 27.558680] ret_from_fork_asm+0x1a/0x30
[ 27.561243]
[ 27.561525] The buggy address belongs to the object at ffff888102a6c880
[ 27.561525] which belongs to the cache kmalloc-64 of size 64
[ 27.562810] The buggy address is located 0 bytes to the right of
[ 27.562810] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 27.563450]
[ 27.563603] The buggy address belongs to the physical page:
[ 27.563891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 27.564430] flags: 0x200000000000000(node=0|zone=2)
[ 27.564899] page_type: f5(slab)
[ 27.565400] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 27.566050] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 27.566490] page dumped because: kasan: bad access detected
[ 27.566814]
[ 27.566972] Memory state around the buggy address:
[ 27.567309] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.567818] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.568269] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 27.570567] ^
[ 27.571028] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.571712] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.572084] ==================================================================
---
[ 27.693040] ==================================================================
[ 27.694653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfaa/0x5450
[ 27.695072] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 27.695773]
[ 27.696068] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 27.696242] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.696283] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.696345] Call Trace:
[ 27.696388] <TASK>
[ 27.696435] dump_stack_lvl+0x73/0xb0
[ 27.696521] print_report+0xd1/0x640
[ 27.696581] ? __virt_addr_valid+0x1db/0x2d0
[ 27.696647] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.696722] kasan_report+0x102/0x140
[ 27.696775] ? kasan_atomics_helper+0xfaa/0x5450
[ 27.696847] ? kasan_atomics_helper+0xfaa/0x5450
[ 27.696925] kasan_check_range+0x10c/0x1c0
[ 27.697034] __kasan_check_write+0x18/0x20
[ 27.697143] kasan_atomics_helper+0xfaa/0x5450
[ 27.697239] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 27.697311] ? __kmalloc_cache_noprof+0x184/0x410
[ 27.697382] ? kasan_atomics+0x153/0x310
[ 27.697455] kasan_atomics+0x1dd/0x310
[ 27.697508] ? __pfx_kasan_atomics+0x10/0x10
[ 27.697569] ? __pfx_read_tsc+0x10/0x10
[ 27.697631] ? ktime_get_ts64+0x86/0x230
[ 27.697700] kunit_try_run_case+0x1b3/0x490
[ 27.697765] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.697823] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.697890] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.697958] ? __kthread_parkme+0x82/0x160
[ 27.698020] ? preempt_count_sub+0x50/0x80
[ 27.698126] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.698226] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.698301] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.698415] kthread+0x324/0x6d0
[ 27.698480] ? trace_preempt_on+0x20/0xc0
[ 27.698543] ? __pfx_kthread+0x10/0x10
[ 27.698602] ? _raw_spin_unlock_irq+0x47/0x80
[ 27.698664] ? calculate_sigpending+0x7b/0xa0
[ 27.698749] ? __pfx_kthread+0x10/0x10
[ 27.698834] ret_from_fork+0x41/0x80
[ 27.698894] ? __pfx_kthread+0x10/0x10
[ 27.698950] ret_from_fork_asm+0x1a/0x30
[ 27.699015] </TASK>
[ 27.699035]
[ 27.712379] Allocated by task 273:
[ 27.712807] kasan_save_stack+0x3d/0x60
[ 27.713387] kasan_save_track+0x18/0x40
[ 27.713787] kasan_save_alloc_info+0x3b/0x50
[ 27.714303] __kasan_kmalloc+0xb7/0xc0
[ 27.714720] __kmalloc_cache_noprof+0x184/0x410
[ 27.715302] kasan_atomics+0x96/0x310
[ 27.715646] kunit_try_run_case+0x1b3/0x490
[ 27.716209] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.716710] kthread+0x324/0x6d0
[ 27.717123] ret_from_fork+0x41/0x80
[ 27.717556] ret_from_fork_asm+0x1a/0x30
[ 27.717846]
[ 27.718013] The buggy address belongs to the object at ffff888102a6c880
[ 27.718013] which belongs to the cache kmalloc-64 of size 64
[ 27.719229] The buggy address is located 0 bytes to the right of
[ 27.719229] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 27.719989]
[ 27.720191] The buggy address belongs to the physical page:
[ 27.720708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 27.721518] flags: 0x200000000000000(node=0|zone=2)
[ 27.722016] page_type: f5(slab)
[ 27.722454] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 27.723135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 27.723750] page dumped because: kasan: bad access detected
[ 27.724340]
[ 27.724574] Memory state around the buggy address:
[ 27.725033] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.725468] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.726032] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 27.726759] ^
[ 27.727400] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.728142] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.728701] ==================================================================
---
[ 28.485545] ==================================================================
[ 28.486146] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1819/0x5450
[ 28.486887] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 28.487519]
[ 28.487775] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 28.487929] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.487994] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 28.488062] Call Trace:
[ 28.488182] <TASK>
[ 28.488243] dump_stack_lvl+0x73/0xb0
[ 28.488356] print_report+0xd1/0x640
[ 28.488425] ? __virt_addr_valid+0x1db/0x2d0
[ 28.488518] ? kasan_complete_mode_report_info+0x2a/0x200
[ 28.488617] kasan_report+0x102/0x140
[ 28.488721] ? kasan_atomics_helper+0x1819/0x5450
[ 28.488798] ? kasan_atomics_helper+0x1819/0x5450
[ 28.488881] kasan_check_range+0x10c/0x1c0
[ 28.488947] __kasan_check_write+0x18/0x20
[ 28.489009] kasan_atomics_helper+0x1819/0x5450
[ 28.489079] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 28.489231] ? __kmalloc_cache_noprof+0x184/0x410
[ 28.489307] ? kasan_atomics+0x153/0x310
[ 28.489378] kasan_atomics+0x1dd/0x310
[ 28.489439] ? __pfx_kasan_atomics+0x10/0x10
[ 28.489482] ? __pfx_read_tsc+0x10/0x10
[ 28.489515] ? ktime_get_ts64+0x86/0x230
[ 28.489555] kunit_try_run_case+0x1b3/0x490
[ 28.489589] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.489620] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 28.489672] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 28.489708] ? __kthread_parkme+0x82/0x160
[ 28.489740] ? preempt_count_sub+0x50/0x80
[ 28.489778] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.489810] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.489847] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 28.489885] kthread+0x324/0x6d0
[ 28.489914] ? trace_preempt_on+0x20/0xc0
[ 28.489948] ? __pfx_kthread+0x10/0x10
[ 28.489979] ? _raw_spin_unlock_irq+0x47/0x80
[ 28.490011] ? calculate_sigpending+0x7b/0xa0
[ 28.490043] ? __pfx_kthread+0x10/0x10
[ 28.490076] ret_from_fork+0x41/0x80
[ 28.490181] ? __pfx_kthread+0x10/0x10
[ 28.490249] ret_from_fork_asm+0x1a/0x30
[ 28.490334] </TASK>
[ 28.490369]
[ 28.507559] Allocated by task 273:
[ 28.508055] kasan_save_stack+0x3d/0x60
[ 28.508600] kasan_save_track+0x18/0x40
[ 28.509077] kasan_save_alloc_info+0x3b/0x50
[ 28.509653] __kasan_kmalloc+0xb7/0xc0
[ 28.510195] __kmalloc_cache_noprof+0x184/0x410
[ 28.510756] kasan_atomics+0x96/0x310
[ 28.511282] kunit_try_run_case+0x1b3/0x490
[ 28.511805] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.512456] kthread+0x324/0x6d0
[ 28.512996] ret_from_fork+0x41/0x80
[ 28.513278] ret_from_fork_asm+0x1a/0x30
[ 28.513888]
[ 28.514114] The buggy address belongs to the object at ffff888102a6c880
[ 28.514114] which belongs to the cache kmalloc-64 of size 64
[ 28.514913] The buggy address is located 0 bytes to the right of
[ 28.514913] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 28.516008]
[ 28.516249] The buggy address belongs to the physical page:
[ 28.516786] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 28.517461] flags: 0x200000000000000(node=0|zone=2)
[ 28.517929] page_type: f5(slab)
[ 28.518391] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 28.519135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 28.519571] page dumped because: kasan: bad access detected
[ 28.520099]
[ 28.520347] Memory state around the buggy address:
[ 28.520675] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.521102] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.521528] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.521972] ^
[ 28.522479] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.523136] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.523785] ==================================================================
[ 26.760758] ==================================================================
[ 26.761827] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b8a/0x5450
[ 26.763325] Read of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 26.763942]
[ 26.764445] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 26.764562] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.764600] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.764661] Call Trace:
[ 26.764701] <TASK>
[ 26.764747] dump_stack_lvl+0x73/0xb0
[ 26.764831] print_report+0xd1/0x640
[ 26.764918] ? __virt_addr_valid+0x1db/0x2d0
[ 26.764995] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.765069] kasan_report+0x102/0x140
[ 26.765190] ? kasan_atomics_helper+0x4b8a/0x5450
[ 26.765266] ? kasan_atomics_helper+0x4b8a/0x5450
[ 26.765346] __asan_report_load4_noabort+0x18/0x20
[ 26.765410] kasan_atomics_helper+0x4b8a/0x5450
[ 26.765477] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 26.765543] ? __kmalloc_cache_noprof+0x184/0x410
[ 26.765609] ? kasan_atomics+0x153/0x310
[ 26.765669] kasan_atomics+0x1dd/0x310
[ 26.765728] ? __pfx_kasan_atomics+0x10/0x10
[ 26.765786] ? __pfx_read_tsc+0x10/0x10
[ 26.765839] ? ktime_get_ts64+0x86/0x230
[ 26.765907] kunit_try_run_case+0x1b3/0x490
[ 26.765964] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.766019] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 26.766082] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.766257] ? __kthread_parkme+0x82/0x160
[ 26.766318] ? preempt_count_sub+0x50/0x80
[ 26.766383] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.766437] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.766501] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.766568] kthread+0x324/0x6d0
[ 26.766624] ? trace_preempt_on+0x20/0xc0
[ 26.766685] ? __pfx_kthread+0x10/0x10
[ 26.766744] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.766802] ? calculate_sigpending+0x7b/0xa0
[ 26.766862] ? __pfx_kthread+0x10/0x10
[ 26.766910] ret_from_fork+0x41/0x80
[ 26.766937] ? __pfx_kthread+0x10/0x10
[ 26.766970] ret_from_fork_asm+0x1a/0x30
[ 26.767016] </TASK>
[ 26.767032]
[ 26.779668] Allocated by task 273:
[ 26.780206] kasan_save_stack+0x3d/0x60
[ 26.780663] kasan_save_track+0x18/0x40
[ 26.781012] kasan_save_alloc_info+0x3b/0x50
[ 26.781392] __kasan_kmalloc+0xb7/0xc0
[ 26.781799] __kmalloc_cache_noprof+0x184/0x410
[ 26.782388] kasan_atomics+0x96/0x310
[ 26.782775] kunit_try_run_case+0x1b3/0x490
[ 26.783190] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.783648] kthread+0x324/0x6d0
[ 26.783905] ret_from_fork+0x41/0x80
[ 26.784211] ret_from_fork_asm+0x1a/0x30
[ 26.784613]
[ 26.784866] The buggy address belongs to the object at ffff888102a6c880
[ 26.784866] which belongs to the cache kmalloc-64 of size 64
[ 26.785975] The buggy address is located 0 bytes to the right of
[ 26.785975] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 26.787020]
[ 26.787309] The buggy address belongs to the physical page:
[ 26.787702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 26.788394] flags: 0x200000000000000(node=0|zone=2)
[ 26.788917] page_type: f5(slab)
[ 26.789287] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 26.789698] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 26.790070] page dumped because: kasan: bad access detected
[ 26.790659]
[ 26.790911] Memory state around the buggy address:
[ 26.791485] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.792200] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.792805] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 26.793222] ^
[ 26.793737] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.794466] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.794937] ==================================================================
---
[ 26.669141] ==================================================================
[ 26.670373] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbe/0x5450
[ 26.671574] Read of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 26.673152]
[ 26.673587] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 26.673706] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.673742] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.673806] Call Trace:
[ 26.673838] <TASK>
[ 26.673882] dump_stack_lvl+0x73/0xb0
[ 26.673975] print_report+0xd1/0x640
[ 26.674025] ? __virt_addr_valid+0x1db/0x2d0
[ 26.674062] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.674109] kasan_report+0x102/0x140
[ 26.674184] ? kasan_atomics_helper+0x4bbe/0x5450
[ 26.674222] ? kasan_atomics_helper+0x4bbe/0x5450
[ 26.674271] __asan_report_load4_noabort+0x18/0x20
[ 26.674355] kasan_atomics_helper+0x4bbe/0x5450
[ 26.674411] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 26.674461] ? __kmalloc_cache_noprof+0x184/0x410
[ 26.674508] ? kasan_atomics+0x153/0x310
[ 26.674543] kasan_atomics+0x1dd/0x310
[ 26.674573] ? __pfx_kasan_atomics+0x10/0x10
[ 26.674604] ? __pfx_read_tsc+0x10/0x10
[ 26.674636] ? ktime_get_ts64+0x86/0x230
[ 26.674672] kunit_try_run_case+0x1b3/0x490
[ 26.674705] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.674733] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 26.674766] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.674799] ? __kthread_parkme+0x82/0x160
[ 26.674831] ? preempt_count_sub+0x50/0x80
[ 26.674865] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.674895] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.674930] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.674965] kthread+0x324/0x6d0
[ 26.674993] ? trace_preempt_on+0x20/0xc0
[ 26.675026] ? __pfx_kthread+0x10/0x10
[ 26.675056] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.675085] ? calculate_sigpending+0x7b/0xa0
[ 26.675175] ? __pfx_kthread+0x10/0x10
[ 26.675211] ret_from_fork+0x41/0x80
[ 26.675238] ? __pfx_kthread+0x10/0x10
[ 26.675280] ret_from_fork_asm+0x1a/0x30
[ 26.675359] </TASK>
[ 26.675380]
[ 26.692762] Allocated by task 273:
[ 26.693033] kasan_save_stack+0x3d/0x60
[ 26.693500] kasan_save_track+0x18/0x40
[ 26.693957] kasan_save_alloc_info+0x3b/0x50
[ 26.694481] __kasan_kmalloc+0xb7/0xc0
[ 26.694926] __kmalloc_cache_noprof+0x184/0x410
[ 26.695837] kasan_atomics+0x96/0x310
[ 26.696428] kunit_try_run_case+0x1b3/0x490
[ 26.697066] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.697817] kthread+0x324/0x6d0
[ 26.698546] ret_from_fork+0x41/0x80
[ 26.699018] ret_from_fork_asm+0x1a/0x30
[ 26.699421]
[ 26.699599] The buggy address belongs to the object at ffff888102a6c880
[ 26.699599] which belongs to the cache kmalloc-64 of size 64
[ 26.701234] The buggy address is located 0 bytes to the right of
[ 26.701234] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 26.702640]
[ 26.703103] The buggy address belongs to the physical page:
[ 26.704061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 26.705036] flags: 0x200000000000000(node=0|zone=2)
[ 26.705802] page_type: f5(slab)
[ 26.706204] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 26.706773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 26.707423] page dumped because: kasan: bad access detected
[ 26.708144]
[ 26.708581] Memory state around the buggy address:
[ 26.709146] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.709771] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.710645] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 26.711564] ^
[ 26.712178] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.712947] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.713675] ==================================================================
---
[ 28.077296] ==================================================================
[ 28.078794] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49d0/0x5450
[ 28.079806] Read of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 28.081440]
[ 28.081851] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 28.081954] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.081982] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 28.082024] Call Trace:
[ 28.082048] <TASK>
[ 28.082078] dump_stack_lvl+0x73/0xb0
[ 28.082269] print_report+0xd1/0x640
[ 28.082439] ? __virt_addr_valid+0x1db/0x2d0
[ 28.082545] ? kasan_complete_mode_report_info+0x2a/0x200
[ 28.082595] kasan_report+0x102/0x140
[ 28.082627] ? kasan_atomics_helper+0x49d0/0x5450
[ 28.082665] ? kasan_atomics_helper+0x49d0/0x5450
[ 28.082707] __asan_report_load4_noabort+0x18/0x20
[ 28.082740] kasan_atomics_helper+0x49d0/0x5450
[ 28.082777] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 28.082813] ? __kmalloc_cache_noprof+0x184/0x410
[ 28.082849] ? kasan_atomics+0x153/0x310
[ 28.082887] kasan_atomics+0x1dd/0x310
[ 28.082918] ? __pfx_kasan_atomics+0x10/0x10
[ 28.082951] ? __pfx_read_tsc+0x10/0x10
[ 28.082983] ? ktime_get_ts64+0x86/0x230
[ 28.083020] kunit_try_run_case+0x1b3/0x490
[ 28.083053] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.083084] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 28.083196] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 28.083238] ? __kthread_parkme+0x82/0x160
[ 28.083272] ? preempt_count_sub+0x50/0x80
[ 28.083312] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.083345] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.083385] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 28.083422] kthread+0x324/0x6d0
[ 28.083454] ? trace_preempt_on+0x20/0xc0
[ 28.083488] ? __pfx_kthread+0x10/0x10
[ 28.083520] ? _raw_spin_unlock_irq+0x47/0x80
[ 28.083553] ? calculate_sigpending+0x7b/0xa0
[ 28.083587] ? __pfx_kthread+0x10/0x10
[ 28.083618] ret_from_fork+0x41/0x80
[ 28.083646] ? __pfx_kthread+0x10/0x10
[ 28.083678] ret_from_fork_asm+0x1a/0x30
[ 28.083724] </TASK>
[ 28.083741]
[ 28.102046] Allocated by task 273:
[ 28.102549] kasan_save_stack+0x3d/0x60
[ 28.102914] kasan_save_track+0x18/0x40
[ 28.105501] kasan_save_alloc_info+0x3b/0x50
[ 28.105829] __kasan_kmalloc+0xb7/0xc0
[ 28.106261] __kmalloc_cache_noprof+0x184/0x410
[ 28.106729] kasan_atomics+0x96/0x310
[ 28.109199] kunit_try_run_case+0x1b3/0x490
[ 28.109529] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.109899] kthread+0x324/0x6d0
[ 28.110281] ret_from_fork+0x41/0x80
[ 28.110529] ret_from_fork_asm+0x1a/0x30
[ 28.110803]
[ 28.110958] The buggy address belongs to the object at ffff888102a6c880
[ 28.110958] which belongs to the cache kmalloc-64 of size 64
[ 28.111562] The buggy address is located 0 bytes to the right of
[ 28.111562] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 28.112191]
[ 28.112357] The buggy address belongs to the physical page:
[ 28.112662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 28.113424] flags: 0x200000000000000(node=0|zone=2)
[ 28.113911] page_type: f5(slab)
[ 28.115503] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 28.116252] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 28.116945] page dumped because: kasan: bad access detected
[ 28.117548]
[ 28.117782] Memory state around the buggy address:
[ 28.118326] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.119008] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.119521] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.120062] ^
[ 28.120585] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.121056] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.121742] ==================================================================
---
[ 27.497175] ==================================================================
[ 27.497889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a86/0x5450
[ 27.500487] Read of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 27.501257]
[ 27.501436] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 27.501589] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.501630] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.501690] Call Trace:
[ 27.501734] <TASK>
[ 27.501786] dump_stack_lvl+0x73/0xb0
[ 27.501914] print_report+0xd1/0x640
[ 27.501992] ? __virt_addr_valid+0x1db/0x2d0
[ 27.502061] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.502134] kasan_report+0x102/0x140
[ 27.502208] ? kasan_atomics_helper+0x4a86/0x5450
[ 27.502280] ? kasan_atomics_helper+0x4a86/0x5450
[ 27.502355] __asan_report_load4_noabort+0x18/0x20
[ 27.502672] kasan_atomics_helper+0x4a86/0x5450
[ 27.502718] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 27.502793] ? __kmalloc_cache_noprof+0x184/0x410
[ 27.502836] ? kasan_atomics+0x153/0x310
[ 27.502874] kasan_atomics+0x1dd/0x310
[ 27.502906] ? __pfx_kasan_atomics+0x10/0x10
[ 27.502940] ? __pfx_read_tsc+0x10/0x10
[ 27.502972] ? ktime_get_ts64+0x86/0x230
[ 27.503008] kunit_try_run_case+0x1b3/0x490
[ 27.503041] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.503071] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.503123] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.503204] ? __kthread_parkme+0x82/0x160
[ 27.503269] ? preempt_count_sub+0x50/0x80
[ 27.503339] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.503399] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.503442] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.503481] kthread+0x324/0x6d0
[ 27.503513] ? trace_preempt_on+0x20/0xc0
[ 27.503550] ? __pfx_kthread+0x10/0x10
[ 27.503582] ? _raw_spin_unlock_irq+0x47/0x80
[ 27.503616] ? calculate_sigpending+0x7b/0xa0
[ 27.503649] ? __pfx_kthread+0x10/0x10
[ 27.503682] ret_from_fork+0x41/0x80
[ 27.503710] ? __pfx_kthread+0x10/0x10
[ 27.503743] ret_from_fork_asm+0x1a/0x30
[ 27.503788] </TASK>
[ 27.503805]
[ 27.518697] Allocated by task 273:
[ 27.519012] kasan_save_stack+0x3d/0x60
[ 27.519509] kasan_save_track+0x18/0x40
[ 27.519785] kasan_save_alloc_info+0x3b/0x50
[ 27.520102] __kasan_kmalloc+0xb7/0xc0
[ 27.520517] __kmalloc_cache_noprof+0x184/0x410
[ 27.520981] kasan_atomics+0x96/0x310
[ 27.521425] kunit_try_run_case+0x1b3/0x490
[ 27.521847] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.522283] kthread+0x324/0x6d0
[ 27.522659] ret_from_fork+0x41/0x80
[ 27.522958] ret_from_fork_asm+0x1a/0x30
[ 27.523423]
[ 27.523659] The buggy address belongs to the object at ffff888102a6c880
[ 27.523659] which belongs to the cache kmalloc-64 of size 64
[ 27.524333] The buggy address is located 0 bytes to the right of
[ 27.524333] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 27.524967]
[ 27.525257] The buggy address belongs to the physical page:
[ 27.525757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 27.526517] flags: 0x200000000000000(node=0|zone=2)
[ 27.526996] page_type: f5(slab)
[ 27.527419] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 27.527981] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 27.528643] page dumped because: kasan: bad access detected
[ 27.529187]
[ 27.529408] Memory state around the buggy address:
[ 27.529712] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.530370] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.530922] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 27.531510] ^
[ 27.531960] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.532383] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.532745] ==================================================================
---
[ 26.868286] ==================================================================
[ 26.868947] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b56/0x5450
[ 26.869544] Read of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 26.870126]
[ 26.870340] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 26.870459] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.870498] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.870561] Call Trace:
[ 26.870600] <TASK>
[ 26.870649] dump_stack_lvl+0x73/0xb0
[ 26.870733] print_report+0xd1/0x640
[ 26.870790] ? __virt_addr_valid+0x1db/0x2d0
[ 26.870855] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.870923] kasan_report+0x102/0x140
[ 26.870975] ? kasan_atomics_helper+0x4b56/0x5450
[ 26.871042] ? kasan_atomics_helper+0x4b56/0x5450
[ 26.871176] __asan_report_load4_noabort+0x18/0x20
[ 26.871258] kasan_atomics_helper+0x4b56/0x5450
[ 26.871328] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 26.871398] ? __kmalloc_cache_noprof+0x184/0x410
[ 26.871468] ? kasan_atomics+0x153/0x310
[ 26.871539] kasan_atomics+0x1dd/0x310
[ 26.871602] ? __pfx_kasan_atomics+0x10/0x10
[ 26.871665] ? __pfx_read_tsc+0x10/0x10
[ 26.871727] ? ktime_get_ts64+0x86/0x230
[ 26.871798] kunit_try_run_case+0x1b3/0x490
[ 26.871863] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.871935] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 26.872003] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.872071] ? __kthread_parkme+0x82/0x160
[ 26.872209] ? preempt_count_sub+0x50/0x80
[ 26.872282] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.872347] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.872417] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.872489] kthread+0x324/0x6d0
[ 26.872547] ? trace_preempt_on+0x20/0xc0
[ 26.872614] ? __pfx_kthread+0x10/0x10
[ 26.872675] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.872740] ? calculate_sigpending+0x7b/0xa0
[ 26.872804] ? __pfx_kthread+0x10/0x10
[ 26.872869] ret_from_fork+0x41/0x80
[ 26.872921] ? __pfx_kthread+0x10/0x10
[ 26.872984] ret_from_fork_asm+0x1a/0x30
[ 26.873072] </TASK>
[ 26.873151]
[ 26.885130] Allocated by task 273:
[ 26.885543] kasan_save_stack+0x3d/0x60
[ 26.885972] kasan_save_track+0x18/0x40
[ 26.886453] kasan_save_alloc_info+0x3b/0x50
[ 26.886821] __kasan_kmalloc+0xb7/0xc0
[ 26.887192] __kmalloc_cache_noprof+0x184/0x410
[ 26.887654] kasan_atomics+0x96/0x310
[ 26.887972] kunit_try_run_case+0x1b3/0x490
[ 26.888378] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.888703] kthread+0x324/0x6d0
[ 26.888940] ret_from_fork+0x41/0x80
[ 26.889251] ret_from_fork_asm+0x1a/0x30
[ 26.889669]
[ 26.889882] The buggy address belongs to the object at ffff888102a6c880
[ 26.889882] which belongs to the cache kmalloc-64 of size 64
[ 26.890927] The buggy address is located 0 bytes to the right of
[ 26.890927] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 26.891996]
[ 26.892293] The buggy address belongs to the physical page:
[ 26.892796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 26.893308] flags: 0x200000000000000(node=0|zone=2)
[ 26.893608] page_type: f5(slab)
[ 26.893955] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 26.894682] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 26.895362] page dumped because: kasan: bad access detected
[ 26.895665]
[ 26.895811] Memory state around the buggy address:
[ 26.896347] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.896981] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.898557] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 26.899239] ^
[ 26.899558] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.900889] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.903656] ==================================================================
---
[ 27.806861] ==================================================================
[ 27.807558] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1e/0x5450
[ 27.807986] Read of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 27.808670]
[ 27.808891] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 27.808985] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.809013] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.809060] Call Trace:
[ 27.809128] <TASK>
[ 27.809222] dump_stack_lvl+0x73/0xb0
[ 27.809386] print_report+0xd1/0x640
[ 27.809508] ? __virt_addr_valid+0x1db/0x2d0
[ 27.809637] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.809769] kasan_report+0x102/0x140
[ 27.809885] ? kasan_atomics_helper+0x4a1e/0x5450
[ 27.810015] ? kasan_atomics_helper+0x4a1e/0x5450
[ 27.810247] __asan_report_load4_noabort+0x18/0x20
[ 27.810316] kasan_atomics_helper+0x4a1e/0x5450
[ 27.810371] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 27.810425] ? __kmalloc_cache_noprof+0x184/0x410
[ 27.810480] ? kasan_atomics+0x153/0x310
[ 27.810533] kasan_atomics+0x1dd/0x310
[ 27.810580] ? __pfx_kasan_atomics+0x10/0x10
[ 27.810632] ? __pfx_read_tsc+0x10/0x10
[ 27.810681] ? ktime_get_ts64+0x86/0x230
[ 27.810735] kunit_try_run_case+0x1b3/0x490
[ 27.810787] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.810837] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.810892] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.810940] ? __kthread_parkme+0x82/0x160
[ 27.810987] ? preempt_count_sub+0x50/0x80
[ 27.811050] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.811175] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.811264] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.811338] kthread+0x324/0x6d0
[ 27.811396] ? trace_preempt_on+0x20/0xc0
[ 27.811464] ? __pfx_kthread+0x10/0x10
[ 27.811527] ? _raw_spin_unlock_irq+0x47/0x80
[ 27.811593] ? calculate_sigpending+0x7b/0xa0
[ 27.811651] ? __pfx_kthread+0x10/0x10
[ 27.811715] ret_from_fork+0x41/0x80
[ 27.811767] ? __pfx_kthread+0x10/0x10
[ 27.811832] ret_from_fork_asm+0x1a/0x30
[ 27.811929] </TASK>
[ 27.811969]
[ 27.835971] Allocated by task 273:
[ 27.837321] kasan_save_stack+0x3d/0x60
[ 27.838129] kasan_save_track+0x18/0x40
[ 27.840288] kasan_save_alloc_info+0x3b/0x50
[ 27.840564] __kasan_kmalloc+0xb7/0xc0
[ 27.840799] __kmalloc_cache_noprof+0x184/0x410
[ 27.842460] kasan_atomics+0x96/0x310
[ 27.842867] kunit_try_run_case+0x1b3/0x490
[ 27.843956] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.844956] kthread+0x324/0x6d0
[ 27.845943] ret_from_fork+0x41/0x80
[ 27.846376] ret_from_fork_asm+0x1a/0x30
[ 27.846649]
[ 27.846812] The buggy address belongs to the object at ffff888102a6c880
[ 27.846812] which belongs to the cache kmalloc-64 of size 64
[ 27.847823] The buggy address is located 0 bytes to the right of
[ 27.847823] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 27.848603]
[ 27.848823] The buggy address belongs to the physical page:
[ 27.849508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 27.850198] flags: 0x200000000000000(node=0|zone=2)
[ 27.850594] page_type: f5(slab)
[ 27.851020] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 27.851761] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 27.852249] page dumped because: kasan: bad access detected
[ 27.852764]
[ 27.853037] Memory state around the buggy address:
[ 27.853445] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.854143] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.855090] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 27.855735] ^
[ 27.856031] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.856421] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.857029] ==================================================================
---
[ 27.986832] ==================================================================
[ 27.987651] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ea/0x5450
[ 27.988103] Read of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 27.988881]
[ 27.989197] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 27.989316] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.989354] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.989416] Call Trace:
[ 27.989459] <TASK>
[ 27.989511] dump_stack_lvl+0x73/0xb0
[ 27.989594] print_report+0xd1/0x640
[ 27.989704] ? __virt_addr_valid+0x1db/0x2d0
[ 27.989770] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.989844] kasan_report+0x102/0x140
[ 27.989916] ? kasan_atomics_helper+0x49ea/0x5450
[ 27.990015] ? kasan_atomics_helper+0x49ea/0x5450
[ 27.990142] __asan_report_load4_noabort+0x18/0x20
[ 27.990255] kasan_atomics_helper+0x49ea/0x5450
[ 27.990351] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 27.990447] ? __kmalloc_cache_noprof+0x184/0x410
[ 27.990520] ? kasan_atomics+0x153/0x310
[ 27.990592] kasan_atomics+0x1dd/0x310
[ 27.990655] ? __pfx_kasan_atomics+0x10/0x10
[ 27.990720] ? __pfx_read_tsc+0x10/0x10
[ 27.990776] ? ktime_get_ts64+0x86/0x230
[ 27.990846] kunit_try_run_case+0x1b3/0x490
[ 27.990906] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.990985] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.991077] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.991200] ? __kthread_parkme+0x82/0x160
[ 27.991239] ? preempt_count_sub+0x50/0x80
[ 27.991280] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.991315] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.991379] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.991449] kthread+0x324/0x6d0
[ 27.991499] ? trace_preempt_on+0x20/0xc0
[ 27.991557] ? __pfx_kthread+0x10/0x10
[ 27.991616] ? _raw_spin_unlock_irq+0x47/0x80
[ 27.991694] ? calculate_sigpending+0x7b/0xa0
[ 27.991782] ? __pfx_kthread+0x10/0x10
[ 27.991850] ret_from_fork+0x41/0x80
[ 27.991913] ? __pfx_kthread+0x10/0x10
[ 27.991971] ret_from_fork_asm+0x1a/0x30
[ 27.992057] </TASK>
[ 27.992132]
[ 28.007985] Allocated by task 273:
[ 28.008474] kasan_save_stack+0x3d/0x60
[ 28.009045] kasan_save_track+0x18/0x40
[ 28.009517] kasan_save_alloc_info+0x3b/0x50
[ 28.010075] __kasan_kmalloc+0xb7/0xc0
[ 28.010607] __kmalloc_cache_noprof+0x184/0x410
[ 28.011258] kasan_atomics+0x96/0x310
[ 28.011706] kunit_try_run_case+0x1b3/0x490
[ 28.012259] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.012771] kthread+0x324/0x6d0
[ 28.013265] ret_from_fork+0x41/0x80
[ 28.013646] ret_from_fork_asm+0x1a/0x30
[ 28.014181]
[ 28.014435] The buggy address belongs to the object at ffff888102a6c880
[ 28.014435] which belongs to the cache kmalloc-64 of size 64
[ 28.015393] The buggy address is located 0 bytes to the right of
[ 28.015393] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 28.016291]
[ 28.016575] The buggy address belongs to the physical page:
[ 28.017232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 28.017789] flags: 0x200000000000000(node=0|zone=2)
[ 28.018405] page_type: f5(slab)
[ 28.018668] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 28.019473] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 28.020184] page dumped because: kasan: bad access detected
[ 28.020671]
[ 28.020946] Memory state around the buggy address:
[ 28.021490] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.021893] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.022314] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.022943] ^
[ 28.023355] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.023727] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.024135] ==================================================================
---
[ 27.729940] ==================================================================
[ 27.730767] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a38/0x5450
[ 27.731949] Read of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 27.732678]
[ 27.732922] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 27.733043] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.733082] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.733146] Call Trace:
[ 27.733214] <TASK>
[ 27.733656] dump_stack_lvl+0x73/0xb0
[ 27.733774] print_report+0xd1/0x640
[ 27.733864] ? __virt_addr_valid+0x1db/0x2d0
[ 27.733927] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.734004] kasan_report+0x102/0x140
[ 27.734057] ? kasan_atomics_helper+0x4a38/0x5450
[ 27.734130] ? kasan_atomics_helper+0x4a38/0x5450
[ 27.734237] __asan_report_load4_noabort+0x18/0x20
[ 27.734303] kasan_atomics_helper+0x4a38/0x5450
[ 27.734376] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 27.734445] ? __kmalloc_cache_noprof+0x184/0x410
[ 27.734517] ? kasan_atomics+0x153/0x310
[ 27.734591] kasan_atomics+0x1dd/0x310
[ 27.734651] ? __pfx_kasan_atomics+0x10/0x10
[ 27.734716] ? __pfx_read_tsc+0x10/0x10
[ 27.734778] ? ktime_get_ts64+0x86/0x230
[ 27.734847] kunit_try_run_case+0x1b3/0x490
[ 27.734912] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.734971] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.735040] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.735105] ? __kthread_parkme+0x82/0x160
[ 27.735189] ? preempt_count_sub+0x50/0x80
[ 27.735263] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.735328] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.735401] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.735473] kthread+0x324/0x6d0
[ 27.735532] ? trace_preempt_on+0x20/0xc0
[ 27.735599] ? __pfx_kthread+0x10/0x10
[ 27.735663] ? _raw_spin_unlock_irq+0x47/0x80
[ 27.735728] ? calculate_sigpending+0x7b/0xa0
[ 27.735789] ? __pfx_kthread+0x10/0x10
[ 27.735852] ret_from_fork+0x41/0x80
[ 27.735921] ? __pfx_kthread+0x10/0x10
[ 27.735984] ret_from_fork_asm+0x1a/0x30
[ 27.736070] </TASK>
[ 27.736108]
[ 27.751536] Allocated by task 273:
[ 27.751968] kasan_save_stack+0x3d/0x60
[ 27.752471] kasan_save_track+0x18/0x40
[ 27.752743] kasan_save_alloc_info+0x3b/0x50
[ 27.753023] __kasan_kmalloc+0xb7/0xc0
[ 27.753561] __kmalloc_cache_noprof+0x184/0x410
[ 27.754004] kasan_atomics+0x96/0x310
[ 27.754533] kunit_try_run_case+0x1b3/0x490
[ 27.755035] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.755679] kthread+0x324/0x6d0
[ 27.756074] ret_from_fork+0x41/0x80
[ 27.756596] ret_from_fork_asm+0x1a/0x30
[ 27.757129]
[ 27.757394] The buggy address belongs to the object at ffff888102a6c880
[ 27.757394] which belongs to the cache kmalloc-64 of size 64
[ 27.758298] The buggy address is located 0 bytes to the right of
[ 27.758298] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 27.758867]
[ 27.759019] The buggy address belongs to the physical page:
[ 27.759686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 27.760563] flags: 0x200000000000000(node=0|zone=2)
[ 27.761053] page_type: f5(slab)
[ 27.761545] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 27.762334] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 27.762901] page dumped because: kasan: bad access detected
[ 27.763244]
[ 27.763402] Memory state around the buggy address:
[ 27.763782] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.764527] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.765227] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 27.765773] ^
[ 27.766055] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.766561] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.767362] ==================================================================
---
[ 27.899736] ==================================================================
[ 27.900951] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a04/0x5450
[ 27.902476] Read of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 27.903079]
[ 27.903405] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 27.903523] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 27.903560] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 27.903622] Call Trace:
[ 27.903663] <TASK>
[ 27.903711] dump_stack_lvl+0x73/0xb0
[ 27.903797] print_report+0xd1/0x640
[ 27.903856] ? __virt_addr_valid+0x1db/0x2d0
[ 27.903933] ? kasan_complete_mode_report_info+0x2a/0x200
[ 27.904008] kasan_report+0x102/0x140
[ 27.904064] ? kasan_atomics_helper+0x4a04/0x5450
[ 27.904578] ? kasan_atomics_helper+0x4a04/0x5450
[ 27.904628] __asan_report_load4_noabort+0x18/0x20
[ 27.904666] kasan_atomics_helper+0x4a04/0x5450
[ 27.904704] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 27.904741] ? __kmalloc_cache_noprof+0x184/0x410
[ 27.904779] ? kasan_atomics+0x153/0x310
[ 27.904816] kasan_atomics+0x1dd/0x310
[ 27.904847] ? __pfx_kasan_atomics+0x10/0x10
[ 27.904880] ? __pfx_read_tsc+0x10/0x10
[ 27.904913] ? ktime_get_ts64+0x86/0x230
[ 27.904951] kunit_try_run_case+0x1b3/0x490
[ 27.904985] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.905015] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 27.905051] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 27.905087] ? __kthread_parkme+0x82/0x160
[ 27.905173] ? preempt_count_sub+0x50/0x80
[ 27.905216] ? __pfx_kunit_try_run_case+0x10/0x10
[ 27.905250] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.905287] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 27.905325] kthread+0x324/0x6d0
[ 27.905356] ? trace_preempt_on+0x20/0xc0
[ 27.905391] ? __pfx_kthread+0x10/0x10
[ 27.905423] ? _raw_spin_unlock_irq+0x47/0x80
[ 27.905454] ? calculate_sigpending+0x7b/0xa0
[ 27.905486] ? __pfx_kthread+0x10/0x10
[ 27.905518] ret_from_fork+0x41/0x80
[ 27.905544] ? __pfx_kthread+0x10/0x10
[ 27.905576] ret_from_fork_asm+0x1a/0x30
[ 27.905623] </TASK>
[ 27.905640]
[ 27.924526] Allocated by task 273:
[ 27.924964] kasan_save_stack+0x3d/0x60
[ 27.926011] kasan_save_track+0x18/0x40
[ 27.926394] kasan_save_alloc_info+0x3b/0x50
[ 27.927366] __kasan_kmalloc+0xb7/0xc0
[ 27.927703] __kmalloc_cache_noprof+0x184/0x410
[ 27.928109] kasan_atomics+0x96/0x310
[ 27.928835] kunit_try_run_case+0x1b3/0x490
[ 27.929129] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 27.929665] kthread+0x324/0x6d0
[ 27.930542] ret_from_fork+0x41/0x80
[ 27.930965] ret_from_fork_asm+0x1a/0x30
[ 27.931779]
[ 27.931944] The buggy address belongs to the object at ffff888102a6c880
[ 27.931944] which belongs to the cache kmalloc-64 of size 64
[ 27.933254] The buggy address is located 0 bytes to the right of
[ 27.933254] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 27.934795]
[ 27.935174] The buggy address belongs to the physical page:
[ 27.935657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 27.936328] flags: 0x200000000000000(node=0|zone=2)
[ 27.936779] page_type: f5(slab)
[ 27.937102] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 27.938298] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 27.939197] page dumped because: kasan: bad access detected
[ 27.939842]
[ 27.940031] Memory state around the buggy address:
[ 27.940959] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.941729] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 27.942522] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 27.943002] ^
[ 27.943827] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.944754] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 27.945651] ==================================================================
[ 29.025002] ==================================================================
[ 29.025824] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f73/0x5450
[ 29.026631] Read of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 29.027389]
[ 29.027760] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 29.027889] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.027931] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 29.027992] Call Trace:
[ 29.028036] <TASK>
[ 29.028931] dump_stack_lvl+0x73/0xb0
[ 29.029057] print_report+0xd1/0x640
[ 29.029185] ? __virt_addr_valid+0x1db/0x2d0
[ 29.029255] ? kasan_complete_mode_report_info+0x2a/0x200
[ 29.029324] kasan_report+0x102/0x140
[ 29.029375] ? kasan_atomics_helper+0x4f73/0x5450
[ 29.029442] ? kasan_atomics_helper+0x4f73/0x5450
[ 29.029522] __asan_report_load8_noabort+0x18/0x20
[ 29.029582] kasan_atomics_helper+0x4f73/0x5450
[ 29.029698] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 29.029769] ? __kmalloc_cache_noprof+0x184/0x410
[ 29.029837] ? kasan_atomics+0x153/0x310
[ 29.029901] kasan_atomics+0x1dd/0x310
[ 29.029959] ? __pfx_kasan_atomics+0x10/0x10
[ 29.030022] ? __pfx_read_tsc+0x10/0x10
[ 29.030081] ? ktime_get_ts64+0x86/0x230
[ 29.030222] kunit_try_run_case+0x1b3/0x490
[ 29.030287] ? __pfx_kunit_try_run_case+0x10/0x10
[ 29.030334] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 29.030393] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 29.030454] ? __kthread_parkme+0x82/0x160
[ 29.030605] ? preempt_count_sub+0x50/0x80
[ 29.030725] ? __pfx_kunit_try_run_case+0x10/0x10
[ 29.030791] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 29.030865] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 29.030931] kthread+0x324/0x6d0
[ 29.030994] ? trace_preempt_on+0x20/0xc0
[ 29.031059] ? __pfx_kthread+0x10/0x10
[ 29.032142] ? _raw_spin_unlock_irq+0x47/0x80
[ 29.032245] ? calculate_sigpending+0x7b/0xa0
[ 29.032311] ? __pfx_kthread+0x10/0x10
[ 29.032372] ret_from_fork+0x41/0x80
[ 29.032427] ? __pfx_kthread+0x10/0x10
[ 29.032488] ret_from_fork_asm+0x1a/0x30
[ 29.032578] </TASK>
[ 29.032611]
[ 29.053590] Allocated by task 273:
[ 29.054039] kasan_save_stack+0x3d/0x60
[ 29.054674] kasan_save_track+0x18/0x40
[ 29.057249] kasan_save_alloc_info+0x3b/0x50
[ 29.057787] __kasan_kmalloc+0xb7/0xc0
[ 29.058149] __kmalloc_cache_noprof+0x184/0x410
[ 29.058890] kasan_atomics+0x96/0x310
[ 29.059375] kunit_try_run_case+0x1b3/0x490
[ 29.059890] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 29.060261] kthread+0x324/0x6d0
[ 29.060508] ret_from_fork+0x41/0x80
[ 29.060737] ret_from_fork_asm+0x1a/0x30
[ 29.061003]
[ 29.061149] The buggy address belongs to the object at ffff888102a6c880
[ 29.061149] which belongs to the cache kmalloc-64 of size 64
[ 29.063277] The buggy address is located 0 bytes to the right of
[ 29.063277] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 29.065930]
[ 29.066286] The buggy address belongs to the physical page:
[ 29.067489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 29.068334] flags: 0x200000000000000(node=0|zone=2)
[ 29.068863] page_type: f5(slab)
[ 29.069312] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 29.069985] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 29.071567] page dumped because: kasan: bad access detected
[ 29.072207]
[ 29.072738] Memory state around the buggy address:
[ 29.073889] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.074462] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.074830] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 29.075344] ^
[ 29.076850] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.077615] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.078446] ==================================================================
---
[ 29.382116] ==================================================================
[ 29.382518] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5117/0x5450
[ 29.383952] Read of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 29.384880]
[ 29.385139] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 29.385269] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.385310] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 29.385372] Call Trace:
[ 29.385418] <TASK>
[ 29.385465] dump_stack_lvl+0x73/0xb0
[ 29.385558] print_report+0xd1/0x640
[ 29.385618] ? __virt_addr_valid+0x1db/0x2d0
[ 29.385683] ? kasan_complete_mode_report_info+0x2a/0x200
[ 29.385844] kasan_report+0x102/0x140
[ 29.385910] ? kasan_atomics_helper+0x5117/0x5450
[ 29.385982] ? kasan_atomics_helper+0x5117/0x5450
[ 29.386063] __asan_report_load8_noabort+0x18/0x20
[ 29.386127] kasan_atomics_helper+0x5117/0x5450
[ 29.386214] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 29.386281] ? __kmalloc_cache_noprof+0x184/0x410
[ 29.386350] ? kasan_atomics+0x153/0x310
[ 29.386421] kasan_atomics+0x1dd/0x310
[ 29.386482] ? __pfx_kasan_atomics+0x10/0x10
[ 29.386545] ? __pfx_read_tsc+0x10/0x10
[ 29.386604] ? ktime_get_ts64+0x86/0x230
[ 29.386678] kunit_try_run_case+0x1b3/0x490
[ 29.386740] ? __pfx_kunit_try_run_case+0x10/0x10
[ 29.386799] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 29.386848] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 29.386883] ? __kthread_parkme+0x82/0x160
[ 29.386918] ? preempt_count_sub+0x50/0x80
[ 29.386956] ? __pfx_kunit_try_run_case+0x10/0x10
[ 29.386989] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 29.387026] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 29.387064] kthread+0x324/0x6d0
[ 29.387103] ? trace_preempt_on+0x20/0xc0
[ 29.387182] ? __pfx_kthread+0x10/0x10
[ 29.387217] ? _raw_spin_unlock_irq+0x47/0x80
[ 29.387250] ? calculate_sigpending+0x7b/0xa0
[ 29.387283] ? __pfx_kthread+0x10/0x10
[ 29.387316] ret_from_fork+0x41/0x80
[ 29.387344] ? __pfx_kthread+0x10/0x10
[ 29.387376] ret_from_fork_asm+0x1a/0x30
[ 29.387423] </TASK>
[ 29.387441]
[ 29.400084] Allocated by task 273:
[ 29.400515] kasan_save_stack+0x3d/0x60
[ 29.401133] kasan_save_track+0x18/0x40
[ 29.401691] kasan_save_alloc_info+0x3b/0x50
[ 29.402183] __kasan_kmalloc+0xb7/0xc0
[ 29.402531] __kmalloc_cache_noprof+0x184/0x410
[ 29.402818] kasan_atomics+0x96/0x310
[ 29.403305] kunit_try_run_case+0x1b3/0x490
[ 29.403829] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 29.404424] kthread+0x324/0x6d0
[ 29.404673] ret_from_fork+0x41/0x80
[ 29.404917] ret_from_fork_asm+0x1a/0x30
[ 29.405411]
[ 29.405716] The buggy address belongs to the object at ffff888102a6c880
[ 29.405716] which belongs to the cache kmalloc-64 of size 64
[ 29.406820] The buggy address is located 0 bytes to the right of
[ 29.406820] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 29.409582]
[ 29.410421] The buggy address belongs to the physical page:
[ 29.410914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 29.411520] flags: 0x200000000000000(node=0|zone=2)
[ 29.414550] page_type: f5(slab)
[ 29.414903] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 29.415535] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 29.416032] page dumped because: kasan: bad access detected
[ 29.416513]
[ 29.416670] Memory state around the buggy address:
[ 29.417006] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.417697] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.418447] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 29.418958] ^
[ 29.419311] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.419906] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.420653] ==================================================================
---
[ 29.222046] ==================================================================
[ 29.223018] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb4/0x5450
[ 29.223731] Read of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 29.225025]
[ 29.225264] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 29.225372] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.225407] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 29.225468] Call Trace:
[ 29.225509] <TASK>
[ 29.225557] dump_stack_lvl+0x73/0xb0
[ 29.225641] print_report+0xd1/0x640
[ 29.225699] ? __virt_addr_valid+0x1db/0x2d0
[ 29.225764] ? kasan_complete_mode_report_info+0x2a/0x200
[ 29.225834] kasan_report+0x102/0x140
[ 29.225885] ? kasan_atomics_helper+0x4fb4/0x5450
[ 29.225952] ? kasan_atomics_helper+0x4fb4/0x5450
[ 29.226032] __asan_report_load8_noabort+0x18/0x20
[ 29.226097] kasan_atomics_helper+0x4fb4/0x5450
[ 29.226257] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 29.226350] ? __kmalloc_cache_noprof+0x184/0x410
[ 29.226423] ? kasan_atomics+0x153/0x310
[ 29.226495] kasan_atomics+0x1dd/0x310
[ 29.226558] ? __pfx_kasan_atomics+0x10/0x10
[ 29.226626] ? __pfx_read_tsc+0x10/0x10
[ 29.226685] ? ktime_get_ts64+0x86/0x230
[ 29.226757] kunit_try_run_case+0x1b3/0x490
[ 29.226821] ? __pfx_kunit_try_run_case+0x10/0x10
[ 29.226879] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 29.226948] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 29.227014] ? __kthread_parkme+0x82/0x160
[ 29.227073] ? preempt_count_sub+0x50/0x80
[ 29.227254] ? __pfx_kunit_try_run_case+0x10/0x10
[ 29.227329] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 29.227444] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 29.227520] kthread+0x324/0x6d0
[ 29.227580] ? trace_preempt_on+0x20/0xc0
[ 29.227641] ? __pfx_kthread+0x10/0x10
[ 29.227703] ? _raw_spin_unlock_irq+0x47/0x80
[ 29.227768] ? calculate_sigpending+0x7b/0xa0
[ 29.227831] ? __pfx_kthread+0x10/0x10
[ 29.227871] ret_from_fork+0x41/0x80
[ 29.227913] ? __pfx_kthread+0x10/0x10
[ 29.227945] ret_from_fork_asm+0x1a/0x30
[ 29.227993] </TASK>
[ 29.228012]
[ 29.243838] Allocated by task 273:
[ 29.244217] kasan_save_stack+0x3d/0x60
[ 29.244692] kasan_save_track+0x18/0x40
[ 29.245241] kasan_save_alloc_info+0x3b/0x50
[ 29.245761] __kasan_kmalloc+0xb7/0xc0
[ 29.246268] __kmalloc_cache_noprof+0x184/0x410
[ 29.246817] kasan_atomics+0x96/0x310
[ 29.247344] kunit_try_run_case+0x1b3/0x490
[ 29.247858] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 29.248304] kthread+0x324/0x6d0
[ 29.248725] ret_from_fork+0x41/0x80
[ 29.249142] ret_from_fork_asm+0x1a/0x30
[ 29.249626]
[ 29.249903] The buggy address belongs to the object at ffff888102a6c880
[ 29.249903] which belongs to the cache kmalloc-64 of size 64
[ 29.250771] The buggy address is located 0 bytes to the right of
[ 29.250771] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 29.251421]
[ 29.251645] The buggy address belongs to the physical page:
[ 29.252177] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 29.252870] flags: 0x200000000000000(node=0|zone=2)
[ 29.253381] page_type: f5(slab)
[ 29.253743] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 29.254392] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 29.254903] page dumped because: kasan: bad access detected
[ 29.255472]
[ 29.255647] Memory state around the buggy address:
[ 29.255940] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.256660] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.257216] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 29.257774] ^
[ 29.258057] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.258756] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.259466] ==================================================================
---
[ 29.297154] ==================================================================
[ 29.297982] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa7/0x5450
[ 29.298756] Read of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 29.299863]
[ 29.300063] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 29.300192] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.300232] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 29.300292] Call Trace:
[ 29.300333] <TASK>
[ 29.300381] dump_stack_lvl+0x73/0xb0
[ 29.300468] print_report+0xd1/0x640
[ 29.300526] ? __virt_addr_valid+0x1db/0x2d0
[ 29.300590] ? kasan_complete_mode_report_info+0x2a/0x200
[ 29.300666] kasan_report+0x102/0x140
[ 29.300719] ? kasan_atomics_helper+0x4fa7/0x5450
[ 29.300791] ? kasan_atomics_helper+0x4fa7/0x5450
[ 29.300864] __asan_report_load8_noabort+0x18/0x20
[ 29.300903] kasan_atomics_helper+0x4fa7/0x5450
[ 29.300941] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 29.300976] ? __kmalloc_cache_noprof+0x184/0x410
[ 29.301013] ? kasan_atomics+0x153/0x310
[ 29.301049] kasan_atomics+0x1dd/0x310
[ 29.301081] ? __pfx_kasan_atomics+0x10/0x10
[ 29.301196] ? __pfx_read_tsc+0x10/0x10
[ 29.301264] ? ktime_get_ts64+0x86/0x230
[ 29.301379] kunit_try_run_case+0x1b3/0x490
[ 29.301447] ? __pfx_kunit_try_run_case+0x10/0x10
[ 29.301504] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 29.301976] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 29.302237] ? __kthread_parkme+0x82/0x160
[ 29.302372] ? preempt_count_sub+0x50/0x80
[ 29.302485] ? __pfx_kunit_try_run_case+0x10/0x10
[ 29.302583] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 29.302684] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 29.302737] kthread+0x324/0x6d0
[ 29.302781] ? trace_preempt_on+0x20/0xc0
[ 29.302847] ? __pfx_kthread+0x10/0x10
[ 29.302903] ? _raw_spin_unlock_irq+0x47/0x80
[ 29.302957] ? calculate_sigpending+0x7b/0xa0
[ 29.303015] ? __pfx_kthread+0x10/0x10
[ 29.303601] ret_from_fork+0x41/0x80
[ 29.305137] ? __pfx_kthread+0x10/0x10
[ 29.305252] ret_from_fork_asm+0x1a/0x30
[ 29.305343] </TASK>
[ 29.305382]
[ 29.321058] Allocated by task 273:
[ 29.321520] kasan_save_stack+0x3d/0x60
[ 29.322007] kasan_save_track+0x18/0x40
[ 29.322521] kasan_save_alloc_info+0x3b/0x50
[ 29.323060] __kasan_kmalloc+0xb7/0xc0
[ 29.323572] __kmalloc_cache_noprof+0x184/0x410
[ 29.324083] kasan_atomics+0x96/0x310
[ 29.324612] kunit_try_run_case+0x1b3/0x490
[ 29.325188] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 29.325684] kthread+0x324/0x6d0
[ 29.326042] ret_from_fork+0x41/0x80
[ 29.326554] ret_from_fork_asm+0x1a/0x30
[ 29.327040]
[ 29.327370] The buggy address belongs to the object at ffff888102a6c880
[ 29.327370] which belongs to the cache kmalloc-64 of size 64
[ 29.328606] The buggy address is located 0 bytes to the right of
[ 29.328606] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 29.329513]
[ 29.329830] The buggy address belongs to the physical page:
[ 29.330355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 29.330997] flags: 0x200000000000000(node=0|zone=2)
[ 29.331538] page_type: f5(slab)
[ 29.331937] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 29.332474] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 29.333220] page dumped because: kasan: bad access detected
[ 29.333674]
[ 29.333945] Memory state around the buggy address:
[ 29.334386] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.334881] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.335566] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 29.336185] ^
[ 29.336566] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.337131] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.337556] ==================================================================
---
[ 28.766656] ==================================================================
[ 28.767446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f32/0x5450
[ 28.768764] Read of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 28.769421]
[ 28.769732] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 28.769924] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.769967] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 28.770031] Call Trace:
[ 28.770074] <TASK>
[ 28.770186] dump_stack_lvl+0x73/0xb0
[ 28.770280] print_report+0xd1/0x640
[ 28.770340] ? __virt_addr_valid+0x1db/0x2d0
[ 28.770399] ? kasan_complete_mode_report_info+0x2a/0x200
[ 28.770471] kasan_report+0x102/0x140
[ 28.770525] ? kasan_atomics_helper+0x4f32/0x5450
[ 28.770626] ? kasan_atomics_helper+0x4f32/0x5450
[ 28.770707] __asan_report_load8_noabort+0x18/0x20
[ 28.770794] kasan_atomics_helper+0x4f32/0x5450
[ 28.770897] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 28.770970] ? __kmalloc_cache_noprof+0x184/0x410
[ 28.771040] ? kasan_atomics+0x153/0x310
[ 28.771154] kasan_atomics+0x1dd/0x310
[ 28.771228] ? __pfx_kasan_atomics+0x10/0x10
[ 28.771265] ? __pfx_read_tsc+0x10/0x10
[ 28.771298] ? ktime_get_ts64+0x86/0x230
[ 28.771336] kunit_try_run_case+0x1b3/0x490
[ 28.771370] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.771401] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 28.771436] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 28.771471] ? __kthread_parkme+0x82/0x160
[ 28.771503] ? preempt_count_sub+0x50/0x80
[ 28.771539] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.771572] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.771609] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 28.771644] kthread+0x324/0x6d0
[ 28.771675] ? trace_preempt_on+0x20/0xc0
[ 28.771707] ? __pfx_kthread+0x10/0x10
[ 28.771738] ? _raw_spin_unlock_irq+0x47/0x80
[ 28.771771] ? calculate_sigpending+0x7b/0xa0
[ 28.771804] ? __pfx_kthread+0x10/0x10
[ 28.771835] ret_from_fork+0x41/0x80
[ 28.771863] ? __pfx_kthread+0x10/0x10
[ 28.771904] ret_from_fork_asm+0x1a/0x30
[ 28.771953] </TASK>
[ 28.771971]
[ 28.787379] Allocated by task 273:
[ 28.788344] kasan_save_stack+0x3d/0x60
[ 28.788726] kasan_save_track+0x18/0x40
[ 28.789073] kasan_save_alloc_info+0x3b/0x50
[ 28.790010] __kasan_kmalloc+0xb7/0xc0
[ 28.790609] __kmalloc_cache_noprof+0x184/0x410
[ 28.791040] kasan_atomics+0x96/0x310
[ 28.791731] kunit_try_run_case+0x1b3/0x490
[ 28.792224] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.792603] kthread+0x324/0x6d0
[ 28.793430] ret_from_fork+0x41/0x80
[ 28.793773] ret_from_fork_asm+0x1a/0x30
[ 28.794226]
[ 28.794398] The buggy address belongs to the object at ffff888102a6c880
[ 28.794398] which belongs to the cache kmalloc-64 of size 64
[ 28.796136] The buggy address is located 0 bytes to the right of
[ 28.796136] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 28.796969]
[ 28.797465] The buggy address belongs to the physical page:
[ 28.797941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 28.798936] flags: 0x200000000000000(node=0|zone=2)
[ 28.799498] page_type: f5(slab)
[ 28.799857] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 28.801035] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 28.801865] page dumped because: kasan: bad access detected
[ 28.802192]
[ 28.802493] Memory state around the buggy address:
[ 28.802950] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.803471] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.804127] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.804985] ^
[ 28.805863] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.806837] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.807668] ==================================================================
---
[ 28.162254] ==================================================================
[ 28.163843] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eb0/0x5450
[ 28.164588] Read of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 28.165323]
[ 28.165967] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 28.166088] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.166129] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 28.166206] Call Trace:
[ 28.166249] <TASK>
[ 28.166299] dump_stack_lvl+0x73/0xb0
[ 28.166426] print_report+0xd1/0x640
[ 28.166498] ? __virt_addr_valid+0x1db/0x2d0
[ 28.166561] ? kasan_complete_mode_report_info+0x2a/0x200
[ 28.166628] kasan_report+0x102/0x140
[ 28.166662] ? kasan_atomics_helper+0x4eb0/0x5450
[ 28.166701] ? kasan_atomics_helper+0x4eb0/0x5450
[ 28.166743] __asan_report_load8_noabort+0x18/0x20
[ 28.166791] kasan_atomics_helper+0x4eb0/0x5450
[ 28.166842] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 28.166878] ? __kmalloc_cache_noprof+0x184/0x410
[ 28.166915] ? kasan_atomics+0x153/0x310
[ 28.166952] kasan_atomics+0x1dd/0x310
[ 28.166983] ? __pfx_kasan_atomics+0x10/0x10
[ 28.167017] ? __pfx_read_tsc+0x10/0x10
[ 28.167050] ? ktime_get_ts64+0x86/0x230
[ 28.167092] kunit_try_run_case+0x1b3/0x490
[ 28.167152] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.167208] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 28.167244] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 28.167279] ? __kthread_parkme+0x82/0x160
[ 28.167311] ? preempt_count_sub+0x50/0x80
[ 28.167347] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.167380] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.167416] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 28.167453] kthread+0x324/0x6d0
[ 28.167484] ? trace_preempt_on+0x20/0xc0
[ 28.167517] ? __pfx_kthread+0x10/0x10
[ 28.167549] ? _raw_spin_unlock_irq+0x47/0x80
[ 28.167582] ? calculate_sigpending+0x7b/0xa0
[ 28.167614] ? __pfx_kthread+0x10/0x10
[ 28.167647] ret_from_fork+0x41/0x80
[ 28.167674] ? __pfx_kthread+0x10/0x10
[ 28.167707] ret_from_fork_asm+0x1a/0x30
[ 28.167754] </TASK>
[ 28.167770]
[ 28.183055] Allocated by task 273:
[ 28.183621] kasan_save_stack+0x3d/0x60
[ 28.184177] kasan_save_track+0x18/0x40
[ 28.184802] kasan_save_alloc_info+0x3b/0x50
[ 28.185490] __kasan_kmalloc+0xb7/0xc0
[ 28.185982] __kmalloc_cache_noprof+0x184/0x410
[ 28.186656] kasan_atomics+0x96/0x310
[ 28.187227] kunit_try_run_case+0x1b3/0x490
[ 28.187769] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.188500] kthread+0x324/0x6d0
[ 28.189153] ret_from_fork+0x41/0x80
[ 28.189428] ret_from_fork_asm+0x1a/0x30
[ 28.190361]
[ 28.190522] The buggy address belongs to the object at ffff888102a6c880
[ 28.190522] which belongs to the cache kmalloc-64 of size 64
[ 28.191928] The buggy address is located 0 bytes to the right of
[ 28.191928] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 28.192945]
[ 28.193208] The buggy address belongs to the physical page:
[ 28.193714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 28.195057] flags: 0x200000000000000(node=0|zone=2)
[ 28.195381] page_type: f5(slab)
[ 28.196018] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 28.196713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 28.197751] page dumped because: kasan: bad access detected
[ 28.198408]
[ 28.198628] Memory state around the buggy address:
[ 28.199061] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.199606] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.200196] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.201140] ^
[ 28.201455] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.202646] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.203453] ==================================================================
---
[ 29.133995] ==================================================================
[ 29.134839] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9a/0x5450
[ 29.135594] Read of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 29.136508]
[ 29.136699] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 29.136816] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.136856] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 29.136919] Call Trace:
[ 29.136995] <TASK>
[ 29.137609] dump_stack_lvl+0x73/0xb0
[ 29.137743] print_report+0xd1/0x640
[ 29.137811] ? __virt_addr_valid+0x1db/0x2d0
[ 29.137875] ? kasan_complete_mode_report_info+0x2a/0x200
[ 29.137952] kasan_report+0x102/0x140
[ 29.137990] ? kasan_atomics_helper+0x4f9a/0x5450
[ 29.138030] ? kasan_atomics_helper+0x4f9a/0x5450
[ 29.138072] __asan_report_load8_noabort+0x18/0x20
[ 29.138149] kasan_atomics_helper+0x4f9a/0x5450
[ 29.138210] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 29.138246] ? __kmalloc_cache_noprof+0x184/0x410
[ 29.138283] ? kasan_atomics+0x153/0x310
[ 29.138320] kasan_atomics+0x1dd/0x310
[ 29.138351] ? __pfx_kasan_atomics+0x10/0x10
[ 29.138385] ? __pfx_read_tsc+0x10/0x10
[ 29.138416] ? ktime_get_ts64+0x86/0x230
[ 29.138453] kunit_try_run_case+0x1b3/0x490
[ 29.138486] ? __pfx_kunit_try_run_case+0x10/0x10
[ 29.138516] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 29.138551] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 29.138586] ? __kthread_parkme+0x82/0x160
[ 29.138618] ? preempt_count_sub+0x50/0x80
[ 29.138653] ? __pfx_kunit_try_run_case+0x10/0x10
[ 29.138685] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 29.138722] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 29.138760] kthread+0x324/0x6d0
[ 29.138789] ? trace_preempt_on+0x20/0xc0
[ 29.138824] ? __pfx_kthread+0x10/0x10
[ 29.138856] ? _raw_spin_unlock_irq+0x47/0x80
[ 29.138888] ? calculate_sigpending+0x7b/0xa0
[ 29.138920] ? __pfx_kthread+0x10/0x10
[ 29.138953] ret_from_fork+0x41/0x80
[ 29.138979] ? __pfx_kthread+0x10/0x10
[ 29.139011] ret_from_fork_asm+0x1a/0x30
[ 29.139057] </TASK>
[ 29.139076]
[ 29.151963] Allocated by task 273:
[ 29.152440] kasan_save_stack+0x3d/0x60
[ 29.152929] kasan_save_track+0x18/0x40
[ 29.153491] kasan_save_alloc_info+0x3b/0x50
[ 29.153860] __kasan_kmalloc+0xb7/0xc0
[ 29.154353] __kmalloc_cache_noprof+0x184/0x410
[ 29.154848] kasan_atomics+0x96/0x310
[ 29.155300] kunit_try_run_case+0x1b3/0x490
[ 29.155711] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 29.156278] kthread+0x324/0x6d0
[ 29.156871] ret_from_fork+0x41/0x80
[ 29.157224] ret_from_fork_asm+0x1a/0x30
[ 29.157579]
[ 29.157832] The buggy address belongs to the object at ffff888102a6c880
[ 29.157832] which belongs to the cache kmalloc-64 of size 64
[ 29.158597] The buggy address is located 0 bytes to the right of
[ 29.158597] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 29.159239]
[ 29.159702] The buggy address belongs to the physical page:
[ 29.160239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 29.160926] flags: 0x200000000000000(node=0|zone=2)
[ 29.161423] page_type: f5(slab)
[ 29.161906] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 29.162604] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 29.163057] page dumped because: kasan: bad access detected
[ 29.163457]
[ 29.163669] Memory state around the buggy address:
[ 29.164063] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.164791] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 29.165466] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 29.166086] ^
[ 29.166637] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.167355] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.167992] ==================================================================
[ 26.950690] ==================================================================
[ 26.951453] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3c/0x5450
[ 26.953664] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 26.954602]
[ 26.954846] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 26.954958] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.954998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.955061] Call Trace:
[ 26.956149] <TASK>
[ 26.956231] dump_stack_lvl+0x73/0xb0
[ 26.956319] print_report+0xd1/0x640
[ 26.956379] ? __virt_addr_valid+0x1db/0x2d0
[ 26.956444] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.956520] kasan_report+0x102/0x140
[ 26.956576] ? kasan_atomics_helper+0x4b3c/0x5450
[ 26.956647] ? kasan_atomics_helper+0x4b3c/0x5450
[ 26.956727] __asan_report_store4_noabort+0x1b/0x30
[ 26.956796] kasan_atomics_helper+0x4b3c/0x5450
[ 26.956868] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 26.956938] ? __kmalloc_cache_noprof+0x184/0x410
[ 26.957007] ? kasan_atomics+0x153/0x310
[ 26.957079] kasan_atomics+0x1dd/0x310
[ 26.957790] ? __pfx_kasan_atomics+0x10/0x10
[ 26.957881] ? __pfx_read_tsc+0x10/0x10
[ 26.957942] ? ktime_get_ts64+0x86/0x230
[ 26.958016] kunit_try_run_case+0x1b3/0x490
[ 26.958080] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.958212] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 26.958287] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.958346] ? __kthread_parkme+0x82/0x160
[ 26.958403] ? preempt_count_sub+0x50/0x80
[ 26.958474] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.958532] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.958605] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.958677] kthread+0x324/0x6d0
[ 26.958737] ? trace_preempt_on+0x20/0xc0
[ 26.958804] ? __pfx_kthread+0x10/0x10
[ 26.958865] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.958911] ? calculate_sigpending+0x7b/0xa0
[ 26.958946] ? __pfx_kthread+0x10/0x10
[ 26.958980] ret_from_fork+0x41/0x80
[ 26.959008] ? __pfx_kthread+0x10/0x10
[ 26.959041] ret_from_fork_asm+0x1a/0x30
[ 26.959103] </TASK>
[ 26.959154]
[ 26.977365] Allocated by task 273:
[ 26.978461] kasan_save_stack+0x3d/0x60
[ 26.978896] kasan_save_track+0x18/0x40
[ 26.979751] kasan_save_alloc_info+0x3b/0x50
[ 26.980192] __kasan_kmalloc+0xb7/0xc0
[ 26.980499] __kmalloc_cache_noprof+0x184/0x410
[ 26.980889] kasan_atomics+0x96/0x310
[ 26.981270] kunit_try_run_case+0x1b3/0x490
[ 26.982238] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.982842] kthread+0x324/0x6d0
[ 26.983189] ret_from_fork+0x41/0x80
[ 26.983659] ret_from_fork_asm+0x1a/0x30
[ 26.984047]
[ 26.984323] The buggy address belongs to the object at ffff888102a6c880
[ 26.984323] which belongs to the cache kmalloc-64 of size 64
[ 26.985296] The buggy address is located 0 bytes to the right of
[ 26.985296] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 26.986254]
[ 26.986421] The buggy address belongs to the physical page:
[ 26.986887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 26.987477] flags: 0x200000000000000(node=0|zone=2)
[ 26.987908] page_type: f5(slab)
[ 26.988143] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 26.988844] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 26.989944] page dumped because: kasan: bad access detected
[ 26.990751]
[ 26.990952] Memory state around the buggy address:
[ 26.992380] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.992860] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.993591] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 26.994086] ^
[ 26.995059] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.995544] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.996355] ==================================================================
---
[ 26.796004] ==================================================================
[ 26.796820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b70/0x5450
[ 26.797601] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 26.798277]
[ 26.798431] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 26.798519] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.798548] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.798592] Call Trace:
[ 26.798628] <TASK>
[ 26.798663] dump_stack_lvl+0x73/0xb0
[ 26.798727] print_report+0xd1/0x640
[ 26.798776] ? __virt_addr_valid+0x1db/0x2d0
[ 26.798902] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.798977] kasan_report+0x102/0x140
[ 26.799026] ? kasan_atomics_helper+0x4b70/0x5450
[ 26.799179] ? kasan_atomics_helper+0x4b70/0x5450
[ 26.799305] __asan_report_store4_noabort+0x1b/0x30
[ 26.799400] kasan_atomics_helper+0x4b70/0x5450
[ 26.799497] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 26.799593] ? __kmalloc_cache_noprof+0x184/0x410
[ 26.799667] ? kasan_atomics+0x153/0x310
[ 26.799763] kasan_atomics+0x1dd/0x310
[ 26.799850] ? __pfx_kasan_atomics+0x10/0x10
[ 26.799932] ? __pfx_read_tsc+0x10/0x10
[ 26.800021] ? ktime_get_ts64+0x86/0x230
[ 26.800152] kunit_try_run_case+0x1b3/0x490
[ 26.800245] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.800292] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 26.800358] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.800419] ? __kthread_parkme+0x82/0x160
[ 26.800479] ? preempt_count_sub+0x50/0x80
[ 26.800547] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.800606] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.800676] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.800744] kthread+0x324/0x6d0
[ 26.800801] ? trace_preempt_on+0x20/0xc0
[ 26.800862] ? __pfx_kthread+0x10/0x10
[ 26.800921] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.800976] ? calculate_sigpending+0x7b/0xa0
[ 26.801038] ? __pfx_kthread+0x10/0x10
[ 26.801144] ret_from_fork+0x41/0x80
[ 26.801224] ? __pfx_kthread+0x10/0x10
[ 26.801286] ret_from_fork_asm+0x1a/0x30
[ 26.801371] </TASK>
[ 26.801403]
[ 26.814124] Allocated by task 273:
[ 26.814556] kasan_save_stack+0x3d/0x60
[ 26.814997] kasan_save_track+0x18/0x40
[ 26.815459] kasan_save_alloc_info+0x3b/0x50
[ 26.815908] __kasan_kmalloc+0xb7/0xc0
[ 26.816399] __kmalloc_cache_noprof+0x184/0x410
[ 26.816861] kasan_atomics+0x96/0x310
[ 26.817349] kunit_try_run_case+0x1b3/0x490
[ 26.817718] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.818036] kthread+0x324/0x6d0
[ 26.818427] ret_from_fork+0x41/0x80
[ 26.818751] ret_from_fork_asm+0x1a/0x30
[ 26.819150]
[ 26.819402] The buggy address belongs to the object at ffff888102a6c880
[ 26.819402] which belongs to the cache kmalloc-64 of size 64
[ 26.820431] The buggy address is located 0 bytes to the right of
[ 26.820431] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 26.821524]
[ 26.821745] The buggy address belongs to the physical page:
[ 26.822310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 26.823001] flags: 0x200000000000000(node=0|zone=2)
[ 26.823559] page_type: f5(slab)
[ 26.823922] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 26.824379] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 26.825052] page dumped because: kasan: bad access detected
[ 26.825641]
[ 26.825890] Memory state around the buggy address:
[ 26.826390] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.826876] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.827561] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 26.827926] ^
[ 26.828436] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.829183] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.829600] ==================================================================
---
[ 26.715932] ==================================================================
[ 26.716424] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba4/0x5450
[ 26.717362] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 26.717896]
[ 26.718178] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 26.718288] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.718325] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.718386] Call Trace:
[ 26.718424] <TASK>
[ 26.718466] dump_stack_lvl+0x73/0xb0
[ 26.718584] print_report+0xd1/0x640
[ 26.718637] ? __virt_addr_valid+0x1db/0x2d0
[ 26.718684] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.718754] kasan_report+0x102/0x140
[ 26.718803] ? kasan_atomics_helper+0x4ba4/0x5450
[ 26.718869] ? kasan_atomics_helper+0x4ba4/0x5450
[ 26.718947] __asan_report_store4_noabort+0x1b/0x30
[ 26.719009] kasan_atomics_helper+0x4ba4/0x5450
[ 26.719077] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 26.719146] ? __kmalloc_cache_noprof+0x184/0x410
[ 26.719229] ? kasan_atomics+0x153/0x310
[ 26.719296] kasan_atomics+0x1dd/0x310
[ 26.719352] ? __pfx_kasan_atomics+0x10/0x10
[ 26.719412] ? __pfx_read_tsc+0x10/0x10
[ 26.719465] ? ktime_get_ts64+0x86/0x230
[ 26.719530] kunit_try_run_case+0x1b3/0x490
[ 26.719588] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.719696] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 26.719937] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.720006] ? __kthread_parkme+0x82/0x160
[ 26.720050] ? preempt_count_sub+0x50/0x80
[ 26.720092] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.720154] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.720215] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.720252] kthread+0x324/0x6d0
[ 26.720342] ? trace_preempt_on+0x20/0xc0
[ 26.720390] ? __pfx_kthread+0x10/0x10
[ 26.720421] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.720455] ? calculate_sigpending+0x7b/0xa0
[ 26.720485] ? __pfx_kthread+0x10/0x10
[ 26.720516] ret_from_fork+0x41/0x80
[ 26.720542] ? __pfx_kthread+0x10/0x10
[ 26.720574] ret_from_fork_asm+0x1a/0x30
[ 26.720618] </TASK>
[ 26.720633]
[ 26.739815] Allocated by task 273:
[ 26.740594] kasan_save_stack+0x3d/0x60
[ 26.741016] kasan_save_track+0x18/0x40
[ 26.742138] kasan_save_alloc_info+0x3b/0x50
[ 26.742609] __kasan_kmalloc+0xb7/0xc0
[ 26.742992] __kmalloc_cache_noprof+0x184/0x410
[ 26.744009] kasan_atomics+0x96/0x310
[ 26.744685] kunit_try_run_case+0x1b3/0x490
[ 26.744971] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.745896] kthread+0x324/0x6d0
[ 26.746722] ret_from_fork+0x41/0x80
[ 26.747036] ret_from_fork_asm+0x1a/0x30
[ 26.747748]
[ 26.747965] The buggy address belongs to the object at ffff888102a6c880
[ 26.747965] which belongs to the cache kmalloc-64 of size 64
[ 26.748977] The buggy address is located 0 bytes to the right of
[ 26.748977] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 26.749859]
[ 26.750005] The buggy address belongs to the physical page:
[ 26.751639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 26.752850] flags: 0x200000000000000(node=0|zone=2)
[ 26.753371] page_type: f5(slab)
[ 26.753604] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 26.754000] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 26.754744] page dumped because: kasan: bad access detected
[ 26.755136]
[ 26.755409] Memory state around the buggy address:
[ 26.755862] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.756469] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.756905] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 26.757594] ^
[ 26.757923] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.758629] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.759214] ==================================================================
[ 28.123606] ==================================================================
[ 28.124178] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b6/0x5450
[ 28.124731] Read of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 28.125433]
[ 28.125693] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 28.125808] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.125845] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 28.125909] Call Trace:
[ 28.125954] <TASK>
[ 28.126001] dump_stack_lvl+0x73/0xb0
[ 28.126127] print_report+0xd1/0x640
[ 28.126257] ? __virt_addr_valid+0x1db/0x2d0
[ 28.126340] ? kasan_complete_mode_report_info+0x2a/0x200
[ 28.126452] kasan_report+0x102/0x140
[ 28.126535] ? kasan_atomics_helper+0x13b6/0x5450
[ 28.126612] ? kasan_atomics_helper+0x13b6/0x5450
[ 28.126722] kasan_check_range+0x10c/0x1c0
[ 28.126787] __kasan_check_read+0x15/0x20
[ 28.126844] kasan_atomics_helper+0x13b6/0x5450
[ 28.126914] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 28.127015] ? __kmalloc_cache_noprof+0x184/0x410
[ 28.127174] ? kasan_atomics+0x153/0x310
[ 28.127259] kasan_atomics+0x1dd/0x310
[ 28.127325] ? __pfx_kasan_atomics+0x10/0x10
[ 28.127389] ? __pfx_read_tsc+0x10/0x10
[ 28.127448] ? ktime_get_ts64+0x86/0x230
[ 28.127517] kunit_try_run_case+0x1b3/0x490
[ 28.127582] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.127640] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 28.127708] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 28.127763] ? __kthread_parkme+0x82/0x160
[ 28.127824] ? preempt_count_sub+0x50/0x80
[ 28.127907] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.127974] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.128048] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 28.128185] kthread+0x324/0x6d0
[ 28.128256] ? trace_preempt_on+0x20/0xc0
[ 28.128325] ? __pfx_kthread+0x10/0x10
[ 28.128389] ? _raw_spin_unlock_irq+0x47/0x80
[ 28.128455] ? calculate_sigpending+0x7b/0xa0
[ 28.128518] ? __pfx_kthread+0x10/0x10
[ 28.128581] ret_from_fork+0x41/0x80
[ 28.128636] ? __pfx_kthread+0x10/0x10
[ 28.128699] ret_from_fork_asm+0x1a/0x30
[ 28.128788] </TASK>
[ 28.128822]
[ 28.144393] Allocated by task 273:
[ 28.144895] kasan_save_stack+0x3d/0x60
[ 28.145350] kasan_save_track+0x18/0x40
[ 28.145765] kasan_save_alloc_info+0x3b/0x50
[ 28.146269] __kasan_kmalloc+0xb7/0xc0
[ 28.146721] __kmalloc_cache_noprof+0x184/0x410
[ 28.147250] kasan_atomics+0x96/0x310
[ 28.147646] kunit_try_run_case+0x1b3/0x490
[ 28.148203] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.148572] kthread+0x324/0x6d0
[ 28.149022] ret_from_fork+0x41/0x80
[ 28.149528] ret_from_fork_asm+0x1a/0x30
[ 28.150064]
[ 28.150353] The buggy address belongs to the object at ffff888102a6c880
[ 28.150353] which belongs to the cache kmalloc-64 of size 64
[ 28.150955] The buggy address is located 0 bytes to the right of
[ 28.150955] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 28.151989]
[ 28.152352] The buggy address belongs to the physical page:
[ 28.152879] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 28.153490] flags: 0x200000000000000(node=0|zone=2)
[ 28.153790] page_type: f5(slab)
[ 28.154016] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 28.154865] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 28.155744] page dumped because: kasan: bad access detected
[ 28.156395]
[ 28.156620] Memory state around the buggy address:
[ 28.157203] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.157771] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.158375] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.158766] ^
[ 28.159364] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.160173] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.160754] ==================================================================
---
[ 26.831565] ==================================================================
[ 26.832155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e0/0x5450
[ 26.833083] Read of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 26.834196]
[ 26.835886] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 26.836008] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.836044] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.836147] Call Trace:
[ 26.836212] <TASK>
[ 26.836257] dump_stack_lvl+0x73/0xb0
[ 26.836347] print_report+0xd1/0x640
[ 26.836407] ? __virt_addr_valid+0x1db/0x2d0
[ 26.836471] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.836541] kasan_report+0x102/0x140
[ 26.836595] ? kasan_atomics_helper+0x3e0/0x5450
[ 26.836664] ? kasan_atomics_helper+0x3e0/0x5450
[ 26.836741] kasan_check_range+0x10c/0x1c0
[ 26.836804] __kasan_check_read+0x15/0x20
[ 26.836862] kasan_atomics_helper+0x3e0/0x5450
[ 26.836931] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 26.836997] ? __kmalloc_cache_noprof+0x184/0x410
[ 26.837064] ? kasan_atomics+0x153/0x310
[ 26.837203] kasan_atomics+0x1dd/0x310
[ 26.837270] ? __pfx_kasan_atomics+0x10/0x10
[ 26.837333] ? __pfx_read_tsc+0x10/0x10
[ 26.837390] ? ktime_get_ts64+0x86/0x230
[ 26.837460] kunit_try_run_case+0x1b3/0x490
[ 26.837523] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.837848] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 26.837925] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.838054] ? __kthread_parkme+0x82/0x160
[ 26.838180] ? preempt_count_sub+0x50/0x80
[ 26.838257] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.838322] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.838398] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.838470] kthread+0x324/0x6d0
[ 26.838529] ? trace_preempt_on+0x20/0xc0
[ 26.838595] ? __pfx_kthread+0x10/0x10
[ 26.838655] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.838722] ? calculate_sigpending+0x7b/0xa0
[ 26.838783] ? __pfx_kthread+0x10/0x10
[ 26.838847] ret_from_fork+0x41/0x80
[ 26.838901] ? __pfx_kthread+0x10/0x10
[ 26.838962] ret_from_fork_asm+0x1a/0x30
[ 26.839049] </TASK>
[ 26.839125]
[ 26.852640] Allocated by task 273:
[ 26.852920] kasan_save_stack+0x3d/0x60
[ 26.853340] kasan_save_track+0x18/0x40
[ 26.853725] kasan_save_alloc_info+0x3b/0x50
[ 26.854155] __kasan_kmalloc+0xb7/0xc0
[ 26.854606] __kmalloc_cache_noprof+0x184/0x410
[ 26.855065] kasan_atomics+0x96/0x310
[ 26.855522] kunit_try_run_case+0x1b3/0x490
[ 26.855956] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.856380] kthread+0x324/0x6d0
[ 26.856628] ret_from_fork+0x41/0x80
[ 26.856875] ret_from_fork_asm+0x1a/0x30
[ 26.857219]
[ 26.857457] The buggy address belongs to the object at ffff888102a6c880
[ 26.857457] which belongs to the cache kmalloc-64 of size 64
[ 26.858528] The buggy address is located 0 bytes to the right of
[ 26.858528] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 26.859545]
[ 26.859713] The buggy address belongs to the physical page:
[ 26.860024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 26.860755] flags: 0x200000000000000(node=0|zone=2)
[ 26.861293] page_type: f5(slab)
[ 26.861658] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 26.862369] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 26.862779] page dumped because: kasan: bad access detected
[ 26.863078]
[ 26.863358] Memory state around the buggy address:
[ 26.863800] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.864482] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 26.865149] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 26.865553] ^
[ 26.865832] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.866291] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.866918] ==================================================================
[ 28.247134] ==================================================================
[ 28.247806] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d6/0x5450
[ 28.248365] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[ 28.249042]
[ 28.249357] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 28.249506] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 28.249549] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 28.249611] Call Trace:
[ 28.249693] <TASK>
[ 28.249745] dump_stack_lvl+0x73/0xb0
[ 28.249856] print_report+0xd1/0x640
[ 28.249944] ? __virt_addr_valid+0x1db/0x2d0
[ 28.250006] ? kasan_complete_mode_report_info+0x2a/0x200
[ 28.250058] kasan_report+0x102/0x140
[ 28.250108] ? kasan_atomics_helper+0x50d6/0x5450
[ 28.250208] ? kasan_atomics_helper+0x50d6/0x5450
[ 28.250293] __asan_report_store8_noabort+0x1b/0x30
[ 28.250346] kasan_atomics_helper+0x50d6/0x5450
[ 28.250410] ? __pfx_kasan_atomics_helper+0x10/0x10
[ 28.250475] ? __kmalloc_cache_noprof+0x184/0x410
[ 28.250562] ? kasan_atomics+0x153/0x310
[ 28.250659] kasan_atomics+0x1dd/0x310
[ 28.250725] ? __pfx_kasan_atomics+0x10/0x10
[ 28.250783] ? __pfx_read_tsc+0x10/0x10
[ 28.250842] ? ktime_get_ts64+0x86/0x230
[ 28.250910] kunit_try_run_case+0x1b3/0x490
[ 28.250995] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.251077] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 28.251148] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 28.251235] ? __kthread_parkme+0x82/0x160
[ 28.251290] ? preempt_count_sub+0x50/0x80
[ 28.251358] ? __pfx_kunit_try_run_case+0x10/0x10
[ 28.251421] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.251492] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 28.251562] kthread+0x324/0x6d0
[ 28.251620] ? trace_preempt_on+0x20/0xc0
[ 28.251686] ? __pfx_kthread+0x10/0x10
[ 28.251746] ? _raw_spin_unlock_irq+0x47/0x80
[ 28.251810] ? calculate_sigpending+0x7b/0xa0
[ 28.251896] ? __pfx_kthread+0x10/0x10
[ 28.251992] ret_from_fork+0x41/0x80
[ 28.252042] ? __pfx_kthread+0x10/0x10
[ 28.252102] ret_from_fork_asm+0x1a/0x30
[ 28.252210] </TASK>
[ 28.252247]
[ 28.268630] Allocated by task 273:
[ 28.269327] kasan_save_stack+0x3d/0x60
[ 28.269681] kasan_save_track+0x18/0x40
[ 28.270037] kasan_save_alloc_info+0x3b/0x50
[ 28.270353] __kasan_kmalloc+0xb7/0xc0
[ 28.270624] __kmalloc_cache_noprof+0x184/0x410
[ 28.270970] kasan_atomics+0x96/0x310
[ 28.271275] kunit_try_run_case+0x1b3/0x490
[ 28.271762] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 28.272345] kthread+0x324/0x6d0
[ 28.272749] ret_from_fork+0x41/0x80
[ 28.273177] ret_from_fork_asm+0x1a/0x30
[ 28.273526]
[ 28.273689] The buggy address belongs to the object at ffff888102a6c880
[ 28.273689] which belongs to the cache kmalloc-64 of size 64
[ 28.274554] The buggy address is located 0 bytes to the right of
[ 28.274554] allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[ 28.275674]
[ 28.275912] The buggy address belongs to the physical page:
[ 28.276406] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[ 28.276901] flags: 0x200000000000000(node=0|zone=2)
[ 28.277478] page_type: f5(slab)
[ 28.277834] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[ 28.278574] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[ 28.279292] page dumped because: kasan: bad access detected
[ 28.279802]
[ 28.280028] Memory state around the buggy address:
[ 28.280416] ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.281036] ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[ 28.281684] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[ 28.282049] ^
[ 28.282481] ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.283177] ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 28.283805] ==================================================================
[ 26.027074] ==================================================================
[ 26.027700] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23b/0xd50
[ 26.028233] Write of size 8 at addr ffff8881027b6368 by task kunit_try_catch/269
[ 26.028976]
[ 26.029241] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 26.029354] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.029391] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.029445] Call Trace:
[ 26.029483] <TASK>
[ 26.029529] dump_stack_lvl+0x73/0xb0
[ 26.029613] print_report+0xd1/0x640
[ 26.029671] ? __virt_addr_valid+0x1db/0x2d0
[ 26.029729] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.029801] kasan_report+0x102/0x140
[ 26.029854] ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[ 26.029924] ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[ 26.029999] kasan_check_range+0x10c/0x1c0
[ 26.030057] __kasan_check_write+0x18/0x20
[ 26.030113] kasan_bitops_modify.constprop.0+0x23b/0xd50
[ 26.030836] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[ 26.030883] ? __kmalloc_cache_noprof+0x184/0x410
[ 26.030919] ? trace_hardirqs_on+0x37/0xe0
[ 26.030953] ? kasan_bitops_generic+0x93/0x1c0
[ 26.030992] kasan_bitops_generic+0x117/0x1c0
[ 26.031022] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 26.031057] ? __pfx_read_tsc+0x10/0x10
[ 26.031087] ? ktime_get_ts64+0x86/0x230
[ 26.031179] kunit_try_run_case+0x1b3/0x490
[ 26.031216] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.031245] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 26.031280] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.031313] ? __kthread_parkme+0x82/0x160
[ 26.031344] ? preempt_count_sub+0x50/0x80
[ 26.031380] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.031411] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.031447] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.031482] kthread+0x324/0x6d0
[ 26.031511] ? trace_preempt_on+0x20/0xc0
[ 26.031542] ? __pfx_kthread+0x10/0x10
[ 26.031573] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.031603] ? calculate_sigpending+0x7b/0xa0
[ 26.031634] ? __pfx_kthread+0x10/0x10
[ 26.031666] ret_from_fork+0x41/0x80
[ 26.031691] ? __pfx_kthread+0x10/0x10
[ 26.031722] ret_from_fork_asm+0x1a/0x30
[ 26.031768] </TASK>
[ 26.031785]
[ 26.052898] Allocated by task 269:
[ 26.054172] kasan_save_stack+0x3d/0x60
[ 26.054879] kasan_save_track+0x18/0x40
[ 26.055215] kasan_save_alloc_info+0x3b/0x50
[ 26.055660] __kasan_kmalloc+0xb7/0xc0
[ 26.056031] __kmalloc_cache_noprof+0x184/0x410
[ 26.056483] kasan_bitops_generic+0x93/0x1c0
[ 26.056796] kunit_try_run_case+0x1b3/0x490
[ 26.057278] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.057800] kthread+0x324/0x6d0
[ 26.058174] ret_from_fork+0x41/0x80
[ 26.058554] ret_from_fork_asm+0x1a/0x30
[ 26.058883]
[ 26.059135] The buggy address belongs to the object at ffff8881027b6360
[ 26.059135] which belongs to the cache kmalloc-16 of size 16
[ 26.059715] The buggy address is located 8 bytes inside of
[ 26.059715] allocated 9-byte region [ffff8881027b6360, ffff8881027b6369)
[ 26.060778]
[ 26.061005] The buggy address belongs to the physical page:
[ 26.061365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b6
[ 26.062022] flags: 0x200000000000000(node=0|zone=2)
[ 26.062381] page_type: f5(slab)
[ 26.062726] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 26.063446] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[ 26.064013] page dumped because: kasan: bad access detected
[ 26.064429]
[ 26.064645] Memory state around the buggy address:
[ 26.064950] ffff8881027b6200: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[ 26.065585] ffff8881027b6280: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[ 26.065943] >ffff8881027b6300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 26.066533] ^
[ 26.067147] ffff8881027b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.067803] ffff8881027b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.068421] ==================================================================
---
[ 26.107537] ==================================================================
[ 26.108850] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x374/0xd50
[ 26.109667] Write of size 8 at addr ffff8881027b6368 by task kunit_try_catch/269
[ 26.110397]
[ 26.110651] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 26.110763] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.110796] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.110854] Call Trace:
[ 26.110894] <TASK>
[ 26.110939] dump_stack_lvl+0x73/0xb0
[ 26.111030] print_report+0xd1/0x640
[ 26.111125] ? __virt_addr_valid+0x1db/0x2d0
[ 26.111211] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.111276] kasan_report+0x102/0x140
[ 26.111323] ? kasan_bitops_modify.constprop.0+0x374/0xd50
[ 26.111394] ? kasan_bitops_modify.constprop.0+0x374/0xd50
[ 26.111474] kasan_check_range+0x10c/0x1c0
[ 26.111534] __kasan_check_write+0x18/0x20
[ 26.111593] kasan_bitops_modify.constprop.0+0x374/0xd50
[ 26.111660] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[ 26.111728] ? __kmalloc_cache_noprof+0x184/0x410
[ 26.111790] ? trace_hardirqs_on+0x37/0xe0
[ 26.111850] ? kasan_bitops_generic+0x93/0x1c0
[ 26.111937] kasan_bitops_generic+0x117/0x1c0
[ 26.111996] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 26.112063] ? __pfx_read_tsc+0x10/0x10
[ 26.112187] ? ktime_get_ts64+0x86/0x230
[ 26.112263] kunit_try_run_case+0x1b3/0x490
[ 26.112326] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.112382] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 26.112446] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.112511] ? __kthread_parkme+0x82/0x160
[ 26.112568] ? preempt_count_sub+0x50/0x80
[ 26.112641] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.112702] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.112772] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.112837] kthread+0x324/0x6d0
[ 26.112895] ? trace_preempt_on+0x20/0xc0
[ 26.112958] ? __pfx_kthread+0x10/0x10
[ 26.113019] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.113079] ? calculate_sigpending+0x7b/0xa0
[ 26.113205] ? __pfx_kthread+0x10/0x10
[ 26.113272] ret_from_fork+0x41/0x80
[ 26.113324] ? __pfx_kthread+0x10/0x10
[ 26.113380] ret_from_fork_asm+0x1a/0x30
[ 26.113470] </TASK>
[ 26.113502]
[ 26.125998] Allocated by task 269:
[ 26.126460] kasan_save_stack+0x3d/0x60
[ 26.126905] kasan_save_track+0x18/0x40
[ 26.127369] kasan_save_alloc_info+0x3b/0x50
[ 26.127800] __kasan_kmalloc+0xb7/0xc0
[ 26.128184] __kmalloc_cache_noprof+0x184/0x410
[ 26.128634] kasan_bitops_generic+0x93/0x1c0
[ 26.128912] kunit_try_run_case+0x1b3/0x490
[ 26.129255] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.129575] kthread+0x324/0x6d0
[ 26.129930] ret_from_fork+0x41/0x80
[ 26.130381] ret_from_fork_asm+0x1a/0x30
[ 26.130797]
[ 26.131020] The buggy address belongs to the object at ffff8881027b6360
[ 26.131020] which belongs to the cache kmalloc-16 of size 16
[ 26.132128] The buggy address is located 8 bytes inside of
[ 26.132128] allocated 9-byte region [ffff8881027b6360, ffff8881027b6369)
[ 26.133073]
[ 26.133287] The buggy address belongs to the physical page:
[ 26.133580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b6
[ 26.133968] flags: 0x200000000000000(node=0|zone=2)
[ 26.134320] page_type: f5(slab)
[ 26.134555] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 26.134935] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[ 26.135529] page dumped because: kasan: bad access detected
[ 26.136039]
[ 26.136319] Memory state around the buggy address:
[ 26.136779] ffff8881027b6200: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[ 26.137475] ffff8881027b6280: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[ 26.138153] >ffff8881027b6300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 26.138784] ^
[ 26.139436] ffff8881027b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.139942] ffff8881027b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.140441] ==================================================================
---
[ 26.141694] ==================================================================
[ 26.143054] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40f/0xd50
[ 26.143830] Write of size 8 at addr ffff8881027b6368 by task kunit_try_catch/269
[ 26.144385]
[ 26.144633] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 26.144744] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.144779] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.144836] Call Trace:
[ 26.144873] <TASK>
[ 26.144921] dump_stack_lvl+0x73/0xb0
[ 26.145006] print_report+0xd1/0x640
[ 26.145066] ? __virt_addr_valid+0x1db/0x2d0
[ 26.145139] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.145234] kasan_report+0x102/0x140
[ 26.145288] ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[ 26.145359] ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[ 26.145434] kasan_check_range+0x10c/0x1c0
[ 26.145498] __kasan_check_write+0x18/0x20
[ 26.145559] kasan_bitops_modify.constprop.0+0x40f/0xd50
[ 26.145621] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[ 26.145684] ? __kmalloc_cache_noprof+0x184/0x410
[ 26.145746] ? trace_hardirqs_on+0x37/0xe0
[ 26.145807] ? kasan_bitops_generic+0x93/0x1c0
[ 26.145878] kasan_bitops_generic+0x117/0x1c0
[ 26.145937] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 26.146000] ? __pfx_read_tsc+0x10/0x10
[ 26.146055] ? ktime_get_ts64+0x86/0x230
[ 26.146125] kunit_try_run_case+0x1b3/0x490
[ 26.147211] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.147290] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 26.147359] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.147426] ? __kthread_parkme+0x82/0x160
[ 26.147487] ? preempt_count_sub+0x50/0x80
[ 26.147559] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.147621] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.147692] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.147761] kthread+0x324/0x6d0
[ 26.147820] ? trace_preempt_on+0x20/0xc0
[ 26.147894] ? __pfx_kthread+0x10/0x10
[ 26.147958] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.148018] ? calculate_sigpending+0x7b/0xa0
[ 26.148067] ? __pfx_kthread+0x10/0x10
[ 26.148130] ret_from_fork+0x41/0x80
[ 26.148198] ? __pfx_kthread+0x10/0x10
[ 26.148258] ret_from_fork_asm+0x1a/0x30
[ 26.148332] </TASK>
[ 26.148364]
[ 26.168057] Allocated by task 269:
[ 26.168926] kasan_save_stack+0x3d/0x60
[ 26.169276] kasan_save_track+0x18/0x40
[ 26.169699] kasan_save_alloc_info+0x3b/0x50
[ 26.170075] __kasan_kmalloc+0xb7/0xc0
[ 26.170584] __kmalloc_cache_noprof+0x184/0x410
[ 26.170950] kasan_bitops_generic+0x93/0x1c0
[ 26.171805] kunit_try_run_case+0x1b3/0x490
[ 26.172717] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.173005] kthread+0x324/0x6d0
[ 26.173687] ret_from_fork+0x41/0x80
[ 26.174079] ret_from_fork_asm+0x1a/0x30
[ 26.174547]
[ 26.175082] The buggy address belongs to the object at ffff8881027b6360
[ 26.175082] which belongs to the cache kmalloc-16 of size 16
[ 26.176062] The buggy address is located 8 bytes inside of
[ 26.176062] allocated 9-byte region [ffff8881027b6360, ffff8881027b6369)
[ 26.178044]
[ 26.178734] The buggy address belongs to the physical page:
[ 26.179236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b6
[ 26.180063] flags: 0x200000000000000(node=0|zone=2)
[ 26.180698] page_type: f5(slab)
[ 26.181105] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 26.181785] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[ 26.182517] page dumped because: kasan: bad access detected
[ 26.182698]
[ 26.182778] Memory state around the buggy address:
[ 26.182935] ffff8881027b6200: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[ 26.183245] ffff8881027b6280: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[ 26.183597] >ffff8881027b6300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 26.184411] ^
[ 26.184785] ffff8881027b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.185378] ffff8881027b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.186005] ==================================================================
---
[ 26.187524] ==================================================================
[ 26.189044] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ad/0xd50
[ 26.189895] Write of size 8 at addr ffff8881027b6368 by task kunit_try_catch/269
[ 26.190541]
[ 26.190709] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 26.190805] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.190836] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.190887] Call Trace:
[ 26.190923] <TASK>
[ 26.190966] dump_stack_lvl+0x73/0xb0
[ 26.193271] print_report+0xd1/0x640
[ 26.193384] ? __virt_addr_valid+0x1db/0x2d0
[ 26.193450] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.193527] kasan_report+0x102/0x140
[ 26.193575] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[ 26.193660] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[ 26.193767] kasan_check_range+0x10c/0x1c0
[ 26.193837] __kasan_check_write+0x18/0x20
[ 26.193899] kasan_bitops_modify.constprop.0+0x4ad/0xd50
[ 26.193967] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[ 26.194037] ? __kmalloc_cache_noprof+0x184/0x410
[ 26.194102] ? trace_hardirqs_on+0x37/0xe0
[ 26.194185] ? kasan_bitops_generic+0x93/0x1c0
[ 26.194263] kasan_bitops_generic+0x117/0x1c0
[ 26.194324] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 26.194445] ? __pfx_read_tsc+0x10/0x10
[ 26.194505] ? ktime_get_ts64+0x86/0x230
[ 26.194569] kunit_try_run_case+0x1b3/0x490
[ 26.194621] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.194666] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 26.195240] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.195309] ? __kthread_parkme+0x82/0x160
[ 26.195365] ? preempt_count_sub+0x50/0x80
[ 26.195433] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.195491] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.195557] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.195622] kthread+0x324/0x6d0
[ 26.195675] ? trace_preempt_on+0x20/0xc0
[ 26.195733] ? __pfx_kthread+0x10/0x10
[ 26.195789] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.195844] ? calculate_sigpending+0x7b/0xa0
[ 26.195910] ? __pfx_kthread+0x10/0x10
[ 26.195969] ret_from_fork+0x41/0x80
[ 26.196018] ? __pfx_kthread+0x10/0x10
[ 26.196074] ret_from_fork_asm+0x1a/0x30
[ 26.196193] </TASK>
[ 26.196224]
[ 26.218649] Allocated by task 269:
[ 26.219138] kasan_save_stack+0x3d/0x60
[ 26.219833] kasan_save_track+0x18/0x40
[ 26.220399] kasan_save_alloc_info+0x3b/0x50
[ 26.220832] __kasan_kmalloc+0xb7/0xc0
[ 26.221402] __kmalloc_cache_noprof+0x184/0x410
[ 26.221915] kasan_bitops_generic+0x93/0x1c0
[ 26.222346] kunit_try_run_case+0x1b3/0x490
[ 26.222823] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.223456] kthread+0x324/0x6d0
[ 26.223854] ret_from_fork+0x41/0x80
[ 26.224351] ret_from_fork_asm+0x1a/0x30
[ 26.224816]
[ 26.225060] The buggy address belongs to the object at ffff8881027b6360
[ 26.225060] which belongs to the cache kmalloc-16 of size 16
[ 26.225685] The buggy address is located 8 bytes inside of
[ 26.225685] allocated 9-byte region [ffff8881027b6360, ffff8881027b6369)
[ 26.226455]
[ 26.226615] The buggy address belongs to the physical page:
[ 26.227027] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b6
[ 26.227670] flags: 0x200000000000000(node=0|zone=2)
[ 26.228005] page_type: f5(slab)
[ 26.228412] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 26.229063] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[ 26.229518] page dumped because: kasan: bad access detected
[ 26.229911]
[ 26.230191] Memory state around the buggy address:
[ 26.230652] ffff8881027b6200: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[ 26.231340] ffff8881027b6280: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[ 26.231981] >ffff8881027b6300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 26.232578] ^
[ 26.233219] ffff8881027b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.233724] ffff8881027b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.234133] ==================================================================
---
[ 26.069756] ==================================================================
[ 26.070716] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d6/0xd50
[ 26.071419] Write of size 8 at addr ffff8881027b6368 by task kunit_try_catch/269
[ 26.071961]
[ 26.072268] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 26.072378] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.072415] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.072467] Call Trace:
[ 26.072502] <TASK>
[ 26.072548] dump_stack_lvl+0x73/0xb0
[ 26.072630] print_report+0xd1/0x640
[ 26.072684] ? __virt_addr_valid+0x1db/0x2d0
[ 26.072738] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.072804] kasan_report+0x102/0x140
[ 26.072857] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[ 26.072924] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[ 26.073003] kasan_check_range+0x10c/0x1c0
[ 26.073061] __kasan_check_write+0x18/0x20
[ 26.073187] kasan_bitops_modify.constprop.0+0x2d6/0xd50
[ 26.073261] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[ 26.073322] ? __kmalloc_cache_noprof+0x184/0x410
[ 26.073376] ? trace_hardirqs_on+0x37/0xe0
[ 26.073434] ? kasan_bitops_generic+0x93/0x1c0
[ 26.073498] kasan_bitops_generic+0x117/0x1c0
[ 26.073561] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 26.073621] ? __pfx_read_tsc+0x10/0x10
[ 26.073680] ? ktime_get_ts64+0x86/0x230
[ 26.073747] kunit_try_run_case+0x1b3/0x490
[ 26.073810] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.073866] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 26.073926] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.073988] ? __kthread_parkme+0x82/0x160
[ 26.074046] ? preempt_count_sub+0x50/0x80
[ 26.074182] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.074245] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.074316] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.074386] kthread+0x324/0x6d0
[ 26.074444] ? trace_preempt_on+0x20/0xc0
[ 26.074499] ? __pfx_kthread+0x10/0x10
[ 26.074557] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.074617] ? calculate_sigpending+0x7b/0xa0
[ 26.074676] ? __pfx_kthread+0x10/0x10
[ 26.074737] ret_from_fork+0x41/0x80
[ 26.074787] ? __pfx_kthread+0x10/0x10
[ 26.074847] ret_from_fork_asm+0x1a/0x30
[ 26.074938] </TASK>
[ 26.074972]
[ 26.087381] Allocated by task 269:
[ 26.087658] kasan_save_stack+0x3d/0x60
[ 26.087963] kasan_save_track+0x18/0x40
[ 26.088356] kasan_save_alloc_info+0x3b/0x50
[ 26.088796] __kasan_kmalloc+0xb7/0xc0
[ 26.089244] __kmalloc_cache_noprof+0x184/0x410
[ 26.089672] kasan_bitops_generic+0x93/0x1c0
[ 26.090142] kunit_try_run_case+0x1b3/0x490
[ 26.090581] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.091081] kthread+0x324/0x6d0
[ 26.091504] ret_from_fork+0x41/0x80
[ 26.091833] ret_from_fork_asm+0x1a/0x30
[ 26.092149]
[ 26.092332] The buggy address belongs to the object at ffff8881027b6360
[ 26.092332] which belongs to the cache kmalloc-16 of size 16
[ 26.092873] The buggy address is located 8 bytes inside of
[ 26.092873] allocated 9-byte region [ffff8881027b6360, ffff8881027b6369)
[ 26.093757]
[ 26.093981] The buggy address belongs to the physical page:
[ 26.094471] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b6
[ 26.095202] flags: 0x200000000000000(node=0|zone=2)
[ 26.095671] page_type: f5(slab)
[ 26.096027] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 26.096751] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[ 26.097451] page dumped because: kasan: bad access detected
[ 26.097939]
[ 26.098206] Memory state around the buggy address:
[ 26.098643] ffff8881027b6200: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[ 26.099269] ffff8881027b6280: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[ 26.099765] >ffff8881027b6300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 26.100189] ^
[ 26.100528] ffff8881027b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.100881] ffff8881027b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.101377] ==================================================================
---
[ 25.941255] ==================================================================
[ 25.941985] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x102/0xd50
[ 25.942785] Write of size 8 at addr ffff8881027b6368 by task kunit_try_catch/269
[ 25.943286]
[ 25.943463] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 25.943574] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.943602] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.943656] Call Trace:
[ 25.943688] <TASK>
[ 25.943729] dump_stack_lvl+0x73/0xb0
[ 25.943817] print_report+0xd1/0x640
[ 25.943886] ? __virt_addr_valid+0x1db/0x2d0
[ 25.943952] ? kasan_complete_mode_report_info+0x2a/0x200
[ 25.944020] kasan_report+0x102/0x140
[ 25.944073] ? kasan_bitops_modify.constprop.0+0x102/0xd50
[ 25.944251] ? kasan_bitops_modify.constprop.0+0x102/0xd50
[ 25.944338] kasan_check_range+0x10c/0x1c0
[ 25.944402] __kasan_check_write+0x18/0x20
[ 25.944462] kasan_bitops_modify.constprop.0+0x102/0xd50
[ 25.944532] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[ 25.944599] ? __kmalloc_cache_noprof+0x184/0x410
[ 25.944659] ? trace_hardirqs_on+0x37/0xe0
[ 25.944709] ? kasan_bitops_generic+0x93/0x1c0
[ 25.944775] kasan_bitops_generic+0x117/0x1c0
[ 25.944834] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 25.944887] ? __pfx_read_tsc+0x10/0x10
[ 25.944946] ? ktime_get_ts64+0x86/0x230
[ 25.945016] kunit_try_run_case+0x1b3/0x490
[ 25.945082] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.945189] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 25.945259] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 25.945323] ? __kthread_parkme+0x82/0x160
[ 25.945382] ? preempt_count_sub+0x50/0x80
[ 25.945451] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.945506] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.945570] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 25.945633] kthread+0x324/0x6d0
[ 25.945689] ? trace_preempt_on+0x20/0xc0
[ 25.945747] ? __pfx_kthread+0x10/0x10
[ 25.945805] ? _raw_spin_unlock_irq+0x47/0x80
[ 25.945865] ? calculate_sigpending+0x7b/0xa0
[ 25.945928] ? __pfx_kthread+0x10/0x10
[ 25.945987] ret_from_fork+0x41/0x80
[ 25.946040] ? __pfx_kthread+0x10/0x10
[ 25.946096] ret_from_fork_asm+0x1a/0x30
[ 25.946210] </TASK>
[ 25.946232]
[ 25.964538] Allocated by task 269:
[ 25.965049] kasan_save_stack+0x3d/0x60
[ 25.965677] kasan_save_track+0x18/0x40
[ 25.966249] kasan_save_alloc_info+0x3b/0x50
[ 25.966670] __kasan_kmalloc+0xb7/0xc0
[ 25.967082] __kmalloc_cache_noprof+0x184/0x410
[ 25.967478] kasan_bitops_generic+0x93/0x1c0
[ 25.967932] kunit_try_run_case+0x1b3/0x490
[ 25.968248] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.968771] kthread+0x324/0x6d0
[ 25.969091] ret_from_fork+0x41/0x80
[ 25.969515] ret_from_fork_asm+0x1a/0x30
[ 25.969870]
[ 25.970030] The buggy address belongs to the object at ffff8881027b6360
[ 25.970030] which belongs to the cache kmalloc-16 of size 16
[ 25.970760] The buggy address is located 8 bytes inside of
[ 25.970760] allocated 9-byte region [ffff8881027b6360, ffff8881027b6369)
[ 25.971870]
[ 25.972275] The buggy address belongs to the physical page:
[ 25.972743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b6
[ 25.973213] flags: 0x200000000000000(node=0|zone=2)
[ 25.973684] page_type: f5(slab)
[ 25.974213] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 25.975748] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[ 25.976184] page dumped because: kasan: bad access detected
[ 25.976967]
[ 25.977519] Memory state around the buggy address:
[ 25.977992] ffff8881027b6200: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[ 25.978600] ffff8881027b6280: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[ 25.979044] >ffff8881027b6300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 25.979678] ^
[ 25.980344] ffff8881027b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.980812] ffff8881027b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.981412] ==================================================================
---
[ 25.983566] ==================================================================
[ 25.983997] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19d/0xd50
[ 25.984758] Write of size 8 at addr ffff8881027b6368 by task kunit_try_catch/269
[ 25.985417]
[ 25.985665] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 25.985772] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.985806] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.985863] Call Trace:
[ 25.985903] <TASK>
[ 25.985948] dump_stack_lvl+0x73/0xb0
[ 25.986029] print_report+0xd1/0x640
[ 25.986087] ? __virt_addr_valid+0x1db/0x2d0
[ 25.986145] ? kasan_complete_mode_report_info+0x2a/0x200
[ 25.986234] kasan_report+0x102/0x140
[ 25.986279] ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[ 25.986347] ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[ 25.986427] kasan_check_range+0x10c/0x1c0
[ 25.986488] __kasan_check_write+0x18/0x20
[ 25.986544] kasan_bitops_modify.constprop.0+0x19d/0xd50
[ 25.986611] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[ 25.986678] ? __kmalloc_cache_noprof+0x184/0x410
[ 25.986741] ? trace_hardirqs_on+0x37/0xe0
[ 25.986801] ? kasan_bitops_generic+0x93/0x1c0
[ 25.986873] kasan_bitops_generic+0x117/0x1c0
[ 25.986934] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 25.986998] ? __pfx_read_tsc+0x10/0x10
[ 25.987055] ? ktime_get_ts64+0x86/0x230
[ 25.987122] kunit_try_run_case+0x1b3/0x490
[ 25.987357] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.987417] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 25.987466] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 25.987513] ? __kthread_parkme+0x82/0x160
[ 25.987559] ? preempt_count_sub+0x50/0x80
[ 25.987610] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.987655] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.987709] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 25.987758] kthread+0x324/0x6d0
[ 25.987799] ? trace_preempt_on+0x20/0xc0
[ 25.987843] ? __pfx_kthread+0x10/0x10
[ 25.987898] ? _raw_spin_unlock_irq+0x47/0x80
[ 25.987965] ? calculate_sigpending+0x7b/0xa0
[ 25.987997] ? __pfx_kthread+0x10/0x10
[ 25.988030] ret_from_fork+0x41/0x80
[ 25.988056] ? __pfx_kthread+0x10/0x10
[ 25.988088] ret_from_fork_asm+0x1a/0x30
[ 25.988187] </TASK>
[ 25.988207]
[ 26.006589] Allocated by task 269:
[ 26.007023] kasan_save_stack+0x3d/0x60
[ 26.007580] kasan_save_track+0x18/0x40
[ 26.008040] kasan_save_alloc_info+0x3b/0x50
[ 26.008576] __kasan_kmalloc+0xb7/0xc0
[ 26.008927] __kmalloc_cache_noprof+0x184/0x410
[ 26.009398] kasan_bitops_generic+0x93/0x1c0
[ 26.009865] kunit_try_run_case+0x1b3/0x490
[ 26.010396] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.010963] kthread+0x324/0x6d0
[ 26.011421] ret_from_fork+0x41/0x80
[ 26.011841] ret_from_fork_asm+0x1a/0x30
[ 26.012364]
[ 26.012602] The buggy address belongs to the object at ffff8881027b6360
[ 26.012602] which belongs to the cache kmalloc-16 of size 16
[ 26.013204] The buggy address is located 8 bytes inside of
[ 26.013204] allocated 9-byte region [ffff8881027b6360, ffff8881027b6369)
[ 26.014342]
[ 26.014581] The buggy address belongs to the physical page:
[ 26.015171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b6
[ 26.015938] flags: 0x200000000000000(node=0|zone=2)
[ 26.016504] page_type: f5(slab)
[ 26.016889] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 26.017682] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[ 26.018371] page dumped because: kasan: bad access detected
[ 26.018811]
[ 26.019019] Memory state around the buggy address:
[ 26.019736] ffff8881027b6200: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[ 26.020878] ffff8881027b6280: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[ 26.021595] >ffff8881027b6300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 26.022209] ^
[ 26.022833] ffff8881027b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.023928] ffff8881027b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.024635] ==================================================================
---
[ 26.236650] ==================================================================
[ 26.237470] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x548/0xd50
[ 26.238269] Write of size 8 at addr ffff8881027b6368 by task kunit_try_catch/269
[ 26.238897]
[ 26.239122] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 26.239255] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.239293] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.239349] Call Trace:
[ 26.239382] <TASK>
[ 26.239427] dump_stack_lvl+0x73/0xb0
[ 26.239507] print_report+0xd1/0x640
[ 26.239564] ? __virt_addr_valid+0x1db/0x2d0
[ 26.239682] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.239758] kasan_report+0x102/0x140
[ 26.239810] ? kasan_bitops_modify.constprop.0+0x548/0xd50
[ 26.239888] ? kasan_bitops_modify.constprop.0+0x548/0xd50
[ 26.239966] kasan_check_range+0x10c/0x1c0
[ 26.240025] __kasan_check_write+0x18/0x20
[ 26.240122] kasan_bitops_modify.constprop.0+0x548/0xd50
[ 26.240223] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[ 26.240292] ? __kmalloc_cache_noprof+0x184/0x410
[ 26.240356] ? trace_hardirqs_on+0x37/0xe0
[ 26.240415] ? kasan_bitops_generic+0x93/0x1c0
[ 26.240481] kasan_bitops_generic+0x117/0x1c0
[ 26.240542] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 26.240603] ? __pfx_read_tsc+0x10/0x10
[ 26.240660] ? ktime_get_ts64+0x86/0x230
[ 26.240714] kunit_try_run_case+0x1b3/0x490
[ 26.240751] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.240780] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 26.240817] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.240862] ? __kthread_parkme+0x82/0x160
[ 26.240912] ? preempt_count_sub+0x50/0x80
[ 26.240978] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.241036] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.241145] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.241256] kthread+0x324/0x6d0
[ 26.241316] ? trace_preempt_on+0x20/0xc0
[ 26.241375] ? __pfx_kthread+0x10/0x10
[ 26.241431] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.241488] ? calculate_sigpending+0x7b/0xa0
[ 26.241550] ? __pfx_kthread+0x10/0x10
[ 26.241606] ret_from_fork+0x41/0x80
[ 26.241653] ? __pfx_kthread+0x10/0x10
[ 26.241712] ret_from_fork_asm+0x1a/0x30
[ 26.241794] </TASK>
[ 26.241822]
[ 26.254448] Allocated by task 269:
[ 26.254866] kasan_save_stack+0x3d/0x60
[ 26.255373] kasan_save_track+0x18/0x40
[ 26.255789] kasan_save_alloc_info+0x3b/0x50
[ 26.256145] __kasan_kmalloc+0xb7/0xc0
[ 26.256559] __kmalloc_cache_noprof+0x184/0x410
[ 26.256877] kasan_bitops_generic+0x93/0x1c0
[ 26.257356] kunit_try_run_case+0x1b3/0x490
[ 26.257781] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.258181] kthread+0x324/0x6d0
[ 26.258553] ret_from_fork+0x41/0x80
[ 26.258868] ret_from_fork_asm+0x1a/0x30
[ 26.259255]
[ 26.259473] The buggy address belongs to the object at ffff8881027b6360
[ 26.259473] which belongs to the cache kmalloc-16 of size 16
[ 26.260372] The buggy address is located 8 bytes inside of
[ 26.260372] allocated 9-byte region [ffff8881027b6360, ffff8881027b6369)
[ 26.261078]
[ 26.261301] The buggy address belongs to the physical page:
[ 26.261769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b6
[ 26.262470] flags: 0x200000000000000(node=0|zone=2)
[ 26.262860] page_type: f5(slab)
[ 26.263133] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 26.263817] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[ 26.264434] page dumped because: kasan: bad access detected
[ 26.264727]
[ 26.264874] Memory state around the buggy address:
[ 26.265209] ffff8881027b6200: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[ 26.265577] ffff8881027b6280: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[ 26.265937] >ffff8881027b6300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 26.266446] ^
[ 26.267043] ffff8881027b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.267727] ffff8881027b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.268389] ==================================================================
[ 26.269883] ==================================================================
[ 26.270891] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[ 26.271723] Write of size 8 at addr ffff8881027b6368 by task kunit_try_catch/269
[ 26.272364]
[ 26.272549] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 26.272661] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.272695] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.272757] Call Trace:
[ 26.272797] <TASK>
[ 26.272845] dump_stack_lvl+0x73/0xb0
[ 26.272925] print_report+0xd1/0x640
[ 26.272984] ? __virt_addr_valid+0x1db/0x2d0
[ 26.273037] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.274184] kasan_report+0x102/0x140
[ 26.274267] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[ 26.274347] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[ 26.274435] kasan_check_range+0x10c/0x1c0
[ 26.274496] __kasan_check_write+0x18/0x20
[ 26.274557] kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[ 26.274631] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 26.274707] ? __kmalloc_cache_noprof+0x184/0x410
[ 26.274773] ? trace_hardirqs_on+0x37/0xe0
[ 26.274835] ? kasan_bitops_generic+0x93/0x1c0
[ 26.274907] kasan_bitops_generic+0x122/0x1c0
[ 26.274969] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 26.275035] ? __pfx_read_tsc+0x10/0x10
[ 26.275072] ? ktime_get_ts64+0x86/0x230
[ 26.276034] kunit_try_run_case+0x1b3/0x490
[ 26.277495] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.277586] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 26.277672] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.277741] ? __kthread_parkme+0x82/0x160
[ 26.277798] ? preempt_count_sub+0x50/0x80
[ 26.277871] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.277930] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.277999] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.278068] kthread+0x324/0x6d0
[ 26.278124] ? trace_preempt_on+0x20/0xc0
[ 26.278203] ? __pfx_kthread+0x10/0x10
[ 26.278260] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.278323] ? calculate_sigpending+0x7b/0xa0
[ 26.278380] ? __pfx_kthread+0x10/0x10
[ 26.278442] ret_from_fork+0x41/0x80
[ 26.278491] ? __pfx_kthread+0x10/0x10
[ 26.278556] ret_from_fork_asm+0x1a/0x30
[ 26.278648] </TASK>
[ 26.278680]
[ 26.298396] Allocated by task 269:
[ 26.298874] kasan_save_stack+0x3d/0x60
[ 26.299466] kasan_save_track+0x18/0x40
[ 26.299968] kasan_save_alloc_info+0x3b/0x50
[ 26.300556] __kasan_kmalloc+0xb7/0xc0
[ 26.300908] __kmalloc_cache_noprof+0x184/0x410
[ 26.301509] kasan_bitops_generic+0x93/0x1c0
[ 26.301932] kunit_try_run_case+0x1b3/0x490
[ 26.302377] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.302984] kthread+0x324/0x6d0
[ 26.303521] ret_from_fork+0x41/0x80
[ 26.303990] ret_from_fork_asm+0x1a/0x30
[ 26.304530]
[ 26.304861] The buggy address belongs to the object at ffff8881027b6360
[ 26.304861] which belongs to the cache kmalloc-16 of size 16
[ 26.305550] The buggy address is located 8 bytes inside of
[ 26.305550] allocated 9-byte region [ffff8881027b6360, ffff8881027b6369)
[ 26.306781]
[ 26.306975] The buggy address belongs to the physical page:
[ 26.307313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b6
[ 26.308018] flags: 0x200000000000000(node=0|zone=2)
[ 26.308402] page_type: f5(slab)
[ 26.308758] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 26.309386] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[ 26.309909] page dumped because: kasan: bad access detected
[ 26.310398]
[ 26.310653] Memory state around the buggy address:
[ 26.311079] ffff8881027b6200: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[ 26.311811] ffff8881027b6280: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[ 26.312420] >ffff8881027b6300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 26.313044] ^
[ 26.313636] ffff8881027b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.313996] ffff8881027b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.314633] ==================================================================
---
[ 26.535287] ==================================================================
[ 26.536960] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[ 26.537960] Write of size 8 at addr ffff8881027b6368 by task kunit_try_catch/269
[ 26.538563]
[ 26.538820] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 26.539021] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.539089] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.539194] Call Trace:
[ 26.539239] <TASK>
[ 26.539308] dump_stack_lvl+0x73/0xb0
[ 26.539435] print_report+0xd1/0x640
[ 26.539521] ? __virt_addr_valid+0x1db/0x2d0
[ 26.539589] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.539717] kasan_report+0x102/0x140
[ 26.539756] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[ 26.539799] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[ 26.539845] kasan_check_range+0x10c/0x1c0
[ 26.539886] __kasan_check_write+0x18/0x20
[ 26.539918] kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[ 26.539956] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 26.539995] ? __kmalloc_cache_noprof+0x184/0x410
[ 26.540028] ? trace_hardirqs_on+0x37/0xe0
[ 26.540061] ? kasan_bitops_generic+0x93/0x1c0
[ 26.540110] kasan_bitops_generic+0x122/0x1c0
[ 26.540183] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 26.540220] ? __pfx_read_tsc+0x10/0x10
[ 26.540251] ? ktime_get_ts64+0x86/0x230
[ 26.540286] kunit_try_run_case+0x1b3/0x490
[ 26.540316] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.540344] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 26.540377] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.540410] ? __kthread_parkme+0x82/0x160
[ 26.540441] ? preempt_count_sub+0x50/0x80
[ 26.540476] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.540507] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.540543] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.540578] kthread+0x324/0x6d0
[ 26.540607] ? trace_preempt_on+0x20/0xc0
[ 26.540637] ? __pfx_kthread+0x10/0x10
[ 26.540668] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.540698] ? calculate_sigpending+0x7b/0xa0
[ 26.540728] ? __pfx_kthread+0x10/0x10
[ 26.540760] ret_from_fork+0x41/0x80
[ 26.540784] ? __pfx_kthread+0x10/0x10
[ 26.540815] ret_from_fork_asm+0x1a/0x30
[ 26.540861] </TASK>
[ 26.540876]
[ 26.555203] Allocated by task 269:
[ 26.555477] kasan_save_stack+0x3d/0x60
[ 26.555774] kasan_save_track+0x18/0x40
[ 26.556048] kasan_save_alloc_info+0x3b/0x50
[ 26.558691] __kasan_kmalloc+0xb7/0xc0
[ 26.559189] __kmalloc_cache_noprof+0x184/0x410
[ 26.559740] kasan_bitops_generic+0x93/0x1c0
[ 26.560309] kunit_try_run_case+0x1b3/0x490
[ 26.560774] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.561386] kthread+0x324/0x6d0
[ 26.561785] ret_from_fork+0x41/0x80
[ 26.562310] ret_from_fork_asm+0x1a/0x30
[ 26.562770]
[ 26.563008] The buggy address belongs to the object at ffff8881027b6360
[ 26.563008] which belongs to the cache kmalloc-16 of size 16
[ 26.564222] The buggy address is located 8 bytes inside of
[ 26.564222] allocated 9-byte region [ffff8881027b6360, ffff8881027b6369)
[ 26.565433]
[ 26.565714] The buggy address belongs to the physical page:
[ 26.566355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b6
[ 26.567175] flags: 0x200000000000000(node=0|zone=2)
[ 26.567729] page_type: f5(slab)
[ 26.568093] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 26.568773] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[ 26.569000] page dumped because: kasan: bad access detected
[ 26.569388]
[ 26.569627] Memory state around the buggy address:
[ 26.570197] ffff8881027b6200: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[ 26.570924] ffff8881027b6280: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[ 26.571664] >ffff8881027b6300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 26.572142] ^
[ 26.572813] ffff8881027b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.573402] ffff8881027b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.574193] ==================================================================
---
[ 26.394824] ==================================================================
[ 26.396105] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[ 26.400480] Write of size 8 at addr ffff8881027b6368 by task kunit_try_catch/269
[ 26.402506]
[ 26.402765] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 26.402841] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.402859] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.402892] Call Trace:
[ 26.402915] <TASK>
[ 26.402942] dump_stack_lvl+0x73/0xb0
[ 26.402993] print_report+0xd1/0x640
[ 26.403022] ? __virt_addr_valid+0x1db/0x2d0
[ 26.403055] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.403114] kasan_report+0x102/0x140
[ 26.403177] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[ 26.403248] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[ 26.403329] kasan_check_range+0x10c/0x1c0
[ 26.403387] __kasan_check_write+0x18/0x20
[ 26.403446] kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[ 26.403520] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 26.403609] ? __kmalloc_cache_noprof+0x184/0x410
[ 26.403704] ? trace_hardirqs_on+0x37/0xe0
[ 26.403768] ? kasan_bitops_generic+0x93/0x1c0
[ 26.403840] kasan_bitops_generic+0x122/0x1c0
[ 26.403912] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 26.403969] ? __pfx_read_tsc+0x10/0x10
[ 26.404015] ? ktime_get_ts64+0x86/0x230
[ 26.404054] kunit_try_run_case+0x1b3/0x490
[ 26.404090] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.404174] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 26.404216] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.404250] ? __kthread_parkme+0x82/0x160
[ 26.404280] ? preempt_count_sub+0x50/0x80
[ 26.404318] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.404349] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.404386] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.404422] kthread+0x324/0x6d0
[ 26.404449] ? trace_preempt_on+0x20/0xc0
[ 26.404483] ? __pfx_kthread+0x10/0x10
[ 26.404514] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.404545] ? calculate_sigpending+0x7b/0xa0
[ 26.404575] ? __pfx_kthread+0x10/0x10
[ 26.404606] ret_from_fork+0x41/0x80
[ 26.404632] ? __pfx_kthread+0x10/0x10
[ 26.404662] ret_from_fork_asm+0x1a/0x30
[ 26.404710] </TASK>
[ 26.404725]
[ 26.424947] Allocated by task 269:
[ 26.425782] kasan_save_stack+0x3d/0x60
[ 26.426386] kasan_save_track+0x18/0x40
[ 26.426882] kasan_save_alloc_info+0x3b/0x50
[ 26.427309] __kasan_kmalloc+0xb7/0xc0
[ 26.428099] __kmalloc_cache_noprof+0x184/0x410
[ 26.428381] kasan_bitops_generic+0x93/0x1c0
[ 26.428821] kunit_try_run_case+0x1b3/0x490
[ 26.429340] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.430336] kthread+0x324/0x6d0
[ 26.430748] ret_from_fork+0x41/0x80
[ 26.431086] ret_from_fork_asm+0x1a/0x30
[ 26.432006]
[ 26.432225] The buggy address belongs to the object at ffff8881027b6360
[ 26.432225] which belongs to the cache kmalloc-16 of size 16
[ 26.433514] The buggy address is located 8 bytes inside of
[ 26.433514] allocated 9-byte region [ffff8881027b6360, ffff8881027b6369)
[ 26.435091]
[ 26.435334] The buggy address belongs to the physical page:
[ 26.436328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b6
[ 26.436854] flags: 0x200000000000000(node=0|zone=2)
[ 26.437533] page_type: f5(slab)
[ 26.437955] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 26.439026] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[ 26.439949] page dumped because: kasan: bad access detected
[ 26.440705]
[ 26.440868] Memory state around the buggy address:
[ 26.441211] ffff8881027b6200: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[ 26.442071] ffff8881027b6280: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[ 26.442624] >ffff8881027b6300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 26.443081] ^
[ 26.444151] ffff8881027b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.445021] ffff8881027b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.445660] ==================================================================
---
[ 26.315981] ==================================================================
[ 26.316734] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[ 26.317439] Write of size 8 at addr ffff8881027b6368 by task kunit_try_catch/269
[ 26.317900]
[ 26.318080] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 26.318306] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.318346] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.318405] Call Trace:
[ 26.318451] <TASK>
[ 26.318497] dump_stack_lvl+0x73/0xb0
[ 26.318580] print_report+0xd1/0x640
[ 26.318641] ? __virt_addr_valid+0x1db/0x2d0
[ 26.318772] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.318855] kasan_report+0x102/0x140
[ 26.318973] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[ 26.319151] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[ 26.319268] kasan_check_range+0x10c/0x1c0
[ 26.319323] __kasan_check_write+0x18/0x20
[ 26.319374] kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[ 26.319441] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 26.319576] ? __kmalloc_cache_noprof+0x184/0x410
[ 26.319656] ? trace_hardirqs_on+0x37/0xe0
[ 26.319719] ? kasan_bitops_generic+0x93/0x1c0
[ 26.319788] kasan_bitops_generic+0x122/0x1c0
[ 26.319850] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 26.319929] ? __pfx_read_tsc+0x10/0x10
[ 26.319986] ? ktime_get_ts64+0x86/0x230
[ 26.320050] kunit_try_run_case+0x1b3/0x490
[ 26.320176] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.320243] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 26.320366] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.320452] ? __kthread_parkme+0x82/0x160
[ 26.320514] ? preempt_count_sub+0x50/0x80
[ 26.320579] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.320638] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.320775] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.320856] kthread+0x324/0x6d0
[ 26.320913] ? trace_preempt_on+0x20/0xc0
[ 26.320973] ? __pfx_kthread+0x10/0x10
[ 26.321028] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.321222] ? calculate_sigpending+0x7b/0xa0
[ 26.321289] ? __pfx_kthread+0x10/0x10
[ 26.321341] ret_from_fork+0x41/0x80
[ 26.321388] ? __pfx_kthread+0x10/0x10
[ 26.321444] ret_from_fork_asm+0x1a/0x30
[ 26.321594] </TASK>
[ 26.321637]
[ 26.336396] Allocated by task 269:
[ 26.336851] kasan_save_stack+0x3d/0x60
[ 26.337409] kasan_save_track+0x18/0x40
[ 26.337826] kasan_save_alloc_info+0x3b/0x50
[ 26.338280] __kasan_kmalloc+0xb7/0xc0
[ 26.338686] __kmalloc_cache_noprof+0x184/0x410
[ 26.339004] kasan_bitops_generic+0x93/0x1c0
[ 26.340553] kunit_try_run_case+0x1b3/0x490
[ 26.340999] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.341641] kthread+0x324/0x6d0
[ 26.344268] ret_from_fork+0x41/0x80
[ 26.344561] ret_from_fork_asm+0x1a/0x30
[ 26.345217]
[ 26.345505] The buggy address belongs to the object at ffff8881027b6360
[ 26.345505] which belongs to the cache kmalloc-16 of size 16
[ 26.346886] The buggy address is located 8 bytes inside of
[ 26.346886] allocated 9-byte region [ffff8881027b6360, ffff8881027b6369)
[ 26.347972]
[ 26.348620] The buggy address belongs to the physical page:
[ 26.349350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b6
[ 26.350045] flags: 0x200000000000000(node=0|zone=2)
[ 26.350590] page_type: f5(slab)
[ 26.350820] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 26.352265] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[ 26.352823] page dumped because: kasan: bad access detected
[ 26.353278]
[ 26.353489] Memory state around the buggy address:
[ 26.353833] ffff8881027b6200: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[ 26.354491] ffff8881027b6280: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[ 26.355129] >ffff8881027b6300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 26.355767] ^
[ 26.356185] ffff8881027b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.356855] ffff8881027b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.357449] ==================================================================
---
[ 26.359138] ==================================================================
[ 26.361023] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[ 26.361802] Write of size 8 at addr ffff8881027b6368 by task kunit_try_catch/269
[ 26.362358]
[ 26.362536] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 26.362659] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.362695] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.362752] Call Trace:
[ 26.362791] <TASK>
[ 26.362837] dump_stack_lvl+0x73/0xb0
[ 26.362917] print_report+0xd1/0x640
[ 26.362969] ? __virt_addr_valid+0x1db/0x2d0
[ 26.363024] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.363096] kasan_report+0x102/0x140
[ 26.363148] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[ 26.363248] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[ 26.363328] kasan_check_range+0x10c/0x1c0
[ 26.363394] __kasan_check_write+0x18/0x20
[ 26.363454] kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[ 26.363526] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 26.363592] ? __kmalloc_cache_noprof+0x184/0x410
[ 26.363655] ? trace_hardirqs_on+0x37/0xe0
[ 26.363709] ? kasan_bitops_generic+0x93/0x1c0
[ 26.363776] kasan_bitops_generic+0x122/0x1c0
[ 26.363835] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 26.363908] ? __pfx_read_tsc+0x10/0x10
[ 26.363963] ? ktime_get_ts64+0x86/0x230
[ 26.364029] kunit_try_run_case+0x1b3/0x490
[ 26.364087] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.364138] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 26.364469] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.364537] ? __kthread_parkme+0x82/0x160
[ 26.364589] ? preempt_count_sub+0x50/0x80
[ 26.364652] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.364712] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.364765] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.364802] kthread+0x324/0x6d0
[ 26.364832] ? trace_preempt_on+0x20/0xc0
[ 26.364864] ? __pfx_kthread+0x10/0x10
[ 26.364896] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.364927] ? calculate_sigpending+0x7b/0xa0
[ 26.364959] ? __pfx_kthread+0x10/0x10
[ 26.364991] ret_from_fork+0x41/0x80
[ 26.365019] ? __pfx_kthread+0x10/0x10
[ 26.365049] ret_from_fork_asm+0x1a/0x30
[ 26.365122] </TASK>
[ 26.365154]
[ 26.377971] Allocated by task 269:
[ 26.378384] kasan_save_stack+0x3d/0x60
[ 26.378835] kasan_save_track+0x18/0x40
[ 26.379306] kasan_save_alloc_info+0x3b/0x50
[ 26.379591] __kasan_kmalloc+0xb7/0xc0
[ 26.379910] __kmalloc_cache_noprof+0x184/0x410
[ 26.380216] kasan_bitops_generic+0x93/0x1c0
[ 26.380653] kunit_try_run_case+0x1b3/0x490
[ 26.381068] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.381749] kthread+0x324/0x6d0
[ 26.382105] ret_from_fork+0x41/0x80
[ 26.382537] ret_from_fork_asm+0x1a/0x30
[ 26.382865]
[ 26.383025] The buggy address belongs to the object at ffff8881027b6360
[ 26.383025] which belongs to the cache kmalloc-16 of size 16
[ 26.383591] The buggy address is located 8 bytes inside of
[ 26.383591] allocated 9-byte region [ffff8881027b6360, ffff8881027b6369)
[ 26.384659]
[ 26.384885] The buggy address belongs to the physical page:
[ 26.385524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b6
[ 26.386042] flags: 0x200000000000000(node=0|zone=2)
[ 26.386358] page_type: f5(slab)
[ 26.386586] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 26.387030] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[ 26.387675] page dumped because: kasan: bad access detected
[ 26.388149]
[ 26.388376] Memory state around the buggy address:
[ 26.388849] ffff8881027b6200: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[ 26.389765] ffff8881027b6280: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[ 26.390555] >ffff8881027b6300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 26.391003] ^
[ 26.391738] ffff8881027b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.392174] ffff8881027b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.392690] ==================================================================
---
[ 26.495758] ==================================================================
[ 26.497220] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[ 26.497842] Write of size 8 at addr ffff8881027b6368 by task kunit_try_catch/269
[ 26.498418]
[ 26.498709] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 26.498818] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.498853] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.498911] Call Trace:
[ 26.498952] <TASK>
[ 26.499015] dump_stack_lvl+0x73/0xb0
[ 26.499185] print_report+0xd1/0x640
[ 26.499253] ? __virt_addr_valid+0x1db/0x2d0
[ 26.499318] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.499407] kasan_report+0x102/0x140
[ 26.499490] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[ 26.499569] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[ 26.499682] kasan_check_range+0x10c/0x1c0
[ 26.499721] __kasan_check_write+0x18/0x20
[ 26.499752] kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[ 26.499814] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 26.499894] ? __kmalloc_cache_noprof+0x184/0x410
[ 26.499959] ? trace_hardirqs_on+0x37/0xe0
[ 26.500039] ? kasan_bitops_generic+0x93/0x1c0
[ 26.500196] kasan_bitops_generic+0x122/0x1c0
[ 26.500262] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 26.500325] ? __pfx_read_tsc+0x10/0x10
[ 26.500379] ? ktime_get_ts64+0x86/0x230
[ 26.500459] kunit_try_run_case+0x1b3/0x490
[ 26.500552] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.500612] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 26.500671] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.500725] ? __kthread_parkme+0x82/0x160
[ 26.500766] ? preempt_count_sub+0x50/0x80
[ 26.500806] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.500837] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.500874] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.500910] kthread+0x324/0x6d0
[ 26.500938] ? trace_preempt_on+0x20/0xc0
[ 26.500972] ? __pfx_kthread+0x10/0x10
[ 26.501003] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.501034] ? calculate_sigpending+0x7b/0xa0
[ 26.501064] ? __pfx_kthread+0x10/0x10
[ 26.501117] ret_from_fork+0x41/0x80
[ 26.501150] ? __pfx_kthread+0x10/0x10
[ 26.501203] ret_from_fork_asm+0x1a/0x30
[ 26.501252] </TASK>
[ 26.501269]
[ 26.517610] Allocated by task 269:
[ 26.518042] kasan_save_stack+0x3d/0x60
[ 26.518591] kasan_save_track+0x18/0x40
[ 26.519039] kasan_save_alloc_info+0x3b/0x50
[ 26.519569] __kasan_kmalloc+0xb7/0xc0
[ 26.520007] __kmalloc_cache_noprof+0x184/0x410
[ 26.520566] kasan_bitops_generic+0x93/0x1c0
[ 26.521038] kunit_try_run_case+0x1b3/0x490
[ 26.521558] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.522035] kthread+0x324/0x6d0
[ 26.522494] ret_from_fork+0x41/0x80
[ 26.522906] ret_from_fork_asm+0x1a/0x30
[ 26.523431]
[ 26.523668] The buggy address belongs to the object at ffff8881027b6360
[ 26.523668] which belongs to the cache kmalloc-16 of size 16
[ 26.524552] The buggy address is located 8 bytes inside of
[ 26.524552] allocated 9-byte region [ffff8881027b6360, ffff8881027b6369)
[ 26.525347]
[ 26.525553] The buggy address belongs to the physical page:
[ 26.525847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b6
[ 26.526588] flags: 0x200000000000000(node=0|zone=2)
[ 26.526997] page_type: f5(slab)
[ 26.527349] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 26.527741] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[ 26.528418] page dumped because: kasan: bad access detected
[ 26.528919]
[ 26.529209] Memory state around the buggy address:
[ 26.529551] ffff8881027b6200: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[ 26.529988] ffff8881027b6280: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[ 26.530636] >ffff8881027b6300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 26.531253] ^
[ 26.531713] ffff8881027b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.532276] ffff8881027b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.532866] ==================================================================
---
[ 26.447579] ==================================================================
[ 26.448509] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[ 26.449581] Write of size 8 at addr ffff8881027b6368 by task kunit_try_catch/269
[ 26.450443]
[ 26.450618] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 26.450685] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.450703] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.450737] Call Trace:
[ 26.450760] <TASK>
[ 26.450787] dump_stack_lvl+0x73/0xb0
[ 26.450836] print_report+0xd1/0x640
[ 26.450868] ? __virt_addr_valid+0x1db/0x2d0
[ 26.450902] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.450941] kasan_report+0x102/0x140
[ 26.450967] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[ 26.451006] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[ 26.451051] kasan_check_range+0x10c/0x1c0
[ 26.451082] __kasan_check_write+0x18/0x20
[ 26.451188] kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[ 26.451271] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 26.451344] ? __kmalloc_cache_noprof+0x184/0x410
[ 26.451407] ? trace_hardirqs_on+0x37/0xe0
[ 26.451456] ? kasan_bitops_generic+0x93/0x1c0
[ 26.451497] kasan_bitops_generic+0x122/0x1c0
[ 26.451529] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 26.451563] ? __pfx_read_tsc+0x10/0x10
[ 26.451609] ? ktime_get_ts64+0x86/0x230
[ 26.451691] kunit_try_run_case+0x1b3/0x490
[ 26.451755] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.451811] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 26.451869] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.451945] ? __kthread_parkme+0x82/0x160
[ 26.452009] ? preempt_count_sub+0x50/0x80
[ 26.452077] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.452152] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.452213] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.452250] kthread+0x324/0x6d0
[ 26.452281] ? trace_preempt_on+0x20/0xc0
[ 26.452312] ? __pfx_kthread+0x10/0x10
[ 26.452344] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.452377] ? calculate_sigpending+0x7b/0xa0
[ 26.452407] ? __pfx_kthread+0x10/0x10
[ 26.452438] ret_from_fork+0x41/0x80
[ 26.452464] ? __pfx_kthread+0x10/0x10
[ 26.452494] ret_from_fork_asm+0x1a/0x30
[ 26.452544] </TASK>
[ 26.452561]
[ 26.476365] Allocated by task 269:
[ 26.476812] kasan_save_stack+0x3d/0x60
[ 26.477511] kasan_save_track+0x18/0x40
[ 26.478069] kasan_save_alloc_info+0x3b/0x50
[ 26.478720] __kasan_kmalloc+0xb7/0xc0
[ 26.479238] __kmalloc_cache_noprof+0x184/0x410
[ 26.479732] kasan_bitops_generic+0x93/0x1c0
[ 26.480358] kunit_try_run_case+0x1b3/0x490
[ 26.480626] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.481230] kthread+0x324/0x6d0
[ 26.481564] ret_from_fork+0x41/0x80
[ 26.481895] ret_from_fork_asm+0x1a/0x30
[ 26.482355]
[ 26.482514] The buggy address belongs to the object at ffff8881027b6360
[ 26.482514] which belongs to the cache kmalloc-16 of size 16
[ 26.483729] The buggy address is located 8 bytes inside of
[ 26.483729] allocated 9-byte region [ffff8881027b6360, ffff8881027b6369)
[ 26.484653]
[ 26.484994] The buggy address belongs to the physical page:
[ 26.485958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b6
[ 26.486876] flags: 0x200000000000000(node=0|zone=2)
[ 26.487493] page_type: f5(slab)
[ 26.487959] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 26.488723] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[ 26.489692] page dumped because: kasan: bad access detected
[ 26.489969]
[ 26.490236] Memory state around the buggy address:
[ 26.490699] ffff8881027b6200: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[ 26.491224] ffff8881027b6280: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[ 26.491850] >ffff8881027b6300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 26.492527] ^
[ 26.492870] ffff8881027b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.493392] ffff8881027b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.494046] ==================================================================
[ 26.616042] ==================================================================
[ 26.618533] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[ 26.619381] Read of size 8 at addr ffff8881027b6368 by task kunit_try_catch/269
[ 26.620682]
[ 26.620910] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 26.620980] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.620998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.621032] Call Trace:
[ 26.621055] <TASK>
[ 26.621081] dump_stack_lvl+0x73/0xb0
[ 26.621174] print_report+0xd1/0x640
[ 26.621208] ? __virt_addr_valid+0x1db/0x2d0
[ 26.621242] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.621280] kasan_report+0x102/0x140
[ 26.621306] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[ 26.621349] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[ 26.621392] __asan_report_load8_noabort+0x18/0x20
[ 26.621424] kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[ 26.621459] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 26.621497] ? __kmalloc_cache_noprof+0x184/0x410
[ 26.621529] ? trace_hardirqs_on+0x37/0xe0
[ 26.621559] ? kasan_bitops_generic+0x93/0x1c0
[ 26.621596] kasan_bitops_generic+0x122/0x1c0
[ 26.621626] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 26.621659] ? __pfx_read_tsc+0x10/0x10
[ 26.621687] ? ktime_get_ts64+0x86/0x230
[ 26.621722] kunit_try_run_case+0x1b3/0x490
[ 26.621751] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.621779] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 26.621814] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.621846] ? __kthread_parkme+0x82/0x160
[ 26.621876] ? preempt_count_sub+0x50/0x80
[ 26.621911] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.621940] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.621976] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.622011] kthread+0x324/0x6d0
[ 26.622039] ? trace_preempt_on+0x20/0xc0
[ 26.622069] ? __pfx_kthread+0x10/0x10
[ 26.622112] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.622186] ? calculate_sigpending+0x7b/0xa0
[ 26.622245] ? __pfx_kthread+0x10/0x10
[ 26.622301] ret_from_fork+0x41/0x80
[ 26.622349] ? __pfx_kthread+0x10/0x10
[ 26.622409] ret_from_fork_asm+0x1a/0x30
[ 26.622492] </TASK>
[ 26.622544]
[ 26.638734] Allocated by task 269:
[ 26.639009] kasan_save_stack+0x3d/0x60
[ 26.639374] kasan_save_track+0x18/0x40
[ 26.639690] kasan_save_alloc_info+0x3b/0x50
[ 26.640258] __kasan_kmalloc+0xb7/0xc0
[ 26.640662] __kmalloc_cache_noprof+0x184/0x410
[ 26.641151] kasan_bitops_generic+0x93/0x1c0
[ 26.641645] kunit_try_run_case+0x1b3/0x490
[ 26.642072] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.642685] kthread+0x324/0x6d0
[ 26.643050] ret_from_fork+0x41/0x80
[ 26.643479] ret_from_fork_asm+0x1a/0x30
[ 26.643746]
[ 26.643912] The buggy address belongs to the object at ffff8881027b6360
[ 26.643912] which belongs to the cache kmalloc-16 of size 16
[ 26.644858] The buggy address is located 8 bytes inside of
[ 26.644858] allocated 9-byte region [ffff8881027b6360, ffff8881027b6369)
[ 26.645936]
[ 26.646252] The buggy address belongs to the physical page:
[ 26.646696] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b6
[ 26.647382] flags: 0x200000000000000(node=0|zone=2)
[ 26.647679] page_type: f5(slab)
[ 26.648039] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 26.648780] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[ 26.649244] page dumped because: kasan: bad access detected
[ 26.649538]
[ 26.649729] Memory state around the buggy address:
[ 26.650286] ffff8881027b6200: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[ 26.650908] ffff8881027b6280: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[ 26.651571] >ffff8881027b6300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 26.654037] ^
[ 26.654926] ffff8881027b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.655624] ffff8881027b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.656666] ==================================================================
[ 26.575862] ==================================================================
[ 26.576622] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[ 26.577249] Read of size 8 at addr ffff8881027b6368 by task kunit_try_catch/269
[ 26.577893]
[ 26.578240] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 26.578393] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 26.578452] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 26.578513] Call Trace:
[ 26.578553] <TASK>
[ 26.578603] dump_stack_lvl+0x73/0xb0
[ 26.578686] print_report+0xd1/0x640
[ 26.578744] ? __virt_addr_valid+0x1db/0x2d0
[ 26.578802] ? kasan_complete_mode_report_info+0x2a/0x200
[ 26.578870] kasan_report+0x102/0x140
[ 26.578923] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[ 26.579055] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[ 26.579293] kasan_check_range+0x10c/0x1c0
[ 26.579370] __kasan_check_read+0x15/0x20
[ 26.579433] kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[ 26.579507] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[ 26.579574] ? __kmalloc_cache_noprof+0x184/0x410
[ 26.579652] ? trace_hardirqs_on+0x37/0xe0
[ 26.579687] ? kasan_bitops_generic+0x93/0x1c0
[ 26.579725] kasan_bitops_generic+0x122/0x1c0
[ 26.579755] ? __pfx_kasan_bitops_generic+0x10/0x10
[ 26.579790] ? __pfx_read_tsc+0x10/0x10
[ 26.579820] ? ktime_get_ts64+0x86/0x230
[ 26.579854] kunit_try_run_case+0x1b3/0x490
[ 26.579894] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.579923] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 26.579957] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 26.579989] ? __kthread_parkme+0x82/0x160
[ 26.580020] ? preempt_count_sub+0x50/0x80
[ 26.580057] ? __pfx_kunit_try_run_case+0x10/0x10
[ 26.580102] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.580186] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 26.580224] kthread+0x324/0x6d0
[ 26.580254] ? trace_preempt_on+0x20/0xc0
[ 26.580284] ? __pfx_kthread+0x10/0x10
[ 26.580315] ? _raw_spin_unlock_irq+0x47/0x80
[ 26.580346] ? calculate_sigpending+0x7b/0xa0
[ 26.580375] ? __pfx_kthread+0x10/0x10
[ 26.580406] ret_from_fork+0x41/0x80
[ 26.580432] ? __pfx_kthread+0x10/0x10
[ 26.580462] ret_from_fork_asm+0x1a/0x30
[ 26.580509] </TASK>
[ 26.580526]
[ 26.596983] Allocated by task 269:
[ 26.597521] kasan_save_stack+0x3d/0x60
[ 26.597969] kasan_save_track+0x18/0x40
[ 26.598360] kasan_save_alloc_info+0x3b/0x50
[ 26.598640] __kasan_kmalloc+0xb7/0xc0
[ 26.599003] __kmalloc_cache_noprof+0x184/0x410
[ 26.599483] kasan_bitops_generic+0x93/0x1c0
[ 26.599894] kunit_try_run_case+0x1b3/0x490
[ 26.600464] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 26.600816] kthread+0x324/0x6d0
[ 26.601056] ret_from_fork+0x41/0x80
[ 26.601568] ret_from_fork_asm+0x1a/0x30
[ 26.601991]
[ 26.602322] The buggy address belongs to the object at ffff8881027b6360
[ 26.602322] which belongs to the cache kmalloc-16 of size 16
[ 26.603406] The buggy address is located 8 bytes inside of
[ 26.603406] allocated 9-byte region [ffff8881027b6360, ffff8881027b6369)
[ 26.603968]
[ 26.604182] The buggy address belongs to the physical page:
[ 26.604685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b6
[ 26.605517] flags: 0x200000000000000(node=0|zone=2)
[ 26.606183] page_type: f5(slab)
[ 26.606545] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 26.607398] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[ 26.608075] page dumped because: kasan: bad access detected
[ 26.608433]
[ 26.608583] Memory state around the buggy address:
[ 26.608850] ffff8881027b6200: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[ 26.609325] ffff8881027b6280: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[ 26.609963] >ffff8881027b6300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[ 26.610658] ^
[ 26.611446] ffff8881027b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.612697] ffff8881027b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 26.613353] ==================================================================
[ 21.601000] ==================================================================
[ 21.602132] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x318/0x370
[ 21.603337] Write of size 1 at addr ffff888101fedf00 by task kunit_try_catch/152
[ 21.603863]
[ 21.604056] CPU: 1 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 21.604393] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 21.604435] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 21.604524] Call Trace:
[ 21.604561] <TASK>
[ 21.604607] dump_stack_lvl+0x73/0xb0
[ 21.604696] print_report+0xd1/0x640
[ 21.604746] ? __virt_addr_valid+0x1db/0x2d0
[ 21.604799] ? kasan_complete_mode_report_info+0x2a/0x200
[ 21.604866] kasan_report+0x102/0x140
[ 21.604914] ? kmalloc_big_oob_right+0x318/0x370
[ 21.604972] ? kmalloc_big_oob_right+0x318/0x370
[ 21.605038] __asan_report_store1_noabort+0x1b/0x30
[ 21.605142] kmalloc_big_oob_right+0x318/0x370
[ 21.605231] ? __pfx_kmalloc_big_oob_right+0x10/0x10
[ 21.605293] ? __schedule+0xcdc/0x2830
[ 21.605347] ? __pfx_read_tsc+0x10/0x10
[ 21.605397] ? ktime_get_ts64+0x86/0x230
[ 21.605458] kunit_try_run_case+0x1b3/0x490
[ 21.605519] ? __pfx_kunit_try_run_case+0x10/0x10
[ 21.605572] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 21.605627] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 21.605677] ? __kthread_parkme+0x82/0x160
[ 21.605717] ? preempt_count_sub+0x50/0x80
[ 21.605753] ? __pfx_kunit_try_run_case+0x10/0x10
[ 21.605784] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 21.605820] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 21.605854] kthread+0x324/0x6d0
[ 21.605882] ? trace_preempt_on+0x20/0xc0
[ 21.605913] ? __pfx_kthread+0x10/0x10
[ 21.605942] ? _raw_spin_unlock_irq+0x47/0x80
[ 21.605972] ? calculate_sigpending+0x7b/0xa0
[ 21.606001] ? __pfx_kthread+0x10/0x10
[ 21.606031] ret_from_fork+0x41/0x80
[ 21.606056] ? __pfx_kthread+0x10/0x10
[ 21.606085] ret_from_fork_asm+0x1a/0x30
[ 21.606197] </TASK>
[ 21.606223]
[ 21.618687] Allocated by task 152:
[ 21.619246] kasan_save_stack+0x3d/0x60
[ 21.619647] kasan_save_track+0x18/0x40
[ 21.620200] kasan_save_alloc_info+0x3b/0x50
[ 21.620581] __kasan_kmalloc+0xb7/0xc0
[ 21.620926] __kmalloc_cache_noprof+0x184/0x410
[ 21.621381] kmalloc_big_oob_right+0xaa/0x370
[ 21.621901] kunit_try_run_case+0x1b3/0x490
[ 21.622405] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 21.622926] kthread+0x324/0x6d0
[ 21.623351] ret_from_fork+0x41/0x80
[ 21.623738] ret_from_fork_asm+0x1a/0x30
[ 21.624231]
[ 21.624460] The buggy address belongs to the object at ffff888101fec000
[ 21.624460] which belongs to the cache kmalloc-8k of size 8192
[ 21.625408] The buggy address is located 0 bytes to the right of
[ 21.625408] allocated 7936-byte region [ffff888101fec000, ffff888101fedf00)
[ 21.626421]
[ 21.626780] The buggy address belongs to the physical page:
[ 21.627515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101fe8
[ 21.628391] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 21.628775] flags: 0x200000000000040(head|node=0|zone=2)
[ 21.629110] page_type: f5(slab)
[ 21.629491] raw: 0200000000000040 ffff888100042280 dead000000000122 0000000000000000
[ 21.630297] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[ 21.631614] head: 0200000000000040 ffff888100042280 dead000000000122 0000000000000000
[ 21.633908] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[ 21.636607] head: 0200000000000003 ffffea000407fa01 ffffffffffffffff 0000000000000000
[ 21.638002] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[ 21.639324] page dumped because: kasan: bad access detected
[ 21.640969]
[ 21.641870] Memory state around the buggy address:
[ 21.642619] ffff888101fede00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 21.643921] ffff888101fede80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 21.644999] >ffff888101fedf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 21.646311] ^
[ 21.647035] ffff888101fedf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 21.648079] ffff888101fee000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 21.649481] ==================================================================
[ 21.656694] ==================================================================
[ 21.657472] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x2eb/0x340
[ 21.658599] Write of size 1 at addr ffff88810232600a by task kunit_try_catch/154
[ 21.660368]
[ 21.660968] CPU: 0 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 21.661073] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 21.661105] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 21.661154] Call Trace:
[ 21.661206] <TASK>
[ 21.661251] dump_stack_lvl+0x73/0xb0
[ 21.661348] print_report+0xd1/0x640
[ 21.661403] ? __virt_addr_valid+0x1db/0x2d0
[ 21.661459] ? kasan_addr_to_slab+0x11/0xa0
[ 21.661517] kasan_report+0x102/0x140
[ 21.661555] ? kmalloc_large_oob_right+0x2eb/0x340
[ 21.661592] ? kmalloc_large_oob_right+0x2eb/0x340
[ 21.661632] __asan_report_store1_noabort+0x1b/0x30
[ 21.661663] kmalloc_large_oob_right+0x2eb/0x340
[ 21.661695] ? __pfx_kmalloc_large_oob_right+0x10/0x10
[ 21.661732] ? __pfx_kmalloc_large_oob_right+0x10/0x10
[ 21.661771] kunit_try_run_case+0x1b3/0x490
[ 21.661802] ? __pfx_kunit_try_run_case+0x10/0x10
[ 21.661829] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 21.661862] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 21.661893] ? __kthread_parkme+0x82/0x160
[ 21.661923] ? preempt_count_sub+0x50/0x80
[ 21.661957] ? __pfx_kunit_try_run_case+0x10/0x10
[ 21.661986] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 21.662019] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 21.662052] kthread+0x324/0x6d0
[ 21.662079] ? trace_preempt_on+0x20/0xc0
[ 21.662218] ? __pfx_kthread+0x10/0x10
[ 21.662303] ? _raw_spin_unlock_irq+0x47/0x80
[ 21.662365] ? calculate_sigpending+0x7b/0xa0
[ 21.662425] ? __pfx_kthread+0x10/0x10
[ 21.662483] ret_from_fork+0x41/0x80
[ 21.662536] ? __pfx_kthread+0x10/0x10
[ 21.662593] ret_from_fork_asm+0x1a/0x30
[ 21.662674] </TASK>
[ 21.662714]
[ 21.678933] The buggy address belongs to the physical page:
[ 21.679729] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102324
[ 21.680464] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 21.680984] flags: 0x200000000000040(head|node=0|zone=2)
[ 21.682405] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 21.683419] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 21.684007] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 21.685198] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 21.685902] head: 0200000000000002 ffffea000408c901 ffffffffffffffff 0000000000000000
[ 21.686701] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[ 21.687193] page dumped because: kasan: bad access detected
[ 21.687601]
[ 21.687948] Memory state around the buggy address:
[ 21.688788] ffff888102325f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 21.690276] ffff888102325f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 21.691090] >ffff888102326000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 21.692063] ^
[ 21.692364] ffff888102326080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 21.692971] ffff888102326100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 21.694462] ==================================================================
[ 21.445743] ==================================================================
[ 21.446637] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x36b/0x3d0
[ 21.447834] Read of size 1 at addr ffff888102c39000 by task kunit_try_catch/148
[ 21.448500]
[ 21.448705] CPU: 0 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 21.448815] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 21.448846] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 21.448906] Call Trace:
[ 21.448936] <TASK>
[ 21.448976] dump_stack_lvl+0x73/0xb0
[ 21.449060] print_report+0xd1/0x640
[ 21.449115] ? __virt_addr_valid+0x1db/0x2d0
[ 21.449284] ? kasan_complete_mode_report_info+0x2a/0x200
[ 21.449361] kasan_report+0x102/0x140
[ 21.449405] ? kmalloc_node_oob_right+0x36b/0x3d0
[ 21.449456] ? kmalloc_node_oob_right+0x36b/0x3d0
[ 21.449597] __asan_report_load1_noabort+0x18/0x20
[ 21.449704] kmalloc_node_oob_right+0x36b/0x3d0
[ 21.449817] ? __pfx_kmalloc_node_oob_right+0x10/0x10
[ 21.449892] ? __pfx_kmalloc_node_oob_right+0x10/0x10
[ 21.449963] kunit_try_run_case+0x1b3/0x490
[ 21.450026] ? __pfx_kunit_try_run_case+0x10/0x10
[ 21.450080] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 21.450145] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 21.450228] ? __kthread_parkme+0x82/0x160
[ 21.450287] ? preempt_count_sub+0x50/0x80
[ 21.450353] ? __pfx_kunit_try_run_case+0x10/0x10
[ 21.450406] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 21.450466] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 21.450519] kthread+0x324/0x6d0
[ 21.450550] ? trace_preempt_on+0x20/0xc0
[ 21.450586] ? __pfx_kthread+0x10/0x10
[ 21.450615] ? _raw_spin_unlock_irq+0x47/0x80
[ 21.450647] ? calculate_sigpending+0x7b/0xa0
[ 21.450677] ? __pfx_kthread+0x10/0x10
[ 21.450706] ret_from_fork+0x41/0x80
[ 21.450732] ? __pfx_kthread+0x10/0x10
[ 21.450761] ret_from_fork_asm+0x1a/0x30
[ 21.450805] </TASK>
[ 21.450822]
[ 21.468815] Allocated by task 148:
[ 21.469151] kasan_save_stack+0x3d/0x60
[ 21.469972] kasan_save_track+0x18/0x40
[ 21.470687] kasan_save_alloc_info+0x3b/0x50
[ 21.471072] __kasan_kmalloc+0xb7/0xc0
[ 21.472024] __kmalloc_cache_node_noprof+0x183/0x420
[ 21.472391] kmalloc_node_oob_right+0xac/0x3d0
[ 21.473084] kunit_try_run_case+0x1b3/0x490
[ 21.473449] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 21.473973] kthread+0x324/0x6d0
[ 21.474418] ret_from_fork+0x41/0x80
[ 21.475264] ret_from_fork_asm+0x1a/0x30
[ 21.475671]
[ 21.475903] The buggy address belongs to the object at ffff888102c38000
[ 21.475903] which belongs to the cache kmalloc-4k of size 4096
[ 21.476765] The buggy address is located 0 bytes to the right of
[ 21.476765] allocated 4096-byte region [ffff888102c38000, ffff888102c39000)
[ 21.477888]
[ 21.478116] The buggy address belongs to the physical page:
[ 21.479620] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c38
[ 21.480998] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 21.481556] flags: 0x200000000000040(head|node=0|zone=2)
[ 21.482512] page_type: f5(slab)
[ 21.482757] raw: 0200000000000040 ffff888100042140 dead000000000122 0000000000000000
[ 21.483482] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[ 21.484013] head: 0200000000000040 ffff888100042140 dead000000000122 0000000000000000
[ 21.484710] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[ 21.485882] head: 0200000000000003 ffffea00040b0e01 ffffffffffffffff 0000000000000000
[ 21.486771] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[ 21.487326] page dumped because: kasan: bad access detected
[ 21.487695]
[ 21.487918] Memory state around the buggy address:
[ 21.489017] ffff888102c38f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 21.489833] ffff888102c38f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 21.490537] >ffff888102c39000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 21.492033] ^
[ 21.492520] ffff888102c39080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 21.492738] ffff888102c39100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 21.492940] ==================================================================
[ 22.747639] ==================================================================
[ 22.748789] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x160/0x320
[ 22.749702] Write of size 128 at addr ffff888102a4ef00 by task kunit_try_catch/178
[ 22.751010]
[ 22.751519] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 22.751607] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 22.751626] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 22.751659] Call Trace:
[ 22.751677] <TASK>
[ 22.751703] dump_stack_lvl+0x73/0xb0
[ 22.751755] print_report+0xd1/0x640
[ 22.751784] ? __virt_addr_valid+0x1db/0x2d0
[ 22.751817] ? kasan_complete_mode_report_info+0x2a/0x200
[ 22.751853] kasan_report+0x102/0x140
[ 22.751886] ? kmalloc_oob_in_memset+0x160/0x320
[ 22.751918] ? kmalloc_oob_in_memset+0x160/0x320
[ 22.751953] kasan_check_range+0x10c/0x1c0
[ 22.751982] __asan_memset+0x27/0x50
[ 22.752011] kmalloc_oob_in_memset+0x160/0x320
[ 22.752039] ? __pfx_kmalloc_oob_in_memset+0x10/0x10
[ 22.752068] ? __schedule+0xcdc/0x2830
[ 22.752109] ? __pfx_read_tsc+0x10/0x10
[ 22.752297] ? ktime_get_ts64+0x86/0x230
[ 22.752373] kunit_try_run_case+0x1b3/0x490
[ 22.752437] ? __pfx_kunit_try_run_case+0x10/0x10
[ 22.752487] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 22.752546] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 22.752596] ? __kthread_parkme+0x82/0x160
[ 22.752641] ? preempt_count_sub+0x50/0x80
[ 22.752690] ? __pfx_kunit_try_run_case+0x10/0x10
[ 22.752721] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 22.752758] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 22.752793] kthread+0x324/0x6d0
[ 22.752821] ? trace_preempt_on+0x20/0xc0
[ 22.752854] ? __pfx_kthread+0x10/0x10
[ 22.752883] ? _raw_spin_unlock_irq+0x47/0x80
[ 22.752913] ? calculate_sigpending+0x7b/0xa0
[ 22.752943] ? __pfx_kthread+0x10/0x10
[ 22.752972] ret_from_fork+0x41/0x80
[ 22.752997] ? __pfx_kthread+0x10/0x10
[ 22.753026] ret_from_fork_asm+0x1a/0x30
[ 22.753070] </TASK>
[ 22.753087]
[ 22.772146] Allocated by task 178:
[ 22.772736] kasan_save_stack+0x3d/0x60
[ 22.773380] kasan_save_track+0x18/0x40
[ 22.773893] kasan_save_alloc_info+0x3b/0x50
[ 22.774604] __kasan_kmalloc+0xb7/0xc0
[ 22.775119] __kmalloc_cache_noprof+0x184/0x410
[ 22.775752] kmalloc_oob_in_memset+0xad/0x320
[ 22.776406] kunit_try_run_case+0x1b3/0x490
[ 22.776942] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 22.777622] kthread+0x324/0x6d0
[ 22.778903] ret_from_fork+0x41/0x80
[ 22.779238] ret_from_fork_asm+0x1a/0x30
[ 22.779620]
[ 22.780107] The buggy address belongs to the object at ffff888102a4ef00
[ 22.780107] which belongs to the cache kmalloc-128 of size 128
[ 22.781699] The buggy address is located 0 bytes inside of
[ 22.781699] allocated 120-byte region [ffff888102a4ef00, ffff888102a4ef78)
[ 22.782932]
[ 22.783788] The buggy address belongs to the physical page:
[ 22.784139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a4e
[ 22.785006] flags: 0x200000000000000(node=0|zone=2)
[ 22.786183] page_type: f5(slab)
[ 22.786725] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[ 22.788119] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 22.788850] page dumped because: kasan: bad access detected
[ 22.789399]
[ 22.790263] Memory state around the buggy address:
[ 22.790716] ffff888102a4ee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 22.791380] ffff888102a4ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 22.792388] >ffff888102a4ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 22.793124] ^
[ 22.794054] ffff888102a4ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 22.794983] ffff888102a4f000: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
[ 22.795426] ==================================================================
[ 21.388654] ==================================================================
[ 21.389148] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x363/0x3c0
[ 21.390225] Read of size 1 at addr ffff8881027b62df by task kunit_try_catch/146
[ 21.391303]
[ 21.391559] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 21.391668] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 21.391699] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 21.391752] Call Trace:
[ 21.391782] <TASK>
[ 21.391823] dump_stack_lvl+0x73/0xb0
[ 21.391926] print_report+0xd1/0x640
[ 21.391982] ? __virt_addr_valid+0x1db/0x2d0
[ 21.392040] ? kasan_complete_mode_report_info+0x2a/0x200
[ 21.392104] kasan_report+0x102/0x140
[ 21.392155] ? kmalloc_oob_left+0x363/0x3c0
[ 21.392229] ? kmalloc_oob_left+0x363/0x3c0
[ 21.392288] __asan_report_load1_noabort+0x18/0x20
[ 21.392347] kmalloc_oob_left+0x363/0x3c0
[ 21.392398] ? __pfx_kmalloc_oob_left+0x10/0x10
[ 21.392450] ? __schedule+0xcdc/0x2830
[ 21.392513] ? __pfx_read_tsc+0x10/0x10
[ 21.392605] ? ktime_get_ts64+0x86/0x230
[ 21.392675] kunit_try_run_case+0x1b3/0x490
[ 21.392712] ? __pfx_kunit_try_run_case+0x10/0x10
[ 21.392740] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 21.392774] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 21.392807] ? __kthread_parkme+0x82/0x160
[ 21.392837] ? preempt_count_sub+0x50/0x80
[ 21.392871] ? __pfx_kunit_try_run_case+0x10/0x10
[ 21.392900] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 21.392935] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 21.392969] kthread+0x324/0x6d0
[ 21.392997] ? trace_preempt_on+0x20/0xc0
[ 21.393028] ? __pfx_kthread+0x10/0x10
[ 21.393057] ? _raw_spin_unlock_irq+0x47/0x80
[ 21.393086] ? calculate_sigpending+0x7b/0xa0
[ 21.393147] ? __pfx_kthread+0x10/0x10
[ 21.393202] ret_from_fork+0x41/0x80
[ 21.393228] ? __pfx_kthread+0x10/0x10
[ 21.393266] ret_from_fork_asm+0x1a/0x30
[ 21.393364] </TASK>
[ 21.393386]
[ 21.411794] Allocated by task 1:
[ 21.412395] kasan_save_stack+0x3d/0x60
[ 21.413067] kasan_save_track+0x18/0x40
[ 21.413872] kasan_save_alloc_info+0x3b/0x50
[ 21.414589] __kasan_kmalloc+0xb7/0xc0
[ 21.415241] __kmalloc_node_track_caller_noprof+0x1c6/0x500
[ 21.415952] kvasprintf+0xc6/0x150
[ 21.416365] __kthread_create_on_node+0x18c/0x3a0
[ 21.417266] kthread_create_on_node+0xa8/0xe0
[ 21.417665] create_worker+0x3c8/0x7a0
[ 21.418018] alloc_unbound_pwq+0x8ea/0xdb0
[ 21.419017] apply_wqattrs_prepare+0x332/0xd40
[ 21.419428] apply_workqueue_attrs_locked+0x4d/0xa0
[ 21.419681] alloc_workqueue+0xcc4/0x1ad0
[ 21.420008] latency_fsnotify_init+0x1b/0x50
[ 21.420507] do_one_initcall+0xb5/0x370
[ 21.421675] kernel_init_freeable+0x425/0x6f0
[ 21.422142] kernel_init+0x23/0x1e0
[ 21.422639] ret_from_fork+0x41/0x80
[ 21.423365] ret_from_fork_asm+0x1a/0x30
[ 21.424092]
[ 21.424380] The buggy address belongs to the object at ffff8881027b62c0
[ 21.424380] which belongs to the cache kmalloc-16 of size 16
[ 21.426410] The buggy address is located 18 bytes to the right of
[ 21.426410] allocated 13-byte region [ffff8881027b62c0, ffff8881027b62cd)
[ 21.427679]
[ 21.427929] The buggy address belongs to the physical page:
[ 21.428566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b6
[ 21.429145] flags: 0x200000000000000(node=0|zone=2)
[ 21.429770] page_type: f5(slab)
[ 21.430112] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 21.431024] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[ 21.432003] page dumped because: kasan: bad access detected
[ 21.432382]
[ 21.432711] Memory state around the buggy address:
[ 21.433732] ffff8881027b6180: 00 05 fc fc 00 02 fc fc 00 03 fc fc fa fb fc fc
[ 21.434412] ffff8881027b6200: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[ 21.435075] >ffff8881027b6280: 00 02 fc fc 00 02 fc fc 00 05 fc fc 00 07 fc fc
[ 21.435847] ^
[ 21.436454] ffff8881027b6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 21.437126] ffff8881027b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 21.437867] ==================================================================
[ 22.803018] ==================================================================
[ 22.803854] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x167/0x330
[ 22.805439] Write of size 2 at addr ffff888101b88a77 by task kunit_try_catch/180
[ 22.806090]
[ 22.806304] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 22.806416] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 22.806447] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 22.806480] Call Trace:
[ 22.806499] <TASK>
[ 22.806526] dump_stack_lvl+0x73/0xb0
[ 22.806581] print_report+0xd1/0x640
[ 22.806632] ? __virt_addr_valid+0x1db/0x2d0
[ 22.806668] ? kasan_complete_mode_report_info+0x2a/0x200
[ 22.806704] kasan_report+0x102/0x140
[ 22.806730] ? kmalloc_oob_memset_2+0x167/0x330
[ 22.806759] ? kmalloc_oob_memset_2+0x167/0x330
[ 22.806793] kasan_check_range+0x10c/0x1c0
[ 22.806822] __asan_memset+0x27/0x50
[ 22.806851] kmalloc_oob_memset_2+0x167/0x330
[ 22.806880] ? __pfx_kmalloc_oob_memset_2+0x10/0x10
[ 22.806909] ? __schedule+0xcdc/0x2830
[ 22.806939] ? __pfx_read_tsc+0x10/0x10
[ 22.806968] ? ktime_get_ts64+0x86/0x230
[ 22.807002] kunit_try_run_case+0x1b3/0x490
[ 22.807033] ? __pfx_kunit_try_run_case+0x10/0x10
[ 22.807060] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 22.807096] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 22.807454] ? __kthread_parkme+0x82/0x160
[ 22.807521] ? preempt_count_sub+0x50/0x80
[ 22.807587] ? __pfx_kunit_try_run_case+0x10/0x10
[ 22.807645] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 22.807713] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 22.807779] kthread+0x324/0x6d0
[ 22.807814] ? trace_preempt_on+0x20/0xc0
[ 22.807850] ? __pfx_kthread+0x10/0x10
[ 22.807892] ? _raw_spin_unlock_irq+0x47/0x80
[ 22.807924] ? calculate_sigpending+0x7b/0xa0
[ 22.807955] ? __pfx_kthread+0x10/0x10
[ 22.807985] ret_from_fork+0x41/0x80
[ 22.808010] ? __pfx_kthread+0x10/0x10
[ 22.808039] ret_from_fork_asm+0x1a/0x30
[ 22.808083] </TASK>
[ 22.808124]
[ 22.823318] Allocated by task 180:
[ 22.823769] kasan_save_stack+0x3d/0x60
[ 22.824346] kasan_save_track+0x18/0x40
[ 22.824605] kasan_save_alloc_info+0x3b/0x50
[ 22.825313] __kasan_kmalloc+0xb7/0xc0
[ 22.825928] __kmalloc_cache_noprof+0x184/0x410
[ 22.826629] kmalloc_oob_memset_2+0xad/0x330
[ 22.827061] kunit_try_run_case+0x1b3/0x490
[ 22.827723] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 22.828126] kthread+0x324/0x6d0
[ 22.828866] ret_from_fork+0x41/0x80
[ 22.829523] ret_from_fork_asm+0x1a/0x30
[ 22.830308]
[ 22.830524] The buggy address belongs to the object at ffff888101b88a00
[ 22.830524] which belongs to the cache kmalloc-128 of size 128
[ 22.831814] The buggy address is located 119 bytes inside of
[ 22.831814] allocated 120-byte region [ffff888101b88a00, ffff888101b88a78)
[ 22.832824]
[ 22.833060] The buggy address belongs to the physical page:
[ 22.833522] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b88
[ 22.834084] flags: 0x200000000000000(node=0|zone=2)
[ 22.835316] page_type: f5(slab)
[ 22.835647] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[ 22.836140] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 22.836792] page dumped because: kasan: bad access detected
[ 22.837437]
[ 22.837649] Memory state around the buggy address:
[ 22.838053] ffff888101b88900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 22.838865] ffff888101b88980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 22.839795] >ffff888101b88a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 22.841150] ^
[ 22.841987] ffff888101b88a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 22.842956] ffff888101b88b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 22.844474] ==================================================================
[ 23.850041] ==================================================================
[ 23.850795] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x404/0x530
[ 23.851514] Read of size 1 at addr ffff888101b9d0c8 by task kunit_try_catch/215
[ 23.852293]
[ 23.852499] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 23.852663] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.852724] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 23.852783] Call Trace:
[ 23.852816] <TASK>
[ 23.852857] dump_stack_lvl+0x73/0xb0
[ 23.852946] print_report+0xd1/0x640
[ 23.853053] ? __virt_addr_valid+0x1db/0x2d0
[ 23.853197] ? kasan_complete_mode_report_info+0x2a/0x200
[ 23.853311] kasan_report+0x102/0x140
[ 23.853418] ? kmem_cache_oob+0x404/0x530
[ 23.853507] ? kmem_cache_oob+0x404/0x530
[ 23.853577] __asan_report_load1_noabort+0x18/0x20
[ 23.853639] kmem_cache_oob+0x404/0x530
[ 23.853691] ? trace_hardirqs_on+0x37/0xe0
[ 23.853753] ? __pfx_kmem_cache_oob+0x10/0x10
[ 23.853802] ? finish_task_switch.isra.0+0x153/0x700
[ 23.853862] ? __switch_to+0x5d9/0xf60
[ 23.853987] ? __pfx_read_tsc+0x10/0x10
[ 23.854086] ? ktime_get_ts64+0x86/0x230
[ 23.854210] kunit_try_run_case+0x1b3/0x490
[ 23.854362] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.854448] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 23.854515] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 23.854573] ? __kthread_parkme+0x82/0x160
[ 23.854631] ? preempt_count_sub+0x50/0x80
[ 23.854695] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.854732] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.854770] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 23.854805] kthread+0x324/0x6d0
[ 23.854833] ? trace_preempt_on+0x20/0xc0
[ 23.854864] ? __pfx_kthread+0x10/0x10
[ 23.854894] ? _raw_spin_unlock_irq+0x47/0x80
[ 23.854924] ? calculate_sigpending+0x7b/0xa0
[ 23.854954] ? __pfx_kthread+0x10/0x10
[ 23.854984] ret_from_fork+0x41/0x80
[ 23.855009] ? __pfx_kthread+0x10/0x10
[ 23.855038] ret_from_fork_asm+0x1a/0x30
[ 23.855083] </TASK>
[ 23.855124]
[ 23.871348] Allocated by task 215:
[ 23.871862] kasan_save_stack+0x3d/0x60
[ 23.872563] kasan_save_track+0x18/0x40
[ 23.872998] kasan_save_alloc_info+0x3b/0x50
[ 23.873652] __kasan_slab_alloc+0x91/0xa0
[ 23.874133] kmem_cache_alloc_noprof+0x11e/0x3f0
[ 23.874744] kmem_cache_oob+0x158/0x530
[ 23.875147] kunit_try_run_case+0x1b3/0x490
[ 23.875620] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.876071] kthread+0x324/0x6d0
[ 23.876498] ret_from_fork+0x41/0x80
[ 23.876883] ret_from_fork_asm+0x1a/0x30
[ 23.877519]
[ 23.877762] The buggy address belongs to the object at ffff888101b9d000
[ 23.877762] which belongs to the cache test_cache of size 200
[ 23.878892] The buggy address is located 0 bytes to the right of
[ 23.878892] allocated 200-byte region [ffff888101b9d000, ffff888101b9d0c8)
[ 23.879500]
[ 23.879700] The buggy address belongs to the physical page:
[ 23.880006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b9d
[ 23.880694] flags: 0x200000000000000(node=0|zone=2)
[ 23.881269] page_type: f5(slab)
[ 23.881751] raw: 0200000000000000 ffff888101ae7140 dead000000000122 0000000000000000
[ 23.882527] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[ 23.883313] page dumped because: kasan: bad access detected
[ 23.883999]
[ 23.884441] Memory state around the buggy address:
[ 23.884949] ffff888101b9cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.885851] ffff888101b9d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 23.886729] >ffff888101b9d080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[ 23.887612] ^
[ 23.888236] ffff888101b9d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.889071] ffff888101b9d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.890111] ==================================================================
[ 21.995119] ==================================================================
[ 21.996577] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe25/0x11d0
[ 21.997516] Write of size 1 at addr ffff8881003aaad0 by task kunit_try_catch/166
[ 21.998417]
[ 21.998734] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 21.998845] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 21.998875] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 21.998946] Call Trace:
[ 21.999004] <TASK>
[ 21.999049] dump_stack_lvl+0x73/0xb0
[ 21.999182] print_report+0xd1/0x640
[ 21.999218] ? __virt_addr_valid+0x1db/0x2d0
[ 21.999252] ? kasan_complete_mode_report_info+0x2a/0x200
[ 21.999401] kasan_report+0x102/0x140
[ 21.999443] ? krealloc_less_oob_helper+0xe25/0x11d0
[ 21.999489] ? krealloc_less_oob_helper+0xe25/0x11d0
[ 21.999586] __asan_report_store1_noabort+0x1b/0x30
[ 21.999640] krealloc_less_oob_helper+0xe25/0x11d0
[ 21.999690] ? __pfx_krealloc_less_oob_helper+0x10/0x10
[ 21.999733] ? finish_task_switch.isra.0+0x153/0x700
[ 21.999783] ? __switch_to+0x5d9/0xf60
[ 21.999829] ? __schedule+0xcdc/0x2830
[ 21.999861] ? __pfx_read_tsc+0x10/0x10
[ 21.999910] krealloc_less_oob+0x1c/0x30
[ 21.999939] kunit_try_run_case+0x1b3/0x490
[ 21.999969] ? __pfx_kunit_try_run_case+0x10/0x10
[ 21.999996] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 22.000027] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 22.000058] ? __kthread_parkme+0x82/0x160
[ 22.000088] ? preempt_count_sub+0x50/0x80
[ 22.000119] ? __pfx_kunit_try_run_case+0x10/0x10
[ 22.000148] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 22.000202] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 22.000236] kthread+0x324/0x6d0
[ 22.000264] ? trace_preempt_on+0x20/0xc0
[ 22.000296] ? __pfx_kthread+0x10/0x10
[ 22.000325] ? _raw_spin_unlock_irq+0x47/0x80
[ 22.000354] ? calculate_sigpending+0x7b/0xa0
[ 22.000383] ? __pfx_kthread+0x10/0x10
[ 22.000413] ret_from_fork+0x41/0x80
[ 22.000437] ? __pfx_kthread+0x10/0x10
[ 22.000466] ret_from_fork_asm+0x1a/0x30
[ 22.000509] </TASK>
[ 22.000524]
[ 22.018672] Allocated by task 166:
[ 22.019427] kasan_save_stack+0x3d/0x60
[ 22.019899] kasan_save_track+0x18/0x40
[ 22.020583] kasan_save_alloc_info+0x3b/0x50
[ 22.021136] __kasan_krealloc+0x190/0x1f0
[ 22.021799] krealloc_noprof+0xf3/0x340
[ 22.022375] krealloc_less_oob_helper+0x1ab/0x11d0
[ 22.023429] krealloc_less_oob+0x1c/0x30
[ 22.023713] kunit_try_run_case+0x1b3/0x490
[ 22.024129] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 22.024783] kthread+0x324/0x6d0
[ 22.025106] ret_from_fork+0x41/0x80
[ 22.025617] ret_from_fork_asm+0x1a/0x30
[ 22.026192]
[ 22.026415] The buggy address belongs to the object at ffff8881003aaa00
[ 22.026415] which belongs to the cache kmalloc-256 of size 256
[ 22.027242] The buggy address is located 7 bytes to the right of
[ 22.027242] allocated 201-byte region [ffff8881003aaa00, ffff8881003aaac9)
[ 22.028519]
[ 22.028911] The buggy address belongs to the physical page:
[ 22.029227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1003aa
[ 22.029945] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 22.031738] flags: 0x200000000000040(head|node=0|zone=2)
[ 22.032539] page_type: f5(slab)
[ 22.033042] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 22.033930] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 22.034979] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 22.035923] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 22.037109] head: 0200000000000001 ffffea000400ea81 ffffffffffffffff 0000000000000000
[ 22.037527] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[ 22.038048] page dumped because: kasan: bad access detected
[ 22.038729]
[ 22.039017] Memory state around the buggy address:
[ 22.039793] ffff8881003aa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 22.040733] ffff8881003aaa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 22.041036] >ffff8881003aaa80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 22.041497] ^
[ 22.042284] ffff8881003aab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 22.042886] ffff8881003aab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 22.044009] ==================================================================
[ 22.045897] ==================================================================
[ 22.046519] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec8/0x11d0
[ 22.048121] Write of size 1 at addr ffff8881003aaada by task kunit_try_catch/166
[ 22.048934]
[ 22.049116] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 22.049243] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 22.049280] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 22.049331] Call Trace:
[ 22.049368] <TASK>
[ 22.049408] dump_stack_lvl+0x73/0xb0
[ 22.049492] print_report+0xd1/0x640
[ 22.049548] ? __virt_addr_valid+0x1db/0x2d0
[ 22.049606] ? kasan_complete_mode_report_info+0x2a/0x200
[ 22.049669] kasan_report+0x102/0x140
[ 22.049722] ? krealloc_less_oob_helper+0xec8/0x11d0
[ 22.049781] ? krealloc_less_oob_helper+0xec8/0x11d0
[ 22.049846] __asan_report_store1_noabort+0x1b/0x30
[ 22.049902] krealloc_less_oob_helper+0xec8/0x11d0
[ 22.049963] ? __pfx_krealloc_less_oob_helper+0x10/0x10
[ 22.050018] ? finish_task_switch.isra.0+0x153/0x700
[ 22.050077] ? __switch_to+0x5d9/0xf60
[ 22.050144] ? __schedule+0xcdc/0x2830
[ 22.050251] ? __pfx_read_tsc+0x10/0x10
[ 22.050339] krealloc_less_oob+0x1c/0x30
[ 22.050397] kunit_try_run_case+0x1b3/0x490
[ 22.050431] ? __pfx_kunit_try_run_case+0x10/0x10
[ 22.050460] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 22.050492] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 22.050523] ? __kthread_parkme+0x82/0x160
[ 22.050555] ? preempt_count_sub+0x50/0x80
[ 22.050588] ? __pfx_kunit_try_run_case+0x10/0x10
[ 22.050617] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 22.050651] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 22.050685] kthread+0x324/0x6d0
[ 22.050712] ? trace_preempt_on+0x20/0xc0
[ 22.050744] ? __pfx_kthread+0x10/0x10
[ 22.050773] ? _raw_spin_unlock_irq+0x47/0x80
[ 22.050802] ? calculate_sigpending+0x7b/0xa0
[ 22.050831] ? __pfx_kthread+0x10/0x10
[ 22.050860] ret_from_fork+0x41/0x80
[ 22.050885] ? __pfx_kthread+0x10/0x10
[ 22.050914] ret_from_fork_asm+0x1a/0x30
[ 22.050957] </TASK>
[ 22.050972]
[ 22.072436] Allocated by task 166:
[ 22.072820] kasan_save_stack+0x3d/0x60
[ 22.073594] kasan_save_track+0x18/0x40
[ 22.074043] kasan_save_alloc_info+0x3b/0x50
[ 22.074623] __kasan_krealloc+0x190/0x1f0
[ 22.074893] krealloc_noprof+0xf3/0x340
[ 22.075116] krealloc_less_oob_helper+0x1ab/0x11d0
[ 22.075423] krealloc_less_oob+0x1c/0x30
[ 22.075944] kunit_try_run_case+0x1b3/0x490
[ 22.076852] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 22.077570] kthread+0x324/0x6d0
[ 22.078105] ret_from_fork+0x41/0x80
[ 22.079314] ret_from_fork_asm+0x1a/0x30
[ 22.080005]
[ 22.080306] The buggy address belongs to the object at ffff8881003aaa00
[ 22.080306] which belongs to the cache kmalloc-256 of size 256
[ 22.080970] The buggy address is located 17 bytes to the right of
[ 22.080970] allocated 201-byte region [ffff8881003aaa00, ffff8881003aaac9)
[ 22.081968]
[ 22.082252] The buggy address belongs to the physical page:
[ 22.082746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1003aa
[ 22.083780] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 22.084394] flags: 0x200000000000040(head|node=0|zone=2)
[ 22.084911] page_type: f5(slab)
[ 22.085594] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 22.086789] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 22.087605] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 22.088236] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 22.089214] head: 0200000000000001 ffffea000400ea81 ffffffffffffffff 0000000000000000
[ 22.089595] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[ 22.090715] page dumped because: kasan: bad access detected
[ 22.091145]
[ 22.091775] Memory state around the buggy address:
[ 22.092483] ffff8881003aa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 22.092881] ffff8881003aaa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 22.093530] >ffff8881003aaa80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 22.094213] ^
[ 22.094992] ffff8881003aab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 22.095723] ffff8881003aab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 22.096840] ==================================================================
[ 21.945753] ==================================================================
[ 21.946358] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd72/0x11d0
[ 21.947608] Write of size 1 at addr ffff8881003aaac9 by task kunit_try_catch/166
[ 21.948801]
[ 21.949351] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 21.949465] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 21.949706] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 21.949764] Call Trace:
[ 21.949811] <TASK>
[ 21.949856] dump_stack_lvl+0x73/0xb0
[ 21.949945] print_report+0xd1/0x640
[ 21.949997] ? __virt_addr_valid+0x1db/0x2d0
[ 21.950043] ? kasan_complete_mode_report_info+0x2a/0x200
[ 21.950080] kasan_report+0x102/0x140
[ 21.950120] ? krealloc_less_oob_helper+0xd72/0x11d0
[ 21.950156] ? krealloc_less_oob_helper+0xd72/0x11d0
[ 21.950245] __asan_report_store1_noabort+0x1b/0x30
[ 21.950394] krealloc_less_oob_helper+0xd72/0x11d0
[ 21.950432] ? __pfx_krealloc_less_oob_helper+0x10/0x10
[ 21.950463] ? finish_task_switch.isra.0+0x153/0x700
[ 21.950499] ? __switch_to+0x5d9/0xf60
[ 21.950535] ? __schedule+0xcdc/0x2830
[ 21.950567] ? __pfx_read_tsc+0x10/0x10
[ 21.950601] krealloc_less_oob+0x1c/0x30
[ 21.950627] kunit_try_run_case+0x1b3/0x490
[ 21.950658] ? __pfx_kunit_try_run_case+0x10/0x10
[ 21.950685] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 21.950716] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 21.950747] ? __kthread_parkme+0x82/0x160
[ 21.950777] ? preempt_count_sub+0x50/0x80
[ 21.950809] ? __pfx_kunit_try_run_case+0x10/0x10
[ 21.950838] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 21.950871] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 21.950904] kthread+0x324/0x6d0
[ 21.950931] ? trace_preempt_on+0x20/0xc0
[ 21.950963] ? __pfx_kthread+0x10/0x10
[ 21.950992] ? _raw_spin_unlock_irq+0x47/0x80
[ 21.951021] ? calculate_sigpending+0x7b/0xa0
[ 21.951051] ? __pfx_kthread+0x10/0x10
[ 21.951081] ret_from_fork+0x41/0x80
[ 21.951117] ? __pfx_kthread+0x10/0x10
[ 21.951151] ret_from_fork_asm+0x1a/0x30
[ 21.951218] </TASK>
[ 21.951235]
[ 21.969821] Allocated by task 166:
[ 21.970400] kasan_save_stack+0x3d/0x60
[ 21.970864] kasan_save_track+0x18/0x40
[ 21.971392] kasan_save_alloc_info+0x3b/0x50
[ 21.971719] __kasan_krealloc+0x190/0x1f0
[ 21.971995] krealloc_noprof+0xf3/0x340
[ 21.973014] krealloc_less_oob_helper+0x1ab/0x11d0
[ 21.973505] krealloc_less_oob+0x1c/0x30
[ 21.973909] kunit_try_run_case+0x1b3/0x490
[ 21.974345] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 21.974705] kthread+0x324/0x6d0
[ 21.974943] ret_from_fork+0x41/0x80
[ 21.975214] ret_from_fork_asm+0x1a/0x30
[ 21.975630]
[ 21.975840] The buggy address belongs to the object at ffff8881003aaa00
[ 21.975840] which belongs to the cache kmalloc-256 of size 256
[ 21.977411] The buggy address is located 0 bytes to the right of
[ 21.977411] allocated 201-byte region [ffff8881003aaa00, ffff8881003aaac9)
[ 21.978428]
[ 21.978662] The buggy address belongs to the physical page:
[ 21.979148] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1003aa
[ 21.980520] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 21.981544] flags: 0x200000000000040(head|node=0|zone=2)
[ 21.982060] page_type: f5(slab)
[ 21.982855] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 21.983273] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 21.983646] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 21.985568] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 21.986390] head: 0200000000000001 ffffea000400ea81 ffffffffffffffff 0000000000000000
[ 21.986806] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[ 21.987757] page dumped because: kasan: bad access detected
[ 21.988431]
[ 21.988643] Memory state around the buggy address:
[ 21.989057] ffff8881003aa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 21.989747] ffff8881003aaa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 21.990519] >ffff8881003aaa80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 21.990980] ^
[ 21.991499] ffff8881003aab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 21.992936] ffff8881003aab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 21.993648] ==================================================================
[ 22.098763] ==================================================================
[ 22.099816] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe92/0x11d0
[ 22.101208] Write of size 1 at addr ffff8881003aaaea by task kunit_try_catch/166
[ 22.102340]
[ 22.102610] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 22.102722] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 22.102754] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 22.102808] Call Trace:
[ 22.102844] <TASK>
[ 22.102889] dump_stack_lvl+0x73/0xb0
[ 22.103019] print_report+0xd1/0x640
[ 22.103220] ? __virt_addr_valid+0x1db/0x2d0
[ 22.103369] ? kasan_complete_mode_report_info+0x2a/0x200
[ 22.103412] kasan_report+0x102/0x140
[ 22.103441] ? krealloc_less_oob_helper+0xe92/0x11d0
[ 22.103474] ? krealloc_less_oob_helper+0xe92/0x11d0
[ 22.103511] __asan_report_store1_noabort+0x1b/0x30
[ 22.103542] krealloc_less_oob_helper+0xe92/0x11d0
[ 22.103575] ? __pfx_krealloc_less_oob_helper+0x10/0x10
[ 22.103605] ? finish_task_switch.isra.0+0x153/0x700
[ 22.103637] ? __switch_to+0x5d9/0xf60
[ 22.103672] ? __schedule+0xcdc/0x2830
[ 22.103703] ? __pfx_read_tsc+0x10/0x10
[ 22.103737] krealloc_less_oob+0x1c/0x30
[ 22.103763] kunit_try_run_case+0x1b3/0x490
[ 22.103793] ? __pfx_kunit_try_run_case+0x10/0x10
[ 22.103820] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 22.103851] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 22.103894] ? __kthread_parkme+0x82/0x160
[ 22.103924] ? preempt_count_sub+0x50/0x80
[ 22.103956] ? __pfx_kunit_try_run_case+0x10/0x10
[ 22.103985] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 22.104018] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 22.104051] kthread+0x324/0x6d0
[ 22.104078] ? trace_preempt_on+0x20/0xc0
[ 22.104125] ? __pfx_kthread+0x10/0x10
[ 22.104174] ? _raw_spin_unlock_irq+0x47/0x80
[ 22.104208] ? calculate_sigpending+0x7b/0xa0
[ 22.104239] ? __pfx_kthread+0x10/0x10
[ 22.104313] ret_from_fork+0x41/0x80
[ 22.104358] ? __pfx_kthread+0x10/0x10
[ 22.104402] ret_from_fork_asm+0x1a/0x30
[ 22.104463] </TASK>
[ 22.104486]
[ 22.122889] Allocated by task 166:
[ 22.123126] kasan_save_stack+0x3d/0x60
[ 22.123904] kasan_save_track+0x18/0x40
[ 22.124754] kasan_save_alloc_info+0x3b/0x50
[ 22.125478] __kasan_krealloc+0x190/0x1f0
[ 22.125876] krealloc_noprof+0xf3/0x340
[ 22.126675] krealloc_less_oob_helper+0x1ab/0x11d0
[ 22.127305] krealloc_less_oob+0x1c/0x30
[ 22.127761] kunit_try_run_case+0x1b3/0x490
[ 22.128251] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 22.128637] kthread+0x324/0x6d0
[ 22.129846] ret_from_fork+0x41/0x80
[ 22.130543] ret_from_fork_asm+0x1a/0x30
[ 22.130791]
[ 22.131376] The buggy address belongs to the object at ffff8881003aaa00
[ 22.131376] which belongs to the cache kmalloc-256 of size 256
[ 22.132389] The buggy address is located 33 bytes to the right of
[ 22.132389] allocated 201-byte region [ffff8881003aaa00, ffff8881003aaac9)
[ 22.134071]
[ 22.134321] The buggy address belongs to the physical page:
[ 22.135119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1003aa
[ 22.135610] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 22.136704] flags: 0x200000000000040(head|node=0|zone=2)
[ 22.137612] page_type: f5(slab)
[ 22.137925] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 22.138820] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 22.139875] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 22.140420] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 22.141056] head: 0200000000000001 ffffea000400ea81 ffffffffffffffff 0000000000000000
[ 22.142315] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[ 22.143043] page dumped because: kasan: bad access detected
[ 22.143766]
[ 22.144001] Memory state around the buggy address:
[ 22.144483] ffff8881003aa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 22.145504] ffff8881003aaa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 22.146424] >ffff8881003aaa80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 22.147397] ^
[ 22.147817] ffff8881003aab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 22.148746] ffff8881003aab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 22.149481] ==================================================================
---
[ 22.150896] ==================================================================
[ 22.151646] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd49/0x11d0
[ 22.152061] Write of size 1 at addr ffff8881003aaaeb by task kunit_try_catch/166
[ 22.152797]
[ 22.153472] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 22.153584] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 22.153617] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 22.153673] Call Trace:
[ 22.153712] <TASK>
[ 22.153755] dump_stack_lvl+0x73/0xb0
[ 22.153868] print_report+0xd1/0x640
[ 22.153944] ? __virt_addr_valid+0x1db/0x2d0
[ 22.154005] ? kasan_complete_mode_report_info+0x2a/0x200
[ 22.154074] kasan_report+0x102/0x140
[ 22.154124] ? krealloc_less_oob_helper+0xd49/0x11d0
[ 22.154204] ? krealloc_less_oob_helper+0xd49/0x11d0
[ 22.154276] __asan_report_store1_noabort+0x1b/0x30
[ 22.154361] krealloc_less_oob_helper+0xd49/0x11d0
[ 22.154423] ? __pfx_krealloc_less_oob_helper+0x10/0x10
[ 22.154478] ? finish_task_switch.isra.0+0x153/0x700
[ 22.154540] ? __switch_to+0x5d9/0xf60
[ 22.154606] ? __schedule+0xcdc/0x2830
[ 22.154656] ? __pfx_read_tsc+0x10/0x10
[ 22.154719] krealloc_less_oob+0x1c/0x30
[ 22.154772] kunit_try_run_case+0x1b3/0x490
[ 22.154830] ? __pfx_kunit_try_run_case+0x10/0x10
[ 22.154882] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 22.154943] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 22.155000] ? __kthread_parkme+0x82/0x160
[ 22.155053] ? preempt_count_sub+0x50/0x80
[ 22.155113] ? __pfx_kunit_try_run_case+0x10/0x10
[ 22.155516] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 22.155588] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 22.155654] kthread+0x324/0x6d0
[ 22.155708] ? trace_preempt_on+0x20/0xc0
[ 22.155777] ? __pfx_kthread+0x10/0x10
[ 22.155810] ? _raw_spin_unlock_irq+0x47/0x80
[ 22.155844] ? calculate_sigpending+0x7b/0xa0
[ 22.155874] ? __pfx_kthread+0x10/0x10
[ 22.155916] ret_from_fork+0x41/0x80
[ 22.155942] ? __pfx_kthread+0x10/0x10
[ 22.155971] ret_from_fork_asm+0x1a/0x30
[ 22.156015] </TASK>
[ 22.156031]
[ 22.181467] Allocated by task 166:
[ 22.183656] kasan_save_stack+0x3d/0x60
[ 22.185088] kasan_save_track+0x18/0x40
[ 22.185619] kasan_save_alloc_info+0x3b/0x50
[ 22.185886] __kasan_krealloc+0x190/0x1f0
[ 22.186069] krealloc_noprof+0xf3/0x340
[ 22.186276] krealloc_less_oob_helper+0x1ab/0x11d0
[ 22.186541] krealloc_less_oob+0x1c/0x30
[ 22.187246] kunit_try_run_case+0x1b3/0x490
[ 22.187847] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 22.188648] kthread+0x324/0x6d0
[ 22.189149] ret_from_fork+0x41/0x80
[ 22.189727] ret_from_fork_asm+0x1a/0x30
[ 22.190900]
[ 22.191071] The buggy address belongs to the object at ffff8881003aaa00
[ 22.191071] which belongs to the cache kmalloc-256 of size 256
[ 22.192077] The buggy address is located 34 bytes to the right of
[ 22.192077] allocated 201-byte region [ffff8881003aaa00, ffff8881003aaac9)
[ 22.193604]
[ 22.193892] The buggy address belongs to the physical page:
[ 22.194557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1003aa
[ 22.195083] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 22.195769] flags: 0x200000000000040(head|node=0|zone=2)
[ 22.196507] page_type: f5(slab)
[ 22.197001] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 22.197702] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 22.198676] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 22.199315] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 22.200857] head: 0200000000000001 ffffea000400ea81 ffffffffffffffff 0000000000000000
[ 22.201617] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[ 22.201846] page dumped because: kasan: bad access detected
[ 22.202012]
[ 22.202090] Memory state around the buggy address:
[ 22.202952] ffff8881003aa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 22.204104] ffff8881003aaa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 22.204762] >ffff8881003aaa80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[ 22.206300] ^
[ 22.207460] ffff8881003aab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 22.208104] ffff8881003aab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 22.208909] ==================================================================
[ 24.835946] ==================================================================
[ 24.836854] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[ 24.837676] Read of size 1 at addr ffff888102d62001 by task kunit_try_catch/231
[ 24.838989]
[ 24.840118] CPU: 1 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 24.840273] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 24.840310] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 24.840371] Call Trace:
[ 24.840406] <TASK>
[ 24.840451] dump_stack_lvl+0x73/0xb0
[ 24.840543] print_report+0xd1/0x640
[ 24.840683] ? __virt_addr_valid+0x1db/0x2d0
[ 24.840724] ? kasan_addr_to_slab+0x11/0xa0
[ 24.840760] kasan_report+0x102/0x140
[ 24.840788] ? mempool_oob_right_helper+0x31a/0x380
[ 24.840822] ? mempool_oob_right_helper+0x31a/0x380
[ 24.840859] __asan_report_load1_noabort+0x18/0x20
[ 24.840890] mempool_oob_right_helper+0x31a/0x380
[ 24.840923] ? __pfx_mempool_oob_right_helper+0x10/0x10
[ 24.840960] ? finish_task_switch.isra.0+0x153/0x700
[ 24.840999] mempool_kmalloc_large_oob_right+0xb6/0x100
[ 24.841030] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[ 24.841062] ? __switch_to+0x5d9/0xf60
[ 24.841105] ? __pfx_mempool_kmalloc+0x10/0x10
[ 24.841148] ? __pfx_mempool_kfree+0x10/0x10
[ 24.841205] ? __pfx_read_tsc+0x10/0x10
[ 24.841237] ? ktime_get_ts64+0x86/0x230
[ 24.841282] ? sysvec_apic_timer_interrupt+0x50/0x90
[ 24.841362] kunit_try_run_case+0x1b3/0x490
[ 24.841404] ? __pfx_kunit_try_run_case+0x10/0x10
[ 24.841433] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 24.841466] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 24.841500] ? __kthread_parkme+0x82/0x160
[ 24.841533] ? preempt_count_sub+0x50/0x80
[ 24.841566] ? __pfx_kunit_try_run_case+0x10/0x10
[ 24.841596] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 24.841632] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 24.841668] kthread+0x324/0x6d0
[ 24.841697] ? trace_preempt_on+0x20/0xc0
[ 24.841731] ? __pfx_kthread+0x10/0x10
[ 24.841761] ? _raw_spin_unlock_irq+0x47/0x80
[ 24.841792] ? calculate_sigpending+0x7b/0xa0
[ 24.841823] ? __pfx_kthread+0x10/0x10
[ 24.841854] ret_from_fork+0x41/0x80
[ 24.841880] ? __pfx_kthread+0x10/0x10
[ 24.841910] ret_from_fork_asm+0x1a/0x30
[ 24.841955] </TASK>
[ 24.841972]
[ 24.863448] The buggy address belongs to the physical page:
[ 24.864014] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d60
[ 24.868751] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 24.869189] flags: 0x200000000000040(head|node=0|zone=2)
[ 24.869531] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 24.871433] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 24.871850] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[ 24.872246] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 24.872610] head: 0200000000000002 ffffea00040b5801 ffffffffffffffff 0000000000000000
[ 24.872975] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[ 24.875378] page dumped because: kasan: bad access detected
[ 24.876285]
[ 24.876447] Memory state around the buggy address:
[ 24.877397] ffff888102d61f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 24.878609] ffff888102d61f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 24.879660] >ffff888102d62000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 24.880276] ^
[ 24.880862] ffff888102d62080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 24.881911] ffff888102d62100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[ 24.882669] ==================================================================
[ 29.899916] ==================================================================
[ 29.900895] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x2e/0x1d0
[ 29.901473] Write of size 121 at addr ffff888101bab200 by task kunit_try_catch/293
[ 29.901855]
[ 29.902081] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 29.902224] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 29.902255] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 29.902309] Call Trace:
[ 29.902348] <TASK>
[ 29.902392] dump_stack_lvl+0x73/0xb0
[ 29.902477] print_report+0xd1/0x640
[ 29.902532] ? __virt_addr_valid+0x1db/0x2d0
[ 29.902598] ? kasan_complete_mode_report_info+0x2a/0x200
[ 29.902677] kasan_report+0x102/0x140
[ 29.902726] ? strncpy_from_user+0x2e/0x1d0
[ 29.902795] ? strncpy_from_user+0x2e/0x1d0
[ 29.902873] kasan_check_range+0x10c/0x1c0
[ 29.902939] __kasan_check_write+0x18/0x20
[ 29.903002] strncpy_from_user+0x2e/0x1d0
[ 29.903066] ? __kasan_check_read+0x15/0x20
[ 29.903128] copy_user_test_oob+0x761/0x10f0
[ 29.903222] ? __pfx_copy_user_test_oob+0x10/0x10
[ 29.903280] ? finish_task_switch.isra.0+0x153/0x700
[ 29.903342] ? __switch_to+0x5d9/0xf60
[ 29.903416] ? __schedule+0xcdc/0x2830
[ 29.903481] ? __pfx_read_tsc+0x10/0x10
[ 29.903533] ? ktime_get_ts64+0x86/0x230
[ 29.903602] kunit_try_run_case+0x1b3/0x490
[ 29.903662] ? __pfx_kunit_try_run_case+0x10/0x10
[ 29.903716] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 29.903779] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 29.903843] ? __kthread_parkme+0x82/0x160
[ 29.903915] ? preempt_count_sub+0x50/0x80
[ 29.903983] ? __pfx_kunit_try_run_case+0x10/0x10
[ 29.904042] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 29.904107] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 29.904245] kthread+0x324/0x6d0
[ 29.904338] ? trace_preempt_on+0x20/0xc0
[ 29.904382] ? __pfx_kthread+0x10/0x10
[ 29.904416] ? _raw_spin_unlock_irq+0x47/0x80
[ 29.904451] ? calculate_sigpending+0x7b/0xa0
[ 29.904506] ? __pfx_kthread+0x10/0x10
[ 29.904569] ret_from_fork+0x41/0x80
[ 29.904618] ? __pfx_kthread+0x10/0x10
[ 29.904671] ret_from_fork_asm+0x1a/0x30
[ 29.904757] </TASK>
[ 29.904791]
[ 29.918445] Allocated by task 293:
[ 29.918893] kasan_save_stack+0x3d/0x60
[ 29.919437] kasan_save_track+0x18/0x40
[ 29.919905] kasan_save_alloc_info+0x3b/0x50
[ 29.920394] __kasan_kmalloc+0xb7/0xc0
[ 29.920661] __kmalloc_noprof+0x1c4/0x500
[ 29.920935] kunit_kmalloc_array+0x25/0x60
[ 29.921270] copy_user_test_oob+0xac/0x10f0
[ 29.921554] kunit_try_run_case+0x1b3/0x490
[ 29.921822] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 29.922213] kthread+0x324/0x6d0
[ 29.922612] ret_from_fork+0x41/0x80
[ 29.923005] ret_from_fork_asm+0x1a/0x30
[ 29.923485]
[ 29.923712] The buggy address belongs to the object at ffff888101bab200
[ 29.923712] which belongs to the cache kmalloc-128 of size 128
[ 29.924786] The buggy address is located 0 bytes inside of
[ 29.924786] allocated 120-byte region [ffff888101bab200, ffff888101bab278)
[ 29.925878]
[ 29.926144] The buggy address belongs to the physical page:
[ 29.926713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bab
[ 29.927492] flags: 0x200000000000000(node=0|zone=2)
[ 29.927987] page_type: f5(slab)
[ 29.928410] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[ 29.928803] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 29.929238] page dumped because: kasan: bad access detected
[ 29.929538]
[ 29.929734] Memory state around the buggy address:
[ 29.930132] ffff888101bab100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 29.930830] ffff888101bab180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.931555] >ffff888101bab200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 29.932275] ^
[ 29.932934] ffff888101bab280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.933630] ffff888101bab300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 29.934347] ==================================================================
[ 25.771202] ==================================================================
[ 25.772975] BUG: KASAN: slab-use-after-free in kasan_strings+0xa0c/0xb60
[ 25.773611] Read of size 1 at addr ffff888102a6d650 by task kunit_try_catch/267
[ 25.774492]
[ 25.775199] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 25.775527] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.775559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.775605] Call Trace:
[ 25.775638] <TASK>
[ 25.775674] dump_stack_lvl+0x73/0xb0
[ 25.775749] print_report+0xd1/0x640
[ 25.775790] ? __virt_addr_valid+0x1db/0x2d0
[ 25.775836] ? kasan_complete_mode_report_info+0x64/0x200
[ 25.775903] kasan_report+0x102/0x140
[ 25.775945] ? kasan_strings+0xa0c/0xb60
[ 25.775996] ? kasan_strings+0xa0c/0xb60
[ 25.776056] __asan_report_load1_noabort+0x18/0x20
[ 25.776174] kasan_strings+0xa0c/0xb60
[ 25.776236] ? __pfx_kasan_strings+0x10/0x10
[ 25.776297] ? __pfx_kasan_strings+0x10/0x10
[ 25.776359] kunit_try_run_case+0x1b3/0x490
[ 25.776420] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.776473] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 25.776534] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 25.776588] ? __kthread_parkme+0x82/0x160
[ 25.776623] ? preempt_count_sub+0x50/0x80
[ 25.776660] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.776692] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.776731] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 25.776766] kthread+0x324/0x6d0
[ 25.776795] ? trace_preempt_on+0x20/0xc0
[ 25.776828] ? __pfx_kthread+0x10/0x10
[ 25.776859] ? _raw_spin_unlock_irq+0x47/0x80
[ 25.776890] ? calculate_sigpending+0x7b/0xa0
[ 25.776921] ? __pfx_kthread+0x10/0x10
[ 25.776953] ret_from_fork+0x41/0x80
[ 25.776980] ? __pfx_kthread+0x10/0x10
[ 25.777010] ret_from_fork_asm+0x1a/0x30
[ 25.777055] </TASK>
[ 25.777071]
[ 25.795571] Allocated by task 267:
[ 25.796155] kasan_save_stack+0x3d/0x60
[ 25.796695] kasan_save_track+0x18/0x40
[ 25.797372] kasan_save_alloc_info+0x3b/0x50
[ 25.798326] __kasan_kmalloc+0xb7/0xc0
[ 25.798557] __kmalloc_cache_noprof+0x184/0x410
[ 25.798829] kasan_strings+0xb9/0xb60
[ 25.799076] kunit_try_run_case+0x1b3/0x490
[ 25.799328] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.799524] kthread+0x324/0x6d0
[ 25.799700] ret_from_fork+0x41/0x80
[ 25.799834] ret_from_fork_asm+0x1a/0x30
[ 25.799987]
[ 25.800066] Freed by task 267:
[ 25.801636] kasan_save_stack+0x3d/0x60
[ 25.802066] kasan_save_track+0x18/0x40
[ 25.803361] kasan_save_free_info+0x3f/0x60
[ 25.803803] __kasan_slab_free+0x56/0x70
[ 25.804340] kfree+0x224/0x3f0
[ 25.804740] kasan_strings+0x13c/0xb60
[ 25.805747] kunit_try_run_case+0x1b3/0x490
[ 25.806237] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.806805] kthread+0x324/0x6d0
[ 25.807736] ret_from_fork+0x41/0x80
[ 25.808058] ret_from_fork_asm+0x1a/0x30
[ 25.808893]
[ 25.809074] The buggy address belongs to the object at ffff888102a6d640
[ 25.809074] which belongs to the cache kmalloc-32 of size 32
[ 25.810438] The buggy address is located 16 bytes inside of
[ 25.810438] freed 32-byte region [ffff888102a6d640, ffff888102a6d660)
[ 25.812139]
[ 25.812387] The buggy address belongs to the physical page:
[ 25.812940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6d
[ 25.813804] flags: 0x200000000000000(node=0|zone=2)
[ 25.814415] page_type: f5(slab)
[ 25.814795] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[ 25.815666] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[ 25.817246] page dumped because: kasan: bad access detected
[ 25.817948]
[ 25.818189] Memory state around the buggy address:
[ 25.819016] ffff888102a6d500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 25.819400] ffff888102a6d580: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[ 25.820459] >ffff888102a6d600: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[ 25.821210] ^
[ 25.821935] ffff888102a6d680: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 25.822756] ffff888102a6d700: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[ 25.823490] ==================================================================
[ 23.292808] ==================================================================
[ 23.293913] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x19d/0x360
[ 23.295767] Read of size 1 at addr ffff8881027b6340 by task kunit_try_catch/200
[ 23.296661]
[ 23.296985] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 23.297051] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.297081] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 23.297133] Call Trace:
[ 23.297179] <TASK>
[ 23.297222] dump_stack_lvl+0x73/0xb0
[ 23.297407] print_report+0xd1/0x640
[ 23.297619] ? __virt_addr_valid+0x1db/0x2d0
[ 23.297658] ? kasan_complete_mode_report_info+0x64/0x200
[ 23.297696] kasan_report+0x102/0x140
[ 23.297722] ? kmalloc_double_kzfree+0x19d/0x360
[ 23.297753] ? kmalloc_double_kzfree+0x19d/0x360
[ 23.297787] ? kmalloc_double_kzfree+0x19d/0x360
[ 23.297816] __kasan_check_byte+0x3d/0x50
[ 23.297844] kfree_sensitive+0x22/0x90
[ 23.297872] kmalloc_double_kzfree+0x19d/0x360
[ 23.297901] ? __pfx_kmalloc_double_kzfree+0x10/0x10
[ 23.297934] ? __pfx_kmalloc_double_kzfree+0x10/0x10
[ 23.297969] kunit_try_run_case+0x1b3/0x490
[ 23.297999] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.298027] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 23.298060] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 23.298094] ? __kthread_parkme+0x82/0x160
[ 23.298192] ? preempt_count_sub+0x50/0x80
[ 23.298235] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.298289] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.298347] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 23.298401] kthread+0x324/0x6d0
[ 23.298446] ? trace_preempt_on+0x20/0xc0
[ 23.298483] ? __pfx_kthread+0x10/0x10
[ 23.298513] ? _raw_spin_unlock_irq+0x47/0x80
[ 23.298544] ? calculate_sigpending+0x7b/0xa0
[ 23.298573] ? __pfx_kthread+0x10/0x10
[ 23.298603] ret_from_fork+0x41/0x80
[ 23.298629] ? __pfx_kthread+0x10/0x10
[ 23.298658] ret_from_fork_asm+0x1a/0x30
[ 23.298702] </TASK>
[ 23.298719]
[ 23.315649] Allocated by task 200:
[ 23.316029] kasan_save_stack+0x3d/0x60
[ 23.316639] kasan_save_track+0x18/0x40
[ 23.316921] kasan_save_alloc_info+0x3b/0x50
[ 23.317547] __kasan_kmalloc+0xb7/0xc0
[ 23.317987] __kmalloc_cache_noprof+0x184/0x410
[ 23.318658] kmalloc_double_kzfree+0xaa/0x360
[ 23.319016] kunit_try_run_case+0x1b3/0x490
[ 23.319806] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.320532] kthread+0x324/0x6d0
[ 23.320926] ret_from_fork+0x41/0x80
[ 23.321287] ret_from_fork_asm+0x1a/0x30
[ 23.321707]
[ 23.321924] Freed by task 200:
[ 23.322493] kasan_save_stack+0x3d/0x60
[ 23.322859] kasan_save_track+0x18/0x40
[ 23.323154] kasan_save_free_info+0x3f/0x60
[ 23.323793] __kasan_slab_free+0x56/0x70
[ 23.324446] kfree+0x224/0x3f0
[ 23.324789] kfree_sensitive+0x67/0x90
[ 23.325978] kmalloc_double_kzfree+0x12c/0x360
[ 23.326544] kunit_try_run_case+0x1b3/0x490
[ 23.326886] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.327241] kthread+0x324/0x6d0
[ 23.327573] ret_from_fork+0x41/0x80
[ 23.327966] ret_from_fork_asm+0x1a/0x30
[ 23.329040]
[ 23.329793] The buggy address belongs to the object at ffff8881027b6340
[ 23.329793] which belongs to the cache kmalloc-16 of size 16
[ 23.330929] The buggy address is located 0 bytes inside of
[ 23.330929] freed 16-byte region [ffff8881027b6340, ffff8881027b6350)
[ 23.332033]
[ 23.332883] The buggy address belongs to the physical page:
[ 23.333583] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b6
[ 23.334493] flags: 0x200000000000000(node=0|zone=2)
[ 23.334987] page_type: f5(slab)
[ 23.335534] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 23.336131] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[ 23.336817] page dumped because: kasan: bad access detected
[ 23.338046]
[ 23.338352] Memory state around the buggy address:
[ 23.338802] ffff8881027b6200: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[ 23.339452] ffff8881027b6280: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[ 23.340516] >ffff8881027b6300: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[ 23.341239] ^
[ 23.341992] ffff8881027b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.342783] ffff8881027b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.343432] ==================================================================
[ 23.111043] ==================================================================
[ 23.113115] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x322/0x380
[ 23.113758] Read of size 1 at addr ffff888101b860c8 by task kunit_try_catch/192
[ 23.115282]
[ 23.115688] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 23.115766] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.115795] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 23.115848] Call Trace:
[ 23.115888] <TASK>
[ 23.115930] dump_stack_lvl+0x73/0xb0
[ 23.115997] print_report+0xd1/0x640
[ 23.116028] ? __virt_addr_valid+0x1db/0x2d0
[ 23.116060] ? kasan_complete_mode_report_info+0x64/0x200
[ 23.116108] kasan_report+0x102/0x140
[ 23.116217] ? kmalloc_uaf+0x322/0x380
[ 23.116256] ? kmalloc_uaf+0x322/0x380
[ 23.116288] __asan_report_load1_noabort+0x18/0x20
[ 23.116341] kmalloc_uaf+0x322/0x380
[ 23.116385] ? __pfx_kmalloc_uaf+0x10/0x10
[ 23.116433] ? __schedule+0xcdc/0x2830
[ 23.116494] ? __pfx_read_tsc+0x10/0x10
[ 23.116530] ? ktime_get_ts64+0x86/0x230
[ 23.116567] kunit_try_run_case+0x1b3/0x490
[ 23.116598] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.116626] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 23.116658] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 23.116689] ? __kthread_parkme+0x82/0x160
[ 23.116719] ? preempt_count_sub+0x50/0x80
[ 23.116752] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.116781] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.116814] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 23.116847] kthread+0x324/0x6d0
[ 23.116874] ? trace_preempt_on+0x20/0xc0
[ 23.116905] ? __pfx_kthread+0x10/0x10
[ 23.116933] ? _raw_spin_unlock_irq+0x47/0x80
[ 23.116962] ? calculate_sigpending+0x7b/0xa0
[ 23.116991] ? __pfx_kthread+0x10/0x10
[ 23.117020] ret_from_fork+0x41/0x80
[ 23.117044] ? __pfx_kthread+0x10/0x10
[ 23.117073] ret_from_fork_asm+0x1a/0x30
[ 23.117135] </TASK>
[ 23.117153]
[ 23.135560] Allocated by task 192:
[ 23.135980] kasan_save_stack+0x3d/0x60
[ 23.137061] kasan_save_track+0x18/0x40
[ 23.137581] kasan_save_alloc_info+0x3b/0x50
[ 23.137880] __kasan_kmalloc+0xb7/0xc0
[ 23.138280] __kmalloc_cache_noprof+0x184/0x410
[ 23.138722] kmalloc_uaf+0xab/0x380
[ 23.139047] kunit_try_run_case+0x1b3/0x490
[ 23.139539] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.140176] kthread+0x324/0x6d0
[ 23.140457] ret_from_fork+0x41/0x80
[ 23.140878] ret_from_fork_asm+0x1a/0x30
[ 23.141279]
[ 23.141522] Freed by task 192:
[ 23.141841] kasan_save_stack+0x3d/0x60
[ 23.142291] kasan_save_track+0x18/0x40
[ 23.142632] kasan_save_free_info+0x3f/0x60
[ 23.143057] __kasan_slab_free+0x56/0x70
[ 23.143584] kfree+0x224/0x3f0
[ 23.144011] kmalloc_uaf+0x12d/0x380
[ 23.144491] kunit_try_run_case+0x1b3/0x490
[ 23.144953] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.145514] kthread+0x324/0x6d0
[ 23.145951] ret_from_fork+0x41/0x80
[ 23.146484] ret_from_fork_asm+0x1a/0x30
[ 23.146913]
[ 23.147074] The buggy address belongs to the object at ffff888101b860c0
[ 23.147074] which belongs to the cache kmalloc-16 of size 16
[ 23.148357] The buggy address is located 8 bytes inside of
[ 23.148357] freed 16-byte region [ffff888101b860c0, ffff888101b860d0)
[ 23.149473]
[ 23.149760] The buggy address belongs to the physical page:
[ 23.150325] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b86
[ 23.150797] flags: 0x200000000000000(node=0|zone=2)
[ 23.151363] page_type: f5(slab)
[ 23.151677] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 23.152278] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[ 23.152962] page dumped because: kasan: bad access detected
[ 23.153423]
[ 23.153638] Memory state around the buggy address:
[ 23.153977] ffff888101b85f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.154592] ffff888101b86000: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[ 23.155008] >ffff888101b86080: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[ 23.155698] ^
[ 23.156065] ffff888101b86100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.156616] ffff888101b86180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.157315] ==================================================================
[ 22.681935] ==================================================================
[ 22.682800] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x47d/0x4c0
[ 22.684005] Read of size 16 at addr ffff888101b860a0 by task kunit_try_catch/176
[ 22.684751]
[ 22.684939] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 22.685545] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 22.685580] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 22.685619] Call Trace:
[ 22.685639] <TASK>
[ 22.685666] dump_stack_lvl+0x73/0xb0
[ 22.685745] print_report+0xd1/0x640
[ 22.685777] ? __virt_addr_valid+0x1db/0x2d0
[ 22.685812] ? kasan_complete_mode_report_info+0x64/0x200
[ 22.685848] kasan_report+0x102/0x140
[ 22.685873] ? kmalloc_uaf_16+0x47d/0x4c0
[ 22.685901] ? kmalloc_uaf_16+0x47d/0x4c0
[ 22.685934] __asan_report_load16_noabort+0x18/0x20
[ 22.685964] kmalloc_uaf_16+0x47d/0x4c0
[ 22.685991] ? __pfx_kmalloc_uaf_16+0x10/0x10
[ 22.686017] ? sysvec_apic_timer_interrupt+0x50/0x90
[ 22.686051] ? trace_hardirqs_on+0x37/0xe0
[ 22.686083] ? __pfx_read_tsc+0x10/0x10
[ 22.686380] ? ktime_get_ts64+0x86/0x230
[ 22.686442] kunit_try_run_case+0x1b3/0x490
[ 22.686479] ? __pfx_kunit_try_run_case+0x10/0x10
[ 22.686510] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 22.686545] ? __kthread_parkme+0x82/0x160
[ 22.686576] ? preempt_count_sub+0x50/0x80
[ 22.686611] ? __pfx_kunit_try_run_case+0x10/0x10
[ 22.686640] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 22.686674] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 22.686708] kthread+0x324/0x6d0
[ 22.686735] ? trace_preempt_on+0x20/0xc0
[ 22.686764] ? __pfx_kthread+0x10/0x10
[ 22.686793] ? _raw_spin_unlock_irq+0x47/0x80
[ 22.686822] ? calculate_sigpending+0x7b/0xa0
[ 22.686851] ? __pfx_kthread+0x10/0x10
[ 22.686881] ret_from_fork+0x41/0x80
[ 22.686905] ? __pfx_kthread+0x10/0x10
[ 22.686934] ret_from_fork_asm+0x1a/0x30
[ 22.686978] </TASK>
[ 22.686995]
[ 22.707011] Allocated by task 176:
[ 22.707289] kasan_save_stack+0x3d/0x60
[ 22.708502] kasan_save_track+0x18/0x40
[ 22.708753] kasan_save_alloc_info+0x3b/0x50
[ 22.709027] __kasan_kmalloc+0xb7/0xc0
[ 22.709284] __kmalloc_cache_noprof+0x184/0x410
[ 22.710232] kmalloc_uaf_16+0x15c/0x4c0
[ 22.711131] kunit_try_run_case+0x1b3/0x490
[ 22.711713] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 22.712049] kthread+0x324/0x6d0
[ 22.713919] ret_from_fork+0x41/0x80
[ 22.714902] ret_from_fork_asm+0x1a/0x30
[ 22.715414]
[ 22.715935] Freed by task 176:
[ 22.716347] kasan_save_stack+0x3d/0x60
[ 22.718192] kasan_save_track+0x18/0x40
[ 22.719762] kasan_save_free_info+0x3f/0x60
[ 22.720621] __kasan_slab_free+0x56/0x70
[ 22.720895] kfree+0x224/0x3f0
[ 22.721127] kmalloc_uaf_16+0x1d7/0x4c0
[ 22.721395] kunit_try_run_case+0x1b3/0x490
[ 22.721655] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 22.721952] kthread+0x324/0x6d0
[ 22.725180] ret_from_fork+0x41/0x80
[ 22.726190] ret_from_fork_asm+0x1a/0x30
[ 22.726885]
[ 22.727179] The buggy address belongs to the object at ffff888101b860a0
[ 22.727179] which belongs to the cache kmalloc-16 of size 16
[ 22.728999] The buggy address is located 0 bytes inside of
[ 22.728999] freed 16-byte region [ffff888101b860a0, ffff888101b860b0)
[ 22.729837]
[ 22.730071] The buggy address belongs to the physical page:
[ 22.730986] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b86
[ 22.731591] flags: 0x200000000000000(node=0|zone=2)
[ 22.731917] page_type: f5(slab)
[ 22.732657] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[ 22.733733] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[ 22.735028] page dumped because: kasan: bad access detected
[ 22.735593]
[ 22.735811] Memory state around the buggy address:
[ 22.736467] ffff888101b85f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 22.736834] ffff888101b86000: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[ 22.737538] >ffff888101b86080: 00 00 fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[ 22.738594] ^
[ 22.739482] ffff888101b86100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 22.740400] ffff888101b86180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 22.740788] ==================================================================
[ 24.153145] ==================================================================
[ 24.153927] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x1bd/0x380
[ 24.154798] Read of size 1 at addr ffff888101ae7500 by task kunit_try_catch/223
[ 24.155326]
[ 24.156268] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 24.156501] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 24.156533] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 24.157358] Call Trace:
[ 24.157401] <TASK>
[ 24.157448] dump_stack_lvl+0x73/0xb0
[ 24.157540] print_report+0xd1/0x640
[ 24.157722] ? __virt_addr_valid+0x1db/0x2d0
[ 24.157760] ? kasan_complete_mode_report_info+0x64/0x200
[ 24.157798] kasan_report+0x102/0x140
[ 24.157825] ? kmem_cache_double_destroy+0x1bd/0x380
[ 24.157860] ? kmem_cache_double_destroy+0x1bd/0x380
[ 24.157896] ? kmem_cache_double_destroy+0x1bd/0x380
[ 24.157928] __kasan_check_byte+0x3d/0x50
[ 24.157957] kmem_cache_destroy+0x25/0x1d0
[ 24.157993] kmem_cache_double_destroy+0x1bd/0x380
[ 24.158024] ? __pfx_kmem_cache_double_destroy+0x10/0x10
[ 24.158056] ? finish_task_switch.isra.0+0x153/0x700
[ 24.158088] ? __switch_to+0x5d9/0xf60
[ 24.158143] ? __pfx_empty_cache_ctor+0x10/0x10
[ 24.158201] ? __pfx_read_tsc+0x10/0x10
[ 24.158232] ? ktime_get_ts64+0x86/0x230
[ 24.158284] kunit_try_run_case+0x1b3/0x490
[ 24.158339] ? __pfx_kunit_try_run_case+0x10/0x10
[ 24.158386] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 24.158422] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 24.158455] ? __kthread_parkme+0x82/0x160
[ 24.158486] ? preempt_count_sub+0x50/0x80
[ 24.158519] ? __pfx_kunit_try_run_case+0x10/0x10
[ 24.158548] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 24.158610] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 24.158646] kthread+0x324/0x6d0
[ 24.158675] ? trace_preempt_on+0x20/0xc0
[ 24.158707] ? __pfx_kthread+0x10/0x10
[ 24.158737] ? _raw_spin_unlock_irq+0x47/0x80
[ 24.158767] ? calculate_sigpending+0x7b/0xa0
[ 24.158798] ? __pfx_kthread+0x10/0x10
[ 24.158828] ret_from_fork+0x41/0x80
[ 24.158853] ? __pfx_kthread+0x10/0x10
[ 24.158883] ret_from_fork_asm+0x1a/0x30
[ 24.158928] </TASK>
[ 24.158944]
[ 24.182032] Allocated by task 223:
[ 24.182413] kasan_save_stack+0x3d/0x60
[ 24.183358] kasan_save_track+0x18/0x40
[ 24.183916] kasan_save_alloc_info+0x3b/0x50
[ 24.184567] __kasan_slab_alloc+0x91/0xa0
[ 24.185081] kmem_cache_alloc_noprof+0x11e/0x3f0
[ 24.186183] __kmem_cache_create_args+0x177/0x250
[ 24.186819] kmem_cache_double_destroy+0xd3/0x380
[ 24.187764] kunit_try_run_case+0x1b3/0x490
[ 24.188637] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 24.189048] kthread+0x324/0x6d0
[ 24.189913] ret_from_fork+0x41/0x80
[ 24.190294] ret_from_fork_asm+0x1a/0x30
[ 24.191051]
[ 24.191546] Freed by task 223:
[ 24.192018] kasan_save_stack+0x3d/0x60
[ 24.192699] kasan_save_track+0x18/0x40
[ 24.192927] kasan_save_free_info+0x3f/0x60
[ 24.193929] __kasan_slab_free+0x56/0x70
[ 24.194210] kmem_cache_free+0x24b/0x420
[ 24.194831] slab_kmem_cache_release+0x2e/0x40
[ 24.195726] kmem_cache_release+0x16/0x20
[ 24.196176] kobject_put+0x181/0x450
[ 24.196535] sysfs_slab_release+0x16/0x20
[ 24.196822] kmem_cache_destroy+0xf0/0x1d0
[ 24.197259] kmem_cache_double_destroy+0x14c/0x380
[ 24.197837] kunit_try_run_case+0x1b3/0x490
[ 24.198054] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 24.199682] kthread+0x324/0x6d0
[ 24.200288] ret_from_fork+0x41/0x80
[ 24.200759] ret_from_fork_asm+0x1a/0x30
[ 24.201484]
[ 24.202586] The buggy address belongs to the object at ffff888101ae7500
[ 24.202586] which belongs to the cache kmem_cache of size 208
[ 24.204770] The buggy address is located 0 bytes inside of
[ 24.204770] freed 208-byte region [ffff888101ae7500, ffff888101ae75d0)
[ 24.206136]
[ 24.206325] The buggy address belongs to the physical page:
[ 24.206897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ae7
[ 24.208043] flags: 0x200000000000000(node=0|zone=2)
[ 24.208945] page_type: f5(slab)
[ 24.209539] raw: 0200000000000000 ffff888100041000 dead000000000122 0000000000000000
[ 24.209945] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[ 24.210832] page dumped because: kasan: bad access detected
[ 24.211689]
[ 24.211989] Memory state around the buggy address:
[ 24.213000] ffff888101ae7400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 24.213791] ffff888101ae7480: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.214241] >ffff888101ae7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 24.215043] ^
[ 24.215737] ffff888101ae7580: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[ 24.216955] ffff888101ae7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.217671] ==================================================================
[ 24.056619] ==================================================================
[ 24.057755] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x3e5/0x510
[ 24.059427] Read of size 1 at addr ffff888102a67000 by task kunit_try_catch/221
[ 24.061023]
[ 24.061832] CPU: 1 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 24.061953] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 24.061983] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 24.062040] Call Trace:
[ 24.062074] <TASK>
[ 24.062525] dump_stack_lvl+0x73/0xb0
[ 24.062902] print_report+0xd1/0x640
[ 24.062973] ? __virt_addr_valid+0x1db/0x2d0
[ 24.063031] ? kasan_complete_mode_report_info+0x64/0x200
[ 24.063133] kasan_report+0x102/0x140
[ 24.063209] ? kmem_cache_rcu_uaf+0x3e5/0x510
[ 24.063266] ? kmem_cache_rcu_uaf+0x3e5/0x510
[ 24.063326] __asan_report_load1_noabort+0x18/0x20
[ 24.063798] kmem_cache_rcu_uaf+0x3e5/0x510
[ 24.063851] ? __pfx_kmem_cache_rcu_uaf+0x10/0x10
[ 24.063912] ? sysvec_apic_timer_interrupt+0x50/0x90
[ 24.063980] ? __pfx_kmem_cache_rcu_uaf+0x10/0x10
[ 24.064043] kunit_try_run_case+0x1b3/0x490
[ 24.064356] ? __pfx_kunit_try_run_case+0x10/0x10
[ 24.064431] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 24.064493] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 24.064550] ? __kthread_parkme+0x82/0x160
[ 24.064607] ? preempt_count_sub+0x50/0x80
[ 24.064669] ? __pfx_kunit_try_run_case+0x10/0x10
[ 24.064720] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 24.064773] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 24.064828] kthread+0x324/0x6d0
[ 24.064871] ? trace_preempt_on+0x20/0xc0
[ 24.064922] ? __pfx_kthread+0x10/0x10
[ 24.064971] ? _raw_spin_unlock_irq+0x47/0x80
[ 24.065022] ? calculate_sigpending+0x7b/0xa0
[ 24.065069] ? __pfx_kthread+0x10/0x10
[ 24.065191] ret_from_fork+0x41/0x80
[ 24.065240] ? __pfx_kthread+0x10/0x10
[ 24.065289] ret_from_fork_asm+0x1a/0x30
[ 24.065356] </TASK>
[ 24.065380]
[ 24.089593] Allocated by task 221:
[ 24.090009] kasan_save_stack+0x3d/0x60
[ 24.090556] kasan_save_track+0x18/0x40
[ 24.090992] kasan_save_alloc_info+0x3b/0x50
[ 24.091496] __kasan_slab_alloc+0x91/0xa0
[ 24.091999] kmem_cache_alloc_noprof+0x11e/0x3f0
[ 24.092637] kmem_cache_rcu_uaf+0x156/0x510
[ 24.093215] kunit_try_run_case+0x1b3/0x490
[ 24.093714] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 24.094430] kthread+0x324/0x6d0
[ 24.094827] ret_from_fork+0x41/0x80
[ 24.095363] ret_from_fork_asm+0x1a/0x30
[ 24.095888]
[ 24.096218] Freed by task 0:
[ 24.096579] kasan_save_stack+0x3d/0x60
[ 24.096883] kasan_save_track+0x18/0x40
[ 24.097442] kasan_save_free_info+0x3f/0x60
[ 24.097949] __kasan_slab_free+0x56/0x70
[ 24.098461] slab_free_after_rcu_debug+0xe4/0x310
[ 24.099050] rcu_core+0x680/0x1d70
[ 24.099540] rcu_core_si+0x12/0x20
[ 24.099788] handle_softirqs+0x209/0x720
[ 24.100099] __irq_exit_rcu+0xc9/0x110
[ 24.100546] irq_exit_rcu+0x12/0x20
[ 24.100932] sysvec_apic_timer_interrupt+0x81/0x90
[ 24.101417] asm_sysvec_apic_timer_interrupt+0x1f/0x30
[ 24.101943]
[ 24.102211] Last potentially related work creation:
[ 24.102632] kasan_save_stack+0x3d/0x60
[ 24.102905] kasan_record_aux_stack+0xb2/0xc0
[ 24.103416] kmem_cache_free+0x132/0x420
[ 24.103826] kmem_cache_rcu_uaf+0x195/0x510
[ 24.104278] kunit_try_run_case+0x1b3/0x490
[ 24.104710] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 24.105302] kthread+0x324/0x6d0
[ 24.105638] ret_from_fork+0x41/0x80
[ 24.106058] ret_from_fork_asm+0x1a/0x30
[ 24.106485]
[ 24.106638] The buggy address belongs to the object at ffff888102a67000
[ 24.106638] which belongs to the cache test_cache of size 200
[ 24.107686] The buggy address is located 0 bytes inside of
[ 24.107686] freed 200-byte region [ffff888102a67000, ffff888102a670c8)
[ 24.108473]
[ 24.108689] The buggy address belongs to the physical page:
[ 24.109075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a67
[ 24.109850] flags: 0x200000000000000(node=0|zone=2)
[ 24.110362] page_type: f5(slab)
[ 24.110722] raw: 0200000000000000 ffff888102118280 dead000000000122 0000000000000000
[ 24.111419] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[ 24.112076] page dumped because: kasan: bad access detected
[ 24.112539]
[ 24.112786] Memory state around the buggy address:
[ 24.113309] ffff888102a66f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.113768] ffff888102a66f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.114326] >ffff888102a67000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 24.114938] ^
[ 24.115888] ffff888102a67080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[ 24.116538] ffff888102a67100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 24.116896] ==================================================================
[ 22.509212] ==================================================================
[ 22.509954] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b9/0x5e0
[ 22.510456] Read of size 1 at addr ffff8881003aac00 by task kunit_try_catch/172
[ 22.511075]
[ 22.511395] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 22.511504] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 22.511538] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 22.511594] Call Trace:
[ 22.511624] <TASK>
[ 22.511663] dump_stack_lvl+0x73/0xb0
[ 22.511742] print_report+0xd1/0x640
[ 22.511791] ? __virt_addr_valid+0x1db/0x2d0
[ 22.511837] ? kasan_complete_mode_report_info+0x64/0x200
[ 22.511902] kasan_report+0x102/0x140
[ 22.511947] ? krealloc_uaf+0x1b9/0x5e0
[ 22.511993] ? krealloc_uaf+0x1b9/0x5e0
[ 22.512051] ? krealloc_uaf+0x1b9/0x5e0
[ 22.512104] __kasan_check_byte+0x3d/0x50
[ 22.512152] krealloc_noprof+0x3f/0x340
[ 22.512297] krealloc_uaf+0x1b9/0x5e0
[ 22.512353] ? __pfx_krealloc_uaf+0x10/0x10
[ 22.512402] ? finish_task_switch.isra.0+0x153/0x700
[ 22.512459] ? __switch_to+0x5d9/0xf60
[ 22.512528] ? __schedule+0xcdc/0x2830
[ 22.512585] ? __pfx_read_tsc+0x10/0x10
[ 22.512633] ? ktime_get_ts64+0x86/0x230
[ 22.512688] kunit_try_run_case+0x1b3/0x490
[ 22.512741] ? __pfx_kunit_try_run_case+0x10/0x10
[ 22.512787] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 22.512845] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 22.512905] ? __kthread_parkme+0x82/0x160
[ 22.512962] ? preempt_count_sub+0x50/0x80
[ 22.513025] ? __pfx_kunit_try_run_case+0x10/0x10
[ 22.513082] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 22.513148] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 22.513237] kthread+0x324/0x6d0
[ 22.513290] ? trace_preempt_on+0x20/0xc0
[ 22.513347] ? __pfx_kthread+0x10/0x10
[ 22.513447] ? _raw_spin_unlock_irq+0x47/0x80
[ 22.513536] ? calculate_sigpending+0x7b/0xa0
[ 22.513595] ? __pfx_kthread+0x10/0x10
[ 22.513654] ret_from_fork+0x41/0x80
[ 22.513699] ? __pfx_kthread+0x10/0x10
[ 22.513732] ret_from_fork_asm+0x1a/0x30
[ 22.513778] </TASK>
[ 22.513796]
[ 22.533793] Allocated by task 172:
[ 22.534920] kasan_save_stack+0x3d/0x60
[ 22.535895] kasan_save_track+0x18/0x40
[ 22.536252] kasan_save_alloc_info+0x3b/0x50
[ 22.536538] __kasan_kmalloc+0xb7/0xc0
[ 22.537086] __kmalloc_cache_noprof+0x184/0x410
[ 22.537672] krealloc_uaf+0xbc/0x5e0
[ 22.538066] kunit_try_run_case+0x1b3/0x490
[ 22.538475] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 22.539025] kthread+0x324/0x6d0
[ 22.539433] ret_from_fork+0x41/0x80
[ 22.540086] ret_from_fork_asm+0x1a/0x30
[ 22.540915]
[ 22.541189] Freed by task 172:
[ 22.541819] kasan_save_stack+0x3d/0x60
[ 22.542429] kasan_save_track+0x18/0x40
[ 22.542926] kasan_save_free_info+0x3f/0x60
[ 22.543429] __kasan_slab_free+0x56/0x70
[ 22.543958] kfree+0x224/0x3f0
[ 22.544485] krealloc_uaf+0x13e/0x5e0
[ 22.544978] kunit_try_run_case+0x1b3/0x490
[ 22.545671] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 22.546432] kthread+0x324/0x6d0
[ 22.546891] ret_from_fork+0x41/0x80
[ 22.547470] ret_from_fork_asm+0x1a/0x30
[ 22.548081]
[ 22.548447] The buggy address belongs to the object at ffff8881003aac00
[ 22.548447] which belongs to the cache kmalloc-256 of size 256
[ 22.549678] The buggy address is located 0 bytes inside of
[ 22.549678] freed 256-byte region [ffff8881003aac00, ffff8881003aad00)
[ 22.550580]
[ 22.550757] The buggy address belongs to the physical page:
[ 22.551579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1003aa
[ 22.552443] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 22.553434] flags: 0x200000000000040(head|node=0|zone=2)
[ 22.554076] page_type: f5(slab)
[ 22.554569] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 22.555668] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 22.556830] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[ 22.558100] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 22.558872] head: 0200000000000001 ffffea000400ea81 ffffffffffffffff 0000000000000000
[ 22.559834] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[ 22.560600] page dumped because: kasan: bad access detected
[ 22.561072]
[ 22.561242] Memory state around the buggy address:
[ 22.561495] ffff8881003aab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 22.562991] ffff8881003aab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 22.563857] >ffff8881003aac00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 22.564596] ^
[ 22.565618] ffff8881003aac80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 22.566249] ffff8881003aad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 22.566689] ==================================================================
[ 24.950193] ==================================================================
[ 24.951464] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x394/0x400
[ 24.952366] Read of size 1 at addr ffff888102a5f900 by task kunit_try_catch/235
[ 24.952748]
[ 24.952932] CPU: 1 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 24.953034] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 24.953063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 24.953108] Call Trace:
[ 24.953138] <TASK>
[ 24.953199] dump_stack_lvl+0x73/0xb0
[ 24.953285] print_report+0xd1/0x640
[ 24.953332] ? __virt_addr_valid+0x1db/0x2d0
[ 24.953383] ? kasan_complete_mode_report_info+0x64/0x200
[ 24.953440] kasan_report+0x102/0x140
[ 24.953479] ? mempool_uaf_helper+0x394/0x400
[ 24.953531] ? mempool_uaf_helper+0x394/0x400
[ 24.953586] __asan_report_load1_noabort+0x18/0x20
[ 24.953644] mempool_uaf_helper+0x394/0x400
[ 24.953699] ? __pfx_mempool_uaf_helper+0x10/0x10
[ 24.953753] ? update_load_avg+0x1c3/0x2110
[ 24.953824] ? update_curr+0x80/0x810
[ 24.953940] ? finish_task_switch.isra.0+0x153/0x700
[ 24.954629] mempool_kmalloc_uaf+0xb3/0x100
[ 24.954699] ? __pfx_mempool_kmalloc_uaf+0x10/0x10
[ 24.954920] ? __switch_to+0x5d9/0xf60
[ 24.955011] ? __pfx_mempool_kmalloc+0x10/0x10
[ 24.955079] ? __pfx_mempool_kfree+0x10/0x10
[ 24.955180] ? __pfx_read_tsc+0x10/0x10
[ 24.955588] ? ktime_get_ts64+0x86/0x230
[ 24.955657] kunit_try_run_case+0x1b3/0x490
[ 24.955697] ? __pfx_kunit_try_run_case+0x10/0x10
[ 24.955728] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 24.955765] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 24.955800] ? __kthread_parkme+0x82/0x160
[ 24.955832] ? preempt_count_sub+0x50/0x80
[ 24.955868] ? __pfx_kunit_try_run_case+0x10/0x10
[ 24.955913] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 24.955950] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 24.955987] kthread+0x324/0x6d0
[ 24.956017] ? trace_preempt_on+0x20/0xc0
[ 24.956052] ? __pfx_kthread+0x10/0x10
[ 24.956084] ? _raw_spin_unlock_irq+0x47/0x80
[ 24.956146] ? calculate_sigpending+0x7b/0xa0
[ 24.956205] ? __pfx_kthread+0x10/0x10
[ 24.956239] ret_from_fork+0x41/0x80
[ 24.956277] ? __pfx_kthread+0x10/0x10
[ 24.956341] ret_from_fork_asm+0x1a/0x30
[ 24.956411] </TASK>
[ 24.956433]
[ 24.977525] Allocated by task 235:
[ 24.978050] kasan_save_stack+0x3d/0x60
[ 24.978771] kasan_save_track+0x18/0x40
[ 24.980058] kasan_save_alloc_info+0x3b/0x50
[ 24.981283] __kasan_mempool_unpoison_object+0x1a9/0x200
[ 24.981946] remove_element+0x11e/0x190
[ 24.982566] mempool_alloc_preallocated+0x4d/0x90
[ 24.983139] mempool_uaf_helper+0x97/0x400
[ 24.984454] mempool_kmalloc_uaf+0xb3/0x100
[ 24.985038] kunit_try_run_case+0x1b3/0x490
[ 24.985883] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 24.986275] kthread+0x324/0x6d0
[ 24.986821] ret_from_fork+0x41/0x80
[ 24.987408] ret_from_fork_asm+0x1a/0x30
[ 24.988495]
[ 24.988843] Freed by task 235:
[ 24.989700] kasan_save_stack+0x3d/0x60
[ 24.990002] kasan_save_track+0x18/0x40
[ 24.990456] kasan_save_free_info+0x3f/0x60
[ 24.991076] __kasan_mempool_poison_object+0x131/0x1d0
[ 24.992217] mempool_free+0x2ec/0x380
[ 24.992632] mempool_uaf_helper+0x11b/0x400
[ 24.993018] mempool_kmalloc_uaf+0xb3/0x100
[ 24.994053] kunit_try_run_case+0x1b3/0x490
[ 24.994578] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 24.995537] kthread+0x324/0x6d0
[ 24.996787] ret_from_fork+0x41/0x80
[ 24.997131] ret_from_fork_asm+0x1a/0x30
[ 24.997665]
[ 24.998368] The buggy address belongs to the object at ffff888102a5f900
[ 24.998368] which belongs to the cache kmalloc-128 of size 128
[ 24.999388] The buggy address is located 0 bytes inside of
[ 24.999388] freed 128-byte region [ffff888102a5f900, ffff888102a5f980)
[ 25.001036]
[ 25.001271] The buggy address belongs to the physical page:
[ 25.001788] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[ 25.002713] flags: 0x200000000000000(node=0|zone=2)
[ 25.003467] page_type: f5(slab)
[ 25.004100] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[ 25.005250] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 25.005898] page dumped because: kasan: bad access detected
[ 25.006709]
[ 25.006891] Memory state around the buggy address:
[ 25.007349] ffff888102a5f800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 25.007869] ffff888102a5f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.009356] >ffff888102a5f900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 25.009813] ^
[ 25.010068] ffff888102a5f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 25.010630] ffff888102a5fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 25.011365] ==================================================================
[ 23.695563] ==================================================================
[ 23.696409] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x50/0x60
[ 23.697988] Read of size 4 at addr ffff888102a5cdc0 by task swapper/1/0
[ 23.699065]
[ 23.699372] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B N 6.13.0 #1
[ 23.699483] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.699517] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 23.699659] Call Trace:
[ 23.699850] <IRQ>
[ 23.699960] dump_stack_lvl+0x73/0xb0
[ 23.700078] print_report+0xd1/0x640
[ 23.700154] ? __virt_addr_valid+0x1db/0x2d0
[ 23.700212] ? kasan_complete_mode_report_info+0x64/0x200
[ 23.700251] kasan_report+0x102/0x140
[ 23.700319] ? rcu_uaf_reclaim+0x50/0x60
[ 23.700375] ? rcu_uaf_reclaim+0x50/0x60
[ 23.700417] __asan_report_load4_noabort+0x18/0x20
[ 23.700449] rcu_uaf_reclaim+0x50/0x60
[ 23.700481] rcu_core+0x680/0x1d70
[ 23.700527] ? __pfx_rcu_core+0x10/0x10
[ 23.700571] rcu_core_si+0x12/0x20
[ 23.700599] handle_softirqs+0x209/0x720
[ 23.700632] ? hrtimer_interrupt+0x2fe/0x780
[ 23.700666] ? __pfx_handle_softirqs+0x10/0x10
[ 23.700706] __irq_exit_rcu+0xc9/0x110
[ 23.700737] irq_exit_rcu+0x12/0x20
[ 23.700767] sysvec_apic_timer_interrupt+0x81/0x90
[ 23.700803] </IRQ>
[ 23.700817] <TASK>
[ 23.700833] asm_sysvec_apic_timer_interrupt+0x1f/0x30
[ 23.700991] RIP: 0010:default_idle+0xf/0x20
[ 23.701186] Code: 4c 01 c7 4c 29 c2 e9 72 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d d3 69 22 00 fb f4 <fa> c3 cc cc cc cc 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90
[ 23.701357] RSP: 0000:ffff88810087fde0 EFLAGS: 00010216
[ 23.701558] RAX: ffff88815b100000 RBX: ffff88810084d000 RCX: ffffffff95634a05
[ 23.701658] RDX: ffffed102b626ad3 RSI: 0000000000000004 RDI: 000000000001f4dc
[ 23.701752] RBP: ffff88810087fde8 R08: 0000000000000001 R09: ffffed102b626ad2
[ 23.701843] R10: ffff88815b135693 R11: 0000000000000000 R12: 0000000000000001
[ 23.701911] R13: ffffed1020109a00 R14: ffffffff973dde10 R15: 0000000000000000
[ 23.702007] ? ct_kernel_exit.constprop.0+0xa5/0xd0
[ 23.702109] ? arch_cpu_idle+0xd/0x20
[ 23.702183] default_idle_call+0x48/0x80
[ 23.702214] do_idle+0x310/0x3c0
[ 23.702248] ? __pfx_do_idle+0x10/0x10
[ 23.702317] ? _raw_spin_unlock_irqrestore+0x49/0x90
[ 23.702374] ? complete+0x15b/0x1d0
[ 23.702412] cpu_startup_entry+0x5c/0x70
[ 23.702444] start_secondary+0x216/0x290
[ 23.702476] ? __pfx_start_secondary+0x10/0x10
[ 23.702516] common_startup_64+0x12c/0x138
[ 23.702566] </TASK>
[ 23.702582]
[ 23.723235] Allocated by task 206:
[ 23.723512] kasan_save_stack+0x3d/0x60
[ 23.723962] kasan_save_track+0x18/0x40
[ 23.724618] kasan_save_alloc_info+0x3b/0x50
[ 23.725056] __kasan_kmalloc+0xb7/0xc0
[ 23.725712] __kmalloc_cache_noprof+0x184/0x410
[ 23.726837] rcu_uaf+0xb1/0x330
[ 23.727436] kunit_try_run_case+0x1b3/0x490
[ 23.728052] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.728869] kthread+0x324/0x6d0
[ 23.729109] ret_from_fork+0x41/0x80
[ 23.729888] ret_from_fork_asm+0x1a/0x30
[ 23.730579]
[ 23.730809] Freed by task 0:
[ 23.731803] kasan_save_stack+0x3d/0x60
[ 23.732202] kasan_save_track+0x18/0x40
[ 23.732955] kasan_save_free_info+0x3f/0x60
[ 23.733217] __kasan_slab_free+0x56/0x70
[ 23.733870] kfree+0x224/0x3f0
[ 23.734428] rcu_uaf_reclaim+0x1f/0x60
[ 23.734802] rcu_core+0x680/0x1d70
[ 23.735621] rcu_core_si+0x12/0x20
[ 23.736037] handle_softirqs+0x209/0x720
[ 23.736633] __irq_exit_rcu+0xc9/0x110
[ 23.737189] irq_exit_rcu+0x12/0x20
[ 23.737592] sysvec_apic_timer_interrupt+0x81/0x90
[ 23.738495] asm_sysvec_apic_timer_interrupt+0x1f/0x30
[ 23.738991]
[ 23.739324] Last potentially related work creation:
[ 23.740325] kasan_save_stack+0x3d/0x60
[ 23.740871] kasan_record_aux_stack+0xb2/0xc0
[ 23.741127] __call_rcu_common.constprop.0+0x72/0xaa0
[ 23.742001] call_rcu+0x12/0x20
[ 23.742474] rcu_uaf+0x169/0x330
[ 23.743137] kunit_try_run_case+0x1b3/0x490
[ 23.744128] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.744620] kthread+0x324/0x6d0
[ 23.744975] ret_from_fork+0x41/0x80
[ 23.745228] ret_from_fork_asm+0x1a/0x30
[ 23.745856]
[ 23.746121] The buggy address belongs to the object at ffff888102a5cdc0
[ 23.746121] which belongs to the cache kmalloc-32 of size 32
[ 23.746785] The buggy address is located 0 bytes inside of
[ 23.746785] freed 32-byte region [ffff888102a5cdc0, ffff888102a5cde0)
[ 23.748454]
[ 23.748629] The buggy address belongs to the physical page:
[ 23.748919] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5c
[ 23.749677] flags: 0x200000000000000(node=0|zone=2)
[ 23.750351] page_type: f5(slab)
[ 23.750750] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[ 23.751659] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[ 23.752049] page dumped because: kasan: bad access detected
[ 23.752361]
[ 23.752572] Memory state around the buggy address:
[ 23.753030] ffff888102a5cc80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 23.754037] ffff888102a5cd00: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc
[ 23.755244] >ffff888102a5cd80: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[ 23.756299] ^
[ 23.756648] ffff888102a5ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.757020] ffff888102a5ce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.758030] ==================================================================
[ 25.717826] ==================================================================
[ 25.720607] BUG: KASAN: slab-use-after-free in strcmp+0xb0/0xc0
[ 25.721786] Read of size 1 at addr ffff888102a6d650 by task kunit_try_catch/267
[ 25.722360]
[ 25.722554] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 25.722670] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.722707] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.722767] Call Trace:
[ 25.722803] <TASK>
[ 25.722847] dump_stack_lvl+0x73/0xb0
[ 25.722935] print_report+0xd1/0x640
[ 25.722997] ? __virt_addr_valid+0x1db/0x2d0
[ 25.723059] ? kasan_complete_mode_report_info+0x64/0x200
[ 25.723127] kasan_report+0x102/0x140
[ 25.723199] ? strcmp+0xb0/0xc0
[ 25.723253] ? strcmp+0xb0/0xc0
[ 25.723306] __asan_report_load1_noabort+0x18/0x20
[ 25.723366] strcmp+0xb0/0xc0
[ 25.723422] kasan_strings+0x2d3/0xb60
[ 25.723475] ? __pfx_kasan_strings+0x10/0x10
[ 25.723533] ? __pfx_kasan_strings+0x10/0x10
[ 25.723586] kunit_try_run_case+0x1b3/0x490
[ 25.723727] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.723765] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 25.723801] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 25.723835] ? __kthread_parkme+0x82/0x160
[ 25.723868] ? preempt_count_sub+0x50/0x80
[ 25.723917] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.723949] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.723986] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 25.724022] kthread+0x324/0x6d0
[ 25.724052] ? trace_preempt_on+0x20/0xc0
[ 25.724084] ? __pfx_kthread+0x10/0x10
[ 25.724174] ? _raw_spin_unlock_irq+0x47/0x80
[ 25.724210] ? calculate_sigpending+0x7b/0xa0
[ 25.724242] ? __pfx_kthread+0x10/0x10
[ 25.724289] ret_from_fork+0x41/0x80
[ 25.724329] ? __pfx_kthread+0x10/0x10
[ 25.724373] ret_from_fork_asm+0x1a/0x30
[ 25.724439] </TASK>
[ 25.724462]
[ 25.741141] Allocated by task 267:
[ 25.741660] kasan_save_stack+0x3d/0x60
[ 25.742393] kasan_save_track+0x18/0x40
[ 25.742674] kasan_save_alloc_info+0x3b/0x50
[ 25.743489] __kasan_kmalloc+0xb7/0xc0
[ 25.743830] __kmalloc_cache_noprof+0x184/0x410
[ 25.744797] kasan_strings+0xb9/0xb60
[ 25.745199] kunit_try_run_case+0x1b3/0x490
[ 25.746097] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.747035] kthread+0x324/0x6d0
[ 25.747641] ret_from_fork+0x41/0x80
[ 25.747898] ret_from_fork_asm+0x1a/0x30
[ 25.748461]
[ 25.748686] Freed by task 267:
[ 25.749022] kasan_save_stack+0x3d/0x60
[ 25.749775] kasan_save_track+0x18/0x40
[ 25.750191] kasan_save_free_info+0x3f/0x60
[ 25.750831] __kasan_slab_free+0x56/0x70
[ 25.751549] kfree+0x224/0x3f0
[ 25.752794] kasan_strings+0x13c/0xb60
[ 25.753293] kunit_try_run_case+0x1b3/0x490
[ 25.753722] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.753919] kthread+0x324/0x6d0
[ 25.754049] ret_from_fork+0x41/0x80
[ 25.754438] ret_from_fork_asm+0x1a/0x30
[ 25.754850]
[ 25.755079] The buggy address belongs to the object at ffff888102a6d640
[ 25.755079] which belongs to the cache kmalloc-32 of size 32
[ 25.756113] The buggy address is located 16 bytes inside of
[ 25.756113] freed 32-byte region [ffff888102a6d640, ffff888102a6d660)
[ 25.757998]
[ 25.758266] The buggy address belongs to the physical page:
[ 25.759179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6d
[ 25.759870] flags: 0x200000000000000(node=0|zone=2)
[ 25.760686] page_type: f5(slab)
[ 25.761511] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[ 25.762311] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[ 25.762964] page dumped because: kasan: bad access detected
[ 25.763461]
[ 25.763660] Memory state around the buggy address:
[ 25.764053] ffff888102a6d500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 25.764744] ffff888102a6d580: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[ 25.765285] >ffff888102a6d600: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[ 25.766213] ^
[ 25.766525] ffff888102a6d680: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 25.767920] ffff888102a6d700: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[ 25.769794] ==================================================================
[ 25.824193] ==================================================================
[ 25.824731] BUG: KASAN: slab-use-after-free in strlen+0x8f/0xb0
[ 25.826152] Read of size 1 at addr ffff888102a6d650 by task kunit_try_catch/267
[ 25.827133]
[ 25.827799] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 25.827933] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.827969] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.828030] Call Trace:
[ 25.828070] <TASK>
[ 25.828116] dump_stack_lvl+0x73/0xb0
[ 25.828231] print_report+0xd1/0x640
[ 25.828546] ? __virt_addr_valid+0x1db/0x2d0
[ 25.828609] ? kasan_complete_mode_report_info+0x64/0x200
[ 25.828666] kasan_report+0x102/0x140
[ 25.828704] ? strlen+0x8f/0xb0
[ 25.828743] ? strlen+0x8f/0xb0
[ 25.828788] __asan_report_load1_noabort+0x18/0x20
[ 25.828834] strlen+0x8f/0xb0
[ 25.828873] kasan_strings+0x425/0xb60
[ 25.828918] ? __pfx_kasan_strings+0x10/0x10
[ 25.828971] ? __pfx_kasan_strings+0x10/0x10
[ 25.829032] kunit_try_run_case+0x1b3/0x490
[ 25.829090] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.829145] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 25.829282] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 25.829347] ? __kthread_parkme+0x82/0x160
[ 25.829399] ? preempt_count_sub+0x50/0x80
[ 25.829438] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.829471] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.829508] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 25.829545] kthread+0x324/0x6d0
[ 25.829573] ? trace_preempt_on+0x20/0xc0
[ 25.829648] ? __pfx_kthread+0x10/0x10
[ 25.829680] ? _raw_spin_unlock_irq+0x47/0x80
[ 25.829711] ? calculate_sigpending+0x7b/0xa0
[ 25.829742] ? __pfx_kthread+0x10/0x10
[ 25.829773] ret_from_fork+0x41/0x80
[ 25.829799] ? __pfx_kthread+0x10/0x10
[ 25.829830] ret_from_fork_asm+0x1a/0x30
[ 25.829875] </TASK>
[ 25.829891]
[ 25.848056] Allocated by task 267:
[ 25.849201] kasan_save_stack+0x3d/0x60
[ 25.850262] kasan_save_track+0x18/0x40
[ 25.850646] kasan_save_alloc_info+0x3b/0x50
[ 25.850969] __kasan_kmalloc+0xb7/0xc0
[ 25.851502] __kmalloc_cache_noprof+0x184/0x410
[ 25.851905] kasan_strings+0xb9/0xb60
[ 25.852470] kunit_try_run_case+0x1b3/0x490
[ 25.852796] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.854088] kthread+0x324/0x6d0
[ 25.854559] ret_from_fork+0x41/0x80
[ 25.854869] ret_from_fork_asm+0x1a/0x30
[ 25.855688]
[ 25.855844] Freed by task 267:
[ 25.856079] kasan_save_stack+0x3d/0x60
[ 25.856833] kasan_save_track+0x18/0x40
[ 25.857071] kasan_save_free_info+0x3f/0x60
[ 25.858546] __kasan_slab_free+0x56/0x70
[ 25.858865] kfree+0x224/0x3f0
[ 25.859135] kasan_strings+0x13c/0xb60
[ 25.859767] kunit_try_run_case+0x1b3/0x490
[ 25.860198] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.860594] kthread+0x324/0x6d0
[ 25.860952] ret_from_fork+0x41/0x80
[ 25.861924] ret_from_fork_asm+0x1a/0x30
[ 25.862557]
[ 25.862782] The buggy address belongs to the object at ffff888102a6d640
[ 25.862782] which belongs to the cache kmalloc-32 of size 32
[ 25.864687] The buggy address is located 16 bytes inside of
[ 25.864687] freed 32-byte region [ffff888102a6d640, ffff888102a6d660)
[ 25.865863]
[ 25.866074] The buggy address belongs to the physical page:
[ 25.867247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6d
[ 25.868132] flags: 0x200000000000000(node=0|zone=2)
[ 25.869733] page_type: f5(slab)
[ 25.870076] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[ 25.871053] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[ 25.871650] page dumped because: kasan: bad access detected
[ 25.872071]
[ 25.872538] Memory state around the buggy address:
[ 25.872873] ffff888102a6d500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 25.873438] ffff888102a6d580: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[ 25.874582] >ffff888102a6d600: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[ 25.875057] ^
[ 25.876474] ffff888102a6d680: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 25.877373] ffff888102a6d700: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[ 25.878051] ==================================================================
[ 25.879266] ==================================================================
[ 25.880109] BUG: KASAN: slab-use-after-free in strnlen+0x73/0x80
[ 25.880601] Read of size 1 at addr ffff888102a6d650 by task kunit_try_catch/267
[ 25.881625]
[ 25.882877] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 25.883004] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.883029] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.883064] Call Trace:
[ 25.883089] <TASK>
[ 25.883132] dump_stack_lvl+0x73/0xb0
[ 25.883206] print_report+0xd1/0x640
[ 25.883236] ? __virt_addr_valid+0x1db/0x2d0
[ 25.883271] ? kasan_complete_mode_report_info+0x64/0x200
[ 25.883309] kasan_report+0x102/0x140
[ 25.883349] ? strnlen+0x73/0x80
[ 25.883397] ? strnlen+0x73/0x80
[ 25.883446] __asan_report_load1_noabort+0x18/0x20
[ 25.883486] strnlen+0x73/0x80
[ 25.883516] kasan_strings+0x4c3/0xb60
[ 25.883546] ? __pfx_kasan_strings+0x10/0x10
[ 25.883577] ? __pfx_kasan_strings+0x10/0x10
[ 25.883610] kunit_try_run_case+0x1b3/0x490
[ 25.883641] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.883669] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 25.883702] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 25.883735] ? __kthread_parkme+0x82/0x160
[ 25.883765] ? preempt_count_sub+0x50/0x80
[ 25.883801] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.883831] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.883866] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 25.883915] kthread+0x324/0x6d0
[ 25.883943] ? trace_preempt_on+0x20/0xc0
[ 25.883976] ? __pfx_kthread+0x10/0x10
[ 25.884006] ? _raw_spin_unlock_irq+0x47/0x80
[ 25.884037] ? calculate_sigpending+0x7b/0xa0
[ 25.884067] ? __pfx_kthread+0x10/0x10
[ 25.884097] ret_from_fork+0x41/0x80
[ 25.884123] ? __pfx_kthread+0x10/0x10
[ 25.884152] ret_from_fork_asm+0x1a/0x30
[ 25.884248] </TASK>
[ 25.884296]
[ 25.897511] Allocated by task 267:
[ 25.897960] kasan_save_stack+0x3d/0x60
[ 25.898575] kasan_save_track+0x18/0x40
[ 25.899001] kasan_save_alloc_info+0x3b/0x50
[ 25.899673] __kasan_kmalloc+0xb7/0xc0
[ 25.900097] __kmalloc_cache_noprof+0x184/0x410
[ 25.900569] kasan_strings+0xb9/0xb60
[ 25.900957] kunit_try_run_case+0x1b3/0x490
[ 25.902154] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.902831] kthread+0x324/0x6d0
[ 25.903123] ret_from_fork+0x41/0x80
[ 25.903680] ret_from_fork_asm+0x1a/0x30
[ 25.904017]
[ 25.904236] Freed by task 267:
[ 25.904632] kasan_save_stack+0x3d/0x60
[ 25.905018] kasan_save_track+0x18/0x40
[ 25.905618] kasan_save_free_info+0x3f/0x60
[ 25.906049] __kasan_slab_free+0x56/0x70
[ 25.907122] kfree+0x224/0x3f0
[ 25.907502] kasan_strings+0x13c/0xb60
[ 25.907908] kunit_try_run_case+0x1b3/0x490
[ 25.908225] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.908546] kthread+0x324/0x6d0
[ 25.908788] ret_from_fork+0x41/0x80
[ 25.909033] ret_from_fork_asm+0x1a/0x30
[ 25.909692]
[ 25.909922] The buggy address belongs to the object at ffff888102a6d640
[ 25.909922] which belongs to the cache kmalloc-32 of size 32
[ 25.911181] The buggy address is located 16 bytes inside of
[ 25.911181] freed 32-byte region [ffff888102a6d640, ffff888102a6d660)
[ 25.912979]
[ 25.913391] The buggy address belongs to the physical page:
[ 25.913910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6d
[ 25.915460] flags: 0x200000000000000(node=0|zone=2)
[ 25.915946] page_type: f5(slab)
[ 25.916289] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[ 25.916738] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[ 25.917106] page dumped because: kasan: bad access detected
[ 25.918969]
[ 25.919241] Memory state around the buggy address:
[ 25.919911] ffff888102a6d500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 25.921458] ffff888102a6d580: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[ 25.921875] >ffff888102a6d600: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[ 25.922468] ^
[ 25.922958] ffff888102a6d680: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 25.923756] ffff888102a6d700: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[ 25.924482] ==================================================================
[ 23.768432] ==================================================================
[ 23.769488] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x4d8/0x560
[ 23.769962] Read of size 8 at addr ffff888102a5ce80 by task kunit_try_catch/208
[ 23.770700]
[ 23.770866] CPU: 1 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 23.770970] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 23.771000] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 23.771048] Call Trace:
[ 23.771188] <TASK>
[ 23.771240] dump_stack_lvl+0x73/0xb0
[ 23.771320] print_report+0xd1/0x640
[ 23.771372] ? __virt_addr_valid+0x1db/0x2d0
[ 23.771432] ? kasan_complete_mode_report_info+0x64/0x200
[ 23.771501] kasan_report+0x102/0x140
[ 23.771551] ? workqueue_uaf+0x4d8/0x560
[ 23.771605] ? workqueue_uaf+0x4d8/0x560
[ 23.771661] __asan_report_load8_noabort+0x18/0x20
[ 23.771755] workqueue_uaf+0x4d8/0x560
[ 23.771819] ? __pfx_workqueue_uaf+0x10/0x10
[ 23.771869] ? __schedule+0xcdc/0x2830
[ 23.771936] ? __pfx_read_tsc+0x10/0x10
[ 23.771989] ? ktime_get_ts64+0x86/0x230
[ 23.772053] kunit_try_run_case+0x1b3/0x490
[ 23.772148] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.772229] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 23.772336] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 23.772399] ? __kthread_parkme+0x82/0x160
[ 23.772455] ? preempt_count_sub+0x50/0x80
[ 23.772514] ? __pfx_kunit_try_run_case+0x10/0x10
[ 23.772562] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.772620] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 23.772684] kthread+0x324/0x6d0
[ 23.772734] ? trace_preempt_on+0x20/0xc0
[ 23.772834] ? __pfx_kthread+0x10/0x10
[ 23.772895] ? _raw_spin_unlock_irq+0x47/0x80
[ 23.772952] ? calculate_sigpending+0x7b/0xa0
[ 23.773005] ? __pfx_kthread+0x10/0x10
[ 23.773054] ret_from_fork+0x41/0x80
[ 23.773135] ? __pfx_kthread+0x10/0x10
[ 23.773220] ret_from_fork_asm+0x1a/0x30
[ 23.773382] </TASK>
[ 23.773469]
[ 23.788679] Allocated by task 208:
[ 23.789068] kasan_save_stack+0x3d/0x60
[ 23.789725] kasan_save_track+0x18/0x40
[ 23.790182] kasan_save_alloc_info+0x3b/0x50
[ 23.790759] __kasan_kmalloc+0xb7/0xc0
[ 23.791152] __kmalloc_cache_noprof+0x184/0x410
[ 23.791684] workqueue_uaf+0x153/0x560
[ 23.794904] kunit_try_run_case+0x1b3/0x490
[ 23.796387] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.797872] kthread+0x324/0x6d0
[ 23.798584] ret_from_fork+0x41/0x80
[ 23.800065] ret_from_fork_asm+0x1a/0x30
[ 23.801005]
[ 23.802699] Freed by task 42:
[ 23.803581] kasan_save_stack+0x3d/0x60
[ 23.804949] kasan_save_track+0x18/0x40
[ 23.805472] kasan_save_free_info+0x3f/0x60
[ 23.805731] __kasan_slab_free+0x56/0x70
[ 23.805964] kfree+0x224/0x3f0
[ 23.806765] workqueue_uaf_work+0x12/0x20
[ 23.808334] process_one_work+0x5ee/0xf60
[ 23.808937] worker_thread+0x720/0x1300
[ 23.809758] kthread+0x324/0x6d0
[ 23.810050] ret_from_fork+0x41/0x80
[ 23.810695] ret_from_fork_asm+0x1a/0x30
[ 23.811109]
[ 23.811358] Last potentially related work creation:
[ 23.812370] kasan_save_stack+0x3d/0x60
[ 23.813025] kasan_record_aux_stack+0xb2/0xc0
[ 23.813318] __queue_work+0x626/0xe60
[ 23.813944] queue_work_on+0x74/0xa0
[ 23.814635] workqueue_uaf+0x26e/0x560
[ 23.815537] kunit_try_run_case+0x1b3/0x490
[ 23.815853] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 23.816557] kthread+0x324/0x6d0
[ 23.816850] ret_from_fork+0x41/0x80
[ 23.817671] ret_from_fork_asm+0x1a/0x30
[ 23.818252]
[ 23.818616] The buggy address belongs to the object at ffff888102a5ce80
[ 23.818616] which belongs to the cache kmalloc-32 of size 32
[ 23.819831] The buggy address is located 0 bytes inside of
[ 23.819831] freed 32-byte region [ffff888102a5ce80, ffff888102a5cea0)
[ 23.820738]
[ 23.820897] The buggy address belongs to the physical page:
[ 23.821791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5c
[ 23.823151] flags: 0x200000000000000(node=0|zone=2)
[ 23.823867] page_type: f5(slab)
[ 23.824110] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[ 23.825146] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[ 23.825998] page dumped because: kasan: bad access detected
[ 23.826554]
[ 23.826770] Memory state around the buggy address:
[ 23.827196] ffff888102a5cd80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 23.827753] ffff888102a5ce00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[ 23.828238] >ffff888102a5ce80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.828587] ^
[ 23.828874] ffff888102a5cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.829766] ffff888102a5cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 23.830432] ==================================================================
[ 21.700794] ==================================================================
[ 21.701773] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2f3/0x340
[ 21.702448] Read of size 1 at addr ffff888102910000 by task kunit_try_catch/156
[ 21.703480]
[ 21.704394] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 21.704516] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 21.704548] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 21.704581] Call Trace:
[ 21.704599] <TASK>
[ 21.704625] dump_stack_lvl+0x73/0xb0
[ 21.704678] print_report+0xd1/0x640
[ 21.704708] ? __virt_addr_valid+0x1db/0x2d0
[ 21.704740] ? kasan_addr_to_slab+0x11/0xa0
[ 21.704775] kasan_report+0x102/0x140
[ 21.704800] ? kmalloc_large_uaf+0x2f3/0x340
[ 21.704832] ? kmalloc_large_uaf+0x2f3/0x340
[ 21.704870] __asan_report_load1_noabort+0x18/0x20
[ 21.704901] kmalloc_large_uaf+0x2f3/0x340
[ 21.704931] ? __pfx_kmalloc_large_uaf+0x10/0x10
[ 21.704966] ? __pfx_kmalloc_large_uaf+0x10/0x10
[ 21.705003] kunit_try_run_case+0x1b3/0x490
[ 21.705034] ? __pfx_kunit_try_run_case+0x10/0x10
[ 21.705061] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 21.705099] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 21.705236] ? __kthread_parkme+0x82/0x160
[ 21.705314] ? preempt_count_sub+0x50/0x80
[ 21.705383] ? __pfx_kunit_try_run_case+0x10/0x10
[ 21.705462] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 21.705520] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 21.705558] kthread+0x324/0x6d0
[ 21.705587] ? trace_preempt_on+0x20/0xc0
[ 21.705620] ? __pfx_kthread+0x10/0x10
[ 21.705649] ? _raw_spin_unlock_irq+0x47/0x80
[ 21.705681] ? calculate_sigpending+0x7b/0xa0
[ 21.705711] ? __pfx_kthread+0x10/0x10
[ 21.705741] ret_from_fork+0x41/0x80
[ 21.705767] ? __pfx_kthread+0x10/0x10
[ 21.705797] ret_from_fork_asm+0x1a/0x30
[ 21.705841] </TASK>
[ 21.705858]
[ 21.724026] The buggy address belongs to the physical page:
[ 21.724402] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102910
[ 21.724814] flags: 0x200000000000000(node=0|zone=2)
[ 21.725919] raw: 0200000000000000 ffffea00040a4508 ffff88815b13f040 0000000000000000
[ 21.726980] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[ 21.728122] page dumped because: kasan: bad access detected
[ 21.728682]
[ 21.729062] Memory state around the buggy address:
[ 21.729468] ffff88810290ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 21.730188] ffff88810290ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 21.730968] >ffff888102910000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 21.731465] ^
[ 21.731985] ffff888102910080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 21.732775] ffff888102910100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 21.733472] ==================================================================
[ 25.145241] ==================================================================
[ 25.146260] BUG: KASAN: use-after-free in mempool_uaf_helper+0x394/0x400
[ 25.147252] Read of size 1 at addr ffff888102d68000 by task kunit_try_catch/241
[ 25.148346]
[ 25.148622] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.13.0 #1
[ 25.148756] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 25.148793] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 25.148853] Call Trace:
[ 25.148893] <TASK>
[ 25.148942] dump_stack_lvl+0x73/0xb0
[ 25.149142] print_report+0xd1/0x640
[ 25.149219] ? __virt_addr_valid+0x1db/0x2d0
[ 25.149259] ? kasan_addr_to_slab+0x11/0xa0
[ 25.149297] kasan_report+0x102/0x140
[ 25.149323] ? mempool_uaf_helper+0x394/0x400
[ 25.149358] ? mempool_uaf_helper+0x394/0x400
[ 25.149393] __asan_report_load1_noabort+0x18/0x20
[ 25.149426] mempool_uaf_helper+0x394/0x400
[ 25.149457] ? __pfx_mempool_uaf_helper+0x10/0x10
[ 25.149492] ? finish_task_switch.isra.0+0x153/0x700
[ 25.149533] mempool_page_alloc_uaf+0xb1/0x100
[ 25.149566] ? __pfx_mempool_page_alloc_uaf+0x10/0x10
[ 25.149619] ? __switch_to+0x5d9/0xf60
[ 25.149661] ? __pfx_mempool_alloc_pages+0x10/0x10
[ 25.149698] ? __pfx_mempool_free_pages+0x10/0x10
[ 25.149735] ? __pfx_read_tsc+0x10/0x10
[ 25.149767] ? ktime_get_ts64+0x86/0x230
[ 25.149802] kunit_try_run_case+0x1b3/0x490
[ 25.149836] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.149865] ? _raw_spin_lock_irqsave+0xa2/0x110
[ 25.149901] ? _raw_spin_unlock_irqrestore+0x5f/0x90
[ 25.149934] ? __kthread_parkme+0x82/0x160
[ 25.149967] ? preempt_count_sub+0x50/0x80
[ 25.150002] ? __pfx_kunit_try_run_case+0x10/0x10
[ 25.150033] kunit_generic_run_threadfn_adapter+0x85/0xf0
[ 25.150068] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[ 25.150105] kthread+0x324/0x6d0
[ 25.150133] ? trace_preempt_on+0x20/0xc0
[ 25.150193] ? __pfx_kthread+0x10/0x10
[ 25.150241] ? _raw_spin_unlock_irq+0x47/0x80
[ 25.150293] ? calculate_sigpending+0x7b/0xa0
[ 25.150345] ? __pfx_kthread+0x10/0x10
[ 25.150401] ret_from_fork+0x41/0x80
[ 25.150453] ? __pfx_kthread+0x10/0x10
[ 25.150512] ret_from_fork_asm+0x1a/0x30
[ 25.150600] </TASK>
[ 25.150635]
[ 25.169765] The buggy address belongs to the physical page:
[ 25.170575] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d68
[ 25.171400] flags: 0x200000000000000(node=0|zone=2)
[ 25.171753] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[ 25.172568] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 25.173487] page dumped because: kasan: bad access detected
[ 25.174062]
[ 25.174536] Memory state around the buggy address:
[ 25.174994] ffff888102d67f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 25.175867] ffff888102d67f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 25.176945] >ffff888102d68000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 25.177710] ^
[ 25.177940] ffff888102d68080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 25.178675] ffff888102d68100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 25.179713] ==================================================================
------------[ cut here ]------------
[ 4.016815] xhci-hcd xhci-hcd.1.auto: xHCI Host Controller
[ 4.019866] WARNING: CPU: 1 PID: 23 at kernel/smp.c:815 smp_call_function_many_cond+0x554/0x5dc
[ 4.025451] xhci-hcd xhci-hcd.1.auto: new USB bus registered, assigned bus number 1
[ 4.034149] Modules linked in:
[ 4.044921] CPU: 1 UID: 0 PID: 23 Comm: ksoftirqd/1 Not tainted 6.13.0 #1
[ 4.044921] Hardware name: Generic DRA74X (Flattened Device Tree)
[ 4.044952] Call trace:
[ 4.044952] unwind_backtrace from show_stack+0x10/0x14
[ 4.044952] show_stack from dump_stack_lvl+0x54/0x68
[ 4.044982] dump_stack_lvl from __warn+0x7c/0x128
[ 4.044982] __warn from warn_slowpath_fmt+0x184/0x18c
[ 4.045013] warn_slowpath_fmt from smp_call_function_many_cond+0x554/0x5dc
[ 4.045013] smp_call_function_many_cond from smp_call_function+0x2c/0x34
[ 4.045013] smp_call_function from set_memory_valid+0x7c/0xbc
[ 4.045043] set_memory_valid from kfence_guarded_free+0x168/0x300
[ 4.045043] kfence_guarded_free from rcu_core+0x2b8/0x964
[ 4.045074] rcu_core from handle_softirqs+0x108/0x344
[ 4.045074] handle_softirqs from run_ksoftirqd+0x30/0x3c
[ 4.045104] run_ksoftirqd from smpboot_thread_fn+0xb8/0x154
[ 4.045104] smpboot_thread_fn from kthread+0xf8/0x248
[ 4.045135] kthread from ret_from_fork+0x14/0x38
[ 4.045135] Exception stack(0xf0069fb0 to 0xf0069ff8)
[ 4.045135] 9fa0: 00000000 00000000 00000000 00000000
[ 4.045135] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 4.045166] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 4.045166] ---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
[ 4.016815] xhci-hcd xhci-hcd.1.auto: xHCI Host Controller
[ 4.019866] WARNING: CPU: 1 PID: 23 at kernel/smp.c:815 smp_call_function_many_cond+0x554/0x5dc
[ 4.025451] xhci-hcd xhci-hcd.1.auto: new USB bus registered, assigned bus number 1
[ 4.034149] Modules linked in:
[ 4.044921] CPU: 1 UID: 0 PID: 23 Comm: ksoftirqd/1 Not tainted 6.13.0 #1
[ 4.044921] Hardware name: Generic DRA74X (Flattened Device Tree)
[ 4.044952] Call trace:
[ 4.044952] unwind_backtrace from show_stack+0x10/0x14
[ 4.044952] show_stack from dump_stack_lvl+0x54/0x68
[ 4.044982] dump_stack_lvl from __warn+0x7c/0x128
[ 4.044982] __warn from warn_slowpath_fmt+0x184/0x18c
[ 4.045013] warn_slowpath_fmt from smp_call_function_many_cond+0x554/0x5dc
[ 4.045013] smp_call_function_many_cond from smp_call_function+0x2c/0x34
[ 4.045013] smp_call_function from set_memory_valid+0x7c/0xbc
[ 4.045043] set_memory_valid from kfence_guarded_free+0x168/0x300
[ 4.045043] kfence_guarded_free from rcu_core+0x2b8/0x964
[ 4.045074] rcu_core from handle_softirqs+0x108/0x344
[ 4.045074] handle_softirqs from run_ksoftirqd+0x30/0x3c
[ 4.045104] run_ksoftirqd from smpboot_thread_fn+0xb8/0x154
[ 4.045104] smpboot_thread_fn from kthread+0xf8/0x248
[ 4.045135] kthread from ret_from_fork+0x14/0x38
[ 4.045135] Exception stack(0xf0069fb0 to 0xf0069ff8)
[ 4.045135] 9fa0: 00000000 00000000 00000000 00000000
[ 4.045135] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 4.045166] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 4.045166] ---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
[ 7.457641] WARNING: CPU: 1 PID: 164 at kernel/smp.c:815 smp_call_function_many_cond+0x564/0x5e8
[ 7.466522] Modules linked in:
[ 7.466522] CPU: 1 UID: 0 PID: 164 Comm: udevadm Not tainted 6.13.0 #1
[ 7.466552] Hardware name: Generic DRA74X (Flattened Device Tree)
[ 7.466552] Call trace:
[ 7.466552] unwind_backtrace from show_stack+0x18/0x1c
[ 7.466583] show_stack from dump_stack_lvl+0x6c/0x8c
[ 7.466583] dump_stack_lvl from __warn+0x84/0x130
[ 7.466583] __warn from warn_slowpath_fmt+0x18c/0x194
[ 7.466613] warn_slowpath_fmt from smp_call_function_many_cond+0x564/0x5e8
[ 7.466613] smp_call_function_many_cond from smp_call_function+0x34/0x3c
[ 7.466644] smp_call_function from set_memory_valid+0x84/0xc0
[ 7.466644] set_memory_valid from kfence_guarded_free+0x170/0x2dc
[ 7.466674] kfence_guarded_free from kmem_cache_free+0x364/0x424
[ 7.466674] kmem_cache_free from rcu_core+0x2d8/0x9fc
[ 7.466705] rcu_core from handle_softirqs+0x14c/0x3d0
[ 7.466705] handle_softirqs from __irq_exit_rcu+0xa0/0x114
[ 7.466705] __irq_exit_rcu from irq_exit+0x10/0x30
[ 7.466735] irq_exit from call_with_stack+0x18/0x20
[ 7.466735] call_with_stack from __irq_usr+0x84/0xa0
[ 7.466766] Exception stack(0xf2031fb0 to 0xf2031ff8)
[ 7.466766] 1fa0: 00000000 b6eb7758 00001800 000007ff
[ 7.466766] 1fc0: beaba4d8 beaba700 00001000 00554ac8 00000009 beaba680 beaba690 beaba770
[ 7.466766] 1fe0: 0000018d beaba450 b6e53afb b6e53afa 200f0030 ffffffff
[ 7.466796] ---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
[ 50.517974] WARNING: CPU: 0 PID: 467 at mm/util.c:674 __kvmalloc_node_noprof+0x11c/0x124
[ 50.519867] Modules linked in: sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 drm fuse backlight ip_tables x_tables
[ 50.523421] CPU: 0 UID: 0 PID: 467 Comm: unshare_test Not tainted 6.13.0 #1
[ 50.524644] Hardware name: linux,dummy-virt (DT)
[ 50.525480] pstate: 23402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[ 50.526561] pc : __kvmalloc_node_noprof+0x11c/0x124
[ 50.527168] lr : __kvmalloc_node_noprof+0x50/0x124
[ 50.527709] sp : ffff800080a5bce0
[ 50.528133] x29: ffff800080a5bcf0 x28: fff8c01d0539ca00 x27: 0000000000000000
[ 50.528978] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[ 50.529422] x23: 0000000080001000 x22: 5bbf9f0bef15edd0 x21: 0000000200001e00
[ 50.531124] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[ 50.531907] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 50.532741] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 50.534243] x11: 0000000000000040 x10: ca8da65740b0ce00 x9 : ca8da65740b0ce00
[ 50.535341] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000000
[ 50.536069] x5 : 0000000000000000 x4 : ffff800080a5bcb0 x3 : 0000000000000000
[ 50.536613] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[ 50.538462] Call trace:
[ 50.538987] __kvmalloc_node_noprof+0x11c/0x124 (P)
[ 50.539693] alloc_fdtable+0x74/0x118
[ 50.541148] expand_files+0x114/0x2e0
[ 50.542193] ksys_dup3+0x64/0xe8
[ 50.542675] __arm64_sys_dup3+0x20/0x30
[ 50.544059] invoke_syscall+0x40/0xf8
[ 50.544324] el0_svc_common+0xa8/0xd8
[ 50.544572] do_el0_svc+0x1c/0x28
[ 50.544806] el0_svc+0x38/0x68
[ 50.545065] el0t_64_sync_handler+0x78/0x108
[ 50.545350] el0t_64_sync+0x198/0x19c
[ 50.546055] ---[ end trace 0000000000000000 ]---
[ 150.594640] BUG: scheduling while atomic: kworker/u8:1/13/0x00000003
[ 150.594640] BUG: scheduling while atomic: kworker/u8:1/13/0x00000003
[ 71.265438] BUG: scheduling while atomic: systemd-journal/114/0x00000003
[ 71.265438] BUG: scheduling while atomic: systemd-journal/114/0x00000003
[ 128.148792] BUG: scheduling while atomic: cron/180/0x00000003
[ 128.148792] BUG: scheduling while atomic: cron/180/0x00000003
[ 75.214022] BUG: scheduling while atomic: ftrace_stress_t/326/0x00000003
[ 75.372568] BUG: scheduling while atomic: ftrace_stress_t/304/0x00000003
[ 75.214022] BUG: scheduling while atomic: ftrace_stress_t/326/0x00000003
---
[ 75.372568] BUG: scheduling while atomic: ftrace_stress_t/304/0x00000003
[ 75.424578] BUG: scheduling while atomic: kcompactd0/39/0x00000003
[ 75.424578] BUG: scheduling while atomic: kcompactd0/39/0x00000003
[ 121.946927] BUG: scheduling while atomic: khungtaskd/36/0x00000003
[ 121.946927] BUG: scheduling while atomic: khungtaskd/36/0x00000003
[ 75.334959] BUG: scheduling while atomic: ksoftirqd/0/16/0x00000003
[ 75.334959] BUG: scheduling while atomic: ksoftirqd/0/16/0x00000003
[ 75.355282] BUG: scheduling while atomic: kworker/0:1/10/0x00000003
[ 75.355282] BUG: scheduling while atomic: kworker/0:1/10/0x00000003
[ 77.369797] BUG: scheduling while atomic: kworker/u9:3/119/0x00000003
[ 77.369797] BUG: scheduling while atomic: kworker/u9:3/119/0x00000003
[ 75.118753] BUG: scheduling while atomic: migration/0/20/0x00000003
[ 75.118753] BUG: scheduling while atomic: migration/0/20/0x00000003
[ 75.509950] BUG: scheduling while atomic: rcu_sched/17/0x00000003
[ 75.509950] BUG: scheduling while atomic: rcu_sched/17/0x00000003
[ 75.237725] BUG: scheduling while atomic: sh/324/0x00000003
[ 75.515748] BUG: scheduling while atomic: sh/325/0x00000003
[ 75.260748] BUG: scheduling while atomic: sh/319/0x00000003
[ 75.237725] BUG: scheduling while atomic: sh/324/0x00000003
---
[ 75.515748] BUG: scheduling while atomic: sh/325/0x00000003
---
[ 75.260748] BUG: scheduling while atomic: sh/319/0x00000003
[ 75.283727] BUG: scheduling while atomic: swapper/0/0/0x00000003
[ 75.283727] BUG: scheduling while atomic: swapper/0/0/0x00000003
[ 145.963182] BUG: scheduling while atomic: systemd-udevd/157/0x00000003
[ 145.963182] BUG: scheduling while atomic: systemd-udevd/157/0x00000003
[ 75.135108] BUG: scheduling while atomic: tee/268/0x00000003
[ 75.135108] BUG: scheduling while atomic: tee/268/0x00000003
[ 75.388578] BUG: scheduling while atomic: tst_sleep/322/0x00000003
[ 75.388578] BUG: scheduling while atomic: tst_sleep/322/0x00000003
------------[ cut here ]------------
[ 45.706594] WARNING: CPU: 1 PID: 481 at mm/util.c:674 __kvmalloc_node_noprof+0xdf/0xf0
[ 45.708236] Modules linked in:
[ 45.709348] CPU: 1 UID: 0 PID: 481 Comm: unshare_test Not tainted 6.13.0 #1
[ 45.710219] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 45.711531] RIP: 0010:__kvmalloc_node_noprof+0xdf/0xf0
[ 45.712235] Code: 89 f0 ff 75 08 53 68 00 04 00 00 e8 9b 38 04 00 48 83 c4 18 5b 41 5e 41 5f 5d c3 cc cc cc cc cc 41 f7 c6 00 20 00 00 75 81 90 <0f> 0b 90 31 c0 eb e3 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90
[ 45.713612] RSP: 0018:ffff9b16c0677db8 EFLAGS: 00010246
[ 45.714284] RAX: 0000000000000004 RBX: 00000000ffffffff RCX: 0000000400000000
[ 45.714538] RDX: 0000000200001e00 RSI: 0000000000000000 RDI: ffffffffac469e38
[ 45.714772] RBP: ffff9b16c0677dd0 R08: 0000000000412cc0 R09: 00000000ffffffff
[ 45.715019] R10: 0000000000000000 R11: 0000000000000000 R12: 00000000400003c0
[ 45.715289] R13: 00000000400003c0 R14: 0000000000400cc0 R15: 0000000200001e00
[ 45.715624] FS: 00007f519697a740(0000) GS:ffff8bd17bd00000(0000) knlGS:0000000000000000
[ 45.715906] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 45.716272] CR2: 00007f51969f79e0 CR3: 000000010442c000 CR4: 00000000000006f0
[ 45.717753] Call Trace:
[ 45.719038] <TASK>
[ 45.719924] ? show_regs+0x5d/0x70
[ 45.720401] ? __warn+0xcf/0x1d0
[ 45.720773] ? __kvmalloc_node_noprof+0xdf/0xf0
[ 45.721401] ? report_bug+0x14c/0x1f0
[ 45.721715] ? handle_bug+0x67/0x90
[ 45.722181] ? exc_invalid_op+0x1f/0x50
[ 45.722541] ? asm_exc_invalid_op+0x1f/0x30
[ 45.722982] ? __kvmalloc_node_noprof+0x48/0xf0
[ 45.723460] ? __kvmalloc_node_noprof+0xdf/0xf0
[ 45.723994] ? __kvmalloc_node_noprof+0x48/0xf0
[ 45.724447] alloc_fdtable+0x7b/0x120
[ 45.725186] expand_files+0x114/0x300
[ 45.725550] ? do_prlimit+0x11d/0x160
[ 45.726052] ? sysvec_apic_timer_interrupt+0x4a/0x90
[ 45.726561] ksys_dup3+0x71/0xd0
[ 45.726926] __x64_sys_dup2+0x1e/0x80
[ 45.727259] x64_sys_call+0x8cf/0x2f50
[ 45.727706] do_syscall_64+0xd0/0x1a0
[ 45.728115] ? exc_page_fault+0x68/0xc0
[ 45.728495] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 45.729281] RIP: 0033:0x7f5196a72c17
[ 45.730179] Code: 73 01 c3 48 8b 0d 09 62 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 21 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 d9 61 0e 00 f7 d8 64 89 02 b8
[ 45.731696] RSP: 002b:00007ffd8a6aedf8 EFLAGS: 00000202 ORIG_RAX: 0000000000000021
[ 45.732502] RAX: ffffffffffffffda RBX: 00007ffd8a6af658 RCX: 00007f5196a72c17
[ 45.733203] RDX: 00007ffd8a6aef78 RSI: 0000000040000038 RDI: 0000000000000002
[ 45.734116] RBP: 00007ffd8a6af010 R08: 0000000000000064 R09: 0000000000000000
[ 45.734740] R10: 00007f519698f170 R11: 0000000000000202 R12: 0000000000000000
[ 45.735424] R13: 00007ffd8a6af668 R14: 00007f5196bae000 R15: 000055b6fc79ecf8
[ 45.736193] </TASK>
[ 45.736705] ---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
[ 201.670641] WARNING: CPU: 0 PID: 1461 at mm/util.c:674 __kvmalloc_node_noprof+0x11c/0x124
[ 201.671374] Modules linked in: brcmfmac brcmutil cfg80211 hantro_vpu snd_soc_hdmi_codec dw_hdmi_cec dw_hdmi_i2s_audio v4l2_h264 v4l2_vp9 v4l2_jpeg hci_uart btqca v4l2_mem2mem rockchipdrm btbcm videobuf2_v4l2 videodev bluetooth dw_mipi_dsi snd_soc_audio_graph_card snd_soc_simple_card panfrost dw_hdmi_qp videobuf2_dma_contig snd_soc_spdif_tx reset_gpio snd_soc_simple_card_utils analogix_dp ecdh_generic gpu_sched dw_hdmi cec ecc drm_shmem_helper videobuf2_memops drm_display_helper phy_rockchip_pcie rtc_rk808 rfkill drm_dma_helper videobuf2_common snd_soc_es8316 drm_client_lib pwrseq_core snd_soc_rockchip_i2s mc drm_kms_helper rockchip_saradc coresight_cpu_debug industrialio_triggered_buffer coresight rockchip_thermal kfifo_buf pcie_rockchip_host fuse drm backlight ip_tables x_tables
[ 201.677538] CPU: 0 UID: 0 PID: 1461 Comm: unshare_test Not tainted 6.13.0 #1
[ 201.678162] Hardware name: Radxa ROCK Pi 4B (DT)
[ 201.678570] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 201.679184] pc : __kvmalloc_node_noprof+0x11c/0x124
[ 201.679623] lr : __kvmalloc_node_noprof+0x50/0x124
[ 201.680050] sp : ffff800084eabce0
[ 201.680344] x29: ffff800084eabcf0 x28: ffff000006732500 x27: 0000000000000000
[ 201.680980] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[ 201.681613] x23: 0000000080000000 x22: ffff80008035edd0 x21: 0000000200001e00
[ 201.682245] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[ 201.682876] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 201.683508] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000739
[ 201.684141] x11: 0000000000000040 x10: f088a89d0f402300 x9 : f088a89d0f402300
[ 201.684773] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000000
[ 201.685405] x5 : 0000000000000000 x4 : ffff800084eabcb0 x3 : 0000000000000000
[ 201.686036] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[ 201.686668] Call trace:
[ 201.686888] __kvmalloc_node_noprof+0x11c/0x124 (P)
[ 201.687328] alloc_fdtable+0x74/0x118
[ 201.687659] expand_files+0x114/0x2e0
[ 201.687987] ksys_dup3+0x64/0xe8
[ 201.688278] __arm64_sys_dup3+0x20/0x30
[ 201.688620] invoke_syscall+0x40/0xf8
[ 201.688948] el0_svc_common+0xa8/0xd8
[ 201.689275] do_el0_svc+0x1c/0x28
[ 201.689571] el0_svc+0x38/0x68
[ 201.689850] el0t_64_sync_handler+0x78/0x108
[ 201.690231] el0t_64_sync+0x198/0x19c
[ 201.690560] ---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
[ 248.169216] WARNING: CPU: 0 PID: 1461 at mm/util.c:674 __kvmalloc_node_noprof+0x138/0x148
[ 248.169945] Modules linked in: brcmfmac brcmutil cfg80211 hci_uart btqca btbcm bluetooth ecdh_generic ecc snd_soc_simple_card snd_soc_audio_graph_card snd_soc_simple_card_utils rfkill snd_soc_hdmi_codec dw_hdmi_cec dw_hdmi_i2s_audio rockchipdrm dw_hdmi_qp analogix_dp dw_mipi_dsi dw_hdmi hantro_vpu v4l2_vp9 v4l2_h264 v4l2_jpeg v4l2_mem2mem panfrost snd_soc_spdif_tx videobuf2_dma_contig reset_gpio cec videobuf2_memops drm_shmem_helper videobuf2_v4l2 drm_display_helper gpu_sched phy_rockchip_pcie videodev videobuf2_common snd_soc_rockchip_i2s snd_soc_es8316 rtc_rk808 rockchip_saradc pwrseq_core mc drm_client_lib industrialio_triggered_buffer drm_dma_helper kfifo_buf rockchip_thermal drm_kms_helper coresight_cpu_debug pcie_rockchip_host coresight drm fuse backlight ip_tables x_tables
[ 248.176107] CPU: 0 UID: 0 PID: 1461 Comm: unshare_test Not tainted 6.13.0 #1
[ 248.176728] Hardware name: Radxa ROCK Pi 4B (DT)
[ 248.177134] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 248.177745] pc : __kvmalloc_node_noprof+0x138/0x148
[ 248.178179] lr : __kvmalloc_node_noprof+0x64/0x148
[ 248.178604] sp : ffff800084f73cd0
[ 248.178896] x29: ffff800084f73ce0 x28: ffff00000182a500 x27: 0000000000000000
[ 248.179528] x26: 0000000000000000 x25: 0000000000000000 x24: ffff000001801e40
[ 248.180159] x23: ffff000001801ec0 x22: ffff80008033990c x21: 0000000200001e00
[ 248.180791] x20: 00000000ffffffff x19: 0000000000400cc0 x18: 0000000000000000
[ 248.181423] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 248.182053] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 248.182685] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[ 248.183316] x8 : 0000000000000001 x7 : 0000000000000001 x6 : 0000000000000005
[ 248.183947] x5 : 0000000000000000 x4 : ffff00000182a500 x3 : 0000000000000000
[ 248.184578] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[ 248.185209] Call trace:
[ 248.185428] __kvmalloc_node_noprof+0x138/0x148 (P)
[ 248.185863] alloc_fdtable+0x84/0x128
[ 248.186192] expand_files+0x74/0x2e4
[ 248.186511] ksys_dup3+0x60/0x120
[ 248.186808] __arm64_sys_dup3+0x20/0x30
[ 248.187149] invoke_syscall+0x48/0x10c
[ 248.187488] el0_svc_common.constprop.0+0x40/0xe0
[ 248.187908] do_el0_svc+0x1c/0x28
[ 248.188207] el0_svc+0x30/0xcc
[ 248.188486] el0t_64_sync_handler+0x10c/0x138
[ 248.188874] el0t_64_sync+0x198/0x19c
[ 248.189203] ---[ end trace 0000000000000000 ]---
[ 3.838256] Internal error: Oops - undefined instruction: 0 [#1] SMP ARM
[ 3.845001] Modules linked in:
[ 3.848083] CPU: 1 UID: 0 PID: 45 Comm: kworker/u10:2 Not tainted 6.13.0 #1
[ 3.855102] Hardware name: Generic DRA74X (Flattened Device Tree)
[ 3.861206] Workqueue: events_unbound deferred_probe_work_func
[ 3.867095] PC is at edma_probe+0x1024/0x1034
[ 3.871459] LR is at devm_kmalloc+0xdc/0x118
[ 3.875762] pc : [<c0c1c014>] lr : [<c0df681c>] psr: 60000013
[ 3.882080] sp : f0105970 ip : 00070007 fp : efcd56f0
[ 3.887329] r10: c3cd8810 r9 : 00000003 r8 : c3cd8800
[ 3.892578] r7 : 00000002 r6 : c23d3b84 r5 : c2f31440 r4 : 00000001
[ 3.899139] r3 : 00000001 r2 : 00000002 r1 : 00000002 r0 : c398f8c0
[ 3.905700] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user
[ 3.912872] Control: 30c5387d Table: 80203000 DAC: 55555555
[ 3.918640] Register r0 information: slab kmalloc-rnd-11-128 start c398f880 pointer offset 64 size 128
[ 3.928039] Register r1 information: non-paged memory
[ 3.933105] Register r2 information: non-paged memory
[ 3.938201] Register r3 information: non-paged memory
[ 3.943267] Register r4 information: non-paged memory
[ 3.948364] Register r5 information: slab kmalloc-rnd-06-512 start c2f31400 pointer offset 64 size 512
[ 3.957733] Register r6 information: non-slab/vmalloc memory
[ 3.963409] Register r7 information: non-paged memory
[ 3.968505] Register r8 information: slab kmalloc-rnd-04-1k start c3cd8800 pointer offset 0 size 1024
[ 3.977783] Register r9 information: non-paged memory
[ 3.982879] Register r10 information: slab kmalloc-rnd-04-1k start c3cd8800 pointer offset 16 size 1024
[ 3.992340] Register r11 information: non-slab/vmalloc memory
[ 3.998107] Register r12 information: non-paged memory
[ 4.003265] Process kworker/u10:2 (pid: 45, stack limit = 0x8ed7d642)
[ 4.009765] Stack: (0xf0105970 to 0xf0106000)
[ 4.014129] 5960: 00000001 c133c0c4 c3cd8810 c23d3b84
[ 4.022338] 5980: c23d3b84 3f45655f 00000001 c0b73800 c3d17340 00000000 00000001 00000000
[ 4.030578] 59a0: c24d5da8 c1338a4c c1d97060 c1d32e5b efcd56f0 3f45655f c24d5da8 fc8f9ed5
[ 4.038787] 59c0: f0105ab8 c13396fc ffffffff c07160d4 00000000 00000000 00000000 00000000
[ 4.047027] 59e0: 00000000 00000000 00000000 00000000 00000000 02d21419 02d21419 c3cd8810
[ 4.055236] 5a00: c23d3b84 c23d3b84 3f45655f c24d5da8 fc8f9ed5 f0105ab8 00000001 c0df4384
[ 4.063446] 5a20: c3cd8810 c23d3b84 00000000 c0df0af0 c3cd8810 c23d3b84 c24d5db0 000000ac
[ 4.071685] 5a40: 00000001 c0defc28 c3cd8810 c3cd8810 00000001 c0df0800 c3cd8810 c23d3b84
[ 4.079895] 5a60: f0105ab8 00000000 c2b84e00 c0df06b8 c0df0584 c0df0584 00000000 f0105a88
[ 4.088104] 5a80: 00000001 c0decca8 c2b84e6c c29ba3b8 c2b84e00 02d21419 c3cd8810 c3cd8854
[ 4.096343] 5aa0: 00000000 00000001 00000000 c2b84e00 00000000 c0defa40 c3cd8810 00000001
[ 4.104553] 5ac0: 00000100 02d21419 c3cd8810 c24d5d9c c2b84e00 c1a4986c c3cd8810 c0decf14
[ 4.112762] 5ae0: c3cd8810 c3cdb010 00000000 c3cdb010 c3cd8810 efcd5754 00000001 c0de8614
[ 4.121002] 5b00: 02d21419 00000000 00000000 00000000 c3cd8800 efcd56f0 c3cd8810 efcd5754
[ 4.129211] 5b20: 00000000 c133b6a4 efcd56f0 c3cdb010 c221d330 00000000 00000000 efcd5754
[ 4.137420] 5b40: c1843b7c c133b93c c2bb9c10 c3cdb010 00000000 00000000 00000000 00000000
[ 4.145660] 5b60: 00000000 00000000 00000000 00000000 00000000 00000000 02d21419 efcd56f0
[ 4.153869] 5b80: c221d330 c1843b7c efcd539c 00000000 c3cdb010 00000001 c24c4778 c133bbb8
[ 4.162109] 5ba0: 00000001 c1d0821f c3d1cf40 efcd5520 f0105be0 00000001 00000000 c1d0821f
[ 4.170318] 5bc0: c1e0e816 c0a471ec 00000000 00000000 c24d5da8 c3cdb010 c221d300 efcd539c
[ 4.178527] 5be0: 00000002 00000000 43300000 00000000 43300000 00000000 00100000 00000000
[ 4.186767] 5c00: 00000200 00000000 efcd539c c1b18920 ff9e8308 ff9e8308 00000001 00000001
[ 4.194976] 5c20: 00000001 00000000 02d21419 c3cdb010 c230f140 c230f140 3f45655f c24d5da8
[ 4.203186] 5c40: fc8f9ed5 f0105ce8 00000001 c0df4384 c3cdb010 c230f140 00000000 c0df0af0
[ 4.211425] 5c60: c3cdb010 c230f140 c24d5db0 000000ac 00000001 c0defc28 c3cdb010 c3cdb010
[ 4.219635] 5c80: 00000001 c0df0800 c3cdb010 c230f140 f0105ce8 00000000 c2b84e00 c0df06b8
[ 4.227844] 5ca0: c0df0584 c0df0584 00000000 f0105cb8 00000001 c0decca8 c2b84e6c c3850738
[ 4.236083] 5cc0: c2b84e00 02d21419 c3cdb010 c3cdb054 00000000 00000001 00000000 c2b84e00
[ 4.244293] 5ce0: c221d300 c0defa40 c3cdb010 00000001 00000100 02d21419 c3cdb010 c24d5d9c
[ 4.252502] 5d00: c2b84e00 c1a4986c c3cdb010 c0decf14 c3cdb010 c2bb9c10 00000000 c2bb9c10
[ 4.260742] 5d20: c3cdb010 efcd5400 00000001 c0de8614 02d21419 00000000 00000000 00000000
[ 4.268951] 5d40: c3cdb000 efcd539c c3cdb010 efcd5400 c221d300 c133b6a4 efcd539c c2bb9c10
[ 4.277160] 5d60: c221d330 c221d300 00000000 efcd5400 00000000 c133b93c 00000000 c2bb9c10
[ 4.285400] 5d80: 43300000 00000000 43300003 00000000 ff9e826c 00000200 00000000 00000000
[ 4.293609] 5da0: 00000000 00000000 02d21419 efcd539c c221d330 00000000 efc693ec 00000000
[ 4.301818] 5dc0: c2bb9c10 00000001 c2919e0d c133bbb8 00000001 f0105eb0 c2bb9c10 efc693ec
[ 4.310058] 5de0: c3873bc0 c2bb9c00 c230f064 c221d330 f0105eb0 c0a464c8 c2bb9c10 c230f064
[ 4.318267] 5e00: c230f064 3f45655f c24d5da8 fc8f9ed5 c2919e0d c0df4384 c2bb9c10 c230f064
[ 4.326477] 5e20: 00000000 c0df0af0 c2bb9c10 c230f064 c24d5db0 00000001 c2919e0d c0defc28
[ 4.334716] 5e40: c2bb9c10 c2bb9c10 c2919e0d c0df0800 c2bb9c10 c230f064 f0105eb0 00000000
[ 4.342926] 5e60: c2b84e00 c0df06b8 c0df0584 c0df0584 00000000 f0105e80 c2919e0d c0decca8
[ 4.351135] 5e80: c2b84e6c c3850538 c2b84e00 02d21419 c2bb9c10 c2bb9c54 00000000 00000001
[ 4.359374] 5ea0: 00000000 c2b84e00 c2919e00 c0defa40 c2bb9c10 00000001 c2919e0d 02d21419
[ 4.367584] 5ec0: c2bb9c10 c24d5d9c c2b84e00 c1a4986c 00000000 c0decf14 c23ffdb4 c2bb9c10
[ 4.375793] 5ee0: c2940dd4 c23ffdd0 00000000 00000004 c2919e0d c0df0318 c29c5180 c23ffdd8
[ 4.384033] 5f00: c2972a00 c2919e80 0000000a c0495454 f0105f68 c1805d2c 00000000 00000002
[ 4.392242] 5f20: 02d21419 c3821280 c29c5198 c29c51d0 c29c51ac c2972a00 c29c5180 c29c51ac
[ 4.400451] 5f40: c3821280 c2972a20 c246c83c 00000402 00000000 c04978c4 c2e84a80 c0497614
[ 4.408691] 5f60: c29c5180 00000040 c3821964 c2e84a9c c2e84a80 c0497614 c29c5180 c3821280
[ 4.416900] 5f80: 00000000 c049e4ec 00000000 00000000 c29c6080 c049e3a8 00000000 00000000
[ 4.425109] 5fa0: 00000000 00000000 00000000 c040029c 00000000 00000000 00000000 00000000
[ 4.433349] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 4.441558] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 00000000 00000000
[ 4.449768] Call trace:
[ 4.449798] edma_probe from platform_probe+0xac/0xe0
[ 4.457427] platform_probe from really_probe+0x170/0x3cc
[ 4.462860] really_probe from __driver_probe_device+0x94/0xdc
[ 4.468719] __driver_probe_device from driver_probe_device+0x3c/0x1bc
[ 4.475280] driver_probe_device from __device_attach_driver+0x134/0x17c
[ 4.482025] __device_attach_driver from bus_for_each_drv+0x130/0x18c
[ 4.488525] bus_for_each_drv from __device_attach+0xcc/0x180
[ 4.494293] __device_attach from bus_probe_device+0xac/0x128
[ 4.500091] bus_probe_device from device_add+0x2b0/0x4d0
[ 4.505523] device_add from of_platform_device_create_pdata+0xc4/0xf8
[ 4.512115] of_platform_device_create_pdata from of_platform_bus_create+0x170/0x370
[ 4.519897] of_platform_bus_create from of_platform_populate+0x7c/0xc4
[ 4.526550] of_platform_populate from sysc_probe+0xa88/0xb98
[ 4.532348] sysc_probe from platform_probe+0xac/0xe0
[ 4.537414] platform_probe from really_probe+0x170/0x3cc
[ 4.542846] really_probe from __driver_probe_device+0x94/0xdc
[ 4.548736] __driver_probe_device from driver_probe_device+0x3c/0x1bc
[ 4.555297] driver_probe_device from __device_attach_driver+0x134/0x17c
[ 4.562042] __device_attach_driver from bus_for_each_drv+0x130/0x18c
[ 4.568511] bus_for_each_drv from __device_attach+0xcc/0x180
[ 4.574310] __device_attach from bus_probe_device+0xac/0x128
[ 4.580078] bus_probe_device from device_add+0x2b0/0x4d0
[ 4.585510] device_add from of_platform_device_create_pdata+0xc4/0xf8
[ 4.592102] of_platform_device_create_pdata from of_platform_bus_create+0x170/0x370
[ 4.599884] of_platform_bus_create from of_platform_populate+0x7c/0xc4
[ 4.606536] of_platform_populate from simple_pm_bus_probe+0xa8/0xf4
[ 4.612945] simple_pm_bus_probe from platform_probe+0xac/0xe0
[ 4.618804] platform_probe from really_probe+0x170/0x3cc
[ 4.624237] really_probe from __driver_probe_device+0x94/0xdc
[ 4.630096] __driver_probe_device from driver_probe_device+0x3c/0x1bc
[ 4.636657] driver_probe_device from __device_attach_driver+0x134/0x17c
[ 4.643402] __device_attach_driver from bus_for_each_drv+0x130/0x18c
[ 4.649902] bus_for_each_drv from __device_attach+0xcc/0x180
[ 4.655670] __device_attach from bus_probe_device+0xac/0x128
[ 4.661468] bus_probe_device from deferred_probe_work_func+0x94/0xd4
[ 4.667938] deferred_probe_work_func from process_scheduled_works+0x25c/0x418
[ 4.675231] process_scheduled_works from worker_thread+0x2b0/0x3ac
[ 4.681518] worker_thread from kthread+0x144/0x350
[ 4.686431] kthread from ret_from_fork+0x14/0x38
[ 4.691192] Exception stack(0xf0105fb0 to 0xf0105ff8)
[ 4.696258] 5fa0: 00000000 00000000 00000000 00000000
[ 4.704467] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 4.712707] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 4.719360] Code: e3a01004 e3570008 e5c01008 1a000001 (e7ffdefe)
[ 4.725463] ---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
[ 6.157287] WARNING: CPU: 0 PID: 0 at kernel/smp.c:815 smp_call_function_many_cond+0x494/0x5cc
[ 6.165954] Modules linked in:
[ 6.169036] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.13.0 #1
[ 6.169067] Hardware name: Generic DRA74X (Flattened Device Tree)
[ 6.169067] Call trace:
[ 6.169067] unwind_backtrace from show_stack+0x10/0x14
[ 6.169067] show_stack from dump_stack_lvl+0x50/0x64
[ 6.169097] dump_stack_lvl from __warn+0x80/0x130
[ 6.169097] __warn from warn_slowpath_fmt+0x170/0x178
[ 6.169128] warn_slowpath_fmt from smp_call_function_many_cond+0x494/0x5cc
[ 6.169128] smp_call_function_many_cond from smp_call_function+0x2c/0x34
[ 6.169158] smp_call_function from flush_tlb_kernel_range+0x5c/0xa4
[ 6.169158] flush_tlb_kernel_range from __change_memory_common+0x5c/0x7c
[ 6.169189] __change_memory_common from set_memory_valid+0x4c/0x54
[ 6.169189] set_memory_valid from kfence_guarded_free+0x2ac/0x594
[ 6.169219] kfence_guarded_free from rcu_core+0x2c0/0x980
[ 6.169219] rcu_core from handle_softirqs+0x108/0x314
[ 6.169250] handle_softirqs from irq_exit+0xa4/0x110
[ 6.169250] irq_exit from __irq_svc+0x7c/0xa4
[ 6.169250] Exception stack(0xc1e01f18 to 0xc1e01f60)
[ 6.169281] 1f00: 0000373c 00000001
[ 6.169281] 1f20: c1e09880 00000000 c2071cc0 c1e04e9c 00000001 c1e04edc c1d7ac28 00000000
[ 6.169281] 1f40: c206fced c1e09880 c2071100 c1e01f68 c1391db0 c13932c8 600b0013 ffffffff
[ 6.169281] __irq_svc from default_idle_call+0x4c/0xb4
[ 6.169311] default_idle_call from do_idle+0x208/0x27c
[ 6.169311] do_idle from cpu_startup_entry+0x28/0x2c
[ 6.169342] cpu_startup_entry from kernel_init+0x0/0x12c
[ 6.169342] ---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
[ 6.157287] WARNING: CPU: 0 PID: 0 at kernel/smp.c:815 smp_call_function_many_cond+0x494/0x5cc
[ 6.165954] Modules linked in:
[ 6.169036] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.13.0 #1
[ 6.169067] Hardware name: Generic DRA74X (Flattened Device Tree)
[ 6.169067] Call trace:
[ 6.169067] unwind_backtrace from show_stack+0x10/0x14
[ 6.169067] show_stack from dump_stack_lvl+0x50/0x64
[ 6.169097] dump_stack_lvl from __warn+0x80/0x130
[ 6.169097] __warn from warn_slowpath_fmt+0x170/0x178
[ 6.169128] warn_slowpath_fmt from smp_call_function_many_cond+0x494/0x5cc
[ 6.169128] smp_call_function_many_cond from smp_call_function+0x2c/0x34
[ 6.169158] smp_call_function from flush_tlb_kernel_range+0x5c/0xa4
[ 6.169158] flush_tlb_kernel_range from __change_memory_common+0x5c/0x7c
[ 6.169189] __change_memory_common from set_memory_valid+0x4c/0x54
[ 6.169189] set_memory_valid from kfence_guarded_free+0x2ac/0x594
[ 6.169219] kfence_guarded_free from rcu_core+0x2c0/0x980
[ 6.169219] rcu_core from handle_softirqs+0x108/0x314
[ 6.169250] handle_softirqs from irq_exit+0xa4/0x110
[ 6.169250] irq_exit from __irq_svc+0x7c/0xa4
[ 6.169250] Exception stack(0xc1e01f18 to 0xc1e01f60)
[ 6.169281] 1f00: 0000373c 00000001
[ 6.169281] 1f20: c1e09880 00000000 c2071cc0 c1e04e9c 00000001 c1e04edc c1d7ac28 00000000
[ 6.169281] 1f40: c206fced c1e09880 c2071100 c1e01f68 c1391db0 c13932c8 600b0013 ffffffff
[ 6.169281] __irq_svc from default_idle_call+0x4c/0xb4
[ 6.169311] default_idle_call from do_idle+0x208/0x27c
[ 6.169311] do_idle from cpu_startup_entry+0x28/0x2c
[ 6.169342] cpu_startup_entry from kernel_init+0x0/0x12c
[ 6.169342] ---[ end trace 0000000000000000 ]---
[ 3.856048] Internal error: Oops - undefined instruction: 0 [#1] SMP ARM
[ 3.862792] Modules linked in:
[ 3.865875] CPU: 1 UID: 0 PID: 45 Comm: kworker/u10:2 Not tainted 6.13.0 #1
[ 3.872863] Hardware name: Generic DRA74X (Flattened Device Tree)
[ 3.878997] Workqueue: events_unbound deferred_probe_work_func
[ 3.884887] PC is at edma_probe+0xb34/0xfe4
[ 3.889068] LR is at devm_kmalloc+0xdc/0x110
[ 3.893371] pc : [<c0c0d864>] lr : [<c0de8ba8>] psr: 60000013
[ 3.899688] sp : f0105928 ip : 00070007 fp : efcd56f0
[ 3.904937] r10: c3cd5410 r9 : c2f5ba40 r8 : c3cd5400
[ 3.910186] r7 : 00000002 r6 : 00000000 r5 : 00000003 r4 : 00000001
[ 3.916748] r3 : 00000001 r2 : 00000002 r1 : 00000002 r0 : c3a65c40
[ 3.923309] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user
[ 3.930480] Control: 30c5387d Table: 80203000 DAC: 55555555
[ 3.936248] Register r0 information: slab kmalloc-128 start c3a65c00 pointer offset 64 size 128
[ 3.945037] Register r1 information: non-paged memory
[ 3.950103] Register r2 information: non-paged memory
[ 3.955169] Register r3 information: non-paged memory
[ 3.960266] Register r4 information: non-paged memory
[ 3.965332] Register r5 information: non-paged memory
[ 3.970428] Register r6 information: NULL pointer
[ 3.975158] Register r7 information: non-paged memory
[ 3.980224] Register r8 information: slab kmalloc-rnd-04-1k start c3cd5400 pointer offset 0 size 1024
[ 3.989532] Register r9 information: slab kmalloc-rnd-05-512 start c2f5ba00 pointer offset 64 size 512
[ 3.998901] Register r10 information: slab kmalloc-rnd-04-1k start c3cd5400 pointer offset 16 size 1024
[ 4.008361] Register r11 information: non-slab/vmalloc memory
[ 4.014129] Register r12 information: non-paged memory
[ 4.019317] Process kworker/u10:2 (pid: 45, stack limit = 0x5f5f91ef)
[ 4.025787] Stack: (0xf0105928 to 0xf0106000)
[ 4.030181] 5920: 00000001 c1337fcc c3cd5410 c23d3aac c23d3aac efcd56f0
[ 4.038391] 5940: 00000001 c3b9c240 c28150fc 00000000 00000001 00000000 c24d5d30 c1334998
[ 4.046600] 5960: c1d96c54 c1d32a35 efcd56f0 3f45655f c24d5d30 fc8f9ed5 f0105a88 c13355f8
[ 4.054840] 5980: ffffffff c07045d0 00000000 00000000 00000000 00000000 00000000 00000000
[ 4.063049] 59a0: 00000000 00000000 00000000 8477db81 8477db81 c3cd5410 c23d3aac c23d3aac
[ 4.071258] 59c0: 3f45655f c24d5d30 fc8f9ed5 f0105a88 00000001 c0de6750 c3cd5410 c23d3aac
[ 4.079498] 59e0: 00000000 c0de2ee0 c3cd5410 c23d3aac c24d5d38 000000ab 00000001 c0de1f64
[ 4.087707] 5a00: 60000013 efcd56f0 c3cd5410 c3cd5410 c24d5d38 000000ab c24d5d30 fc8f9ed5
[ 4.095916] 5a20: 00000001 c0de2bf0 c3cd5410 c23d3aac f0105a88 00000000 c28cd000 c0de2aa8
[ 4.104156] 5a40: c0de2974 c0de2974 00000000 f0105a58 00000001 c0ddefe4 c28cd06c c2e2c238
[ 4.112365] 5a60: c28cd000 8477db81 c3cd5410 c3cd5454 00000000 00000001 00000000 c28cd000
[ 4.120574] 5a80: 00000000 c0de1d7c c3cd5410 00000001 00000100 8477db81 c3cd5410 c24d5d24
[ 4.128814] 5aa0: c28cd000 c1a49918 c3cd5410 c0ddf250 c3cd5410 c3cd4010 00000000 c3cd4010
[ 4.137023] 5ac0: c3cd5410 efcd5754 00000001 c0dda934 8477db81 00000000 00000000 00000000
[ 4.145233] 5ae0: c3cd5400 efcd56f0 c3cd5410 efcd5754 00000000 c13375ac efcd56f0 c3cd4010
[ 4.153472] 5b00: c221d2b8 00000000 00000000 efcd5754 c1843cfc c1337844 c2bbac10 c3cd4010
[ 4.161682] 5b20: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 4.169891] 5b40: 00000000 00000000 8477db81 efcd56f0 c221d2b8 c1843cfc efcd539c 00000000
[ 4.178131] 5b60: c3cd4010 00000001 c24c46f8 c1337ac0 00000001 c1d07df9 c3cf5640 efcd5520
[ 4.186340] 5b80: f0105bb0 00000001 00000000 c1d07df9 c1e0e3f2 c0a387c0 00000000 00000000
[ 4.194549] 5ba0: c24d5d30 c3cd4010 c221d524 efcd539c 00000002 00000000 43300000 00000000
[ 4.202789] 5bc0: 43300000 00000000 00100000 00000000 00000200 00000000 efcd539c c1b18a60
[ 4.210998] 5be0: ff9e8308 ff9e8308 00000001 00000001 00000001 00000000 8477db81 c3cd4010
[ 4.219207] 5c00: c230f080 c230f080 3f45655f c24d5d30 fc8f9ed5 f0105cd0 00000001 c0de6750
[ 4.227447] 5c20: c3cd4010 c230f080 00000000 c0de2ee0 c3cd4010 c230f080 c24d5d38 000000ab
[ 4.235656] 5c40: 00000001 c0de1f64 60000013 efcd539c c3cd4010 c3cd4010 c24d5d38 000000ab
[ 4.243865] 5c60: c24d5d30 fc8f9ed5 00000001 c0de2bf0 c3cd4010 c230f080 f0105cd0 00000000
[ 4.252105] 5c80: c28cd000 c0de2aa8 c0de2974 c0de2974 00000000 f0105ca0 00000001 c0ddefe4
[ 4.260314] 5ca0: c28cd06c c386c3b8 c28cd000 8477db81 c3cd4010 c3cd4054 00000000 00000001
[ 4.268524] 5cc0: 00000000 c28cd000 c221d524 c0de1d7c c3cd4010 00000001 00000100 8477db81
[ 4.276763] 5ce0: c3cd4010 c24d5d24 c28cd000 c1a49918 c3cd4010 c0ddf250 c3cd4010 c2bbac10
[ 4.284973] 5d00: 00000000 c2bbac10 c3cd4010 efcd5400 00000001 c0dda934 8477db81 00000000
[ 4.293182] 5d20: 00000000 00000000 c3cd4000 efcd539c c3cd4010 efcd5400 c221d524 c13375ac
[ 4.301422] 5d40: efcd539c c2bbac10 c221d2b8 c221d524 00000000 efcd5400 00000000 c1337844
[ 4.309631] 5d60: 00000000 c2bbac10 43300000 00000000 43300003 00000000 ff9e826c 00000200
[ 4.317871] 5d80: 00000000 00000000 00000000 00000000 8477db81 efcd539c c221d2b8 00000000
[ 4.326080] 5da0: efc693ec 00000000 c2bbac10 00000001 c291760d c1337ac0 00000001 f0105eb0
[ 4.334289] 5dc0: c2bbac10 efc693ec c2e32d40 c2bbac00 c230efa4 c221d2b8 f0105eb0 c0a37a98
[ 4.342498] 5de0: c2bbac10 c230efa4 c230efa4 3f45655f c24d5d30 fc8f9ed5 c291760d c0de6750
[ 4.350738] 5e00: c2bbac10 c230efa4 00000000 c0de2ee0 c2bbac10 c230efa4 c24d5d38 00000001
[ 4.358947] 5e20: c291760d c0de1f64 60000013 efc693ec c2bbac10 c2bbac10 c24d5d38 00000001
[ 4.367156] 5e40: c24d5d30 fc8f9ed5 c291760d c0de2bf0 c2bbac10 c230efa4 f0105eb0 00000000
[ 4.375396] 5e60: c28cd000 c0de2aa8 c0de2974 c0de2974 00000000 f0105e80 c291760d c0ddefe4
[ 4.383605] 5e80: c28cd06c c386cd38 c28cd000 8477db81 c2bbac10 c2bbac54 00000000 00000001
[ 4.391845] 5ea0: 00000000 c28cd000 c2917600 c0de1d7c c2bbac10 00000001 c291760d 8477db81
[ 4.400054] 5ec0: c2bbac10 c24d5d24 c28cd000 c1a49918 00000000 c0ddf250 c23ffcdc c2bbac10
[ 4.408264] 5ee0: c2c4b4d4 c23ffcf8 00000000 00000004 c291760d c0de2708 c29bc980 c23ffd00
[ 4.416503] 5f00: c2818800 c2917680 0000000a c047f318 f0105f68 c1805e28 00000000 00000002
[ 4.424713] 5f20: 8477db81 c3819280 c29bc998 c29bc9d0 c29bc9ac c2818800 c29bc980 c29bc9ac
[ 4.432922] 5f40: c3819280 c2818820 c246c73c 00000402 00000000 c048180c c29b5200 c048155c
[ 4.441162] 5f60: c29bc980 00000040 c3819964 c29b521c c29b5200 c048155c c29bc980 c3819280
[ 4.449371] 5f80: 00000000 c048848c 00000000 00000000 c29bd440 c0488348 00000000 00000000
[ 4.457580] 5fa0: 00000000 00000000 00000000 c040029c 00000000 00000000 00000000 00000000
[ 4.465820] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 4.474029] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 00000000 00000000
[ 4.482238] Call trace:
[ 4.482269] edma_probe from platform_probe+0xac/0xe0
[ 4.489898] platform_probe from really_probe+0x170/0x3cc
[ 4.495330] really_probe from __driver_probe_device+0x90/0x18c
[ 4.501281] __driver_probe_device from driver_probe_device+0x3c/0x1bc
[ 4.507843] driver_probe_device from __device_attach_driver+0x134/0x17c
[ 4.514587] __device_attach_driver from bus_for_each_drv+0x130/0x18c
[ 4.521087] bus_for_each_drv from __device_attach+0xcc/0x184
[ 4.526855] __device_attach from bus_probe_device+0xac/0x128
[ 4.532623] bus_probe_device from device_add+0x2b0/0x4d0
[ 4.538085] device_add from of_platform_device_create_pdata+0xc4/0xf8
[ 4.544647] of_platform_device_create_pdata from of_platform_bus_create+0x170/0x370
[ 4.552429] of_platform_bus_create from of_platform_populate+0x7c/0xc4
[ 4.559112] of_platform_populate from sysc_probe+0xa8c/0xb9c
[ 4.564880] sysc_probe from platform_probe+0xac/0xe0
[ 4.569976] platform_probe from really_probe+0x170/0x3cc
[ 4.575408] really_probe from __driver_probe_device+0x90/0x18c
[ 4.581359] __driver_probe_device from driver_probe_device+0x3c/0x1bc
[ 4.587951] driver_probe_device from __device_attach_driver+0x134/0x17c
[ 4.594696] __device_attach_driver from bus_for_each_drv+0x130/0x18c
[ 4.601165] bus_for_each_drv from __device_attach+0xcc/0x184
[ 4.606933] __device_attach from bus_probe_device+0xac/0x128
[ 4.612731] bus_probe_device from device_add+0x2b0/0x4d0
[ 4.618164] device_add from of_platform_device_create_pdata+0xc4/0xf8
[ 4.624725] of_platform_device_create_pdata from of_platform_bus_create+0x170/0x370
[ 4.632537] of_platform_bus_create from of_platform_populate+0x7c/0xc4
[ 4.639190] of_platform_populate from simple_pm_bus_probe+0xa8/0xf4
[ 4.645568] simple_pm_bus_probe from platform_probe+0xac/0xe0
[ 4.651458] platform_probe from really_probe+0x170/0x3cc
[ 4.656890] really_probe from __driver_probe_device+0x90/0x18c
[ 4.662841] __driver_probe_device from driver_probe_device+0x3c/0x1bc
[ 4.669403] driver_probe_device from __device_attach_driver+0x134/0x17c
[ 4.676147] __device_attach_driver from bus_for_each_drv+0x130/0x18c
[ 4.682617] bus_for_each_drv from __device_attach+0xcc/0x184
[ 4.688415] __device_attach from bus_probe_device+0xac/0x128
[ 4.694183] bus_probe_device from deferred_probe_work_func+0x94/0xd4
[ 4.700683] deferred_probe_work_func from process_scheduled_works+0x25c/0x418
[ 4.707946] process_scheduled_works from worker_thread+0x2b0/0x3ac
[ 4.714263] worker_thread from kthread+0x144/0x350
[ 4.719177] kthread from ret_from_fork+0x14/0x38
[ 4.723907] Exception stack(0xf0105fb0 to 0xf0105ff8)
[ 4.728973] 5fa0: 00000000 00000000 00000000 00000000
[ 4.737213] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 4.745422] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 4.752075] Code: e3a03001 13540001 e5c03002 1a000006 (e7ffdefe)
[ 4.758209] ---[ end trace 0000000000000000 ]---
[ 3.856048] Internal error: Oops - undefined instruction: 0 [#1] SMP ARM
[ 3.862792] Modules linked in:
[ 3.865875] CPU: 1 UID: 0 PID: 45 Comm: kworker/u10:2 Not tainted 6.13.0 #1
[ 3.872863] Hardware name: Generic DRA74X (Flattened Device Tree)
[ 3.878997] Workqueue: events_unbound deferred_probe_work_func
[ 3.884887] PC is at edma_probe+0xb34/0xfe4
[ 3.889068] LR is at devm_kmalloc+0xdc/0x110
[ 3.893371] pc : [<c0c0d864>] lr : [<c0de8ba8>] psr: 60000013
[ 3.899688] sp : f0105928 ip : 00070007 fp : efcd56f0
[ 3.904937] r10: c3cd5410 r9 : c2f5ba40 r8 : c3cd5400
[ 3.910186] r7 : 00000002 r6 : 00000000 r5 : 00000003 r4 : 00000001
[ 3.916748] r3 : 00000001 r2 : 00000002 r1 : 00000002 r0 : c3a65c40
[ 3.923309] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user
[ 3.930480] Control: 30c5387d Table: 80203000 DAC: 55555555
[ 3.936248] Register r0 information: slab kmalloc-128 start c3a65c00 pointer offset 64 size 128
[ 3.945037] Register r1 information: non-paged memory
[ 3.950103] Register r2 information: non-paged memory
[ 3.955169] Register r3 information: non-paged memory
[ 3.960266] Register r4 information: non-paged memory
[ 3.965332] Register r5 information: non-paged memory
[ 3.970428] Register r6 information: NULL pointer
[ 3.975158] Register r7 information: non-paged memory
[ 3.980224] Register r8 information: slab kmalloc-rnd-04-1k start c3cd5400 pointer offset 0 size 1024
[ 3.989532] Register r9 information: slab kmalloc-rnd-05-512 start c2f5ba00 pointer offset 64 size 512
[ 3.998901] Register r10 information: slab kmalloc-rnd-04-1k start c3cd5400 pointer offset 16 size 1024
[ 4.008361] Register r11 information: non-slab/vmalloc memory
[ 4.014129] Register r12 information: non-paged memory
[ 4.019317] Process kworker/u10:2 (pid: 45, stack limit = 0x5f5f91ef)
[ 4.025787] Stack: (0xf0105928 to 0xf0106000)
[ 4.030181] 5920: 00000001 c1337fcc c3cd5410 c23d3aac c23d3aac efcd56f0
[ 4.038391] 5940: 00000001 c3b9c240 c28150fc 00000000 00000001 00000000 c24d5d30 c1334998
[ 4.046600] 5960: c1d96c54 c1d32a35 efcd56f0 3f45655f c24d5d30 fc8f9ed5 f0105a88 c13355f8
[ 4.054840] 5980: ffffffff c07045d0 00000000 00000000 00000000 00000000 00000000 00000000
[ 4.063049] 59a0: 00000000 00000000 00000000 8477db81 8477db81 c3cd5410 c23d3aac c23d3aac
[ 4.071258] 59c0: 3f45655f c24d5d30 fc8f9ed5 f0105a88 00000001 c0de6750 c3cd5410 c23d3aac
[ 4.079498] 59e0: 00000000 c0de2ee0 c3cd5410 c23d3aac c24d5d38 000000ab 00000001 c0de1f64
[ 4.087707] 5a00: 60000013 efcd56f0 c3cd5410 c3cd5410 c24d5d38 000000ab c24d5d30 fc8f9ed5
[ 4.095916] 5a20: 00000001 c0de2bf0 c3cd5410 c23d3aac f0105a88 00000000 c28cd000 c0de2aa8
[ 4.104156] 5a40: c0de2974 c0de2974 00000000 f0105a58 00000001 c0ddefe4 c28cd06c c2e2c238
[ 4.112365] 5a60: c28cd000 8477db81 c3cd5410 c3cd5454 00000000 00000001 00000000 c28cd000
[ 4.120574] 5a80: 00000000 c0de1d7c c3cd5410 00000001 00000100 8477db81 c3cd5410 c24d5d24
[ 4.128814] 5aa0: c28cd000 c1a49918 c3cd5410 c0ddf250 c3cd5410 c3cd4010 00000000 c3cd4010
[ 4.137023] 5ac0: c3cd5410 efcd5754 00000001 c0dda934 8477db81 00000000 00000000 00000000
[ 4.145233] 5ae0: c3cd5400 efcd56f0 c3cd5410 efcd5754 00000000 c13375ac efcd56f0 c3cd4010
[ 4.153472] 5b00: c221d2b8 00000000 00000000 efcd5754 c1843cfc c1337844 c2bbac10 c3cd4010
[ 4.161682] 5b20: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 4.169891] 5b40: 00000000 00000000 8477db81 efcd56f0 c221d2b8 c1843cfc efcd539c 00000000
[ 4.178131] 5b60: c3cd4010 00000001 c24c46f8 c1337ac0 00000001 c1d07df9 c3cf5640 efcd5520
[ 4.186340] 5b80: f0105bb0 00000001 00000000 c1d07df9 c1e0e3f2 c0a387c0 00000000 00000000
[ 4.194549] 5ba0: c24d5d30 c3cd4010 c221d524 efcd539c 00000002 00000000 43300000 00000000
[ 4.202789] 5bc0: 43300000 00000000 00100000 00000000 00000200 00000000 efcd539c c1b18a60
[ 4.210998] 5be0: ff9e8308 ff9e8308 00000001 00000001 00000001 00000000 8477db81 c3cd4010
[ 4.219207] 5c00: c230f080 c230f080 3f45655f c24d5d30 fc8f9ed5 f0105cd0 00000001 c0de6750
[ 4.227447] 5c20: c3cd4010 c230f080 00000000 c0de2ee0 c3cd4010 c230f080 c24d5d38 000000ab
[ 4.235656] 5c40: 00000001 c0de1f64 60000013 efcd539c c3cd4010 c3cd4010 c24d5d38 000000ab
[ 4.243865] 5c60: c24d5d30 fc8f9ed5 00000001 c0de2bf0 c3cd4010 c230f080 f0105cd0 00000000
[ 4.252105] 5c80: c28cd000 c0de2aa8 c0de2974 c0de2974 00000000 f0105ca0 00000001 c0ddefe4
[ 4.260314] 5ca0: c28cd06c c386c3b8 c28cd000 8477db81 c3cd4010 c3cd4054 00000000 00000001
[ 4.268524] 5cc0: 00000000 c28cd000 c221d524 c0de1d7c c3cd4010 00000001 00000100 8477db81
[ 4.276763] 5ce0: c3cd4010 c24d5d24 c28cd000 c1a49918 c3cd4010 c0ddf250 c3cd4010 c2bbac10
[ 4.284973] 5d00: 00000000 c2bbac10 c3cd4010 efcd5400 00000001 c0dda934 8477db81 00000000
[ 4.293182] 5d20: 00000000 00000000 c3cd4000 efcd539c c3cd4010 efcd5400 c221d524 c13375ac
[ 4.301422] 5d40: efcd539c c2bbac10 c221d2b8 c221d524 00000000 efcd5400 00000000 c1337844
[ 4.309631] 5d60: 00000000 c2bbac10 43300000 00000000 43300003 00000000 ff9e826c 00000200
[ 4.317871] 5d80: 00000000 00000000 00000000 00000000 8477db81 efcd539c c221d2b8 00000000
[ 4.326080] 5da0: efc693ec 00000000 c2bbac10 00000001 c291760d c1337ac0 00000001 f0105eb0
[ 4.334289] 5dc0: c2bbac10 efc693ec c2e32d40 c2bbac00 c230efa4 c221d2b8 f0105eb0 c0a37a98
[ 4.342498] 5de0: c2bbac10 c230efa4 c230efa4 3f45655f c24d5d30 fc8f9ed5 c291760d c0de6750
[ 4.350738] 5e00: c2bbac10 c230efa4 00000000 c0de2ee0 c2bbac10 c230efa4 c24d5d38 00000001
[ 4.358947] 5e20: c291760d c0de1f64 60000013 efc693ec c2bbac10 c2bbac10 c24d5d38 00000001
[ 4.367156] 5e40: c24d5d30 fc8f9ed5 c291760d c0de2bf0 c2bbac10 c230efa4 f0105eb0 00000000
[ 4.375396] 5e60: c28cd000 c0de2aa8 c0de2974 c0de2974 00000000 f0105e80 c291760d c0ddefe4
[ 4.383605] 5e80: c28cd06c c386cd38 c28cd000 8477db81 c2bbac10 c2bbac54 00000000 00000001
[ 4.391845] 5ea0: 00000000 c28cd000 c2917600 c0de1d7c c2bbac10 00000001 c291760d 8477db81
[ 4.400054] 5ec0: c2bbac10 c24d5d24 c28cd000 c1a49918 00000000 c0ddf250 c23ffcdc c2bbac10
[ 4.408264] 5ee0: c2c4b4d4 c23ffcf8 00000000 00000004 c291760d c0de2708 c29bc980 c23ffd00
[ 4.416503] 5f00: c2818800 c2917680 0000000a c047f318 f0105f68 c1805e28 00000000 00000002
[ 4.424713] 5f20: 8477db81 c3819280 c29bc998 c29bc9d0 c29bc9ac c2818800 c29bc980 c29bc9ac
[ 4.432922] 5f40: c3819280 c2818820 c246c73c 00000402 00000000 c048180c c29b5200 c048155c
[ 4.441162] 5f60: c29bc980 00000040 c3819964 c29b521c c29b5200 c048155c c29bc980 c3819280
[ 4.449371] 5f80: 00000000 c048848c 00000000 00000000 c29bd440 c0488348 00000000 00000000
[ 4.457580] 5fa0: 00000000 00000000 00000000 c040029c 00000000 00000000 00000000 00000000
[ 4.465820] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 4.474029] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 00000000 00000000
[ 4.482238] Call trace:
[ 4.482269] edma_probe from platform_probe+0xac/0xe0
[ 4.489898] platform_probe from really_probe+0x170/0x3cc
[ 4.495330] really_probe from __driver_probe_device+0x90/0x18c
[ 4.501281] __driver_probe_device from driver_probe_device+0x3c/0x1bc
[ 4.507843] driver_probe_device from __device_attach_driver+0x134/0x17c
[ 4.514587] __device_attach_driver from bus_for_each_drv+0x130/0x18c
[ 4.521087] bus_for_each_drv from __device_attach+0xcc/0x184
[ 4.526855] __device_attach from bus_probe_device+0xac/0x128
[ 4.532623] bus_probe_device from device_add+0x2b0/0x4d0
[ 4.538085] device_add from of_platform_device_create_pdata+0xc4/0xf8
[ 4.544647] of_platform_device_create_pdata from of_platform_bus_create+0x170/0x370
[ 4.552429] of_platform_bus_create from of_platform_populate+0x7c/0xc4
[ 4.559112] of_platform_populate from sysc_probe+0xa8c/0xb9c
[ 4.564880] sysc_probe from platform_probe+0xac/0xe0
[ 4.569976] platform_probe from really_probe+0x170/0x3cc
[ 4.575408] really_probe from __driver_probe_device+0x90/0x18c
[ 4.581359] __driver_probe_device from driver_probe_device+0x3c/0x1bc
[ 4.587951] driver_probe_device from __device_attach_driver+0x134/0x17c
[ 4.594696] __device_attach_driver from bus_for_each_drv+0x130/0x18c
[ 4.601165] bus_for_each_drv from __device_attach+0xcc/0x184
[ 4.606933] __device_attach from bus_probe_device+0xac/0x128
[ 4.612731] bus_probe_device from device_add+0x2b0/0x4d0
[ 4.618164] device_add from of_platform_device_create_pdata+0xc4/0xf8
[ 4.624725] of_platform_device_create_pdata from of_platform_bus_create+0x170/0x370
[ 4.632537] of_platform_bus_create from of_platform_populate+0x7c/0xc4
[ 4.639190] of_platform_populate from simple_pm_bus_probe+0xa8/0xf4
[ 4.645568] simple_pm_bus_probe from platform_probe+0xac/0xe0
[ 4.651458] platform_probe from really_probe+0x170/0x3cc
[ 4.656890] really_probe from __driver_probe_device+0x90/0x18c
[ 4.662841] __driver_probe_device from driver_probe_device+0x3c/0x1bc
[ 4.669403] driver_probe_device from __device_attach_driver+0x134/0x17c
[ 4.676147] __device_attach_driver from bus_for_each_drv+0x130/0x18c
[ 4.682617] bus_for_each_drv from __device_attach+0xcc/0x184
[ 4.688415] __device_attach from bus_probe_device+0xac/0x128
[ 4.694183] bus_probe_device from deferred_probe_work_func+0x94/0xd4
[ 4.700683] deferred_probe_work_func from process_scheduled_works+0x25c/0x418
[ 4.707946] process_scheduled_works from worker_thread+0x2b0/0x3ac
[ 4.714263] worker_thread from kthread+0x144/0x350
[ 4.719177] kthread from ret_from_fork+0x14/0x38
[ 4.723907] Exception stack(0xf0105fb0 to 0xf0105ff8)
[ 4.728973] 5fa0: 00000000 00000000 00000000 00000000
[ 4.737213] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 4.745422] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[ 4.752075] Code: e3a03001 13540001 e5c03002 1a000006 (e7ffdefe)
[ 4.758209] ---[ end trace 0000000000000000 ]---