Date
June 8, 2025, 11:09 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 56.955544] ================================================================== [ 56.962501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 56.969786] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 56.977164] [ 56.978648] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 56.978696] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.978713] Hardware name: WinLink E850-96 board (DT) [ 56.978733] Call trace: [ 56.978747] show_stack+0x20/0x38 (C) [ 56.978780] dump_stack_lvl+0x8c/0xd0 [ 56.978816] print_report+0x118/0x608 [ 56.978851] kasan_report+0xdc/0x128 [ 56.978885] kasan_check_range+0x100/0x1a8 [ 56.978923] __kasan_check_write+0x20/0x30 [ 56.978954] kasan_atomics_helper+0xf20/0x4858 [ 56.978989] kasan_atomics+0x198/0x2e0 [ 56.979019] kunit_try_run_case+0x170/0x3f0 [ 56.979055] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.979095] kthread+0x328/0x630 [ 56.979123] ret_from_fork+0x10/0x20 [ 56.979158] [ 57.048864] Allocated by task 312: [ 57.052250] kasan_save_stack+0x3c/0x68 [ 57.056069] kasan_save_track+0x20/0x40 [ 57.059889] kasan_save_alloc_info+0x40/0x58 [ 57.064142] __kasan_kmalloc+0xd4/0xd8 [ 57.067876] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.072388] kasan_atomics+0xb8/0x2e0 [ 57.076034] kunit_try_run_case+0x170/0x3f0 [ 57.080201] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.085669] kthread+0x328/0x630 [ 57.088881] ret_from_fork+0x10/0x20 [ 57.092440] [ 57.093916] The buggy address belongs to the object at ffff000805f49a00 [ 57.093916] which belongs to the cache kmalloc-64 of size 64 [ 57.106242] The buggy address is located 0 bytes to the right of [ 57.106242] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 57.119089] [ 57.120565] The buggy address belongs to the physical page: [ 57.126122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 57.134110] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.140616] page_type: f5(slab) [ 57.143753] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.151475] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.159193] page dumped because: kasan: bad access detected [ 57.164748] [ 57.166224] Memory state around the buggy address: [ 57.171002] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.178207] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.185411] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.192612] ^ [ 57.197390] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.204595] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.211796] ================================================================== [ 54.595236] ================================================================== [ 54.602288] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 54.609578] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 54.616957] [ 54.618438] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 54.618483] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.618498] Hardware name: WinLink E850-96 board (DT) [ 54.618516] Call trace: [ 54.618527] show_stack+0x20/0x38 (C) [ 54.618561] dump_stack_lvl+0x8c/0xd0 [ 54.618596] print_report+0x118/0x608 [ 54.618629] kasan_report+0xdc/0x128 [ 54.618663] kasan_check_range+0x100/0x1a8 [ 54.618699] __kasan_check_write+0x20/0x30 [ 54.618731] kasan_atomics_helper+0xca0/0x4858 [ 54.618767] kasan_atomics+0x198/0x2e0 [ 54.618797] kunit_try_run_case+0x170/0x3f0 [ 54.618832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.618870] kthread+0x328/0x630 [ 54.618897] ret_from_fork+0x10/0x20 [ 54.618929] [ 54.688657] Allocated by task 312: [ 54.692042] kasan_save_stack+0x3c/0x68 [ 54.695862] kasan_save_track+0x20/0x40 [ 54.699681] kasan_save_alloc_info+0x40/0x58 [ 54.703934] __kasan_kmalloc+0xd4/0xd8 [ 54.707667] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.712181] kasan_atomics+0xb8/0x2e0 [ 54.715827] kunit_try_run_case+0x170/0x3f0 [ 54.719993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.725462] kthread+0x328/0x630 [ 54.728674] ret_from_fork+0x10/0x20 [ 54.732233] [ 54.733708] The buggy address belongs to the object at ffff000805f49a00 [ 54.733708] which belongs to the cache kmalloc-64 of size 64 [ 54.746035] The buggy address is located 0 bytes to the right of [ 54.746035] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 54.758881] [ 54.760357] The buggy address belongs to the physical page: [ 54.765913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 54.773899] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.780409] page_type: f5(slab) [ 54.783542] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.791266] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.798985] page dumped because: kasan: bad access detected [ 54.804540] [ 54.806016] Memory state around the buggy address: [ 54.810795] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.817999] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.825204] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.832405] ^ [ 54.837183] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.844388] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.851589] ================================================================== [ 56.691730] ================================================================== [ 56.698785] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 56.706075] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 56.713453] [ 56.714933] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 56.714980] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.714995] Hardware name: WinLink E850-96 board (DT) [ 56.715012] Call trace: [ 56.715025] show_stack+0x20/0x38 (C) [ 56.715056] dump_stack_lvl+0x8c/0xd0 [ 56.715093] print_report+0x118/0x608 [ 56.715127] kasan_report+0xdc/0x128 [ 56.715161] kasan_check_range+0x100/0x1a8 [ 56.715195] __kasan_check_write+0x20/0x30 [ 56.715224] kasan_atomics_helper+0xeb8/0x4858 [ 56.715259] kasan_atomics+0x198/0x2e0 [ 56.715290] kunit_try_run_case+0x170/0x3f0 [ 56.715323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.715361] kthread+0x328/0x630 [ 56.715391] ret_from_fork+0x10/0x20 [ 56.715422] [ 56.785153] Allocated by task 312: [ 56.788539] kasan_save_stack+0x3c/0x68 [ 56.792358] kasan_save_track+0x20/0x40 [ 56.796177] kasan_save_alloc_info+0x40/0x58 [ 56.800430] __kasan_kmalloc+0xd4/0xd8 [ 56.804163] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.808677] kasan_atomics+0xb8/0x2e0 [ 56.812323] kunit_try_run_case+0x170/0x3f0 [ 56.816490] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.821958] kthread+0x328/0x630 [ 56.825170] ret_from_fork+0x10/0x20 [ 56.828729] [ 56.830205] The buggy address belongs to the object at ffff000805f49a00 [ 56.830205] which belongs to the cache kmalloc-64 of size 64 [ 56.842531] The buggy address is located 0 bytes to the right of [ 56.842531] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 56.855378] [ 56.856854] The buggy address belongs to the physical page: [ 56.862410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 56.870395] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.876905] page_type: f5(slab) [ 56.880039] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.887763] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.895482] page dumped because: kasan: bad access detected [ 56.901037] [ 56.902512] Memory state around the buggy address: [ 56.907291] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.914496] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.921700] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.928901] ^ [ 56.933679] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.940884] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.948085] ================================================================== [ 52.759152] ================================================================== [ 52.766205] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 52.773495] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 52.780873] [ 52.782354] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 52.782401] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.782417] Hardware name: WinLink E850-96 board (DT) [ 52.782435] Call trace: [ 52.782448] show_stack+0x20/0x38 (C) [ 52.782480] dump_stack_lvl+0x8c/0xd0 [ 52.782515] print_report+0x118/0x608 [ 52.782549] kasan_report+0xdc/0x128 [ 52.782582] kasan_check_range+0x100/0x1a8 [ 52.782616] __kasan_check_write+0x20/0x30 [ 52.782647] kasan_atomics_helper+0xa6c/0x4858 [ 52.782682] kasan_atomics+0x198/0x2e0 [ 52.782712] kunit_try_run_case+0x170/0x3f0 [ 52.782746] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.782782] kthread+0x328/0x630 [ 52.782810] ret_from_fork+0x10/0x20 [ 52.782840] [ 52.852573] Allocated by task 312: [ 52.855959] kasan_save_stack+0x3c/0x68 [ 52.859778] kasan_save_track+0x20/0x40 [ 52.863597] kasan_save_alloc_info+0x40/0x58 [ 52.867851] __kasan_kmalloc+0xd4/0xd8 [ 52.871583] __kmalloc_cache_noprof+0x16c/0x3c0 [ 52.876097] kasan_atomics+0xb8/0x2e0 [ 52.879743] kunit_try_run_case+0x170/0x3f0 [ 52.883910] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.889378] kthread+0x328/0x630 [ 52.892590] ret_from_fork+0x10/0x20 [ 52.896149] [ 52.897624] The buggy address belongs to the object at ffff000805f49a00 [ 52.897624] which belongs to the cache kmalloc-64 of size 64 [ 52.909951] The buggy address is located 0 bytes to the right of [ 52.909951] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 52.922798] [ 52.924274] The buggy address belongs to the physical page: [ 52.929830] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 52.937815] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.944325] page_type: f5(slab) [ 52.947459] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.955183] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.962902] page dumped because: kasan: bad access detected [ 52.968457] [ 52.969933] Memory state around the buggy address: [ 52.974711] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.981916] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.989120] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.996321] ^ [ 53.001099] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.008304] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.015505] ================================================================== [ 47.231269] ================================================================== [ 47.238165] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 47.245453] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 47.252831] [ 47.254315] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 47.254363] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.254379] Hardware name: WinLink E850-96 board (DT) [ 47.254399] Call trace: [ 47.254415] show_stack+0x20/0x38 (C) [ 47.254452] dump_stack_lvl+0x8c/0xd0 [ 47.254489] print_report+0x118/0x608 [ 47.254525] kasan_report+0xdc/0x128 [ 47.254559] kasan_check_range+0x100/0x1a8 [ 47.254598] __kasan_check_write+0x20/0x30 [ 47.254629] kasan_atomics_helper+0x24c/0x4858 [ 47.254663] kasan_atomics+0x198/0x2e0 [ 47.254694] kunit_try_run_case+0x170/0x3f0 [ 47.254730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.254768] kthread+0x328/0x630 [ 47.254793] ret_from_fork+0x10/0x20 [ 47.254827] [ 47.324531] Allocated by task 312: [ 47.327918] kasan_save_stack+0x3c/0x68 [ 47.331736] kasan_save_track+0x20/0x40 [ 47.335555] kasan_save_alloc_info+0x40/0x58 [ 47.339809] __kasan_kmalloc+0xd4/0xd8 [ 47.343541] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.348055] kasan_atomics+0xb8/0x2e0 [ 47.351701] kunit_try_run_case+0x170/0x3f0 [ 47.355868] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.361336] kthread+0x328/0x630 [ 47.364548] ret_from_fork+0x10/0x20 [ 47.368107] [ 47.369583] The buggy address belongs to the object at ffff000805f49a00 [ 47.369583] which belongs to the cache kmalloc-64 of size 64 [ 47.381909] The buggy address is located 0 bytes to the right of [ 47.381909] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 47.394756] [ 47.396233] The buggy address belongs to the physical page: [ 47.401789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 47.409776] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.416284] page_type: f5(slab) [ 47.419418] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.427141] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.434860] page dumped because: kasan: bad access detected [ 47.440415] [ 47.441890] Memory state around the buggy address: [ 47.446670] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.453874] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.461078] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.468279] ^ [ 47.473057] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.480262] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.487462] ================================================================== [ 48.806785] ================================================================== [ 48.813836] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 48.821124] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 48.828502] [ 48.829985] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 48.830037] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.830054] Hardware name: WinLink E850-96 board (DT) [ 48.830073] Call trace: [ 48.830087] show_stack+0x20/0x38 (C) [ 48.830120] dump_stack_lvl+0x8c/0xd0 [ 48.830156] print_report+0x118/0x608 [ 48.830189] kasan_report+0xdc/0x128 [ 48.830222] kasan_check_range+0x100/0x1a8 [ 48.830256] __kasan_check_write+0x20/0x30 [ 48.830286] kasan_atomics_helper+0x414/0x4858 [ 48.830320] kasan_atomics+0x198/0x2e0 [ 48.830351] kunit_try_run_case+0x170/0x3f0 [ 48.830385] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.830423] kthread+0x328/0x630 [ 48.830451] ret_from_fork+0x10/0x20 [ 48.830482] [ 48.900202] Allocated by task 312: [ 48.903587] kasan_save_stack+0x3c/0x68 [ 48.907407] kasan_save_track+0x20/0x40 [ 48.911226] kasan_save_alloc_info+0x40/0x58 [ 48.915480] __kasan_kmalloc+0xd4/0xd8 [ 48.919212] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.923726] kasan_atomics+0xb8/0x2e0 [ 48.927372] kunit_try_run_case+0x170/0x3f0 [ 48.931538] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.937007] kthread+0x328/0x630 [ 48.940219] ret_from_fork+0x10/0x20 [ 48.943778] [ 48.945255] The buggy address belongs to the object at ffff000805f49a00 [ 48.945255] which belongs to the cache kmalloc-64 of size 64 [ 48.957580] The buggy address is located 0 bytes to the right of [ 48.957580] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 48.970427] [ 48.971904] The buggy address belongs to the physical page: [ 48.977460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 48.985447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.991955] page_type: f5(slab) [ 48.995091] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.002812] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.010530] page dumped because: kasan: bad access detected [ 49.016086] [ 49.017561] Memory state around the buggy address: [ 49.022340] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.029544] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.036749] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.043950] ^ [ 49.048728] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.055933] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.063134] ================================================================== [ 50.389071] ================================================================== [ 50.396105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 50.403392] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 50.410770] [ 50.412254] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 50.412306] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.412322] Hardware name: WinLink E850-96 board (DT) [ 50.412343] Call trace: [ 50.412361] show_stack+0x20/0x38 (C) [ 50.412394] dump_stack_lvl+0x8c/0xd0 [ 50.412432] print_report+0x118/0x608 [ 50.412467] kasan_report+0xdc/0x128 [ 50.412498] kasan_check_range+0x100/0x1a8 [ 50.412535] __kasan_check_write+0x20/0x30 [ 50.412565] kasan_atomics_helper+0x684/0x4858 [ 50.412598] kasan_atomics+0x198/0x2e0 [ 50.412631] kunit_try_run_case+0x170/0x3f0 [ 50.412667] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.412704] kthread+0x328/0x630 [ 50.412733] ret_from_fork+0x10/0x20 [ 50.412764] [ 50.482470] Allocated by task 312: [ 50.485856] kasan_save_stack+0x3c/0x68 [ 50.489675] kasan_save_track+0x20/0x40 [ 50.493494] kasan_save_alloc_info+0x40/0x58 [ 50.497748] __kasan_kmalloc+0xd4/0xd8 [ 50.501480] __kmalloc_cache_noprof+0x16c/0x3c0 [ 50.505994] kasan_atomics+0xb8/0x2e0 [ 50.509640] kunit_try_run_case+0x170/0x3f0 [ 50.513806] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.519275] kthread+0x328/0x630 [ 50.522487] ret_from_fork+0x10/0x20 [ 50.526046] [ 50.527521] The buggy address belongs to the object at ffff000805f49a00 [ 50.527521] which belongs to the cache kmalloc-64 of size 64 [ 50.539848] The buggy address is located 0 bytes to the right of [ 50.539848] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 50.552695] [ 50.554171] The buggy address belongs to the physical page: [ 50.559727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 50.567714] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.574222] page_type: f5(slab) [ 50.577356] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.585079] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.592798] page dumped because: kasan: bad access detected [ 50.598354] [ 50.599829] Memory state around the buggy address: [ 50.604607] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.611812] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.619017] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.626218] ^ [ 50.630996] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.638201] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.645402] ================================================================== [ 51.968124] ================================================================== [ 51.975072] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 51.982361] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 51.989739] [ 51.991223] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 51.991270] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.991285] Hardware name: WinLink E850-96 board (DT) [ 51.991306] Call trace: [ 51.991323] show_stack+0x20/0x38 (C) [ 51.991356] dump_stack_lvl+0x8c/0xd0 [ 51.991392] print_report+0x118/0x608 [ 51.991426] kasan_report+0xdc/0x128 [ 51.991462] kasan_check_range+0x100/0x1a8 [ 51.991498] __kasan_check_write+0x20/0x30 [ 51.991529] kasan_atomics_helper+0x934/0x4858 [ 51.991563] kasan_atomics+0x198/0x2e0 [ 51.991594] kunit_try_run_case+0x170/0x3f0 [ 51.991628] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.991666] kthread+0x328/0x630 [ 51.991693] ret_from_fork+0x10/0x20 [ 51.991730] [ 52.061439] Allocated by task 312: [ 52.064825] kasan_save_stack+0x3c/0x68 [ 52.068644] kasan_save_track+0x20/0x40 [ 52.072463] kasan_save_alloc_info+0x40/0x58 [ 52.076717] __kasan_kmalloc+0xd4/0xd8 [ 52.080449] __kmalloc_cache_noprof+0x16c/0x3c0 [ 52.084963] kasan_atomics+0xb8/0x2e0 [ 52.088609] kunit_try_run_case+0x170/0x3f0 [ 52.092776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.098244] kthread+0x328/0x630 [ 52.101456] ret_from_fork+0x10/0x20 [ 52.105015] [ 52.106490] The buggy address belongs to the object at ffff000805f49a00 [ 52.106490] which belongs to the cache kmalloc-64 of size 64 [ 52.118817] The buggy address is located 0 bytes to the right of [ 52.118817] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 52.131664] [ 52.133142] The buggy address belongs to the physical page: [ 52.138698] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 52.146683] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.153191] page_type: f5(slab) [ 52.156326] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.164049] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.171768] page dumped because: kasan: bad access detected [ 52.177323] [ 52.178798] Memory state around the buggy address: [ 52.183577] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.190782] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.197986] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.205187] ^ [ 52.209965] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.217170] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.224371] ================================================================== [ 58.538208] ================================================================== [ 58.545286] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 58.552662] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 58.560040] [ 58.561523] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 58.561569] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.561586] Hardware name: WinLink E850-96 board (DT) [ 58.561606] Call trace: [ 58.561620] show_stack+0x20/0x38 (C) [ 58.561655] dump_stack_lvl+0x8c/0xd0 [ 58.561689] print_report+0x118/0x608 [ 58.561722] kasan_report+0xdc/0x128 [ 58.561757] kasan_check_range+0x100/0x1a8 [ 58.561793] __kasan_check_write+0x20/0x30 [ 58.561824] kasan_atomics_helper+0x1190/0x4858 [ 58.561857] kasan_atomics+0x198/0x2e0 [ 58.561887] kunit_try_run_case+0x170/0x3f0 [ 58.561918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.561956] kthread+0x328/0x630 [ 58.561984] ret_from_fork+0x10/0x20 [ 58.562017] [ 58.631827] Allocated by task 312: [ 58.635213] kasan_save_stack+0x3c/0x68 [ 58.639032] kasan_save_track+0x20/0x40 [ 58.642851] kasan_save_alloc_info+0x40/0x58 [ 58.647104] __kasan_kmalloc+0xd4/0xd8 [ 58.650837] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.655351] kasan_atomics+0xb8/0x2e0 [ 58.658997] kunit_try_run_case+0x170/0x3f0 [ 58.663163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.668632] kthread+0x328/0x630 [ 58.671844] ret_from_fork+0x10/0x20 [ 58.675402] [ 58.676878] The buggy address belongs to the object at ffff000805f49a00 [ 58.676878] which belongs to the cache kmalloc-64 of size 64 [ 58.689205] The buggy address is located 0 bytes to the right of [ 58.689205] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 58.702052] [ 58.703527] The buggy address belongs to the physical page: [ 58.709085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 58.717072] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.723579] page_type: f5(slab) [ 58.726712] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.734436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.742155] page dumped because: kasan: bad access detected [ 58.747711] [ 58.749186] Memory state around the buggy address: [ 58.753964] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.761169] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.768374] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.775575] ^ [ 58.780353] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.787558] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.794759] ================================================================== [ 55.119488] ================================================================== [ 55.126413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 55.133703] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 55.141080] [ 55.142564] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 55.142614] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.142629] Hardware name: WinLink E850-96 board (DT) [ 55.142649] Call trace: [ 55.142666] show_stack+0x20/0x38 (C) [ 55.142698] dump_stack_lvl+0x8c/0xd0 [ 55.142734] print_report+0x118/0x608 [ 55.142767] kasan_report+0xdc/0x128 [ 55.142801] kasan_check_range+0x100/0x1a8 [ 55.142838] __kasan_check_write+0x20/0x30 [ 55.142869] kasan_atomics_helper+0xd3c/0x4858 [ 55.142904] kasan_atomics+0x198/0x2e0 [ 55.142935] kunit_try_run_case+0x170/0x3f0 [ 55.142971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.143009] kthread+0x328/0x630 [ 55.143037] ret_from_fork+0x10/0x20 [ 55.143072] [ 55.212781] Allocated by task 312: [ 55.216166] kasan_save_stack+0x3c/0x68 [ 55.219986] kasan_save_track+0x20/0x40 [ 55.223805] kasan_save_alloc_info+0x40/0x58 [ 55.228059] __kasan_kmalloc+0xd4/0xd8 [ 55.231791] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.236305] kasan_atomics+0xb8/0x2e0 [ 55.239950] kunit_try_run_case+0x170/0x3f0 [ 55.244117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.249586] kthread+0x328/0x630 [ 55.252798] ret_from_fork+0x10/0x20 [ 55.256357] [ 55.257832] The buggy address belongs to the object at ffff000805f49a00 [ 55.257832] which belongs to the cache kmalloc-64 of size 64 [ 55.270159] The buggy address is located 0 bytes to the right of [ 55.270159] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 55.283006] [ 55.284481] The buggy address belongs to the physical page: [ 55.290039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 55.298026] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.304533] page_type: f5(slab) [ 55.307668] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.315391] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.323109] page dumped because: kasan: bad access detected [ 55.328664] [ 55.330140] Memory state around the buggy address: [ 55.334919] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.342123] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.349328] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.356529] ^ [ 55.361307] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.368511] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.375713] ================================================================== [ 60.645842] ================================================================== [ 60.652892] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 60.660269] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 60.667647] [ 60.669129] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 60.669176] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.669192] Hardware name: WinLink E850-96 board (DT) [ 60.669211] Call trace: [ 60.669227] show_stack+0x20/0x38 (C) [ 60.669260] dump_stack_lvl+0x8c/0xd0 [ 60.669295] print_report+0x118/0x608 [ 60.669328] kasan_report+0xdc/0x128 [ 60.669361] kasan_check_range+0x100/0x1a8 [ 60.669395] __kasan_check_write+0x20/0x30 [ 60.669427] kasan_atomics_helper+0x14e4/0x4858 [ 60.669461] kasan_atomics+0x198/0x2e0 [ 60.669491] kunit_try_run_case+0x170/0x3f0 [ 60.669524] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.669562] kthread+0x328/0x630 [ 60.669590] ret_from_fork+0x10/0x20 [ 60.669623] [ 60.739434] Allocated by task 312: [ 60.742819] kasan_save_stack+0x3c/0x68 [ 60.746639] kasan_save_track+0x20/0x40 [ 60.750458] kasan_save_alloc_info+0x40/0x58 [ 60.754712] __kasan_kmalloc+0xd4/0xd8 [ 60.758444] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.762958] kasan_atomics+0xb8/0x2e0 [ 60.766604] kunit_try_run_case+0x170/0x3f0 [ 60.770771] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.776239] kthread+0x328/0x630 [ 60.779450] ret_from_fork+0x10/0x20 [ 60.783010] [ 60.784485] The buggy address belongs to the object at ffff000805f49a00 [ 60.784485] which belongs to the cache kmalloc-64 of size 64 [ 60.796812] The buggy address is located 0 bytes to the right of [ 60.796812] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 60.809659] [ 60.811135] The buggy address belongs to the physical page: [ 60.816690] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 60.824678] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.831186] page_type: f5(slab) [ 60.834321] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.842044] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.849762] page dumped because: kasan: bad access detected [ 60.855318] [ 60.856793] Memory state around the buggy address: [ 60.861572] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.868776] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.875981] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.883182] ^ [ 60.887960] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.895165] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.902366] ================================================================== [ 47.494868] ================================================================== [ 47.501879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 47.509164] Read of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 47.516456] [ 47.517941] CPU: 1 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 47.517993] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.518009] Hardware name: WinLink E850-96 board (DT) [ 47.518030] Call trace: [ 47.518046] show_stack+0x20/0x38 (C) [ 47.518082] dump_stack_lvl+0x8c/0xd0 [ 47.518123] print_report+0x118/0x608 [ 47.518158] kasan_report+0xdc/0x128 [ 47.518192] kasan_check_range+0x100/0x1a8 [ 47.518231] __kasan_check_read+0x20/0x30 [ 47.518260] kasan_atomics_helper+0x2b0/0x4858 [ 47.518295] kasan_atomics+0x198/0x2e0 [ 47.518328] kunit_try_run_case+0x170/0x3f0 [ 47.518367] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.518407] kthread+0x328/0x630 [ 47.518435] ret_from_fork+0x10/0x20 [ 47.518470] [ 47.588069] Allocated by task 312: [ 47.591456] kasan_save_stack+0x3c/0x68 [ 47.595274] kasan_save_track+0x20/0x40 [ 47.599093] kasan_save_alloc_info+0x40/0x58 [ 47.603346] __kasan_kmalloc+0xd4/0xd8 [ 47.607079] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.611593] kasan_atomics+0xb8/0x2e0 [ 47.615239] kunit_try_run_case+0x170/0x3f0 [ 47.619405] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.624874] kthread+0x328/0x630 [ 47.628086] ret_from_fork+0x10/0x20 [ 47.631645] [ 47.633121] The buggy address belongs to the object at ffff000805f49a00 [ 47.633121] which belongs to the cache kmalloc-64 of size 64 [ 47.645447] The buggy address is located 0 bytes to the right of [ 47.645447] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 47.658294] [ 47.659771] The buggy address belongs to the physical page: [ 47.665330] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 47.673311] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.679821] page_type: f5(slab) [ 47.682957] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.690680] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.698397] page dumped because: kasan: bad access detected [ 47.703953] [ 47.705428] Memory state around the buggy address: [ 47.710208] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.717411] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.724616] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.731817] ^ [ 47.736595] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.743800] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.751002] ================================================================== [ 51.180189] ================================================================== [ 51.187237] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 51.194526] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 51.201904] [ 51.203386] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 51.203435] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.203452] Hardware name: WinLink E850-96 board (DT) [ 51.203473] Call trace: [ 51.203488] show_stack+0x20/0x38 (C) [ 51.203521] dump_stack_lvl+0x8c/0xd0 [ 51.203557] print_report+0x118/0x608 [ 51.203590] kasan_report+0xdc/0x128 [ 51.203625] kasan_check_range+0x100/0x1a8 [ 51.203662] __kasan_check_write+0x20/0x30 [ 51.203692] kasan_atomics_helper+0x7cc/0x4858 [ 51.203726] kasan_atomics+0x198/0x2e0 [ 51.203756] kunit_try_run_case+0x170/0x3f0 [ 51.203790] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.203828] kthread+0x328/0x630 [ 51.203856] ret_from_fork+0x10/0x20 [ 51.203887] [ 51.273604] Allocated by task 312: [ 51.276989] kasan_save_stack+0x3c/0x68 [ 51.280809] kasan_save_track+0x20/0x40 [ 51.284628] kasan_save_alloc_info+0x40/0x58 [ 51.288881] __kasan_kmalloc+0xd4/0xd8 [ 51.292614] __kmalloc_cache_noprof+0x16c/0x3c0 [ 51.297128] kasan_atomics+0xb8/0x2e0 [ 51.300774] kunit_try_run_case+0x170/0x3f0 [ 51.304940] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.310409] kthread+0x328/0x630 [ 51.313621] ret_from_fork+0x10/0x20 [ 51.317180] [ 51.318655] The buggy address belongs to the object at ffff000805f49a00 [ 51.318655] which belongs to the cache kmalloc-64 of size 64 [ 51.330982] The buggy address is located 0 bytes to the right of [ 51.330982] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 51.343829] [ 51.345304] The buggy address belongs to the physical page: [ 51.350860] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 51.358848] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.365356] page_type: f5(slab) [ 51.368489] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.376213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.383932] page dumped because: kasan: bad access detected [ 51.389488] [ 51.390963] Memory state around the buggy address: [ 51.395741] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.402946] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.410151] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.417351] ^ [ 51.422130] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.429335] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.436536] ================================================================== [ 47.758436] ================================================================== [ 47.765413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 47.772789] Read of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 47.780080] [ 47.781565] CPU: 1 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 47.781618] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.781636] Hardware name: WinLink E850-96 board (DT) [ 47.781656] Call trace: [ 47.781670] show_stack+0x20/0x38 (C) [ 47.781706] dump_stack_lvl+0x8c/0xd0 [ 47.781741] print_report+0x118/0x608 [ 47.781776] kasan_report+0xdc/0x128 [ 47.781812] __asan_report_load4_noabort+0x20/0x30 [ 47.781852] kasan_atomics_helper+0x40fc/0x4858 [ 47.781886] kasan_atomics+0x198/0x2e0 [ 47.781917] kunit_try_run_case+0x170/0x3f0 [ 47.781954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.781993] kthread+0x328/0x630 [ 47.782019] ret_from_fork+0x10/0x20 [ 47.782053] [ 47.848482] Allocated by task 312: [ 47.851868] kasan_save_stack+0x3c/0x68 [ 47.855686] kasan_save_track+0x20/0x40 [ 47.859506] kasan_save_alloc_info+0x40/0x58 [ 47.863760] __kasan_kmalloc+0xd4/0xd8 [ 47.867491] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.872006] kasan_atomics+0xb8/0x2e0 [ 47.875651] kunit_try_run_case+0x170/0x3f0 [ 47.879818] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.885287] kthread+0x328/0x630 [ 47.888499] ret_from_fork+0x10/0x20 [ 47.892058] [ 47.893534] The buggy address belongs to the object at ffff000805f49a00 [ 47.893534] which belongs to the cache kmalloc-64 of size 64 [ 47.905862] The buggy address is located 0 bytes to the right of [ 47.905862] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 47.918707] [ 47.920184] The buggy address belongs to the physical page: [ 47.925741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 47.933726] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.940234] page_type: f5(slab) [ 47.943369] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.951091] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.958810] page dumped because: kasan: bad access detected [ 47.964365] [ 47.965841] Memory state around the buggy address: [ 47.970621] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.977824] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.985029] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.992230] ^ [ 47.997008] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.004212] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.011413] ================================================================== [ 51.707616] ================================================================== [ 51.714659] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 51.722035] Read of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 51.729327] [ 51.730809] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 51.730854] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.730872] Hardware name: WinLink E850-96 board (DT) [ 51.730893] Call trace: [ 51.730907] show_stack+0x20/0x38 (C) [ 51.730940] dump_stack_lvl+0x8c/0xd0 [ 51.730976] print_report+0x118/0x608 [ 51.731010] kasan_report+0xdc/0x128 [ 51.731044] __asan_report_load4_noabort+0x20/0x30 [ 51.731083] kasan_atomics_helper+0x42d8/0x4858 [ 51.731117] kasan_atomics+0x198/0x2e0 [ 51.731149] kunit_try_run_case+0x170/0x3f0 [ 51.731182] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.731221] kthread+0x328/0x630 [ 51.731250] ret_from_fork+0x10/0x20 [ 51.731284] [ 51.797728] Allocated by task 312: [ 51.801114] kasan_save_stack+0x3c/0x68 [ 51.804932] kasan_save_track+0x20/0x40 [ 51.808752] kasan_save_alloc_info+0x40/0x58 [ 51.813006] __kasan_kmalloc+0xd4/0xd8 [ 51.816738] __kmalloc_cache_noprof+0x16c/0x3c0 [ 51.821252] kasan_atomics+0xb8/0x2e0 [ 51.824898] kunit_try_run_case+0x170/0x3f0 [ 51.829064] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.834533] kthread+0x328/0x630 [ 51.837745] ret_from_fork+0x10/0x20 [ 51.841304] [ 51.842779] The buggy address belongs to the object at ffff000805f49a00 [ 51.842779] which belongs to the cache kmalloc-64 of size 64 [ 51.855106] The buggy address is located 0 bytes to the right of [ 51.855106] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 51.867953] [ 51.869429] The buggy address belongs to the physical page: [ 51.874984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 51.882972] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.889480] page_type: f5(slab) [ 51.892614] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.900338] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.908056] page dumped because: kasan: bad access detected [ 51.913612] [ 51.915087] Memory state around the buggy address: [ 51.919866] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.927070] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.934275] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.941476] ^ [ 51.946254] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.953459] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.960660] ================================================================== [ 51.443918] ================================================================== [ 51.450948] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 51.458237] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 51.465615] [ 51.467098] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 51.467147] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.467165] Hardware name: WinLink E850-96 board (DT) [ 51.467185] Call trace: [ 51.467202] show_stack+0x20/0x38 (C) [ 51.467234] dump_stack_lvl+0x8c/0xd0 [ 51.467272] print_report+0x118/0x608 [ 51.467305] kasan_report+0xdc/0x128 [ 51.467338] kasan_check_range+0x100/0x1a8 [ 51.467374] __kasan_check_write+0x20/0x30 [ 51.467405] kasan_atomics_helper+0x894/0x4858 [ 51.467437] kasan_atomics+0x198/0x2e0 [ 51.467469] kunit_try_run_case+0x170/0x3f0 [ 51.467504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.467544] kthread+0x328/0x630 [ 51.467571] ret_from_fork+0x10/0x20 [ 51.467604] [ 51.537315] Allocated by task 312: [ 51.540701] kasan_save_stack+0x3c/0x68 [ 51.544520] kasan_save_track+0x20/0x40 [ 51.548339] kasan_save_alloc_info+0x40/0x58 [ 51.552593] __kasan_kmalloc+0xd4/0xd8 [ 51.556325] __kmalloc_cache_noprof+0x16c/0x3c0 [ 51.560839] kasan_atomics+0xb8/0x2e0 [ 51.564485] kunit_try_run_case+0x170/0x3f0 [ 51.568652] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.574120] kthread+0x328/0x630 [ 51.577332] ret_from_fork+0x10/0x20 [ 51.580891] [ 51.582367] The buggy address belongs to the object at ffff000805f49a00 [ 51.582367] which belongs to the cache kmalloc-64 of size 64 [ 51.594693] The buggy address is located 0 bytes to the right of [ 51.594693] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 51.607540] [ 51.609016] The buggy address belongs to the physical page: [ 51.614572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 51.622558] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.629068] page_type: f5(slab) [ 51.632200] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.639925] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.647644] page dumped because: kasan: bad access detected [ 51.653199] [ 51.654674] Memory state around the buggy address: [ 51.659453] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.666658] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.673862] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.681063] ^ [ 51.685841] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.693046] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.700247] ================================================================== [ 49.334217] ================================================================== [ 49.341258] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 49.348546] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 49.355924] [ 49.357408] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 49.357457] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.357475] Hardware name: WinLink E850-96 board (DT) [ 49.357497] Call trace: [ 49.357512] show_stack+0x20/0x38 (C) [ 49.357545] dump_stack_lvl+0x8c/0xd0 [ 49.357583] print_report+0x118/0x608 [ 49.357619] kasan_report+0xdc/0x128 [ 49.357652] kasan_check_range+0x100/0x1a8 [ 49.357686] __kasan_check_write+0x20/0x30 [ 49.357717] kasan_atomics_helper+0x4e4/0x4858 [ 49.357749] kasan_atomics+0x198/0x2e0 [ 49.357781] kunit_try_run_case+0x170/0x3f0 [ 49.357816] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.357854] kthread+0x328/0x630 [ 49.357883] ret_from_fork+0x10/0x20 [ 49.357915] [ 49.427625] Allocated by task 312: [ 49.431010] kasan_save_stack+0x3c/0x68 [ 49.434829] kasan_save_track+0x20/0x40 [ 49.438649] kasan_save_alloc_info+0x40/0x58 [ 49.442903] __kasan_kmalloc+0xd4/0xd8 [ 49.446635] __kmalloc_cache_noprof+0x16c/0x3c0 [ 49.451149] kasan_atomics+0xb8/0x2e0 [ 49.454794] kunit_try_run_case+0x170/0x3f0 [ 49.458961] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.464430] kthread+0x328/0x630 [ 49.467642] ret_from_fork+0x10/0x20 [ 49.471201] [ 49.472676] The buggy address belongs to the object at ffff000805f49a00 [ 49.472676] which belongs to the cache kmalloc-64 of size 64 [ 49.485003] The buggy address is located 0 bytes to the right of [ 49.485003] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 49.497850] [ 49.499326] The buggy address belongs to the physical page: [ 49.504881] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 49.512869] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.519377] page_type: f5(slab) [ 49.522510] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.530235] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.537953] page dumped because: kasan: bad access detected [ 49.543508] [ 49.544984] Memory state around the buggy address: [ 49.549762] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.556967] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.564172] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.571373] ^ [ 49.576151] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.583356] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.590556] ================================================================== [ 56.431167] ================================================================== [ 56.438200] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 56.445575] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 56.452953] [ 56.454437] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 56.454484] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.454501] Hardware name: WinLink E850-96 board (DT) [ 56.454521] Call trace: [ 56.454534] show_stack+0x20/0x38 (C) [ 56.454567] dump_stack_lvl+0x8c/0xd0 [ 56.454604] print_report+0x118/0x608 [ 56.454637] kasan_report+0xdc/0x128 [ 56.454671] __asan_report_store8_noabort+0x20/0x30 [ 56.454703] kasan_atomics_helper+0x3e5c/0x4858 [ 56.454736] kasan_atomics+0x198/0x2e0 [ 56.454768] kunit_try_run_case+0x170/0x3f0 [ 56.454804] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.454842] kthread+0x328/0x630 [ 56.454868] ret_from_fork+0x10/0x20 [ 56.454900] [ 56.521442] Allocated by task 312: [ 56.524827] kasan_save_stack+0x3c/0x68 [ 56.528647] kasan_save_track+0x20/0x40 [ 56.532466] kasan_save_alloc_info+0x40/0x58 [ 56.536719] __kasan_kmalloc+0xd4/0xd8 [ 56.540452] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.544966] kasan_atomics+0xb8/0x2e0 [ 56.548612] kunit_try_run_case+0x170/0x3f0 [ 56.552778] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.558247] kthread+0x328/0x630 [ 56.561459] ret_from_fork+0x10/0x20 [ 56.565018] [ 56.566493] The buggy address belongs to the object at ffff000805f49a00 [ 56.566493] which belongs to the cache kmalloc-64 of size 64 [ 56.578820] The buggy address is located 0 bytes to the right of [ 56.578820] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 56.591667] [ 56.593142] The buggy address belongs to the physical page: [ 56.598698] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 56.606683] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.613194] page_type: f5(slab) [ 56.616327] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.624051] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.631770] page dumped because: kasan: bad access detected [ 56.637326] [ 56.638801] Memory state around the buggy address: [ 56.643579] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.650784] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.657989] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.665190] ^ [ 56.669968] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.677172] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.684374] ================================================================== [ 54.071162] ================================================================== [ 54.078166] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 54.085455] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 54.092833] [ 54.094315] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 54.094361] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.094378] Hardware name: WinLink E850-96 board (DT) [ 54.094397] Call trace: [ 54.094411] show_stack+0x20/0x38 (C) [ 54.094443] dump_stack_lvl+0x8c/0xd0 [ 54.094480] print_report+0x118/0x608 [ 54.094513] kasan_report+0xdc/0x128 [ 54.094546] kasan_check_range+0x100/0x1a8 [ 54.094584] __kasan_check_write+0x20/0x30 [ 54.094615] kasan_atomics_helper+0xc08/0x4858 [ 54.094649] kasan_atomics+0x198/0x2e0 [ 54.094679] kunit_try_run_case+0x170/0x3f0 [ 54.094713] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.094751] kthread+0x328/0x630 [ 54.094780] ret_from_fork+0x10/0x20 [ 54.094813] [ 54.164533] Allocated by task 312: [ 54.167918] kasan_save_stack+0x3c/0x68 [ 54.171737] kasan_save_track+0x20/0x40 [ 54.175557] kasan_save_alloc_info+0x40/0x58 [ 54.179810] __kasan_kmalloc+0xd4/0xd8 [ 54.183543] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.188057] kasan_atomics+0xb8/0x2e0 [ 54.191702] kunit_try_run_case+0x170/0x3f0 [ 54.195869] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.201338] kthread+0x328/0x630 [ 54.204550] ret_from_fork+0x10/0x20 [ 54.208108] [ 54.209584] The buggy address belongs to the object at ffff000805f49a00 [ 54.209584] which belongs to the cache kmalloc-64 of size 64 [ 54.221911] The buggy address is located 0 bytes to the right of [ 54.221911] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 54.234758] [ 54.236233] The buggy address belongs to the physical page: [ 54.241789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 54.249778] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.256285] page_type: f5(slab) [ 54.259418] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.267143] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.274861] page dumped because: kasan: bad access detected [ 54.280416] [ 54.281892] Memory state around the buggy address: [ 54.286671] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.293875] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.301080] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.308281] ^ [ 54.313059] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.320264] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.327464] ================================================================== [ 56.167435] ================================================================== [ 56.174487] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 56.181777] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 56.189155] [ 56.190636] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 56.190683] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.190699] Hardware name: WinLink E850-96 board (DT) [ 56.190717] Call trace: [ 56.190733] show_stack+0x20/0x38 (C) [ 56.190766] dump_stack_lvl+0x8c/0xd0 [ 56.190801] print_report+0x118/0x608 [ 56.190832] kasan_report+0xdc/0x128 [ 56.190865] kasan_check_range+0x100/0x1a8 [ 56.190901] __kasan_check_write+0x20/0x30 [ 56.190932] kasan_atomics_helper+0xe44/0x4858 [ 56.190966] kasan_atomics+0x198/0x2e0 [ 56.190997] kunit_try_run_case+0x170/0x3f0 [ 56.191032] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.191070] kthread+0x328/0x630 [ 56.191098] ret_from_fork+0x10/0x20 [ 56.191128] [ 56.260855] Allocated by task 312: [ 56.264241] kasan_save_stack+0x3c/0x68 [ 56.268060] kasan_save_track+0x20/0x40 [ 56.271879] kasan_save_alloc_info+0x40/0x58 [ 56.276133] __kasan_kmalloc+0xd4/0xd8 [ 56.279866] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.284380] kasan_atomics+0xb8/0x2e0 [ 56.288025] kunit_try_run_case+0x170/0x3f0 [ 56.292192] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.297661] kthread+0x328/0x630 [ 56.300872] ret_from_fork+0x10/0x20 [ 56.304431] [ 56.305907] The buggy address belongs to the object at ffff000805f49a00 [ 56.305907] which belongs to the cache kmalloc-64 of size 64 [ 56.318234] The buggy address is located 0 bytes to the right of [ 56.318234] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 56.331080] [ 56.332556] The buggy address belongs to the physical page: [ 56.338112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 56.346098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.352608] page_type: f5(slab) [ 56.355741] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.363465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.371184] page dumped because: kasan: bad access detected [ 56.376739] [ 56.378214] Memory state around the buggy address: [ 56.382993] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.390198] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.397402] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.404603] ^ [ 56.409381] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.416586] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.423787] ================================================================== [ 49.861724] ================================================================== [ 49.868679] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 49.875969] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 49.883347] [ 49.884831] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 49.884883] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.884899] Hardware name: WinLink E850-96 board (DT) [ 49.884920] Call trace: [ 49.884934] show_stack+0x20/0x38 (C) [ 49.884967] dump_stack_lvl+0x8c/0xd0 [ 49.885005] print_report+0x118/0x608 [ 49.885038] kasan_report+0xdc/0x128 [ 49.885071] kasan_check_range+0x100/0x1a8 [ 49.885107] __kasan_check_write+0x20/0x30 [ 49.885137] kasan_atomics_helper+0x5b4/0x4858 [ 49.885170] kasan_atomics+0x198/0x2e0 [ 49.885201] kunit_try_run_case+0x170/0x3f0 [ 49.885235] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.885274] kthread+0x328/0x630 [ 49.885302] ret_from_fork+0x10/0x20 [ 49.885331] [ 49.955047] Allocated by task 312: [ 49.958433] kasan_save_stack+0x3c/0x68 [ 49.962252] kasan_save_track+0x20/0x40 [ 49.966072] kasan_save_alloc_info+0x40/0x58 [ 49.970325] __kasan_kmalloc+0xd4/0xd8 [ 49.974058] __kmalloc_cache_noprof+0x16c/0x3c0 [ 49.978571] kasan_atomics+0xb8/0x2e0 [ 49.982217] kunit_try_run_case+0x170/0x3f0 [ 49.986384] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.991853] kthread+0x328/0x630 [ 49.995064] ret_from_fork+0x10/0x20 [ 49.998623] [ 50.000099] The buggy address belongs to the object at ffff000805f49a00 [ 50.000099] which belongs to the cache kmalloc-64 of size 64 [ 50.012425] The buggy address is located 0 bytes to the right of [ 50.012425] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 50.025272] [ 50.026749] The buggy address belongs to the physical page: [ 50.032304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 50.040290] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.046799] page_type: f5(slab) [ 50.049935] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.057657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.065376] page dumped because: kasan: bad access detected [ 50.070931] [ 50.072406] Memory state around the buggy address: [ 50.077185] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.084390] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.091594] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.098795] ^ [ 50.103574] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.110778] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.117979] ================================================================== [ 46.707046] ================================================================== [ 46.714042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 46.721415] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 46.728795] [ 46.730282] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 46.730339] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.730357] Hardware name: WinLink E850-96 board (DT) [ 46.730378] Call trace: [ 46.730393] show_stack+0x20/0x38 (C) [ 46.730430] dump_stack_lvl+0x8c/0xd0 [ 46.730468] print_report+0x118/0x608 [ 46.730503] kasan_report+0xdc/0x128 [ 46.730539] __asan_report_store4_noabort+0x20/0x30 [ 46.730575] kasan_atomics_helper+0x3f7c/0x4858 [ 46.730610] kasan_atomics+0x198/0x2e0 [ 46.730645] kunit_try_run_case+0x170/0x3f0 [ 46.730681] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.730721] kthread+0x328/0x630 [ 46.730753] ret_from_fork+0x10/0x20 [ 46.730790] [ 46.797283] Allocated by task 312: [ 46.800670] kasan_save_stack+0x3c/0x68 [ 46.804487] kasan_save_track+0x20/0x40 [ 46.808306] kasan_save_alloc_info+0x40/0x58 [ 46.812560] __kasan_kmalloc+0xd4/0xd8 [ 46.816293] __kmalloc_cache_noprof+0x16c/0x3c0 [ 46.820807] kasan_atomics+0xb8/0x2e0 [ 46.824452] kunit_try_run_case+0x170/0x3f0 [ 46.828619] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.834087] kthread+0x328/0x630 [ 46.837299] ret_from_fork+0x10/0x20 [ 46.840860] [ 46.842336] The buggy address belongs to the object at ffff000805f49a00 [ 46.842336] which belongs to the cache kmalloc-64 of size 64 [ 46.854662] The buggy address is located 0 bytes to the right of [ 46.854662] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 46.867507] [ 46.868985] The buggy address belongs to the physical page: [ 46.874542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 46.882527] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.889035] page_type: f5(slab) [ 46.892170] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 46.899892] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 46.907611] page dumped because: kasan: bad access detected [ 46.913166] [ 46.914641] Memory state around the buggy address: [ 46.919421] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.926624] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.933831] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 46.941030] ^ [ 46.945808] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.953013] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.960214] ================================================================== [ 52.231709] ================================================================== [ 52.238783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 52.246072] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 52.253451] [ 52.254933] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 52.254984] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.254998] Hardware name: WinLink E850-96 board (DT) [ 52.255018] Call trace: [ 52.255031] show_stack+0x20/0x38 (C) [ 52.255065] dump_stack_lvl+0x8c/0xd0 [ 52.255100] print_report+0x118/0x608 [ 52.255133] kasan_report+0xdc/0x128 [ 52.255166] kasan_check_range+0x100/0x1a8 [ 52.255201] __kasan_check_write+0x20/0x30 [ 52.255230] kasan_atomics_helper+0x99c/0x4858 [ 52.255265] kasan_atomics+0x198/0x2e0 [ 52.255296] kunit_try_run_case+0x170/0x3f0 [ 52.255329] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.255367] kthread+0x328/0x630 [ 52.255396] ret_from_fork+0x10/0x20 [ 52.255428] [ 52.325151] Allocated by task 312: [ 52.328536] kasan_save_stack+0x3c/0x68 [ 52.332355] kasan_save_track+0x20/0x40 [ 52.336175] kasan_save_alloc_info+0x40/0x58 [ 52.340428] __kasan_kmalloc+0xd4/0xd8 [ 52.344161] __kmalloc_cache_noprof+0x16c/0x3c0 [ 52.348675] kasan_atomics+0xb8/0x2e0 [ 52.352321] kunit_try_run_case+0x170/0x3f0 [ 52.356487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.361956] kthread+0x328/0x630 [ 52.365168] ret_from_fork+0x10/0x20 [ 52.368727] [ 52.370202] The buggy address belongs to the object at ffff000805f49a00 [ 52.370202] which belongs to the cache kmalloc-64 of size 64 [ 52.382529] The buggy address is located 0 bytes to the right of [ 52.382529] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 52.395375] [ 52.396851] The buggy address belongs to the physical page: [ 52.402407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 52.410393] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.416903] page_type: f5(slab) [ 52.420036] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.427760] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.435479] page dumped because: kasan: bad access detected [ 52.441034] [ 52.442510] Memory state around the buggy address: [ 52.447288] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.454493] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.461698] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.468898] ^ [ 52.473677] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.480881] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.488082] ================================================================== [ 48.543148] ================================================================== [ 48.550124] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 48.557413] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 48.564791] [ 48.566276] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 48.566329] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.566347] Hardware name: WinLink E850-96 board (DT) [ 48.566371] Call trace: [ 48.566387] show_stack+0x20/0x38 (C) [ 48.566426] dump_stack_lvl+0x8c/0xd0 [ 48.566464] print_report+0x118/0x608 [ 48.566502] kasan_report+0xdc/0x128 [ 48.566535] kasan_check_range+0x100/0x1a8 [ 48.566574] __kasan_check_write+0x20/0x30 [ 48.566605] kasan_atomics_helper+0x3ac/0x4858 [ 48.566639] kasan_atomics+0x198/0x2e0 [ 48.566669] kunit_try_run_case+0x170/0x3f0 [ 48.566705] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.566743] kthread+0x328/0x630 [ 48.566771] ret_from_fork+0x10/0x20 [ 48.566805] [ 48.636491] Allocated by task 312: [ 48.639878] kasan_save_stack+0x3c/0x68 [ 48.643695] kasan_save_track+0x20/0x40 [ 48.647515] kasan_save_alloc_info+0x40/0x58 [ 48.651768] __kasan_kmalloc+0xd4/0xd8 [ 48.655501] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.660015] kasan_atomics+0xb8/0x2e0 [ 48.663661] kunit_try_run_case+0x170/0x3f0 [ 48.667827] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.673296] kthread+0x328/0x630 [ 48.676508] ret_from_fork+0x10/0x20 [ 48.680067] [ 48.681544] The buggy address belongs to the object at ffff000805f49a00 [ 48.681544] which belongs to the cache kmalloc-64 of size 64 [ 48.693869] The buggy address is located 0 bytes to the right of [ 48.693869] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 48.706716] [ 48.708193] The buggy address belongs to the physical page: [ 48.713752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 48.721735] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.728243] page_type: f5(slab) [ 48.731378] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 48.739100] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.746819] page dumped because: kasan: bad access detected [ 48.752374] [ 48.753850] Memory state around the buggy address: [ 48.758630] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.765833] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.773038] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.780239] ^ [ 48.785017] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.792222] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.799422] ================================================================== [ 55.643509] ================================================================== [ 55.650537] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 55.657827] Read of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 55.665118] [ 55.666600] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 55.666652] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.666669] Hardware name: WinLink E850-96 board (DT) [ 55.666689] Call trace: [ 55.666705] show_stack+0x20/0x38 (C) [ 55.666737] dump_stack_lvl+0x8c/0xd0 [ 55.666772] print_report+0x118/0x608 [ 55.666805] kasan_report+0xdc/0x128 [ 55.666840] kasan_check_range+0x100/0x1a8 [ 55.666878] __kasan_check_read+0x20/0x30 [ 55.666909] kasan_atomics_helper+0xdd4/0x4858 [ 55.666943] kasan_atomics+0x198/0x2e0 [ 55.666977] kunit_try_run_case+0x170/0x3f0 [ 55.667010] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.667047] kthread+0x328/0x630 [ 55.667074] ret_from_fork+0x10/0x20 [ 55.667107] [ 55.736731] Allocated by task 312: [ 55.740117] kasan_save_stack+0x3c/0x68 [ 55.743936] kasan_save_track+0x20/0x40 [ 55.747756] kasan_save_alloc_info+0x40/0x58 [ 55.752009] __kasan_kmalloc+0xd4/0xd8 [ 55.755742] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.760255] kasan_atomics+0xb8/0x2e0 [ 55.763901] kunit_try_run_case+0x170/0x3f0 [ 55.768068] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.773536] kthread+0x328/0x630 [ 55.776748] ret_from_fork+0x10/0x20 [ 55.780307] [ 55.781782] The buggy address belongs to the object at ffff000805f49a00 [ 55.781782] which belongs to the cache kmalloc-64 of size 64 [ 55.794109] The buggy address is located 0 bytes to the right of [ 55.794109] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 55.806956] [ 55.808432] The buggy address belongs to the physical page: [ 55.813988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 55.821975] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.828484] page_type: f5(slab) [ 55.831619] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.839341] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.847060] page dumped because: kasan: bad access detected [ 55.852615] [ 55.854091] Memory state around the buggy address: [ 55.858869] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.866074] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.873278] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.880479] ^ [ 55.885257] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.892462] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.899663] ================================================================== [ 57.482875] ================================================================== [ 57.489921] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 57.497209] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 57.504587] [ 57.506068] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 57.506117] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.506134] Hardware name: WinLink E850-96 board (DT) [ 57.506152] Call trace: [ 57.506166] show_stack+0x20/0x38 (C) [ 57.506199] dump_stack_lvl+0x8c/0xd0 [ 57.506234] print_report+0x118/0x608 [ 57.506268] kasan_report+0xdc/0x128 [ 57.506300] kasan_check_range+0x100/0x1a8 [ 57.506335] __kasan_check_write+0x20/0x30 [ 57.506365] kasan_atomics_helper+0xff0/0x4858 [ 57.506399] kasan_atomics+0x198/0x2e0 [ 57.506429] kunit_try_run_case+0x170/0x3f0 [ 57.506463] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.506502] kthread+0x328/0x630 [ 57.506529] ret_from_fork+0x10/0x20 [ 57.506561] [ 57.576287] Allocated by task 312: [ 57.579673] kasan_save_stack+0x3c/0x68 [ 57.583492] kasan_save_track+0x20/0x40 [ 57.587311] kasan_save_alloc_info+0x40/0x58 [ 57.591565] __kasan_kmalloc+0xd4/0xd8 [ 57.595297] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.599811] kasan_atomics+0xb8/0x2e0 [ 57.603457] kunit_try_run_case+0x170/0x3f0 [ 57.607624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.613092] kthread+0x328/0x630 [ 57.616304] ret_from_fork+0x10/0x20 [ 57.619863] [ 57.621338] The buggy address belongs to the object at ffff000805f49a00 [ 57.621338] which belongs to the cache kmalloc-64 of size 64 [ 57.633665] The buggy address is located 0 bytes to the right of [ 57.633665] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 57.646512] [ 57.647988] The buggy address belongs to the physical page: [ 57.653544] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 57.661530] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.668039] page_type: f5(slab) [ 57.671172] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.678897] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.686615] page dumped because: kasan: bad access detected [ 57.692171] [ 57.693646] Memory state around the buggy address: [ 57.698425] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.705629] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.712834] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.720035] ^ [ 57.724813] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.732018] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.739219] ================================================================== [ 59.857748] ================================================================== [ 59.864713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 59.872087] Read of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 59.879378] [ 59.880861] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 59.880910] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.880928] Hardware name: WinLink E850-96 board (DT) [ 59.880948] Call trace: [ 59.880963] show_stack+0x20/0x38 (C) [ 59.880999] dump_stack_lvl+0x8c/0xd0 [ 59.881035] print_report+0x118/0x608 [ 59.881071] kasan_report+0xdc/0x128 [ 59.881102] __asan_report_load8_noabort+0x20/0x30 [ 59.881142] kasan_atomics_helper+0x3f04/0x4858 [ 59.881176] kasan_atomics+0x198/0x2e0 [ 59.881207] kunit_try_run_case+0x170/0x3f0 [ 59.881243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.881282] kthread+0x328/0x630 [ 59.881309] ret_from_fork+0x10/0x20 [ 59.881343] [ 59.947779] Allocated by task 312: [ 59.951165] kasan_save_stack+0x3c/0x68 [ 59.954984] kasan_save_track+0x20/0x40 [ 59.958804] kasan_save_alloc_info+0x40/0x58 [ 59.963057] __kasan_kmalloc+0xd4/0xd8 [ 59.966789] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.971303] kasan_atomics+0xb8/0x2e0 [ 59.974949] kunit_try_run_case+0x170/0x3f0 [ 59.979116] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.984584] kthread+0x328/0x630 [ 59.987796] ret_from_fork+0x10/0x20 [ 59.991355] [ 59.992831] The buggy address belongs to the object at ffff000805f49a00 [ 59.992831] which belongs to the cache kmalloc-64 of size 64 [ 60.005158] The buggy address is located 0 bytes to the right of [ 60.005158] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 60.018004] [ 60.019481] The buggy address belongs to the physical page: [ 60.025037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 60.033025] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.039531] page_type: f5(slab) [ 60.042665] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.050389] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.058108] page dumped because: kasan: bad access detected [ 60.063663] [ 60.065138] Memory state around the buggy address: [ 60.069918] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.077122] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.084326] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.091527] ^ [ 60.096305] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.103510] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.110711] ================================================================== [ 55.907054] ================================================================== [ 55.914075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 55.921451] Read of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 55.928743] [ 55.930224] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 55.930269] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.930284] Hardware name: WinLink E850-96 board (DT) [ 55.930303] Call trace: [ 55.930317] show_stack+0x20/0x38 (C) [ 55.930349] dump_stack_lvl+0x8c/0xd0 [ 55.930385] print_report+0x118/0x608 [ 55.930417] kasan_report+0xdc/0x128 [ 55.930451] __asan_report_load8_noabort+0x20/0x30 [ 55.930490] kasan_atomics_helper+0x3f58/0x4858 [ 55.930525] kasan_atomics+0x198/0x2e0 [ 55.930556] kunit_try_run_case+0x170/0x3f0 [ 55.930591] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.930628] kthread+0x328/0x630 [ 55.930657] ret_from_fork+0x10/0x20 [ 55.930688] [ 55.997144] Allocated by task 312: [ 56.000530] kasan_save_stack+0x3c/0x68 [ 56.004349] kasan_save_track+0x20/0x40 [ 56.008168] kasan_save_alloc_info+0x40/0x58 [ 56.012422] __kasan_kmalloc+0xd4/0xd8 [ 56.016154] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.020668] kasan_atomics+0xb8/0x2e0 [ 56.024314] kunit_try_run_case+0x170/0x3f0 [ 56.028481] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.033949] kthread+0x328/0x630 [ 56.037161] ret_from_fork+0x10/0x20 [ 56.040720] [ 56.042195] The buggy address belongs to the object at ffff000805f49a00 [ 56.042195] which belongs to the cache kmalloc-64 of size 64 [ 56.054522] The buggy address is located 0 bytes to the right of [ 56.054522] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 56.067369] [ 56.068845] The buggy address belongs to the physical page: [ 56.074401] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 56.082388] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.088896] page_type: f5(slab) [ 56.092029] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 56.099754] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.107472] page dumped because: kasan: bad access detected [ 56.113028] [ 56.114504] Memory state around the buggy address: [ 56.119282] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.126486] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.133691] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.140892] ^ [ 56.145670] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.152875] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.160075] ================================================================== [ 57.746600] ================================================================== [ 57.753632] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 57.761007] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 57.768385] [ 57.769867] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 57.769915] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.769933] Hardware name: WinLink E850-96 board (DT) [ 57.769950] Call trace: [ 57.769967] show_stack+0x20/0x38 (C) [ 57.769998] dump_stack_lvl+0x8c/0xd0 [ 57.770031] print_report+0x118/0x608 [ 57.770064] kasan_report+0xdc/0x128 [ 57.770100] kasan_check_range+0x100/0x1a8 [ 57.770134] __kasan_check_write+0x20/0x30 [ 57.770165] kasan_atomics_helper+0x1058/0x4858 [ 57.770198] kasan_atomics+0x198/0x2e0 [ 57.770229] kunit_try_run_case+0x170/0x3f0 [ 57.770265] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.770303] kthread+0x328/0x630 [ 57.770332] ret_from_fork+0x10/0x20 [ 57.770363] [ 57.840172] Allocated by task 312: [ 57.843558] kasan_save_stack+0x3c/0x68 [ 57.847377] kasan_save_track+0x20/0x40 [ 57.851196] kasan_save_alloc_info+0x40/0x58 [ 57.855450] __kasan_kmalloc+0xd4/0xd8 [ 57.859182] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.863696] kasan_atomics+0xb8/0x2e0 [ 57.867342] kunit_try_run_case+0x170/0x3f0 [ 57.871508] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.876977] kthread+0x328/0x630 [ 57.880189] ret_from_fork+0x10/0x20 [ 57.883747] [ 57.885223] The buggy address belongs to the object at ffff000805f49a00 [ 57.885223] which belongs to the cache kmalloc-64 of size 64 [ 57.897550] The buggy address is located 0 bytes to the right of [ 57.897550] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 57.910396] [ 57.911873] The buggy address belongs to the physical page: [ 57.917429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 57.925415] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.931924] page_type: f5(slab) [ 57.935057] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.942782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.950500] page dumped because: kasan: bad access detected [ 57.956055] [ 57.957531] Memory state around the buggy address: [ 57.962310] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.969515] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.976719] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.983920] ^ [ 57.988698] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.995903] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.003104] ================================================================== [ 50.125343] ================================================================== [ 50.132392] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 50.139681] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 50.147058] [ 50.148542] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 50.148591] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.148607] Hardware name: WinLink E850-96 board (DT) [ 50.148628] Call trace: [ 50.148641] show_stack+0x20/0x38 (C) [ 50.148676] dump_stack_lvl+0x8c/0xd0 [ 50.148714] print_report+0x118/0x608 [ 50.148748] kasan_report+0xdc/0x128 [ 50.148782] kasan_check_range+0x100/0x1a8 [ 50.148817] __kasan_check_write+0x20/0x30 [ 50.148846] kasan_atomics_helper+0x61c/0x4858 [ 50.148880] kasan_atomics+0x198/0x2e0 [ 50.148910] kunit_try_run_case+0x170/0x3f0 [ 50.148945] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.148983] kthread+0x328/0x630 [ 50.149010] ret_from_fork+0x10/0x20 [ 50.149043] [ 50.218758] Allocated by task 312: [ 50.222144] kasan_save_stack+0x3c/0x68 [ 50.225963] kasan_save_track+0x20/0x40 [ 50.229783] kasan_save_alloc_info+0x40/0x58 [ 50.234036] __kasan_kmalloc+0xd4/0xd8 [ 50.237769] __kmalloc_cache_noprof+0x16c/0x3c0 [ 50.242283] kasan_atomics+0xb8/0x2e0 [ 50.245929] kunit_try_run_case+0x170/0x3f0 [ 50.250095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.255564] kthread+0x328/0x630 [ 50.258775] ret_from_fork+0x10/0x20 [ 50.262334] [ 50.263810] The buggy address belongs to the object at ffff000805f49a00 [ 50.263810] which belongs to the cache kmalloc-64 of size 64 [ 50.276137] The buggy address is located 0 bytes to the right of [ 50.276137] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 50.288983] [ 50.290459] The buggy address belongs to the physical page: [ 50.296015] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 50.304001] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.310511] page_type: f5(slab) [ 50.313644] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.321368] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.329087] page dumped because: kasan: bad access detected [ 50.334642] [ 50.336118] Memory state around the buggy address: [ 50.340896] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.348101] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.355306] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.362506] ^ [ 50.367285] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.374489] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.381690] ================================================================== [ 54.334849] ================================================================== [ 54.341876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 54.349253] Read of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 54.356544] [ 54.358026] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 54.358076] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.358092] Hardware name: WinLink E850-96 board (DT) [ 54.358113] Call trace: [ 54.358130] show_stack+0x20/0x38 (C) [ 54.358164] dump_stack_lvl+0x8c/0xd0 [ 54.358200] print_report+0x118/0x608 [ 54.358233] kasan_report+0xdc/0x128 [ 54.358267] __asan_report_load4_noabort+0x20/0x30 [ 54.358307] kasan_atomics_helper+0x3de4/0x4858 [ 54.358340] kasan_atomics+0x198/0x2e0 [ 54.358370] kunit_try_run_case+0x170/0x3f0 [ 54.358407] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.358447] kthread+0x328/0x630 [ 54.358475] ret_from_fork+0x10/0x20 [ 54.358507] [ 54.424945] Allocated by task 312: [ 54.428331] kasan_save_stack+0x3c/0x68 [ 54.432151] kasan_save_track+0x20/0x40 [ 54.435970] kasan_save_alloc_info+0x40/0x58 [ 54.440223] __kasan_kmalloc+0xd4/0xd8 [ 54.443956] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.448469] kasan_atomics+0xb8/0x2e0 [ 54.452115] kunit_try_run_case+0x170/0x3f0 [ 54.456282] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.461750] kthread+0x328/0x630 [ 54.464962] ret_from_fork+0x10/0x20 [ 54.468521] [ 54.469997] The buggy address belongs to the object at ffff000805f49a00 [ 54.469997] which belongs to the cache kmalloc-64 of size 64 [ 54.482324] The buggy address is located 0 bytes to the right of [ 54.482324] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 54.495170] [ 54.496647] The buggy address belongs to the physical page: [ 54.502203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 54.510189] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.516697] page_type: f5(slab) [ 54.519831] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.527555] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.535274] page dumped because: kasan: bad access detected [ 54.540829] [ 54.542305] Memory state around the buggy address: [ 54.547083] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.554288] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.561492] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.568693] ^ [ 54.573471] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.580676] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.587877] ================================================================== [ 62.486093] ================================================================== [ 62.493144] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 62.500519] Read of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 62.507810] [ 62.509294] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 62.509341] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.509358] Hardware name: WinLink E850-96 board (DT) [ 62.509376] Call trace: [ 62.509390] show_stack+0x20/0x38 (C) [ 62.509425] dump_stack_lvl+0x8c/0xd0 [ 62.509460] print_report+0x118/0x608 [ 62.509494] kasan_report+0xdc/0x128 [ 62.509528] __asan_report_load8_noabort+0x20/0x30 [ 62.509566] kasan_atomics_helper+0x3e10/0x4858 [ 62.509602] kasan_atomics+0x198/0x2e0 [ 62.509631] kunit_try_run_case+0x170/0x3f0 [ 62.509665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.509703] kthread+0x328/0x630 [ 62.509728] ret_from_fork+0x10/0x20 [ 62.509760] [ 62.576212] Allocated by task 312: [ 62.579597] kasan_save_stack+0x3c/0x68 [ 62.583417] kasan_save_track+0x20/0x40 [ 62.587236] kasan_save_alloc_info+0x40/0x58 [ 62.591490] __kasan_kmalloc+0xd4/0xd8 [ 62.595222] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.599736] kasan_atomics+0xb8/0x2e0 [ 62.603382] kunit_try_run_case+0x170/0x3f0 [ 62.607548] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.613017] kthread+0x328/0x630 [ 62.616229] ret_from_fork+0x10/0x20 [ 62.619788] [ 62.621263] The buggy address belongs to the object at ffff000805f49a00 [ 62.621263] which belongs to the cache kmalloc-64 of size 64 [ 62.633590] The buggy address is located 0 bytes to the right of [ 62.633590] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 62.646437] [ 62.647913] The buggy address belongs to the physical page: [ 62.653469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 62.661457] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.667964] page_type: f5(slab) [ 62.671097] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 62.678822] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.686540] page dumped because: kasan: bad access detected [ 62.692095] [ 62.693571] Memory state around the buggy address: [ 62.698351] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.705554] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.712759] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.719960] ^ [ 62.724738] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.731943] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.739144] ================================================================== [ 53.546987] ================================================================== [ 53.554042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 53.561330] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 53.568708] [ 53.570190] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 53.570236] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.570252] Hardware name: WinLink E850-96 board (DT) [ 53.570271] Call trace: [ 53.570283] show_stack+0x20/0x38 (C) [ 53.570316] dump_stack_lvl+0x8c/0xd0 [ 53.570351] print_report+0x118/0x608 [ 53.570383] kasan_report+0xdc/0x128 [ 53.570419] kasan_check_range+0x100/0x1a8 [ 53.570456] __kasan_check_write+0x20/0x30 [ 53.570484] kasan_atomics_helper+0xb70/0x4858 [ 53.570518] kasan_atomics+0x198/0x2e0 [ 53.570549] kunit_try_run_case+0x170/0x3f0 [ 53.570583] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.570622] kthread+0x328/0x630 [ 53.570648] ret_from_fork+0x10/0x20 [ 53.570680] [ 53.640409] Allocated by task 312: [ 53.643794] kasan_save_stack+0x3c/0x68 [ 53.647613] kasan_save_track+0x20/0x40 [ 53.651433] kasan_save_alloc_info+0x40/0x58 [ 53.655686] __kasan_kmalloc+0xd4/0xd8 [ 53.659419] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.663933] kasan_atomics+0xb8/0x2e0 [ 53.667579] kunit_try_run_case+0x170/0x3f0 [ 53.671745] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.677214] kthread+0x328/0x630 [ 53.680425] ret_from_fork+0x10/0x20 [ 53.683985] [ 53.685460] The buggy address belongs to the object at ffff000805f49a00 [ 53.685460] which belongs to the cache kmalloc-64 of size 64 [ 53.697787] The buggy address is located 0 bytes to the right of [ 53.697787] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 53.710634] [ 53.712109] The buggy address belongs to the physical page: [ 53.717665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 53.725650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.732161] page_type: f5(slab) [ 53.735294] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 53.743018] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.750737] page dumped because: kasan: bad access detected [ 53.756292] [ 53.757768] Memory state around the buggy address: [ 53.762546] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.769751] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.776956] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.784157] ^ [ 53.788935] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.796139] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.803340] ================================================================== [ 49.070528] ================================================================== [ 49.077546] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 49.084835] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 49.092213] [ 49.093697] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 49.093747] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.093765] Hardware name: WinLink E850-96 board (DT) [ 49.093787] Call trace: [ 49.093803] show_stack+0x20/0x38 (C) [ 49.093836] dump_stack_lvl+0x8c/0xd0 [ 49.093875] print_report+0x118/0x608 [ 49.093908] kasan_report+0xdc/0x128 [ 49.093944] kasan_check_range+0x100/0x1a8 [ 49.093980] __kasan_check_write+0x20/0x30 [ 49.094011] kasan_atomics_helper+0x47c/0x4858 [ 49.094043] kasan_atomics+0x198/0x2e0 [ 49.094073] kunit_try_run_case+0x170/0x3f0 [ 49.094108] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.094147] kthread+0x328/0x630 [ 49.094173] ret_from_fork+0x10/0x20 [ 49.094206] [ 49.163914] Allocated by task 312: [ 49.167299] kasan_save_stack+0x3c/0x68 [ 49.171118] kasan_save_track+0x20/0x40 [ 49.174938] kasan_save_alloc_info+0x40/0x58 [ 49.179191] __kasan_kmalloc+0xd4/0xd8 [ 49.182924] __kmalloc_cache_noprof+0x16c/0x3c0 [ 49.187437] kasan_atomics+0xb8/0x2e0 [ 49.191083] kunit_try_run_case+0x170/0x3f0 [ 49.195250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.200718] kthread+0x328/0x630 [ 49.203930] ret_from_fork+0x10/0x20 [ 49.207489] [ 49.208965] The buggy address belongs to the object at ffff000805f49a00 [ 49.208965] which belongs to the cache kmalloc-64 of size 64 [ 49.221292] The buggy address is located 0 bytes to the right of [ 49.221292] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 49.234138] [ 49.235615] The buggy address belongs to the physical page: [ 49.241170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 49.249156] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.255665] page_type: f5(slab) [ 49.258799] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.266523] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.274242] page dumped because: kasan: bad access detected [ 49.279797] [ 49.281273] Memory state around the buggy address: [ 49.286053] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.293256] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.300461] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.307661] ^ [ 49.312439] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.319644] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.326845] ================================================================== [ 63.270803] ================================================================== [ 63.277855] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 63.285229] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 63.292607] [ 63.294091] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 63.294140] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.294156] Hardware name: WinLink E850-96 board (DT) [ 63.294174] Call trace: [ 63.294189] show_stack+0x20/0x38 (C) [ 63.294222] dump_stack_lvl+0x8c/0xd0 [ 63.294255] print_report+0x118/0x608 [ 63.294290] kasan_report+0xdc/0x128 [ 63.294324] kasan_check_range+0x100/0x1a8 [ 63.294360] __kasan_check_write+0x20/0x30 [ 63.294391] kasan_atomics_helper+0x17ec/0x4858 [ 63.294424] kasan_atomics+0x198/0x2e0 [ 63.294454] kunit_try_run_case+0x170/0x3f0 [ 63.294489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.294526] kthread+0x328/0x630 [ 63.294555] ret_from_fork+0x10/0x20 [ 63.294589] [ 63.364394] Allocated by task 312: [ 63.367780] kasan_save_stack+0x3c/0x68 [ 63.371600] kasan_save_track+0x20/0x40 [ 63.375419] kasan_save_alloc_info+0x40/0x58 [ 63.379672] __kasan_kmalloc+0xd4/0xd8 [ 63.383405] __kmalloc_cache_noprof+0x16c/0x3c0 [ 63.387919] kasan_atomics+0xb8/0x2e0 [ 63.391564] kunit_try_run_case+0x170/0x3f0 [ 63.395731] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.401200] kthread+0x328/0x630 [ 63.404411] ret_from_fork+0x10/0x20 [ 63.407970] [ 63.409446] The buggy address belongs to the object at ffff000805f49a00 [ 63.409446] which belongs to the cache kmalloc-64 of size 64 [ 63.421773] The buggy address is located 0 bytes to the right of [ 63.421773] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 63.434619] [ 63.436096] The buggy address belongs to the physical page: [ 63.441651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 63.449640] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.456147] page_type: f5(slab) [ 63.459280] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 63.467004] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.474723] page dumped because: kasan: bad access detected [ 63.480278] [ 63.481754] Memory state around the buggy address: [ 63.486536] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.493737] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.500942] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.508142] ^ [ 63.512920] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.520126] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.527326] ================================================================== [ 60.381951] ================================================================== [ 60.389009] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 60.396384] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 60.403762] [ 60.405245] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 60.405294] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.405309] Hardware name: WinLink E850-96 board (DT) [ 60.405330] Call trace: [ 60.405345] show_stack+0x20/0x38 (C) [ 60.405379] dump_stack_lvl+0x8c/0xd0 [ 60.405414] print_report+0x118/0x608 [ 60.405448] kasan_report+0xdc/0x128 [ 60.405482] kasan_check_range+0x100/0x1a8 [ 60.405518] __kasan_check_write+0x20/0x30 [ 60.405548] kasan_atomics_helper+0x147c/0x4858 [ 60.405581] kasan_atomics+0x198/0x2e0 [ 60.405611] kunit_try_run_case+0x170/0x3f0 [ 60.405647] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.405686] kthread+0x328/0x630 [ 60.405713] ret_from_fork+0x10/0x20 [ 60.405744] [ 60.475549] Allocated by task 312: [ 60.478935] kasan_save_stack+0x3c/0x68 [ 60.482754] kasan_save_track+0x20/0x40 [ 60.486573] kasan_save_alloc_info+0x40/0x58 [ 60.490827] __kasan_kmalloc+0xd4/0xd8 [ 60.494559] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.499073] kasan_atomics+0xb8/0x2e0 [ 60.502719] kunit_try_run_case+0x170/0x3f0 [ 60.506886] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.512354] kthread+0x328/0x630 [ 60.515566] ret_from_fork+0x10/0x20 [ 60.519125] [ 60.520600] The buggy address belongs to the object at ffff000805f49a00 [ 60.520600] which belongs to the cache kmalloc-64 of size 64 [ 60.532927] The buggy address is located 0 bytes to the right of [ 60.532927] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 60.545774] [ 60.547250] The buggy address belongs to the physical page: [ 60.552806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 60.560793] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.567301] page_type: f5(slab) [ 60.570435] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.578159] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.585877] page dumped because: kasan: bad access detected [ 60.591433] [ 60.592908] Memory state around the buggy address: [ 60.597687] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.604891] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.612096] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.619297] ^ [ 60.624075] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.631280] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.638481] ================================================================== [ 48.282630] ================================================================== [ 48.289537] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 48.296913] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 48.304291] [ 48.305776] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 48.305828] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.305848] Hardware name: WinLink E850-96 board (DT) [ 48.305872] Call trace: [ 48.305886] show_stack+0x20/0x38 (C) [ 48.305925] dump_stack_lvl+0x8c/0xd0 [ 48.305963] print_report+0x118/0x608 [ 48.305997] kasan_report+0xdc/0x128 [ 48.306029] __asan_report_store4_noabort+0x20/0x30 [ 48.306065] kasan_atomics_helper+0x3f94/0x4858 [ 48.306098] kasan_atomics+0x198/0x2e0 [ 48.306129] kunit_try_run_case+0x170/0x3f0 [ 48.306164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.306202] kthread+0x328/0x630 [ 48.306232] ret_from_fork+0x10/0x20 [ 48.306266] [ 48.372779] Allocated by task 312: [ 48.376165] kasan_save_stack+0x3c/0x68 [ 48.379984] kasan_save_track+0x20/0x40 [ 48.383804] kasan_save_alloc_info+0x40/0x58 [ 48.388057] __kasan_kmalloc+0xd4/0xd8 [ 48.391789] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.396304] kasan_atomics+0xb8/0x2e0 [ 48.399949] kunit_try_run_case+0x170/0x3f0 [ 48.404116] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.409585] kthread+0x328/0x630 [ 48.412796] ret_from_fork+0x10/0x20 [ 48.416355] [ 48.417832] The buggy address belongs to the object at ffff000805f49a00 [ 48.417832] which belongs to the cache kmalloc-64 of size 64 [ 48.430157] The buggy address is located 0 bytes to the right of [ 48.430157] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 48.443004] [ 48.444480] The buggy address belongs to the physical page: [ 48.450037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 48.458023] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.464532] page_type: f5(slab) [ 48.467665] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 48.475389] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.483108] page dumped because: kasan: bad access detected [ 48.488663] [ 48.490139] Memory state around the buggy address: [ 48.494918] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.502122] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.509327] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.516528] ^ [ 48.521305] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.528510] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.535711] ================================================================== [ 61.437516] ================================================================== [ 61.444549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 61.451924] Read of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 61.459215] [ 61.460698] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 61.460744] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.460760] Hardware name: WinLink E850-96 board (DT) [ 61.460780] Call trace: [ 61.460794] show_stack+0x20/0x38 (C) [ 61.460828] dump_stack_lvl+0x8c/0xd0 [ 61.460864] print_report+0x118/0x608 [ 61.460898] kasan_report+0xdc/0x128 [ 61.460933] __asan_report_load8_noabort+0x20/0x30 [ 61.460970] kasan_atomics_helper+0x3db0/0x4858 [ 61.461003] kasan_atomics+0x198/0x2e0 [ 61.461033] kunit_try_run_case+0x170/0x3f0 [ 61.461070] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.461109] kthread+0x328/0x630 [ 61.461137] ret_from_fork+0x10/0x20 [ 61.461169] [ 61.527617] Allocated by task 312: [ 61.531002] kasan_save_stack+0x3c/0x68 [ 61.534821] kasan_save_track+0x20/0x40 [ 61.538641] kasan_save_alloc_info+0x40/0x58 [ 61.542894] __kasan_kmalloc+0xd4/0xd8 [ 61.546628] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.551141] kasan_atomics+0xb8/0x2e0 [ 61.554786] kunit_try_run_case+0x170/0x3f0 [ 61.558953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.564422] kthread+0x328/0x630 [ 61.567634] ret_from_fork+0x10/0x20 [ 61.571193] [ 61.572668] The buggy address belongs to the object at ffff000805f49a00 [ 61.572668] which belongs to the cache kmalloc-64 of size 64 [ 61.584995] The buggy address is located 0 bytes to the right of [ 61.584995] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 61.597841] [ 61.599317] The buggy address belongs to the physical page: [ 61.604873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 61.612860] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.619369] page_type: f5(slab) [ 61.622502] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 61.630226] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.637945] page dumped because: kasan: bad access detected [ 61.643500] [ 61.644976] Memory state around the buggy address: [ 61.649756] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.656959] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.664164] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.671365] ^ [ 61.676143] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.683347] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.690548] ================================================================== [ 55.383044] ================================================================== [ 55.390125] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 55.397500] Read of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 55.404792] [ 55.406275] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 55.406319] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.406335] Hardware name: WinLink E850-96 board (DT) [ 55.406354] Call trace: [ 55.406366] show_stack+0x20/0x38 (C) [ 55.406399] dump_stack_lvl+0x8c/0xd0 [ 55.406436] print_report+0x118/0x608 [ 55.406468] kasan_report+0xdc/0x128 [ 55.406504] __asan_report_load4_noabort+0x20/0x30 [ 55.406540] kasan_atomics_helper+0x3e04/0x4858 [ 55.406573] kasan_atomics+0x198/0x2e0 [ 55.406604] kunit_try_run_case+0x170/0x3f0 [ 55.406637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.406676] kthread+0x328/0x630 [ 55.406704] ret_from_fork+0x10/0x20 [ 55.406737] [ 55.473194] Allocated by task 312: [ 55.476579] kasan_save_stack+0x3c/0x68 [ 55.480398] kasan_save_track+0x20/0x40 [ 55.484218] kasan_save_alloc_info+0x40/0x58 [ 55.488471] __kasan_kmalloc+0xd4/0xd8 [ 55.492204] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.496718] kasan_atomics+0xb8/0x2e0 [ 55.500364] kunit_try_run_case+0x170/0x3f0 [ 55.504530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.509999] kthread+0x328/0x630 [ 55.513210] ret_from_fork+0x10/0x20 [ 55.516770] [ 55.518245] The buggy address belongs to the object at ffff000805f49a00 [ 55.518245] which belongs to the cache kmalloc-64 of size 64 [ 55.530572] The buggy address is located 0 bytes to the right of [ 55.530572] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 55.543418] [ 55.544894] The buggy address belongs to the physical page: [ 55.550450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 55.558438] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.564946] page_type: f5(slab) [ 55.568079] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.575803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.583522] page dumped because: kasan: bad access detected [ 55.589078] [ 55.590553] Memory state around the buggy address: [ 55.595331] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.602536] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.609741] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.616941] ^ [ 55.621720] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.628924] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.636125] ================================================================== [ 61.697886] ================================================================== [ 61.704960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 61.712336] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 61.719715] [ 61.721196] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 61.721244] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.721262] Hardware name: WinLink E850-96 board (DT) [ 61.721282] Call trace: [ 61.721296] show_stack+0x20/0x38 (C) [ 61.721330] dump_stack_lvl+0x8c/0xd0 [ 61.721363] print_report+0x118/0x608 [ 61.721394] kasan_report+0xdc/0x128 [ 61.721432] kasan_check_range+0x100/0x1a8 [ 61.721466] __kasan_check_write+0x20/0x30 [ 61.721495] kasan_atomics_helper+0x1644/0x4858 [ 61.721529] kasan_atomics+0x198/0x2e0 [ 61.721561] kunit_try_run_case+0x170/0x3f0 [ 61.721595] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.721633] kthread+0x328/0x630 [ 61.721662] ret_from_fork+0x10/0x20 [ 61.721692] [ 61.791501] Allocated by task 312: [ 61.794887] kasan_save_stack+0x3c/0x68 [ 61.798706] kasan_save_track+0x20/0x40 [ 61.802526] kasan_save_alloc_info+0x40/0x58 [ 61.806779] __kasan_kmalloc+0xd4/0xd8 [ 61.810512] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.815026] kasan_atomics+0xb8/0x2e0 [ 61.818671] kunit_try_run_case+0x170/0x3f0 [ 61.822838] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.828307] kthread+0x328/0x630 [ 61.831518] ret_from_fork+0x10/0x20 [ 61.835077] [ 61.836553] The buggy address belongs to the object at ffff000805f49a00 [ 61.836553] which belongs to the cache kmalloc-64 of size 64 [ 61.848879] The buggy address is located 0 bytes to the right of [ 61.848879] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 61.861726] [ 61.863202] The buggy address belongs to the physical page: [ 61.868759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 61.876744] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.883254] page_type: f5(slab) [ 61.886387] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 61.894111] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.901830] page dumped because: kasan: bad access detected [ 61.907385] [ 61.908861] Memory state around the buggy address: [ 61.913641] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.920844] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.928049] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.935249] ^ [ 61.940027] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.947232] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.954433] ================================================================== [ 54.858940] ================================================================== [ 54.866000] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 54.873377] Read of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 54.880668] [ 54.882149] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 54.882196] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.882212] Hardware name: WinLink E850-96 board (DT) [ 54.882231] Call trace: [ 54.882246] show_stack+0x20/0x38 (C) [ 54.882279] dump_stack_lvl+0x8c/0xd0 [ 54.882316] print_report+0x118/0x608 [ 54.882350] kasan_report+0xdc/0x128 [ 54.882382] __asan_report_load4_noabort+0x20/0x30 [ 54.882420] kasan_atomics_helper+0x3dd8/0x4858 [ 54.882453] kasan_atomics+0x198/0x2e0 [ 54.882483] kunit_try_run_case+0x170/0x3f0 [ 54.882519] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.882557] kthread+0x328/0x630 [ 54.882585] ret_from_fork+0x10/0x20 [ 54.882617] [ 54.949070] Allocated by task 312: [ 54.952455] kasan_save_stack+0x3c/0x68 [ 54.956274] kasan_save_track+0x20/0x40 [ 54.960094] kasan_save_alloc_info+0x40/0x58 [ 54.964347] __kasan_kmalloc+0xd4/0xd8 [ 54.968080] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.972593] kasan_atomics+0xb8/0x2e0 [ 54.976240] kunit_try_run_case+0x170/0x3f0 [ 54.980406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.985875] kthread+0x328/0x630 [ 54.989087] ret_from_fork+0x10/0x20 [ 54.992646] [ 54.994121] The buggy address belongs to the object at ffff000805f49a00 [ 54.994121] which belongs to the cache kmalloc-64 of size 64 [ 55.006448] The buggy address is located 0 bytes to the right of [ 55.006448] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 55.019294] [ 55.020770] The buggy address belongs to the physical page: [ 55.026326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 55.034312] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.040822] page_type: f5(slab) [ 55.043955] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 55.051679] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.059398] page dumped because: kasan: bad access detected [ 55.064953] [ 55.066429] Memory state around the buggy address: [ 55.071207] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.078412] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.085616] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.092817] ^ [ 55.097595] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.104800] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.112001] ================================================================== [ 62.222225] ================================================================== [ 62.229259] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 62.236634] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 62.244012] [ 62.245495] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 62.245543] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.245559] Hardware name: WinLink E850-96 board (DT) [ 62.245579] Call trace: [ 62.245595] show_stack+0x20/0x38 (C) [ 62.245626] dump_stack_lvl+0x8c/0xd0 [ 62.245663] print_report+0x118/0x608 [ 62.245695] kasan_report+0xdc/0x128 [ 62.245727] kasan_check_range+0x100/0x1a8 [ 62.245763] __kasan_check_write+0x20/0x30 [ 62.245792] kasan_atomics_helper+0x16d0/0x4858 [ 62.245826] kasan_atomics+0x198/0x2e0 [ 62.245858] kunit_try_run_case+0x170/0x3f0 [ 62.245893] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.245931] kthread+0x328/0x630 [ 62.245958] ret_from_fork+0x10/0x20 [ 62.245989] [ 62.315799] Allocated by task 312: [ 62.319185] kasan_save_stack+0x3c/0x68 [ 62.323004] kasan_save_track+0x20/0x40 [ 62.326823] kasan_save_alloc_info+0x40/0x58 [ 62.331077] __kasan_kmalloc+0xd4/0xd8 [ 62.334810] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.339323] kasan_atomics+0xb8/0x2e0 [ 62.342969] kunit_try_run_case+0x170/0x3f0 [ 62.347136] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.352604] kthread+0x328/0x630 [ 62.355816] ret_from_fork+0x10/0x20 [ 62.359375] [ 62.360851] The buggy address belongs to the object at ffff000805f49a00 [ 62.360851] which belongs to the cache kmalloc-64 of size 64 [ 62.373177] The buggy address is located 0 bytes to the right of [ 62.373177] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 62.386024] [ 62.387500] The buggy address belongs to the physical page: [ 62.393056] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 62.401044] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.407551] page_type: f5(slab) [ 62.410685] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 62.418409] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.426128] page dumped because: kasan: bad access detected [ 62.431683] [ 62.433159] Memory state around the buggy address: [ 62.437938] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.445142] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.452346] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.459547] ^ [ 62.464325] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.471530] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.478731] ================================================================== [ 48.018806] ================================================================== [ 48.025827] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 48.033116] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 48.040493] [ 48.041978] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 48.042033] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.042052] Hardware name: WinLink E850-96 board (DT) [ 48.042074] Call trace: [ 48.042088] show_stack+0x20/0x38 (C) [ 48.042128] dump_stack_lvl+0x8c/0xd0 [ 48.042165] print_report+0x118/0x608 [ 48.042205] kasan_report+0xdc/0x128 [ 48.042237] kasan_check_range+0x100/0x1a8 [ 48.042278] __kasan_check_write+0x20/0x30 [ 48.042310] kasan_atomics_helper+0x32c/0x4858 [ 48.042342] kasan_atomics+0x198/0x2e0 [ 48.042374] kunit_try_run_case+0x170/0x3f0 [ 48.042411] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.042448] kthread+0x328/0x630 [ 48.042479] ret_from_fork+0x10/0x20 [ 48.042514] [ 48.112193] Allocated by task 312: [ 48.115579] kasan_save_stack+0x3c/0x68 [ 48.119398] kasan_save_track+0x20/0x40 [ 48.123218] kasan_save_alloc_info+0x40/0x58 [ 48.127471] __kasan_kmalloc+0xd4/0xd8 [ 48.131204] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.135717] kasan_atomics+0xb8/0x2e0 [ 48.139363] kunit_try_run_case+0x170/0x3f0 [ 48.143530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.148998] kthread+0x328/0x630 [ 48.152210] ret_from_fork+0x10/0x20 [ 48.155769] [ 48.157246] The buggy address belongs to the object at ffff000805f49a00 [ 48.157246] which belongs to the cache kmalloc-64 of size 64 [ 48.169573] The buggy address is located 0 bytes to the right of [ 48.169573] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 48.182417] [ 48.183894] The buggy address belongs to the physical page: [ 48.189450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 48.197437] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.203945] page_type: f5(slab) [ 48.207081] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 48.214803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.222521] page dumped because: kasan: bad access detected [ 48.228077] [ 48.229552] Memory state around the buggy address: [ 48.234332] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.241535] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.248740] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 48.255941] ^ [ 48.260719] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.267924] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.275125] ================================================================== [ 62.746523] ================================================================== [ 62.753558] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 62.760932] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 62.768310] [ 62.769793] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 62.769842] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.769858] Hardware name: WinLink E850-96 board (DT) [ 62.769878] Call trace: [ 62.769894] show_stack+0x20/0x38 (C) [ 62.769925] dump_stack_lvl+0x8c/0xd0 [ 62.769963] print_report+0x118/0x608 [ 62.769998] kasan_report+0xdc/0x128 [ 62.770032] kasan_check_range+0x100/0x1a8 [ 62.770068] __kasan_check_write+0x20/0x30 [ 62.770099] kasan_atomics_helper+0x175c/0x4858 [ 62.770132] kasan_atomics+0x198/0x2e0 [ 62.770164] kunit_try_run_case+0x170/0x3f0 [ 62.770201] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.770242] kthread+0x328/0x630 [ 62.770269] ret_from_fork+0x10/0x20 [ 62.770301] [ 62.840097] Allocated by task 312: [ 62.843483] kasan_save_stack+0x3c/0x68 [ 62.847302] kasan_save_track+0x20/0x40 [ 62.851121] kasan_save_alloc_info+0x40/0x58 [ 62.855374] __kasan_kmalloc+0xd4/0xd8 [ 62.859107] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.863621] kasan_atomics+0xb8/0x2e0 [ 62.867267] kunit_try_run_case+0x170/0x3f0 [ 62.871433] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.876902] kthread+0x328/0x630 [ 62.880114] ret_from_fork+0x10/0x20 [ 62.883673] [ 62.885148] The buggy address belongs to the object at ffff000805f49a00 [ 62.885148] which belongs to the cache kmalloc-64 of size 64 [ 62.897475] The buggy address is located 0 bytes to the right of [ 62.897475] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 62.910322] [ 62.911798] The buggy address belongs to the physical page: [ 62.917354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 62.925342] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.931849] page_type: f5(slab) [ 62.934982] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 62.942707] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.950425] page dumped because: kasan: bad access detected [ 62.955981] [ 62.957456] Memory state around the buggy address: [ 62.962235] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.969439] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.976644] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.983845] ^ [ 62.988623] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.995828] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.003029] ================================================================== [ 58.010554] ================================================================== [ 58.017516] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 58.024892] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 58.032270] [ 58.033752] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 58.033803] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.033820] Hardware name: WinLink E850-96 board (DT) [ 58.033841] Call trace: [ 58.033856] show_stack+0x20/0x38 (C) [ 58.033890] dump_stack_lvl+0x8c/0xd0 [ 58.033926] print_report+0x118/0x608 [ 58.033959] kasan_report+0xdc/0x128 [ 58.033994] kasan_check_range+0x100/0x1a8 [ 58.034029] __kasan_check_write+0x20/0x30 [ 58.034059] kasan_atomics_helper+0x10c0/0x4858 [ 58.034094] kasan_atomics+0x198/0x2e0 [ 58.034125] kunit_try_run_case+0x170/0x3f0 [ 58.034160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.034199] kthread+0x328/0x630 [ 58.034226] ret_from_fork+0x10/0x20 [ 58.034258] [ 58.104057] Allocated by task 312: [ 58.107443] kasan_save_stack+0x3c/0x68 [ 58.111262] kasan_save_track+0x20/0x40 [ 58.115081] kasan_save_alloc_info+0x40/0x58 [ 58.119335] __kasan_kmalloc+0xd4/0xd8 [ 58.123067] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.127581] kasan_atomics+0xb8/0x2e0 [ 58.131227] kunit_try_run_case+0x170/0x3f0 [ 58.135393] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.140862] kthread+0x328/0x630 [ 58.144074] ret_from_fork+0x10/0x20 [ 58.147633] [ 58.149108] The buggy address belongs to the object at ffff000805f49a00 [ 58.149108] which belongs to the cache kmalloc-64 of size 64 [ 58.161435] The buggy address is located 0 bytes to the right of [ 58.161435] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 58.174282] [ 58.175759] The buggy address belongs to the physical page: [ 58.181314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 58.189302] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.195809] page_type: f5(slab) [ 58.198944] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.206667] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.214385] page dumped because: kasan: bad access detected [ 58.219940] [ 58.221416] Memory state around the buggy address: [ 58.226195] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.233399] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.240604] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.247804] ^ [ 58.252583] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.259788] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.266989] ================================================================== [ 59.329915] ================================================================== [ 59.336940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 59.344317] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 59.351695] [ 59.353177] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 59.353227] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.353244] Hardware name: WinLink E850-96 board (DT) [ 59.353263] Call trace: [ 59.353281] show_stack+0x20/0x38 (C) [ 59.353313] dump_stack_lvl+0x8c/0xd0 [ 59.353350] print_report+0x118/0x608 [ 59.353384] kasan_report+0xdc/0x128 [ 59.353419] kasan_check_range+0x100/0x1a8 [ 59.353453] __kasan_check_write+0x20/0x30 [ 59.353484] kasan_atomics_helper+0x12d8/0x4858 [ 59.353518] kasan_atomics+0x198/0x2e0 [ 59.353549] kunit_try_run_case+0x170/0x3f0 [ 59.353582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.353621] kthread+0x328/0x630 [ 59.353649] ret_from_fork+0x10/0x20 [ 59.353683] [ 59.423481] Allocated by task 312: [ 59.426867] kasan_save_stack+0x3c/0x68 [ 59.430686] kasan_save_track+0x20/0x40 [ 59.434506] kasan_save_alloc_info+0x40/0x58 [ 59.438759] __kasan_kmalloc+0xd4/0xd8 [ 59.442492] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.447006] kasan_atomics+0xb8/0x2e0 [ 59.450652] kunit_try_run_case+0x170/0x3f0 [ 59.454818] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.460286] kthread+0x328/0x630 [ 59.463499] ret_from_fork+0x10/0x20 [ 59.467057] [ 59.468533] The buggy address belongs to the object at ffff000805f49a00 [ 59.468533] which belongs to the cache kmalloc-64 of size 64 [ 59.480859] The buggy address is located 0 bytes to the right of [ 59.480859] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 59.493706] [ 59.495182] The buggy address belongs to the physical page: [ 59.500738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 59.508727] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.515233] page_type: f5(slab) [ 59.518369] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.526091] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.533810] page dumped because: kasan: bad access detected [ 59.539365] [ 59.540841] Memory state around the buggy address: [ 59.545619] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.552824] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.560029] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.567229] ^ [ 59.572008] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.579212] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.586413] ================================================================== [ 53.810687] ================================================================== [ 53.817752] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 53.825128] Read of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 53.832420] [ 53.833903] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 53.833949] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.833970] Hardware name: WinLink E850-96 board (DT) [ 53.833987] Call trace: [ 53.833999] show_stack+0x20/0x38 (C) [ 53.834034] dump_stack_lvl+0x8c/0xd0 [ 53.834069] print_report+0x118/0x608 [ 53.834102] kasan_report+0xdc/0x128 [ 53.834137] __asan_report_load4_noabort+0x20/0x30 [ 53.834176] kasan_atomics_helper+0x3dbc/0x4858 [ 53.834210] kasan_atomics+0x198/0x2e0 [ 53.834241] kunit_try_run_case+0x170/0x3f0 [ 53.834277] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.834314] kthread+0x328/0x630 [ 53.834343] ret_from_fork+0x10/0x20 [ 53.834375] [ 53.900821] Allocated by task 312: [ 53.904207] kasan_save_stack+0x3c/0x68 [ 53.908026] kasan_save_track+0x20/0x40 [ 53.911846] kasan_save_alloc_info+0x40/0x58 [ 53.916099] __kasan_kmalloc+0xd4/0xd8 [ 53.919832] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.924346] kasan_atomics+0xb8/0x2e0 [ 53.927991] kunit_try_run_case+0x170/0x3f0 [ 53.932158] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.937626] kthread+0x328/0x630 [ 53.940838] ret_from_fork+0x10/0x20 [ 53.944397] [ 53.945873] The buggy address belongs to the object at ffff000805f49a00 [ 53.945873] which belongs to the cache kmalloc-64 of size 64 [ 53.958200] The buggy address is located 0 bytes to the right of [ 53.958200] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 53.971046] [ 53.972522] The buggy address belongs to the physical page: [ 53.978078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 53.986065] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.992573] page_type: f5(slab) [ 53.995707] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 54.003431] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.011150] page dumped because: kasan: bad access detected [ 54.016705] [ 54.018181] Memory state around the buggy address: [ 54.022959] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.030164] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.037368] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.044569] ^ [ 54.049348] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.056552] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.063753] ================================================================== [ 60.909817] ================================================================== [ 60.916779] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 60.924154] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 60.931532] [ 60.933015] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 60.933064] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.933082] Hardware name: WinLink E850-96 board (DT) [ 60.933103] Call trace: [ 60.933118] show_stack+0x20/0x38 (C) [ 60.933151] dump_stack_lvl+0x8c/0xd0 [ 60.933190] print_report+0x118/0x608 [ 60.933225] kasan_report+0xdc/0x128 [ 60.933258] kasan_check_range+0x100/0x1a8 [ 60.933296] __kasan_check_write+0x20/0x30 [ 60.933325] kasan_atomics_helper+0x154c/0x4858 [ 60.933356] kasan_atomics+0x198/0x2e0 [ 60.933386] kunit_try_run_case+0x170/0x3f0 [ 60.933421] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.933461] kthread+0x328/0x630 [ 60.933489] ret_from_fork+0x10/0x20 [ 60.933526] [ 61.003319] Allocated by task 312: [ 61.006704] kasan_save_stack+0x3c/0x68 [ 61.010524] kasan_save_track+0x20/0x40 [ 61.014343] kasan_save_alloc_info+0x40/0x58 [ 61.018596] __kasan_kmalloc+0xd4/0xd8 [ 61.022329] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.026843] kasan_atomics+0xb8/0x2e0 [ 61.030489] kunit_try_run_case+0x170/0x3f0 [ 61.034655] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.040124] kthread+0x328/0x630 [ 61.043336] ret_from_fork+0x10/0x20 [ 61.046895] [ 61.048371] The buggy address belongs to the object at ffff000805f49a00 [ 61.048371] which belongs to the cache kmalloc-64 of size 64 [ 61.060697] The buggy address is located 0 bytes to the right of [ 61.060697] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 61.073544] [ 61.075021] The buggy address belongs to the physical page: [ 61.080577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 61.088563] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.095071] page_type: f5(slab) [ 61.098206] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 61.105929] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.113647] page dumped because: kasan: bad access detected [ 61.119203] [ 61.120678] Memory state around the buggy address: [ 61.125458] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.132661] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.139866] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.147067] ^ [ 61.151845] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.159049] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.166251] ================================================================== [ 53.022955] ================================================================== [ 53.029919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 53.037207] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 53.044584] [ 53.046068] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 53.046114] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.046129] Hardware name: WinLink E850-96 board (DT) [ 53.046151] Call trace: [ 53.046166] show_stack+0x20/0x38 (C) [ 53.046199] dump_stack_lvl+0x8c/0xd0 [ 53.046236] print_report+0x118/0x608 [ 53.046272] kasan_report+0xdc/0x128 [ 53.046306] kasan_check_range+0x100/0x1a8 [ 53.046340] __kasan_check_write+0x20/0x30 [ 53.046371] kasan_atomics_helper+0xad4/0x4858 [ 53.046405] kasan_atomics+0x198/0x2e0 [ 53.046437] kunit_try_run_case+0x170/0x3f0 [ 53.046473] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.046511] kthread+0x328/0x630 [ 53.046540] ret_from_fork+0x10/0x20 [ 53.046572] [ 53.116285] Allocated by task 312: [ 53.119670] kasan_save_stack+0x3c/0x68 [ 53.123490] kasan_save_track+0x20/0x40 [ 53.127309] kasan_save_alloc_info+0x40/0x58 [ 53.131562] __kasan_kmalloc+0xd4/0xd8 [ 53.135295] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.139809] kasan_atomics+0xb8/0x2e0 [ 53.143455] kunit_try_run_case+0x170/0x3f0 [ 53.147621] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.153090] kthread+0x328/0x630 [ 53.156301] ret_from_fork+0x10/0x20 [ 53.159860] [ 53.161336] The buggy address belongs to the object at ffff000805f49a00 [ 53.161336] which belongs to the cache kmalloc-64 of size 64 [ 53.173664] The buggy address is located 0 bytes to the right of [ 53.173664] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 53.186510] [ 53.187985] The buggy address belongs to the physical page: [ 53.193541] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 53.201530] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.208037] page_type: f5(slab) [ 53.211170] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 53.218894] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.226613] page dumped because: kasan: bad access detected [ 53.232168] [ 53.233644] Memory state around the buggy address: [ 53.238422] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.245627] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.252831] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.260032] ^ [ 53.264811] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.272015] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.279216] ================================================================== [ 46.439520] ================================================================== [ 46.453630] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 46.461004] Read of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 46.468294] [ 46.469781] CPU: 2 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 46.469841] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.469860] Hardware name: WinLink E850-96 board (DT) [ 46.469883] Call trace: [ 46.469901] show_stack+0x20/0x38 (C) [ 46.469943] dump_stack_lvl+0x8c/0xd0 [ 46.469981] print_report+0x118/0x608 [ 46.470019] kasan_report+0xdc/0x128 [ 46.470052] __asan_report_load4_noabort+0x20/0x30 [ 46.470093] kasan_atomics_helper+0x40a8/0x4858 [ 46.470130] kasan_atomics+0x198/0x2e0 [ 46.470162] kunit_try_run_case+0x170/0x3f0 [ 46.470201] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.470240] kthread+0x328/0x630 [ 46.470272] ret_from_fork+0x10/0x20 [ 46.470311] [ 46.536698] Allocated by task 312: [ 46.540085] kasan_save_stack+0x3c/0x68 [ 46.543901] kasan_save_track+0x20/0x40 [ 46.547720] kasan_save_alloc_info+0x40/0x58 [ 46.551973] __kasan_kmalloc+0xd4/0xd8 [ 46.555707] __kmalloc_cache_noprof+0x16c/0x3c0 [ 46.560220] kasan_atomics+0xb8/0x2e0 [ 46.563866] kunit_try_run_case+0x170/0x3f0 [ 46.568032] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.573501] kthread+0x328/0x630 [ 46.576712] ret_from_fork+0x10/0x20 [ 46.580272] [ 46.581749] The buggy address belongs to the object at ffff000805f49a00 [ 46.581749] which belongs to the cache kmalloc-64 of size 64 [ 46.594076] The buggy address is located 0 bytes to the right of [ 46.594076] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 46.606921] [ 46.608400] The buggy address belongs to the physical page: [ 46.613956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 46.621940] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.628451] page_type: f5(slab) [ 46.631584] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 46.639306] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 46.647025] page dumped because: kasan: bad access detected [ 46.652580] [ 46.654057] Memory state around the buggy address: [ 46.658834] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.666038] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.673244] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 46.680444] ^ [ 46.685221] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.692426] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.699630] ================================================================== [ 59.066091] ================================================================== [ 59.073057] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 59.080432] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 59.087810] [ 59.089293] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 59.089343] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.089359] Hardware name: WinLink E850-96 board (DT) [ 59.089379] Call trace: [ 59.089396] show_stack+0x20/0x38 (C) [ 59.089430] dump_stack_lvl+0x8c/0xd0 [ 59.089467] print_report+0x118/0x608 [ 59.089500] kasan_report+0xdc/0x128 [ 59.089535] kasan_check_range+0x100/0x1a8 [ 59.089569] __kasan_check_write+0x20/0x30 [ 59.089600] kasan_atomics_helper+0x126c/0x4858 [ 59.089634] kasan_atomics+0x198/0x2e0 [ 59.089663] kunit_try_run_case+0x170/0x3f0 [ 59.089700] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.089739] kthread+0x328/0x630 [ 59.089767] ret_from_fork+0x10/0x20 [ 59.089802] [ 59.159596] Allocated by task 312: [ 59.162982] kasan_save_stack+0x3c/0x68 [ 59.166802] kasan_save_track+0x20/0x40 [ 59.170621] kasan_save_alloc_info+0x40/0x58 [ 59.174874] __kasan_kmalloc+0xd4/0xd8 [ 59.178607] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.183121] kasan_atomics+0xb8/0x2e0 [ 59.186766] kunit_try_run_case+0x170/0x3f0 [ 59.190933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.196402] kthread+0x328/0x630 [ 59.199614] ret_from_fork+0x10/0x20 [ 59.203173] [ 59.204648] The buggy address belongs to the object at ffff000805f49a00 [ 59.204648] which belongs to the cache kmalloc-64 of size 64 [ 59.216976] The buggy address is located 0 bytes to the right of [ 59.216976] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 59.229821] [ 59.231297] The buggy address belongs to the physical page: [ 59.236853] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 59.244842] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.251349] page_type: f5(slab) [ 59.254484] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.262206] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.269925] page dumped because: kasan: bad access detected [ 59.275480] [ 59.276956] Memory state around the buggy address: [ 59.281734] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.288939] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.296144] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.303344] ^ [ 59.308123] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.315328] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.322528] ================================================================== [ 53.286580] ================================================================== [ 53.293628] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 53.301005] Read of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 53.308296] [ 53.309777] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 53.309826] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.309841] Hardware name: WinLink E850-96 board (DT) [ 53.309860] Call trace: [ 53.309874] show_stack+0x20/0x38 (C) [ 53.309906] dump_stack_lvl+0x8c/0xd0 [ 53.309941] print_report+0x118/0x608 [ 53.309976] kasan_report+0xdc/0x128 [ 53.310011] __asan_report_load4_noabort+0x20/0x30 [ 53.310049] kasan_atomics_helper+0x3dcc/0x4858 [ 53.310082] kasan_atomics+0x198/0x2e0 [ 53.310114] kunit_try_run_case+0x170/0x3f0 [ 53.310148] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.310184] kthread+0x328/0x630 [ 53.310212] ret_from_fork+0x10/0x20 [ 53.310245] [ 53.376697] Allocated by task 312: [ 53.380083] kasan_save_stack+0x3c/0x68 [ 53.383902] kasan_save_track+0x20/0x40 [ 53.387722] kasan_save_alloc_info+0x40/0x58 [ 53.391975] __kasan_kmalloc+0xd4/0xd8 [ 53.395708] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.400221] kasan_atomics+0xb8/0x2e0 [ 53.403867] kunit_try_run_case+0x170/0x3f0 [ 53.408034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.413502] kthread+0x328/0x630 [ 53.416714] ret_from_fork+0x10/0x20 [ 53.420273] [ 53.421748] The buggy address belongs to the object at ffff000805f49a00 [ 53.421748] which belongs to the cache kmalloc-64 of size 64 [ 53.434076] The buggy address is located 0 bytes to the right of [ 53.434076] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 53.446922] [ 53.448398] The buggy address belongs to the physical page: [ 53.453954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 53.461940] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.468450] page_type: f5(slab) [ 53.471583] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 53.479307] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.487026] page dumped because: kasan: bad access detected [ 53.492581] [ 53.494057] Memory state around the buggy address: [ 53.498835] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.506040] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.513244] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.520445] ^ [ 53.525223] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.532428] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.539629] ================================================================== [ 57.219129] ================================================================== [ 57.226209] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 57.233497] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 57.240875] [ 57.242358] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 57.242410] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.242427] Hardware name: WinLink E850-96 board (DT) [ 57.242450] Call trace: [ 57.242466] show_stack+0x20/0x38 (C) [ 57.242495] dump_stack_lvl+0x8c/0xd0 [ 57.242531] print_report+0x118/0x608 [ 57.242566] kasan_report+0xdc/0x128 [ 57.242600] kasan_check_range+0x100/0x1a8 [ 57.242634] __kasan_check_write+0x20/0x30 [ 57.242664] kasan_atomics_helper+0xf88/0x4858 [ 57.242698] kasan_atomics+0x198/0x2e0 [ 57.242730] kunit_try_run_case+0x170/0x3f0 [ 57.242763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.242803] kthread+0x328/0x630 [ 57.242831] ret_from_fork+0x10/0x20 [ 57.242863] [ 57.312576] Allocated by task 312: [ 57.315962] kasan_save_stack+0x3c/0x68 [ 57.319781] kasan_save_track+0x20/0x40 [ 57.323600] kasan_save_alloc_info+0x40/0x58 [ 57.327854] __kasan_kmalloc+0xd4/0xd8 [ 57.331586] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.336100] kasan_atomics+0xb8/0x2e0 [ 57.339746] kunit_try_run_case+0x170/0x3f0 [ 57.343912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.349381] kthread+0x328/0x630 [ 57.352593] ret_from_fork+0x10/0x20 [ 57.356152] [ 57.357627] The buggy address belongs to the object at ffff000805f49a00 [ 57.357627] which belongs to the cache kmalloc-64 of size 64 [ 57.369954] The buggy address is located 0 bytes to the right of [ 57.369954] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 57.382800] [ 57.384276] The buggy address belongs to the physical page: [ 57.389832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 57.397821] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.404328] page_type: f5(slab) [ 57.407461] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 57.415185] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.422904] page dumped because: kasan: bad access detected [ 57.428460] [ 57.429935] Memory state around the buggy address: [ 57.434713] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.441918] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.449123] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.456324] ^ [ 57.461101] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.468307] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.475508] ================================================================== [ 60.118048] ================================================================== [ 60.125123] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 60.132499] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 60.139877] [ 60.141360] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 60.141409] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.141424] Hardware name: WinLink E850-96 board (DT) [ 60.141440] Call trace: [ 60.141453] show_stack+0x20/0x38 (C) [ 60.141487] dump_stack_lvl+0x8c/0xd0 [ 60.141524] print_report+0x118/0x608 [ 60.141557] kasan_report+0xdc/0x128 [ 60.141589] kasan_check_range+0x100/0x1a8 [ 60.141625] __kasan_check_write+0x20/0x30 [ 60.141655] kasan_atomics_helper+0x1414/0x4858 [ 60.141689] kasan_atomics+0x198/0x2e0 [ 60.141719] kunit_try_run_case+0x170/0x3f0 [ 60.141753] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.141793] kthread+0x328/0x630 [ 60.141821] ret_from_fork+0x10/0x20 [ 60.141854] [ 60.211664] Allocated by task 312: [ 60.215049] kasan_save_stack+0x3c/0x68 [ 60.218869] kasan_save_track+0x20/0x40 [ 60.222688] kasan_save_alloc_info+0x40/0x58 [ 60.226942] __kasan_kmalloc+0xd4/0xd8 [ 60.230674] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.235188] kasan_atomics+0xb8/0x2e0 [ 60.238834] kunit_try_run_case+0x170/0x3f0 [ 60.243001] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.248469] kthread+0x328/0x630 [ 60.251681] ret_from_fork+0x10/0x20 [ 60.255240] [ 60.256716] The buggy address belongs to the object at ffff000805f49a00 [ 60.256716] which belongs to the cache kmalloc-64 of size 64 [ 60.269042] The buggy address is located 0 bytes to the right of [ 60.269042] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 60.281889] [ 60.283365] The buggy address belongs to the physical page: [ 60.288921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 60.296909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.303416] page_type: f5(slab) [ 60.306550] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 60.314274] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.321992] page dumped because: kasan: bad access detected [ 60.327548] [ 60.329023] Memory state around the buggy address: [ 60.333802] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.341006] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.348211] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.355412] ^ [ 60.360190] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.367395] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.374596] ================================================================== [ 50.652736] ================================================================== [ 50.659814] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 50.667103] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 50.674481] [ 50.675964] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 50.676013] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.676029] Hardware name: WinLink E850-96 board (DT) [ 50.676049] Call trace: [ 50.676065] show_stack+0x20/0x38 (C) [ 50.676098] dump_stack_lvl+0x8c/0xd0 [ 50.676135] print_report+0x118/0x608 [ 50.676170] kasan_report+0xdc/0x128 [ 50.676203] kasan_check_range+0x100/0x1a8 [ 50.676238] __kasan_check_write+0x20/0x30 [ 50.676269] kasan_atomics_helper+0x6ec/0x4858 [ 50.676304] kasan_atomics+0x198/0x2e0 [ 50.676334] kunit_try_run_case+0x170/0x3f0 [ 50.676368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.676408] kthread+0x328/0x630 [ 50.676435] ret_from_fork+0x10/0x20 [ 50.676468] [ 50.746181] Allocated by task 312: [ 50.749567] kasan_save_stack+0x3c/0x68 [ 50.753386] kasan_save_track+0x20/0x40 [ 50.757205] kasan_save_alloc_info+0x40/0x58 [ 50.761459] __kasan_kmalloc+0xd4/0xd8 [ 50.765192] __kmalloc_cache_noprof+0x16c/0x3c0 [ 50.769705] kasan_atomics+0xb8/0x2e0 [ 50.773351] kunit_try_run_case+0x170/0x3f0 [ 50.777518] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.782986] kthread+0x328/0x630 [ 50.786198] ret_from_fork+0x10/0x20 [ 50.789757] [ 50.791233] The buggy address belongs to the object at ffff000805f49a00 [ 50.791233] which belongs to the cache kmalloc-64 of size 64 [ 50.803559] The buggy address is located 0 bytes to the right of [ 50.803559] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 50.816406] [ 50.817882] The buggy address belongs to the physical page: [ 50.823438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 50.831425] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.837933] page_type: f5(slab) [ 50.841067] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 50.848791] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.856509] page dumped because: kasan: bad access detected [ 50.862065] [ 50.863540] Memory state around the buggy address: [ 50.868319] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.875524] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.882728] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.889929] ^ [ 50.894707] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.901912] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.909113] ================================================================== [ 58.274367] ================================================================== [ 58.281400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 58.288777] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 58.296155] [ 58.297639] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 58.297690] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.297706] Hardware name: WinLink E850-96 board (DT) [ 58.297725] Call trace: [ 58.297742] show_stack+0x20/0x38 (C) [ 58.297777] dump_stack_lvl+0x8c/0xd0 [ 58.297815] print_report+0x118/0x608 [ 58.297846] kasan_report+0xdc/0x128 [ 58.297880] kasan_check_range+0x100/0x1a8 [ 58.297916] __kasan_check_write+0x20/0x30 [ 58.297946] kasan_atomics_helper+0x1128/0x4858 [ 58.297979] kasan_atomics+0x198/0x2e0 [ 58.298009] kunit_try_run_case+0x170/0x3f0 [ 58.298045] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.298083] kthread+0x328/0x630 [ 58.298109] ret_from_fork+0x10/0x20 [ 58.298141] [ 58.367942] Allocated by task 312: [ 58.371327] kasan_save_stack+0x3c/0x68 [ 58.375147] kasan_save_track+0x20/0x40 [ 58.378966] kasan_save_alloc_info+0x40/0x58 [ 58.383220] __kasan_kmalloc+0xd4/0xd8 [ 58.386952] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.391466] kasan_atomics+0xb8/0x2e0 [ 58.395112] kunit_try_run_case+0x170/0x3f0 [ 58.399278] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.404747] kthread+0x328/0x630 [ 58.407959] ret_from_fork+0x10/0x20 [ 58.411518] [ 58.412993] The buggy address belongs to the object at ffff000805f49a00 [ 58.412993] which belongs to the cache kmalloc-64 of size 64 [ 58.425320] The buggy address is located 0 bytes to the right of [ 58.425320] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 58.438166] [ 58.439642] The buggy address belongs to the physical page: [ 58.445200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 58.453187] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.459694] page_type: f5(slab) [ 58.462829] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.470551] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.478270] page dumped because: kasan: bad access detected [ 58.483825] [ 58.485301] Memory state around the buggy address: [ 58.490080] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.497284] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.504489] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.511690] ^ [ 58.516468] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.523673] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.530874] ================================================================== [ 61.173623] ================================================================== [ 61.180665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 61.188039] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 61.195417] [ 61.196900] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 61.196951] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.196968] Hardware name: WinLink E850-96 board (DT) [ 61.196989] Call trace: [ 61.197005] show_stack+0x20/0x38 (C) [ 61.197036] dump_stack_lvl+0x8c/0xd0 [ 61.197070] print_report+0x118/0x608 [ 61.197106] kasan_report+0xdc/0x128 [ 61.197138] kasan_check_range+0x100/0x1a8 [ 61.197174] __kasan_check_write+0x20/0x30 [ 61.197205] kasan_atomics_helper+0x15b4/0x4858 [ 61.197239] kasan_atomics+0x198/0x2e0 [ 61.197272] kunit_try_run_case+0x170/0x3f0 [ 61.197305] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.197345] kthread+0x328/0x630 [ 61.197371] ret_from_fork+0x10/0x20 [ 61.197406] [ 61.267204] Allocated by task 312: [ 61.270590] kasan_save_stack+0x3c/0x68 [ 61.274408] kasan_save_track+0x20/0x40 [ 61.278228] kasan_save_alloc_info+0x40/0x58 [ 61.282481] __kasan_kmalloc+0xd4/0xd8 [ 61.286214] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.290728] kasan_atomics+0xb8/0x2e0 [ 61.294374] kunit_try_run_case+0x170/0x3f0 [ 61.298540] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.304009] kthread+0x328/0x630 [ 61.307221] ret_from_fork+0x10/0x20 [ 61.310780] [ 61.312255] The buggy address belongs to the object at ffff000805f49a00 [ 61.312255] which belongs to the cache kmalloc-64 of size 64 [ 61.324582] The buggy address is located 0 bytes to the right of [ 61.324582] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 61.337429] [ 61.338904] The buggy address belongs to the physical page: [ 61.344461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 61.352448] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.358956] page_type: f5(slab) [ 61.362089] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 61.369813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.377532] page dumped because: kasan: bad access detected [ 61.383088] [ 61.384563] Memory state around the buggy address: [ 61.389341] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.396546] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.403751] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.410952] ^ [ 61.415730] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.422935] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.430136] ================================================================== [ 63.010485] ================================================================== [ 63.017442] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 63.024817] Read of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 63.032108] [ 63.033591] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 63.033640] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.033660] Hardware name: WinLink E850-96 board (DT) [ 63.033680] Call trace: [ 63.033694] show_stack+0x20/0x38 (C) [ 63.033726] dump_stack_lvl+0x8c/0xd0 [ 63.033763] print_report+0x118/0x608 [ 63.033797] kasan_report+0xdc/0x128 [ 63.033833] __asan_report_load8_noabort+0x20/0x30 [ 63.033870] kasan_atomics_helper+0x3e20/0x4858 [ 63.033903] kasan_atomics+0x198/0x2e0 [ 63.033936] kunit_try_run_case+0x170/0x3f0 [ 63.033970] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.034007] kthread+0x328/0x630 [ 63.034033] ret_from_fork+0x10/0x20 [ 63.034066] [ 63.100509] Allocated by task 312: [ 63.103895] kasan_save_stack+0x3c/0x68 [ 63.107715] kasan_save_track+0x20/0x40 [ 63.111534] kasan_save_alloc_info+0x40/0x58 [ 63.115788] __kasan_kmalloc+0xd4/0xd8 [ 63.119520] __kmalloc_cache_noprof+0x16c/0x3c0 [ 63.124034] kasan_atomics+0xb8/0x2e0 [ 63.127679] kunit_try_run_case+0x170/0x3f0 [ 63.131846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.137315] kthread+0x328/0x630 [ 63.140527] ret_from_fork+0x10/0x20 [ 63.144086] [ 63.145561] The buggy address belongs to the object at ffff000805f49a00 [ 63.145561] which belongs to the cache kmalloc-64 of size 64 [ 63.157888] The buggy address is located 0 bytes to the right of [ 63.157888] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 63.170734] [ 63.172210] The buggy address belongs to the physical page: [ 63.177768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 63.185755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.192262] page_type: f5(slab) [ 63.195396] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 63.203119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.210838] page dumped because: kasan: bad access detected [ 63.216393] [ 63.217869] Memory state around the buggy address: [ 63.222649] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.229852] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.237057] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.244258] ^ [ 63.249036] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.256240] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.263441] ================================================================== [ 52.495405] ================================================================== [ 52.502493] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 52.509783] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 52.517162] [ 52.518644] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 52.518691] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.518705] Hardware name: WinLink E850-96 board (DT) [ 52.518724] Call trace: [ 52.518738] show_stack+0x20/0x38 (C) [ 52.518772] dump_stack_lvl+0x8c/0xd0 [ 52.518807] print_report+0x118/0x608 [ 52.518841] kasan_report+0xdc/0x128 [ 52.518876] kasan_check_range+0x100/0x1a8 [ 52.518910] __kasan_check_write+0x20/0x30 [ 52.518938] kasan_atomics_helper+0xa04/0x4858 [ 52.518972] kasan_atomics+0x198/0x2e0 [ 52.519002] kunit_try_run_case+0x170/0x3f0 [ 52.519038] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.519075] kthread+0x328/0x630 [ 52.519103] ret_from_fork+0x10/0x20 [ 52.519134] [ 52.588862] Allocated by task 312: [ 52.592247] kasan_save_stack+0x3c/0x68 [ 52.596067] kasan_save_track+0x20/0x40 [ 52.599886] kasan_save_alloc_info+0x40/0x58 [ 52.604139] __kasan_kmalloc+0xd4/0xd8 [ 52.607872] __kmalloc_cache_noprof+0x16c/0x3c0 [ 52.612386] kasan_atomics+0xb8/0x2e0 [ 52.616032] kunit_try_run_case+0x170/0x3f0 [ 52.620198] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.625667] kthread+0x328/0x630 [ 52.628879] ret_from_fork+0x10/0x20 [ 52.632438] [ 52.633913] The buggy address belongs to the object at ffff000805f49a00 [ 52.633913] which belongs to the cache kmalloc-64 of size 64 [ 52.646240] The buggy address is located 0 bytes to the right of [ 52.646240] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 52.659087] [ 52.660562] The buggy address belongs to the physical page: [ 52.666118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 52.674104] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.680614] page_type: f5(slab) [ 52.683747] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 52.691471] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.699190] page dumped because: kasan: bad access detected [ 52.704746] [ 52.706221] Memory state around the buggy address: [ 52.711000] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.718204] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.725409] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.732610] ^ [ 52.737388] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.744593] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.751794] ================================================================== [ 61.961852] ================================================================== [ 61.968845] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 61.976221] Read of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 61.983513] [ 61.984996] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 61.985048] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.985063] Hardware name: WinLink E850-96 board (DT) [ 61.985081] Call trace: [ 61.985097] show_stack+0x20/0x38 (C) [ 61.985129] dump_stack_lvl+0x8c/0xd0 [ 61.985166] print_report+0x118/0x608 [ 61.985199] kasan_report+0xdc/0x128 [ 61.985234] __asan_report_load8_noabort+0x20/0x30 [ 61.985274] kasan_atomics_helper+0x3df4/0x4858 [ 61.985307] kasan_atomics+0x198/0x2e0 [ 61.985338] kunit_try_run_case+0x170/0x3f0 [ 61.985373] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.985410] kthread+0x328/0x630 [ 61.985438] ret_from_fork+0x10/0x20 [ 61.985469] [ 62.051914] Allocated by task 312: [ 62.055300] kasan_save_stack+0x3c/0x68 [ 62.059119] kasan_save_track+0x20/0x40 [ 62.062939] kasan_save_alloc_info+0x40/0x58 [ 62.067192] __kasan_kmalloc+0xd4/0xd8 [ 62.070924] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.075438] kasan_atomics+0xb8/0x2e0 [ 62.079084] kunit_try_run_case+0x170/0x3f0 [ 62.083251] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.088719] kthread+0x328/0x630 [ 62.091931] ret_from_fork+0x10/0x20 [ 62.095490] [ 62.096967] The buggy address belongs to the object at ffff000805f49a00 [ 62.096967] which belongs to the cache kmalloc-64 of size 64 [ 62.109292] The buggy address is located 0 bytes to the right of [ 62.109292] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 62.122139] [ 62.123615] The buggy address belongs to the physical page: [ 62.129170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 62.137158] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.143666] page_type: f5(slab) [ 62.146799] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 62.154524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.162242] page dumped because: kasan: bad access detected [ 62.167798] [ 62.169273] Memory state around the buggy address: [ 62.174054] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.181257] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.188461] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.195662] ^ [ 62.200440] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.207645] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.214846] ================================================================== [ 46.967607] ================================================================== [ 46.974627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 46.981915] Read of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 46.989207] [ 46.990691] CPU: 7 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 46.990741] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.990759] Hardware name: WinLink E850-96 board (DT) [ 46.990779] Call trace: [ 46.990791] show_stack+0x20/0x38 (C) [ 46.990826] dump_stack_lvl+0x8c/0xd0 [ 46.990866] print_report+0x118/0x608 [ 46.990903] kasan_report+0xdc/0x128 [ 46.990938] kasan_check_range+0x100/0x1a8 [ 46.990978] __kasan_check_read+0x20/0x30 [ 46.991007] kasan_atomics_helper+0x1ec/0x4858 [ 46.991039] kasan_atomics+0x198/0x2e0 [ 46.991072] kunit_try_run_case+0x170/0x3f0 [ 46.991107] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.991146] kthread+0x328/0x630 [ 46.991175] ret_from_fork+0x10/0x20 [ 46.991212] [ 47.060820] Allocated by task 312: [ 47.064207] kasan_save_stack+0x3c/0x68 [ 47.068025] kasan_save_track+0x20/0x40 [ 47.071844] kasan_save_alloc_info+0x40/0x58 [ 47.076098] __kasan_kmalloc+0xd4/0xd8 [ 47.079830] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.084344] kasan_atomics+0xb8/0x2e0 [ 47.087990] kunit_try_run_case+0x170/0x3f0 [ 47.092156] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.097625] kthread+0x328/0x630 [ 47.100837] ret_from_fork+0x10/0x20 [ 47.104396] [ 47.105873] The buggy address belongs to the object at ffff000805f49a00 [ 47.105873] which belongs to the cache kmalloc-64 of size 64 [ 47.118198] The buggy address is located 0 bytes to the right of [ 47.118198] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 47.131045] [ 47.132522] The buggy address belongs to the physical page: [ 47.138078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 47.146064] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.152573] page_type: f5(slab) [ 47.155707] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.163429] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.171148] page dumped because: kasan: bad access detected [ 47.176703] [ 47.178179] Memory state around the buggy address: [ 47.182959] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.190162] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.197367] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 47.204568] ^ [ 47.209346] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.216550] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.223751] ================================================================== [ 49.597924] ================================================================== [ 49.604968] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 49.612258] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 49.619636] [ 49.621119] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 49.621167] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.621185] Hardware name: WinLink E850-96 board (DT) [ 49.621208] Call trace: [ 49.621222] show_stack+0x20/0x38 (C) [ 49.621255] dump_stack_lvl+0x8c/0xd0 [ 49.621292] print_report+0x118/0x608 [ 49.621325] kasan_report+0xdc/0x128 [ 49.621359] kasan_check_range+0x100/0x1a8 [ 49.621394] __kasan_check_write+0x20/0x30 [ 49.621425] kasan_atomics_helper+0x54c/0x4858 [ 49.621460] kasan_atomics+0x198/0x2e0 [ 49.621491] kunit_try_run_case+0x170/0x3f0 [ 49.621525] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.621562] kthread+0x328/0x630 [ 49.621590] ret_from_fork+0x10/0x20 [ 49.621621] [ 49.691336] Allocated by task 312: [ 49.694722] kasan_save_stack+0x3c/0x68 [ 49.698541] kasan_save_track+0x20/0x40 [ 49.702360] kasan_save_alloc_info+0x40/0x58 [ 49.706614] __kasan_kmalloc+0xd4/0xd8 [ 49.710346] __kmalloc_cache_noprof+0x16c/0x3c0 [ 49.714860] kasan_atomics+0xb8/0x2e0 [ 49.718505] kunit_try_run_case+0x170/0x3f0 [ 49.722673] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.728141] kthread+0x328/0x630 [ 49.731353] ret_from_fork+0x10/0x20 [ 49.734912] [ 49.736387] The buggy address belongs to the object at ffff000805f49a00 [ 49.736387] which belongs to the cache kmalloc-64 of size 64 [ 49.748714] The buggy address is located 0 bytes to the right of [ 49.748714] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 49.761561] [ 49.763037] The buggy address belongs to the physical page: [ 49.768593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 49.776579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.783088] page_type: f5(slab) [ 49.786221] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 49.793945] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.801664] page dumped because: kasan: bad access detected [ 49.807220] [ 49.808695] Memory state around the buggy address: [ 49.813474] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.820678] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.827883] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 49.835084] ^ [ 49.839862] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.847067] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.854268] ================================================================== [ 58.802111] ================================================================== [ 58.809171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 58.816547] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 58.823925] [ 58.825408] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 58.825457] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.825473] Hardware name: WinLink E850-96 board (DT) [ 58.825490] Call trace: [ 58.825507] show_stack+0x20/0x38 (C) [ 58.825537] dump_stack_lvl+0x8c/0xd0 [ 58.825573] print_report+0x118/0x608 [ 58.825609] kasan_report+0xdc/0x128 [ 58.825641] kasan_check_range+0x100/0x1a8 [ 58.825676] __kasan_check_write+0x20/0x30 [ 58.825705] kasan_atomics_helper+0x11f8/0x4858 [ 58.825740] kasan_atomics+0x198/0x2e0 [ 58.825773] kunit_try_run_case+0x170/0x3f0 [ 58.825807] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.825846] kthread+0x328/0x630 [ 58.825874] ret_from_fork+0x10/0x20 [ 58.825905] [ 58.895711] Allocated by task 312: [ 58.899097] kasan_save_stack+0x3c/0x68 [ 58.902916] kasan_save_track+0x20/0x40 [ 58.906736] kasan_save_alloc_info+0x40/0x58 [ 58.910989] __kasan_kmalloc+0xd4/0xd8 [ 58.914722] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.919236] kasan_atomics+0xb8/0x2e0 [ 58.922882] kunit_try_run_case+0x170/0x3f0 [ 58.927048] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.932517] kthread+0x328/0x630 [ 58.935729] ret_from_fork+0x10/0x20 [ 58.939288] [ 58.940763] The buggy address belongs to the object at ffff000805f49a00 [ 58.940763] which belongs to the cache kmalloc-64 of size 64 [ 58.953090] The buggy address is located 0 bytes to the right of [ 58.953090] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 58.965937] [ 58.967412] The buggy address belongs to the physical page: [ 58.972968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 58.980955] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.987464] page_type: f5(slab) [ 58.990597] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 58.998321] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.006040] page dumped because: kasan: bad access detected [ 59.011595] [ 59.013071] Memory state around the buggy address: [ 59.017850] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.025054] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.032258] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.039460] ^ [ 59.044238] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.051443] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.058643] ================================================================== [ 50.916548] ================================================================== [ 50.923526] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 50.930814] Write of size 4 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 50.938193] [ 50.939676] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 50.939724] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.939741] Hardware name: WinLink E850-96 board (DT) [ 50.939762] Call trace: [ 50.939777] show_stack+0x20/0x38 (C) [ 50.939810] dump_stack_lvl+0x8c/0xd0 [ 50.939845] print_report+0x118/0x608 [ 50.939880] kasan_report+0xdc/0x128 [ 50.939915] kasan_check_range+0x100/0x1a8 [ 50.939950] __kasan_check_write+0x20/0x30 [ 50.939980] kasan_atomics_helper+0x760/0x4858 [ 50.940013] kasan_atomics+0x198/0x2e0 [ 50.940044] kunit_try_run_case+0x170/0x3f0 [ 50.940079] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.940117] kthread+0x328/0x630 [ 50.940144] ret_from_fork+0x10/0x20 [ 50.940176] [ 51.009892] Allocated by task 312: [ 51.013278] kasan_save_stack+0x3c/0x68 [ 51.017097] kasan_save_track+0x20/0x40 [ 51.020917] kasan_save_alloc_info+0x40/0x58 [ 51.025170] __kasan_kmalloc+0xd4/0xd8 [ 51.028903] __kmalloc_cache_noprof+0x16c/0x3c0 [ 51.033416] kasan_atomics+0xb8/0x2e0 [ 51.037063] kunit_try_run_case+0x170/0x3f0 [ 51.041229] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.046698] kthread+0x328/0x630 [ 51.049909] ret_from_fork+0x10/0x20 [ 51.053468] [ 51.054944] The buggy address belongs to the object at ffff000805f49a00 [ 51.054944] which belongs to the cache kmalloc-64 of size 64 [ 51.067271] The buggy address is located 0 bytes to the right of [ 51.067271] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 51.080117] [ 51.081593] The buggy address belongs to the physical page: [ 51.087149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 51.095135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.101645] page_type: f5(slab) [ 51.104779] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 51.112502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.120221] page dumped because: kasan: bad access detected [ 51.125776] [ 51.127252] Memory state around the buggy address: [ 51.132030] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.139235] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.146440] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.153641] ^ [ 51.158418] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.165623] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.172824] ================================================================== [ 59.593777] ================================================================== [ 59.600825] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 59.608201] Write of size 8 at addr ffff000805f49a30 by task kunit_try_catch/312 [ 59.615580] [ 59.617063] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 59.617110] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.617125] Hardware name: WinLink E850-96 board (DT) [ 59.617145] Call trace: [ 59.617161] show_stack+0x20/0x38 (C) [ 59.617192] dump_stack_lvl+0x8c/0xd0 [ 59.617229] print_report+0x118/0x608 [ 59.617261] kasan_report+0xdc/0x128 [ 59.617296] kasan_check_range+0x100/0x1a8 [ 59.617329] __kasan_check_write+0x20/0x30 [ 59.617359] kasan_atomics_helper+0x1384/0x4858 [ 59.617392] kasan_atomics+0x198/0x2e0 [ 59.617422] kunit_try_run_case+0x170/0x3f0 [ 59.617455] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.617493] kthread+0x328/0x630 [ 59.617520] ret_from_fork+0x10/0x20 [ 59.617553] [ 59.687367] Allocated by task 312: [ 59.690752] kasan_save_stack+0x3c/0x68 [ 59.694571] kasan_save_track+0x20/0x40 [ 59.698391] kasan_save_alloc_info+0x40/0x58 [ 59.702644] __kasan_kmalloc+0xd4/0xd8 [ 59.706377] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.710891] kasan_atomics+0xb8/0x2e0 [ 59.714536] kunit_try_run_case+0x170/0x3f0 [ 59.718703] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.724172] kthread+0x328/0x630 [ 59.727383] ret_from_fork+0x10/0x20 [ 59.730942] [ 59.732418] The buggy address belongs to the object at ffff000805f49a00 [ 59.732418] which belongs to the cache kmalloc-64 of size 64 [ 59.744745] The buggy address is located 0 bytes to the right of [ 59.744745] allocated 48-byte region [ffff000805f49a00, ffff000805f49a30) [ 59.757591] [ 59.759067] The buggy address belongs to the physical page: [ 59.764623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f49 [ 59.772612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.779119] page_type: f5(slab) [ 59.782252] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 59.789976] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.797695] page dumped because: kasan: bad access detected [ 59.803250] [ 59.804726] Memory state around the buggy address: [ 59.809504] ffff000805f49900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.816709] ffff000805f49980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.823914] >ffff000805f49a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.831114] ^ [ 59.835892] ffff000805f49a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.843097] ffff000805f49b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.850298] ==================================================================
[ 29.866375] ================================================================== [ 29.866552] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 29.866762] Read of size 4 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 29.867333] [ 29.868090] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 29.868642] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.868724] Hardware name: linux,dummy-virt (DT) [ 29.869006] Call trace: [ 29.869155] show_stack+0x20/0x38 (C) [ 29.869283] dump_stack_lvl+0x8c/0xd0 [ 29.869406] print_report+0x118/0x608 [ 29.870026] kasan_report+0xdc/0x128 [ 29.870509] __asan_report_load4_noabort+0x20/0x30 [ 29.871209] kasan_atomics_helper+0x3dd8/0x4858 [ 29.871568] kasan_atomics+0x198/0x2e0 [ 29.871697] kunit_try_run_case+0x170/0x3f0 [ 29.871839] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.872572] kthread+0x328/0x630 [ 29.873468] ret_from_fork+0x10/0x20 [ 29.874014] [ 29.874375] Allocated by task 265: [ 29.874876] kasan_save_stack+0x3c/0x68 [ 29.875375] kasan_save_track+0x20/0x40 [ 29.876107] kasan_save_alloc_info+0x40/0x58 [ 29.876257] __kasan_kmalloc+0xd4/0xd8 [ 29.876567] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.876820] kasan_atomics+0xb8/0x2e0 [ 29.876929] kunit_try_run_case+0x170/0x3f0 [ 29.877998] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.878134] kthread+0x328/0x630 [ 29.878311] ret_from_fork+0x10/0x20 [ 29.878494] [ 29.878547] The buggy address belongs to the object at fff00000c643c780 [ 29.878547] which belongs to the cache kmalloc-64 of size 64 [ 29.878692] The buggy address is located 0 bytes to the right of [ 29.878692] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 29.878849] [ 29.878983] The buggy address belongs to the physical page: [ 29.879151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c [ 29.879287] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.879432] page_type: f5(slab) [ 29.879816] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.880027] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.880179] page dumped because: kasan: bad access detected [ 29.880279] [ 29.880335] Memory state around the buggy address: [ 29.880421] fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.880539] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.880666] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.880768] ^ [ 29.880856] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.881237] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.881346] ================================================================== [ 29.728763] ================================================================== [ 29.728923] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 29.729071] Write of size 4 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 29.729257] [ 29.729423] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 29.729633] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.729705] Hardware name: linux,dummy-virt (DT) [ 29.729781] Call trace: [ 29.729839] show_stack+0x20/0x38 (C) [ 29.729984] dump_stack_lvl+0x8c/0xd0 [ 29.730115] print_report+0x118/0x608 [ 29.730251] kasan_report+0xdc/0x128 [ 29.730600] kasan_check_range+0x100/0x1a8 [ 29.730767] __kasan_check_write+0x20/0x30 [ 29.731500] kasan_atomics_helper+0x99c/0x4858 [ 29.731666] kasan_atomics+0x198/0x2e0 [ 29.731808] kunit_try_run_case+0x170/0x3f0 [ 29.731894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.732063] kthread+0x328/0x630 [ 29.732190] ret_from_fork+0x10/0x20 [ 29.732335] [ 29.732461] Allocated by task 265: [ 29.732628] kasan_save_stack+0x3c/0x68 [ 29.732744] kasan_save_track+0x20/0x40 [ 29.732904] kasan_save_alloc_info+0x40/0x58 [ 29.733046] __kasan_kmalloc+0xd4/0xd8 [ 29.733154] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.733448] kasan_atomics+0xb8/0x2e0 [ 29.733573] kunit_try_run_case+0x170/0x3f0 [ 29.733689] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.733944] kthread+0x328/0x630 [ 29.734140] ret_from_fork+0x10/0x20 [ 29.734334] [ 29.734443] The buggy address belongs to the object at fff00000c643c780 [ 29.734443] which belongs to the cache kmalloc-64 of size 64 [ 29.734637] The buggy address is located 0 bytes to the right of [ 29.734637] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 29.734827] [ 29.734904] The buggy address belongs to the physical page: [ 29.735232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c [ 29.735420] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.735582] page_type: f5(slab) [ 29.735699] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.735871] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.736010] page dumped because: kasan: bad access detected [ 29.736105] [ 29.736328] Memory state around the buggy address: [ 29.736491] fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.736604] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.736720] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.736907] ^ [ 29.737035] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.737149] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.737258] ================================================================== [ 30.255664] ================================================================== [ 30.255776] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 30.255895] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 30.256856] [ 30.257015] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.257501] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.257761] Hardware name: linux,dummy-virt (DT) [ 30.257841] Call trace: [ 30.258345] show_stack+0x20/0x38 (C) [ 30.258493] dump_stack_lvl+0x8c/0xd0 [ 30.259011] print_report+0x118/0x608 [ 30.259216] kasan_report+0xdc/0x128 [ 30.259454] kasan_check_range+0x100/0x1a8 [ 30.259701] __kasan_check_write+0x20/0x30 [ 30.260102] kasan_atomics_helper+0x16d0/0x4858 [ 30.260400] kasan_atomics+0x198/0x2e0 [ 30.260520] kunit_try_run_case+0x170/0x3f0 [ 30.261599] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.262450] kthread+0x328/0x630 [ 30.263351] ret_from_fork+0x10/0x20 [ 30.263756] [ 30.264411] Allocated by task 265: [ 30.264662] kasan_save_stack+0x3c/0x68 [ 30.265676] kasan_save_track+0x20/0x40 [ 30.266087] kasan_save_alloc_info+0x40/0x58 [ 30.266237] __kasan_kmalloc+0xd4/0xd8 [ 30.266337] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.266444] kasan_atomics+0xb8/0x2e0 [ 30.266539] kunit_try_run_case+0x170/0x3f0 [ 30.268635] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.269076] kthread+0x328/0x630 [ 30.269183] ret_from_fork+0x10/0x20 [ 30.269276] [ 30.270655] The buggy address belongs to the object at fff00000c643c780 [ 30.270655] which belongs to the cache kmalloc-64 of size 64 [ 30.270971] The buggy address is located 0 bytes to the right of [ 30.270971] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 30.272142] [ 30.272497] The buggy address belongs to the physical page: [ 30.273262] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c [ 30.273420] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.273549] page_type: f5(slab) [ 30.273651] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.273777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.274603] page dumped because: kasan: bad access detected [ 30.277247] [ 30.277400] Memory state around the buggy address: [ 30.277646] fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.278627] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.278909] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.280022] ^ [ 30.280747] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.281182] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.281882] ================================================================== [ 29.857307] ================================================================== [ 29.857443] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 29.857560] Write of size 4 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 29.857682] [ 29.857746] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 29.857960] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.858031] Hardware name: linux,dummy-virt (DT) [ 29.858110] Call trace: [ 29.858164] show_stack+0x20/0x38 (C) [ 29.858290] dump_stack_lvl+0x8c/0xd0 [ 29.858405] print_report+0x118/0x608 [ 29.858525] kasan_report+0xdc/0x128 [ 29.858639] kasan_check_range+0x100/0x1a8 [ 29.858764] __kasan_check_write+0x20/0x30 [ 29.858888] kasan_atomics_helper+0xca0/0x4858 [ 29.859500] kasan_atomics+0x198/0x2e0 [ 29.859745] kunit_try_run_case+0x170/0x3f0 [ 29.860203] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.860412] kthread+0x328/0x630 [ 29.860545] ret_from_fork+0x10/0x20 [ 29.860862] [ 29.860915] Allocated by task 265: [ 29.861065] kasan_save_stack+0x3c/0x68 [ 29.861377] kasan_save_track+0x20/0x40 [ 29.861483] kasan_save_alloc_info+0x40/0x58 [ 29.861650] __kasan_kmalloc+0xd4/0xd8 [ 29.861964] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.862088] kasan_atomics+0xb8/0x2e0 [ 29.862366] kunit_try_run_case+0x170/0x3f0 [ 29.862664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.862787] kthread+0x328/0x630 [ 29.862892] ret_from_fork+0x10/0x20 [ 29.863428] [ 29.863484] The buggy address belongs to the object at fff00000c643c780 [ 29.863484] which belongs to the cache kmalloc-64 of size 64 [ 29.863642] The buggy address is located 0 bytes to the right of [ 29.863642] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 29.863825] [ 29.863883] The buggy address belongs to the physical page: [ 29.863995] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c [ 29.864307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.864437] page_type: f5(slab) [ 29.864539] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.864672] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.864771] page dumped because: kasan: bad access detected [ 29.864854] [ 29.864900] Memory state around the buggy address: [ 29.865019] fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.865201] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.865355] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.865640] ^ [ 29.865743] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.865863] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.866008] ================================================================== [ 30.052626] ================================================================== [ 30.052729] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 30.052884] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 30.053176] [ 30.053431] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.054630] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.054807] Hardware name: linux,dummy-virt (DT) [ 30.054897] Call trace: [ 30.054971] show_stack+0x20/0x38 (C) [ 30.055102] dump_stack_lvl+0x8c/0xd0 [ 30.055229] print_report+0x118/0x608 [ 30.055352] kasan_report+0xdc/0x128 [ 30.055470] kasan_check_range+0x100/0x1a8 [ 30.055589] __kasan_check_write+0x20/0x30 [ 30.055706] kasan_atomics_helper+0x1190/0x4858 [ 30.055829] kasan_atomics+0x198/0x2e0 [ 30.056621] kunit_try_run_case+0x170/0x3f0 [ 30.056784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.057472] kthread+0x328/0x630 [ 30.057890] ret_from_fork+0x10/0x20 [ 30.058048] [ 30.058270] Allocated by task 265: [ 30.058351] kasan_save_stack+0x3c/0x68 [ 30.058574] kasan_save_track+0x20/0x40 [ 30.058668] kasan_save_alloc_info+0x40/0x58 [ 30.058775] __kasan_kmalloc+0xd4/0xd8 [ 30.058971] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.059271] kasan_atomics+0xb8/0x2e0 [ 30.059532] kunit_try_run_case+0x170/0x3f0 [ 30.060103] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.060255] kthread+0x328/0x630 [ 30.060559] ret_from_fork+0x10/0x20 [ 30.060677] [ 30.060982] The buggy address belongs to the object at fff00000c643c780 [ 30.060982] which belongs to the cache kmalloc-64 of size 64 [ 30.061439] The buggy address is located 0 bytes to the right of [ 30.061439] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 30.062827] [ 30.063043] The buggy address belongs to the physical page: [ 30.063128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c [ 30.064060] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.064195] page_type: f5(slab) [ 30.064293] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.065408] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.066014] page dumped because: kasan: bad access detected [ 30.066889] [ 30.066984] Memory state around the buggy address: [ 30.067274] fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.067511] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.067794] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.068277] ^ [ 30.068385] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.068495] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.068694] ================================================================== [ 30.342413] ================================================================== [ 30.342521] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 30.342639] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 30.342762] [ 30.343056] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.343625] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.344075] Hardware name: linux,dummy-virt (DT) [ 30.344525] Call trace: [ 30.344615] show_stack+0x20/0x38 (C) [ 30.345405] dump_stack_lvl+0x8c/0xd0 [ 30.345578] print_report+0x118/0x608 [ 30.346006] kasan_report+0xdc/0x128 [ 30.346396] kasan_check_range+0x100/0x1a8 [ 30.346542] __kasan_check_write+0x20/0x30 [ 30.346668] kasan_atomics_helper+0x17ec/0x4858 [ 30.346874] kasan_atomics+0x198/0x2e0 [ 30.347227] kunit_try_run_case+0x170/0x3f0 [ 30.347306] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.347417] kthread+0x328/0x630 [ 30.347790] ret_from_fork+0x10/0x20 [ 30.347971] [ 30.348032] Allocated by task 265: [ 30.348219] kasan_save_stack+0x3c/0x68 [ 30.348411] kasan_save_track+0x20/0x40 [ 30.348510] kasan_save_alloc_info+0x40/0x58 [ 30.348621] __kasan_kmalloc+0xd4/0xd8 [ 30.348914] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.349046] kasan_atomics+0xb8/0x2e0 [ 30.349509] kunit_try_run_case+0x170/0x3f0 [ 30.349620] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.350084] kthread+0x328/0x630 [ 30.350191] ret_from_fork+0x10/0x20 [ 30.350312] [ 30.350457] The buggy address belongs to the object at fff00000c643c780 [ 30.350457] which belongs to the cache kmalloc-64 of size 64 [ 30.350747] The buggy address is located 0 bytes to the right of [ 30.350747] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 30.351180] [ 30.351258] The buggy address belongs to the physical page: [ 30.351342] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c [ 30.351479] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.351597] page_type: f5(slab) [ 30.351857] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.352017] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.352129] page dumped because: kasan: bad access detected [ 30.352213] [ 30.352275] Memory state around the buggy address: [ 30.352360] fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.352516] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.352631] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.352729] ^ [ 30.352849] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.353408] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.353652] ================================================================== [ 30.083738] ================================================================== [ 30.083855] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 30.084003] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 30.084135] [ 30.084205] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.084516] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.084661] Hardware name: linux,dummy-virt (DT) [ 30.084820] Call trace: [ 30.084928] show_stack+0x20/0x38 (C) [ 30.085262] dump_stack_lvl+0x8c/0xd0 [ 30.085462] print_report+0x118/0x608 [ 30.085749] kasan_report+0xdc/0x128 [ 30.086059] kasan_check_range+0x100/0x1a8 [ 30.086213] __kasan_check_write+0x20/0x30 [ 30.086567] kasan_atomics_helper+0x126c/0x4858 [ 30.086708] kasan_atomics+0x198/0x2e0 [ 30.086832] kunit_try_run_case+0x170/0x3f0 [ 30.086986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.087127] kthread+0x328/0x630 [ 30.087292] ret_from_fork+0x10/0x20 [ 30.087531] [ 30.087591] Allocated by task 265: [ 30.087764] kasan_save_stack+0x3c/0x68 [ 30.087889] kasan_save_track+0x20/0x40 [ 30.088103] kasan_save_alloc_info+0x40/0x58 [ 30.088298] __kasan_kmalloc+0xd4/0xd8 [ 30.088500] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.088622] kasan_atomics+0xb8/0x2e0 [ 30.088719] kunit_try_run_case+0x170/0x3f0 [ 30.088871] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.089018] kthread+0x328/0x630 [ 30.089116] ret_from_fork+0x10/0x20 [ 30.089226] [ 30.089296] The buggy address belongs to the object at fff00000c643c780 [ 30.089296] which belongs to the cache kmalloc-64 of size 64 [ 30.089446] The buggy address is located 0 bytes to the right of [ 30.089446] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 30.089708] [ 30.089775] The buggy address belongs to the physical page: [ 30.089899] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c [ 30.090057] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.090255] page_type: f5(slab) [ 30.090417] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.090555] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.090684] page dumped because: kasan: bad access detected [ 30.090784] [ 30.090950] Memory state around the buggy address: [ 30.091047] fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.091263] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.091386] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.091501] ^ [ 30.091682] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.091796] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.091917] ================================================================== [ 30.004705] ================================================================== [ 30.004851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 30.004989] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 30.005113] [ 30.005185] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.005384] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.005456] Hardware name: linux,dummy-virt (DT) [ 30.005531] Call trace: [ 30.005643] show_stack+0x20/0x38 (C) [ 30.005777] dump_stack_lvl+0x8c/0xd0 [ 30.005893] print_report+0x118/0x608 [ 30.006038] kasan_report+0xdc/0x128 [ 30.006154] kasan_check_range+0x100/0x1a8 [ 30.006277] __kasan_check_write+0x20/0x30 [ 30.006393] kasan_atomics_helper+0xff0/0x4858 [ 30.006510] kasan_atomics+0x198/0x2e0 [ 30.006627] kunit_try_run_case+0x170/0x3f0 [ 30.006753] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.006897] kthread+0x328/0x630 [ 30.007201] ret_from_fork+0x10/0x20 [ 30.007951] [ 30.008380] Allocated by task 265: [ 30.008492] kasan_save_stack+0x3c/0x68 [ 30.008997] kasan_save_track+0x20/0x40 [ 30.009131] kasan_save_alloc_info+0x40/0x58 [ 30.009320] __kasan_kmalloc+0xd4/0xd8 [ 30.009476] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.009582] kasan_atomics+0xb8/0x2e0 [ 30.009681] kunit_try_run_case+0x170/0x3f0 [ 30.010450] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.011078] kthread+0x328/0x630 [ 30.011672] ret_from_fork+0x10/0x20 [ 30.011786] [ 30.011847] The buggy address belongs to the object at fff00000c643c780 [ 30.011847] which belongs to the cache kmalloc-64 of size 64 [ 30.012017] The buggy address is located 0 bytes to the right of [ 30.012017] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 30.012545] [ 30.012654] The buggy address belongs to the physical page: [ 30.012823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c [ 30.013483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.013867] page_type: f5(slab) [ 30.014001] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.014578] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.014748] page dumped because: kasan: bad access detected [ 30.015034] [ 30.015098] Memory state around the buggy address: [ 30.015187] fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.015763] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.016125] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.016245] ^ [ 30.016657] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.017170] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.017308] ================================================================== [ 30.231798] ================================================================== [ 30.231979] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 30.232093] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 30.232214] [ 30.232284] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.232490] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.232680] Hardware name: linux,dummy-virt (DT) [ 30.232906] Call trace: [ 30.233088] show_stack+0x20/0x38 (C) [ 30.233233] dump_stack_lvl+0x8c/0xd0 [ 30.233409] print_report+0x118/0x608 [ 30.233575] kasan_report+0xdc/0x128 [ 30.233783] kasan_check_range+0x100/0x1a8 [ 30.234038] __kasan_check_write+0x20/0x30 [ 30.234173] kasan_atomics_helper+0x1644/0x4858 [ 30.234326] kasan_atomics+0x198/0x2e0 [ 30.234782] kunit_try_run_case+0x170/0x3f0 [ 30.235096] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.235391] kthread+0x328/0x630 [ 30.235559] ret_from_fork+0x10/0x20 [ 30.235832] [ 30.235978] Allocated by task 265: [ 30.236112] kasan_save_stack+0x3c/0x68 [ 30.236306] kasan_save_track+0x20/0x40 [ 30.236406] kasan_save_alloc_info+0x40/0x58 [ 30.236508] __kasan_kmalloc+0xd4/0xd8 [ 30.236654] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.236784] kasan_atomics+0xb8/0x2e0 [ 30.236891] kunit_try_run_case+0x170/0x3f0 [ 30.237018] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.237252] kthread+0x328/0x630 [ 30.237427] ret_from_fork+0x10/0x20 [ 30.237574] [ 30.237635] The buggy address belongs to the object at fff00000c643c780 [ 30.237635] which belongs to the cache kmalloc-64 of size 64 [ 30.238005] The buggy address is located 0 bytes to the right of [ 30.238005] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 30.238222] [ 30.238353] The buggy address belongs to the physical page: [ 30.238436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c [ 30.238566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.238687] page_type: f5(slab) [ 30.238780] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.238921] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.239053] page dumped because: kasan: bad access detected [ 30.239166] [ 30.239227] Memory state around the buggy address: [ 30.239416] fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.239554] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.239685] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.239799] ^ [ 30.240007] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.240144] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.240250] ================================================================== [ 29.962083] ================================================================== [ 29.962192] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 29.962304] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 29.962429] [ 29.962497] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 29.962690] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.962759] Hardware name: linux,dummy-virt (DT) [ 29.962849] Call trace: [ 29.962953] show_stack+0x20/0x38 (C) [ 29.963241] dump_stack_lvl+0x8c/0xd0 [ 29.963500] print_report+0x118/0x608 [ 29.963837] kasan_report+0xdc/0x128 [ 29.963978] kasan_check_range+0x100/0x1a8 [ 29.964329] __kasan_check_write+0x20/0x30 [ 29.964482] kasan_atomics_helper+0xeb8/0x4858 [ 29.964657] kasan_atomics+0x198/0x2e0 [ 29.964803] kunit_try_run_case+0x170/0x3f0 [ 29.965068] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.965253] kthread+0x328/0x630 [ 29.965642] ret_from_fork+0x10/0x20 [ 29.965816] [ 29.966305] Allocated by task 265: [ 29.966608] kasan_save_stack+0x3c/0x68 [ 29.966997] kasan_save_track+0x20/0x40 [ 29.967168] kasan_save_alloc_info+0x40/0x58 [ 29.967487] __kasan_kmalloc+0xd4/0xd8 [ 29.967679] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.967835] kasan_atomics+0xb8/0x2e0 [ 29.968113] kunit_try_run_case+0x170/0x3f0 [ 29.968223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.968334] kthread+0x328/0x630 [ 29.968482] ret_from_fork+0x10/0x20 [ 29.968585] [ 29.968638] The buggy address belongs to the object at fff00000c643c780 [ 29.968638] which belongs to the cache kmalloc-64 of size 64 [ 29.968785] The buggy address is located 0 bytes to the right of [ 29.968785] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 29.969081] [ 29.969504] The buggy address belongs to the physical page: [ 29.969906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c [ 29.970154] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.970334] page_type: f5(slab) [ 29.970544] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.971179] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.971366] page dumped because: kasan: bad access detected [ 29.971502] [ 29.971812] Memory state around the buggy address: [ 29.971906] fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.972042] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.972169] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.972269] ^ [ 29.972739] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.973013] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.973126] ================================================================== [ 30.109640] ================================================================== [ 30.109769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 30.110304] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 30.110482] [ 30.110557] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.110758] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.110823] Hardware name: linux,dummy-virt (DT) [ 30.110911] Call trace: [ 30.110987] show_stack+0x20/0x38 (C) [ 30.111114] dump_stack_lvl+0x8c/0xd0 [ 30.112539] print_report+0x118/0x608 [ 30.112688] kasan_report+0xdc/0x128 [ 30.112818] kasan_check_range+0x100/0x1a8 [ 30.113337] __kasan_check_write+0x20/0x30 [ 30.113959] kasan_atomics_helper+0x1384/0x4858 [ 30.114205] kasan_atomics+0x198/0x2e0 [ 30.114627] kunit_try_run_case+0x170/0x3f0 [ 30.115587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.115872] kthread+0x328/0x630 [ 30.116192] ret_from_fork+0x10/0x20 [ 30.116380] [ 30.116461] Allocated by task 265: [ 30.116657] kasan_save_stack+0x3c/0x68 [ 30.116772] kasan_save_track+0x20/0x40 [ 30.116919] kasan_save_alloc_info+0x40/0x58 [ 30.117190] __kasan_kmalloc+0xd4/0xd8 [ 30.117342] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.117631] kasan_atomics+0xb8/0x2e0 [ 30.117792] kunit_try_run_case+0x170/0x3f0 [ 30.117904] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.118067] kthread+0x328/0x630 [ 30.118216] ret_from_fork+0x10/0x20 [ 30.118366] [ 30.118425] The buggy address belongs to the object at fff00000c643c780 [ 30.118425] which belongs to the cache kmalloc-64 of size 64 [ 30.118582] The buggy address is located 0 bytes to the right of [ 30.118582] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 30.118781] [ 30.118846] The buggy address belongs to the physical page: [ 30.119173] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c [ 30.119329] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.119623] page_type: f5(slab) [ 30.119769] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.119994] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.120110] page dumped because: kasan: bad access detected [ 30.120244] [ 30.120306] Memory state around the buggy address: [ 30.120401] fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.120526] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.120645] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.120743] ^ [ 30.120824] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.121005] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.121097] ================================================================== [ 29.749551] ================================================================== [ 29.749619] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 29.749685] Write of size 4 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 29.749750] [ 29.749786] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 29.749890] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.749927] Hardware name: linux,dummy-virt (DT) [ 29.750028] Call trace: [ 29.750181] show_stack+0x20/0x38 (C) [ 29.750323] dump_stack_lvl+0x8c/0xd0 [ 29.750458] print_report+0x118/0x608 [ 29.750810] kasan_report+0xdc/0x128 [ 29.751034] kasan_check_range+0x100/0x1a8 [ 29.751261] __kasan_check_write+0x20/0x30 [ 29.751490] kasan_atomics_helper+0xa6c/0x4858 [ 29.751717] kasan_atomics+0x198/0x2e0 [ 29.752038] kunit_try_run_case+0x170/0x3f0 [ 29.752860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.753131] kthread+0x328/0x630 [ 29.754475] ret_from_fork+0x10/0x20 [ 29.754684] [ 29.754739] Allocated by task 265: [ 29.754817] kasan_save_stack+0x3c/0x68 [ 29.754985] kasan_save_track+0x20/0x40 [ 29.755249] kasan_save_alloc_info+0x40/0x58 [ 29.755427] __kasan_kmalloc+0xd4/0xd8 [ 29.755591] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.755851] kasan_atomics+0xb8/0x2e0 [ 29.756034] kunit_try_run_case+0x170/0x3f0 [ 29.756163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.756372] kthread+0x328/0x630 [ 29.756677] ret_from_fork+0x10/0x20 [ 29.757267] [ 29.757338] The buggy address belongs to the object at fff00000c643c780 [ 29.757338] which belongs to the cache kmalloc-64 of size 64 [ 29.757646] The buggy address is located 0 bytes to the right of [ 29.757646] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 29.757828] [ 29.757882] The buggy address belongs to the physical page: [ 29.758804] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c [ 29.759237] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.759871] page_type: f5(slab) [ 29.760638] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.761151] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.761300] page dumped because: kasan: bad access detected [ 29.761774] [ 29.762150] Memory state around the buggy address: [ 29.762486] fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.762605] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.763868] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.764372] ^ [ 29.765229] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.765353] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.765451] ================================================================== [ 29.845268] ================================================================== [ 29.845368] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 29.845481] Read of size 4 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 29.845603] [ 29.845668] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 29.845860] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.845927] Hardware name: linux,dummy-virt (DT) [ 29.846027] Call trace: [ 29.846081] show_stack+0x20/0x38 (C) [ 29.846209] dump_stack_lvl+0x8c/0xd0 [ 29.846328] print_report+0x118/0x608 [ 29.846453] kasan_report+0xdc/0x128 [ 29.846573] __asan_report_load4_noabort+0x20/0x30 [ 29.846700] kasan_atomics_helper+0x3de4/0x4858 [ 29.846827] kasan_atomics+0x198/0x2e0 [ 29.847929] kunit_try_run_case+0x170/0x3f0 [ 29.848150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.848338] kthread+0x328/0x630 [ 29.848470] ret_from_fork+0x10/0x20 [ 29.848616] [ 29.848679] Allocated by task 265: [ 29.848842] kasan_save_stack+0x3c/0x68 [ 29.849193] kasan_save_track+0x20/0x40 [ 29.849377] kasan_save_alloc_info+0x40/0x58 [ 29.849494] __kasan_kmalloc+0xd4/0xd8 [ 29.849629] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.849759] kasan_atomics+0xb8/0x2e0 [ 29.849860] kunit_try_run_case+0x170/0x3f0 [ 29.849980] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.850100] kthread+0x328/0x630 [ 29.850259] ret_from_fork+0x10/0x20 [ 29.850379] [ 29.850461] The buggy address belongs to the object at fff00000c643c780 [ 29.850461] which belongs to the cache kmalloc-64 of size 64 [ 29.850698] The buggy address is located 0 bytes to the right of [ 29.850698] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 29.851100] [ 29.851527] The buggy address belongs to the physical page: [ 29.851678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c [ 29.852478] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.852757] page_type: f5(slab) [ 29.852874] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.853152] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.853268] page dumped because: kasan: bad access detected [ 29.853373] [ 29.853663] Memory state around the buggy address: [ 29.853985] fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.854630] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.855143] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.855726] ^ [ 29.855871] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.856012] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.856114] ================================================================== [ 30.219415] ================================================================== [ 30.219531] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 30.219664] Read of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 30.219806] [ 30.219955] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.220159] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.220235] Hardware name: linux,dummy-virt (DT) [ 30.220318] Call trace: [ 30.220385] show_stack+0x20/0x38 (C) [ 30.220518] dump_stack_lvl+0x8c/0xd0 [ 30.220645] print_report+0x118/0x608 [ 30.220765] kasan_report+0xdc/0x128 [ 30.220886] __asan_report_load8_noabort+0x20/0x30 [ 30.221036] kasan_atomics_helper+0x3db0/0x4858 [ 30.221163] kasan_atomics+0x198/0x2e0 [ 30.221296] kunit_try_run_case+0x170/0x3f0 [ 30.221486] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.221681] kthread+0x328/0x630 [ 30.221832] ret_from_fork+0x10/0x20 [ 30.221992] [ 30.222066] Allocated by task 265: [ 30.222288] kasan_save_stack+0x3c/0x68 [ 30.222509] kasan_save_track+0x20/0x40 [ 30.222619] kasan_save_alloc_info+0x40/0x58 [ 30.222732] __kasan_kmalloc+0xd4/0xd8 [ 30.222831] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.222965] kasan_atomics+0xb8/0x2e0 [ 30.223060] kunit_try_run_case+0x170/0x3f0 [ 30.223183] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.223354] kthread+0x328/0x630 [ 30.223469] ret_from_fork+0x10/0x20 [ 30.223654] [ 30.223739] The buggy address belongs to the object at fff00000c643c780 [ 30.223739] which belongs to the cache kmalloc-64 of size 64 [ 30.223985] The buggy address is located 0 bytes to the right of [ 30.223985] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 30.225793] [ 30.226381] The buggy address belongs to the physical page: [ 30.226503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c [ 30.227020] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.227267] page_type: f5(slab) [ 30.227397] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.227614] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.228027] page dumped because: kasan: bad access detected [ 30.228153] [ 30.228463] Memory state around the buggy address: [ 30.228620] fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.228896] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.229038] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.229893] ^ [ 30.230041] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.230676] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.230976] ================================================================== [ 29.952849] ================================================================== [ 29.953372] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 29.953612] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 29.953748] [ 29.953952] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 29.954236] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.954442] Hardware name: linux,dummy-virt (DT) [ 29.954624] Call trace: [ 29.954680] show_stack+0x20/0x38 (C) [ 29.954808] dump_stack_lvl+0x8c/0xd0 [ 29.954955] print_report+0x118/0x608 [ 29.955099] kasan_report+0xdc/0x128 [ 29.955719] __asan_report_store8_noabort+0x20/0x30 [ 29.956168] kasan_atomics_helper+0x3e5c/0x4858 [ 29.956322] kasan_atomics+0x198/0x2e0 [ 29.956528] kunit_try_run_case+0x170/0x3f0 [ 29.956746] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.956920] kthread+0x328/0x630 [ 29.957127] ret_from_fork+0x10/0x20 [ 29.957285] [ 29.957445] Allocated by task 265: [ 29.957534] kasan_save_stack+0x3c/0x68 [ 29.957640] kasan_save_track+0x20/0x40 [ 29.957793] kasan_save_alloc_info+0x40/0x58 [ 29.958027] __kasan_kmalloc+0xd4/0xd8 [ 29.958173] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.958339] kasan_atomics+0xb8/0x2e0 [ 29.958442] kunit_try_run_case+0x170/0x3f0 [ 29.958543] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.958653] kthread+0x328/0x630 [ 29.958744] ret_from_fork+0x10/0x20 [ 29.958910] [ 29.958983] The buggy address belongs to the object at fff00000c643c780 [ 29.958983] which belongs to the cache kmalloc-64 of size 64 [ 29.959141] The buggy address is located 0 bytes to the right of [ 29.959141] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 29.959325] [ 29.959392] The buggy address belongs to the physical page: [ 29.959558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c [ 29.959788] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.959922] page_type: f5(slab) [ 29.960058] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.960208] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.960319] page dumped because: kasan: bad access detected [ 29.960408] [ 29.960457] Memory state around the buggy address: [ 29.960535] fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.960755] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.960952] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.961056] ^ [ 29.961151] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.961285] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.961548] ================================================================== [ 30.328813] ================================================================== [ 30.328927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 30.329070] Read of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 30.329192] [ 30.329279] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.329474] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.329542] Hardware name: linux,dummy-virt (DT) [ 30.329624] Call trace: [ 30.329696] show_stack+0x20/0x38 (C) [ 30.330066] dump_stack_lvl+0x8c/0xd0 [ 30.330439] print_report+0x118/0x608 [ 30.330572] kasan_report+0xdc/0x128 [ 30.330701] __asan_report_load8_noabort+0x20/0x30 [ 30.331010] kasan_atomics_helper+0x3e20/0x4858 [ 30.331202] kasan_atomics+0x198/0x2e0 [ 30.331823] kunit_try_run_case+0x170/0x3f0 [ 30.332174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.332323] kthread+0x328/0x630 [ 30.332543] ret_from_fork+0x10/0x20 [ 30.333180] [ 30.333252] Allocated by task 265: [ 30.333338] kasan_save_stack+0x3c/0x68 [ 30.333562] kasan_save_track+0x20/0x40 [ 30.333723] kasan_save_alloc_info+0x40/0x58 [ 30.334295] __kasan_kmalloc+0xd4/0xd8 [ 30.334406] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.334663] kasan_atomics+0xb8/0x2e0 [ 30.334852] kunit_try_run_case+0x170/0x3f0 [ 30.334980] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.335548] kthread+0x328/0x630 [ 30.335807] ret_from_fork+0x10/0x20 [ 30.336059] [ 30.336117] The buggy address belongs to the object at fff00000c643c780 [ 30.336117] which belongs to the cache kmalloc-64 of size 64 [ 30.336820] The buggy address is located 0 bytes to the right of [ 30.336820] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 30.337261] [ 30.337327] The buggy address belongs to the physical page: [ 30.337672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c [ 30.337857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.338272] page_type: f5(slab) [ 30.338563] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.338819] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.339232] page dumped because: kasan: bad access detected [ 30.339382] [ 30.339598] Memory state around the buggy address: [ 30.339891] fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.340334] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.340697] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.341249] ^ [ 30.341420] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.341564] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.341669] ================================================================== [ 29.394003] ================================================================== [ 29.397562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 29.399745] kasan_atomics_helper+0x1ec/0x4858 [ 29.405108] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.406355] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.412466] kunit_try_run_case+0x170/0x3f0 [ 29.418684] [ 29.421378] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.426881] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.427837] ================================================================== [ 30.186293] ================================================================== [ 30.186923] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 30.187073] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 30.187783] [ 30.187878] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.188284] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.188607] Hardware name: linux,dummy-virt (DT) [ 30.188686] Call trace: [ 30.188750] show_stack+0x20/0x38 (C) [ 30.188892] dump_stack_lvl+0x8c/0xd0 [ 30.189030] print_report+0x118/0x608 [ 30.189146] kasan_report+0xdc/0x128 [ 30.191915] kasan_check_range+0x100/0x1a8 [ 30.192076] __kasan_check_write+0x20/0x30 [ 30.193053] kasan_atomics_helper+0x154c/0x4858 [ 30.193835] kasan_atomics+0x198/0x2e0 [ 30.194384] kunit_try_run_case+0x170/0x3f0 [ 30.194528] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.194666] kthread+0x328/0x630 [ 30.195905] ret_from_fork+0x10/0x20 [ 30.196452] [ 30.196666] Allocated by task 265: [ 30.196864] kasan_save_stack+0x3c/0x68 [ 30.197555] kasan_save_track+0x20/0x40 [ 30.198389] kasan_save_alloc_info+0x40/0x58 [ 30.198819] __kasan_kmalloc+0xd4/0xd8 [ 30.198965] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.199313] kasan_atomics+0xb8/0x2e0 [ 30.199421] kunit_try_run_case+0x170/0x3f0 [ 30.199842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.200118] kthread+0x328/0x630 [ 30.200227] ret_from_fork+0x10/0x20 [ 30.200755] [ 30.200887] The buggy address belongs to the object at fff00000c643c780 [ 30.200887] which belongs to the cache kmalloc-64 of size 64 [ 30.201387] The buggy address is located 0 bytes to the right of [ 30.201387] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 30.201613] [ 30.201737] The buggy address belongs to the physical page: [ 30.201823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c [ 30.201981] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.202115] page_type: f5(slab) [ 30.202400] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.202538] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.202650] page dumped because: kasan: bad access detected [ 30.202891] [ 30.203493] Memory state around the buggy address: [ 30.203653] fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.203775] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.203894] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.204013] ^ [ 30.204282] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.204621] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.204818] ================================================================== [ 30.241253] ================================================================== [ 30.241568] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 30.241885] Read of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 30.242032] [ 30.242109] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.242306] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.242374] Hardware name: linux,dummy-virt (DT) [ 30.242450] Call trace: [ 30.242502] show_stack+0x20/0x38 (C) [ 30.242630] dump_stack_lvl+0x8c/0xd0 [ 30.242750] print_report+0x118/0x608 [ 30.242886] kasan_report+0xdc/0x128 [ 30.243432] __asan_report_load8_noabort+0x20/0x30 [ 30.244265] kasan_atomics_helper+0x3df4/0x4858 [ 30.244867] kasan_atomics+0x198/0x2e0 [ 30.245126] kunit_try_run_case+0x170/0x3f0 [ 30.245381] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.245636] kthread+0x328/0x630 [ 30.246227] ret_from_fork+0x10/0x20 [ 30.246472] [ 30.247023] Allocated by task 265: [ 30.247149] kasan_save_stack+0x3c/0x68 [ 30.247364] kasan_save_track+0x20/0x40 [ 30.247617] kasan_save_alloc_info+0x40/0x58 [ 30.247747] __kasan_kmalloc+0xd4/0xd8 [ 30.247921] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.248062] kasan_atomics+0xb8/0x2e0 [ 30.248159] kunit_try_run_case+0x170/0x3f0 [ 30.248253] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.248370] kthread+0x328/0x630 [ 30.248493] ret_from_fork+0x10/0x20 [ 30.248632] [ 30.248686] The buggy address belongs to the object at fff00000c643c780 [ 30.248686] which belongs to the cache kmalloc-64 of size 64 [ 30.248831] The buggy address is located 0 bytes to the right of [ 30.248831] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 30.249385] [ 30.249459] The buggy address belongs to the physical page: [ 30.249572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c [ 30.250570] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.251093] page_type: f5(slab) [ 30.251372] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.252007] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.252130] page dumped because: kasan: bad access detected [ 30.252343] [ 30.252417] Memory state around the buggy address: [ 30.252626] fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.252922] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.253409] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.253542] ^ [ 30.253764] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.254315] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.254513] ================================================================== [ 29.973782] ================================================================== [ 29.973897] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 29.974050] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 29.974245] [ 29.974360] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 29.974911] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.975007] Hardware name: linux,dummy-virt (DT) [ 29.975091] Call trace: [ 29.975437] show_stack+0x20/0x38 (C) [ 29.975631] dump_stack_lvl+0x8c/0xd0 [ 29.975771] print_report+0x118/0x608 [ 29.975893] kasan_report+0xdc/0x128 [ 29.976171] kasan_check_range+0x100/0x1a8 [ 29.976433] __kasan_check_write+0x20/0x30 [ 29.976566] kasan_atomics_helper+0xf20/0x4858 [ 29.976694] kasan_atomics+0x198/0x2e0 [ 29.976810] kunit_try_run_case+0x170/0x3f0 [ 29.976955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.977151] kthread+0x328/0x630 [ 29.977285] ret_from_fork+0x10/0x20 [ 29.977570] [ 29.977621] Allocated by task 265: [ 29.977725] kasan_save_stack+0x3c/0x68 [ 29.977866] kasan_save_track+0x20/0x40 [ 29.978354] kasan_save_alloc_info+0x40/0x58 [ 29.978474] __kasan_kmalloc+0xd4/0xd8 [ 29.978586] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.978711] kasan_atomics+0xb8/0x2e0 [ 29.978817] kunit_try_run_case+0x170/0x3f0 [ 29.979117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.979256] kthread+0x328/0x630 [ 29.979524] ret_from_fork+0x10/0x20 [ 29.979664] [ 29.979746] The buggy address belongs to the object at fff00000c643c780 [ 29.979746] which belongs to the cache kmalloc-64 of size 64 [ 29.980157] The buggy address is located 0 bytes to the right of [ 29.980157] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 29.980433] [ 29.980488] The buggy address belongs to the physical page: [ 29.980571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c [ 29.980713] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.980835] page_type: f5(slab) [ 29.982168] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.982350] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.982470] page dumped because: kasan: bad access detected [ 29.982562] [ 29.983630] Memory state around the buggy address: [ 29.984018] fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.984173] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.984310] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.984584] ^ [ 29.984802] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.985074] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.985175] ================================================================== [ 29.769313] ================================================================== [ 29.769518] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 29.769692] Write of size 4 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 29.769816] [ 29.769888] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 29.770115] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.770199] Hardware name: linux,dummy-virt (DT) [ 29.771411] print_report+0x118/0x608 [ 29.781091] ^ [ 29.786663] print_report+0x118/0x608 [ 29.786786] kasan_report+0xdc/0x128 [ 29.788801] ret_from_fork+0x10/0x20 [ 29.788925] [ 29.789371] kasan_save_track+0x20/0x40 [ 29.789702] __kasan_kmalloc+0xd4/0xd8 [ 29.790710] kthread+0x328/0x630 [ 29.791490] The buggy address is located 0 bytes to the right of [ 29.791490] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 29.792435] page_type: f5(slab) [ 29.792554] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.793650] ^ [ 29.793844] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.795681] [ 29.797659] kasan_atomics_helper+0xb70/0x4858 [ 29.802534] kasan_save_alloc_info+0x40/0x58 [ 29.804855] The buggy address is located 0 bytes to the right of [ 29.804855] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 29.808889] [ 29.811255] page_type: f5(slab) [ 29.812661] [ 29.815530] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.817258] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 29.819969] kunit_try_run_case+0x170/0x3f0 [ 29.821838] kthread+0x328/0x630 [ 29.824018] [ 29.825133] page_type: f5(slab) [ 29.825819] [ 29.827872] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.830101] Write of size 4 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 29.840244] [ 29.840298] The buggy address belongs to the physical page: [ 29.841124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c [ 29.841863] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.842388] page_type: f5(slab) [ 29.842598] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.842834] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.842995] page dumped because: kasan: bad access detected [ 29.843459] [ 29.843524] Memory state around the buggy address: [ 29.843621] fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.844124] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.844368] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.844562] ^ [ 29.844656] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.844770] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.844949] ================================================================== [ 30.306556] ================================================================== [ 30.306663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 30.306779] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 30.306914] [ 30.307024] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.307293] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.307375] Hardware name: linux,dummy-virt (DT) [ 30.307473] Call trace: [ 30.307595] show_stack+0x20/0x38 (C) [ 30.307748] dump_stack_lvl+0x8c/0xd0 [ 30.307886] print_report+0x118/0x608 [ 30.308124] kasan_report+0xdc/0x128 [ 30.308322] kasan_check_range+0x100/0x1a8 [ 30.308518] __kasan_check_write+0x20/0x30 [ 30.308718] kasan_atomics_helper+0x175c/0x4858 [ 30.309090] kasan_atomics+0x198/0x2e0 [ 30.309253] kunit_try_run_case+0x170/0x3f0 [ 30.309401] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.309646] kthread+0x328/0x630 [ 30.310458] ret_from_fork+0x10/0x20 [ 30.310589] [ 30.310639] Allocated by task 265: [ 30.311494] kasan_save_stack+0x3c/0x68 [ 30.312381] kasan_save_track+0x20/0x40 [ 30.312499] kasan_save_alloc_info+0x40/0x58 [ 30.312615] __kasan_kmalloc+0xd4/0xd8 [ 30.313668] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.313902] kasan_atomics+0xb8/0x2e0 [ 30.314394] kunit_try_run_case+0x170/0x3f0 [ 30.316664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.317014] kthread+0x328/0x630 [ 30.318216] ret_from_fork+0x10/0x20 [ 30.318350] [ 30.318730] The buggy address belongs to the object at fff00000c643c780 [ 30.318730] which belongs to the cache kmalloc-64 of size 64 [ 30.319325] The buggy address is located 0 bytes to the right of [ 30.319325] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 30.320583] [ 30.320651] The buggy address belongs to the physical page: [ 30.321527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c [ 30.322016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.322880] page_type: f5(slab) [ 30.323705] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.323847] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.323979] page dumped because: kasan: bad access detected [ 30.324070] [ 30.324119] Memory state around the buggy address: [ 30.324206] fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.324476] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.324591] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.324691] ^ [ 30.324851] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.325048] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.325219] ================================================================== [ 30.135156] ================================================================== [ 30.135261] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 30.135328] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 30.135411] [ 30.135835] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.136652] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.136735] Hardware name: linux,dummy-virt (DT) [ 30.136857] Call trace: [ 30.136989] show_stack+0x20/0x38 (C) [ 30.137169] dump_stack_lvl+0x8c/0xd0 [ 30.137300] print_report+0x118/0x608 [ 30.137634] kasan_report+0xdc/0x128 [ 30.137759] kasan_check_range+0x100/0x1a8 [ 30.137949] __kasan_check_write+0x20/0x30 [ 30.138093] kasan_atomics_helper+0x1414/0x4858 [ 30.138723] kasan_atomics+0x198/0x2e0 [ 30.139268] kunit_try_run_case+0x170/0x3f0 [ 30.139502] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.139673] kthread+0x328/0x630 [ 30.139800] ret_from_fork+0x10/0x20 [ 30.139975] [ 30.140031] Allocated by task 265: [ 30.140108] kasan_save_stack+0x3c/0x68 [ 30.140220] kasan_save_track+0x20/0x40 [ 30.140330] kasan_save_alloc_info+0x40/0x58 [ 30.140472] __kasan_kmalloc+0xd4/0xd8 [ 30.140744] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.140911] kasan_atomics+0xb8/0x2e0 [ 30.141047] kunit_try_run_case+0x170/0x3f0 [ 30.141188] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.141353] kthread+0x328/0x630 [ 30.141710] ret_from_fork+0x10/0x20 [ 30.141834] [ 30.141967] The buggy address belongs to the object at fff00000c643c780 [ 30.141967] which belongs to the cache kmalloc-64 of size 64 [ 30.142209] The buggy address is located 0 bytes to the right of [ 30.142209] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 30.142429] [ 30.142487] The buggy address belongs to the physical page: [ 30.142921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c [ 30.143078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.143203] page_type: f5(slab) [ 30.143303] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.143434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.143538] page dumped because: kasan: bad access detected [ 30.143650] [ 30.143724] Memory state around the buggy address: [ 30.143836] fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.144103] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.144223] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.144329] ^ [ 30.144416] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.145812] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.145998] ================================================================== [ 30.029022] ================================================================== [ 30.029328] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 30.030127] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 30.030306] [ 30.030528] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.031450] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.031641] Hardware name: linux,dummy-virt (DT) [ 30.031749] Call trace: [ 30.031810] show_stack+0x20/0x38 (C) [ 30.031969] dump_stack_lvl+0x8c/0xd0 [ 30.032095] print_report+0x118/0x608 [ 30.032217] kasan_report+0xdc/0x128 [ 30.032332] kasan_check_range+0x100/0x1a8 [ 30.032455] __kasan_check_write+0x20/0x30 [ 30.032571] kasan_atomics_helper+0x10c0/0x4858 [ 30.033259] kasan_atomics+0x198/0x2e0 [ 30.033508] kunit_try_run_case+0x170/0x3f0 [ 30.034228] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.034554] kthread+0x328/0x630 [ 30.034951] ret_from_fork+0x10/0x20 [ 30.035753] [ 30.036047] Allocated by task 265: [ 30.036143] kasan_save_stack+0x3c/0x68 [ 30.036480] kasan_save_track+0x20/0x40 [ 30.036618] kasan_save_alloc_info+0x40/0x58 [ 30.036762] __kasan_kmalloc+0xd4/0xd8 [ 30.036988] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.037144] kasan_atomics+0xb8/0x2e0 [ 30.037316] kunit_try_run_case+0x170/0x3f0 [ 30.037420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.037555] kthread+0x328/0x630 [ 30.037649] ret_from_fork+0x10/0x20 [ 30.037744] [ 30.037803] The buggy address belongs to the object at fff00000c643c780 [ 30.037803] which belongs to the cache kmalloc-64 of size 64 [ 30.037967] The buggy address is located 0 bytes to the right of [ 30.037967] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 30.038126] [ 30.038178] The buggy address belongs to the physical page: [ 30.038255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c [ 30.038400] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.038613] page_type: f5(slab) [ 30.038716] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.038855] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.039214] page dumped because: kasan: bad access detected [ 30.039319] [ 30.039859] Memory state around the buggy address: [ 30.039971] fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.041015] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.041207] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.041519] ^ [ 30.041992] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.043222] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.043339] ================================================================== [ 29.612242] ================================================================== [ 29.612372] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 29.612628] [ 29.612770] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 29.613049] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.614066] kasan_check_range+0x100/0x1a8 [ 29.614252] __kasan_check_write+0x20/0x30 [ 29.614646] kasan_atomics+0x198/0x2e0 [ 29.615465] kasan_save_stack+0x3c/0x68 [ 29.615568] kasan_save_track+0x20/0x40 [ 29.615744] kasan_save_alloc_info+0x40/0x58 [ 29.615902] __kasan_kmalloc+0xd4/0xd8 [ 29.616370] kasan_atomics+0xb8/0x2e0 [ 29.617301] ret_from_fork+0x10/0x20 [ 29.617634] The buggy address is located 0 bytes to the right of [ 29.617634] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 29.617847] [ 29.617958] The buggy address belongs to the physical page: [ 29.618753] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.619327] fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.619613] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.619743] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.619865] ^ [ 29.620063] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.620232] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.620339] ================================================================== [ 29.986701] ================================================================== [ 29.987255] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 29.987461] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 29.987675] [ 29.987758] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 29.988012] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.988090] Hardware name: linux,dummy-virt (DT) [ 29.988182] Call trace: [ 29.988358] show_stack+0x20/0x38 (C) [ 29.988669] dump_stack_lvl+0x8c/0xd0 [ 29.988798] print_report+0x118/0x608 [ 29.988918] kasan_report+0xdc/0x128 [ 29.989061] kasan_check_range+0x100/0x1a8 [ 29.989212] __kasan_check_write+0x20/0x30 [ 29.989943] kasan_atomics_helper+0xf88/0x4858 [ 29.990132] kasan_atomics+0x198/0x2e0 [ 29.990346] kunit_try_run_case+0x170/0x3f0 [ 29.990662] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.991451] kthread+0x328/0x630 [ 29.992841] ret_from_fork+0x10/0x20 [ 29.993636] [ 29.993989] Allocated by task 265: [ 29.994319] kasan_save_stack+0x3c/0x68 [ 29.994485] kasan_save_track+0x20/0x40 [ 29.995065] kasan_save_alloc_info+0x40/0x58 [ 29.995348] __kasan_kmalloc+0xd4/0xd8 [ 29.995448] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.995550] kasan_atomics+0xb8/0x2e0 [ 29.995646] kunit_try_run_case+0x170/0x3f0 [ 29.995749] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.995872] kthread+0x328/0x630 [ 29.995989] ret_from_fork+0x10/0x20 [ 29.996091] [ 29.997642] The buggy address belongs to the object at fff00000c643c780 [ 29.997642] which belongs to the cache kmalloc-64 of size 64 [ 29.998621] The buggy address is located 0 bytes to the right of [ 29.998621] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 29.999298] [ 29.999372] The buggy address belongs to the physical page: [ 29.999599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c [ 30.000272] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.000550] page_type: f5(slab) [ 30.000673] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.000982] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.001095] page dumped because: kasan: bad access detected [ 30.001434] [ 30.001491] Memory state around the buggy address: [ 30.001708] fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.002000] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.002154] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.002408] ^ [ 30.002497] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.002608] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.002710] ================================================================== [ 29.738191] ================================================================== [ 29.738318] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 29.738586] Write of size 4 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 29.738955] [ 29.739040] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 29.739471] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.739578] Hardware name: linux,dummy-virt (DT) [ 29.739673] Call trace: [ 29.739756] show_stack+0x20/0x38 (C) [ 29.739959] dump_stack_lvl+0x8c/0xd0 [ 29.740109] print_report+0x118/0x608 [ 29.740304] kasan_report+0xdc/0x128 [ 29.740400] kasan_check_range+0x100/0x1a8 [ 29.740532] __kasan_check_write+0x20/0x30 [ 29.740913] kasan_atomics_helper+0xa04/0x4858 [ 29.741201] kasan_atomics+0x198/0x2e0 [ 29.741390] kunit_try_run_case+0x170/0x3f0 [ 29.741525] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.741668] kthread+0x328/0x630 [ 29.741790] ret_from_fork+0x10/0x20 [ 29.741971] [ 29.742098] Allocated by task 265: [ 29.742173] kasan_save_stack+0x3c/0x68 [ 29.742288] kasan_save_track+0x20/0x40 [ 29.742390] kasan_save_alloc_info+0x40/0x58 [ 29.742654] __kasan_kmalloc+0xd4/0xd8 [ 29.742793] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.743015] kasan_atomics+0xb8/0x2e0 [ 29.743184] kunit_try_run_case+0x170/0x3f0 [ 29.743306] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.743698] kthread+0x328/0x630 [ 29.743893] ret_from_fork+0x10/0x20 [ 29.744024] [ 29.744081] The buggy address belongs to the object at fff00000c643c780 [ 29.744081] which belongs to the cache kmalloc-64 of size 64 [ 29.745094] The buggy address is located 0 bytes to the right of [ 29.745094] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 29.745263] [ 29.745315] The buggy address belongs to the physical page: [ 29.745393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c [ 29.745524] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.745646] page_type: f5(slab) [ 29.745743] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.745869] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.745988] page dumped because: kasan: bad access detected [ 29.746072] [ 29.746122] Memory state around the buggy address: [ 29.746202] fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.746312] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.746418] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.746517] ^ [ 29.746596] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.746707] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.746807] ================================================================== [ 30.018700] ================================================================== [ 30.018805] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 30.018927] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 30.020518] [ 30.020609] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.020733] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.020845] Hardware name: linux,dummy-virt (DT) [ 30.020960] Call trace: [ 30.021035] show_stack+0x20/0x38 (C) [ 30.021289] dump_stack_lvl+0x8c/0xd0 [ 30.021465] print_report+0x118/0x608 [ 30.021594] kasan_report+0xdc/0x128 [ 30.021779] kasan_check_range+0x100/0x1a8 [ 30.022369] __kasan_check_write+0x20/0x30 [ 30.022532] kasan_atomics_helper+0x1058/0x4858 [ 30.022667] kasan_atomics+0x198/0x2e0 [ 30.023171] kunit_try_run_case+0x170/0x3f0 [ 30.023463] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.023765] kthread+0x328/0x630 [ 30.024010] ret_from_fork+0x10/0x20 [ 30.024133] [ 30.024189] Allocated by task 265: [ 30.024271] kasan_save_stack+0x3c/0x68 [ 30.024382] kasan_save_track+0x20/0x40 [ 30.024480] kasan_save_alloc_info+0x40/0x58 [ 30.024581] __kasan_kmalloc+0xd4/0xd8 [ 30.024710] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.024844] kasan_atomics+0xb8/0x2e0 [ 30.025048] kunit_try_run_case+0x170/0x3f0 [ 30.025168] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.025305] kthread+0x328/0x630 [ 30.025415] ret_from_fork+0x10/0x20 [ 30.025615] [ 30.025681] The buggy address belongs to the object at fff00000c643c780 [ 30.025681] which belongs to the cache kmalloc-64 of size 64 [ 30.025976] The buggy address is located 0 bytes to the right of [ 30.025976] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 30.026174] [ 30.026342] The buggy address belongs to the physical page: [ 30.026426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c [ 30.026559] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.026679] page_type: f5(slab) [ 30.026771] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.026912] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.027038] page dumped because: kasan: bad access detected [ 30.027183] [ 30.027243] Memory state around the buggy address: [ 30.027338] fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.027506] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.027695] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.027806] ^ [ 30.027905] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.028096] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.028212] ================================================================== [ 30.148535] ================================================================== [ 30.148675] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 30.148796] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 30.148919] [ 30.149019] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.150604] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.150758] Hardware name: linux,dummy-virt (DT) [ 30.151095] Call trace: [ 30.151208] show_stack+0x20/0x38 (C) [ 30.151379] dump_stack_lvl+0x8c/0xd0 [ 30.151839] print_report+0x118/0x608 [ 30.152082] kasan_report+0xdc/0x128 [ 30.152248] kasan_check_range+0x100/0x1a8 [ 30.152371] __kasan_check_write+0x20/0x30 [ 30.152572] kasan_atomics_helper+0x147c/0x4858 [ 30.153030] kasan_atomics+0x198/0x2e0 [ 30.153514] kunit_try_run_case+0x170/0x3f0 [ 30.154262] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.154411] kthread+0x328/0x630 [ 30.154950] ret_from_fork+0x10/0x20 [ 30.155136] [ 30.155686] Allocated by task 265: [ 30.155793] kasan_save_stack+0x3c/0x68 [ 30.156463] kasan_save_track+0x20/0x40 [ 30.156571] kasan_save_alloc_info+0x40/0x58 [ 30.156685] __kasan_kmalloc+0xd4/0xd8 [ 30.156789] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.157293] kasan_atomics+0xb8/0x2e0 [ 30.157799] kunit_try_run_case+0x170/0x3f0 [ 30.158147] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.158457] kthread+0x328/0x630 [ 30.158581] ret_from_fork+0x10/0x20 [ 30.159036] [ 30.159094] The buggy address belongs to the object at fff00000c643c780 [ 30.159094] which belongs to the cache kmalloc-64 of size 64 [ 30.159620] The buggy address is located 0 bytes to the right of [ 30.159620] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 30.160424] [ 30.160520] The buggy address belongs to the physical page: [ 30.160677] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c [ 30.161473] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.161753] page_type: f5(slab) [ 30.161966] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.162102] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.162238] page dumped because: kasan: bad access detected [ 30.162477] [ 30.162602] Memory state around the buggy address: [ 30.162696] fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.163034] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.163884] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.164031] ^ [ 30.164127] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.165338] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.165457] ================================================================== [ 30.166111] ================================================================== [ 30.166341] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 30.166456] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 30.166582] [ 30.166654] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.166850] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.166950] Hardware name: linux,dummy-virt (DT) [ 30.167028] Call trace: [ 30.167087] show_stack+0x20/0x38 (C) [ 30.167224] dump_stack_lvl+0x8c/0xd0 [ 30.167589] print_report+0x118/0x608 [ 30.167737] kasan_report+0xdc/0x128 [ 30.167929] kasan_check_range+0x100/0x1a8 [ 30.168089] __kasan_check_write+0x20/0x30 [ 30.168233] kasan_atomics_helper+0x14e4/0x4858 [ 30.168571] kasan_atomics+0x198/0x2e0 [ 30.168701] kunit_try_run_case+0x170/0x3f0 [ 30.168836] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.169000] kthread+0x328/0x630 [ 30.169123] ret_from_fork+0x10/0x20 [ 30.169294] [ 30.169356] Allocated by task 265: [ 30.169483] kasan_save_stack+0x3c/0x68 [ 30.169606] kasan_save_track+0x20/0x40 [ 30.169699] kasan_save_alloc_info+0x40/0x58 [ 30.169806] __kasan_kmalloc+0xd4/0xd8 [ 30.169900] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.170032] kasan_atomics+0xb8/0x2e0 [ 30.170132] kunit_try_run_case+0x170/0x3f0 [ 30.171164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.172052] kthread+0x328/0x630 [ 30.173377] ret_from_fork+0x10/0x20 [ 30.173502] [ 30.173557] The buggy address belongs to the object at fff00000c643c780 [ 30.173557] which belongs to the cache kmalloc-64 of size 64 [ 30.174441] The buggy address is located 0 bytes to the right of [ 30.174441] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 30.174611] [ 30.174671] The buggy address belongs to the physical page: [ 30.174749] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c [ 30.174896] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.175068] page_type: f5(slab) [ 30.177041] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.177194] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.177314] page dumped because: kasan: bad access detected [ 30.177412] [ 30.177462] Memory state around the buggy address: [ 30.178549] fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.180496] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.180626] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.180740] ^ [ 30.180831] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.182711] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.183057] ================================================================== [ 30.044217] ================================================================== [ 30.044502] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 30.044614] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 30.044738] [ 30.044813] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.045108] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.045183] Hardware name: linux,dummy-virt (DT) [ 30.045309] Call trace: [ 30.045485] show_stack+0x20/0x38 (C) [ 30.045848] dump_stack_lvl+0x8c/0xd0 [ 30.046041] print_report+0x118/0x608 [ 30.046225] kasan_report+0xdc/0x128 [ 30.046368] kasan_check_range+0x100/0x1a8 [ 30.046509] __kasan_check_write+0x20/0x30 [ 30.046816] kasan_atomics_helper+0x1128/0x4858 [ 30.046992] kasan_atomics+0x198/0x2e0 [ 30.047172] kunit_try_run_case+0x170/0x3f0 [ 30.047313] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.047491] kthread+0x328/0x630 [ 30.047606] ret_from_fork+0x10/0x20 [ 30.047818] [ 30.047872] Allocated by task 265: [ 30.047968] kasan_save_stack+0x3c/0x68 [ 30.048092] kasan_save_track+0x20/0x40 [ 30.048343] kasan_save_alloc_info+0x40/0x58 [ 30.048469] __kasan_kmalloc+0xd4/0xd8 [ 30.048802] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.049028] kasan_atomics+0xb8/0x2e0 [ 30.049202] kunit_try_run_case+0x170/0x3f0 [ 30.049311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.049420] kthread+0x328/0x630 [ 30.049546] ret_from_fork+0x10/0x20 [ 30.049758] [ 30.049810] The buggy address belongs to the object at fff00000c643c780 [ 30.049810] which belongs to the cache kmalloc-64 of size 64 [ 30.050068] The buggy address is located 0 bytes to the right of [ 30.050068] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 30.050520] [ 30.050633] The buggy address belongs to the physical page: [ 30.050717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c [ 30.050844] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.050994] page_type: f5(slab) [ 30.051210] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.051528] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.051653] page dumped because: kasan: bad access detected [ 30.051750] [ 30.051803] Memory state around the buggy address: [ 30.051886] fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.052069] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.052148] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.052203] ^ [ 30.052248] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.052304] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.052353] ================================================================== [ 30.092814] ================================================================== [ 30.092925] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 30.093058] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 30.093179] [ 30.093253] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.093453] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.093532] Hardware name: linux,dummy-virt (DT) [ 30.093759] Call trace: [ 30.093954] show_stack+0x20/0x38 (C) [ 30.094167] dump_stack_lvl+0x8c/0xd0 [ 30.094347] print_report+0x118/0x608 [ 30.094498] kasan_report+0xdc/0x128 [ 30.094623] kasan_check_range+0x100/0x1a8 [ 30.094747] __kasan_check_write+0x20/0x30 [ 30.094876] kasan_atomics_helper+0x12d8/0x4858 [ 30.095021] kasan_atomics+0x198/0x2e0 [ 30.095478] kunit_try_run_case+0x170/0x3f0 [ 30.095843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.096119] kthread+0x328/0x630 [ 30.096876] ret_from_fork+0x10/0x20 [ 30.097885] [ 30.097957] Allocated by task 265: [ 30.098283] kasan_save_stack+0x3c/0x68 [ 30.098728] kasan_save_track+0x20/0x40 [ 30.099151] kasan_save_alloc_info+0x40/0x58 [ 30.099365] __kasan_kmalloc+0xd4/0xd8 [ 30.099476] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.099594] kasan_atomics+0xb8/0x2e0 [ 30.100571] kunit_try_run_case+0x170/0x3f0 [ 30.100973] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.101497] kthread+0x328/0x630 [ 30.101826] ret_from_fork+0x10/0x20 [ 30.102407] [ 30.102697] The buggy address belongs to the object at fff00000c643c780 [ 30.102697] which belongs to the cache kmalloc-64 of size 64 [ 30.102988] The buggy address is located 0 bytes to the right of [ 30.102988] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 30.103382] [ 30.103449] The buggy address belongs to the physical page: [ 30.103539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c [ 30.104267] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.104887] page_type: f5(slab) [ 30.105259] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.105626] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.105840] page dumped because: kasan: bad access detected [ 30.106323] [ 30.106414] Memory state around the buggy address: [ 30.106805] fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.106951] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.107066] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.107736] ^ [ 30.107947] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.108073] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.108181] ================================================================== [ 29.924463] ================================================================== [ 29.924618] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 29.924752] Read of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 29.924991] [ 29.925178] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 29.925406] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.925484] Hardware name: linux,dummy-virt (DT) [ 29.925571] Call trace: [ 29.925635] show_stack+0x20/0x38 (C) [ 29.925761] dump_stack_lvl+0x8c/0xd0 [ 29.925890] print_report+0x118/0x608 [ 29.926034] kasan_report+0xdc/0x128 [ 29.926156] __asan_report_load8_noabort+0x20/0x30 [ 29.926286] kasan_atomics_helper+0x3f58/0x4858 [ 29.926407] kasan_atomics+0x198/0x2e0 [ 29.926521] kunit_try_run_case+0x170/0x3f0 [ 29.926648] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.926785] kthread+0x328/0x630 [ 29.926912] ret_from_fork+0x10/0x20 [ 29.927091] [ 29.927221] Allocated by task 265: [ 29.927473] kasan_save_stack+0x3c/0x68 [ 29.927626] kasan_save_track+0x20/0x40 [ 29.927744] kasan_save_alloc_info+0x40/0x58 [ 29.927860] __kasan_kmalloc+0xd4/0xd8 [ 29.927992] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.928100] kasan_atomics+0xb8/0x2e0 [ 29.928337] kunit_try_run_case+0x170/0x3f0 [ 29.928494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.928816] kthread+0x328/0x630 [ 29.928918] ret_from_fork+0x10/0x20 [ 29.929154] [ 29.929208] The buggy address belongs to the object at fff00000c643c780 [ 29.929208] which belongs to the cache kmalloc-64 of size 64 [ 29.929477] The buggy address is located 0 bytes to the right of [ 29.929477] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 29.929781] [ 29.929865] The buggy address belongs to the physical page: [ 29.930007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c [ 29.930198] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.930345] page_type: f5(slab) [ 29.930461] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.930609] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.930979] page dumped because: kasan: bad access detected [ 29.931128] [ 29.931251] Memory state around the buggy address: [ 29.931671] fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.931822] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.931971] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.932333] ^ [ 29.932499] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.932709] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.933438] ================================================================== [ 30.070170] ================================================================== [ 30.070465] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 30.070779] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 30.071559] [ 30.071661] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.071889] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.071991] Hardware name: linux,dummy-virt (DT) [ 30.072197] Call trace: [ 30.072368] show_stack+0x20/0x38 (C) [ 30.072565] dump_stack_lvl+0x8c/0xd0 [ 30.072750] print_report+0x118/0x608 [ 30.073007] kasan_report+0xdc/0x128 [ 30.073369] kasan_check_range+0x100/0x1a8 [ 30.073881] __kasan_check_write+0x20/0x30 [ 30.074495] kasan_atomics_helper+0x11f8/0x4858 [ 30.074838] kasan_atomics+0x198/0x2e0 [ 30.075239] kunit_try_run_case+0x170/0x3f0 [ 30.075390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.075528] kthread+0x328/0x630 [ 30.075658] ret_from_fork+0x10/0x20 [ 30.075790] [ 30.075843] Allocated by task 265: [ 30.077247] kasan_save_stack+0x3c/0x68 [ 30.077372] kasan_save_track+0x20/0x40 [ 30.077493] kasan_save_alloc_info+0x40/0x58 [ 30.078162] __kasan_kmalloc+0xd4/0xd8 [ 30.079218] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.079548] kasan_atomics+0xb8/0x2e0 [ 30.079656] kunit_try_run_case+0x170/0x3f0 [ 30.079759] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.079870] kthread+0x328/0x630 [ 30.080009] ret_from_fork+0x10/0x20 [ 30.080257] [ 30.080310] The buggy address belongs to the object at fff00000c643c780 [ 30.080310] which belongs to the cache kmalloc-64 of size 64 [ 30.080482] The buggy address is located 0 bytes to the right of [ 30.080482] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 30.080696] [ 30.080757] The buggy address belongs to the physical page: [ 30.080834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c [ 30.081153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.081288] page_type: f5(slab) [ 30.081548] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.081910] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.082077] page dumped because: kasan: bad access detected [ 30.082177] [ 30.082236] Memory state around the buggy address: [ 30.082342] fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.082522] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.082653] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.082783] ^ [ 30.082924] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.083084] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.083191] ================================================================== [ 30.206100] ================================================================== [ 30.206246] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 30.206453] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 30.206616] [ 30.206898] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.207348] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.207584] Hardware name: linux,dummy-virt (DT) [ 30.207773] Call trace: [ 30.207870] show_stack+0x20/0x38 (C) [ 30.208178] dump_stack_lvl+0x8c/0xd0 [ 30.208526] print_report+0x118/0x608 [ 30.208813] kasan_report+0xdc/0x128 [ 30.209140] kasan_check_range+0x100/0x1a8 [ 30.209355] __kasan_check_write+0x20/0x30 [ 30.209800] kasan_atomics_helper+0x15b4/0x4858 [ 30.210047] kasan_atomics+0x198/0x2e0 [ 30.210243] kunit_try_run_case+0x170/0x3f0 [ 30.210455] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.210660] kthread+0x328/0x630 [ 30.210915] ret_from_fork+0x10/0x20 [ 30.211076] [ 30.211414] Allocated by task 265: [ 30.211700] kasan_save_stack+0x3c/0x68 [ 30.212074] kasan_save_track+0x20/0x40 [ 30.212289] kasan_save_alloc_info+0x40/0x58 [ 30.212596] __kasan_kmalloc+0xd4/0xd8 [ 30.212767] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.212993] kasan_atomics+0xb8/0x2e0 [ 30.213302] kunit_try_run_case+0x170/0x3f0 [ 30.213654] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.213833] kthread+0x328/0x630 [ 30.214581] ret_from_fork+0x10/0x20 [ 30.214746] [ 30.214839] The buggy address belongs to the object at fff00000c643c780 [ 30.214839] which belongs to the cache kmalloc-64 of size 64 [ 30.215531] The buggy address is located 0 bytes to the right of [ 30.215531] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 30.215704] [ 30.215984] The buggy address belongs to the physical page: [ 30.216082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c [ 30.216446] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.216859] page_type: f5(slab) [ 30.217094] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.217338] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.217594] page dumped because: kasan: bad access detected [ 30.217689] [ 30.217834] Memory state around the buggy address: [ 30.217920] fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.218066] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.218181] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.218401] ^ [ 30.218542] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.218700] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.218967] ================================================================== [ 29.694232] ================================================================== [ 29.694340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 29.694453] Read of size 4 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 29.694575] [ 29.694642] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 29.694833] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.694920] Hardware name: linux,dummy-virt (DT) [ 29.699179] Call trace: [ 29.699746] show_stack+0x20/0x38 (C) [ 29.700056] dump_stack_lvl+0x8c/0xd0 [ 29.700198] print_report+0x118/0x608 [ 29.700328] kasan_report+0xdc/0x128 [ 29.701363] __asan_report_load4_noabort+0x20/0x30 [ 29.701756] kasan_atomics_helper+0x42d8/0x4858 [ 29.701958] kasan_atomics+0x198/0x2e0 [ 29.702103] kunit_try_run_case+0x170/0x3f0 [ 29.702427] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.702578] kthread+0x328/0x630 [ 29.702962] ret_from_fork+0x10/0x20 [ 29.703091] [ 29.703152] Allocated by task 265: [ 29.703243] kasan_save_stack+0x3c/0x68 [ 29.703613] kasan_save_track+0x20/0x40 [ 29.703735] kasan_save_alloc_info+0x40/0x58 [ 29.703865] __kasan_kmalloc+0xd4/0xd8 [ 29.704124] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.704274] kasan_atomics+0xb8/0x2e0 [ 29.704365] kunit_try_run_case+0x170/0x3f0 [ 29.704464] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.704582] kthread+0x328/0x630 [ 29.704827] ret_from_fork+0x10/0x20 [ 29.704924] [ 29.705005] The buggy address belongs to the object at fff00000c643c780 [ 29.705005] which belongs to the cache kmalloc-64 of size 64 [ 29.705381] The buggy address is located 0 bytes to the right of [ 29.705381] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 29.705831] [ 29.706164] The buggy address belongs to the physical page: [ 29.706267] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c [ 29.706636] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.706774] page_type: f5(slab) [ 29.707045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.711187] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.712271] Call trace: [ 29.712341] show_stack+0x20/0x38 (C) [ 29.713288] dump_stack_lvl+0x8c/0xd0 [ 29.713636] print_report+0x118/0x608 [ 29.714159] kasan_report+0xdc/0x128 [ 29.714667] kasan_check_range+0x100/0x1a8 [ 29.715720] __kasan_check_write+0x20/0x30 [ 29.715911] kasan_atomics_helper+0x934/0x4858 [ 29.716112] kasan_atomics+0x198/0x2e0 [ 29.716347] kunit_try_run_case+0x170/0x3f0 [ 29.716635] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.717159] kthread+0x328/0x630 [ 29.717303] ret_from_fork+0x10/0x20 [ 29.717424] [ 29.718115] Allocated by task 265: [ 29.718200] kasan_save_stack+0x3c/0x68 [ 29.718710] kasan_save_track+0x20/0x40 [ 29.719162] kasan_save_alloc_info+0x40/0x58 [ 29.719504] __kasan_kmalloc+0xd4/0xd8 [ 29.719928] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.720245] kasan_atomics+0xb8/0x2e0 [ 29.720365] kunit_try_run_case+0x170/0x3f0 [ 29.721024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.721232] kthread+0x328/0x630 [ 29.721353] ret_from_fork+0x10/0x20 [ 29.721600] [ 29.721658] The buggy address belongs to the object at fff00000c643c780 [ 29.721658] which belongs to the cache kmalloc-64 of size 64 [ 29.722235] The buggy address is located 0 bytes to the right of [ 29.722235] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 29.722605] [ 29.723176] The buggy address belongs to the physical page: [ 29.723612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c [ 29.723752] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.723874] page_type: f5(slab) [ 29.724893] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.725202] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.725396] page dumped because: kasan: bad access detected [ 29.725600] [ 29.725764] Memory state around the buggy address: [ 29.725890] fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.726269] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.726437] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.726541] ^ [ 29.726628] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.726738] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.726842] ================================================================== [ 30.121624] ================================================================== [ 30.121904] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 30.122123] Read of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 30.122260] [ 30.122453] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.123006] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.123222] Hardware name: linux,dummy-virt (DT) [ 30.123350] Call trace: [ 30.123452] show_stack+0x20/0x38 (C) [ 30.123611] dump_stack_lvl+0x8c/0xd0 [ 30.123750] print_report+0x118/0x608 [ 30.124000] kasan_report+0xdc/0x128 [ 30.124263] __asan_report_load8_noabort+0x20/0x30 [ 30.124448] kasan_atomics_helper+0x3f04/0x4858 [ 30.126145] kasan_atomics+0x198/0x2e0 [ 30.126283] kunit_try_run_case+0x170/0x3f0 [ 30.126451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.126857] kthread+0x328/0x630 [ 30.127075] ret_from_fork+0x10/0x20 [ 30.127427] [ 30.127479] Allocated by task 265: [ 30.127569] kasan_save_stack+0x3c/0x68 [ 30.127847] kasan_save_track+0x20/0x40 [ 30.127994] kasan_save_alloc_info+0x40/0x58 [ 30.128117] __kasan_kmalloc+0xd4/0xd8 [ 30.128234] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.129293] kasan_atomics+0xb8/0x2e0 [ 30.129528] kunit_try_run_case+0x170/0x3f0 [ 30.129685] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.129924] kthread+0x328/0x630 [ 30.130038] ret_from_fork+0x10/0x20 [ 30.130395] [ 30.130458] The buggy address belongs to the object at fff00000c643c780 [ 30.130458] which belongs to the cache kmalloc-64 of size 64 [ 30.130629] The buggy address is located 0 bytes to the right of [ 30.130629] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 30.131178] [ 30.131245] The buggy address belongs to the physical page: [ 30.131864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c [ 30.132061] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.132201] page_type: f5(slab) [ 30.132440] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.133083] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.133282] page dumped because: kasan: bad access detected [ 30.133499] [ 30.133656] Memory state around the buggy address: [ 30.133819] fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.134016] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.134157] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.134294] ^ [ 30.134385] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.134493] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.134590] ================================================================== [ 30.284705] ================================================================== [ 30.284818] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 30.284962] Read of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 30.285088] [ 30.285167] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.285367] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.285441] Hardware name: linux,dummy-virt (DT) [ 30.285517] Call trace: [ 30.285573] show_stack+0x20/0x38 (C) [ 30.285704] dump_stack_lvl+0x8c/0xd0 [ 30.285828] print_report+0x118/0x608 [ 30.289761] kasan_report+0xdc/0x128 [ 30.290994] __asan_report_load8_noabort+0x20/0x30 [ 30.291133] kasan_atomics_helper+0x3e10/0x4858 [ 30.293487] kasan_atomics+0x198/0x2e0 [ 30.294253] kunit_try_run_case+0x170/0x3f0 [ 30.294723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.295684] kthread+0x328/0x630 [ 30.296518] ret_from_fork+0x10/0x20 [ 30.297329] [ 30.297493] Allocated by task 265: [ 30.297876] kasan_save_stack+0x3c/0x68 [ 30.298002] kasan_save_track+0x20/0x40 [ 30.298106] kasan_save_alloc_info+0x40/0x58 [ 30.299440] __kasan_kmalloc+0xd4/0xd8 [ 30.299560] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.299679] kasan_atomics+0xb8/0x2e0 [ 30.301001] kunit_try_run_case+0x170/0x3f0 [ 30.301122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.302361] kthread+0x328/0x630 [ 30.302644] ret_from_fork+0x10/0x20 [ 30.303485] [ 30.303557] The buggy address belongs to the object at fff00000c643c780 [ 30.303557] which belongs to the cache kmalloc-64 of size 64 [ 30.303981] The buggy address is located 0 bytes to the right of [ 30.303981] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 30.304078] [ 30.304112] The buggy address belongs to the physical page: [ 30.304201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c [ 30.304359] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.304510] page_type: f5(slab) [ 30.304639] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.304781] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.304912] page dumped because: kasan: bad access detected [ 30.305033] [ 30.305086] Memory state around the buggy address: [ 30.305236] fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.305370] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.305499] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.305612] ^ [ 30.305712] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.305852] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.305984] ================================================================== [ 29.911701] ================================================================== [ 29.911809] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 29.911926] Read of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 29.912076] [ 29.912151] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 29.912356] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.912430] Hardware name: linux,dummy-virt (DT) [ 29.912513] Call trace: [ 29.912580] show_stack+0x20/0x38 (C) [ 29.912723] dump_stack_lvl+0x8c/0xd0 [ 29.915227] print_report+0x118/0x608 [ 29.915536] kasan_report+0xdc/0x128 [ 29.916247] kasan_check_range+0x100/0x1a8 [ 29.916577] __kasan_check_read+0x20/0x30 [ 29.917087] kasan_atomics_helper+0xdd4/0x4858 [ 29.917212] kasan_atomics+0x198/0x2e0 [ 29.918179] kunit_try_run_case+0x170/0x3f0 [ 29.918338] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.918473] kthread+0x328/0x630 [ 29.918582] ret_from_fork+0x10/0x20 [ 29.918701] [ 29.918752] Allocated by task 265: [ 29.918830] kasan_save_stack+0x3c/0x68 [ 29.918959] kasan_save_track+0x20/0x40 [ 29.919079] kasan_save_alloc_info+0x40/0x58 [ 29.919197] __kasan_kmalloc+0xd4/0xd8 [ 29.919291] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.919409] kasan_atomics+0xb8/0x2e0 [ 29.919509] kunit_try_run_case+0x170/0x3f0 [ 29.920157] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.920348] kthread+0x328/0x630 [ 29.920450] ret_from_fork+0x10/0x20 [ 29.920554] [ 29.920709] The buggy address belongs to the object at fff00000c643c780 [ 29.920709] which belongs to the cache kmalloc-64 of size 64 [ 29.920870] The buggy address is located 0 bytes to the right of [ 29.920870] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 29.921051] [ 29.921103] The buggy address belongs to the physical page: [ 29.921193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c [ 29.921599] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.921955] page_type: f5(slab) [ 29.922073] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.922225] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.922379] page dumped because: kasan: bad access detected [ 29.922606] [ 29.922668] Memory state around the buggy address: [ 29.922747] fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.922859] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.923013] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.923334] ^ [ 29.923501] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.923621] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.923892] ================================================================== [ 29.934761] ================================================================== [ 29.934880] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 29.935015] Write of size 8 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 29.935540] [ 29.936767] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 29.937951] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.938111] Hardware name: linux,dummy-virt (DT) [ 29.939118] Call trace: [ 29.939187] show_stack+0x20/0x38 (C) [ 29.940276] dump_stack_lvl+0x8c/0xd0 [ 29.940414] print_report+0x118/0x608 [ 29.941259] kasan_report+0xdc/0x128 [ 29.942082] kasan_check_range+0x100/0x1a8 [ 29.942460] __kasan_check_write+0x20/0x30 [ 29.943114] kasan_atomics_helper+0xe44/0x4858 [ 29.943263] kasan_atomics+0x198/0x2e0 [ 29.943659] kunit_try_run_case+0x170/0x3f0 [ 29.943781] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.943963] kthread+0x328/0x630 [ 29.944318] ret_from_fork+0x10/0x20 [ 29.944466] [ 29.944516] Allocated by task 265: [ 29.944588] kasan_save_stack+0x3c/0x68 [ 29.944695] kasan_save_track+0x20/0x40 [ 29.944858] kasan_save_alloc_info+0x40/0x58 [ 29.945045] __kasan_kmalloc+0xd4/0xd8 [ 29.945291] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.945446] kasan_atomics+0xb8/0x2e0 [ 29.945725] kunit_try_run_case+0x170/0x3f0 [ 29.945849] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.945984] kthread+0x328/0x630 [ 29.946101] ret_from_fork+0x10/0x20 [ 29.946685] [ 29.947019] The buggy address belongs to the object at fff00000c643c780 [ 29.947019] which belongs to the cache kmalloc-64 of size 64 [ 29.947402] The buggy address is located 0 bytes to the right of [ 29.947402] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 29.948098] [ 29.948296] The buggy address belongs to the physical page: [ 29.948665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c [ 29.948830] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.949061] page_type: f5(slab) [ 29.949336] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.949463] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.949567] page dumped because: kasan: bad access detected [ 29.949773] [ 29.949828] Memory state around the buggy address: [ 29.950002] fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.950124] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.950236] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.950352] ^ [ 29.950452] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.950714] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.951325] ================================================================== [ 29.526092] ================================================================== [ 29.526311] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 29.527619] Hardware name: linux,dummy-virt (DT) [ 29.531852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.534362] The buggy address belongs to the object at fff00000c643c780 [ 29.534362] which belongs to the cache kmalloc-64 of size 64 [ 29.536244] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.538016] ================================================================== [ 29.882582] ================================================================== [ 29.882690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 29.882802] Write of size 4 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 29.882952] [ 29.883023] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 29.883249] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.883383] Hardware name: linux,dummy-virt (DT) [ 29.883507] Call trace: [ 29.883577] show_stack+0x20/0x38 (C) [ 29.883726] dump_stack_lvl+0x8c/0xd0 [ 29.883910] print_report+0x118/0x608 [ 29.884089] kasan_report+0xdc/0x128 [ 29.884240] kasan_check_range+0x100/0x1a8 [ 29.884454] __kasan_check_write+0x20/0x30 [ 29.884810] kasan_atomics_helper+0xd3c/0x4858 [ 29.884983] kasan_atomics+0x198/0x2e0 [ 29.885109] kunit_try_run_case+0x170/0x3f0 [ 29.885240] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.885393] kthread+0x328/0x630 [ 29.885508] ret_from_fork+0x10/0x20 [ 29.885637] [ 29.885685] Allocated by task 265: [ 29.885777] kasan_save_stack+0x3c/0x68 [ 29.885907] kasan_save_track+0x20/0x40 [ 29.886228] kasan_save_alloc_info+0x40/0x58 [ 29.886344] __kasan_kmalloc+0xd4/0xd8 [ 29.886462] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.886767] kasan_atomics+0xb8/0x2e0 [ 29.886965] kunit_try_run_case+0x170/0x3f0 [ 29.887074] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.887193] kthread+0x328/0x630 [ 29.887292] ret_from_fork+0x10/0x20 [ 29.887466] [ 29.887559] The buggy address belongs to the object at fff00000c643c780 [ 29.887559] which belongs to the cache kmalloc-64 of size 64 [ 29.887719] The buggy address is located 0 bytes to the right of [ 29.887719] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 29.887995] [ 29.888116] The buggy address belongs to the physical page: [ 29.888199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c [ 29.888341] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.888657] page_type: f5(slab) [ 29.888853] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.889277] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.889386] page dumped because: kasan: bad access detected [ 29.889501] [ 29.889554] Memory state around the buggy address: [ 29.889641] fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.889772] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.889966] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.890098] ^ [ 29.890196] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.890312] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.890413] ================================================================== [ 29.624192] ================================================================== [ 29.624303] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 29.624432] Write of size 4 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 29.624558] [ 29.624630] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 29.624848] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.631366] [ 29.631782] page_type: f5(slab) [ 29.632961] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.634315] ================================================================== [ 29.891018] ================================================================== [ 29.891257] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 29.891502] Read of size 4 at addr fff00000c643c7b0 by task kunit_try_catch/265 [ 29.891627] [ 29.892437] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 29.894992] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.895038] Hardware name: linux,dummy-virt (DT) [ 29.895080] Call trace: [ 29.895108] show_stack+0x20/0x38 (C) [ 29.895231] dump_stack_lvl+0x8c/0xd0 [ 29.895369] print_report+0x118/0x608 [ 29.895852] kasan_report+0xdc/0x128 [ 29.896284] __asan_report_load4_noabort+0x20/0x30 [ 29.896602] kasan_atomics_helper+0x3e04/0x4858 [ 29.897016] kasan_atomics+0x198/0x2e0 [ 29.897369] kunit_try_run_case+0x170/0x3f0 [ 29.897754] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.898030] kthread+0x328/0x630 [ 29.898230] ret_from_fork+0x10/0x20 [ 29.898725] [ 29.898814] Allocated by task 265: [ 29.899320] kasan_save_stack+0x3c/0x68 [ 29.899465] kasan_save_track+0x20/0x40 [ 29.899582] kasan_save_alloc_info+0x40/0x58 [ 29.899702] __kasan_kmalloc+0xd4/0xd8 [ 29.899834] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.899967] kasan_atomics+0xb8/0x2e0 [ 29.900102] kunit_try_run_case+0x170/0x3f0 [ 29.900211] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.900707] kthread+0x328/0x630 [ 29.901241] ret_from_fork+0x10/0x20 [ 29.901406] [ 29.902101] The buggy address belongs to the object at fff00000c643c780 [ 29.902101] which belongs to the cache kmalloc-64 of size 64 [ 29.902247] The buggy address is located 0 bytes to the right of [ 29.902247] allocated 48-byte region [fff00000c643c780, fff00000c643c7b0) [ 29.902409] [ 29.902461] The buggy address belongs to the physical page: [ 29.902540] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643c [ 29.902677] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.902809] page_type: f5(slab) [ 29.902926] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.903080] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.907169] page dumped because: kasan: bad access detected [ 29.907282] [ 29.907593] Memory state around the buggy address: [ 29.907686] fff00000c643c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.907826] fff00000c643c700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.907973] >fff00000c643c780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.908077] ^ [ 29.911080] fff00000c643c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.911206] fff00000c643c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.911312] ==================================================================
[ 30.101111] ================================================================== [ 30.101226] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 30.101359] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265 [ 30.101487] [ 30.101578] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.101789] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.102983] Hardware name: linux,dummy-virt (DT) [ 30.103240] Call trace: [ 30.103306] show_stack+0x20/0x38 (C) [ 30.103440] dump_stack_lvl+0x8c/0xd0 [ 30.103558] print_report+0x118/0x608 [ 30.104355] kasan_report+0xdc/0x128 [ 30.107436] kasan_check_range+0x100/0x1a8 [ 30.107568] __kasan_check_write+0x20/0x30 [ 30.107714] kasan_atomics_helper+0xf20/0x4858 [ 30.107957] kasan_atomics+0x198/0x2e0 [ 30.108291] kunit_try_run_case+0x170/0x3f0 [ 30.108484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.108881] kthread+0x328/0x630 [ 30.109177] ret_from_fork+0x10/0x20 [ 30.109313] [ 30.109373] Allocated by task 265: [ 30.109461] kasan_save_stack+0x3c/0x68 [ 30.109570] kasan_save_track+0x20/0x40 [ 30.109670] kasan_save_alloc_info+0x40/0x58 [ 30.109794] __kasan_kmalloc+0xd4/0xd8 [ 30.109918] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.110035] kasan_atomics+0xb8/0x2e0 [ 30.110135] kunit_try_run_case+0x170/0x3f0 [ 30.110587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.110890] kthread+0x328/0x630 [ 30.111335] ret_from_fork+0x10/0x20 [ 30.111504] [ 30.111571] The buggy address belongs to the object at fff00000c7751400 [ 30.111571] which belongs to the cache kmalloc-64 of size 64 [ 30.111724] The buggy address is located 0 bytes to the right of [ 30.111724] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 30.112166] [ 30.112471] The buggy address belongs to the physical page: [ 30.112985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 30.113191] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.113956] page_type: f5(slab) [ 30.114190] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.115005] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.115307] page dumped because: kasan: bad access detected [ 30.115819] [ 30.115894] Memory state around the buggy address: [ 30.115992] fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.116997] fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.117208] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.117309] ^ [ 30.117394] fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.117506] fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.118627] ================================================================== [ 29.851330] ================================================================== [ 29.851571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 29.851703] Write of size 4 at addr fff00000c7751430 by task kunit_try_catch/265 [ 29.851857] [ 29.851938] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 29.852159] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.852248] Hardware name: linux,dummy-virt (DT) [ 29.852385] Call trace: [ 29.852461] show_stack+0x20/0x38 (C) [ 29.852734] dump_stack_lvl+0x8c/0xd0 [ 29.853254] print_report+0x118/0x608 [ 29.853466] kasan_report+0xdc/0x128 [ 29.853599] kasan_check_range+0x100/0x1a8 [ 29.854727] __kasan_check_write+0x20/0x30 [ 29.855082] kasan_atomics_helper+0x99c/0x4858 [ 29.855466] kasan_atomics+0x198/0x2e0 [ 29.855868] kunit_try_run_case+0x170/0x3f0 [ 29.856072] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.856329] kthread+0x328/0x630 [ 29.856706] ret_from_fork+0x10/0x20 [ 29.857114] [ 29.857172] Allocated by task 265: [ 29.857252] kasan_save_stack+0x3c/0x68 [ 29.857371] kasan_save_track+0x20/0x40 [ 29.857588] kasan_save_alloc_info+0x40/0x58 [ 29.857699] __kasan_kmalloc+0xd4/0xd8 [ 29.857864] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.858169] kasan_atomics+0xb8/0x2e0 [ 29.858429] kunit_try_run_case+0x170/0x3f0 [ 29.858567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.858692] kthread+0x328/0x630 [ 29.858849] ret_from_fork+0x10/0x20 [ 29.858966] [ 29.859064] The buggy address belongs to the object at fff00000c7751400 [ 29.859064] which belongs to the cache kmalloc-64 of size 64 [ 29.859253] The buggy address is located 0 bytes to the right of [ 29.859253] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 29.859429] [ 29.859490] The buggy address belongs to the physical page: [ 29.859605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 29.859770] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.859969] page_type: f5(slab) [ 29.860089] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.860227] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.860341] page dumped because: kasan: bad access detected [ 29.860445] [ 29.860573] Memory state around the buggy address: [ 29.860761] fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.860905] fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 29.861105] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.861223] ^ [ 29.861318] fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.861467] fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.861569] ================================================================== [ 29.999143] ================================================================== [ 29.999253] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 29.999801] Write of size 4 at addr fff00000c7751430 by task kunit_try_catch/265 [ 30.000797] [ 30.000924] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.001078] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.001154] Hardware name: linux,dummy-virt (DT) [ 30.001274] Call trace: [ 30.001422] show_stack+0x20/0x38 (C) [ 30.003160] dump_stack_lvl+0x8c/0xd0 [ 30.003340] print_report+0x118/0x608 [ 30.003474] kasan_report+0xdc/0x128 [ 30.003602] kasan_check_range+0x100/0x1a8 [ 30.004001] __kasan_check_write+0x20/0x30 [ 30.004343] kasan_atomics_helper+0xd3c/0x4858 [ 30.004715] kasan_atomics+0x198/0x2e0 [ 30.004938] kunit_try_run_case+0x170/0x3f0 [ 30.005088] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.005246] kthread+0x328/0x630 [ 30.007901] ret_from_fork+0x10/0x20 [ 30.008057] [ 30.008186] Allocated by task 265: [ 30.008272] kasan_save_stack+0x3c/0x68 [ 30.008399] kasan_save_track+0x20/0x40 [ 30.008503] kasan_save_alloc_info+0x40/0x58 [ 30.008606] __kasan_kmalloc+0xd4/0xd8 [ 30.009217] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.009347] kasan_atomics+0xb8/0x2e0 [ 30.009465] kunit_try_run_case+0x170/0x3f0 [ 30.009587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.009725] kthread+0x328/0x630 [ 30.009864] ret_from_fork+0x10/0x20 [ 30.009995] [ 30.010090] The buggy address belongs to the object at fff00000c7751400 [ 30.010090] which belongs to the cache kmalloc-64 of size 64 [ 30.010253] The buggy address is located 0 bytes to the right of [ 30.010253] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 30.010475] [ 30.010549] The buggy address belongs to the physical page: [ 30.010639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 30.010778] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.011272] page_type: f5(slab) [ 30.012174] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.012310] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.012415] page dumped because: kasan: bad access detected [ 30.012502] [ 30.012650] Memory state around the buggy address: [ 30.012775] fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.012977] fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.013140] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.013257] ^ [ 30.013958] fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.014737] fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.014913] ================================================================== [ 30.288211] ================================================================== [ 30.288323] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 30.288452] Read of size 8 at addr fff00000c7751430 by task kunit_try_catch/265 [ 30.288576] [ 30.288952] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.290081] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.290250] Hardware name: linux,dummy-virt (DT) [ 30.290363] Call trace: [ 30.290450] show_stack+0x20/0x38 (C) [ 30.290684] dump_stack_lvl+0x8c/0xd0 [ 30.290947] print_report+0x118/0x608 [ 30.291143] kasan_report+0xdc/0x128 [ 30.291306] __asan_report_load8_noabort+0x20/0x30 [ 30.291509] kasan_atomics_helper+0x3f04/0x4858 [ 30.291683] kasan_atomics+0x198/0x2e0 [ 30.292098] kunit_try_run_case+0x170/0x3f0 [ 30.292272] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.292648] kthread+0x328/0x630 [ 30.292851] ret_from_fork+0x10/0x20 [ 30.293007] [ 30.293108] Allocated by task 265: [ 30.293528] kasan_save_stack+0x3c/0x68 [ 30.293874] kasan_save_track+0x20/0x40 [ 30.294042] kasan_save_alloc_info+0x40/0x58 [ 30.294245] __kasan_kmalloc+0xd4/0xd8 [ 30.294367] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.294575] kasan_atomics+0xb8/0x2e0 [ 30.294697] kunit_try_run_case+0x170/0x3f0 [ 30.295258] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.295466] kthread+0x328/0x630 [ 30.295717] ret_from_fork+0x10/0x20 [ 30.295940] [ 30.296004] The buggy address belongs to the object at fff00000c7751400 [ 30.296004] which belongs to the cache kmalloc-64 of size 64 [ 30.296155] The buggy address is located 0 bytes to the right of [ 30.296155] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 30.296581] [ 30.296694] The buggy address belongs to the physical page: [ 30.296817] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 30.297089] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.297546] page_type: f5(slab) [ 30.297823] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.298130] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.298243] page dumped because: kasan: bad access detected [ 30.298949] [ 30.299424] Memory state around the buggy address: [ 30.299902] fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.300174] fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.300294] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.300392] ^ [ 30.300546] fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.300661] fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.300758] ================================================================== [ 30.213970] ================================================================== [ 30.214381] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 30.214723] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265 [ 30.214906] [ 30.215070] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.215356] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.215492] Hardware name: linux,dummy-virt (DT) [ 30.215583] Call trace: [ 30.215807] show_stack+0x20/0x38 (C) [ 30.215997] dump_stack_lvl+0x8c/0xd0 [ 30.216198] print_report+0x118/0x608 [ 30.216334] kasan_report+0xdc/0x128 [ 30.216901] kasan_check_range+0x100/0x1a8 [ 30.217289] __kasan_check_write+0x20/0x30 [ 30.217898] kasan_atomics_helper+0x1190/0x4858 [ 30.218070] kasan_atomics+0x198/0x2e0 [ 30.218598] kunit_try_run_case+0x170/0x3f0 [ 30.218734] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.218895] kthread+0x328/0x630 [ 30.219010] ret_from_fork+0x10/0x20 [ 30.219127] [ 30.222798] Allocated by task 265: [ 30.222944] kasan_save_stack+0x3c/0x68 [ 30.223085] kasan_save_track+0x20/0x40 [ 30.223185] kasan_save_alloc_info+0x40/0x58 [ 30.223279] __kasan_kmalloc+0xd4/0xd8 [ 30.223362] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.223455] kasan_atomics+0xb8/0x2e0 [ 30.223536] kunit_try_run_case+0x170/0x3f0 [ 30.223625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.223727] kthread+0x328/0x630 [ 30.223819] ret_from_fork+0x10/0x20 [ 30.223924] [ 30.223970] The buggy address belongs to the object at fff00000c7751400 [ 30.223970] which belongs to the cache kmalloc-64 of size 64 [ 30.224104] The buggy address is located 0 bytes to the right of [ 30.224104] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 30.224251] [ 30.224300] The buggy address belongs to the physical page: [ 30.224376] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 30.224517] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.225793] page_type: f5(slab) [ 30.226008] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.226486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.226594] page dumped because: kasan: bad access detected [ 30.226743] [ 30.226824] Memory state around the buggy address: [ 30.227196] fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.228294] fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.229560] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.229866] ^ [ 30.229977] fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.230432] fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.230539] ================================================================== [ 29.426581] ================================================================== [ 29.454748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 29.456216] print_report+0x118/0x608 [ 29.457851] ret_from_fork+0x10/0x20 [ 29.460580] kasan_atomics+0xb8/0x2e0 [ 29.463680] [ 29.463747] The buggy address belongs to the physical page: [ 29.464022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 29.464374] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.464540] page_type: f5(slab) [ 29.465518] page dumped because: kasan: bad access detected [ 29.466461] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.467416] ================================================================== [ 30.342817] ================================================================== [ 30.343077] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 30.343199] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265 [ 30.343338] [ 30.343934] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.344162] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.344234] Hardware name: linux,dummy-virt (DT) [ 30.344317] Call trace: [ 30.344377] show_stack+0x20/0x38 (C) [ 30.344511] dump_stack_lvl+0x8c/0xd0 [ 30.344637] print_report+0x118/0x608 [ 30.344755] kasan_report+0xdc/0x128 [ 30.344892] kasan_check_range+0x100/0x1a8 [ 30.345014] __kasan_check_write+0x20/0x30 [ 30.346524] kasan_atomics_helper+0x154c/0x4858 [ 30.347169] kasan_atomics+0x198/0x2e0 [ 30.347464] kunit_try_run_case+0x170/0x3f0 [ 30.347955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.348340] kthread+0x328/0x630 [ 30.348719] ret_from_fork+0x10/0x20 [ 30.349101] [ 30.349303] Allocated by task 265: [ 30.349479] kasan_save_stack+0x3c/0x68 [ 30.349796] kasan_save_track+0x20/0x40 [ 30.350191] kasan_save_alloc_info+0x40/0x58 [ 30.350386] __kasan_kmalloc+0xd4/0xd8 [ 30.350669] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.350796] kasan_atomics+0xb8/0x2e0 [ 30.351033] kunit_try_run_case+0x170/0x3f0 [ 30.351143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.351268] kthread+0x328/0x630 [ 30.351372] ret_from_fork+0x10/0x20 [ 30.351498] [ 30.351586] The buggy address belongs to the object at fff00000c7751400 [ 30.351586] which belongs to the cache kmalloc-64 of size 64 [ 30.351731] The buggy address is located 0 bytes to the right of [ 30.351731] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 30.352329] [ 30.352390] The buggy address belongs to the physical page: [ 30.353218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 30.353379] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.353929] page_type: f5(slab) [ 30.354284] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.354579] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.354742] page dumped because: kasan: bad access detected [ 30.355160] [ 30.355393] Memory state around the buggy address: [ 30.355482] fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.355957] fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.356558] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.356861] ^ [ 30.357242] fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.357366] fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.359049] ================================================================== [ 30.458499] ================================================================== [ 30.458748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 30.458916] Read of size 8 at addr fff00000c7751430 by task kunit_try_catch/265 [ 30.459039] [ 30.459114] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.459309] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.459385] Hardware name: linux,dummy-virt (DT) [ 30.459937] Call trace: [ 30.460015] show_stack+0x20/0x38 (C) [ 30.460162] dump_stack_lvl+0x8c/0xd0 [ 30.460380] print_report+0x118/0x608 [ 30.460815] kasan_report+0xdc/0x128 [ 30.461122] __asan_report_load8_noabort+0x20/0x30 [ 30.461474] kasan_atomics_helper+0x3e20/0x4858 [ 30.461790] kasan_atomics+0x198/0x2e0 [ 30.461950] kunit_try_run_case+0x170/0x3f0 [ 30.462091] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.462283] kthread+0x328/0x630 [ 30.462591] ret_from_fork+0x10/0x20 [ 30.462737] [ 30.462790] Allocated by task 265: [ 30.463183] kasan_save_stack+0x3c/0x68 [ 30.463305] kasan_save_track+0x20/0x40 [ 30.463417] kasan_save_alloc_info+0x40/0x58 [ 30.464055] __kasan_kmalloc+0xd4/0xd8 [ 30.464653] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.464794] kasan_atomics+0xb8/0x2e0 [ 30.466011] kunit_try_run_case+0x170/0x3f0 [ 30.466569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.466889] kthread+0x328/0x630 [ 30.466999] ret_from_fork+0x10/0x20 [ 30.467576] [ 30.467640] The buggy address belongs to the object at fff00000c7751400 [ 30.467640] which belongs to the cache kmalloc-64 of size 64 [ 30.468124] The buggy address is located 0 bytes to the right of [ 30.468124] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 30.468507] [ 30.468565] The buggy address belongs to the physical page: [ 30.468676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 30.469074] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.469227] page_type: f5(slab) [ 30.469342] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.469495] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.469611] page dumped because: kasan: bad access detected [ 30.470131] [ 30.470303] Memory state around the buggy address: [ 30.470393] fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.470521] fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.470637] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.470830] ^ [ 30.471050] fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.471173] fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.471468] ================================================================== [ 30.230955] ================================================================== [ 30.231525] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 30.232219] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265 [ 30.232373] [ 30.233095] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.233337] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.233423] Hardware name: linux,dummy-virt (DT) [ 30.233661] Call trace: [ 30.233747] show_stack+0x20/0x38 (C) [ 30.234149] dump_stack_lvl+0x8c/0xd0 [ 30.234703] print_report+0x118/0x608 [ 30.234874] kasan_report+0xdc/0x128 [ 30.234999] kasan_check_range+0x100/0x1a8 [ 30.235487] __kasan_check_write+0x20/0x30 [ 30.235921] kasan_atomics_helper+0x11f8/0x4858 [ 30.236092] kasan_atomics+0x198/0x2e0 [ 30.236634] kunit_try_run_case+0x170/0x3f0 [ 30.237069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.237213] kthread+0x328/0x630 [ 30.237643] ret_from_fork+0x10/0x20 [ 30.237947] [ 30.238001] Allocated by task 265: [ 30.238171] kasan_save_stack+0x3c/0x68 [ 30.238481] kasan_save_track+0x20/0x40 [ 30.239039] kasan_save_alloc_info+0x40/0x58 [ 30.239556] __kasan_kmalloc+0xd4/0xd8 [ 30.239667] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.240409] kasan_atomics+0xb8/0x2e0 [ 30.240715] kunit_try_run_case+0x170/0x3f0 [ 30.240816] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.241035] kthread+0x328/0x630 [ 30.241234] ret_from_fork+0x10/0x20 [ 30.241438] [ 30.241760] The buggy address belongs to the object at fff00000c7751400 [ 30.241760] which belongs to the cache kmalloc-64 of size 64 [ 30.241932] The buggy address is located 0 bytes to the right of [ 30.241932] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 30.242103] [ 30.242861] The buggy address belongs to the physical page: [ 30.243040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 30.243292] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.243421] page_type: f5(slab) [ 30.243522] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.243698] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.244903] page dumped because: kasan: bad access detected [ 30.245125] [ 30.245403] Memory state around the buggy address: [ 30.245812] fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.245952] fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.246064] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.246159] ^ [ 30.246249] fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.247174] fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.247789] ================================================================== [ 30.375642] ================================================================== [ 30.375755] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 30.375912] Read of size 8 at addr fff00000c7751430 by task kunit_try_catch/265 [ 30.376033] [ 30.376130] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.376352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.376431] Hardware name: linux,dummy-virt (DT) [ 30.376618] Call trace: [ 30.376743] show_stack+0x20/0x38 (C) [ 30.376968] dump_stack_lvl+0x8c/0xd0 [ 30.377129] print_report+0x118/0x608 [ 30.377257] kasan_report+0xdc/0x128 [ 30.377402] __asan_report_load8_noabort+0x20/0x30 [ 30.377787] kasan_atomics_helper+0x3db0/0x4858 [ 30.377952] kasan_atomics+0x198/0x2e0 [ 30.378114] kunit_try_run_case+0x170/0x3f0 [ 30.378301] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.378538] kthread+0x328/0x630 [ 30.378826] ret_from_fork+0x10/0x20 [ 30.378999] [ 30.379142] Allocated by task 265: [ 30.379317] kasan_save_stack+0x3c/0x68 [ 30.379420] kasan_save_track+0x20/0x40 [ 30.379680] kasan_save_alloc_info+0x40/0x58 [ 30.379801] __kasan_kmalloc+0xd4/0xd8 [ 30.379918] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.380022] kasan_atomics+0xb8/0x2e0 [ 30.380181] kunit_try_run_case+0x170/0x3f0 [ 30.380305] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.381128] kthread+0x328/0x630 [ 30.381260] ret_from_fork+0x10/0x20 [ 30.381390] [ 30.381570] The buggy address belongs to the object at fff00000c7751400 [ 30.381570] which belongs to the cache kmalloc-64 of size 64 [ 30.381718] The buggy address is located 0 bytes to the right of [ 30.381718] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 30.381893] [ 30.381951] The buggy address belongs to the physical page: [ 30.382032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 30.382158] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.382273] page_type: f5(slab) [ 30.382368] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.382499] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.382641] page dumped because: kasan: bad access detected [ 30.382720] [ 30.382778] Memory state around the buggy address: [ 30.382891] fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.383064] fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.383179] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.383500] ^ [ 30.383608] fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.383752] fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.383873] ================================================================== [ 30.416245] ================================================================== [ 30.416435] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 30.416581] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265 [ 30.416708] [ 30.416791] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.417012] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.417145] Hardware name: linux,dummy-virt (DT) [ 30.417246] Call trace: [ 30.417318] show_stack+0x20/0x38 (C) [ 30.417714] dump_stack_lvl+0x8c/0xd0 [ 30.417919] print_report+0x118/0x608 [ 30.418063] kasan_report+0xdc/0x128 [ 30.418403] kasan_check_range+0x100/0x1a8 [ 30.418568] __kasan_check_write+0x20/0x30 [ 30.418696] kasan_atomics_helper+0x16d0/0x4858 [ 30.418884] kasan_atomics+0x198/0x2e0 [ 30.419132] kunit_try_run_case+0x170/0x3f0 [ 30.419315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.419469] kthread+0x328/0x630 [ 30.419805] ret_from_fork+0x10/0x20 [ 30.419983] [ 30.420043] Allocated by task 265: [ 30.420126] kasan_save_stack+0x3c/0x68 [ 30.420248] kasan_save_track+0x20/0x40 [ 30.420406] kasan_save_alloc_info+0x40/0x58 [ 30.420535] __kasan_kmalloc+0xd4/0xd8 [ 30.420648] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.420802] kasan_atomics+0xb8/0x2e0 [ 30.420984] kunit_try_run_case+0x170/0x3f0 [ 30.421167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.421274] kthread+0x328/0x630 [ 30.421324] ret_from_fork+0x10/0x20 [ 30.421371] [ 30.421415] The buggy address belongs to the object at fff00000c7751400 [ 30.421415] which belongs to the cache kmalloc-64 of size 64 [ 30.421683] The buggy address is located 0 bytes to the right of [ 30.421683] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 30.421888] [ 30.421950] The buggy address belongs to the physical page: [ 30.422029] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 30.422200] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.422324] page_type: f5(slab) [ 30.422516] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.422857] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.423025] page dumped because: kasan: bad access detected [ 30.423245] [ 30.423300] Memory state around the buggy address: [ 30.423381] fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.423541] fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.423684] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.423906] ^ [ 30.424019] fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.424151] fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.424262] ================================================================== [ 29.987897] ================================================================== [ 29.989851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 29.989964] Read of size 4 at addr fff00000c7751430 by task kunit_try_catch/265 [ 29.990034] [ 29.990114] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 29.990331] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.990414] Hardware name: linux,dummy-virt (DT) [ 29.990503] Call trace: [ 29.990612] show_stack+0x20/0x38 (C) [ 29.990930] dump_stack_lvl+0x8c/0xd0 [ 29.991152] print_report+0x118/0x608 [ 29.991339] kasan_report+0xdc/0x128 [ 29.991680] __asan_report_load4_noabort+0x20/0x30 [ 29.991941] kasan_atomics_helper+0x3dd8/0x4858 [ 29.992074] kasan_atomics+0x198/0x2e0 [ 29.992135] kunit_try_run_case+0x170/0x3f0 [ 29.992203] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.992274] kthread+0x328/0x630 [ 29.992332] ret_from_fork+0x10/0x20 [ 29.992395] [ 29.992422] Allocated by task 265: [ 29.992461] kasan_save_stack+0x3c/0x68 [ 29.992516] kasan_save_track+0x20/0x40 [ 29.992566] kasan_save_alloc_info+0x40/0x58 [ 29.992618] __kasan_kmalloc+0xd4/0xd8 [ 29.992666] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.992719] kasan_atomics+0xb8/0x2e0 [ 29.992766] kunit_try_run_case+0x170/0x3f0 [ 29.992816] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.992940] kthread+0x328/0x630 [ 29.993028] ret_from_fork+0x10/0x20 [ 29.993163] [ 29.993323] The buggy address belongs to the object at fff00000c7751400 [ 29.993323] which belongs to the cache kmalloc-64 of size 64 [ 29.993474] The buggy address is located 0 bytes to the right of [ 29.993474] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 29.993633] [ 29.993726] The buggy address belongs to the physical page: [ 29.993959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 29.994095] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.994227] page_type: f5(slab) [ 29.994447] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.994794] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.994954] page dumped because: kasan: bad access detected [ 29.995556] [ 29.995715] Memory state around the buggy address: [ 29.996243] fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.996433] fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 29.996601] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.996828] ^ [ 29.997335] fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.997530] fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.997732] ================================================================== [ 30.425606] ================================================================== [ 30.425718] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 30.425831] Read of size 8 at addr fff00000c7751430 by task kunit_try_catch/265 [ 30.425976] [ 30.426059] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.426562] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.426649] Hardware name: linux,dummy-virt (DT) [ 30.426748] Call trace: [ 30.426804] show_stack+0x20/0x38 (C) [ 30.427188] dump_stack_lvl+0x8c/0xd0 [ 30.427384] print_report+0x118/0x608 [ 30.428039] kasan_report+0xdc/0x128 [ 30.428177] __asan_report_load8_noabort+0x20/0x30 [ 30.428431] kasan_atomics_helper+0x3e10/0x4858 [ 30.428884] kasan_atomics+0x198/0x2e0 [ 30.429152] kunit_try_run_case+0x170/0x3f0 [ 30.429357] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.429644] kthread+0x328/0x630 [ 30.429996] ret_from_fork+0x10/0x20 [ 30.430128] [ 30.430176] Allocated by task 265: [ 30.430249] kasan_save_stack+0x3c/0x68 [ 30.430346] kasan_save_track+0x20/0x40 [ 30.430453] kasan_save_alloc_info+0x40/0x58 [ 30.430557] __kasan_kmalloc+0xd4/0xd8 [ 30.430773] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.430961] kasan_atomics+0xb8/0x2e0 [ 30.431081] kunit_try_run_case+0x170/0x3f0 [ 30.431198] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.431803] kthread+0x328/0x630 [ 30.431950] ret_from_fork+0x10/0x20 [ 30.432062] [ 30.432124] The buggy address belongs to the object at fff00000c7751400 [ 30.432124] which belongs to the cache kmalloc-64 of size 64 [ 30.432768] The buggy address is located 0 bytes to the right of [ 30.432768] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 30.433209] [ 30.433338] The buggy address belongs to the physical page: [ 30.433418] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 30.433553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.433678] page_type: f5(slab) [ 30.434235] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.434520] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.434631] page dumped because: kasan: bad access detected [ 30.434721] [ 30.434849] Memory state around the buggy address: [ 30.435034] fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.435153] fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.435268] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.435369] ^ [ 30.435466] fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.437145] fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.437261] ================================================================== [ 29.822339] ================================================================== [ 29.822447] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 29.822571] Read of size 4 at addr fff00000c7751430 by task kunit_try_catch/265 [ 29.822706] [ 29.822778] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 29.823601] print_report+0x118/0x608 [ 29.828168] kasan_save_alloc_info+0x40/0x58 [ 29.828285] __kasan_kmalloc+0xd4/0xd8 [ 29.829831] The buggy address is located 0 bytes to the right of [ 29.829831] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 29.830919] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.832918] fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.838131] Call trace: [ 29.838189] show_stack+0x20/0x38 (C) [ 29.838309] dump_stack_lvl+0x8c/0xd0 [ 29.838441] print_report+0x118/0x608 [ 29.838561] kasan_report+0xdc/0x128 [ 29.838681] kasan_check_range+0x100/0x1a8 [ 29.838820] __kasan_check_write+0x20/0x30 [ 29.841071] kasan_atomics_helper+0x934/0x4858 [ 29.841203] kasan_atomics+0x198/0x2e0 [ 29.841385] kunit_try_run_case+0x170/0x3f0 [ 29.841523] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.841661] kthread+0x328/0x630 [ 29.841769] ret_from_fork+0x10/0x20 [ 29.842340] [ 29.842415] Allocated by task 265: [ 29.842883] kasan_save_stack+0x3c/0x68 [ 29.843011] kasan_save_track+0x20/0x40 [ 29.843423] kasan_save_alloc_info+0x40/0x58 [ 29.843827] __kasan_kmalloc+0xd4/0xd8 [ 29.843963] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.844072] kasan_atomics+0xb8/0x2e0 [ 29.844166] kunit_try_run_case+0x170/0x3f0 [ 29.844264] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.844380] kthread+0x328/0x630 [ 29.845304] ret_from_fork+0x10/0x20 [ 29.845418] [ 29.845536] The buggy address belongs to the object at fff00000c7751400 [ 29.845536] which belongs to the cache kmalloc-64 of size 64 [ 29.845674] The buggy address is located 0 bytes to the right of [ 29.845674] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 29.845850] [ 29.846024] The buggy address belongs to the physical page: [ 29.846511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 29.846696] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.846825] page_type: f5(slab) [ 29.846955] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.847102] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.847210] page dumped because: kasan: bad access detected [ 29.847292] [ 29.847346] Memory state around the buggy address: [ 29.848707] fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.849154] fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 29.849301] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.849410] ^ [ 29.849508] fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.849730] fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.849989] ================================================================== [ 30.473031] ================================================================== [ 30.473789] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 30.474270] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265 [ 30.474451] [ 30.474529] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.475104] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.475191] Hardware name: linux,dummy-virt (DT) [ 30.475270] Call trace: [ 30.475329] show_stack+0x20/0x38 (C) [ 30.475457] dump_stack_lvl+0x8c/0xd0 [ 30.475577] print_report+0x118/0x608 [ 30.475699] kasan_report+0xdc/0x128 [ 30.475868] kasan_check_range+0x100/0x1a8 [ 30.476428] __kasan_check_write+0x20/0x30 [ 30.476722] kasan_atomics_helper+0x17ec/0x4858 [ 30.476873] kasan_atomics+0x198/0x2e0 [ 30.477025] kunit_try_run_case+0x170/0x3f0 [ 30.477186] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.477547] kthread+0x328/0x630 [ 30.477665] ret_from_fork+0x10/0x20 [ 30.477964] [ 30.478032] Allocated by task 265: [ 30.478103] kasan_save_stack+0x3c/0x68 [ 30.478281] kasan_save_track+0x20/0x40 [ 30.478394] kasan_save_alloc_info+0x40/0x58 [ 30.478706] __kasan_kmalloc+0xd4/0xd8 [ 30.479677] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.480007] kasan_atomics+0xb8/0x2e0 [ 30.480275] kunit_try_run_case+0x170/0x3f0 [ 30.480463] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.480770] kthread+0x328/0x630 [ 30.480881] ret_from_fork+0x10/0x20 [ 30.480980] [ 30.481035] The buggy address belongs to the object at fff00000c7751400 [ 30.481035] which belongs to the cache kmalloc-64 of size 64 [ 30.481186] The buggy address is located 0 bytes to the right of [ 30.481186] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 30.481719] [ 30.481917] The buggy address belongs to the physical page: [ 30.482038] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 30.482194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.482370] page_type: f5(slab) [ 30.482734] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.483075] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.483184] page dumped because: kasan: bad access detected [ 30.483266] [ 30.483317] Memory state around the buggy address: [ 30.483471] fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.483587] fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.483700] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.483852] ^ [ 30.483952] fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.484080] fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.484466] ================================================================== [ 30.120555] ================================================================== [ 30.120668] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 30.120798] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265 [ 30.121365] [ 30.121472] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.121890] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.122002] Hardware name: linux,dummy-virt (DT) [ 30.123742] Call trace: [ 30.123850] show_stack+0x20/0x38 (C) [ 30.124201] dump_stack_lvl+0x8c/0xd0 [ 30.124793] print_report+0x118/0x608 [ 30.125301] kasan_report+0xdc/0x128 [ 30.125637] kasan_check_range+0x100/0x1a8 [ 30.126014] __kasan_check_write+0x20/0x30 [ 30.126650] kasan_atomics_helper+0xf88/0x4858 [ 30.128168] kasan_atomics+0x198/0x2e0 [ 30.128347] kunit_try_run_case+0x170/0x3f0 [ 30.129122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.129666] kthread+0x328/0x630 [ 30.129863] ret_from_fork+0x10/0x20 [ 30.130195] [ 30.131070] Allocated by task 265: [ 30.131213] kasan_save_stack+0x3c/0x68 [ 30.131368] kasan_save_track+0x20/0x40 [ 30.132086] kasan_save_alloc_info+0x40/0x58 [ 30.132277] __kasan_kmalloc+0xd4/0xd8 [ 30.132933] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.133439] kasan_atomics+0xb8/0x2e0 [ 30.134052] kunit_try_run_case+0x170/0x3f0 [ 30.134237] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.134361] kthread+0x328/0x630 [ 30.134459] ret_from_fork+0x10/0x20 [ 30.135069] [ 30.135128] The buggy address belongs to the object at fff00000c7751400 [ 30.135128] which belongs to the cache kmalloc-64 of size 64 [ 30.135535] The buggy address is located 0 bytes to the right of [ 30.135535] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 30.135722] [ 30.135833] The buggy address belongs to the physical page: [ 30.136590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 30.136760] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.136915] page_type: f5(slab) [ 30.137027] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.137172] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.137278] page dumped because: kasan: bad access detected [ 30.137360] [ 30.137412] Memory state around the buggy address: [ 30.137492] fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.137605] fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.137716] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.137807] ^ [ 30.139327] fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.139528] fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.139870] ================================================================== [ 30.275175] ================================================================== [ 30.275280] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 30.275498] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265 [ 30.275633] [ 30.275704] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.275932] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.276005] Hardware name: linux,dummy-virt (DT) [ 30.276079] Call trace: [ 30.276136] show_stack+0x20/0x38 (C) [ 30.276273] dump_stack_lvl+0x8c/0xd0 [ 30.276477] print_report+0x118/0x608 [ 30.276679] kasan_report+0xdc/0x128 [ 30.277035] kasan_check_range+0x100/0x1a8 [ 30.277285] __kasan_check_write+0x20/0x30 [ 30.277414] kasan_atomics_helper+0x1384/0x4858 [ 30.277738] kasan_atomics+0x198/0x2e0 [ 30.277958] kunit_try_run_case+0x170/0x3f0 [ 30.278459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.279034] kthread+0x328/0x630 [ 30.279480] ret_from_fork+0x10/0x20 [ 30.279806] [ 30.280166] Allocated by task 265: [ 30.280248] kasan_save_stack+0x3c/0x68 [ 30.280350] kasan_save_track+0x20/0x40 [ 30.280449] kasan_save_alloc_info+0x40/0x58 [ 30.281003] __kasan_kmalloc+0xd4/0xd8 [ 30.281949] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.282070] kasan_atomics+0xb8/0x2e0 [ 30.282183] kunit_try_run_case+0x170/0x3f0 [ 30.282858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.283068] kthread+0x328/0x630 [ 30.283174] ret_from_fork+0x10/0x20 [ 30.284893] [ 30.284970] The buggy address belongs to the object at fff00000c7751400 [ 30.284970] which belongs to the cache kmalloc-64 of size 64 [ 30.285130] The buggy address is located 0 bytes to the right of [ 30.285130] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 30.285305] [ 30.285375] The buggy address belongs to the physical page: [ 30.285466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 30.285626] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.285777] page_type: f5(slab) [ 30.285965] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.286318] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.286463] page dumped because: kasan: bad access detected [ 30.286544] [ 30.286595] Memory state around the buggy address: [ 30.286720] fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.286992] fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.287104] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.287206] ^ [ 30.287293] fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.287448] fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.287731] ================================================================== [ 30.076964] ================================================================== [ 30.077086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 30.077204] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265 [ 30.077326] [ 30.077406] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.077602] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.077676] Hardware name: linux,dummy-virt (DT) [ 30.078200] Call trace: [ 30.078475] show_stack+0x20/0x38 (C) [ 30.078762] dump_stack_lvl+0x8c/0xd0 [ 30.078958] print_report+0x118/0x608 [ 30.079237] kasan_report+0xdc/0x128 [ 30.079413] __asan_report_store8_noabort+0x20/0x30 [ 30.079705] kasan_atomics_helper+0x3e5c/0x4858 [ 30.080065] kasan_atomics+0x198/0x2e0 [ 30.080191] kunit_try_run_case+0x170/0x3f0 [ 30.080313] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.080447] kthread+0x328/0x630 [ 30.080553] ret_from_fork+0x10/0x20 [ 30.080674] [ 30.080720] Allocated by task 265: [ 30.080793] kasan_save_stack+0x3c/0x68 [ 30.080919] kasan_save_track+0x20/0x40 [ 30.081484] kasan_save_alloc_info+0x40/0x58 [ 30.082170] __kasan_kmalloc+0xd4/0xd8 [ 30.082529] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.082787] kasan_atomics+0xb8/0x2e0 [ 30.082957] kunit_try_run_case+0x170/0x3f0 [ 30.083061] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.083176] kthread+0x328/0x630 [ 30.083258] ret_from_fork+0x10/0x20 [ 30.083347] [ 30.083401] The buggy address belongs to the object at fff00000c7751400 [ 30.083401] which belongs to the cache kmalloc-64 of size 64 [ 30.083537] The buggy address is located 0 bytes to the right of [ 30.083537] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 30.083688] [ 30.083742] The buggy address belongs to the physical page: [ 30.083858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 30.083997] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.084132] page_type: f5(slab) [ 30.084779] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.085517] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.085665] page dumped because: kasan: bad access detected [ 30.086039] [ 30.086121] Memory state around the buggy address: [ 30.086399] fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.086514] fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.086623] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.086717] ^ [ 30.086805] fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.086946] fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.087043] ================================================================== [ 30.249004] ================================================================== [ 30.249237] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 30.250058] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265 [ 30.250219] [ 30.250351] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.250574] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.250647] Hardware name: linux,dummy-virt (DT) [ 30.250722] Call trace: [ 30.250783] show_stack+0x20/0x38 (C) [ 30.250929] dump_stack_lvl+0x8c/0xd0 [ 30.251058] print_report+0x118/0x608 [ 30.251182] kasan_report+0xdc/0x128 [ 30.251298] kasan_check_range+0x100/0x1a8 [ 30.252801] __kasan_check_write+0x20/0x30 [ 30.253083] kasan_atomics_helper+0x126c/0x4858 [ 30.254067] kasan_atomics+0x198/0x2e0 [ 30.254443] kunit_try_run_case+0x170/0x3f0 [ 30.254723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.255218] kthread+0x328/0x630 [ 30.255870] ret_from_fork+0x10/0x20 [ 30.256089] [ 30.256754] Allocated by task 265: [ 30.257069] kasan_save_stack+0x3c/0x68 [ 30.257247] kasan_save_track+0x20/0x40 [ 30.257362] kasan_save_alloc_info+0x40/0x58 [ 30.257469] __kasan_kmalloc+0xd4/0xd8 [ 30.257799] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.258754] kasan_atomics+0xb8/0x2e0 [ 30.258975] kunit_try_run_case+0x170/0x3f0 [ 30.259094] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.259222] kthread+0x328/0x630 [ 30.259311] ret_from_fork+0x10/0x20 [ 30.259405] [ 30.259462] The buggy address belongs to the object at fff00000c7751400 [ 30.259462] which belongs to the cache kmalloc-64 of size 64 [ 30.260776] The buggy address is located 0 bytes to the right of [ 30.260776] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 30.261949] [ 30.262136] The buggy address belongs to the physical page: [ 30.262221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 30.262357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.262470] page_type: f5(slab) [ 30.262568] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.263102] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.263331] page dumped because: kasan: bad access detected [ 30.263425] [ 30.263487] Memory state around the buggy address: [ 30.264036] fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.264438] fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.264620] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.264772] ^ [ 30.264885] fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.264997] fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.265098] ================================================================== [ 30.401498] ================================================================== [ 30.401614] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 30.401856] Read of size 8 at addr fff00000c7751430 by task kunit_try_catch/265 [ 30.402207] [ 30.402647] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.403104] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.403182] Hardware name: linux,dummy-virt (DT) [ 30.403259] Call trace: [ 30.403317] show_stack+0x20/0x38 (C) [ 30.405367] dump_stack_lvl+0x8c/0xd0 [ 30.406459] print_report+0x118/0x608 [ 30.406601] kasan_report+0xdc/0x128 [ 30.406741] __asan_report_load8_noabort+0x20/0x30 [ 30.406900] kasan_atomics_helper+0x3df4/0x4858 [ 30.407041] kasan_atomics+0x198/0x2e0 [ 30.407168] kunit_try_run_case+0x170/0x3f0 [ 30.407297] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.407437] kthread+0x328/0x630 [ 30.407554] ret_from_fork+0x10/0x20 [ 30.407696] [ 30.407750] Allocated by task 265: [ 30.407851] kasan_save_stack+0x3c/0x68 [ 30.408147] kasan_save_track+0x20/0x40 [ 30.408254] kasan_save_alloc_info+0x40/0x58 [ 30.408364] __kasan_kmalloc+0xd4/0xd8 [ 30.408459] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.408570] kasan_atomics+0xb8/0x2e0 [ 30.409408] kunit_try_run_case+0x170/0x3f0 [ 30.409703] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.410095] kthread+0x328/0x630 [ 30.410194] ret_from_fork+0x10/0x20 [ 30.410778] [ 30.411190] The buggy address belongs to the object at fff00000c7751400 [ 30.411190] which belongs to the cache kmalloc-64 of size 64 [ 30.411549] The buggy address is located 0 bytes to the right of [ 30.411549] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 30.411900] [ 30.412501] The buggy address belongs to the physical page: [ 30.412605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 30.412767] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.413201] page_type: f5(slab) [ 30.413522] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.413731] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.413873] page dumped because: kasan: bad access detected [ 30.413994] [ 30.414057] Memory state around the buggy address: [ 30.414153] fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.414316] fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.414429] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.414854] ^ [ 30.414958] fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.415080] fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.415187] ================================================================== [ 30.329015] ================================================================== [ 30.329162] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 30.329297] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265 [ 30.329617] [ 30.329714] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.329950] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.330051] Hardware name: linux,dummy-virt (DT) [ 30.330174] Call trace: [ 30.330658] show_stack+0x20/0x38 (C) [ 30.331285] dump_stack_lvl+0x8c/0xd0 [ 30.331809] print_report+0x118/0x608 [ 30.332006] kasan_report+0xdc/0x128 [ 30.332150] kasan_check_range+0x100/0x1a8 [ 30.332276] __kasan_check_write+0x20/0x30 [ 30.333418] kasan_atomics_helper+0x14e4/0x4858 [ 30.333780] kasan_atomics+0x198/0x2e0 [ 30.333939] kunit_try_run_case+0x170/0x3f0 [ 30.334072] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.334221] kthread+0x328/0x630 [ 30.334337] ret_from_fork+0x10/0x20 [ 30.334456] [ 30.335134] Allocated by task 265: [ 30.335231] kasan_save_stack+0x3c/0x68 [ 30.335341] kasan_save_track+0x20/0x40 [ 30.335438] kasan_save_alloc_info+0x40/0x58 [ 30.335545] __kasan_kmalloc+0xd4/0xd8 [ 30.335968] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.336108] kasan_atomics+0xb8/0x2e0 [ 30.336235] kunit_try_run_case+0x170/0x3f0 [ 30.336451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.336588] kthread+0x328/0x630 [ 30.336770] ret_from_fork+0x10/0x20 [ 30.336887] [ 30.336944] The buggy address belongs to the object at fff00000c7751400 [ 30.336944] which belongs to the cache kmalloc-64 of size 64 [ 30.337150] The buggy address is located 0 bytes to the right of [ 30.337150] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 30.337336] [ 30.337401] The buggy address belongs to the physical page: [ 30.337510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 30.337669] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.338217] page_type: f5(slab) [ 30.338819] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.339119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.339231] page dumped because: kasan: bad access detected [ 30.339347] [ 30.339398] Memory state around the buggy address: [ 30.339476] fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.339756] fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.339944] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.340093] ^ [ 30.340225] fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.340515] fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.340651] ================================================================== [ 30.029807] ================================================================== [ 30.030586] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 30.030732] Read of size 8 at addr fff00000c7751430 by task kunit_try_catch/265 [ 30.030884] [ 30.031138] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.031344] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.031416] Hardware name: linux,dummy-virt (DT) [ 30.031491] Call trace: [ 30.031552] show_stack+0x20/0x38 (C) [ 30.031675] dump_stack_lvl+0x8c/0xd0 [ 30.031807] print_report+0x118/0x608 [ 30.031947] kasan_report+0xdc/0x128 [ 30.032066] kasan_check_range+0x100/0x1a8 [ 30.032186] __kasan_check_read+0x20/0x30 [ 30.032301] kasan_atomics_helper+0xdd4/0x4858 [ 30.032420] kasan_atomics+0x198/0x2e0 [ 30.032539] kunit_try_run_case+0x170/0x3f0 [ 30.032672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.032949] kthread+0x328/0x630 [ 30.033151] ret_from_fork+0x10/0x20 [ 30.033329] [ 30.033394] Allocated by task 265: [ 30.033483] kasan_save_stack+0x3c/0x68 [ 30.033598] kasan_save_track+0x20/0x40 [ 30.033719] kasan_save_alloc_info+0x40/0x58 [ 30.033853] __kasan_kmalloc+0xd4/0xd8 [ 30.034067] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.034258] kasan_atomics+0xb8/0x2e0 [ 30.034635] kunit_try_run_case+0x170/0x3f0 [ 30.034770] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.034904] kthread+0x328/0x630 [ 30.034995] ret_from_fork+0x10/0x20 [ 30.035087] [ 30.035139] The buggy address belongs to the object at fff00000c7751400 [ 30.035139] which belongs to the cache kmalloc-64 of size 64 [ 30.035282] The buggy address is located 0 bytes to the right of [ 30.035282] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 30.035443] [ 30.035759] The buggy address belongs to the physical page: [ 30.036949] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 30.039852] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.040346] page_type: f5(slab) [ 30.040473] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.040608] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.040730] page dumped because: kasan: bad access detected [ 30.041903] [ 30.041965] Memory state around the buggy address: [ 30.042055] fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.043884] fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.044868] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.045155] ^ [ 30.045260] fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.045376] fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.045490] ================================================================== [ 30.174401] ================================================================== [ 30.174514] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 30.174636] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265 [ 30.174759] [ 30.175111] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.176103] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.176205] Hardware name: linux,dummy-virt (DT) [ 30.176303] Call trace: [ 30.176692] show_stack+0x20/0x38 (C) [ 30.177309] dump_stack_lvl+0x8c/0xd0 [ 30.177446] print_report+0x118/0x608 [ 30.177810] kasan_report+0xdc/0x128 [ 30.178402] kasan_check_range+0x100/0x1a8 [ 30.178537] __kasan_check_write+0x20/0x30 [ 30.179016] kasan_atomics_helper+0x10c0/0x4858 [ 30.179536] kasan_atomics+0x198/0x2e0 [ 30.180088] kunit_try_run_case+0x170/0x3f0 [ 30.180260] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.180802] kthread+0x328/0x630 [ 30.180959] ret_from_fork+0x10/0x20 [ 30.181725] [ 30.181849] Allocated by task 265: [ 30.181934] kasan_save_stack+0x3c/0x68 [ 30.182420] kasan_save_track+0x20/0x40 [ 30.182544] kasan_save_alloc_info+0x40/0x58 [ 30.183142] __kasan_kmalloc+0xd4/0xd8 [ 30.183573] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.183816] kasan_atomics+0xb8/0x2e0 [ 30.184590] kunit_try_run_case+0x170/0x3f0 [ 30.184733] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.185157] kthread+0x328/0x630 [ 30.185349] ret_from_fork+0x10/0x20 [ 30.185448] [ 30.186169] The buggy address belongs to the object at fff00000c7751400 [ 30.186169] which belongs to the cache kmalloc-64 of size 64 [ 30.186372] The buggy address is located 0 bytes to the right of [ 30.186372] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 30.187000] [ 30.187067] The buggy address belongs to the physical page: [ 30.187461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 30.187720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.188092] page_type: f5(slab) [ 30.188225] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.188356] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.188459] page dumped because: kasan: bad access detected [ 30.188541] [ 30.188586] Memory state around the buggy address: [ 30.189163] fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.189365] fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.189563] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.190096] ^ [ 30.190562] fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.190765] fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.191181] ================================================================== [ 30.088149] ================================================================== [ 30.088265] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 30.088858] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265 [ 30.089238] [ 30.089331] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.089530] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.089600] Hardware name: linux,dummy-virt (DT) [ 30.089679] Call trace: [ 30.089744] show_stack+0x20/0x38 (C) [ 30.089887] dump_stack_lvl+0x8c/0xd0 [ 30.090087] print_report+0x118/0x608 [ 30.090228] kasan_report+0xdc/0x128 [ 30.090351] kasan_check_range+0x100/0x1a8 [ 30.090473] __kasan_check_write+0x20/0x30 [ 30.090595] kasan_atomics_helper+0xeb8/0x4858 [ 30.090721] kasan_atomics+0x198/0x2e0 [ 30.090860] kunit_try_run_case+0x170/0x3f0 [ 30.092171] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.092349] kthread+0x328/0x630 [ 30.093256] ret_from_fork+0x10/0x20 [ 30.093421] [ 30.093479] Allocated by task 265: [ 30.093566] kasan_save_stack+0x3c/0x68 [ 30.093679] kasan_save_track+0x20/0x40 [ 30.093793] kasan_save_alloc_info+0x40/0x58 [ 30.093946] __kasan_kmalloc+0xd4/0xd8 [ 30.094282] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.094402] kasan_atomics+0xb8/0x2e0 [ 30.094495] kunit_try_run_case+0x170/0x3f0 [ 30.094601] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.094715] kthread+0x328/0x630 [ 30.094805] ret_from_fork+0x10/0x20 [ 30.094925] [ 30.094978] The buggy address belongs to the object at fff00000c7751400 [ 30.094978] which belongs to the cache kmalloc-64 of size 64 [ 30.095113] The buggy address is located 0 bytes to the right of [ 30.095113] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 30.095279] [ 30.095338] The buggy address belongs to the physical page: [ 30.095424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 30.095553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.095687] page_type: f5(slab) [ 30.095809] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.096416] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.096530] page dumped because: kasan: bad access detected [ 30.096613] [ 30.096658] Memory state around the buggy address: [ 30.096746] fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.097758] fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.098501] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.098604] ^ [ 30.099792] fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.099939] fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.100042] ================================================================== [ 29.863111] ================================================================== [ 29.863308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 29.863536] Write of size 4 at addr fff00000c7751430 by task kunit_try_catch/265 [ 29.863724] [ 29.863817] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 29.864667] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.864770] Hardware name: linux,dummy-virt (DT) [ 29.864871] Call trace: [ 29.864952] show_stack+0x20/0x38 (C) [ 29.865132] dump_stack_lvl+0x8c/0xd0 [ 29.865314] print_report+0x118/0x608 [ 29.866221] kasan_report+0xdc/0x128 [ 29.866375] kasan_check_range+0x100/0x1a8 [ 29.867045] __kasan_check_write+0x20/0x30 [ 29.869241] ret_from_fork+0x10/0x20 [ 29.869375] [ 29.869431] Allocated by task 265: [ 29.869513] kasan_save_stack+0x3c/0x68 [ 29.870160] kasan_save_track+0x20/0x40 [ 29.870278] kasan_save_alloc_info+0x40/0x58 [ 29.870383] __kasan_kmalloc+0xd4/0xd8 [ 29.870664] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.871159] kasan_atomics+0xb8/0x2e0 [ 29.871290] kunit_try_run_case+0x170/0x3f0 [ 29.871408] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.871608] kthread+0x328/0x630 [ 29.872087] ret_from_fork+0x10/0x20 [ 29.872593] [ 29.872647] The buggy address belongs to the object at fff00000c7751400 [ 29.872647] which belongs to the cache kmalloc-64 of size 64 [ 29.872935] The buggy address is located 0 bytes to the right of [ 29.872935] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 29.873144] [ 29.873198] The buggy address belongs to the physical page: [ 29.873279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 29.873407] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.873529] page_type: f5(slab) [ 29.873653] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.874412] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.874576] page dumped because: kasan: bad access detected [ 29.874701] [ 29.874759] Memory state around the buggy address: [ 29.874861] fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.875151] fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 29.875295] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.875404] ^ [ 29.875926] fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.876047] fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.876154] ================================================================== [ 30.062125] ================================================================== [ 30.062230] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 30.063280] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265 [ 30.063430] [ 30.063521] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.063737] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.063809] Hardware name: linux,dummy-virt (DT) [ 30.063893] Call trace: [ 30.064564] show_stack+0x20/0x38 (C) [ 30.064740] dump_stack_lvl+0x8c/0xd0 [ 30.064888] print_report+0x118/0x608 [ 30.065020] kasan_report+0xdc/0x128 [ 30.065325] kasan_check_range+0x100/0x1a8 [ 30.065521] __kasan_check_write+0x20/0x30 [ 30.065653] kasan_atomics_helper+0xe44/0x4858 [ 30.065787] kasan_atomics+0x198/0x2e0 [ 30.066187] kunit_try_run_case+0x170/0x3f0 [ 30.066676] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.066892] kthread+0x328/0x630 [ 30.067034] ret_from_fork+0x10/0x20 [ 30.068582] [ 30.068641] Allocated by task 265: [ 30.068709] kasan_save_stack+0x3c/0x68 [ 30.068832] kasan_save_track+0x20/0x40 [ 30.069048] kasan_save_alloc_info+0x40/0x58 [ 30.069175] __kasan_kmalloc+0xd4/0xd8 [ 30.069278] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.070595] kasan_atomics+0xb8/0x2e0 [ 30.070932] kunit_try_run_case+0x170/0x3f0 [ 30.071188] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.071982] kthread+0x328/0x630 [ 30.072100] ret_from_fork+0x10/0x20 [ 30.072211] [ 30.072261] The buggy address belongs to the object at fff00000c7751400 [ 30.072261] which belongs to the cache kmalloc-64 of size 64 [ 30.072404] The buggy address is located 0 bytes to the right of [ 30.072404] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 30.072609] [ 30.072691] The buggy address belongs to the physical page: [ 30.072780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 30.072961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.073157] page_type: f5(slab) [ 30.073273] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.073627] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.073738] page dumped because: kasan: bad access detected [ 30.073896] [ 30.073955] Memory state around the buggy address: [ 30.074049] fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.074179] fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.075242] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.075353] ^ [ 30.075450] fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.075884] fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.076074] ================================================================== [ 30.316991] ================================================================== [ 30.317207] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 30.317382] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265 [ 30.317777] [ 30.318063] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.318317] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.318623] Hardware name: linux,dummy-virt (DT) [ 30.318858] Call trace: [ 30.319122] show_stack+0x20/0x38 (C) [ 30.319267] dump_stack_lvl+0x8c/0xd0 [ 30.319418] print_report+0x118/0x608 [ 30.319599] kasan_report+0xdc/0x128 [ 30.320044] kasan_check_range+0x100/0x1a8 [ 30.320310] __kasan_check_write+0x20/0x30 [ 30.320528] kasan_atomics_helper+0x147c/0x4858 [ 30.320815] kasan_atomics+0x198/0x2e0 [ 30.320966] kunit_try_run_case+0x170/0x3f0 [ 30.321404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.321763] kthread+0x328/0x630 [ 30.322141] ret_from_fork+0x10/0x20 [ 30.322292] [ 30.322347] Allocated by task 265: [ 30.322524] kasan_save_stack+0x3c/0x68 [ 30.322635] kasan_save_track+0x20/0x40 [ 30.322732] kasan_save_alloc_info+0x40/0x58 [ 30.322857] __kasan_kmalloc+0xd4/0xd8 [ 30.323509] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.324014] kasan_atomics+0xb8/0x2e0 [ 30.324295] kunit_try_run_case+0x170/0x3f0 [ 30.324418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.325012] kthread+0x328/0x630 [ 30.325246] ret_from_fork+0x10/0x20 [ 30.325385] [ 30.325454] The buggy address belongs to the object at fff00000c7751400 [ 30.325454] which belongs to the cache kmalloc-64 of size 64 [ 30.325602] The buggy address is located 0 bytes to the right of [ 30.325602] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 30.325823] [ 30.325908] The buggy address belongs to the physical page: [ 30.326155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 30.326298] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.326474] page_type: f5(slab) [ 30.326642] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.326783] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.327073] page dumped because: kasan: bad access detected [ 30.327304] [ 30.327435] Memory state around the buggy address: [ 30.327576] fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.327734] fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.327870] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.328067] ^ [ 30.328157] fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.328262] fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.328366] ================================================================== [ 29.879118] ================================================================== [ 29.879273] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 29.879419] Write of size 4 at addr fff00000c7751430 by task kunit_try_catch/265 [ 29.879556] [ 29.880105] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 29.880762] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.881004] Hardware name: linux,dummy-virt (DT) [ 29.881157] Call trace: [ 29.881301] show_stack+0x20/0x38 (C) [ 29.881451] dump_stack_lvl+0x8c/0xd0 [ 29.881586] print_report+0x118/0x608 [ 29.881725] kasan_report+0xdc/0x128 [ 29.882048] kasan_check_range+0x100/0x1a8 [ 29.882178] __kasan_check_write+0x20/0x30 [ 29.882302] kasan_atomics_helper+0xa6c/0x4858 [ 29.882440] kasan_atomics+0x198/0x2e0 [ 29.882740] kunit_try_run_case+0x170/0x3f0 [ 29.883573] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.883807] kthread+0x328/0x630 [ 29.884444] ret_from_fork+0x10/0x20 [ 29.884721] [ 29.884870] Allocated by task 265: [ 29.885174] kasan_save_track+0x20/0x40 [ 29.885293] kasan_save_alloc_info+0x40/0x58 [ 29.885712] __kasan_kmalloc+0xd4/0xd8 [ 29.885928] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.886163] kasan_atomics+0xb8/0x2e0 [ 29.886386] kunit_try_run_case+0x170/0x3f0 [ 29.887591] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.888797] The buggy address is located 0 bytes to the right of [ 29.888797] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 29.893380] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.896022] fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.898861] Call trace: [ 29.901591] kasan_save_alloc_info+0x40/0x58 [ 29.901871] __kasan_kmalloc+0xd4/0xd8 [ 29.902132] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.902276] kasan_atomics+0xb8/0x2e0 [ 29.902513] kunit_try_run_case+0x170/0x3f0 [ 29.902622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.902782] kthread+0x328/0x630 [ 29.902912] ret_from_fork+0x10/0x20 [ 29.903076] [ 29.903144] The buggy address belongs to the object at fff00000c7751400 [ 29.903144] which belongs to the cache kmalloc-64 of size 64 [ 29.903284] The buggy address is located 0 bytes to the right of [ 29.903284] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 29.903443] [ 29.903741] The buggy address belongs to the physical page: [ 29.903866] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 29.904001] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.904134] page_type: f5(slab) [ 29.904234] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.904503] page dumped because: kasan: bad access detected [ 29.905466] fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.908812] kasan_atomics+0x198/0x2e0 [ 29.910210] __kasan_kmalloc+0xd4/0xd8 [ 29.910362] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.910490] kasan_atomics+0xb8/0x2e0 [ 29.910599] kunit_try_run_case+0x170/0x3f0 [ 29.912985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 29.914906] fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 29.926067] kasan_save_alloc_info+0x40/0x58 [ 29.927418] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.929466] [ 29.930858] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.931789] page dumped because: kasan: bad access detected [ 29.934361] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.935200] Read of size 4 at addr fff00000c7751430 by task kunit_try_catch/265 [ 29.936102] print_report+0x118/0x608 [ 29.938443] ret_from_fork+0x10/0x20 [ 29.941263] kunit_try_run_case+0x170/0x3f0 [ 29.941368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.941491] kthread+0x328/0x630 [ 29.942956] The buggy address is located 0 bytes to the right of [ 29.942956] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 29.943415] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.943908] page dumped because: kasan: bad access detected [ 29.944117] fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.945482] fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.947872] Call trace: [ 29.948290] kasan_atomics_helper+0xc08/0x4858 [ 29.949110] __kasan_kmalloc+0xd4/0xd8 [ 29.952662] [ 29.952988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.960113] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.963905] kasan_save_stack+0x3c/0x68 [ 29.964896] ret_from_fork+0x10/0x20 [ 29.965027] [ 29.965296] The buggy address is located 0 bytes to the right of [ 29.965296] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 29.966512] page dumped because: kasan: bad access detected [ 29.967464] fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 29.978639] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.982973] [ 29.983024] The buggy address belongs to the object at fff00000c7751400 [ 29.983024] which belongs to the cache kmalloc-64 of size 64 [ 29.983173] The buggy address is located 0 bytes to the right of [ 29.983173] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 29.983353] [ 29.983420] The buggy address belongs to the physical page: [ 29.983511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 29.983650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.983810] page_type: f5(slab) [ 29.984010] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.984159] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.984258] page dumped because: kasan: bad access detected [ 29.985091] [ 29.985162] Memory state around the buggy address: [ 29.985262] fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.985394] fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 29.985570] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.985679] ^ [ 29.985856] fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.986046] fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.986156] ================================================================== [ 30.386115] ================================================================== [ 30.386252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 30.386368] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265 [ 30.386494] [ 30.386611] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.387658] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.387717] Hardware name: linux,dummy-virt (DT) [ 30.387757] Call trace: [ 30.387798] show_stack+0x20/0x38 (C) [ 30.387931] dump_stack_lvl+0x8c/0xd0 [ 30.388172] print_report+0x118/0x608 [ 30.388522] kasan_report+0xdc/0x128 [ 30.388857] kasan_check_range+0x100/0x1a8 [ 30.389352] __kasan_check_write+0x20/0x30 [ 30.389543] kasan_atomics_helper+0x1644/0x4858 [ 30.389682] kasan_atomics+0x198/0x2e0 [ 30.389797] kunit_try_run_case+0x170/0x3f0 [ 30.389945] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.390127] kthread+0x328/0x630 [ 30.390275] ret_from_fork+0x10/0x20 [ 30.390396] [ 30.390446] Allocated by task 265: [ 30.390530] kasan_save_stack+0x3c/0x68 [ 30.390660] kasan_save_track+0x20/0x40 [ 30.390766] kasan_save_alloc_info+0x40/0x58 [ 30.390938] __kasan_kmalloc+0xd4/0xd8 [ 30.391048] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.391172] kasan_atomics+0xb8/0x2e0 [ 30.391290] kunit_try_run_case+0x170/0x3f0 [ 30.391719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.392002] kthread+0x328/0x630 [ 30.392093] ret_from_fork+0x10/0x20 [ 30.392278] [ 30.392331] The buggy address belongs to the object at fff00000c7751400 [ 30.392331] which belongs to the cache kmalloc-64 of size 64 [ 30.392478] The buggy address is located 0 bytes to the right of [ 30.392478] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 30.393152] [ 30.393292] The buggy address belongs to the physical page: [ 30.393869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 30.394200] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.395170] page_type: f5(slab) [ 30.395392] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.395524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.395635] page dumped because: kasan: bad access detected [ 30.395721] [ 30.395774] Memory state around the buggy address: [ 30.396853] fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.398108] fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.398322] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.398436] ^ [ 30.398540] fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.398667] fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.398895] ================================================================== [ 30.046904] ================================================================== [ 30.047016] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 30.047143] Read of size 8 at addr fff00000c7751430 by task kunit_try_catch/265 [ 30.047267] [ 30.047352] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.047566] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.047642] Hardware name: linux,dummy-virt (DT) [ 30.047719] Call trace: [ 30.047790] show_stack+0x20/0x38 (C) [ 30.047936] dump_stack_lvl+0x8c/0xd0 [ 30.048060] print_report+0x118/0x608 [ 30.048177] kasan_report+0xdc/0x128 [ 30.048296] __asan_report_load8_noabort+0x20/0x30 [ 30.048428] kasan_atomics_helper+0x3f58/0x4858 [ 30.048592] kasan_atomics+0x198/0x2e0 [ 30.048774] kunit_try_run_case+0x170/0x3f0 [ 30.049275] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.051906] kthread+0x328/0x630 [ 30.052621] ret_from_fork+0x10/0x20 [ 30.052767] [ 30.052815] Allocated by task 265: [ 30.052930] kasan_save_stack+0x3c/0x68 [ 30.053264] kasan_save_track+0x20/0x40 [ 30.053424] kasan_save_alloc_info+0x40/0x58 [ 30.053871] __kasan_kmalloc+0xd4/0xd8 [ 30.054008] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.054128] kasan_atomics+0xb8/0x2e0 [ 30.054232] kunit_try_run_case+0x170/0x3f0 [ 30.055150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.055439] kthread+0x328/0x630 [ 30.055580] ret_from_fork+0x10/0x20 [ 30.055877] [ 30.055939] The buggy address belongs to the object at fff00000c7751400 [ 30.055939] which belongs to the cache kmalloc-64 of size 64 [ 30.056082] The buggy address is located 0 bytes to the right of [ 30.056082] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 30.056246] [ 30.056342] The buggy address belongs to the physical page: [ 30.057015] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 30.057228] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.057417] page_type: f5(slab) [ 30.057532] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.057676] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.057832] page dumped because: kasan: bad access detected [ 30.057947] [ 30.058128] Memory state around the buggy address: [ 30.058215] fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.058334] fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.058449] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.059500] ^ [ 30.060501] fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.060692] fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.061154] ================================================================== [ 30.192173] ================================================================== [ 30.192294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 30.192623] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265 [ 30.192917] [ 30.193133] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.193454] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.193633] Hardware name: linux,dummy-virt (DT) [ 30.194363] Call trace: [ 30.194632] show_stack+0x20/0x38 (C) [ 30.194801] dump_stack_lvl+0x8c/0xd0 [ 30.195640] print_report+0x118/0x608 [ 30.195791] kasan_report+0xdc/0x128 [ 30.195936] kasan_check_range+0x100/0x1a8 [ 30.196076] __kasan_check_write+0x20/0x30 [ 30.196206] kasan_atomics_helper+0x1128/0x4858 [ 30.196548] kasan_atomics+0x198/0x2e0 [ 30.196744] kunit_try_run_case+0x170/0x3f0 [ 30.196904] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.197887] kthread+0x328/0x630 [ 30.198410] ret_from_fork+0x10/0x20 [ 30.198876] [ 30.199271] Allocated by task 265: [ 30.199353] kasan_save_stack+0x3c/0x68 [ 30.199705] kasan_save_track+0x20/0x40 [ 30.199952] kasan_save_alloc_info+0x40/0x58 [ 30.200122] __kasan_kmalloc+0xd4/0xd8 [ 30.200280] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.200404] kasan_atomics+0xb8/0x2e0 [ 30.200744] kunit_try_run_case+0x170/0x3f0 [ 30.200873] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.202505] kthread+0x328/0x630 [ 30.202648] ret_from_fork+0x10/0x20 [ 30.202766] [ 30.202822] The buggy address belongs to the object at fff00000c7751400 [ 30.202822] which belongs to the cache kmalloc-64 of size 64 [ 30.202988] The buggy address is located 0 bytes to the right of [ 30.202988] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 30.203150] [ 30.203208] The buggy address belongs to the physical page: [ 30.203290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 30.204102] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.204324] page_type: f5(slab) [ 30.204445] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.204805] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.205813] page dumped because: kasan: bad access detected [ 30.205980] [ 30.206053] Memory state around the buggy address: [ 30.206210] fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.206667] fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.207079] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.207296] ^ [ 30.207393] fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.207515] fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.207618] ================================================================== [ 30.266116] ================================================================== [ 30.266224] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 30.266338] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265 [ 30.266462] [ 30.266539] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.266738] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.266808] Hardware name: linux,dummy-virt (DT) [ 30.266903] Call trace: [ 30.266964] show_stack+0x20/0x38 (C) [ 30.267084] dump_stack_lvl+0x8c/0xd0 [ 30.267210] print_report+0x118/0x608 [ 30.267358] kasan_report+0xdc/0x128 [ 30.268200] kasan_check_range+0x100/0x1a8 [ 30.268414] __kasan_check_write+0x20/0x30 [ 30.268628] kasan_atomics_helper+0x12d8/0x4858 [ 30.268781] kasan_atomics+0x198/0x2e0 [ 30.268938] kunit_try_run_case+0x170/0x3f0 [ 30.269108] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.269353] kthread+0x328/0x630 [ 30.269610] ret_from_fork+0x10/0x20 [ 30.269821] [ 30.269907] Allocated by task 265: [ 30.270069] kasan_save_stack+0x3c/0x68 [ 30.270218] kasan_save_track+0x20/0x40 [ 30.270399] kasan_save_alloc_info+0x40/0x58 [ 30.270521] __kasan_kmalloc+0xd4/0xd8 [ 30.270644] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.270864] kasan_atomics+0xb8/0x2e0 [ 30.271040] kunit_try_run_case+0x170/0x3f0 [ 30.271149] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.271269] kthread+0x328/0x630 [ 30.271376] ret_from_fork+0x10/0x20 [ 30.271570] [ 30.271717] The buggy address belongs to the object at fff00000c7751400 [ 30.271717] which belongs to the cache kmalloc-64 of size 64 [ 30.271964] The buggy address is located 0 bytes to the right of [ 30.271964] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 30.272231] [ 30.272335] The buggy address belongs to the physical page: [ 30.272416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 30.272617] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.272774] page_type: f5(slab) [ 30.272890] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.273068] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.273190] page dumped because: kasan: bad access detected [ 30.273326] [ 30.273410] Memory state around the buggy address: [ 30.273577] fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.273735] fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.274056] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.274189] ^ [ 30.274305] fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.274513] fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.274681] ================================================================== [ 30.359603] ================================================================== [ 30.359710] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 30.359862] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265 [ 30.359998] [ 30.360092] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.360296] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.360361] Hardware name: linux,dummy-virt (DT) [ 30.360445] Call trace: [ 30.360503] show_stack+0x20/0x38 (C) [ 30.360633] dump_stack_lvl+0x8c/0xd0 [ 30.360751] print_report+0x118/0x608 [ 30.363831] kasan_report+0xdc/0x128 [ 30.363994] kasan_check_range+0x100/0x1a8 [ 30.364134] __kasan_check_write+0x20/0x30 [ 30.364265] kasan_atomics_helper+0x15b4/0x4858 [ 30.364401] kasan_atomics+0x198/0x2e0 [ 30.364529] kunit_try_run_case+0x170/0x3f0 [ 30.364674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.364824] kthread+0x328/0x630 [ 30.364976] ret_from_fork+0x10/0x20 [ 30.365110] [ 30.365170] Allocated by task 265: [ 30.365250] kasan_save_stack+0x3c/0x68 [ 30.365358] kasan_save_track+0x20/0x40 [ 30.365458] kasan_save_alloc_info+0x40/0x58 [ 30.365564] __kasan_kmalloc+0xd4/0xd8 [ 30.365657] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.365769] kasan_atomics+0xb8/0x2e0 [ 30.368503] kunit_try_run_case+0x170/0x3f0 [ 30.368621] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.368745] kthread+0x328/0x630 [ 30.368829] ret_from_fork+0x10/0x20 [ 30.368944] [ 30.368997] The buggy address belongs to the object at fff00000c7751400 [ 30.368997] which belongs to the cache kmalloc-64 of size 64 [ 30.371274] The buggy address is located 0 bytes to the right of [ 30.371274] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 30.371620] [ 30.371723] The buggy address belongs to the physical page: [ 30.371819] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 30.372241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.372421] page_type: f5(slab) [ 30.372596] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.372950] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.373221] page dumped because: kasan: bad access detected [ 30.373355] [ 30.373476] Memory state around the buggy address: [ 30.373561] fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.374420] fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.374632] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.374732] ^ [ 30.374824] fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.374971] fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.375085] ================================================================== [ 30.140713] ================================================================== [ 30.140948] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 30.141094] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265 [ 30.141287] [ 30.141700] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.142188] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.142272] Hardware name: linux,dummy-virt (DT) [ 30.142800] Call trace: [ 30.142892] show_stack+0x20/0x38 (C) [ 30.143021] dump_stack_lvl+0x8c/0xd0 [ 30.143138] print_report+0x118/0x608 [ 30.143345] kasan_report+0xdc/0x128 [ 30.144121] kasan_check_range+0x100/0x1a8 [ 30.144474] __kasan_check_write+0x20/0x30 [ 30.144981] kasan_atomics_helper+0xff0/0x4858 [ 30.145349] kasan_atomics+0x198/0x2e0 [ 30.145600] kunit_try_run_case+0x170/0x3f0 [ 30.146162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.146419] kthread+0x328/0x630 [ 30.146729] ret_from_fork+0x10/0x20 [ 30.146916] [ 30.147283] Allocated by task 265: [ 30.147396] kasan_save_stack+0x3c/0x68 [ 30.147541] kasan_save_track+0x20/0x40 [ 30.147646] kasan_save_alloc_info+0x40/0x58 [ 30.148179] __kasan_kmalloc+0xd4/0xd8 [ 30.148664] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.148804] kasan_atomics+0xb8/0x2e0 [ 30.149299] kunit_try_run_case+0x170/0x3f0 [ 30.149514] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.149870] kthread+0x328/0x630 [ 30.150045] ret_from_fork+0x10/0x20 [ 30.150187] [ 30.150241] The buggy address belongs to the object at fff00000c7751400 [ 30.150241] which belongs to the cache kmalloc-64 of size 64 [ 30.150391] The buggy address is located 0 bytes to the right of [ 30.150391] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 30.150548] [ 30.150603] The buggy address belongs to the physical page: [ 30.150681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 30.151261] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.151733] page_type: f5(slab) [ 30.151996] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.152261] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.152373] page dumped because: kasan: bad access detected [ 30.152476] [ 30.152526] Memory state around the buggy address: [ 30.152613] fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.152727] fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.153967] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.154091] ^ [ 30.154192] fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.154321] fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.154433] ================================================================== [ 30.155218] ================================================================== [ 30.155673] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 30.156132] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265 [ 30.156433] [ 30.156523] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.156747] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.156850] Hardware name: linux,dummy-virt (DT) [ 30.156941] Call trace: [ 30.158522] show_stack+0x20/0x38 (C) [ 30.158706] dump_stack_lvl+0x8c/0xd0 [ 30.158869] print_report+0x118/0x608 [ 30.160072] kasan_report+0xdc/0x128 [ 30.160268] kasan_check_range+0x100/0x1a8 [ 30.160402] __kasan_check_write+0x20/0x30 [ 30.160524] kasan_atomics_helper+0x1058/0x4858 [ 30.161858] kasan_atomics+0x198/0x2e0 [ 30.162079] kunit_try_run_case+0x170/0x3f0 [ 30.162669] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.162812] kthread+0x328/0x630 [ 30.162954] ret_from_fork+0x10/0x20 [ 30.163077] [ 30.163128] Allocated by task 265: [ 30.163204] kasan_save_stack+0x3c/0x68 [ 30.163324] kasan_save_track+0x20/0x40 [ 30.163449] kasan_save_alloc_info+0x40/0x58 [ 30.163983] __kasan_kmalloc+0xd4/0xd8 [ 30.164388] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.164866] kasan_atomics+0xb8/0x2e0 [ 30.165199] kunit_try_run_case+0x170/0x3f0 [ 30.165682] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.166220] kthread+0x328/0x630 [ 30.166375] ret_from_fork+0x10/0x20 [ 30.166485] [ 30.166540] The buggy address belongs to the object at fff00000c7751400 [ 30.166540] which belongs to the cache kmalloc-64 of size 64 [ 30.166953] The buggy address is located 0 bytes to the right of [ 30.166953] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 30.167240] [ 30.167370] The buggy address belongs to the physical page: [ 30.167815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 30.167992] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.168233] page_type: f5(slab) [ 30.168782] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.169196] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.169684] page dumped because: kasan: bad access detected [ 30.169784] [ 30.169868] Memory state around the buggy address: [ 30.169962] fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.170276] fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.170661] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.171277] ^ [ 30.171410] fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.171853] fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.172197] ================================================================== [ 30.437713] ================================================================== [ 30.437821] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 30.437979] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265 [ 30.438117] [ 30.438203] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.438444] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.438523] Hardware name: linux,dummy-virt (DT) [ 30.438748] Call trace: [ 30.438828] show_stack+0x20/0x38 (C) [ 30.439129] dump_stack_lvl+0x8c/0xd0 [ 30.439254] print_report+0x118/0x608 [ 30.439380] kasan_report+0xdc/0x128 [ 30.440489] kasan_check_range+0x100/0x1a8 [ 30.440629] __kasan_check_write+0x20/0x30 [ 30.440797] kasan_atomics_helper+0x175c/0x4858 [ 30.440950] kasan_atomics+0x198/0x2e0 [ 30.441112] kunit_try_run_case+0x170/0x3f0 [ 30.441505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.441670] kthread+0x328/0x630 [ 30.443259] ret_from_fork+0x10/0x20 [ 30.443451] [ 30.443503] Allocated by task 265: [ 30.443578] kasan_save_stack+0x3c/0x68 [ 30.443679] kasan_save_track+0x20/0x40 [ 30.443791] kasan_save_alloc_info+0x40/0x58 [ 30.443914] __kasan_kmalloc+0xd4/0xd8 [ 30.444123] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.444231] kasan_atomics+0xb8/0x2e0 [ 30.444588] kunit_try_run_case+0x170/0x3f0 [ 30.445176] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.445673] kthread+0x328/0x630 [ 30.446168] ret_from_fork+0x10/0x20 [ 30.446734] [ 30.446794] The buggy address belongs to the object at fff00000c7751400 [ 30.446794] which belongs to the cache kmalloc-64 of size 64 [ 30.447523] The buggy address is located 0 bytes to the right of [ 30.447523] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 30.448454] [ 30.449053] The buggy address belongs to the physical page: [ 30.449454] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 30.449606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.449739] page_type: f5(slab) [ 30.451345] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.451993] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.452102] page dumped because: kasan: bad access detected [ 30.452188] [ 30.452242] Memory state around the buggy address: [ 30.454122] fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.454278] fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.454395] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.454497] ^ [ 30.456258] fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.456561] fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.456664] ================================================================== [ 30.015822] ================================================================== [ 30.015952] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 30.016075] Read of size 4 at addr fff00000c7751430 by task kunit_try_catch/265 [ 30.017945] [ 30.018047] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.018271] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.018354] Hardware name: linux,dummy-virt (DT) [ 30.018442] Call trace: [ 30.018507] show_stack+0x20/0x38 (C) [ 30.018637] dump_stack_lvl+0x8c/0xd0 [ 30.018765] print_report+0x118/0x608 [ 30.018906] kasan_report+0xdc/0x128 [ 30.019969] __asan_report_load4_noabort+0x20/0x30 [ 30.020113] kasan_atomics_helper+0x3e04/0x4858 [ 30.020356] kasan_atomics+0x198/0x2e0 [ 30.021112] kunit_try_run_case+0x170/0x3f0 [ 30.021267] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.021439] kthread+0x328/0x630 [ 30.021644] ret_from_fork+0x10/0x20 [ 30.021866] [ 30.022032] Allocated by task 265: [ 30.022196] kasan_save_stack+0x3c/0x68 [ 30.022307] kasan_save_track+0x20/0x40 [ 30.022412] kasan_save_alloc_info+0x40/0x58 [ 30.022570] __kasan_kmalloc+0xd4/0xd8 [ 30.022833] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.022965] kasan_atomics+0xb8/0x2e0 [ 30.023063] kunit_try_run_case+0x170/0x3f0 [ 30.023384] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.023702] kthread+0x328/0x630 [ 30.023940] ret_from_fork+0x10/0x20 [ 30.024299] [ 30.024357] The buggy address belongs to the object at fff00000c7751400 [ 30.024357] which belongs to the cache kmalloc-64 of size 64 [ 30.024935] The buggy address is located 0 bytes to the right of [ 30.024935] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 30.025124] [ 30.025187] The buggy address belongs to the physical page: [ 30.025274] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 30.025423] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.025696] page_type: f5(slab) [ 30.025816] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.026146] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.026418] page dumped because: kasan: bad access detected [ 30.026963] [ 30.027170] Memory state around the buggy address: [ 30.027285] fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.027404] fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.027551] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.027830] ^ [ 30.028009] fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.028468] fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.028658] ================================================================== [ 30.302910] ================================================================== [ 30.303282] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 30.303530] Write of size 8 at addr fff00000c7751430 by task kunit_try_catch/265 [ 30.303665] [ 30.304154] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.304463] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.304543] Hardware name: linux,dummy-virt (DT) [ 30.304637] Call trace: [ 30.304701] show_stack+0x20/0x38 (C) [ 30.304830] dump_stack_lvl+0x8c/0xd0 [ 30.304984] print_report+0x118/0x608 [ 30.305553] kasan_report+0xdc/0x128 [ 30.306018] kasan_check_range+0x100/0x1a8 [ 30.306222] __kasan_check_write+0x20/0x30 [ 30.306382] kasan_atomics_helper+0x1414/0x4858 [ 30.306557] kasan_atomics+0x198/0x2e0 [ 30.306707] kunit_try_run_case+0x170/0x3f0 [ 30.307300] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.307692] kthread+0x328/0x630 [ 30.308314] ret_from_fork+0x10/0x20 [ 30.308507] [ 30.308650] Allocated by task 265: [ 30.308757] kasan_save_stack+0x3c/0x68 [ 30.309005] kasan_save_track+0x20/0x40 [ 30.309197] kasan_save_alloc_info+0x40/0x58 [ 30.309358] __kasan_kmalloc+0xd4/0xd8 [ 30.309542] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.309730] kasan_atomics+0xb8/0x2e0 [ 30.310200] kunit_try_run_case+0x170/0x3f0 [ 30.310312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.310454] kthread+0x328/0x630 [ 30.310644] ret_from_fork+0x10/0x20 [ 30.310795] [ 30.310873] The buggy address belongs to the object at fff00000c7751400 [ 30.310873] which belongs to the cache kmalloc-64 of size 64 [ 30.311067] The buggy address is located 0 bytes to the right of [ 30.311067] allocated 48-byte region [fff00000c7751400, fff00000c7751430) [ 30.311240] [ 30.311303] The buggy address belongs to the physical page: [ 30.311385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 30.311718] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.311965] page_type: f5(slab) [ 30.312131] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.312416] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.312549] page dumped because: kasan: bad access detected [ 30.312896] [ 30.313355] Memory state around the buggy address: [ 30.313478] fff00000c7751300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.313743] fff00000c7751380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.313877] >fff00000c7751400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.314805] ^ [ 30.315033] fff00000c7751480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.315205] fff00000c7751500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.315375] ==================================================================
[ 23.577970] ================================================================== [ 23.578412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 23.579026] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 23.579785] [ 23.580069] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 23.580208] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.580302] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.580390] Call Trace: [ 23.580465] <TASK> [ 23.580598] dump_stack_lvl+0x73/0xb0 [ 23.580699] print_report+0xd1/0x650 [ 23.580779] ? __virt_addr_valid+0x1db/0x2d0 [ 23.580857] ? kasan_atomics_helper+0x4a0/0x5450 [ 23.580934] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.581012] ? kasan_atomics_helper+0x4a0/0x5450 [ 23.581087] kasan_report+0x141/0x180 [ 23.581164] ? kasan_atomics_helper+0x4a0/0x5450 [ 23.581287] kasan_check_range+0x10c/0x1c0 [ 23.581374] __kasan_check_write+0x18/0x20 [ 23.581477] kasan_atomics_helper+0x4a0/0x5450 [ 23.581608] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.581708] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.581832] ? kasan_atomics+0x152/0x310 [ 23.581957] kasan_atomics+0x1dc/0x310 [ 23.582046] ? __pfx_kasan_atomics+0x10/0x10 [ 23.582124] ? __pfx_read_tsc+0x10/0x10 [ 23.582190] ? ktime_get_ts64+0x86/0x230 [ 23.582301] kunit_try_run_case+0x1a5/0x480 [ 23.582378] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.582448] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.582571] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.582704] ? __kthread_parkme+0x82/0x180 [ 23.582787] ? preempt_count_sub+0x50/0x80 [ 23.582866] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.582947] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.583032] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.583111] kthread+0x337/0x6f0 [ 23.583145] ? trace_preempt_on+0x20/0xc0 [ 23.583182] ? __pfx_kthread+0x10/0x10 [ 23.583214] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.583298] ? calculate_sigpending+0x7b/0xa0 [ 23.583339] ? __pfx_kthread+0x10/0x10 [ 23.583371] ret_from_fork+0x116/0x1d0 [ 23.583398] ? __pfx_kthread+0x10/0x10 [ 23.583433] ret_from_fork_asm+0x1a/0x30 [ 23.583476] </TASK> [ 23.583493] [ 23.603261] Allocated by task 283: [ 23.603634] kasan_save_stack+0x45/0x70 [ 23.604009] kasan_save_track+0x18/0x40 [ 23.604380] kasan_save_alloc_info+0x3b/0x50 [ 23.604881] __kasan_kmalloc+0xb7/0xc0 [ 23.605460] __kmalloc_cache_noprof+0x189/0x420 [ 23.606128] kasan_atomics+0x95/0x310 [ 23.606656] kunit_try_run_case+0x1a5/0x480 [ 23.608256] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.609398] kthread+0x337/0x6f0 [ 23.610040] ret_from_fork+0x116/0x1d0 [ 23.610482] ret_from_fork_asm+0x1a/0x30 [ 23.610836] [ 23.611032] The buggy address belongs to the object at ffff8881039d9c80 [ 23.611032] which belongs to the cache kmalloc-64 of size 64 [ 23.613640] The buggy address is located 0 bytes to the right of [ 23.613640] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 23.615263] [ 23.615542] The buggy address belongs to the physical page: [ 23.616762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 23.617847] flags: 0x200000000000000(node=0|zone=2) [ 23.618388] page_type: f5(slab) [ 23.618867] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.619643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.620491] page dumped because: kasan: bad access detected [ 23.620995] [ 23.621333] Memory state around the buggy address: [ 23.621804] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.622747] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.624056] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.625108] ^ [ 23.625764] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.627017] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.627795] ================================================================== [ 26.063087] ================================================================== [ 26.065854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 26.067244] Read of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 26.067898] [ 26.068149] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 26.068312] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.068361] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.068563] Call Trace: [ 26.068625] <TASK> [ 26.068679] dump_stack_lvl+0x73/0xb0 [ 26.068740] print_report+0xd1/0x650 [ 26.068779] ? __virt_addr_valid+0x1db/0x2d0 [ 26.068816] ? kasan_atomics_helper+0x4f71/0x5450 [ 26.068851] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.068886] ? kasan_atomics_helper+0x4f71/0x5450 [ 26.068920] kasan_report+0x141/0x180 [ 26.068952] ? kasan_atomics_helper+0x4f71/0x5450 [ 26.068991] __asan_report_load8_noabort+0x18/0x20 [ 26.069030] kasan_atomics_helper+0x4f71/0x5450 [ 26.069065] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.069099] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.069143] ? kasan_atomics+0x152/0x310 [ 26.069183] kasan_atomics+0x1dc/0x310 [ 26.069240] ? __pfx_kasan_atomics+0x10/0x10 [ 26.069304] ? __pfx_read_tsc+0x10/0x10 [ 26.069341] ? ktime_get_ts64+0x86/0x230 [ 26.069381] kunit_try_run_case+0x1a5/0x480 [ 26.069425] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.069468] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.069532] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.069575] ? __kthread_parkme+0x82/0x180 [ 26.069608] ? preempt_count_sub+0x50/0x80 [ 26.069659] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.069698] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.069736] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.069775] kthread+0x337/0x6f0 [ 26.069806] ? trace_preempt_on+0x20/0xc0 [ 26.069842] ? __pfx_kthread+0x10/0x10 [ 26.069873] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.069906] ? calculate_sigpending+0x7b/0xa0 [ 26.069942] ? __pfx_kthread+0x10/0x10 [ 26.069974] ret_from_fork+0x116/0x1d0 [ 26.070001] ? __pfx_kthread+0x10/0x10 [ 26.070031] ret_from_fork_asm+0x1a/0x30 [ 26.070074] </TASK> [ 26.070092] [ 26.088541] Allocated by task 283: [ 26.088960] kasan_save_stack+0x45/0x70 [ 26.089517] kasan_save_track+0x18/0x40 [ 26.089967] kasan_save_alloc_info+0x3b/0x50 [ 26.090557] __kasan_kmalloc+0xb7/0xc0 [ 26.091054] __kmalloc_cache_noprof+0x189/0x420 [ 26.091675] kasan_atomics+0x95/0x310 [ 26.092068] kunit_try_run_case+0x1a5/0x480 [ 26.092723] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.093377] kthread+0x337/0x6f0 [ 26.093931] ret_from_fork+0x116/0x1d0 [ 26.094313] ret_from_fork_asm+0x1a/0x30 [ 26.094693] [ 26.094938] The buggy address belongs to the object at ffff8881039d9c80 [ 26.094938] which belongs to the cache kmalloc-64 of size 64 [ 26.096032] The buggy address is located 0 bytes to the right of [ 26.096032] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 26.097170] [ 26.097461] The buggy address belongs to the physical page: [ 26.097956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 26.098744] flags: 0x200000000000000(node=0|zone=2) [ 26.099112] page_type: f5(slab) [ 26.099613] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.100438] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.101156] page dumped because: kasan: bad access detected [ 26.101772] [ 26.102016] Memory state around the buggy address: [ 26.102540] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.103132] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.103841] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.104422] ^ [ 26.104992] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.105764] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.106445] ================================================================== [ 24.420628] ================================================================== [ 24.421130] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 24.422725] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 24.423255] [ 24.423787] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 24.423924] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.423992] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.424062] Call Trace: [ 24.424456] <TASK> [ 24.424528] dump_stack_lvl+0x73/0xb0 [ 24.424649] print_report+0xd1/0x650 [ 24.424736] ? __virt_addr_valid+0x1db/0x2d0 [ 24.424803] ? kasan_atomics_helper+0xd47/0x5450 [ 24.424840] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.424876] ? kasan_atomics_helper+0xd47/0x5450 [ 24.424909] kasan_report+0x141/0x180 [ 24.424942] ? kasan_atomics_helper+0xd47/0x5450 [ 24.424982] kasan_check_range+0x10c/0x1c0 [ 24.425019] __kasan_check_write+0x18/0x20 [ 24.425049] kasan_atomics_helper+0xd47/0x5450 [ 24.425083] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.425117] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.425162] ? kasan_atomics+0x152/0x310 [ 24.425202] kasan_atomics+0x1dc/0x310 [ 24.425305] ? __pfx_kasan_atomics+0x10/0x10 [ 24.425390] ? __pfx_read_tsc+0x10/0x10 [ 24.425428] ? ktime_get_ts64+0x86/0x230 [ 24.425466] kunit_try_run_case+0x1a5/0x480 [ 24.425544] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.425649] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.425721] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.425788] ? __kthread_parkme+0x82/0x180 [ 24.425863] ? preempt_count_sub+0x50/0x80 [ 24.425932] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.425999] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.426071] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.426148] kthread+0x337/0x6f0 [ 24.426207] ? trace_preempt_on+0x20/0xc0 [ 24.426281] ? __pfx_kthread+0x10/0x10 [ 24.426315] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.426349] ? calculate_sigpending+0x7b/0xa0 [ 24.426385] ? __pfx_kthread+0x10/0x10 [ 24.426417] ret_from_fork+0x116/0x1d0 [ 24.426446] ? __pfx_kthread+0x10/0x10 [ 24.426478] ret_from_fork_asm+0x1a/0x30 [ 24.426561] </TASK> [ 24.426603] [ 24.450239] Allocated by task 283: [ 24.450653] kasan_save_stack+0x45/0x70 [ 24.452102] kasan_save_track+0x18/0x40 [ 24.452732] kasan_save_alloc_info+0x3b/0x50 [ 24.453105] __kasan_kmalloc+0xb7/0xc0 [ 24.453926] __kmalloc_cache_noprof+0x189/0x420 [ 24.454992] kasan_atomics+0x95/0x310 [ 24.456079] kunit_try_run_case+0x1a5/0x480 [ 24.456784] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.458006] kthread+0x337/0x6f0 [ 24.458185] ret_from_fork+0x116/0x1d0 [ 24.458918] ret_from_fork_asm+0x1a/0x30 [ 24.459582] [ 24.459831] The buggy address belongs to the object at ffff8881039d9c80 [ 24.459831] which belongs to the cache kmalloc-64 of size 64 [ 24.461247] The buggy address is located 0 bytes to the right of [ 24.461247] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 24.463586] [ 24.463975] The buggy address belongs to the physical page: [ 24.464849] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 24.465810] flags: 0x200000000000000(node=0|zone=2) [ 24.466983] page_type: f5(slab) [ 24.467594] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.468407] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.469170] page dumped because: kasan: bad access detected [ 24.469954] [ 24.470178] Memory state around the buggy address: [ 24.470595] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.471055] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.472282] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.473657] ^ [ 24.474710] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.475667] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.476235] ================================================================== [ 25.483383] ================================================================== [ 25.485020] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 25.485746] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 25.486449] [ 25.486783] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 25.486922] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.486966] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.487058] Call Trace: [ 25.487140] <TASK> [ 25.487198] dump_stack_lvl+0x73/0xb0 [ 25.487283] print_report+0xd1/0x650 [ 25.487324] ? __virt_addr_valid+0x1db/0x2d0 [ 25.487397] ? kasan_atomics_helper+0x1818/0x5450 [ 25.487476] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.487579] ? kasan_atomics_helper+0x1818/0x5450 [ 25.487660] kasan_report+0x141/0x180 [ 25.487763] ? kasan_atomics_helper+0x1818/0x5450 [ 25.487885] kasan_check_range+0x10c/0x1c0 [ 25.487967] __kasan_check_write+0x18/0x20 [ 25.488026] kasan_atomics_helper+0x1818/0x5450 [ 25.488066] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.488100] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.488146] ? kasan_atomics+0x152/0x310 [ 25.488187] kasan_atomics+0x1dc/0x310 [ 25.488232] ? __pfx_kasan_atomics+0x10/0x10 [ 25.488312] ? __pfx_read_tsc+0x10/0x10 [ 25.488351] ? ktime_get_ts64+0x86/0x230 [ 25.488389] kunit_try_run_case+0x1a5/0x480 [ 25.488432] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.488469] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.488532] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.488573] ? __kthread_parkme+0x82/0x180 [ 25.488606] ? preempt_count_sub+0x50/0x80 [ 25.488640] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.488678] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.488715] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.488753] kthread+0x337/0x6f0 [ 25.488782] ? trace_preempt_on+0x20/0xc0 [ 25.488817] ? __pfx_kthread+0x10/0x10 [ 25.488847] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.488880] ? calculate_sigpending+0x7b/0xa0 [ 25.488917] ? __pfx_kthread+0x10/0x10 [ 25.488950] ret_from_fork+0x116/0x1d0 [ 25.488980] ? __pfx_kthread+0x10/0x10 [ 25.489010] ret_from_fork_asm+0x1a/0x30 [ 25.489053] </TASK> [ 25.489069] [ 25.506405] Allocated by task 283: [ 25.506885] kasan_save_stack+0x45/0x70 [ 25.507580] kasan_save_track+0x18/0x40 [ 25.508008] kasan_save_alloc_info+0x3b/0x50 [ 25.508603] __kasan_kmalloc+0xb7/0xc0 [ 25.509073] __kmalloc_cache_noprof+0x189/0x420 [ 25.509732] kasan_atomics+0x95/0x310 [ 25.510283] kunit_try_run_case+0x1a5/0x480 [ 25.510763] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.511752] kthread+0x337/0x6f0 [ 25.512621] ret_from_fork+0x116/0x1d0 [ 25.513032] ret_from_fork_asm+0x1a/0x30 [ 25.513558] [ 25.513825] The buggy address belongs to the object at ffff8881039d9c80 [ 25.513825] which belongs to the cache kmalloc-64 of size 64 [ 25.514914] The buggy address is located 0 bytes to the right of [ 25.514914] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 25.515745] [ 25.515997] The buggy address belongs to the physical page: [ 25.516699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 25.517586] flags: 0x200000000000000(node=0|zone=2) [ 25.518353] page_type: f5(slab) [ 25.518752] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.519636] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.520100] page dumped because: kasan: bad access detected [ 25.520616] [ 25.520939] Memory state around the buggy address: [ 25.521450] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.522082] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.523602] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.524244] ^ [ 25.524923] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.525828] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.526721] ================================================================== [ 26.417456] ================================================================== [ 26.418516] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 26.419177] Read of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 26.419823] [ 26.420107] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 26.420249] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.420291] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.420359] Call Trace: [ 26.420418] <TASK> [ 26.420482] dump_stack_lvl+0x73/0xb0 [ 26.420613] print_report+0xd1/0x650 [ 26.420701] ? __virt_addr_valid+0x1db/0x2d0 [ 26.420792] ? kasan_atomics_helper+0x5115/0x5450 [ 26.420868] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.420926] ? kasan_atomics_helper+0x5115/0x5450 [ 26.420999] kasan_report+0x141/0x180 [ 26.421081] ? kasan_atomics_helper+0x5115/0x5450 [ 26.421171] __asan_report_load8_noabort+0x18/0x20 [ 26.421259] kasan_atomics_helper+0x5115/0x5450 [ 26.421346] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.421424] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.421974] ? kasan_atomics+0x152/0x310 [ 26.422067] kasan_atomics+0x1dc/0x310 [ 26.422148] ? __pfx_kasan_atomics+0x10/0x10 [ 26.422231] ? __pfx_read_tsc+0x10/0x10 [ 26.422307] ? ktime_get_ts64+0x86/0x230 [ 26.422424] kunit_try_run_case+0x1a5/0x480 [ 26.422534] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.422618] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.422698] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.422777] ? __kthread_parkme+0x82/0x180 [ 26.422853] ? preempt_count_sub+0x50/0x80 [ 26.422932] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.423016] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.423078] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.423118] kthread+0x337/0x6f0 [ 26.423148] ? trace_preempt_on+0x20/0xc0 [ 26.423185] ? __pfx_kthread+0x10/0x10 [ 26.423218] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.423286] ? calculate_sigpending+0x7b/0xa0 [ 26.423326] ? __pfx_kthread+0x10/0x10 [ 26.423361] ret_from_fork+0x116/0x1d0 [ 26.423389] ? __pfx_kthread+0x10/0x10 [ 26.423419] ret_from_fork_asm+0x1a/0x30 [ 26.423463] </TASK> [ 26.423481] [ 26.444948] Allocated by task 283: [ 26.445300] kasan_save_stack+0x45/0x70 [ 26.445844] kasan_save_track+0x18/0x40 [ 26.446155] kasan_save_alloc_info+0x3b/0x50 [ 26.446454] __kasan_kmalloc+0xb7/0xc0 [ 26.446873] __kmalloc_cache_noprof+0x189/0x420 [ 26.447351] kasan_atomics+0x95/0x310 [ 26.447768] kunit_try_run_case+0x1a5/0x480 [ 26.448200] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.448604] kthread+0x337/0x6f0 [ 26.449770] ret_from_fork+0x116/0x1d0 [ 26.450218] ret_from_fork_asm+0x1a/0x30 [ 26.451145] [ 26.451342] The buggy address belongs to the object at ffff8881039d9c80 [ 26.451342] which belongs to the cache kmalloc-64 of size 64 [ 26.452857] The buggy address is located 0 bytes to the right of [ 26.452857] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 26.453469] [ 26.454543] The buggy address belongs to the physical page: [ 26.455059] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 26.455829] flags: 0x200000000000000(node=0|zone=2) [ 26.456308] page_type: f5(slab) [ 26.456675] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.457214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.457823] page dumped because: kasan: bad access detected [ 26.458398] [ 26.458690] Memory state around the buggy address: [ 26.459192] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.459794] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.460416] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.460939] ^ [ 26.461292] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.462013] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.462731] ================================================================== [ 26.325078] ================================================================== [ 26.325566] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 26.326121] Read of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 26.327171] [ 26.327447] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 26.327597] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.327642] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.327707] Call Trace: [ 26.327763] <TASK> [ 26.327826] dump_stack_lvl+0x73/0xb0 [ 26.327927] print_report+0xd1/0x650 [ 26.328014] ? __virt_addr_valid+0x1db/0x2d0 [ 26.328096] ? kasan_atomics_helper+0x4fa5/0x5450 [ 26.328174] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.328264] ? kasan_atomics_helper+0x4fa5/0x5450 [ 26.328346] kasan_report+0x141/0x180 [ 26.328433] ? kasan_atomics_helper+0x4fa5/0x5450 [ 26.328880] __asan_report_load8_noabort+0x18/0x20 [ 26.328974] kasan_atomics_helper+0x4fa5/0x5450 [ 26.329055] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.329134] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.329232] ? kasan_atomics+0x152/0x310 [ 26.329322] kasan_atomics+0x1dc/0x310 [ 26.329400] ? __pfx_kasan_atomics+0x10/0x10 [ 26.329473] ? __pfx_read_tsc+0x10/0x10 [ 26.329571] ? ktime_get_ts64+0x86/0x230 [ 26.329669] kunit_try_run_case+0x1a5/0x480 [ 26.329759] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.329841] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.329922] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.330007] ? __kthread_parkme+0x82/0x180 [ 26.330079] ? preempt_count_sub+0x50/0x80 [ 26.330162] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.330251] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.330333] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.330415] kthread+0x337/0x6f0 [ 26.330487] ? trace_preempt_on+0x20/0xc0 [ 26.330627] ? __pfx_kthread+0x10/0x10 [ 26.330688] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.330753] ? calculate_sigpending+0x7b/0xa0 [ 26.330830] ? __pfx_kthread+0x10/0x10 [ 26.330901] ret_from_fork+0x116/0x1d0 [ 26.330971] ? __pfx_kthread+0x10/0x10 [ 26.331048] ret_from_fork_asm+0x1a/0x30 [ 26.331147] </TASK> [ 26.331188] [ 26.355141] Allocated by task 283: [ 26.355782] kasan_save_stack+0x45/0x70 [ 26.356544] kasan_save_track+0x18/0x40 [ 26.357137] kasan_save_alloc_info+0x3b/0x50 [ 26.357561] __kasan_kmalloc+0xb7/0xc0 [ 26.357992] __kmalloc_cache_noprof+0x189/0x420 [ 26.358455] kasan_atomics+0x95/0x310 [ 26.358908] kunit_try_run_case+0x1a5/0x480 [ 26.359383] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.359923] kthread+0x337/0x6f0 [ 26.360363] ret_from_fork+0x116/0x1d0 [ 26.360789] ret_from_fork_asm+0x1a/0x30 [ 26.361273] [ 26.361520] The buggy address belongs to the object at ffff8881039d9c80 [ 26.361520] which belongs to the cache kmalloc-64 of size 64 [ 26.362435] The buggy address is located 0 bytes to the right of [ 26.362435] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 26.363444] [ 26.363709] The buggy address belongs to the physical page: [ 26.364189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 26.364868] flags: 0x200000000000000(node=0|zone=2) [ 26.365376] page_type: f5(slab) [ 26.365715] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.366457] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.367032] page dumped because: kasan: bad access detected [ 26.368135] [ 26.368680] Memory state around the buggy address: [ 26.369396] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.369908] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.370426] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.371186] ^ [ 26.371592] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.372184] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.372917] ================================================================== [ 24.243397] ================================================================== [ 24.244047] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 24.244836] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 24.245657] [ 24.245916] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 24.246704] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.246748] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.246814] Call Trace: [ 24.246866] <TASK> [ 24.246922] dump_stack_lvl+0x73/0xb0 [ 24.247026] print_report+0xd1/0x650 [ 24.247107] ? __virt_addr_valid+0x1db/0x2d0 [ 24.247191] ? kasan_atomics_helper+0xb6a/0x5450 [ 24.247675] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.248133] ? kasan_atomics_helper+0xb6a/0x5450 [ 24.248259] kasan_report+0x141/0x180 [ 24.248348] ? kasan_atomics_helper+0xb6a/0x5450 [ 24.248441] kasan_check_range+0x10c/0x1c0 [ 24.248581] __kasan_check_write+0x18/0x20 [ 24.248662] kasan_atomics_helper+0xb6a/0x5450 [ 24.248743] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.248794] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.248844] ? kasan_atomics+0x152/0x310 [ 24.248884] kasan_atomics+0x1dc/0x310 [ 24.248919] ? __pfx_kasan_atomics+0x10/0x10 [ 24.248956] ? __pfx_read_tsc+0x10/0x10 [ 24.248988] ? ktime_get_ts64+0x86/0x230 [ 24.249024] kunit_try_run_case+0x1a5/0x480 [ 24.249065] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.249101] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.249136] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.249169] ? __kthread_parkme+0x82/0x180 [ 24.249200] ? preempt_count_sub+0x50/0x80 [ 24.249290] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.249335] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.249372] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.249409] kthread+0x337/0x6f0 [ 24.249439] ? trace_preempt_on+0x20/0xc0 [ 24.249475] ? __pfx_kthread+0x10/0x10 [ 24.249534] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.249609] ? calculate_sigpending+0x7b/0xa0 [ 24.249702] ? __pfx_kthread+0x10/0x10 [ 24.249762] ret_from_fork+0x116/0x1d0 [ 24.249818] ? __pfx_kthread+0x10/0x10 [ 24.249877] ret_from_fork_asm+0x1a/0x30 [ 24.249956] </TASK> [ 24.249988] [ 24.271981] Allocated by task 283: [ 24.272587] kasan_save_stack+0x45/0x70 [ 24.273736] kasan_save_track+0x18/0x40 [ 24.274588] kasan_save_alloc_info+0x3b/0x50 [ 24.275859] __kasan_kmalloc+0xb7/0xc0 [ 24.276201] __kmalloc_cache_noprof+0x189/0x420 [ 24.276992] kasan_atomics+0x95/0x310 [ 24.277592] kunit_try_run_case+0x1a5/0x480 [ 24.278283] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.278783] kthread+0x337/0x6f0 [ 24.279879] ret_from_fork+0x116/0x1d0 [ 24.280489] ret_from_fork_asm+0x1a/0x30 [ 24.281354] [ 24.281572] The buggy address belongs to the object at ffff8881039d9c80 [ 24.281572] which belongs to the cache kmalloc-64 of size 64 [ 24.283138] The buggy address is located 0 bytes to the right of [ 24.283138] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 24.284029] [ 24.284194] The buggy address belongs to the physical page: [ 24.284570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 24.285023] flags: 0x200000000000000(node=0|zone=2) [ 24.285365] page_type: f5(slab) [ 24.285771] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.286460] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.288055] page dumped because: kasan: bad access detected [ 24.289454] [ 24.289702] Memory state around the buggy address: [ 24.290712] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.291328] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.292174] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.293447] ^ [ 24.295853] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.298062] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.299669] ================================================================== [ 23.251296] ================================================================== [ 23.252403] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 23.253046] Read of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 23.253653] [ 23.253924] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 23.254059] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.254096] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.254163] Call Trace: [ 23.254202] <TASK> [ 23.254255] dump_stack_lvl+0x73/0xb0 [ 23.254358] print_report+0xd1/0x650 [ 23.254437] ? __virt_addr_valid+0x1db/0x2d0 [ 23.254541] ? kasan_atomics_helper+0x4bbc/0x5450 [ 23.255040] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.255118] ? kasan_atomics_helper+0x4bbc/0x5450 [ 23.255192] kasan_report+0x141/0x180 [ 23.255467] ? kasan_atomics_helper+0x4bbc/0x5450 [ 23.255638] __asan_report_load4_noabort+0x18/0x20 [ 23.255724] kasan_atomics_helper+0x4bbc/0x5450 [ 23.255800] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.255896] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.255978] ? kasan_atomics+0x152/0x310 [ 23.256019] kasan_atomics+0x1dc/0x310 [ 23.256053] ? __pfx_kasan_atomics+0x10/0x10 [ 23.256089] ? __pfx_read_tsc+0x10/0x10 [ 23.256123] ? ktime_get_ts64+0x86/0x230 [ 23.256157] kunit_try_run_case+0x1a5/0x480 [ 23.256195] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.256276] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.256321] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.256357] ? __kthread_parkme+0x82/0x180 [ 23.256389] ? preempt_count_sub+0x50/0x80 [ 23.256420] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.256456] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.256490] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.256603] kthread+0x337/0x6f0 [ 23.256688] ? trace_preempt_on+0x20/0xc0 [ 23.256731] ? __pfx_kthread+0x10/0x10 [ 23.256760] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.256794] ? calculate_sigpending+0x7b/0xa0 [ 23.256830] ? __pfx_kthread+0x10/0x10 [ 23.256859] ret_from_fork+0x116/0x1d0 [ 23.256886] ? __pfx_kthread+0x10/0x10 [ 23.256915] ret_from_fork_asm+0x1a/0x30 [ 23.256956] </TASK> [ 23.256973] [ 23.273867] Allocated by task 283: [ 23.274347] kasan_save_stack+0x45/0x70 [ 23.274859] kasan_save_track+0x18/0x40 [ 23.275308] kasan_save_alloc_info+0x3b/0x50 [ 23.275731] __kasan_kmalloc+0xb7/0xc0 [ 23.276049] __kmalloc_cache_noprof+0x189/0x420 [ 23.276470] kasan_atomics+0x95/0x310 [ 23.276906] kunit_try_run_case+0x1a5/0x480 [ 23.277476] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.278055] kthread+0x337/0x6f0 [ 23.278759] ret_from_fork+0x116/0x1d0 [ 23.279145] ret_from_fork_asm+0x1a/0x30 [ 23.279691] [ 23.279936] The buggy address belongs to the object at ffff8881039d9c80 [ 23.279936] which belongs to the cache kmalloc-64 of size 64 [ 23.280876] The buggy address is located 0 bytes to the right of [ 23.280876] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 23.281832] [ 23.282025] The buggy address belongs to the physical page: [ 23.282453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 23.283159] flags: 0x200000000000000(node=0|zone=2) [ 23.283928] page_type: f5(slab) [ 23.284204] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.284788] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.285464] page dumped because: kasan: bad access detected [ 23.286096] [ 23.286399] Memory state around the buggy address: [ 23.286982] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.287436] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.288733] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.289392] ^ [ 23.290033] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.290858] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.291402] ================================================================== [ 25.222432] ================================================================== [ 25.222988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 25.223704] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 25.224339] [ 25.224640] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 25.224772] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.224820] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.224889] Call Trace: [ 25.224944] <TASK> [ 25.224999] dump_stack_lvl+0x73/0xb0 [ 25.225095] print_report+0xd1/0x650 [ 25.225184] ? __virt_addr_valid+0x1db/0x2d0 [ 25.225309] ? kasan_atomics_helper+0x50d4/0x5450 [ 25.225389] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.225472] ? kasan_atomics_helper+0x50d4/0x5450 [ 25.225575] kasan_report+0x141/0x180 [ 25.225674] ? kasan_atomics_helper+0x50d4/0x5450 [ 25.225766] __asan_report_store8_noabort+0x1b/0x30 [ 25.225846] kasan_atomics_helper+0x50d4/0x5450 [ 25.225929] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.226017] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.226121] ? kasan_atomics+0x152/0x310 [ 25.226215] kasan_atomics+0x1dc/0x310 [ 25.226345] ? __pfx_kasan_atomics+0x10/0x10 [ 25.226429] ? __pfx_read_tsc+0x10/0x10 [ 25.226525] ? ktime_get_ts64+0x86/0x230 [ 25.226573] kunit_try_run_case+0x1a5/0x480 [ 25.226618] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.226694] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.226781] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.226866] ? __kthread_parkme+0x82/0x180 [ 25.226951] ? preempt_count_sub+0x50/0x80 [ 25.227038] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.227121] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.227209] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.227338] kthread+0x337/0x6f0 [ 25.227411] ? trace_preempt_on+0x20/0xc0 [ 25.227466] ? __pfx_kthread+0x10/0x10 [ 25.227525] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.227562] ? calculate_sigpending+0x7b/0xa0 [ 25.227598] ? __pfx_kthread+0x10/0x10 [ 25.227632] ret_from_fork+0x116/0x1d0 [ 25.227660] ? __pfx_kthread+0x10/0x10 [ 25.227690] ret_from_fork_asm+0x1a/0x30 [ 25.227735] </TASK> [ 25.227752] [ 25.242110] Allocated by task 283: [ 25.242628] kasan_save_stack+0x45/0x70 [ 25.243097] kasan_save_track+0x18/0x40 [ 25.243561] kasan_save_alloc_info+0x3b/0x50 [ 25.243967] __kasan_kmalloc+0xb7/0xc0 [ 25.244441] __kmalloc_cache_noprof+0x189/0x420 [ 25.244921] kasan_atomics+0x95/0x310 [ 25.245302] kunit_try_run_case+0x1a5/0x480 [ 25.245779] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.246269] kthread+0x337/0x6f0 [ 25.246686] ret_from_fork+0x116/0x1d0 [ 25.247080] ret_from_fork_asm+0x1a/0x30 [ 25.247538] [ 25.247782] The buggy address belongs to the object at ffff8881039d9c80 [ 25.247782] which belongs to the cache kmalloc-64 of size 64 [ 25.248664] The buggy address is located 0 bytes to the right of [ 25.248664] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 25.249429] [ 25.249712] The buggy address belongs to the physical page: [ 25.250309] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 25.251120] flags: 0x200000000000000(node=0|zone=2) [ 25.251966] page_type: f5(slab) [ 25.252380] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.253028] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.254076] page dumped because: kasan: bad access detected [ 25.255090] [ 25.255480] Memory state around the buggy address: [ 25.256134] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.257403] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.258081] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.259060] ^ [ 25.259553] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.260486] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.261111] ================================================================== [ 24.300611] ================================================================== [ 24.301040] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 24.305437] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 24.308162] [ 24.309144] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 24.309326] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.309351] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.309390] Call Trace: [ 24.309416] <TASK> [ 24.309441] dump_stack_lvl+0x73/0xb0 [ 24.309545] print_report+0xd1/0x650 [ 24.309692] ? __virt_addr_valid+0x1db/0x2d0 [ 24.309761] ? kasan_atomics_helper+0xc70/0x5450 [ 24.309803] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.309837] ? kasan_atomics_helper+0xc70/0x5450 [ 24.309870] kasan_report+0x141/0x180 [ 24.309905] ? kasan_atomics_helper+0xc70/0x5450 [ 24.309943] kasan_check_range+0x10c/0x1c0 [ 24.309978] __kasan_check_write+0x18/0x20 [ 24.310006] kasan_atomics_helper+0xc70/0x5450 [ 24.310040] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.310073] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.310118] ? kasan_atomics+0x152/0x310 [ 24.310157] kasan_atomics+0x1dc/0x310 [ 24.310192] ? __pfx_kasan_atomics+0x10/0x10 [ 24.310273] ? __pfx_read_tsc+0x10/0x10 [ 24.310314] ? ktime_get_ts64+0x86/0x230 [ 24.310351] kunit_try_run_case+0x1a5/0x480 [ 24.310392] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.310428] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.310464] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.310524] ? __kthread_parkme+0x82/0x180 [ 24.310599] ? preempt_count_sub+0x50/0x80 [ 24.310681] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.310752] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.310826] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.310903] kthread+0x337/0x6f0 [ 24.310960] ? trace_preempt_on+0x20/0xc0 [ 24.311025] ? __pfx_kthread+0x10/0x10 [ 24.311087] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.311158] ? calculate_sigpending+0x7b/0xa0 [ 24.311230] ? __pfx_kthread+0x10/0x10 [ 24.311300] ret_from_fork+0x116/0x1d0 [ 24.311332] ? __pfx_kthread+0x10/0x10 [ 24.311362] ret_from_fork_asm+0x1a/0x30 [ 24.311406] </TASK> [ 24.311422] [ 24.336397] Allocated by task 283: [ 24.337571] kasan_save_stack+0x45/0x70 [ 24.338335] kasan_save_track+0x18/0x40 [ 24.339076] kasan_save_alloc_info+0x3b/0x50 [ 24.339903] __kasan_kmalloc+0xb7/0xc0 [ 24.340272] __kmalloc_cache_noprof+0x189/0x420 [ 24.340698] kasan_atomics+0x95/0x310 [ 24.341051] kunit_try_run_case+0x1a5/0x480 [ 24.341441] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.343553] kthread+0x337/0x6f0 [ 24.344015] ret_from_fork+0x116/0x1d0 [ 24.344999] ret_from_fork_asm+0x1a/0x30 [ 24.345659] [ 24.346037] The buggy address belongs to the object at ffff8881039d9c80 [ 24.346037] which belongs to the cache kmalloc-64 of size 64 [ 24.346926] The buggy address is located 0 bytes to the right of [ 24.346926] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 24.348179] [ 24.348487] The buggy address belongs to the physical page: [ 24.349734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 24.350432] flags: 0x200000000000000(node=0|zone=2) [ 24.350977] page_type: f5(slab) [ 24.351738] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.352985] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.354126] page dumped because: kasan: bad access detected [ 24.354448] [ 24.354638] Memory state around the buggy address: [ 24.356059] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.356758] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.357457] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.358455] ^ [ 24.358965] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.360053] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.360855] ================================================================== [ 25.884447] ================================================================== [ 25.885321] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 25.885843] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 25.886437] [ 25.886736] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 25.886878] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.886921] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.886987] Call Trace: [ 25.887038] <TASK> [ 25.887087] dump_stack_lvl+0x73/0xb0 [ 25.887179] print_report+0xd1/0x650 [ 25.887315] ? __virt_addr_valid+0x1db/0x2d0 [ 25.887396] ? kasan_atomics_helper+0x1d7a/0x5450 [ 25.887472] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.887572] ? kasan_atomics_helper+0x1d7a/0x5450 [ 25.887649] kasan_report+0x141/0x180 [ 25.887726] ? kasan_atomics_helper+0x1d7a/0x5450 [ 25.887811] kasan_check_range+0x10c/0x1c0 [ 25.887896] __kasan_check_write+0x18/0x20 [ 25.887973] kasan_atomics_helper+0x1d7a/0x5450 [ 25.888057] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.888141] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.888288] ? kasan_atomics+0x152/0x310 [ 25.888384] kasan_atomics+0x1dc/0x310 [ 25.888465] ? __pfx_kasan_atomics+0x10/0x10 [ 25.888564] ? __pfx_read_tsc+0x10/0x10 [ 25.888643] ? ktime_get_ts64+0x86/0x230 [ 25.888732] kunit_try_run_case+0x1a5/0x480 [ 25.888821] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.888896] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.888942] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.888979] ? __kthread_parkme+0x82/0x180 [ 25.889012] ? preempt_count_sub+0x50/0x80 [ 25.889046] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.889084] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.889121] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.889157] kthread+0x337/0x6f0 [ 25.889186] ? trace_preempt_on+0x20/0xc0 [ 25.889249] ? __pfx_kthread+0x10/0x10 [ 25.889304] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.889339] ? calculate_sigpending+0x7b/0xa0 [ 25.889374] ? __pfx_kthread+0x10/0x10 [ 25.889406] ret_from_fork+0x116/0x1d0 [ 25.889434] ? __pfx_kthread+0x10/0x10 [ 25.889466] ret_from_fork_asm+0x1a/0x30 [ 25.889536] </TASK> [ 25.889555] [ 25.906022] Allocated by task 283: [ 25.906489] kasan_save_stack+0x45/0x70 [ 25.907841] kasan_save_track+0x18/0x40 [ 25.909205] kasan_save_alloc_info+0x3b/0x50 [ 25.911565] __kasan_kmalloc+0xb7/0xc0 [ 25.912544] __kmalloc_cache_noprof+0x189/0x420 [ 25.914109] kasan_atomics+0x95/0x310 [ 25.915176] kunit_try_run_case+0x1a5/0x480 [ 25.916684] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.917020] kthread+0x337/0x6f0 [ 25.918275] ret_from_fork+0x116/0x1d0 [ 25.919319] ret_from_fork_asm+0x1a/0x30 [ 25.920111] [ 25.921089] The buggy address belongs to the object at ffff8881039d9c80 [ 25.921089] which belongs to the cache kmalloc-64 of size 64 [ 25.922151] The buggy address is located 0 bytes to the right of [ 25.922151] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 25.923179] [ 25.923397] The buggy address belongs to the physical page: [ 25.924240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 25.925422] flags: 0x200000000000000(node=0|zone=2) [ 25.925876] page_type: f5(slab) [ 25.926300] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.927417] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.928075] page dumped because: kasan: bad access detected [ 25.928709] [ 25.928921] Memory state around the buggy address: [ 25.929298] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.929836] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.930357] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.931561] ^ [ 25.932297] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.933004] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.933748] ================================================================== [ 26.153380] ================================================================== [ 26.154385] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 26.155296] Read of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 26.155990] [ 26.156239] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 26.156370] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.156414] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.156481] Call Trace: [ 26.156552] <TASK> [ 26.156607] dump_stack_lvl+0x73/0xb0 [ 26.156703] print_report+0xd1/0x650 [ 26.156790] ? __virt_addr_valid+0x1db/0x2d0 [ 26.156832] ? kasan_atomics_helper+0x4f98/0x5450 [ 26.156866] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.156901] ? kasan_atomics_helper+0x4f98/0x5450 [ 26.156961] kasan_report+0x141/0x180 [ 26.157021] ? kasan_atomics_helper+0x4f98/0x5450 [ 26.157097] __asan_report_load8_noabort+0x18/0x20 [ 26.157181] kasan_atomics_helper+0x4f98/0x5450 [ 26.157323] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.157472] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.157699] ? kasan_atomics+0x152/0x310 [ 26.157793] kasan_atomics+0x1dc/0x310 [ 26.157874] ? __pfx_kasan_atomics+0x10/0x10 [ 26.157953] ? __pfx_read_tsc+0x10/0x10 [ 26.158027] ? ktime_get_ts64+0x86/0x230 [ 26.158108] kunit_try_run_case+0x1a5/0x480 [ 26.158197] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.158292] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.158429] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.158618] ? __kthread_parkme+0x82/0x180 [ 26.158780] ? preempt_count_sub+0x50/0x80 [ 26.158897] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.158984] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.159066] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.159147] kthread+0x337/0x6f0 [ 26.159193] ? trace_preempt_on+0x20/0xc0 [ 26.159247] ? __pfx_kthread+0x10/0x10 [ 26.159299] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.159334] ? calculate_sigpending+0x7b/0xa0 [ 26.159370] ? __pfx_kthread+0x10/0x10 [ 26.159400] ret_from_fork+0x116/0x1d0 [ 26.159428] ? __pfx_kthread+0x10/0x10 [ 26.159458] ret_from_fork_asm+0x1a/0x30 [ 26.159526] </TASK> [ 26.159546] [ 26.185477] Allocated by task 283: [ 26.186173] kasan_save_stack+0x45/0x70 [ 26.186994] kasan_save_track+0x18/0x40 [ 26.187797] kasan_save_alloc_info+0x3b/0x50 [ 26.188198] __kasan_kmalloc+0xb7/0xc0 [ 26.188727] __kmalloc_cache_noprof+0x189/0x420 [ 26.189307] kasan_atomics+0x95/0x310 [ 26.189861] kunit_try_run_case+0x1a5/0x480 [ 26.190396] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.190924] kthread+0x337/0x6f0 [ 26.191444] ret_from_fork+0x116/0x1d0 [ 26.191880] ret_from_fork_asm+0x1a/0x30 [ 26.192360] [ 26.192730] The buggy address belongs to the object at ffff8881039d9c80 [ 26.192730] which belongs to the cache kmalloc-64 of size 64 [ 26.193732] The buggy address is located 0 bytes to the right of [ 26.193732] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 26.194893] [ 26.195157] The buggy address belongs to the physical page: [ 26.195806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 26.196693] flags: 0x200000000000000(node=0|zone=2) [ 26.197293] page_type: f5(slab) [ 26.197757] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.198530] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.199204] page dumped because: kasan: bad access detected [ 26.199640] [ 26.199851] Memory state around the buggy address: [ 26.200204] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.200884] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.201589] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.202287] ^ [ 26.202684] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.203457] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.204083] ================================================================== [ 25.757029] ================================================================== [ 25.757694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 25.758578] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 25.759368] [ 25.759741] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 25.759904] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.759950] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.760068] Call Trace: [ 25.760155] <TASK> [ 25.760213] dump_stack_lvl+0x73/0xb0 [ 25.760410] print_report+0xd1/0x650 [ 25.760545] ? __virt_addr_valid+0x1db/0x2d0 [ 25.760631] ? kasan_atomics_helper+0x1c18/0x5450 [ 25.760794] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.760879] ? kasan_atomics_helper+0x1c18/0x5450 [ 25.760948] kasan_report+0x141/0x180 [ 25.760988] ? kasan_atomics_helper+0x1c18/0x5450 [ 25.761028] kasan_check_range+0x10c/0x1c0 [ 25.761065] __kasan_check_write+0x18/0x20 [ 25.761095] kasan_atomics_helper+0x1c18/0x5450 [ 25.761129] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.761162] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.761209] ? kasan_atomics+0x152/0x310 [ 25.761312] kasan_atomics+0x1dc/0x310 [ 25.761350] ? __pfx_kasan_atomics+0x10/0x10 [ 25.761387] ? __pfx_read_tsc+0x10/0x10 [ 25.761419] ? ktime_get_ts64+0x86/0x230 [ 25.761455] kunit_try_run_case+0x1a5/0x480 [ 25.761516] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.761562] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.761599] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.761650] ? __kthread_parkme+0x82/0x180 [ 25.761683] ? preempt_count_sub+0x50/0x80 [ 25.761716] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.761755] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.761791] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.761828] kthread+0x337/0x6f0 [ 25.761856] ? trace_preempt_on+0x20/0xc0 [ 25.761891] ? __pfx_kthread+0x10/0x10 [ 25.761922] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.761954] ? calculate_sigpending+0x7b/0xa0 [ 25.761991] ? __pfx_kthread+0x10/0x10 [ 25.762023] ret_from_fork+0x116/0x1d0 [ 25.762049] ? __pfx_kthread+0x10/0x10 [ 25.762079] ret_from_fork_asm+0x1a/0x30 [ 25.762123] </TASK> [ 25.762140] [ 25.778934] Allocated by task 283: [ 25.779382] kasan_save_stack+0x45/0x70 [ 25.779871] kasan_save_track+0x18/0x40 [ 25.780375] kasan_save_alloc_info+0x3b/0x50 [ 25.780962] __kasan_kmalloc+0xb7/0xc0 [ 25.781459] __kmalloc_cache_noprof+0x189/0x420 [ 25.782093] kasan_atomics+0x95/0x310 [ 25.782616] kunit_try_run_case+0x1a5/0x480 [ 25.783069] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.783546] kthread+0x337/0x6f0 [ 25.784016] ret_from_fork+0x116/0x1d0 [ 25.784655] ret_from_fork_asm+0x1a/0x30 [ 25.785100] [ 25.785383] The buggy address belongs to the object at ffff8881039d9c80 [ 25.785383] which belongs to the cache kmalloc-64 of size 64 [ 25.786579] The buggy address is located 0 bytes to the right of [ 25.786579] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 25.787781] [ 25.788035] The buggy address belongs to the physical page: [ 25.788639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 25.789141] flags: 0x200000000000000(node=0|zone=2) [ 25.789571] page_type: f5(slab) [ 25.790082] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.790919] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.791643] page dumped because: kasan: bad access detected [ 25.792668] [ 25.792861] Memory state around the buggy address: [ 25.793214] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.794408] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.795339] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.795903] ^ [ 25.796842] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.797523] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.798314] ================================================================== [ 24.651925] ================================================================== [ 24.652672] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 24.653863] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 24.654932] [ 24.655140] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 24.655255] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.655296] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.655361] Call Trace: [ 24.655407] <TASK> [ 24.655460] dump_stack_lvl+0x73/0xb0 [ 24.655591] print_report+0xd1/0x650 [ 24.655679] ? __virt_addr_valid+0x1db/0x2d0 [ 24.655762] ? kasan_atomics_helper+0xfa9/0x5450 [ 24.655842] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.655925] ? kasan_atomics_helper+0xfa9/0x5450 [ 24.656003] kasan_report+0x141/0x180 [ 24.656083] ? kasan_atomics_helper+0xfa9/0x5450 [ 24.656173] kasan_check_range+0x10c/0x1c0 [ 24.656259] __kasan_check_write+0x18/0x20 [ 24.656331] kasan_atomics_helper+0xfa9/0x5450 [ 24.656406] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.656483] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.656605] ? kasan_atomics+0x152/0x310 [ 24.656713] kasan_atomics+0x1dc/0x310 [ 24.656755] ? __pfx_kasan_atomics+0x10/0x10 [ 24.656794] ? __pfx_read_tsc+0x10/0x10 [ 24.656828] ? ktime_get_ts64+0x86/0x230 [ 24.656866] kunit_try_run_case+0x1a5/0x480 [ 24.656906] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.656941] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.656977] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.657012] ? __kthread_parkme+0x82/0x180 [ 24.657042] ? preempt_count_sub+0x50/0x80 [ 24.657076] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.657112] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.657147] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.657184] kthread+0x337/0x6f0 [ 24.657212] ? trace_preempt_on+0x20/0xc0 [ 24.657279] ? __pfx_kthread+0x10/0x10 [ 24.657314] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.657348] ? calculate_sigpending+0x7b/0xa0 [ 24.657383] ? __pfx_kthread+0x10/0x10 [ 24.657416] ret_from_fork+0x116/0x1d0 [ 24.657444] ? __pfx_kthread+0x10/0x10 [ 24.657475] ret_from_fork_asm+0x1a/0x30 [ 24.657550] </TASK> [ 24.657568] [ 24.675016] Allocated by task 283: [ 24.675614] kasan_save_stack+0x45/0x70 [ 24.676199] kasan_save_track+0x18/0x40 [ 24.676681] kasan_save_alloc_info+0x3b/0x50 [ 24.677397] __kasan_kmalloc+0xb7/0xc0 [ 24.677828] __kmalloc_cache_noprof+0x189/0x420 [ 24.678596] kasan_atomics+0x95/0x310 [ 24.679017] kunit_try_run_case+0x1a5/0x480 [ 24.679413] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.679990] kthread+0x337/0x6f0 [ 24.680391] ret_from_fork+0x116/0x1d0 [ 24.680850] ret_from_fork_asm+0x1a/0x30 [ 24.681197] [ 24.681444] The buggy address belongs to the object at ffff8881039d9c80 [ 24.681444] which belongs to the cache kmalloc-64 of size 64 [ 24.683876] The buggy address is located 0 bytes to the right of [ 24.683876] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 24.685027] [ 24.685701] The buggy address belongs to the physical page: [ 24.686135] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 24.687015] flags: 0x200000000000000(node=0|zone=2) [ 24.687992] page_type: f5(slab) [ 24.688172] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.688969] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.689291] page dumped because: kasan: bad access detected [ 24.690247] [ 24.690488] Memory state around the buggy address: [ 24.691049] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.692075] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.692895] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.694051] ^ [ 24.694632] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.695152] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.696408] ================================================================== [ 24.960045] ================================================================== [ 24.960694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 24.961283] Read of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 24.961922] [ 24.962160] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 24.962305] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.962348] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.962414] Call Trace: [ 24.962471] <TASK> [ 24.962548] dump_stack_lvl+0x73/0xb0 [ 24.962645] print_report+0xd1/0x650 [ 24.962732] ? __virt_addr_valid+0x1db/0x2d0 [ 24.962818] ? kasan_atomics_helper+0x49e8/0x5450 [ 24.962903] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.962985] ? kasan_atomics_helper+0x49e8/0x5450 [ 24.963065] kasan_report+0x141/0x180 [ 24.963150] ? kasan_atomics_helper+0x49e8/0x5450 [ 24.963240] __asan_report_load4_noabort+0x18/0x20 [ 24.963330] kasan_atomics_helper+0x49e8/0x5450 [ 24.963411] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.963488] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.963574] ? kasan_atomics+0x152/0x310 [ 24.963616] kasan_atomics+0x1dc/0x310 [ 24.963650] ? __pfx_kasan_atomics+0x10/0x10 [ 24.963687] ? __pfx_read_tsc+0x10/0x10 [ 24.963721] ? ktime_get_ts64+0x86/0x230 [ 24.963756] kunit_try_run_case+0x1a5/0x480 [ 24.963796] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.963831] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.963866] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.963900] ? __kthread_parkme+0x82/0x180 [ 24.963931] ? preempt_count_sub+0x50/0x80 [ 24.963963] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.964000] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.964035] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.964071] kthread+0x337/0x6f0 [ 24.964099] ? trace_preempt_on+0x20/0xc0 [ 24.964133] ? __pfx_kthread+0x10/0x10 [ 24.964163] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.964196] ? calculate_sigpending+0x7b/0xa0 [ 24.964250] ? __pfx_kthread+0x10/0x10 [ 24.964301] ret_from_fork+0x116/0x1d0 [ 24.964330] ? __pfx_kthread+0x10/0x10 [ 24.964360] ret_from_fork_asm+0x1a/0x30 [ 24.964402] </TASK> [ 24.964419] [ 24.978918] Allocated by task 283: [ 24.979260] kasan_save_stack+0x45/0x70 [ 24.979758] kasan_save_track+0x18/0x40 [ 24.980173] kasan_save_alloc_info+0x3b/0x50 [ 24.980611] __kasan_kmalloc+0xb7/0xc0 [ 24.980930] __kmalloc_cache_noprof+0x189/0x420 [ 24.981441] kasan_atomics+0x95/0x310 [ 24.982203] kunit_try_run_case+0x1a5/0x480 [ 24.982692] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.984766] kthread+0x337/0x6f0 [ 24.985185] ret_from_fork+0x116/0x1d0 [ 24.985687] ret_from_fork_asm+0x1a/0x30 [ 24.986117] [ 24.986788] The buggy address belongs to the object at ffff8881039d9c80 [ 24.986788] which belongs to the cache kmalloc-64 of size 64 [ 24.987736] The buggy address is located 0 bytes to the right of [ 24.987736] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 24.989549] [ 24.989951] The buggy address belongs to the physical page: [ 24.990762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 24.991689] flags: 0x200000000000000(node=0|zone=2) [ 24.992143] page_type: f5(slab) [ 24.992547] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.993149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.993850] page dumped because: kasan: bad access detected [ 24.994380] [ 24.994608] Memory state around the buggy address: [ 24.995065] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.995811] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.996469] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.997069] ^ [ 24.997597] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.998314] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.998921] ================================================================== [ 25.575894] ================================================================== [ 25.576648] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 25.577454] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 25.577965] [ 25.578275] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 25.578398] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.578437] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.578524] Call Trace: [ 25.578610] <TASK> [ 25.578667] dump_stack_lvl+0x73/0xb0 [ 25.578902] print_report+0xd1/0x650 [ 25.579026] ? __virt_addr_valid+0x1db/0x2d0 [ 25.579111] ? kasan_atomics_helper+0x194a/0x5450 [ 25.579191] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.579283] ? kasan_atomics_helper+0x194a/0x5450 [ 25.579343] kasan_report+0x141/0x180 [ 25.579411] ? kasan_atomics_helper+0x194a/0x5450 [ 25.579568] kasan_check_range+0x10c/0x1c0 [ 25.579689] __kasan_check_write+0x18/0x20 [ 25.579768] kasan_atomics_helper+0x194a/0x5450 [ 25.579904] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.580015] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.580104] ? kasan_atomics+0x152/0x310 [ 25.580149] kasan_atomics+0x1dc/0x310 [ 25.580185] ? __pfx_kasan_atomics+0x10/0x10 [ 25.580225] ? __pfx_read_tsc+0x10/0x10 [ 25.580306] ? ktime_get_ts64+0x86/0x230 [ 25.580346] kunit_try_run_case+0x1a5/0x480 [ 25.580389] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.580426] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.580462] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.580523] ? __kthread_parkme+0x82/0x180 [ 25.580560] ? preempt_count_sub+0x50/0x80 [ 25.580595] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.580633] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.580669] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.580705] kthread+0x337/0x6f0 [ 25.580734] ? trace_preempt_on+0x20/0xc0 [ 25.580770] ? __pfx_kthread+0x10/0x10 [ 25.580801] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.580834] ? calculate_sigpending+0x7b/0xa0 [ 25.580870] ? __pfx_kthread+0x10/0x10 [ 25.580902] ret_from_fork+0x116/0x1d0 [ 25.580930] ? __pfx_kthread+0x10/0x10 [ 25.580959] ret_from_fork_asm+0x1a/0x30 [ 25.581002] </TASK> [ 25.581018] [ 25.598819] Allocated by task 283: [ 25.599267] kasan_save_stack+0x45/0x70 [ 25.599831] kasan_save_track+0x18/0x40 [ 25.600337] kasan_save_alloc_info+0x3b/0x50 [ 25.600758] __kasan_kmalloc+0xb7/0xc0 [ 25.601145] __kmalloc_cache_noprof+0x189/0x420 [ 25.601762] kasan_atomics+0x95/0x310 [ 25.602259] kunit_try_run_case+0x1a5/0x480 [ 25.602757] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.603317] kthread+0x337/0x6f0 [ 25.603754] ret_from_fork+0x116/0x1d0 [ 25.604137] ret_from_fork_asm+0x1a/0x30 [ 25.604529] [ 25.604773] The buggy address belongs to the object at ffff8881039d9c80 [ 25.604773] which belongs to the cache kmalloc-64 of size 64 [ 25.605863] The buggy address is located 0 bytes to the right of [ 25.605863] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 25.606831] [ 25.607031] The buggy address belongs to the physical page: [ 25.607455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 25.608212] flags: 0x200000000000000(node=0|zone=2) [ 25.608800] page_type: f5(slab) [ 25.609294] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.610046] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.610768] page dumped because: kasan: bad access detected [ 25.611421] [ 25.611631] Memory state around the buggy address: [ 25.611979] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.612688] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.613466] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.614128] ^ [ 25.614673] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.615394] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.615957] ================================================================== [ 25.351015] ================================================================== [ 25.351786] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 25.352563] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 25.353347] [ 25.353670] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 25.353799] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.353843] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.353909] Call Trace: [ 25.353966] <TASK> [ 25.354019] dump_stack_lvl+0x73/0xb0 [ 25.354182] print_report+0xd1/0x650 [ 25.354425] ? __virt_addr_valid+0x1db/0x2d0 [ 25.354601] ? kasan_atomics_helper+0x164f/0x5450 [ 25.354713] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.354796] ? kasan_atomics_helper+0x164f/0x5450 [ 25.354875] kasan_report+0x141/0x180 [ 25.354951] ? kasan_atomics_helper+0x164f/0x5450 [ 25.355037] kasan_check_range+0x10c/0x1c0 [ 25.355121] __kasan_check_write+0x18/0x20 [ 25.355197] kasan_atomics_helper+0x164f/0x5450 [ 25.355442] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.355564] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.355663] ? kasan_atomics+0x152/0x310 [ 25.355747] kasan_atomics+0x1dc/0x310 [ 25.355793] ? __pfx_kasan_atomics+0x10/0x10 [ 25.355833] ? __pfx_read_tsc+0x10/0x10 [ 25.355868] ? ktime_get_ts64+0x86/0x230 [ 25.355903] kunit_try_run_case+0x1a5/0x480 [ 25.355943] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.355977] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.356013] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.356050] ? __kthread_parkme+0x82/0x180 [ 25.356080] ? preempt_count_sub+0x50/0x80 [ 25.356113] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.356150] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.356185] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.356245] kthread+0x337/0x6f0 [ 25.356296] ? trace_preempt_on+0x20/0xc0 [ 25.356333] ? __pfx_kthread+0x10/0x10 [ 25.356363] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.356395] ? calculate_sigpending+0x7b/0xa0 [ 25.356431] ? __pfx_kthread+0x10/0x10 [ 25.356460] ret_from_fork+0x116/0x1d0 [ 25.356487] ? __pfx_kthread+0x10/0x10 [ 25.356548] ret_from_fork_asm+0x1a/0x30 [ 25.356594] </TASK> [ 25.356610] [ 25.370616] Allocated by task 283: [ 25.371289] kasan_save_stack+0x45/0x70 [ 25.371749] kasan_save_track+0x18/0x40 [ 25.372157] kasan_save_alloc_info+0x3b/0x50 [ 25.372603] __kasan_kmalloc+0xb7/0xc0 [ 25.372890] __kmalloc_cache_noprof+0x189/0x420 [ 25.373192] kasan_atomics+0x95/0x310 [ 25.373708] kunit_try_run_case+0x1a5/0x480 [ 25.374156] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.374629] kthread+0x337/0x6f0 [ 25.374874] ret_from_fork+0x116/0x1d0 [ 25.375217] ret_from_fork_asm+0x1a/0x30 [ 25.375678] [ 25.375832] The buggy address belongs to the object at ffff8881039d9c80 [ 25.375832] which belongs to the cache kmalloc-64 of size 64 [ 25.376598] The buggy address is located 0 bytes to the right of [ 25.376598] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 25.377436] [ 25.380548] The buggy address belongs to the physical page: [ 25.380947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 25.381454] flags: 0x200000000000000(node=0|zone=2) [ 25.381820] page_type: f5(slab) [ 25.382061] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.382452] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.382993] page dumped because: kasan: bad access detected [ 25.383851] [ 25.384074] Memory state around the buggy address: [ 25.384527] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.385552] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.386240] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.388277] ^ [ 25.388622] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.390079] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.390833] ================================================================== [ 24.477127] ================================================================== [ 24.478461] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 24.479421] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 24.479877] [ 24.480070] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 24.480181] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.480219] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.480283] Call Trace: [ 24.480795] <TASK> [ 24.480887] dump_stack_lvl+0x73/0xb0 [ 24.480995] print_report+0xd1/0x650 [ 24.481079] ? __virt_addr_valid+0x1db/0x2d0 [ 24.481321] ? kasan_atomics_helper+0xde0/0x5450 [ 24.481401] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.481481] ? kasan_atomics_helper+0xde0/0x5450 [ 24.481642] kasan_report+0x141/0x180 [ 24.481729] ? kasan_atomics_helper+0xde0/0x5450 [ 24.481819] kasan_check_range+0x10c/0x1c0 [ 24.481902] __kasan_check_write+0x18/0x20 [ 24.481975] kasan_atomics_helper+0xde0/0x5450 [ 24.482085] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.482173] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.482268] ? kasan_atomics+0x152/0x310 [ 24.482323] kasan_atomics+0x1dc/0x310 [ 24.482360] ? __pfx_kasan_atomics+0x10/0x10 [ 24.482398] ? __pfx_read_tsc+0x10/0x10 [ 24.482433] ? ktime_get_ts64+0x86/0x230 [ 24.482471] kunit_try_run_case+0x1a5/0x480 [ 24.482559] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.482641] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.482715] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.482787] ? __kthread_parkme+0x82/0x180 [ 24.482856] ? preempt_count_sub+0x50/0x80 [ 24.482927] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.483002] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.483082] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.483127] kthread+0x337/0x6f0 [ 24.483156] ? trace_preempt_on+0x20/0xc0 [ 24.483191] ? __pfx_kthread+0x10/0x10 [ 24.483230] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.483303] ? calculate_sigpending+0x7b/0xa0 [ 24.483342] ? __pfx_kthread+0x10/0x10 [ 24.483374] ret_from_fork+0x116/0x1d0 [ 24.483401] ? __pfx_kthread+0x10/0x10 [ 24.483432] ret_from_fork_asm+0x1a/0x30 [ 24.483476] </TASK> [ 24.483492] [ 24.507300] Allocated by task 283: [ 24.507979] kasan_save_stack+0x45/0x70 [ 24.508578] kasan_save_track+0x18/0x40 [ 24.508998] kasan_save_alloc_info+0x3b/0x50 [ 24.509959] __kasan_kmalloc+0xb7/0xc0 [ 24.510439] __kmalloc_cache_noprof+0x189/0x420 [ 24.511490] kasan_atomics+0x95/0x310 [ 24.512139] kunit_try_run_case+0x1a5/0x480 [ 24.512620] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.513058] kthread+0x337/0x6f0 [ 24.513386] ret_from_fork+0x116/0x1d0 [ 24.514099] ret_from_fork_asm+0x1a/0x30 [ 24.515321] [ 24.515725] The buggy address belongs to the object at ffff8881039d9c80 [ 24.515725] which belongs to the cache kmalloc-64 of size 64 [ 24.516769] The buggy address is located 0 bytes to the right of [ 24.516769] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 24.519049] [ 24.519248] The buggy address belongs to the physical page: [ 24.519776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 24.520836] flags: 0x200000000000000(node=0|zone=2) [ 24.522347] page_type: f5(slab) [ 24.522969] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.524198] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.525239] page dumped because: kasan: bad access detected [ 24.526154] [ 24.526423] Memory state around the buggy address: [ 24.527517] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.528387] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.529291] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.530064] ^ [ 24.530804] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.531197] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.532715] ================================================================== [ 25.000301] ================================================================== [ 25.000841] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 25.001492] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 25.002165] [ 25.002561] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 25.002692] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.002737] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.002805] Call Trace: [ 25.002861] <TASK> [ 25.002937] dump_stack_lvl+0x73/0xb0 [ 25.003067] print_report+0xd1/0x650 [ 25.003156] ? __virt_addr_valid+0x1db/0x2d0 [ 25.003307] ? kasan_atomics_helper+0x12e6/0x5450 [ 25.003421] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.003516] ? kasan_atomics_helper+0x12e6/0x5450 [ 25.003597] kasan_report+0x141/0x180 [ 25.003678] ? kasan_atomics_helper+0x12e6/0x5450 [ 25.003769] kasan_check_range+0x10c/0x1c0 [ 25.003875] __kasan_check_write+0x18/0x20 [ 25.003981] kasan_atomics_helper+0x12e6/0x5450 [ 25.004069] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.004149] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.004326] ? kasan_atomics+0x152/0x310 [ 25.004416] kasan_atomics+0x1dc/0x310 [ 25.004476] ? __pfx_kasan_atomics+0x10/0x10 [ 25.004543] ? __pfx_read_tsc+0x10/0x10 [ 25.004582] ? ktime_get_ts64+0x86/0x230 [ 25.004620] kunit_try_run_case+0x1a5/0x480 [ 25.004660] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.004697] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.004733] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.004768] ? __kthread_parkme+0x82/0x180 [ 25.004800] ? preempt_count_sub+0x50/0x80 [ 25.004833] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.004870] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.004906] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.004942] kthread+0x337/0x6f0 [ 25.004971] ? trace_preempt_on+0x20/0xc0 [ 25.005005] ? __pfx_kthread+0x10/0x10 [ 25.005036] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.005069] ? calculate_sigpending+0x7b/0xa0 [ 25.005104] ? __pfx_kthread+0x10/0x10 [ 25.005134] ret_from_fork+0x116/0x1d0 [ 25.005162] ? __pfx_kthread+0x10/0x10 [ 25.005191] ret_from_fork_asm+0x1a/0x30 [ 25.005269] </TASK> [ 25.005291] [ 25.023064] Allocated by task 283: [ 25.023631] kasan_save_stack+0x45/0x70 [ 25.024302] kasan_save_track+0x18/0x40 [ 25.024837] kasan_save_alloc_info+0x3b/0x50 [ 25.025460] __kasan_kmalloc+0xb7/0xc0 [ 25.025962] __kmalloc_cache_noprof+0x189/0x420 [ 25.026635] kasan_atomics+0x95/0x310 [ 25.027110] kunit_try_run_case+0x1a5/0x480 [ 25.027693] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.028348] kthread+0x337/0x6f0 [ 25.028854] ret_from_fork+0x116/0x1d0 [ 25.029404] ret_from_fork_asm+0x1a/0x30 [ 25.029928] [ 25.030265] The buggy address belongs to the object at ffff8881039d9c80 [ 25.030265] which belongs to the cache kmalloc-64 of size 64 [ 25.031179] The buggy address is located 0 bytes to the right of [ 25.031179] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 25.032545] [ 25.032816] The buggy address belongs to the physical page: [ 25.033454] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 25.034106] flags: 0x200000000000000(node=0|zone=2) [ 25.034798] page_type: f5(slab) [ 25.035160] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.035947] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.036796] page dumped because: kasan: bad access detected [ 25.037392] [ 25.037663] Memory state around the buggy address: [ 25.038277] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.039023] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.039830] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.040541] ^ [ 25.040914] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.041585] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.042163] ================================================================== [ 23.628934] ================================================================== [ 23.629476] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 23.631985] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 23.632986] [ 23.633238] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 23.633441] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.633488] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.633595] Call Trace: [ 23.633673] <TASK> [ 23.633731] dump_stack_lvl+0x73/0xb0 [ 23.633841] print_report+0xd1/0x650 [ 23.633927] ? __virt_addr_valid+0x1db/0x2d0 [ 23.634008] ? kasan_atomics_helper+0x4b3a/0x5450 [ 23.634087] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.634170] ? kasan_atomics_helper+0x4b3a/0x5450 [ 23.634248] kasan_report+0x141/0x180 [ 23.634566] ? kasan_atomics_helper+0x4b3a/0x5450 [ 23.634660] __asan_report_store4_noabort+0x1b/0x30 [ 23.634739] kasan_atomics_helper+0x4b3a/0x5450 [ 23.634820] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.634938] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.634992] ? kasan_atomics+0x152/0x310 [ 23.635033] kasan_atomics+0x1dc/0x310 [ 23.635070] ? __pfx_kasan_atomics+0x10/0x10 [ 23.635112] ? __pfx_read_tsc+0x10/0x10 [ 23.635147] ? ktime_get_ts64+0x86/0x230 [ 23.635185] kunit_try_run_case+0x1a5/0x480 [ 23.635254] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.635304] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.635343] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.635380] ? __kthread_parkme+0x82/0x180 [ 23.635413] ? preempt_count_sub+0x50/0x80 [ 23.635447] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.635484] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.635564] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.635654] kthread+0x337/0x6f0 [ 23.635728] ? trace_preempt_on+0x20/0xc0 [ 23.635809] ? __pfx_kthread+0x10/0x10 [ 23.635878] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.635952] ? calculate_sigpending+0x7b/0xa0 [ 23.636025] ? __pfx_kthread+0x10/0x10 [ 23.636061] ret_from_fork+0x116/0x1d0 [ 23.636092] ? __pfx_kthread+0x10/0x10 [ 23.636123] ret_from_fork_asm+0x1a/0x30 [ 23.636166] </TASK> [ 23.636181] [ 23.660368] Allocated by task 283: [ 23.662117] kasan_save_stack+0x45/0x70 [ 23.662871] kasan_save_track+0x18/0x40 [ 23.663327] kasan_save_alloc_info+0x3b/0x50 [ 23.664362] __kasan_kmalloc+0xb7/0xc0 [ 23.664739] __kmalloc_cache_noprof+0x189/0x420 [ 23.665077] kasan_atomics+0x95/0x310 [ 23.665592] kunit_try_run_case+0x1a5/0x480 [ 23.666864] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.667975] kthread+0x337/0x6f0 [ 23.668441] ret_from_fork+0x116/0x1d0 [ 23.668914] ret_from_fork_asm+0x1a/0x30 [ 23.670069] [ 23.670620] The buggy address belongs to the object at ffff8881039d9c80 [ 23.670620] which belongs to the cache kmalloc-64 of size 64 [ 23.671990] The buggy address is located 0 bytes to the right of [ 23.671990] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 23.673761] [ 23.674446] The buggy address belongs to the physical page: [ 23.674849] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 23.675725] flags: 0x200000000000000(node=0|zone=2) [ 23.676178] page_type: f5(slab) [ 23.676572] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.677169] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.678069] page dumped because: kasan: bad access detected [ 23.678442] [ 23.678716] Memory state around the buggy address: [ 23.680132] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.681189] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.681996] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.683096] ^ [ 23.683563] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.684094] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.684855] ================================================================== [ 24.598485] ================================================================== [ 24.599321] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 24.601395] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 24.602148] [ 24.602699] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 24.602836] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.602877] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.602963] Call Trace: [ 24.603016] <TASK> [ 24.603071] dump_stack_lvl+0x73/0xb0 [ 24.603184] print_report+0xd1/0x650 [ 24.603561] ? __virt_addr_valid+0x1db/0x2d0 [ 24.603652] ? kasan_atomics_helper+0xf10/0x5450 [ 24.603735] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.603814] ? kasan_atomics_helper+0xf10/0x5450 [ 24.603892] kasan_report+0x141/0x180 [ 24.603930] ? kasan_atomics_helper+0xf10/0x5450 [ 24.603971] kasan_check_range+0x10c/0x1c0 [ 24.604006] __kasan_check_write+0x18/0x20 [ 24.604037] kasan_atomics_helper+0xf10/0x5450 [ 24.604073] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.604107] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.604152] ? kasan_atomics+0x152/0x310 [ 24.604193] kasan_atomics+0x1dc/0x310 [ 24.604237] ? __pfx_kasan_atomics+0x10/0x10 [ 24.604309] ? __pfx_read_tsc+0x10/0x10 [ 24.604345] ? ktime_get_ts64+0x86/0x230 [ 24.604382] kunit_try_run_case+0x1a5/0x480 [ 24.604424] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.604461] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.604523] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.604952] ? __kthread_parkme+0x82/0x180 [ 24.604998] ? preempt_count_sub+0x50/0x80 [ 24.605036] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.605076] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.605115] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.605153] kthread+0x337/0x6f0 [ 24.605186] ? trace_preempt_on+0x20/0xc0 [ 24.605225] ? __pfx_kthread+0x10/0x10 [ 24.605304] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.605343] ? calculate_sigpending+0x7b/0xa0 [ 24.605382] ? __pfx_kthread+0x10/0x10 [ 24.605415] ret_from_fork+0x116/0x1d0 [ 24.605445] ? __pfx_kthread+0x10/0x10 [ 24.605475] ret_from_fork_asm+0x1a/0x30 [ 24.605552] </TASK> [ 24.605606] [ 24.626230] Allocated by task 283: [ 24.627320] kasan_save_stack+0x45/0x70 [ 24.628210] kasan_save_track+0x18/0x40 [ 24.629116] kasan_save_alloc_info+0x3b/0x50 [ 24.630376] __kasan_kmalloc+0xb7/0xc0 [ 24.630712] __kmalloc_cache_noprof+0x189/0x420 [ 24.631182] kasan_atomics+0x95/0x310 [ 24.632412] kunit_try_run_case+0x1a5/0x480 [ 24.632862] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.633349] kthread+0x337/0x6f0 [ 24.633713] ret_from_fork+0x116/0x1d0 [ 24.634131] ret_from_fork_asm+0x1a/0x30 [ 24.635132] [ 24.635377] The buggy address belongs to the object at ffff8881039d9c80 [ 24.635377] which belongs to the cache kmalloc-64 of size 64 [ 24.636812] The buggy address is located 0 bytes to the right of [ 24.636812] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 24.638268] [ 24.638947] The buggy address belongs to the physical page: [ 24.639636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 24.640887] flags: 0x200000000000000(node=0|zone=2) [ 24.641314] page_type: f5(slab) [ 24.642193] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.642890] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.644129] page dumped because: kasan: bad access detected [ 24.644599] [ 24.644938] Memory state around the buggy address: [ 24.645877] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.647027] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.648169] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.648589] ^ [ 24.648905] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.649165] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.650155] ================================================================== [ 26.022326] ================================================================== [ 26.022961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 26.023636] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 26.024331] [ 26.024638] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 26.024770] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.024813] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.024877] Call Trace: [ 26.024933] <TASK> [ 26.024989] dump_stack_lvl+0x73/0xb0 [ 26.025083] print_report+0xd1/0x650 [ 26.025166] ? __virt_addr_valid+0x1db/0x2d0 [ 26.025301] ? kasan_atomics_helper+0x1f43/0x5450 [ 26.025385] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.025470] ? kasan_atomics_helper+0x1f43/0x5450 [ 26.025570] kasan_report+0x141/0x180 [ 26.025662] ? kasan_atomics_helper+0x1f43/0x5450 [ 26.025752] kasan_check_range+0x10c/0x1c0 [ 26.025841] __kasan_check_write+0x18/0x20 [ 26.025921] kasan_atomics_helper+0x1f43/0x5450 [ 26.026008] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.026091] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.026194] ? kasan_atomics+0x152/0x310 [ 26.026333] kasan_atomics+0x1dc/0x310 [ 26.026414] ? __pfx_kasan_atomics+0x10/0x10 [ 26.026519] ? __pfx_read_tsc+0x10/0x10 [ 26.026596] ? ktime_get_ts64+0x86/0x230 [ 26.026688] kunit_try_run_case+0x1a5/0x480 [ 26.026781] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.026865] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.026949] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.027034] ? __kthread_parkme+0x82/0x180 [ 26.027112] ? preempt_count_sub+0x50/0x80 [ 26.027194] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.027288] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.027331] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.027370] kthread+0x337/0x6f0 [ 26.027402] ? trace_preempt_on+0x20/0xc0 [ 26.027441] ? __pfx_kthread+0x10/0x10 [ 26.027472] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.027528] ? calculate_sigpending+0x7b/0xa0 [ 26.027571] ? __pfx_kthread+0x10/0x10 [ 26.027603] ret_from_fork+0x116/0x1d0 [ 26.027630] ? __pfx_kthread+0x10/0x10 [ 26.027661] ret_from_fork_asm+0x1a/0x30 [ 26.027704] </TASK> [ 26.027720] [ 26.044663] Allocated by task 283: [ 26.045176] kasan_save_stack+0x45/0x70 [ 26.045716] kasan_save_track+0x18/0x40 [ 26.046204] kasan_save_alloc_info+0x3b/0x50 [ 26.046712] __kasan_kmalloc+0xb7/0xc0 [ 26.047130] __kmalloc_cache_noprof+0x189/0x420 [ 26.047646] kasan_atomics+0x95/0x310 [ 26.048077] kunit_try_run_case+0x1a5/0x480 [ 26.048429] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.049085] kthread+0x337/0x6f0 [ 26.049703] ret_from_fork+0x116/0x1d0 [ 26.050064] ret_from_fork_asm+0x1a/0x30 [ 26.050401] [ 26.050625] The buggy address belongs to the object at ffff8881039d9c80 [ 26.050625] which belongs to the cache kmalloc-64 of size 64 [ 26.051670] The buggy address is located 0 bytes to the right of [ 26.051670] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 26.052887] [ 26.053085] The buggy address belongs to the physical page: [ 26.053462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 26.054207] flags: 0x200000000000000(node=0|zone=2) [ 26.054852] page_type: f5(slab) [ 26.055295] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.056023] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.056653] page dumped because: kasan: bad access detected [ 26.057140] [ 26.057493] Memory state around the buggy address: [ 26.057978] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.058701] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.059157] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.059862] ^ [ 26.060372] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.061038] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.061954] ================================================================== [ 23.525037] ================================================================== [ 23.525521] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 23.526130] Read of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 23.527521] [ 23.527851] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 23.527984] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.528029] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.528096] Call Trace: [ 23.528151] <TASK> [ 23.528203] dump_stack_lvl+0x73/0xb0 [ 23.528780] print_report+0xd1/0x650 [ 23.528903] ? __virt_addr_valid+0x1db/0x2d0 [ 23.528985] ? kasan_atomics_helper+0x4b54/0x5450 [ 23.529053] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.529092] ? kasan_atomics_helper+0x4b54/0x5450 [ 23.529128] kasan_report+0x141/0x180 [ 23.529162] ? kasan_atomics_helper+0x4b54/0x5450 [ 23.529203] __asan_report_load4_noabort+0x18/0x20 [ 23.529295] kasan_atomics_helper+0x4b54/0x5450 [ 23.529336] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.529371] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.529417] ? kasan_atomics+0x152/0x310 [ 23.529459] kasan_atomics+0x1dc/0x310 [ 23.529515] ? __pfx_kasan_atomics+0x10/0x10 [ 23.529633] ? __pfx_read_tsc+0x10/0x10 [ 23.529713] ? ktime_get_ts64+0x86/0x230 [ 23.529755] kunit_try_run_case+0x1a5/0x480 [ 23.529798] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.529835] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.529871] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.529905] ? __kthread_parkme+0x82/0x180 [ 23.529936] ? preempt_count_sub+0x50/0x80 [ 23.529970] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.530007] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.530042] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.530078] kthread+0x337/0x6f0 [ 23.530107] ? trace_preempt_on+0x20/0xc0 [ 23.530140] ? __pfx_kthread+0x10/0x10 [ 23.530170] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.530203] ? calculate_sigpending+0x7b/0xa0 [ 23.530277] ? __pfx_kthread+0x10/0x10 [ 23.530313] ret_from_fork+0x116/0x1d0 [ 23.530340] ? __pfx_kthread+0x10/0x10 [ 23.530370] ret_from_fork_asm+0x1a/0x30 [ 23.530412] </TASK> [ 23.530428] [ 23.551370] Allocated by task 283: [ 23.552201] kasan_save_stack+0x45/0x70 [ 23.552911] kasan_save_track+0x18/0x40 [ 23.553532] kasan_save_alloc_info+0x3b/0x50 [ 23.554359] __kasan_kmalloc+0xb7/0xc0 [ 23.554667] __kmalloc_cache_noprof+0x189/0x420 [ 23.555365] kasan_atomics+0x95/0x310 [ 23.555992] kunit_try_run_case+0x1a5/0x480 [ 23.556842] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.557473] kthread+0x337/0x6f0 [ 23.558004] ret_from_fork+0x116/0x1d0 [ 23.558464] ret_from_fork_asm+0x1a/0x30 [ 23.559198] [ 23.559756] The buggy address belongs to the object at ffff8881039d9c80 [ 23.559756] which belongs to the cache kmalloc-64 of size 64 [ 23.562042] The buggy address is located 0 bytes to the right of [ 23.562042] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 23.563584] [ 23.564071] The buggy address belongs to the physical page: [ 23.564851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 23.566350] flags: 0x200000000000000(node=0|zone=2) [ 23.566921] page_type: f5(slab) [ 23.567226] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.568338] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.568804] page dumped because: kasan: bad access detected [ 23.570096] [ 23.570682] Memory state around the buggy address: [ 23.571212] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.572136] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.572654] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.573194] ^ [ 23.574374] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.575423] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.576533] ================================================================== [ 23.857955] ================================================================== [ 23.858695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 23.859770] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 23.860296] [ 23.861319] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 23.861454] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.861515] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.861782] Call Trace: [ 23.861844] <TASK> [ 23.861899] dump_stack_lvl+0x73/0xb0 [ 23.862007] print_report+0xd1/0x650 [ 23.862094] ? __virt_addr_valid+0x1db/0x2d0 [ 23.862174] ? kasan_atomics_helper+0x72f/0x5450 [ 23.862272] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.862353] ? kasan_atomics_helper+0x72f/0x5450 [ 23.862429] kasan_report+0x141/0x180 [ 23.862532] ? kasan_atomics_helper+0x72f/0x5450 [ 23.862627] kasan_check_range+0x10c/0x1c0 [ 23.862841] __kasan_check_write+0x18/0x20 [ 23.862923] kasan_atomics_helper+0x72f/0x5450 [ 23.863001] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.863042] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.863092] ? kasan_atomics+0x152/0x310 [ 23.863134] kasan_atomics+0x1dc/0x310 [ 23.863169] ? __pfx_kasan_atomics+0x10/0x10 [ 23.863207] ? __pfx_read_tsc+0x10/0x10 [ 23.863278] ? ktime_get_ts64+0x86/0x230 [ 23.863321] kunit_try_run_case+0x1a5/0x480 [ 23.863363] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.863402] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.863439] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.863474] ? __kthread_parkme+0x82/0x180 [ 23.863542] ? preempt_count_sub+0x50/0x80 [ 23.863732] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.863776] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.863817] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.863855] kthread+0x337/0x6f0 [ 23.863887] ? trace_preempt_on+0x20/0xc0 [ 23.863923] ? __pfx_kthread+0x10/0x10 [ 23.863955] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.863989] ? calculate_sigpending+0x7b/0xa0 [ 23.864026] ? __pfx_kthread+0x10/0x10 [ 23.864059] ret_from_fork+0x116/0x1d0 [ 23.864086] ? __pfx_kthread+0x10/0x10 [ 23.864117] ret_from_fork_asm+0x1a/0x30 [ 23.864162] </TASK> [ 23.864179] [ 23.880185] Allocated by task 283: [ 23.880620] kasan_save_stack+0x45/0x70 [ 23.881272] kasan_save_track+0x18/0x40 [ 23.881707] kasan_save_alloc_info+0x3b/0x50 [ 23.882139] __kasan_kmalloc+0xb7/0xc0 [ 23.882527] __kmalloc_cache_noprof+0x189/0x420 [ 23.883072] kasan_atomics+0x95/0x310 [ 23.883652] kunit_try_run_case+0x1a5/0x480 [ 23.884120] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.884528] kthread+0x337/0x6f0 [ 23.884944] ret_from_fork+0x116/0x1d0 [ 23.885393] ret_from_fork_asm+0x1a/0x30 [ 23.885775] [ 23.886023] The buggy address belongs to the object at ffff8881039d9c80 [ 23.886023] which belongs to the cache kmalloc-64 of size 64 [ 23.886943] The buggy address is located 0 bytes to the right of [ 23.886943] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 23.887868] [ 23.888127] The buggy address belongs to the physical page: [ 23.888711] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 23.889683] flags: 0x200000000000000(node=0|zone=2) [ 23.890052] page_type: f5(slab) [ 23.890403] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.891460] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.892141] page dumped because: kasan: bad access detected [ 23.892647] [ 23.892855] Memory state around the buggy address: [ 23.893254] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.893796] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.894478] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.894947] ^ [ 23.895629] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.896254] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.896941] ================================================================== [ 26.247940] ================================================================== [ 26.249374] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 26.249854] Read of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 26.250938] [ 26.251372] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 26.251522] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.251564] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.251628] Call Trace: [ 26.251683] <TASK> [ 26.251741] dump_stack_lvl+0x73/0xb0 [ 26.251846] print_report+0xd1/0x650 [ 26.251927] ? __virt_addr_valid+0x1db/0x2d0 [ 26.252019] ? kasan_atomics_helper+0x4fb2/0x5450 [ 26.252095] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.252173] ? kasan_atomics_helper+0x4fb2/0x5450 [ 26.252277] kasan_report+0x141/0x180 [ 26.252364] ? kasan_atomics_helper+0x4fb2/0x5450 [ 26.252455] __asan_report_load8_noabort+0x18/0x20 [ 26.252561] kasan_atomics_helper+0x4fb2/0x5450 [ 26.252638] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.252717] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.252835] ? kasan_atomics+0x152/0x310 [ 26.252889] kasan_atomics+0x1dc/0x310 [ 26.252929] ? __pfx_kasan_atomics+0x10/0x10 [ 26.252968] ? __pfx_read_tsc+0x10/0x10 [ 26.253005] ? ktime_get_ts64+0x86/0x230 [ 26.253047] kunit_try_run_case+0x1a5/0x480 [ 26.253091] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.253129] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.253168] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.253204] ? __kthread_parkme+0x82/0x180 [ 26.253279] ? preempt_count_sub+0x50/0x80 [ 26.253324] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.253364] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.253401] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.253438] kthread+0x337/0x6f0 [ 26.253469] ? trace_preempt_on+0x20/0xc0 [ 26.253557] ? __pfx_kthread+0x10/0x10 [ 26.253625] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.253686] ? calculate_sigpending+0x7b/0xa0 [ 26.253749] ? __pfx_kthread+0x10/0x10 [ 26.253812] ret_from_fork+0x116/0x1d0 [ 26.253847] ? __pfx_kthread+0x10/0x10 [ 26.253881] ret_from_fork_asm+0x1a/0x30 [ 26.253926] </TASK> [ 26.253943] [ 26.268087] Allocated by task 283: [ 26.268775] kasan_save_stack+0x45/0x70 [ 26.269227] kasan_save_track+0x18/0x40 [ 26.269717] kasan_save_alloc_info+0x3b/0x50 [ 26.270178] __kasan_kmalloc+0xb7/0xc0 [ 26.270642] __kmalloc_cache_noprof+0x189/0x420 [ 26.271148] kasan_atomics+0x95/0x310 [ 26.271575] kunit_try_run_case+0x1a5/0x480 [ 26.271967] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.272483] kthread+0x337/0x6f0 [ 26.272896] ret_from_fork+0x116/0x1d0 [ 26.273315] ret_from_fork_asm+0x1a/0x30 [ 26.273702] [ 26.273898] The buggy address belongs to the object at ffff8881039d9c80 [ 26.273898] which belongs to the cache kmalloc-64 of size 64 [ 26.274763] The buggy address is located 0 bytes to the right of [ 26.274763] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 26.276202] [ 26.276474] The buggy address belongs to the physical page: [ 26.276879] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 26.277435] flags: 0x200000000000000(node=0|zone=2) [ 26.277978] page_type: f5(slab) [ 26.278540] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.279150] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.279640] page dumped because: kasan: bad access detected [ 26.280007] [ 26.280190] Memory state around the buggy address: [ 26.280695] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.281314] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.281979] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.282955] ^ [ 26.283409] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.283923] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.284466] ================================================================== [ 23.465120] ================================================================== [ 23.465883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 23.466670] Read of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 23.467277] [ 23.467531] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 23.467695] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.467742] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.467808] Call Trace: [ 23.467908] <TASK> [ 23.467970] dump_stack_lvl+0x73/0xb0 [ 23.468058] print_report+0xd1/0x650 [ 23.468137] ? __virt_addr_valid+0x1db/0x2d0 [ 23.468208] ? kasan_atomics_helper+0x3df/0x5450 [ 23.468324] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.468413] ? kasan_atomics_helper+0x3df/0x5450 [ 23.468489] kasan_report+0x141/0x180 [ 23.468631] ? kasan_atomics_helper+0x3df/0x5450 [ 23.468718] kasan_check_range+0x10c/0x1c0 [ 23.468800] __kasan_check_read+0x15/0x20 [ 23.468872] kasan_atomics_helper+0x3df/0x5450 [ 23.468950] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.469031] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.469128] ? kasan_atomics+0x152/0x310 [ 23.469258] kasan_atomics+0x1dc/0x310 [ 23.469346] ? __pfx_kasan_atomics+0x10/0x10 [ 23.469473] ? __pfx_read_tsc+0x10/0x10 [ 23.469613] ? ktime_get_ts64+0x86/0x230 [ 23.469721] kunit_try_run_case+0x1a5/0x480 [ 23.469815] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.469892] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.469971] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.470052] ? __kthread_parkme+0x82/0x180 [ 23.470129] ? preempt_count_sub+0x50/0x80 [ 23.470210] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.470320] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.470407] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.470494] kthread+0x337/0x6f0 [ 23.470583] ? trace_preempt_on+0x20/0xc0 [ 23.470665] ? __pfx_kthread+0x10/0x10 [ 23.470740] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.470817] ? calculate_sigpending+0x7b/0xa0 [ 23.470963] ? __pfx_kthread+0x10/0x10 [ 23.471022] ret_from_fork+0x116/0x1d0 [ 23.471058] ? __pfx_kthread+0x10/0x10 [ 23.471089] ret_from_fork_asm+0x1a/0x30 [ 23.471133] </TASK> [ 23.471150] [ 23.491294] Allocated by task 283: [ 23.492162] kasan_save_stack+0x45/0x70 [ 23.493483] kasan_save_track+0x18/0x40 [ 23.495325] kasan_save_alloc_info+0x3b/0x50 [ 23.496749] __kasan_kmalloc+0xb7/0xc0 [ 23.497948] __kmalloc_cache_noprof+0x189/0x420 [ 23.499290] kasan_atomics+0x95/0x310 [ 23.499909] kunit_try_run_case+0x1a5/0x480 [ 23.500205] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.502936] kthread+0x337/0x6f0 [ 23.504131] ret_from_fork+0x116/0x1d0 [ 23.504819] ret_from_fork_asm+0x1a/0x30 [ 23.505092] [ 23.505246] The buggy address belongs to the object at ffff8881039d9c80 [ 23.505246] which belongs to the cache kmalloc-64 of size 64 [ 23.509071] The buggy address is located 0 bytes to the right of [ 23.509071] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 23.510913] [ 23.511168] The buggy address belongs to the physical page: [ 23.511645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 23.512477] flags: 0x200000000000000(node=0|zone=2) [ 23.513553] page_type: f5(slab) [ 23.513878] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.514868] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.516764] page dumped because: kasan: bad access detected [ 23.517749] [ 23.517984] Memory state around the buggy address: [ 23.518384] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.519200] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.520588] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.521207] ^ [ 23.522014] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.523032] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.523455] ================================================================== [ 25.086829] ================================================================== [ 25.087465] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 25.088174] Read of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 25.088802] [ 25.089129] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 25.089267] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.089314] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.089404] Call Trace: [ 25.089487] <TASK> [ 25.089561] dump_stack_lvl+0x73/0xb0 [ 25.089647] print_report+0xd1/0x650 [ 25.089690] ? __virt_addr_valid+0x1db/0x2d0 [ 25.089729] ? kasan_atomics_helper+0x13b5/0x5450 [ 25.089808] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.089893] ? kasan_atomics_helper+0x13b5/0x5450 [ 25.090024] kasan_report+0x141/0x180 [ 25.090114] ? kasan_atomics_helper+0x13b5/0x5450 [ 25.090210] kasan_check_range+0x10c/0x1c0 [ 25.090312] __kasan_check_read+0x15/0x20 [ 25.090420] kasan_atomics_helper+0x13b5/0x5450 [ 25.090518] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.090566] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.090618] ? kasan_atomics+0x152/0x310 [ 25.090659] kasan_atomics+0x1dc/0x310 [ 25.090704] ? __pfx_kasan_atomics+0x10/0x10 [ 25.090775] ? __pfx_read_tsc+0x10/0x10 [ 25.090828] ? ktime_get_ts64+0x86/0x230 [ 25.090869] kunit_try_run_case+0x1a5/0x480 [ 25.090912] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.090950] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.090986] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.091021] ? __kthread_parkme+0x82/0x180 [ 25.091053] ? preempt_count_sub+0x50/0x80 [ 25.091086] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.091125] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.091161] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.091197] kthread+0x337/0x6f0 [ 25.091240] ? trace_preempt_on+0x20/0xc0 [ 25.091299] ? __pfx_kthread+0x10/0x10 [ 25.091333] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.091366] ? calculate_sigpending+0x7b/0xa0 [ 25.091404] ? __pfx_kthread+0x10/0x10 [ 25.091434] ret_from_fork+0x116/0x1d0 [ 25.091464] ? __pfx_kthread+0x10/0x10 [ 25.091493] ret_from_fork_asm+0x1a/0x30 [ 25.091564] </TASK> [ 25.091581] [ 25.112372] Allocated by task 283: [ 25.113906] kasan_save_stack+0x45/0x70 [ 25.115025] kasan_save_track+0x18/0x40 [ 25.115769] kasan_save_alloc_info+0x3b/0x50 [ 25.116707] __kasan_kmalloc+0xb7/0xc0 [ 25.117048] __kmalloc_cache_noprof+0x189/0x420 [ 25.117965] kasan_atomics+0x95/0x310 [ 25.118569] kunit_try_run_case+0x1a5/0x480 [ 25.119042] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.119774] kthread+0x337/0x6f0 [ 25.120371] ret_from_fork+0x116/0x1d0 [ 25.120769] ret_from_fork_asm+0x1a/0x30 [ 25.121560] [ 25.121835] The buggy address belongs to the object at ffff8881039d9c80 [ 25.121835] which belongs to the cache kmalloc-64 of size 64 [ 25.122921] The buggy address is located 0 bytes to the right of [ 25.122921] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 25.123949] [ 25.124247] The buggy address belongs to the physical page: [ 25.124843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 25.125643] flags: 0x200000000000000(node=0|zone=2) [ 25.126232] page_type: f5(slab) [ 25.126811] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.127421] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.128173] page dumped because: kasan: bad access detected [ 25.128871] [ 25.129088] Memory state around the buggy address: [ 25.129791] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.130393] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.130978] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.131674] ^ [ 25.132027] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.132995] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.133731] ================================================================== [ 25.711484] ================================================================== [ 25.712210] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 25.713032] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 25.713696] [ 25.713895] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 25.714005] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.714043] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.714102] Call Trace: [ 25.714146] <TASK> [ 25.714192] dump_stack_lvl+0x73/0xb0 [ 25.714334] print_report+0xd1/0x650 [ 25.714481] ? __virt_addr_valid+0x1db/0x2d0 [ 25.714628] ? kasan_atomics_helper+0x1b22/0x5450 [ 25.714718] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.714799] ? kasan_atomics_helper+0x1b22/0x5450 [ 25.714879] kasan_report+0x141/0x180 [ 25.714959] ? kasan_atomics_helper+0x1b22/0x5450 [ 25.715046] kasan_check_range+0x10c/0x1c0 [ 25.715131] __kasan_check_write+0x18/0x20 [ 25.715201] kasan_atomics_helper+0x1b22/0x5450 [ 25.715389] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.715469] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.715587] ? kasan_atomics+0x152/0x310 [ 25.715669] kasan_atomics+0x1dc/0x310 [ 25.715749] ? __pfx_kasan_atomics+0x10/0x10 [ 25.715834] ? __pfx_read_tsc+0x10/0x10 [ 25.715913] ? ktime_get_ts64+0x86/0x230 [ 25.716070] kunit_try_run_case+0x1a5/0x480 [ 25.716251] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.716338] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.716418] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.716514] ? __kthread_parkme+0x82/0x180 [ 25.716560] ? preempt_count_sub+0x50/0x80 [ 25.716597] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.716636] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.716672] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.716708] kthread+0x337/0x6f0 [ 25.716738] ? trace_preempt_on+0x20/0xc0 [ 25.716773] ? __pfx_kthread+0x10/0x10 [ 25.716805] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.716837] ? calculate_sigpending+0x7b/0xa0 [ 25.716872] ? __pfx_kthread+0x10/0x10 [ 25.716903] ret_from_fork+0x116/0x1d0 [ 25.716931] ? __pfx_kthread+0x10/0x10 [ 25.716961] ret_from_fork_asm+0x1a/0x30 [ 25.717005] </TASK> [ 25.717022] [ 25.735465] Allocated by task 283: [ 25.736078] kasan_save_stack+0x45/0x70 [ 25.736730] kasan_save_track+0x18/0x40 [ 25.738181] kasan_save_alloc_info+0x3b/0x50 [ 25.739147] __kasan_kmalloc+0xb7/0xc0 [ 25.739589] __kmalloc_cache_noprof+0x189/0x420 [ 25.740321] kasan_atomics+0x95/0x310 [ 25.740780] kunit_try_run_case+0x1a5/0x480 [ 25.741212] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.742066] kthread+0x337/0x6f0 [ 25.742529] ret_from_fork+0x116/0x1d0 [ 25.742975] ret_from_fork_asm+0x1a/0x30 [ 25.743519] [ 25.743723] The buggy address belongs to the object at ffff8881039d9c80 [ 25.743723] which belongs to the cache kmalloc-64 of size 64 [ 25.744673] The buggy address is located 0 bytes to the right of [ 25.744673] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 25.745645] [ 25.745964] The buggy address belongs to the physical page: [ 25.746397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 25.747072] flags: 0x200000000000000(node=0|zone=2) [ 25.747741] page_type: f5(slab) [ 25.748207] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.748874] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.749657] page dumped because: kasan: bad access detected [ 25.750307] [ 25.750565] Memory state around the buggy address: [ 25.751026] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.751802] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.752570] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.753307] ^ [ 25.753903] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.754629] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.755375] ================================================================== [ 24.824104] ================================================================== [ 24.826781] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 24.827480] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 24.829124] [ 24.829378] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 24.829489] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.829545] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.829601] Call Trace: [ 24.829662] <TASK> [ 24.829706] dump_stack_lvl+0x73/0xb0 [ 24.829788] print_report+0xd1/0x650 [ 24.829848] ? __virt_addr_valid+0x1db/0x2d0 [ 24.829907] ? kasan_atomics_helper+0x1148/0x5450 [ 24.829964] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.830021] ? kasan_atomics_helper+0x1148/0x5450 [ 24.830079] kasan_report+0x141/0x180 [ 24.830133] ? kasan_atomics_helper+0x1148/0x5450 [ 24.830283] kasan_check_range+0x10c/0x1c0 [ 24.830366] __kasan_check_write+0x18/0x20 [ 24.830435] kasan_atomics_helper+0x1148/0x5450 [ 24.830561] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.830679] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.830830] ? kasan_atomics+0x152/0x310 [ 24.830948] kasan_atomics+0x1dc/0x310 [ 24.831025] ? __pfx_kasan_atomics+0x10/0x10 [ 24.831105] ? __pfx_read_tsc+0x10/0x10 [ 24.831179] ? ktime_get_ts64+0x86/0x230 [ 24.831315] kunit_try_run_case+0x1a5/0x480 [ 24.831404] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.831485] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.831591] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.832704] ? __kthread_parkme+0x82/0x180 [ 24.832778] ? preempt_count_sub+0x50/0x80 [ 24.832856] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.832932] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.833009] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.833094] kthread+0x337/0x6f0 [ 24.833171] ? trace_preempt_on+0x20/0xc0 [ 24.833267] ? __pfx_kthread+0x10/0x10 [ 24.833340] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.833404] ? calculate_sigpending+0x7b/0xa0 [ 24.833471] ? __pfx_kthread+0x10/0x10 [ 24.833557] ret_from_fork+0x116/0x1d0 [ 24.833639] ? __pfx_kthread+0x10/0x10 [ 24.833702] ret_from_fork_asm+0x1a/0x30 [ 24.833780] </TASK> [ 24.833815] [ 24.852129] Allocated by task 283: [ 24.852732] kasan_save_stack+0x45/0x70 [ 24.853214] kasan_save_track+0x18/0x40 [ 24.853824] kasan_save_alloc_info+0x3b/0x50 [ 24.854276] __kasan_kmalloc+0xb7/0xc0 [ 24.854692] __kmalloc_cache_noprof+0x189/0x420 [ 24.855298] kasan_atomics+0x95/0x310 [ 24.855744] kunit_try_run_case+0x1a5/0x480 [ 24.856128] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.856773] kthread+0x337/0x6f0 [ 24.857162] ret_from_fork+0x116/0x1d0 [ 24.857679] ret_from_fork_asm+0x1a/0x30 [ 24.858140] [ 24.858468] The buggy address belongs to the object at ffff8881039d9c80 [ 24.858468] which belongs to the cache kmalloc-64 of size 64 [ 24.859665] The buggy address is located 0 bytes to the right of [ 24.859665] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 24.860772] [ 24.860976] The buggy address belongs to the physical page: [ 24.861405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 24.862192] flags: 0x200000000000000(node=0|zone=2) [ 24.862819] page_type: f5(slab) [ 24.863274] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.864022] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.864705] page dumped because: kasan: bad access detected [ 24.865302] [ 24.865527] Memory state around the buggy address: [ 24.866017] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.866714] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.867268] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.868110] ^ [ 24.868661] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.869116] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.869826] ================================================================== [ 23.797044] ================================================================== [ 23.798024] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 23.799217] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 23.801212] [ 23.801434] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 23.801575] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.801631] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.802135] Call Trace: [ 23.802167] <TASK> [ 23.802195] dump_stack_lvl+0x73/0xb0 [ 23.802286] print_report+0xd1/0x650 [ 23.802326] ? __virt_addr_valid+0x1db/0x2d0 [ 23.802362] ? kasan_atomics_helper+0x697/0x5450 [ 23.802421] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.802458] ? kasan_atomics_helper+0x697/0x5450 [ 23.802536] kasan_report+0x141/0x180 [ 23.802673] ? kasan_atomics_helper+0x697/0x5450 [ 23.802765] kasan_check_range+0x10c/0x1c0 [ 23.802807] __kasan_check_write+0x18/0x20 [ 23.802863] kasan_atomics_helper+0x697/0x5450 [ 23.802899] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.802952] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.803033] ? kasan_atomics+0x152/0x310 [ 23.803104] kasan_atomics+0x1dc/0x310 [ 23.803149] ? __pfx_kasan_atomics+0x10/0x10 [ 23.803188] ? __pfx_read_tsc+0x10/0x10 [ 23.803226] ? ktime_get_ts64+0x86/0x230 [ 23.803300] kunit_try_run_case+0x1a5/0x480 [ 23.803344] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.803382] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.803418] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.803453] ? __kthread_parkme+0x82/0x180 [ 23.803483] ? preempt_count_sub+0x50/0x80 [ 23.803552] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.803643] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.803703] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.803743] kthread+0x337/0x6f0 [ 23.803773] ? trace_preempt_on+0x20/0xc0 [ 23.803810] ? __pfx_kthread+0x10/0x10 [ 23.803841] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.803874] ? calculate_sigpending+0x7b/0xa0 [ 23.803910] ? __pfx_kthread+0x10/0x10 [ 23.803942] ret_from_fork+0x116/0x1d0 [ 23.803970] ? __pfx_kthread+0x10/0x10 [ 23.804000] ret_from_fork_asm+0x1a/0x30 [ 23.804047] </TASK> [ 23.804063] [ 23.831384] Allocated by task 283: [ 23.832099] kasan_save_stack+0x45/0x70 [ 23.832714] kasan_save_track+0x18/0x40 [ 23.833040] kasan_save_alloc_info+0x3b/0x50 [ 23.833798] __kasan_kmalloc+0xb7/0xc0 [ 23.834641] __kmalloc_cache_noprof+0x189/0x420 [ 23.835411] kasan_atomics+0x95/0x310 [ 23.836124] kunit_try_run_case+0x1a5/0x480 [ 23.836972] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.838062] kthread+0x337/0x6f0 [ 23.839597] ret_from_fork+0x116/0x1d0 [ 23.840053] ret_from_fork_asm+0x1a/0x30 [ 23.840519] [ 23.840972] The buggy address belongs to the object at ffff8881039d9c80 [ 23.840972] which belongs to the cache kmalloc-64 of size 64 [ 23.842018] The buggy address is located 0 bytes to the right of [ 23.842018] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 23.844231] [ 23.844523] The buggy address belongs to the physical page: [ 23.845562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 23.846604] flags: 0x200000000000000(node=0|zone=2) [ 23.847733] page_type: f5(slab) [ 23.848152] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.848907] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.849949] page dumped because: kasan: bad access detected [ 23.851547] [ 23.851759] Memory state around the buggy address: [ 23.852107] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.852938] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.853720] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.854291] ^ [ 23.855408] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.856174] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.856926] ================================================================== [ 25.935754] ================================================================== [ 25.936321] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 25.937392] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 25.938199] [ 25.938587] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 25.938724] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.938765] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.938830] Call Trace: [ 25.938951] <TASK> [ 25.939080] dump_stack_lvl+0x73/0xb0 [ 25.939205] print_report+0xd1/0x650 [ 25.939364] ? __virt_addr_valid+0x1db/0x2d0 [ 25.939443] ? kasan_atomics_helper+0x1e12/0x5450 [ 25.939481] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.939549] ? kasan_atomics_helper+0x1e12/0x5450 [ 25.939584] kasan_report+0x141/0x180 [ 25.939619] ? kasan_atomics_helper+0x1e12/0x5450 [ 25.939658] kasan_check_range+0x10c/0x1c0 [ 25.939693] __kasan_check_write+0x18/0x20 [ 25.939722] kasan_atomics_helper+0x1e12/0x5450 [ 25.939754] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.939787] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.939832] ? kasan_atomics+0x152/0x310 [ 25.939871] kasan_atomics+0x1dc/0x310 [ 25.939904] ? __pfx_kasan_atomics+0x10/0x10 [ 25.939940] ? __pfx_read_tsc+0x10/0x10 [ 25.939972] ? ktime_get_ts64+0x86/0x230 [ 25.940008] kunit_try_run_case+0x1a5/0x480 [ 25.940048] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.940084] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.940119] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.940154] ? __kthread_parkme+0x82/0x180 [ 25.940186] ? preempt_count_sub+0x50/0x80 [ 25.940240] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.940310] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.940348] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.940386] kthread+0x337/0x6f0 [ 25.940414] ? trace_preempt_on+0x20/0xc0 [ 25.940450] ? __pfx_kthread+0x10/0x10 [ 25.940480] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.940546] ? calculate_sigpending+0x7b/0xa0 [ 25.940586] ? __pfx_kthread+0x10/0x10 [ 25.940618] ret_from_fork+0x116/0x1d0 [ 25.940646] ? __pfx_kthread+0x10/0x10 [ 25.940678] ret_from_fork_asm+0x1a/0x30 [ 25.940723] </TASK> [ 25.940740] [ 25.958033] Allocated by task 283: [ 25.958591] kasan_save_stack+0x45/0x70 [ 25.959138] kasan_save_track+0x18/0x40 [ 25.959626] kasan_save_alloc_info+0x3b/0x50 [ 25.960114] __kasan_kmalloc+0xb7/0xc0 [ 25.960569] __kmalloc_cache_noprof+0x189/0x420 [ 25.961089] kasan_atomics+0x95/0x310 [ 25.961595] kunit_try_run_case+0x1a5/0x480 [ 25.962024] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.962697] kthread+0x337/0x6f0 [ 25.963094] ret_from_fork+0x116/0x1d0 [ 25.963566] ret_from_fork_asm+0x1a/0x30 [ 25.964019] [ 25.964331] The buggy address belongs to the object at ffff8881039d9c80 [ 25.964331] which belongs to the cache kmalloc-64 of size 64 [ 25.965431] The buggy address is located 0 bytes to the right of [ 25.965431] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 25.966362] [ 25.966665] The buggy address belongs to the physical page: [ 25.967270] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 25.967991] flags: 0x200000000000000(node=0|zone=2) [ 25.968581] page_type: f5(slab) [ 25.968988] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.969641] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.970351] page dumped because: kasan: bad access detected [ 25.970847] [ 25.971090] Memory state around the buggy address: [ 25.971650] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.972320] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.972952] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.973649] ^ [ 25.974138] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.974795] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.975432] ================================================================== [ 25.977021] ================================================================== [ 25.977851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 25.978606] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 25.979459] [ 25.979752] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 25.979868] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.979903] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.979954] Call Trace: [ 25.979997] <TASK> [ 25.980042] dump_stack_lvl+0x73/0xb0 [ 25.980124] print_report+0xd1/0x650 [ 25.980197] ? __virt_addr_valid+0x1db/0x2d0 [ 25.980312] ? kasan_atomics_helper+0x1eaa/0x5450 [ 25.980374] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.980443] ? kasan_atomics_helper+0x1eaa/0x5450 [ 25.980571] kasan_report+0x141/0x180 [ 25.980658] ? kasan_atomics_helper+0x1eaa/0x5450 [ 25.980748] kasan_check_range+0x10c/0x1c0 [ 25.980831] __kasan_check_write+0x18/0x20 [ 25.980910] kasan_atomics_helper+0x1eaa/0x5450 [ 25.980993] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.981074] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.981176] ? kasan_atomics+0x152/0x310 [ 25.981346] kasan_atomics+0x1dc/0x310 [ 25.981424] ? __pfx_kasan_atomics+0x10/0x10 [ 25.981488] ? __pfx_read_tsc+0x10/0x10 [ 25.981582] ? ktime_get_ts64+0x86/0x230 [ 25.981717] kunit_try_run_case+0x1a5/0x480 [ 25.981823] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.981908] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.982034] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.982184] ? __kthread_parkme+0x82/0x180 [ 25.982293] ? preempt_count_sub+0x50/0x80 [ 25.982380] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.982466] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.982570] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.982653] kthread+0x337/0x6f0 [ 25.982726] ? trace_preempt_on+0x20/0xc0 [ 25.982810] ? __pfx_kthread+0x10/0x10 [ 25.982884] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.982959] ? calculate_sigpending+0x7b/0xa0 [ 25.983039] ? __pfx_kthread+0x10/0x10 [ 25.983114] ret_from_fork+0x116/0x1d0 [ 25.983182] ? __pfx_kthread+0x10/0x10 [ 25.983257] ret_from_fork_asm+0x1a/0x30 [ 25.983348] </TASK> [ 25.983392] [ 26.002691] Allocated by task 283: [ 26.003360] kasan_save_stack+0x45/0x70 [ 26.003842] kasan_save_track+0x18/0x40 [ 26.004243] kasan_save_alloc_info+0x3b/0x50 [ 26.004716] __kasan_kmalloc+0xb7/0xc0 [ 26.005470] __kmalloc_cache_noprof+0x189/0x420 [ 26.006156] kasan_atomics+0x95/0x310 [ 26.006622] kunit_try_run_case+0x1a5/0x480 [ 26.007030] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.007789] kthread+0x337/0x6f0 [ 26.008457] ret_from_fork+0x116/0x1d0 [ 26.008821] ret_from_fork_asm+0x1a/0x30 [ 26.009449] [ 26.009746] The buggy address belongs to the object at ffff8881039d9c80 [ 26.009746] which belongs to the cache kmalloc-64 of size 64 [ 26.011139] The buggy address is located 0 bytes to the right of [ 26.011139] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 26.012309] [ 26.012697] The buggy address belongs to the physical page: [ 26.013230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 26.014043] flags: 0x200000000000000(node=0|zone=2) [ 26.014636] page_type: f5(slab) [ 26.014925] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.015658] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.016270] page dumped because: kasan: bad access detected [ 26.016784] [ 26.017000] Memory state around the buggy address: [ 26.017451] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.018001] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.018675] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.019271] ^ [ 26.019723] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.020349] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.020973] ================================================================== [ 23.410454] ================================================================== [ 23.411898] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 23.413059] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 23.413842] [ 23.414307] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 23.414434] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.414471] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.414693] Call Trace: [ 23.414755] <TASK> [ 23.414811] dump_stack_lvl+0x73/0xb0 [ 23.414964] print_report+0xd1/0x650 [ 23.415049] ? __virt_addr_valid+0x1db/0x2d0 [ 23.415130] ? kasan_atomics_helper+0x4b6e/0x5450 [ 23.415200] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.415275] ? kasan_atomics_helper+0x4b6e/0x5450 [ 23.415312] kasan_report+0x141/0x180 [ 23.415346] ? kasan_atomics_helper+0x4b6e/0x5450 [ 23.415383] __asan_report_store4_noabort+0x1b/0x30 [ 23.415413] kasan_atomics_helper+0x4b6e/0x5450 [ 23.415444] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.415475] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.415564] ? kasan_atomics+0x152/0x310 [ 23.415653] kasan_atomics+0x1dc/0x310 [ 23.415709] ? __pfx_kasan_atomics+0x10/0x10 [ 23.415745] ? __pfx_read_tsc+0x10/0x10 [ 23.415778] ? ktime_get_ts64+0x86/0x230 [ 23.415813] kunit_try_run_case+0x1a5/0x480 [ 23.415851] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.415885] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.415919] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.415952] ? __kthread_parkme+0x82/0x180 [ 23.415983] ? preempt_count_sub+0x50/0x80 [ 23.416170] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.416212] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.416308] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.416351] kthread+0x337/0x6f0 [ 23.416382] ? trace_preempt_on+0x20/0xc0 [ 23.416417] ? __pfx_kthread+0x10/0x10 [ 23.416449] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.416483] ? calculate_sigpending+0x7b/0xa0 [ 23.416561] ? __pfx_kthread+0x10/0x10 [ 23.416644] ret_from_fork+0x116/0x1d0 [ 23.416710] ? __pfx_kthread+0x10/0x10 [ 23.416777] ret_from_fork_asm+0x1a/0x30 [ 23.416860] </TASK> [ 23.416895] [ 23.440634] Allocated by task 283: [ 23.440994] kasan_save_stack+0x45/0x70 [ 23.441871] kasan_save_track+0x18/0x40 [ 23.442280] kasan_save_alloc_info+0x3b/0x50 [ 23.443123] __kasan_kmalloc+0xb7/0xc0 [ 23.443793] __kmalloc_cache_noprof+0x189/0x420 [ 23.444651] kasan_atomics+0x95/0x310 [ 23.445247] kunit_try_run_case+0x1a5/0x480 [ 23.446183] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.447322] kthread+0x337/0x6f0 [ 23.447880] ret_from_fork+0x116/0x1d0 [ 23.448236] ret_from_fork_asm+0x1a/0x30 [ 23.449130] [ 23.449344] The buggy address belongs to the object at ffff8881039d9c80 [ 23.449344] which belongs to the cache kmalloc-64 of size 64 [ 23.451158] The buggy address is located 0 bytes to the right of [ 23.451158] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 23.452264] [ 23.452541] The buggy address belongs to the physical page: [ 23.453034] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 23.453962] flags: 0x200000000000000(node=0|zone=2) [ 23.454452] page_type: f5(slab) [ 23.454784] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.456065] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.456873] page dumped because: kasan: bad access detected [ 23.457356] [ 23.457985] Memory state around the buggy address: [ 23.458408] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.459169] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.460140] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.461303] ^ [ 23.461926] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.463006] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.464280] ================================================================== [ 24.361889] ================================================================== [ 24.362336] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 24.363933] Read of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 24.365006] [ 24.365390] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 24.365752] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.365855] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.365954] Call Trace: [ 24.366016] <TASK> [ 24.366075] dump_stack_lvl+0x73/0xb0 [ 24.366267] print_report+0xd1/0x650 [ 24.366359] ? __virt_addr_valid+0x1db/0x2d0 [ 24.366439] ? kasan_atomics_helper+0x4a84/0x5450 [ 24.366489] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.366634] ? kasan_atomics_helper+0x4a84/0x5450 [ 24.366710] kasan_report+0x141/0x180 [ 24.366776] ? kasan_atomics_helper+0x4a84/0x5450 [ 24.366848] __asan_report_load4_noabort+0x18/0x20 [ 24.366924] kasan_atomics_helper+0x4a84/0x5450 [ 24.366991] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.367054] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.367138] ? kasan_atomics+0x152/0x310 [ 24.367218] kasan_atomics+0x1dc/0x310 [ 24.367292] ? __pfx_kasan_atomics+0x10/0x10 [ 24.367332] ? __pfx_read_tsc+0x10/0x10 [ 24.367366] ? ktime_get_ts64+0x86/0x230 [ 24.367402] kunit_try_run_case+0x1a5/0x480 [ 24.367442] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.367477] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.367554] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.367640] ? __kthread_parkme+0x82/0x180 [ 24.367701] ? preempt_count_sub+0x50/0x80 [ 24.367737] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.367777] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.367816] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.367854] kthread+0x337/0x6f0 [ 24.367882] ? trace_preempt_on+0x20/0xc0 [ 24.367919] ? __pfx_kthread+0x10/0x10 [ 24.367950] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.367983] ? calculate_sigpending+0x7b/0xa0 [ 24.368019] ? __pfx_kthread+0x10/0x10 [ 24.368050] ret_from_fork+0x116/0x1d0 [ 24.368078] ? __pfx_kthread+0x10/0x10 [ 24.368108] ret_from_fork_asm+0x1a/0x30 [ 24.368151] </TASK> [ 24.368168] [ 24.392272] Allocated by task 283: [ 24.392854] kasan_save_stack+0x45/0x70 [ 24.393688] kasan_save_track+0x18/0x40 [ 24.394617] kasan_save_alloc_info+0x3b/0x50 [ 24.395059] __kasan_kmalloc+0xb7/0xc0 [ 24.395529] __kmalloc_cache_noprof+0x189/0x420 [ 24.396424] kasan_atomics+0x95/0x310 [ 24.397390] kunit_try_run_case+0x1a5/0x480 [ 24.398011] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.399058] kthread+0x337/0x6f0 [ 24.399474] ret_from_fork+0x116/0x1d0 [ 24.399852] ret_from_fork_asm+0x1a/0x30 [ 24.400281] [ 24.400543] The buggy address belongs to the object at ffff8881039d9c80 [ 24.400543] which belongs to the cache kmalloc-64 of size 64 [ 24.402693] The buggy address is located 0 bytes to the right of [ 24.402693] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 24.404863] [ 24.405058] The buggy address belongs to the physical page: [ 24.405399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 24.407024] flags: 0x200000000000000(node=0|zone=2) [ 24.408483] page_type: f5(slab) [ 24.409855] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.410492] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.411083] page dumped because: kasan: bad access detected [ 24.412300] [ 24.412478] Memory state around the buggy address: [ 24.412915] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.413918] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.414946] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.415569] ^ [ 24.416551] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.417137] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.418591] ================================================================== [ 23.963046] ================================================================== [ 23.963878] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 23.965160] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 23.966193] [ 23.966865] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 23.967658] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.967712] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.967808] Call Trace: [ 23.967860] <TASK> [ 23.967891] dump_stack_lvl+0x73/0xb0 [ 23.967956] print_report+0xd1/0x650 [ 23.967999] ? __virt_addr_valid+0x1db/0x2d0 [ 23.968043] ? kasan_atomics_helper+0x860/0x5450 [ 23.968082] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.968122] ? kasan_atomics_helper+0x860/0x5450 [ 23.968161] kasan_report+0x141/0x180 [ 23.968198] ? kasan_atomics_helper+0x860/0x5450 [ 23.968268] kasan_check_range+0x10c/0x1c0 [ 23.968447] __kasan_check_write+0x18/0x20 [ 23.968550] kasan_atomics_helper+0x860/0x5450 [ 23.968637] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.968727] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.968790] ? kasan_atomics+0x152/0x310 [ 23.968836] kasan_atomics+0x1dc/0x310 [ 23.968875] ? __pfx_kasan_atomics+0x10/0x10 [ 23.968919] ? __pfx_read_tsc+0x10/0x10 [ 23.968956] ? ktime_get_ts64+0x86/0x230 [ 23.968997] kunit_try_run_case+0x1a5/0x480 [ 23.969045] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.969087] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.969130] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.969170] ? __kthread_parkme+0x82/0x180 [ 23.969206] ? preempt_count_sub+0x50/0x80 [ 23.969276] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.969326] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.969372] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.969418] kthread+0x337/0x6f0 [ 23.969453] ? trace_preempt_on+0x20/0xc0 [ 23.969493] ? __pfx_kthread+0x10/0x10 [ 23.969586] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.969693] ? calculate_sigpending+0x7b/0xa0 [ 23.969744] ? __pfx_kthread+0x10/0x10 [ 23.969785] ret_from_fork+0x116/0x1d0 [ 23.969818] ? __pfx_kthread+0x10/0x10 [ 23.969854] ret_from_fork_asm+0x1a/0x30 [ 23.969902] </TASK> [ 23.969919] [ 23.993939] Allocated by task 283: [ 23.995303] kasan_save_stack+0x45/0x70 [ 23.995852] kasan_save_track+0x18/0x40 [ 23.996408] kasan_save_alloc_info+0x3b/0x50 [ 23.996906] __kasan_kmalloc+0xb7/0xc0 [ 23.997303] __kmalloc_cache_noprof+0x189/0x420 [ 23.997742] kasan_atomics+0x95/0x310 [ 23.998330] kunit_try_run_case+0x1a5/0x480 [ 23.999538] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.000437] kthread+0x337/0x6f0 [ 24.001115] ret_from_fork+0x116/0x1d0 [ 24.001569] ret_from_fork_asm+0x1a/0x30 [ 24.001952] [ 24.002209] The buggy address belongs to the object at ffff8881039d9c80 [ 24.002209] which belongs to the cache kmalloc-64 of size 64 [ 24.004256] The buggy address is located 0 bytes to the right of [ 24.004256] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 24.006102] [ 24.006445] The buggy address belongs to the physical page: [ 24.007173] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 24.007767] flags: 0x200000000000000(node=0|zone=2) [ 24.008654] page_type: f5(slab) [ 24.008999] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.010178] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.011488] page dumped because: kasan: bad access detected [ 24.012156] [ 24.012657] Memory state around the buggy address: [ 24.013557] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.014811] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.016121] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.017118] ^ [ 24.017917] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.018922] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.020201] ================================================================== [ 24.737776] ================================================================== [ 24.738473] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 24.739224] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 24.739910] [ 24.740231] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 24.740377] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.740417] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.740748] Call Trace: [ 24.740803] <TASK> [ 24.740860] dump_stack_lvl+0x73/0xb0 [ 24.741829] print_report+0xd1/0x650 [ 24.741903] ? __virt_addr_valid+0x1db/0x2d0 [ 24.741968] ? kasan_atomics_helper+0x1079/0x5450 [ 24.742041] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.742119] ? kasan_atomics_helper+0x1079/0x5450 [ 24.742206] kasan_report+0x141/0x180 [ 24.742290] ? kasan_atomics_helper+0x1079/0x5450 [ 24.742385] kasan_check_range+0x10c/0x1c0 [ 24.742473] __kasan_check_write+0x18/0x20 [ 24.742571] kasan_atomics_helper+0x1079/0x5450 [ 24.742658] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.742741] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.742842] ? kasan_atomics+0x152/0x310 [ 24.742937] kasan_atomics+0x1dc/0x310 [ 24.743022] ? __pfx_kasan_atomics+0x10/0x10 [ 24.743110] ? __pfx_read_tsc+0x10/0x10 [ 24.743191] ? ktime_get_ts64+0x86/0x230 [ 24.744491] kunit_try_run_case+0x1a5/0x480 [ 24.744605] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.744683] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.744766] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.744845] ? __kthread_parkme+0x82/0x180 [ 24.744922] ? preempt_count_sub+0x50/0x80 [ 24.745001] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.745085] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.745167] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.745255] kthread+0x337/0x6f0 [ 24.745328] ? trace_preempt_on+0x20/0xc0 [ 24.745407] ? __pfx_kthread+0x10/0x10 [ 24.745480] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.745593] ? calculate_sigpending+0x7b/0xa0 [ 24.745656] ? __pfx_kthread+0x10/0x10 [ 24.745694] ret_from_fork+0x116/0x1d0 [ 24.745723] ? __pfx_kthread+0x10/0x10 [ 24.745755] ret_from_fork_asm+0x1a/0x30 [ 24.745799] </TASK> [ 24.745817] [ 24.764039] Allocated by task 283: [ 24.764532] kasan_save_stack+0x45/0x70 [ 24.765002] kasan_save_track+0x18/0x40 [ 24.765341] kasan_save_alloc_info+0x3b/0x50 [ 24.765961] __kasan_kmalloc+0xb7/0xc0 [ 24.766276] __kmalloc_cache_noprof+0x189/0x420 [ 24.766677] kasan_atomics+0x95/0x310 [ 24.767084] kunit_try_run_case+0x1a5/0x480 [ 24.767866] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.768526] kthread+0x337/0x6f0 [ 24.768934] ret_from_fork+0x116/0x1d0 [ 24.769359] ret_from_fork_asm+0x1a/0x30 [ 24.769789] [ 24.769988] The buggy address belongs to the object at ffff8881039d9c80 [ 24.769988] which belongs to the cache kmalloc-64 of size 64 [ 24.770948] The buggy address is located 0 bytes to the right of [ 24.770948] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 24.772132] [ 24.772398] The buggy address belongs to the physical page: [ 24.772827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 24.773352] flags: 0x200000000000000(node=0|zone=2) [ 24.774189] page_type: f5(slab) [ 24.774623] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.775315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.775910] page dumped because: kasan: bad access detected [ 24.776411] [ 24.776626] Memory state around the buggy address: [ 24.776978] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.778210] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.780045] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.780576] ^ [ 24.781122] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.781794] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.782488] ================================================================== [ 25.179085] ================================================================== [ 25.180203] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 25.180881] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 25.181177] [ 25.181611] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 25.181768] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.181812] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.181878] Call Trace: [ 25.181934] <TASK> [ 25.182007] dump_stack_lvl+0x73/0xb0 [ 25.182132] print_report+0xd1/0x650 [ 25.182217] ? __virt_addr_valid+0x1db/0x2d0 [ 25.182426] ? kasan_atomics_helper+0x1467/0x5450 [ 25.182780] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.182845] ? kasan_atomics_helper+0x1467/0x5450 [ 25.182906] kasan_report+0x141/0x180 [ 25.182945] ? kasan_atomics_helper+0x1467/0x5450 [ 25.182986] kasan_check_range+0x10c/0x1c0 [ 25.183021] __kasan_check_write+0x18/0x20 [ 25.183050] kasan_atomics_helper+0x1467/0x5450 [ 25.183084] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.183117] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.183164] ? kasan_atomics+0x152/0x310 [ 25.183204] kasan_atomics+0x1dc/0x310 [ 25.183295] ? __pfx_kasan_atomics+0x10/0x10 [ 25.183338] ? __pfx_read_tsc+0x10/0x10 [ 25.183373] ? ktime_get_ts64+0x86/0x230 [ 25.183409] kunit_try_run_case+0x1a5/0x480 [ 25.183448] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.183484] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.183551] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.183589] ? __kthread_parkme+0x82/0x180 [ 25.183620] ? preempt_count_sub+0x50/0x80 [ 25.183655] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.183693] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.183730] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.183767] kthread+0x337/0x6f0 [ 25.183796] ? trace_preempt_on+0x20/0xc0 [ 25.183831] ? __pfx_kthread+0x10/0x10 [ 25.183864] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.183897] ? calculate_sigpending+0x7b/0xa0 [ 25.183933] ? __pfx_kthread+0x10/0x10 [ 25.183963] ret_from_fork+0x116/0x1d0 [ 25.183992] ? __pfx_kthread+0x10/0x10 [ 25.184022] ret_from_fork_asm+0x1a/0x30 [ 25.184065] </TASK> [ 25.184081] [ 25.199025] Allocated by task 283: [ 25.199579] kasan_save_stack+0x45/0x70 [ 25.199992] kasan_save_track+0x18/0x40 [ 25.200456] kasan_save_alloc_info+0x3b/0x50 [ 25.200930] __kasan_kmalloc+0xb7/0xc0 [ 25.201349] __kmalloc_cache_noprof+0x189/0x420 [ 25.201912] kasan_atomics+0x95/0x310 [ 25.202377] kunit_try_run_case+0x1a5/0x480 [ 25.202833] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.203293] kthread+0x337/0x6f0 [ 25.203783] ret_from_fork+0x116/0x1d0 [ 25.204196] ret_from_fork_asm+0x1a/0x30 [ 25.205025] [ 25.206314] The buggy address belongs to the object at ffff8881039d9c80 [ 25.206314] which belongs to the cache kmalloc-64 of size 64 [ 25.208373] The buggy address is located 0 bytes to the right of [ 25.208373] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 25.210212] [ 25.210720] The buggy address belongs to the physical page: [ 25.211203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 25.212489] flags: 0x200000000000000(node=0|zone=2) [ 25.213005] page_type: f5(slab) [ 25.213461] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.214227] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.215184] page dumped because: kasan: bad access detected [ 25.215718] [ 25.215923] Memory state around the buggy address: [ 25.216410] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.217122] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.217819] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.218786] ^ [ 25.219550] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.220105] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.221090] ================================================================== [ 25.392524] ================================================================== [ 25.393612] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 25.394366] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 25.395277] [ 25.395634] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 25.395773] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.395809] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.395876] Call Trace: [ 25.395932] <TASK> [ 25.395986] dump_stack_lvl+0x73/0xb0 [ 25.396084] print_report+0xd1/0x650 [ 25.396168] ? __virt_addr_valid+0x1db/0x2d0 [ 25.396251] ? kasan_atomics_helper+0x16e7/0x5450 [ 25.396333] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.396479] ? kasan_atomics_helper+0x16e7/0x5450 [ 25.396714] kasan_report+0x141/0x180 [ 25.396831] ? kasan_atomics_helper+0x16e7/0x5450 [ 25.396926] kasan_check_range+0x10c/0x1c0 [ 25.397010] __kasan_check_write+0x18/0x20 [ 25.397087] kasan_atomics_helper+0x16e7/0x5450 [ 25.397170] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.397255] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.397383] ? kasan_atomics+0x152/0x310 [ 25.397568] kasan_atomics+0x1dc/0x310 [ 25.397775] ? __pfx_kasan_atomics+0x10/0x10 [ 25.397906] ? __pfx_read_tsc+0x10/0x10 [ 25.398050] ? ktime_get_ts64+0x86/0x230 [ 25.398138] kunit_try_run_case+0x1a5/0x480 [ 25.398235] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.398318] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.398404] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.398484] ? __kthread_parkme+0x82/0x180 [ 25.398588] ? preempt_count_sub+0x50/0x80 [ 25.398664] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.398744] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.398843] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.398940] kthread+0x337/0x6f0 [ 25.399012] ? trace_preempt_on+0x20/0xc0 [ 25.399159] ? __pfx_kthread+0x10/0x10 [ 25.399357] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.399536] ? calculate_sigpending+0x7b/0xa0 [ 25.399626] ? __pfx_kthread+0x10/0x10 [ 25.399703] ret_from_fork+0x116/0x1d0 [ 25.399774] ? __pfx_kthread+0x10/0x10 [ 25.399850] ret_from_fork_asm+0x1a/0x30 [ 25.400007] </TASK> [ 25.400080] [ 25.419471] Allocated by task 283: [ 25.419941] kasan_save_stack+0x45/0x70 [ 25.420428] kasan_save_track+0x18/0x40 [ 25.420901] kasan_save_alloc_info+0x3b/0x50 [ 25.421364] __kasan_kmalloc+0xb7/0xc0 [ 25.421925] __kmalloc_cache_noprof+0x189/0x420 [ 25.422530] kasan_atomics+0x95/0x310 [ 25.422914] kunit_try_run_case+0x1a5/0x480 [ 25.423312] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.423916] kthread+0x337/0x6f0 [ 25.424402] ret_from_fork+0x116/0x1d0 [ 25.424886] ret_from_fork_asm+0x1a/0x30 [ 25.425403] [ 25.425693] The buggy address belongs to the object at ffff8881039d9c80 [ 25.425693] which belongs to the cache kmalloc-64 of size 64 [ 25.426731] The buggy address is located 0 bytes to the right of [ 25.426731] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 25.427737] [ 25.428043] The buggy address belongs to the physical page: [ 25.428604] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 25.429311] flags: 0x200000000000000(node=0|zone=2) [ 25.429883] page_type: f5(slab) [ 25.430378] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.431064] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.431793] page dumped because: kasan: bad access detected [ 25.432273] [ 25.432542] Memory state around the buggy address: [ 25.432979] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.433705] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.434349] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.435056] ^ [ 25.435581] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.436171] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.436927] ================================================================== [ 25.528766] ================================================================== [ 25.529324] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 25.530568] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 25.531712] [ 25.532112] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 25.532269] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.532319] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.532387] Call Trace: [ 25.532443] <TASK> [ 25.532554] dump_stack_lvl+0x73/0xb0 [ 25.532664] print_report+0xd1/0x650 [ 25.532703] ? __virt_addr_valid+0x1db/0x2d0 [ 25.532740] ? kasan_atomics_helper+0x18b1/0x5450 [ 25.532792] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.532860] ? kasan_atomics_helper+0x18b1/0x5450 [ 25.532897] kasan_report+0x141/0x180 [ 25.532932] ? kasan_atomics_helper+0x18b1/0x5450 [ 25.532974] kasan_check_range+0x10c/0x1c0 [ 25.533010] __kasan_check_write+0x18/0x20 [ 25.533037] kasan_atomics_helper+0x18b1/0x5450 [ 25.533070] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.533102] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.533148] ? kasan_atomics+0x152/0x310 [ 25.533187] kasan_atomics+0x1dc/0x310 [ 25.533246] ? __pfx_kasan_atomics+0x10/0x10 [ 25.533302] ? __pfx_read_tsc+0x10/0x10 [ 25.533337] ? ktime_get_ts64+0x86/0x230 [ 25.533374] kunit_try_run_case+0x1a5/0x480 [ 25.533415] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.533450] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.533487] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.533553] ? __kthread_parkme+0x82/0x180 [ 25.533587] ? preempt_count_sub+0x50/0x80 [ 25.533641] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.533681] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.533717] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.533754] kthread+0x337/0x6f0 [ 25.533782] ? trace_preempt_on+0x20/0xc0 [ 25.533817] ? __pfx_kthread+0x10/0x10 [ 25.533848] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.533882] ? calculate_sigpending+0x7b/0xa0 [ 25.533916] ? __pfx_kthread+0x10/0x10 [ 25.533947] ret_from_fork+0x116/0x1d0 [ 25.533974] ? __pfx_kthread+0x10/0x10 [ 25.534004] ret_from_fork_asm+0x1a/0x30 [ 25.534047] </TASK> [ 25.534063] [ 25.554233] Allocated by task 283: [ 25.555391] kasan_save_stack+0x45/0x70 [ 25.556018] kasan_save_track+0x18/0x40 [ 25.556365] kasan_save_alloc_info+0x3b/0x50 [ 25.556851] __kasan_kmalloc+0xb7/0xc0 [ 25.557194] __kmalloc_cache_noprof+0x189/0x420 [ 25.558193] kasan_atomics+0x95/0x310 [ 25.558830] kunit_try_run_case+0x1a5/0x480 [ 25.559216] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.559916] kthread+0x337/0x6f0 [ 25.560207] ret_from_fork+0x116/0x1d0 [ 25.561003] ret_from_fork_asm+0x1a/0x30 [ 25.561487] [ 25.561767] The buggy address belongs to the object at ffff8881039d9c80 [ 25.561767] which belongs to the cache kmalloc-64 of size 64 [ 25.562812] The buggy address is located 0 bytes to the right of [ 25.562812] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 25.564205] [ 25.564544] The buggy address belongs to the physical page: [ 25.565089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 25.565783] flags: 0x200000000000000(node=0|zone=2) [ 25.566317] page_type: f5(slab) [ 25.566790] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.567467] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.568230] page dumped because: kasan: bad access detected [ 25.568971] [ 25.569337] Memory state around the buggy address: [ 25.569915] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.570679] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.571360] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.572083] ^ [ 25.572635] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.573372] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.574087] ================================================================== [ 25.438421] ================================================================== [ 25.439051] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 25.439745] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 25.440275] [ 25.440641] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 25.440756] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.440790] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.440847] Call Trace: [ 25.440899] <TASK> [ 25.440947] dump_stack_lvl+0x73/0xb0 [ 25.441032] print_report+0xd1/0x650 [ 25.441100] ? __virt_addr_valid+0x1db/0x2d0 [ 25.441168] ? kasan_atomics_helper+0x177f/0x5450 [ 25.441309] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.441395] ? kasan_atomics_helper+0x177f/0x5450 [ 25.441474] kasan_report+0x141/0x180 [ 25.441578] ? kasan_atomics_helper+0x177f/0x5450 [ 25.441684] kasan_check_range+0x10c/0x1c0 [ 25.441772] __kasan_check_write+0x18/0x20 [ 25.441851] kasan_atomics_helper+0x177f/0x5450 [ 25.442006] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.442097] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.442211] ? kasan_atomics+0x152/0x310 [ 25.442415] kasan_atomics+0x1dc/0x310 [ 25.442525] ? __pfx_kasan_atomics+0x10/0x10 [ 25.442689] ? __pfx_read_tsc+0x10/0x10 [ 25.442775] ? ktime_get_ts64+0x86/0x230 [ 25.442870] kunit_try_run_case+0x1a5/0x480 [ 25.443019] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.443159] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.443285] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.443368] ? __kthread_parkme+0x82/0x180 [ 25.443441] ? preempt_count_sub+0x50/0x80 [ 25.443482] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.443555] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.443597] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.443635] kthread+0x337/0x6f0 [ 25.443664] ? trace_preempt_on+0x20/0xc0 [ 25.443701] ? __pfx_kthread+0x10/0x10 [ 25.443732] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.443765] ? calculate_sigpending+0x7b/0xa0 [ 25.443801] ? __pfx_kthread+0x10/0x10 [ 25.443833] ret_from_fork+0x116/0x1d0 [ 25.443860] ? __pfx_kthread+0x10/0x10 [ 25.443891] ret_from_fork_asm+0x1a/0x30 [ 25.443934] </TASK> [ 25.443952] [ 25.463162] Allocated by task 283: [ 25.463813] kasan_save_stack+0x45/0x70 [ 25.464439] kasan_save_track+0x18/0x40 [ 25.464957] kasan_save_alloc_info+0x3b/0x50 [ 25.465571] __kasan_kmalloc+0xb7/0xc0 [ 25.466025] __kmalloc_cache_noprof+0x189/0x420 [ 25.466714] kasan_atomics+0x95/0x310 [ 25.467135] kunit_try_run_case+0x1a5/0x480 [ 25.467730] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.468469] kthread+0x337/0x6f0 [ 25.468908] ret_from_fork+0x116/0x1d0 [ 25.469481] ret_from_fork_asm+0x1a/0x30 [ 25.469875] [ 25.470343] The buggy address belongs to the object at ffff8881039d9c80 [ 25.470343] which belongs to the cache kmalloc-64 of size 64 [ 25.471532] The buggy address is located 0 bytes to the right of [ 25.471532] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 25.472731] [ 25.472968] The buggy address belongs to the physical page: [ 25.473528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 25.474190] flags: 0x200000000000000(node=0|zone=2) [ 25.474922] page_type: f5(slab) [ 25.475422] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.476135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.476769] page dumped because: kasan: bad access detected [ 25.477238] [ 25.477489] Memory state around the buggy address: [ 25.477989] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.478598] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.479132] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.479859] ^ [ 25.480423] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.480931] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.481654] ================================================================== [ 24.784161] ================================================================== [ 24.784801] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 24.785491] Read of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 24.786261] [ 24.786700] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 24.786829] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.786865] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.786920] Call Trace: [ 24.786957] <TASK> [ 24.787002] dump_stack_lvl+0x73/0xb0 [ 24.787087] print_report+0xd1/0x650 [ 24.787159] ? __virt_addr_valid+0x1db/0x2d0 [ 24.787261] ? kasan_atomics_helper+0x4a1c/0x5450 [ 24.787339] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.787412] ? kasan_atomics_helper+0x4a1c/0x5450 [ 24.787486] kasan_report+0x141/0x180 [ 24.787687] ? kasan_atomics_helper+0x4a1c/0x5450 [ 24.787815] __asan_report_load4_noabort+0x18/0x20 [ 24.787942] kasan_atomics_helper+0x4a1c/0x5450 [ 24.788027] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.788106] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.788284] ? kasan_atomics+0x152/0x310 [ 24.788380] kasan_atomics+0x1dc/0x310 [ 24.788459] ? __pfx_kasan_atomics+0x10/0x10 [ 24.788562] ? __pfx_read_tsc+0x10/0x10 [ 24.788641] ? ktime_get_ts64+0x86/0x230 [ 24.788724] kunit_try_run_case+0x1a5/0x480 [ 24.788840] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.788925] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.789008] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.789088] ? __kthread_parkme+0x82/0x180 [ 24.789166] ? preempt_count_sub+0x50/0x80 [ 24.789295] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.789377] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.789426] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.789466] kthread+0x337/0x6f0 [ 24.789519] ? trace_preempt_on+0x20/0xc0 [ 24.789568] ? __pfx_kthread+0x10/0x10 [ 24.789601] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.789652] ? calculate_sigpending+0x7b/0xa0 [ 24.789691] ? __pfx_kthread+0x10/0x10 [ 24.789722] ret_from_fork+0x116/0x1d0 [ 24.789750] ? __pfx_kthread+0x10/0x10 [ 24.789779] ret_from_fork_asm+0x1a/0x30 [ 24.789823] </TASK> [ 24.789839] [ 24.804790] Allocated by task 283: [ 24.805152] kasan_save_stack+0x45/0x70 [ 24.805575] kasan_save_track+0x18/0x40 [ 24.806007] kasan_save_alloc_info+0x3b/0x50 [ 24.806567] __kasan_kmalloc+0xb7/0xc0 [ 24.807013] __kmalloc_cache_noprof+0x189/0x420 [ 24.807611] kasan_atomics+0x95/0x310 [ 24.808050] kunit_try_run_case+0x1a5/0x480 [ 24.808593] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.809473] kthread+0x337/0x6f0 [ 24.809905] ret_from_fork+0x116/0x1d0 [ 24.810322] ret_from_fork_asm+0x1a/0x30 [ 24.810772] [ 24.811018] The buggy address belongs to the object at ffff8881039d9c80 [ 24.811018] which belongs to the cache kmalloc-64 of size 64 [ 24.812834] The buggy address is located 0 bytes to the right of [ 24.812834] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 24.813656] [ 24.813857] The buggy address belongs to the physical page: [ 24.814269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 24.815006] flags: 0x200000000000000(node=0|zone=2) [ 24.815605] page_type: f5(slab) [ 24.816078] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.816868] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.817592] page dumped because: kasan: bad access detected [ 24.818137] [ 24.818456] Memory state around the buggy address: [ 24.818925] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.819692] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.820366] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.820919] ^ [ 24.821447] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.822044] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.822679] ================================================================== [ 25.668710] ================================================================== [ 25.669319] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 25.670122] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 25.670779] [ 25.671071] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 25.671209] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.671317] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.671414] Call Trace: [ 25.671523] <TASK> [ 25.671610] dump_stack_lvl+0x73/0xb0 [ 25.671743] print_report+0xd1/0x650 [ 25.671884] ? __virt_addr_valid+0x1db/0x2d0 [ 25.671961] ? kasan_atomics_helper+0x1a7f/0x5450 [ 25.672015] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.672052] ? kasan_atomics_helper+0x1a7f/0x5450 [ 25.672086] kasan_report+0x141/0x180 [ 25.672120] ? kasan_atomics_helper+0x1a7f/0x5450 [ 25.672162] kasan_check_range+0x10c/0x1c0 [ 25.672201] __kasan_check_write+0x18/0x20 [ 25.672276] kasan_atomics_helper+0x1a7f/0x5450 [ 25.672322] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.672360] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.672405] ? kasan_atomics+0x152/0x310 [ 25.672446] kasan_atomics+0x1dc/0x310 [ 25.672481] ? __pfx_kasan_atomics+0x10/0x10 [ 25.672548] ? __pfx_read_tsc+0x10/0x10 [ 25.672585] ? ktime_get_ts64+0x86/0x230 [ 25.672621] kunit_try_run_case+0x1a5/0x480 [ 25.672663] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.672701] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.672738] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.672774] ? __kthread_parkme+0x82/0x180 [ 25.672808] ? preempt_count_sub+0x50/0x80 [ 25.672842] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.672880] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.672919] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.672957] kthread+0x337/0x6f0 [ 25.672988] ? trace_preempt_on+0x20/0xc0 [ 25.673023] ? __pfx_kthread+0x10/0x10 [ 25.673053] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.673086] ? calculate_sigpending+0x7b/0xa0 [ 25.673125] ? __pfx_kthread+0x10/0x10 [ 25.673158] ret_from_fork+0x116/0x1d0 [ 25.673186] ? __pfx_kthread+0x10/0x10 [ 25.673218] ret_from_fork_asm+0x1a/0x30 [ 25.673299] </TASK> [ 25.673318] [ 25.689000] Allocated by task 283: [ 25.689992] kasan_save_stack+0x45/0x70 [ 25.691538] kasan_save_track+0x18/0x40 [ 25.691885] kasan_save_alloc_info+0x3b/0x50 [ 25.692234] __kasan_kmalloc+0xb7/0xc0 [ 25.692751] __kmalloc_cache_noprof+0x189/0x420 [ 25.693737] kasan_atomics+0x95/0x310 [ 25.694378] kunit_try_run_case+0x1a5/0x480 [ 25.695099] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.696546] kthread+0x337/0x6f0 [ 25.696976] ret_from_fork+0x116/0x1d0 [ 25.697254] ret_from_fork_asm+0x1a/0x30 [ 25.698065] [ 25.698492] The buggy address belongs to the object at ffff8881039d9c80 [ 25.698492] which belongs to the cache kmalloc-64 of size 64 [ 25.699579] The buggy address is located 0 bytes to the right of [ 25.699579] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 25.700870] [ 25.701425] The buggy address belongs to the physical page: [ 25.701921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 25.702615] flags: 0x200000000000000(node=0|zone=2) [ 25.703029] page_type: f5(slab) [ 25.703376] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.704137] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.704812] page dumped because: kasan: bad access detected [ 25.705332] [ 25.705571] Memory state around the buggy address: [ 25.706085] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.706800] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.707531] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.708157] ^ [ 25.708665] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.709344] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.709982] ================================================================== [ 26.205901] ================================================================== [ 26.206623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 26.207449] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 26.208112] [ 26.208529] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 26.208664] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.208709] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.208775] Call Trace: [ 26.208918] <TASK> [ 26.208978] dump_stack_lvl+0x73/0xb0 [ 26.209107] print_report+0xd1/0x650 [ 26.209273] ? __virt_addr_valid+0x1db/0x2d0 [ 26.209362] ? kasan_atomics_helper+0x20c8/0x5450 [ 26.209491] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.209603] ? kasan_atomics_helper+0x20c8/0x5450 [ 26.209700] kasan_report+0x141/0x180 [ 26.209838] ? kasan_atomics_helper+0x20c8/0x5450 [ 26.209961] kasan_check_range+0x10c/0x1c0 [ 26.210048] __kasan_check_write+0x18/0x20 [ 26.210094] kasan_atomics_helper+0x20c8/0x5450 [ 26.210128] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.210163] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.210211] ? kasan_atomics+0x152/0x310 [ 26.210316] kasan_atomics+0x1dc/0x310 [ 26.210354] ? __pfx_kasan_atomics+0x10/0x10 [ 26.210393] ? __pfx_read_tsc+0x10/0x10 [ 26.210428] ? ktime_get_ts64+0x86/0x230 [ 26.210465] kunit_try_run_case+0x1a5/0x480 [ 26.210532] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.210571] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.210608] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.210643] ? __kthread_parkme+0x82/0x180 [ 26.210677] ? preempt_count_sub+0x50/0x80 [ 26.210713] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.210750] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.210785] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.210822] kthread+0x337/0x6f0 [ 26.210850] ? trace_preempt_on+0x20/0xc0 [ 26.210885] ? __pfx_kthread+0x10/0x10 [ 26.210915] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.210947] ? calculate_sigpending+0x7b/0xa0 [ 26.210981] ? __pfx_kthread+0x10/0x10 [ 26.211013] ret_from_fork+0x116/0x1d0 [ 26.211039] ? __pfx_kthread+0x10/0x10 [ 26.211070] ret_from_fork_asm+0x1a/0x30 [ 26.211113] </TASK> [ 26.211130] [ 26.228308] Allocated by task 283: [ 26.228787] kasan_save_stack+0x45/0x70 [ 26.229302] kasan_save_track+0x18/0x40 [ 26.229664] kasan_save_alloc_info+0x3b/0x50 [ 26.230151] __kasan_kmalloc+0xb7/0xc0 [ 26.230678] __kmalloc_cache_noprof+0x189/0x420 [ 26.231199] kasan_atomics+0x95/0x310 [ 26.231637] kunit_try_run_case+0x1a5/0x480 [ 26.231991] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.232541] kthread+0x337/0x6f0 [ 26.232997] ret_from_fork+0x116/0x1d0 [ 26.233520] ret_from_fork_asm+0x1a/0x30 [ 26.233992] [ 26.234314] The buggy address belongs to the object at ffff8881039d9c80 [ 26.234314] which belongs to the cache kmalloc-64 of size 64 [ 26.235449] The buggy address is located 0 bytes to the right of [ 26.235449] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 26.236339] [ 26.236609] The buggy address belongs to the physical page: [ 26.237175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 26.237887] flags: 0x200000000000000(node=0|zone=2) [ 26.238322] page_type: f5(slab) [ 26.238711] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.239432] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.240086] page dumped because: kasan: bad access detected [ 26.240528] [ 26.240777] Memory state around the buggy address: [ 26.241351] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.242658] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.243599] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.244311] ^ [ 26.244971] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.245521] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.246081] ================================================================== [ 23.352963] ================================================================== [ 23.354002] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 23.354856] Read of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 23.355382] [ 23.355680] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 23.355812] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.355855] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.355907] Call Trace: [ 23.355929] <TASK> [ 23.355952] dump_stack_lvl+0x73/0xb0 [ 23.356005] print_report+0xd1/0x650 [ 23.356070] ? __virt_addr_valid+0x1db/0x2d0 [ 23.356124] ? kasan_atomics_helper+0x4b88/0x5450 [ 23.356160] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.356192] ? kasan_atomics_helper+0x4b88/0x5450 [ 23.356224] kasan_report+0x141/0x180 [ 23.356255] ? kasan_atomics_helper+0x4b88/0x5450 [ 23.356295] __asan_report_load4_noabort+0x18/0x20 [ 23.356333] kasan_atomics_helper+0x4b88/0x5450 [ 23.356367] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.356398] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.356442] ? kasan_atomics+0x152/0x310 [ 23.356481] kasan_atomics+0x1dc/0x310 [ 23.356594] ? __pfx_kasan_atomics+0x10/0x10 [ 23.356705] ? __pfx_read_tsc+0x10/0x10 [ 23.356780] ? ktime_get_ts64+0x86/0x230 [ 23.356859] kunit_try_run_case+0x1a5/0x480 [ 23.356945] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.357019] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.357093] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.357173] ? __kthread_parkme+0x82/0x180 [ 23.357299] ? preempt_count_sub+0x50/0x80 [ 23.357365] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.357454] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.357538] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.357607] kthread+0x337/0x6f0 [ 23.357722] ? trace_preempt_on+0x20/0xc0 [ 23.357802] ? __pfx_kthread+0x10/0x10 [ 23.357860] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.357922] ? calculate_sigpending+0x7b/0xa0 [ 23.357991] ? __pfx_kthread+0x10/0x10 [ 23.358053] ret_from_fork+0x116/0x1d0 [ 23.358115] ? __pfx_kthread+0x10/0x10 [ 23.358183] ret_from_fork_asm+0x1a/0x30 [ 23.358269] </TASK> [ 23.358289] [ 23.384355] Allocated by task 283: [ 23.384829] kasan_save_stack+0x45/0x70 [ 23.385880] kasan_save_track+0x18/0x40 [ 23.386535] kasan_save_alloc_info+0x3b/0x50 [ 23.387256] __kasan_kmalloc+0xb7/0xc0 [ 23.388002] __kmalloc_cache_noprof+0x189/0x420 [ 23.388740] kasan_atomics+0x95/0x310 [ 23.389786] kunit_try_run_case+0x1a5/0x480 [ 23.390251] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.390824] kthread+0x337/0x6f0 [ 23.391768] ret_from_fork+0x116/0x1d0 [ 23.392214] ret_from_fork_asm+0x1a/0x30 [ 23.393054] [ 23.393432] The buggy address belongs to the object at ffff8881039d9c80 [ 23.393432] which belongs to the cache kmalloc-64 of size 64 [ 23.394857] The buggy address is located 0 bytes to the right of [ 23.394857] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 23.396034] [ 23.396218] The buggy address belongs to the physical page: [ 23.397741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 23.398364] flags: 0x200000000000000(node=0|zone=2) [ 23.398902] page_type: f5(slab) [ 23.399287] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.400813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.401683] page dumped because: kasan: bad access detected [ 23.402649] [ 23.402836] Memory state around the buggy address: [ 23.403186] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.404810] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.405522] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.406372] ^ [ 23.407259] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.408073] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.408867] ================================================================== [ 24.918806] ================================================================== [ 24.919460] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 24.920197] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 24.921532] [ 24.921814] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 24.921908] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.921929] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.921965] Call Trace: [ 24.921995] <TASK> [ 24.922049] dump_stack_lvl+0x73/0xb0 [ 24.922151] print_report+0xd1/0x650 [ 24.922255] ? __virt_addr_valid+0x1db/0x2d0 [ 24.922338] ? kasan_atomics_helper+0x1217/0x5450 [ 24.922413] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.922469] ? kasan_atomics_helper+0x1217/0x5450 [ 24.922544] kasan_report+0x141/0x180 [ 24.922580] ? kasan_atomics_helper+0x1217/0x5450 [ 24.922619] kasan_check_range+0x10c/0x1c0 [ 24.922654] __kasan_check_write+0x18/0x20 [ 24.922682] kasan_atomics_helper+0x1217/0x5450 [ 24.922716] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.922748] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.922795] ? kasan_atomics+0x152/0x310 [ 24.922835] kasan_atomics+0x1dc/0x310 [ 24.922869] ? __pfx_kasan_atomics+0x10/0x10 [ 24.922905] ? __pfx_read_tsc+0x10/0x10 [ 24.922938] ? ktime_get_ts64+0x86/0x230 [ 24.922973] kunit_try_run_case+0x1a5/0x480 [ 24.923012] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.923048] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.923083] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.923118] ? __kthread_parkme+0x82/0x180 [ 24.923149] ? preempt_count_sub+0x50/0x80 [ 24.923182] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.923224] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.923293] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.923332] kthread+0x337/0x6f0 [ 24.923362] ? trace_preempt_on+0x20/0xc0 [ 24.923397] ? __pfx_kthread+0x10/0x10 [ 24.923427] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.923459] ? calculate_sigpending+0x7b/0xa0 [ 24.923515] ? __pfx_kthread+0x10/0x10 [ 24.923556] ret_from_fork+0x116/0x1d0 [ 24.923585] ? __pfx_kthread+0x10/0x10 [ 24.923614] ret_from_fork_asm+0x1a/0x30 [ 24.923658] </TASK> [ 24.923675] [ 24.938045] Allocated by task 283: [ 24.938465] kasan_save_stack+0x45/0x70 [ 24.938961] kasan_save_track+0x18/0x40 [ 24.939287] kasan_save_alloc_info+0x3b/0x50 [ 24.939762] __kasan_kmalloc+0xb7/0xc0 [ 24.940107] __kmalloc_cache_noprof+0x189/0x420 [ 24.940605] kasan_atomics+0x95/0x310 [ 24.940921] kunit_try_run_case+0x1a5/0x480 [ 24.941257] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.941823] kthread+0x337/0x6f0 [ 24.942208] ret_from_fork+0x116/0x1d0 [ 24.942630] ret_from_fork_asm+0x1a/0x30 [ 24.943066] [ 24.943314] The buggy address belongs to the object at ffff8881039d9c80 [ 24.943314] which belongs to the cache kmalloc-64 of size 64 [ 24.944212] The buggy address is located 0 bytes to the right of [ 24.944212] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 24.945170] [ 24.945567] The buggy address belongs to the physical page: [ 24.946106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 24.946648] flags: 0x200000000000000(node=0|zone=2) [ 24.947017] page_type: f5(slab) [ 24.947308] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.947961] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.948909] page dumped because: kasan: bad access detected [ 24.949722] [ 24.949908] Memory state around the buggy address: [ 24.950441] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.951132] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.953744] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.954214] ^ [ 24.954739] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.956117] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.957148] ================================================================== [ 24.534903] ================================================================== [ 24.535648] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 24.536345] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 24.537795] [ 24.538129] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 24.538265] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.538310] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.538375] Call Trace: [ 24.538433] <TASK> [ 24.538488] dump_stack_lvl+0x73/0xb0 [ 24.539285] print_report+0xd1/0x650 [ 24.539372] ? __virt_addr_valid+0x1db/0x2d0 [ 24.539477] ? kasan_atomics_helper+0xe78/0x5450 [ 24.539558] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.539639] ? kasan_atomics_helper+0xe78/0x5450 [ 24.539720] kasan_report+0x141/0x180 [ 24.539805] ? kasan_atomics_helper+0xe78/0x5450 [ 24.539851] kasan_check_range+0x10c/0x1c0 [ 24.539888] __kasan_check_write+0x18/0x20 [ 24.539917] kasan_atomics_helper+0xe78/0x5450 [ 24.539952] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.539988] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.540033] ? kasan_atomics+0x152/0x310 [ 24.540074] kasan_atomics+0x1dc/0x310 [ 24.540108] ? __pfx_kasan_atomics+0x10/0x10 [ 24.540147] ? __pfx_read_tsc+0x10/0x10 [ 24.540182] ? ktime_get_ts64+0x86/0x230 [ 24.540221] kunit_try_run_case+0x1a5/0x480 [ 24.540302] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.540343] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.540379] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.540415] ? __kthread_parkme+0x82/0x180 [ 24.540445] ? preempt_count_sub+0x50/0x80 [ 24.540479] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.540551] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.540638] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.540722] kthread+0x337/0x6f0 [ 24.540795] ? trace_preempt_on+0x20/0xc0 [ 24.540866] ? __pfx_kthread+0x10/0x10 [ 24.540943] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.541003] ? calculate_sigpending+0x7b/0xa0 [ 24.541043] ? __pfx_kthread+0x10/0x10 [ 24.541075] ret_from_fork+0x116/0x1d0 [ 24.541103] ? __pfx_kthread+0x10/0x10 [ 24.541138] ret_from_fork_asm+0x1a/0x30 [ 24.541183] </TASK> [ 24.541199] [ 24.572163] Allocated by task 283: [ 24.573791] kasan_save_stack+0x45/0x70 [ 24.574052] kasan_save_track+0x18/0x40 [ 24.574241] kasan_save_alloc_info+0x3b/0x50 [ 24.574774] __kasan_kmalloc+0xb7/0xc0 [ 24.575198] __kmalloc_cache_noprof+0x189/0x420 [ 24.575718] kasan_atomics+0x95/0x310 [ 24.576160] kunit_try_run_case+0x1a5/0x480 [ 24.577799] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.578953] kthread+0x337/0x6f0 [ 24.579445] ret_from_fork+0x116/0x1d0 [ 24.580078] ret_from_fork_asm+0x1a/0x30 [ 24.581275] [ 24.581690] The buggy address belongs to the object at ffff8881039d9c80 [ 24.581690] which belongs to the cache kmalloc-64 of size 64 [ 24.582949] The buggy address is located 0 bytes to the right of [ 24.582949] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 24.584192] [ 24.584481] The buggy address belongs to the physical page: [ 24.585793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 24.586806] flags: 0x200000000000000(node=0|zone=2) [ 24.587193] page_type: f5(slab) [ 24.588142] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.589701] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.590260] page dumped because: kasan: bad access detected [ 24.590698] [ 24.590874] Memory state around the buggy address: [ 24.591258] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.593428] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.594375] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.594940] ^ [ 24.595416] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.596212] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.597424] ================================================================== [ 25.134984] ================================================================== [ 25.135985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 25.137002] Read of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 25.137571] [ 25.137950] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 25.138137] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.138213] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.138286] Call Trace: [ 25.138342] <TASK> [ 25.138390] dump_stack_lvl+0x73/0xb0 [ 25.138484] print_report+0xd1/0x650 [ 25.138590] ? __virt_addr_valid+0x1db/0x2d0 [ 25.138673] ? kasan_atomics_helper+0x4eae/0x5450 [ 25.138753] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.138924] ? kasan_atomics_helper+0x4eae/0x5450 [ 25.139059] kasan_report+0x141/0x180 [ 25.139174] ? kasan_atomics_helper+0x4eae/0x5450 [ 25.139278] __asan_report_load8_noabort+0x18/0x20 [ 25.139349] kasan_atomics_helper+0x4eae/0x5450 [ 25.139390] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.139427] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.139474] ? kasan_atomics+0x152/0x310 [ 25.139545] kasan_atomics+0x1dc/0x310 [ 25.139585] ? __pfx_kasan_atomics+0x10/0x10 [ 25.139624] ? __pfx_read_tsc+0x10/0x10 [ 25.139658] ? ktime_get_ts64+0x86/0x230 [ 25.139696] kunit_try_run_case+0x1a5/0x480 [ 25.139737] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.139776] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.139812] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.139847] ? __kthread_parkme+0x82/0x180 [ 25.139879] ? preempt_count_sub+0x50/0x80 [ 25.139912] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.139951] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.139988] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.140026] kthread+0x337/0x6f0 [ 25.140056] ? trace_preempt_on+0x20/0xc0 [ 25.140091] ? __pfx_kthread+0x10/0x10 [ 25.140122] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.140155] ? calculate_sigpending+0x7b/0xa0 [ 25.140192] ? __pfx_kthread+0x10/0x10 [ 25.140235] ret_from_fork+0x116/0x1d0 [ 25.140287] ? __pfx_kthread+0x10/0x10 [ 25.140320] ret_from_fork_asm+0x1a/0x30 [ 25.140364] </TASK> [ 25.140380] [ 25.156075] Allocated by task 283: [ 25.156588] kasan_save_stack+0x45/0x70 [ 25.157086] kasan_save_track+0x18/0x40 [ 25.157790] kasan_save_alloc_info+0x3b/0x50 [ 25.158650] __kasan_kmalloc+0xb7/0xc0 [ 25.158974] __kmalloc_cache_noprof+0x189/0x420 [ 25.159341] kasan_atomics+0x95/0x310 [ 25.159762] kunit_try_run_case+0x1a5/0x480 [ 25.160214] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.161017] kthread+0x337/0x6f0 [ 25.161777] ret_from_fork+0x116/0x1d0 [ 25.162702] ret_from_fork_asm+0x1a/0x30 [ 25.163154] [ 25.163424] The buggy address belongs to the object at ffff8881039d9c80 [ 25.163424] which belongs to the cache kmalloc-64 of size 64 [ 25.165182] The buggy address is located 0 bytes to the right of [ 25.165182] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 25.166042] [ 25.166322] The buggy address belongs to the physical page: [ 25.166881] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 25.167993] flags: 0x200000000000000(node=0|zone=2) [ 25.168442] page_type: f5(slab) [ 25.168881] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.169574] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.170261] page dumped because: kasan: bad access detected [ 25.170984] [ 25.171444] Memory state around the buggy address: [ 25.172086] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.172862] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.173591] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.174360] ^ [ 25.175027] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.175985] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.176751] ================================================================== [ 25.617360] ================================================================== [ 25.618008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 25.618702] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 25.619401] [ 25.620148] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 25.620643] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.620690] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.620758] Call Trace: [ 25.620817] <TASK> [ 25.620874] dump_stack_lvl+0x73/0xb0 [ 25.620980] print_report+0xd1/0x650 [ 25.621064] ? __virt_addr_valid+0x1db/0x2d0 [ 25.621148] ? kasan_atomics_helper+0x19e3/0x5450 [ 25.621227] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.621334] ? kasan_atomics_helper+0x19e3/0x5450 [ 25.621414] kasan_report+0x141/0x180 [ 25.621511] ? kasan_atomics_helper+0x19e3/0x5450 [ 25.621604] kasan_check_range+0x10c/0x1c0 [ 25.621699] __kasan_check_write+0x18/0x20 [ 25.621770] kasan_atomics_helper+0x19e3/0x5450 [ 25.621852] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.621928] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.621989] ? kasan_atomics+0x152/0x310 [ 25.622032] kasan_atomics+0x1dc/0x310 [ 25.622068] ? __pfx_kasan_atomics+0x10/0x10 [ 25.622109] ? __pfx_read_tsc+0x10/0x10 [ 25.622143] ? ktime_get_ts64+0x86/0x230 [ 25.622179] kunit_try_run_case+0x1a5/0x480 [ 25.622226] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.622304] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.622344] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.622381] ? __kthread_parkme+0x82/0x180 [ 25.622413] ? preempt_count_sub+0x50/0x80 [ 25.622447] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.622486] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.622553] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.622592] kthread+0x337/0x6f0 [ 25.622621] ? trace_preempt_on+0x20/0xc0 [ 25.622657] ? __pfx_kthread+0x10/0x10 [ 25.622686] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.622720] ? calculate_sigpending+0x7b/0xa0 [ 25.622757] ? __pfx_kthread+0x10/0x10 [ 25.622788] ret_from_fork+0x116/0x1d0 [ 25.622816] ? __pfx_kthread+0x10/0x10 [ 25.622846] ret_from_fork_asm+0x1a/0x30 [ 25.622892] </TASK> [ 25.622910] [ 25.638141] Allocated by task 283: [ 25.638632] kasan_save_stack+0x45/0x70 [ 25.639152] kasan_save_track+0x18/0x40 [ 25.639595] kasan_save_alloc_info+0x3b/0x50 [ 25.640034] __kasan_kmalloc+0xb7/0xc0 [ 25.640459] __kmalloc_cache_noprof+0x189/0x420 [ 25.640935] kasan_atomics+0x95/0x310 [ 25.642615] kunit_try_run_case+0x1a5/0x480 [ 25.642999] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.643546] kthread+0x337/0x6f0 [ 25.648903] ret_from_fork+0x116/0x1d0 [ 25.649833] ret_from_fork_asm+0x1a/0x30 [ 25.650175] [ 25.651656] The buggy address belongs to the object at ffff8881039d9c80 [ 25.651656] which belongs to the cache kmalloc-64 of size 64 [ 25.654119] The buggy address is located 0 bytes to the right of [ 25.654119] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 25.656987] [ 25.657180] The buggy address belongs to the physical page: [ 25.658043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 25.658926] flags: 0x200000000000000(node=0|zone=2) [ 25.659343] page_type: f5(slab) [ 25.659711] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.660297] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.660931] page dumped because: kasan: bad access detected [ 25.661392] [ 25.661769] Memory state around the buggy address: [ 25.662387] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.663023] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.663831] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.664411] ^ [ 25.665056] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.665809] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.666529] ================================================================== [ 23.900099] ================================================================== [ 23.904305] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 23.906596] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 23.908210] [ 23.908855] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 23.908933] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.908954] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.908988] Call Trace: [ 23.909014] <TASK> [ 23.909040] dump_stack_lvl+0x73/0xb0 [ 23.909100] print_report+0xd1/0x650 [ 23.909136] ? __virt_addr_valid+0x1db/0x2d0 [ 23.909171] ? kasan_atomics_helper+0x7c7/0x5450 [ 23.909203] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.909294] ? kasan_atomics_helper+0x7c7/0x5450 [ 23.909381] kasan_report+0x141/0x180 [ 23.909462] ? kasan_atomics_helper+0x7c7/0x5450 [ 23.909588] kasan_check_range+0x10c/0x1c0 [ 23.909691] __kasan_check_write+0x18/0x20 [ 23.909767] kasan_atomics_helper+0x7c7/0x5450 [ 23.909871] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.909942] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.910021] ? kasan_atomics+0x152/0x310 [ 23.910099] kasan_atomics+0x1dc/0x310 [ 23.910167] ? __pfx_kasan_atomics+0x10/0x10 [ 23.910240] ? __pfx_read_tsc+0x10/0x10 [ 23.910304] ? ktime_get_ts64+0x86/0x230 [ 23.910374] kunit_try_run_case+0x1a5/0x480 [ 23.910455] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.910553] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.910641] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.910702] ? __kthread_parkme+0x82/0x180 [ 23.910737] ? preempt_count_sub+0x50/0x80 [ 23.910774] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.910814] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.910852] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.910891] kthread+0x337/0x6f0 [ 23.910921] ? trace_preempt_on+0x20/0xc0 [ 23.910957] ? __pfx_kthread+0x10/0x10 [ 23.910987] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.911020] ? calculate_sigpending+0x7b/0xa0 [ 23.911056] ? __pfx_kthread+0x10/0x10 [ 23.911087] ret_from_fork+0x116/0x1d0 [ 23.911114] ? __pfx_kthread+0x10/0x10 [ 23.911144] ret_from_fork_asm+0x1a/0x30 [ 23.911189] </TASK> [ 23.911205] [ 23.936487] Allocated by task 283: [ 23.937109] kasan_save_stack+0x45/0x70 [ 23.937904] kasan_save_track+0x18/0x40 [ 23.938423] kasan_save_alloc_info+0x3b/0x50 [ 23.939023] __kasan_kmalloc+0xb7/0xc0 [ 23.939515] __kmalloc_cache_noprof+0x189/0x420 [ 23.940974] kasan_atomics+0x95/0x310 [ 23.941353] kunit_try_run_case+0x1a5/0x480 [ 23.942156] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.943079] kthread+0x337/0x6f0 [ 23.943656] ret_from_fork+0x116/0x1d0 [ 23.944750] ret_from_fork_asm+0x1a/0x30 [ 23.946007] [ 23.946412] The buggy address belongs to the object at ffff8881039d9c80 [ 23.946412] which belongs to the cache kmalloc-64 of size 64 [ 23.947941] The buggy address is located 0 bytes to the right of [ 23.947941] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 23.948758] [ 23.949120] The buggy address belongs to the physical page: [ 23.949755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 23.951156] flags: 0x200000000000000(node=0|zone=2) [ 23.951657] page_type: f5(slab) [ 23.952016] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.953443] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.954415] page dumped because: kasan: bad access detected [ 23.955148] [ 23.955373] Memory state around the buggy address: [ 23.956376] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.957613] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.958294] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.959192] ^ [ 23.959836] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.960527] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.961117] ================================================================== [ 26.107988] ================================================================== [ 26.108413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 26.110115] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 26.111289] [ 26.111658] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 26.111842] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.111885] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.111951] Call Trace: [ 26.112005] <TASK> [ 26.112059] dump_stack_lvl+0x73/0xb0 [ 26.112160] print_report+0xd1/0x650 [ 26.112264] ? __virt_addr_valid+0x1db/0x2d0 [ 26.112346] ? kasan_atomics_helper+0x2006/0x5450 [ 26.112419] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.112536] ? kasan_atomics_helper+0x2006/0x5450 [ 26.112607] kasan_report+0x141/0x180 [ 26.112685] ? kasan_atomics_helper+0x2006/0x5450 [ 26.112778] kasan_check_range+0x10c/0x1c0 [ 26.112860] __kasan_check_write+0x18/0x20 [ 26.112895] kasan_atomics_helper+0x2006/0x5450 [ 26.112930] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.112964] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.113009] ? kasan_atomics+0x152/0x310 [ 26.113048] kasan_atomics+0x1dc/0x310 [ 26.113082] ? __pfx_kasan_atomics+0x10/0x10 [ 26.113118] ? __pfx_read_tsc+0x10/0x10 [ 26.113149] ? ktime_get_ts64+0x86/0x230 [ 26.113186] kunit_try_run_case+0x1a5/0x480 [ 26.113256] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.113309] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.113347] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.113383] ? __kthread_parkme+0x82/0x180 [ 26.113415] ? preempt_count_sub+0x50/0x80 [ 26.113452] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.113489] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.113559] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.113598] kthread+0x337/0x6f0 [ 26.113643] ? trace_preempt_on+0x20/0xc0 [ 26.113681] ? __pfx_kthread+0x10/0x10 [ 26.113712] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.113745] ? calculate_sigpending+0x7b/0xa0 [ 26.113780] ? __pfx_kthread+0x10/0x10 [ 26.113812] ret_from_fork+0x116/0x1d0 [ 26.113840] ? __pfx_kthread+0x10/0x10 [ 26.113871] ret_from_fork_asm+0x1a/0x30 [ 26.113914] </TASK> [ 26.113931] [ 26.132997] Allocated by task 283: [ 26.133711] kasan_save_stack+0x45/0x70 [ 26.134205] kasan_save_track+0x18/0x40 [ 26.134803] kasan_save_alloc_info+0x3b/0x50 [ 26.135336] __kasan_kmalloc+0xb7/0xc0 [ 26.135809] __kmalloc_cache_noprof+0x189/0x420 [ 26.136372] kasan_atomics+0x95/0x310 [ 26.136819] kunit_try_run_case+0x1a5/0x480 [ 26.137300] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.137947] kthread+0x337/0x6f0 [ 26.138367] ret_from_fork+0x116/0x1d0 [ 26.138902] ret_from_fork_asm+0x1a/0x30 [ 26.139299] [ 26.139593] The buggy address belongs to the object at ffff8881039d9c80 [ 26.139593] which belongs to the cache kmalloc-64 of size 64 [ 26.140817] The buggy address is located 0 bytes to the right of [ 26.140817] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 26.141915] [ 26.142112] The buggy address belongs to the physical page: [ 26.142645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 26.143627] flags: 0x200000000000000(node=0|zone=2) [ 26.144239] page_type: f5(slab) [ 26.144716] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.145468] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.146021] page dumped because: kasan: bad access detected [ 26.146491] [ 26.146865] Memory state around the buggy address: [ 26.147723] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.148474] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.148976] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.150077] ^ [ 26.150679] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.151310] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.152225] ================================================================== [ 25.044551] ================================================================== [ 25.045341] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 25.046197] Read of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 25.046803] [ 25.047089] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 25.047233] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.047823] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.047868] Call Trace: [ 25.047894] <TASK> [ 25.047922] dump_stack_lvl+0x73/0xb0 [ 25.047980] print_report+0xd1/0x650 [ 25.048018] ? __virt_addr_valid+0x1db/0x2d0 [ 25.048054] ? kasan_atomics_helper+0x49ce/0x5450 [ 25.048088] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.048121] ? kasan_atomics_helper+0x49ce/0x5450 [ 25.048154] kasan_report+0x141/0x180 [ 25.048187] ? kasan_atomics_helper+0x49ce/0x5450 [ 25.048232] __asan_report_load4_noabort+0x18/0x20 [ 25.048314] kasan_atomics_helper+0x49ce/0x5450 [ 25.048356] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.048392] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.048439] ? kasan_atomics+0x152/0x310 [ 25.048480] kasan_atomics+0x1dc/0x310 [ 25.048543] ? __pfx_kasan_atomics+0x10/0x10 [ 25.048586] ? __pfx_read_tsc+0x10/0x10 [ 25.048621] ? ktime_get_ts64+0x86/0x230 [ 25.048659] kunit_try_run_case+0x1a5/0x480 [ 25.048700] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.048738] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.048775] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.048812] ? __kthread_parkme+0x82/0x180 [ 25.048845] ? preempt_count_sub+0x50/0x80 [ 25.048880] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.048919] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.048955] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.048992] kthread+0x337/0x6f0 [ 25.049022] ? trace_preempt_on+0x20/0xc0 [ 25.049059] ? __pfx_kthread+0x10/0x10 [ 25.049090] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.049125] ? calculate_sigpending+0x7b/0xa0 [ 25.049163] ? __pfx_kthread+0x10/0x10 [ 25.049195] ret_from_fork+0x116/0x1d0 [ 25.049233] ? __pfx_kthread+0x10/0x10 [ 25.049286] ret_from_fork_asm+0x1a/0x30 [ 25.049333] </TASK> [ 25.049352] [ 25.066182] Allocated by task 283: [ 25.066608] kasan_save_stack+0x45/0x70 [ 25.067082] kasan_save_track+0x18/0x40 [ 25.067645] kasan_save_alloc_info+0x3b/0x50 [ 25.068114] __kasan_kmalloc+0xb7/0xc0 [ 25.068659] __kmalloc_cache_noprof+0x189/0x420 [ 25.069201] kasan_atomics+0x95/0x310 [ 25.069696] kunit_try_run_case+0x1a5/0x480 [ 25.070201] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.070719] kthread+0x337/0x6f0 [ 25.071206] ret_from_fork+0x116/0x1d0 [ 25.071823] ret_from_fork_asm+0x1a/0x30 [ 25.072389] [ 25.072698] The buggy address belongs to the object at ffff8881039d9c80 [ 25.072698] which belongs to the cache kmalloc-64 of size 64 [ 25.073781] The buggy address is located 0 bytes to the right of [ 25.073781] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 25.074654] [ 25.074996] The buggy address belongs to the physical page: [ 25.075581] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 25.076547] flags: 0x200000000000000(node=0|zone=2) [ 25.076917] page_type: f5(slab) [ 25.077204] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.077899] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.078708] page dumped because: kasan: bad access detected [ 25.079239] [ 25.079454] Memory state around the buggy address: [ 25.080755] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.081653] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.082271] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.083021] ^ [ 25.083708] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.084229] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.085034] ================================================================== [ 24.698247] ================================================================== [ 24.699766] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 24.700461] Read of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 24.701021] [ 24.701352] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 24.701490] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.701553] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.701679] Call Trace: [ 24.701737] <TASK> [ 24.701797] dump_stack_lvl+0x73/0xb0 [ 24.701897] print_report+0xd1/0x650 [ 24.702181] ? __virt_addr_valid+0x1db/0x2d0 [ 24.702324] ? kasan_atomics_helper+0x4a36/0x5450 [ 24.702406] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.702489] ? kasan_atomics_helper+0x4a36/0x5450 [ 24.702590] kasan_report+0x141/0x180 [ 24.702671] ? kasan_atomics_helper+0x4a36/0x5450 [ 24.702758] __asan_report_load4_noabort+0x18/0x20 [ 24.702833] kasan_atomics_helper+0x4a36/0x5450 [ 24.702900] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.702961] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.703040] ? kasan_atomics+0x152/0x310 [ 24.703107] kasan_atomics+0x1dc/0x310 [ 24.703171] ? __pfx_kasan_atomics+0x10/0x10 [ 24.703241] ? __pfx_read_tsc+0x10/0x10 [ 24.703304] ? ktime_get_ts64+0x86/0x230 [ 24.703370] kunit_try_run_case+0x1a5/0x480 [ 24.703438] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.703522] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.703592] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.703664] ? __kthread_parkme+0x82/0x180 [ 24.703735] ? preempt_count_sub+0x50/0x80 [ 24.703807] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.703881] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.703945] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.703987] kthread+0x337/0x6f0 [ 24.704017] ? trace_preempt_on+0x20/0xc0 [ 24.704053] ? __pfx_kthread+0x10/0x10 [ 24.704082] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.704116] ? calculate_sigpending+0x7b/0xa0 [ 24.704153] ? __pfx_kthread+0x10/0x10 [ 24.704184] ret_from_fork+0x116/0x1d0 [ 24.704211] ? __pfx_kthread+0x10/0x10 [ 24.704291] ret_from_fork_asm+0x1a/0x30 [ 24.704345] </TASK> [ 24.704365] [ 24.719462] Allocated by task 283: [ 24.719958] kasan_save_stack+0x45/0x70 [ 24.720552] kasan_save_track+0x18/0x40 [ 24.720966] kasan_save_alloc_info+0x3b/0x50 [ 24.721399] __kasan_kmalloc+0xb7/0xc0 [ 24.721756] __kmalloc_cache_noprof+0x189/0x420 [ 24.722251] kasan_atomics+0x95/0x310 [ 24.722871] kunit_try_run_case+0x1a5/0x480 [ 24.723438] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.724013] kthread+0x337/0x6f0 [ 24.724490] ret_from_fork+0x116/0x1d0 [ 24.724846] ret_from_fork_asm+0x1a/0x30 [ 24.725252] [ 24.725527] The buggy address belongs to the object at ffff8881039d9c80 [ 24.725527] which belongs to the cache kmalloc-64 of size 64 [ 24.726560] The buggy address is located 0 bytes to the right of [ 24.726560] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 24.727455] [ 24.727750] The buggy address belongs to the physical page: [ 24.728288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 24.728934] flags: 0x200000000000000(node=0|zone=2) [ 24.729433] page_type: f5(slab) [ 24.729870] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.730536] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.731232] page dumped because: kasan: bad access detected [ 24.731820] [ 24.732033] Memory state around the buggy address: [ 24.732384] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.732867] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.733329] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.734043] ^ [ 24.734679] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.735353] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.736361] ================================================================== [ 23.738797] ================================================================== [ 23.739453] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 23.740262] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 23.741421] [ 23.742053] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 23.742222] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.742266] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.742388] Call Trace: [ 23.742473] <TASK> [ 23.742780] dump_stack_lvl+0x73/0xb0 [ 23.742920] print_report+0xd1/0x650 [ 23.743007] ? __virt_addr_valid+0x1db/0x2d0 [ 23.743176] ? kasan_atomics_helper+0x5fe/0x5450 [ 23.743305] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.743398] ? kasan_atomics_helper+0x5fe/0x5450 [ 23.743478] kasan_report+0x141/0x180 [ 23.743815] ? kasan_atomics_helper+0x5fe/0x5450 [ 23.744374] kasan_check_range+0x10c/0x1c0 [ 23.744510] __kasan_check_write+0x18/0x20 [ 23.744591] kasan_atomics_helper+0x5fe/0x5450 [ 23.744674] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.744751] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.744990] ? kasan_atomics+0x152/0x310 [ 23.745086] kasan_atomics+0x1dc/0x310 [ 23.745175] ? __pfx_kasan_atomics+0x10/0x10 [ 23.745418] ? __pfx_read_tsc+0x10/0x10 [ 23.745545] ? ktime_get_ts64+0x86/0x230 [ 23.745711] kunit_try_run_case+0x1a5/0x480 [ 23.745757] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.745795] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.745832] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.745871] ? __kthread_parkme+0x82/0x180 [ 23.745903] ? preempt_count_sub+0x50/0x80 [ 23.745939] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.745976] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.746012] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.746049] kthread+0x337/0x6f0 [ 23.746079] ? trace_preempt_on+0x20/0xc0 [ 23.746114] ? __pfx_kthread+0x10/0x10 [ 23.746145] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.746178] ? calculate_sigpending+0x7b/0xa0 [ 23.746214] ? __pfx_kthread+0x10/0x10 [ 23.746280] ret_from_fork+0x116/0x1d0 [ 23.746313] ? __pfx_kthread+0x10/0x10 [ 23.746344] ret_from_fork_asm+0x1a/0x30 [ 23.746389] </TASK> [ 23.746406] [ 23.769254] Allocated by task 283: [ 23.769583] kasan_save_stack+0x45/0x70 [ 23.770020] kasan_save_track+0x18/0x40 [ 23.770325] kasan_save_alloc_info+0x3b/0x50 [ 23.774742] __kasan_kmalloc+0xb7/0xc0 [ 23.775758] __kmalloc_cache_noprof+0x189/0x420 [ 23.776279] kasan_atomics+0x95/0x310 [ 23.776717] kunit_try_run_case+0x1a5/0x480 [ 23.777003] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.777334] kthread+0x337/0x6f0 [ 23.779470] ret_from_fork+0x116/0x1d0 [ 23.780445] ret_from_fork_asm+0x1a/0x30 [ 23.781413] [ 23.782186] The buggy address belongs to the object at ffff8881039d9c80 [ 23.782186] which belongs to the cache kmalloc-64 of size 64 [ 23.783393] The buggy address is located 0 bytes to the right of [ 23.783393] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 23.784480] [ 23.784822] The buggy address belongs to the physical page: [ 23.785437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 23.786102] flags: 0x200000000000000(node=0|zone=2) [ 23.786693] page_type: f5(slab) [ 23.787186] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.787972] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.788606] page dumped because: kasan: bad access detected [ 23.789209] [ 23.789560] Memory state around the buggy address: [ 23.789980] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.790934] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.791482] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.793183] ^ [ 23.793940] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.794531] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.795322] ================================================================== [ 25.799618] ================================================================== [ 25.800680] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 25.801302] Read of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 25.801918] [ 25.802199] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 25.802340] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.802388] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.802462] Call Trace: [ 25.803310] <TASK> [ 25.803376] dump_stack_lvl+0x73/0xb0 [ 25.803477] print_report+0xd1/0x650 [ 25.803550] ? __virt_addr_valid+0x1db/0x2d0 [ 25.803591] ? kasan_atomics_helper+0x4f30/0x5450 [ 25.803627] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.803662] ? kasan_atomics_helper+0x4f30/0x5450 [ 25.803696] kasan_report+0x141/0x180 [ 25.803729] ? kasan_atomics_helper+0x4f30/0x5450 [ 25.803769] __asan_report_load8_noabort+0x18/0x20 [ 25.803808] kasan_atomics_helper+0x4f30/0x5450 [ 25.803842] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.803875] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.803922] ? kasan_atomics+0x152/0x310 [ 25.803961] kasan_atomics+0x1dc/0x310 [ 25.803997] ? __pfx_kasan_atomics+0x10/0x10 [ 25.804035] ? __pfx_read_tsc+0x10/0x10 [ 25.804068] ? ktime_get_ts64+0x86/0x230 [ 25.804106] kunit_try_run_case+0x1a5/0x480 [ 25.804147] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.804189] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.804271] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.804317] ? __kthread_parkme+0x82/0x180 [ 25.804352] ? preempt_count_sub+0x50/0x80 [ 25.804387] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.804427] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.804464] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.804524] kthread+0x337/0x6f0 [ 25.804560] ? trace_preempt_on+0x20/0xc0 [ 25.804597] ? __pfx_kthread+0x10/0x10 [ 25.804628] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.804663] ? calculate_sigpending+0x7b/0xa0 [ 25.804701] ? __pfx_kthread+0x10/0x10 [ 25.804733] ret_from_fork+0x116/0x1d0 [ 25.804761] ? __pfx_kthread+0x10/0x10 [ 25.804793] ret_from_fork_asm+0x1a/0x30 [ 25.804838] </TASK> [ 25.804856] [ 25.822069] Allocated by task 283: [ 25.822555] kasan_save_stack+0x45/0x70 [ 25.822929] kasan_save_track+0x18/0x40 [ 25.823383] kasan_save_alloc_info+0x3b/0x50 [ 25.823924] __kasan_kmalloc+0xb7/0xc0 [ 25.824400] __kmalloc_cache_noprof+0x189/0x420 [ 25.824931] kasan_atomics+0x95/0x310 [ 25.825299] kunit_try_run_case+0x1a5/0x480 [ 25.825718] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.826392] kthread+0x337/0x6f0 [ 25.826860] ret_from_fork+0x116/0x1d0 [ 25.827342] ret_from_fork_asm+0x1a/0x30 [ 25.827868] [ 25.828118] The buggy address belongs to the object at ffff8881039d9c80 [ 25.828118] which belongs to the cache kmalloc-64 of size 64 [ 25.829147] The buggy address is located 0 bytes to the right of [ 25.829147] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 25.830267] [ 25.830559] The buggy address belongs to the physical page: [ 25.831056] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 25.831811] flags: 0x200000000000000(node=0|zone=2) [ 25.832413] page_type: f5(slab) [ 25.832794] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.833545] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.834030] page dumped because: kasan: bad access detected [ 25.834587] [ 25.834839] Memory state around the buggy address: [ 25.835396] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.836071] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.836601] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.837177] ^ [ 25.837777] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.838646] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.839634] ================================================================== [ 25.842186] ================================================================== [ 25.842937] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 25.843698] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 25.844343] [ 25.844705] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 25.844823] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.844863] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.844931] Call Trace: [ 25.844992] <TASK> [ 25.845052] dump_stack_lvl+0x73/0xb0 [ 25.845155] print_report+0xd1/0x650 [ 25.845292] ? __virt_addr_valid+0x1db/0x2d0 [ 25.845383] ? kasan_atomics_helper+0x1ce1/0x5450 [ 25.845464] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.845572] ? kasan_atomics_helper+0x1ce1/0x5450 [ 25.845670] kasan_report+0x141/0x180 [ 25.845756] ? kasan_atomics_helper+0x1ce1/0x5450 [ 25.845835] kasan_check_range+0x10c/0x1c0 [ 25.845919] __kasan_check_write+0x18/0x20 [ 25.845996] kasan_atomics_helper+0x1ce1/0x5450 [ 25.846075] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.846153] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.846300] ? kasan_atomics+0x152/0x310 [ 25.846398] kasan_atomics+0x1dc/0x310 [ 25.846478] ? __pfx_kasan_atomics+0x10/0x10 [ 25.846564] ? __pfx_read_tsc+0x10/0x10 [ 25.846603] ? ktime_get_ts64+0x86/0x230 [ 25.846640] kunit_try_run_case+0x1a5/0x480 [ 25.846681] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.846719] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.846756] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.846791] ? __kthread_parkme+0x82/0x180 [ 25.846823] ? preempt_count_sub+0x50/0x80 [ 25.846858] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.846895] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.846930] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.846966] kthread+0x337/0x6f0 [ 25.846995] ? trace_preempt_on+0x20/0xc0 [ 25.847030] ? __pfx_kthread+0x10/0x10 [ 25.847061] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.847093] ? calculate_sigpending+0x7b/0xa0 [ 25.847130] ? __pfx_kthread+0x10/0x10 [ 25.847160] ret_from_fork+0x116/0x1d0 [ 25.847188] ? __pfx_kthread+0x10/0x10 [ 25.847239] ret_from_fork_asm+0x1a/0x30 [ 25.847317] </TASK> [ 25.847337] [ 25.863936] Allocated by task 283: [ 25.864441] kasan_save_stack+0x45/0x70 [ 25.864923] kasan_save_track+0x18/0x40 [ 25.865383] kasan_save_alloc_info+0x3b/0x50 [ 25.865770] __kasan_kmalloc+0xb7/0xc0 [ 25.866106] __kmalloc_cache_noprof+0x189/0x420 [ 25.866593] kasan_atomics+0x95/0x310 [ 25.867031] kunit_try_run_case+0x1a5/0x480 [ 25.867655] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.868273] kthread+0x337/0x6f0 [ 25.868781] ret_from_fork+0x116/0x1d0 [ 25.869103] ret_from_fork_asm+0x1a/0x30 [ 25.869810] [ 25.870069] The buggy address belongs to the object at ffff8881039d9c80 [ 25.870069] which belongs to the cache kmalloc-64 of size 64 [ 25.872049] The buggy address is located 0 bytes to the right of [ 25.872049] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 25.874109] [ 25.875036] The buggy address belongs to the physical page: [ 25.875490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 25.876267] flags: 0x200000000000000(node=0|zone=2) [ 25.876737] page_type: f5(slab) [ 25.877096] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.877802] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.878434] page dumped because: kasan: bad access detected [ 25.878934] [ 25.879170] Memory state around the buggy address: [ 25.879661] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.880314] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.880874] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.881419] ^ [ 25.881912] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.882559] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.883114] ================================================================== [ 23.686032] ================================================================== [ 23.686743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 23.687371] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 23.688050] [ 23.688347] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 23.688491] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.688550] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.688613] Call Trace: [ 23.688665] <TASK> [ 23.688723] dump_stack_lvl+0x73/0xb0 [ 23.688838] print_report+0xd1/0x650 [ 23.688924] ? __virt_addr_valid+0x1db/0x2d0 [ 23.689007] ? kasan_atomics_helper+0x565/0x5450 [ 23.689090] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.689169] ? kasan_atomics_helper+0x565/0x5450 [ 23.689249] kasan_report+0x141/0x180 [ 23.689345] ? kasan_atomics_helper+0x565/0x5450 [ 23.689440] kasan_check_range+0x10c/0x1c0 [ 23.689544] __kasan_check_write+0x18/0x20 [ 23.689631] kasan_atomics_helper+0x565/0x5450 [ 23.689717] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.689801] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.689883] ? kasan_atomics+0x152/0x310 [ 23.689956] kasan_atomics+0x1dc/0x310 [ 23.690036] ? __pfx_kasan_atomics+0x10/0x10 [ 23.690126] ? __pfx_read_tsc+0x10/0x10 [ 23.690215] ? ktime_get_ts64+0x86/0x230 [ 23.690316] kunit_try_run_case+0x1a5/0x480 [ 23.690411] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.690494] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.690595] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.690680] ? __kthread_parkme+0x82/0x180 [ 23.690755] ? preempt_count_sub+0x50/0x80 [ 23.690839] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.690927] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.690978] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.691018] kthread+0x337/0x6f0 [ 23.691049] ? trace_preempt_on+0x20/0xc0 [ 23.691086] ? __pfx_kthread+0x10/0x10 [ 23.691118] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.691150] ? calculate_sigpending+0x7b/0xa0 [ 23.691186] ? __pfx_kthread+0x10/0x10 [ 23.691219] ret_from_fork+0x116/0x1d0 [ 23.691279] ? __pfx_kthread+0x10/0x10 [ 23.691313] ret_from_fork_asm+0x1a/0x30 [ 23.691357] </TASK> [ 23.691375] [ 23.716062] Allocated by task 283: [ 23.716885] kasan_save_stack+0x45/0x70 [ 23.717256] kasan_save_track+0x18/0x40 [ 23.717733] kasan_save_alloc_info+0x3b/0x50 [ 23.718602] __kasan_kmalloc+0xb7/0xc0 [ 23.719336] __kmalloc_cache_noprof+0x189/0x420 [ 23.720004] kasan_atomics+0x95/0x310 [ 23.720587] kunit_try_run_case+0x1a5/0x480 [ 23.721217] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.721855] kthread+0x337/0x6f0 [ 23.722176] ret_from_fork+0x116/0x1d0 [ 23.723041] ret_from_fork_asm+0x1a/0x30 [ 23.723857] [ 23.724082] The buggy address belongs to the object at ffff8881039d9c80 [ 23.724082] which belongs to the cache kmalloc-64 of size 64 [ 23.724934] The buggy address is located 0 bytes to the right of [ 23.724934] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 23.727097] [ 23.727743] The buggy address belongs to the physical page: [ 23.728343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 23.729460] flags: 0x200000000000000(node=0|zone=2) [ 23.729906] page_type: f5(slab) [ 23.730332] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.730970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.731728] page dumped because: kasan: bad access detected [ 23.732546] [ 23.732880] Memory state around the buggy address: [ 23.733349] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.734162] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.734842] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.735323] ^ [ 23.735931] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.736698] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.737575] ================================================================== [ 24.872931] ================================================================== [ 24.873995] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 24.874871] Read of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 24.875935] [ 24.876142] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 24.876212] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.876582] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.876677] Call Trace: [ 24.876732] <TASK> [ 24.876787] dump_stack_lvl+0x73/0xb0 [ 24.876888] print_report+0xd1/0x650 [ 24.876971] ? __virt_addr_valid+0x1db/0x2d0 [ 24.877052] ? kasan_atomics_helper+0x4a02/0x5450 [ 24.877132] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.877215] ? kasan_atomics_helper+0x4a02/0x5450 [ 24.877318] kasan_report+0x141/0x180 [ 24.877355] ? kasan_atomics_helper+0x4a02/0x5450 [ 24.877396] __asan_report_load4_noabort+0x18/0x20 [ 24.877434] kasan_atomics_helper+0x4a02/0x5450 [ 24.877467] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.877524] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.877574] ? kasan_atomics+0x152/0x310 [ 24.877629] kasan_atomics+0x1dc/0x310 [ 24.877667] ? __pfx_kasan_atomics+0x10/0x10 [ 24.877704] ? __pfx_read_tsc+0x10/0x10 [ 24.877737] ? ktime_get_ts64+0x86/0x230 [ 24.877776] kunit_try_run_case+0x1a5/0x480 [ 24.877816] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.877852] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.877888] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.877923] ? __kthread_parkme+0x82/0x180 [ 24.877954] ? preempt_count_sub+0x50/0x80 [ 24.877988] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.878026] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.878060] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.878096] kthread+0x337/0x6f0 [ 24.878125] ? trace_preempt_on+0x20/0xc0 [ 24.878159] ? __pfx_kthread+0x10/0x10 [ 24.878189] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.878229] ? calculate_sigpending+0x7b/0xa0 [ 24.878294] ? __pfx_kthread+0x10/0x10 [ 24.878327] ret_from_fork+0x116/0x1d0 [ 24.878356] ? __pfx_kthread+0x10/0x10 [ 24.878385] ret_from_fork_asm+0x1a/0x30 [ 24.878429] </TASK> [ 24.878445] [ 24.898064] Allocated by task 283: [ 24.898359] kasan_save_stack+0x45/0x70 [ 24.899307] kasan_save_track+0x18/0x40 [ 24.899870] kasan_save_alloc_info+0x3b/0x50 [ 24.900547] __kasan_kmalloc+0xb7/0xc0 [ 24.900921] __kmalloc_cache_noprof+0x189/0x420 [ 24.901570] kasan_atomics+0x95/0x310 [ 24.902017] kunit_try_run_case+0x1a5/0x480 [ 24.902454] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.903182] kthread+0x337/0x6f0 [ 24.903589] ret_from_fork+0x116/0x1d0 [ 24.904012] ret_from_fork_asm+0x1a/0x30 [ 24.904412] [ 24.904762] The buggy address belongs to the object at ffff8881039d9c80 [ 24.904762] which belongs to the cache kmalloc-64 of size 64 [ 24.905778] The buggy address is located 0 bytes to the right of [ 24.905778] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 24.906825] [ 24.907089] The buggy address belongs to the physical page: [ 24.907711] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 24.908521] flags: 0x200000000000000(node=0|zone=2) [ 24.908965] page_type: f5(slab) [ 24.909520] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.910165] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.910912] page dumped because: kasan: bad access detected [ 24.911510] [ 24.911742] Memory state around the buggy address: [ 24.912410] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.912954] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.913790] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.914349] ^ [ 24.914896] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.915611] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.916281] ================================================================== [ 24.021383] ================================================================== [ 24.021879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 24.023494] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 24.024249] [ 24.025216] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 24.025368] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.025412] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.025482] Call Trace: [ 24.025564] <TASK> [ 24.025639] dump_stack_lvl+0x73/0xb0 [ 24.025765] print_report+0xd1/0x650 [ 24.025852] ? __virt_addr_valid+0x1db/0x2d0 [ 24.025932] ? kasan_atomics_helper+0x8f9/0x5450 [ 24.026007] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.026084] ? kasan_atomics_helper+0x8f9/0x5450 [ 24.026121] kasan_report+0x141/0x180 [ 24.026158] ? kasan_atomics_helper+0x8f9/0x5450 [ 24.026197] kasan_check_range+0x10c/0x1c0 [ 24.026251] __kasan_check_write+0x18/0x20 [ 24.026298] kasan_atomics_helper+0x8f9/0x5450 [ 24.026333] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.026365] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.026412] ? kasan_atomics+0x152/0x310 [ 24.026451] kasan_atomics+0x1dc/0x310 [ 24.026484] ? __pfx_kasan_atomics+0x10/0x10 [ 24.026568] ? __pfx_read_tsc+0x10/0x10 [ 24.026651] ? ktime_get_ts64+0x86/0x230 [ 24.026721] kunit_try_run_case+0x1a5/0x480 [ 24.026792] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.026857] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.026923] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.026988] ? __kthread_parkme+0x82/0x180 [ 24.027049] ? preempt_count_sub+0x50/0x80 [ 24.027112] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.027186] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.027262] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.027321] kthread+0x337/0x6f0 [ 24.027353] ? trace_preempt_on+0x20/0xc0 [ 24.027389] ? __pfx_kthread+0x10/0x10 [ 24.027420] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.027454] ? calculate_sigpending+0x7b/0xa0 [ 24.027489] ? __pfx_kthread+0x10/0x10 [ 24.027600] ret_from_fork+0x116/0x1d0 [ 24.027677] ? __pfx_kthread+0x10/0x10 [ 24.027723] ret_from_fork_asm+0x1a/0x30 [ 24.027769] </TASK> [ 24.027787] [ 24.059304] Allocated by task 283: [ 24.059685] kasan_save_stack+0x45/0x70 [ 24.060120] kasan_save_track+0x18/0x40 [ 24.060705] kasan_save_alloc_info+0x3b/0x50 [ 24.061285] __kasan_kmalloc+0xb7/0xc0 [ 24.061726] __kmalloc_cache_noprof+0x189/0x420 [ 24.062331] kasan_atomics+0x95/0x310 [ 24.063556] kunit_try_run_case+0x1a5/0x480 [ 24.063985] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.064479] kthread+0x337/0x6f0 [ 24.064861] ret_from_fork+0x116/0x1d0 [ 24.065456] ret_from_fork_asm+0x1a/0x30 [ 24.065985] [ 24.066231] The buggy address belongs to the object at ffff8881039d9c80 [ 24.066231] which belongs to the cache kmalloc-64 of size 64 [ 24.067142] The buggy address is located 0 bytes to the right of [ 24.067142] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 24.068528] [ 24.068794] The buggy address belongs to the physical page: [ 24.069288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 24.069948] flags: 0x200000000000000(node=0|zone=2) [ 24.070474] page_type: f5(slab) [ 24.070833] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.071452] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.073285] page dumped because: kasan: bad access detected [ 24.074006] [ 24.074221] Memory state around the buggy address: [ 24.074855] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.075404] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.076908] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.077587] ^ [ 24.078014] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.078629] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.079229] ================================================================== [ 24.081120] ================================================================== [ 24.081917] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 24.083286] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 24.084876] [ 24.085364] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 24.085529] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.085572] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.085659] Call Trace: [ 24.085716] <TASK> [ 24.085772] dump_stack_lvl+0x73/0xb0 [ 24.085939] print_report+0xd1/0x650 [ 24.085999] ? __virt_addr_valid+0x1db/0x2d0 [ 24.086036] ? kasan_atomics_helper+0x992/0x5450 [ 24.086070] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.086104] ? kasan_atomics_helper+0x992/0x5450 [ 24.086135] kasan_report+0x141/0x180 [ 24.086168] ? kasan_atomics_helper+0x992/0x5450 [ 24.086206] kasan_check_range+0x10c/0x1c0 [ 24.086284] __kasan_check_write+0x18/0x20 [ 24.086316] kasan_atomics_helper+0x992/0x5450 [ 24.086350] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.086383] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.086428] ? kasan_atomics+0x152/0x310 [ 24.086467] kasan_atomics+0x1dc/0x310 [ 24.086526] ? __pfx_kasan_atomics+0x10/0x10 [ 24.086643] ? __pfx_read_tsc+0x10/0x10 [ 24.086701] ? ktime_get_ts64+0x86/0x230 [ 24.086740] kunit_try_run_case+0x1a5/0x480 [ 24.086782] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.086818] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.086854] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.086889] ? __kthread_parkme+0x82/0x180 [ 24.086921] ? preempt_count_sub+0x50/0x80 [ 24.086954] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.086990] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.087025] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.087062] kthread+0x337/0x6f0 [ 24.087090] ? trace_preempt_on+0x20/0xc0 [ 24.087125] ? __pfx_kthread+0x10/0x10 [ 24.087156] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.087187] ? calculate_sigpending+0x7b/0xa0 [ 24.087222] ? __pfx_kthread+0x10/0x10 [ 24.087285] ret_from_fork+0x116/0x1d0 [ 24.087315] ? __pfx_kthread+0x10/0x10 [ 24.087347] ret_from_fork_asm+0x1a/0x30 [ 24.087390] </TASK> [ 24.087407] [ 24.109177] Allocated by task 283: [ 24.109754] kasan_save_stack+0x45/0x70 [ 24.110289] kasan_save_track+0x18/0x40 [ 24.110869] kasan_save_alloc_info+0x3b/0x50 [ 24.111171] __kasan_kmalloc+0xb7/0xc0 [ 24.111490] __kmalloc_cache_noprof+0x189/0x420 [ 24.112054] kasan_atomics+0x95/0x310 [ 24.112533] kunit_try_run_case+0x1a5/0x480 [ 24.112990] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.113588] kthread+0x337/0x6f0 [ 24.113983] ret_from_fork+0x116/0x1d0 [ 24.114582] ret_from_fork_asm+0x1a/0x30 [ 24.115031] [ 24.115415] The buggy address belongs to the object at ffff8881039d9c80 [ 24.115415] which belongs to the cache kmalloc-64 of size 64 [ 24.116274] The buggy address is located 0 bytes to the right of [ 24.116274] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 24.117235] [ 24.117492] The buggy address belongs to the physical page: [ 24.118404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 24.120074] flags: 0x200000000000000(node=0|zone=2) [ 24.120830] page_type: f5(slab) [ 24.121269] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.122413] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.123959] page dumped because: kasan: bad access detected [ 24.124949] [ 24.125382] Memory state around the buggy address: [ 24.126478] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.128385] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.128888] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.129439] ^ [ 24.130689] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.131107] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.132162] ================================================================== [ 24.133314] ================================================================== [ 24.133925] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 24.135183] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 24.136641] [ 24.137021] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 24.137149] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.137186] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.137255] Call Trace: [ 24.137313] <TASK> [ 24.137980] dump_stack_lvl+0x73/0xb0 [ 24.138109] print_report+0xd1/0x650 [ 24.138194] ? __virt_addr_valid+0x1db/0x2d0 [ 24.138282] ? kasan_atomics_helper+0xa2b/0x5450 [ 24.138360] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.138441] ? kasan_atomics_helper+0xa2b/0x5450 [ 24.138546] kasan_report+0x141/0x180 [ 24.138691] ? kasan_atomics_helper+0xa2b/0x5450 [ 24.138749] kasan_check_range+0x10c/0x1c0 [ 24.138786] __kasan_check_write+0x18/0x20 [ 24.138818] kasan_atomics_helper+0xa2b/0x5450 [ 24.138852] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.138885] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.138930] ? kasan_atomics+0x152/0x310 [ 24.138969] kasan_atomics+0x1dc/0x310 [ 24.139003] ? __pfx_kasan_atomics+0x10/0x10 [ 24.139039] ? __pfx_read_tsc+0x10/0x10 [ 24.139071] ? ktime_get_ts64+0x86/0x230 [ 24.139107] kunit_try_run_case+0x1a5/0x480 [ 24.139146] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.139182] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.139220] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.139289] ? __kthread_parkme+0x82/0x180 [ 24.139323] ? preempt_count_sub+0x50/0x80 [ 24.139358] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.139396] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.139431] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.139468] kthread+0x337/0x6f0 [ 24.139521] ? trace_preempt_on+0x20/0xc0 [ 24.139604] ? __pfx_kthread+0x10/0x10 [ 24.139683] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.139755] ? calculate_sigpending+0x7b/0xa0 [ 24.139794] ? __pfx_kthread+0x10/0x10 [ 24.139827] ret_from_fork+0x116/0x1d0 [ 24.139856] ? __pfx_kthread+0x10/0x10 [ 24.139887] ret_from_fork_asm+0x1a/0x30 [ 24.139930] </TASK> [ 24.139946] [ 24.162462] Allocated by task 283: [ 24.163073] kasan_save_stack+0x45/0x70 [ 24.163634] kasan_save_track+0x18/0x40 [ 24.164270] kasan_save_alloc_info+0x3b/0x50 [ 24.164776] __kasan_kmalloc+0xb7/0xc0 [ 24.165775] __kmalloc_cache_noprof+0x189/0x420 [ 24.166279] kasan_atomics+0x95/0x310 [ 24.167082] kunit_try_run_case+0x1a5/0x480 [ 24.167883] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.168357] kthread+0x337/0x6f0 [ 24.169097] ret_from_fork+0x116/0x1d0 [ 24.170320] ret_from_fork_asm+0x1a/0x30 [ 24.170731] [ 24.170990] The buggy address belongs to the object at ffff8881039d9c80 [ 24.170990] which belongs to the cache kmalloc-64 of size 64 [ 24.172646] The buggy address is located 0 bytes to the right of [ 24.172646] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 24.173775] [ 24.174023] The buggy address belongs to the physical page: [ 24.175065] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 24.175756] flags: 0x200000000000000(node=0|zone=2) [ 24.176094] page_type: f5(slab) [ 24.177276] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.178697] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.179991] page dumped because: kasan: bad access detected [ 24.180584] [ 24.181067] Memory state around the buggy address: [ 24.181716] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.182342] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.182887] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.183408] ^ [ 24.184691] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.186167] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.187472] ================================================================== [ 26.374675] ================================================================== [ 26.375302] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 26.375957] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 26.376622] [ 26.376906] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 26.377038] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.377082] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.377148] Call Trace: [ 26.377207] <TASK> [ 26.378195] dump_stack_lvl+0x73/0xb0 [ 26.378313] print_report+0xd1/0x650 [ 26.378398] ? __virt_addr_valid+0x1db/0x2d0 [ 26.378531] ? kasan_atomics_helper+0x224c/0x5450 [ 26.378599] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.378673] ? kasan_atomics_helper+0x224c/0x5450 [ 26.378738] kasan_report+0x141/0x180 [ 26.378801] ? kasan_atomics_helper+0x224c/0x5450 [ 26.378875] kasan_check_range+0x10c/0x1c0 [ 26.378917] __kasan_check_write+0x18/0x20 [ 26.378948] kasan_atomics_helper+0x224c/0x5450 [ 26.378984] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.379018] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.379064] ? kasan_atomics+0x152/0x310 [ 26.379103] kasan_atomics+0x1dc/0x310 [ 26.379138] ? __pfx_kasan_atomics+0x10/0x10 [ 26.379176] ? __pfx_read_tsc+0x10/0x10 [ 26.379209] ? ktime_get_ts64+0x86/0x230 [ 26.379293] kunit_try_run_case+0x1a5/0x480 [ 26.379339] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.379377] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.379415] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.379450] ? __kthread_parkme+0x82/0x180 [ 26.379481] ? preempt_count_sub+0x50/0x80 [ 26.379544] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.379586] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.379622] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.379659] kthread+0x337/0x6f0 [ 26.379689] ? trace_preempt_on+0x20/0xc0 [ 26.379725] ? __pfx_kthread+0x10/0x10 [ 26.379756] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.379791] ? calculate_sigpending+0x7b/0xa0 [ 26.379828] ? __pfx_kthread+0x10/0x10 [ 26.379860] ret_from_fork+0x116/0x1d0 [ 26.379888] ? __pfx_kthread+0x10/0x10 [ 26.379918] ret_from_fork_asm+0x1a/0x30 [ 26.379964] </TASK> [ 26.379981] [ 26.394862] Allocated by task 283: [ 26.395218] kasan_save_stack+0x45/0x70 [ 26.395685] kasan_save_track+0x18/0x40 [ 26.396169] kasan_save_alloc_info+0x3b/0x50 [ 26.396710] __kasan_kmalloc+0xb7/0xc0 [ 26.397180] __kmalloc_cache_noprof+0x189/0x420 [ 26.397749] kasan_atomics+0x95/0x310 [ 26.399065] kunit_try_run_case+0x1a5/0x480 [ 26.400839] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.401698] kthread+0x337/0x6f0 [ 26.402007] ret_from_fork+0x116/0x1d0 [ 26.403051] ret_from_fork_asm+0x1a/0x30 [ 26.403877] [ 26.404293] The buggy address belongs to the object at ffff8881039d9c80 [ 26.404293] which belongs to the cache kmalloc-64 of size 64 [ 26.406483] The buggy address is located 0 bytes to the right of [ 26.406483] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 26.407960] [ 26.408388] The buggy address belongs to the physical page: [ 26.408846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 26.409449] flags: 0x200000000000000(node=0|zone=2) [ 26.410216] page_type: f5(slab) [ 26.410568] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.411058] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.411774] page dumped because: kasan: bad access detected [ 26.412428] [ 26.412653] Memory state around the buggy address: [ 26.413114] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.413743] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.414297] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.414872] ^ [ 26.415257] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.415896] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.416460] ================================================================== [ 23.294465] ================================================================== [ 23.296009] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 23.296916] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 23.297873] [ 23.298184] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 23.298350] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.298392] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.298451] Call Trace: [ 23.298494] <TASK> [ 23.299094] dump_stack_lvl+0x73/0xb0 [ 23.299197] print_report+0xd1/0x650 [ 23.299322] ? __virt_addr_valid+0x1db/0x2d0 [ 23.299399] ? kasan_atomics_helper+0x4ba2/0x5450 [ 23.299471] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.299757] ? kasan_atomics_helper+0x4ba2/0x5450 [ 23.299832] kasan_report+0x141/0x180 [ 23.299910] ? kasan_atomics_helper+0x4ba2/0x5450 [ 23.299997] __asan_report_store4_noabort+0x1b/0x30 [ 23.300072] kasan_atomics_helper+0x4ba2/0x5450 [ 23.300153] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.300272] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.300374] ? kasan_atomics+0x152/0x310 [ 23.300460] kasan_atomics+0x1dc/0x310 [ 23.300674] ? __pfx_kasan_atomics+0x10/0x10 [ 23.300763] ? __pfx_read_tsc+0x10/0x10 [ 23.300835] ? ktime_get_ts64+0x86/0x230 [ 23.300913] kunit_try_run_case+0x1a5/0x480 [ 23.300998] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.301071] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.301149] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.301265] ? __kthread_parkme+0x82/0x180 [ 23.301342] ? preempt_count_sub+0x50/0x80 [ 23.301421] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.301520] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.301837] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.301887] kthread+0x337/0x6f0 [ 23.301916] ? trace_preempt_on+0x20/0xc0 [ 23.301950] ? __pfx_kthread+0x10/0x10 [ 23.301981] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.302011] ? calculate_sigpending+0x7b/0xa0 [ 23.302046] ? __pfx_kthread+0x10/0x10 [ 23.302076] ret_from_fork+0x116/0x1d0 [ 23.302102] ? __pfx_kthread+0x10/0x10 [ 23.302130] ret_from_fork_asm+0x1a/0x30 [ 23.302170] </TASK> [ 23.302186] [ 23.326947] Allocated by task 283: [ 23.327267] kasan_save_stack+0x45/0x70 [ 23.327611] kasan_save_track+0x18/0x40 [ 23.328279] kasan_save_alloc_info+0x3b/0x50 [ 23.329018] __kasan_kmalloc+0xb7/0xc0 [ 23.330010] __kmalloc_cache_noprof+0x189/0x420 [ 23.330929] kasan_atomics+0x95/0x310 [ 23.331555] kunit_try_run_case+0x1a5/0x480 [ 23.332223] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.333123] kthread+0x337/0x6f0 [ 23.333854] ret_from_fork+0x116/0x1d0 [ 23.334127] ret_from_fork_asm+0x1a/0x30 [ 23.334671] [ 23.335333] The buggy address belongs to the object at ffff8881039d9c80 [ 23.335333] which belongs to the cache kmalloc-64 of size 64 [ 23.336344] The buggy address is located 0 bytes to the right of [ 23.336344] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 23.337998] [ 23.338167] The buggy address belongs to the physical page: [ 23.339524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 23.340569] flags: 0x200000000000000(node=0|zone=2) [ 23.341043] page_type: f5(slab) [ 23.341372] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.342523] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.343428] page dumped because: kasan: bad access detected [ 23.344158] [ 23.344652] Memory state around the buggy address: [ 23.345135] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.346107] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.347150] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.348160] ^ [ 23.348755] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.349411] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.350438] ================================================================== [ 25.262341] ================================================================== [ 25.263701] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 25.264409] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 25.265417] [ 25.265918] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 25.266056] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.266098] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.266167] Call Trace: [ 25.266267] <TASK> [ 25.266311] dump_stack_lvl+0x73/0xb0 [ 25.266363] print_report+0xd1/0x650 [ 25.266398] ? __virt_addr_valid+0x1db/0x2d0 [ 25.266434] ? kasan_atomics_helper+0x151d/0x5450 [ 25.266467] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.266530] ? kasan_atomics_helper+0x151d/0x5450 [ 25.266568] kasan_report+0x141/0x180 [ 25.266603] ? kasan_atomics_helper+0x151d/0x5450 [ 25.266640] kasan_check_range+0x10c/0x1c0 [ 25.266675] __kasan_check_write+0x18/0x20 [ 25.266704] kasan_atomics_helper+0x151d/0x5450 [ 25.266737] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.266771] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.266815] ? kasan_atomics+0x152/0x310 [ 25.266854] kasan_atomics+0x1dc/0x310 [ 25.266887] ? __pfx_kasan_atomics+0x10/0x10 [ 25.266924] ? __pfx_read_tsc+0x10/0x10 [ 25.266957] ? ktime_get_ts64+0x86/0x230 [ 25.266992] kunit_try_run_case+0x1a5/0x480 [ 25.267032] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.267067] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.267102] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.267138] ? __kthread_parkme+0x82/0x180 [ 25.267169] ? preempt_count_sub+0x50/0x80 [ 25.267201] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.267288] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.267330] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.267368] kthread+0x337/0x6f0 [ 25.267398] ? trace_preempt_on+0x20/0xc0 [ 25.267434] ? __pfx_kthread+0x10/0x10 [ 25.267465] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.267523] ? calculate_sigpending+0x7b/0xa0 [ 25.267565] ? __pfx_kthread+0x10/0x10 [ 25.267598] ret_from_fork+0x116/0x1d0 [ 25.267626] ? __pfx_kthread+0x10/0x10 [ 25.267657] ret_from_fork_asm+0x1a/0x30 [ 25.267701] </TASK> [ 25.267717] [ 25.284948] Allocated by task 283: [ 25.285457] kasan_save_stack+0x45/0x70 [ 25.286017] kasan_save_track+0x18/0x40 [ 25.286527] kasan_save_alloc_info+0x3b/0x50 [ 25.286873] __kasan_kmalloc+0xb7/0xc0 [ 25.287279] __kmalloc_cache_noprof+0x189/0x420 [ 25.287958] kasan_atomics+0x95/0x310 [ 25.288560] kunit_try_run_case+0x1a5/0x480 [ 25.289068] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.289753] kthread+0x337/0x6f0 [ 25.290201] ret_from_fork+0x116/0x1d0 [ 25.290746] ret_from_fork_asm+0x1a/0x30 [ 25.291278] [ 25.291601] The buggy address belongs to the object at ffff8881039d9c80 [ 25.291601] which belongs to the cache kmalloc-64 of size 64 [ 25.292535] The buggy address is located 0 bytes to the right of [ 25.292535] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 25.293877] [ 25.294093] The buggy address belongs to the physical page: [ 25.294751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 25.295602] flags: 0x200000000000000(node=0|zone=2) [ 25.296112] page_type: f5(slab) [ 25.296683] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.297441] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.298155] page dumped because: kasan: bad access detected [ 25.299741] [ 25.300136] Memory state around the buggy address: [ 25.300711] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.301366] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.301918] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.302799] ^ [ 25.303518] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.304043] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.304827] ================================================================== [ 24.189383] ================================================================== [ 24.190731] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 24.191786] Write of size 4 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 24.192692] [ 24.193155] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 24.193322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.193367] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.193437] Call Trace: [ 24.193509] <TASK> [ 24.193567] dump_stack_lvl+0x73/0xb0 [ 24.193726] print_report+0xd1/0x650 [ 24.193807] ? __virt_addr_valid+0x1db/0x2d0 [ 24.193887] ? kasan_atomics_helper+0xac7/0x5450 [ 24.193961] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.194540] ? kasan_atomics_helper+0xac7/0x5450 [ 24.194632] kasan_report+0x141/0x180 [ 24.194685] ? kasan_atomics_helper+0xac7/0x5450 [ 24.194728] kasan_check_range+0x10c/0x1c0 [ 24.194766] __kasan_check_write+0x18/0x20 [ 24.194796] kasan_atomics_helper+0xac7/0x5450 [ 24.194829] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.194864] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.194911] ? kasan_atomics+0x152/0x310 [ 24.194950] kasan_atomics+0x1dc/0x310 [ 24.194983] ? __pfx_kasan_atomics+0x10/0x10 [ 24.195019] ? __pfx_read_tsc+0x10/0x10 [ 24.195052] ? ktime_get_ts64+0x86/0x230 [ 24.195088] kunit_try_run_case+0x1a5/0x480 [ 24.195128] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.195165] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.195201] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.195252] ? __kthread_parkme+0x82/0x180 [ 24.195319] ? preempt_count_sub+0x50/0x80 [ 24.195385] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.195457] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.195553] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.195634] kthread+0x337/0x6f0 [ 24.195703] ? trace_preempt_on+0x20/0xc0 [ 24.195759] ? __pfx_kthread+0x10/0x10 [ 24.195791] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.195825] ? calculate_sigpending+0x7b/0xa0 [ 24.195860] ? __pfx_kthread+0x10/0x10 [ 24.195891] ret_from_fork+0x116/0x1d0 [ 24.195917] ? __pfx_kthread+0x10/0x10 [ 24.195947] ret_from_fork_asm+0x1a/0x30 [ 24.195991] </TASK> [ 24.196008] [ 24.219290] Allocated by task 283: [ 24.220425] kasan_save_stack+0x45/0x70 [ 24.221172] kasan_save_track+0x18/0x40 [ 24.221813] kasan_save_alloc_info+0x3b/0x50 [ 24.222266] __kasan_kmalloc+0xb7/0xc0 [ 24.222929] __kmalloc_cache_noprof+0x189/0x420 [ 24.223405] kasan_atomics+0x95/0x310 [ 24.223812] kunit_try_run_case+0x1a5/0x480 [ 24.224187] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.224741] kthread+0x337/0x6f0 [ 24.225138] ret_from_fork+0x116/0x1d0 [ 24.227095] ret_from_fork_asm+0x1a/0x30 [ 24.227680] [ 24.227935] The buggy address belongs to the object at ffff8881039d9c80 [ 24.227935] which belongs to the cache kmalloc-64 of size 64 [ 24.229456] The buggy address is located 0 bytes to the right of [ 24.229456] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 24.230883] [ 24.231147] The buggy address belongs to the physical page: [ 24.231852] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 24.232530] flags: 0x200000000000000(node=0|zone=2) [ 24.233688] page_type: f5(slab) [ 24.234126] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.234716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.235768] page dumped because: kasan: bad access detected [ 24.236255] [ 24.236478] Memory state around the buggy address: [ 24.237736] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.238379] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.239189] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.239955] ^ [ 24.240450] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.241742] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.242309] ================================================================== [ 26.286216] ================================================================== [ 26.286926] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 26.287439] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 26.288445] [ 26.288748] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 26.288880] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.288923] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.288992] Call Trace: [ 26.289049] <TASK> [ 26.289105] dump_stack_lvl+0x73/0xb0 [ 26.289202] print_report+0xd1/0x650 [ 26.289283] ? __virt_addr_valid+0x1db/0x2d0 [ 26.289371] ? kasan_atomics_helper+0x218a/0x5450 [ 26.289448] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.289551] ? kasan_atomics_helper+0x218a/0x5450 [ 26.289655] kasan_report+0x141/0x180 [ 26.289735] ? kasan_atomics_helper+0x218a/0x5450 [ 26.289825] kasan_check_range+0x10c/0x1c0 [ 26.289911] __kasan_check_write+0x18/0x20 [ 26.289983] kasan_atomics_helper+0x218a/0x5450 [ 26.290063] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.290140] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.290240] ? kasan_atomics+0x152/0x310 [ 26.290330] kasan_atomics+0x1dc/0x310 [ 26.290407] ? __pfx_kasan_atomics+0x10/0x10 [ 26.290491] ? __pfx_read_tsc+0x10/0x10 [ 26.290596] ? ktime_get_ts64+0x86/0x230 [ 26.290678] kunit_try_run_case+0x1a5/0x480 [ 26.290768] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.290850] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.290930] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.291012] ? __kthread_parkme+0x82/0x180 [ 26.291090] ? preempt_count_sub+0x50/0x80 [ 26.291174] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.291260] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.291342] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.291443] kthread+0x337/0x6f0 [ 26.291517] ? trace_preempt_on+0x20/0xc0 [ 26.291597] ? __pfx_kthread+0x10/0x10 [ 26.291674] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.291754] ? calculate_sigpending+0x7b/0xa0 [ 26.291843] ? __pfx_kthread+0x10/0x10 [ 26.291924] ret_from_fork+0x116/0x1d0 [ 26.291995] ? __pfx_kthread+0x10/0x10 [ 26.292072] ret_from_fork_asm+0x1a/0x30 [ 26.292170] </TASK> [ 26.292214] [ 26.307464] Allocated by task 283: [ 26.307835] kasan_save_stack+0x45/0x70 [ 26.308200] kasan_save_track+0x18/0x40 [ 26.308578] kasan_save_alloc_info+0x3b/0x50 [ 26.309003] __kasan_kmalloc+0xb7/0xc0 [ 26.309470] __kmalloc_cache_noprof+0x189/0x420 [ 26.309995] kasan_atomics+0x95/0x310 [ 26.310549] kunit_try_run_case+0x1a5/0x480 [ 26.310934] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.311454] kthread+0x337/0x6f0 [ 26.311818] ret_from_fork+0x116/0x1d0 [ 26.312133] ret_from_fork_asm+0x1a/0x30 [ 26.312713] [ 26.312964] The buggy address belongs to the object at ffff8881039d9c80 [ 26.312964] which belongs to the cache kmalloc-64 of size 64 [ 26.314075] The buggy address is located 0 bytes to the right of [ 26.314075] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 26.315313] [ 26.315532] The buggy address belongs to the physical page: [ 26.315906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 26.316413] flags: 0x200000000000000(node=0|zone=2) [ 26.316898] page_type: f5(slab) [ 26.317267] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.318197] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.319140] page dumped because: kasan: bad access detected [ 26.319975] [ 26.320182] Memory state around the buggy address: [ 26.320588] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.321034] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.321481] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.322119] ^ [ 26.322595] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.323242] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.323902] ================================================================== [ 25.306490] ================================================================== [ 25.308305] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 25.308958] Write of size 8 at addr ffff8881039d9cb0 by task kunit_try_catch/283 [ 25.309959] [ 25.310202] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 25.310336] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.310405] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.310472] Call Trace: [ 25.310549] <TASK> [ 25.310606] dump_stack_lvl+0x73/0xb0 [ 25.310737] print_report+0xd1/0x650 [ 25.310829] ? __virt_addr_valid+0x1db/0x2d0 [ 25.310914] ? kasan_atomics_helper+0x15b6/0x5450 [ 25.310986] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.311025] ? kasan_atomics_helper+0x15b6/0x5450 [ 25.311057] kasan_report+0x141/0x180 [ 25.311091] ? kasan_atomics_helper+0x15b6/0x5450 [ 25.311129] kasan_check_range+0x10c/0x1c0 [ 25.311164] __kasan_check_write+0x18/0x20 [ 25.311193] kasan_atomics_helper+0x15b6/0x5450 [ 25.311236] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.311315] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.311364] ? kasan_atomics+0x152/0x310 [ 25.311404] kasan_atomics+0x1dc/0x310 [ 25.311439] ? __pfx_kasan_atomics+0x10/0x10 [ 25.311477] ? __pfx_read_tsc+0x10/0x10 [ 25.311537] ? ktime_get_ts64+0x86/0x230 [ 25.311576] kunit_try_run_case+0x1a5/0x480 [ 25.311618] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.311655] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.311690] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.311724] ? __kthread_parkme+0x82/0x180 [ 25.311755] ? preempt_count_sub+0x50/0x80 [ 25.311789] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.311828] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.311862] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.311898] kthread+0x337/0x6f0 [ 25.311927] ? trace_preempt_on+0x20/0xc0 [ 25.311963] ? __pfx_kthread+0x10/0x10 [ 25.311994] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.312027] ? calculate_sigpending+0x7b/0xa0 [ 25.312066] ? __pfx_kthread+0x10/0x10 [ 25.312097] ret_from_fork+0x116/0x1d0 [ 25.312124] ? __pfx_kthread+0x10/0x10 [ 25.312154] ret_from_fork_asm+0x1a/0x30 [ 25.312199] </TASK> [ 25.312214] [ 25.331127] Allocated by task 283: [ 25.331662] kasan_save_stack+0x45/0x70 [ 25.332293] kasan_save_track+0x18/0x40 [ 25.332776] kasan_save_alloc_info+0x3b/0x50 [ 25.333343] __kasan_kmalloc+0xb7/0xc0 [ 25.333840] __kmalloc_cache_noprof+0x189/0x420 [ 25.334432] kasan_atomics+0x95/0x310 [ 25.334924] kunit_try_run_case+0x1a5/0x480 [ 25.335614] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.336204] kthread+0x337/0x6f0 [ 25.336776] ret_from_fork+0x116/0x1d0 [ 25.337203] ret_from_fork_asm+0x1a/0x30 [ 25.337767] [ 25.338084] The buggy address belongs to the object at ffff8881039d9c80 [ 25.338084] which belongs to the cache kmalloc-64 of size 64 [ 25.339025] The buggy address is located 0 bytes to the right of [ 25.339025] allocated 48-byte region [ffff8881039d9c80, ffff8881039d9cb0) [ 25.340202] [ 25.340481] The buggy address belongs to the physical page: [ 25.341030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d9 [ 25.341771] flags: 0x200000000000000(node=0|zone=2) [ 25.342139] page_type: f5(slab) [ 25.342463] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.343287] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.344148] page dumped because: kasan: bad access detected [ 25.344814] [ 25.345036] Memory state around the buggy address: [ 25.345538] ffff8881039d9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.346301] ffff8881039d9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.347097] >ffff8881039d9c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.347778] ^ [ 25.348335] ffff8881039d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.349061] ffff8881039d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.349861] ==================================================================
[ 23.855379] ================================================================== [ 23.856218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 23.856830] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 23.857366] [ 23.857637] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 23.857735] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.857757] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.857788] Call Trace: [ 23.857808] <TASK> [ 23.857828] dump_stack_lvl+0x73/0xb0 [ 23.858312] print_report+0xd1/0x650 [ 23.858426] ? __virt_addr_valid+0x1db/0x2d0 [ 23.858504] ? kasan_atomics_helper+0x177f/0x5450 [ 23.858579] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.858657] ? kasan_atomics_helper+0x177f/0x5450 [ 23.858733] kasan_report+0x141/0x180 [ 23.858812] ? kasan_atomics_helper+0x177f/0x5450 [ 23.858913] kasan_check_range+0x10c/0x1c0 [ 23.858960] __kasan_check_write+0x18/0x20 [ 23.858993] kasan_atomics_helper+0x177f/0x5450 [ 23.859028] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.859063] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.859126] ? kasan_save_alloc_info+0x3b/0x50 [ 23.859180] ? kasan_atomics+0x152/0x310 [ 23.859223] kasan_atomics+0x1dc/0x310 [ 23.859258] ? __pfx_kasan_atomics+0x10/0x10 [ 23.859296] ? __pfx_read_tsc+0x10/0x10 [ 23.859328] ? ktime_get_ts64+0x86/0x230 [ 23.859362] kunit_try_run_case+0x1a5/0x480 [ 23.859400] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.859436] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.859473] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.859509] ? __kthread_parkme+0x82/0x180 [ 23.859540] ? preempt_count_sub+0x50/0x80 [ 23.859574] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.859612] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.859648] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.859685] kthread+0x337/0x6f0 [ 23.859716] ? trace_preempt_on+0x20/0xc0 [ 23.859750] ? __pfx_kthread+0x10/0x10 [ 23.859781] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.859816] ? calculate_sigpending+0x7b/0xa0 [ 23.859851] ? __pfx_kthread+0x10/0x10 [ 23.859911] ret_from_fork+0x116/0x1d0 [ 23.859945] ? __pfx_kthread+0x10/0x10 [ 23.859978] ret_from_fork_asm+0x1a/0x30 [ 23.860024] </TASK> [ 23.860040] [ 23.877518] Allocated by task 283: [ 23.877861] kasan_save_stack+0x45/0x70 [ 23.878504] kasan_save_track+0x18/0x40 [ 23.878942] kasan_save_alloc_info+0x3b/0x50 [ 23.879426] __kasan_kmalloc+0xb7/0xc0 [ 23.879748] __kmalloc_cache_noprof+0x189/0x420 [ 23.880161] kasan_atomics+0x95/0x310 [ 23.880603] kunit_try_run_case+0x1a5/0x480 [ 23.881065] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.881616] kthread+0x337/0x6f0 [ 23.882072] ret_from_fork+0x116/0x1d0 [ 23.882517] ret_from_fork_asm+0x1a/0x30 [ 23.882946] [ 23.883137] The buggy address belongs to the object at ffff8881038ee700 [ 23.883137] which belongs to the cache kmalloc-64 of size 64 [ 23.883912] The buggy address is located 0 bytes to the right of [ 23.883912] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 23.885247] [ 23.885480] The buggy address belongs to the physical page: [ 23.886109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 23.886709] flags: 0x200000000000000(node=0|zone=2) [ 23.887222] page_type: f5(slab) [ 23.887584] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.888289] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.888980] page dumped because: kasan: bad access detected [ 23.889507] [ 23.889716] Memory state around the buggy address: [ 23.890206] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.890741] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.892110] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.892559] ^ [ 23.892923] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.893378] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.894125] ================================================================== [ 23.626913] ================================================================== [ 23.627375] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 23.628163] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 23.628980] [ 23.629226] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 23.629350] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.629397] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.629464] Call Trace: [ 23.629514] <TASK> [ 23.629561] dump_stack_lvl+0x73/0xb0 [ 23.629648] print_report+0xd1/0x650 [ 23.629730] ? __virt_addr_valid+0x1db/0x2d0 [ 23.629813] ? kasan_atomics_helper+0x50d4/0x5450 [ 23.629908] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.629993] ? kasan_atomics_helper+0x50d4/0x5450 [ 23.630072] kasan_report+0x141/0x180 [ 23.630153] ? kasan_atomics_helper+0x50d4/0x5450 [ 23.630247] __asan_report_store8_noabort+0x1b/0x30 [ 23.630342] kasan_atomics_helper+0x50d4/0x5450 [ 23.630422] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.630505] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.630588] ? kasan_save_alloc_info+0x3b/0x50 [ 23.630667] ? kasan_atomics+0x152/0x310 [ 23.630752] kasan_atomics+0x1dc/0x310 [ 23.630832] ? __pfx_kasan_atomics+0x10/0x10 [ 23.630931] ? __pfx_read_tsc+0x10/0x10 [ 23.631005] ? ktime_get_ts64+0x86/0x230 [ 23.631085] kunit_try_run_case+0x1a5/0x480 [ 23.631170] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.631248] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.631326] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.631407] ? __kthread_parkme+0x82/0x180 [ 23.631480] ? preempt_count_sub+0x50/0x80 [ 23.631561] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.631640] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.631719] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.631799] kthread+0x337/0x6f0 [ 23.631869] ? trace_preempt_on+0x20/0xc0 [ 23.631965] ? __pfx_kthread+0x10/0x10 [ 23.632039] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.632104] ? calculate_sigpending+0x7b/0xa0 [ 23.632173] ? __pfx_kthread+0x10/0x10 [ 23.632250] ret_from_fork+0x116/0x1d0 [ 23.632322] ? __pfx_kthread+0x10/0x10 [ 23.632398] ret_from_fork_asm+0x1a/0x30 [ 23.632495] </TASK> [ 23.632539] [ 23.647209] Allocated by task 283: [ 23.647580] kasan_save_stack+0x45/0x70 [ 23.648023] kasan_save_track+0x18/0x40 [ 23.648462] kasan_save_alloc_info+0x3b/0x50 [ 23.648819] __kasan_kmalloc+0xb7/0xc0 [ 23.649309] __kmalloc_cache_noprof+0x189/0x420 [ 23.649732] kasan_atomics+0x95/0x310 [ 23.650116] kunit_try_run_case+0x1a5/0x480 [ 23.650554] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.651007] kthread+0x337/0x6f0 [ 23.651627] ret_from_fork+0x116/0x1d0 [ 23.652028] ret_from_fork_asm+0x1a/0x30 [ 23.652451] [ 23.652687] The buggy address belongs to the object at ffff8881038ee700 [ 23.652687] which belongs to the cache kmalloc-64 of size 64 [ 23.653788] The buggy address is located 0 bytes to the right of [ 23.653788] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 23.655070] [ 23.655301] The buggy address belongs to the physical page: [ 23.655828] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 23.656354] flags: 0x200000000000000(node=0|zone=2) [ 23.656718] page_type: f5(slab) [ 23.657065] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.658091] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.659139] page dumped because: kasan: bad access detected [ 23.659660] [ 23.659918] Memory state around the buggy address: [ 23.660404] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.662471] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.663179] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.663840] ^ [ 23.664262] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.664719] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.667186] ================================================================== [ 22.325387] ================================================================== [ 22.326148] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 22.326846] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 22.328150] [ 22.328379] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 22.328488] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.328526] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.328585] Call Trace: [ 22.328636] <TASK> [ 22.328681] dump_stack_lvl+0x73/0xb0 [ 22.328770] print_report+0xd1/0x650 [ 22.328852] ? __virt_addr_valid+0x1db/0x2d0 [ 22.328957] ? kasan_atomics_helper+0x5fe/0x5450 [ 22.329033] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.329110] ? kasan_atomics_helper+0x5fe/0x5450 [ 22.329191] kasan_report+0x141/0x180 [ 22.329272] ? kasan_atomics_helper+0x5fe/0x5450 [ 22.329360] kasan_check_range+0x10c/0x1c0 [ 22.329446] __kasan_check_write+0x18/0x20 [ 22.329662] kasan_atomics_helper+0x5fe/0x5450 [ 22.329746] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.329825] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.329925] ? kasan_save_alloc_info+0x3b/0x50 [ 22.330005] ? kasan_atomics+0x152/0x310 [ 22.330090] kasan_atomics+0x1dc/0x310 [ 22.330173] ? __pfx_kasan_atomics+0x10/0x10 [ 22.330266] ? __pfx_read_tsc+0x10/0x10 [ 22.330340] ? ktime_get_ts64+0x86/0x230 [ 22.330421] kunit_try_run_case+0x1a5/0x480 [ 22.330506] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.330580] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.330619] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.330655] ? __kthread_parkme+0x82/0x180 [ 22.330687] ? preempt_count_sub+0x50/0x80 [ 22.330719] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.330758] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.330794] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.330830] kthread+0x337/0x6f0 [ 22.330858] ? trace_preempt_on+0x20/0xc0 [ 22.330921] ? __pfx_kthread+0x10/0x10 [ 22.330955] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.330988] ? calculate_sigpending+0x7b/0xa0 [ 22.331022] ? __pfx_kthread+0x10/0x10 [ 22.331053] ret_from_fork+0x116/0x1d0 [ 22.331079] ? __pfx_kthread+0x10/0x10 [ 22.331141] ret_from_fork_asm+0x1a/0x30 [ 22.331190] </TASK> [ 22.331208] [ 22.347330] Allocated by task 283: [ 22.347708] kasan_save_stack+0x45/0x70 [ 22.348394] kasan_save_track+0x18/0x40 [ 22.349437] kasan_save_alloc_info+0x3b/0x50 [ 22.349934] __kasan_kmalloc+0xb7/0xc0 [ 22.350405] __kmalloc_cache_noprof+0x189/0x420 [ 22.351113] kasan_atomics+0x95/0x310 [ 22.351494] kunit_try_run_case+0x1a5/0x480 [ 22.352079] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.352661] kthread+0x337/0x6f0 [ 22.352980] ret_from_fork+0x116/0x1d0 [ 22.353547] ret_from_fork_asm+0x1a/0x30 [ 22.354455] [ 22.354689] The buggy address belongs to the object at ffff8881038ee700 [ 22.354689] which belongs to the cache kmalloc-64 of size 64 [ 22.356183] The buggy address is located 0 bytes to the right of [ 22.356183] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 22.357193] [ 22.357440] The buggy address belongs to the physical page: [ 22.358226] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 22.358972] flags: 0x200000000000000(node=0|zone=2) [ 22.359651] page_type: f5(slab) [ 22.360047] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.360680] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.361167] page dumped because: kasan: bad access detected [ 22.361634] [ 22.362115] Memory state around the buggy address: [ 22.362774] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.363642] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.365147] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.365924] ^ [ 22.366734] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.367455] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.368279] ================================================================== [ 23.894891] ================================================================== [ 23.895534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 23.897616] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 23.898528] [ 23.898998] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 23.899214] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.899259] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.899319] Call Trace: [ 23.899367] <TASK> [ 23.899416] dump_stack_lvl+0x73/0xb0 [ 23.899506] print_report+0xd1/0x650 [ 23.899582] ? __virt_addr_valid+0x1db/0x2d0 [ 23.899662] ? kasan_atomics_helper+0x1818/0x5450 [ 23.899737] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.899816] ? kasan_atomics_helper+0x1818/0x5450 [ 23.899914] kasan_report+0x141/0x180 [ 23.899996] ? kasan_atomics_helper+0x1818/0x5450 [ 23.900054] kasan_check_range+0x10c/0x1c0 [ 23.900111] __kasan_check_write+0x18/0x20 [ 23.900176] kasan_atomics_helper+0x1818/0x5450 [ 23.900212] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.900247] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.900283] ? kasan_save_alloc_info+0x3b/0x50 [ 23.900320] ? kasan_atomics+0x152/0x310 [ 23.900358] kasan_atomics+0x1dc/0x310 [ 23.900392] ? __pfx_kasan_atomics+0x10/0x10 [ 23.900429] ? __pfx_read_tsc+0x10/0x10 [ 23.900460] ? ktime_get_ts64+0x86/0x230 [ 23.900494] kunit_try_run_case+0x1a5/0x480 [ 23.900531] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.900567] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.900601] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.900637] ? __kthread_parkme+0x82/0x180 [ 23.900667] ? preempt_count_sub+0x50/0x80 [ 23.900700] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.900737] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.900772] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.900809] kthread+0x337/0x6f0 [ 23.900838] ? trace_preempt_on+0x20/0xc0 [ 23.900871] ? __pfx_kthread+0x10/0x10 [ 23.900931] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.900965] ? calculate_sigpending+0x7b/0xa0 [ 23.901001] ? __pfx_kthread+0x10/0x10 [ 23.901032] ret_from_fork+0x116/0x1d0 [ 23.901059] ? __pfx_kthread+0x10/0x10 [ 23.901089] ret_from_fork_asm+0x1a/0x30 [ 23.901162] </TASK> [ 23.901181] [ 23.917191] Allocated by task 283: [ 23.917583] kasan_save_stack+0x45/0x70 [ 23.918040] kasan_save_track+0x18/0x40 [ 23.918465] kasan_save_alloc_info+0x3b/0x50 [ 23.918955] __kasan_kmalloc+0xb7/0xc0 [ 23.919374] __kmalloc_cache_noprof+0x189/0x420 [ 23.920112] kasan_atomics+0x95/0x310 [ 23.920538] kunit_try_run_case+0x1a5/0x480 [ 23.921936] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.923466] kthread+0x337/0x6f0 [ 23.924357] ret_from_fork+0x116/0x1d0 [ 23.924942] ret_from_fork_asm+0x1a/0x30 [ 23.926086] [ 23.926905] The buggy address belongs to the object at ffff8881038ee700 [ 23.926905] which belongs to the cache kmalloc-64 of size 64 [ 23.927825] The buggy address is located 0 bytes to the right of [ 23.927825] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 23.928981] [ 23.929298] The buggy address belongs to the physical page: [ 23.929900] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 23.930735] flags: 0x200000000000000(node=0|zone=2) [ 23.931232] page_type: f5(slab) [ 23.931605] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.932233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.932727] page dumped because: kasan: bad access detected [ 23.933338] [ 23.933552] Memory state around the buggy address: [ 23.934002] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.934770] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.935472] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.936081] ^ [ 23.936695] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.937263] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.938025] ================================================================== [ 22.712054] ================================================================== [ 22.712634] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 22.713387] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 22.714007] [ 22.714363] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 22.714486] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.714530] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.714624] Call Trace: [ 22.714670] <TASK> [ 22.714704] dump_stack_lvl+0x73/0xb0 [ 22.714774] print_report+0xd1/0x650 [ 22.714849] ? __virt_addr_valid+0x1db/0x2d0 [ 22.714954] ? kasan_atomics_helper+0xac7/0x5450 [ 22.715028] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.715111] ? kasan_atomics_helper+0xac7/0x5450 [ 22.715198] kasan_report+0x141/0x180 [ 22.715281] ? kasan_atomics_helper+0xac7/0x5450 [ 22.715368] kasan_check_range+0x10c/0x1c0 [ 22.715491] __kasan_check_write+0x18/0x20 [ 22.715564] kasan_atomics_helper+0xac7/0x5450 [ 22.715644] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.715694] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.715732] ? kasan_save_alloc_info+0x3b/0x50 [ 22.715768] ? kasan_atomics+0x152/0x310 [ 22.715807] kasan_atomics+0x1dc/0x310 [ 22.715841] ? __pfx_kasan_atomics+0x10/0x10 [ 22.715903] ? __pfx_read_tsc+0x10/0x10 [ 22.715938] ? ktime_get_ts64+0x86/0x230 [ 22.715973] kunit_try_run_case+0x1a5/0x480 [ 22.716010] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.716046] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.716080] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.716151] ? __kthread_parkme+0x82/0x180 [ 22.716188] ? preempt_count_sub+0x50/0x80 [ 22.716221] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.716258] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.716293] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.716329] kthread+0x337/0x6f0 [ 22.716358] ? trace_preempt_on+0x20/0xc0 [ 22.716390] ? __pfx_kthread+0x10/0x10 [ 22.716420] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.716452] ? calculate_sigpending+0x7b/0xa0 [ 22.716487] ? __pfx_kthread+0x10/0x10 [ 22.716518] ret_from_fork+0x116/0x1d0 [ 22.716545] ? __pfx_kthread+0x10/0x10 [ 22.716575] ret_from_fork_asm+0x1a/0x30 [ 22.716618] </TASK> [ 22.716634] [ 22.734940] Allocated by task 283: [ 22.735474] kasan_save_stack+0x45/0x70 [ 22.736006] kasan_save_track+0x18/0x40 [ 22.736493] kasan_save_alloc_info+0x3b/0x50 [ 22.736958] __kasan_kmalloc+0xb7/0xc0 [ 22.737357] __kmalloc_cache_noprof+0x189/0x420 [ 22.738067] kasan_atomics+0x95/0x310 [ 22.738602] kunit_try_run_case+0x1a5/0x480 [ 22.739050] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.739751] kthread+0x337/0x6f0 [ 22.740234] ret_from_fork+0x116/0x1d0 [ 22.740758] ret_from_fork_asm+0x1a/0x30 [ 22.741259] [ 22.741609] The buggy address belongs to the object at ffff8881038ee700 [ 22.741609] which belongs to the cache kmalloc-64 of size 64 [ 22.742755] The buggy address is located 0 bytes to the right of [ 22.742755] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 22.743932] [ 22.744244] The buggy address belongs to the physical page: [ 22.744623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 22.745483] flags: 0x200000000000000(node=0|zone=2) [ 22.746067] page_type: f5(slab) [ 22.746453] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.747184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.747971] page dumped because: kasan: bad access detected [ 22.748572] [ 22.748858] Memory state around the buggy address: [ 22.749449] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.750161] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.750958] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.751777] ^ [ 22.752147] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.752936] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.753683] ================================================================== [ 22.664528] ================================================================== [ 22.666924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 22.668468] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 22.669872] [ 22.670357] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 22.670571] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.670641] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.670687] Call Trace: [ 22.670712] <TASK> [ 22.670735] dump_stack_lvl+0x73/0xb0 [ 22.670782] print_report+0xd1/0x650 [ 22.670818] ? __virt_addr_valid+0x1db/0x2d0 [ 22.670853] ? kasan_atomics_helper+0xa2b/0x5450 [ 22.670924] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.670972] ? kasan_atomics_helper+0xa2b/0x5450 [ 22.671007] kasan_report+0x141/0x180 [ 22.671042] ? kasan_atomics_helper+0xa2b/0x5450 [ 22.671080] kasan_check_range+0x10c/0x1c0 [ 22.671165] __kasan_check_write+0x18/0x20 [ 22.671199] kasan_atomics_helper+0xa2b/0x5450 [ 22.671233] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.671266] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.671303] ? kasan_save_alloc_info+0x3b/0x50 [ 22.671338] ? kasan_atomics+0x152/0x310 [ 22.671376] kasan_atomics+0x1dc/0x310 [ 22.671412] ? __pfx_kasan_atomics+0x10/0x10 [ 22.671448] ? __pfx_read_tsc+0x10/0x10 [ 22.671481] ? ktime_get_ts64+0x86/0x230 [ 22.671515] kunit_try_run_case+0x1a5/0x480 [ 22.671553] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.671588] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.671623] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.671658] ? __kthread_parkme+0x82/0x180 [ 22.671688] ? preempt_count_sub+0x50/0x80 [ 22.671721] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.671758] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.671792] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.671829] kthread+0x337/0x6f0 [ 22.671858] ? trace_preempt_on+0x20/0xc0 [ 22.671923] ? __pfx_kthread+0x10/0x10 [ 22.671956] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.671991] ? calculate_sigpending+0x7b/0xa0 [ 22.672028] ? __pfx_kthread+0x10/0x10 [ 22.672060] ret_from_fork+0x116/0x1d0 [ 22.672087] ? __pfx_kthread+0x10/0x10 [ 22.672159] ret_from_fork_asm+0x1a/0x30 [ 22.672209] </TASK> [ 22.672225] [ 22.690866] Allocated by task 283: [ 22.691168] kasan_save_stack+0x45/0x70 [ 22.691600] kasan_save_track+0x18/0x40 [ 22.692047] kasan_save_alloc_info+0x3b/0x50 [ 22.692892] __kasan_kmalloc+0xb7/0xc0 [ 22.693713] __kmalloc_cache_noprof+0x189/0x420 [ 22.694325] kasan_atomics+0x95/0x310 [ 22.694643] kunit_try_run_case+0x1a5/0x480 [ 22.695527] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.696023] kthread+0x337/0x6f0 [ 22.696354] ret_from_fork+0x116/0x1d0 [ 22.696665] ret_from_fork_asm+0x1a/0x30 [ 22.697009] [ 22.697197] The buggy address belongs to the object at ffff8881038ee700 [ 22.697197] which belongs to the cache kmalloc-64 of size 64 [ 22.698414] The buggy address is located 0 bytes to the right of [ 22.698414] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 22.699843] [ 22.700061] The buggy address belongs to the physical page: [ 22.700910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 22.701975] flags: 0x200000000000000(node=0|zone=2) [ 22.702998] page_type: f5(slab) [ 22.703602] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.704462] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.705096] page dumped because: kasan: bad access detected [ 22.705872] [ 22.706089] Memory state around the buggy address: [ 22.706509] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.707049] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.707986] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.708943] ^ [ 22.709807] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.710323] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.711009] ================================================================== [ 22.059850] ================================================================== [ 22.060358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 22.062250] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 22.062783] [ 22.063089] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 22.063948] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.063995] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.064056] Call Trace: [ 22.064080] <TASK> [ 22.064107] dump_stack_lvl+0x73/0xb0 [ 22.064186] print_report+0xd1/0x650 [ 22.064223] ? __virt_addr_valid+0x1db/0x2d0 [ 22.064256] ? kasan_atomics_helper+0x4b6e/0x5450 [ 22.064288] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.064321] ? kasan_atomics_helper+0x4b6e/0x5450 [ 22.064354] kasan_report+0x141/0x180 [ 22.064387] ? kasan_atomics_helper+0x4b6e/0x5450 [ 22.064426] __asan_report_store4_noabort+0x1b/0x30 [ 22.064455] kasan_atomics_helper+0x4b6e/0x5450 [ 22.064490] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.064523] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.064559] ? kasan_save_alloc_info+0x3b/0x50 [ 22.064594] ? kasan_atomics+0x152/0x310 [ 22.064632] kasan_atomics+0x1dc/0x310 [ 22.064665] ? __pfx_kasan_atomics+0x10/0x10 [ 22.064701] ? __pfx_read_tsc+0x10/0x10 [ 22.064731] ? ktime_get_ts64+0x86/0x230 [ 22.064767] kunit_try_run_case+0x1a5/0x480 [ 22.064803] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.064838] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.064892] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.064938] ? __kthread_parkme+0x82/0x180 [ 22.064971] ? preempt_count_sub+0x50/0x80 [ 22.065004] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.065041] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.065076] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.065149] kthread+0x337/0x6f0 [ 22.065184] ? trace_preempt_on+0x20/0xc0 [ 22.065219] ? __pfx_kthread+0x10/0x10 [ 22.065250] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.065283] ? calculate_sigpending+0x7b/0xa0 [ 22.065318] ? __pfx_kthread+0x10/0x10 [ 22.065349] ret_from_fork+0x116/0x1d0 [ 22.065376] ? __pfx_kthread+0x10/0x10 [ 22.065406] ret_from_fork_asm+0x1a/0x30 [ 22.065448] </TASK> [ 22.065467] [ 22.085179] Allocated by task 283: [ 22.085608] kasan_save_stack+0x45/0x70 [ 22.086069] kasan_save_track+0x18/0x40 [ 22.086536] kasan_save_alloc_info+0x3b/0x50 [ 22.087082] __kasan_kmalloc+0xb7/0xc0 [ 22.087539] __kmalloc_cache_noprof+0x189/0x420 [ 22.088011] kasan_atomics+0x95/0x310 [ 22.088390] kunit_try_run_case+0x1a5/0x480 [ 22.088775] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.089542] kthread+0x337/0x6f0 [ 22.089991] ret_from_fork+0x116/0x1d0 [ 22.090459] ret_from_fork_asm+0x1a/0x30 [ 22.091045] [ 22.091314] The buggy address belongs to the object at ffff8881038ee700 [ 22.091314] which belongs to the cache kmalloc-64 of size 64 [ 22.092536] The buggy address is located 0 bytes to the right of [ 22.092536] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 22.093490] [ 22.093686] The buggy address belongs to the physical page: [ 22.094086] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 22.095454] flags: 0x200000000000000(node=0|zone=2) [ 22.096391] page_type: f5(slab) [ 22.097021] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.098173] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.098771] page dumped because: kasan: bad access detected [ 22.099289] [ 22.099623] Memory state around the buggy address: [ 22.100123] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.100817] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.101439] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.102011] ^ [ 22.102440] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.102980] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.103639] ================================================================== [ 22.196323] ================================================================== [ 22.196975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 22.197791] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 22.198454] [ 22.198754] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 22.198892] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.198937] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.198997] Call Trace: [ 22.199042] <TASK> [ 22.199089] dump_stack_lvl+0x73/0xb0 [ 22.199220] print_report+0xd1/0x650 [ 22.199300] ? __virt_addr_valid+0x1db/0x2d0 [ 22.199383] ? kasan_atomics_helper+0x4a0/0x5450 [ 22.199457] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.199579] ? kasan_atomics_helper+0x4a0/0x5450 [ 22.199658] kasan_report+0x141/0x180 [ 22.199736] ? kasan_atomics_helper+0x4a0/0x5450 [ 22.199821] kasan_check_range+0x10c/0x1c0 [ 22.199926] __kasan_check_write+0x18/0x20 [ 22.200002] kasan_atomics_helper+0x4a0/0x5450 [ 22.200087] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.200214] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.200296] ? kasan_save_alloc_info+0x3b/0x50 [ 22.200377] ? kasan_atomics+0x152/0x310 [ 22.200468] kasan_atomics+0x1dc/0x310 [ 22.200551] ? __pfx_kasan_atomics+0x10/0x10 [ 22.200636] ? __pfx_read_tsc+0x10/0x10 [ 22.200711] ? ktime_get_ts64+0x86/0x230 [ 22.200794] kunit_try_run_case+0x1a5/0x480 [ 22.200897] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.200978] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.201054] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.201180] ? __kthread_parkme+0x82/0x180 [ 22.201257] ? preempt_count_sub+0x50/0x80 [ 22.201335] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.201419] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.201501] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.201552] kthread+0x337/0x6f0 [ 22.201583] ? trace_preempt_on+0x20/0xc0 [ 22.201619] ? __pfx_kthread+0x10/0x10 [ 22.201650] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.201683] ? calculate_sigpending+0x7b/0xa0 [ 22.201717] ? __pfx_kthread+0x10/0x10 [ 22.201748] ret_from_fork+0x116/0x1d0 [ 22.201774] ? __pfx_kthread+0x10/0x10 [ 22.201804] ret_from_fork_asm+0x1a/0x30 [ 22.201846] </TASK> [ 22.201864] [ 22.223230] Allocated by task 283: [ 22.224006] kasan_save_stack+0x45/0x70 [ 22.224481] kasan_save_track+0x18/0x40 [ 22.224800] kasan_save_alloc_info+0x3b/0x50 [ 22.225962] __kasan_kmalloc+0xb7/0xc0 [ 22.226317] __kmalloc_cache_noprof+0x189/0x420 [ 22.226925] kasan_atomics+0x95/0x310 [ 22.227528] kunit_try_run_case+0x1a5/0x480 [ 22.228032] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.228672] kthread+0x337/0x6f0 [ 22.229046] ret_from_fork+0x116/0x1d0 [ 22.229892] ret_from_fork_asm+0x1a/0x30 [ 22.230443] [ 22.230692] The buggy address belongs to the object at ffff8881038ee700 [ 22.230692] which belongs to the cache kmalloc-64 of size 64 [ 22.231642] The buggy address is located 0 bytes to the right of [ 22.231642] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 22.232701] [ 22.232989] The buggy address belongs to the physical page: [ 22.233409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 22.234108] flags: 0x200000000000000(node=0|zone=2) [ 22.234739] page_type: f5(slab) [ 22.235102] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.235868] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.236627] page dumped because: kasan: bad access detected [ 22.237138] [ 22.237409] Memory state around the buggy address: [ 22.237781] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.239175] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.239942] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.240546] ^ [ 22.241007] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.241657] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.242304] ================================================================== [ 22.515682] ================================================================== [ 22.516551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 22.517104] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 22.517824] [ 22.518829] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 22.519236] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.519263] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.519301] Call Trace: [ 22.519324] <TASK> [ 22.519348] dump_stack_lvl+0x73/0xb0 [ 22.519397] print_report+0xd1/0x650 [ 22.519431] ? __virt_addr_valid+0x1db/0x2d0 [ 22.519466] ? kasan_atomics_helper+0x860/0x5450 [ 22.519498] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.519531] ? kasan_atomics_helper+0x860/0x5450 [ 22.519563] kasan_report+0x141/0x180 [ 22.519595] ? kasan_atomics_helper+0x860/0x5450 [ 22.519632] kasan_check_range+0x10c/0x1c0 [ 22.519667] __kasan_check_write+0x18/0x20 [ 22.519696] kasan_atomics_helper+0x860/0x5450 [ 22.519730] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.519761] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.519798] ? kasan_save_alloc_info+0x3b/0x50 [ 22.519832] ? kasan_atomics+0x152/0x310 [ 22.519870] kasan_atomics+0x1dc/0x310 [ 22.519935] ? __pfx_kasan_atomics+0x10/0x10 [ 22.519973] ? __pfx_read_tsc+0x10/0x10 [ 22.520006] ? ktime_get_ts64+0x86/0x230 [ 22.520039] kunit_try_run_case+0x1a5/0x480 [ 22.520077] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.520143] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.520185] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.520222] ? __kthread_parkme+0x82/0x180 [ 22.520254] ? preempt_count_sub+0x50/0x80 [ 22.520288] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.520325] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.520360] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.520398] kthread+0x337/0x6f0 [ 22.520427] ? trace_preempt_on+0x20/0xc0 [ 22.520459] ? __pfx_kthread+0x10/0x10 [ 22.520490] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.520521] ? calculate_sigpending+0x7b/0xa0 [ 22.520557] ? __pfx_kthread+0x10/0x10 [ 22.520587] ret_from_fork+0x116/0x1d0 [ 22.520614] ? __pfx_kthread+0x10/0x10 [ 22.520643] ret_from_fork_asm+0x1a/0x30 [ 22.520687] </TASK> [ 22.520703] [ 22.543219] Allocated by task 283: [ 22.544008] kasan_save_stack+0x45/0x70 [ 22.544455] kasan_save_track+0x18/0x40 [ 22.544817] kasan_save_alloc_info+0x3b/0x50 [ 22.545698] __kasan_kmalloc+0xb7/0xc0 [ 22.546061] __kmalloc_cache_noprof+0x189/0x420 [ 22.546698] kasan_atomics+0x95/0x310 [ 22.547290] kunit_try_run_case+0x1a5/0x480 [ 22.547701] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.548480] kthread+0x337/0x6f0 [ 22.549049] ret_from_fork+0x116/0x1d0 [ 22.549441] ret_from_fork_asm+0x1a/0x30 [ 22.550092] [ 22.550369] The buggy address belongs to the object at ffff8881038ee700 [ 22.550369] which belongs to the cache kmalloc-64 of size 64 [ 22.551578] The buggy address is located 0 bytes to the right of [ 22.551578] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 22.552926] [ 22.553431] The buggy address belongs to the physical page: [ 22.553836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 22.554857] flags: 0x200000000000000(node=0|zone=2) [ 22.555231] page_type: f5(slab) [ 22.555994] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.556778] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.557616] page dumped because: kasan: bad access detected [ 22.558362] [ 22.558760] Memory state around the buggy address: [ 22.559206] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.560078] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.560699] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.561779] ^ [ 22.562744] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.563230] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.563782] ================================================================== [ 22.286015] ================================================================== [ 22.286581] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 22.287731] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 22.288301] [ 22.288605] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 22.288726] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.288767] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.288828] Call Trace: [ 22.288872] <TASK> [ 22.288933] dump_stack_lvl+0x73/0xb0 [ 22.289022] print_report+0xd1/0x650 [ 22.289107] ? __virt_addr_valid+0x1db/0x2d0 [ 22.289204] ? kasan_atomics_helper+0x565/0x5450 [ 22.289284] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.289403] ? kasan_atomics_helper+0x565/0x5450 [ 22.289482] kasan_report+0x141/0x180 [ 22.289559] ? kasan_atomics_helper+0x565/0x5450 [ 22.289651] kasan_check_range+0x10c/0x1c0 [ 22.289768] __kasan_check_write+0x18/0x20 [ 22.289851] kasan_atomics_helper+0x565/0x5450 [ 22.289951] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.290031] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.290113] ? kasan_save_alloc_info+0x3b/0x50 [ 22.290197] ? kasan_atomics+0x152/0x310 [ 22.290290] kasan_atomics+0x1dc/0x310 [ 22.290330] ? __pfx_kasan_atomics+0x10/0x10 [ 22.290368] ? __pfx_read_tsc+0x10/0x10 [ 22.290399] ? ktime_get_ts64+0x86/0x230 [ 22.290436] kunit_try_run_case+0x1a5/0x480 [ 22.290472] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.290508] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.290542] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.290578] ? __kthread_parkme+0x82/0x180 [ 22.290607] ? preempt_count_sub+0x50/0x80 [ 22.290640] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.290675] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.290710] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.290747] kthread+0x337/0x6f0 [ 22.290775] ? trace_preempt_on+0x20/0xc0 [ 22.290808] ? __pfx_kthread+0x10/0x10 [ 22.290840] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.290892] ? calculate_sigpending+0x7b/0xa0 [ 22.290940] ? __pfx_kthread+0x10/0x10 [ 22.290974] ret_from_fork+0x116/0x1d0 [ 22.291000] ? __pfx_kthread+0x10/0x10 [ 22.291031] ret_from_fork_asm+0x1a/0x30 [ 22.291074] </TASK> [ 22.291091] [ 22.306497] Allocated by task 283: [ 22.306896] kasan_save_stack+0x45/0x70 [ 22.307411] kasan_save_track+0x18/0x40 [ 22.307845] kasan_save_alloc_info+0x3b/0x50 [ 22.308367] __kasan_kmalloc+0xb7/0xc0 [ 22.308800] __kmalloc_cache_noprof+0x189/0x420 [ 22.309213] kasan_atomics+0x95/0x310 [ 22.309533] kunit_try_run_case+0x1a5/0x480 [ 22.309893] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.310386] kthread+0x337/0x6f0 [ 22.310825] ret_from_fork+0x116/0x1d0 [ 22.311285] ret_from_fork_asm+0x1a/0x30 [ 22.311982] [ 22.312258] The buggy address belongs to the object at ffff8881038ee700 [ 22.312258] which belongs to the cache kmalloc-64 of size 64 [ 22.312998] The buggy address is located 0 bytes to the right of [ 22.312998] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 22.314086] [ 22.314368] The buggy address belongs to the physical page: [ 22.314772] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 22.315575] flags: 0x200000000000000(node=0|zone=2) [ 22.316102] page_type: f5(slab) [ 22.316519] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.317172] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.317793] page dumped because: kasan: bad access detected [ 22.318179] [ 22.318380] Memory state around the buggy address: [ 22.318719] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.319397] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.320263] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.321099] ^ [ 22.321520] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.322108] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.324535] ================================================================== [ 22.566077] ================================================================== [ 22.566682] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 22.567507] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 22.568079] [ 22.568988] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 22.569058] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.569078] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.569126] Call Trace: [ 22.569166] <TASK> [ 22.569191] dump_stack_lvl+0x73/0xb0 [ 22.569238] print_report+0xd1/0x650 [ 22.569273] ? __virt_addr_valid+0x1db/0x2d0 [ 22.569326] ? kasan_atomics_helper+0x8f9/0x5450 [ 22.569366] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.569399] ? kasan_atomics_helper+0x8f9/0x5450 [ 22.569432] kasan_report+0x141/0x180 [ 22.569464] ? kasan_atomics_helper+0x8f9/0x5450 [ 22.569502] kasan_check_range+0x10c/0x1c0 [ 22.569537] __kasan_check_write+0x18/0x20 [ 22.569565] kasan_atomics_helper+0x8f9/0x5450 [ 22.569598] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.569631] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.569668] ? kasan_save_alloc_info+0x3b/0x50 [ 22.569704] ? kasan_atomics+0x152/0x310 [ 22.569741] kasan_atomics+0x1dc/0x310 [ 22.569773] ? __pfx_kasan_atomics+0x10/0x10 [ 22.569809] ? __pfx_read_tsc+0x10/0x10 [ 22.569839] ? ktime_get_ts64+0x86/0x230 [ 22.569892] kunit_try_run_case+0x1a5/0x480 [ 22.569941] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.569977] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.570015] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.570051] ? __kthread_parkme+0x82/0x180 [ 22.570081] ? preempt_count_sub+0x50/0x80 [ 22.570147] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.570191] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.570228] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.570277] kthread+0x337/0x6f0 [ 22.570308] ? trace_preempt_on+0x20/0xc0 [ 22.570344] ? __pfx_kthread+0x10/0x10 [ 22.570375] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.570407] ? calculate_sigpending+0x7b/0xa0 [ 22.570443] ? __pfx_kthread+0x10/0x10 [ 22.570473] ret_from_fork+0x116/0x1d0 [ 22.570499] ? __pfx_kthread+0x10/0x10 [ 22.570529] ret_from_fork_asm+0x1a/0x30 [ 22.570571] </TASK> [ 22.570588] [ 22.590620] Allocated by task 283: [ 22.590772] kasan_save_stack+0x45/0x70 [ 22.591058] kasan_save_track+0x18/0x40 [ 22.591396] kasan_save_alloc_info+0x3b/0x50 [ 22.591738] __kasan_kmalloc+0xb7/0xc0 [ 22.592051] __kmalloc_cache_noprof+0x189/0x420 [ 22.593792] kasan_atomics+0x95/0x310 [ 22.594140] kunit_try_run_case+0x1a5/0x480 [ 22.594555] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.595014] kthread+0x337/0x6f0 [ 22.595738] ret_from_fork+0x116/0x1d0 [ 22.596308] ret_from_fork_asm+0x1a/0x30 [ 22.597007] [ 22.597220] The buggy address belongs to the object at ffff8881038ee700 [ 22.597220] which belongs to the cache kmalloc-64 of size 64 [ 22.598780] The buggy address is located 0 bytes to the right of [ 22.598780] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 22.600046] [ 22.600826] The buggy address belongs to the physical page: [ 22.601279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 22.602084] flags: 0x200000000000000(node=0|zone=2) [ 22.602743] page_type: f5(slab) [ 22.603272] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.604044] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.604706] page dumped because: kasan: bad access detected [ 22.605622] [ 22.605806] Memory state around the buggy address: [ 22.606719] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.607560] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.608220] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.608985] ^ [ 22.609658] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.610461] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.611338] ================================================================== [ 23.590391] ================================================================== [ 23.591729] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 23.592620] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 23.593073] [ 23.593270] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 23.594161] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.594201] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.594238] Call Trace: [ 23.594268] <TASK> [ 23.594288] dump_stack_lvl+0x73/0xb0 [ 23.594368] print_report+0xd1/0x650 [ 23.594412] ? __virt_addr_valid+0x1db/0x2d0 [ 23.594447] ? kasan_atomics_helper+0x1467/0x5450 [ 23.594479] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.594512] ? kasan_atomics_helper+0x1467/0x5450 [ 23.594544] kasan_report+0x141/0x180 [ 23.594577] ? kasan_atomics_helper+0x1467/0x5450 [ 23.594614] kasan_check_range+0x10c/0x1c0 [ 23.594649] __kasan_check_write+0x18/0x20 [ 23.594678] kasan_atomics_helper+0x1467/0x5450 [ 23.594711] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.594744] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.594780] ? kasan_save_alloc_info+0x3b/0x50 [ 23.594815] ? kasan_atomics+0x152/0x310 [ 23.594852] kasan_atomics+0x1dc/0x310 [ 23.594924] ? __pfx_kasan_atomics+0x10/0x10 [ 23.595014] ? __pfx_read_tsc+0x10/0x10 [ 23.595090] ? ktime_get_ts64+0x86/0x230 [ 23.595193] kunit_try_run_case+0x1a5/0x480 [ 23.595237] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.595276] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.595313] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.595349] ? __kthread_parkme+0x82/0x180 [ 23.595379] ? preempt_count_sub+0x50/0x80 [ 23.595412] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.595447] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.595482] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.595522] kthread+0x337/0x6f0 [ 23.595552] ? trace_preempt_on+0x20/0xc0 [ 23.595584] ? __pfx_kthread+0x10/0x10 [ 23.595615] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.595646] ? calculate_sigpending+0x7b/0xa0 [ 23.595682] ? __pfx_kthread+0x10/0x10 [ 23.595767] ret_from_fork+0x116/0x1d0 [ 23.595840] ? __pfx_kthread+0x10/0x10 [ 23.595898] ret_from_fork_asm+0x1a/0x30 [ 23.595944] </TASK> [ 23.595963] [ 23.610816] Allocated by task 283: [ 23.611230] kasan_save_stack+0x45/0x70 [ 23.611675] kasan_save_track+0x18/0x40 [ 23.612141] kasan_save_alloc_info+0x3b/0x50 [ 23.612554] __kasan_kmalloc+0xb7/0xc0 [ 23.612949] __kmalloc_cache_noprof+0x189/0x420 [ 23.613674] kasan_atomics+0x95/0x310 [ 23.614042] kunit_try_run_case+0x1a5/0x480 [ 23.614532] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.614947] kthread+0x337/0x6f0 [ 23.615292] ret_from_fork+0x116/0x1d0 [ 23.615707] ret_from_fork_asm+0x1a/0x30 [ 23.616350] [ 23.616578] The buggy address belongs to the object at ffff8881038ee700 [ 23.616578] which belongs to the cache kmalloc-64 of size 64 [ 23.617538] The buggy address is located 0 bytes to the right of [ 23.617538] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 23.618506] [ 23.618745] The buggy address belongs to the physical page: [ 23.619322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 23.619825] flags: 0x200000000000000(node=0|zone=2) [ 23.620313] page_type: f5(slab) [ 23.620685] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.621177] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.621548] page dumped because: kasan: bad access detected [ 23.621839] [ 23.621996] Memory state around the buggy address: [ 23.622385] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.623024] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.623698] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.624276] ^ [ 23.624919] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.625464] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.625922] ================================================================== [ 23.050610] ================================================================== [ 23.051312] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 23.051797] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 23.052611] [ 23.053011] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 23.053123] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.053168] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.053228] Call Trace: [ 23.053269] <TASK> [ 23.053311] dump_stack_lvl+0x73/0xb0 [ 23.053399] print_report+0xd1/0x650 [ 23.053475] ? __virt_addr_valid+0x1db/0x2d0 [ 23.053555] ? kasan_atomics_helper+0xfa9/0x5450 [ 23.053630] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.053706] ? kasan_atomics_helper+0xfa9/0x5450 [ 23.053778] kasan_report+0x141/0x180 [ 23.053854] ? kasan_atomics_helper+0xfa9/0x5450 [ 23.053964] kasan_check_range+0x10c/0x1c0 [ 23.054042] __kasan_check_write+0x18/0x20 [ 23.054115] kasan_atomics_helper+0xfa9/0x5450 [ 23.054193] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.054286] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.054372] ? kasan_save_alloc_info+0x3b/0x50 [ 23.054445] ? kasan_atomics+0x152/0x310 [ 23.054525] kasan_atomics+0x1dc/0x310 [ 23.054608] ? __pfx_kasan_atomics+0x10/0x10 [ 23.054689] ? __pfx_read_tsc+0x10/0x10 [ 23.054756] ? ktime_get_ts64+0x86/0x230 [ 23.054856] kunit_try_run_case+0x1a5/0x480 [ 23.054966] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.055051] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.055136] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.055221] ? __kthread_parkme+0x82/0x180 [ 23.055299] ? preempt_count_sub+0x50/0x80 [ 23.055382] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.055469] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.055571] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.055651] kthread+0x337/0x6f0 [ 23.055711] ? trace_preempt_on+0x20/0xc0 [ 23.055789] ? __pfx_kthread+0x10/0x10 [ 23.055867] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.055964] ? calculate_sigpending+0x7b/0xa0 [ 23.056046] ? __pfx_kthread+0x10/0x10 [ 23.056121] ret_from_fork+0x116/0x1d0 [ 23.056192] ? __pfx_kthread+0x10/0x10 [ 23.056267] ret_from_fork_asm+0x1a/0x30 [ 23.056370] </TASK> [ 23.056414] [ 23.080033] Allocated by task 283: [ 23.080786] kasan_save_stack+0x45/0x70 [ 23.081332] kasan_save_track+0x18/0x40 [ 23.081649] kasan_save_alloc_info+0x3b/0x50 [ 23.082037] __kasan_kmalloc+0xb7/0xc0 [ 23.082541] __kmalloc_cache_noprof+0x189/0x420 [ 23.082975] kasan_atomics+0x95/0x310 [ 23.083391] kunit_try_run_case+0x1a5/0x480 [ 23.084029] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.084615] kthread+0x337/0x6f0 [ 23.085094] ret_from_fork+0x116/0x1d0 [ 23.085803] ret_from_fork_asm+0x1a/0x30 [ 23.086186] [ 23.086586] The buggy address belongs to the object at ffff8881038ee700 [ 23.086586] which belongs to the cache kmalloc-64 of size 64 [ 23.087631] The buggy address is located 0 bytes to the right of [ 23.087631] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 23.088993] [ 23.089238] The buggy address belongs to the physical page: [ 23.089685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 23.090872] flags: 0x200000000000000(node=0|zone=2) [ 23.091222] page_type: f5(slab) [ 23.091926] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.092818] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.093692] page dumped because: kasan: bad access detected [ 23.094119] [ 23.094675] Memory state around the buggy address: [ 23.095071] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.096091] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.096956] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.097915] ^ [ 23.098344] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.098597] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.098835] ================================================================== [ 24.384823] ================================================================== [ 24.386350] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 24.386948] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 24.387649] [ 24.387950] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 24.388066] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.388153] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.388217] Call Trace: [ 24.388259] <TASK> [ 24.388299] dump_stack_lvl+0x73/0xb0 [ 24.388387] print_report+0xd1/0x650 [ 24.388467] ? __virt_addr_valid+0x1db/0x2d0 [ 24.388551] ? kasan_atomics_helper+0x1eaa/0x5450 [ 24.388648] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.388759] ? kasan_atomics_helper+0x1eaa/0x5450 [ 24.388834] kasan_report+0x141/0x180 [ 24.388933] ? kasan_atomics_helper+0x1eaa/0x5450 [ 24.389021] kasan_check_range+0x10c/0x1c0 [ 24.389141] __kasan_check_write+0x18/0x20 [ 24.389221] kasan_atomics_helper+0x1eaa/0x5450 [ 24.389301] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.389379] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.389514] ? kasan_save_alloc_info+0x3b/0x50 [ 24.389601] ? kasan_atomics+0x152/0x310 [ 24.389691] kasan_atomics+0x1dc/0x310 [ 24.389822] ? __pfx_kasan_atomics+0x10/0x10 [ 24.389925] ? __pfx_read_tsc+0x10/0x10 [ 24.389990] ? ktime_get_ts64+0x86/0x230 [ 24.390031] kunit_try_run_case+0x1a5/0x480 [ 24.390070] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.390153] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.390197] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.390235] ? __kthread_parkme+0x82/0x180 [ 24.390277] ? preempt_count_sub+0x50/0x80 [ 24.390311] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.390349] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.390385] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.390421] kthread+0x337/0x6f0 [ 24.390450] ? trace_preempt_on+0x20/0xc0 [ 24.390484] ? __pfx_kthread+0x10/0x10 [ 24.390514] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.390546] ? calculate_sigpending+0x7b/0xa0 [ 24.390581] ? __pfx_kthread+0x10/0x10 [ 24.390613] ret_from_fork+0x116/0x1d0 [ 24.390639] ? __pfx_kthread+0x10/0x10 [ 24.390669] ret_from_fork_asm+0x1a/0x30 [ 24.390712] </TASK> [ 24.390727] [ 24.412368] Allocated by task 283: [ 24.412689] kasan_save_stack+0x45/0x70 [ 24.413827] kasan_save_track+0x18/0x40 [ 24.414567] kasan_save_alloc_info+0x3b/0x50 [ 24.415120] __kasan_kmalloc+0xb7/0xc0 [ 24.415563] __kmalloc_cache_noprof+0x189/0x420 [ 24.416053] kasan_atomics+0x95/0x310 [ 24.416444] kunit_try_run_case+0x1a5/0x480 [ 24.416946] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.417425] kthread+0x337/0x6f0 [ 24.417859] ret_from_fork+0x116/0x1d0 [ 24.418377] ret_from_fork_asm+0x1a/0x30 [ 24.418753] [ 24.418995] The buggy address belongs to the object at ffff8881038ee700 [ 24.418995] which belongs to the cache kmalloc-64 of size 64 [ 24.420692] The buggy address is located 0 bytes to the right of [ 24.420692] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 24.422027] [ 24.422414] The buggy address belongs to the physical page: [ 24.422865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 24.423766] flags: 0x200000000000000(node=0|zone=2) [ 24.424171] page_type: f5(slab) [ 24.424548] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.425134] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.425705] page dumped because: kasan: bad access detected [ 24.426852] [ 24.427059] Memory state around the buggy address: [ 24.427845] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.428641] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.429408] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.430550] ^ [ 24.431096] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.431864] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.432800] ================================================================== [ 24.478474] ================================================================== [ 24.479067] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 24.479746] Read of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 24.480487] [ 24.480796] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 24.480938] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.480979] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.481043] Call Trace: [ 24.481084] <TASK> [ 24.481165] dump_stack_lvl+0x73/0xb0 [ 24.481258] print_report+0xd1/0x650 [ 24.481333] ? __virt_addr_valid+0x1db/0x2d0 [ 24.481411] ? kasan_atomics_helper+0x4f71/0x5450 [ 24.481487] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.481567] ? kasan_atomics_helper+0x4f71/0x5450 [ 24.481683] kasan_report+0x141/0x180 [ 24.481774] ? kasan_atomics_helper+0x4f71/0x5450 [ 24.481918] __asan_report_load8_noabort+0x18/0x20 [ 24.482008] kasan_atomics_helper+0x4f71/0x5450 [ 24.482089] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.482215] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.482309] ? kasan_save_alloc_info+0x3b/0x50 [ 24.482391] ? kasan_atomics+0x152/0x310 [ 24.482477] kasan_atomics+0x1dc/0x310 [ 24.482525] ? __pfx_kasan_atomics+0x10/0x10 [ 24.482564] ? __pfx_read_tsc+0x10/0x10 [ 24.482595] ? ktime_get_ts64+0x86/0x230 [ 24.482630] kunit_try_run_case+0x1a5/0x480 [ 24.482667] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.482704] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.482739] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.482774] ? __kthread_parkme+0x82/0x180 [ 24.482802] ? preempt_count_sub+0x50/0x80 [ 24.482835] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.482906] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.482999] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.483060] kthread+0x337/0x6f0 [ 24.483096] ? trace_preempt_on+0x20/0xc0 [ 24.483322] ? __pfx_kthread+0x10/0x10 [ 24.483360] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.483394] ? calculate_sigpending+0x7b/0xa0 [ 24.483430] ? __pfx_kthread+0x10/0x10 [ 24.483463] ret_from_fork+0x116/0x1d0 [ 24.483489] ? __pfx_kthread+0x10/0x10 [ 24.483524] ret_from_fork_asm+0x1a/0x30 [ 24.483568] </TASK> [ 24.483584] [ 24.501947] Allocated by task 283: [ 24.502589] kasan_save_stack+0x45/0x70 [ 24.502955] kasan_save_track+0x18/0x40 [ 24.503324] kasan_save_alloc_info+0x3b/0x50 [ 24.504161] __kasan_kmalloc+0xb7/0xc0 [ 24.504692] __kmalloc_cache_noprof+0x189/0x420 [ 24.505210] kasan_atomics+0x95/0x310 [ 24.505621] kunit_try_run_case+0x1a5/0x480 [ 24.506325] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.506896] kthread+0x337/0x6f0 [ 24.507397] ret_from_fork+0x116/0x1d0 [ 24.507939] ret_from_fork_asm+0x1a/0x30 [ 24.508474] [ 24.508709] The buggy address belongs to the object at ffff8881038ee700 [ 24.508709] which belongs to the cache kmalloc-64 of size 64 [ 24.509719] The buggy address is located 0 bytes to the right of [ 24.509719] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 24.510672] [ 24.510986] The buggy address belongs to the physical page: [ 24.511660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 24.512357] flags: 0x200000000000000(node=0|zone=2) [ 24.512850] page_type: f5(slab) [ 24.513336] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.514060] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.514817] page dumped because: kasan: bad access detected [ 24.515434] [ 24.515649] Memory state around the buggy address: [ 24.516223] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.516921] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.517667] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.518308] ^ [ 24.518749] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.519499] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.520144] ================================================================== [ 23.497641] ================================================================== [ 23.498362] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 23.499035] Read of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 23.499547] [ 23.499768] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 23.499902] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.499948] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.500008] Call Trace: [ 23.500053] <TASK> [ 23.500137] dump_stack_lvl+0x73/0xb0 [ 23.500234] print_report+0xd1/0x650 [ 23.500315] ? __virt_addr_valid+0x1db/0x2d0 [ 23.500394] ? kasan_atomics_helper+0x13b5/0x5450 [ 23.500471] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.500551] ? kasan_atomics_helper+0x13b5/0x5450 [ 23.500635] kasan_report+0x141/0x180 [ 23.500711] ? kasan_atomics_helper+0x13b5/0x5450 [ 23.500796] kasan_check_range+0x10c/0x1c0 [ 23.500896] __kasan_check_read+0x15/0x20 [ 23.500972] kasan_atomics_helper+0x13b5/0x5450 [ 23.501050] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.501174] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.501259] ? kasan_save_alloc_info+0x3b/0x50 [ 23.501343] ? kasan_atomics+0x152/0x310 [ 23.501437] kasan_atomics+0x1dc/0x310 [ 23.501522] ? __pfx_kasan_atomics+0x10/0x10 [ 23.501609] ? __pfx_read_tsc+0x10/0x10 [ 23.501686] ? ktime_get_ts64+0x86/0x230 [ 23.501774] kunit_try_run_case+0x1a5/0x480 [ 23.501861] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.501959] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.502040] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.502155] ? __kthread_parkme+0x82/0x180 [ 23.502198] ? preempt_count_sub+0x50/0x80 [ 23.502233] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.502284] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.502322] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.502359] kthread+0x337/0x6f0 [ 23.502390] ? trace_preempt_on+0x20/0xc0 [ 23.502425] ? __pfx_kthread+0x10/0x10 [ 23.502455] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.502489] ? calculate_sigpending+0x7b/0xa0 [ 23.502524] ? __pfx_kthread+0x10/0x10 [ 23.502555] ret_from_fork+0x116/0x1d0 [ 23.502584] ? __pfx_kthread+0x10/0x10 [ 23.502615] ret_from_fork_asm+0x1a/0x30 [ 23.502657] </TASK> [ 23.502672] [ 23.521381] Allocated by task 283: [ 23.521839] kasan_save_stack+0x45/0x70 [ 23.522183] kasan_save_track+0x18/0x40 [ 23.523652] kasan_save_alloc_info+0x3b/0x50 [ 23.524162] __kasan_kmalloc+0xb7/0xc0 [ 23.524860] __kmalloc_cache_noprof+0x189/0x420 [ 23.525275] kasan_atomics+0x95/0x310 [ 23.525900] kunit_try_run_case+0x1a5/0x480 [ 23.526525] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.527433] kthread+0x337/0x6f0 [ 23.527822] ret_from_fork+0x116/0x1d0 [ 23.528215] ret_from_fork_asm+0x1a/0x30 [ 23.528593] [ 23.528831] The buggy address belongs to the object at ffff8881038ee700 [ 23.528831] which belongs to the cache kmalloc-64 of size 64 [ 23.529901] The buggy address is located 0 bytes to the right of [ 23.529901] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 23.530853] [ 23.531664] The buggy address belongs to the physical page: [ 23.532035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 23.533052] flags: 0x200000000000000(node=0|zone=2) [ 23.533710] page_type: f5(slab) [ 23.534092] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.534965] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.535826] page dumped because: kasan: bad access detected [ 23.536594] [ 23.536793] Memory state around the buggy address: [ 23.537148] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.537811] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.538420] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.539492] ^ [ 23.539800] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.540861] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.541719] ================================================================== [ 23.762756] ================================================================== [ 23.763482] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 23.764291] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 23.764887] [ 23.765227] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 23.765367] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.765437] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.765501] Call Trace: [ 23.765543] <TASK> [ 23.765587] dump_stack_lvl+0x73/0xb0 [ 23.765677] print_report+0xd1/0x650 [ 23.765761] ? __virt_addr_valid+0x1db/0x2d0 [ 23.765847] ? kasan_atomics_helper+0x164f/0x5450 [ 23.765949] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.766078] ? kasan_atomics_helper+0x164f/0x5450 [ 23.766200] kasan_report+0x141/0x180 [ 23.766291] ? kasan_atomics_helper+0x164f/0x5450 [ 23.766381] kasan_check_range+0x10c/0x1c0 [ 23.766467] __kasan_check_write+0x18/0x20 [ 23.766561] kasan_atomics_helper+0x164f/0x5450 [ 23.766678] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.766764] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.766856] ? kasan_save_alloc_info+0x3b/0x50 [ 23.766977] ? kasan_atomics+0x152/0x310 [ 23.767088] kasan_atomics+0x1dc/0x310 [ 23.767179] ? __pfx_kasan_atomics+0x10/0x10 [ 23.767222] ? __pfx_read_tsc+0x10/0x10 [ 23.767256] ? ktime_get_ts64+0x86/0x230 [ 23.767294] kunit_try_run_case+0x1a5/0x480 [ 23.767334] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.767371] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.767407] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.767442] ? __kthread_parkme+0x82/0x180 [ 23.767472] ? preempt_count_sub+0x50/0x80 [ 23.767504] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.767541] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.767576] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.767613] kthread+0x337/0x6f0 [ 23.767641] ? trace_preempt_on+0x20/0xc0 [ 23.767674] ? __pfx_kthread+0x10/0x10 [ 23.767703] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.767737] ? calculate_sigpending+0x7b/0xa0 [ 23.767773] ? __pfx_kthread+0x10/0x10 [ 23.767804] ret_from_fork+0x116/0x1d0 [ 23.767831] ? __pfx_kthread+0x10/0x10 [ 23.767863] ret_from_fork_asm+0x1a/0x30 [ 23.767933] </TASK> [ 23.767950] [ 23.790007] Allocated by task 283: [ 23.790788] kasan_save_stack+0x45/0x70 [ 23.791659] kasan_save_track+0x18/0x40 [ 23.792029] kasan_save_alloc_info+0x3b/0x50 [ 23.792976] __kasan_kmalloc+0xb7/0xc0 [ 23.793434] __kmalloc_cache_noprof+0x189/0x420 [ 23.793913] kasan_atomics+0x95/0x310 [ 23.794323] kunit_try_run_case+0x1a5/0x480 [ 23.794786] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.795307] kthread+0x337/0x6f0 [ 23.795687] ret_from_fork+0x116/0x1d0 [ 23.796098] ret_from_fork_asm+0x1a/0x30 [ 23.796531] [ 23.796722] The buggy address belongs to the object at ffff8881038ee700 [ 23.796722] which belongs to the cache kmalloc-64 of size 64 [ 23.797796] The buggy address is located 0 bytes to the right of [ 23.797796] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 23.798828] [ 23.799305] The buggy address belongs to the physical page: [ 23.799726] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 23.800507] flags: 0x200000000000000(node=0|zone=2) [ 23.801014] page_type: f5(slab) [ 23.801412] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.802067] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.802772] page dumped because: kasan: bad access detected [ 23.803186] [ 23.803490] Memory state around the buggy address: [ 23.803992] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.804690] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.805386] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.805912] ^ [ 23.806580] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.807266] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.807815] ================================================================== [ 24.618306] ================================================================== [ 24.619280] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 24.620453] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 24.621585] [ 24.621870] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 24.622082] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.622126] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.622186] Call Trace: [ 24.622231] <TASK> [ 24.622328] dump_stack_lvl+0x73/0xb0 [ 24.622378] print_report+0xd1/0x650 [ 24.622415] ? __virt_addr_valid+0x1db/0x2d0 [ 24.622448] ? kasan_atomics_helper+0x20c8/0x5450 [ 24.622479] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.622513] ? kasan_atomics_helper+0x20c8/0x5450 [ 24.622548] kasan_report+0x141/0x180 [ 24.622582] ? kasan_atomics_helper+0x20c8/0x5450 [ 24.622622] kasan_check_range+0x10c/0x1c0 [ 24.622657] __kasan_check_write+0x18/0x20 [ 24.622686] kasan_atomics_helper+0x20c8/0x5450 [ 24.622719] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.622750] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.622786] ? kasan_save_alloc_info+0x3b/0x50 [ 24.622820] ? kasan_atomics+0x152/0x310 [ 24.622857] kasan_atomics+0x1dc/0x310 [ 24.622918] ? __pfx_kasan_atomics+0x10/0x10 [ 24.622958] ? __pfx_read_tsc+0x10/0x10 [ 24.622990] ? ktime_get_ts64+0x86/0x230 [ 24.623024] kunit_try_run_case+0x1a5/0x480 [ 24.623061] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.623094] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.623165] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.623207] ? __kthread_parkme+0x82/0x180 [ 24.623240] ? preempt_count_sub+0x50/0x80 [ 24.623274] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.623313] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.623348] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.623385] kthread+0x337/0x6f0 [ 24.623414] ? trace_preempt_on+0x20/0xc0 [ 24.623447] ? __pfx_kthread+0x10/0x10 [ 24.623478] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.623510] ? calculate_sigpending+0x7b/0xa0 [ 24.623544] ? __pfx_kthread+0x10/0x10 [ 24.623575] ret_from_fork+0x116/0x1d0 [ 24.623601] ? __pfx_kthread+0x10/0x10 [ 24.623632] ret_from_fork_asm+0x1a/0x30 [ 24.623674] </TASK> [ 24.623689] [ 24.641247] Allocated by task 283: [ 24.641608] kasan_save_stack+0x45/0x70 [ 24.641956] kasan_save_track+0x18/0x40 [ 24.642289] kasan_save_alloc_info+0x3b/0x50 [ 24.642772] __kasan_kmalloc+0xb7/0xc0 [ 24.643112] __kmalloc_cache_noprof+0x189/0x420 [ 24.643467] kasan_atomics+0x95/0x310 [ 24.643835] kunit_try_run_case+0x1a5/0x480 [ 24.644535] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.645144] kthread+0x337/0x6f0 [ 24.645560] ret_from_fork+0x116/0x1d0 [ 24.646019] ret_from_fork_asm+0x1a/0x30 [ 24.646564] [ 24.646853] The buggy address belongs to the object at ffff8881038ee700 [ 24.646853] which belongs to the cache kmalloc-64 of size 64 [ 24.648103] The buggy address is located 0 bytes to the right of [ 24.648103] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 24.649445] [ 24.649714] The buggy address belongs to the physical page: [ 24.650289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 24.651029] flags: 0x200000000000000(node=0|zone=2) [ 24.651570] page_type: f5(slab) [ 24.652080] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.652796] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.653826] page dumped because: kasan: bad access detected [ 24.655616] [ 24.656048] Memory state around the buggy address: [ 24.656840] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.658015] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.658865] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.659557] ^ [ 24.660000] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.660665] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.661285] ================================================================== [ 22.973319] ================================================================== [ 22.974963] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 22.975896] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 22.976917] [ 22.977552] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 22.977659] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.977695] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.977731] Call Trace: [ 22.977753] <TASK> [ 22.977773] dump_stack_lvl+0x73/0xb0 [ 22.977819] print_report+0xd1/0x650 [ 22.977853] ? __virt_addr_valid+0x1db/0x2d0 [ 22.977925] ? kasan_atomics_helper+0xe78/0x5450 [ 22.978004] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.978074] ? kasan_atomics_helper+0xe78/0x5450 [ 22.978151] kasan_report+0x141/0x180 [ 22.978192] ? kasan_atomics_helper+0xe78/0x5450 [ 22.978231] kasan_check_range+0x10c/0x1c0 [ 22.978277] __kasan_check_write+0x18/0x20 [ 22.978307] kasan_atomics_helper+0xe78/0x5450 [ 22.978341] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.978373] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.978411] ? kasan_save_alloc_info+0x3b/0x50 [ 22.978445] ? kasan_atomics+0x152/0x310 [ 22.978483] kasan_atomics+0x1dc/0x310 [ 22.978517] ? __pfx_kasan_atomics+0x10/0x10 [ 22.978553] ? __pfx_read_tsc+0x10/0x10 [ 22.978585] ? ktime_get_ts64+0x86/0x230 [ 22.978622] kunit_try_run_case+0x1a5/0x480 [ 22.978658] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.978693] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.978728] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.978763] ? __kthread_parkme+0x82/0x180 [ 22.978793] ? preempt_count_sub+0x50/0x80 [ 22.978826] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.978863] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.978925] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.978964] kthread+0x337/0x6f0 [ 22.978994] ? trace_preempt_on+0x20/0xc0 [ 22.979028] ? __pfx_kthread+0x10/0x10 [ 22.979058] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.979090] ? calculate_sigpending+0x7b/0xa0 [ 22.979164] ? __pfx_kthread+0x10/0x10 [ 22.979198] ret_from_fork+0x116/0x1d0 [ 22.979226] ? __pfx_kthread+0x10/0x10 [ 22.979257] ret_from_fork_asm+0x1a/0x30 [ 22.979301] </TASK> [ 22.979318] [ 22.994478] Allocated by task 283: [ 22.994769] kasan_save_stack+0x45/0x70 [ 22.995223] kasan_save_track+0x18/0x40 [ 22.995680] kasan_save_alloc_info+0x3b/0x50 [ 22.996182] __kasan_kmalloc+0xb7/0xc0 [ 22.996613] __kmalloc_cache_noprof+0x189/0x420 [ 22.997255] kasan_atomics+0x95/0x310 [ 22.997574] kunit_try_run_case+0x1a5/0x480 [ 22.997975] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.998892] kthread+0x337/0x6f0 [ 22.999385] ret_from_fork+0x116/0x1d0 [ 22.999828] ret_from_fork_asm+0x1a/0x30 [ 23.000184] [ 23.000418] The buggy address belongs to the object at ffff8881038ee700 [ 23.000418] which belongs to the cache kmalloc-64 of size 64 [ 23.001381] The buggy address is located 0 bytes to the right of [ 23.001381] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 23.002166] [ 23.002376] The buggy address belongs to the physical page: [ 23.002749] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 23.003494] flags: 0x200000000000000(node=0|zone=2) [ 23.004026] page_type: f5(slab) [ 23.004541] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.005434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.005920] page dumped because: kasan: bad access detected [ 23.006680] [ 23.006931] Memory state around the buggy address: [ 23.007631] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.008243] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.008863] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.009573] ^ [ 23.009939] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.010470] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.011104] ================================================================== [ 22.612190] ================================================================== [ 22.612773] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 22.613566] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 22.615092] [ 22.615521] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 22.615585] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.615606] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.615636] Call Trace: [ 22.615655] <TASK> [ 22.615673] dump_stack_lvl+0x73/0xb0 [ 22.615716] print_report+0xd1/0x650 [ 22.615750] ? __virt_addr_valid+0x1db/0x2d0 [ 22.615783] ? kasan_atomics_helper+0x992/0x5450 [ 22.615814] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.615848] ? kasan_atomics_helper+0x992/0x5450 [ 22.615911] kasan_report+0x141/0x180 [ 22.615999] ? kasan_atomics_helper+0x992/0x5450 [ 22.616319] kasan_check_range+0x10c/0x1c0 [ 22.616707] __kasan_check_write+0x18/0x20 [ 22.616744] kasan_atomics_helper+0x992/0x5450 [ 22.616780] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.616815] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.616852] ? kasan_save_alloc_info+0x3b/0x50 [ 22.616912] ? kasan_atomics+0x152/0x310 [ 22.616954] kasan_atomics+0x1dc/0x310 [ 22.616988] ? __pfx_kasan_atomics+0x10/0x10 [ 22.617025] ? __pfx_read_tsc+0x10/0x10 [ 22.617059] ? ktime_get_ts64+0x86/0x230 [ 22.617098] kunit_try_run_case+0x1a5/0x480 [ 22.617179] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.617218] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.617255] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.617291] ? __kthread_parkme+0x82/0x180 [ 22.617321] ? preempt_count_sub+0x50/0x80 [ 22.617355] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.617392] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.617428] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.617465] kthread+0x337/0x6f0 [ 22.617494] ? trace_preempt_on+0x20/0xc0 [ 22.617528] ? __pfx_kthread+0x10/0x10 [ 22.617558] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.617590] ? calculate_sigpending+0x7b/0xa0 [ 22.617625] ? __pfx_kthread+0x10/0x10 [ 22.617657] ret_from_fork+0x116/0x1d0 [ 22.617683] ? __pfx_kthread+0x10/0x10 [ 22.617713] ret_from_fork_asm+0x1a/0x30 [ 22.617756] </TASK> [ 22.617772] [ 22.638730] Allocated by task 283: [ 22.639676] kasan_save_stack+0x45/0x70 [ 22.640025] kasan_save_track+0x18/0x40 [ 22.640563] kasan_save_alloc_info+0x3b/0x50 [ 22.641160] __kasan_kmalloc+0xb7/0xc0 [ 22.641746] __kmalloc_cache_noprof+0x189/0x420 [ 22.642411] kasan_atomics+0x95/0x310 [ 22.642992] kunit_try_run_case+0x1a5/0x480 [ 22.644068] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.644510] kthread+0x337/0x6f0 [ 22.645021] ret_from_fork+0x116/0x1d0 [ 22.645698] ret_from_fork_asm+0x1a/0x30 [ 22.646172] [ 22.646338] The buggy address belongs to the object at ffff8881038ee700 [ 22.646338] which belongs to the cache kmalloc-64 of size 64 [ 22.647787] The buggy address is located 0 bytes to the right of [ 22.647787] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 22.648985] [ 22.649229] The buggy address belongs to the physical page: [ 22.649939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 22.651043] flags: 0x200000000000000(node=0|zone=2) [ 22.651368] page_type: f5(slab) [ 22.651743] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.652451] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.653615] page dumped because: kasan: bad access detected [ 22.654212] [ 22.654394] Memory state around the buggy address: [ 22.654745] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.657292] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.657974] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.659861] ^ [ 22.660664] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.662339] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.663576] ================================================================== [ 23.312205] ================================================================== [ 23.315166] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 23.316133] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 23.316788] [ 23.317373] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 23.317591] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.317638] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.317702] Call Trace: [ 23.317749] <TASK> [ 23.317794] dump_stack_lvl+0x73/0xb0 [ 23.317902] print_report+0xd1/0x650 [ 23.317982] ? __virt_addr_valid+0x1db/0x2d0 [ 23.318061] ? kasan_atomics_helper+0x1217/0x5450 [ 23.318154] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.318232] ? kasan_atomics_helper+0x1217/0x5450 [ 23.318315] kasan_report+0x141/0x180 [ 23.318403] ? kasan_atomics_helper+0x1217/0x5450 [ 23.318484] kasan_check_range+0x10c/0x1c0 [ 23.318527] __kasan_check_write+0x18/0x20 [ 23.318559] kasan_atomics_helper+0x1217/0x5450 [ 23.318594] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.318669] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.318711] ? kasan_save_alloc_info+0x3b/0x50 [ 23.318749] ? kasan_atomics+0x152/0x310 [ 23.318789] kasan_atomics+0x1dc/0x310 [ 23.318825] ? __pfx_kasan_atomics+0x10/0x10 [ 23.318862] ? __pfx_read_tsc+0x10/0x10 [ 23.319030] ? ktime_get_ts64+0x86/0x230 [ 23.319118] kunit_try_run_case+0x1a5/0x480 [ 23.319208] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.319288] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.319338] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.319377] ? __kthread_parkme+0x82/0x180 [ 23.319409] ? preempt_count_sub+0x50/0x80 [ 23.319445] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.319483] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.319520] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.319556] kthread+0x337/0x6f0 [ 23.319586] ? trace_preempt_on+0x20/0xc0 [ 23.319620] ? __pfx_kthread+0x10/0x10 [ 23.319650] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.319684] ? calculate_sigpending+0x7b/0xa0 [ 23.319719] ? __pfx_kthread+0x10/0x10 [ 23.319751] ret_from_fork+0x116/0x1d0 [ 23.319777] ? __pfx_kthread+0x10/0x10 [ 23.319807] ret_from_fork_asm+0x1a/0x30 [ 23.319850] </TASK> [ 23.319865] [ 23.339364] Allocated by task 283: [ 23.339858] kasan_save_stack+0x45/0x70 [ 23.340444] kasan_save_track+0x18/0x40 [ 23.340931] kasan_save_alloc_info+0x3b/0x50 [ 23.341508] __kasan_kmalloc+0xb7/0xc0 [ 23.342008] __kmalloc_cache_noprof+0x189/0x420 [ 23.342586] kasan_atomics+0x95/0x310 [ 23.343022] kunit_try_run_case+0x1a5/0x480 [ 23.343592] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.344291] kthread+0x337/0x6f0 [ 23.344697] ret_from_fork+0x116/0x1d0 [ 23.345271] ret_from_fork_asm+0x1a/0x30 [ 23.345610] [ 23.345945] The buggy address belongs to the object at ffff8881038ee700 [ 23.345945] which belongs to the cache kmalloc-64 of size 64 [ 23.347174] The buggy address is located 0 bytes to the right of [ 23.347174] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 23.348292] [ 23.348589] The buggy address belongs to the physical page: [ 23.349137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 23.349991] flags: 0x200000000000000(node=0|zone=2) [ 23.350533] page_type: f5(slab) [ 23.351010] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.351788] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.352522] page dumped because: kasan: bad access detected [ 23.353016] [ 23.353270] Memory state around the buggy address: [ 23.353684] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.354345] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.355077] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.356179] ^ [ 23.356706] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.357407] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.357962] ================================================================== [ 23.358944] ================================================================== [ 23.359637] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 23.360320] Read of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 23.360945] [ 23.361260] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 23.361410] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.361455] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.361514] Call Trace: [ 23.361557] <TASK> [ 23.361601] dump_stack_lvl+0x73/0xb0 [ 23.361691] print_report+0xd1/0x650 [ 23.361769] ? __virt_addr_valid+0x1db/0x2d0 [ 23.361866] ? kasan_atomics_helper+0x49e8/0x5450 [ 23.361977] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.362056] ? kasan_atomics_helper+0x49e8/0x5450 [ 23.362178] kasan_report+0x141/0x180 [ 23.362267] ? kasan_atomics_helper+0x49e8/0x5450 [ 23.362313] __asan_report_load4_noabort+0x18/0x20 [ 23.362351] kasan_atomics_helper+0x49e8/0x5450 [ 23.362386] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.362422] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.362458] ? kasan_save_alloc_info+0x3b/0x50 [ 23.362495] ? kasan_atomics+0x152/0x310 [ 23.362534] kasan_atomics+0x1dc/0x310 [ 23.362568] ? __pfx_kasan_atomics+0x10/0x10 [ 23.362604] ? __pfx_read_tsc+0x10/0x10 [ 23.362634] ? ktime_get_ts64+0x86/0x230 [ 23.362670] kunit_try_run_case+0x1a5/0x480 [ 23.362706] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.362742] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.362777] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.362812] ? __kthread_parkme+0x82/0x180 [ 23.362842] ? preempt_count_sub+0x50/0x80 [ 23.362900] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.362947] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.362984] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.363022] kthread+0x337/0x6f0 [ 23.363050] ? trace_preempt_on+0x20/0xc0 [ 23.363085] ? __pfx_kthread+0x10/0x10 [ 23.363163] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.363199] ? calculate_sigpending+0x7b/0xa0 [ 23.363234] ? __pfx_kthread+0x10/0x10 [ 23.363267] ret_from_fork+0x116/0x1d0 [ 23.363294] ? __pfx_kthread+0x10/0x10 [ 23.363325] ret_from_fork_asm+0x1a/0x30 [ 23.363367] </TASK> [ 23.363387] [ 23.384177] Allocated by task 283: [ 23.384723] kasan_save_stack+0x45/0x70 [ 23.385308] kasan_save_track+0x18/0x40 [ 23.385645] kasan_save_alloc_info+0x3b/0x50 [ 23.386018] __kasan_kmalloc+0xb7/0xc0 [ 23.387520] __kmalloc_cache_noprof+0x189/0x420 [ 23.388111] kasan_atomics+0x95/0x310 [ 23.388706] kunit_try_run_case+0x1a5/0x480 [ 23.389156] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.389744] kthread+0x337/0x6f0 [ 23.390100] ret_from_fork+0x116/0x1d0 [ 23.390958] ret_from_fork_asm+0x1a/0x30 [ 23.391638] [ 23.392041] The buggy address belongs to the object at ffff8881038ee700 [ 23.392041] which belongs to the cache kmalloc-64 of size 64 [ 23.393422] The buggy address is located 0 bytes to the right of [ 23.393422] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 23.394615] [ 23.394866] The buggy address belongs to the physical page: [ 23.395705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 23.396610] flags: 0x200000000000000(node=0|zone=2) [ 23.397003] page_type: f5(slab) [ 23.397928] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.398695] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.399475] page dumped because: kasan: bad access detected [ 23.399904] [ 23.400067] Memory state around the buggy address: [ 23.401151] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.401849] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.402564] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.403164] ^ [ 23.403944] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.404711] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.405518] ================================================================== [ 23.979916] ================================================================== [ 23.980351] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 23.981477] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 23.982283] [ 23.982578] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 23.982723] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.982767] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.982828] Call Trace: [ 23.982871] <TASK> [ 23.982988] dump_stack_lvl+0x73/0xb0 [ 23.983104] print_report+0xd1/0x650 [ 23.983206] ? __virt_addr_valid+0x1db/0x2d0 [ 23.983346] ? kasan_atomics_helper+0x194a/0x5450 [ 23.983455] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.983540] ? kasan_atomics_helper+0x194a/0x5450 [ 23.983671] kasan_report+0x141/0x180 [ 23.983789] ? kasan_atomics_helper+0x194a/0x5450 [ 23.983900] kasan_check_range+0x10c/0x1c0 [ 23.984067] __kasan_check_write+0x18/0x20 [ 23.984146] kasan_atomics_helper+0x194a/0x5450 [ 23.984232] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.984395] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.984482] ? kasan_save_alloc_info+0x3b/0x50 [ 23.984615] ? kasan_atomics+0x152/0x310 [ 23.984740] kasan_atomics+0x1dc/0x310 [ 23.984848] ? __pfx_kasan_atomics+0x10/0x10 [ 23.985008] ? __pfx_read_tsc+0x10/0x10 [ 23.985121] ? ktime_get_ts64+0x86/0x230 [ 23.985227] kunit_try_run_case+0x1a5/0x480 [ 23.985373] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.985488] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.985549] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.985589] ? __kthread_parkme+0x82/0x180 [ 23.985621] ? preempt_count_sub+0x50/0x80 [ 23.985657] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.985695] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.985750] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.985806] kthread+0x337/0x6f0 [ 23.985847] ? trace_preempt_on+0x20/0xc0 [ 23.985925] ? __pfx_kthread+0x10/0x10 [ 23.985961] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.986016] ? calculate_sigpending+0x7b/0xa0 [ 23.986055] ? __pfx_kthread+0x10/0x10 [ 23.986121] ret_from_fork+0x116/0x1d0 [ 23.986175] ? __pfx_kthread+0x10/0x10 [ 23.986216] ret_from_fork_asm+0x1a/0x30 [ 23.986283] </TASK> [ 23.986304] [ 24.010941] Allocated by task 283: [ 24.011366] kasan_save_stack+0x45/0x70 [ 24.012230] kasan_save_track+0x18/0x40 [ 24.012761] kasan_save_alloc_info+0x3b/0x50 [ 24.013458] __kasan_kmalloc+0xb7/0xc0 [ 24.014059] __kmalloc_cache_noprof+0x189/0x420 [ 24.014648] kasan_atomics+0x95/0x310 [ 24.015238] kunit_try_run_case+0x1a5/0x480 [ 24.015673] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.016276] kthread+0x337/0x6f0 [ 24.016888] ret_from_fork+0x116/0x1d0 [ 24.017497] ret_from_fork_asm+0x1a/0x30 [ 24.017828] [ 24.018006] The buggy address belongs to the object at ffff8881038ee700 [ 24.018006] which belongs to the cache kmalloc-64 of size 64 [ 24.019768] The buggy address is located 0 bytes to the right of [ 24.019768] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 24.020919] [ 24.021797] The buggy address belongs to the physical page: [ 24.022331] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 24.023042] flags: 0x200000000000000(node=0|zone=2) [ 24.023728] page_type: f5(slab) [ 24.024094] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.025054] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.025800] page dumped because: kasan: bad access detected [ 24.026415] [ 24.026661] Memory state around the buggy address: [ 24.027431] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.028602] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.029137] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.029850] ^ [ 24.030732] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.031513] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.032163] ================================================================== [ 23.939040] ================================================================== [ 23.939696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 23.940405] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 23.941065] [ 23.941393] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 23.941511] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.941556] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.941616] Call Trace: [ 23.941662] <TASK> [ 23.941705] dump_stack_lvl+0x73/0xb0 [ 23.941795] print_report+0xd1/0x650 [ 23.941836] ? __virt_addr_valid+0x1db/0x2d0 [ 23.941892] ? kasan_atomics_helper+0x18b1/0x5450 [ 23.941961] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.941999] ? kasan_atomics_helper+0x18b1/0x5450 [ 23.942032] kasan_report+0x141/0x180 [ 23.942066] ? kasan_atomics_helper+0x18b1/0x5450 [ 23.942137] kasan_check_range+0x10c/0x1c0 [ 23.942273] __kasan_check_write+0x18/0x20 [ 23.942379] kasan_atomics_helper+0x18b1/0x5450 [ 23.942493] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.942574] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.942655] ? kasan_save_alloc_info+0x3b/0x50 [ 23.942726] ? kasan_atomics+0x152/0x310 [ 23.942771] kasan_atomics+0x1dc/0x310 [ 23.942808] ? __pfx_kasan_atomics+0x10/0x10 [ 23.942848] ? __pfx_read_tsc+0x10/0x10 [ 23.942902] ? ktime_get_ts64+0x86/0x230 [ 23.942943] kunit_try_run_case+0x1a5/0x480 [ 23.942981] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.943015] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.943052] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.943087] ? __kthread_parkme+0x82/0x180 [ 23.943158] ? preempt_count_sub+0x50/0x80 [ 23.943196] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.943233] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.943269] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.943306] kthread+0x337/0x6f0 [ 23.943336] ? trace_preempt_on+0x20/0xc0 [ 23.943369] ? __pfx_kthread+0x10/0x10 [ 23.943399] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.943433] ? calculate_sigpending+0x7b/0xa0 [ 23.943468] ? __pfx_kthread+0x10/0x10 [ 23.943499] ret_from_fork+0x116/0x1d0 [ 23.943526] ? __pfx_kthread+0x10/0x10 [ 23.943556] ret_from_fork_asm+0x1a/0x30 [ 23.943597] </TASK> [ 23.943614] [ 23.960122] Allocated by task 283: [ 23.960550] kasan_save_stack+0x45/0x70 [ 23.961301] kasan_save_track+0x18/0x40 [ 23.961903] kasan_save_alloc_info+0x3b/0x50 [ 23.962414] __kasan_kmalloc+0xb7/0xc0 [ 23.962897] __kmalloc_cache_noprof+0x189/0x420 [ 23.963534] kasan_atomics+0x95/0x310 [ 23.964032] kunit_try_run_case+0x1a5/0x480 [ 23.964655] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.965185] kthread+0x337/0x6f0 [ 23.965647] ret_from_fork+0x116/0x1d0 [ 23.966061] ret_from_fork_asm+0x1a/0x30 [ 23.966536] [ 23.966922] The buggy address belongs to the object at ffff8881038ee700 [ 23.966922] which belongs to the cache kmalloc-64 of size 64 [ 23.968137] The buggy address is located 0 bytes to the right of [ 23.968137] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 23.969034] [ 23.969413] The buggy address belongs to the physical page: [ 23.970066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 23.970749] flags: 0x200000000000000(node=0|zone=2) [ 23.971310] page_type: f5(slab) [ 23.971741] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.972540] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.973320] page dumped because: kasan: bad access detected [ 23.973869] [ 23.974180] Memory state around the buggy address: [ 23.974692] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.975199] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.976041] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.976762] ^ [ 23.977146] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.977806] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.978663] ================================================================== [ 24.167681] ================================================================== [ 24.168837] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 24.169517] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 24.170196] [ 24.170589] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 24.170709] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.170749] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.170808] Call Trace: [ 24.170853] <TASK> [ 24.170915] dump_stack_lvl+0x73/0xb0 [ 24.171009] print_report+0xd1/0x650 [ 24.171158] ? __virt_addr_valid+0x1db/0x2d0 [ 24.171250] ? kasan_atomics_helper+0x1c18/0x5450 [ 24.171331] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.171409] ? kasan_atomics_helper+0x1c18/0x5450 [ 24.171447] kasan_report+0x141/0x180 [ 24.171484] ? kasan_atomics_helper+0x1c18/0x5450 [ 24.171524] kasan_check_range+0x10c/0x1c0 [ 24.171560] __kasan_check_write+0x18/0x20 [ 24.171589] kasan_atomics_helper+0x1c18/0x5450 [ 24.171621] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.171654] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.171689] ? kasan_save_alloc_info+0x3b/0x50 [ 24.171723] ? kasan_atomics+0x152/0x310 [ 24.171761] kasan_atomics+0x1dc/0x310 [ 24.171794] ? __pfx_kasan_atomics+0x10/0x10 [ 24.171830] ? __pfx_read_tsc+0x10/0x10 [ 24.171859] ? ktime_get_ts64+0x86/0x230 [ 24.171923] kunit_try_run_case+0x1a5/0x480 [ 24.171963] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.172000] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.172034] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.172069] ? __kthread_parkme+0x82/0x180 [ 24.172121] ? preempt_count_sub+0x50/0x80 [ 24.172172] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.172210] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.172248] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.172284] kthread+0x337/0x6f0 [ 24.172312] ? trace_preempt_on+0x20/0xc0 [ 24.172346] ? __pfx_kthread+0x10/0x10 [ 24.172376] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.172407] ? calculate_sigpending+0x7b/0xa0 [ 24.172442] ? __pfx_kthread+0x10/0x10 [ 24.172473] ret_from_fork+0x116/0x1d0 [ 24.172499] ? __pfx_kthread+0x10/0x10 [ 24.172529] ret_from_fork_asm+0x1a/0x30 [ 24.172571] </TASK> [ 24.172587] [ 24.193831] Allocated by task 283: [ 24.194095] kasan_save_stack+0x45/0x70 [ 24.195250] kasan_save_track+0x18/0x40 [ 24.195791] kasan_save_alloc_info+0x3b/0x50 [ 24.196435] __kasan_kmalloc+0xb7/0xc0 [ 24.196615] __kmalloc_cache_noprof+0x189/0x420 [ 24.196805] kasan_atomics+0x95/0x310 [ 24.197275] kunit_try_run_case+0x1a5/0x480 [ 24.197737] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.198538] kthread+0x337/0x6f0 [ 24.198946] ret_from_fork+0x116/0x1d0 [ 24.199226] ret_from_fork_asm+0x1a/0x30 [ 24.200105] [ 24.200468] The buggy address belongs to the object at ffff8881038ee700 [ 24.200468] which belongs to the cache kmalloc-64 of size 64 [ 24.201360] The buggy address is located 0 bytes to the right of [ 24.201360] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 24.202826] [ 24.203614] The buggy address belongs to the physical page: [ 24.204044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 24.204934] flags: 0x200000000000000(node=0|zone=2) [ 24.205551] page_type: f5(slab) [ 24.206050] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.206853] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.207456] page dumped because: kasan: bad access detected [ 24.208060] [ 24.208285] Memory state around the buggy address: [ 24.208791] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.209646] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.210280] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.211015] ^ [ 24.211534] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.212244] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.212972] ================================================================== [ 24.213798] ================================================================== [ 24.214405] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 24.215183] Read of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 24.215749] [ 24.216057] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 24.216218] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.216258] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.216317] Call Trace: [ 24.216359] <TASK> [ 24.216439] dump_stack_lvl+0x73/0xb0 [ 24.216533] print_report+0xd1/0x650 [ 24.216619] ? __virt_addr_valid+0x1db/0x2d0 [ 24.216702] ? kasan_atomics_helper+0x4f30/0x5450 [ 24.216782] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.216860] ? kasan_atomics_helper+0x4f30/0x5450 [ 24.216993] kasan_report+0x141/0x180 [ 24.217080] ? kasan_atomics_helper+0x4f30/0x5450 [ 24.217215] __asan_report_load8_noabort+0x18/0x20 [ 24.217298] kasan_atomics_helper+0x4f30/0x5450 [ 24.217377] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.217458] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.217581] ? kasan_save_alloc_info+0x3b/0x50 [ 24.217667] ? kasan_atomics+0x152/0x310 [ 24.217757] kasan_atomics+0x1dc/0x310 [ 24.217838] ? __pfx_kasan_atomics+0x10/0x10 [ 24.217934] ? __pfx_read_tsc+0x10/0x10 [ 24.217973] ? ktime_get_ts64+0x86/0x230 [ 24.218011] kunit_try_run_case+0x1a5/0x480 [ 24.218050] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.218087] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.218217] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.218320] ? __kthread_parkme+0x82/0x180 [ 24.218372] ? preempt_count_sub+0x50/0x80 [ 24.218409] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.218447] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.218483] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.218520] kthread+0x337/0x6f0 [ 24.218548] ? trace_preempt_on+0x20/0xc0 [ 24.218582] ? __pfx_kthread+0x10/0x10 [ 24.218612] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.218644] ? calculate_sigpending+0x7b/0xa0 [ 24.218680] ? __pfx_kthread+0x10/0x10 [ 24.218710] ret_from_fork+0x116/0x1d0 [ 24.218737] ? __pfx_kthread+0x10/0x10 [ 24.218768] ret_from_fork_asm+0x1a/0x30 [ 24.218810] </TASK> [ 24.218826] [ 24.234103] Allocated by task 283: [ 24.234537] kasan_save_stack+0x45/0x70 [ 24.235018] kasan_save_track+0x18/0x40 [ 24.235437] kasan_save_alloc_info+0x3b/0x50 [ 24.235933] __kasan_kmalloc+0xb7/0xc0 [ 24.236390] __kmalloc_cache_noprof+0x189/0x420 [ 24.236826] kasan_atomics+0x95/0x310 [ 24.237731] kunit_try_run_case+0x1a5/0x480 [ 24.238432] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.239460] kthread+0x337/0x6f0 [ 24.239813] ret_from_fork+0x116/0x1d0 [ 24.240158] ret_from_fork_asm+0x1a/0x30 [ 24.240495] [ 24.240727] The buggy address belongs to the object at ffff8881038ee700 [ 24.240727] which belongs to the cache kmalloc-64 of size 64 [ 24.242985] The buggy address is located 0 bytes to the right of [ 24.242985] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 24.244990] [ 24.245413] The buggy address belongs to the physical page: [ 24.246395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 24.247914] flags: 0x200000000000000(node=0|zone=2) [ 24.248817] page_type: f5(slab) [ 24.249544] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.250541] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.250800] page dumped because: kasan: bad access detected [ 24.251161] [ 24.251432] Memory state around the buggy address: [ 24.251864] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.252567] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.253103] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.253736] ^ [ 24.254227] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.254934] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.255665] ================================================================== [ 22.796188] ================================================================== [ 22.796679] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 22.797460] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 22.798399] [ 22.798749] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 22.798859] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.798921] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.798983] Call Trace: [ 22.799022] <TASK> [ 22.799060] dump_stack_lvl+0x73/0xb0 [ 22.799192] print_report+0xd1/0x650 [ 22.799270] ? __virt_addr_valid+0x1db/0x2d0 [ 22.799353] ? kasan_atomics_helper+0xc70/0x5450 [ 22.799427] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.799559] ? kasan_atomics_helper+0xc70/0x5450 [ 22.799644] kasan_report+0x141/0x180 [ 22.799724] ? kasan_atomics_helper+0xc70/0x5450 [ 22.799864] kasan_check_range+0x10c/0x1c0 [ 22.799965] __kasan_check_write+0x18/0x20 [ 22.800036] kasan_atomics_helper+0xc70/0x5450 [ 22.800157] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.800243] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.800347] ? kasan_save_alloc_info+0x3b/0x50 [ 22.800456] ? kasan_atomics+0x152/0x310 [ 22.800549] kasan_atomics+0x1dc/0x310 [ 22.800648] ? __pfx_kasan_atomics+0x10/0x10 [ 22.800764] ? __pfx_read_tsc+0x10/0x10 [ 22.800846] ? ktime_get_ts64+0x86/0x230 [ 22.800920] kunit_try_run_case+0x1a5/0x480 [ 22.800965] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.801004] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.801039] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.801075] ? __kthread_parkme+0x82/0x180 [ 22.801150] ? preempt_count_sub+0x50/0x80 [ 22.801191] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.801229] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.801265] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.801302] kthread+0x337/0x6f0 [ 22.801330] ? trace_preempt_on+0x20/0xc0 [ 22.801365] ? __pfx_kthread+0x10/0x10 [ 22.801396] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.801429] ? calculate_sigpending+0x7b/0xa0 [ 22.801464] ? __pfx_kthread+0x10/0x10 [ 22.801495] ret_from_fork+0x116/0x1d0 [ 22.801522] ? __pfx_kthread+0x10/0x10 [ 22.801552] ret_from_fork_asm+0x1a/0x30 [ 22.801594] </TASK> [ 22.801609] [ 22.820054] Allocated by task 283: [ 22.820357] kasan_save_stack+0x45/0x70 [ 22.821132] kasan_save_track+0x18/0x40 [ 22.821630] kasan_save_alloc_info+0x3b/0x50 [ 22.822053] __kasan_kmalloc+0xb7/0xc0 [ 22.822558] __kmalloc_cache_noprof+0x189/0x420 [ 22.823132] kasan_atomics+0x95/0x310 [ 22.823596] kunit_try_run_case+0x1a5/0x480 [ 22.823976] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.824649] kthread+0x337/0x6f0 [ 22.825075] ret_from_fork+0x116/0x1d0 [ 22.825544] ret_from_fork_asm+0x1a/0x30 [ 22.826051] [ 22.826316] The buggy address belongs to the object at ffff8881038ee700 [ 22.826316] which belongs to the cache kmalloc-64 of size 64 [ 22.827447] The buggy address is located 0 bytes to the right of [ 22.827447] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 22.828616] [ 22.828863] The buggy address belongs to the physical page: [ 22.829349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 22.830138] flags: 0x200000000000000(node=0|zone=2) [ 22.830699] page_type: f5(slab) [ 22.831145] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.832005] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.832693] page dumped because: kasan: bad access detected [ 22.833140] [ 22.833305] Memory state around the buggy address: [ 22.833668] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.835821] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.836558] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.837361] ^ [ 22.837837] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.838842] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.839922] ================================================================== [ 22.920176] ================================================================== [ 22.920821] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 22.922810] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 22.923356] [ 22.923573] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 22.923691] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.923734] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.923795] Call Trace: [ 22.923837] <TASK> [ 22.923901] dump_stack_lvl+0x73/0xb0 [ 22.923974] print_report+0xd1/0x650 [ 22.924031] ? __virt_addr_valid+0x1db/0x2d0 [ 22.924088] ? kasan_atomics_helper+0xde0/0x5450 [ 22.924146] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.924202] ? kasan_atomics_helper+0xde0/0x5450 [ 22.924260] kasan_report+0x141/0x180 [ 22.924316] ? kasan_atomics_helper+0xde0/0x5450 [ 22.924382] kasan_check_range+0x10c/0x1c0 [ 22.924440] __kasan_check_write+0x18/0x20 [ 22.924489] kasan_atomics_helper+0xde0/0x5450 [ 22.924592] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.924679] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.924763] ? kasan_save_alloc_info+0x3b/0x50 [ 22.924847] ? kasan_atomics+0x152/0x310 [ 22.925060] kasan_atomics+0x1dc/0x310 [ 22.925168] ? __pfx_kasan_atomics+0x10/0x10 [ 22.925254] ? __pfx_read_tsc+0x10/0x10 [ 22.926308] ? ktime_get_ts64+0x86/0x230 [ 22.926385] kunit_try_run_case+0x1a5/0x480 [ 22.926450] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.926509] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.926568] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.927934] ? __kthread_parkme+0x82/0x180 [ 22.928019] ? preempt_count_sub+0x50/0x80 [ 22.928098] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.928870] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.928973] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.929049] kthread+0x337/0x6f0 [ 22.929947] ? trace_preempt_on+0x20/0xc0 [ 22.930023] ? __pfx_kthread+0x10/0x10 [ 22.930089] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.930202] ? calculate_sigpending+0x7b/0xa0 [ 22.930283] ? __pfx_kthread+0x10/0x10 [ 22.930345] ret_from_fork+0x116/0x1d0 [ 22.930395] ? __pfx_kthread+0x10/0x10 [ 22.930451] ret_from_fork_asm+0x1a/0x30 [ 22.930536] </TASK> [ 22.930569] [ 22.952241] Allocated by task 283: [ 22.952904] kasan_save_stack+0x45/0x70 [ 22.953267] kasan_save_track+0x18/0x40 [ 22.953589] kasan_save_alloc_info+0x3b/0x50 [ 22.954280] __kasan_kmalloc+0xb7/0xc0 [ 22.954998] __kmalloc_cache_noprof+0x189/0x420 [ 22.955482] kasan_atomics+0x95/0x310 [ 22.956055] kunit_try_run_case+0x1a5/0x480 [ 22.956463] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.957181] kthread+0x337/0x6f0 [ 22.957578] ret_from_fork+0x116/0x1d0 [ 22.958097] ret_from_fork_asm+0x1a/0x30 [ 22.958665] [ 22.958855] The buggy address belongs to the object at ffff8881038ee700 [ 22.958855] which belongs to the cache kmalloc-64 of size 64 [ 22.960198] The buggy address is located 0 bytes to the right of [ 22.960198] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 22.961629] [ 22.962082] The buggy address belongs to the physical page: [ 22.962956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 22.963675] flags: 0x200000000000000(node=0|zone=2) [ 22.964085] page_type: f5(slab) [ 22.964788] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.965576] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.966432] page dumped because: kasan: bad access detected [ 22.967020] [ 22.967333] Memory state around the buggy address: [ 22.967864] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.968748] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.969613] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.970216] ^ [ 22.970735] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.971412] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.972114] ================================================================== [ 23.717352] ================================================================== [ 23.717755] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 23.718548] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 23.720195] [ 23.721118] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 23.721228] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.721267] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.721323] Call Trace: [ 23.721366] <TASK> [ 23.721406] dump_stack_lvl+0x73/0xb0 [ 23.721477] print_report+0xd1/0x650 [ 23.721546] ? __virt_addr_valid+0x1db/0x2d0 [ 23.721618] ? kasan_atomics_helper+0x15b6/0x5450 [ 23.721689] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.721762] ? kasan_atomics_helper+0x15b6/0x5450 [ 23.721836] kasan_report+0x141/0x180 [ 23.722318] ? kasan_atomics_helper+0x15b6/0x5450 [ 23.722407] kasan_check_range+0x10c/0x1c0 [ 23.722474] __kasan_check_write+0x18/0x20 [ 23.722531] kasan_atomics_helper+0x15b6/0x5450 [ 23.722598] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.722663] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.722726] ? kasan_save_alloc_info+0x3b/0x50 [ 23.722792] ? kasan_atomics+0x152/0x310 [ 23.722858] kasan_atomics+0x1dc/0x310 [ 23.722967] ? __pfx_kasan_atomics+0x10/0x10 [ 23.723043] ? __pfx_read_tsc+0x10/0x10 [ 23.723105] ? ktime_get_ts64+0x86/0x230 [ 23.723197] kunit_try_run_case+0x1a5/0x480 [ 23.723277] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.723347] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.723419] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.723494] ? __kthread_parkme+0x82/0x180 [ 23.723560] ? preempt_count_sub+0x50/0x80 [ 23.723621] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.723693] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.723768] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.723831] kthread+0x337/0x6f0 [ 23.723911] ? trace_preempt_on+0x20/0xc0 [ 23.723974] ? __pfx_kthread+0x10/0x10 [ 23.724027] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.724082] ? calculate_sigpending+0x7b/0xa0 [ 23.724166] ? __pfx_kthread+0x10/0x10 [ 23.724226] ret_from_fork+0x116/0x1d0 [ 23.724273] ? __pfx_kthread+0x10/0x10 [ 23.724329] ret_from_fork_asm+0x1a/0x30 [ 23.724402] </TASK> [ 23.724432] [ 23.744160] Allocated by task 283: [ 23.744864] kasan_save_stack+0x45/0x70 [ 23.745641] kasan_save_track+0x18/0x40 [ 23.745817] kasan_save_alloc_info+0x3b/0x50 [ 23.746271] __kasan_kmalloc+0xb7/0xc0 [ 23.746702] __kmalloc_cache_noprof+0x189/0x420 [ 23.747169] kasan_atomics+0x95/0x310 [ 23.747493] kunit_try_run_case+0x1a5/0x480 [ 23.748024] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.748595] kthread+0x337/0x6f0 [ 23.749091] ret_from_fork+0x116/0x1d0 [ 23.749499] ret_from_fork_asm+0x1a/0x30 [ 23.750041] [ 23.750312] The buggy address belongs to the object at ffff8881038ee700 [ 23.750312] which belongs to the cache kmalloc-64 of size 64 [ 23.751419] The buggy address is located 0 bytes to the right of [ 23.751419] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 23.752442] [ 23.752734] The buggy address belongs to the physical page: [ 23.753301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 23.754031] flags: 0x200000000000000(node=0|zone=2) [ 23.754549] page_type: f5(slab) [ 23.754991] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.755608] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.756382] page dumped because: kasan: bad access detected [ 23.756918] [ 23.757198] Memory state around the buggy address: [ 23.757689] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.758327] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.759024] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.759595] ^ [ 23.760180] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.760801] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.761514] ================================================================== [ 24.522353] ================================================================== [ 24.523607] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 24.524056] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 24.525715] [ 24.526322] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 24.526422] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.526455] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.526505] Call Trace: [ 24.526538] <TASK> [ 24.526570] dump_stack_lvl+0x73/0xb0 [ 24.526636] print_report+0xd1/0x650 [ 24.526693] ? __virt_addr_valid+0x1db/0x2d0 [ 24.526747] ? kasan_atomics_helper+0x2006/0x5450 [ 24.526801] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.526856] ? kasan_atomics_helper+0x2006/0x5450 [ 24.527018] kasan_report+0x141/0x180 [ 24.527928] ? kasan_atomics_helper+0x2006/0x5450 [ 24.528027] kasan_check_range+0x10c/0x1c0 [ 24.528111] __kasan_check_write+0x18/0x20 [ 24.528206] kasan_atomics_helper+0x2006/0x5450 [ 24.528289] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.528385] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.528498] ? kasan_save_alloc_info+0x3b/0x50 [ 24.528604] ? kasan_atomics+0x152/0x310 [ 24.528742] kasan_atomics+0x1dc/0x310 [ 24.528837] ? __pfx_kasan_atomics+0x10/0x10 [ 24.528951] ? __pfx_read_tsc+0x10/0x10 [ 24.529053] ? ktime_get_ts64+0x86/0x230 [ 24.529277] kunit_try_run_case+0x1a5/0x480 [ 24.529368] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.529445] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.529518] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.529598] ? __kthread_parkme+0x82/0x180 [ 24.529668] ? preempt_count_sub+0x50/0x80 [ 24.529740] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.529809] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.529920] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.529996] kthread+0x337/0x6f0 [ 24.530055] ? trace_preempt_on+0x20/0xc0 [ 24.530131] ? __pfx_kthread+0x10/0x10 [ 24.530200] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.530279] ? calculate_sigpending+0x7b/0xa0 [ 24.530355] ? __pfx_kthread+0x10/0x10 [ 24.530427] ret_from_fork+0x116/0x1d0 [ 24.530487] ? __pfx_kthread+0x10/0x10 [ 24.530556] ret_from_fork_asm+0x1a/0x30 [ 24.530640] </TASK> [ 24.530675] [ 24.551684] Allocated by task 283: [ 24.552448] kasan_save_stack+0x45/0x70 [ 24.553022] kasan_save_track+0x18/0x40 [ 24.553564] kasan_save_alloc_info+0x3b/0x50 [ 24.554016] __kasan_kmalloc+0xb7/0xc0 [ 24.554700] __kmalloc_cache_noprof+0x189/0x420 [ 24.555103] kasan_atomics+0x95/0x310 [ 24.555747] kunit_try_run_case+0x1a5/0x480 [ 24.556231] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.556950] kthread+0x337/0x6f0 [ 24.557330] ret_from_fork+0x116/0x1d0 [ 24.557747] ret_from_fork_asm+0x1a/0x30 [ 24.558166] [ 24.558383] The buggy address belongs to the object at ffff8881038ee700 [ 24.558383] which belongs to the cache kmalloc-64 of size 64 [ 24.559902] The buggy address is located 0 bytes to the right of [ 24.559902] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 24.561176] [ 24.561580] The buggy address belongs to the physical page: [ 24.562226] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 24.563102] flags: 0x200000000000000(node=0|zone=2) [ 24.564063] page_type: f5(slab) [ 24.564352] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.565372] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.565923] page dumped because: kasan: bad access detected [ 24.566896] [ 24.567067] Memory state around the buggy address: [ 24.567408] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.568282] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.569090] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.569745] ^ [ 24.570398] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.571072] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.571783] ================================================================== [ 22.755081] ================================================================== [ 22.756197] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 22.757513] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 22.758051] [ 22.758397] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 22.758501] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.758541] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.758600] Call Trace: [ 22.758640] <TASK> [ 22.758683] dump_stack_lvl+0x73/0xb0 [ 22.758770] print_report+0xd1/0x650 [ 22.758852] ? __virt_addr_valid+0x1db/0x2d0 [ 22.758958] ? kasan_atomics_helper+0xb6a/0x5450 [ 22.759056] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.759162] ? kasan_atomics_helper+0xb6a/0x5450 [ 22.759242] kasan_report+0x141/0x180 [ 22.759322] ? kasan_atomics_helper+0xb6a/0x5450 [ 22.759407] kasan_check_range+0x10c/0x1c0 [ 22.759490] __kasan_check_write+0x18/0x20 [ 22.759561] kasan_atomics_helper+0xb6a/0x5450 [ 22.759642] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.759699] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.759737] ? kasan_save_alloc_info+0x3b/0x50 [ 22.759774] ? kasan_atomics+0x152/0x310 [ 22.759814] kasan_atomics+0x1dc/0x310 [ 22.759847] ? __pfx_kasan_atomics+0x10/0x10 [ 22.759909] ? __pfx_read_tsc+0x10/0x10 [ 22.759946] ? ktime_get_ts64+0x86/0x230 [ 22.759982] kunit_try_run_case+0x1a5/0x480 [ 22.760019] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.760056] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.760090] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.760167] ? __kthread_parkme+0x82/0x180 [ 22.760200] ? preempt_count_sub+0x50/0x80 [ 22.760233] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.760270] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.760306] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.760342] kthread+0x337/0x6f0 [ 22.760372] ? trace_preempt_on+0x20/0xc0 [ 22.760403] ? __pfx_kthread+0x10/0x10 [ 22.760433] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.760466] ? calculate_sigpending+0x7b/0xa0 [ 22.760500] ? __pfx_kthread+0x10/0x10 [ 22.760532] ret_from_fork+0x116/0x1d0 [ 22.760559] ? __pfx_kthread+0x10/0x10 [ 22.760589] ret_from_fork_asm+0x1a/0x30 [ 22.760631] </TASK> [ 22.760646] [ 22.776722] Allocated by task 283: [ 22.777116] kasan_save_stack+0x45/0x70 [ 22.777547] kasan_save_track+0x18/0x40 [ 22.777999] kasan_save_alloc_info+0x3b/0x50 [ 22.778479] __kasan_kmalloc+0xb7/0xc0 [ 22.778942] __kmalloc_cache_noprof+0x189/0x420 [ 22.779611] kasan_atomics+0x95/0x310 [ 22.780093] kunit_try_run_case+0x1a5/0x480 [ 22.780614] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.781145] kthread+0x337/0x6f0 [ 22.781509] ret_from_fork+0x116/0x1d0 [ 22.781956] ret_from_fork_asm+0x1a/0x30 [ 22.782531] [ 22.782729] The buggy address belongs to the object at ffff8881038ee700 [ 22.782729] which belongs to the cache kmalloc-64 of size 64 [ 22.783437] The buggy address is located 0 bytes to the right of [ 22.783437] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 22.784463] [ 22.784711] The buggy address belongs to the physical page: [ 22.785256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 22.786032] flags: 0x200000000000000(node=0|zone=2) [ 22.786470] page_type: f5(slab) [ 22.786759] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.787249] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.787778] page dumped because: kasan: bad access detected [ 22.789743] [ 22.790003] Memory state around the buggy address: [ 22.790977] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.791667] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.792363] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.792948] ^ [ 22.793523] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.794182] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.794814] ================================================================== [ 24.703346] ================================================================== [ 24.704106] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 24.704653] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 24.705380] [ 24.705648] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 24.705711] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.705730] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.705772] Call Trace: [ 24.705808] <TASK> [ 24.705842] dump_stack_lvl+0x73/0xb0 [ 24.705939] print_report+0xd1/0x650 [ 24.706020] ? __virt_addr_valid+0x1db/0x2d0 [ 24.706140] ? kasan_atomics_helper+0x218a/0x5450 [ 24.706220] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.706313] ? kasan_atomics_helper+0x218a/0x5450 [ 24.706389] kasan_report+0x141/0x180 [ 24.706518] ? kasan_atomics_helper+0x218a/0x5450 [ 24.706610] kasan_check_range+0x10c/0x1c0 [ 24.706697] __kasan_check_write+0x18/0x20 [ 24.706797] kasan_atomics_helper+0x218a/0x5450 [ 24.706921] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.707005] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.707087] ? kasan_save_alloc_info+0x3b/0x50 [ 24.707207] ? kasan_atomics+0x152/0x310 [ 24.707324] kasan_atomics+0x1dc/0x310 [ 24.707406] ? __pfx_kasan_atomics+0x10/0x10 [ 24.707542] ? __pfx_read_tsc+0x10/0x10 [ 24.707624] ? ktime_get_ts64+0x86/0x230 [ 24.707708] kunit_try_run_case+0x1a5/0x480 [ 24.707842] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.707947] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.708031] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.708117] ? __kthread_parkme+0x82/0x180 [ 24.708219] ? preempt_count_sub+0x50/0x80 [ 24.708327] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.708414] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.708523] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.708638] kthread+0x337/0x6f0 [ 24.708712] ? trace_preempt_on+0x20/0xc0 [ 24.708814] ? __pfx_kthread+0x10/0x10 [ 24.708937] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.709010] ? calculate_sigpending+0x7b/0xa0 [ 24.709052] ? __pfx_kthread+0x10/0x10 [ 24.709087] ret_from_fork+0x116/0x1d0 [ 24.709155] ? __pfx_kthread+0x10/0x10 [ 24.709192] ret_from_fork_asm+0x1a/0x30 [ 24.709236] </TASK> [ 24.709255] [ 24.727327] Allocated by task 283: [ 24.727815] kasan_save_stack+0x45/0x70 [ 24.728398] kasan_save_track+0x18/0x40 [ 24.728867] kasan_save_alloc_info+0x3b/0x50 [ 24.729239] __kasan_kmalloc+0xb7/0xc0 [ 24.729712] __kmalloc_cache_noprof+0x189/0x420 [ 24.730238] kasan_atomics+0x95/0x310 [ 24.730793] kunit_try_run_case+0x1a5/0x480 [ 24.731256] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.731732] kthread+0x337/0x6f0 [ 24.732109] ret_from_fork+0x116/0x1d0 [ 24.732577] ret_from_fork_asm+0x1a/0x30 [ 24.733134] [ 24.733376] The buggy address belongs to the object at ffff8881038ee700 [ 24.733376] which belongs to the cache kmalloc-64 of size 64 [ 24.734162] The buggy address is located 0 bytes to the right of [ 24.734162] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 24.735539] [ 24.735730] The buggy address belongs to the physical page: [ 24.736230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 24.737022] flags: 0x200000000000000(node=0|zone=2) [ 24.737551] page_type: f5(slab) [ 24.737840] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.738354] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.738840] page dumped because: kasan: bad access detected [ 24.739434] [ 24.739710] Memory state around the buggy address: [ 24.740075] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.740984] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.741850] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.742658] ^ [ 24.743190] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.743784] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.744451] ================================================================== [ 24.745264] ================================================================== [ 24.747253] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 24.747694] Read of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 24.748234] [ 24.748804] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 24.748942] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.748987] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.749045] Call Trace: [ 24.749088] <TASK> [ 24.749148] dump_stack_lvl+0x73/0xb0 [ 24.749224] print_report+0xd1/0x650 [ 24.749261] ? __virt_addr_valid+0x1db/0x2d0 [ 24.749296] ? kasan_atomics_helper+0x4fa5/0x5450 [ 24.749328] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.749402] ? kasan_atomics_helper+0x4fa5/0x5450 [ 24.749440] kasan_report+0x141/0x180 [ 24.749474] ? kasan_atomics_helper+0x4fa5/0x5450 [ 24.749512] __asan_report_load8_noabort+0x18/0x20 [ 24.749552] kasan_atomics_helper+0x4fa5/0x5450 [ 24.749584] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.749617] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.749653] ? kasan_save_alloc_info+0x3b/0x50 [ 24.749687] ? kasan_atomics+0x152/0x310 [ 24.749725] kasan_atomics+0x1dc/0x310 [ 24.749759] ? __pfx_kasan_atomics+0x10/0x10 [ 24.749795] ? __pfx_read_tsc+0x10/0x10 [ 24.749826] ? ktime_get_ts64+0x86/0x230 [ 24.749859] kunit_try_run_case+0x1a5/0x480 [ 24.749950] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.750030] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.750106] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.750187] ? __kthread_parkme+0x82/0x180 [ 24.750276] ? preempt_count_sub+0x50/0x80 [ 24.750360] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.750442] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.750524] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.750606] kthread+0x337/0x6f0 [ 24.750680] ? trace_preempt_on+0x20/0xc0 [ 24.750739] ? __pfx_kthread+0x10/0x10 [ 24.750772] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.750804] ? calculate_sigpending+0x7b/0xa0 [ 24.750839] ? __pfx_kthread+0x10/0x10 [ 24.750888] ret_from_fork+0x116/0x1d0 [ 24.750924] ? __pfx_kthread+0x10/0x10 [ 24.750957] ret_from_fork_asm+0x1a/0x30 [ 24.751001] </TASK> [ 24.751018] [ 24.772161] Allocated by task 283: [ 24.772714] kasan_save_stack+0x45/0x70 [ 24.773586] kasan_save_track+0x18/0x40 [ 24.774132] kasan_save_alloc_info+0x3b/0x50 [ 24.775078] __kasan_kmalloc+0xb7/0xc0 [ 24.775444] __kmalloc_cache_noprof+0x189/0x420 [ 24.776046] kasan_atomics+0x95/0x310 [ 24.776630] kunit_try_run_case+0x1a5/0x480 [ 24.777246] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.777941] kthread+0x337/0x6f0 [ 24.778461] ret_from_fork+0x116/0x1d0 [ 24.778838] ret_from_fork_asm+0x1a/0x30 [ 24.779530] [ 24.779770] The buggy address belongs to the object at ffff8881038ee700 [ 24.779770] which belongs to the cache kmalloc-64 of size 64 [ 24.780994] The buggy address is located 0 bytes to the right of [ 24.780994] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 24.782559] [ 24.782748] The buggy address belongs to the physical page: [ 24.783597] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 24.784508] flags: 0x200000000000000(node=0|zone=2) [ 24.785065] page_type: f5(slab) [ 24.785621] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.786391] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.786828] page dumped because: kasan: bad access detected [ 24.787754] [ 24.788064] Memory state around the buggy address: [ 24.789614] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.790676] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.792035] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.793629] ^ [ 24.793986] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.795932] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.797621] ================================================================== [ 24.801060] ================================================================== [ 24.802082] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 24.802966] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 24.803544] [ 24.803817] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 24.803960] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.803994] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.804029] Call Trace: [ 24.804051] <TASK> [ 24.804071] dump_stack_lvl+0x73/0xb0 [ 24.804581] print_report+0xd1/0x650 [ 24.804630] ? __virt_addr_valid+0x1db/0x2d0 [ 24.804669] ? kasan_atomics_helper+0x224c/0x5450 [ 24.804703] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.804737] ? kasan_atomics_helper+0x224c/0x5450 [ 24.804769] kasan_report+0x141/0x180 [ 24.804801] ? kasan_atomics_helper+0x224c/0x5450 [ 24.804838] kasan_check_range+0x10c/0x1c0 [ 24.804895] __kasan_check_write+0x18/0x20 [ 24.804942] kasan_atomics_helper+0x224c/0x5450 [ 24.804978] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.805011] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.805047] ? kasan_save_alloc_info+0x3b/0x50 [ 24.805083] ? kasan_atomics+0x152/0x310 [ 24.805162] kasan_atomics+0x1dc/0x310 [ 24.805202] ? __pfx_kasan_atomics+0x10/0x10 [ 24.805239] ? __pfx_read_tsc+0x10/0x10 [ 24.805272] ? ktime_get_ts64+0x86/0x230 [ 24.805307] kunit_try_run_case+0x1a5/0x480 [ 24.805344] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.805379] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.805414] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.805448] ? __kthread_parkme+0x82/0x180 [ 24.805478] ? preempt_count_sub+0x50/0x80 [ 24.805511] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.805547] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.805582] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.805618] kthread+0x337/0x6f0 [ 24.805648] ? trace_preempt_on+0x20/0xc0 [ 24.805682] ? __pfx_kthread+0x10/0x10 [ 24.805712] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.805744] ? calculate_sigpending+0x7b/0xa0 [ 24.805780] ? __pfx_kthread+0x10/0x10 [ 24.805812] ret_from_fork+0x116/0x1d0 [ 24.805839] ? __pfx_kthread+0x10/0x10 [ 24.805868] ret_from_fork_asm+0x1a/0x30 [ 24.805967] </TASK> [ 24.805986] [ 24.828758] Allocated by task 283: [ 24.829153] kasan_save_stack+0x45/0x70 [ 24.829580] kasan_save_track+0x18/0x40 [ 24.829946] kasan_save_alloc_info+0x3b/0x50 [ 24.830809] __kasan_kmalloc+0xb7/0xc0 [ 24.831374] __kmalloc_cache_noprof+0x189/0x420 [ 24.832061] kasan_atomics+0x95/0x310 [ 24.832462] kunit_try_run_case+0x1a5/0x480 [ 24.833123] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.833893] kthread+0x337/0x6f0 [ 24.834186] ret_from_fork+0x116/0x1d0 [ 24.835057] ret_from_fork_asm+0x1a/0x30 [ 24.835544] [ 24.835786] The buggy address belongs to the object at ffff8881038ee700 [ 24.835786] which belongs to the cache kmalloc-64 of size 64 [ 24.837054] The buggy address is located 0 bytes to the right of [ 24.837054] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 24.838331] [ 24.838704] The buggy address belongs to the physical page: [ 24.839128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 24.839892] flags: 0x200000000000000(node=0|zone=2) [ 24.840390] page_type: f5(slab) [ 24.840688] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.841478] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.841939] page dumped because: kasan: bad access detected [ 24.842290] [ 24.842470] Memory state around the buggy address: [ 24.843825] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.844567] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.845021] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.845432] ^ [ 24.845773] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.847507] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.848476] ================================================================== [ 23.453128] ================================================================== [ 23.454980] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 23.455745] Read of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 23.456780] [ 23.457035] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 23.457136] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.457169] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.457218] Call Trace: [ 23.457248] <TASK> [ 23.457279] dump_stack_lvl+0x73/0xb0 [ 23.457347] print_report+0xd1/0x650 [ 23.457402] ? __virt_addr_valid+0x1db/0x2d0 [ 23.457458] ? kasan_atomics_helper+0x49ce/0x5450 [ 23.457512] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.457568] ? kasan_atomics_helper+0x49ce/0x5450 [ 23.457620] kasan_report+0x141/0x180 [ 23.457678] ? kasan_atomics_helper+0x49ce/0x5450 [ 23.457743] __asan_report_load4_noabort+0x18/0x20 [ 23.457802] kasan_atomics_helper+0x49ce/0x5450 [ 23.457860] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.457944] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.458762] ? kasan_save_alloc_info+0x3b/0x50 [ 23.458836] ? kasan_atomics+0x152/0x310 [ 23.458932] kasan_atomics+0x1dc/0x310 [ 23.459495] ? __pfx_kasan_atomics+0x10/0x10 [ 23.459592] ? __pfx_read_tsc+0x10/0x10 [ 23.459655] ? ktime_get_ts64+0x86/0x230 [ 23.459716] kunit_try_run_case+0x1a5/0x480 [ 23.459778] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.459836] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.459922] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.460010] ? __kthread_parkme+0x82/0x180 [ 23.460090] ? preempt_count_sub+0x50/0x80 [ 23.460568] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.460731] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.460810] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.460917] kthread+0x337/0x6f0 [ 23.460993] ? trace_preempt_on+0x20/0xc0 [ 23.461070] ? __pfx_kthread+0x10/0x10 [ 23.461146] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.461220] ? calculate_sigpending+0x7b/0xa0 [ 23.461298] ? __pfx_kthread+0x10/0x10 [ 23.461372] ret_from_fork+0x116/0x1d0 [ 23.461439] ? __pfx_kthread+0x10/0x10 [ 23.461508] ret_from_fork_asm+0x1a/0x30 [ 23.461598] </TASK> [ 23.461633] [ 23.479466] Allocated by task 283: [ 23.479849] kasan_save_stack+0x45/0x70 [ 23.480598] kasan_save_track+0x18/0x40 [ 23.480934] kasan_save_alloc_info+0x3b/0x50 [ 23.481773] __kasan_kmalloc+0xb7/0xc0 [ 23.482547] __kmalloc_cache_noprof+0x189/0x420 [ 23.483414] kasan_atomics+0x95/0x310 [ 23.483751] kunit_try_run_case+0x1a5/0x480 [ 23.484081] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.484661] kthread+0x337/0x6f0 [ 23.485061] ret_from_fork+0x116/0x1d0 [ 23.485525] ret_from_fork_asm+0x1a/0x30 [ 23.485933] [ 23.486217] The buggy address belongs to the object at ffff8881038ee700 [ 23.486217] which belongs to the cache kmalloc-64 of size 64 [ 23.487168] The buggy address is located 0 bytes to the right of [ 23.487168] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 23.488172] [ 23.488392] The buggy address belongs to the physical page: [ 23.488947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 23.489560] flags: 0x200000000000000(node=0|zone=2) [ 23.490057] page_type: f5(slab) [ 23.490473] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.491071] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.491774] page dumped because: kasan: bad access detected [ 23.492341] [ 23.492529] Memory state around the buggy address: [ 23.492991] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.493603] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.494301] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.494870] ^ [ 23.495402] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.495946] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.496597] ================================================================== [ 22.153760] ================================================================== [ 22.154417] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 22.155009] Read of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 22.155765] [ 22.156052] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 22.156236] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.156271] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.156333] Call Trace: [ 22.156386] <TASK> [ 22.156434] dump_stack_lvl+0x73/0xb0 [ 22.156551] print_report+0xd1/0x650 [ 22.156676] ? __virt_addr_valid+0x1db/0x2d0 [ 22.156780] ? kasan_atomics_helper+0x4b54/0x5450 [ 22.156900] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.156984] ? kasan_atomics_helper+0x4b54/0x5450 [ 22.157060] kasan_report+0x141/0x180 [ 22.157186] ? kasan_atomics_helper+0x4b54/0x5450 [ 22.157278] __asan_report_load4_noabort+0x18/0x20 [ 22.157449] kasan_atomics_helper+0x4b54/0x5450 [ 22.157550] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.157618] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.157688] ? kasan_save_alloc_info+0x3b/0x50 [ 22.157764] ? kasan_atomics+0x152/0x310 [ 22.157855] kasan_atomics+0x1dc/0x310 [ 22.157988] ? __pfx_kasan_atomics+0x10/0x10 [ 22.158146] ? __pfx_read_tsc+0x10/0x10 [ 22.158224] ? ktime_get_ts64+0x86/0x230 [ 22.158322] kunit_try_run_case+0x1a5/0x480 [ 22.158431] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.158543] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.158613] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.158653] ? __kthread_parkme+0x82/0x180 [ 22.158688] ? preempt_count_sub+0x50/0x80 [ 22.158731] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.158803] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.158843] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.158907] kthread+0x337/0x6f0 [ 22.158940] ? trace_preempt_on+0x20/0xc0 [ 22.158976] ? __pfx_kthread+0x10/0x10 [ 22.159007] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.159039] ? calculate_sigpending+0x7b/0xa0 [ 22.159075] ? __pfx_kthread+0x10/0x10 [ 22.159157] ret_from_fork+0x116/0x1d0 [ 22.159191] ? __pfx_kthread+0x10/0x10 [ 22.159223] ret_from_fork_asm+0x1a/0x30 [ 22.159267] </TASK> [ 22.159285] [ 22.178747] Allocated by task 283: [ 22.179685] kasan_save_stack+0x45/0x70 [ 22.180035] kasan_save_track+0x18/0x40 [ 22.180489] kasan_save_alloc_info+0x3b/0x50 [ 22.180894] __kasan_kmalloc+0xb7/0xc0 [ 22.181309] __kmalloc_cache_noprof+0x189/0x420 [ 22.181716] kasan_atomics+0x95/0x310 [ 22.182621] kunit_try_run_case+0x1a5/0x480 [ 22.183291] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.183766] kthread+0x337/0x6f0 [ 22.184172] ret_from_fork+0x116/0x1d0 [ 22.184549] ret_from_fork_asm+0x1a/0x30 [ 22.184967] [ 22.185260] The buggy address belongs to the object at ffff8881038ee700 [ 22.185260] which belongs to the cache kmalloc-64 of size 64 [ 22.186169] The buggy address is located 0 bytes to the right of [ 22.186169] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 22.187147] [ 22.187402] The buggy address belongs to the physical page: [ 22.187789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 22.188488] flags: 0x200000000000000(node=0|zone=2) [ 22.189002] page_type: f5(slab) [ 22.189424] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.189944] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.190617] page dumped because: kasan: bad access detected [ 22.191174] [ 22.191411] Memory state around the buggy address: [ 22.191787] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.192421] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.193055] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.193685] ^ [ 22.194056] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.194720] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.195357] ================================================================== [ 22.014917] ================================================================== [ 22.015551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 22.016386] Read of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 22.017097] [ 22.017666] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 22.017791] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.017832] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.017869] Call Trace: [ 22.017920] <TASK> [ 22.017963] dump_stack_lvl+0x73/0xb0 [ 22.018009] print_report+0xd1/0x650 [ 22.018042] ? __virt_addr_valid+0x1db/0x2d0 [ 22.018076] ? kasan_atomics_helper+0x4b88/0x5450 [ 22.018125] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.018306] ? kasan_atomics_helper+0x4b88/0x5450 [ 22.018346] kasan_report+0x141/0x180 [ 22.018408] ? kasan_atomics_helper+0x4b88/0x5450 [ 22.018450] __asan_report_load4_noabort+0x18/0x20 [ 22.018488] kasan_atomics_helper+0x4b88/0x5450 [ 22.018522] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.018555] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.018591] ? kasan_save_alloc_info+0x3b/0x50 [ 22.018626] ? kasan_atomics+0x152/0x310 [ 22.018663] kasan_atomics+0x1dc/0x310 [ 22.018697] ? __pfx_kasan_atomics+0x10/0x10 [ 22.018733] ? __pfx_read_tsc+0x10/0x10 [ 22.018766] ? ktime_get_ts64+0x86/0x230 [ 22.018801] kunit_try_run_case+0x1a5/0x480 [ 22.018838] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.018892] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.018937] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.018974] ? __kthread_parkme+0x82/0x180 [ 22.019005] ? preempt_count_sub+0x50/0x80 [ 22.019038] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.019075] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.019169] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.019261] kthread+0x337/0x6f0 [ 22.019333] ? trace_preempt_on+0x20/0xc0 [ 22.019411] ? __pfx_kthread+0x10/0x10 [ 22.019448] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.019482] ? calculate_sigpending+0x7b/0xa0 [ 22.019519] ? __pfx_kthread+0x10/0x10 [ 22.019551] ret_from_fork+0x116/0x1d0 [ 22.019579] ? __pfx_kthread+0x10/0x10 [ 22.019610] ret_from_fork_asm+0x1a/0x30 [ 22.019651] </TASK> [ 22.019667] [ 22.039779] Allocated by task 283: [ 22.040023] kasan_save_stack+0x45/0x70 [ 22.040353] kasan_save_track+0x18/0x40 [ 22.041456] kasan_save_alloc_info+0x3b/0x50 [ 22.041918] __kasan_kmalloc+0xb7/0xc0 [ 22.042321] __kmalloc_cache_noprof+0x189/0x420 [ 22.042772] kasan_atomics+0x95/0x310 [ 22.043158] kunit_try_run_case+0x1a5/0x480 [ 22.043551] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.044598] kthread+0x337/0x6f0 [ 22.044870] ret_from_fork+0x116/0x1d0 [ 22.045581] ret_from_fork_asm+0x1a/0x30 [ 22.046159] [ 22.046555] The buggy address belongs to the object at ffff8881038ee700 [ 22.046555] which belongs to the cache kmalloc-64 of size 64 [ 22.047798] The buggy address is located 0 bytes to the right of [ 22.047798] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 22.049167] [ 22.049356] The buggy address belongs to the physical page: [ 22.049848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 22.050758] flags: 0x200000000000000(node=0|zone=2) [ 22.051336] page_type: f5(slab) [ 22.051830] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.052647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.053328] page dumped because: kasan: bad access detected [ 22.053825] [ 22.054061] Memory state around the buggy address: [ 22.054493] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.055365] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.055799] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.056661] ^ [ 22.057288] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.057980] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.058828] ================================================================== [ 24.345011] ================================================================== [ 24.345762] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 24.346514] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 24.347397] [ 24.347615] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 24.347729] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.347773] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.347831] Call Trace: [ 24.347943] <TASK> [ 24.348019] dump_stack_lvl+0x73/0xb0 [ 24.348205] print_report+0xd1/0x650 [ 24.348288] ? __virt_addr_valid+0x1db/0x2d0 [ 24.348370] ? kasan_atomics_helper+0x1e12/0x5450 [ 24.348450] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.348615] ? kasan_atomics_helper+0x1e12/0x5450 [ 24.348700] kasan_report+0x141/0x180 [ 24.348777] ? kasan_atomics_helper+0x1e12/0x5450 [ 24.348864] kasan_check_range+0x10c/0x1c0 [ 24.348933] __kasan_check_write+0x18/0x20 [ 24.348967] kasan_atomics_helper+0x1e12/0x5450 [ 24.349005] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.349039] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.349075] ? kasan_save_alloc_info+0x3b/0x50 [ 24.349154] ? kasan_atomics+0x152/0x310 [ 24.349197] kasan_atomics+0x1dc/0x310 [ 24.349233] ? __pfx_kasan_atomics+0x10/0x10 [ 24.349268] ? __pfx_read_tsc+0x10/0x10 [ 24.349299] ? ktime_get_ts64+0x86/0x230 [ 24.349334] kunit_try_run_case+0x1a5/0x480 [ 24.349370] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.349405] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.349438] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.349473] ? __kthread_parkme+0x82/0x180 [ 24.349501] ? preempt_count_sub+0x50/0x80 [ 24.349535] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.349572] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.349607] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.349644] kthread+0x337/0x6f0 [ 24.349672] ? trace_preempt_on+0x20/0xc0 [ 24.349705] ? __pfx_kthread+0x10/0x10 [ 24.349736] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.349768] ? calculate_sigpending+0x7b/0xa0 [ 24.349802] ? __pfx_kthread+0x10/0x10 [ 24.349835] ret_from_fork+0x116/0x1d0 [ 24.349862] ? __pfx_kthread+0x10/0x10 [ 24.349920] ret_from_fork_asm+0x1a/0x30 [ 24.349965] </TASK> [ 24.349981] [ 24.366856] Allocated by task 283: [ 24.367318] kasan_save_stack+0x45/0x70 [ 24.367752] kasan_save_track+0x18/0x40 [ 24.368226] kasan_save_alloc_info+0x3b/0x50 [ 24.368680] __kasan_kmalloc+0xb7/0xc0 [ 24.369180] __kmalloc_cache_noprof+0x189/0x420 [ 24.369652] kasan_atomics+0x95/0x310 [ 24.370199] kunit_try_run_case+0x1a5/0x480 [ 24.370570] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.371207] kthread+0x337/0x6f0 [ 24.371576] ret_from_fork+0x116/0x1d0 [ 24.371916] ret_from_fork_asm+0x1a/0x30 [ 24.372305] [ 24.372518] The buggy address belongs to the object at ffff8881038ee700 [ 24.372518] which belongs to the cache kmalloc-64 of size 64 [ 24.373679] The buggy address is located 0 bytes to the right of [ 24.373679] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 24.374824] [ 24.375032] The buggy address belongs to the physical page: [ 24.375442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 24.376261] flags: 0x200000000000000(node=0|zone=2) [ 24.376737] page_type: f5(slab) [ 24.377222] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.377958] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.378595] page dumped because: kasan: bad access detected [ 24.379201] [ 24.379440] Memory state around the buggy address: [ 24.379947] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.380622] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.381268] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.381846] ^ [ 24.382424] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.382905] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.383551] ================================================================== [ 22.469272] ================================================================== [ 22.470008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 22.470692] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 22.471412] [ 22.471686] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 22.471844] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.471908] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.471971] Call Trace: [ 22.472016] <TASK> [ 22.472062] dump_stack_lvl+0x73/0xb0 [ 22.472223] print_report+0xd1/0x650 [ 22.472309] ? __virt_addr_valid+0x1db/0x2d0 [ 22.472376] ? kasan_atomics_helper+0x7c7/0x5450 [ 22.472412] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.472447] ? kasan_atomics_helper+0x7c7/0x5450 [ 22.472480] kasan_report+0x141/0x180 [ 22.472546] ? kasan_atomics_helper+0x7c7/0x5450 [ 22.472613] kasan_check_range+0x10c/0x1c0 [ 22.472689] __kasan_check_write+0x18/0x20 [ 22.472798] kasan_atomics_helper+0x7c7/0x5450 [ 22.472899] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.472977] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.473062] ? kasan_save_alloc_info+0x3b/0x50 [ 22.473217] ? kasan_atomics+0x152/0x310 [ 22.473306] kasan_atomics+0x1dc/0x310 [ 22.473390] ? __pfx_kasan_atomics+0x10/0x10 [ 22.473515] ? __pfx_read_tsc+0x10/0x10 [ 22.473594] ? ktime_get_ts64+0x86/0x230 [ 22.473679] kunit_try_run_case+0x1a5/0x480 [ 22.473797] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.473894] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.473976] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.474060] ? __kthread_parkme+0x82/0x180 [ 22.474214] ? preempt_count_sub+0x50/0x80 [ 22.474312] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.474401] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.474521] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.474609] kthread+0x337/0x6f0 [ 22.474684] ? trace_preempt_on+0x20/0xc0 [ 22.474744] ? __pfx_kthread+0x10/0x10 [ 22.474780] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.474817] ? calculate_sigpending+0x7b/0xa0 [ 22.474853] ? __pfx_kthread+0x10/0x10 [ 22.474912] ret_from_fork+0x116/0x1d0 [ 22.474945] ? __pfx_kthread+0x10/0x10 [ 22.474976] ret_from_fork_asm+0x1a/0x30 [ 22.475019] </TASK> [ 22.475034] [ 22.492380] Allocated by task 283: [ 22.492844] kasan_save_stack+0x45/0x70 [ 22.493316] kasan_save_track+0x18/0x40 [ 22.493894] kasan_save_alloc_info+0x3b/0x50 [ 22.494384] __kasan_kmalloc+0xb7/0xc0 [ 22.494705] __kmalloc_cache_noprof+0x189/0x420 [ 22.496787] kasan_atomics+0x95/0x310 [ 22.497158] kunit_try_run_case+0x1a5/0x480 [ 22.497736] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.498740] kthread+0x337/0x6f0 [ 22.499060] ret_from_fork+0x116/0x1d0 [ 22.499493] ret_from_fork_asm+0x1a/0x30 [ 22.499894] [ 22.500502] The buggy address belongs to the object at ffff8881038ee700 [ 22.500502] which belongs to the cache kmalloc-64 of size 64 [ 22.501323] The buggy address is located 0 bytes to the right of [ 22.501323] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 22.503018] [ 22.503305] The buggy address belongs to the physical page: [ 22.503772] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 22.504728] flags: 0x200000000000000(node=0|zone=2) [ 22.505170] page_type: f5(slab) [ 22.505861] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.506733] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.507579] page dumped because: kasan: bad access detected [ 22.508340] [ 22.508609] Memory state around the buggy address: [ 22.508957] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.510222] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.510717] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.511587] ^ [ 22.512213] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.512813] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.513588] ================================================================== [ 21.964756] ================================================================== [ 21.966425] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 21.967245] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 21.967893] [ 21.968165] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 21.968291] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.968333] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.968392] Call Trace: [ 21.968445] <TASK> [ 21.968492] dump_stack_lvl+0x73/0xb0 [ 21.968576] print_report+0xd1/0x650 [ 21.968649] ? __virt_addr_valid+0x1db/0x2d0 [ 21.968726] ? kasan_atomics_helper+0x4ba2/0x5450 [ 21.968794] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.968868] ? kasan_atomics_helper+0x4ba2/0x5450 [ 21.968963] kasan_report+0x141/0x180 [ 21.969036] ? kasan_atomics_helper+0x4ba2/0x5450 [ 21.969084] __asan_report_store4_noabort+0x1b/0x30 [ 21.969157] kasan_atomics_helper+0x4ba2/0x5450 [ 21.969198] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.969231] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.969267] ? kasan_save_alloc_info+0x3b/0x50 [ 21.969301] ? kasan_atomics+0x152/0x310 [ 21.969338] kasan_atomics+0x1dc/0x310 [ 21.969370] ? __pfx_kasan_atomics+0x10/0x10 [ 21.969405] ? __pfx_read_tsc+0x10/0x10 [ 21.969435] ? ktime_get_ts64+0x86/0x230 [ 21.969470] kunit_try_run_case+0x1a5/0x480 [ 21.969507] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.969541] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.969575] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.969608] ? __kthread_parkme+0x82/0x180 [ 21.969637] ? preempt_count_sub+0x50/0x80 [ 21.969669] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.969704] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.969738] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.969773] kthread+0x337/0x6f0 [ 21.969800] ? trace_preempt_on+0x20/0xc0 [ 21.969832] ? __pfx_kthread+0x10/0x10 [ 21.969860] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.969919] ? calculate_sigpending+0x7b/0xa0 [ 21.969957] ? __pfx_kthread+0x10/0x10 [ 21.969986] ret_from_fork+0x116/0x1d0 [ 21.970012] ? __pfx_kthread+0x10/0x10 [ 21.970041] ret_from_fork_asm+0x1a/0x30 [ 21.970082] </TASK> [ 21.970099] [ 21.991222] Allocated by task 283: [ 21.991692] kasan_save_stack+0x45/0x70 [ 21.992966] kasan_save_track+0x18/0x40 [ 21.993423] kasan_save_alloc_info+0x3b/0x50 [ 21.994137] __kasan_kmalloc+0xb7/0xc0 [ 21.994745] __kmalloc_cache_noprof+0x189/0x420 [ 21.995326] kasan_atomics+0x95/0x310 [ 21.995891] kunit_try_run_case+0x1a5/0x480 [ 21.996474] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.996915] kthread+0x337/0x6f0 [ 21.997929] ret_from_fork+0x116/0x1d0 [ 21.998318] ret_from_fork_asm+0x1a/0x30 [ 21.998765] [ 21.999283] The buggy address belongs to the object at ffff8881038ee700 [ 21.999283] which belongs to the cache kmalloc-64 of size 64 [ 22.000119] The buggy address is located 0 bytes to the right of [ 22.000119] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 22.001654] [ 22.001841] The buggy address belongs to the physical page: [ 22.002812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 22.003664] flags: 0x200000000000000(node=0|zone=2) [ 22.004069] page_type: f5(slab) [ 22.004671] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.005497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.006046] page dumped because: kasan: bad access detected [ 22.006753] [ 22.006996] Memory state around the buggy address: [ 22.007475] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.008534] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.009258] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.009760] ^ [ 22.010215] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.010722] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.011835] ================================================================== [ 22.105961] ================================================================== [ 22.106960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 22.107586] Read of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 22.108539] [ 22.108732] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 22.108794] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.108815] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.108845] Call Trace: [ 22.108862] <TASK> [ 22.108909] dump_stack_lvl+0x73/0xb0 [ 22.108996] print_report+0xd1/0x650 [ 22.109074] ? __virt_addr_valid+0x1db/0x2d0 [ 22.109154] ? kasan_atomics_helper+0x3df/0x5450 [ 22.109228] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.109558] ? kasan_atomics_helper+0x3df/0x5450 [ 22.109644] kasan_report+0x141/0x180 [ 22.109789] ? kasan_atomics_helper+0x3df/0x5450 [ 22.109899] kasan_check_range+0x10c/0x1c0 [ 22.109946] __kasan_check_read+0x15/0x20 [ 22.109978] kasan_atomics_helper+0x3df/0x5450 [ 22.110014] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.110048] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.110086] ? kasan_save_alloc_info+0x3b/0x50 [ 22.110151] ? kasan_atomics+0x152/0x310 [ 22.110192] kasan_atomics+0x1dc/0x310 [ 22.110227] ? __pfx_kasan_atomics+0x10/0x10 [ 22.110274] ? __pfx_read_tsc+0x10/0x10 [ 22.110309] ? ktime_get_ts64+0x86/0x230 [ 22.110344] kunit_try_run_case+0x1a5/0x480 [ 22.110382] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.110417] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.110451] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.110486] ? __kthread_parkme+0x82/0x180 [ 22.110515] ? preempt_count_sub+0x50/0x80 [ 22.110549] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.110585] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.110620] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.110655] kthread+0x337/0x6f0 [ 22.110684] ? trace_preempt_on+0x20/0xc0 [ 22.110716] ? __pfx_kthread+0x10/0x10 [ 22.110747] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.110779] ? calculate_sigpending+0x7b/0xa0 [ 22.110813] ? __pfx_kthread+0x10/0x10 [ 22.110844] ret_from_fork+0x116/0x1d0 [ 22.110869] ? __pfx_kthread+0x10/0x10 [ 22.110929] ret_from_fork_asm+0x1a/0x30 [ 22.110973] </TASK> [ 22.110990] [ 22.129335] Allocated by task 283: [ 22.132970] kasan_save_stack+0x45/0x70 [ 22.133841] kasan_save_track+0x18/0x40 [ 22.135255] kasan_save_alloc_info+0x3b/0x50 [ 22.136950] __kasan_kmalloc+0xb7/0xc0 [ 22.137408] __kmalloc_cache_noprof+0x189/0x420 [ 22.137898] kasan_atomics+0x95/0x310 [ 22.138330] kunit_try_run_case+0x1a5/0x480 [ 22.138795] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.139507] kthread+0x337/0x6f0 [ 22.139989] ret_from_fork+0x116/0x1d0 [ 22.140451] ret_from_fork_asm+0x1a/0x30 [ 22.140960] [ 22.141249] The buggy address belongs to the object at ffff8881038ee700 [ 22.141249] which belongs to the cache kmalloc-64 of size 64 [ 22.142330] The buggy address is located 0 bytes to the right of [ 22.142330] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 22.143387] [ 22.143629] The buggy address belongs to the physical page: [ 22.144255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 22.144933] flags: 0x200000000000000(node=0|zone=2) [ 22.145498] page_type: f5(slab) [ 22.145936] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.146562] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.147342] page dumped because: kasan: bad access detected [ 22.147731] [ 22.148016] Memory state around the buggy address: [ 22.148545] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.149270] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.149920] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.150558] ^ [ 22.151020] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.151697] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.152381] ================================================================== [ 24.300312] ================================================================== [ 24.301246] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 24.301926] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 24.302628] [ 24.302919] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 24.303036] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.303076] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.303178] Call Trace: [ 24.303222] <TASK> [ 24.303261] dump_stack_lvl+0x73/0xb0 [ 24.303347] print_report+0xd1/0x650 [ 24.303424] ? __virt_addr_valid+0x1db/0x2d0 [ 24.303498] ? kasan_atomics_helper+0x1d7a/0x5450 [ 24.303573] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.303648] ? kasan_atomics_helper+0x1d7a/0x5450 [ 24.303722] kasan_report+0x141/0x180 [ 24.303804] ? kasan_atomics_helper+0x1d7a/0x5450 [ 24.303911] kasan_check_range+0x10c/0x1c0 [ 24.304000] __kasan_check_write+0x18/0x20 [ 24.304079] kasan_atomics_helper+0x1d7a/0x5450 [ 24.304208] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.304290] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.304373] ? kasan_save_alloc_info+0x3b/0x50 [ 24.304454] ? kasan_atomics+0x152/0x310 [ 24.304545] kasan_atomics+0x1dc/0x310 [ 24.304629] ? __pfx_kasan_atomics+0x10/0x10 [ 24.304701] ? __pfx_read_tsc+0x10/0x10 [ 24.304759] ? ktime_get_ts64+0x86/0x230 [ 24.304841] kunit_try_run_case+0x1a5/0x480 [ 24.304948] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.305033] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.305157] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.305245] ? __kthread_parkme+0x82/0x180 [ 24.305323] ? preempt_count_sub+0x50/0x80 [ 24.305409] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.305494] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.305578] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.305664] kthread+0x337/0x6f0 [ 24.305736] ? trace_preempt_on+0x20/0xc0 [ 24.305814] ? __pfx_kthread+0x10/0x10 [ 24.305905] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.305984] ? calculate_sigpending+0x7b/0xa0 [ 24.306062] ? __pfx_kthread+0x10/0x10 [ 24.306183] ret_from_fork+0x116/0x1d0 [ 24.306260] ? __pfx_kthread+0x10/0x10 [ 24.306334] ret_from_fork_asm+0x1a/0x30 [ 24.306428] </TASK> [ 24.306469] [ 24.326691] Allocated by task 283: [ 24.326997] kasan_save_stack+0x45/0x70 [ 24.328057] kasan_save_track+0x18/0x40 [ 24.328439] kasan_save_alloc_info+0x3b/0x50 [ 24.328661] __kasan_kmalloc+0xb7/0xc0 [ 24.328826] __kmalloc_cache_noprof+0x189/0x420 [ 24.329038] kasan_atomics+0x95/0x310 [ 24.330349] kunit_try_run_case+0x1a5/0x480 [ 24.330810] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.331322] kthread+0x337/0x6f0 [ 24.331683] ret_from_fork+0x116/0x1d0 [ 24.332040] ret_from_fork_asm+0x1a/0x30 [ 24.332404] [ 24.332644] The buggy address belongs to the object at ffff8881038ee700 [ 24.332644] which belongs to the cache kmalloc-64 of size 64 [ 24.333564] The buggy address is located 0 bytes to the right of [ 24.333564] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 24.334549] [ 24.334860] The buggy address belongs to the physical page: [ 24.335445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 24.336313] flags: 0x200000000000000(node=0|zone=2) [ 24.336700] page_type: f5(slab) [ 24.337214] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.337987] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.338721] page dumped because: kasan: bad access detected [ 24.339151] [ 24.339386] Memory state around the buggy address: [ 24.339951] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.340698] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.341372] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.342031] ^ [ 24.342599] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.343329] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.343971] ================================================================== [ 24.033244] ================================================================== [ 24.034011] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 24.034960] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 24.035462] [ 24.035694] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 24.035800] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.035897] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.035966] Call Trace: [ 24.036018] <TASK> [ 24.036108] dump_stack_lvl+0x73/0xb0 [ 24.036201] print_report+0xd1/0x650 [ 24.036281] ? __virt_addr_valid+0x1db/0x2d0 [ 24.036358] ? kasan_atomics_helper+0x19e3/0x5450 [ 24.036433] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.036511] ? kasan_atomics_helper+0x19e3/0x5450 [ 24.036588] kasan_report+0x141/0x180 [ 24.036664] ? kasan_atomics_helper+0x19e3/0x5450 [ 24.036754] kasan_check_range+0x10c/0x1c0 [ 24.036834] __kasan_check_write+0x18/0x20 [ 24.036967] kasan_atomics_helper+0x19e3/0x5450 [ 24.037058] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.037150] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.037235] ? kasan_save_alloc_info+0x3b/0x50 [ 24.037320] ? kasan_atomics+0x152/0x310 [ 24.037407] kasan_atomics+0x1dc/0x310 [ 24.037529] ? __pfx_kasan_atomics+0x10/0x10 [ 24.037618] ? __pfx_read_tsc+0x10/0x10 [ 24.037690] ? ktime_get_ts64+0x86/0x230 [ 24.037772] kunit_try_run_case+0x1a5/0x480 [ 24.037823] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.037861] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.037926] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.037962] ? __kthread_parkme+0x82/0x180 [ 24.037995] ? preempt_count_sub+0x50/0x80 [ 24.038031] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.038070] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.038124] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.038177] kthread+0x337/0x6f0 [ 24.038208] ? trace_preempt_on+0x20/0xc0 [ 24.038243] ? __pfx_kthread+0x10/0x10 [ 24.038284] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.038318] ? calculate_sigpending+0x7b/0xa0 [ 24.038354] ? __pfx_kthread+0x10/0x10 [ 24.038385] ret_from_fork+0x116/0x1d0 [ 24.038414] ? __pfx_kthread+0x10/0x10 [ 24.038445] ret_from_fork_asm+0x1a/0x30 [ 24.038489] </TASK> [ 24.038505] [ 24.057444] Allocated by task 283: [ 24.057829] kasan_save_stack+0x45/0x70 [ 24.058269] kasan_save_track+0x18/0x40 [ 24.058740] kasan_save_alloc_info+0x3b/0x50 [ 24.059225] __kasan_kmalloc+0xb7/0xc0 [ 24.059657] __kmalloc_cache_noprof+0x189/0x420 [ 24.060049] kasan_atomics+0x95/0x310 [ 24.060455] kunit_try_run_case+0x1a5/0x480 [ 24.060971] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.061510] kthread+0x337/0x6f0 [ 24.061809] ret_from_fork+0x116/0x1d0 [ 24.062327] ret_from_fork_asm+0x1a/0x30 [ 24.062817] [ 24.063106] The buggy address belongs to the object at ffff8881038ee700 [ 24.063106] which belongs to the cache kmalloc-64 of size 64 [ 24.064048] The buggy address is located 0 bytes to the right of [ 24.064048] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 24.066980] [ 24.067278] The buggy address belongs to the physical page: [ 24.067700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 24.068227] flags: 0x200000000000000(node=0|zone=2) [ 24.068717] page_type: f5(slab) [ 24.069151] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.070065] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.070738] page dumped because: kasan: bad access detected [ 24.071144] [ 24.071384] Memory state around the buggy address: [ 24.071901] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.072539] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.073032] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.073956] ^ [ 24.074754] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.075418] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.075948] ================================================================== [ 24.122241] ================================================================== [ 24.123393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 24.123930] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 24.124554] [ 24.125027] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 24.125154] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.125195] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.125259] Call Trace: [ 24.125302] <TASK> [ 24.125345] dump_stack_lvl+0x73/0xb0 [ 24.125437] print_report+0xd1/0x650 [ 24.125508] ? __virt_addr_valid+0x1db/0x2d0 [ 24.125592] ? kasan_atomics_helper+0x1b22/0x5450 [ 24.125739] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.126078] ? kasan_atomics_helper+0x1b22/0x5450 [ 24.126186] kasan_report+0x141/0x180 [ 24.126280] ? kasan_atomics_helper+0x1b22/0x5450 [ 24.126371] kasan_check_range+0x10c/0x1c0 [ 24.126455] __kasan_check_write+0x18/0x20 [ 24.126528] kasan_atomics_helper+0x1b22/0x5450 [ 24.126608] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.126688] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.126770] ? kasan_save_alloc_info+0x3b/0x50 [ 24.127062] ? kasan_atomics+0x152/0x310 [ 24.127178] kasan_atomics+0x1dc/0x310 [ 24.127260] ? __pfx_kasan_atomics+0x10/0x10 [ 24.127311] ? __pfx_read_tsc+0x10/0x10 [ 24.127348] ? ktime_get_ts64+0x86/0x230 [ 24.127384] kunit_try_run_case+0x1a5/0x480 [ 24.127425] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.127462] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.127499] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.127536] ? __kthread_parkme+0x82/0x180 [ 24.127566] ? preempt_count_sub+0x50/0x80 [ 24.127599] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.127636] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.127673] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.127711] kthread+0x337/0x6f0 [ 24.127739] ? trace_preempt_on+0x20/0xc0 [ 24.127774] ? __pfx_kthread+0x10/0x10 [ 24.127804] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.127837] ? calculate_sigpending+0x7b/0xa0 [ 24.127871] ? __pfx_kthread+0x10/0x10 [ 24.127934] ret_from_fork+0x116/0x1d0 [ 24.127964] ? __pfx_kthread+0x10/0x10 [ 24.127996] ret_from_fork_asm+0x1a/0x30 [ 24.128039] </TASK> [ 24.128055] [ 24.146460] Allocated by task 283: [ 24.147049] kasan_save_stack+0x45/0x70 [ 24.147533] kasan_save_track+0x18/0x40 [ 24.147916] kasan_save_alloc_info+0x3b/0x50 [ 24.148546] __kasan_kmalloc+0xb7/0xc0 [ 24.149084] __kmalloc_cache_noprof+0x189/0x420 [ 24.149610] kasan_atomics+0x95/0x310 [ 24.150300] kunit_try_run_case+0x1a5/0x480 [ 24.150749] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.151511] kthread+0x337/0x6f0 [ 24.152151] ret_from_fork+0x116/0x1d0 [ 24.152511] ret_from_fork_asm+0x1a/0x30 [ 24.153082] [ 24.153372] The buggy address belongs to the object at ffff8881038ee700 [ 24.153372] which belongs to the cache kmalloc-64 of size 64 [ 24.154474] The buggy address is located 0 bytes to the right of [ 24.154474] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 24.155503] [ 24.155931] The buggy address belongs to the physical page: [ 24.156514] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 24.157388] flags: 0x200000000000000(node=0|zone=2) [ 24.158032] page_type: f5(slab) [ 24.158634] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.159426] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.160177] page dumped because: kasan: bad access detected [ 24.161034] [ 24.161277] Memory state around the buggy address: [ 24.161628] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.162426] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.163258] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.163999] ^ [ 24.164811] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.165525] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.166325] ================================================================== [ 22.422566] ================================================================== [ 22.423796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 22.424331] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 22.424951] [ 22.426189] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 22.426270] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.426292] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.426325] Call Trace: [ 22.426350] <TASK> [ 22.426372] dump_stack_lvl+0x73/0xb0 [ 22.426417] print_report+0xd1/0x650 [ 22.426450] ? __virt_addr_valid+0x1db/0x2d0 [ 22.426485] ? kasan_atomics_helper+0x72f/0x5450 [ 22.426518] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.426550] ? kasan_atomics_helper+0x72f/0x5450 [ 22.426583] kasan_report+0x141/0x180 [ 22.426614] ? kasan_atomics_helper+0x72f/0x5450 [ 22.426652] kasan_check_range+0x10c/0x1c0 [ 22.426687] __kasan_check_write+0x18/0x20 [ 22.426715] kasan_atomics_helper+0x72f/0x5450 [ 22.426749] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.426781] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.426817] ? kasan_save_alloc_info+0x3b/0x50 [ 22.426851] ? kasan_atomics+0x152/0x310 [ 22.426915] kasan_atomics+0x1dc/0x310 [ 22.426954] ? __pfx_kasan_atomics+0x10/0x10 [ 22.426990] ? __pfx_read_tsc+0x10/0x10 [ 22.427022] ? ktime_get_ts64+0x86/0x230 [ 22.427057] kunit_try_run_case+0x1a5/0x480 [ 22.427095] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.427174] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.427211] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.427249] ? __kthread_parkme+0x82/0x180 [ 22.427279] ? preempt_count_sub+0x50/0x80 [ 22.427312] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.427348] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.427383] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.427419] kthread+0x337/0x6f0 [ 22.427446] ? trace_preempt_on+0x20/0xc0 [ 22.427479] ? __pfx_kthread+0x10/0x10 [ 22.427509] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.427541] ? calculate_sigpending+0x7b/0xa0 [ 22.427577] ? __pfx_kthread+0x10/0x10 [ 22.427608] ret_from_fork+0x116/0x1d0 [ 22.427637] ? __pfx_kthread+0x10/0x10 [ 22.427667] ret_from_fork_asm+0x1a/0x30 [ 22.427710] </TASK> [ 22.427725] [ 22.448664] Allocated by task 283: [ 22.448988] kasan_save_stack+0x45/0x70 [ 22.449721] kasan_save_track+0x18/0x40 [ 22.450163] kasan_save_alloc_info+0x3b/0x50 [ 22.450852] __kasan_kmalloc+0xb7/0xc0 [ 22.451477] __kmalloc_cache_noprof+0x189/0x420 [ 22.451971] kasan_atomics+0x95/0x310 [ 22.452630] kunit_try_run_case+0x1a5/0x480 [ 22.453089] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.453938] kthread+0x337/0x6f0 [ 22.454571] ret_from_fork+0x116/0x1d0 [ 22.455034] ret_from_fork_asm+0x1a/0x30 [ 22.455764] [ 22.456012] The buggy address belongs to the object at ffff8881038ee700 [ 22.456012] which belongs to the cache kmalloc-64 of size 64 [ 22.456905] The buggy address is located 0 bytes to the right of [ 22.456905] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 22.458586] [ 22.459028] The buggy address belongs to the physical page: [ 22.459702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 22.460638] flags: 0x200000000000000(node=0|zone=2) [ 22.461081] page_type: f5(slab) [ 22.461693] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.462498] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.463353] page dumped because: kasan: bad access detected [ 22.463759] [ 22.464261] Memory state around the buggy address: [ 22.464648] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.465201] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.465734] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.466374] ^ [ 22.466784] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.467538] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.468170] ================================================================== [ 23.182361] ================================================================== [ 23.182770] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 23.183158] Read of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 23.183506] [ 23.183670] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 23.183765] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.183794] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.183839] Call Trace: [ 23.184269] <TASK> [ 23.184321] dump_stack_lvl+0x73/0xb0 [ 23.184403] print_report+0xd1/0x650 [ 23.184473] ? __virt_addr_valid+0x1db/0x2d0 [ 23.184544] ? kasan_atomics_helper+0x4a1c/0x5450 [ 23.184608] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.188653] ? kasan_atomics_helper+0x4a1c/0x5450 [ 23.188718] kasan_report+0x141/0x180 [ 23.188772] ? kasan_atomics_helper+0x4a1c/0x5450 [ 23.188835] __asan_report_load4_noabort+0x18/0x20 [ 23.188924] kasan_atomics_helper+0x4a1c/0x5450 [ 23.188987] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.189039] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.189126] ? kasan_save_alloc_info+0x3b/0x50 [ 23.189189] ? kasan_atomics+0x152/0x310 [ 23.189250] kasan_atomics+0x1dc/0x310 [ 23.189303] ? __pfx_kasan_atomics+0x10/0x10 [ 23.189359] ? __pfx_read_tsc+0x10/0x10 [ 23.189408] ? ktime_get_ts64+0x86/0x230 [ 23.189462] kunit_try_run_case+0x1a5/0x480 [ 23.189519] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.189572] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.189625] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.189689] ? __kthread_parkme+0x82/0x180 [ 23.189763] ? preempt_count_sub+0x50/0x80 [ 23.189844] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.189999] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.190061] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.190698] kthread+0x337/0x6f0 [ 23.190770] ? trace_preempt_on+0x20/0xc0 [ 23.190853] ? __pfx_kthread+0x10/0x10 [ 23.190942] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.191010] ? calculate_sigpending+0x7b/0xa0 [ 23.191081] ? __pfx_kthread+0x10/0x10 [ 23.191276] ret_from_fork+0x116/0x1d0 [ 23.191349] ? __pfx_kthread+0x10/0x10 [ 23.191422] ret_from_fork_asm+0x1a/0x30 [ 23.191512] </TASK> [ 23.191552] [ 23.210741] Allocated by task 283: [ 23.211091] kasan_save_stack+0x45/0x70 [ 23.211509] kasan_save_track+0x18/0x40 [ 23.211959] kasan_save_alloc_info+0x3b/0x50 [ 23.212442] __kasan_kmalloc+0xb7/0xc0 [ 23.212858] __kmalloc_cache_noprof+0x189/0x420 [ 23.213244] kasan_atomics+0x95/0x310 [ 23.213495] kunit_try_run_case+0x1a5/0x480 [ 23.213760] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.214078] kthread+0x337/0x6f0 [ 23.214426] ret_from_fork+0x116/0x1d0 [ 23.214838] ret_from_fork_asm+0x1a/0x30 [ 23.215326] [ 23.215564] The buggy address belongs to the object at ffff8881038ee700 [ 23.215564] which belongs to the cache kmalloc-64 of size 64 [ 23.216396] The buggy address is located 0 bytes to the right of [ 23.216396] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 23.217226] [ 23.217372] The buggy address belongs to the physical page: [ 23.217650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 23.218186] flags: 0x200000000000000(node=0|zone=2) [ 23.218477] page_type: f5(slab) [ 23.218695] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.219234] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.219712] page dumped because: kasan: bad access detected [ 23.222243] [ 23.222601] Memory state around the buggy address: [ 23.223650] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.224231] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.224734] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.225097] ^ [ 23.226135] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.226659] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.227824] ================================================================== [ 23.406802] ================================================================== [ 23.408194] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 23.408859] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 23.410065] [ 23.410526] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 23.410591] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.410612] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.410642] Call Trace: [ 23.410661] <TASK> [ 23.410679] dump_stack_lvl+0x73/0xb0 [ 23.410723] print_report+0xd1/0x650 [ 23.410758] ? __virt_addr_valid+0x1db/0x2d0 [ 23.410796] ? kasan_atomics_helper+0x12e6/0x5450 [ 23.410831] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.410864] ? kasan_atomics_helper+0x12e6/0x5450 [ 23.410940] kasan_report+0x141/0x180 [ 23.410976] ? kasan_atomics_helper+0x12e6/0x5450 [ 23.411015] kasan_check_range+0x10c/0x1c0 [ 23.411051] __kasan_check_write+0x18/0x20 [ 23.411112] kasan_atomics_helper+0x12e6/0x5450 [ 23.411198] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.411466] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.411527] ? kasan_save_alloc_info+0x3b/0x50 [ 23.411567] ? kasan_atomics+0x152/0x310 [ 23.411607] kasan_atomics+0x1dc/0x310 [ 23.411643] ? __pfx_kasan_atomics+0x10/0x10 [ 23.411682] ? __pfx_read_tsc+0x10/0x10 [ 23.411714] ? ktime_get_ts64+0x86/0x230 [ 23.411752] kunit_try_run_case+0x1a5/0x480 [ 23.411790] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.411826] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.411861] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.411924] ? __kthread_parkme+0x82/0x180 [ 23.411959] ? preempt_count_sub+0x50/0x80 [ 23.411993] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.412031] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.412068] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.412117] kthread+0x337/0x6f0 [ 23.412167] ? trace_preempt_on+0x20/0xc0 [ 23.412202] ? __pfx_kthread+0x10/0x10 [ 23.412232] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.412266] ? calculate_sigpending+0x7b/0xa0 [ 23.412301] ? __pfx_kthread+0x10/0x10 [ 23.412335] ret_from_fork+0x116/0x1d0 [ 23.412363] ? __pfx_kthread+0x10/0x10 [ 23.412394] ret_from_fork_asm+0x1a/0x30 [ 23.412436] </TASK> [ 23.412453] [ 23.433297] Allocated by task 283: [ 23.433549] kasan_save_stack+0x45/0x70 [ 23.434363] kasan_save_track+0x18/0x40 [ 23.434895] kasan_save_alloc_info+0x3b/0x50 [ 23.435537] __kasan_kmalloc+0xb7/0xc0 [ 23.435930] __kmalloc_cache_noprof+0x189/0x420 [ 23.436566] kasan_atomics+0x95/0x310 [ 23.436992] kunit_try_run_case+0x1a5/0x480 [ 23.437599] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.438208] kthread+0x337/0x6f0 [ 23.438567] ret_from_fork+0x116/0x1d0 [ 23.439004] ret_from_fork_asm+0x1a/0x30 [ 23.439702] [ 23.439965] The buggy address belongs to the object at ffff8881038ee700 [ 23.439965] which belongs to the cache kmalloc-64 of size 64 [ 23.441070] The buggy address is located 0 bytes to the right of [ 23.441070] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 23.442228] [ 23.442475] The buggy address belongs to the physical page: [ 23.442963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 23.444151] flags: 0x200000000000000(node=0|zone=2) [ 23.444631] page_type: f5(slab) [ 23.445304] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.445993] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.446843] page dumped because: kasan: bad access detected [ 23.447456] [ 23.447666] Memory state around the buggy address: [ 23.448399] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.448857] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.449436] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.449964] ^ [ 23.451495] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.451963] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.452363] ================================================================== [ 24.662368] ================================================================== [ 24.663131] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 24.663555] Read of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 24.664358] [ 24.664625] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 24.664761] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.664831] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.664931] Call Trace: [ 24.664976] <TASK> [ 24.665015] dump_stack_lvl+0x73/0xb0 [ 24.665101] print_report+0xd1/0x650 [ 24.665187] ? __virt_addr_valid+0x1db/0x2d0 [ 24.665272] ? kasan_atomics_helper+0x4fb2/0x5450 [ 24.665352] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.665433] ? kasan_atomics_helper+0x4fb2/0x5450 [ 24.665537] kasan_report+0x141/0x180 [ 24.665646] ? kasan_atomics_helper+0x4fb2/0x5450 [ 24.665735] __asan_report_load8_noabort+0x18/0x20 [ 24.665812] kasan_atomics_helper+0x4fb2/0x5450 [ 24.665872] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.665966] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.666067] ? kasan_save_alloc_info+0x3b/0x50 [ 24.666176] ? kasan_atomics+0x152/0x310 [ 24.666296] kasan_atomics+0x1dc/0x310 [ 24.666386] ? __pfx_kasan_atomics+0x10/0x10 [ 24.666473] ? __pfx_read_tsc+0x10/0x10 [ 24.666549] ? ktime_get_ts64+0x86/0x230 [ 24.666632] kunit_try_run_case+0x1a5/0x480 [ 24.666720] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.666803] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.666928] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.667041] ? __kthread_parkme+0x82/0x180 [ 24.667119] ? preempt_count_sub+0x50/0x80 [ 24.667214] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.667299] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.667379] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.667461] kthread+0x337/0x6f0 [ 24.667529] ? trace_preempt_on+0x20/0xc0 [ 24.667606] ? __pfx_kthread+0x10/0x10 [ 24.667647] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.667683] ? calculate_sigpending+0x7b/0xa0 [ 24.667718] ? __pfx_kthread+0x10/0x10 [ 24.667751] ret_from_fork+0x116/0x1d0 [ 24.667780] ? __pfx_kthread+0x10/0x10 [ 24.667813] ret_from_fork_asm+0x1a/0x30 [ 24.667855] </TASK> [ 24.667870] [ 24.683367] Allocated by task 283: [ 24.683766] kasan_save_stack+0x45/0x70 [ 24.684680] kasan_save_track+0x18/0x40 [ 24.685099] kasan_save_alloc_info+0x3b/0x50 [ 24.686094] __kasan_kmalloc+0xb7/0xc0 [ 24.687620] __kmalloc_cache_noprof+0x189/0x420 [ 24.688758] kasan_atomics+0x95/0x310 [ 24.689147] kunit_try_run_case+0x1a5/0x480 [ 24.689490] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.689931] kthread+0x337/0x6f0 [ 24.690231] ret_from_fork+0x116/0x1d0 [ 24.690681] ret_from_fork_asm+0x1a/0x30 [ 24.691182] [ 24.691371] The buggy address belongs to the object at ffff8881038ee700 [ 24.691371] which belongs to the cache kmalloc-64 of size 64 [ 24.692401] The buggy address is located 0 bytes to the right of [ 24.692401] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 24.693525] [ 24.693749] The buggy address belongs to the physical page: [ 24.694341] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 24.695038] flags: 0x200000000000000(node=0|zone=2) [ 24.695517] page_type: f5(slab) [ 24.695812] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.696586] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.697393] page dumped because: kasan: bad access detected [ 24.697830] [ 24.698155] Memory state around the buggy address: [ 24.698692] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.699445] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.700032] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.700625] ^ [ 24.701187] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.701668] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.702394] ================================================================== [ 24.850707] ================================================================== [ 24.852144] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 24.852763] Read of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 24.853865] [ 24.854537] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 24.854603] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.854652] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.854714] Call Trace: [ 24.854757] <TASK> [ 24.854803] dump_stack_lvl+0x73/0xb0 [ 24.854945] print_report+0xd1/0x650 [ 24.855029] ? __virt_addr_valid+0x1db/0x2d0 [ 24.855107] ? kasan_atomics_helper+0x5115/0x5450 [ 24.855179] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.855216] ? kasan_atomics_helper+0x5115/0x5450 [ 24.855248] kasan_report+0x141/0x180 [ 24.855283] ? kasan_atomics_helper+0x5115/0x5450 [ 24.855322] __asan_report_load8_noabort+0x18/0x20 [ 24.855360] kasan_atomics_helper+0x5115/0x5450 [ 24.855393] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.855425] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.855460] ? kasan_save_alloc_info+0x3b/0x50 [ 24.855495] ? kasan_atomics+0x152/0x310 [ 24.855532] kasan_atomics+0x1dc/0x310 [ 24.855566] ? __pfx_kasan_atomics+0x10/0x10 [ 24.855602] ? __pfx_read_tsc+0x10/0x10 [ 24.855632] ? ktime_get_ts64+0x86/0x230 [ 24.855668] kunit_try_run_case+0x1a5/0x480 [ 24.855704] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.855739] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.855773] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.855808] ? __kthread_parkme+0x82/0x180 [ 24.855837] ? preempt_count_sub+0x50/0x80 [ 24.855870] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.855934] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.855972] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.856008] kthread+0x337/0x6f0 [ 24.856037] ? trace_preempt_on+0x20/0xc0 [ 24.856071] ? __pfx_kthread+0x10/0x10 [ 24.856112] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.856164] ? calculate_sigpending+0x7b/0xa0 [ 24.856202] ? __pfx_kthread+0x10/0x10 [ 24.856234] ret_from_fork+0x116/0x1d0 [ 24.856261] ? __pfx_kthread+0x10/0x10 [ 24.856290] ret_from_fork_asm+0x1a/0x30 [ 24.856334] </TASK> [ 24.856351] [ 24.875011] Allocated by task 283: [ 24.875541] kasan_save_stack+0x45/0x70 [ 24.876584] kasan_save_track+0x18/0x40 [ 24.877261] kasan_save_alloc_info+0x3b/0x50 [ 24.877723] __kasan_kmalloc+0xb7/0xc0 [ 24.878158] __kmalloc_cache_noprof+0x189/0x420 [ 24.878765] kasan_atomics+0x95/0x310 [ 24.879140] kunit_try_run_case+0x1a5/0x480 [ 24.879638] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.880190] kthread+0x337/0x6f0 [ 24.880551] ret_from_fork+0x116/0x1d0 [ 24.880986] ret_from_fork_asm+0x1a/0x30 [ 24.881427] [ 24.881699] The buggy address belongs to the object at ffff8881038ee700 [ 24.881699] which belongs to the cache kmalloc-64 of size 64 [ 24.882819] The buggy address is located 0 bytes to the right of [ 24.882819] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 24.883765] [ 24.884063] The buggy address belongs to the physical page: [ 24.884556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 24.885165] flags: 0x200000000000000(node=0|zone=2) [ 24.885674] page_type: f5(slab) [ 24.886262] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.886855] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.887501] page dumped because: kasan: bad access detected [ 24.887891] [ 24.888157] Memory state around the buggy address: [ 24.888655] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.889422] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.890067] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.890692] ^ [ 24.891203] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.891802] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.892495] ================================================================== [ 21.920860] ================================================================== [ 21.922268] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 21.922955] Read of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 21.924161] [ 21.924646] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 21.924773] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.924800] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.924834] Call Trace: [ 21.924851] <TASK> [ 21.924891] dump_stack_lvl+0x73/0xb0 [ 21.924945] print_report+0xd1/0x650 [ 21.924978] ? __virt_addr_valid+0x1db/0x2d0 [ 21.925011] ? kasan_atomics_helper+0x4bbc/0x5450 [ 21.925042] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.925072] ? kasan_atomics_helper+0x4bbc/0x5450 [ 21.925115] kasan_report+0x141/0x180 [ 21.925167] ? kasan_atomics_helper+0x4bbc/0x5450 [ 21.925203] __asan_report_load4_noabort+0x18/0x20 [ 21.925239] kasan_atomics_helper+0x4bbc/0x5450 [ 21.925274] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 21.925305] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.925341] ? kasan_save_alloc_info+0x3b/0x50 [ 21.925374] ? kasan_atomics+0x152/0x310 [ 21.925410] kasan_atomics+0x1dc/0x310 [ 21.925442] ? __pfx_kasan_atomics+0x10/0x10 [ 21.925476] ? __pfx_read_tsc+0x10/0x10 [ 21.925505] ? ktime_get_ts64+0x86/0x230 [ 21.925538] kunit_try_run_case+0x1a5/0x480 [ 21.925574] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.925607] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.925640] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.925674] ? __kthread_parkme+0x82/0x180 [ 21.925701] ? preempt_count_sub+0x50/0x80 [ 21.925734] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.925769] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.925802] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.925836] kthread+0x337/0x6f0 [ 21.925863] ? trace_preempt_on+0x20/0xc0 [ 21.925920] ? __pfx_kthread+0x10/0x10 [ 21.925950] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.925982] ? calculate_sigpending+0x7b/0xa0 [ 21.926016] ? __pfx_kthread+0x10/0x10 [ 21.926046] ret_from_fork+0x116/0x1d0 [ 21.926071] ? __pfx_kthread+0x10/0x10 [ 21.926109] ret_from_fork_asm+0x1a/0x30 [ 21.926171] </TASK> [ 21.926188] [ 21.946787] Allocated by task 283: [ 21.947106] kasan_save_stack+0x45/0x70 [ 21.947312] kasan_save_track+0x18/0x40 [ 21.947475] kasan_save_alloc_info+0x3b/0x50 [ 21.947650] __kasan_kmalloc+0xb7/0xc0 [ 21.947808] __kmalloc_cache_noprof+0x189/0x420 [ 21.948139] kasan_atomics+0x95/0x310 [ 21.948522] kunit_try_run_case+0x1a5/0x480 [ 21.949059] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.949666] kthread+0x337/0x6f0 [ 21.950098] ret_from_fork+0x116/0x1d0 [ 21.950602] ret_from_fork_asm+0x1a/0x30 [ 21.951053] [ 21.951300] The buggy address belongs to the object at ffff8881038ee700 [ 21.951300] which belongs to the cache kmalloc-64 of size 64 [ 21.952164] The buggy address is located 0 bytes to the right of [ 21.952164] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 21.953283] [ 21.953581] The buggy address belongs to the physical page: [ 21.954338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 21.955078] flags: 0x200000000000000(node=0|zone=2) [ 21.955707] page_type: f5(slab) [ 21.956065] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 21.956546] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.957259] page dumped because: kasan: bad access detected [ 21.958087] [ 21.958321] Memory state around the buggy address: [ 21.958898] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.959489] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.960162] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.960809] ^ [ 21.961385] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.962018] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.962686] ================================================================== [ 22.243250] ================================================================== [ 22.243741] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 22.244324] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 22.245108] [ 22.245343] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 22.245459] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.245498] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.245555] Call Trace: [ 22.245593] <TASK> [ 22.245635] dump_stack_lvl+0x73/0xb0 [ 22.245730] print_report+0xd1/0x650 [ 22.245818] ? __virt_addr_valid+0x1db/0x2d0 [ 22.245920] ? kasan_atomics_helper+0x4b3a/0x5450 [ 22.246000] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.246120] ? kasan_atomics_helper+0x4b3a/0x5450 [ 22.246201] kasan_report+0x141/0x180 [ 22.246327] ? kasan_atomics_helper+0x4b3a/0x5450 [ 22.246421] __asan_report_store4_noabort+0x1b/0x30 [ 22.246499] kasan_atomics_helper+0x4b3a/0x5450 [ 22.246580] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.246660] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.246782] ? kasan_save_alloc_info+0x3b/0x50 [ 22.246869] ? kasan_atomics+0x152/0x310 [ 22.246978] kasan_atomics+0x1dc/0x310 [ 22.247099] ? __pfx_kasan_atomics+0x10/0x10 [ 22.247202] ? __pfx_read_tsc+0x10/0x10 [ 22.247276] ? ktime_get_ts64+0x86/0x230 [ 22.247335] kunit_try_run_case+0x1a5/0x480 [ 22.247377] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.247413] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.247459] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.247539] ? __kthread_parkme+0x82/0x180 [ 22.247651] ? preempt_count_sub+0x50/0x80 [ 22.247738] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.247826] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.247933] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.248061] kthread+0x337/0x6f0 [ 22.248137] ? trace_preempt_on+0x20/0xc0 [ 22.248218] ? __pfx_kthread+0x10/0x10 [ 22.248277] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.248312] ? calculate_sigpending+0x7b/0xa0 [ 22.248347] ? __pfx_kthread+0x10/0x10 [ 22.248382] ret_from_fork+0x116/0x1d0 [ 22.248412] ? __pfx_kthread+0x10/0x10 [ 22.248444] ret_from_fork_asm+0x1a/0x30 [ 22.248487] </TASK> [ 22.248505] [ 22.264919] Allocated by task 283: [ 22.265293] kasan_save_stack+0x45/0x70 [ 22.265783] kasan_save_track+0x18/0x40 [ 22.266215] kasan_save_alloc_info+0x3b/0x50 [ 22.266594] __kasan_kmalloc+0xb7/0xc0 [ 22.266974] __kmalloc_cache_noprof+0x189/0x420 [ 22.267726] kasan_atomics+0x95/0x310 [ 22.268200] kunit_try_run_case+0x1a5/0x480 [ 22.268558] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.269023] kthread+0x337/0x6f0 [ 22.270703] ret_from_fork+0x116/0x1d0 [ 22.271160] ret_from_fork_asm+0x1a/0x30 [ 22.271612] [ 22.271842] The buggy address belongs to the object at ffff8881038ee700 [ 22.271842] which belongs to the cache kmalloc-64 of size 64 [ 22.273705] The buggy address is located 0 bytes to the right of [ 22.273705] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 22.274457] [ 22.275690] The buggy address belongs to the physical page: [ 22.276470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 22.277418] flags: 0x200000000000000(node=0|zone=2) [ 22.277932] page_type: f5(slab) [ 22.278336] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.279007] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.279713] page dumped because: kasan: bad access detected [ 22.280237] [ 22.280500] Memory state around the buggy address: [ 22.280996] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.281621] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.282331] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.283117] ^ [ 22.283608] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.284204] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.284920] ================================================================== [ 23.099897] ================================================================== [ 23.100781] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 23.101410] Read of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 23.102100] [ 23.102395] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 23.102517] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.102557] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.102618] Call Trace: [ 23.102660] <TASK> [ 23.102704] dump_stack_lvl+0x73/0xb0 [ 23.102788] print_report+0xd1/0x650 [ 23.102866] ? __virt_addr_valid+0x1db/0x2d0 [ 23.103006] ? kasan_atomics_helper+0x4a36/0x5450 [ 23.103095] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.103213] ? kasan_atomics_helper+0x4a36/0x5450 [ 23.103303] kasan_report+0x141/0x180 [ 23.103463] ? kasan_atomics_helper+0x4a36/0x5450 [ 23.103559] __asan_report_load4_noabort+0x18/0x20 [ 23.103643] kasan_atomics_helper+0x4a36/0x5450 [ 23.103724] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.103804] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.103906] ? kasan_save_alloc_info+0x3b/0x50 [ 23.104032] ? kasan_atomics+0x152/0x310 [ 23.104126] kasan_atomics+0x1dc/0x310 [ 23.104217] ? __pfx_kasan_atomics+0x10/0x10 [ 23.104340] ? __pfx_read_tsc+0x10/0x10 [ 23.104421] ? ktime_get_ts64+0x86/0x230 [ 23.104509] kunit_try_run_case+0x1a5/0x480 [ 23.104581] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.104622] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.104657] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.104695] ? __kthread_parkme+0x82/0x180 [ 23.104726] ? preempt_count_sub+0x50/0x80 [ 23.104759] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.104796] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.104831] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.104867] kthread+0x337/0x6f0 [ 23.104927] ? trace_preempt_on+0x20/0xc0 [ 23.104962] ? __pfx_kthread+0x10/0x10 [ 23.104993] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.105026] ? calculate_sigpending+0x7b/0xa0 [ 23.105063] ? __pfx_kthread+0x10/0x10 [ 23.105102] ret_from_fork+0x116/0x1d0 [ 23.105173] ? __pfx_kthread+0x10/0x10 [ 23.105207] ret_from_fork_asm+0x1a/0x30 [ 23.105252] </TASK> [ 23.105271] [ 23.117705] Allocated by task 283: [ 23.118230] kasan_save_stack+0x45/0x70 [ 23.118687] kasan_save_track+0x18/0x40 [ 23.119145] kasan_save_alloc_info+0x3b/0x50 [ 23.119901] __kasan_kmalloc+0xb7/0xc0 [ 23.120442] __kmalloc_cache_noprof+0x189/0x420 [ 23.120965] kasan_atomics+0x95/0x310 [ 23.121357] kunit_try_run_case+0x1a5/0x480 [ 23.121655] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.122189] kthread+0x337/0x6f0 [ 23.122661] ret_from_fork+0x116/0x1d0 [ 23.123162] ret_from_fork_asm+0x1a/0x30 [ 23.123601] [ 23.124181] The buggy address belongs to the object at ffff8881038ee700 [ 23.124181] which belongs to the cache kmalloc-64 of size 64 [ 23.125296] The buggy address is located 0 bytes to the right of [ 23.125296] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 23.126389] [ 23.126634] The buggy address belongs to the physical page: [ 23.128041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 23.130310] flags: 0x200000000000000(node=0|zone=2) [ 23.130676] page_type: f5(slab) [ 23.133200] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.133859] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.135525] page dumped because: kasan: bad access detected [ 23.135820] [ 23.135980] Memory state around the buggy address: [ 23.136256] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.136613] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.137627] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.138134] ^ [ 23.139430] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.140631] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.141118] ================================================================== [ 24.434030] ================================================================== [ 24.435557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 24.436175] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 24.436788] [ 24.437869] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 24.437981] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.438002] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.438034] Call Trace: [ 24.438053] <TASK> [ 24.438070] dump_stack_lvl+0x73/0xb0 [ 24.438153] print_report+0xd1/0x650 [ 24.438193] ? __virt_addr_valid+0x1db/0x2d0 [ 24.438228] ? kasan_atomics_helper+0x1f43/0x5450 [ 24.438271] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.438306] ? kasan_atomics_helper+0x1f43/0x5450 [ 24.438339] kasan_report+0x141/0x180 [ 24.438373] ? kasan_atomics_helper+0x1f43/0x5450 [ 24.438414] kasan_check_range+0x10c/0x1c0 [ 24.438448] __kasan_check_write+0x18/0x20 [ 24.438477] kasan_atomics_helper+0x1f43/0x5450 [ 24.438509] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.438542] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.438578] ? kasan_save_alloc_info+0x3b/0x50 [ 24.438614] ? kasan_atomics+0x152/0x310 [ 24.438652] kasan_atomics+0x1dc/0x310 [ 24.438686] ? __pfx_kasan_atomics+0x10/0x10 [ 24.438723] ? __pfx_read_tsc+0x10/0x10 [ 24.438753] ? ktime_get_ts64+0x86/0x230 [ 24.438786] kunit_try_run_case+0x1a5/0x480 [ 24.438822] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.438857] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.438918] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.438957] ? __kthread_parkme+0x82/0x180 [ 24.438988] ? preempt_count_sub+0x50/0x80 [ 24.439022] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.439059] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.439100] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.439174] kthread+0x337/0x6f0 [ 24.439205] ? trace_preempt_on+0x20/0xc0 [ 24.439239] ? __pfx_kthread+0x10/0x10 [ 24.439270] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.439302] ? calculate_sigpending+0x7b/0xa0 [ 24.439337] ? __pfx_kthread+0x10/0x10 [ 24.439370] ret_from_fork+0x116/0x1d0 [ 24.439397] ? __pfx_kthread+0x10/0x10 [ 24.439428] ret_from_fork_asm+0x1a/0x30 [ 24.439470] </TASK> [ 24.439487] [ 24.459011] Allocated by task 283: [ 24.459486] kasan_save_stack+0x45/0x70 [ 24.460256] kasan_save_track+0x18/0x40 [ 24.460581] kasan_save_alloc_info+0x3b/0x50 [ 24.460947] __kasan_kmalloc+0xb7/0xc0 [ 24.461651] __kmalloc_cache_noprof+0x189/0x420 [ 24.462285] kasan_atomics+0x95/0x310 [ 24.462790] kunit_try_run_case+0x1a5/0x480 [ 24.463413] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.463936] kthread+0x337/0x6f0 [ 24.464360] ret_from_fork+0x116/0x1d0 [ 24.465010] ret_from_fork_asm+0x1a/0x30 [ 24.465540] [ 24.465896] The buggy address belongs to the object at ffff8881038ee700 [ 24.465896] which belongs to the cache kmalloc-64 of size 64 [ 24.467090] The buggy address is located 0 bytes to the right of [ 24.467090] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 24.468442] [ 24.468681] The buggy address belongs to the physical page: [ 24.469391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 24.470212] flags: 0x200000000000000(node=0|zone=2) [ 24.470716] page_type: f5(slab) [ 24.471152] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.471765] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.472435] page dumped because: kasan: bad access detected [ 24.472931] [ 24.473229] Memory state around the buggy address: [ 24.473681] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.474380] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.475030] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.475650] ^ [ 24.476189] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.476718] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.477452] ================================================================== [ 24.572690] ================================================================== [ 24.573175] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 24.575051] Read of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 24.575632] [ 24.576225] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 24.576295] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.576315] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.576348] Call Trace: [ 24.576367] <TASK> [ 24.576386] dump_stack_lvl+0x73/0xb0 [ 24.576431] print_report+0xd1/0x650 [ 24.576467] ? __virt_addr_valid+0x1db/0x2d0 [ 24.576501] ? kasan_atomics_helper+0x4f98/0x5450 [ 24.576532] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.576567] ? kasan_atomics_helper+0x4f98/0x5450 [ 24.576600] kasan_report+0x141/0x180 [ 24.576632] ? kasan_atomics_helper+0x4f98/0x5450 [ 24.576670] __asan_report_load8_noabort+0x18/0x20 [ 24.576707] kasan_atomics_helper+0x4f98/0x5450 [ 24.576740] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.576772] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.576808] ? kasan_save_alloc_info+0x3b/0x50 [ 24.576842] ? kasan_atomics+0x152/0x310 [ 24.576902] kasan_atomics+0x1dc/0x310 [ 24.576941] ? __pfx_kasan_atomics+0x10/0x10 [ 24.576979] ? __pfx_read_tsc+0x10/0x10 [ 24.577009] ? ktime_get_ts64+0x86/0x230 [ 24.577044] kunit_try_run_case+0x1a5/0x480 [ 24.577079] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.577150] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.577191] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.577228] ? __kthread_parkme+0x82/0x180 [ 24.577259] ? preempt_count_sub+0x50/0x80 [ 24.577291] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.577328] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.577364] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.577403] kthread+0x337/0x6f0 [ 24.577432] ? trace_preempt_on+0x20/0xc0 [ 24.577466] ? __pfx_kthread+0x10/0x10 [ 24.577497] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.577530] ? calculate_sigpending+0x7b/0xa0 [ 24.577564] ? __pfx_kthread+0x10/0x10 [ 24.577595] ret_from_fork+0x116/0x1d0 [ 24.577622] ? __pfx_kthread+0x10/0x10 [ 24.577651] ret_from_fork_asm+0x1a/0x30 [ 24.577693] </TASK> [ 24.577711] [ 24.597380] Allocated by task 283: [ 24.597755] kasan_save_stack+0x45/0x70 [ 24.598188] kasan_save_track+0x18/0x40 [ 24.598588] kasan_save_alloc_info+0x3b/0x50 [ 24.599683] __kasan_kmalloc+0xb7/0xc0 [ 24.600017] __kmalloc_cache_noprof+0x189/0x420 [ 24.600745] kasan_atomics+0x95/0x310 [ 24.601370] kunit_try_run_case+0x1a5/0x480 [ 24.601939] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.602608] kthread+0x337/0x6f0 [ 24.603014] ret_from_fork+0x116/0x1d0 [ 24.603646] ret_from_fork_asm+0x1a/0x30 [ 24.604251] [ 24.604481] The buggy address belongs to the object at ffff8881038ee700 [ 24.604481] which belongs to the cache kmalloc-64 of size 64 [ 24.605920] The buggy address is located 0 bytes to the right of [ 24.605920] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 24.606942] [ 24.607595] The buggy address belongs to the physical page: [ 24.608023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 24.608964] flags: 0x200000000000000(node=0|zone=2) [ 24.609427] page_type: f5(slab) [ 24.609800] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.610778] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.611569] page dumped because: kasan: bad access detected [ 24.612239] [ 24.612436] Memory state around the buggy address: [ 24.613076] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.614108] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.614504] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.614751] ^ [ 24.615078] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.616567] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.617387] ================================================================== [ 23.142682] ================================================================== [ 23.143275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 23.144512] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 23.145171] [ 23.145435] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 23.145555] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.145598] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.145657] Call Trace: [ 23.145682] <TASK> [ 23.145703] dump_stack_lvl+0x73/0xb0 [ 23.145747] print_report+0xd1/0x650 [ 23.145781] ? __virt_addr_valid+0x1db/0x2d0 [ 23.145850] ? kasan_atomics_helper+0x1079/0x5450 [ 23.145934] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.146014] ? kasan_atomics_helper+0x1079/0x5450 [ 23.146094] kasan_report+0x141/0x180 [ 23.146220] ? kasan_atomics_helper+0x1079/0x5450 [ 23.146321] kasan_check_range+0x10c/0x1c0 [ 23.146405] __kasan_check_write+0x18/0x20 [ 23.146480] kasan_atomics_helper+0x1079/0x5450 [ 23.146562] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.146639] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.146718] ? kasan_save_alloc_info+0x3b/0x50 [ 23.146799] ? kasan_atomics+0x152/0x310 [ 23.146870] kasan_atomics+0x1dc/0x310 [ 23.146932] ? __pfx_kasan_atomics+0x10/0x10 [ 23.146972] ? __pfx_read_tsc+0x10/0x10 [ 23.147005] ? ktime_get_ts64+0x86/0x230 [ 23.147041] kunit_try_run_case+0x1a5/0x480 [ 23.147078] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.147150] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.147190] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.147228] ? __kthread_parkme+0x82/0x180 [ 23.147271] ? preempt_count_sub+0x50/0x80 [ 23.147307] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.147344] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.147380] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.147416] kthread+0x337/0x6f0 [ 23.147444] ? trace_preempt_on+0x20/0xc0 [ 23.147478] ? __pfx_kthread+0x10/0x10 [ 23.147508] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.147568] ? calculate_sigpending+0x7b/0xa0 [ 23.147605] ? __pfx_kthread+0x10/0x10 [ 23.147637] ret_from_fork+0x116/0x1d0 [ 23.147664] ? __pfx_kthread+0x10/0x10 [ 23.147695] ret_from_fork_asm+0x1a/0x30 [ 23.147737] </TASK> [ 23.147754] [ 23.160194] Allocated by task 283: [ 23.160812] kasan_save_stack+0x45/0x70 [ 23.161279] kasan_save_track+0x18/0x40 [ 23.161727] kasan_save_alloc_info+0x3b/0x50 [ 23.162180] __kasan_kmalloc+0xb7/0xc0 [ 23.162506] __kmalloc_cache_noprof+0x189/0x420 [ 23.162857] kasan_atomics+0x95/0x310 [ 23.163288] kunit_try_run_case+0x1a5/0x480 [ 23.163826] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.164900] kthread+0x337/0x6f0 [ 23.166934] ret_from_fork+0x116/0x1d0 [ 23.167208] ret_from_fork_asm+0x1a/0x30 [ 23.167464] [ 23.167864] The buggy address belongs to the object at ffff8881038ee700 [ 23.167864] which belongs to the cache kmalloc-64 of size 64 [ 23.170545] The buggy address is located 0 bytes to the right of [ 23.170545] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 23.171171] [ 23.171311] The buggy address belongs to the physical page: [ 23.171585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 23.172336] flags: 0x200000000000000(node=0|zone=2) [ 23.172626] page_type: f5(slab) [ 23.172840] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.173338] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.174588] page dumped because: kasan: bad access detected [ 23.175149] [ 23.175371] Memory state around the buggy address: [ 23.175828] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.176254] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.177726] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.178613] ^ [ 23.179127] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.179930] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.180630] ================================================================== [ 23.273156] ================================================================== [ 23.274002] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 23.274903] Read of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 23.275820] [ 23.276465] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 23.276589] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.276612] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.276659] Call Trace: [ 23.276684] <TASK> [ 23.276706] dump_stack_lvl+0x73/0xb0 [ 23.276777] print_report+0xd1/0x650 [ 23.276826] ? __virt_addr_valid+0x1db/0x2d0 [ 23.276862] ? kasan_atomics_helper+0x4a02/0x5450 [ 23.276944] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.277023] ? kasan_atomics_helper+0x4a02/0x5450 [ 23.277085] kasan_report+0x141/0x180 [ 23.277156] ? kasan_atomics_helper+0x4a02/0x5450 [ 23.277199] __asan_report_load4_noabort+0x18/0x20 [ 23.277237] kasan_atomics_helper+0x4a02/0x5450 [ 23.277271] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.277306] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.277343] ? kasan_save_alloc_info+0x3b/0x50 [ 23.277378] ? kasan_atomics+0x152/0x310 [ 23.277417] kasan_atomics+0x1dc/0x310 [ 23.277451] ? __pfx_kasan_atomics+0x10/0x10 [ 23.277487] ? __pfx_read_tsc+0x10/0x10 [ 23.277519] ? ktime_get_ts64+0x86/0x230 [ 23.277555] kunit_try_run_case+0x1a5/0x480 [ 23.277591] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.277628] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.277662] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.277698] ? __kthread_parkme+0x82/0x180 [ 23.277727] ? preempt_count_sub+0x50/0x80 [ 23.277761] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.277797] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.277832] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.277868] kthread+0x337/0x6f0 [ 23.277925] ? trace_preempt_on+0x20/0xc0 [ 23.277960] ? __pfx_kthread+0x10/0x10 [ 23.277991] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.278023] ? calculate_sigpending+0x7b/0xa0 [ 23.278058] ? __pfx_kthread+0x10/0x10 [ 23.278090] ret_from_fork+0x116/0x1d0 [ 23.278147] ? __pfx_kthread+0x10/0x10 [ 23.278181] ret_from_fork_asm+0x1a/0x30 [ 23.278225] </TASK> [ 23.278243] [ 23.295048] Allocated by task 283: [ 23.295344] kasan_save_stack+0x45/0x70 [ 23.295791] kasan_save_track+0x18/0x40 [ 23.296238] kasan_save_alloc_info+0x3b/0x50 [ 23.296710] __kasan_kmalloc+0xb7/0xc0 [ 23.297158] __kmalloc_cache_noprof+0x189/0x420 [ 23.297631] kasan_atomics+0x95/0x310 [ 23.298019] kunit_try_run_case+0x1a5/0x480 [ 23.298446] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.298865] kthread+0x337/0x6f0 [ 23.299187] ret_from_fork+0x116/0x1d0 [ 23.299853] ret_from_fork_asm+0x1a/0x30 [ 23.300292] [ 23.300537] The buggy address belongs to the object at ffff8881038ee700 [ 23.300537] which belongs to the cache kmalloc-64 of size 64 [ 23.301609] The buggy address is located 0 bytes to the right of [ 23.301609] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 23.302386] [ 23.302577] The buggy address belongs to the physical page: [ 23.303106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 23.303991] flags: 0x200000000000000(node=0|zone=2) [ 23.304706] page_type: f5(slab) [ 23.305109] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.305639] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.306393] page dumped because: kasan: bad access detected [ 23.306870] [ 23.307079] Memory state around the buggy address: [ 23.307542] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.308173] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.308696] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.309165] ^ [ 23.309513] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.310183] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.311110] ================================================================== [ 24.256925] ================================================================== [ 24.258248] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 24.260359] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 24.261869] [ 24.262085] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 24.262185] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.262217] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.262280] Call Trace: [ 24.262311] <TASK> [ 24.262340] dump_stack_lvl+0x73/0xb0 [ 24.262408] print_report+0xd1/0x650 [ 24.262464] ? __virt_addr_valid+0x1db/0x2d0 [ 24.262572] ? kasan_atomics_helper+0x1ce1/0x5450 [ 24.262653] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.262737] ? kasan_atomics_helper+0x1ce1/0x5450 [ 24.263013] kasan_report+0x141/0x180 [ 24.263143] ? kasan_atomics_helper+0x1ce1/0x5450 [ 24.263236] kasan_check_range+0x10c/0x1c0 [ 24.263305] __kasan_check_write+0x18/0x20 [ 24.263356] kasan_atomics_helper+0x1ce1/0x5450 [ 24.263410] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.263467] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.263531] ? kasan_save_alloc_info+0x3b/0x50 [ 24.263607] ? kasan_atomics+0x152/0x310 [ 24.263690] kasan_atomics+0x1dc/0x310 [ 24.263770] ? __pfx_kasan_atomics+0x10/0x10 [ 24.263849] ? __pfx_read_tsc+0x10/0x10 [ 24.264489] ? ktime_get_ts64+0x86/0x230 [ 24.264574] kunit_try_run_case+0x1a5/0x480 [ 24.264658] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.264734] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.264809] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.264921] ? __kthread_parkme+0x82/0x180 [ 24.264998] ? preempt_count_sub+0x50/0x80 [ 24.265073] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.265168] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.265238] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.265310] kthread+0x337/0x6f0 [ 24.265371] ? trace_preempt_on+0x20/0xc0 [ 24.265438] ? __pfx_kthread+0x10/0x10 [ 24.265497] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.265558] ? calculate_sigpending+0x7b/0xa0 [ 24.265626] ? __pfx_kthread+0x10/0x10 [ 24.265692] ret_from_fork+0x116/0x1d0 [ 24.265751] ? __pfx_kthread+0x10/0x10 [ 24.265821] ret_from_fork_asm+0x1a/0x30 [ 24.265927] </TASK> [ 24.265964] [ 24.283703] Allocated by task 283: [ 24.284127] kasan_save_stack+0x45/0x70 [ 24.284514] kasan_save_track+0x18/0x40 [ 24.284944] kasan_save_alloc_info+0x3b/0x50 [ 24.285448] __kasan_kmalloc+0xb7/0xc0 [ 24.285797] __kmalloc_cache_noprof+0x189/0x420 [ 24.286350] kasan_atomics+0x95/0x310 [ 24.286751] kunit_try_run_case+0x1a5/0x480 [ 24.287173] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.287699] kthread+0x337/0x6f0 [ 24.288065] ret_from_fork+0x116/0x1d0 [ 24.288520] ret_from_fork_asm+0x1a/0x30 [ 24.288957] [ 24.289233] The buggy address belongs to the object at ffff8881038ee700 [ 24.289233] which belongs to the cache kmalloc-64 of size 64 [ 24.290084] The buggy address is located 0 bytes to the right of [ 24.290084] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 24.291142] [ 24.291336] The buggy address belongs to the physical page: [ 24.291838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 24.292557] flags: 0x200000000000000(node=0|zone=2) [ 24.292981] page_type: f5(slab) [ 24.293397] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.294016] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.294675] page dumped because: kasan: bad access detected [ 24.295070] [ 24.295316] Memory state around the buggy address: [ 24.295664] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.296299] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.296982] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.297680] ^ [ 24.298228] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.298920] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.299409] ================================================================== [ 23.809021] ================================================================== [ 23.809719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 23.810427] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 23.810859] [ 23.811098] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 23.811217] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.811259] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.811321] Call Trace: [ 23.811362] <TASK> [ 23.811407] dump_stack_lvl+0x73/0xb0 [ 23.811496] print_report+0xd1/0x650 [ 23.811616] ? __virt_addr_valid+0x1db/0x2d0 [ 23.811702] ? kasan_atomics_helper+0x16e7/0x5450 [ 23.811778] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.811856] ? kasan_atomics_helper+0x16e7/0x5450 [ 23.811953] kasan_report+0x141/0x180 [ 23.812031] ? kasan_atomics_helper+0x16e7/0x5450 [ 23.812121] kasan_check_range+0x10c/0x1c0 [ 23.812214] __kasan_check_write+0x18/0x20 [ 23.812326] kasan_atomics_helper+0x16e7/0x5450 [ 23.812417] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.812537] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.812624] ? kasan_save_alloc_info+0x3b/0x50 [ 23.812709] ? kasan_atomics+0x152/0x310 [ 23.812798] kasan_atomics+0x1dc/0x310 [ 23.812897] ? __pfx_kasan_atomics+0x10/0x10 [ 23.812986] ? __pfx_read_tsc+0x10/0x10 [ 23.813059] ? ktime_get_ts64+0x86/0x230 [ 23.813161] kunit_try_run_case+0x1a5/0x480 [ 23.813251] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.813308] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.813349] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.813389] ? __kthread_parkme+0x82/0x180 [ 23.813421] ? preempt_count_sub+0x50/0x80 [ 23.813454] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.813491] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.813528] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.813566] kthread+0x337/0x6f0 [ 23.813594] ? trace_preempt_on+0x20/0xc0 [ 23.813629] ? __pfx_kthread+0x10/0x10 [ 23.813659] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.813691] ? calculate_sigpending+0x7b/0xa0 [ 23.813727] ? __pfx_kthread+0x10/0x10 [ 23.813760] ret_from_fork+0x116/0x1d0 [ 23.813787] ? __pfx_kthread+0x10/0x10 [ 23.813818] ret_from_fork_asm+0x1a/0x30 [ 23.813860] </TASK> [ 23.813901] [ 23.835318] Allocated by task 283: [ 23.835693] kasan_save_stack+0x45/0x70 [ 23.836139] kasan_save_track+0x18/0x40 [ 23.836495] kasan_save_alloc_info+0x3b/0x50 [ 23.836962] __kasan_kmalloc+0xb7/0xc0 [ 23.837474] __kmalloc_cache_noprof+0x189/0x420 [ 23.837834] kasan_atomics+0x95/0x310 [ 23.838483] kunit_try_run_case+0x1a5/0x480 [ 23.838999] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.839700] kthread+0x337/0x6f0 [ 23.840228] ret_from_fork+0x116/0x1d0 [ 23.840672] ret_from_fork_asm+0x1a/0x30 [ 23.841230] [ 23.841499] The buggy address belongs to the object at ffff8881038ee700 [ 23.841499] which belongs to the cache kmalloc-64 of size 64 [ 23.842563] The buggy address is located 0 bytes to the right of [ 23.842563] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 23.843715] [ 23.844053] The buggy address belongs to the physical page: [ 23.844624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 23.845524] flags: 0x200000000000000(node=0|zone=2) [ 23.846083] page_type: f5(slab) [ 23.846557] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.847271] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.847978] page dumped because: kasan: bad access detected [ 23.848562] [ 23.848924] Memory state around the buggy address: [ 23.849498] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.850192] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.850813] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.851526] ^ [ 23.851993] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.852746] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.853405] ================================================================== [ 23.012374] ================================================================== [ 23.013070] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 23.013680] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 23.014322] [ 23.014555] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 23.014671] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.014712] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.014772] Call Trace: [ 23.014812] <TASK> [ 23.014854] dump_stack_lvl+0x73/0xb0 [ 23.014963] print_report+0xd1/0x650 [ 23.015046] ? __virt_addr_valid+0x1db/0x2d0 [ 23.015128] ? kasan_atomics_helper+0xf10/0x5450 [ 23.015211] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.015291] ? kasan_atomics_helper+0xf10/0x5450 [ 23.015373] kasan_report+0x141/0x180 [ 23.015455] ? kasan_atomics_helper+0xf10/0x5450 [ 23.015543] kasan_check_range+0x10c/0x1c0 [ 23.015628] __kasan_check_write+0x18/0x20 [ 23.015703] kasan_atomics_helper+0xf10/0x5450 [ 23.015788] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.015909] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.015997] ? kasan_save_alloc_info+0x3b/0x50 [ 23.016080] ? kasan_atomics+0x152/0x310 [ 23.016169] kasan_atomics+0x1dc/0x310 [ 23.016250] ? __pfx_kasan_atomics+0x10/0x10 [ 23.016333] ? __pfx_read_tsc+0x10/0x10 [ 23.016404] ? ktime_get_ts64+0x86/0x230 [ 23.016489] kunit_try_run_case+0x1a5/0x480 [ 23.016571] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.016648] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.016725] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.016808] ? __kthread_parkme+0x82/0x180 [ 23.016902] ? preempt_count_sub+0x50/0x80 [ 23.016984] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.017068] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.017139] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.017215] kthread+0x337/0x6f0 [ 23.017286] ? trace_preempt_on+0x20/0xc0 [ 23.017367] ? __pfx_kthread+0x10/0x10 [ 23.017445] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.017527] ? calculate_sigpending+0x7b/0xa0 [ 23.017608] ? __pfx_kthread+0x10/0x10 [ 23.017683] ret_from_fork+0x116/0x1d0 [ 23.017754] ? __pfx_kthread+0x10/0x10 [ 23.017831] ret_from_fork_asm+0x1a/0x30 [ 23.017946] </TASK> [ 23.017990] [ 23.032900] Allocated by task 283: [ 23.033388] kasan_save_stack+0x45/0x70 [ 23.033811] kasan_save_track+0x18/0x40 [ 23.034387] kasan_save_alloc_info+0x3b/0x50 [ 23.034837] __kasan_kmalloc+0xb7/0xc0 [ 23.035341] __kmalloc_cache_noprof+0x189/0x420 [ 23.035739] kasan_atomics+0x95/0x310 [ 23.036147] kunit_try_run_case+0x1a5/0x480 [ 23.036608] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.037122] kthread+0x337/0x6f0 [ 23.037498] ret_from_fork+0x116/0x1d0 [ 23.037816] ret_from_fork_asm+0x1a/0x30 [ 23.038248] [ 23.038499] The buggy address belongs to the object at ffff8881038ee700 [ 23.038499] which belongs to the cache kmalloc-64 of size 64 [ 23.039811] The buggy address is located 0 bytes to the right of [ 23.039811] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 23.040718] [ 23.040973] The buggy address belongs to the physical page: [ 23.041655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 23.042472] flags: 0x200000000000000(node=0|zone=2) [ 23.042910] page_type: f5(slab) [ 23.043235] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.043722] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.044378] page dumped because: kasan: bad access detected [ 23.044941] [ 23.045200] Memory state around the buggy address: [ 23.045671] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.046296] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.046895] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.047460] ^ [ 23.047806] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.048532] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.049149] ================================================================== [ 22.370774] ================================================================== [ 22.371430] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 22.372239] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 22.372909] [ 22.373187] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 22.373318] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.373363] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.373428] Call Trace: [ 22.373471] <TASK> [ 22.373497] dump_stack_lvl+0x73/0xb0 [ 22.373545] print_report+0xd1/0x650 [ 22.373583] ? __virt_addr_valid+0x1db/0x2d0 [ 22.373658] ? kasan_atomics_helper+0x697/0x5450 [ 22.373732] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.373816] ? kasan_atomics_helper+0x697/0x5450 [ 22.374296] kasan_report+0x141/0x180 [ 22.374387] ? kasan_atomics_helper+0x697/0x5450 [ 22.374478] kasan_check_range+0x10c/0x1c0 [ 22.374560] __kasan_check_write+0x18/0x20 [ 22.374630] kasan_atomics_helper+0x697/0x5450 [ 22.374708] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.374788] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.374868] ? kasan_save_alloc_info+0x3b/0x50 [ 22.374970] ? kasan_atomics+0x152/0x310 [ 22.375054] kasan_atomics+0x1dc/0x310 [ 22.375176] ? __pfx_kasan_atomics+0x10/0x10 [ 22.375221] ? __pfx_read_tsc+0x10/0x10 [ 22.375255] ? ktime_get_ts64+0x86/0x230 [ 22.375293] kunit_try_run_case+0x1a5/0x480 [ 22.375331] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.375367] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.375401] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.375436] ? __kthread_parkme+0x82/0x180 [ 22.375466] ? preempt_count_sub+0x50/0x80 [ 22.375499] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.375535] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.375570] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.375606] kthread+0x337/0x6f0 [ 22.375634] ? trace_preempt_on+0x20/0xc0 [ 22.375667] ? __pfx_kthread+0x10/0x10 [ 22.375697] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.375729] ? calculate_sigpending+0x7b/0xa0 [ 22.375763] ? __pfx_kthread+0x10/0x10 [ 22.375794] ret_from_fork+0x116/0x1d0 [ 22.375820] ? __pfx_kthread+0x10/0x10 [ 22.375850] ret_from_fork_asm+0x1a/0x30 [ 22.375915] </TASK> [ 22.375936] [ 22.397203] Allocated by task 283: [ 22.397496] kasan_save_stack+0x45/0x70 [ 22.397805] kasan_save_track+0x18/0x40 [ 22.398659] kasan_save_alloc_info+0x3b/0x50 [ 22.401413] __kasan_kmalloc+0xb7/0xc0 [ 22.401995] __kmalloc_cache_noprof+0x189/0x420 [ 22.402823] kasan_atomics+0x95/0x310 [ 22.404020] kunit_try_run_case+0x1a5/0x480 [ 22.404728] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.405232] kthread+0x337/0x6f0 [ 22.405582] ret_from_fork+0x116/0x1d0 [ 22.406065] ret_from_fork_asm+0x1a/0x30 [ 22.406470] [ 22.406711] The buggy address belongs to the object at ffff8881038ee700 [ 22.406711] which belongs to the cache kmalloc-64 of size 64 [ 22.408468] The buggy address is located 0 bytes to the right of [ 22.408468] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 22.409940] [ 22.410151] The buggy address belongs to the physical page: [ 22.410633] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 22.411826] flags: 0x200000000000000(node=0|zone=2) [ 22.412225] page_type: f5(slab) [ 22.412899] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.413785] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.414616] page dumped because: kasan: bad access detected [ 22.415486] [ 22.415728] Memory state around the buggy address: [ 22.416496] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.417362] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.418498] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.419008] ^ [ 22.419475] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.420649] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.421494] ================================================================== [ 22.878406] ================================================================== [ 22.879332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 22.879922] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 22.880565] [ 22.880774] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 22.880911] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.880956] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.881017] Call Trace: [ 22.881060] <TASK> [ 22.881103] dump_stack_lvl+0x73/0xb0 [ 22.881194] print_report+0xd1/0x650 [ 22.881278] ? __virt_addr_valid+0x1db/0x2d0 [ 22.881359] ? kasan_atomics_helper+0xd47/0x5450 [ 22.881433] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.881493] ? kasan_atomics_helper+0xd47/0x5450 [ 22.881570] kasan_report+0x141/0x180 [ 22.881651] ? kasan_atomics_helper+0xd47/0x5450 [ 22.881742] kasan_check_range+0x10c/0x1c0 [ 22.881823] __kasan_check_write+0x18/0x20 [ 22.882071] kasan_atomics_helper+0xd47/0x5450 [ 22.882164] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.882245] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.882341] ? kasan_save_alloc_info+0x3b/0x50 [ 22.882424] ? kasan_atomics+0x152/0x310 [ 22.882512] kasan_atomics+0x1dc/0x310 [ 22.882605] ? __pfx_kasan_atomics+0x10/0x10 [ 22.882685] ? __pfx_read_tsc+0x10/0x10 [ 22.882739] ? ktime_get_ts64+0x86/0x230 [ 22.882820] kunit_try_run_case+0x1a5/0x480 [ 22.882925] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.883007] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.883091] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.883202] ? __kthread_parkme+0x82/0x180 [ 22.883277] ? preempt_count_sub+0x50/0x80 [ 22.883356] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.883440] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.883518] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.883601] kthread+0x337/0x6f0 [ 22.883672] ? trace_preempt_on+0x20/0xc0 [ 22.883748] ? __pfx_kthread+0x10/0x10 [ 22.883819] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.883915] ? calculate_sigpending+0x7b/0xa0 [ 22.883996] ? __pfx_kthread+0x10/0x10 [ 22.884069] ret_from_fork+0x116/0x1d0 [ 22.884138] ? __pfx_kthread+0x10/0x10 [ 22.884212] ret_from_fork_asm+0x1a/0x30 [ 22.884306] </TASK> [ 22.884344] [ 22.899360] Allocated by task 283: [ 22.899640] kasan_save_stack+0x45/0x70 [ 22.900006] kasan_save_track+0x18/0x40 [ 22.900449] kasan_save_alloc_info+0x3b/0x50 [ 22.900913] __kasan_kmalloc+0xb7/0xc0 [ 22.901505] __kmalloc_cache_noprof+0x189/0x420 [ 22.902012] kasan_atomics+0x95/0x310 [ 22.902556] kunit_try_run_case+0x1a5/0x480 [ 22.902919] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.903723] kthread+0x337/0x6f0 [ 22.904113] ret_from_fork+0x116/0x1d0 [ 22.904488] ret_from_fork_asm+0x1a/0x30 [ 22.904848] [ 22.905055] The buggy address belongs to the object at ffff8881038ee700 [ 22.905055] which belongs to the cache kmalloc-64 of size 64 [ 22.905742] The buggy address is located 0 bytes to the right of [ 22.905742] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 22.906749] [ 22.907002] The buggy address belongs to the physical page: [ 22.907892] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 22.909024] flags: 0x200000000000000(node=0|zone=2) [ 22.909535] page_type: f5(slab) [ 22.909864] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.910561] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.911068] page dumped because: kasan: bad access detected [ 22.911574] [ 22.911806] Memory state around the buggy address: [ 22.912381] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.912946] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.913569] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.914152] ^ [ 22.914575] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.915086] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.915718] ================================================================== [ 24.077106] ================================================================== [ 24.077988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 24.078480] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 24.079241] [ 24.079549] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 24.079668] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.079710] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.079771] Call Trace: [ 24.079811] <TASK> [ 24.079854] dump_stack_lvl+0x73/0xb0 [ 24.080029] print_report+0xd1/0x650 [ 24.080156] ? __virt_addr_valid+0x1db/0x2d0 [ 24.080239] ? kasan_atomics_helper+0x1a7f/0x5450 [ 24.080320] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.080401] ? kasan_atomics_helper+0x1a7f/0x5450 [ 24.080481] kasan_report+0x141/0x180 [ 24.080606] ? kasan_atomics_helper+0x1a7f/0x5450 [ 24.080691] kasan_check_range+0x10c/0x1c0 [ 24.080774] __kasan_check_write+0x18/0x20 [ 24.080844] kasan_atomics_helper+0x1a7f/0x5450 [ 24.080940] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.081015] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.081098] ? kasan_save_alloc_info+0x3b/0x50 [ 24.081173] ? kasan_atomics+0x152/0x310 [ 24.081252] kasan_atomics+0x1dc/0x310 [ 24.081328] ? __pfx_kasan_atomics+0x10/0x10 [ 24.081870] ? __pfx_read_tsc+0x10/0x10 [ 24.081970] ? ktime_get_ts64+0x86/0x230 [ 24.082054] kunit_try_run_case+0x1a5/0x480 [ 24.082158] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.082242] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.082337] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.082379] ? __kthread_parkme+0x82/0x180 [ 24.082412] ? preempt_count_sub+0x50/0x80 [ 24.082447] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.082484] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.082521] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.082559] kthread+0x337/0x6f0 [ 24.082587] ? trace_preempt_on+0x20/0xc0 [ 24.082621] ? __pfx_kthread+0x10/0x10 [ 24.082652] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.082686] ? calculate_sigpending+0x7b/0xa0 [ 24.082722] ? __pfx_kthread+0x10/0x10 [ 24.082755] ret_from_fork+0x116/0x1d0 [ 24.082782] ? __pfx_kthread+0x10/0x10 [ 24.082813] ret_from_fork_asm+0x1a/0x30 [ 24.082859] </TASK> [ 24.082896] [ 24.102012] Allocated by task 283: [ 24.102558] kasan_save_stack+0x45/0x70 [ 24.103045] kasan_save_track+0x18/0x40 [ 24.103536] kasan_save_alloc_info+0x3b/0x50 [ 24.103959] __kasan_kmalloc+0xb7/0xc0 [ 24.104283] __kmalloc_cache_noprof+0x189/0x420 [ 24.104937] kasan_atomics+0x95/0x310 [ 24.105356] kunit_try_run_case+0x1a5/0x480 [ 24.105959] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.106888] kthread+0x337/0x6f0 [ 24.107212] ret_from_fork+0x116/0x1d0 [ 24.107525] ret_from_fork_asm+0x1a/0x30 [ 24.107964] [ 24.108315] The buggy address belongs to the object at ffff8881038ee700 [ 24.108315] which belongs to the cache kmalloc-64 of size 64 [ 24.109618] The buggy address is located 0 bytes to the right of [ 24.109618] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 24.111501] [ 24.111698] The buggy address belongs to the physical page: [ 24.112463] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 24.113117] flags: 0x200000000000000(node=0|zone=2) [ 24.113591] page_type: f5(slab) [ 24.113975] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.114896] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.115671] page dumped because: kasan: bad access detected [ 24.116237] [ 24.116608] Memory state around the buggy address: [ 24.117039] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.118038] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.118715] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.119331] ^ [ 24.119521] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.119765] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.120162] ================================================================== [ 23.543130] ================================================================== [ 23.544154] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 23.544798] Read of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 23.545989] [ 23.546293] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 23.546646] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.546672] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.546705] Call Trace: [ 23.546728] <TASK> [ 23.546749] dump_stack_lvl+0x73/0xb0 [ 23.546793] print_report+0xd1/0x650 [ 23.546827] ? __virt_addr_valid+0x1db/0x2d0 [ 23.546859] ? kasan_atomics_helper+0x4eae/0x5450 [ 23.546919] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.546955] ? kasan_atomics_helper+0x4eae/0x5450 [ 23.546988] kasan_report+0x141/0x180 [ 23.547022] ? kasan_atomics_helper+0x4eae/0x5450 [ 23.547060] __asan_report_load8_noabort+0x18/0x20 [ 23.547104] kasan_atomics_helper+0x4eae/0x5450 [ 23.547178] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.547213] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.547249] ? kasan_save_alloc_info+0x3b/0x50 [ 23.547284] ? kasan_atomics+0x152/0x310 [ 23.547322] kasan_atomics+0x1dc/0x310 [ 23.547355] ? __pfx_kasan_atomics+0x10/0x10 [ 23.547393] ? __pfx_read_tsc+0x10/0x10 [ 23.547424] ? ktime_get_ts64+0x86/0x230 [ 23.547459] kunit_try_run_case+0x1a5/0x480 [ 23.547495] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.547530] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.547565] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.547600] ? __kthread_parkme+0x82/0x180 [ 23.547630] ? preempt_count_sub+0x50/0x80 [ 23.547663] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.547700] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.547735] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.547771] kthread+0x337/0x6f0 [ 23.547801] ? trace_preempt_on+0x20/0xc0 [ 23.547835] ? __pfx_kthread+0x10/0x10 [ 23.547865] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.547928] ? calculate_sigpending+0x7b/0xa0 [ 23.547965] ? __pfx_kthread+0x10/0x10 [ 23.547998] ret_from_fork+0x116/0x1d0 [ 23.548026] ? __pfx_kthread+0x10/0x10 [ 23.548056] ret_from_fork_asm+0x1a/0x30 [ 23.548104] </TASK> [ 23.548139] [ 23.568721] Allocated by task 283: [ 23.569102] kasan_save_stack+0x45/0x70 [ 23.569992] kasan_save_track+0x18/0x40 [ 23.570556] kasan_save_alloc_info+0x3b/0x50 [ 23.571166] __kasan_kmalloc+0xb7/0xc0 [ 23.571725] __kmalloc_cache_noprof+0x189/0x420 [ 23.572398] kasan_atomics+0x95/0x310 [ 23.572976] kunit_try_run_case+0x1a5/0x480 [ 23.573538] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.574037] kthread+0x337/0x6f0 [ 23.574768] ret_from_fork+0x116/0x1d0 [ 23.575428] ret_from_fork_asm+0x1a/0x30 [ 23.576034] [ 23.576260] The buggy address belongs to the object at ffff8881038ee700 [ 23.576260] which belongs to the cache kmalloc-64 of size 64 [ 23.577113] The buggy address is located 0 bytes to the right of [ 23.577113] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 23.578534] [ 23.579062] The buggy address belongs to the physical page: [ 23.579530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 23.580446] flags: 0x200000000000000(node=0|zone=2) [ 23.581065] page_type: f5(slab) [ 23.581557] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.582392] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.583174] page dumped because: kasan: bad access detected [ 23.583826] [ 23.584256] Memory state around the buggy address: [ 23.584891] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.585810] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.586357] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.587145] ^ [ 23.587689] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.588332] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.588849] ================================================================== [ 23.669306] ================================================================== [ 23.670722] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 23.671533] Write of size 8 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 23.673152] [ 23.673426] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 23.673493] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.673513] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.673545] Call Trace: [ 23.673566] <TASK> [ 23.673585] dump_stack_lvl+0x73/0xb0 [ 23.673631] print_report+0xd1/0x650 [ 23.673664] ? __virt_addr_valid+0x1db/0x2d0 [ 23.673695] ? kasan_atomics_helper+0x151d/0x5450 [ 23.673728] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.673760] ? kasan_atomics_helper+0x151d/0x5450 [ 23.673791] kasan_report+0x141/0x180 [ 23.673824] ? kasan_atomics_helper+0x151d/0x5450 [ 23.673861] kasan_check_range+0x10c/0x1c0 [ 23.673950] __kasan_check_write+0x18/0x20 [ 23.674024] kasan_atomics_helper+0x151d/0x5450 [ 23.674146] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.674256] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.674326] ? kasan_save_alloc_info+0x3b/0x50 [ 23.674367] ? kasan_atomics+0x152/0x310 [ 23.674406] kasan_atomics+0x1dc/0x310 [ 23.674440] ? __pfx_kasan_atomics+0x10/0x10 [ 23.674476] ? __pfx_read_tsc+0x10/0x10 [ 23.674506] ? ktime_get_ts64+0x86/0x230 [ 23.674543] kunit_try_run_case+0x1a5/0x480 [ 23.674579] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.674616] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.674651] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.674687] ? __kthread_parkme+0x82/0x180 [ 23.674716] ? preempt_count_sub+0x50/0x80 [ 23.674749] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.674786] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.674821] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.674855] kthread+0x337/0x6f0 [ 23.674917] ? trace_preempt_on+0x20/0xc0 [ 23.674960] ? __pfx_kthread+0x10/0x10 [ 23.675009] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.675048] ? calculate_sigpending+0x7b/0xa0 [ 23.675084] ? __pfx_kthread+0x10/0x10 [ 23.675181] ret_from_fork+0x116/0x1d0 [ 23.675215] ? __pfx_kthread+0x10/0x10 [ 23.675247] ret_from_fork_asm+0x1a/0x30 [ 23.675289] </TASK> [ 23.675306] [ 23.696933] Allocated by task 283: [ 23.697568] kasan_save_stack+0x45/0x70 [ 23.697976] kasan_save_track+0x18/0x40 [ 23.698500] kasan_save_alloc_info+0x3b/0x50 [ 23.699298] __kasan_kmalloc+0xb7/0xc0 [ 23.699855] __kmalloc_cache_noprof+0x189/0x420 [ 23.700079] kasan_atomics+0x95/0x310 [ 23.700841] kunit_try_run_case+0x1a5/0x480 [ 23.701235] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.701629] kthread+0x337/0x6f0 [ 23.701907] ret_from_fork+0x116/0x1d0 [ 23.702075] ret_from_fork_asm+0x1a/0x30 [ 23.702778] [ 23.703151] The buggy address belongs to the object at ffff8881038ee700 [ 23.703151] which belongs to the cache kmalloc-64 of size 64 [ 23.704631] The buggy address is located 0 bytes to the right of [ 23.704631] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 23.705654] [ 23.706491] The buggy address belongs to the physical page: [ 23.706916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 23.707600] flags: 0x200000000000000(node=0|zone=2) [ 23.708021] page_type: f5(slab) [ 23.708741] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.709252] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.710086] page dumped because: kasan: bad access detected [ 23.710651] [ 23.710902] Memory state around the buggy address: [ 23.711789] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.712578] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.713352] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.714045] ^ [ 23.714587] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.715242] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.715809] ================================================================== [ 22.840935] ================================================================== [ 22.842376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 22.843416] Read of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 22.844221] [ 22.844491] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 22.844654] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.844698] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.844757] Call Trace: [ 22.844803] <TASK> [ 22.844846] dump_stack_lvl+0x73/0xb0 [ 22.844996] print_report+0xd1/0x650 [ 22.845078] ? __virt_addr_valid+0x1db/0x2d0 [ 22.845223] ? kasan_atomics_helper+0x4a84/0x5450 [ 22.845323] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.845406] ? kasan_atomics_helper+0x4a84/0x5450 [ 22.845482] kasan_report+0x141/0x180 [ 22.845521] ? kasan_atomics_helper+0x4a84/0x5450 [ 22.845562] __asan_report_load4_noabort+0x18/0x20 [ 22.845599] kasan_atomics_helper+0x4a84/0x5450 [ 22.845633] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 22.845666] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.845702] ? kasan_save_alloc_info+0x3b/0x50 [ 22.845736] ? kasan_atomics+0x152/0x310 [ 22.845774] kasan_atomics+0x1dc/0x310 [ 22.845807] ? __pfx_kasan_atomics+0x10/0x10 [ 22.845843] ? __pfx_read_tsc+0x10/0x10 [ 22.845894] ? ktime_get_ts64+0x86/0x230 [ 22.845939] kunit_try_run_case+0x1a5/0x480 [ 22.845978] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.846015] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.846052] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.846087] ? __kthread_parkme+0x82/0x180 [ 22.846176] ? preempt_count_sub+0x50/0x80 [ 22.846212] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.846250] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.846301] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.846337] kthread+0x337/0x6f0 [ 22.846367] ? trace_preempt_on+0x20/0xc0 [ 22.846400] ? __pfx_kthread+0x10/0x10 [ 22.846430] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.846463] ? calculate_sigpending+0x7b/0xa0 [ 22.846498] ? __pfx_kthread+0x10/0x10 [ 22.846529] ret_from_fork+0x116/0x1d0 [ 22.846556] ? __pfx_kthread+0x10/0x10 [ 22.846586] ret_from_fork_asm+0x1a/0x30 [ 22.846628] </TASK> [ 22.846644] [ 22.861788] Allocated by task 283: [ 22.862105] kasan_save_stack+0x45/0x70 [ 22.862452] kasan_save_track+0x18/0x40 [ 22.862779] kasan_save_alloc_info+0x3b/0x50 [ 22.863272] __kasan_kmalloc+0xb7/0xc0 [ 22.863706] __kmalloc_cache_noprof+0x189/0x420 [ 22.864312] kasan_atomics+0x95/0x310 [ 22.864744] kunit_try_run_case+0x1a5/0x480 [ 22.865109] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.865640] kthread+0x337/0x6f0 [ 22.866040] ret_from_fork+0x116/0x1d0 [ 22.866481] ret_from_fork_asm+0x1a/0x30 [ 22.866870] [ 22.867157] The buggy address belongs to the object at ffff8881038ee700 [ 22.867157] which belongs to the cache kmalloc-64 of size 64 [ 22.868008] The buggy address is located 0 bytes to the right of [ 22.868008] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 22.868825] [ 22.869082] The buggy address belongs to the physical page: [ 22.869585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 22.870434] flags: 0x200000000000000(node=0|zone=2) [ 22.870934] page_type: f5(slab) [ 22.871314] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 22.871811] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.872302] page dumped because: kasan: bad access detected [ 22.872674] [ 22.872860] Memory state around the buggy address: [ 22.873323] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.874002] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.874652] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.875769] ^ [ 22.876264] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.876718] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.877466] ================================================================== [ 23.228745] ================================================================== [ 23.229965] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 23.230486] Write of size 4 at addr ffff8881038ee730 by task kunit_try_catch/283 [ 23.231911] [ 23.232325] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 23.232390] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.232410] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.232440] Call Trace: [ 23.232460] <TASK> [ 23.232479] dump_stack_lvl+0x73/0xb0 [ 23.232522] print_report+0xd1/0x650 [ 23.232556] ? __virt_addr_valid+0x1db/0x2d0 [ 23.232590] ? kasan_atomics_helper+0x1148/0x5450 [ 23.232620] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.232654] ? kasan_atomics_helper+0x1148/0x5450 [ 23.232687] kasan_report+0x141/0x180 [ 23.232719] ? kasan_atomics_helper+0x1148/0x5450 [ 23.232757] kasan_check_range+0x10c/0x1c0 [ 23.232794] __kasan_check_write+0x18/0x20 [ 23.232824] kasan_atomics_helper+0x1148/0x5450 [ 23.232858] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 23.232943] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.233027] ? kasan_save_alloc_info+0x3b/0x50 [ 23.233090] ? kasan_atomics+0x152/0x310 [ 23.233330] kasan_atomics+0x1dc/0x310 [ 23.233479] ? __pfx_kasan_atomics+0x10/0x10 [ 23.233541] ? __pfx_read_tsc+0x10/0x10 [ 23.233577] ? ktime_get_ts64+0x86/0x230 [ 23.233615] kunit_try_run_case+0x1a5/0x480 [ 23.233652] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.233688] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.233723] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.233759] ? __kthread_parkme+0x82/0x180 [ 23.233789] ? preempt_count_sub+0x50/0x80 [ 23.233821] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.233858] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.233921] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.233960] kthread+0x337/0x6f0 [ 23.233990] ? trace_preempt_on+0x20/0xc0 [ 23.234024] ? __pfx_kthread+0x10/0x10 [ 23.234054] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.234087] ? calculate_sigpending+0x7b/0xa0 [ 23.234153] ? __pfx_kthread+0x10/0x10 [ 23.234188] ret_from_fork+0x116/0x1d0 [ 23.234216] ? __pfx_kthread+0x10/0x10 [ 23.234247] ret_from_fork_asm+0x1a/0x30 [ 23.234303] </TASK> [ 23.234320] [ 23.250155] Allocated by task 283: [ 23.250458] kasan_save_stack+0x45/0x70 [ 23.250789] kasan_save_track+0x18/0x40 [ 23.254595] kasan_save_alloc_info+0x3b/0x50 [ 23.254973] __kasan_kmalloc+0xb7/0xc0 [ 23.255417] __kmalloc_cache_noprof+0x189/0x420 [ 23.255867] kasan_atomics+0x95/0x310 [ 23.256279] kunit_try_run_case+0x1a5/0x480 [ 23.256717] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.257668] kthread+0x337/0x6f0 [ 23.257961] ret_from_fork+0x116/0x1d0 [ 23.258719] ret_from_fork_asm+0x1a/0x30 [ 23.259110] [ 23.259731] The buggy address belongs to the object at ffff8881038ee700 [ 23.259731] which belongs to the cache kmalloc-64 of size 64 [ 23.260572] The buggy address is located 0 bytes to the right of [ 23.260572] allocated 48-byte region [ffff8881038ee700, ffff8881038ee730) [ 23.262034] [ 23.262671] The buggy address belongs to the physical page: [ 23.263111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ee [ 23.263827] flags: 0x200000000000000(node=0|zone=2) [ 23.264499] page_type: f5(slab) [ 23.264870] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 23.265802] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.266445] page dumped because: kasan: bad access detected [ 23.266854] [ 23.267418] Memory state around the buggy address: [ 23.267746] ffff8881038ee600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.268830] ffff8881038ee680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.269306] >ffff8881038ee700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.270091] ^ [ 23.270546] ffff8881038ee780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.271141] ffff8881038ee800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.272040] ==================================================================