Date
July 3, 2025, 11:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 23.095635] ================================================================== [ 23.095799] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 23.095932] Read of size 4 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.096214] [ 23.096302] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 23.096467] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.096859] Hardware name: linux,dummy-virt (DT) [ 23.096946] Call trace: [ 23.096998] show_stack+0x20/0x38 (C) [ 23.097261] dump_stack_lvl+0x8c/0xd0 [ 23.097388] print_report+0x118/0x608 [ 23.097490] kasan_report+0xdc/0x128 [ 23.097692] __asan_report_load4_noabort+0x20/0x30 [ 23.097816] kasan_atomics_helper+0x42d8/0x4858 [ 23.097942] kasan_atomics+0x198/0x2e0 [ 23.098091] kunit_try_run_case+0x170/0x3f0 [ 23.098204] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.098326] kthread+0x328/0x630 [ 23.098428] ret_from_fork+0x10/0x20 [ 23.098548] [ 23.098608] Allocated by task 265: [ 23.098670] kasan_save_stack+0x3c/0x68 [ 23.098745] kasan_save_track+0x20/0x40 [ 23.098957] kasan_save_alloc_info+0x40/0x58 [ 23.099067] __kasan_kmalloc+0xd4/0xd8 [ 23.099359] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.099412] kasan_atomics+0xb8/0x2e0 [ 23.099451] kunit_try_run_case+0x170/0x3f0 [ 23.099497] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.099558] kthread+0x328/0x630 [ 23.099593] ret_from_fork+0x10/0x20 [ 23.099631] [ 23.099654] The buggy address belongs to the object at fff00000c659e300 [ 23.099654] which belongs to the cache kmalloc-64 of size 64 [ 23.099717] The buggy address is located 0 bytes to the right of [ 23.099717] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.099781] [ 23.099806] The buggy address belongs to the physical page: [ 23.099840] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.099896] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.099950] page_type: f5(slab) [ 23.100146] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.100850] ^ [ 23.102050] [ 23.102559] Call trace: [ 23.102612] show_stack+0x20/0x38 (C) [ 23.102705] dump_stack_lvl+0x8c/0xd0 [ 23.102795] print_report+0x118/0x608 [ 23.102898] kasan_report+0xdc/0x128 [ 23.103003] kasan_check_range+0x100/0x1a8 [ 23.104219] __kasan_check_write+0x20/0x30 [ 23.104461] kasan_atomics_helper+0x934/0x4858 [ 23.104661] kasan_atomics+0x198/0x2e0 [ 23.105068] kunit_try_run_case+0x170/0x3f0 [ 23.105294] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.105416] kthread+0x328/0x630 [ 23.105729] ret_from_fork+0x10/0x20 [ 23.105900] [ 23.106073] Allocated by task 265: [ 23.106184] kasan_save_stack+0x3c/0x68 [ 23.106292] kasan_save_track+0x20/0x40 [ 23.106364] kasan_save_alloc_info+0x40/0x58 [ 23.106880] __kasan_kmalloc+0xd4/0xd8 [ 23.106995] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.107116] kasan_atomics+0xb8/0x2e0 [ 23.107207] kunit_try_run_case+0x170/0x3f0 [ 23.107325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.107435] kthread+0x328/0x630 [ 23.107684] ret_from_fork+0x10/0x20 [ 23.107913] [ 23.108123] The buggy address belongs to the object at fff00000c659e300 [ 23.108123] which belongs to the cache kmalloc-64 of size 64 [ 23.108250] The buggy address is located 0 bytes to the right of [ 23.108250] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.108534] [ 23.108614] The buggy address belongs to the physical page: [ 23.108721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.108869] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.109032] page_type: f5(slab) [ 23.109136] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.109317] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.109459] page dumped because: kasan: bad access detected [ 23.109536] [ 23.109580] Memory state around the buggy address: [ 23.109668] fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.109755] fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.109852] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.109952] ^ [ 23.110392] fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.110619] fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.110700] ================================================================== [ 23.306618] ================================================================== [ 23.306727] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 23.306838] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.306940] [ 23.307000] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 23.307191] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.307256] Hardware name: linux,dummy-virt (DT) [ 23.307325] Call trace: [ 23.307383] show_stack+0x20/0x38 (C) [ 23.307495] dump_stack_lvl+0x8c/0xd0 [ 23.307601] print_report+0x118/0x608 [ 23.307708] kasan_report+0xdc/0x128 [ 23.307812] kasan_check_range+0x100/0x1a8 [ 23.307927] __kasan_check_write+0x20/0x30 [ 23.308048] kasan_atomics_helper+0xff0/0x4858 [ 23.308149] kasan_atomics+0x198/0x2e0 [ 23.308242] kunit_try_run_case+0x170/0x3f0 [ 23.308329] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.308444] kthread+0x328/0x630 [ 23.308559] ret_from_fork+0x10/0x20 [ 23.308666] [ 23.308716] Allocated by task 265: [ 23.308784] kasan_save_stack+0x3c/0x68 [ 23.308872] kasan_save_track+0x20/0x40 [ 23.308959] kasan_save_alloc_info+0x40/0x58 [ 23.309063] __kasan_kmalloc+0xd4/0xd8 [ 23.309150] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.309251] kasan_atomics+0xb8/0x2e0 [ 23.309348] kunit_try_run_case+0x170/0x3f0 [ 23.309426] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.309517] kthread+0x328/0x630 [ 23.309586] ret_from_fork+0x10/0x20 [ 23.309667] [ 23.309721] The buggy address belongs to the object at fff00000c659e300 [ 23.309721] which belongs to the cache kmalloc-64 of size 64 [ 23.309922] The buggy address is located 0 bytes to the right of [ 23.309922] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.310153] [ 23.310203] The buggy address belongs to the physical page: [ 23.310309] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.310433] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.310530] page_type: f5(slab) [ 23.310603] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.311121] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.311224] page dumped because: kasan: bad access detected [ 23.311303] [ 23.311351] Memory state around the buggy address: [ 23.311429] fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.311543] fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.311638] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.311797] ^ [ 23.311877] fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.311976] fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.312078] ================================================================== [ 23.460652] ================================================================== [ 23.460776] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 23.460918] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.461060] [ 23.461132] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 23.461340] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.461408] Hardware name: linux,dummy-virt (DT) [ 23.461487] Call trace: [ 23.461535] show_stack+0x20/0x38 (C) [ 23.461648] dump_stack_lvl+0x8c/0xd0 [ 23.461794] print_report+0x118/0x608 [ 23.462018] kasan_report+0xdc/0x128 [ 23.462173] kasan_check_range+0x100/0x1a8 [ 23.462305] __kasan_check_write+0x20/0x30 [ 23.462467] kasan_atomics_helper+0x16d0/0x4858 [ 23.462631] kasan_atomics+0x198/0x2e0 [ 23.462756] kunit_try_run_case+0x170/0x3f0 [ 23.462845] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.462979] kthread+0x328/0x630 [ 23.463099] ret_from_fork+0x10/0x20 [ 23.463201] [ 23.463257] Allocated by task 265: [ 23.463316] kasan_save_stack+0x3c/0x68 [ 23.463407] kasan_save_track+0x20/0x40 [ 23.463489] kasan_save_alloc_info+0x40/0x58 [ 23.463636] __kasan_kmalloc+0xd4/0xd8 [ 23.463799] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.463936] kasan_atomics+0xb8/0x2e0 [ 23.464039] kunit_try_run_case+0x170/0x3f0 [ 23.464138] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.464249] kthread+0x328/0x630 [ 23.464367] ret_from_fork+0x10/0x20 [ 23.464493] [ 23.464550] The buggy address belongs to the object at fff00000c659e300 [ 23.464550] which belongs to the cache kmalloc-64 of size 64 [ 23.464699] The buggy address is located 0 bytes to the right of [ 23.464699] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.464861] [ 23.464918] The buggy address belongs to the physical page: [ 23.465035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.465244] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.465362] page_type: f5(slab) [ 23.465449] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.465589] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.465748] page dumped because: kasan: bad access detected [ 23.465828] [ 23.465878] Memory state around the buggy address: [ 23.465967] fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.466079] fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.466185] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.466285] ^ [ 23.466483] fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.466589] fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.466684] ================================================================== [ 23.353482] ================================================================== [ 23.353591] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 23.353697] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.353805] [ 23.353877] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 23.354082] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.354148] Hardware name: linux,dummy-virt (DT) [ 23.354217] Call trace: [ 23.354278] show_stack+0x20/0x38 (C) [ 23.354379] dump_stack_lvl+0x8c/0xd0 [ 23.354491] print_report+0x118/0x608 [ 23.354599] kasan_report+0xdc/0x128 [ 23.354700] kasan_check_range+0x100/0x1a8 [ 23.354808] __kasan_check_write+0x20/0x30 [ 23.354910] kasan_atomics_helper+0x126c/0x4858 [ 23.355037] kasan_atomics+0x198/0x2e0 [ 23.356239] kunit_try_run_case+0x170/0x3f0 [ 23.356672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.356833] kthread+0x328/0x630 [ 23.356937] ret_from_fork+0x10/0x20 [ 23.357294] [ 23.357352] Allocated by task 265: [ 23.357444] kasan_save_stack+0x3c/0x68 [ 23.357549] kasan_save_track+0x20/0x40 [ 23.357639] kasan_save_alloc_info+0x40/0x58 [ 23.357759] __kasan_kmalloc+0xd4/0xd8 [ 23.357918] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.358090] kasan_atomics+0xb8/0x2e0 [ 23.358186] kunit_try_run_case+0x170/0x3f0 [ 23.358313] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.358426] kthread+0x328/0x630 [ 23.358533] ret_from_fork+0x10/0x20 [ 23.358610] [ 23.358652] The buggy address belongs to the object at fff00000c659e300 [ 23.358652] which belongs to the cache kmalloc-64 of size 64 [ 23.358792] The buggy address is located 0 bytes to the right of [ 23.358792] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.358930] [ 23.358979] The buggy address belongs to the physical page: [ 23.359122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.359263] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.359368] page_type: f5(slab) [ 23.359452] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.359599] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.359753] page dumped because: kasan: bad access detected [ 23.359865] [ 23.359911] Memory state around the buggy address: [ 23.360217] fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.360347] fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.360465] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.360570] ^ [ 23.360661] fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.360768] fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.360867] ================================================================== [ 23.467327] ================================================================== [ 23.467442] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 23.467542] Read of size 8 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.467639] [ 23.467695] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 23.467867] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.467928] Hardware name: linux,dummy-virt (DT) [ 23.468006] Call trace: [ 23.468077] show_stack+0x20/0x38 (C) [ 23.468192] dump_stack_lvl+0x8c/0xd0 [ 23.468302] print_report+0x118/0x608 [ 23.468413] kasan_report+0xdc/0x128 [ 23.468537] __asan_report_load8_noabort+0x20/0x30 [ 23.468659] kasan_atomics_helper+0x3e10/0x4858 [ 23.468784] kasan_atomics+0x198/0x2e0 [ 23.468895] kunit_try_run_case+0x170/0x3f0 [ 23.469013] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.470529] kthread+0x328/0x630 [ 23.470660] ret_from_fork+0x10/0x20 [ 23.470870] [ 23.470926] Allocated by task 265: [ 23.471326] kasan_save_stack+0x3c/0x68 [ 23.471419] kasan_save_track+0x20/0x40 [ 23.471895] kasan_save_alloc_info+0x40/0x58 [ 23.471990] __kasan_kmalloc+0xd4/0xd8 [ 23.472123] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.472351] kasan_atomics+0xb8/0x2e0 [ 23.472444] kunit_try_run_case+0x170/0x3f0 [ 23.472583] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.472704] kthread+0x328/0x630 [ 23.472889] ret_from_fork+0x10/0x20 [ 23.472989] [ 23.473052] The buggy address belongs to the object at fff00000c659e300 [ 23.473052] which belongs to the cache kmalloc-64 of size 64 [ 23.473184] The buggy address is located 0 bytes to the right of [ 23.473184] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.473338] [ 23.473391] The buggy address belongs to the physical page: [ 23.473465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.473589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.473760] page_type: f5(slab) [ 23.473837] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.473966] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.474081] page dumped because: kasan: bad access detected [ 23.474160] [ 23.474208] Memory state around the buggy address: [ 23.474279] fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.474369] fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.474518] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.474607] ^ [ 23.474717] fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.474828] fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.474923] ================================================================== [ 23.312549] ================================================================== [ 23.312679] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 23.312784] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.312896] [ 23.312961] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 23.313216] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.313304] Hardware name: linux,dummy-virt (DT) [ 23.313391] Call trace: [ 23.313467] show_stack+0x20/0x38 (C) [ 23.313580] dump_stack_lvl+0x8c/0xd0 [ 23.313764] print_report+0x118/0x608 [ 23.313869] kasan_report+0xdc/0x128 [ 23.313983] kasan_check_range+0x100/0x1a8 [ 23.314115] __kasan_check_write+0x20/0x30 [ 23.314256] kasan_atomics_helper+0x1058/0x4858 [ 23.314362] kasan_atomics+0x198/0x2e0 [ 23.314472] kunit_try_run_case+0x170/0x3f0 [ 23.314593] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.314749] kthread+0x328/0x630 [ 23.314866] ret_from_fork+0x10/0x20 [ 23.314959] [ 23.315004] Allocated by task 265: [ 23.315078] kasan_save_stack+0x3c/0x68 [ 23.315155] kasan_save_track+0x20/0x40 [ 23.315226] kasan_save_alloc_info+0x40/0x58 [ 23.315305] __kasan_kmalloc+0xd4/0xd8 [ 23.315384] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.315500] kasan_atomics+0xb8/0x2e0 [ 23.315569] kunit_try_run_case+0x170/0x3f0 [ 23.315718] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.315820] kthread+0x328/0x630 [ 23.315888] ret_from_fork+0x10/0x20 [ 23.315972] [ 23.316035] The buggy address belongs to the object at fff00000c659e300 [ 23.316035] which belongs to the cache kmalloc-64 of size 64 [ 23.316179] The buggy address is located 0 bytes to the right of [ 23.316179] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.316332] [ 23.316379] The buggy address belongs to the physical page: [ 23.316452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.316596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.316706] page_type: f5(slab) [ 23.316788] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.316903] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.317004] page dumped because: kasan: bad access detected [ 23.317096] [ 23.317143] Memory state around the buggy address: [ 23.317225] fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.317316] fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.317436] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.317546] ^ [ 23.317620] fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.317743] fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.317872] ================================================================== [ 23.452253] ================================================================== [ 23.452398] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 23.452531] Read of size 8 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.452725] [ 23.453109] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 23.453419] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.453491] Hardware name: linux,dummy-virt (DT) [ 23.454595] Call trace: [ 23.455056] show_stack+0x20/0x38 (C) [ 23.455305] dump_stack_lvl+0x8c/0xd0 [ 23.455469] print_report+0x118/0x608 [ 23.455634] kasan_report+0xdc/0x128 [ 23.455771] __asan_report_load8_noabort+0x20/0x30 [ 23.455898] kasan_atomics_helper+0x3df4/0x4858 [ 23.456087] kasan_atomics+0x198/0x2e0 [ 23.456227] kunit_try_run_case+0x170/0x3f0 [ 23.456343] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.456476] kthread+0x328/0x630 [ 23.456597] ret_from_fork+0x10/0x20 [ 23.456720] [ 23.456800] Allocated by task 265: [ 23.456898] kasan_save_stack+0x3c/0x68 [ 23.457009] kasan_save_track+0x20/0x40 [ 23.457102] kasan_save_alloc_info+0x40/0x58 [ 23.457199] __kasan_kmalloc+0xd4/0xd8 [ 23.457292] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.457387] kasan_atomics+0xb8/0x2e0 [ 23.457462] kunit_try_run_case+0x170/0x3f0 [ 23.457548] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.457657] kthread+0x328/0x630 [ 23.457759] ret_from_fork+0x10/0x20 [ 23.457917] [ 23.457970] The buggy address belongs to the object at fff00000c659e300 [ 23.457970] which belongs to the cache kmalloc-64 of size 64 [ 23.458134] The buggy address is located 0 bytes to the right of [ 23.458134] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.458277] [ 23.458325] The buggy address belongs to the physical page: [ 23.458419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.458574] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.458730] page_type: f5(slab) [ 23.458812] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.458978] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.459084] page dumped because: kasan: bad access detected [ 23.459157] [ 23.459295] Memory state around the buggy address: [ 23.459374] fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.459482] fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.459598] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.459686] ^ [ 23.459767] fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.459873] fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.460010] ================================================================== [ 23.278096] ================================================================== [ 23.278377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 23.278689] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.278829] [ 23.278900] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 23.279094] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.279163] Hardware name: linux,dummy-virt (DT) [ 23.279233] Call trace: [ 23.279285] show_stack+0x20/0x38 (C) [ 23.279392] dump_stack_lvl+0x8c/0xd0 [ 23.279497] print_report+0x118/0x608 [ 23.279584] kasan_report+0xdc/0x128 [ 23.279672] __asan_report_store8_noabort+0x20/0x30 [ 23.279780] kasan_atomics_helper+0x3e5c/0x4858 [ 23.279885] kasan_atomics+0x198/0x2e0 [ 23.279995] kunit_try_run_case+0x170/0x3f0 [ 23.280123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.280247] kthread+0x328/0x630 [ 23.280348] ret_from_fork+0x10/0x20 [ 23.280454] [ 23.280512] Allocated by task 265: [ 23.280588] kasan_save_stack+0x3c/0x68 [ 23.280682] kasan_save_track+0x20/0x40 [ 23.280770] kasan_save_alloc_info+0x40/0x58 [ 23.280857] __kasan_kmalloc+0xd4/0xd8 [ 23.280944] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.281823] kasan_atomics+0xb8/0x2e0 [ 23.281940] kunit_try_run_case+0x170/0x3f0 [ 23.282488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.283010] kthread+0x328/0x630 [ 23.283112] ret_from_fork+0x10/0x20 [ 23.283415] [ 23.283563] The buggy address belongs to the object at fff00000c659e300 [ 23.283563] which belongs to the cache kmalloc-64 of size 64 [ 23.283853] The buggy address is located 0 bytes to the right of [ 23.283853] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.284228] [ 23.284328] The buggy address belongs to the physical page: [ 23.284416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.284553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.284675] page_type: f5(slab) [ 23.285081] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.285214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.285798] page dumped because: kasan: bad access detected [ 23.285889] [ 23.285947] Memory state around the buggy address: [ 23.286046] fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.286477] fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.286740] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.286873] ^ [ 23.286941] fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.287034] fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.287117] ================================================================== [ 23.475418] ================================================================== [ 23.475625] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 23.475797] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.475911] [ 23.475971] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 23.476180] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.476239] Hardware name: linux,dummy-virt (DT) [ 23.476304] Call trace: [ 23.476356] show_stack+0x20/0x38 (C) [ 23.476534] dump_stack_lvl+0x8c/0xd0 [ 23.476656] print_report+0x118/0x608 [ 23.476752] kasan_report+0xdc/0x128 [ 23.476862] kasan_check_range+0x100/0x1a8 [ 23.477005] __kasan_check_write+0x20/0x30 [ 23.477176] kasan_atomics_helper+0x175c/0x4858 [ 23.477351] kasan_atomics+0x198/0x2e0 [ 23.477499] kunit_try_run_case+0x170/0x3f0 [ 23.477652] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.477808] kthread+0x328/0x630 [ 23.478143] ret_from_fork+0x10/0x20 [ 23.478397] [ 23.478753] Allocated by task 265: [ 23.478873] kasan_save_stack+0x3c/0x68 [ 23.479044] kasan_save_track+0x20/0x40 [ 23.479197] kasan_save_alloc_info+0x40/0x58 [ 23.479498] __kasan_kmalloc+0xd4/0xd8 [ 23.479862] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.480161] kasan_atomics+0xb8/0x2e0 [ 23.480211] kunit_try_run_case+0x170/0x3f0 [ 23.480252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.480307] kthread+0x328/0x630 [ 23.480371] ret_from_fork+0x10/0x20 [ 23.480494] [ 23.480556] The buggy address belongs to the object at fff00000c659e300 [ 23.480556] which belongs to the cache kmalloc-64 of size 64 [ 23.480887] The buggy address is located 0 bytes to the right of [ 23.480887] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.481410] [ 23.481466] The buggy address belongs to the physical page: [ 23.481739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.481991] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.482112] page_type: f5(slab) [ 23.482199] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.482316] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.482397] page dumped because: kasan: bad access detected [ 23.483175] [ 23.483792] Memory state around the buggy address: [ 23.483907] fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.484009] fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.484107] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.484181] ^ [ 23.484255] fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.484347] fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.484423] ================================================================== [ 23.239180] ================================================================== [ 23.239467] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 23.239586] Read of size 4 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.239806] [ 23.239912] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 23.240133] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.240194] Hardware name: linux,dummy-virt (DT) [ 23.240306] Call trace: [ 23.240441] show_stack+0x20/0x38 (C) [ 23.240565] dump_stack_lvl+0x8c/0xd0 [ 23.240684] print_report+0x118/0x608 [ 23.240792] kasan_report+0xdc/0x128 [ 23.241322] __asan_report_load4_noabort+0x20/0x30 [ 23.241464] kasan_atomics_helper+0x3dd8/0x4858 [ 23.241571] kasan_atomics+0x198/0x2e0 [ 23.241744] kunit_try_run_case+0x170/0x3f0 [ 23.241861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.242041] kthread+0x328/0x630 [ 23.242144] ret_from_fork+0x10/0x20 [ 23.242256] [ 23.242303] Allocated by task 265: [ 23.242374] kasan_save_stack+0x3c/0x68 [ 23.242479] kasan_save_track+0x20/0x40 [ 23.242546] kasan_save_alloc_info+0x40/0x58 [ 23.242638] __kasan_kmalloc+0xd4/0xd8 [ 23.242709] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.242814] kasan_atomics+0xb8/0x2e0 [ 23.242885] kunit_try_run_case+0x170/0x3f0 [ 23.242964] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.243073] kthread+0x328/0x630 [ 23.243149] ret_from_fork+0x10/0x20 [ 23.243225] [ 23.243284] The buggy address belongs to the object at fff00000c659e300 [ 23.243284] which belongs to the cache kmalloc-64 of size 64 [ 23.243418] The buggy address is located 0 bytes to the right of [ 23.243418] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.243570] [ 23.243615] The buggy address belongs to the physical page: [ 23.243683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.243807] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.243908] page_type: f5(slab) [ 23.244001] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.244209] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.244347] page dumped because: kasan: bad access detected [ 23.244457] [ 23.244540] Memory state around the buggy address: [ 23.244658] fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.244766] fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.244877] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.244995] ^ [ 23.245102] fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.245215] fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.245316] ================================================================== [ 23.338062] ================================================================== [ 23.338179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 23.338510] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.338642] [ 23.338709] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 23.338892] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.338959] Hardware name: linux,dummy-virt (DT) [ 23.339052] Call trace: [ 23.339271] show_stack+0x20/0x38 (C) [ 23.339390] dump_stack_lvl+0x8c/0xd0 [ 23.339529] print_report+0x118/0x608 [ 23.339645] kasan_report+0xdc/0x128 [ 23.339751] kasan_check_range+0x100/0x1a8 [ 23.339862] __kasan_check_write+0x20/0x30 [ 23.339973] kasan_atomics_helper+0x1190/0x4858 [ 23.340924] kasan_atomics+0x198/0x2e0 [ 23.341101] kunit_try_run_case+0x170/0x3f0 [ 23.342098] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.342283] kthread+0x328/0x630 [ 23.342449] ret_from_fork+0x10/0x20 [ 23.342546] [ 23.342647] Allocated by task 265: [ 23.342713] kasan_save_stack+0x3c/0x68 [ 23.342799] kasan_save_track+0x20/0x40 [ 23.342873] kasan_save_alloc_info+0x40/0x58 [ 23.342959] __kasan_kmalloc+0xd4/0xd8 [ 23.343304] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.343447] kasan_atomics+0xb8/0x2e0 [ 23.343560] kunit_try_run_case+0x170/0x3f0 [ 23.343715] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.343820] kthread+0x328/0x630 [ 23.343925] ret_from_fork+0x10/0x20 [ 23.344050] [ 23.344118] The buggy address belongs to the object at fff00000c659e300 [ 23.344118] which belongs to the cache kmalloc-64 of size 64 [ 23.344302] The buggy address is located 0 bytes to the right of [ 23.344302] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.344440] [ 23.344514] The buggy address belongs to the physical page: [ 23.344632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.344792] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.344971] page_type: f5(slab) [ 23.345086] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.345204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.345313] page dumped because: kasan: bad access detected [ 23.345387] [ 23.345664] Memory state around the buggy address: [ 23.345910] fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.346014] fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.346122] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.346203] ^ [ 23.346420] fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.346530] fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.346649] ================================================================== [ 23.318955] ================================================================== [ 23.319089] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 23.319201] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.319313] [ 23.319385] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 23.319557] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.319620] Hardware name: linux,dummy-virt (DT) [ 23.319694] Call trace: [ 23.319746] show_stack+0x20/0x38 (C) [ 23.319859] dump_stack_lvl+0x8c/0xd0 [ 23.319967] print_report+0x118/0x608 [ 23.321054] kasan_report+0xdc/0x128 [ 23.321219] kasan_check_range+0x100/0x1a8 [ 23.321334] __kasan_check_write+0x20/0x30 [ 23.322008] kasan_atomics_helper+0x10c0/0x4858 [ 23.322243] kasan_atomics+0x198/0x2e0 [ 23.322365] kunit_try_run_case+0x170/0x3f0 [ 23.322485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.322607] kthread+0x328/0x630 [ 23.322729] ret_from_fork+0x10/0x20 [ 23.322969] [ 23.323141] Allocated by task 265: [ 23.323365] kasan_save_stack+0x3c/0x68 [ 23.323779] kasan_save_track+0x20/0x40 [ 23.324073] kasan_save_alloc_info+0x40/0x58 [ 23.324178] __kasan_kmalloc+0xd4/0xd8 [ 23.324361] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.324928] kasan_atomics+0xb8/0x2e0 [ 23.325218] kunit_try_run_case+0x170/0x3f0 [ 23.325575] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.325917] kthread+0x328/0x630 [ 23.326071] ret_from_fork+0x10/0x20 [ 23.326336] [ 23.326526] The buggy address belongs to the object at fff00000c659e300 [ 23.326526] which belongs to the cache kmalloc-64 of size 64 [ 23.326657] The buggy address is located 0 bytes to the right of [ 23.326657] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.326908] [ 23.326964] The buggy address belongs to the physical page: [ 23.327069] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.327265] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.327432] page_type: f5(slab) [ 23.327533] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.327655] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.327755] page dumped because: kasan: bad access detected [ 23.327832] [ 23.327880] Memory state around the buggy address: [ 23.327955] fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.328068] fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.328168] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.328258] ^ [ 23.328351] fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.328442] fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.328589] ================================================================== [ 23.484892] ================================================================== [ 23.484993] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 23.485140] Read of size 8 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.485242] [ 23.485299] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 23.488059] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.488135] Hardware name: linux,dummy-virt (DT) [ 23.488205] Call trace: [ 23.488248] show_stack+0x20/0x38 (C) [ 23.488359] dump_stack_lvl+0x8c/0xd0 [ 23.488466] print_report+0x118/0x608 [ 23.488578] kasan_report+0xdc/0x128 [ 23.488678] __asan_report_load8_noabort+0x20/0x30 [ 23.488784] kasan_atomics_helper+0x3e20/0x4858 [ 23.488883] kasan_atomics+0x198/0x2e0 [ 23.488985] kunit_try_run_case+0x170/0x3f0 [ 23.489112] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.489239] kthread+0x328/0x630 [ 23.489339] ret_from_fork+0x10/0x20 [ 23.489436] [ 23.489482] Allocated by task 265: [ 23.489543] kasan_save_stack+0x3c/0x68 [ 23.489632] kasan_save_track+0x20/0x40 [ 23.490789] kasan_save_alloc_info+0x40/0x58 [ 23.490937] __kasan_kmalloc+0xd4/0xd8 [ 23.491052] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.491148] kasan_atomics+0xb8/0x2e0 [ 23.491227] kunit_try_run_case+0x170/0x3f0 [ 23.491312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.491404] kthread+0x328/0x630 [ 23.491471] ret_from_fork+0x10/0x20 [ 23.491552] [ 23.491599] The buggy address belongs to the object at fff00000c659e300 [ 23.491599] which belongs to the cache kmalloc-64 of size 64 [ 23.491727] The buggy address is located 0 bytes to the right of [ 23.491727] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.491851] [ 23.491899] The buggy address belongs to the physical page: [ 23.492018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.492177] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.492314] page_type: f5(slab) [ 23.492411] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.492581] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.492737] page dumped because: kasan: bad access detected [ 23.492854] [ 23.492911] Memory state around the buggy address: [ 23.493018] fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.493166] fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.493260] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.493348] ^ [ 23.493420] fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.493509] fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.494303] ================================================================== [ 23.158139] ================================================================== [ 23.158230] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 23.158336] Read of size 4 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.158450] [ 23.158523] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 23.158704] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.158783] Hardware name: linux,dummy-virt (DT) [ 23.158859] Call trace: [ 23.158913] show_stack+0x20/0x38 (C) [ 23.159037] dump_stack_lvl+0x8c/0xd0 [ 23.159152] print_report+0x118/0x608 [ 23.159274] kasan_report+0xdc/0x128 [ 23.159381] __asan_report_load4_noabort+0x20/0x30 [ 23.159502] kasan_atomics_helper+0x3dcc/0x4858 [ 23.159615] kasan_atomics+0x198/0x2e0 [ 23.159723] kunit_try_run_case+0x170/0x3f0 [ 23.159843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.159972] kthread+0x328/0x630 [ 23.160450] ret_from_fork+0x10/0x20 [ 23.161013] [ 23.161137] Allocated by task 265: [ 23.161226] kasan_save_stack+0x3c/0x68 [ 23.161324] kasan_save_track+0x20/0x40 [ 23.161416] kasan_save_alloc_info+0x40/0x58 [ 23.161510] __kasan_kmalloc+0xd4/0xd8 [ 23.161595] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.161682] kasan_atomics+0xb8/0x2e0 [ 23.162045] kunit_try_run_case+0x170/0x3f0 [ 23.162191] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.162340] kthread+0x328/0x630 [ 23.162424] ret_from_fork+0x10/0x20 [ 23.162506] [ 23.162559] The buggy address belongs to the object at fff00000c659e300 [ 23.162559] which belongs to the cache kmalloc-64 of size 64 [ 23.162740] The buggy address is located 0 bytes to the right of [ 23.162740] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.162884] [ 23.162944] The buggy address belongs to the physical page: [ 23.163015] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.163490] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.163611] page_type: f5(slab) [ 23.163760] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.163939] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.164109] page dumped because: kasan: bad access detected [ 23.164185] [ 23.164229] Memory state around the buggy address: [ 23.164308] fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.164411] fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.164534] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.164642] ^ [ 23.164731] fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.164876] fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.165015] ================================================================== [ 23.300996] ================================================================== [ 23.301123] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 23.301233] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.301334] [ 23.301403] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 23.301587] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.301651] Hardware name: linux,dummy-virt (DT) [ 23.301720] Call trace: [ 23.301770] show_stack+0x20/0x38 (C) [ 23.301865] dump_stack_lvl+0x8c/0xd0 [ 23.301957] print_report+0x118/0x608 [ 23.302066] kasan_report+0xdc/0x128 [ 23.302186] kasan_check_range+0x100/0x1a8 [ 23.302326] __kasan_check_write+0x20/0x30 [ 23.302438] kasan_atomics_helper+0xf88/0x4858 [ 23.302565] kasan_atomics+0x198/0x2e0 [ 23.302699] kunit_try_run_case+0x170/0x3f0 [ 23.302858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.303048] kthread+0x328/0x630 [ 23.303145] ret_from_fork+0x10/0x20 [ 23.303231] [ 23.303275] Allocated by task 265: [ 23.303343] kasan_save_stack+0x3c/0x68 [ 23.303431] kasan_save_track+0x20/0x40 [ 23.303551] kasan_save_alloc_info+0x40/0x58 [ 23.303673] __kasan_kmalloc+0xd4/0xd8 [ 23.303783] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.303872] kasan_atomics+0xb8/0x2e0 [ 23.303959] kunit_try_run_case+0x170/0x3f0 [ 23.304079] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.304182] kthread+0x328/0x630 [ 23.304259] ret_from_fork+0x10/0x20 [ 23.304342] [ 23.304388] The buggy address belongs to the object at fff00000c659e300 [ 23.304388] which belongs to the cache kmalloc-64 of size 64 [ 23.304536] The buggy address is located 0 bytes to the right of [ 23.304536] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.304697] [ 23.304750] The buggy address belongs to the physical page: [ 23.304826] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.304974] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.305109] page_type: f5(slab) [ 23.305193] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.305318] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.305423] page dumped because: kasan: bad access detected [ 23.305487] [ 23.305524] Memory state around the buggy address: [ 23.305591] fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.305678] fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.305779] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.305876] ^ [ 23.305944] fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.306049] fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.306142] ================================================================== [ 23.370501] ================================================================== [ 23.370619] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 23.370734] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.370849] [ 23.370922] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 23.371134] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.371204] Hardware name: linux,dummy-virt (DT) [ 23.371276] Call trace: [ 23.371333] show_stack+0x20/0x38 (C) [ 23.371442] dump_stack_lvl+0x8c/0xd0 [ 23.371560] print_report+0x118/0x608 [ 23.371672] kasan_report+0xdc/0x128 [ 23.371778] kasan_check_range+0x100/0x1a8 [ 23.371892] __kasan_check_write+0x20/0x30 [ 23.372000] kasan_atomics_helper+0x1384/0x4858 [ 23.373723] kasan_atomics+0x198/0x2e0 [ 23.373936] kunit_try_run_case+0x170/0x3f0 [ 23.374157] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.374292] kthread+0x328/0x630 [ 23.374399] ret_from_fork+0x10/0x20 [ 23.374553] [ 23.374637] Allocated by task 265: [ 23.375038] kasan_save_stack+0x3c/0x68 [ 23.375327] kasan_save_track+0x20/0x40 [ 23.375635] kasan_save_alloc_info+0x40/0x58 [ 23.375938] __kasan_kmalloc+0xd4/0xd8 [ 23.376043] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.376136] kasan_atomics+0xb8/0x2e0 [ 23.376366] kunit_try_run_case+0x170/0x3f0 [ 23.376667] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.376999] kthread+0x328/0x630 [ 23.377585] ret_from_fork+0x10/0x20 [ 23.377870] [ 23.377963] The buggy address belongs to the object at fff00000c659e300 [ 23.377963] which belongs to the cache kmalloc-64 of size 64 [ 23.378118] The buggy address is located 0 bytes to the right of [ 23.378118] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.378269] [ 23.378321] The buggy address belongs to the physical page: [ 23.378384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.378483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.378608] page_type: f5(slab) [ 23.378690] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.378810] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.378914] page dumped because: kasan: bad access detected [ 23.378998] [ 23.379064] Memory state around the buggy address: [ 23.379181] fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.379292] fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.379402] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.379502] ^ [ 23.379592] fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.379684] fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.379771] ================================================================== [ 23.446319] ================================================================== [ 23.446426] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 23.446533] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.446645] [ 23.446714] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 23.446900] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.446965] Hardware name: linux,dummy-virt (DT) [ 23.447052] Call trace: [ 23.447111] show_stack+0x20/0x38 (C) [ 23.447219] dump_stack_lvl+0x8c/0xd0 [ 23.447332] print_report+0x118/0x608 [ 23.447436] kasan_report+0xdc/0x128 [ 23.447540] kasan_check_range+0x100/0x1a8 [ 23.447655] __kasan_check_write+0x20/0x30 [ 23.447758] kasan_atomics_helper+0x1644/0x4858 [ 23.447869] kasan_atomics+0x198/0x2e0 [ 23.447970] kunit_try_run_case+0x170/0x3f0 [ 23.448083] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.448189] kthread+0x328/0x630 [ 23.448334] ret_from_fork+0x10/0x20 [ 23.448449] [ 23.448952] Allocated by task 265: [ 23.449693] kasan_save_stack+0x3c/0x68 [ 23.449854] kasan_save_track+0x20/0x40 [ 23.449955] kasan_save_alloc_info+0x40/0x58 [ 23.450077] __kasan_kmalloc+0xd4/0xd8 [ 23.450241] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.450338] kasan_atomics+0xb8/0x2e0 [ 23.450440] kunit_try_run_case+0x170/0x3f0 [ 23.450530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.450682] kthread+0x328/0x630 [ 23.450750] ret_from_fork+0x10/0x20 [ 23.450948] [ 23.450980] The buggy address belongs to the object at fff00000c659e300 [ 23.450980] which belongs to the cache kmalloc-64 of size 64 [ 23.451097] The buggy address is located 0 bytes to the right of [ 23.451097] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.451169] [ 23.451194] The buggy address belongs to the physical page: [ 23.451227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.451282] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.451334] page_type: f5(slab) [ 23.451376] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.451430] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.451474] page dumped because: kasan: bad access detected [ 23.451508] [ 23.451531] Memory state around the buggy address: [ 23.451565] fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.451611] fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.451657] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.451696] ^ [ 23.451732] fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.451775] fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.451814] ================================================================== [ 23.112608] ================================================================== [ 23.112732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 23.112858] Write of size 4 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.112987] [ 23.113342] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 23.113763] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.113905] Hardware name: linux,dummy-virt (DT) [ 23.114233] Call trace: [ 23.114297] show_stack+0x20/0x38 (C) [ 23.114422] dump_stack_lvl+0x8c/0xd0 [ 23.114515] print_report+0x118/0x608 [ 23.114614] kasan_report+0xdc/0x128 [ 23.114725] kasan_check_range+0x100/0x1a8 [ 23.114840] __kasan_check_write+0x20/0x30 [ 23.114947] kasan_atomics_helper+0x99c/0x4858 [ 23.115078] kasan_atomics+0x198/0x2e0 [ 23.115187] kunit_try_run_case+0x170/0x3f0 [ 23.115304] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.115899] kthread+0x328/0x630 [ 23.116060] ret_from_fork+0x10/0x20 [ 23.116283] [ 23.116366] Allocated by task 265: [ 23.116571] kasan_save_stack+0x3c/0x68 [ 23.116968] kasan_save_track+0x20/0x40 [ 23.117077] kasan_save_alloc_info+0x40/0x58 [ 23.117326] __kasan_kmalloc+0xd4/0xd8 [ 23.117445] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.117537] kasan_atomics+0xb8/0x2e0 [ 23.117713] kunit_try_run_case+0x170/0x3f0 [ 23.117805] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.118240] kthread+0x328/0x630 [ 23.118335] ret_from_fork+0x10/0x20 [ 23.118419] [ 23.118460] The buggy address belongs to the object at fff00000c659e300 [ 23.118460] which belongs to the cache kmalloc-64 of size 64 [ 23.118578] The buggy address is located 0 bytes to the right of [ 23.118578] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.118724] [ 23.119396] The buggy address belongs to the physical page: [ 23.119815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.120037] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.120951] page_type: f5(slab) [ 23.121602] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.121886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.121981] page dumped because: kasan: bad access detected [ 23.122063] [ 23.122603] Memory state around the buggy address: [ 23.122897] fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.123226] fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.123400] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.123504] ^ [ 23.123580] fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.123718] fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.123817] ================================================================== [ 23.136116] ================================================================== [ 23.136358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 23.136708] Write of size 4 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.136952] [ 23.137170] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 23.137585] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.137654] Hardware name: linux,dummy-virt (DT) [ 23.137736] Call trace: [ 23.137789] show_stack+0x20/0x38 (C) [ 23.137904] dump_stack_lvl+0x8c/0xd0 [ 23.138013] print_report+0x118/0x608 [ 23.138130] kasan_report+0xdc/0x128 [ 23.138561] kasan_check_range+0x100/0x1a8 [ 23.138857] __kasan_check_write+0x20/0x30 [ 23.139091] kasan_atomics_helper+0xa6c/0x4858 [ 23.139283] kasan_atomics+0x198/0x2e0 [ 23.139413] kunit_try_run_case+0x170/0x3f0 [ 23.139507] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.139608] kthread+0x328/0x630 [ 23.139680] ret_from_fork+0x10/0x20 [ 23.139766] [ 23.139814] Allocated by task 265: [ 23.140282] kasan_save_stack+0x3c/0x68 [ 23.140553] kasan_save_track+0x20/0x40 [ 23.140797] kasan_save_alloc_info+0x40/0x58 [ 23.141042] __kasan_kmalloc+0xd4/0xd8 [ 23.141130] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.141223] kasan_atomics+0xb8/0x2e0 [ 23.141533] kunit_try_run_case+0x170/0x3f0 [ 23.141867] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.142253] kthread+0x328/0x630 [ 23.142324] ret_from_fork+0x10/0x20 [ 23.142994] [ 23.143162] The buggy address belongs to the object at fff00000c659e300 [ 23.143162] which belongs to the cache kmalloc-64 of size 64 [ 23.143316] The buggy address is located 0 bytes to the right of [ 23.143316] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.143641] [ 23.143727] The buggy address belongs to the physical page: [ 23.144742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.145166] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.145754] page_type: f5(slab) [ 23.145967] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.146341] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.146444] page dumped because: kasan: bad access detected [ 23.146527] [ 23.146575] Memory state around the buggy address: [ 23.146643] fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.146725] fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.147313] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.147507] ^ [ 23.147609] fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.147703] fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.147791] ================================================================== [ 23.271069] ================================================================== [ 23.271168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 23.271294] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.271461] [ 23.271562] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 23.271831] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.271922] Hardware name: linux,dummy-virt (DT) [ 23.272033] Call trace: [ 23.272119] show_stack+0x20/0x38 (C) [ 23.272270] dump_stack_lvl+0x8c/0xd0 [ 23.272425] print_report+0x118/0x608 [ 23.272601] kasan_report+0xdc/0x128 [ 23.272710] kasan_check_range+0x100/0x1a8 [ 23.272834] __kasan_check_write+0x20/0x30 [ 23.272951] kasan_atomics_helper+0xe44/0x4858 [ 23.273078] kasan_atomics+0x198/0x2e0 [ 23.273184] kunit_try_run_case+0x170/0x3f0 [ 23.273373] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.273487] kthread+0x328/0x630 [ 23.273608] ret_from_fork+0x10/0x20 [ 23.273719] [ 23.273777] Allocated by task 265: [ 23.273966] kasan_save_stack+0x3c/0x68 [ 23.274188] kasan_save_track+0x20/0x40 [ 23.274496] kasan_save_alloc_info+0x40/0x58 [ 23.274708] __kasan_kmalloc+0xd4/0xd8 [ 23.274805] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.274927] kasan_atomics+0xb8/0x2e0 [ 23.275003] kunit_try_run_case+0x170/0x3f0 [ 23.275124] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.275216] kthread+0x328/0x630 [ 23.275283] ret_from_fork+0x10/0x20 [ 23.275352] [ 23.275523] The buggy address belongs to the object at fff00000c659e300 [ 23.275523] which belongs to the cache kmalloc-64 of size 64 [ 23.275651] The buggy address is located 0 bytes to the right of [ 23.275651] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.275795] [ 23.275854] The buggy address belongs to the physical page: [ 23.275929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.276058] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.276175] page_type: f5(slab) [ 23.276261] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.276385] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.276479] page dumped because: kasan: bad access detected [ 23.276812] [ 23.276903] Memory state around the buggy address: [ 23.277035] fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.277157] fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.277258] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.277351] ^ [ 23.277465] fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.277602] fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.277691] ================================================================== [ 23.387284] ================================================================== [ 23.387365] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 23.387427] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.387480] [ 23.387515] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 23.387599] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.387629] Hardware name: linux,dummy-virt (DT) [ 23.387660] Call trace: [ 23.387686] show_stack+0x20/0x38 (C) [ 23.387735] dump_stack_lvl+0x8c/0xd0 [ 23.387786] print_report+0x118/0x608 [ 23.387835] kasan_report+0xdc/0x128 [ 23.387882] kasan_check_range+0x100/0x1a8 [ 23.387933] __kasan_check_write+0x20/0x30 [ 23.387979] kasan_atomics_helper+0x1414/0x4858 [ 23.388057] kasan_atomics+0x198/0x2e0 [ 23.388158] kunit_try_run_case+0x170/0x3f0 [ 23.388260] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.388385] kthread+0x328/0x630 [ 23.388482] ret_from_fork+0x10/0x20 [ 23.388617] [ 23.388666] Allocated by task 265: [ 23.388732] kasan_save_stack+0x3c/0x68 [ 23.388823] kasan_save_track+0x20/0x40 [ 23.388910] kasan_save_alloc_info+0x40/0x58 [ 23.388993] __kasan_kmalloc+0xd4/0xd8 [ 23.389269] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.389361] kasan_atomics+0xb8/0x2e0 [ 23.389447] kunit_try_run_case+0x170/0x3f0 [ 23.389532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.389634] kthread+0x328/0x630 [ 23.389942] ret_from_fork+0x10/0x20 [ 23.390065] [ 23.390429] The buggy address belongs to the object at fff00000c659e300 [ 23.390429] which belongs to the cache kmalloc-64 of size 64 [ 23.390700] The buggy address is located 0 bytes to the right of [ 23.390700] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.391380] [ 23.391556] The buggy address belongs to the physical page: [ 23.391730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.392243] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.392367] page_type: f5(slab) [ 23.392456] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.393112] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.393282] page dumped because: kasan: bad access detected [ 23.393365] [ 23.393604] Memory state around the buggy address: [ 23.393684] fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.393950] fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.394059] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.394150] ^ [ 23.394227] fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.394779] fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.394887] ================================================================== [ 23.407052] ================================================================== [ 23.407160] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 23.407516] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.407647] [ 23.407724] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 23.407914] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.407976] Hardware name: linux,dummy-virt (DT) [ 23.408067] Call trace: [ 23.408122] show_stack+0x20/0x38 (C) [ 23.408232] dump_stack_lvl+0x8c/0xd0 [ 23.408336] print_report+0x118/0x608 [ 23.408442] kasan_report+0xdc/0x128 [ 23.408571] kasan_check_range+0x100/0x1a8 [ 23.408684] __kasan_check_write+0x20/0x30 [ 23.408791] kasan_atomics_helper+0x14e4/0x4858 [ 23.408900] kasan_atomics+0x198/0x2e0 [ 23.409005] kunit_try_run_case+0x170/0x3f0 [ 23.409332] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.409456] kthread+0x328/0x630 [ 23.409550] ret_from_fork+0x10/0x20 [ 23.409653] [ 23.409709] Allocated by task 265: [ 23.409774] kasan_save_stack+0x3c/0x68 [ 23.409867] kasan_save_track+0x20/0x40 [ 23.409950] kasan_save_alloc_info+0x40/0x58 [ 23.410054] __kasan_kmalloc+0xd4/0xd8 [ 23.410140] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.410228] kasan_atomics+0xb8/0x2e0 [ 23.410306] kunit_try_run_case+0x170/0x3f0 [ 23.410397] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.410495] kthread+0x328/0x630 [ 23.410573] ret_from_fork+0x10/0x20 [ 23.410659] [ 23.410708] The buggy address belongs to the object at fff00000c659e300 [ 23.410708] which belongs to the cache kmalloc-64 of size 64 [ 23.410840] The buggy address is located 0 bytes to the right of [ 23.410840] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.410993] [ 23.413202] The buggy address belongs to the physical page: [ 23.413547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.413679] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.414401] page_type: f5(slab) [ 23.414768] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.414894] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.414988] page dumped because: kasan: bad access detected [ 23.415080] [ 23.415700] Memory state around the buggy address: [ 23.415851] fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.415967] fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.416287] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.416390] ^ [ 23.416942] fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.417226] fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.417581] ================================================================== [ 23.329608] ================================================================== [ 23.329773] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 23.329931] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.330116] [ 23.330224] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 23.330482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.330569] Hardware name: linux,dummy-virt (DT) [ 23.330670] Call trace: [ 23.330745] show_stack+0x20/0x38 (C) [ 23.330904] dump_stack_lvl+0x8c/0xd0 [ 23.331011] print_report+0x118/0x608 [ 23.331112] kasan_report+0xdc/0x128 [ 23.331569] kasan_check_range+0x100/0x1a8 [ 23.331747] __kasan_check_write+0x20/0x30 [ 23.331989] kasan_atomics_helper+0x1128/0x4858 [ 23.332110] kasan_atomics+0x198/0x2e0 [ 23.332451] kunit_try_run_case+0x170/0x3f0 [ 23.332638] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.332848] kthread+0x328/0x630 [ 23.332951] ret_from_fork+0x10/0x20 [ 23.333077] [ 23.333147] Allocated by task 265: [ 23.333210] kasan_save_stack+0x3c/0x68 [ 23.333336] kasan_save_track+0x20/0x40 [ 23.333422] kasan_save_alloc_info+0x40/0x58 [ 23.333706] __kasan_kmalloc+0xd4/0xd8 [ 23.333792] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.333874] kasan_atomics+0xb8/0x2e0 [ 23.333955] kunit_try_run_case+0x170/0x3f0 [ 23.334064] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.334243] kthread+0x328/0x630 [ 23.334357] ret_from_fork+0x10/0x20 [ 23.334461] [ 23.334539] The buggy address belongs to the object at fff00000c659e300 [ 23.334539] which belongs to the cache kmalloc-64 of size 64 [ 23.334664] The buggy address is located 0 bytes to the right of [ 23.334664] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.334847] [ 23.334921] The buggy address belongs to the physical page: [ 23.335039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.335396] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.335545] page_type: f5(slab) [ 23.335670] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.335781] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.335878] page dumped because: kasan: bad access detected [ 23.335950] [ 23.335997] Memory state around the buggy address: [ 23.336089] fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.336203] fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.336302] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.336551] ^ [ 23.336849] fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.336968] fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.337071] ================================================================== [ 23.288257] ================================================================== [ 23.288393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 23.288719] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.289143] [ 23.289234] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 23.289433] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.289502] Hardware name: linux,dummy-virt (DT) [ 23.289708] Call trace: [ 23.289771] show_stack+0x20/0x38 (C) [ 23.289871] dump_stack_lvl+0x8c/0xd0 [ 23.289979] print_report+0x118/0x608 [ 23.290117] kasan_report+0xdc/0x128 [ 23.290268] kasan_check_range+0x100/0x1a8 [ 23.290385] __kasan_check_write+0x20/0x30 [ 23.290494] kasan_atomics_helper+0xeb8/0x4858 [ 23.290611] kasan_atomics+0x198/0x2e0 [ 23.290697] kunit_try_run_case+0x170/0x3f0 [ 23.290996] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.291124] kthread+0x328/0x630 [ 23.291205] ret_from_fork+0x10/0x20 [ 23.291305] [ 23.291378] Allocated by task 265: [ 23.291467] kasan_save_stack+0x3c/0x68 [ 23.291609] kasan_save_track+0x20/0x40 [ 23.291739] kasan_save_alloc_info+0x40/0x58 [ 23.291833] __kasan_kmalloc+0xd4/0xd8 [ 23.291914] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.292006] kasan_atomics+0xb8/0x2e0 [ 23.292104] kunit_try_run_case+0x170/0x3f0 [ 23.292191] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.292334] kthread+0x328/0x630 [ 23.292425] ret_from_fork+0x10/0x20 [ 23.292517] [ 23.292570] The buggy address belongs to the object at fff00000c659e300 [ 23.292570] which belongs to the cache kmalloc-64 of size 64 [ 23.292767] The buggy address is located 0 bytes to the right of [ 23.292767] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.292932] [ 23.292985] The buggy address belongs to the physical page: [ 23.293072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.293185] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.293292] page_type: f5(slab) [ 23.293366] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.293471] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.293572] page dumped because: kasan: bad access detected [ 23.293655] [ 23.293693] Memory state around the buggy address: [ 23.293766] fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.293853] fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.293948] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.294044] ^ [ 23.294120] fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.294266] fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.294349] ================================================================== [ 23.494809] ================================================================== [ 23.494906] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 23.495016] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.495139] [ 23.495201] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 23.495364] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.495420] Hardware name: linux,dummy-virt (DT) [ 23.495476] Call trace: [ 23.495524] show_stack+0x20/0x38 (C) [ 23.495631] dump_stack_lvl+0x8c/0xd0 [ 23.495729] print_report+0x118/0x608 [ 23.495827] kasan_report+0xdc/0x128 [ 23.495913] kasan_check_range+0x100/0x1a8 [ 23.496003] __kasan_check_write+0x20/0x30 [ 23.496298] kasan_atomics_helper+0x17ec/0x4858 [ 23.496439] kasan_atomics+0x198/0x2e0 [ 23.496624] kunit_try_run_case+0x170/0x3f0 [ 23.496793] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.496968] kthread+0x328/0x630 [ 23.497145] ret_from_fork+0x10/0x20 [ 23.497254] [ 23.497308] Allocated by task 265: [ 23.497374] kasan_save_stack+0x3c/0x68 [ 23.497472] kasan_save_track+0x20/0x40 [ 23.497555] kasan_save_alloc_info+0x40/0x58 [ 23.497652] __kasan_kmalloc+0xd4/0xd8 [ 23.497770] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.497858] kasan_atomics+0xb8/0x2e0 [ 23.497943] kunit_try_run_case+0x170/0x3f0 [ 23.498527] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.498749] kthread+0x328/0x630 [ 23.498837] ret_from_fork+0x10/0x20 [ 23.499036] [ 23.499242] The buggy address belongs to the object at fff00000c659e300 [ 23.499242] which belongs to the cache kmalloc-64 of size 64 [ 23.499479] The buggy address is located 0 bytes to the right of [ 23.499479] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.499845] [ 23.499900] The buggy address belongs to the physical page: [ 23.499966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.500137] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.500457] page_type: f5(slab) [ 23.500701] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.501176] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.501277] page dumped because: kasan: bad access detected [ 23.501348] [ 23.501400] Memory state around the buggy address: [ 23.501476] fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.501840] fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.502340] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.502452] ^ [ 23.502524] fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.502992] fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.503219] ================================================================== [ 23.294807] ================================================================== [ 23.294909] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 23.295008] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.295131] [ 23.295192] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 23.295360] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.295427] Hardware name: linux,dummy-virt (DT) [ 23.295496] Call trace: [ 23.295558] show_stack+0x20/0x38 (C) [ 23.295770] dump_stack_lvl+0x8c/0xd0 [ 23.295952] print_report+0x118/0x608 [ 23.296099] kasan_report+0xdc/0x128 [ 23.296250] kasan_check_range+0x100/0x1a8 [ 23.296404] __kasan_check_write+0x20/0x30 [ 23.296577] kasan_atomics_helper+0xf20/0x4858 [ 23.296741] kasan_atomics+0x198/0x2e0 [ 23.296884] kunit_try_run_case+0x170/0x3f0 [ 23.297052] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.297169] kthread+0x328/0x630 [ 23.297282] ret_from_fork+0x10/0x20 [ 23.297434] [ 23.297499] Allocated by task 265: [ 23.297592] kasan_save_stack+0x3c/0x68 [ 23.297722] kasan_save_track+0x20/0x40 [ 23.297802] kasan_save_alloc_info+0x40/0x58 [ 23.297889] __kasan_kmalloc+0xd4/0xd8 [ 23.297974] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.298074] kasan_atomics+0xb8/0x2e0 [ 23.298141] kunit_try_run_case+0x170/0x3f0 [ 23.298217] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.298323] kthread+0x328/0x630 [ 23.298410] ret_from_fork+0x10/0x20 [ 23.298484] [ 23.298578] The buggy address belongs to the object at fff00000c659e300 [ 23.298578] which belongs to the cache kmalloc-64 of size 64 [ 23.298734] The buggy address is located 0 bytes to the right of [ 23.298734] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.298950] [ 23.299005] The buggy address belongs to the physical page: [ 23.299093] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.299195] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.299294] page_type: f5(slab) [ 23.299385] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.299506] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.299611] page dumped because: kasan: bad access detected [ 23.299705] [ 23.299754] Memory state around the buggy address: [ 23.299818] fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.299901] fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.299995] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.300100] ^ [ 23.300187] fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.300291] fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.300388] ================================================================== [ 23.433981] ================================================================== [ 23.434095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 23.434203] Read of size 8 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.434312] [ 23.434579] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 23.434779] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.434851] Hardware name: linux,dummy-virt (DT) [ 23.434944] Call trace: [ 23.435047] show_stack+0x20/0x38 (C) [ 23.435250] dump_stack_lvl+0x8c/0xd0 [ 23.435358] print_report+0x118/0x608 [ 23.435460] kasan_report+0xdc/0x128 [ 23.435571] __asan_report_load8_noabort+0x20/0x30 [ 23.435681] kasan_atomics_helper+0x3db0/0x4858 [ 23.435794] kasan_atomics+0x198/0x2e0 [ 23.435896] kunit_try_run_case+0x170/0x3f0 [ 23.436005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.436413] kthread+0x328/0x630 [ 23.436567] ret_from_fork+0x10/0x20 [ 23.436699] [ 23.437052] Allocated by task 265: [ 23.437213] kasan_save_stack+0x3c/0x68 [ 23.437351] kasan_save_track+0x20/0x40 [ 23.437439] kasan_save_alloc_info+0x40/0x58 [ 23.437526] __kasan_kmalloc+0xd4/0xd8 [ 23.437610] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.438002] kasan_atomics+0xb8/0x2e0 [ 23.438213] kunit_try_run_case+0x170/0x3f0 [ 23.438517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.438660] kthread+0x328/0x630 [ 23.438741] ret_from_fork+0x10/0x20 [ 23.438816] [ 23.438867] The buggy address belongs to the object at fff00000c659e300 [ 23.438867] which belongs to the cache kmalloc-64 of size 64 [ 23.439003] The buggy address is located 0 bytes to the right of [ 23.439003] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.439181] [ 23.439234] The buggy address belongs to the physical page: [ 23.440247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.440545] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.440785] page_type: f5(slab) [ 23.440870] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.441896] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.442360] page dumped because: kasan: bad access detected [ 23.442434] [ 23.442474] Memory state around the buggy address: [ 23.442993] fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.443349] fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.443476] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.443963] ^ [ 23.444294] fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.444604] fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.444694] ================================================================== [ 23.264232] ================================================================== [ 23.264328] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 23.264889] Read of size 8 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.265247] [ 23.265474] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 23.265852] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.265932] Hardware name: linux,dummy-virt (DT) [ 23.266031] Call trace: [ 23.266080] show_stack+0x20/0x38 (C) [ 23.266194] dump_stack_lvl+0x8c/0xd0 [ 23.266286] print_report+0x118/0x608 [ 23.266374] kasan_report+0xdc/0x128 [ 23.266469] __asan_report_load8_noabort+0x20/0x30 [ 23.266577] kasan_atomics_helper+0x3f58/0x4858 [ 23.266889] kasan_atomics+0x198/0x2e0 [ 23.267146] kunit_try_run_case+0x170/0x3f0 [ 23.267345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.267501] kthread+0x328/0x630 [ 23.267747] ret_from_fork+0x10/0x20 [ 23.267948] [ 23.268003] Allocated by task 265: [ 23.268082] kasan_save_stack+0x3c/0x68 [ 23.268182] kasan_save_track+0x20/0x40 [ 23.268268] kasan_save_alloc_info+0x40/0x58 [ 23.268358] __kasan_kmalloc+0xd4/0xd8 [ 23.268436] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.268547] kasan_atomics+0xb8/0x2e0 [ 23.268636] kunit_try_run_case+0x170/0x3f0 [ 23.268732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.268843] kthread+0x328/0x630 [ 23.268939] ret_from_fork+0x10/0x20 [ 23.269040] [ 23.269088] The buggy address belongs to the object at fff00000c659e300 [ 23.269088] which belongs to the cache kmalloc-64 of size 64 [ 23.269322] The buggy address is located 0 bytes to the right of [ 23.269322] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.269788] [ 23.270101] The buggy address belongs to the physical page: [ 23.270152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.270217] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.270271] page_type: f5(slab) [ 23.270312] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.270366] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.270410] page dumped because: kasan: bad access detected [ 23.270445] [ 23.270465] Memory state around the buggy address: [ 23.270500] fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.270547] fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.270592] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.270632] ^ [ 23.270667] fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.270712] fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.270752] ================================================================== [ 23.246048] ================================================================== [ 23.246157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 23.246266] Write of size 4 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.246390] [ 23.246467] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 23.246659] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.246717] Hardware name: linux,dummy-virt (DT) [ 23.246792] Call trace: [ 23.246843] show_stack+0x20/0x38 (C) [ 23.246952] dump_stack_lvl+0x8c/0xd0 [ 23.247076] print_report+0x118/0x608 [ 23.247180] kasan_report+0xdc/0x128 [ 23.247277] kasan_check_range+0x100/0x1a8 [ 23.247366] __kasan_check_write+0x20/0x30 [ 23.247452] kasan_atomics_helper+0xd3c/0x4858 [ 23.247553] kasan_atomics+0x198/0x2e0 [ 23.247655] kunit_try_run_case+0x170/0x3f0 [ 23.247760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.247880] kthread+0x328/0x630 [ 23.247973] ret_from_fork+0x10/0x20 [ 23.248226] [ 23.248282] Allocated by task 265: [ 23.248346] kasan_save_stack+0x3c/0x68 [ 23.248431] kasan_save_track+0x20/0x40 [ 23.248521] kasan_save_alloc_info+0x40/0x58 [ 23.248618] __kasan_kmalloc+0xd4/0xd8 [ 23.248759] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.248849] kasan_atomics+0xb8/0x2e0 [ 23.248938] kunit_try_run_case+0x170/0x3f0 [ 23.249043] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.249194] kthread+0x328/0x630 [ 23.249301] ret_from_fork+0x10/0x20 [ 23.249421] [ 23.249472] The buggy address belongs to the object at fff00000c659e300 [ 23.249472] which belongs to the cache kmalloc-64 of size 64 [ 23.249594] The buggy address is located 0 bytes to the right of [ 23.249594] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.249762] [ 23.249835] The buggy address belongs to the physical page: [ 23.249905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.250014] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.250151] page_type: f5(slab) [ 23.250250] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.250386] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.250473] page dumped because: kasan: bad access detected [ 23.250541] [ 23.250582] Memory state around the buggy address: [ 23.250686] fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.250829] fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.250972] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.251112] ^ [ 23.251233] fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.251370] fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.251497] ================================================================== [ 23.166464] ================================================================== [ 23.166627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 23.166749] Write of size 4 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.166897] [ 23.166968] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 23.167158] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.167229] Hardware name: linux,dummy-virt (DT) [ 23.167310] Call trace: [ 23.167359] show_stack+0x20/0x38 (C) [ 23.167725] dump_stack_lvl+0x8c/0xd0 [ 23.167912] print_report+0x118/0x608 [ 23.168038] kasan_report+0xdc/0x128 [ 23.168276] kasan_check_range+0x100/0x1a8 [ 23.168395] __kasan_check_write+0x20/0x30 [ 23.168519] kasan_atomics_helper+0xb70/0x4858 [ 23.168633] kasan_atomics+0x198/0x2e0 [ 23.168964] kunit_try_run_case+0x170/0x3f0 [ 23.169092] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.169218] kthread+0x328/0x630 [ 23.169312] ret_from_fork+0x10/0x20 [ 23.169618] [ 23.169677] Allocated by task 265: [ 23.169762] kasan_save_stack+0x3c/0x68 [ 23.169911] kasan_save_track+0x20/0x40 [ 23.170009] kasan_save_alloc_info+0x40/0x58 [ 23.170120] __kasan_kmalloc+0xd4/0xd8 [ 23.170209] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.170304] kasan_atomics+0xb8/0x2e0 [ 23.170400] kunit_try_run_case+0x170/0x3f0 [ 23.170653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.170967] kthread+0x328/0x630 [ 23.171070] ret_from_fork+0x10/0x20 [ 23.171166] [ 23.171210] The buggy address belongs to the object at fff00000c659e300 [ 23.171210] which belongs to the cache kmalloc-64 of size 64 [ 23.171321] The buggy address is located 0 bytes to the right of [ 23.171321] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.171578] [ 23.171642] The buggy address belongs to the physical page: [ 23.171714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.172037] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.172190] page_type: f5(slab) [ 23.172284] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.172562] page dumped because: kasan: bad access detected [ 23.172776] fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.173114] ^ [ 23.175566] Read of size 4 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.177767] kasan_atomics_helper+0x3dbc/0x4858 [ 23.179986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.182032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.191729] Call trace: [ 23.200983] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.206583] [ 23.209002] ^ [ 23.214942] Call trace: [ 23.219148] kthread+0x328/0x630 [ 23.220432] [ 23.221501] page dumped because: kasan: bad access detected [ 23.226877] ^ [ 23.228898] Write of size 4 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.234643] [ 23.234693] The buggy address belongs to the object at fff00000c659e300 [ 23.234693] which belongs to the cache kmalloc-64 of size 64 [ 23.234832] The buggy address is located 0 bytes to the right of [ 23.234832] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.234973] [ 23.235039] The buggy address belongs to the physical page: [ 23.235101] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.235225] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.235330] page_type: f5(slab) [ 23.235661] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.235824] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.235918] page dumped because: kasan: bad access detected [ 23.235997] [ 23.236069] Memory state around the buggy address: [ 23.236145] fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.236268] fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.236429] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.236702] ^ [ 23.236858] fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.236986] fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.237100] ================================================================== [ 23.427677] ================================================================== [ 23.427810] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 23.427925] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.428062] [ 23.428167] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 23.428357] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.428412] Hardware name: linux,dummy-virt (DT) [ 23.428482] Call trace: [ 23.428683] show_stack+0x20/0x38 (C) [ 23.428845] dump_stack_lvl+0x8c/0xd0 [ 23.429000] print_report+0x118/0x608 [ 23.429168] kasan_report+0xdc/0x128 [ 23.429313] kasan_check_range+0x100/0x1a8 [ 23.429461] __kasan_check_write+0x20/0x30 [ 23.429603] kasan_atomics_helper+0x15b4/0x4858 [ 23.429725] kasan_atomics+0x198/0x2e0 [ 23.429823] kunit_try_run_case+0x170/0x3f0 [ 23.429924] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.430110] kthread+0x328/0x630 [ 23.430217] ret_from_fork+0x10/0x20 [ 23.430340] [ 23.430390] Allocated by task 265: [ 23.430484] kasan_save_stack+0x3c/0x68 [ 23.430577] kasan_save_track+0x20/0x40 [ 23.430657] kasan_save_alloc_info+0x40/0x58 [ 23.430735] __kasan_kmalloc+0xd4/0xd8 [ 23.430798] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.430875] kasan_atomics+0xb8/0x2e0 [ 23.430953] kunit_try_run_case+0x170/0x3f0 [ 23.431051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.431206] kthread+0x328/0x630 [ 23.431275] ret_from_fork+0x10/0x20 [ 23.431360] [ 23.431418] The buggy address belongs to the object at fff00000c659e300 [ 23.431418] which belongs to the cache kmalloc-64 of size 64 [ 23.431539] The buggy address is located 0 bytes to the right of [ 23.431539] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.431713] [ 23.431759] The buggy address belongs to the physical page: [ 23.431854] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.432034] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.432141] page_type: f5(slab) [ 23.432267] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.432378] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.432474] page dumped because: kasan: bad access detected [ 23.432567] [ 23.432616] Memory state around the buggy address: [ 23.432695] fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.432846] fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.432975] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.433116] ^ [ 23.433216] fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.433325] fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.433555] ================================================================== [ 23.148607] ================================================================== [ 23.148945] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 23.149099] Write of size 4 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.149231] [ 23.149306] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 23.149795] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.149902] Hardware name: linux,dummy-virt (DT) [ 23.149993] Call trace: [ 23.150056] show_stack+0x20/0x38 (C) [ 23.150156] dump_stack_lvl+0x8c/0xd0 [ 23.150258] print_report+0x118/0x608 [ 23.150676] kasan_report+0xdc/0x128 [ 23.150834] kasan_check_range+0x100/0x1a8 [ 23.150950] __kasan_check_write+0x20/0x30 [ 23.151064] kasan_atomics_helper+0xad4/0x4858 [ 23.151445] kasan_atomics+0x198/0x2e0 [ 23.151600] kunit_try_run_case+0x170/0x3f0 [ 23.151720] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.152048] kthread+0x328/0x630 [ 23.152286] ret_from_fork+0x10/0x20 [ 23.152425] [ 23.152476] Allocated by task 265: [ 23.152561] kasan_save_stack+0x3c/0x68 [ 23.152879] kasan_save_track+0x20/0x40 [ 23.153126] kasan_save_alloc_info+0x40/0x58 [ 23.153273] __kasan_kmalloc+0xd4/0xd8 [ 23.153376] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.153464] kasan_atomics+0xb8/0x2e0 [ 23.153725] kunit_try_run_case+0x170/0x3f0 [ 23.154088] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.154198] kthread+0x328/0x630 [ 23.154263] ret_from_fork+0x10/0x20 [ 23.154351] [ 23.154396] The buggy address belongs to the object at fff00000c659e300 [ 23.154396] which belongs to the cache kmalloc-64 of size 64 [ 23.154528] The buggy address is located 0 bytes to the right of [ 23.154528] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.154723] [ 23.155009] The buggy address belongs to the physical page: [ 23.155118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.155249] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.155369] page_type: f5(slab) [ 23.155453] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.155882] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.156002] page dumped because: kasan: bad access detected [ 23.156106] [ 23.156158] Memory state around the buggy address: [ 23.156269] fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.156370] fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.156666] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.156974] ^ [ 23.157090] fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.157315] fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.157605] ================================================================== [ 23.251982] ================================================================== [ 23.252105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 23.252208] Read of size 4 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.252349] [ 23.252419] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 23.252617] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.252677] Hardware name: linux,dummy-virt (DT) [ 23.252752] Call trace: [ 23.252801] show_stack+0x20/0x38 (C) [ 23.252915] dump_stack_lvl+0x8c/0xd0 [ 23.253078] print_report+0x118/0x608 [ 23.253242] kasan_report+0xdc/0x128 [ 23.253416] __asan_report_load4_noabort+0x20/0x30 [ 23.253524] kasan_atomics_helper+0x3e04/0x4858 [ 23.253822] kasan_atomics+0x198/0x2e0 [ 23.253980] kunit_try_run_case+0x170/0x3f0 [ 23.254109] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.254212] kthread+0x328/0x630 [ 23.254309] ret_from_fork+0x10/0x20 [ 23.254410] [ 23.254475] Allocated by task 265: [ 23.254534] kasan_save_stack+0x3c/0x68 [ 23.254616] kasan_save_track+0x20/0x40 [ 23.254700] kasan_save_alloc_info+0x40/0x58 [ 23.254782] __kasan_kmalloc+0xd4/0xd8 [ 23.254869] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.254964] kasan_atomics+0xb8/0x2e0 [ 23.255062] kunit_try_run_case+0x170/0x3f0 [ 23.255155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.255254] kthread+0x328/0x630 [ 23.255340] ret_from_fork+0x10/0x20 [ 23.255421] [ 23.255486] The buggy address belongs to the object at fff00000c659e300 [ 23.255486] which belongs to the cache kmalloc-64 of size 64 [ 23.255681] The buggy address is located 0 bytes to the right of [ 23.255681] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.255846] [ 23.255892] The buggy address belongs to the physical page: [ 23.255967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.256161] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.256319] page_type: f5(slab) [ 23.256446] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.256644] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.256794] page dumped because: kasan: bad access detected [ 23.256876] [ 23.256922] Memory state around the buggy address: [ 23.257013] fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.257138] fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.257259] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.257369] ^ [ 23.257433] fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.257521] fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.257608] ================================================================== [ 23.124686] ================================================================== [ 23.124831] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 23.124941] Write of size 4 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.125071] [ 23.125148] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 23.125342] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.125747] Hardware name: linux,dummy-virt (DT) [ 23.125911] Call trace: [ 23.125997] show_stack+0x20/0x38 (C) [ 23.126424] dump_stack_lvl+0x8c/0xd0 [ 23.126602] print_report+0x118/0x608 [ 23.126854] kasan_report+0xdc/0x128 [ 23.127140] kasan_check_range+0x100/0x1a8 [ 23.127268] __kasan_check_write+0x20/0x30 [ 23.127373] kasan_atomics_helper+0xa04/0x4858 [ 23.127861] kasan_atomics+0x198/0x2e0 [ 23.127990] kunit_try_run_case+0x170/0x3f0 [ 23.128369] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.128683] kthread+0x328/0x630 [ 23.128961] ret_from_fork+0x10/0x20 [ 23.129425] [ 23.129557] Allocated by task 265: [ 23.129728] kasan_save_stack+0x3c/0x68 [ 23.129884] kasan_save_track+0x20/0x40 [ 23.130105] kasan_save_alloc_info+0x40/0x58 [ 23.130349] __kasan_kmalloc+0xd4/0xd8 [ 23.130437] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.130525] kasan_atomics+0xb8/0x2e0 [ 23.130773] kunit_try_run_case+0x170/0x3f0 [ 23.131051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.131162] kthread+0x328/0x630 [ 23.131382] ret_from_fork+0x10/0x20 [ 23.131570] [ 23.131677] The buggy address belongs to the object at fff00000c659e300 [ 23.131677] which belongs to the cache kmalloc-64 of size 64 [ 23.131898] The buggy address is located 0 bytes to the right of [ 23.131898] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.132253] [ 23.132308] The buggy address belongs to the physical page: [ 23.132383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.132519] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.132640] page_type: f5(slab) [ 23.133068] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.133509] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.133718] page dumped because: kasan: bad access detected [ 23.133842] [ 23.133923] Memory state around the buggy address: [ 23.134251] fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.134363] fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.134453] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.134703] ^ [ 23.134899] fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.135169] fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.135273] ================================================================== [ 23.347535] ================================================================== [ 23.347607] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 23.347670] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.347781] [ 23.347884] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 23.348167] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.348243] Hardware name: linux,dummy-virt (DT) [ 23.348314] Call trace: [ 23.348369] show_stack+0x20/0x38 (C) [ 23.348479] dump_stack_lvl+0x8c/0xd0 [ 23.348612] print_report+0x118/0x608 [ 23.348725] kasan_report+0xdc/0x128 [ 23.348834] kasan_check_range+0x100/0x1a8 [ 23.348960] __kasan_check_write+0x20/0x30 [ 23.349095] kasan_atomics_helper+0x11f8/0x4858 [ 23.349226] kasan_atomics+0x198/0x2e0 [ 23.349333] kunit_try_run_case+0x170/0x3f0 [ 23.349441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.349561] kthread+0x328/0x630 [ 23.349655] ret_from_fork+0x10/0x20 [ 23.349803] [ 23.349903] Allocated by task 265: [ 23.350039] kasan_save_stack+0x3c/0x68 [ 23.350135] kasan_save_track+0x20/0x40 [ 23.350219] kasan_save_alloc_info+0x40/0x58 [ 23.350312] __kasan_kmalloc+0xd4/0xd8 [ 23.350423] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.350517] kasan_atomics+0xb8/0x2e0 [ 23.350592] kunit_try_run_case+0x170/0x3f0 [ 23.350665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.350757] kthread+0x328/0x630 [ 23.350829] ret_from_fork+0x10/0x20 [ 23.350998] [ 23.351065] The buggy address belongs to the object at fff00000c659e300 [ 23.351065] which belongs to the cache kmalloc-64 of size 64 [ 23.351198] The buggy address is located 0 bytes to the right of [ 23.351198] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.351360] [ 23.351427] The buggy address belongs to the physical page: [ 23.351498] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.351622] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.351732] page_type: f5(slab) [ 23.351820] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.351936] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.352046] page dumped because: kasan: bad access detected [ 23.352125] [ 23.352176] Memory state around the buggy address: [ 23.352251] fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.352356] fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.352459] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.352572] ^ [ 23.352669] fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.352766] fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.352979] ================================================================== [ 23.380225] ================================================================== [ 23.380361] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 23.380475] Read of size 8 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.380603] [ 23.380735] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 23.381067] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.381172] Hardware name: linux,dummy-virt (DT) [ 23.381297] Call trace: [ 23.381371] show_stack+0x20/0x38 (C) [ 23.381536] dump_stack_lvl+0x8c/0xd0 [ 23.381640] print_report+0x118/0x608 [ 23.381775] kasan_report+0xdc/0x128 [ 23.381899] __asan_report_load8_noabort+0x20/0x30 [ 23.382017] kasan_atomics_helper+0x3f04/0x4858 [ 23.382150] kasan_atomics+0x198/0x2e0 [ 23.382264] kunit_try_run_case+0x170/0x3f0 [ 23.382416] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.382589] kthread+0x328/0x630 [ 23.382695] ret_from_fork+0x10/0x20 [ 23.382815] [ 23.382863] Allocated by task 265: [ 23.382985] kasan_save_stack+0x3c/0x68 [ 23.383212] kasan_save_track+0x20/0x40 [ 23.383308] kasan_save_alloc_info+0x40/0x58 [ 23.383399] __kasan_kmalloc+0xd4/0xd8 [ 23.383487] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.383575] kasan_atomics+0xb8/0x2e0 [ 23.383659] kunit_try_run_case+0x170/0x3f0 [ 23.383767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.383880] kthread+0x328/0x630 [ 23.383956] ret_from_fork+0x10/0x20 [ 23.384062] [ 23.384111] The buggy address belongs to the object at fff00000c659e300 [ 23.384111] which belongs to the cache kmalloc-64 of size 64 [ 23.384284] The buggy address is located 0 bytes to the right of [ 23.384284] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.384552] [ 23.384642] The buggy address belongs to the physical page: [ 23.384718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.384856] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.384978] page_type: f5(slab) [ 23.385085] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.385242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.385363] page dumped because: kasan: bad access detected [ 23.385445] [ 23.385491] Memory state around the buggy address: [ 23.385568] fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.385746] fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.385853] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.385946] ^ [ 23.386079] fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.386182] fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.386302] ================================================================== [ 23.258237] ================================================================== [ 23.258404] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 23.258559] Read of size 8 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.258711] [ 23.258772] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 23.258941] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.259000] Hardware name: linux,dummy-virt (DT) [ 23.259109] Call trace: [ 23.259177] show_stack+0x20/0x38 (C) [ 23.259282] dump_stack_lvl+0x8c/0xd0 [ 23.259393] print_report+0x118/0x608 [ 23.259500] kasan_report+0xdc/0x128 [ 23.259599] kasan_check_range+0x100/0x1a8 [ 23.259704] __kasan_check_read+0x20/0x30 [ 23.259836] kasan_atomics_helper+0xdd4/0x4858 [ 23.259971] kasan_atomics+0x198/0x2e0 [ 23.260144] kunit_try_run_case+0x170/0x3f0 [ 23.260298] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.260405] kthread+0x328/0x630 [ 23.260531] ret_from_fork+0x10/0x20 [ 23.260643] [ 23.260689] Allocated by task 265: [ 23.260786] kasan_save_stack+0x3c/0x68 [ 23.260903] kasan_save_track+0x20/0x40 [ 23.261043] kasan_save_alloc_info+0x40/0x58 [ 23.261162] __kasan_kmalloc+0xd4/0xd8 [ 23.261261] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.261385] kasan_atomics+0xb8/0x2e0 [ 23.261484] kunit_try_run_case+0x170/0x3f0 [ 23.261589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.261754] kthread+0x328/0x630 [ 23.261827] ret_from_fork+0x10/0x20 [ 23.261894] [ 23.261931] The buggy address belongs to the object at fff00000c659e300 [ 23.261931] which belongs to the cache kmalloc-64 of size 64 [ 23.262077] The buggy address is located 0 bytes to the right of [ 23.262077] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.262232] [ 23.262276] The buggy address belongs to the physical page: [ 23.262348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.262457] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.262566] page_type: f5(slab) [ 23.262648] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.262801] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.262919] page dumped because: kasan: bad access detected [ 23.263066] [ 23.263130] Memory state around the buggy address: [ 23.263210] fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.263319] fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.263435] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.263520] ^ [ 23.263647] fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.263774] fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.263869] ================================================================== [ 23.396384] ================================================================== [ 23.396682] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 23.396803] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.396931] [ 23.397003] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 23.397197] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.397257] Hardware name: linux,dummy-virt (DT) [ 23.397445] Call trace: [ 23.397688] show_stack+0x20/0x38 (C) [ 23.397810] dump_stack_lvl+0x8c/0xd0 [ 23.397925] print_report+0x118/0x608 [ 23.398239] kasan_report+0xdc/0x128 [ 23.398489] kasan_check_range+0x100/0x1a8 [ 23.398601] __kasan_check_write+0x20/0x30 [ 23.398817] kasan_atomics_helper+0x147c/0x4858 [ 23.398916] kasan_atomics+0x198/0x2e0 [ 23.399050] kunit_try_run_case+0x170/0x3f0 [ 23.399212] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.399455] kthread+0x328/0x630 [ 23.399632] ret_from_fork+0x10/0x20 [ 23.399909] [ 23.400108] Allocated by task 265: [ 23.400218] kasan_save_stack+0x3c/0x68 [ 23.400340] kasan_save_track+0x20/0x40 [ 23.400424] kasan_save_alloc_info+0x40/0x58 [ 23.400533] __kasan_kmalloc+0xd4/0xd8 [ 23.400632] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.400730] kasan_atomics+0xb8/0x2e0 [ 23.401145] kunit_try_run_case+0x170/0x3f0 [ 23.401499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.401725] kthread+0x328/0x630 [ 23.401921] ret_from_fork+0x10/0x20 [ 23.402220] [ 23.402275] The buggy address belongs to the object at fff00000c659e300 [ 23.402275] which belongs to the cache kmalloc-64 of size 64 [ 23.402658] The buggy address is located 0 bytes to the right of [ 23.402658] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.403176] [ 23.403257] The buggy address belongs to the physical page: [ 23.403394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.403795] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.404007] page_type: f5(slab) [ 23.404101] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.404216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.404309] page dumped because: kasan: bad access detected [ 23.404721] [ 23.404905] Memory state around the buggy address: [ 23.405005] fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.405499] fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.405615] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.406071] ^ [ 23.406176] fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.406297] fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.406392] ================================================================== [ 23.418466] ================================================================== [ 23.418634] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 23.418785] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.418898] [ 23.418974] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 23.419140] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.419201] Hardware name: linux,dummy-virt (DT) [ 23.419269] Call trace: [ 23.419321] show_stack+0x20/0x38 (C) [ 23.419432] dump_stack_lvl+0x8c/0xd0 [ 23.419541] print_report+0x118/0x608 [ 23.419642] kasan_report+0xdc/0x128 [ 23.419745] kasan_check_range+0x100/0x1a8 [ 23.419849] __kasan_check_write+0x20/0x30 [ 23.419952] kasan_atomics_helper+0x154c/0x4858 [ 23.420065] kasan_atomics+0x198/0x2e0 [ 23.420154] kunit_try_run_case+0x170/0x3f0 [ 23.420255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.420370] kthread+0x328/0x630 [ 23.420460] ret_from_fork+0x10/0x20 [ 23.420590] [ 23.420644] Allocated by task 265: [ 23.420712] kasan_save_stack+0x3c/0x68 [ 23.420816] kasan_save_track+0x20/0x40 [ 23.421324] kasan_save_alloc_info+0x40/0x58 [ 23.421612] __kasan_kmalloc+0xd4/0xd8 [ 23.421915] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.422098] kasan_atomics+0xb8/0x2e0 [ 23.422204] kunit_try_run_case+0x170/0x3f0 [ 23.422285] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.422529] kthread+0x328/0x630 [ 23.422619] ret_from_fork+0x10/0x20 [ 23.422702] [ 23.422907] The buggy address belongs to the object at fff00000c659e300 [ 23.422907] which belongs to the cache kmalloc-64 of size 64 [ 23.423064] The buggy address is located 0 bytes to the right of [ 23.423064] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.423428] [ 23.423507] The buggy address belongs to the physical page: [ 23.423607] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.423794] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.423904] page_type: f5(slab) [ 23.423988] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.424118] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.424216] page dumped because: kasan: bad access detected [ 23.424291] [ 23.424338] Memory state around the buggy address: [ 23.424411] fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.424529] fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.424681] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.424784] ^ [ 23.424888] fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.425008] fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.425421] ================================================================== [ 23.362590] ================================================================== [ 23.362735] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 23.362858] Write of size 8 at addr fff00000c659e330 by task kunit_try_catch/265 [ 23.362970] [ 23.363058] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 23.363382] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.363452] Hardware name: linux,dummy-virt (DT) [ 23.363520] Call trace: [ 23.363595] show_stack+0x20/0x38 (C) [ 23.363763] dump_stack_lvl+0x8c/0xd0 [ 23.363879] print_report+0x118/0x608 [ 23.363986] kasan_report+0xdc/0x128 [ 23.364098] kasan_check_range+0x100/0x1a8 [ 23.364209] __kasan_check_write+0x20/0x30 [ 23.364316] kasan_atomics_helper+0x12d8/0x4858 [ 23.364429] kasan_atomics+0x198/0x2e0 [ 23.364558] kunit_try_run_case+0x170/0x3f0 [ 23.364685] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.364830] kthread+0x328/0x630 [ 23.364937] ret_from_fork+0x10/0x20 [ 23.365071] [ 23.365118] Allocated by task 265: [ 23.365193] kasan_save_stack+0x3c/0x68 [ 23.365394] kasan_save_track+0x20/0x40 [ 23.365505] kasan_save_alloc_info+0x40/0x58 [ 23.365600] __kasan_kmalloc+0xd4/0xd8 [ 23.365722] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.365825] kasan_atomics+0xb8/0x2e0 [ 23.365918] kunit_try_run_case+0x170/0x3f0 [ 23.365996] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.366108] kthread+0x328/0x630 [ 23.366263] ret_from_fork+0x10/0x20 [ 23.366341] [ 23.366389] The buggy address belongs to the object at fff00000c659e300 [ 23.366389] which belongs to the cache kmalloc-64 of size 64 [ 23.366521] The buggy address is located 0 bytes to the right of [ 23.366521] allocated 48-byte region [fff00000c659e300, fff00000c659e330) [ 23.366703] [ 23.366795] The buggy address belongs to the physical page: [ 23.366872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659e [ 23.366987] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.367333] page_type: f5(slab) [ 23.367610] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.367741] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.367840] page dumped because: kasan: bad access detected [ 23.368179] [ 23.368424] Memory state around the buggy address: [ 23.368588] fff00000c659e200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.368808] fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.368925] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.369013] ^ [ 23.369342] fff00000c659e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.369704] fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.369904] ==================================================================
[ 14.605220] ================================================================== [ 14.605919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 14.606321] Read of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.606797] [ 14.606928] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.606970] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.606982] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.607034] Call Trace: [ 14.607050] <TASK> [ 14.607078] dump_stack_lvl+0x73/0xb0 [ 14.607118] print_report+0xd1/0x650 [ 14.607153] ? __virt_addr_valid+0x1db/0x2d0 [ 14.607178] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.607200] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.607222] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.607244] kasan_report+0x141/0x180 [ 14.607267] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.607294] __asan_report_load4_noabort+0x18/0x20 [ 14.607319] kasan_atomics_helper+0x4a36/0x5450 [ 14.607342] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.607364] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.607438] ? kasan_atomics+0x152/0x310 [ 14.607465] kasan_atomics+0x1dc/0x310 [ 14.607490] ? __pfx_kasan_atomics+0x10/0x10 [ 14.607514] ? __pfx_read_tsc+0x10/0x10 [ 14.607535] ? ktime_get_ts64+0x86/0x230 [ 14.607561] kunit_try_run_case+0x1a5/0x480 [ 14.607585] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.607607] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.607671] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.607695] ? __kthread_parkme+0x82/0x180 [ 14.607745] ? preempt_count_sub+0x50/0x80 [ 14.607770] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.607794] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.607829] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.607853] kthread+0x337/0x6f0 [ 14.607874] ? trace_preempt_on+0x20/0xc0 [ 14.607898] ? __pfx_kthread+0x10/0x10 [ 14.607918] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.607940] ? calculate_sigpending+0x7b/0xa0 [ 14.607966] ? __pfx_kthread+0x10/0x10 [ 14.607989] ret_from_fork+0x116/0x1d0 [ 14.608009] ? __pfx_kthread+0x10/0x10 [ 14.608030] ret_from_fork_asm+0x1a/0x30 [ 14.608061] </TASK> [ 14.608073] [ 14.617064] Allocated by task 282: [ 14.617300] kasan_save_stack+0x45/0x70 [ 14.617586] kasan_save_track+0x18/0x40 [ 14.617826] kasan_save_alloc_info+0x3b/0x50 [ 14.617981] __kasan_kmalloc+0xb7/0xc0 [ 14.618179] __kmalloc_cache_noprof+0x189/0x420 [ 14.618451] kasan_atomics+0x95/0x310 [ 14.618596] kunit_try_run_case+0x1a5/0x480 [ 14.618744] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.618999] kthread+0x337/0x6f0 [ 14.619350] ret_from_fork+0x116/0x1d0 [ 14.619624] ret_from_fork_asm+0x1a/0x30 [ 14.619867] [ 14.620006] The buggy address belongs to the object at ffff8881039c5a00 [ 14.620006] which belongs to the cache kmalloc-64 of size 64 [ 14.620788] The buggy address is located 0 bytes to the right of [ 14.620788] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.621238] [ 14.621336] The buggy address belongs to the physical page: [ 14.621840] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.622242] flags: 0x200000000000000(node=0|zone=2) [ 14.622518] page_type: f5(slab) [ 14.622660] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.623008] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.623447] page dumped because: kasan: bad access detected [ 14.623795] [ 14.623869] Memory state around the buggy address: [ 14.624027] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.624674] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.625053] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.625558] ^ [ 14.625816] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.626176] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.626525] ================================================================== [ 15.378210] ================================================================== [ 15.378614] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 15.378974] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 15.379361] [ 15.379451] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.379492] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.379505] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.379526] Call Trace: [ 15.379539] <TASK> [ 15.379574] dump_stack_lvl+0x73/0xb0 [ 15.379602] print_report+0xd1/0x650 [ 15.379626] ? __virt_addr_valid+0x1db/0x2d0 [ 15.379650] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.379671] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.379693] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.379715] kasan_report+0x141/0x180 [ 15.379737] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.379764] kasan_check_range+0x10c/0x1c0 [ 15.379788] __kasan_check_write+0x18/0x20 [ 15.379808] kasan_atomics_helper+0x20c8/0x5450 [ 15.379831] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.379863] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.379888] ? kasan_atomics+0x152/0x310 [ 15.379927] kasan_atomics+0x1dc/0x310 [ 15.379950] ? __pfx_kasan_atomics+0x10/0x10 [ 15.379974] ? __pfx_read_tsc+0x10/0x10 [ 15.379995] ? ktime_get_ts64+0x86/0x230 [ 15.380020] kunit_try_run_case+0x1a5/0x480 [ 15.380043] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.380066] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.380090] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.380112] ? __kthread_parkme+0x82/0x180 [ 15.380161] ? preempt_count_sub+0x50/0x80 [ 15.380184] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.380208] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.380232] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.380255] kthread+0x337/0x6f0 [ 15.380284] ? trace_preempt_on+0x20/0xc0 [ 15.380308] ? __pfx_kthread+0x10/0x10 [ 15.380329] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.380361] ? calculate_sigpending+0x7b/0xa0 [ 15.380385] ? __pfx_kthread+0x10/0x10 [ 15.380407] ret_from_fork+0x116/0x1d0 [ 15.380426] ? __pfx_kthread+0x10/0x10 [ 15.380457] ret_from_fork_asm+0x1a/0x30 [ 15.380490] </TASK> [ 15.380502] [ 15.388439] Allocated by task 282: [ 15.388666] kasan_save_stack+0x45/0x70 [ 15.388884] kasan_save_track+0x18/0x40 [ 15.389029] kasan_save_alloc_info+0x3b/0x50 [ 15.389331] __kasan_kmalloc+0xb7/0xc0 [ 15.389551] __kmalloc_cache_noprof+0x189/0x420 [ 15.389802] kasan_atomics+0x95/0x310 [ 15.389953] kunit_try_run_case+0x1a5/0x480 [ 15.390234] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.390551] kthread+0x337/0x6f0 [ 15.390751] ret_from_fork+0x116/0x1d0 [ 15.390968] ret_from_fork_asm+0x1a/0x30 [ 15.391163] [ 15.391236] The buggy address belongs to the object at ffff8881039c5a00 [ 15.391236] which belongs to the cache kmalloc-64 of size 64 [ 15.391735] The buggy address is located 0 bytes to the right of [ 15.391735] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 15.392351] [ 15.392485] The buggy address belongs to the physical page: [ 15.392759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 15.393004] flags: 0x200000000000000(node=0|zone=2) [ 15.393278] page_type: f5(slab) [ 15.393494] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.393810] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.394039] page dumped because: kasan: bad access detected [ 15.394332] [ 15.394428] Memory state around the buggy address: [ 15.394654] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.394970] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.395275] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.395489] ^ [ 15.395663] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.395981] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.396370] ================================================================== [ 14.045492] ================================================================== [ 14.045956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 14.046776] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.047498] [ 14.047730] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.047775] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.047788] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.047809] Call Trace: [ 14.047821] <TASK> [ 14.047835] dump_stack_lvl+0x73/0xb0 [ 14.047882] print_report+0xd1/0x650 [ 14.047904] ? __virt_addr_valid+0x1db/0x2d0 [ 14.047929] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.047949] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.047971] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.047991] kasan_report+0x141/0x180 [ 14.048012] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.048038] __asan_report_store4_noabort+0x1b/0x30 [ 14.048057] kasan_atomics_helper+0x4ba2/0x5450 [ 14.048078] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.048100] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.048139] ? kasan_atomics+0x152/0x310 [ 14.048166] kasan_atomics+0x1dc/0x310 [ 14.048187] ? __pfx_kasan_atomics+0x10/0x10 [ 14.048211] ? __pfx_read_tsc+0x10/0x10 [ 14.048231] ? ktime_get_ts64+0x86/0x230 [ 14.048254] kunit_try_run_case+0x1a5/0x480 [ 14.048276] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.048296] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.048319] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.048340] ? __kthread_parkme+0x82/0x180 [ 14.048361] ? preempt_count_sub+0x50/0x80 [ 14.048383] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.048405] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.048427] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.048448] kthread+0x337/0x6f0 [ 14.048468] ? trace_preempt_on+0x20/0xc0 [ 14.048491] ? __pfx_kthread+0x10/0x10 [ 14.048511] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.048531] ? calculate_sigpending+0x7b/0xa0 [ 14.048555] ? __pfx_kthread+0x10/0x10 [ 14.048576] ret_from_fork+0x116/0x1d0 [ 14.048592] ? __pfx_kthread+0x10/0x10 [ 14.048612] ret_from_fork_asm+0x1a/0x30 [ 14.048642] </TASK> [ 14.048664] [ 14.062475] Allocated by task 282: [ 14.062889] kasan_save_stack+0x45/0x70 [ 14.063324] kasan_save_track+0x18/0x40 [ 14.063728] kasan_save_alloc_info+0x3b/0x50 [ 14.064038] __kasan_kmalloc+0xb7/0xc0 [ 14.064208] __kmalloc_cache_noprof+0x189/0x420 [ 14.064709] kasan_atomics+0x95/0x310 [ 14.065101] kunit_try_run_case+0x1a5/0x480 [ 14.065521] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.065700] kthread+0x337/0x6f0 [ 14.065822] ret_from_fork+0x116/0x1d0 [ 14.065957] ret_from_fork_asm+0x1a/0x30 [ 14.066096] [ 14.066205] The buggy address belongs to the object at ffff8881039c5a00 [ 14.066205] which belongs to the cache kmalloc-64 of size 64 [ 14.067115] The buggy address is located 0 bytes to the right of [ 14.067115] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.067667] [ 14.067775] The buggy address belongs to the physical page: [ 14.068042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.068360] flags: 0x200000000000000(node=0|zone=2) [ 14.068725] page_type: f5(slab) [ 14.068847] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.069318] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.069651] page dumped because: kasan: bad access detected [ 14.069936] [ 14.070008] Memory state around the buggy address: [ 14.070236] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.070665] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.070998] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.071650] ^ [ 14.071912] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.072247] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.072567] ================================================================== [ 14.539869] ================================================================== [ 14.540226] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 14.540592] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.541048] [ 14.541180] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.541222] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.541235] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.541258] Call Trace: [ 14.541272] <TASK> [ 14.541286] dump_stack_lvl+0x73/0xb0 [ 14.541315] print_report+0xd1/0x650 [ 14.541337] ? __virt_addr_valid+0x1db/0x2d0 [ 14.541361] ? kasan_atomics_helper+0xe78/0x5450 [ 14.541382] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.541491] ? kasan_atomics_helper+0xe78/0x5450 [ 14.541513] kasan_report+0x141/0x180 [ 14.541548] ? kasan_atomics_helper+0xe78/0x5450 [ 14.541575] kasan_check_range+0x10c/0x1c0 [ 14.541599] __kasan_check_write+0x18/0x20 [ 14.541618] kasan_atomics_helper+0xe78/0x5450 [ 14.541642] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.541665] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.541691] ? kasan_atomics+0x152/0x310 [ 14.541718] kasan_atomics+0x1dc/0x310 [ 14.541742] ? __pfx_kasan_atomics+0x10/0x10 [ 14.541766] ? __pfx_read_tsc+0x10/0x10 [ 14.541788] ? ktime_get_ts64+0x86/0x230 [ 14.541813] kunit_try_run_case+0x1a5/0x480 [ 14.541837] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.541859] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.541884] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.541907] ? __kthread_parkme+0x82/0x180 [ 14.541929] ? preempt_count_sub+0x50/0x80 [ 14.541953] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.541977] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.542000] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.542023] kthread+0x337/0x6f0 [ 14.542043] ? trace_preempt_on+0x20/0xc0 [ 14.542067] ? __pfx_kthread+0x10/0x10 [ 14.542088] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.542109] ? calculate_sigpending+0x7b/0xa0 [ 14.542181] ? __pfx_kthread+0x10/0x10 [ 14.542204] ret_from_fork+0x116/0x1d0 [ 14.542222] ? __pfx_kthread+0x10/0x10 [ 14.542254] ret_from_fork_asm+0x1a/0x30 [ 14.542285] </TASK> [ 14.542296] [ 14.551836] Allocated by task 282: [ 14.552033] kasan_save_stack+0x45/0x70 [ 14.552309] kasan_save_track+0x18/0x40 [ 14.552593] kasan_save_alloc_info+0x3b/0x50 [ 14.552838] __kasan_kmalloc+0xb7/0xc0 [ 14.553064] __kmalloc_cache_noprof+0x189/0x420 [ 14.553309] kasan_atomics+0x95/0x310 [ 14.553450] kunit_try_run_case+0x1a5/0x480 [ 14.553807] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.554200] kthread+0x337/0x6f0 [ 14.554381] ret_from_fork+0x116/0x1d0 [ 14.554571] ret_from_fork_asm+0x1a/0x30 [ 14.554770] [ 14.554860] The buggy address belongs to the object at ffff8881039c5a00 [ 14.554860] which belongs to the cache kmalloc-64 of size 64 [ 14.555509] The buggy address is located 0 bytes to the right of [ 14.555509] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.555967] [ 14.556079] The buggy address belongs to the physical page: [ 14.556344] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.557043] flags: 0x200000000000000(node=0|zone=2) [ 14.557327] page_type: f5(slab) [ 14.557538] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.557921] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.558348] page dumped because: kasan: bad access detected [ 14.558573] [ 14.558670] Memory state around the buggy address: [ 14.558895] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.559367] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.559639] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.559947] ^ [ 14.560216] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.560642] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.560988] ================================================================== [ 14.474879] ================================================================== [ 14.475423] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 14.475852] Read of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.476223] [ 14.476439] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.476485] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.476498] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.476518] Call Trace: [ 14.476536] <TASK> [ 14.476551] dump_stack_lvl+0x73/0xb0 [ 14.476577] print_report+0xd1/0x650 [ 14.476601] ? __virt_addr_valid+0x1db/0x2d0 [ 14.476625] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.476647] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.476669] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.476692] kasan_report+0x141/0x180 [ 14.476715] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.476741] __asan_report_load4_noabort+0x18/0x20 [ 14.476766] kasan_atomics_helper+0x4a84/0x5450 [ 14.476790] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.476813] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.476838] ? kasan_atomics+0x152/0x310 [ 14.476865] kasan_atomics+0x1dc/0x310 [ 14.476889] ? __pfx_kasan_atomics+0x10/0x10 [ 14.476913] ? __pfx_read_tsc+0x10/0x10 [ 14.476934] ? ktime_get_ts64+0x86/0x230 [ 14.476959] kunit_try_run_case+0x1a5/0x480 [ 14.476983] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.477006] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.477030] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.477054] ? __kthread_parkme+0x82/0x180 [ 14.477075] ? preempt_count_sub+0x50/0x80 [ 14.477099] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.477137] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.477160] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.477184] kthread+0x337/0x6f0 [ 14.477204] ? trace_preempt_on+0x20/0xc0 [ 14.477226] ? __pfx_kthread+0x10/0x10 [ 14.477248] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.477269] ? calculate_sigpending+0x7b/0xa0 [ 14.477293] ? __pfx_kthread+0x10/0x10 [ 14.477315] ret_from_fork+0x116/0x1d0 [ 14.477334] ? __pfx_kthread+0x10/0x10 [ 14.477354] ret_from_fork_asm+0x1a/0x30 [ 14.477385] </TASK> [ 14.477396] [ 14.486279] Allocated by task 282: [ 14.486475] kasan_save_stack+0x45/0x70 [ 14.486628] kasan_save_track+0x18/0x40 [ 14.486765] kasan_save_alloc_info+0x3b/0x50 [ 14.486947] __kasan_kmalloc+0xb7/0xc0 [ 14.487164] __kmalloc_cache_noprof+0x189/0x420 [ 14.487497] kasan_atomics+0x95/0x310 [ 14.487692] kunit_try_run_case+0x1a5/0x480 [ 14.488069] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.488508] kthread+0x337/0x6f0 [ 14.488697] ret_from_fork+0x116/0x1d0 [ 14.488836] ret_from_fork_asm+0x1a/0x30 [ 14.488980] [ 14.489053] The buggy address belongs to the object at ffff8881039c5a00 [ 14.489053] which belongs to the cache kmalloc-64 of size 64 [ 14.489421] The buggy address is located 0 bytes to the right of [ 14.489421] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.490477] [ 14.490613] The buggy address belongs to the physical page: [ 14.490944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.491326] flags: 0x200000000000000(node=0|zone=2) [ 14.491495] page_type: f5(slab) [ 14.491618] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.491850] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.492079] page dumped because: kasan: bad access detected [ 14.492261] [ 14.492333] Memory state around the buggy address: [ 14.492490] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.492710] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.492931] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.493157] ^ [ 14.493314] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.493718] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.493934] ================================================================== [ 14.781996] ================================================================== [ 14.782241] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 14.782877] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.783228] [ 14.783316] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.783359] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.783372] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.783395] Call Trace: [ 14.783460] <TASK> [ 14.783477] dump_stack_lvl+0x73/0xb0 [ 14.783505] print_report+0xd1/0x650 [ 14.783529] ? __virt_addr_valid+0x1db/0x2d0 [ 14.783555] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.783576] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.783600] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.783622] kasan_report+0x141/0x180 [ 14.783644] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.783671] kasan_check_range+0x10c/0x1c0 [ 14.783695] __kasan_check_write+0x18/0x20 [ 14.783715] kasan_atomics_helper+0x12e6/0x5450 [ 14.783738] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.783759] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.783785] ? kasan_atomics+0x152/0x310 [ 14.783812] kasan_atomics+0x1dc/0x310 [ 14.783835] ? __pfx_kasan_atomics+0x10/0x10 [ 14.783873] ? __pfx_read_tsc+0x10/0x10 [ 14.783894] ? ktime_get_ts64+0x86/0x230 [ 14.783920] kunit_try_run_case+0x1a5/0x480 [ 14.783956] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.783979] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.784004] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.784037] ? __kthread_parkme+0x82/0x180 [ 14.784058] ? preempt_count_sub+0x50/0x80 [ 14.784082] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.784117] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.784162] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.784186] kthread+0x337/0x6f0 [ 14.784205] ? trace_preempt_on+0x20/0xc0 [ 14.784230] ? __pfx_kthread+0x10/0x10 [ 14.784250] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.784272] ? calculate_sigpending+0x7b/0xa0 [ 14.784296] ? __pfx_kthread+0x10/0x10 [ 14.784359] ret_from_fork+0x116/0x1d0 [ 14.784379] ? __pfx_kthread+0x10/0x10 [ 14.784400] ret_from_fork_asm+0x1a/0x30 [ 14.784431] </TASK> [ 14.784444] [ 14.798644] Allocated by task 282: [ 14.798974] kasan_save_stack+0x45/0x70 [ 14.799442] kasan_save_track+0x18/0x40 [ 14.799812] kasan_save_alloc_info+0x3b/0x50 [ 14.800218] __kasan_kmalloc+0xb7/0xc0 [ 14.800562] __kmalloc_cache_noprof+0x189/0x420 [ 14.800918] kasan_atomics+0x95/0x310 [ 14.801057] kunit_try_run_case+0x1a5/0x480 [ 14.801484] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.801976] kthread+0x337/0x6f0 [ 14.802336] ret_from_fork+0x116/0x1d0 [ 14.802753] ret_from_fork_asm+0x1a/0x30 [ 14.802901] [ 14.802972] The buggy address belongs to the object at ffff8881039c5a00 [ 14.802972] which belongs to the cache kmalloc-64 of size 64 [ 14.803862] The buggy address is located 0 bytes to the right of [ 14.803862] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.805163] [ 14.805379] The buggy address belongs to the physical page: [ 14.805873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.806111] flags: 0x200000000000000(node=0|zone=2) [ 14.806652] page_type: f5(slab) [ 14.806949] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.807869] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.808465] page dumped because: kasan: bad access detected [ 14.808955] [ 14.809081] Memory state around the buggy address: [ 14.809563] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.810055] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.810598] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.810976] ^ [ 14.811158] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.811877] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.812710] ================================================================== [ 14.921992] ================================================================== [ 14.922487] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 14.922835] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.923104] [ 14.923247] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.923287] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.923301] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.923332] Call Trace: [ 14.923348] <TASK> [ 14.923363] dump_stack_lvl+0x73/0xb0 [ 14.923389] print_report+0xd1/0x650 [ 14.923414] ? __virt_addr_valid+0x1db/0x2d0 [ 14.923437] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.923459] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.923481] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.923503] kasan_report+0x141/0x180 [ 14.923526] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.923553] kasan_check_range+0x10c/0x1c0 [ 14.923577] __kasan_check_write+0x18/0x20 [ 14.923597] kasan_atomics_helper+0x15b6/0x5450 [ 14.923621] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.923642] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.923669] ? kasan_atomics+0x152/0x310 [ 14.923705] kasan_atomics+0x1dc/0x310 [ 14.923730] ? __pfx_kasan_atomics+0x10/0x10 [ 14.923754] ? __pfx_read_tsc+0x10/0x10 [ 14.923788] ? ktime_get_ts64+0x86/0x230 [ 14.923813] kunit_try_run_case+0x1a5/0x480 [ 14.923839] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.923863] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.923889] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.923912] ? __kthread_parkme+0x82/0x180 [ 14.923933] ? preempt_count_sub+0x50/0x80 [ 14.923956] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.923990] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.924013] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.924036] kthread+0x337/0x6f0 [ 14.924067] ? trace_preempt_on+0x20/0xc0 [ 14.924090] ? __pfx_kthread+0x10/0x10 [ 14.924112] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.924167] ? calculate_sigpending+0x7b/0xa0 [ 14.924191] ? __pfx_kthread+0x10/0x10 [ 14.924212] ret_from_fork+0x116/0x1d0 [ 14.924242] ? __pfx_kthread+0x10/0x10 [ 14.924264] ret_from_fork_asm+0x1a/0x30 [ 14.924295] </TASK> [ 14.924317] [ 14.931842] Allocated by task 282: [ 14.931995] kasan_save_stack+0x45/0x70 [ 14.932245] kasan_save_track+0x18/0x40 [ 14.932422] kasan_save_alloc_info+0x3b/0x50 [ 14.932572] __kasan_kmalloc+0xb7/0xc0 [ 14.932706] __kmalloc_cache_noprof+0x189/0x420 [ 14.932865] kasan_atomics+0x95/0x310 [ 14.933005] kunit_try_run_case+0x1a5/0x480 [ 14.933202] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.933483] kthread+0x337/0x6f0 [ 14.933655] ret_from_fork+0x116/0x1d0 [ 14.933842] ret_from_fork_asm+0x1a/0x30 [ 14.934039] [ 14.934168] The buggy address belongs to the object at ffff8881039c5a00 [ 14.934168] which belongs to the cache kmalloc-64 of size 64 [ 14.934699] The buggy address is located 0 bytes to the right of [ 14.934699] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.935272] [ 14.935377] The buggy address belongs to the physical page: [ 14.935614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.935857] flags: 0x200000000000000(node=0|zone=2) [ 14.936093] page_type: f5(slab) [ 14.936318] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.936657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.936980] page dumped because: kasan: bad access detected [ 14.937246] [ 14.937357] Memory state around the buggy address: [ 14.937564] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.937869] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.938203] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.938533] ^ [ 14.938742] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.939057] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.939392] ================================================================== [ 14.747956] ================================================================== [ 14.748331] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 14.748652] Read of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.749302] [ 14.749445] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.749491] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.749504] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.749527] Call Trace: [ 14.749541] <TASK> [ 14.749555] dump_stack_lvl+0x73/0xb0 [ 14.749583] print_report+0xd1/0x650 [ 14.749606] ? __virt_addr_valid+0x1db/0x2d0 [ 14.749629] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.749651] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.749674] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.749696] kasan_report+0x141/0x180 [ 14.749720] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.749749] __asan_report_load4_noabort+0x18/0x20 [ 14.749774] kasan_atomics_helper+0x49e8/0x5450 [ 14.749798] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.749821] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.749849] ? kasan_atomics+0x152/0x310 [ 14.749877] kasan_atomics+0x1dc/0x310 [ 14.749902] ? __pfx_kasan_atomics+0x10/0x10 [ 14.749926] ? __pfx_read_tsc+0x10/0x10 [ 14.749948] ? ktime_get_ts64+0x86/0x230 [ 14.749972] kunit_try_run_case+0x1a5/0x480 [ 14.749996] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.750018] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.750042] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.750065] ? __kthread_parkme+0x82/0x180 [ 14.750085] ? preempt_count_sub+0x50/0x80 [ 14.750109] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.750213] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.750240] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.750265] kthread+0x337/0x6f0 [ 14.750296] ? trace_preempt_on+0x20/0xc0 [ 14.750360] ? __pfx_kthread+0x10/0x10 [ 14.750396] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.750417] ? calculate_sigpending+0x7b/0xa0 [ 14.750441] ? __pfx_kthread+0x10/0x10 [ 14.750463] ret_from_fork+0x116/0x1d0 [ 14.750482] ? __pfx_kthread+0x10/0x10 [ 14.750516] ret_from_fork_asm+0x1a/0x30 [ 14.750547] </TASK> [ 14.750559] [ 14.766958] Allocated by task 282: [ 14.767343] kasan_save_stack+0x45/0x70 [ 14.767724] kasan_save_track+0x18/0x40 [ 14.767866] kasan_save_alloc_info+0x3b/0x50 [ 14.768012] __kasan_kmalloc+0xb7/0xc0 [ 14.768177] __kmalloc_cache_noprof+0x189/0x420 [ 14.768697] kasan_atomics+0x95/0x310 [ 14.769339] kunit_try_run_case+0x1a5/0x480 [ 14.769789] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.770333] kthread+0x337/0x6f0 [ 14.770667] ret_from_fork+0x116/0x1d0 [ 14.771042] ret_from_fork_asm+0x1a/0x30 [ 14.771670] [ 14.771781] The buggy address belongs to the object at ffff8881039c5a00 [ 14.771781] which belongs to the cache kmalloc-64 of size 64 [ 14.772148] The buggy address is located 0 bytes to the right of [ 14.772148] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.773549] [ 14.773753] The buggy address belongs to the physical page: [ 14.774278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.774978] flags: 0x200000000000000(node=0|zone=2) [ 14.775179] page_type: f5(slab) [ 14.775451] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.776054] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.776766] page dumped because: kasan: bad access detected [ 14.777422] [ 14.777566] Memory state around the buggy address: [ 14.777872] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.778095] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.778647] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.779357] ^ [ 14.779794] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.780496] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.781148] ================================================================== [ 15.041237] ================================================================== [ 15.041970] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 15.042727] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 15.043040] [ 15.043324] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.043371] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.043384] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.043408] Call Trace: [ 15.043423] <TASK> [ 15.043438] dump_stack_lvl+0x73/0xb0 [ 15.043467] print_report+0xd1/0x650 [ 15.043490] ? __virt_addr_valid+0x1db/0x2d0 [ 15.043514] ? kasan_atomics_helper+0x194a/0x5450 [ 15.043537] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.043559] ? kasan_atomics_helper+0x194a/0x5450 [ 15.043582] kasan_report+0x141/0x180 [ 15.043604] ? kasan_atomics_helper+0x194a/0x5450 [ 15.043631] kasan_check_range+0x10c/0x1c0 [ 15.043655] __kasan_check_write+0x18/0x20 [ 15.043675] kasan_atomics_helper+0x194a/0x5450 [ 15.043698] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.043720] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.043746] ? kasan_atomics+0x152/0x310 [ 15.043772] kasan_atomics+0x1dc/0x310 [ 15.043795] ? __pfx_kasan_atomics+0x10/0x10 [ 15.043820] ? __pfx_read_tsc+0x10/0x10 [ 15.043841] ? ktime_get_ts64+0x86/0x230 [ 15.043867] kunit_try_run_case+0x1a5/0x480 [ 15.043892] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.043915] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.043940] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.043963] ? __kthread_parkme+0x82/0x180 [ 15.043984] ? preempt_count_sub+0x50/0x80 [ 15.044009] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.044034] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.044058] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.044082] kthread+0x337/0x6f0 [ 15.044102] ? trace_preempt_on+0x20/0xc0 [ 15.044297] ? __pfx_kthread+0x10/0x10 [ 15.044323] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.044347] ? calculate_sigpending+0x7b/0xa0 [ 15.044372] ? __pfx_kthread+0x10/0x10 [ 15.044393] ret_from_fork+0x116/0x1d0 [ 15.044413] ? __pfx_kthread+0x10/0x10 [ 15.044434] ret_from_fork_asm+0x1a/0x30 [ 15.044464] </TASK> [ 15.044476] [ 15.054855] Allocated by task 282: [ 15.055214] kasan_save_stack+0x45/0x70 [ 15.055421] kasan_save_track+0x18/0x40 [ 15.055753] kasan_save_alloc_info+0x3b/0x50 [ 15.056030] __kasan_kmalloc+0xb7/0xc0 [ 15.056360] __kmalloc_cache_noprof+0x189/0x420 [ 15.056673] kasan_atomics+0x95/0x310 [ 15.056892] kunit_try_run_case+0x1a5/0x480 [ 15.057239] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.057577] kthread+0x337/0x6f0 [ 15.057816] ret_from_fork+0x116/0x1d0 [ 15.058032] ret_from_fork_asm+0x1a/0x30 [ 15.058359] [ 15.058482] The buggy address belongs to the object at ffff8881039c5a00 [ 15.058482] which belongs to the cache kmalloc-64 of size 64 [ 15.059214] The buggy address is located 0 bytes to the right of [ 15.059214] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 15.059841] [ 15.059941] The buggy address belongs to the physical page: [ 15.060336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 15.060766] flags: 0x200000000000000(node=0|zone=2) [ 15.060985] page_type: f5(slab) [ 15.061332] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.061741] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.062175] page dumped because: kasan: bad access detected [ 15.062378] [ 15.062568] Memory state around the buggy address: [ 15.062898] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.063233] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.063701] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.064042] ^ [ 15.064376] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.064772] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.065181] ================================================================== [ 15.140655] ================================================================== [ 15.140968] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 15.141699] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 15.142099] [ 15.142403] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.142453] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.142466] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.142488] Call Trace: [ 15.142504] <TASK> [ 15.142529] dump_stack_lvl+0x73/0xb0 [ 15.142557] print_report+0xd1/0x650 [ 15.142581] ? __virt_addr_valid+0x1db/0x2d0 [ 15.142605] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.142627] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.142650] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.142672] kasan_report+0x141/0x180 [ 15.142696] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.142723] kasan_check_range+0x10c/0x1c0 [ 15.142747] __kasan_check_write+0x18/0x20 [ 15.142767] kasan_atomics_helper+0x1c18/0x5450 [ 15.142791] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.142815] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.142841] ? kasan_atomics+0x152/0x310 [ 15.142869] kasan_atomics+0x1dc/0x310 [ 15.142892] ? __pfx_kasan_atomics+0x10/0x10 [ 15.142917] ? __pfx_read_tsc+0x10/0x10 [ 15.142938] ? ktime_get_ts64+0x86/0x230 [ 15.142962] kunit_try_run_case+0x1a5/0x480 [ 15.142987] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.143009] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.143031] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.143054] ? __kthread_parkme+0x82/0x180 [ 15.143075] ? preempt_count_sub+0x50/0x80 [ 15.143099] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.143145] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.143168] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.143192] kthread+0x337/0x6f0 [ 15.143212] ? trace_preempt_on+0x20/0xc0 [ 15.143236] ? __pfx_kthread+0x10/0x10 [ 15.143257] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.143278] ? calculate_sigpending+0x7b/0xa0 [ 15.143302] ? __pfx_kthread+0x10/0x10 [ 15.143323] ret_from_fork+0x116/0x1d0 [ 15.143343] ? __pfx_kthread+0x10/0x10 [ 15.143364] ret_from_fork_asm+0x1a/0x30 [ 15.143395] </TASK> [ 15.143406] [ 15.154042] Allocated by task 282: [ 15.154431] kasan_save_stack+0x45/0x70 [ 15.154659] kasan_save_track+0x18/0x40 [ 15.154966] kasan_save_alloc_info+0x3b/0x50 [ 15.155211] __kasan_kmalloc+0xb7/0xc0 [ 15.155525] __kmalloc_cache_noprof+0x189/0x420 [ 15.155810] kasan_atomics+0x95/0x310 [ 15.156000] kunit_try_run_case+0x1a5/0x480 [ 15.156401] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.156675] kthread+0x337/0x6f0 [ 15.156945] ret_from_fork+0x116/0x1d0 [ 15.157260] ret_from_fork_asm+0x1a/0x30 [ 15.157493] [ 15.157613] The buggy address belongs to the object at ffff8881039c5a00 [ 15.157613] which belongs to the cache kmalloc-64 of size 64 [ 15.158078] The buggy address is located 0 bytes to the right of [ 15.158078] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 15.158900] [ 15.159175] The buggy address belongs to the physical page: [ 15.159466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 15.159881] flags: 0x200000000000000(node=0|zone=2) [ 15.160238] page_type: f5(slab) [ 15.160515] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.160837] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.161384] page dumped because: kasan: bad access detected [ 15.161718] [ 15.161840] Memory state around the buggy address: [ 15.162185] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.162498] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.162931] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.163329] ^ [ 15.163628] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.163997] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.164423] ================================================================== [ 14.561673] ================================================================== [ 14.562000] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 14.562446] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.562698] [ 14.562801] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.562928] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.562944] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.562991] Call Trace: [ 14.563029] <TASK> [ 14.563045] dump_stack_lvl+0x73/0xb0 [ 14.563073] print_report+0xd1/0x650 [ 14.563116] ? __virt_addr_valid+0x1db/0x2d0 [ 14.563157] ? kasan_atomics_helper+0xf10/0x5450 [ 14.563178] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.563200] ? kasan_atomics_helper+0xf10/0x5450 [ 14.563222] kasan_report+0x141/0x180 [ 14.563245] ? kasan_atomics_helper+0xf10/0x5450 [ 14.563271] kasan_check_range+0x10c/0x1c0 [ 14.563295] __kasan_check_write+0x18/0x20 [ 14.563358] kasan_atomics_helper+0xf10/0x5450 [ 14.563382] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.563405] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.563431] ? kasan_atomics+0x152/0x310 [ 14.563457] kasan_atomics+0x1dc/0x310 [ 14.563481] ? __pfx_kasan_atomics+0x10/0x10 [ 14.563505] ? __pfx_read_tsc+0x10/0x10 [ 14.563527] ? ktime_get_ts64+0x86/0x230 [ 14.563552] kunit_try_run_case+0x1a5/0x480 [ 14.563612] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.563637] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.563661] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.563711] ? __kthread_parkme+0x82/0x180 [ 14.563734] ? preempt_count_sub+0x50/0x80 [ 14.563758] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.563793] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.563816] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.563840] kthread+0x337/0x6f0 [ 14.563860] ? trace_preempt_on+0x20/0xc0 [ 14.563884] ? __pfx_kthread+0x10/0x10 [ 14.563905] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.563927] ? calculate_sigpending+0x7b/0xa0 [ 14.563951] ? __pfx_kthread+0x10/0x10 [ 14.563973] ret_from_fork+0x116/0x1d0 [ 14.563992] ? __pfx_kthread+0x10/0x10 [ 14.564014] ret_from_fork_asm+0x1a/0x30 [ 14.564045] </TASK> [ 14.564057] [ 14.573076] Allocated by task 282: [ 14.573479] kasan_save_stack+0x45/0x70 [ 14.573648] kasan_save_track+0x18/0x40 [ 14.573787] kasan_save_alloc_info+0x3b/0x50 [ 14.573992] __kasan_kmalloc+0xb7/0xc0 [ 14.574300] __kmalloc_cache_noprof+0x189/0x420 [ 14.574860] kasan_atomics+0x95/0x310 [ 14.575108] kunit_try_run_case+0x1a5/0x480 [ 14.575425] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.575718] kthread+0x337/0x6f0 [ 14.575844] ret_from_fork+0x116/0x1d0 [ 14.575979] ret_from_fork_asm+0x1a/0x30 [ 14.576245] [ 14.576432] The buggy address belongs to the object at ffff8881039c5a00 [ 14.576432] which belongs to the cache kmalloc-64 of size 64 [ 14.577209] The buggy address is located 0 bytes to the right of [ 14.577209] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.577789] [ 14.577869] The buggy address belongs to the physical page: [ 14.578155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.578613] flags: 0x200000000000000(node=0|zone=2) [ 14.578922] page_type: f5(slab) [ 14.579053] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.579642] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.579970] page dumped because: kasan: bad access detected [ 14.580245] [ 14.580346] Memory state around the buggy address: [ 14.580558] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.580865] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.581546] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.581882] ^ [ 14.582044] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.582540] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.582877] ================================================================== [ 14.583511] ================================================================== [ 14.583826] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 14.584210] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.584729] [ 14.584862] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.584907] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.584920] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.584943] Call Trace: [ 14.584960] <TASK> [ 14.584976] dump_stack_lvl+0x73/0xb0 [ 14.585005] print_report+0xd1/0x650 [ 14.585027] ? __virt_addr_valid+0x1db/0x2d0 [ 14.585051] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.585073] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.585095] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.585117] kasan_report+0x141/0x180 [ 14.585194] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.585231] kasan_check_range+0x10c/0x1c0 [ 14.585256] __kasan_check_write+0x18/0x20 [ 14.585276] kasan_atomics_helper+0xfa9/0x5450 [ 14.585298] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.585321] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.585346] ? kasan_atomics+0x152/0x310 [ 14.585373] kasan_atomics+0x1dc/0x310 [ 14.585397] ? __pfx_kasan_atomics+0x10/0x10 [ 14.585422] ? __pfx_read_tsc+0x10/0x10 [ 14.585443] ? ktime_get_ts64+0x86/0x230 [ 14.585468] kunit_try_run_case+0x1a5/0x480 [ 14.585492] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.585514] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.585539] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.585562] ? __kthread_parkme+0x82/0x180 [ 14.585584] ? preempt_count_sub+0x50/0x80 [ 14.585608] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.585632] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.585655] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.585679] kthread+0x337/0x6f0 [ 14.585699] ? trace_preempt_on+0x20/0xc0 [ 14.585723] ? __pfx_kthread+0x10/0x10 [ 14.585744] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.585765] ? calculate_sigpending+0x7b/0xa0 [ 14.585789] ? __pfx_kthread+0x10/0x10 [ 14.585812] ret_from_fork+0x116/0x1d0 [ 14.585831] ? __pfx_kthread+0x10/0x10 [ 14.585852] ret_from_fork_asm+0x1a/0x30 [ 14.585883] </TASK> [ 14.585894] [ 14.595696] Allocated by task 282: [ 14.595872] kasan_save_stack+0x45/0x70 [ 14.596140] kasan_save_track+0x18/0x40 [ 14.596481] kasan_save_alloc_info+0x3b/0x50 [ 14.596703] __kasan_kmalloc+0xb7/0xc0 [ 14.596925] __kmalloc_cache_noprof+0x189/0x420 [ 14.597228] kasan_atomics+0x95/0x310 [ 14.597499] kunit_try_run_case+0x1a5/0x480 [ 14.597737] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.598007] kthread+0x337/0x6f0 [ 14.598194] ret_from_fork+0x116/0x1d0 [ 14.598454] ret_from_fork_asm+0x1a/0x30 [ 14.598641] [ 14.598716] The buggy address belongs to the object at ffff8881039c5a00 [ 14.598716] which belongs to the cache kmalloc-64 of size 64 [ 14.599391] The buggy address is located 0 bytes to the right of [ 14.599391] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.599896] [ 14.599994] The buggy address belongs to the physical page: [ 14.600314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.600995] flags: 0x200000000000000(node=0|zone=2) [ 14.601265] page_type: f5(slab) [ 14.601389] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.601695] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.602094] page dumped because: kasan: bad access detected [ 14.602366] [ 14.602464] Memory state around the buggy address: [ 14.602694] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.603075] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.603477] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.603764] ^ [ 14.604008] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.604446] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.604828] ================================================================== [ 14.727042] ================================================================== [ 14.727297] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 14.727987] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.728753] [ 14.728863] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.728908] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.728923] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.728944] Call Trace: [ 14.728960] <TASK> [ 14.728976] dump_stack_lvl+0x73/0xb0 [ 14.729004] print_report+0xd1/0x650 [ 14.729028] ? __virt_addr_valid+0x1db/0x2d0 [ 14.729053] ? kasan_atomics_helper+0x1217/0x5450 [ 14.729075] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.729098] ? kasan_atomics_helper+0x1217/0x5450 [ 14.729134] kasan_report+0x141/0x180 [ 14.729158] ? kasan_atomics_helper+0x1217/0x5450 [ 14.729185] kasan_check_range+0x10c/0x1c0 [ 14.729209] __kasan_check_write+0x18/0x20 [ 14.729230] kasan_atomics_helper+0x1217/0x5450 [ 14.729253] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.729277] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.729303] ? kasan_atomics+0x152/0x310 [ 14.729330] kasan_atomics+0x1dc/0x310 [ 14.729353] ? __pfx_kasan_atomics+0x10/0x10 [ 14.729379] ? __pfx_read_tsc+0x10/0x10 [ 14.729400] ? ktime_get_ts64+0x86/0x230 [ 14.729479] kunit_try_run_case+0x1a5/0x480 [ 14.729519] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.729541] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.729565] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.729588] ? __kthread_parkme+0x82/0x180 [ 14.729611] ? preempt_count_sub+0x50/0x80 [ 14.729634] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.729658] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.729682] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.729705] kthread+0x337/0x6f0 [ 14.729725] ? trace_preempt_on+0x20/0xc0 [ 14.729748] ? __pfx_kthread+0x10/0x10 [ 14.729770] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.729791] ? calculate_sigpending+0x7b/0xa0 [ 14.729815] ? __pfx_kthread+0x10/0x10 [ 14.729837] ret_from_fork+0x116/0x1d0 [ 14.729855] ? __pfx_kthread+0x10/0x10 [ 14.729876] ret_from_fork_asm+0x1a/0x30 [ 14.729906] </TASK> [ 14.729918] [ 14.738808] Allocated by task 282: [ 14.739027] kasan_save_stack+0x45/0x70 [ 14.739246] kasan_save_track+0x18/0x40 [ 14.739385] kasan_save_alloc_info+0x3b/0x50 [ 14.739796] __kasan_kmalloc+0xb7/0xc0 [ 14.740002] __kmalloc_cache_noprof+0x189/0x420 [ 14.740241] kasan_atomics+0x95/0x310 [ 14.740456] kunit_try_run_case+0x1a5/0x480 [ 14.740669] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.740908] kthread+0x337/0x6f0 [ 14.741099] ret_from_fork+0x116/0x1d0 [ 14.741294] ret_from_fork_asm+0x1a/0x30 [ 14.741437] [ 14.741510] The buggy address belongs to the object at ffff8881039c5a00 [ 14.741510] which belongs to the cache kmalloc-64 of size 64 [ 14.741966] The buggy address is located 0 bytes to the right of [ 14.741966] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.742505] [ 14.742598] The buggy address belongs to the physical page: [ 14.742766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.743153] flags: 0x200000000000000(node=0|zone=2) [ 14.743552] page_type: f5(slab) [ 14.743907] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.744488] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.744784] page dumped because: kasan: bad access detected [ 14.745022] [ 14.745120] Memory state around the buggy address: [ 14.745518] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.745832] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.746156] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.746575] ^ [ 14.746792] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.747105] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.747548] ================================================================== [ 14.813404] ================================================================== [ 14.813674] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 14.813912] Read of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.814153] [ 14.814249] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.814292] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.814320] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.814341] Call Trace: [ 14.814358] <TASK> [ 14.814387] dump_stack_lvl+0x73/0xb0 [ 14.814424] print_report+0xd1/0x650 [ 14.814450] ? __virt_addr_valid+0x1db/0x2d0 [ 14.814474] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.814496] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.814523] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.814545] kasan_report+0x141/0x180 [ 14.814568] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.814594] __asan_report_load4_noabort+0x18/0x20 [ 14.814619] kasan_atomics_helper+0x49ce/0x5450 [ 14.814642] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.814664] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.814689] ? kasan_atomics+0x152/0x310 [ 14.814726] kasan_atomics+0x1dc/0x310 [ 14.814750] ? __pfx_kasan_atomics+0x10/0x10 [ 14.814784] ? __pfx_read_tsc+0x10/0x10 [ 14.814806] ? ktime_get_ts64+0x86/0x230 [ 14.814830] kunit_try_run_case+0x1a5/0x480 [ 14.814855] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.814878] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.814911] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.814934] ? __kthread_parkme+0x82/0x180 [ 14.814955] ? preempt_count_sub+0x50/0x80 [ 14.814990] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.815015] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.815038] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.815062] kthread+0x337/0x6f0 [ 14.815081] ? trace_preempt_on+0x20/0xc0 [ 14.815105] ? __pfx_kthread+0x10/0x10 [ 14.815135] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.815167] ? calculate_sigpending+0x7b/0xa0 [ 14.815192] ? __pfx_kthread+0x10/0x10 [ 14.815214] ret_from_fork+0x116/0x1d0 [ 14.815234] ? __pfx_kthread+0x10/0x10 [ 14.815254] ret_from_fork_asm+0x1a/0x30 [ 14.815285] </TASK> [ 14.815297] [ 14.822893] Allocated by task 282: [ 14.823070] kasan_save_stack+0x45/0x70 [ 14.823325] kasan_save_track+0x18/0x40 [ 14.823506] kasan_save_alloc_info+0x3b/0x50 [ 14.823735] __kasan_kmalloc+0xb7/0xc0 [ 14.823920] __kmalloc_cache_noprof+0x189/0x420 [ 14.824200] kasan_atomics+0x95/0x310 [ 14.824380] kunit_try_run_case+0x1a5/0x480 [ 14.824599] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.824838] kthread+0x337/0x6f0 [ 14.824974] ret_from_fork+0x116/0x1d0 [ 14.825238] ret_from_fork_asm+0x1a/0x30 [ 14.825439] [ 14.825533] The buggy address belongs to the object at ffff8881039c5a00 [ 14.825533] which belongs to the cache kmalloc-64 of size 64 [ 14.825894] The buggy address is located 0 bytes to the right of [ 14.825894] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.826306] [ 14.826406] The buggy address belongs to the physical page: [ 14.826665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.827042] flags: 0x200000000000000(node=0|zone=2) [ 14.827309] page_type: f5(slab) [ 14.827478] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.827820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.828173] page dumped because: kasan: bad access detected [ 14.828349] [ 14.828422] Memory state around the buggy address: [ 14.828580] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.828917] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.829283] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.829629] ^ [ 14.829858] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.830188] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.830468] ================================================================== [ 14.885487] ================================================================== [ 14.885816] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 14.886194] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.886526] [ 14.886610] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.886664] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.886677] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.886708] Call Trace: [ 14.886724] <TASK> [ 14.886740] dump_stack_lvl+0x73/0xb0 [ 14.886766] print_report+0xd1/0x650 [ 14.886808] ? __virt_addr_valid+0x1db/0x2d0 [ 14.886832] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.886853] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.886887] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.886910] kasan_report+0x141/0x180 [ 14.886932] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.886959] __asan_report_store8_noabort+0x1b/0x30 [ 14.886990] kasan_atomics_helper+0x50d4/0x5450 [ 14.887013] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.887036] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.887072] ? kasan_atomics+0x152/0x310 [ 14.887100] kasan_atomics+0x1dc/0x310 [ 14.887153] ? __pfx_kasan_atomics+0x10/0x10 [ 14.887179] ? __pfx_read_tsc+0x10/0x10 [ 14.887212] ? ktime_get_ts64+0x86/0x230 [ 14.887237] kunit_try_run_case+0x1a5/0x480 [ 14.887261] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.887295] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.887318] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.887342] ? __kthread_parkme+0x82/0x180 [ 14.887374] ? preempt_count_sub+0x50/0x80 [ 14.887399] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.887423] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.887458] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.887482] kthread+0x337/0x6f0 [ 14.887502] ? trace_preempt_on+0x20/0xc0 [ 14.887537] ? __pfx_kthread+0x10/0x10 [ 14.887558] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.887580] ? calculate_sigpending+0x7b/0xa0 [ 14.887615] ? __pfx_kthread+0x10/0x10 [ 14.887637] ret_from_fork+0x116/0x1d0 [ 14.887656] ? __pfx_kthread+0x10/0x10 [ 14.887688] ret_from_fork_asm+0x1a/0x30 [ 14.887718] </TASK> [ 14.887730] [ 14.895314] Allocated by task 282: [ 14.895493] kasan_save_stack+0x45/0x70 [ 14.895720] kasan_save_track+0x18/0x40 [ 14.895948] kasan_save_alloc_info+0x3b/0x50 [ 14.896221] __kasan_kmalloc+0xb7/0xc0 [ 14.896403] __kmalloc_cache_noprof+0x189/0x420 [ 14.896600] kasan_atomics+0x95/0x310 [ 14.896791] kunit_try_run_case+0x1a5/0x480 [ 14.897014] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.897299] kthread+0x337/0x6f0 [ 14.897470] ret_from_fork+0x116/0x1d0 [ 14.897666] ret_from_fork_asm+0x1a/0x30 [ 14.897859] [ 14.897968] The buggy address belongs to the object at ffff8881039c5a00 [ 14.897968] which belongs to the cache kmalloc-64 of size 64 [ 14.898505] The buggy address is located 0 bytes to the right of [ 14.898505] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.899040] [ 14.899112] The buggy address belongs to the physical page: [ 14.899362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.899734] flags: 0x200000000000000(node=0|zone=2) [ 14.899951] page_type: f5(slab) [ 14.900093] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.900468] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.900728] page dumped because: kasan: bad access detected [ 14.900901] [ 14.900972] Memory state around the buggy address: [ 14.901156] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.901374] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.901684] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.902001] ^ [ 14.902257] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.902585] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.902901] ================================================================== [ 15.165670] ================================================================== [ 15.165980] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 15.166475] Read of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 15.166831] [ 15.166957] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.167004] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.167017] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.167039] Call Trace: [ 15.167054] <TASK> [ 15.167069] dump_stack_lvl+0x73/0xb0 [ 15.167097] print_report+0xd1/0x650 [ 15.167120] ? __virt_addr_valid+0x1db/0x2d0 [ 15.167436] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.167464] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.167487] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.167510] kasan_report+0x141/0x180 [ 15.167533] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.167560] __asan_report_load8_noabort+0x18/0x20 [ 15.167586] kasan_atomics_helper+0x4f30/0x5450 [ 15.167609] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.167631] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.167657] ? kasan_atomics+0x152/0x310 [ 15.167684] kasan_atomics+0x1dc/0x310 [ 15.167707] ? __pfx_kasan_atomics+0x10/0x10 [ 15.167732] ? __pfx_read_tsc+0x10/0x10 [ 15.167753] ? ktime_get_ts64+0x86/0x230 [ 15.167778] kunit_try_run_case+0x1a5/0x480 [ 15.167801] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.167824] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.167848] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.167871] ? __kthread_parkme+0x82/0x180 [ 15.167892] ? preempt_count_sub+0x50/0x80 [ 15.167916] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.167939] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.167962] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.167986] kthread+0x337/0x6f0 [ 15.168006] ? trace_preempt_on+0x20/0xc0 [ 15.168028] ? __pfx_kthread+0x10/0x10 [ 15.168050] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.168071] ? calculate_sigpending+0x7b/0xa0 [ 15.168095] ? __pfx_kthread+0x10/0x10 [ 15.168116] ret_from_fork+0x116/0x1d0 [ 15.168148] ? __pfx_kthread+0x10/0x10 [ 15.168169] ret_from_fork_asm+0x1a/0x30 [ 15.168200] </TASK> [ 15.168212] [ 15.178678] Allocated by task 282: [ 15.178955] kasan_save_stack+0x45/0x70 [ 15.179179] kasan_save_track+0x18/0x40 [ 15.179509] kasan_save_alloc_info+0x3b/0x50 [ 15.179733] __kasan_kmalloc+0xb7/0xc0 [ 15.180025] __kmalloc_cache_noprof+0x189/0x420 [ 15.180334] kasan_atomics+0x95/0x310 [ 15.180602] kunit_try_run_case+0x1a5/0x480 [ 15.180834] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.181253] kthread+0x337/0x6f0 [ 15.181454] ret_from_fork+0x116/0x1d0 [ 15.181744] ret_from_fork_asm+0x1a/0x30 [ 15.182018] [ 15.182277] The buggy address belongs to the object at ffff8881039c5a00 [ 15.182277] which belongs to the cache kmalloc-64 of size 64 [ 15.182797] The buggy address is located 0 bytes to the right of [ 15.182797] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 15.183647] [ 15.183746] The buggy address belongs to the physical page: [ 15.183958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 15.184489] flags: 0x200000000000000(node=0|zone=2) [ 15.184840] page_type: f5(slab) [ 15.185080] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.185611] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.186027] page dumped because: kasan: bad access detected [ 15.186413] [ 15.186568] Memory state around the buggy address: [ 15.186875] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.187362] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.187713] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.188069] ^ [ 15.188442] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.188804] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.189230] ================================================================== [ 14.831025] ================================================================== [ 14.831367] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 14.831662] Read of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.831952] [ 14.832065] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.832108] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.832476] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.832523] Call Trace: [ 14.832539] <TASK> [ 14.832554] dump_stack_lvl+0x73/0xb0 [ 14.832582] print_report+0xd1/0x650 [ 14.832605] ? __virt_addr_valid+0x1db/0x2d0 [ 14.832629] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.832652] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.832675] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.832697] kasan_report+0x141/0x180 [ 14.832719] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.832746] kasan_check_range+0x10c/0x1c0 [ 14.832780] __kasan_check_read+0x15/0x20 [ 14.832800] kasan_atomics_helper+0x13b5/0x5450 [ 14.832823] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.832857] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.832882] ? kasan_atomics+0x152/0x310 [ 14.832908] kasan_atomics+0x1dc/0x310 [ 14.832941] ? __pfx_kasan_atomics+0x10/0x10 [ 14.832965] ? __pfx_read_tsc+0x10/0x10 [ 14.832986] ? ktime_get_ts64+0x86/0x230 [ 14.833020] kunit_try_run_case+0x1a5/0x480 [ 14.833044] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.833066] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.833090] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.833154] ? __kthread_parkme+0x82/0x180 [ 14.833181] ? preempt_count_sub+0x50/0x80 [ 14.833219] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.833246] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.833279] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.833303] kthread+0x337/0x6f0 [ 14.833323] ? trace_preempt_on+0x20/0xc0 [ 14.833346] ? __pfx_kthread+0x10/0x10 [ 14.833368] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.833398] ? calculate_sigpending+0x7b/0xa0 [ 14.833423] ? __pfx_kthread+0x10/0x10 [ 14.833445] ret_from_fork+0x116/0x1d0 [ 14.833474] ? __pfx_kthread+0x10/0x10 [ 14.833495] ret_from_fork_asm+0x1a/0x30 [ 14.833526] </TASK> [ 14.833537] [ 14.841157] Allocated by task 282: [ 14.841293] kasan_save_stack+0x45/0x70 [ 14.841437] kasan_save_track+0x18/0x40 [ 14.841574] kasan_save_alloc_info+0x3b/0x50 [ 14.841787] __kasan_kmalloc+0xb7/0xc0 [ 14.842008] __kmalloc_cache_noprof+0x189/0x420 [ 14.842282] kasan_atomics+0x95/0x310 [ 14.842495] kunit_try_run_case+0x1a5/0x480 [ 14.842720] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.843001] kthread+0x337/0x6f0 [ 14.843215] ret_from_fork+0x116/0x1d0 [ 14.843421] ret_from_fork_asm+0x1a/0x30 [ 14.843575] [ 14.843660] The buggy address belongs to the object at ffff8881039c5a00 [ 14.843660] which belongs to the cache kmalloc-64 of size 64 [ 14.844232] The buggy address is located 0 bytes to the right of [ 14.844232] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.844606] [ 14.844680] The buggy address belongs to the physical page: [ 14.844856] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.845271] flags: 0x200000000000000(node=0|zone=2) [ 14.845507] page_type: f5(slab) [ 14.845674] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.846012] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.846383] page dumped because: kasan: bad access detected [ 14.846617] [ 14.846727] Memory state around the buggy address: [ 14.846922] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.847175] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.847437] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.847781] ^ [ 14.848010] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.848385] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.848706] ================================================================== [ 14.849436] ================================================================== [ 14.849769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 14.850146] Read of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.850503] [ 14.850645] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.850688] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.850712] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.850733] Call Trace: [ 14.850750] <TASK> [ 14.850779] dump_stack_lvl+0x73/0xb0 [ 14.850806] print_report+0xd1/0x650 [ 14.850829] ? __virt_addr_valid+0x1db/0x2d0 [ 14.850863] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.850884] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.850907] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.850929] kasan_report+0x141/0x180 [ 14.850952] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.850978] __asan_report_load8_noabort+0x18/0x20 [ 14.851003] kasan_atomics_helper+0x4eae/0x5450 [ 14.851026] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.851048] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.851074] ? kasan_atomics+0x152/0x310 [ 14.851100] kasan_atomics+0x1dc/0x310 [ 14.851152] ? __pfx_kasan_atomics+0x10/0x10 [ 14.851177] ? __pfx_read_tsc+0x10/0x10 [ 14.851199] ? ktime_get_ts64+0x86/0x230 [ 14.851223] kunit_try_run_case+0x1a5/0x480 [ 14.851247] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.851270] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.851294] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.851317] ? __kthread_parkme+0x82/0x180 [ 14.851338] ? preempt_count_sub+0x50/0x80 [ 14.851361] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.851385] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.851418] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.851443] kthread+0x337/0x6f0 [ 14.851463] ? trace_preempt_on+0x20/0xc0 [ 14.851507] ? __pfx_kthread+0x10/0x10 [ 14.851528] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.851549] ? calculate_sigpending+0x7b/0xa0 [ 14.851584] ? __pfx_kthread+0x10/0x10 [ 14.851607] ret_from_fork+0x116/0x1d0 [ 14.851626] ? __pfx_kthread+0x10/0x10 [ 14.851648] ret_from_fork_asm+0x1a/0x30 [ 14.851678] </TASK> [ 14.851691] [ 14.859168] Allocated by task 282: [ 14.859327] kasan_save_stack+0x45/0x70 [ 14.859557] kasan_save_track+0x18/0x40 [ 14.859755] kasan_save_alloc_info+0x3b/0x50 [ 14.859949] __kasan_kmalloc+0xb7/0xc0 [ 14.860176] __kmalloc_cache_noprof+0x189/0x420 [ 14.860400] kasan_atomics+0x95/0x310 [ 14.860598] kunit_try_run_case+0x1a5/0x480 [ 14.860787] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.861046] kthread+0x337/0x6f0 [ 14.861237] ret_from_fork+0x116/0x1d0 [ 14.861423] ret_from_fork_asm+0x1a/0x30 [ 14.861634] [ 14.861718] The buggy address belongs to the object at ffff8881039c5a00 [ 14.861718] which belongs to the cache kmalloc-64 of size 64 [ 14.862256] The buggy address is located 0 bytes to the right of [ 14.862256] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.862747] [ 14.862843] The buggy address belongs to the physical page: [ 14.863103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.863395] flags: 0x200000000000000(node=0|zone=2) [ 14.863559] page_type: f5(slab) [ 14.863680] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.863913] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.864286] page dumped because: kasan: bad access detected [ 14.864590] [ 14.864699] Memory state around the buggy address: [ 14.864973] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.865341] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.865567] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.865783] ^ [ 14.865938] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.866295] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.866643] ================================================================== [ 14.274987] ================================================================== [ 14.275532] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 14.275813] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.276162] [ 14.276258] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.276383] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.276397] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.276419] Call Trace: [ 14.276436] <TASK> [ 14.276451] dump_stack_lvl+0x73/0xb0 [ 14.276479] print_report+0xd1/0x650 [ 14.276502] ? __virt_addr_valid+0x1db/0x2d0 [ 14.276526] ? kasan_atomics_helper+0x72f/0x5450 [ 14.276548] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.276571] ? kasan_atomics_helper+0x72f/0x5450 [ 14.276594] kasan_report+0x141/0x180 [ 14.276617] ? kasan_atomics_helper+0x72f/0x5450 [ 14.276644] kasan_check_range+0x10c/0x1c0 [ 14.276668] __kasan_check_write+0x18/0x20 [ 14.276688] kasan_atomics_helper+0x72f/0x5450 [ 14.276711] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.276735] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.276761] ? kasan_atomics+0x152/0x310 [ 14.276788] kasan_atomics+0x1dc/0x310 [ 14.276811] ? __pfx_kasan_atomics+0x10/0x10 [ 14.276836] ? __pfx_read_tsc+0x10/0x10 [ 14.276858] ? ktime_get_ts64+0x86/0x230 [ 14.276883] kunit_try_run_case+0x1a5/0x480 [ 14.276907] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.276929] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.276954] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.276977] ? __kthread_parkme+0x82/0x180 [ 14.277000] ? preempt_count_sub+0x50/0x80 [ 14.277023] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.277047] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.277070] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.277093] kthread+0x337/0x6f0 [ 14.277113] ? trace_preempt_on+0x20/0xc0 [ 14.277148] ? __pfx_kthread+0x10/0x10 [ 14.277188] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.277209] ? calculate_sigpending+0x7b/0xa0 [ 14.277233] ? __pfx_kthread+0x10/0x10 [ 14.277255] ret_from_fork+0x116/0x1d0 [ 14.277275] ? __pfx_kthread+0x10/0x10 [ 14.277347] ret_from_fork_asm+0x1a/0x30 [ 14.277382] </TASK> [ 14.277393] [ 14.285250] Allocated by task 282: [ 14.285700] kasan_save_stack+0x45/0x70 [ 14.285864] kasan_save_track+0x18/0x40 [ 14.286063] kasan_save_alloc_info+0x3b/0x50 [ 14.286281] __kasan_kmalloc+0xb7/0xc0 [ 14.286547] __kmalloc_cache_noprof+0x189/0x420 [ 14.286741] kasan_atomics+0x95/0x310 [ 14.286933] kunit_try_run_case+0x1a5/0x480 [ 14.287088] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.287441] kthread+0x337/0x6f0 [ 14.287579] ret_from_fork+0x116/0x1d0 [ 14.287770] ret_from_fork_asm+0x1a/0x30 [ 14.287912] [ 14.287984] The buggy address belongs to the object at ffff8881039c5a00 [ 14.287984] which belongs to the cache kmalloc-64 of size 64 [ 14.288442] The buggy address is located 0 bytes to the right of [ 14.288442] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.288986] [ 14.289087] The buggy address belongs to the physical page: [ 14.289386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.289748] flags: 0x200000000000000(node=0|zone=2) [ 14.289980] page_type: f5(slab) [ 14.290151] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.290451] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.290708] page dumped because: kasan: bad access detected [ 14.290880] [ 14.290952] Memory state around the buggy address: [ 14.291110] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.291733] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.292079] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.292511] ^ [ 14.292751] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.293063] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.293414] ================================================================== [ 15.016645] ================================================================== [ 15.016895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 15.017318] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 15.017660] [ 15.017772] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.017814] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.017828] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.017850] Call Trace: [ 15.017868] <TASK> [ 15.017885] dump_stack_lvl+0x73/0xb0 [ 15.017911] print_report+0xd1/0x650 [ 15.017935] ? __virt_addr_valid+0x1db/0x2d0 [ 15.017959] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.017981] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.018004] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.018026] kasan_report+0x141/0x180 [ 15.018049] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.018076] kasan_check_range+0x10c/0x1c0 [ 15.018100] __kasan_check_write+0x18/0x20 [ 15.018160] kasan_atomics_helper+0x18b1/0x5450 [ 15.018185] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.018207] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.018232] ? kasan_atomics+0x152/0x310 [ 15.018260] kasan_atomics+0x1dc/0x310 [ 15.018283] ? __pfx_kasan_atomics+0x10/0x10 [ 15.018308] ? __pfx_read_tsc+0x10/0x10 [ 15.018328] ? ktime_get_ts64+0x86/0x230 [ 15.018354] kunit_try_run_case+0x1a5/0x480 [ 15.018379] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.018402] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.018426] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.018448] ? __kthread_parkme+0x82/0x180 [ 15.018469] ? preempt_count_sub+0x50/0x80 [ 15.018492] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.018524] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.018547] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.018571] kthread+0x337/0x6f0 [ 15.018591] ? trace_preempt_on+0x20/0xc0 [ 15.018614] ? __pfx_kthread+0x10/0x10 [ 15.018636] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.018656] ? calculate_sigpending+0x7b/0xa0 [ 15.018680] ? __pfx_kthread+0x10/0x10 [ 15.018702] ret_from_fork+0x116/0x1d0 [ 15.018721] ? __pfx_kthread+0x10/0x10 [ 15.018742] ret_from_fork_asm+0x1a/0x30 [ 15.018773] </TASK> [ 15.018784] [ 15.028886] Allocated by task 282: [ 15.029023] kasan_save_stack+0x45/0x70 [ 15.029186] kasan_save_track+0x18/0x40 [ 15.029445] kasan_save_alloc_info+0x3b/0x50 [ 15.029665] __kasan_kmalloc+0xb7/0xc0 [ 15.029859] __kmalloc_cache_noprof+0x189/0x420 [ 15.030085] kasan_atomics+0x95/0x310 [ 15.031882] kunit_try_run_case+0x1a5/0x480 [ 15.032184] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.032528] kthread+0x337/0x6f0 [ 15.032713] ret_from_fork+0x116/0x1d0 [ 15.032929] ret_from_fork_asm+0x1a/0x30 [ 15.033090] [ 15.033450] The buggy address belongs to the object at ffff8881039c5a00 [ 15.033450] which belongs to the cache kmalloc-64 of size 64 [ 15.034017] The buggy address is located 0 bytes to the right of [ 15.034017] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 15.034759] [ 15.034859] The buggy address belongs to the physical page: [ 15.035112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 15.035750] flags: 0x200000000000000(node=0|zone=2) [ 15.036060] page_type: f5(slab) [ 15.036321] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.036743] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.037171] page dumped because: kasan: bad access detected [ 15.037444] [ 15.037669] Memory state around the buggy address: [ 15.037880] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.038391] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.038805] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.039148] ^ [ 15.039497] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.039930] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.040423] ================================================================== [ 14.698488] ================================================================== [ 14.699132] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 14.699669] Read of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.700410] [ 14.700528] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.700699] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.700718] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.700742] Call Trace: [ 14.700761] <TASK> [ 14.700779] dump_stack_lvl+0x73/0xb0 [ 14.700808] print_report+0xd1/0x650 [ 14.700832] ? __virt_addr_valid+0x1db/0x2d0 [ 14.700856] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.700879] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.700901] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.700923] kasan_report+0x141/0x180 [ 14.700945] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.700972] __asan_report_load4_noabort+0x18/0x20 [ 14.700997] kasan_atomics_helper+0x4a02/0x5450 [ 14.701019] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.701042] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.701067] ? kasan_atomics+0x152/0x310 [ 14.701094] kasan_atomics+0x1dc/0x310 [ 14.701118] ? __pfx_kasan_atomics+0x10/0x10 [ 14.701152] ? __pfx_read_tsc+0x10/0x10 [ 14.701175] ? ktime_get_ts64+0x86/0x230 [ 14.701200] kunit_try_run_case+0x1a5/0x480 [ 14.701224] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.701246] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.701270] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.701294] ? __kthread_parkme+0x82/0x180 [ 14.701371] ? preempt_count_sub+0x50/0x80 [ 14.701395] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.701420] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.701443] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.701468] kthread+0x337/0x6f0 [ 14.701487] ? trace_preempt_on+0x20/0xc0 [ 14.701512] ? __pfx_kthread+0x10/0x10 [ 14.701534] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.701556] ? calculate_sigpending+0x7b/0xa0 [ 14.701580] ? __pfx_kthread+0x10/0x10 [ 14.701601] ret_from_fork+0x116/0x1d0 [ 14.701621] ? __pfx_kthread+0x10/0x10 [ 14.701642] ret_from_fork_asm+0x1a/0x30 [ 14.701673] </TASK> [ 14.701685] [ 14.713781] Allocated by task 282: [ 14.713969] kasan_save_stack+0x45/0x70 [ 14.714828] kasan_save_track+0x18/0x40 [ 14.715006] kasan_save_alloc_info+0x3b/0x50 [ 14.715494] __kasan_kmalloc+0xb7/0xc0 [ 14.715871] __kmalloc_cache_noprof+0x189/0x420 [ 14.716074] kasan_atomics+0x95/0x310 [ 14.716526] kunit_try_run_case+0x1a5/0x480 [ 14.716884] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.717180] kthread+0x337/0x6f0 [ 14.717564] ret_from_fork+0x116/0x1d0 [ 14.717864] ret_from_fork_asm+0x1a/0x30 [ 14.718177] [ 14.718472] The buggy address belongs to the object at ffff8881039c5a00 [ 14.718472] which belongs to the cache kmalloc-64 of size 64 [ 14.718971] The buggy address is located 0 bytes to the right of [ 14.718971] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.720059] [ 14.720168] The buggy address belongs to the physical page: [ 14.720814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.721386] flags: 0x200000000000000(node=0|zone=2) [ 14.721627] page_type: f5(slab) [ 14.721795] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.722119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.722745] page dumped because: kasan: bad access detected [ 14.723004] [ 14.723096] Memory state around the buggy address: [ 14.723607] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.724013] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.724709] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.725000] ^ [ 14.725541] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.725840] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.726282] ================================================================== [ 14.903598] ================================================================== [ 14.903949] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 14.904399] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.904703] [ 14.904793] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.904836] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.904849] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.904873] Call Trace: [ 14.904886] <TASK> [ 14.904901] dump_stack_lvl+0x73/0xb0 [ 14.904928] print_report+0xd1/0x650 [ 14.904951] ? __virt_addr_valid+0x1db/0x2d0 [ 14.904974] ? kasan_atomics_helper+0x151d/0x5450 [ 14.904996] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.905019] ? kasan_atomics_helper+0x151d/0x5450 [ 14.905042] kasan_report+0x141/0x180 [ 14.905065] ? kasan_atomics_helper+0x151d/0x5450 [ 14.905095] kasan_check_range+0x10c/0x1c0 [ 14.905148] __kasan_check_write+0x18/0x20 [ 14.905169] kasan_atomics_helper+0x151d/0x5450 [ 14.905202] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.905225] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.905262] ? kasan_atomics+0x152/0x310 [ 14.905290] kasan_atomics+0x1dc/0x310 [ 14.905313] ? __pfx_kasan_atomics+0x10/0x10 [ 14.905338] ? __pfx_read_tsc+0x10/0x10 [ 14.905360] ? ktime_get_ts64+0x86/0x230 [ 14.905383] kunit_try_run_case+0x1a5/0x480 [ 14.905407] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.905432] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.905455] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.905479] ? __kthread_parkme+0x82/0x180 [ 14.905500] ? preempt_count_sub+0x50/0x80 [ 14.905525] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.905549] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.905573] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.905597] kthread+0x337/0x6f0 [ 14.905617] ? trace_preempt_on+0x20/0xc0 [ 14.905641] ? __pfx_kthread+0x10/0x10 [ 14.905662] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.905684] ? calculate_sigpending+0x7b/0xa0 [ 14.905709] ? __pfx_kthread+0x10/0x10 [ 14.905741] ret_from_fork+0x116/0x1d0 [ 14.905760] ? __pfx_kthread+0x10/0x10 [ 14.905782] ret_from_fork_asm+0x1a/0x30 [ 14.905822] </TASK> [ 14.905834] [ 14.913739] Allocated by task 282: [ 14.913909] kasan_save_stack+0x45/0x70 [ 14.914111] kasan_save_track+0x18/0x40 [ 14.914327] kasan_save_alloc_info+0x3b/0x50 [ 14.914549] __kasan_kmalloc+0xb7/0xc0 [ 14.914729] __kmalloc_cache_noprof+0x189/0x420 [ 14.914952] kasan_atomics+0x95/0x310 [ 14.915203] kunit_try_run_case+0x1a5/0x480 [ 14.915384] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.915677] kthread+0x337/0x6f0 [ 14.915867] ret_from_fork+0x116/0x1d0 [ 14.916058] ret_from_fork_asm+0x1a/0x30 [ 14.916292] [ 14.916388] The buggy address belongs to the object at ffff8881039c5a00 [ 14.916388] which belongs to the cache kmalloc-64 of size 64 [ 14.916880] The buggy address is located 0 bytes to the right of [ 14.916880] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.917437] [ 14.917559] The buggy address belongs to the physical page: [ 14.917796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.918175] flags: 0x200000000000000(node=0|zone=2) [ 14.918418] page_type: f5(slab) [ 14.918595] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.918844] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.919074] page dumped because: kasan: bad access detected [ 14.919368] [ 14.919474] Memory state around the buggy address: [ 14.919700] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.919965] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.920216] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.920553] ^ [ 14.920781] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.921152] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.921486] ================================================================== [ 14.384725] ================================================================== [ 14.385088] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 14.385474] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.385956] [ 14.386064] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.386207] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.386221] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.386243] Call Trace: [ 14.386259] <TASK> [ 14.386276] dump_stack_lvl+0x73/0xb0 [ 14.386363] print_report+0xd1/0x650 [ 14.386389] ? __virt_addr_valid+0x1db/0x2d0 [ 14.386480] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.386518] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.386541] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.386563] kasan_report+0x141/0x180 [ 14.386586] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.386614] kasan_check_range+0x10c/0x1c0 [ 14.386637] __kasan_check_write+0x18/0x20 [ 14.386658] kasan_atomics_helper+0xa2b/0x5450 [ 14.386681] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.386704] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.386730] ? kasan_atomics+0x152/0x310 [ 14.386757] kasan_atomics+0x1dc/0x310 [ 14.386780] ? __pfx_kasan_atomics+0x10/0x10 [ 14.386806] ? __pfx_read_tsc+0x10/0x10 [ 14.386827] ? ktime_get_ts64+0x86/0x230 [ 14.386852] kunit_try_run_case+0x1a5/0x480 [ 14.386875] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.386897] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.386921] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.386944] ? __kthread_parkme+0x82/0x180 [ 14.386964] ? preempt_count_sub+0x50/0x80 [ 14.386988] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.387012] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.387034] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.387059] kthread+0x337/0x6f0 [ 14.387079] ? trace_preempt_on+0x20/0xc0 [ 14.387103] ? __pfx_kthread+0x10/0x10 [ 14.387150] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.387172] ? calculate_sigpending+0x7b/0xa0 [ 14.387195] ? __pfx_kthread+0x10/0x10 [ 14.387217] ret_from_fork+0x116/0x1d0 [ 14.387236] ? __pfx_kthread+0x10/0x10 [ 14.387258] ret_from_fork_asm+0x1a/0x30 [ 14.387288] </TASK> [ 14.387307] [ 14.397234] Allocated by task 282: [ 14.397419] kasan_save_stack+0x45/0x70 [ 14.397606] kasan_save_track+0x18/0x40 [ 14.397779] kasan_save_alloc_info+0x3b/0x50 [ 14.397976] __kasan_kmalloc+0xb7/0xc0 [ 14.398285] __kmalloc_cache_noprof+0x189/0x420 [ 14.398556] kasan_atomics+0x95/0x310 [ 14.398772] kunit_try_run_case+0x1a5/0x480 [ 14.399040] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.399355] kthread+0x337/0x6f0 [ 14.399534] ret_from_fork+0x116/0x1d0 [ 14.399800] ret_from_fork_asm+0x1a/0x30 [ 14.399946] [ 14.400037] The buggy address belongs to the object at ffff8881039c5a00 [ 14.400037] which belongs to the cache kmalloc-64 of size 64 [ 14.400933] The buggy address is located 0 bytes to the right of [ 14.400933] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.401603] [ 14.401796] The buggy address belongs to the physical page: [ 14.402082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.402571] flags: 0x200000000000000(node=0|zone=2) [ 14.402843] page_type: f5(slab) [ 14.403016] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.403481] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.403857] page dumped because: kasan: bad access detected [ 14.404133] [ 14.404262] Memory state around the buggy address: [ 14.404651] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.405024] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.405576] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.405931] ^ [ 14.406170] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.406631] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.406961] ================================================================== [ 14.429512] ================================================================== [ 14.429748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 14.430056] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.430779] [ 14.430901] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.430984] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.431022] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.431044] Call Trace: [ 14.431074] <TASK> [ 14.431091] dump_stack_lvl+0x73/0xb0 [ 14.431148] print_report+0xd1/0x650 [ 14.431173] ? __virt_addr_valid+0x1db/0x2d0 [ 14.431197] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.431218] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.431240] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.431262] kasan_report+0x141/0x180 [ 14.431284] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.431371] kasan_check_range+0x10c/0x1c0 [ 14.431396] __kasan_check_write+0x18/0x20 [ 14.431418] kasan_atomics_helper+0xb6a/0x5450 [ 14.431440] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.431462] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.431488] ? kasan_atomics+0x152/0x310 [ 14.431515] kasan_atomics+0x1dc/0x310 [ 14.431538] ? __pfx_kasan_atomics+0x10/0x10 [ 14.431563] ? __pfx_read_tsc+0x10/0x10 [ 14.431583] ? ktime_get_ts64+0x86/0x230 [ 14.431608] kunit_try_run_case+0x1a5/0x480 [ 14.431632] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.431655] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.431679] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.431702] ? __kthread_parkme+0x82/0x180 [ 14.431722] ? preempt_count_sub+0x50/0x80 [ 14.431746] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.431770] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.431793] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.431817] kthread+0x337/0x6f0 [ 14.431836] ? trace_preempt_on+0x20/0xc0 [ 14.431860] ? __pfx_kthread+0x10/0x10 [ 14.431880] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.431902] ? calculate_sigpending+0x7b/0xa0 [ 14.431926] ? __pfx_kthread+0x10/0x10 [ 14.431947] ret_from_fork+0x116/0x1d0 [ 14.431966] ? __pfx_kthread+0x10/0x10 [ 14.431987] ret_from_fork_asm+0x1a/0x30 [ 14.432018] </TASK> [ 14.432029] [ 14.441659] Allocated by task 282: [ 14.441986] kasan_save_stack+0x45/0x70 [ 14.442237] kasan_save_track+0x18/0x40 [ 14.442546] kasan_save_alloc_info+0x3b/0x50 [ 14.442828] __kasan_kmalloc+0xb7/0xc0 [ 14.442969] __kmalloc_cache_noprof+0x189/0x420 [ 14.443227] kasan_atomics+0x95/0x310 [ 14.443556] kunit_try_run_case+0x1a5/0x480 [ 14.443813] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.444063] kthread+0x337/0x6f0 [ 14.444283] ret_from_fork+0x116/0x1d0 [ 14.444596] ret_from_fork_asm+0x1a/0x30 [ 14.444798] [ 14.444895] The buggy address belongs to the object at ffff8881039c5a00 [ 14.444895] which belongs to the cache kmalloc-64 of size 64 [ 14.445809] The buggy address is located 0 bytes to the right of [ 14.445809] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.446527] [ 14.446608] The buggy address belongs to the physical page: [ 14.446980] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.447458] flags: 0x200000000000000(node=0|zone=2) [ 14.447740] page_type: f5(slab) [ 14.447883] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.448243] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.448573] page dumped because: kasan: bad access detected [ 14.448819] [ 14.448908] Memory state around the buggy address: [ 14.449352] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.449591] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.449915] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.450330] ^ [ 14.450787] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.451132] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.451438] ================================================================== [ 14.518099] ================================================================== [ 14.518714] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 14.519034] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.519408] [ 14.519693] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.519770] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.519784] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.519805] Call Trace: [ 14.519836] <TASK> [ 14.519852] dump_stack_lvl+0x73/0xb0 [ 14.519882] print_report+0xd1/0x650 [ 14.519905] ? __virt_addr_valid+0x1db/0x2d0 [ 14.519930] ? kasan_atomics_helper+0xde0/0x5450 [ 14.519952] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.519975] ? kasan_atomics_helper+0xde0/0x5450 [ 14.519996] kasan_report+0x141/0x180 [ 14.520019] ? kasan_atomics_helper+0xde0/0x5450 [ 14.520074] kasan_check_range+0x10c/0x1c0 [ 14.520099] __kasan_check_write+0x18/0x20 [ 14.520120] kasan_atomics_helper+0xde0/0x5450 [ 14.520186] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.520210] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.520235] ? kasan_atomics+0x152/0x310 [ 14.520273] kasan_atomics+0x1dc/0x310 [ 14.520345] ? __pfx_kasan_atomics+0x10/0x10 [ 14.520373] ? __pfx_read_tsc+0x10/0x10 [ 14.520396] ? ktime_get_ts64+0x86/0x230 [ 14.520422] kunit_try_run_case+0x1a5/0x480 [ 14.520446] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.520468] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.520493] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.520517] ? __kthread_parkme+0x82/0x180 [ 14.520539] ? preempt_count_sub+0x50/0x80 [ 14.520564] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.520588] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.520612] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.520635] kthread+0x337/0x6f0 [ 14.520656] ? trace_preempt_on+0x20/0xc0 [ 14.520681] ? __pfx_kthread+0x10/0x10 [ 14.520702] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.520724] ? calculate_sigpending+0x7b/0xa0 [ 14.520749] ? __pfx_kthread+0x10/0x10 [ 14.520771] ret_from_fork+0x116/0x1d0 [ 14.520789] ? __pfx_kthread+0x10/0x10 [ 14.520811] ret_from_fork_asm+0x1a/0x30 [ 14.520841] </TASK> [ 14.520854] [ 14.529818] Allocated by task 282: [ 14.529953] kasan_save_stack+0x45/0x70 [ 14.530235] kasan_save_track+0x18/0x40 [ 14.530449] kasan_save_alloc_info+0x3b/0x50 [ 14.530888] __kasan_kmalloc+0xb7/0xc0 [ 14.531101] __kmalloc_cache_noprof+0x189/0x420 [ 14.531278] kasan_atomics+0x95/0x310 [ 14.531611] kunit_try_run_case+0x1a5/0x480 [ 14.531879] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.532149] kthread+0x337/0x6f0 [ 14.532291] ret_from_fork+0x116/0x1d0 [ 14.532486] ret_from_fork_asm+0x1a/0x30 [ 14.532669] [ 14.532757] The buggy address belongs to the object at ffff8881039c5a00 [ 14.532757] which belongs to the cache kmalloc-64 of size 64 [ 14.533486] The buggy address is located 0 bytes to the right of [ 14.533486] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.533949] [ 14.534024] The buggy address belongs to the physical page: [ 14.534507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.534935] flags: 0x200000000000000(node=0|zone=2) [ 14.535279] page_type: f5(slab) [ 14.535446] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.535851] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.536170] page dumped because: kasan: bad access detected [ 14.536479] [ 14.536577] Memory state around the buggy address: [ 14.536969] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.537405] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.537702] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.538004] ^ [ 14.538284] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.538844] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.539088] ================================================================== [ 15.396977] ================================================================== [ 15.397401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 15.397640] Read of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 15.397933] [ 15.398076] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.398149] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.398163] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.398184] Call Trace: [ 15.398200] <TASK> [ 15.398215] dump_stack_lvl+0x73/0xb0 [ 15.398241] print_report+0xd1/0x650 [ 15.398263] ? __virt_addr_valid+0x1db/0x2d0 [ 15.398288] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.398309] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.398333] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.398356] kasan_report+0x141/0x180 [ 15.398378] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.398405] __asan_report_load8_noabort+0x18/0x20 [ 15.398462] kasan_atomics_helper+0x4fb2/0x5450 [ 15.398485] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.398521] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.398548] ? kasan_atomics+0x152/0x310 [ 15.398574] kasan_atomics+0x1dc/0x310 [ 15.398597] ? __pfx_kasan_atomics+0x10/0x10 [ 15.398621] ? __pfx_read_tsc+0x10/0x10 [ 15.398642] ? ktime_get_ts64+0x86/0x230 [ 15.398666] kunit_try_run_case+0x1a5/0x480 [ 15.398691] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.398714] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.398737] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.398760] ? __kthread_parkme+0x82/0x180 [ 15.398782] ? preempt_count_sub+0x50/0x80 [ 15.398806] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.398830] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.398853] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.398877] kthread+0x337/0x6f0 [ 15.398897] ? trace_preempt_on+0x20/0xc0 [ 15.398920] ? __pfx_kthread+0x10/0x10 [ 15.398941] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.398962] ? calculate_sigpending+0x7b/0xa0 [ 15.398986] ? __pfx_kthread+0x10/0x10 [ 15.399007] ret_from_fork+0x116/0x1d0 [ 15.399060] ? __pfx_kthread+0x10/0x10 [ 15.399081] ret_from_fork_asm+0x1a/0x30 [ 15.399150] </TASK> [ 15.399162] [ 15.407052] Allocated by task 282: [ 15.407252] kasan_save_stack+0x45/0x70 [ 15.407409] kasan_save_track+0x18/0x40 [ 15.407603] kasan_save_alloc_info+0x3b/0x50 [ 15.407864] __kasan_kmalloc+0xb7/0xc0 [ 15.408039] __kmalloc_cache_noprof+0x189/0x420 [ 15.408353] kasan_atomics+0x95/0x310 [ 15.408495] kunit_try_run_case+0x1a5/0x480 [ 15.408673] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.408971] kthread+0x337/0x6f0 [ 15.409207] ret_from_fork+0x116/0x1d0 [ 15.409494] ret_from_fork_asm+0x1a/0x30 [ 15.409638] [ 15.409711] The buggy address belongs to the object at ffff8881039c5a00 [ 15.409711] which belongs to the cache kmalloc-64 of size 64 [ 15.410305] The buggy address is located 0 bytes to the right of [ 15.410305] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 15.410798] [ 15.410896] The buggy address belongs to the physical page: [ 15.411170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 15.411560] flags: 0x200000000000000(node=0|zone=2) [ 15.411727] page_type: f5(slab) [ 15.411846] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.412172] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.412560] page dumped because: kasan: bad access detected [ 15.412818] [ 15.412912] Memory state around the buggy address: [ 15.413256] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.413530] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.413818] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.414147] ^ [ 15.414311] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.414671] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.415152] ================================================================== [ 15.434028] ================================================================== [ 15.434568] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 15.434915] Read of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 15.435147] [ 15.435230] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.435271] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.435284] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.435304] Call Trace: [ 15.435322] <TASK> [ 15.435338] dump_stack_lvl+0x73/0xb0 [ 15.435364] print_report+0xd1/0x650 [ 15.435388] ? __virt_addr_valid+0x1db/0x2d0 [ 15.435410] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.435432] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.435455] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.435476] kasan_report+0x141/0x180 [ 15.435499] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.435526] __asan_report_load8_noabort+0x18/0x20 [ 15.435552] kasan_atomics_helper+0x4fa5/0x5450 [ 15.435587] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.435610] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.435635] ? kasan_atomics+0x152/0x310 [ 15.435674] kasan_atomics+0x1dc/0x310 [ 15.435697] ? __pfx_kasan_atomics+0x10/0x10 [ 15.435722] ? __pfx_read_tsc+0x10/0x10 [ 15.435743] ? ktime_get_ts64+0x86/0x230 [ 15.435767] kunit_try_run_case+0x1a5/0x480 [ 15.435792] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.435815] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.435839] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.435863] ? __kthread_parkme+0x82/0x180 [ 15.435884] ? preempt_count_sub+0x50/0x80 [ 15.435908] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.435941] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.435965] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.435989] kthread+0x337/0x6f0 [ 15.436020] ? trace_preempt_on+0x20/0xc0 [ 15.436042] ? __pfx_kthread+0x10/0x10 [ 15.436064] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.436086] ? calculate_sigpending+0x7b/0xa0 [ 15.436110] ? __pfx_kthread+0x10/0x10 [ 15.436141] ret_from_fork+0x116/0x1d0 [ 15.436161] ? __pfx_kthread+0x10/0x10 [ 15.436185] ret_from_fork_asm+0x1a/0x30 [ 15.436217] </TASK> [ 15.436229] [ 15.443994] Allocated by task 282: [ 15.444274] kasan_save_stack+0x45/0x70 [ 15.444478] kasan_save_track+0x18/0x40 [ 15.444698] kasan_save_alloc_info+0x3b/0x50 [ 15.444911] __kasan_kmalloc+0xb7/0xc0 [ 15.445102] __kmalloc_cache_noprof+0x189/0x420 [ 15.445356] kasan_atomics+0x95/0x310 [ 15.445516] kunit_try_run_case+0x1a5/0x480 [ 15.445664] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.445944] kthread+0x337/0x6f0 [ 15.446116] ret_from_fork+0x116/0x1d0 [ 15.446309] ret_from_fork_asm+0x1a/0x30 [ 15.446446] [ 15.446524] The buggy address belongs to the object at ffff8881039c5a00 [ 15.446524] which belongs to the cache kmalloc-64 of size 64 [ 15.447051] The buggy address is located 0 bytes to the right of [ 15.447051] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 15.447588] [ 15.447662] The buggy address belongs to the physical page: [ 15.447838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 15.448080] flags: 0x200000000000000(node=0|zone=2) [ 15.448328] page_type: f5(slab) [ 15.448511] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.448848] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.449214] page dumped because: kasan: bad access detected [ 15.449466] [ 15.449564] Memory state around the buggy address: [ 15.449786] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.450101] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.450431] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.450652] ^ [ 15.450809] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.451085] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.451467] ================================================================== [ 14.220268] ================================================================== [ 14.220624] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 14.220977] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.221380] [ 14.221490] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.221532] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.221544] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.221581] Call Trace: [ 14.221598] <TASK> [ 14.221613] dump_stack_lvl+0x73/0xb0 [ 14.221652] print_report+0xd1/0x650 [ 14.221676] ? __virt_addr_valid+0x1db/0x2d0 [ 14.221700] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.221730] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.221753] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.221775] kasan_report+0x141/0x180 [ 14.221808] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.221835] kasan_check_range+0x10c/0x1c0 [ 14.221859] __kasan_check_write+0x18/0x20 [ 14.221888] kasan_atomics_helper+0x5fe/0x5450 [ 14.221912] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.221936] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.221972] ? kasan_atomics+0x152/0x310 [ 14.222000] kasan_atomics+0x1dc/0x310 [ 14.222023] ? __pfx_kasan_atomics+0x10/0x10 [ 14.222048] ? __pfx_read_tsc+0x10/0x10 [ 14.222077] ? ktime_get_ts64+0x86/0x230 [ 14.222102] kunit_try_run_case+0x1a5/0x480 [ 14.222142] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.222166] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.222190] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.222213] ? __kthread_parkme+0x82/0x180 [ 14.222235] ? preempt_count_sub+0x50/0x80 [ 14.222258] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.222283] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.222306] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.222330] kthread+0x337/0x6f0 [ 14.222351] ? trace_preempt_on+0x20/0xc0 [ 14.222429] ? __pfx_kthread+0x10/0x10 [ 14.222452] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.222484] ? calculate_sigpending+0x7b/0xa0 [ 14.222507] ? __pfx_kthread+0x10/0x10 [ 14.222532] ret_from_fork+0x116/0x1d0 [ 14.222564] ? __pfx_kthread+0x10/0x10 [ 14.222585] ret_from_fork_asm+0x1a/0x30 [ 14.222615] </TASK> [ 14.222626] [ 14.232146] Allocated by task 282: [ 14.232283] kasan_save_stack+0x45/0x70 [ 14.232431] kasan_save_track+0x18/0x40 [ 14.232571] kasan_save_alloc_info+0x3b/0x50 [ 14.234035] __kasan_kmalloc+0xb7/0xc0 [ 14.234625] __kmalloc_cache_noprof+0x189/0x420 [ 14.235464] kasan_atomics+0x95/0x310 [ 14.236181] kunit_try_run_case+0x1a5/0x480 [ 14.236893] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.237796] kthread+0x337/0x6f0 [ 14.238462] ret_from_fork+0x116/0x1d0 [ 14.239254] ret_from_fork_asm+0x1a/0x30 [ 14.239960] [ 14.240328] The buggy address belongs to the object at ffff8881039c5a00 [ 14.240328] which belongs to the cache kmalloc-64 of size 64 [ 14.241909] The buggy address is located 0 bytes to the right of [ 14.241909] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.242373] [ 14.242639] The buggy address belongs to the physical page: [ 14.243174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.243989] flags: 0x200000000000000(node=0|zone=2) [ 14.244512] page_type: f5(slab) [ 14.244937] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.245357] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.245593] page dumped because: kasan: bad access detected [ 14.245769] [ 14.245845] Memory state around the buggy address: [ 14.246012] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.246277] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.247012] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.247623] ^ [ 14.247906] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.248151] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.248955] ================================================================== [ 15.215379] ================================================================== [ 15.215711] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 15.216022] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 15.216823] [ 15.217034] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.217082] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.217095] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.217118] Call Trace: [ 15.217168] <TASK> [ 15.217261] dump_stack_lvl+0x73/0xb0 [ 15.217291] print_report+0xd1/0x650 [ 15.217314] ? __virt_addr_valid+0x1db/0x2d0 [ 15.217339] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.217361] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.217383] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.217405] kasan_report+0x141/0x180 [ 15.217429] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.217457] kasan_check_range+0x10c/0x1c0 [ 15.217481] __kasan_check_write+0x18/0x20 [ 15.217501] kasan_atomics_helper+0x1d7a/0x5450 [ 15.217525] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.217547] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.217573] ? kasan_atomics+0x152/0x310 [ 15.217600] kasan_atomics+0x1dc/0x310 [ 15.217624] ? __pfx_kasan_atomics+0x10/0x10 [ 15.217649] ? __pfx_read_tsc+0x10/0x10 [ 15.217670] ? ktime_get_ts64+0x86/0x230 [ 15.217695] kunit_try_run_case+0x1a5/0x480 [ 15.217719] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.217741] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.217765] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.217788] ? __kthread_parkme+0x82/0x180 [ 15.217809] ? preempt_count_sub+0x50/0x80 [ 15.217833] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.217858] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.217881] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.217904] kthread+0x337/0x6f0 [ 15.217924] ? trace_preempt_on+0x20/0xc0 [ 15.217947] ? __pfx_kthread+0x10/0x10 [ 15.217968] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.217990] ? calculate_sigpending+0x7b/0xa0 [ 15.218014] ? __pfx_kthread+0x10/0x10 [ 15.218036] ret_from_fork+0x116/0x1d0 [ 15.218055] ? __pfx_kthread+0x10/0x10 [ 15.218076] ret_from_fork_asm+0x1a/0x30 [ 15.218106] </TASK> [ 15.218118] [ 15.228542] Allocated by task 282: [ 15.228704] kasan_save_stack+0x45/0x70 [ 15.229060] kasan_save_track+0x18/0x40 [ 15.229399] kasan_save_alloc_info+0x3b/0x50 [ 15.229674] __kasan_kmalloc+0xb7/0xc0 [ 15.229882] __kmalloc_cache_noprof+0x189/0x420 [ 15.230280] kasan_atomics+0x95/0x310 [ 15.230485] kunit_try_run_case+0x1a5/0x480 [ 15.230787] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.231159] kthread+0x337/0x6f0 [ 15.231299] ret_from_fork+0x116/0x1d0 [ 15.231507] ret_from_fork_asm+0x1a/0x30 [ 15.231905] [ 15.232023] The buggy address belongs to the object at ffff8881039c5a00 [ 15.232023] which belongs to the cache kmalloc-64 of size 64 [ 15.232662] The buggy address is located 0 bytes to the right of [ 15.232662] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 15.233331] [ 15.233572] The buggy address belongs to the physical page: [ 15.233841] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 15.234449] flags: 0x200000000000000(node=0|zone=2) [ 15.234755] page_type: f5(slab) [ 15.234948] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.235386] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.235807] page dumped because: kasan: bad access detected [ 15.236042] [ 15.236252] Memory state around the buggy address: [ 15.236582] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.236877] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.237376] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.237766] ^ [ 15.238066] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.238580] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.238872] ================================================================== [ 15.313465] ================================================================== [ 15.313951] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 15.314316] Read of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 15.314623] [ 15.314764] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.314806] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.314820] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.314841] Call Trace: [ 15.314857] <TASK> [ 15.314874] dump_stack_lvl+0x73/0xb0 [ 15.314901] print_report+0xd1/0x650 [ 15.314924] ? __virt_addr_valid+0x1db/0x2d0 [ 15.314947] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.314969] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.314991] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.315014] kasan_report+0x141/0x180 [ 15.315036] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.315063] __asan_report_load8_noabort+0x18/0x20 [ 15.315087] kasan_atomics_helper+0x4f71/0x5450 [ 15.315111] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.315163] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.315189] ? kasan_atomics+0x152/0x310 [ 15.315216] kasan_atomics+0x1dc/0x310 [ 15.315239] ? __pfx_kasan_atomics+0x10/0x10 [ 15.315264] ? __pfx_read_tsc+0x10/0x10 [ 15.315284] ? ktime_get_ts64+0x86/0x230 [ 15.315308] kunit_try_run_case+0x1a5/0x480 [ 15.315333] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.315354] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.315378] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.315401] ? __kthread_parkme+0x82/0x180 [ 15.315423] ? preempt_count_sub+0x50/0x80 [ 15.315447] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.315470] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.315494] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.315518] kthread+0x337/0x6f0 [ 15.315539] ? trace_preempt_on+0x20/0xc0 [ 15.315562] ? __pfx_kthread+0x10/0x10 [ 15.315583] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.315604] ? calculate_sigpending+0x7b/0xa0 [ 15.315628] ? __pfx_kthread+0x10/0x10 [ 15.315650] ret_from_fork+0x116/0x1d0 [ 15.315669] ? __pfx_kthread+0x10/0x10 [ 15.315691] ret_from_fork_asm+0x1a/0x30 [ 15.315721] </TASK> [ 15.315733] [ 15.326055] Allocated by task 282: [ 15.326598] kasan_save_stack+0x45/0x70 [ 15.327016] kasan_save_track+0x18/0x40 [ 15.327408] kasan_save_alloc_info+0x3b/0x50 [ 15.327980] __kasan_kmalloc+0xb7/0xc0 [ 15.328625] __kmalloc_cache_noprof+0x189/0x420 [ 15.328846] kasan_atomics+0x95/0x310 [ 15.328988] kunit_try_run_case+0x1a5/0x480 [ 15.329150] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.329430] kthread+0x337/0x6f0 [ 15.329569] ret_from_fork+0x116/0x1d0 [ 15.329763] ret_from_fork_asm+0x1a/0x30 [ 15.329916] [ 15.330153] The buggy address belongs to the object at ffff8881039c5a00 [ 15.330153] which belongs to the cache kmalloc-64 of size 64 [ 15.330659] The buggy address is located 0 bytes to the right of [ 15.330659] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 15.331030] [ 15.331105] The buggy address belongs to the physical page: [ 15.331739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 15.332524] flags: 0x200000000000000(node=0|zone=2) [ 15.333177] page_type: f5(slab) [ 15.333516] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.334245] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.334954] page dumped because: kasan: bad access detected [ 15.335354] [ 15.335431] Memory state around the buggy address: [ 15.335588] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.335806] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.336022] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.336616] ^ [ 15.337089] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.337809] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.338547] ================================================================== [ 15.116062] ================================================================== [ 15.116532] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 15.116882] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 15.117479] [ 15.117826] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.117876] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.117890] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.117912] Call Trace: [ 15.117928] <TASK> [ 15.117943] dump_stack_lvl+0x73/0xb0 [ 15.117971] print_report+0xd1/0x650 [ 15.117995] ? __virt_addr_valid+0x1db/0x2d0 [ 15.118021] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.118043] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.118067] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.118089] kasan_report+0x141/0x180 [ 15.118112] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.118154] kasan_check_range+0x10c/0x1c0 [ 15.118178] __kasan_check_write+0x18/0x20 [ 15.118198] kasan_atomics_helper+0x1b22/0x5450 [ 15.118221] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.118243] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.118269] ? kasan_atomics+0x152/0x310 [ 15.118296] kasan_atomics+0x1dc/0x310 [ 15.118319] ? __pfx_kasan_atomics+0x10/0x10 [ 15.118345] ? __pfx_read_tsc+0x10/0x10 [ 15.118366] ? ktime_get_ts64+0x86/0x230 [ 15.118391] kunit_try_run_case+0x1a5/0x480 [ 15.118414] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.118437] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.118461] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.118485] ? __kthread_parkme+0x82/0x180 [ 15.118506] ? preempt_count_sub+0x50/0x80 [ 15.118535] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.118559] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.118582] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.118605] kthread+0x337/0x6f0 [ 15.118625] ? trace_preempt_on+0x20/0xc0 [ 15.118648] ? __pfx_kthread+0x10/0x10 [ 15.118670] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.118691] ? calculate_sigpending+0x7b/0xa0 [ 15.118716] ? __pfx_kthread+0x10/0x10 [ 15.118738] ret_from_fork+0x116/0x1d0 [ 15.118757] ? __pfx_kthread+0x10/0x10 [ 15.118778] ret_from_fork_asm+0x1a/0x30 [ 15.118809] </TASK> [ 15.118820] [ 15.129225] Allocated by task 282: [ 15.129548] kasan_save_stack+0x45/0x70 [ 15.129752] kasan_save_track+0x18/0x40 [ 15.130033] kasan_save_alloc_info+0x3b/0x50 [ 15.130371] __kasan_kmalloc+0xb7/0xc0 [ 15.130581] __kmalloc_cache_noprof+0x189/0x420 [ 15.130892] kasan_atomics+0x95/0x310 [ 15.131157] kunit_try_run_case+0x1a5/0x480 [ 15.131490] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.131882] kthread+0x337/0x6f0 [ 15.132065] ret_from_fork+0x116/0x1d0 [ 15.132467] ret_from_fork_asm+0x1a/0x30 [ 15.132659] [ 15.132741] The buggy address belongs to the object at ffff8881039c5a00 [ 15.132741] which belongs to the cache kmalloc-64 of size 64 [ 15.133540] The buggy address is located 0 bytes to the right of [ 15.133540] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 15.134047] [ 15.134177] The buggy address belongs to the physical page: [ 15.134685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 15.135117] flags: 0x200000000000000(node=0|zone=2) [ 15.135469] page_type: f5(slab) [ 15.135695] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.136051] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.136572] page dumped because: kasan: bad access detected [ 15.136844] [ 15.137059] Memory state around the buggy address: [ 15.137424] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.137719] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.138149] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.138537] ^ [ 15.138814] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.139137] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.139683] ================================================================== [ 14.407428] ================================================================== [ 14.407692] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 14.407957] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.408433] [ 14.408550] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.408634] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.408671] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.408692] Call Trace: [ 14.408790] <TASK> [ 14.408806] dump_stack_lvl+0x73/0xb0 [ 14.408834] print_report+0xd1/0x650 [ 14.408858] ? __virt_addr_valid+0x1db/0x2d0 [ 14.408882] ? kasan_atomics_helper+0xac7/0x5450 [ 14.408904] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.408926] ? kasan_atomics_helper+0xac7/0x5450 [ 14.408949] kasan_report+0x141/0x180 [ 14.408972] ? kasan_atomics_helper+0xac7/0x5450 [ 14.408998] kasan_check_range+0x10c/0x1c0 [ 14.409023] __kasan_check_write+0x18/0x20 [ 14.409043] kasan_atomics_helper+0xac7/0x5450 [ 14.409065] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.409087] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.409113] ? kasan_atomics+0x152/0x310 [ 14.409166] kasan_atomics+0x1dc/0x310 [ 14.409189] ? __pfx_kasan_atomics+0x10/0x10 [ 14.409214] ? __pfx_read_tsc+0x10/0x10 [ 14.409235] ? ktime_get_ts64+0x86/0x230 [ 14.409259] kunit_try_run_case+0x1a5/0x480 [ 14.409283] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.409365] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.409391] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.409414] ? __kthread_parkme+0x82/0x180 [ 14.409435] ? preempt_count_sub+0x50/0x80 [ 14.409458] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.409483] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.409506] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.409530] kthread+0x337/0x6f0 [ 14.409550] ? trace_preempt_on+0x20/0xc0 [ 14.409574] ? __pfx_kthread+0x10/0x10 [ 14.409594] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.409616] ? calculate_sigpending+0x7b/0xa0 [ 14.409641] ? __pfx_kthread+0x10/0x10 [ 14.409663] ret_from_fork+0x116/0x1d0 [ 14.409681] ? __pfx_kthread+0x10/0x10 [ 14.409703] ret_from_fork_asm+0x1a/0x30 [ 14.409732] </TASK> [ 14.409744] [ 14.419548] Allocated by task 282: [ 14.419737] kasan_save_stack+0x45/0x70 [ 14.419943] kasan_save_track+0x18/0x40 [ 14.420212] kasan_save_alloc_info+0x3b/0x50 [ 14.420616] __kasan_kmalloc+0xb7/0xc0 [ 14.420777] __kmalloc_cache_noprof+0x189/0x420 [ 14.421005] kasan_atomics+0x95/0x310 [ 14.421269] kunit_try_run_case+0x1a5/0x480 [ 14.421546] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.421920] kthread+0x337/0x6f0 [ 14.422068] ret_from_fork+0x116/0x1d0 [ 14.422432] ret_from_fork_asm+0x1a/0x30 [ 14.422652] [ 14.422830] The buggy address belongs to the object at ffff8881039c5a00 [ 14.422830] which belongs to the cache kmalloc-64 of size 64 [ 14.423715] The buggy address is located 0 bytes to the right of [ 14.423715] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.424284] [ 14.424535] The buggy address belongs to the physical page: [ 14.424806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.425172] flags: 0x200000000000000(node=0|zone=2) [ 14.425407] page_type: f5(slab) [ 14.425571] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.425901] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.426395] page dumped because: kasan: bad access detected [ 14.426627] [ 14.426724] Memory state around the buggy address: [ 14.427073] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.427503] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.427781] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.428235] ^ [ 14.428433] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.428748] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.429058] ================================================================== [ 15.415692] ================================================================== [ 15.416268] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 15.416576] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 15.417005] [ 15.417109] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.417184] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.417197] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.417219] Call Trace: [ 15.417248] <TASK> [ 15.417263] dump_stack_lvl+0x73/0xb0 [ 15.417289] print_report+0xd1/0x650 [ 15.417312] ? __virt_addr_valid+0x1db/0x2d0 [ 15.417335] ? kasan_atomics_helper+0x218a/0x5450 [ 15.417356] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.417378] ? kasan_atomics_helper+0x218a/0x5450 [ 15.417400] kasan_report+0x141/0x180 [ 15.417422] ? kasan_atomics_helper+0x218a/0x5450 [ 15.417449] kasan_check_range+0x10c/0x1c0 [ 15.417473] __kasan_check_write+0x18/0x20 [ 15.417494] kasan_atomics_helper+0x218a/0x5450 [ 15.417517] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.417539] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.417563] ? kasan_atomics+0x152/0x310 [ 15.417590] kasan_atomics+0x1dc/0x310 [ 15.417614] ? __pfx_kasan_atomics+0x10/0x10 [ 15.417638] ? __pfx_read_tsc+0x10/0x10 [ 15.417659] ? ktime_get_ts64+0x86/0x230 [ 15.417683] kunit_try_run_case+0x1a5/0x480 [ 15.417707] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.417729] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.417753] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.417776] ? __kthread_parkme+0x82/0x180 [ 15.417798] ? preempt_count_sub+0x50/0x80 [ 15.417832] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.417857] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.417880] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.417916] kthread+0x337/0x6f0 [ 15.417936] ? trace_preempt_on+0x20/0xc0 [ 15.417959] ? __pfx_kthread+0x10/0x10 [ 15.417980] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.418002] ? calculate_sigpending+0x7b/0xa0 [ 15.418026] ? __pfx_kthread+0x10/0x10 [ 15.418048] ret_from_fork+0x116/0x1d0 [ 15.418066] ? __pfx_kthread+0x10/0x10 [ 15.418087] ret_from_fork_asm+0x1a/0x30 [ 15.418130] </TASK> [ 15.418142] [ 15.425731] Allocated by task 282: [ 15.425900] kasan_save_stack+0x45/0x70 [ 15.426114] kasan_save_track+0x18/0x40 [ 15.426316] kasan_save_alloc_info+0x3b/0x50 [ 15.426534] __kasan_kmalloc+0xb7/0xc0 [ 15.426874] __kmalloc_cache_noprof+0x189/0x420 [ 15.427034] kasan_atomics+0x95/0x310 [ 15.427206] kunit_try_run_case+0x1a5/0x480 [ 15.427422] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.427823] kthread+0x337/0x6f0 [ 15.428015] ret_from_fork+0x116/0x1d0 [ 15.428268] ret_from_fork_asm+0x1a/0x30 [ 15.428416] [ 15.428489] The buggy address belongs to the object at ffff8881039c5a00 [ 15.428489] which belongs to the cache kmalloc-64 of size 64 [ 15.428885] The buggy address is located 0 bytes to the right of [ 15.428885] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 15.429439] [ 15.429566] The buggy address belongs to the physical page: [ 15.429819] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 15.430080] flags: 0x200000000000000(node=0|zone=2) [ 15.430474] page_type: f5(slab) [ 15.430633] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.430928] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.431248] page dumped because: kasan: bad access detected [ 15.431533] [ 15.431631] Memory state around the buggy address: [ 15.431855] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.432173] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.432471] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.432776] ^ [ 15.432955] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.433295] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.433571] ================================================================== [ 14.073509] ================================================================== [ 14.073794] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 14.074446] Read of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.074896] [ 14.075037] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.075093] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.075105] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.075137] Call Trace: [ 14.075149] <TASK> [ 14.075162] dump_stack_lvl+0x73/0xb0 [ 14.075190] print_report+0xd1/0x650 [ 14.075211] ? __virt_addr_valid+0x1db/0x2d0 [ 14.075233] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.075254] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.075275] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.075295] kasan_report+0x141/0x180 [ 14.075316] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.075341] __asan_report_load4_noabort+0x18/0x20 [ 14.075407] kasan_atomics_helper+0x4b88/0x5450 [ 14.075430] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.075451] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.075509] ? kasan_atomics+0x152/0x310 [ 14.075536] kasan_atomics+0x1dc/0x310 [ 14.075559] ? __pfx_kasan_atomics+0x10/0x10 [ 14.075582] ? __pfx_read_tsc+0x10/0x10 [ 14.075601] ? ktime_get_ts64+0x86/0x230 [ 14.075625] kunit_try_run_case+0x1a5/0x480 [ 14.075647] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.075668] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.075690] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.075712] ? __kthread_parkme+0x82/0x180 [ 14.075731] ? preempt_count_sub+0x50/0x80 [ 14.075754] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.075777] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.075798] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.075822] kthread+0x337/0x6f0 [ 14.075840] ? trace_preempt_on+0x20/0xc0 [ 14.075863] ? __pfx_kthread+0x10/0x10 [ 14.075883] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.075902] ? calculate_sigpending+0x7b/0xa0 [ 14.075926] ? __pfx_kthread+0x10/0x10 [ 14.075946] ret_from_fork+0x116/0x1d0 [ 14.075963] ? __pfx_kthread+0x10/0x10 [ 14.075983] ret_from_fork_asm+0x1a/0x30 [ 14.076012] </TASK> [ 14.076024] [ 14.084667] Allocated by task 282: [ 14.084848] kasan_save_stack+0x45/0x70 [ 14.085069] kasan_save_track+0x18/0x40 [ 14.085356] kasan_save_alloc_info+0x3b/0x50 [ 14.085573] __kasan_kmalloc+0xb7/0xc0 [ 14.085749] __kmalloc_cache_noprof+0x189/0x420 [ 14.085978] kasan_atomics+0x95/0x310 [ 14.086177] kunit_try_run_case+0x1a5/0x480 [ 14.086427] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.086659] kthread+0x337/0x6f0 [ 14.086787] ret_from_fork+0x116/0x1d0 [ 14.086920] ret_from_fork_asm+0x1a/0x30 [ 14.087154] [ 14.087252] The buggy address belongs to the object at ffff8881039c5a00 [ 14.087252] which belongs to the cache kmalloc-64 of size 64 [ 14.087857] The buggy address is located 0 bytes to the right of [ 14.087857] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.088666] [ 14.088746] The buggy address belongs to the physical page: [ 14.089008] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.089492] flags: 0x200000000000000(node=0|zone=2) [ 14.089664] page_type: f5(slab) [ 14.089788] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.090089] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.090571] page dumped because: kasan: bad access detected [ 14.090827] [ 14.090938] Memory state around the buggy address: [ 14.091322] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.091666] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.092071] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.092477] ^ [ 14.092699] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.093030] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.093633] ================================================================== [ 14.017992] ================================================================== [ 14.018853] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 14.019106] Read of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.019798] [ 14.019964] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.020236] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.020258] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.020281] Call Trace: [ 14.020294] <TASK> [ 14.020363] dump_stack_lvl+0x73/0xb0 [ 14.020397] print_report+0xd1/0x650 [ 14.020421] ? __virt_addr_valid+0x1db/0x2d0 [ 14.020444] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.020466] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.020487] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.020508] kasan_report+0x141/0x180 [ 14.020528] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.020553] __asan_report_load4_noabort+0x18/0x20 [ 14.020577] kasan_atomics_helper+0x4bbc/0x5450 [ 14.020598] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.020619] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.020644] ? kasan_atomics+0x152/0x310 [ 14.020669] kasan_atomics+0x1dc/0x310 [ 14.020691] ? __pfx_kasan_atomics+0x10/0x10 [ 14.020713] ? __pfx_read_tsc+0x10/0x10 [ 14.020735] ? ktime_get_ts64+0x86/0x230 [ 14.020762] kunit_try_run_case+0x1a5/0x480 [ 14.020787] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.020808] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.020832] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.020853] ? __kthread_parkme+0x82/0x180 [ 14.020875] ? preempt_count_sub+0x50/0x80 [ 14.020898] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.020921] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.020944] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.020965] kthread+0x337/0x6f0 [ 14.020984] ? trace_preempt_on+0x20/0xc0 [ 14.021008] ? __pfx_kthread+0x10/0x10 [ 14.021029] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.021049] ? calculate_sigpending+0x7b/0xa0 [ 14.021074] ? __pfx_kthread+0x10/0x10 [ 14.021094] ret_from_fork+0x116/0x1d0 [ 14.021112] ? __pfx_kthread+0x10/0x10 [ 14.021144] ret_from_fork_asm+0x1a/0x30 [ 14.021176] </TASK> [ 14.021187] [ 14.030838] Allocated by task 282: [ 14.031011] kasan_save_stack+0x45/0x70 [ 14.031710] kasan_save_track+0x18/0x40 [ 14.031856] kasan_save_alloc_info+0x3b/0x50 [ 14.032005] __kasan_kmalloc+0xb7/0xc0 [ 14.032650] __kmalloc_cache_noprof+0x189/0x420 [ 14.032890] kasan_atomics+0x95/0x310 [ 14.033072] kunit_try_run_case+0x1a5/0x480 [ 14.033884] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.034362] kthread+0x337/0x6f0 [ 14.034544] ret_from_fork+0x116/0x1d0 [ 14.034722] ret_from_fork_asm+0x1a/0x30 [ 14.034908] [ 14.034999] The buggy address belongs to the object at ffff8881039c5a00 [ 14.034999] which belongs to the cache kmalloc-64 of size 64 [ 14.036323] The buggy address is located 0 bytes to the right of [ 14.036323] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.037270] [ 14.037588] The buggy address belongs to the physical page: [ 14.037829] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.038157] flags: 0x200000000000000(node=0|zone=2) [ 14.038764] page_type: f5(slab) [ 14.039251] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.039827] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.040145] page dumped because: kasan: bad access detected [ 14.040488] [ 14.040581] Memory state around the buggy address: [ 14.040778] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.041057] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.041770] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.042064] ^ [ 14.042656] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.043246] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.043784] ================================================================== [ 14.094243] ================================================================== [ 14.094693] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 14.095052] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.095467] [ 14.095579] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.095622] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.095636] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.095656] Call Trace: [ 14.095669] <TASK> [ 14.095686] dump_stack_lvl+0x73/0xb0 [ 14.095723] print_report+0xd1/0x650 [ 14.095746] ? __virt_addr_valid+0x1db/0x2d0 [ 14.095781] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.095803] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.095825] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.095847] kasan_report+0x141/0x180 [ 14.095869] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.095905] __asan_report_store4_noabort+0x1b/0x30 [ 14.095926] kasan_atomics_helper+0x4b6e/0x5450 [ 14.095960] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.095982] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.096008] ? kasan_atomics+0x152/0x310 [ 14.096034] kasan_atomics+0x1dc/0x310 [ 14.096058] ? __pfx_kasan_atomics+0x10/0x10 [ 14.096083] ? __pfx_read_tsc+0x10/0x10 [ 14.096110] ? ktime_get_ts64+0x86/0x230 [ 14.096170] kunit_try_run_case+0x1a5/0x480 [ 14.096194] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.096216] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.096241] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.096263] ? __kthread_parkme+0x82/0x180 [ 14.096283] ? preempt_count_sub+0x50/0x80 [ 14.096365] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.096391] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.096414] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.096439] kthread+0x337/0x6f0 [ 14.096459] ? trace_preempt_on+0x20/0xc0 [ 14.096483] ? __pfx_kthread+0x10/0x10 [ 14.096504] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.096538] ? calculate_sigpending+0x7b/0xa0 [ 14.096562] ? __pfx_kthread+0x10/0x10 [ 14.096584] ret_from_fork+0x116/0x1d0 [ 14.096614] ? __pfx_kthread+0x10/0x10 [ 14.096636] ret_from_fork_asm+0x1a/0x30 [ 14.096667] </TASK> [ 14.096678] [ 14.104945] Allocated by task 282: [ 14.105181] kasan_save_stack+0x45/0x70 [ 14.105431] kasan_save_track+0x18/0x40 [ 14.105575] kasan_save_alloc_info+0x3b/0x50 [ 14.105765] __kasan_kmalloc+0xb7/0xc0 [ 14.105906] __kmalloc_cache_noprof+0x189/0x420 [ 14.106199] kasan_atomics+0x95/0x310 [ 14.106433] kunit_try_run_case+0x1a5/0x480 [ 14.106657] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.106927] kthread+0x337/0x6f0 [ 14.107054] ret_from_fork+0x116/0x1d0 [ 14.107225] ret_from_fork_asm+0x1a/0x30 [ 14.107505] [ 14.107606] The buggy address belongs to the object at ffff8881039c5a00 [ 14.107606] which belongs to the cache kmalloc-64 of size 64 [ 14.108141] The buggy address is located 0 bytes to the right of [ 14.108141] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.108872] [ 14.108968] The buggy address belongs to the physical page: [ 14.109278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.109703] flags: 0x200000000000000(node=0|zone=2) [ 14.109951] page_type: f5(slab) [ 14.110163] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.110423] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.110791] page dumped because: kasan: bad access detected [ 14.111047] [ 14.111186] Memory state around the buggy address: [ 14.111468] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.111774] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.112074] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.112497] ^ [ 14.112680] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.112974] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.113519] ================================================================== [ 14.940251] ================================================================== [ 14.940599] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 14.941240] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.941682] [ 14.941833] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.941875] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.941897] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.941917] Call Trace: [ 14.941935] <TASK> [ 14.941950] dump_stack_lvl+0x73/0xb0 [ 14.941990] print_report+0xd1/0x650 [ 14.942013] ? __virt_addr_valid+0x1db/0x2d0 [ 14.942037] ? kasan_atomics_helper+0x164f/0x5450 [ 14.942059] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.942081] ? kasan_atomics_helper+0x164f/0x5450 [ 14.942104] kasan_report+0x141/0x180 [ 14.942158] ? kasan_atomics_helper+0x164f/0x5450 [ 14.942194] kasan_check_range+0x10c/0x1c0 [ 14.942218] __kasan_check_write+0x18/0x20 [ 14.942237] kasan_atomics_helper+0x164f/0x5450 [ 14.942272] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.942294] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.942320] ? kasan_atomics+0x152/0x310 [ 14.942348] kasan_atomics+0x1dc/0x310 [ 14.942370] ? __pfx_kasan_atomics+0x10/0x10 [ 14.942394] ? __pfx_read_tsc+0x10/0x10 [ 14.942417] ? ktime_get_ts64+0x86/0x230 [ 14.942442] kunit_try_run_case+0x1a5/0x480 [ 14.942466] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.942489] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.942521] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.942543] ? __kthread_parkme+0x82/0x180 [ 14.942566] ? preempt_count_sub+0x50/0x80 [ 14.942590] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.942624] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.942647] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.942683] kthread+0x337/0x6f0 [ 14.942703] ? trace_preempt_on+0x20/0xc0 [ 14.942727] ? __pfx_kthread+0x10/0x10 [ 14.942748] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.942769] ? calculate_sigpending+0x7b/0xa0 [ 14.942794] ? __pfx_kthread+0x10/0x10 [ 14.942816] ret_from_fork+0x116/0x1d0 [ 14.942835] ? __pfx_kthread+0x10/0x10 [ 14.942857] ret_from_fork_asm+0x1a/0x30 [ 14.942890] </TASK> [ 14.942901] [ 14.950442] Allocated by task 282: [ 14.950575] kasan_save_stack+0x45/0x70 [ 14.950769] kasan_save_track+0x18/0x40 [ 14.950975] kasan_save_alloc_info+0x3b/0x50 [ 14.951215] __kasan_kmalloc+0xb7/0xc0 [ 14.951410] __kmalloc_cache_noprof+0x189/0x420 [ 14.951631] kasan_atomics+0x95/0x310 [ 14.951806] kunit_try_run_case+0x1a5/0x480 [ 14.952010] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.952262] kthread+0x337/0x6f0 [ 14.952389] ret_from_fork+0x116/0x1d0 [ 14.952532] ret_from_fork_asm+0x1a/0x30 [ 14.952732] [ 14.952855] The buggy address belongs to the object at ffff8881039c5a00 [ 14.952855] which belongs to the cache kmalloc-64 of size 64 [ 14.953449] The buggy address is located 0 bytes to the right of [ 14.953449] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.953950] [ 14.954048] The buggy address belongs to the physical page: [ 14.954334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.954687] flags: 0x200000000000000(node=0|zone=2) [ 14.954927] page_type: f5(slab) [ 14.955100] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.955388] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.955616] page dumped because: kasan: bad access detected [ 14.955790] [ 14.955861] Memory state around the buggy address: [ 14.956085] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.956445] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.956765] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.957085] ^ [ 14.957346] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.957695] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.957983] ================================================================== [ 14.361788] ================================================================== [ 14.362191] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 14.362658] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.363063] [ 14.363252] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.363428] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.363443] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.363465] Call Trace: [ 14.363480] <TASK> [ 14.363496] dump_stack_lvl+0x73/0xb0 [ 14.363524] print_report+0xd1/0x650 [ 14.363548] ? __virt_addr_valid+0x1db/0x2d0 [ 14.363572] ? kasan_atomics_helper+0x992/0x5450 [ 14.363594] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.363668] ? kasan_atomics_helper+0x992/0x5450 [ 14.363691] kasan_report+0x141/0x180 [ 14.363762] ? kasan_atomics_helper+0x992/0x5450 [ 14.363790] kasan_check_range+0x10c/0x1c0 [ 14.363814] __kasan_check_write+0x18/0x20 [ 14.363845] kasan_atomics_helper+0x992/0x5450 [ 14.363869] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.363892] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.363918] ? kasan_atomics+0x152/0x310 [ 14.363945] kasan_atomics+0x1dc/0x310 [ 14.363969] ? __pfx_kasan_atomics+0x10/0x10 [ 14.363993] ? __pfx_read_tsc+0x10/0x10 [ 14.364014] ? ktime_get_ts64+0x86/0x230 [ 14.364038] kunit_try_run_case+0x1a5/0x480 [ 14.364062] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.364084] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.364109] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.364141] ? __kthread_parkme+0x82/0x180 [ 14.364181] ? preempt_count_sub+0x50/0x80 [ 14.364206] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.364229] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.364252] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.364276] kthread+0x337/0x6f0 [ 14.364302] ? trace_preempt_on+0x20/0xc0 [ 14.364327] ? __pfx_kthread+0x10/0x10 [ 14.364348] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.364370] ? calculate_sigpending+0x7b/0xa0 [ 14.364394] ? __pfx_kthread+0x10/0x10 [ 14.364416] ret_from_fork+0x116/0x1d0 [ 14.364435] ? __pfx_kthread+0x10/0x10 [ 14.364457] ret_from_fork_asm+0x1a/0x30 [ 14.364487] </TASK> [ 14.364499] [ 14.374239] Allocated by task 282: [ 14.374491] kasan_save_stack+0x45/0x70 [ 14.374825] kasan_save_track+0x18/0x40 [ 14.375041] kasan_save_alloc_info+0x3b/0x50 [ 14.375430] __kasan_kmalloc+0xb7/0xc0 [ 14.375601] __kmalloc_cache_noprof+0x189/0x420 [ 14.375830] kasan_atomics+0x95/0x310 [ 14.376018] kunit_try_run_case+0x1a5/0x480 [ 14.376233] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.376436] kthread+0x337/0x6f0 [ 14.376621] ret_from_fork+0x116/0x1d0 [ 14.376795] ret_from_fork_asm+0x1a/0x30 [ 14.376961] [ 14.377064] The buggy address belongs to the object at ffff8881039c5a00 [ 14.377064] which belongs to the cache kmalloc-64 of size 64 [ 14.377948] The buggy address is located 0 bytes to the right of [ 14.377948] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.378623] [ 14.378745] The buggy address belongs to the physical page: [ 14.379096] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.379565] flags: 0x200000000000000(node=0|zone=2) [ 14.379842] page_type: f5(slab) [ 14.379987] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.380508] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.380870] page dumped because: kasan: bad access detected [ 14.381105] [ 14.381381] Memory state around the buggy address: [ 14.381611] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.382041] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.382644] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.383003] ^ [ 14.383232] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.383681] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.384038] ================================================================== [ 15.239603] ================================================================== [ 15.240434] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 15.240772] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 15.241330] [ 15.241440] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.241606] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.241623] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.241645] Call Trace: [ 15.241660] <TASK> [ 15.241676] dump_stack_lvl+0x73/0xb0 [ 15.241704] print_report+0xd1/0x650 [ 15.241727] ? __virt_addr_valid+0x1db/0x2d0 [ 15.241750] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.241772] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.241796] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.241818] kasan_report+0x141/0x180 [ 15.241840] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.241866] kasan_check_range+0x10c/0x1c0 [ 15.241890] __kasan_check_write+0x18/0x20 [ 15.241910] kasan_atomics_helper+0x1e12/0x5450 [ 15.241935] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.241958] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.241984] ? kasan_atomics+0x152/0x310 [ 15.242011] kasan_atomics+0x1dc/0x310 [ 15.242034] ? __pfx_kasan_atomics+0x10/0x10 [ 15.242059] ? __pfx_read_tsc+0x10/0x10 [ 15.242081] ? ktime_get_ts64+0x86/0x230 [ 15.242105] kunit_try_run_case+0x1a5/0x480 [ 15.242150] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.242174] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.242198] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.242221] ? __kthread_parkme+0x82/0x180 [ 15.242243] ? preempt_count_sub+0x50/0x80 [ 15.242267] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.242290] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.242314] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.242338] kthread+0x337/0x6f0 [ 15.242358] ? trace_preempt_on+0x20/0xc0 [ 15.242382] ? __pfx_kthread+0x10/0x10 [ 15.242404] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.242424] ? calculate_sigpending+0x7b/0xa0 [ 15.242449] ? __pfx_kthread+0x10/0x10 [ 15.242470] ret_from_fork+0x116/0x1d0 [ 15.242488] ? __pfx_kthread+0x10/0x10 [ 15.242518] ret_from_fork_asm+0x1a/0x30 [ 15.242548] </TASK> [ 15.242561] [ 15.253231] Allocated by task 282: [ 15.253597] kasan_save_stack+0x45/0x70 [ 15.253824] kasan_save_track+0x18/0x40 [ 15.253987] kasan_save_alloc_info+0x3b/0x50 [ 15.254495] __kasan_kmalloc+0xb7/0xc0 [ 15.254692] __kmalloc_cache_noprof+0x189/0x420 [ 15.254969] kasan_atomics+0x95/0x310 [ 15.255195] kunit_try_run_case+0x1a5/0x480 [ 15.255531] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.255787] kthread+0x337/0x6f0 [ 15.256061] ret_from_fork+0x116/0x1d0 [ 15.256378] ret_from_fork_asm+0x1a/0x30 [ 15.256667] [ 15.256749] The buggy address belongs to the object at ffff8881039c5a00 [ 15.256749] which belongs to the cache kmalloc-64 of size 64 [ 15.257518] The buggy address is located 0 bytes to the right of [ 15.257518] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 15.258379] [ 15.258483] The buggy address belongs to the physical page: [ 15.258857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 15.259341] flags: 0x200000000000000(node=0|zone=2) [ 15.259558] page_type: f5(slab) [ 15.259881] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.260346] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.260769] page dumped because: kasan: bad access detected [ 15.261044] [ 15.261314] Memory state around the buggy address: [ 15.261530] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.261914] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.262406] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.262733] ^ [ 15.263038] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.263560] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.263930] ================================================================== [ 14.648693] ================================================================== [ 14.648997] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 14.649416] Read of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.649680] [ 14.649792] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.649834] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.649847] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.649906] Call Trace: [ 14.649934] <TASK> [ 14.649962] dump_stack_lvl+0x73/0xb0 [ 14.650017] print_report+0xd1/0x650 [ 14.650041] ? __virt_addr_valid+0x1db/0x2d0 [ 14.650064] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.650097] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.650119] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.650150] kasan_report+0x141/0x180 [ 14.650173] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.650199] __asan_report_load4_noabort+0x18/0x20 [ 14.650224] kasan_atomics_helper+0x4a1c/0x5450 [ 14.650278] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.650301] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.650337] ? kasan_atomics+0x152/0x310 [ 14.650365] kasan_atomics+0x1dc/0x310 [ 14.650388] ? __pfx_kasan_atomics+0x10/0x10 [ 14.650413] ? __pfx_read_tsc+0x10/0x10 [ 14.650435] ? ktime_get_ts64+0x86/0x230 [ 14.650459] kunit_try_run_case+0x1a5/0x480 [ 14.650483] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.650505] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.650533] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.650625] ? __kthread_parkme+0x82/0x180 [ 14.650663] ? preempt_count_sub+0x50/0x80 [ 14.650688] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.650712] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.650735] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.650759] kthread+0x337/0x6f0 [ 14.650779] ? trace_preempt_on+0x20/0xc0 [ 14.650802] ? __pfx_kthread+0x10/0x10 [ 14.650824] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.650845] ? calculate_sigpending+0x7b/0xa0 [ 14.650869] ? __pfx_kthread+0x10/0x10 [ 14.650891] ret_from_fork+0x116/0x1d0 [ 14.650910] ? __pfx_kthread+0x10/0x10 [ 14.650932] ret_from_fork_asm+0x1a/0x30 [ 14.650962] </TASK> [ 14.650974] [ 14.659716] Allocated by task 282: [ 14.659903] kasan_save_stack+0x45/0x70 [ 14.660111] kasan_save_track+0x18/0x40 [ 14.660322] kasan_save_alloc_info+0x3b/0x50 [ 14.660505] __kasan_kmalloc+0xb7/0xc0 [ 14.660688] __kmalloc_cache_noprof+0x189/0x420 [ 14.660904] kasan_atomics+0x95/0x310 [ 14.661054] kunit_try_run_case+0x1a5/0x480 [ 14.661550] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.661797] kthread+0x337/0x6f0 [ 14.661963] ret_from_fork+0x116/0x1d0 [ 14.662346] ret_from_fork_asm+0x1a/0x30 [ 14.662617] [ 14.662694] The buggy address belongs to the object at ffff8881039c5a00 [ 14.662694] which belongs to the cache kmalloc-64 of size 64 [ 14.663166] The buggy address is located 0 bytes to the right of [ 14.663166] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.663785] [ 14.663891] The buggy address belongs to the physical page: [ 14.664230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.664876] flags: 0x200000000000000(node=0|zone=2) [ 14.665053] page_type: f5(slab) [ 14.665189] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.665797] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.666170] page dumped because: kasan: bad access detected [ 14.666421] [ 14.666539] Memory state around the buggy address: [ 14.666944] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.667329] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.667597] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.668147] ^ [ 14.668448] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.668847] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.669240] ================================================================== [ 15.295884] ================================================================== [ 15.296159] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 15.296499] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 15.296772] [ 15.296860] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.296902] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.296916] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.296939] Call Trace: [ 15.296952] <TASK> [ 15.296967] dump_stack_lvl+0x73/0xb0 [ 15.296994] print_report+0xd1/0x650 [ 15.297018] ? __virt_addr_valid+0x1db/0x2d0 [ 15.297043] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.297065] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.297088] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.297110] kasan_report+0x141/0x180 [ 15.297172] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.297223] kasan_check_range+0x10c/0x1c0 [ 15.297248] __kasan_check_write+0x18/0x20 [ 15.297268] kasan_atomics_helper+0x1f43/0x5450 [ 15.297291] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.297314] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.297341] ? kasan_atomics+0x152/0x310 [ 15.297368] kasan_atomics+0x1dc/0x310 [ 15.297393] ? __pfx_kasan_atomics+0x10/0x10 [ 15.297418] ? __pfx_read_tsc+0x10/0x10 [ 15.297440] ? ktime_get_ts64+0x86/0x230 [ 15.297465] kunit_try_run_case+0x1a5/0x480 [ 15.297489] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.297512] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.297536] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.297559] ? __kthread_parkme+0x82/0x180 [ 15.297581] ? preempt_count_sub+0x50/0x80 [ 15.297622] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.297647] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.297682] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.297706] kthread+0x337/0x6f0 [ 15.297727] ? trace_preempt_on+0x20/0xc0 [ 15.297751] ? __pfx_kthread+0x10/0x10 [ 15.297772] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.297794] ? calculate_sigpending+0x7b/0xa0 [ 15.297818] ? __pfx_kthread+0x10/0x10 [ 15.297840] ret_from_fork+0x116/0x1d0 [ 15.297859] ? __pfx_kthread+0x10/0x10 [ 15.297880] ret_from_fork_asm+0x1a/0x30 [ 15.297911] </TASK> [ 15.297923] [ 15.305443] Allocated by task 282: [ 15.305627] kasan_save_stack+0x45/0x70 [ 15.305837] kasan_save_track+0x18/0x40 [ 15.306032] kasan_save_alloc_info+0x3b/0x50 [ 15.306281] __kasan_kmalloc+0xb7/0xc0 [ 15.306473] __kmalloc_cache_noprof+0x189/0x420 [ 15.306693] kasan_atomics+0x95/0x310 [ 15.306900] kunit_try_run_case+0x1a5/0x480 [ 15.307093] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.307326] kthread+0x337/0x6f0 [ 15.307452] ret_from_fork+0x116/0x1d0 [ 15.307587] ret_from_fork_asm+0x1a/0x30 [ 15.307810] [ 15.307910] The buggy address belongs to the object at ffff8881039c5a00 [ 15.307910] which belongs to the cache kmalloc-64 of size 64 [ 15.308511] The buggy address is located 0 bytes to the right of [ 15.308511] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 15.309001] [ 15.309100] The buggy address belongs to the physical page: [ 15.309363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 15.309715] flags: 0x200000000000000(node=0|zone=2) [ 15.309878] page_type: f5(slab) [ 15.310000] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.310287] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.310633] page dumped because: kasan: bad access detected [ 15.310887] [ 15.310983] Memory state around the buggy address: [ 15.311240] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.311586] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.311895] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.312182] ^ [ 15.312365] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.312684] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.313000] ================================================================== [ 15.090613] ================================================================== [ 15.090935] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 15.091602] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 15.092100] [ 15.092262] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.092309] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.092453] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.092482] Call Trace: [ 15.092499] <TASK> [ 15.092515] dump_stack_lvl+0x73/0xb0 [ 15.092544] print_report+0xd1/0x650 [ 15.092567] ? __virt_addr_valid+0x1db/0x2d0 [ 15.092591] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.092614] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.092637] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.092661] kasan_report+0x141/0x180 [ 15.092686] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.092715] kasan_check_range+0x10c/0x1c0 [ 15.092740] __kasan_check_write+0x18/0x20 [ 15.092760] kasan_atomics_helper+0x1a7f/0x5450 [ 15.092784] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.092806] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.092832] ? kasan_atomics+0x152/0x310 [ 15.092859] kasan_atomics+0x1dc/0x310 [ 15.092883] ? __pfx_kasan_atomics+0x10/0x10 [ 15.092907] ? __pfx_read_tsc+0x10/0x10 [ 15.092927] ? ktime_get_ts64+0x86/0x230 [ 15.092952] kunit_try_run_case+0x1a5/0x480 [ 15.092975] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.092998] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.093021] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.093044] ? __kthread_parkme+0x82/0x180 [ 15.093065] ? preempt_count_sub+0x50/0x80 [ 15.093088] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.093112] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.093170] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.093194] kthread+0x337/0x6f0 [ 15.093215] ? trace_preempt_on+0x20/0xc0 [ 15.093237] ? __pfx_kthread+0x10/0x10 [ 15.093261] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.093283] ? calculate_sigpending+0x7b/0xa0 [ 15.093306] ? __pfx_kthread+0x10/0x10 [ 15.093328] ret_from_fork+0x116/0x1d0 [ 15.093347] ? __pfx_kthread+0x10/0x10 [ 15.093368] ret_from_fork_asm+0x1a/0x30 [ 15.093398] </TASK> [ 15.093411] [ 15.104140] Allocated by task 282: [ 15.104462] kasan_save_stack+0x45/0x70 [ 15.104656] kasan_save_track+0x18/0x40 [ 15.104992] kasan_save_alloc_info+0x3b/0x50 [ 15.105303] __kasan_kmalloc+0xb7/0xc0 [ 15.105582] __kmalloc_cache_noprof+0x189/0x420 [ 15.105792] kasan_atomics+0x95/0x310 [ 15.106110] kunit_try_run_case+0x1a5/0x480 [ 15.106347] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.106635] kthread+0x337/0x6f0 [ 15.106913] ret_from_fork+0x116/0x1d0 [ 15.107205] ret_from_fork_asm+0x1a/0x30 [ 15.107422] [ 15.107501] The buggy address belongs to the object at ffff8881039c5a00 [ 15.107501] which belongs to the cache kmalloc-64 of size 64 [ 15.108024] The buggy address is located 0 bytes to the right of [ 15.108024] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 15.108830] [ 15.109061] The buggy address belongs to the physical page: [ 15.109462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 15.110041] flags: 0x200000000000000(node=0|zone=2) [ 15.110448] page_type: f5(slab) [ 15.110662] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.111119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.111477] page dumped because: kasan: bad access detected [ 15.111843] [ 15.112027] Memory state around the buggy address: [ 15.112293] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.112731] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.113040] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.113601] ^ [ 15.113845] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.114305] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.114622] ================================================================== [ 15.469874] ================================================================== [ 15.470228] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 15.470578] Read of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 15.470838] [ 15.470958] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.470998] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.471011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.471032] Call Trace: [ 15.471047] <TASK> [ 15.471063] dump_stack_lvl+0x73/0xb0 [ 15.471098] print_report+0xd1/0x650 [ 15.471154] ? __virt_addr_valid+0x1db/0x2d0 [ 15.471178] ? kasan_atomics_helper+0x5115/0x5450 [ 15.471200] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.471233] ? kasan_atomics_helper+0x5115/0x5450 [ 15.471264] kasan_report+0x141/0x180 [ 15.471287] ? kasan_atomics_helper+0x5115/0x5450 [ 15.471314] __asan_report_load8_noabort+0x18/0x20 [ 15.471349] kasan_atomics_helper+0x5115/0x5450 [ 15.471372] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.471395] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.471429] ? kasan_atomics+0x152/0x310 [ 15.471457] kasan_atomics+0x1dc/0x310 [ 15.471480] ? __pfx_kasan_atomics+0x10/0x10 [ 15.471515] ? __pfx_read_tsc+0x10/0x10 [ 15.471535] ? ktime_get_ts64+0x86/0x230 [ 15.471559] kunit_try_run_case+0x1a5/0x480 [ 15.471583] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.471606] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.471629] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.471653] ? __kthread_parkme+0x82/0x180 [ 15.471674] ? preempt_count_sub+0x50/0x80 [ 15.471697] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.471721] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.471744] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.471768] kthread+0x337/0x6f0 [ 15.471788] ? trace_preempt_on+0x20/0xc0 [ 15.471811] ? __pfx_kthread+0x10/0x10 [ 15.471833] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.471854] ? calculate_sigpending+0x7b/0xa0 [ 15.471879] ? __pfx_kthread+0x10/0x10 [ 15.471900] ret_from_fork+0x116/0x1d0 [ 15.471919] ? __pfx_kthread+0x10/0x10 [ 15.471941] ret_from_fork_asm+0x1a/0x30 [ 15.471972] </TASK> [ 15.471983] [ 15.479170] Allocated by task 282: [ 15.479385] kasan_save_stack+0x45/0x70 [ 15.479621] kasan_save_track+0x18/0x40 [ 15.479839] kasan_save_alloc_info+0x3b/0x50 [ 15.480050] __kasan_kmalloc+0xb7/0xc0 [ 15.480270] __kmalloc_cache_noprof+0x189/0x420 [ 15.480499] kasan_atomics+0x95/0x310 [ 15.480662] kunit_try_run_case+0x1a5/0x480 [ 15.480810] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.480986] kthread+0x337/0x6f0 [ 15.481172] ret_from_fork+0x116/0x1d0 [ 15.481385] ret_from_fork_asm+0x1a/0x30 [ 15.481584] [ 15.481696] The buggy address belongs to the object at ffff8881039c5a00 [ 15.481696] which belongs to the cache kmalloc-64 of size 64 [ 15.482283] The buggy address is located 0 bytes to the right of [ 15.482283] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 15.482798] [ 15.482895] The buggy address belongs to the physical page: [ 15.483184] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 15.483534] flags: 0x200000000000000(node=0|zone=2) [ 15.483760] page_type: f5(slab) [ 15.483927] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.484281] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.484619] page dumped because: kasan: bad access detected [ 15.484871] [ 15.484991] Memory state around the buggy address: [ 15.485188] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.485491] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.485817] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.486166] ^ [ 15.486393] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.486649] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.486863] ================================================================== [ 14.452246] ================================================================== [ 14.452707] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 14.453110] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.453594] [ 14.453734] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.453846] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.453860] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.453894] Call Trace: [ 14.453907] <TASK> [ 14.453922] dump_stack_lvl+0x73/0xb0 [ 14.453951] print_report+0xd1/0x650 [ 14.453973] ? __virt_addr_valid+0x1db/0x2d0 [ 14.453997] ? kasan_atomics_helper+0xc70/0x5450 [ 14.454019] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.454042] ? kasan_atomics_helper+0xc70/0x5450 [ 14.454064] kasan_report+0x141/0x180 [ 14.454086] ? kasan_atomics_helper+0xc70/0x5450 [ 14.454113] kasan_check_range+0x10c/0x1c0 [ 14.454163] __kasan_check_write+0x18/0x20 [ 14.454184] kasan_atomics_helper+0xc70/0x5450 [ 14.454207] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.454230] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.454256] ? kasan_atomics+0x152/0x310 [ 14.454283] kasan_atomics+0x1dc/0x310 [ 14.454372] ? __pfx_kasan_atomics+0x10/0x10 [ 14.454397] ? __pfx_read_tsc+0x10/0x10 [ 14.454420] ? ktime_get_ts64+0x86/0x230 [ 14.454445] kunit_try_run_case+0x1a5/0x480 [ 14.454470] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.454492] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.454521] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.454544] ? __kthread_parkme+0x82/0x180 [ 14.454565] ? preempt_count_sub+0x50/0x80 [ 14.454590] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.454614] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.454637] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.454661] kthread+0x337/0x6f0 [ 14.454681] ? trace_preempt_on+0x20/0xc0 [ 14.454706] ? __pfx_kthread+0x10/0x10 [ 14.454726] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.454748] ? calculate_sigpending+0x7b/0xa0 [ 14.454771] ? __pfx_kthread+0x10/0x10 [ 14.454793] ret_from_fork+0x116/0x1d0 [ 14.454812] ? __pfx_kthread+0x10/0x10 [ 14.454834] ret_from_fork_asm+0x1a/0x30 [ 14.454865] </TASK> [ 14.454877] [ 14.464920] Allocated by task 282: [ 14.465106] kasan_save_stack+0x45/0x70 [ 14.465513] kasan_save_track+0x18/0x40 [ 14.465680] kasan_save_alloc_info+0x3b/0x50 [ 14.465896] __kasan_kmalloc+0xb7/0xc0 [ 14.466229] __kmalloc_cache_noprof+0x189/0x420 [ 14.466433] kasan_atomics+0x95/0x310 [ 14.466610] kunit_try_run_case+0x1a5/0x480 [ 14.466826] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.467072] kthread+0x337/0x6f0 [ 14.467244] ret_from_fork+0x116/0x1d0 [ 14.467427] ret_from_fork_asm+0x1a/0x30 [ 14.467613] [ 14.467701] The buggy address belongs to the object at ffff8881039c5a00 [ 14.467701] which belongs to the cache kmalloc-64 of size 64 [ 14.468482] The buggy address is located 0 bytes to the right of [ 14.468482] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.469044] [ 14.469220] The buggy address belongs to the physical page: [ 14.469622] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.469934] flags: 0x200000000000000(node=0|zone=2) [ 14.470269] page_type: f5(slab) [ 14.470579] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.470894] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.471361] page dumped because: kasan: bad access detected [ 14.471623] [ 14.471811] Memory state around the buggy address: [ 14.472025] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.472489] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.472846] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.473228] ^ [ 14.473623] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.473993] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.474435] ================================================================== [ 14.976818] ================================================================== [ 14.977272] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 14.977603] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.977831] [ 14.977913] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.977954] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.977967] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.977986] Call Trace: [ 14.978002] <TASK> [ 14.978018] dump_stack_lvl+0x73/0xb0 [ 14.978042] print_report+0xd1/0x650 [ 14.978075] ? __virt_addr_valid+0x1db/0x2d0 [ 14.978099] ? kasan_atomics_helper+0x177f/0x5450 [ 14.978153] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.978177] ? kasan_atomics_helper+0x177f/0x5450 [ 14.978199] kasan_report+0x141/0x180 [ 14.978221] ? kasan_atomics_helper+0x177f/0x5450 [ 14.978248] kasan_check_range+0x10c/0x1c0 [ 14.978272] __kasan_check_write+0x18/0x20 [ 14.978292] kasan_atomics_helper+0x177f/0x5450 [ 14.978315] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.978338] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.978364] ? kasan_atomics+0x152/0x310 [ 14.978390] kasan_atomics+0x1dc/0x310 [ 14.978413] ? __pfx_kasan_atomics+0x10/0x10 [ 14.978437] ? __pfx_read_tsc+0x10/0x10 [ 14.978459] ? ktime_get_ts64+0x86/0x230 [ 14.978482] kunit_try_run_case+0x1a5/0x480 [ 14.978507] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.978536] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.978559] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.978582] ? __kthread_parkme+0x82/0x180 [ 14.978604] ? preempt_count_sub+0x50/0x80 [ 14.978627] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.978652] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.978674] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.978698] kthread+0x337/0x6f0 [ 14.978717] ? trace_preempt_on+0x20/0xc0 [ 14.978741] ? __pfx_kthread+0x10/0x10 [ 14.978762] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.978782] ? calculate_sigpending+0x7b/0xa0 [ 14.978806] ? __pfx_kthread+0x10/0x10 [ 14.978828] ret_from_fork+0x116/0x1d0 [ 14.978846] ? __pfx_kthread+0x10/0x10 [ 14.978867] ret_from_fork_asm+0x1a/0x30 [ 14.978899] </TASK> [ 14.978910] [ 14.989764] Allocated by task 282: [ 14.990089] kasan_save_stack+0x45/0x70 [ 14.990303] kasan_save_track+0x18/0x40 [ 14.990649] kasan_save_alloc_info+0x3b/0x50 [ 14.990942] __kasan_kmalloc+0xb7/0xc0 [ 14.991096] __kmalloc_cache_noprof+0x189/0x420 [ 14.991548] kasan_atomics+0x95/0x310 [ 14.991742] kunit_try_run_case+0x1a5/0x480 [ 14.992034] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.992302] kthread+0x337/0x6f0 [ 14.992585] ret_from_fork+0x116/0x1d0 [ 14.992881] ret_from_fork_asm+0x1a/0x30 [ 14.993102] [ 14.993296] The buggy address belongs to the object at ffff8881039c5a00 [ 14.993296] which belongs to the cache kmalloc-64 of size 64 [ 14.993896] The buggy address is located 0 bytes to the right of [ 14.993896] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.994380] [ 14.994481] The buggy address belongs to the physical page: [ 14.994744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.995046] flags: 0x200000000000000(node=0|zone=2) [ 14.995256] page_type: f5(slab) [ 14.995380] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.995742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.996043] page dumped because: kasan: bad access detected [ 14.996297] [ 14.996390] Memory state around the buggy address: [ 14.996557] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.997008] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.997339] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.997668] ^ [ 14.997880] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.998150] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.998459] ================================================================== [ 15.360453] ================================================================== [ 15.360913] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 15.361266] Read of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 15.361547] [ 15.361652] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.361692] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.361705] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.361725] Call Trace: [ 15.361741] <TASK> [ 15.361755] dump_stack_lvl+0x73/0xb0 [ 15.361782] print_report+0xd1/0x650 [ 15.361805] ? __virt_addr_valid+0x1db/0x2d0 [ 15.361828] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.361850] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.361872] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.361894] kasan_report+0x141/0x180 [ 15.361916] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.361942] __asan_report_load8_noabort+0x18/0x20 [ 15.361966] kasan_atomics_helper+0x4f98/0x5450 [ 15.362021] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.362043] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.362082] ? kasan_atomics+0x152/0x310 [ 15.362110] kasan_atomics+0x1dc/0x310 [ 15.362159] ? __pfx_kasan_atomics+0x10/0x10 [ 15.362184] ? __pfx_read_tsc+0x10/0x10 [ 15.362206] ? ktime_get_ts64+0x86/0x230 [ 15.362230] kunit_try_run_case+0x1a5/0x480 [ 15.362254] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.362277] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.362303] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.362327] ? __kthread_parkme+0x82/0x180 [ 15.362349] ? preempt_count_sub+0x50/0x80 [ 15.362373] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.362397] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.362421] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.362445] kthread+0x337/0x6f0 [ 15.362464] ? trace_preempt_on+0x20/0xc0 [ 15.362489] ? __pfx_kthread+0x10/0x10 [ 15.362513] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.362534] ? calculate_sigpending+0x7b/0xa0 [ 15.362559] ? __pfx_kthread+0x10/0x10 [ 15.362582] ret_from_fork+0x116/0x1d0 [ 15.362601] ? __pfx_kthread+0x10/0x10 [ 15.362623] ret_from_fork_asm+0x1a/0x30 [ 15.362665] </TASK> [ 15.362677] [ 15.370219] Allocated by task 282: [ 15.370397] kasan_save_stack+0x45/0x70 [ 15.370586] kasan_save_track+0x18/0x40 [ 15.370784] kasan_save_alloc_info+0x3b/0x50 [ 15.370931] __kasan_kmalloc+0xb7/0xc0 [ 15.371060] __kmalloc_cache_noprof+0x189/0x420 [ 15.371327] kasan_atomics+0x95/0x310 [ 15.371519] kunit_try_run_case+0x1a5/0x480 [ 15.371712] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.371895] kthread+0x337/0x6f0 [ 15.372062] ret_from_fork+0x116/0x1d0 [ 15.372311] ret_from_fork_asm+0x1a/0x30 [ 15.372522] [ 15.372597] The buggy address belongs to the object at ffff8881039c5a00 [ 15.372597] which belongs to the cache kmalloc-64 of size 64 [ 15.373138] The buggy address is located 0 bytes to the right of [ 15.373138] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 15.373656] [ 15.373729] The buggy address belongs to the physical page: [ 15.373904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 15.374183] flags: 0x200000000000000(node=0|zone=2) [ 15.374437] page_type: f5(slab) [ 15.374604] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.374974] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.375350] page dumped because: kasan: bad access detected [ 15.375594] [ 15.375715] Memory state around the buggy address: [ 15.375873] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.376090] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.376354] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.376671] ^ [ 15.376922] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.377321] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.377615] ================================================================== [ 15.190462] ================================================================== [ 15.190797] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 15.191152] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 15.191709] [ 15.192065] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.192115] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.192154] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.192175] Call Trace: [ 15.192193] <TASK> [ 15.192210] dump_stack_lvl+0x73/0xb0 [ 15.192239] print_report+0xd1/0x650 [ 15.192262] ? __virt_addr_valid+0x1db/0x2d0 [ 15.192287] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.192309] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.192331] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.192354] kasan_report+0x141/0x180 [ 15.192377] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.192403] kasan_check_range+0x10c/0x1c0 [ 15.192427] __kasan_check_write+0x18/0x20 [ 15.192448] kasan_atomics_helper+0x1ce1/0x5450 [ 15.192472] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.192496] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.192522] ? kasan_atomics+0x152/0x310 [ 15.192549] kasan_atomics+0x1dc/0x310 [ 15.192573] ? __pfx_kasan_atomics+0x10/0x10 [ 15.192598] ? __pfx_read_tsc+0x10/0x10 [ 15.192620] ? ktime_get_ts64+0x86/0x230 [ 15.192644] kunit_try_run_case+0x1a5/0x480 [ 15.192669] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.192692] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.192717] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.192741] ? __kthread_parkme+0x82/0x180 [ 15.192762] ? preempt_count_sub+0x50/0x80 [ 15.192786] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.192810] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.192833] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.192855] kthread+0x337/0x6f0 [ 15.192876] ? trace_preempt_on+0x20/0xc0 [ 15.192899] ? __pfx_kthread+0x10/0x10 [ 15.192920] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.192941] ? calculate_sigpending+0x7b/0xa0 [ 15.192965] ? __pfx_kthread+0x10/0x10 [ 15.192987] ret_from_fork+0x116/0x1d0 [ 15.193007] ? __pfx_kthread+0x10/0x10 [ 15.193027] ret_from_fork_asm+0x1a/0x30 [ 15.193058] </TASK> [ 15.193070] [ 15.203914] Allocated by task 282: [ 15.204388] kasan_save_stack+0x45/0x70 [ 15.204601] kasan_save_track+0x18/0x40 [ 15.204803] kasan_save_alloc_info+0x3b/0x50 [ 15.205103] __kasan_kmalloc+0xb7/0xc0 [ 15.205420] __kmalloc_cache_noprof+0x189/0x420 [ 15.205718] kasan_atomics+0x95/0x310 [ 15.205923] kunit_try_run_case+0x1a5/0x480 [ 15.206320] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.206660] kthread+0x337/0x6f0 [ 15.206912] ret_from_fork+0x116/0x1d0 [ 15.207119] ret_from_fork_asm+0x1a/0x30 [ 15.207423] [ 15.207523] The buggy address belongs to the object at ffff8881039c5a00 [ 15.207523] which belongs to the cache kmalloc-64 of size 64 [ 15.208252] The buggy address is located 0 bytes to the right of [ 15.208252] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 15.208864] [ 15.208988] The buggy address belongs to the physical page: [ 15.209447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 15.209795] flags: 0x200000000000000(node=0|zone=2) [ 15.210160] page_type: f5(slab) [ 15.210452] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.210889] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.211369] page dumped because: kasan: bad access detected [ 15.211705] [ 15.211785] Memory state around the buggy address: [ 15.212036] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.212545] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.212881] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.213352] ^ [ 15.213606] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.214039] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.214482] ================================================================== [ 14.133919] ================================================================== [ 14.134190] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 14.134641] Read of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.134891] [ 14.134982] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.135034] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.135048] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.135079] Call Trace: [ 14.135095] <TASK> [ 14.135110] dump_stack_lvl+0x73/0xb0 [ 14.135164] print_report+0xd1/0x650 [ 14.135186] ? __virt_addr_valid+0x1db/0x2d0 [ 14.135209] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.135231] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.135253] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.135275] kasan_report+0x141/0x180 [ 14.135368] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.135399] __asan_report_load4_noabort+0x18/0x20 [ 14.135436] kasan_atomics_helper+0x4b54/0x5450 [ 14.135468] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.135490] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.135526] ? kasan_atomics+0x152/0x310 [ 14.135554] kasan_atomics+0x1dc/0x310 [ 14.135576] ? __pfx_kasan_atomics+0x10/0x10 [ 14.135601] ? __pfx_read_tsc+0x10/0x10 [ 14.135622] ? ktime_get_ts64+0x86/0x230 [ 14.135646] kunit_try_run_case+0x1a5/0x480 [ 14.135670] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.135692] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.135716] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.135739] ? __kthread_parkme+0x82/0x180 [ 14.135760] ? preempt_count_sub+0x50/0x80 [ 14.135793] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.135817] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.135840] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.135874] kthread+0x337/0x6f0 [ 14.135894] ? trace_preempt_on+0x20/0xc0 [ 14.135917] ? __pfx_kthread+0x10/0x10 [ 14.135938] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.135968] ? calculate_sigpending+0x7b/0xa0 [ 14.135991] ? __pfx_kthread+0x10/0x10 [ 14.136013] ret_from_fork+0x116/0x1d0 [ 14.136042] ? __pfx_kthread+0x10/0x10 [ 14.136064] ret_from_fork_asm+0x1a/0x30 [ 14.136094] </TASK> [ 14.136105] [ 14.145318] Allocated by task 282: [ 14.145491] kasan_save_stack+0x45/0x70 [ 14.145677] kasan_save_track+0x18/0x40 [ 14.145856] kasan_save_alloc_info+0x3b/0x50 [ 14.146052] __kasan_kmalloc+0xb7/0xc0 [ 14.146675] __kmalloc_cache_noprof+0x189/0x420 [ 14.146898] kasan_atomics+0x95/0x310 [ 14.147065] kunit_try_run_case+0x1a5/0x480 [ 14.147259] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.147601] kthread+0x337/0x6f0 [ 14.147765] ret_from_fork+0x116/0x1d0 [ 14.147956] ret_from_fork_asm+0x1a/0x30 [ 14.148097] [ 14.148250] The buggy address belongs to the object at ffff8881039c5a00 [ 14.148250] which belongs to the cache kmalloc-64 of size 64 [ 14.148803] The buggy address is located 0 bytes to the right of [ 14.148803] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.149400] [ 14.149502] The buggy address belongs to the physical page: [ 14.149791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.150179] flags: 0x200000000000000(node=0|zone=2) [ 14.150632] page_type: f5(slab) [ 14.150782] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.151137] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.151557] page dumped because: kasan: bad access detected [ 14.151798] [ 14.151912] Memory state around the buggy address: [ 14.152090] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.152530] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.152837] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.153099] ^ [ 14.153429] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.153716] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.154038] ================================================================== [ 14.958446] ================================================================== [ 14.958798] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 14.959152] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.959492] [ 14.959602] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.959642] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.959654] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.959676] Call Trace: [ 14.959689] <TASK> [ 14.959702] dump_stack_lvl+0x73/0xb0 [ 14.959726] print_report+0xd1/0x650 [ 14.959749] ? __virt_addr_valid+0x1db/0x2d0 [ 14.959772] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.959793] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.959816] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.959837] kasan_report+0x141/0x180 [ 14.959860] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.959886] kasan_check_range+0x10c/0x1c0 [ 14.959910] __kasan_check_write+0x18/0x20 [ 14.959930] kasan_atomics_helper+0x16e7/0x5450 [ 14.959954] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.959976] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.960001] ? kasan_atomics+0x152/0x310 [ 14.960027] kasan_atomics+0x1dc/0x310 [ 14.960050] ? __pfx_kasan_atomics+0x10/0x10 [ 14.960074] ? __pfx_read_tsc+0x10/0x10 [ 14.960095] ? ktime_get_ts64+0x86/0x230 [ 14.960240] kunit_try_run_case+0x1a5/0x480 [ 14.960275] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.960313] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.960338] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.960370] ? __kthread_parkme+0x82/0x180 [ 14.960391] ? preempt_count_sub+0x50/0x80 [ 14.960426] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.960450] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.960475] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.960499] kthread+0x337/0x6f0 [ 14.960528] ? trace_preempt_on+0x20/0xc0 [ 14.960552] ? __pfx_kthread+0x10/0x10 [ 14.960573] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.960606] ? calculate_sigpending+0x7b/0xa0 [ 14.960630] ? __pfx_kthread+0x10/0x10 [ 14.960652] ret_from_fork+0x116/0x1d0 [ 14.960680] ? __pfx_kthread+0x10/0x10 [ 14.960701] ret_from_fork_asm+0x1a/0x30 [ 14.960742] </TASK> [ 14.960755] [ 14.968502] Allocated by task 282: [ 14.968685] kasan_save_stack+0x45/0x70 [ 14.968889] kasan_save_track+0x18/0x40 [ 14.969086] kasan_save_alloc_info+0x3b/0x50 [ 14.969264] __kasan_kmalloc+0xb7/0xc0 [ 14.969402] __kmalloc_cache_noprof+0x189/0x420 [ 14.969560] kasan_atomics+0x95/0x310 [ 14.969695] kunit_try_run_case+0x1a5/0x480 [ 14.969842] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.970074] kthread+0x337/0x6f0 [ 14.970313] ret_from_fork+0x116/0x1d0 [ 14.970549] ret_from_fork_asm+0x1a/0x30 [ 14.970785] [ 14.970896] The buggy address belongs to the object at ffff8881039c5a00 [ 14.970896] which belongs to the cache kmalloc-64 of size 64 [ 14.971464] The buggy address is located 0 bytes to the right of [ 14.971464] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.972020] [ 14.972092] The buggy address belongs to the physical page: [ 14.972400] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.972656] flags: 0x200000000000000(node=0|zone=2) [ 14.972823] page_type: f5(slab) [ 14.972952] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.973360] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.973702] page dumped because: kasan: bad access detected [ 14.973981] [ 14.974076] Memory state around the buggy address: [ 14.974342] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.974642] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.974960] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.975316] ^ [ 14.975544] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.975853] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.976205] ================================================================== [ 14.313837] ================================================================== [ 14.314104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 14.314710] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.314933] [ 14.315018] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.315060] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.315073] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.315095] Call Trace: [ 14.315109] <TASK> [ 14.315154] dump_stack_lvl+0x73/0xb0 [ 14.315183] print_report+0xd1/0x650 [ 14.315206] ? __virt_addr_valid+0x1db/0x2d0 [ 14.315272] ? kasan_atomics_helper+0x860/0x5450 [ 14.315378] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.315456] ? kasan_atomics_helper+0x860/0x5450 [ 14.315525] kasan_report+0x141/0x180 [ 14.315548] ? kasan_atomics_helper+0x860/0x5450 [ 14.315575] kasan_check_range+0x10c/0x1c0 [ 14.315599] __kasan_check_write+0x18/0x20 [ 14.315620] kasan_atomics_helper+0x860/0x5450 [ 14.315643] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.315666] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.315693] ? kasan_atomics+0x152/0x310 [ 14.315721] kasan_atomics+0x1dc/0x310 [ 14.315744] ? __pfx_kasan_atomics+0x10/0x10 [ 14.315770] ? __pfx_read_tsc+0x10/0x10 [ 14.315792] ? ktime_get_ts64+0x86/0x230 [ 14.315816] kunit_try_run_case+0x1a5/0x480 [ 14.315842] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.315865] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.315922] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.315946] ? __kthread_parkme+0x82/0x180 [ 14.315968] ? preempt_count_sub+0x50/0x80 [ 14.315993] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.316017] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.316071] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.316096] kthread+0x337/0x6f0 [ 14.316140] ? trace_preempt_on+0x20/0xc0 [ 14.316165] ? __pfx_kthread+0x10/0x10 [ 14.316187] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.316208] ? calculate_sigpending+0x7b/0xa0 [ 14.316233] ? __pfx_kthread+0x10/0x10 [ 14.316256] ret_from_fork+0x116/0x1d0 [ 14.316275] ? __pfx_kthread+0x10/0x10 [ 14.316353] ret_from_fork_asm+0x1a/0x30 [ 14.316387] </TASK> [ 14.316399] [ 14.327110] Allocated by task 282: [ 14.327283] kasan_save_stack+0x45/0x70 [ 14.327491] kasan_save_track+0x18/0x40 [ 14.327670] kasan_save_alloc_info+0x3b/0x50 [ 14.327869] __kasan_kmalloc+0xb7/0xc0 [ 14.328052] __kmalloc_cache_noprof+0x189/0x420 [ 14.328294] kasan_atomics+0x95/0x310 [ 14.328433] kunit_try_run_case+0x1a5/0x480 [ 14.328575] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.328747] kthread+0x337/0x6f0 [ 14.328867] ret_from_fork+0x116/0x1d0 [ 14.329064] ret_from_fork_asm+0x1a/0x30 [ 14.329368] [ 14.329599] The buggy address belongs to the object at ffff8881039c5a00 [ 14.329599] which belongs to the cache kmalloc-64 of size 64 [ 14.330722] The buggy address is located 0 bytes to the right of [ 14.330722] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.331552] [ 14.331711] The buggy address belongs to the physical page: [ 14.332013] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.332559] flags: 0x200000000000000(node=0|zone=2) [ 14.332803] page_type: f5(slab) [ 14.333036] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.333527] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.333969] page dumped because: kasan: bad access detected [ 14.334249] [ 14.334509] Memory state around the buggy address: [ 14.334739] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.335009] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.335655] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.336067] ^ [ 14.336413] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.336685] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.337022] ================================================================== [ 14.494445] ================================================================== [ 14.494707] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 14.494933] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.495695] [ 14.495828] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.495940] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.495955] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.496005] Call Trace: [ 14.496020] <TASK> [ 14.496046] dump_stack_lvl+0x73/0xb0 [ 14.496087] print_report+0xd1/0x650 [ 14.496111] ? __virt_addr_valid+0x1db/0x2d0 [ 14.496145] ? kasan_atomics_helper+0xd47/0x5450 [ 14.496167] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.496190] ? kasan_atomics_helper+0xd47/0x5450 [ 14.496212] kasan_report+0x141/0x180 [ 14.496235] ? kasan_atomics_helper+0xd47/0x5450 [ 14.496262] kasan_check_range+0x10c/0x1c0 [ 14.496287] __kasan_check_write+0x18/0x20 [ 14.496307] kasan_atomics_helper+0xd47/0x5450 [ 14.496330] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.496353] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.496379] ? kasan_atomics+0x152/0x310 [ 14.496406] kasan_atomics+0x1dc/0x310 [ 14.496429] ? __pfx_kasan_atomics+0x10/0x10 [ 14.496454] ? __pfx_read_tsc+0x10/0x10 [ 14.496553] ? ktime_get_ts64+0x86/0x230 [ 14.496598] kunit_try_run_case+0x1a5/0x480 [ 14.496623] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.496646] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.496671] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.496694] ? __kthread_parkme+0x82/0x180 [ 14.496716] ? preempt_count_sub+0x50/0x80 [ 14.496740] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.496764] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.496788] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.496812] kthread+0x337/0x6f0 [ 14.496832] ? trace_preempt_on+0x20/0xc0 [ 14.496856] ? __pfx_kthread+0x10/0x10 [ 14.496878] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.496899] ? calculate_sigpending+0x7b/0xa0 [ 14.496923] ? __pfx_kthread+0x10/0x10 [ 14.496945] ret_from_fork+0x116/0x1d0 [ 14.496965] ? __pfx_kthread+0x10/0x10 [ 14.496986] ret_from_fork_asm+0x1a/0x30 [ 14.497017] </TASK> [ 14.497029] [ 14.508052] Allocated by task 282: [ 14.508266] kasan_save_stack+0x45/0x70 [ 14.508900] kasan_save_track+0x18/0x40 [ 14.509110] kasan_save_alloc_info+0x3b/0x50 [ 14.509437] __kasan_kmalloc+0xb7/0xc0 [ 14.509579] __kmalloc_cache_noprof+0x189/0x420 [ 14.509794] kasan_atomics+0x95/0x310 [ 14.509985] kunit_try_run_case+0x1a5/0x480 [ 14.510277] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.510651] kthread+0x337/0x6f0 [ 14.510787] ret_from_fork+0x116/0x1d0 [ 14.510969] ret_from_fork_asm+0x1a/0x30 [ 14.511223] [ 14.511325] The buggy address belongs to the object at ffff8881039c5a00 [ 14.511325] which belongs to the cache kmalloc-64 of size 64 [ 14.511920] The buggy address is located 0 bytes to the right of [ 14.511920] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.512558] [ 14.512638] The buggy address belongs to the physical page: [ 14.512930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.513625] flags: 0x200000000000000(node=0|zone=2) [ 14.513892] page_type: f5(slab) [ 14.514091] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.514360] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.514747] page dumped because: kasan: bad access detected [ 14.515039] [ 14.515134] Memory state around the buggy address: [ 14.515422] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.515774] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.516081] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.516425] ^ [ 14.516751] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.517106] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.517527] ================================================================== [ 15.066017] ================================================================== [ 15.066543] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 15.066992] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 15.067444] [ 15.067657] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.067705] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.067721] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.067895] Call Trace: [ 15.067915] <TASK> [ 15.067932] dump_stack_lvl+0x73/0xb0 [ 15.067961] print_report+0xd1/0x650 [ 15.067985] ? __virt_addr_valid+0x1db/0x2d0 [ 15.068009] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.068031] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.068054] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.068077] kasan_report+0x141/0x180 [ 15.068099] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.068158] kasan_check_range+0x10c/0x1c0 [ 15.068183] __kasan_check_write+0x18/0x20 [ 15.068203] kasan_atomics_helper+0x19e3/0x5450 [ 15.068227] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.068250] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.068277] ? kasan_atomics+0x152/0x310 [ 15.068303] kasan_atomics+0x1dc/0x310 [ 15.068327] ? __pfx_kasan_atomics+0x10/0x10 [ 15.068351] ? __pfx_read_tsc+0x10/0x10 [ 15.068372] ? ktime_get_ts64+0x86/0x230 [ 15.068397] kunit_try_run_case+0x1a5/0x480 [ 15.068422] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.068444] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.068467] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.068490] ? __kthread_parkme+0x82/0x180 [ 15.068513] ? preempt_count_sub+0x50/0x80 [ 15.068537] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.068561] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.068585] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.068608] kthread+0x337/0x6f0 [ 15.068629] ? trace_preempt_on+0x20/0xc0 [ 15.068653] ? __pfx_kthread+0x10/0x10 [ 15.068674] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.068695] ? calculate_sigpending+0x7b/0xa0 [ 15.068718] ? __pfx_kthread+0x10/0x10 [ 15.068740] ret_from_fork+0x116/0x1d0 [ 15.068758] ? __pfx_kthread+0x10/0x10 [ 15.068780] ret_from_fork_asm+0x1a/0x30 [ 15.068810] </TASK> [ 15.068822] [ 15.079397] Allocated by task 282: [ 15.079644] kasan_save_stack+0x45/0x70 [ 15.079907] kasan_save_track+0x18/0x40 [ 15.080219] kasan_save_alloc_info+0x3b/0x50 [ 15.080502] __kasan_kmalloc+0xb7/0xc0 [ 15.080754] __kmalloc_cache_noprof+0x189/0x420 [ 15.081041] kasan_atomics+0x95/0x310 [ 15.081290] kunit_try_run_case+0x1a5/0x480 [ 15.081507] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.081756] kthread+0x337/0x6f0 [ 15.081911] ret_from_fork+0x116/0x1d0 [ 15.082058] ret_from_fork_asm+0x1a/0x30 [ 15.082571] [ 15.082770] The buggy address belongs to the object at ffff8881039c5a00 [ 15.082770] which belongs to the cache kmalloc-64 of size 64 [ 15.083429] The buggy address is located 0 bytes to the right of [ 15.083429] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 15.084206] [ 15.084291] The buggy address belongs to the physical page: [ 15.084675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 15.085142] flags: 0x200000000000000(node=0|zone=2) [ 15.085467] page_type: f5(slab) [ 15.085714] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.086168] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.086597] page dumped because: kasan: bad access detected [ 15.086870] [ 15.087096] Memory state around the buggy address: [ 15.087461] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.087778] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.088238] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.088606] ^ [ 15.088862] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.089305] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.089643] ================================================================== [ 14.867300] ================================================================== [ 14.867671] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 14.868020] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.868386] [ 14.868514] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.868556] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.868569] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.868602] Call Trace: [ 14.868614] <TASK> [ 14.868628] dump_stack_lvl+0x73/0xb0 [ 14.868655] print_report+0xd1/0x650 [ 14.868689] ? __virt_addr_valid+0x1db/0x2d0 [ 14.868713] ? kasan_atomics_helper+0x1467/0x5450 [ 14.868735] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.868766] ? kasan_atomics_helper+0x1467/0x5450 [ 14.868788] kasan_report+0x141/0x180 [ 14.868811] ? kasan_atomics_helper+0x1467/0x5450 [ 14.868847] kasan_check_range+0x10c/0x1c0 [ 14.868872] __kasan_check_write+0x18/0x20 [ 14.868892] kasan_atomics_helper+0x1467/0x5450 [ 14.868923] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.868946] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.868971] ? kasan_atomics+0x152/0x310 [ 14.869008] kasan_atomics+0x1dc/0x310 [ 14.869032] ? __pfx_kasan_atomics+0x10/0x10 [ 14.869057] ? __pfx_read_tsc+0x10/0x10 [ 14.869078] ? ktime_get_ts64+0x86/0x230 [ 14.869102] kunit_try_run_case+0x1a5/0x480 [ 14.869156] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.869178] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.869203] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.869226] ? __kthread_parkme+0x82/0x180 [ 14.869248] ? preempt_count_sub+0x50/0x80 [ 14.869273] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.869307] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.869332] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.869355] kthread+0x337/0x6f0 [ 14.869388] ? trace_preempt_on+0x20/0xc0 [ 14.869412] ? __pfx_kthread+0x10/0x10 [ 14.869433] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.869465] ? calculate_sigpending+0x7b/0xa0 [ 14.869489] ? __pfx_kthread+0x10/0x10 [ 14.869511] ret_from_fork+0x116/0x1d0 [ 14.869530] ? __pfx_kthread+0x10/0x10 [ 14.869551] ret_from_fork_asm+0x1a/0x30 [ 14.869581] </TASK> [ 14.869593] [ 14.877320] Allocated by task 282: [ 14.877524] kasan_save_stack+0x45/0x70 [ 14.877710] kasan_save_track+0x18/0x40 [ 14.877900] kasan_save_alloc_info+0x3b/0x50 [ 14.878051] __kasan_kmalloc+0xb7/0xc0 [ 14.878213] __kmalloc_cache_noprof+0x189/0x420 [ 14.878372] kasan_atomics+0x95/0x310 [ 14.878506] kunit_try_run_case+0x1a5/0x480 [ 14.878657] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.878853] kthread+0x337/0x6f0 [ 14.879052] ret_from_fork+0x116/0x1d0 [ 14.879279] ret_from_fork_asm+0x1a/0x30 [ 14.879474] [ 14.879576] The buggy address belongs to the object at ffff8881039c5a00 [ 14.879576] which belongs to the cache kmalloc-64 of size 64 [ 14.880110] The buggy address is located 0 bytes to the right of [ 14.880110] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.880697] [ 14.880783] The buggy address belongs to the physical page: [ 14.880960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.881242] flags: 0x200000000000000(node=0|zone=2) [ 14.881413] page_type: f5(slab) [ 14.881534] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.881908] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.882309] page dumped because: kasan: bad access detected [ 14.882589] [ 14.882699] Memory state around the buggy address: [ 14.882924] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.883300] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.883642] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.883948] ^ [ 14.884181] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.884503] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.884823] ================================================================== [ 15.451986] ================================================================== [ 15.452368] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 15.452668] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 15.452993] [ 15.453149] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.453192] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.453204] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.453225] Call Trace: [ 15.453239] <TASK> [ 15.453254] dump_stack_lvl+0x73/0xb0 [ 15.453281] print_report+0xd1/0x650 [ 15.453314] ? __virt_addr_valid+0x1db/0x2d0 [ 15.453339] ? kasan_atomics_helper+0x224c/0x5450 [ 15.453360] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.453395] ? kasan_atomics_helper+0x224c/0x5450 [ 15.453417] kasan_report+0x141/0x180 [ 15.453440] ? kasan_atomics_helper+0x224c/0x5450 [ 15.453467] kasan_check_range+0x10c/0x1c0 [ 15.453501] __kasan_check_write+0x18/0x20 [ 15.453521] kasan_atomics_helper+0x224c/0x5450 [ 15.453544] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.453577] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.453603] ? kasan_atomics+0x152/0x310 [ 15.453631] kasan_atomics+0x1dc/0x310 [ 15.453662] ? __pfx_kasan_atomics+0x10/0x10 [ 15.453687] ? __pfx_read_tsc+0x10/0x10 [ 15.453708] ? ktime_get_ts64+0x86/0x230 [ 15.453744] kunit_try_run_case+0x1a5/0x480 [ 15.453768] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.453791] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.453815] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.453838] ? __kthread_parkme+0x82/0x180 [ 15.453869] ? preempt_count_sub+0x50/0x80 [ 15.453893] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.453917] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.453951] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.453975] kthread+0x337/0x6f0 [ 15.453994] ? trace_preempt_on+0x20/0xc0 [ 15.454019] ? __pfx_kthread+0x10/0x10 [ 15.454040] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.454062] ? calculate_sigpending+0x7b/0xa0 [ 15.454086] ? __pfx_kthread+0x10/0x10 [ 15.454107] ret_from_fork+0x116/0x1d0 [ 15.454154] ? __pfx_kthread+0x10/0x10 [ 15.454176] ret_from_fork_asm+0x1a/0x30 [ 15.454206] </TASK> [ 15.454217] [ 15.461769] Allocated by task 282: [ 15.461916] kasan_save_stack+0x45/0x70 [ 15.462153] kasan_save_track+0x18/0x40 [ 15.462371] kasan_save_alloc_info+0x3b/0x50 [ 15.462555] __kasan_kmalloc+0xb7/0xc0 [ 15.462770] __kmalloc_cache_noprof+0x189/0x420 [ 15.462978] kasan_atomics+0x95/0x310 [ 15.463193] kunit_try_run_case+0x1a5/0x480 [ 15.463409] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.463639] kthread+0x337/0x6f0 [ 15.463814] ret_from_fork+0x116/0x1d0 [ 15.464031] ret_from_fork_asm+0x1a/0x30 [ 15.464221] [ 15.464293] The buggy address belongs to the object at ffff8881039c5a00 [ 15.464293] which belongs to the cache kmalloc-64 of size 64 [ 15.464649] The buggy address is located 0 bytes to the right of [ 15.464649] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 15.465069] [ 15.465195] The buggy address belongs to the physical page: [ 15.465488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 15.465909] flags: 0x200000000000000(node=0|zone=2) [ 15.466207] page_type: f5(slab) [ 15.466379] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.466726] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.467046] page dumped because: kasan: bad access detected [ 15.467257] [ 15.467330] Memory state around the buggy address: [ 15.467487] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.467731] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.468080] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.468435] ^ [ 15.468690] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.469018] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.469380] ================================================================== [ 14.999020] ================================================================== [ 14.999345] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 14.999669] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.999975] [ 15.000077] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.000132] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.000145] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.000168] Call Trace: [ 15.000183] <TASK> [ 15.000200] dump_stack_lvl+0x73/0xb0 [ 15.000226] print_report+0xd1/0x650 [ 15.000249] ? __virt_addr_valid+0x1db/0x2d0 [ 15.000273] ? kasan_atomics_helper+0x1818/0x5450 [ 15.000295] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.000319] ? kasan_atomics_helper+0x1818/0x5450 [ 15.000342] kasan_report+0x141/0x180 [ 15.000364] ? kasan_atomics_helper+0x1818/0x5450 [ 15.000390] kasan_check_range+0x10c/0x1c0 [ 15.000414] __kasan_check_write+0x18/0x20 [ 15.000433] kasan_atomics_helper+0x1818/0x5450 [ 15.000457] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.000479] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.000504] ? kasan_atomics+0x152/0x310 [ 15.000530] kasan_atomics+0x1dc/0x310 [ 15.000554] ? __pfx_kasan_atomics+0x10/0x10 [ 15.000578] ? __pfx_read_tsc+0x10/0x10 [ 15.000600] ? ktime_get_ts64+0x86/0x230 [ 15.000623] kunit_try_run_case+0x1a5/0x480 [ 15.000647] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.000670] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.000693] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.000717] ? __kthread_parkme+0x82/0x180 [ 15.000738] ? preempt_count_sub+0x50/0x80 [ 15.000761] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.000785] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.000808] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.000833] kthread+0x337/0x6f0 [ 15.000852] ? trace_preempt_on+0x20/0xc0 [ 15.000876] ? __pfx_kthread+0x10/0x10 [ 15.000898] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.000921] ? calculate_sigpending+0x7b/0xa0 [ 15.000947] ? __pfx_kthread+0x10/0x10 [ 15.000971] ret_from_fork+0x116/0x1d0 [ 15.000992] ? __pfx_kthread+0x10/0x10 [ 15.001015] ret_from_fork_asm+0x1a/0x30 [ 15.001046] </TASK> [ 15.001058] [ 15.008819] Allocated by task 282: [ 15.009013] kasan_save_stack+0x45/0x70 [ 15.009276] kasan_save_track+0x18/0x40 [ 15.009451] kasan_save_alloc_info+0x3b/0x50 [ 15.009644] __kasan_kmalloc+0xb7/0xc0 [ 15.009812] __kmalloc_cache_noprof+0x189/0x420 [ 15.009985] kasan_atomics+0x95/0x310 [ 15.010221] kunit_try_run_case+0x1a5/0x480 [ 15.010401] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.010586] kthread+0x337/0x6f0 [ 15.010768] ret_from_fork+0x116/0x1d0 [ 15.010954] ret_from_fork_asm+0x1a/0x30 [ 15.011192] [ 15.011288] The buggy address belongs to the object at ffff8881039c5a00 [ 15.011288] which belongs to the cache kmalloc-64 of size 64 [ 15.011696] The buggy address is located 0 bytes to the right of [ 15.011696] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 15.012069] [ 15.012202] The buggy address belongs to the physical page: [ 15.012454] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 15.012805] flags: 0x200000000000000(node=0|zone=2) [ 15.013037] page_type: f5(slab) [ 15.013233] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.013468] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.013697] page dumped because: kasan: bad access detected [ 15.013926] [ 15.014022] Memory state around the buggy address: [ 15.014278] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.014605] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.014931] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.015265] ^ [ 15.015485] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.015759] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.016033] ================================================================== [ 14.627079] ================================================================== [ 14.627527] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 14.627929] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.628235] [ 14.628410] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.628492] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.628544] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.628567] Call Trace: [ 14.628583] <TASK> [ 14.628598] dump_stack_lvl+0x73/0xb0 [ 14.628638] print_report+0xd1/0x650 [ 14.628660] ? __virt_addr_valid+0x1db/0x2d0 [ 14.628684] ? kasan_atomics_helper+0x1079/0x5450 [ 14.628708] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.628731] ? kasan_atomics_helper+0x1079/0x5450 [ 14.628753] kasan_report+0x141/0x180 [ 14.628805] ? kasan_atomics_helper+0x1079/0x5450 [ 14.628833] kasan_check_range+0x10c/0x1c0 [ 14.628858] __kasan_check_write+0x18/0x20 [ 14.628888] kasan_atomics_helper+0x1079/0x5450 [ 14.628911] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.628934] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.628960] ? kasan_atomics+0x152/0x310 [ 14.628987] kasan_atomics+0x1dc/0x310 [ 14.629011] ? __pfx_kasan_atomics+0x10/0x10 [ 14.629035] ? __pfx_read_tsc+0x10/0x10 [ 14.629084] ? ktime_get_ts64+0x86/0x230 [ 14.629136] kunit_try_run_case+0x1a5/0x480 [ 14.629162] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.629185] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.629209] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.629231] ? __kthread_parkme+0x82/0x180 [ 14.629253] ? preempt_count_sub+0x50/0x80 [ 14.629278] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.629301] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.629341] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.629365] kthread+0x337/0x6f0 [ 14.629387] ? trace_preempt_on+0x20/0xc0 [ 14.629413] ? __pfx_kthread+0x10/0x10 [ 14.629434] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.629456] ? calculate_sigpending+0x7b/0xa0 [ 14.629480] ? __pfx_kthread+0x10/0x10 [ 14.629502] ret_from_fork+0x116/0x1d0 [ 14.629522] ? __pfx_kthread+0x10/0x10 [ 14.629543] ret_from_fork_asm+0x1a/0x30 [ 14.629573] </TASK> [ 14.629585] [ 14.639064] Allocated by task 282: [ 14.639304] kasan_save_stack+0x45/0x70 [ 14.639472] kasan_save_track+0x18/0x40 [ 14.639611] kasan_save_alloc_info+0x3b/0x50 [ 14.640034] __kasan_kmalloc+0xb7/0xc0 [ 14.640259] __kmalloc_cache_noprof+0x189/0x420 [ 14.640466] kasan_atomics+0x95/0x310 [ 14.640792] kunit_try_run_case+0x1a5/0x480 [ 14.641016] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.641294] kthread+0x337/0x6f0 [ 14.641511] ret_from_fork+0x116/0x1d0 [ 14.641840] ret_from_fork_asm+0x1a/0x30 [ 14.642048] [ 14.642206] The buggy address belongs to the object at ffff8881039c5a00 [ 14.642206] which belongs to the cache kmalloc-64 of size 64 [ 14.642678] The buggy address is located 0 bytes to the right of [ 14.642678] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.643455] [ 14.643583] The buggy address belongs to the physical page: [ 14.643846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.644209] flags: 0x200000000000000(node=0|zone=2) [ 14.644549] page_type: f5(slab) [ 14.644717] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.645082] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.645324] page dumped because: kasan: bad access detected [ 14.645643] [ 14.645796] Memory state around the buggy address: [ 14.646026] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.646459] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.646797] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.647016] ^ [ 14.647553] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.647892] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.648183] ================================================================== [ 14.337632] ================================================================== [ 14.338003] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 14.338488] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.339031] [ 14.339158] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.339203] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.339216] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.339240] Call Trace: [ 14.339257] <TASK> [ 14.339274] dump_stack_lvl+0x73/0xb0 [ 14.339302] print_report+0xd1/0x650 [ 14.339324] ? __virt_addr_valid+0x1db/0x2d0 [ 14.339419] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.339496] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.339523] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.339546] kasan_report+0x141/0x180 [ 14.339569] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.339596] kasan_check_range+0x10c/0x1c0 [ 14.339620] __kasan_check_write+0x18/0x20 [ 14.339708] kasan_atomics_helper+0x8f9/0x5450 [ 14.339744] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.339767] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.339793] ? kasan_atomics+0x152/0x310 [ 14.339821] kasan_atomics+0x1dc/0x310 [ 14.339844] ? __pfx_kasan_atomics+0x10/0x10 [ 14.339869] ? __pfx_read_tsc+0x10/0x10 [ 14.339892] ? ktime_get_ts64+0x86/0x230 [ 14.339918] kunit_try_run_case+0x1a5/0x480 [ 14.339943] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.339966] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.339990] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.340013] ? __kthread_parkme+0x82/0x180 [ 14.340034] ? preempt_count_sub+0x50/0x80 [ 14.340058] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.340082] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.340106] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.340139] kthread+0x337/0x6f0 [ 14.340159] ? trace_preempt_on+0x20/0xc0 [ 14.340184] ? __pfx_kthread+0x10/0x10 [ 14.340205] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.340227] ? calculate_sigpending+0x7b/0xa0 [ 14.340251] ? __pfx_kthread+0x10/0x10 [ 14.340274] ret_from_fork+0x116/0x1d0 [ 14.340293] ? __pfx_kthread+0x10/0x10 [ 14.340363] ret_from_fork_asm+0x1a/0x30 [ 14.340396] </TASK> [ 14.340408] [ 14.351173] Allocated by task 282: [ 14.351358] kasan_save_stack+0x45/0x70 [ 14.351639] kasan_save_track+0x18/0x40 [ 14.351837] kasan_save_alloc_info+0x3b/0x50 [ 14.352106] __kasan_kmalloc+0xb7/0xc0 [ 14.352372] __kmalloc_cache_noprof+0x189/0x420 [ 14.352826] kasan_atomics+0x95/0x310 [ 14.353030] kunit_try_run_case+0x1a5/0x480 [ 14.353258] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.353578] kthread+0x337/0x6f0 [ 14.353977] ret_from_fork+0x116/0x1d0 [ 14.354193] ret_from_fork_asm+0x1a/0x30 [ 14.354556] [ 14.354716] The buggy address belongs to the object at ffff8881039c5a00 [ 14.354716] which belongs to the cache kmalloc-64 of size 64 [ 14.355298] The buggy address is located 0 bytes to the right of [ 14.355298] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.356140] [ 14.356254] The buggy address belongs to the physical page: [ 14.356484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.356850] flags: 0x200000000000000(node=0|zone=2) [ 14.357076] page_type: f5(slab) [ 14.357335] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.357709] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.358261] page dumped because: kasan: bad access detected [ 14.358589] [ 14.358689] Memory state around the buggy address: [ 14.358859] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.359464] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.359772] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.360076] ^ [ 14.360503] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.360811] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.361237] ================================================================== [ 14.200582] ================================================================== [ 14.200998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 14.201398] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.201682] [ 14.201807] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.201859] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.201872] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.201893] Call Trace: [ 14.201906] <TASK> [ 14.201921] dump_stack_lvl+0x73/0xb0 [ 14.201947] print_report+0xd1/0x650 [ 14.201971] ? __virt_addr_valid+0x1db/0x2d0 [ 14.201995] ? kasan_atomics_helper+0x565/0x5450 [ 14.202017] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.202040] ? kasan_atomics_helper+0x565/0x5450 [ 14.202062] kasan_report+0x141/0x180 [ 14.202085] ? kasan_atomics_helper+0x565/0x5450 [ 14.202120] kasan_check_range+0x10c/0x1c0 [ 14.202162] __kasan_check_write+0x18/0x20 [ 14.202182] kasan_atomics_helper+0x565/0x5450 [ 14.202206] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.202239] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.202265] ? kasan_atomics+0x152/0x310 [ 14.202293] kasan_atomics+0x1dc/0x310 [ 14.202316] ? __pfx_kasan_atomics+0x10/0x10 [ 14.202411] ? __pfx_read_tsc+0x10/0x10 [ 14.202434] ? ktime_get_ts64+0x86/0x230 [ 14.202460] kunit_try_run_case+0x1a5/0x480 [ 14.202484] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.202508] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.202535] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.202558] ? __kthread_parkme+0x82/0x180 [ 14.202580] ? preempt_count_sub+0x50/0x80 [ 14.202604] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.202628] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.202652] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.202676] kthread+0x337/0x6f0 [ 14.202696] ? trace_preempt_on+0x20/0xc0 [ 14.202720] ? __pfx_kthread+0x10/0x10 [ 14.202751] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.202774] ? calculate_sigpending+0x7b/0xa0 [ 14.202797] ? __pfx_kthread+0x10/0x10 [ 14.202829] ret_from_fork+0x116/0x1d0 [ 14.202851] ? __pfx_kthread+0x10/0x10 [ 14.202872] ret_from_fork_asm+0x1a/0x30 [ 14.202902] </TASK> [ 14.202923] [ 14.211058] Allocated by task 282: [ 14.211518] kasan_save_stack+0x45/0x70 [ 14.211777] kasan_save_track+0x18/0x40 [ 14.211978] kasan_save_alloc_info+0x3b/0x50 [ 14.212207] __kasan_kmalloc+0xb7/0xc0 [ 14.212473] __kmalloc_cache_noprof+0x189/0x420 [ 14.212674] kasan_atomics+0x95/0x310 [ 14.212852] kunit_try_run_case+0x1a5/0x480 [ 14.213078] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.213413] kthread+0x337/0x6f0 [ 14.213609] ret_from_fork+0x116/0x1d0 [ 14.213798] ret_from_fork_asm+0x1a/0x30 [ 14.213983] [ 14.214101] The buggy address belongs to the object at ffff8881039c5a00 [ 14.214101] which belongs to the cache kmalloc-64 of size 64 [ 14.214538] The buggy address is located 0 bytes to the right of [ 14.214538] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.215051] [ 14.215189] The buggy address belongs to the physical page: [ 14.215534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.215898] flags: 0x200000000000000(node=0|zone=2) [ 14.216153] page_type: f5(slab) [ 14.216542] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.216905] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.217227] page dumped because: kasan: bad access detected [ 14.217579] [ 14.217685] Memory state around the buggy address: [ 14.217881] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.218216] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.218502] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.218780] ^ [ 14.219022] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.219450] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.219794] ================================================================== [ 14.113928] ================================================================== [ 14.114320] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 14.114714] Read of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.115017] [ 14.115186] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.115228] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.115241] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.115264] Call Trace: [ 14.115277] <TASK> [ 14.115342] dump_stack_lvl+0x73/0xb0 [ 14.115373] print_report+0xd1/0x650 [ 14.115408] ? __virt_addr_valid+0x1db/0x2d0 [ 14.115434] ? kasan_atomics_helper+0x3df/0x5450 [ 14.115455] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.115489] ? kasan_atomics_helper+0x3df/0x5450 [ 14.115510] kasan_report+0x141/0x180 [ 14.115533] ? kasan_atomics_helper+0x3df/0x5450 [ 14.115559] kasan_check_range+0x10c/0x1c0 [ 14.115584] __kasan_check_read+0x15/0x20 [ 14.115603] kasan_atomics_helper+0x3df/0x5450 [ 14.115626] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.115648] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.115674] ? kasan_atomics+0x152/0x310 [ 14.115701] kasan_atomics+0x1dc/0x310 [ 14.115724] ? __pfx_kasan_atomics+0x10/0x10 [ 14.115758] ? __pfx_read_tsc+0x10/0x10 [ 14.115779] ? ktime_get_ts64+0x86/0x230 [ 14.115804] kunit_try_run_case+0x1a5/0x480 [ 14.115838] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.115862] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.115886] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.115909] ? __kthread_parkme+0x82/0x180 [ 14.115940] ? preempt_count_sub+0x50/0x80 [ 14.115965] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.115988] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.116021] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.116045] kthread+0x337/0x6f0 [ 14.116065] ? trace_preempt_on+0x20/0xc0 [ 14.116097] ? __pfx_kthread+0x10/0x10 [ 14.116151] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.116173] ? calculate_sigpending+0x7b/0xa0 [ 14.116197] ? __pfx_kthread+0x10/0x10 [ 14.116219] ret_from_fork+0x116/0x1d0 [ 14.116239] ? __pfx_kthread+0x10/0x10 [ 14.116260] ret_from_fork_asm+0x1a/0x30 [ 14.116337] </TASK> [ 14.116352] [ 14.124905] Allocated by task 282: [ 14.125103] kasan_save_stack+0x45/0x70 [ 14.125421] kasan_save_track+0x18/0x40 [ 14.125649] kasan_save_alloc_info+0x3b/0x50 [ 14.125835] __kasan_kmalloc+0xb7/0xc0 [ 14.126010] __kmalloc_cache_noprof+0x189/0x420 [ 14.126253] kasan_atomics+0x95/0x310 [ 14.126535] kunit_try_run_case+0x1a5/0x480 [ 14.126742] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.126945] kthread+0x337/0x6f0 [ 14.127070] ret_from_fork+0x116/0x1d0 [ 14.127239] ret_from_fork_asm+0x1a/0x30 [ 14.127524] [ 14.127623] The buggy address belongs to the object at ffff8881039c5a00 [ 14.127623] which belongs to the cache kmalloc-64 of size 64 [ 14.128168] The buggy address is located 0 bytes to the right of [ 14.128168] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.128556] [ 14.128653] The buggy address belongs to the physical page: [ 14.129181] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.129636] flags: 0x200000000000000(node=0|zone=2) [ 14.129898] page_type: f5(slab) [ 14.130069] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.130447] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.130753] page dumped because: kasan: bad access detected [ 14.131026] [ 14.131144] Memory state around the buggy address: [ 14.131355] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.131682] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.132028] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.132352] ^ [ 14.132618] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.132941] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.133467] ================================================================== [ 15.264978] ================================================================== [ 15.265928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 15.266195] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 15.266427] [ 15.266521] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.266565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.266579] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.266600] Call Trace: [ 15.266618] <TASK> [ 15.266636] dump_stack_lvl+0x73/0xb0 [ 15.266663] print_report+0xd1/0x650 [ 15.266686] ? __virt_addr_valid+0x1db/0x2d0 [ 15.266710] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.266732] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.266754] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.266776] kasan_report+0x141/0x180 [ 15.266799] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.266826] kasan_check_range+0x10c/0x1c0 [ 15.266850] __kasan_check_write+0x18/0x20 [ 15.266870] kasan_atomics_helper+0x1eaa/0x5450 [ 15.266892] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.266915] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.266940] ? kasan_atomics+0x152/0x310 [ 15.266968] kasan_atomics+0x1dc/0x310 [ 15.266991] ? __pfx_kasan_atomics+0x10/0x10 [ 15.267016] ? __pfx_read_tsc+0x10/0x10 [ 15.267037] ? ktime_get_ts64+0x86/0x230 [ 15.267061] kunit_try_run_case+0x1a5/0x480 [ 15.267086] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.267109] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.267143] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.267166] ? __kthread_parkme+0x82/0x180 [ 15.267187] ? preempt_count_sub+0x50/0x80 [ 15.267212] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.267236] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.267259] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.267283] kthread+0x337/0x6f0 [ 15.267303] ? trace_preempt_on+0x20/0xc0 [ 15.267326] ? __pfx_kthread+0x10/0x10 [ 15.267347] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.267369] ? calculate_sigpending+0x7b/0xa0 [ 15.267393] ? __pfx_kthread+0x10/0x10 [ 15.267415] ret_from_fork+0x116/0x1d0 [ 15.267433] ? __pfx_kthread+0x10/0x10 [ 15.267454] ret_from_fork_asm+0x1a/0x30 [ 15.267484] </TASK> [ 15.267496] [ 15.280195] Allocated by task 282: [ 15.280510] kasan_save_stack+0x45/0x70 [ 15.280858] kasan_save_track+0x18/0x40 [ 15.281221] kasan_save_alloc_info+0x3b/0x50 [ 15.281672] __kasan_kmalloc+0xb7/0xc0 [ 15.282009] __kmalloc_cache_noprof+0x189/0x420 [ 15.282741] kasan_atomics+0x95/0x310 [ 15.282899] kunit_try_run_case+0x1a5/0x480 [ 15.283045] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.283507] kthread+0x337/0x6f0 [ 15.283804] ret_from_fork+0x116/0x1d0 [ 15.284142] ret_from_fork_asm+0x1a/0x30 [ 15.285216] [ 15.285592] The buggy address belongs to the object at ffff8881039c5a00 [ 15.285592] which belongs to the cache kmalloc-64 of size 64 [ 15.286495] The buggy address is located 0 bytes to the right of [ 15.286495] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 15.288435] [ 15.288522] The buggy address belongs to the physical page: [ 15.288705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 15.289042] flags: 0x200000000000000(node=0|zone=2) [ 15.289282] page_type: f5(slab) [ 15.289443] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.289748] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.290049] page dumped because: kasan: bad access detected [ 15.291859] [ 15.291943] Memory state around the buggy address: [ 15.292108] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.292739] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.292963] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.293353] ^ [ 15.293813] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.294479] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.295093] ================================================================== [ 14.180883] ================================================================== [ 14.181238] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 14.181704] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.182046] [ 14.182154] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.182199] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.182212] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.182235] Call Trace: [ 14.182263] <TASK> [ 14.182279] dump_stack_lvl+0x73/0xb0 [ 14.182307] print_report+0xd1/0x650 [ 14.182343] ? __virt_addr_valid+0x1db/0x2d0 [ 14.182367] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.182389] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.182412] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.182434] kasan_report+0x141/0x180 [ 14.182465] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.182507] __asan_report_store4_noabort+0x1b/0x30 [ 14.182581] kasan_atomics_helper+0x4b3a/0x5450 [ 14.182606] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.182629] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.182655] ? kasan_atomics+0x152/0x310 [ 14.182683] kasan_atomics+0x1dc/0x310 [ 14.182706] ? __pfx_kasan_atomics+0x10/0x10 [ 14.182732] ? __pfx_read_tsc+0x10/0x10 [ 14.182754] ? ktime_get_ts64+0x86/0x230 [ 14.182778] kunit_try_run_case+0x1a5/0x480 [ 14.182803] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.182827] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.182851] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.182874] ? __kthread_parkme+0x82/0x180 [ 14.182895] ? preempt_count_sub+0x50/0x80 [ 14.182920] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.182943] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.182967] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.182991] kthread+0x337/0x6f0 [ 14.183021] ? trace_preempt_on+0x20/0xc0 [ 14.183045] ? __pfx_kthread+0x10/0x10 [ 14.183066] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.183099] ? calculate_sigpending+0x7b/0xa0 [ 14.183130] ? __pfx_kthread+0x10/0x10 [ 14.183153] ret_from_fork+0x116/0x1d0 [ 14.183172] ? __pfx_kthread+0x10/0x10 [ 14.183192] ret_from_fork_asm+0x1a/0x30 [ 14.183223] </TASK> [ 14.183235] [ 14.191760] Allocated by task 282: [ 14.191927] kasan_save_stack+0x45/0x70 [ 14.192162] kasan_save_track+0x18/0x40 [ 14.192356] kasan_save_alloc_info+0x3b/0x50 [ 14.192569] __kasan_kmalloc+0xb7/0xc0 [ 14.192787] __kmalloc_cache_noprof+0x189/0x420 [ 14.193004] kasan_atomics+0x95/0x310 [ 14.193240] kunit_try_run_case+0x1a5/0x480 [ 14.193502] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.193684] kthread+0x337/0x6f0 [ 14.193807] ret_from_fork+0x116/0x1d0 [ 14.193990] ret_from_fork_asm+0x1a/0x30 [ 14.194221] [ 14.194318] The buggy address belongs to the object at ffff8881039c5a00 [ 14.194318] which belongs to the cache kmalloc-64 of size 64 [ 14.194760] The buggy address is located 0 bytes to the right of [ 14.194760] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.195685] [ 14.195775] The buggy address belongs to the physical page: [ 14.195993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.196262] flags: 0x200000000000000(node=0|zone=2) [ 14.196541] page_type: f5(slab) [ 14.196709] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.197053] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.197665] page dumped because: kasan: bad access detected [ 14.197928] [ 14.198016] Memory state around the buggy address: [ 14.198185] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.198639] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.198981] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.199274] ^ [ 14.199550] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.199790] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.200184] ================================================================== [ 14.154626] ================================================================== [ 14.154945] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 14.155268] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.155777] [ 14.155875] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.155920] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.155934] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.155956] Call Trace: [ 14.155982] <TASK> [ 14.155996] dump_stack_lvl+0x73/0xb0 [ 14.156025] print_report+0xd1/0x650 [ 14.156060] ? __virt_addr_valid+0x1db/0x2d0 [ 14.156084] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.156105] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.156137] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.156159] kasan_report+0x141/0x180 [ 14.156182] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.156208] kasan_check_range+0x10c/0x1c0 [ 14.156233] __kasan_check_write+0x18/0x20 [ 14.156259] kasan_atomics_helper+0x4a0/0x5450 [ 14.156324] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.156357] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.156382] ? kasan_atomics+0x152/0x310 [ 14.156461] kasan_atomics+0x1dc/0x310 [ 14.156488] ? __pfx_kasan_atomics+0x10/0x10 [ 14.156513] ? __pfx_read_tsc+0x10/0x10 [ 14.156534] ? ktime_get_ts64+0x86/0x230 [ 14.156558] kunit_try_run_case+0x1a5/0x480 [ 14.156582] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.156605] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.156628] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.156651] ? __kthread_parkme+0x82/0x180 [ 14.156672] ? preempt_count_sub+0x50/0x80 [ 14.156695] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.156731] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.156754] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.156779] kthread+0x337/0x6f0 [ 14.156810] ? trace_preempt_on+0x20/0xc0 [ 14.156842] ? __pfx_kthread+0x10/0x10 [ 14.156863] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.156884] ? calculate_sigpending+0x7b/0xa0 [ 14.156919] ? __pfx_kthread+0x10/0x10 [ 14.156940] ret_from_fork+0x116/0x1d0 [ 14.156959] ? __pfx_kthread+0x10/0x10 [ 14.156980] ret_from_fork_asm+0x1a/0x30 [ 14.157011] </TASK> [ 14.157023] [ 14.168550] Allocated by task 282: [ 14.168819] kasan_save_stack+0x45/0x70 [ 14.169139] kasan_save_track+0x18/0x40 [ 14.169558] kasan_save_alloc_info+0x3b/0x50 [ 14.169977] __kasan_kmalloc+0xb7/0xc0 [ 14.170192] __kmalloc_cache_noprof+0x189/0x420 [ 14.170842] kasan_atomics+0x95/0x310 [ 14.171345] kunit_try_run_case+0x1a5/0x480 [ 14.171699] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.171883] kthread+0x337/0x6f0 [ 14.172005] ret_from_fork+0x116/0x1d0 [ 14.172203] ret_from_fork_asm+0x1a/0x30 [ 14.172647] [ 14.172841] The buggy address belongs to the object at ffff8881039c5a00 [ 14.172841] which belongs to the cache kmalloc-64 of size 64 [ 14.173998] The buggy address is located 0 bytes to the right of [ 14.173998] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.175039] [ 14.175142] The buggy address belongs to the physical page: [ 14.175878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.176490] flags: 0x200000000000000(node=0|zone=2) [ 14.176664] page_type: f5(slab) [ 14.176787] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.177020] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.177287] page dumped because: kasan: bad access detected [ 14.177644] [ 14.177787] Memory state around the buggy address: [ 14.178027] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.178371] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.178671] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.179045] ^ [ 14.179450] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.179725] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.180049] ================================================================== [ 15.339476] ================================================================== [ 15.340357] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 15.341052] Write of size 8 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 15.341714] [ 15.341810] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.341854] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.341867] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.341889] Call Trace: [ 15.341905] <TASK> [ 15.341921] dump_stack_lvl+0x73/0xb0 [ 15.341949] print_report+0xd1/0x650 [ 15.341971] ? __virt_addr_valid+0x1db/0x2d0 [ 15.341995] ? kasan_atomics_helper+0x2006/0x5450 [ 15.342017] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.342039] ? kasan_atomics_helper+0x2006/0x5450 [ 15.342062] kasan_report+0x141/0x180 [ 15.342085] ? kasan_atomics_helper+0x2006/0x5450 [ 15.342111] kasan_check_range+0x10c/0x1c0 [ 15.342148] __kasan_check_write+0x18/0x20 [ 15.342200] kasan_atomics_helper+0x2006/0x5450 [ 15.342225] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.342249] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.342301] ? kasan_atomics+0x152/0x310 [ 15.342329] kasan_atomics+0x1dc/0x310 [ 15.342364] ? __pfx_kasan_atomics+0x10/0x10 [ 15.342389] ? __pfx_read_tsc+0x10/0x10 [ 15.342410] ? ktime_get_ts64+0x86/0x230 [ 15.342434] kunit_try_run_case+0x1a5/0x480 [ 15.342458] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.342481] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.342504] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.342534] ? __kthread_parkme+0x82/0x180 [ 15.342555] ? preempt_count_sub+0x50/0x80 [ 15.342580] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.342603] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.342627] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.342651] kthread+0x337/0x6f0 [ 15.342671] ? trace_preempt_on+0x20/0xc0 [ 15.342695] ? __pfx_kthread+0x10/0x10 [ 15.342716] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.342738] ? calculate_sigpending+0x7b/0xa0 [ 15.342762] ? __pfx_kthread+0x10/0x10 [ 15.342784] ret_from_fork+0x116/0x1d0 [ 15.342803] ? __pfx_kthread+0x10/0x10 [ 15.342824] ret_from_fork_asm+0x1a/0x30 [ 15.342854] </TASK> [ 15.342867] [ 15.352002] Allocated by task 282: [ 15.352148] kasan_save_stack+0x45/0x70 [ 15.352432] kasan_save_track+0x18/0x40 [ 15.352644] kasan_save_alloc_info+0x3b/0x50 [ 15.352858] __kasan_kmalloc+0xb7/0xc0 [ 15.353023] __kmalloc_cache_noprof+0x189/0x420 [ 15.353287] kasan_atomics+0x95/0x310 [ 15.353533] kunit_try_run_case+0x1a5/0x480 [ 15.353805] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.354085] kthread+0x337/0x6f0 [ 15.354324] ret_from_fork+0x116/0x1d0 [ 15.354539] ret_from_fork_asm+0x1a/0x30 [ 15.354779] [ 15.354853] The buggy address belongs to the object at ffff8881039c5a00 [ 15.354853] which belongs to the cache kmalloc-64 of size 64 [ 15.355250] The buggy address is located 0 bytes to the right of [ 15.355250] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 15.355855] [ 15.355957] The buggy address belongs to the physical page: [ 15.356235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 15.356481] flags: 0x200000000000000(node=0|zone=2) [ 15.356717] page_type: f5(slab) [ 15.356886] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.357252] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.357482] page dumped because: kasan: bad access detected [ 15.357655] [ 15.357731] Memory state around the buggy address: [ 15.357958] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.358349] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.358680] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.359162] ^ [ 15.359415] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.359698] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.359914] ================================================================== [ 14.249929] ================================================================== [ 14.250593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 14.251002] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.251501] [ 14.251767] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.251813] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.251828] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.251851] Call Trace: [ 14.251867] <TASK> [ 14.251883] dump_stack_lvl+0x73/0xb0 [ 14.251912] print_report+0xd1/0x650 [ 14.251967] ? __virt_addr_valid+0x1db/0x2d0 [ 14.251990] ? kasan_atomics_helper+0x697/0x5450 [ 14.252012] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.252035] ? kasan_atomics_helper+0x697/0x5450 [ 14.252057] kasan_report+0x141/0x180 [ 14.252080] ? kasan_atomics_helper+0x697/0x5450 [ 14.252107] kasan_check_range+0x10c/0x1c0 [ 14.252154] __kasan_check_write+0x18/0x20 [ 14.252175] kasan_atomics_helper+0x697/0x5450 [ 14.252198] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.252221] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.252247] ? kasan_atomics+0x152/0x310 [ 14.252275] kasan_atomics+0x1dc/0x310 [ 14.252298] ? __pfx_kasan_atomics+0x10/0x10 [ 14.252374] ? __pfx_read_tsc+0x10/0x10 [ 14.252395] ? ktime_get_ts64+0x86/0x230 [ 14.252420] kunit_try_run_case+0x1a5/0x480 [ 14.252444] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.252467] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.252491] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.252514] ? __kthread_parkme+0x82/0x180 [ 14.252535] ? preempt_count_sub+0x50/0x80 [ 14.252560] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.252584] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.252608] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.252631] kthread+0x337/0x6f0 [ 14.252651] ? trace_preempt_on+0x20/0xc0 [ 14.252675] ? __pfx_kthread+0x10/0x10 [ 14.252695] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.252718] ? calculate_sigpending+0x7b/0xa0 [ 14.252742] ? __pfx_kthread+0x10/0x10 [ 14.252767] ret_from_fork+0x116/0x1d0 [ 14.252787] ? __pfx_kthread+0x10/0x10 [ 14.252808] ret_from_fork_asm+0x1a/0x30 [ 14.252839] </TASK> [ 14.252852] [ 14.266616] Allocated by task 282: [ 14.266805] kasan_save_stack+0x45/0x70 [ 14.266994] kasan_save_track+0x18/0x40 [ 14.267163] kasan_save_alloc_info+0x3b/0x50 [ 14.267440] __kasan_kmalloc+0xb7/0xc0 [ 14.267637] __kmalloc_cache_noprof+0x189/0x420 [ 14.267830] kasan_atomics+0x95/0x310 [ 14.268016] kunit_try_run_case+0x1a5/0x480 [ 14.268219] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.268453] kthread+0x337/0x6f0 [ 14.268605] ret_from_fork+0x116/0x1d0 [ 14.268738] ret_from_fork_asm+0x1a/0x30 [ 14.268878] [ 14.268958] The buggy address belongs to the object at ffff8881039c5a00 [ 14.268958] which belongs to the cache kmalloc-64 of size 64 [ 14.269616] The buggy address is located 0 bytes to the right of [ 14.269616] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.270035] [ 14.270170] The buggy address belongs to the physical page: [ 14.270598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.270966] flags: 0x200000000000000(node=0|zone=2) [ 14.271206] page_type: f5(slab) [ 14.271450] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.271699] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.271999] page dumped because: kasan: bad access detected [ 14.272357] [ 14.272459] Memory state around the buggy address: [ 14.272684] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.272915] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.273268] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.273640] ^ [ 14.273842] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.274088] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.274499] ================================================================== [ 14.293840] ================================================================== [ 14.294220] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 14.294609] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.294932] [ 14.295031] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.295073] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.295087] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.295108] Call Trace: [ 14.295134] <TASK> [ 14.295151] dump_stack_lvl+0x73/0xb0 [ 14.295198] print_report+0xd1/0x650 [ 14.295223] ? __virt_addr_valid+0x1db/0x2d0 [ 14.295247] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.295271] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.295355] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.295381] kasan_report+0x141/0x180 [ 14.295405] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.295432] kasan_check_range+0x10c/0x1c0 [ 14.295457] __kasan_check_write+0x18/0x20 [ 14.295478] kasan_atomics_helper+0x7c7/0x5450 [ 14.295501] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.295523] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.295550] ? kasan_atomics+0x152/0x310 [ 14.295578] kasan_atomics+0x1dc/0x310 [ 14.295601] ? __pfx_kasan_atomics+0x10/0x10 [ 14.295626] ? __pfx_read_tsc+0x10/0x10 [ 14.295648] ? ktime_get_ts64+0x86/0x230 [ 14.295671] kunit_try_run_case+0x1a5/0x480 [ 14.295696] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.295718] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.295743] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.295766] ? __kthread_parkme+0x82/0x180 [ 14.295787] ? preempt_count_sub+0x50/0x80 [ 14.295811] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.295835] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.295859] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.295883] kthread+0x337/0x6f0 [ 14.295903] ? trace_preempt_on+0x20/0xc0 [ 14.295927] ? __pfx_kthread+0x10/0x10 [ 14.295948] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.295970] ? calculate_sigpending+0x7b/0xa0 [ 14.295993] ? __pfx_kthread+0x10/0x10 [ 14.296015] ret_from_fork+0x116/0x1d0 [ 14.296034] ? __pfx_kthread+0x10/0x10 [ 14.296054] ret_from_fork_asm+0x1a/0x30 [ 14.296084] </TASK> [ 14.296097] [ 14.304674] Allocated by task 282: [ 14.304881] kasan_save_stack+0x45/0x70 [ 14.305076] kasan_save_track+0x18/0x40 [ 14.305372] kasan_save_alloc_info+0x3b/0x50 [ 14.305592] __kasan_kmalloc+0xb7/0xc0 [ 14.305779] __kmalloc_cache_noprof+0x189/0x420 [ 14.305998] kasan_atomics+0x95/0x310 [ 14.306220] kunit_try_run_case+0x1a5/0x480 [ 14.306478] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.306663] kthread+0x337/0x6f0 [ 14.306864] ret_from_fork+0x116/0x1d0 [ 14.307075] ret_from_fork_asm+0x1a/0x30 [ 14.307305] [ 14.307423] The buggy address belongs to the object at ffff8881039c5a00 [ 14.307423] which belongs to the cache kmalloc-64 of size 64 [ 14.307955] The buggy address is located 0 bytes to the right of [ 14.307955] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.308634] [ 14.308779] The buggy address belongs to the physical page: [ 14.308968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.309622] flags: 0x200000000000000(node=0|zone=2) [ 14.309806] page_type: f5(slab) [ 14.310016] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.310410] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.310823] page dumped because: kasan: bad access detected [ 14.311079] [ 14.311234] Memory state around the buggy address: [ 14.311564] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.311901] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.312239] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.312664] ^ [ 14.312823] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.313058] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.313377] ================================================================== [ 14.669856] ================================================================== [ 14.670239] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 14.670808] Write of size 4 at addr ffff8881039c5a30 by task kunit_try_catch/282 [ 14.671080] [ 14.671316] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.671376] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.671426] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.671450] Call Trace: [ 14.671469] <TASK> [ 14.671497] dump_stack_lvl+0x73/0xb0 [ 14.671528] print_report+0xd1/0x650 [ 14.671551] ? __virt_addr_valid+0x1db/0x2d0 [ 14.671575] ? kasan_atomics_helper+0x1148/0x5450 [ 14.671596] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.671619] ? kasan_atomics_helper+0x1148/0x5450 [ 14.671641] kasan_report+0x141/0x180 [ 14.671664] ? kasan_atomics_helper+0x1148/0x5450 [ 14.671691] kasan_check_range+0x10c/0x1c0 [ 14.671715] __kasan_check_write+0x18/0x20 [ 14.671734] kasan_atomics_helper+0x1148/0x5450 [ 14.671757] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.671779] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.671804] ? kasan_atomics+0x152/0x310 [ 14.671832] kasan_atomics+0x1dc/0x310 [ 14.671855] ? __pfx_kasan_atomics+0x10/0x10 [ 14.671880] ? __pfx_read_tsc+0x10/0x10 [ 14.671901] ? ktime_get_ts64+0x86/0x230 [ 14.671926] kunit_try_run_case+0x1a5/0x480 [ 14.671950] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.671972] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.671995] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.672019] ? __kthread_parkme+0x82/0x180 [ 14.672040] ? preempt_count_sub+0x50/0x80 [ 14.672065] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.672089] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.672112] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.672237] kthread+0x337/0x6f0 [ 14.672265] ? trace_preempt_on+0x20/0xc0 [ 14.672303] ? __pfx_kthread+0x10/0x10 [ 14.672324] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.672388] ? calculate_sigpending+0x7b/0xa0 [ 14.672416] ? __pfx_kthread+0x10/0x10 [ 14.672438] ret_from_fork+0x116/0x1d0 [ 14.672457] ? __pfx_kthread+0x10/0x10 [ 14.672478] ret_from_fork_asm+0x1a/0x30 [ 14.672509] </TASK> [ 14.672520] [ 14.685137] Allocated by task 282: [ 14.685753] kasan_save_stack+0x45/0x70 [ 14.685981] kasan_save_track+0x18/0x40 [ 14.686379] kasan_save_alloc_info+0x3b/0x50 [ 14.686783] __kasan_kmalloc+0xb7/0xc0 [ 14.687084] __kmalloc_cache_noprof+0x189/0x420 [ 14.687616] kasan_atomics+0x95/0x310 [ 14.687808] kunit_try_run_case+0x1a5/0x480 [ 14.687974] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.688539] kthread+0x337/0x6f0 [ 14.688687] ret_from_fork+0x116/0x1d0 [ 14.689019] ret_from_fork_asm+0x1a/0x30 [ 14.689499] [ 14.689600] The buggy address belongs to the object at ffff8881039c5a00 [ 14.689600] which belongs to the cache kmalloc-64 of size 64 [ 14.690392] The buggy address is located 0 bytes to the right of [ 14.690392] allocated 48-byte region [ffff8881039c5a00, ffff8881039c5a30) [ 14.691268] [ 14.691369] The buggy address belongs to the physical page: [ 14.691760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c5 [ 14.692119] flags: 0x200000000000000(node=0|zone=2) [ 14.692685] page_type: f5(slab) [ 14.693004] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.693469] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.693864] page dumped because: kasan: bad access detected [ 14.694109] [ 14.694260] Memory state around the buggy address: [ 14.694869] ffff8881039c5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.695362] ffff8881039c5980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.695965] >ffff8881039c5a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.696545] ^ [ 14.696886] ffff8881039c5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.697395] ffff8881039c5b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.697821] ==================================================================