Date
July 4, 2025, 11:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 20.746458] ================================================================== [ 20.746509] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 20.746897] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265 [ 20.747069] [ 20.747139] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.747246] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.747368] Hardware name: linux,dummy-virt (DT) [ 20.747444] Call trace: [ 20.747589] show_stack+0x20/0x38 (C) [ 20.747662] dump_stack_lvl+0x8c/0xd0 [ 20.747713] print_report+0x118/0x608 [ 20.747796] kasan_report+0xdc/0x128 [ 20.747857] kasan_check_range+0x100/0x1a8 [ 20.747910] __kasan_check_write+0x20/0x30 [ 20.747959] kasan_atomics_helper+0xe44/0x4858 [ 20.748165] kasan_atomics+0x198/0x2e0 [ 20.748295] kunit_try_run_case+0x170/0x3f0 [ 20.748606] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.748736] kthread+0x328/0x630 [ 20.748872] ret_from_fork+0x10/0x20 [ 20.748996] [ 20.749066] Allocated by task 265: [ 20.749240] kasan_save_stack+0x3c/0x68 [ 20.749405] kasan_save_track+0x20/0x40 [ 20.749467] kasan_save_alloc_info+0x40/0x58 [ 20.749511] __kasan_kmalloc+0xd4/0xd8 [ 20.749841] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.749948] kasan_atomics+0xb8/0x2e0 [ 20.750062] kunit_try_run_case+0x170/0x3f0 [ 20.750366] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.750504] kthread+0x328/0x630 [ 20.750590] ret_from_fork+0x10/0x20 [ 20.750629] [ 20.750651] The buggy address belongs to the object at fff00000c6f13780 [ 20.750651] which belongs to the cache kmalloc-64 of size 64 [ 20.750934] The buggy address is located 0 bytes to the right of [ 20.750934] allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0) [ 20.751219] [ 20.751269] The buggy address belongs to the physical page: [ 20.751489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13 [ 20.751793] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.751951] page_type: f5(slab) [ 20.752030] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.752081] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.752148] page dumped because: kasan: bad access detected [ 20.752180] [ 20.752200] Memory state around the buggy address: [ 20.752358] fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.752448] fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.752574] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.752630] ^ [ 20.752671] fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.752716] fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.752756] ================================================================== [ 20.758147] ================================================================== [ 20.758198] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 20.758403] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265 [ 20.758589] [ 20.758678] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.758878] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.759002] Hardware name: linux,dummy-virt (DT) [ 20.759206] Call trace: [ 20.759245] show_stack+0x20/0x38 (C) [ 20.759344] dump_stack_lvl+0x8c/0xd0 [ 20.759464] print_report+0x118/0x608 [ 20.759552] kasan_report+0xdc/0x128 [ 20.759629] kasan_check_range+0x100/0x1a8 [ 20.759680] __kasan_check_write+0x20/0x30 [ 20.759748] kasan_atomics_helper+0xeb8/0x4858 [ 20.759801] kasan_atomics+0x198/0x2e0 [ 20.760037] kunit_try_run_case+0x170/0x3f0 [ 20.760206] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.760283] kthread+0x328/0x630 [ 20.760375] ret_from_fork+0x10/0x20 [ 20.760730] [ 20.760857] Allocated by task 265: [ 20.760963] kasan_save_stack+0x3c/0x68 [ 20.761088] kasan_save_track+0x20/0x40 [ 20.761180] kasan_save_alloc_info+0x40/0x58 [ 20.761282] __kasan_kmalloc+0xd4/0xd8 [ 20.761369] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.761536] kasan_atomics+0xb8/0x2e0 [ 20.761660] kunit_try_run_case+0x170/0x3f0 [ 20.761722] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.761769] kthread+0x328/0x630 [ 20.762041] ret_from_fork+0x10/0x20 [ 20.762234] [ 20.762342] The buggy address belongs to the object at fff00000c6f13780 [ 20.762342] which belongs to the cache kmalloc-64 of size 64 [ 20.762595] The buggy address is located 0 bytes to the right of [ 20.762595] allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0) [ 20.762814] [ 20.762873] The buggy address belongs to the physical page: [ 20.763025] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13 [ 20.763081] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.763130] page_type: f5(slab) [ 20.763307] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.763477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.763614] page dumped because: kasan: bad access detected [ 20.763734] [ 20.764027] Memory state around the buggy address: [ 20.764170] fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.764266] fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.764399] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.764440] ^ [ 20.764474] fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.764541] fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.764582] ================================================================== [ 20.863578] ================================================================== [ 20.863720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 20.863780] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265 [ 20.863939] [ 20.863973] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.864266] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.864396] Hardware name: linux,dummy-virt (DT) [ 20.864467] Call trace: [ 20.864495] show_stack+0x20/0x38 (C) [ 20.864591] dump_stack_lvl+0x8c/0xd0 [ 20.864641] print_report+0x118/0x608 [ 20.864687] kasan_report+0xdc/0x128 [ 20.864772] kasan_check_range+0x100/0x1a8 [ 20.864833] __kasan_check_write+0x20/0x30 [ 20.864880] kasan_atomics_helper+0x14e4/0x4858 [ 20.864984] kasan_atomics+0x198/0x2e0 [ 20.865102] kunit_try_run_case+0x170/0x3f0 [ 20.865167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.865221] kthread+0x328/0x630 [ 20.865267] ret_from_fork+0x10/0x20 [ 20.865474] [ 20.865504] Allocated by task 265: [ 20.865537] kasan_save_stack+0x3c/0x68 [ 20.865584] kasan_save_track+0x20/0x40 [ 20.865623] kasan_save_alloc_info+0x40/0x58 [ 20.865665] __kasan_kmalloc+0xd4/0xd8 [ 20.865716] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.865756] kasan_atomics+0xb8/0x2e0 [ 20.865795] kunit_try_run_case+0x170/0x3f0 [ 20.866036] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.866102] kthread+0x328/0x630 [ 20.866198] ret_from_fork+0x10/0x20 [ 20.866238] [ 20.866259] The buggy address belongs to the object at fff00000c6f13780 [ 20.866259] which belongs to the cache kmalloc-64 of size 64 [ 20.866344] The buggy address is located 0 bytes to the right of [ 20.866344] allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0) [ 20.866410] [ 20.866431] The buggy address belongs to the physical page: [ 20.866589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13 [ 20.866769] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.866943] page_type: f5(slab) [ 20.867020] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.867811] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.867942] page dumped because: kasan: bad access detected [ 20.867977] [ 20.868013] Memory state around the buggy address: [ 20.868049] fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.868118] fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.868163] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.868220] ^ [ 20.868254] fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.868408] fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.868483] ================================================================== [ 20.872857] ================================================================== [ 20.873165] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 20.873289] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265 [ 20.873361] [ 20.873424] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.873530] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.873589] Hardware name: linux,dummy-virt (DT) [ 20.873683] Call trace: [ 20.873788] show_stack+0x20/0x38 (C) [ 20.873876] dump_stack_lvl+0x8c/0xd0 [ 20.873952] print_report+0x118/0x608 [ 20.874001] kasan_report+0xdc/0x128 [ 20.874053] kasan_check_range+0x100/0x1a8 [ 20.874108] __kasan_check_write+0x20/0x30 [ 20.874210] kasan_atomics_helper+0x15b4/0x4858 [ 20.874299] kasan_atomics+0x198/0x2e0 [ 20.874364] kunit_try_run_case+0x170/0x3f0 [ 20.874469] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.874524] kthread+0x328/0x630 [ 20.874570] ret_from_fork+0x10/0x20 [ 20.874749] [ 20.874770] Allocated by task 265: [ 20.874941] kasan_save_stack+0x3c/0x68 [ 20.875241] kasan_save_track+0x20/0x40 [ 20.875551] kasan_save_alloc_info+0x40/0x58 [ 20.875722] __kasan_kmalloc+0xd4/0xd8 [ 20.875888] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.876009] kasan_atomics+0xb8/0x2e0 [ 20.876097] kunit_try_run_case+0x170/0x3f0 [ 20.876186] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.876231] kthread+0x328/0x630 [ 20.876266] ret_from_fork+0x10/0x20 [ 20.876305] [ 20.876326] The buggy address belongs to the object at fff00000c6f13780 [ 20.876326] which belongs to the cache kmalloc-64 of size 64 [ 20.876718] The buggy address is located 0 bytes to the right of [ 20.876718] allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0) [ 20.876964] [ 20.877152] The buggy address belongs to the physical page: [ 20.877362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13 [ 20.877424] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.877665] page_type: f5(slab) [ 20.877722] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.877909] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.878031] page dumped because: kasan: bad access detected [ 20.878369] [ 20.878481] Memory state around the buggy address: [ 20.878567] fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.878677] fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.878771] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.878823] ^ [ 20.878857] fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.879166] fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.879377] ================================================================== [ 20.838182] ================================================================== [ 20.838236] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 20.838286] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265 [ 20.838338] [ 20.838368] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.838458] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.838485] Hardware name: linux,dummy-virt (DT) [ 20.838518] Call trace: [ 20.838541] show_stack+0x20/0x38 (C) [ 20.838591] dump_stack_lvl+0x8c/0xd0 [ 20.838638] print_report+0x118/0x608 [ 20.838686] kasan_report+0xdc/0x128 [ 20.838732] kasan_check_range+0x100/0x1a8 [ 20.838782] __kasan_check_write+0x20/0x30 [ 20.838847] kasan_atomics_helper+0x12d8/0x4858 [ 20.838896] kasan_atomics+0x198/0x2e0 [ 20.838975] kunit_try_run_case+0x170/0x3f0 [ 20.839332] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.839407] kthread+0x328/0x630 [ 20.839567] ret_from_fork+0x10/0x20 [ 20.839728] [ 20.839874] Allocated by task 265: [ 20.839976] kasan_save_stack+0x3c/0x68 [ 20.840071] kasan_save_track+0x20/0x40 [ 20.840176] kasan_save_alloc_info+0x40/0x58 [ 20.840251] __kasan_kmalloc+0xd4/0xd8 [ 20.840290] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.840357] kasan_atomics+0xb8/0x2e0 [ 20.840396] kunit_try_run_case+0x170/0x3f0 [ 20.840438] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.840526] kthread+0x328/0x630 [ 20.840562] ret_from_fork+0x10/0x20 [ 20.840774] [ 20.840873] The buggy address belongs to the object at fff00000c6f13780 [ 20.840873] which belongs to the cache kmalloc-64 of size 64 [ 20.841303] The buggy address is located 0 bytes to the right of [ 20.841303] allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0) [ 20.841486] [ 20.841558] The buggy address belongs to the physical page: [ 20.841608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13 [ 20.841693] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.841745] page_type: f5(slab) [ 20.841783] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.842033] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.842165] page dumped because: kasan: bad access detected [ 20.842214] [ 20.842235] Memory state around the buggy address: [ 20.842298] fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.842374] fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.842419] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.842459] ^ [ 20.842777] fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.842943] fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.843049] ================================================================== [ 20.713656] ================================================================== [ 20.713709] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 20.713761] Write of size 4 at addr fff00000c6f137b0 by task kunit_try_catch/265 [ 20.713822] [ 20.713853] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.713934] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.713963] Hardware name: linux,dummy-virt (DT) [ 20.714030] Call trace: [ 20.714058] show_stack+0x20/0x38 (C) [ 20.714127] dump_stack_lvl+0x8c/0xd0 [ 20.714185] print_report+0x118/0x608 [ 20.714242] kasan_report+0xdc/0x128 [ 20.714288] kasan_check_range+0x100/0x1a8 [ 20.714339] __kasan_check_write+0x20/0x30 [ 20.714385] kasan_atomics_helper+0xd3c/0x4858 [ 20.714434] kasan_atomics+0x198/0x2e0 [ 20.714488] kunit_try_run_case+0x170/0x3f0 [ 20.714538] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.714592] kthread+0x328/0x630 [ 20.714635] ret_from_fork+0x10/0x20 [ 20.714691] [ 20.714714] Allocated by task 265: [ 20.714745] kasan_save_stack+0x3c/0x68 [ 20.714788] kasan_save_track+0x20/0x40 [ 20.714838] kasan_save_alloc_info+0x40/0x58 [ 20.714881] __kasan_kmalloc+0xd4/0xd8 [ 20.715826] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.716113] kasan_atomics+0xb8/0x2e0 [ 20.716170] kunit_try_run_case+0x170/0x3f0 [ 20.716338] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.716617] kthread+0x328/0x630 [ 20.716972] ret_from_fork+0x10/0x20 [ 20.717059] [ 20.717235] The buggy address belongs to the object at fff00000c6f13780 [ 20.717235] which belongs to the cache kmalloc-64 of size 64 [ 20.717654] The buggy address is located 0 bytes to the right of [ 20.717654] allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0) [ 20.717982] [ 20.718055] The buggy address belongs to the physical page: [ 20.718254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13 [ 20.718654] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.718735] page_type: f5(slab) [ 20.718881] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.719545] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.719615] page dumped because: kasan: bad access detected [ 20.719669] [ 20.719690] Memory state around the buggy address: [ 20.720354] fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.720420] fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.720511] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.720789] ^ [ 20.720897] fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.721231] fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.721460] ================================================================== [ 20.847527] ================================================================== [ 20.847580] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 20.847649] Read of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265 [ 20.847738] [ 20.847798] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.847907] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.848005] Hardware name: linux,dummy-virt (DT) [ 20.848043] Call trace: [ 20.848070] show_stack+0x20/0x38 (C) [ 20.848256] dump_stack_lvl+0x8c/0xd0 [ 20.848392] print_report+0x118/0x608 [ 20.848516] kasan_report+0xdc/0x128 [ 20.848587] __asan_report_load8_noabort+0x20/0x30 [ 20.848654] kasan_atomics_helper+0x3f04/0x4858 [ 20.848720] kasan_atomics+0x198/0x2e0 [ 20.848856] kunit_try_run_case+0x170/0x3f0 [ 20.848909] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.848969] kthread+0x328/0x630 [ 20.849044] ret_from_fork+0x10/0x20 [ 20.849114] [ 20.849134] Allocated by task 265: [ 20.849165] kasan_save_stack+0x3c/0x68 [ 20.849228] kasan_save_track+0x20/0x40 [ 20.849269] kasan_save_alloc_info+0x40/0x58 [ 20.849312] __kasan_kmalloc+0xd4/0xd8 [ 20.849374] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.849415] kasan_atomics+0xb8/0x2e0 [ 20.849451] kunit_try_run_case+0x170/0x3f0 [ 20.849598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.849651] kthread+0x328/0x630 [ 20.849721] ret_from_fork+0x10/0x20 [ 20.849845] [ 20.849889] The buggy address belongs to the object at fff00000c6f13780 [ 20.849889] which belongs to the cache kmalloc-64 of size 64 [ 20.850124] The buggy address is located 0 bytes to the right of [ 20.850124] allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0) [ 20.850201] [ 20.850222] The buggy address belongs to the physical page: [ 20.850254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13 [ 20.850403] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.850577] page_type: f5(slab) [ 20.850620] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.850673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.850774] page dumped because: kasan: bad access detected [ 20.850849] [ 20.851005] Memory state around the buggy address: [ 20.851154] fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.851334] fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.851467] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.851508] ^ [ 20.851566] fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.851609] fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.851648] ================================================================== [ 20.892168] ================================================================== [ 20.892225] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 20.892271] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265 [ 20.892320] [ 20.892349] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.892430] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.892459] Hardware name: linux,dummy-virt (DT) [ 20.892962] Call trace: [ 20.893047] show_stack+0x20/0x38 (C) [ 20.893298] dump_stack_lvl+0x8c/0xd0 [ 20.893459] print_report+0x118/0x608 [ 20.893549] kasan_report+0xdc/0x128 [ 20.893642] kasan_check_range+0x100/0x1a8 [ 20.893821] __kasan_check_write+0x20/0x30 [ 20.893899] kasan_atomics_helper+0x16d0/0x4858 [ 20.893949] kasan_atomics+0x198/0x2e0 [ 20.893995] kunit_try_run_case+0x170/0x3f0 [ 20.894043] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.894330] kthread+0x328/0x630 [ 20.894448] ret_from_fork+0x10/0x20 [ 20.894892] [ 20.894944] Allocated by task 265: [ 20.894976] kasan_save_stack+0x3c/0x68 [ 20.895067] kasan_save_track+0x20/0x40 [ 20.895140] kasan_save_alloc_info+0x40/0x58 [ 20.895251] __kasan_kmalloc+0xd4/0xd8 [ 20.895328] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.895434] kasan_atomics+0xb8/0x2e0 [ 20.895523] kunit_try_run_case+0x170/0x3f0 [ 20.895618] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.895692] kthread+0x328/0x630 [ 20.895725] ret_from_fork+0x10/0x20 [ 20.895762] [ 20.895782] The buggy address belongs to the object at fff00000c6f13780 [ 20.895782] which belongs to the cache kmalloc-64 of size 64 [ 20.895871] The buggy address is located 0 bytes to the right of [ 20.895871] allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0) [ 20.896035] [ 20.896058] The buggy address belongs to the physical page: [ 20.896091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13 [ 20.896212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.896379] page_type: f5(slab) [ 20.896484] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.896561] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.896679] page dumped because: kasan: bad access detected [ 20.896714] [ 20.896733] Memory state around the buggy address: [ 20.896768] fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.896977] fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.897070] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.897183] ^ [ 20.897298] fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.897344] fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.897384] ================================================================== [ 20.898390] ================================================================== [ 20.898440] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 20.898768] Read of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265 [ 20.898911] [ 20.898944] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.899032] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.899079] Hardware name: linux,dummy-virt (DT) [ 20.899147] Call trace: [ 20.899192] show_stack+0x20/0x38 (C) [ 20.899340] dump_stack_lvl+0x8c/0xd0 [ 20.899390] print_report+0x118/0x608 [ 20.899462] kasan_report+0xdc/0x128 [ 20.899510] __asan_report_load8_noabort+0x20/0x30 [ 20.899878] kasan_atomics_helper+0x3e10/0x4858 [ 20.900073] kasan_atomics+0x198/0x2e0 [ 20.900174] kunit_try_run_case+0x170/0x3f0 [ 20.900392] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.900650] kthread+0x328/0x630 [ 20.900884] ret_from_fork+0x10/0x20 [ 20.901107] [ 20.901260] Allocated by task 265: [ 20.901293] kasan_save_stack+0x3c/0x68 [ 20.901335] kasan_save_track+0x20/0x40 [ 20.901404] kasan_save_alloc_info+0x40/0x58 [ 20.901796] __kasan_kmalloc+0xd4/0xd8 [ 20.902070] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.902296] kasan_atomics+0xb8/0x2e0 [ 20.902441] kunit_try_run_case+0x170/0x3f0 [ 20.902556] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.902739] kthread+0x328/0x630 [ 20.902941] ret_from_fork+0x10/0x20 [ 20.903032] [ 20.903064] The buggy address belongs to the object at fff00000c6f13780 [ 20.903064] which belongs to the cache kmalloc-64 of size 64 [ 20.903146] The buggy address is located 0 bytes to the right of [ 20.903146] allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0) [ 20.903215] [ 20.903236] The buggy address belongs to the physical page: [ 20.903269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13 [ 20.903325] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.903376] page_type: f5(slab) [ 20.903523] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.903625] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.903797] page dumped because: kasan: bad access detected [ 20.903874] [ 20.903894] Memory state around the buggy address: [ 20.903933] fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.903979] fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.904171] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.904289] ^ [ 20.904413] fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.904509] fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.904611] ================================================================== [ 20.635705] ================================================================== [ 20.635746] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 20.635818] Write of size 4 at addr fff00000c6f137b0 by task kunit_try_catch/265 [ 20.635869] [ 20.635902] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.636159] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.636438] Hardware name: linux,dummy-virt (DT) [ 20.636495] Call trace: [ 20.636520] show_stack+0x20/0x38 (C) [ 20.636573] dump_stack_lvl+0x8c/0xd0 [ 20.636620] print_report+0x118/0x608 [ 20.636971] kasan_report+0xdc/0x128 [ 20.637043] kasan_check_range+0x100/0x1a8 [ 20.637096] __kasan_check_write+0x20/0x30 [ 20.637221] kasan_atomics_helper+0xa6c/0x4858 [ 20.637273] kasan_atomics+0x198/0x2e0 [ 20.638402] kasan_save_alloc_info+0x40/0x58 [ 20.638443] __kasan_kmalloc+0xd4/0xd8 [ 20.638482] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.638713] kasan_atomics+0xb8/0x2e0 [ 20.638815] kunit_try_run_case+0x170/0x3f0 [ 20.638888] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.638944] kthread+0x328/0x630 [ 20.639006] ret_from_fork+0x10/0x20 [ 20.639323] [ 20.640487] [ 20.641296] fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.642994] [ 20.643817] kasan_atomics_helper+0xad4/0x4858 [ 20.645469] kasan_save_alloc_info+0x40/0x58 [ 20.645613] __kasan_kmalloc+0xd4/0xd8 [ 20.645666] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.645965] kasan_atomics+0xb8/0x2e0 [ 20.646070] kunit_try_run_case+0x170/0x3f0 [ 20.646112] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.646276] The buggy address belongs to the object at fff00000c6f13780 [ 20.646276] which belongs to the cache kmalloc-64 of size 64 [ 20.648430] fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.650136] kasan_atomics_helper+0x3dcc/0x4858 [ 20.651741] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.653991] The buggy address belongs to the physical page: [ 20.655249] [ 20.655969] ^ [ 20.657932] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.658775] kasan_save_stack+0x3c/0x68 [ 20.661061] [ 20.661955] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.664172] fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.666683] show_stack+0x20/0x38 (C) [ 20.669397] kasan_save_stack+0x3c/0x68 [ 20.672230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.672687] ^ [ 20.679080] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.679440] kunit_try_run_case+0x170/0x3f0 [ 20.681483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.682708] fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.683239] ^ [ 20.685202] Read of size 4 at addr fff00000c6f137b0 by task kunit_try_catch/265 [ 20.685508] Hardware name: linux,dummy-virt (DT) [ 20.686536] kasan_atomics_helper+0x3de4/0x4858 [ 20.688244] kasan_save_track+0x20/0x40 [ 20.689521] kthread+0x328/0x630 [ 20.689793] [ 20.690343] [ 20.690761] The buggy address belongs to the physical page: [ 20.690930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13 [ 20.691862] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.692638] fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.692873] ^ [ 20.693262] fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.695253] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.696235] print_report+0x118/0x608 [ 20.697254] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.699007] __kasan_kmalloc+0xd4/0xd8 [ 20.700508] ret_from_fork+0x10/0x20 [ 20.700667] [ 20.700693] The buggy address belongs to the object at fff00000c6f13780 [ 20.700693] which belongs to the cache kmalloc-64 of size 64 [ 20.700791] The buggy address is located 0 bytes to the right of [ 20.700791] allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0) [ 20.700891] [ 20.700922] The buggy address belongs to the physical page: [ 20.700964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13 [ 20.701027] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.701076] page_type: f5(slab) [ 20.701114] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.701165] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.701207] page dumped because: kasan: bad access detected [ 20.701250] [ 20.701281] Memory state around the buggy address: [ 20.701314] fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.701364] fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.701417] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.701461] ^ [ 20.701496] fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.701545] fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.701586] ================================================================== [ 20.722281] ================================================================== [ 20.722430] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 20.722536] Read of size 4 at addr fff00000c6f137b0 by task kunit_try_catch/265 [ 20.722589] [ 20.722703] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.723036] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.723222] Hardware name: linux,dummy-virt (DT) [ 20.723289] Call trace: [ 20.723443] show_stack+0x20/0x38 (C) [ 20.723647] dump_stack_lvl+0x8c/0xd0 [ 20.723799] print_report+0x118/0x608 [ 20.723949] kasan_report+0xdc/0x128 [ 20.724123] __asan_report_load4_noabort+0x20/0x30 [ 20.724268] kasan_atomics_helper+0x3e04/0x4858 [ 20.724421] kasan_atomics+0x198/0x2e0 [ 20.725223] kunit_try_run_case+0x170/0x3f0 [ 20.725311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.725393] kthread+0x328/0x630 [ 20.725476] ret_from_fork+0x10/0x20 [ 20.725549] [ 20.725571] Allocated by task 265: [ 20.726028] kasan_save_stack+0x3c/0x68 [ 20.726391] kasan_save_track+0x20/0x40 [ 20.726433] kasan_save_alloc_info+0x40/0x58 [ 20.726476] __kasan_kmalloc+0xd4/0xd8 [ 20.726703] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.727167] kasan_atomics+0xb8/0x2e0 [ 20.727238] kunit_try_run_case+0x170/0x3f0 [ 20.727421] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.727538] kthread+0x328/0x630 [ 20.727573] ret_from_fork+0x10/0x20 [ 20.727611] [ 20.728355] The buggy address belongs to the object at fff00000c6f13780 [ 20.728355] which belongs to the cache kmalloc-64 of size 64 [ 20.728446] The buggy address is located 0 bytes to the right of [ 20.728446] allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0) [ 20.728860] [ 20.729007] The buggy address belongs to the physical page: [ 20.729285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13 [ 20.729362] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.729770] page_type: f5(slab) [ 20.729863] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.730195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.730379] page dumped because: kasan: bad access detected [ 20.730507] [ 20.730539] Memory state around the buggy address: [ 20.730595] fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.730652] fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.730705] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.730752] ^ [ 20.730788] fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.730843] fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.730895] ================================================================== [ 20.790593] ================================================================== [ 20.790687] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 20.790827] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265 [ 20.790890] [ 20.790951] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.791464] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.791678] Hardware name: linux,dummy-virt (DT) [ 20.791761] Call trace: [ 20.791882] show_stack+0x20/0x38 (C) [ 20.791990] dump_stack_lvl+0x8c/0xd0 [ 20.792044] print_report+0x118/0x608 [ 20.792116] kasan_report+0xdc/0x128 [ 20.792485] kasan_check_range+0x100/0x1a8 [ 20.792747] __kasan_check_write+0x20/0x30 [ 20.792896] kasan_atomics_helper+0x1058/0x4858 [ 20.793304] kasan_atomics+0x198/0x2e0 [ 20.793505] kunit_try_run_case+0x170/0x3f0 [ 20.794003] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.794272] kthread+0x328/0x630 [ 20.794413] ret_from_fork+0x10/0x20 [ 20.794585] [ 20.794609] Allocated by task 265: [ 20.794638] kasan_save_stack+0x3c/0x68 [ 20.795079] kasan_save_track+0x20/0x40 [ 20.795342] kasan_save_alloc_info+0x40/0x58 [ 20.795569] __kasan_kmalloc+0xd4/0xd8 [ 20.795696] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.796061] kasan_atomics+0xb8/0x2e0 [ 20.796101] kunit_try_run_case+0x170/0x3f0 [ 20.796140] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.796185] kthread+0x328/0x630 [ 20.796667] ret_from_fork+0x10/0x20 [ 20.796765] [ 20.797055] The buggy address belongs to the object at fff00000c6f13780 [ 20.797055] which belongs to the cache kmalloc-64 of size 64 [ 20.797246] The buggy address is located 0 bytes to the right of [ 20.797246] allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0) [ 20.797463] [ 20.797521] The buggy address belongs to the physical page: [ 20.797887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13 [ 20.798086] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.798168] page_type: f5(slab) [ 20.798211] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.798651] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.799100] page dumped because: kasan: bad access detected [ 20.799276] [ 20.799337] Memory state around the buggy address: [ 20.799756] fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.799957] fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.800175] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.800360] ^ [ 20.800417] fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.800569] fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.800777] ================================================================== [ 20.616122] ================================================================== [ 20.616175] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 20.616568] Read of size 4 at addr fff00000c6f137b0 by task kunit_try_catch/265 [ 20.616699] [ 20.616733] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.616919] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.616976] Hardware name: linux,dummy-virt (DT) [ 20.617011] Call trace: [ 20.617088] show_stack+0x20/0x38 (C) [ 20.617142] dump_stack_lvl+0x8c/0xd0 [ 20.617212] print_report+0x118/0x608 [ 20.617265] kasan_report+0xdc/0x128 [ 20.617349] __asan_report_load4_noabort+0x20/0x30 [ 20.617694] kasan_atomics_helper+0x42d8/0x4858 [ 20.617821] kasan_atomics+0x198/0x2e0 [ 20.617917] kunit_try_run_case+0x170/0x3f0 [ 20.617966] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.618021] kthread+0x328/0x630 [ 20.618105] ret_from_fork+0x10/0x20 [ 20.618155] [ 20.618193] Allocated by task 265: [ 20.618389] kasan_save_stack+0x3c/0x68 [ 20.618443] kasan_save_track+0x20/0x40 [ 20.618627] kasan_save_alloc_info+0x40/0x58 [ 20.618679] __kasan_kmalloc+0xd4/0xd8 [ 20.618726] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.618768] kasan_atomics+0xb8/0x2e0 [ 20.618920] kunit_try_run_case+0x170/0x3f0 [ 20.619108] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.619245] kthread+0x328/0x630 [ 20.619571] ret_from_fork+0x10/0x20 [ 20.619686] [ 20.619816] The buggy address belongs to the object at fff00000c6f13780 [ 20.619816] which belongs to the cache kmalloc-64 of size 64 [ 20.619922] The buggy address is located 0 bytes to the right of [ 20.619922] allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0) [ 20.620000] [ 20.620023] The buggy address belongs to the physical page: [ 20.620097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13 [ 20.620168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.620217] page_type: f5(slab) [ 20.620255] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.620308] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.620434] fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.621777] [ 20.622020] Hardware name: linux,dummy-virt (DT) [ 20.622076] show_stack+0x20/0x38 (C) [ 20.622127] dump_stack_lvl+0x8c/0xd0 [ 20.622175] print_report+0x118/0x608 [ 20.622233] kasan_report+0xdc/0x128 [ 20.622288] kasan_check_range+0x100/0x1a8 [ 20.622338] __kasan_check_write+0x20/0x30 [ 20.622391] kasan_atomics_helper+0x934/0x4858 [ 20.622443] kasan_atomics+0x198/0x2e0 [ 20.622488] kunit_try_run_case+0x170/0x3f0 [ 20.622535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.622596] kthread+0x328/0x630 [ 20.622639] ret_from_fork+0x10/0x20 [ 20.622686] [ 20.622707] Allocated by task 265: [ 20.622734] kasan_save_stack+0x3c/0x68 [ 20.622775] kasan_save_track+0x20/0x40 [ 20.623119] kasan_save_alloc_info+0x40/0x58 [ 20.623324] __kasan_kmalloc+0xd4/0xd8 [ 20.623368] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.623408] kasan_atomics+0xb8/0x2e0 [ 20.623638] kunit_try_run_case+0x170/0x3f0 [ 20.623786] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.623935] kthread+0x328/0x630 [ 20.623970] ret_from_fork+0x10/0x20 [ 20.624031] [ 20.624161] The buggy address belongs to the object at fff00000c6f13780 [ 20.624161] which belongs to the cache kmalloc-64 of size 64 [ 20.624350] The buggy address is located 0 bytes to the right of [ 20.624350] allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0) [ 20.624740] [ 20.624774] The buggy address belongs to the physical page: [ 20.624880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13 [ 20.625040] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.625178] page_type: f5(slab) [ 20.625307] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.625420] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.625567] page dumped because: kasan: bad access detected [ 20.625676] [ 20.625783] Memory state around the buggy address: [ 20.625895] fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.625968] fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.626013] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.626066] ^ [ 20.626106] fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.626150] fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.626191] ================================================================== [ 20.934714] ================================================================== [ 20.934931] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 20.935547] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265 [ 20.935626] [ 20.935662] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.936304] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.936702] Hardware name: linux,dummy-virt (DT) [ 20.936837] Call trace: [ 20.937139] show_stack+0x20/0x38 (C) [ 20.937645] dump_stack_lvl+0x8c/0xd0 [ 20.938547] print_report+0x118/0x608 [ 20.939288] kasan_report+0xdc/0x128 [ 20.939520] kasan_check_range+0x100/0x1a8 [ 20.939604] __kasan_check_write+0x20/0x30 [ 20.939651] kasan_atomics_helper+0x17ec/0x4858 [ 20.939701] kasan_atomics+0x198/0x2e0 [ 20.939746] kunit_try_run_case+0x170/0x3f0 [ 20.939796] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.941095] kthread+0x328/0x630 [ 20.941426] ret_from_fork+0x10/0x20 [ 20.941518] [ 20.942015] Allocated by task 265: [ 20.942140] kasan_save_stack+0x3c/0x68 [ 20.942725] kasan_save_track+0x20/0x40 [ 20.942896] kasan_save_alloc_info+0x40/0x58 [ 20.942942] __kasan_kmalloc+0xd4/0xd8 [ 20.943546] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.943599] kasan_atomics+0xb8/0x2e0 [ 20.944668] kunit_try_run_case+0x170/0x3f0 [ 20.945137] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.945568] kthread+0x328/0x630 [ 20.945642] ret_from_fork+0x10/0x20 [ 20.945682] [ 20.945704] The buggy address belongs to the object at fff00000c6f13780 [ 20.945704] which belongs to the cache kmalloc-64 of size 64 [ 20.946938] The buggy address is located 0 bytes to the right of [ 20.946938] allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0) [ 20.947173] [ 20.947196] The buggy address belongs to the physical page: [ 20.947231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13 [ 20.947976] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.948186] page_type: f5(slab) [ 20.948230] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.949193] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.949651] page dumped because: kasan: bad access detected [ 20.950499] [ 20.950902] Memory state around the buggy address: [ 20.951022] fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.951085] fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.951721] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.952414] ^ [ 20.952613] fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.952672] fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.953401] ================================================================== [ 20.825563] ================================================================== [ 20.825768] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 20.825931] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265 [ 20.826156] [ 20.826265] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.826365] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.826456] Hardware name: linux,dummy-virt (DT) [ 20.826526] Call trace: [ 20.826551] show_stack+0x20/0x38 (C) [ 20.826603] dump_stack_lvl+0x8c/0xd0 [ 20.826980] print_report+0x118/0x608 [ 20.827396] kasan_report+0xdc/0x128 [ 20.827546] kasan_check_range+0x100/0x1a8 [ 20.827695] __kasan_check_write+0x20/0x30 [ 20.827800] kasan_atomics_helper+0x11f8/0x4858 [ 20.827934] kasan_atomics+0x198/0x2e0 [ 20.828106] kunit_try_run_case+0x170/0x3f0 [ 20.828164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.828217] kthread+0x328/0x630 [ 20.828264] ret_from_fork+0x10/0x20 [ 20.828311] [ 20.828355] Allocated by task 265: [ 20.828386] kasan_save_stack+0x3c/0x68 [ 20.828428] kasan_save_track+0x20/0x40 [ 20.828664] kasan_save_alloc_info+0x40/0x58 [ 20.828812] __kasan_kmalloc+0xd4/0xd8 [ 20.828915] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.829233] kasan_atomics+0xb8/0x2e0 [ 20.829317] kunit_try_run_case+0x170/0x3f0 [ 20.829444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.829568] kthread+0x328/0x630 [ 20.829684] ret_from_fork+0x10/0x20 [ 20.829838] [ 20.829940] The buggy address belongs to the object at fff00000c6f13780 [ 20.829940] which belongs to the cache kmalloc-64 of size 64 [ 20.830003] The buggy address is located 0 bytes to the right of [ 20.830003] allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0) [ 20.830361] [ 20.830410] The buggy address belongs to the physical page: [ 20.830452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13 [ 20.830506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.830555] page_type: f5(slab) [ 20.830604] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.830658] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.830699] page dumped because: kasan: bad access detected [ 20.830743] [ 20.830772] Memory state around the buggy address: [ 20.830824] fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.830868] fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.830912] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.831191] ^ [ 20.831282] fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.831325] fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.831551] ================================================================== [ 20.702602] ================================================================== [ 20.702654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 20.702706] Read of size 4 at addr fff00000c6f137b0 by task kunit_try_catch/265 [ 20.702919] [ 20.702965] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.703218] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.703409] Hardware name: linux,dummy-virt (DT) [ 20.703736] Call trace: [ 20.703859] show_stack+0x20/0x38 (C) [ 20.704122] dump_stack_lvl+0x8c/0xd0 [ 20.704375] print_report+0x118/0x608 [ 20.704772] kasan_report+0xdc/0x128 [ 20.705006] __asan_report_load4_noabort+0x20/0x30 [ 20.705111] kasan_atomics_helper+0x3dd8/0x4858 [ 20.705543] kasan_atomics+0x198/0x2e0 [ 20.705636] kunit_try_run_case+0x170/0x3f0 [ 20.705841] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.706450] kthread+0x328/0x630 [ 20.706674] ret_from_fork+0x10/0x20 [ 20.706904] [ 20.707172] Allocated by task 265: [ 20.707349] kasan_save_stack+0x3c/0x68 [ 20.707449] kasan_save_track+0x20/0x40 [ 20.707506] kasan_save_alloc_info+0x40/0x58 [ 20.707680] __kasan_kmalloc+0xd4/0xd8 [ 20.707722] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.707763] kasan_atomics+0xb8/0x2e0 [ 20.708325] kunit_try_run_case+0x170/0x3f0 [ 20.708491] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.708571] kthread+0x328/0x630 [ 20.708608] ret_from_fork+0x10/0x20 [ 20.708962] [ 20.709311] The buggy address belongs to the object at fff00000c6f13780 [ 20.709311] which belongs to the cache kmalloc-64 of size 64 [ 20.709748] The buggy address is located 0 bytes to the right of [ 20.709748] allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0) [ 20.709892] [ 20.710212] The buggy address belongs to the physical page: [ 20.710329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13 [ 20.710594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.711119] page_type: f5(slab) [ 20.711335] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.711458] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.711637] page dumped because: kasan: bad access detected [ 20.711801] [ 20.712005] Memory state around the buggy address: [ 20.712133] fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.712356] fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.712438] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.712476] ^ [ 20.712512] fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.712557] fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.712887] ================================================================== [ 20.916107] ================================================================== [ 20.916283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 20.916709] Read of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265 [ 20.916843] [ 20.917515] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.918594] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.918707] Hardware name: linux,dummy-virt (DT) [ 20.918743] Call trace: [ 20.918766] show_stack+0x20/0x38 (C) [ 20.919061] dump_stack_lvl+0x8c/0xd0 [ 20.919275] print_report+0x118/0x608 [ 20.919327] kasan_report+0xdc/0x128 [ 20.919374] __asan_report_load8_noabort+0x20/0x30 [ 20.919423] kasan_atomics_helper+0x3e20/0x4858 [ 20.919473] kasan_atomics+0x198/0x2e0 [ 20.919520] kunit_try_run_case+0x170/0x3f0 [ 20.920954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.921604] kthread+0x328/0x630 [ 20.921742] ret_from_fork+0x10/0x20 [ 20.922320] [ 20.922987] Allocated by task 265: [ 20.923154] kasan_save_stack+0x3c/0x68 [ 20.923204] kasan_save_track+0x20/0x40 [ 20.923244] kasan_save_alloc_info+0x40/0x58 [ 20.923287] __kasan_kmalloc+0xd4/0xd8 [ 20.923326] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.923365] kasan_atomics+0xb8/0x2e0 [ 20.923404] kunit_try_run_case+0x170/0x3f0 [ 20.923442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.923487] kthread+0x328/0x630 [ 20.923520] ret_from_fork+0x10/0x20 [ 20.925155] [ 20.925578] The buggy address belongs to the object at fff00000c6f13780 [ 20.925578] which belongs to the cache kmalloc-64 of size 64 [ 20.926641] The buggy address is located 0 bytes to the right of [ 20.926641] allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0) [ 20.926930] [ 20.926960] The buggy address belongs to the physical page: [ 20.926993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13 [ 20.927051] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.927100] page_type: f5(slab) [ 20.927141] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.928473] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.928858] page dumped because: kasan: bad access detected [ 20.928900] [ 20.929794] Memory state around the buggy address: [ 20.929962] fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.930282] fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.930502] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.930769] ^ [ 20.931364] fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.931414] fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.932275] ================================================================== [ 20.809555] ================================================================== [ 20.809604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 20.809653] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265 [ 20.809704] [ 20.809735] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.809832] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.809861] Hardware name: linux,dummy-virt (DT) [ 20.809894] Call trace: [ 20.809918] show_stack+0x20/0x38 (C) [ 20.809966] dump_stack_lvl+0x8c/0xd0 [ 20.810013] print_report+0x118/0x608 [ 20.810061] kasan_report+0xdc/0x128 [ 20.810106] kasan_check_range+0x100/0x1a8 [ 20.810156] __kasan_check_write+0x20/0x30 [ 20.810200] kasan_atomics_helper+0x1128/0x4858 [ 20.810250] kasan_atomics+0x198/0x2e0 [ 20.810297] kunit_try_run_case+0x170/0x3f0 [ 20.810343] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.810396] kthread+0x328/0x630 [ 20.810438] ret_from_fork+0x10/0x20 [ 20.810486] [ 20.810506] Allocated by task 265: [ 20.811185] kasan_save_stack+0x3c/0x68 [ 20.811238] kasan_save_track+0x20/0x40 [ 20.811309] kasan_save_alloc_info+0x40/0x58 [ 20.811354] __kasan_kmalloc+0xd4/0xd8 [ 20.811392] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.811433] kasan_atomics+0xb8/0x2e0 [ 20.811470] kunit_try_run_case+0x170/0x3f0 [ 20.811510] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.811554] kthread+0x328/0x630 [ 20.811590] ret_from_fork+0x10/0x20 [ 20.811627] [ 20.811648] The buggy address belongs to the object at fff00000c6f13780 [ 20.811648] which belongs to the cache kmalloc-64 of size 64 [ 20.811707] The buggy address is located 0 bytes to the right of [ 20.811707] allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0) [ 20.811773] [ 20.811794] The buggy address belongs to the physical page: [ 20.811842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13 [ 20.811893] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.811947] page_type: f5(slab) [ 20.811987] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.812039] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.812081] page dumped because: kasan: bad access detected [ 20.812115] [ 20.813094] Memory state around the buggy address: [ 20.813140] fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.814211] fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.817122] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.817249] ^ [ 20.817350] fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.817435] fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.817673] ================================================================== [ 20.856362] ================================================================== [ 20.856420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 20.856626] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265 [ 20.856715] [ 20.856745] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.856839] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.856973] Hardware name: linux,dummy-virt (DT) [ 20.857150] Call trace: [ 20.857270] show_stack+0x20/0x38 (C) [ 20.857456] dump_stack_lvl+0x8c/0xd0 [ 20.857748] print_report+0x118/0x608 [ 20.857816] kasan_report+0xdc/0x128 [ 20.857865] kasan_check_range+0x100/0x1a8 [ 20.858102] __kasan_check_write+0x20/0x30 [ 20.858297] kasan_atomics_helper+0x147c/0x4858 [ 20.858611] kasan_atomics+0x198/0x2e0 [ 20.858749] kunit_try_run_case+0x170/0x3f0 [ 20.858898] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.859091] kthread+0x328/0x630 [ 20.859205] ret_from_fork+0x10/0x20 [ 20.859326] [ 20.859419] Allocated by task 265: [ 20.859491] kasan_save_stack+0x3c/0x68 [ 20.859534] kasan_save_track+0x20/0x40 [ 20.859597] kasan_save_alloc_info+0x40/0x58 [ 20.859639] __kasan_kmalloc+0xd4/0xd8 [ 20.859678] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.859718] kasan_atomics+0xb8/0x2e0 [ 20.860058] kunit_try_run_case+0x170/0x3f0 [ 20.860159] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.860256] kthread+0x328/0x630 [ 20.860335] ret_from_fork+0x10/0x20 [ 20.860425] [ 20.860649] The buggy address belongs to the object at fff00000c6f13780 [ 20.860649] which belongs to the cache kmalloc-64 of size 64 [ 20.860714] The buggy address is located 0 bytes to the right of [ 20.860714] allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0) [ 20.860975] [ 20.861012] The buggy address belongs to the physical page: [ 20.861112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13 [ 20.861277] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.861576] page_type: f5(slab) [ 20.861659] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.861859] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.861921] page dumped because: kasan: bad access detected [ 20.861955] [ 20.861975] Memory state around the buggy address: [ 20.862122] fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.862383] fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.862469] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.862564] ^ [ 20.862916] fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.863060] fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.863174] ================================================================== [ 20.880119] ================================================================== [ 20.880167] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 20.880216] Read of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265 [ 20.880267] [ 20.880298] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.880376] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.880405] Hardware name: linux,dummy-virt (DT) [ 20.880436] Call trace: [ 20.880461] show_stack+0x20/0x38 (C) [ 20.880509] dump_stack_lvl+0x8c/0xd0 [ 20.880557] print_report+0x118/0x608 [ 20.880604] kasan_report+0xdc/0x128 [ 20.880651] __asan_report_load8_noabort+0x20/0x30 [ 20.880700] kasan_atomics_helper+0x3db0/0x4858 [ 20.880749] kasan_atomics+0x198/0x2e0 [ 20.880796] kunit_try_run_case+0x170/0x3f0 [ 20.880889] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.880963] kthread+0x328/0x630 [ 20.881064] ret_from_fork+0x10/0x20 [ 20.881141] [ 20.881185] Allocated by task 265: [ 20.881242] kasan_save_stack+0x3c/0x68 [ 20.881454] kasan_save_track+0x20/0x40 [ 20.881565] kasan_save_alloc_info+0x40/0x58 [ 20.881701] __kasan_kmalloc+0xd4/0xd8 [ 20.881797] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.881883] kasan_atomics+0xb8/0x2e0 [ 20.881948] kunit_try_run_case+0x170/0x3f0 [ 20.882026] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.882115] kthread+0x328/0x630 [ 20.882150] ret_from_fork+0x10/0x20 [ 20.882205] [ 20.882227] The buggy address belongs to the object at fff00000c6f13780 [ 20.882227] which belongs to the cache kmalloc-64 of size 64 [ 20.882288] The buggy address is located 0 bytes to the right of [ 20.882288] allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0) [ 20.882354] [ 20.882374] The buggy address belongs to the physical page: [ 20.882405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13 [ 20.882581] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.882722] page_type: f5(slab) [ 20.882857] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.882954] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.883096] page dumped because: kasan: bad access detected [ 20.883313] [ 20.883523] Memory state around the buggy address: [ 20.883591] fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.883696] fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.883813] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.883855] ^ [ 20.883896] fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.883942] fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.883982] ================================================================== [ 20.884223] ================================================================== [ 20.884418] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 20.884501] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265 [ 20.884554] [ 20.884602] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.884703] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.884842] Hardware name: linux,dummy-virt (DT) [ 20.884997] Call trace: [ 20.885097] show_stack+0x20/0x38 (C) [ 20.885212] dump_stack_lvl+0x8c/0xd0 [ 20.885278] print_report+0x118/0x608 [ 20.885333] kasan_report+0xdc/0x128 [ 20.885395] kasan_check_range+0x100/0x1a8 [ 20.885445] __kasan_check_write+0x20/0x30 [ 20.885598] kasan_atomics_helper+0x1644/0x4858 [ 20.885654] kasan_atomics+0x198/0x2e0 [ 20.885880] kunit_try_run_case+0x170/0x3f0 [ 20.885973] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.886029] kthread+0x328/0x630 [ 20.886154] ret_from_fork+0x10/0x20 [ 20.886227] [ 20.886304] Allocated by task 265: [ 20.886405] kasan_save_stack+0x3c/0x68 [ 20.886493] kasan_save_track+0x20/0x40 [ 20.886536] kasan_save_alloc_info+0x40/0x58 [ 20.886579] __kasan_kmalloc+0xd4/0xd8 [ 20.886627] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.886669] kasan_atomics+0xb8/0x2e0 [ 20.886705] kunit_try_run_case+0x170/0x3f0 [ 20.886754] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.886799] kthread+0x328/0x630 [ 20.886843] ret_from_fork+0x10/0x20 [ 20.886880] [ 20.886901] The buggy address belongs to the object at fff00000c6f13780 [ 20.886901] which belongs to the cache kmalloc-64 of size 64 [ 20.886999] The buggy address is located 0 bytes to the right of [ 20.886999] allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0) [ 20.887214] [ 20.887340] The buggy address belongs to the physical page: [ 20.887445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13 [ 20.887680] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.887983] page_type: f5(slab) [ 20.888075] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.888128] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.888170] page dumped because: kasan: bad access detected [ 20.888326] [ 20.888347] Memory state around the buggy address: [ 20.888382] fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.888594] fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.888726] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.888828] ^ [ 20.889146] fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.889248] fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.889289] ================================================================== [ 20.832111] ================================================================== [ 20.832166] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 20.832374] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265 [ 20.832435] [ 20.832543] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.832700] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.832848] Hardware name: linux,dummy-virt (DT) [ 20.832885] Call trace: [ 20.833059] show_stack+0x20/0x38 (C) [ 20.833163] dump_stack_lvl+0x8c/0xd0 [ 20.833261] print_report+0x118/0x608 [ 20.833311] kasan_report+0xdc/0x128 [ 20.833405] kasan_check_range+0x100/0x1a8 [ 20.833504] __kasan_check_write+0x20/0x30 [ 20.833567] kasan_atomics_helper+0x126c/0x4858 [ 20.833616] kasan_atomics+0x198/0x2e0 [ 20.833682] kunit_try_run_case+0x170/0x3f0 [ 20.833731] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.833977] kthread+0x328/0x630 [ 20.834087] ret_from_fork+0x10/0x20 [ 20.834426] [ 20.834486] Allocated by task 265: [ 20.834520] kasan_save_stack+0x3c/0x68 [ 20.834617] kasan_save_track+0x20/0x40 [ 20.834695] kasan_save_alloc_info+0x40/0x58 [ 20.834740] __kasan_kmalloc+0xd4/0xd8 [ 20.834777] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.834830] kasan_atomics+0xb8/0x2e0 [ 20.834867] kunit_try_run_case+0x170/0x3f0 [ 20.834908] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.834958] kthread+0x328/0x630 [ 20.834991] ret_from_fork+0x10/0x20 [ 20.835029] [ 20.835073] The buggy address belongs to the object at fff00000c6f13780 [ 20.835073] which belongs to the cache kmalloc-64 of size 64 [ 20.835135] The buggy address is located 0 bytes to the right of [ 20.835135] allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0) [ 20.835200] [ 20.835393] The buggy address belongs to the physical page: [ 20.835432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13 [ 20.835510] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.835560] page_type: f5(slab) [ 20.835598] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.835686] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.835836] page dumped because: kasan: bad access detected [ 20.835922] [ 20.836017] Memory state around the buggy address: [ 20.836102] fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.836199] fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.836662] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.836735] ^ [ 20.836771] fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.836946] fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.837150] ================================================================== [ 20.732119] ================================================================== [ 20.732172] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 20.732602] Read of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265 [ 20.732739] [ 20.732782] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.732875] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.733220] Hardware name: linux,dummy-virt (DT) [ 20.733455] Call trace: [ 20.733487] show_stack+0x20/0x38 (C) [ 20.733733] dump_stack_lvl+0x8c/0xd0 [ 20.733862] print_report+0x118/0x608 [ 20.733933] kasan_report+0xdc/0x128 [ 20.734002] kasan_check_range+0x100/0x1a8 [ 20.734052] __kasan_check_read+0x20/0x30 [ 20.734386] kasan_atomics_helper+0xdd4/0x4858 [ 20.734605] kasan_atomics+0x198/0x2e0 [ 20.734817] kunit_try_run_case+0x170/0x3f0 [ 20.734881] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.735001] kthread+0x328/0x630 [ 20.735123] ret_from_fork+0x10/0x20 [ 20.735238] [ 20.735260] Allocated by task 265: [ 20.735291] kasan_save_stack+0x3c/0x68 [ 20.735562] kasan_save_track+0x20/0x40 [ 20.735726] kasan_save_alloc_info+0x40/0x58 [ 20.735962] __kasan_kmalloc+0xd4/0xd8 [ 20.736150] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.736203] kasan_atomics+0xb8/0x2e0 [ 20.736242] kunit_try_run_case+0x170/0x3f0 [ 20.736543] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.736858] kthread+0x328/0x630 [ 20.737011] ret_from_fork+0x10/0x20 [ 20.737328] [ 20.737446] The buggy address belongs to the object at fff00000c6f13780 [ 20.737446] which belongs to the cache kmalloc-64 of size 64 [ 20.738055] The buggy address is located 0 bytes to the right of [ 20.738055] allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0) [ 20.738470] [ 20.738628] The buggy address belongs to the physical page: [ 20.738673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13 [ 20.738776] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.738844] page_type: f5(slab) [ 20.738892] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.739182] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.739394] page dumped because: kasan: bad access detected [ 20.739431] [ 20.739454] Memory state around the buggy address: [ 20.739650] fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.740068] fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.740298] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.740485] ^ [ 20.740606] fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.740652] fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.740705] ================================================================== [ 20.626588] ================================================================== [ 20.626639] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 20.626707] Write of size 4 at addr fff00000c6f137b0 by task kunit_try_catch/265 [ 20.626759] [ 20.626824] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.626929] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.627097] Hardware name: linux,dummy-virt (DT) [ 20.627352] Call trace: [ 20.627429] show_stack+0x20/0x38 (C) [ 20.627532] dump_stack_lvl+0x8c/0xd0 [ 20.627583] print_report+0x118/0x608 [ 20.627755] kasan_report+0xdc/0x128 [ 20.627815] kasan_check_range+0x100/0x1a8 [ 20.628019] __kasan_check_write+0x20/0x30 [ 20.628118] kasan_atomics_helper+0x99c/0x4858 [ 20.628278] kasan_atomics+0x198/0x2e0 [ 20.628383] kunit_try_run_case+0x170/0x3f0 [ 20.628720] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.628868] kthread+0x328/0x630 [ 20.629016] ret_from_fork+0x10/0x20 [ 20.629153] [ 20.629250] Allocated by task 265: [ 20.629390] kasan_save_stack+0x3c/0x68 [ 20.629515] kasan_save_track+0x20/0x40 [ 20.629556] kasan_save_alloc_info+0x40/0x58 [ 20.629839] __kasan_kmalloc+0xd4/0xd8 [ 20.629956] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.630020] kasan_atomics+0xb8/0x2e0 [ 20.630126] kunit_try_run_case+0x170/0x3f0 [ 20.630500] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.630651] kthread+0x328/0x630 [ 20.630698] ret_from_fork+0x10/0x20 [ 20.630737] [ 20.630765] The buggy address belongs to the object at fff00000c6f13780 [ 20.630765] which belongs to the cache kmalloc-64 of size 64 [ 20.630836] The buggy address is located 0 bytes to the right of [ 20.630836] allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0) [ 20.630899] [ 20.630940] The buggy address belongs to the physical page: [ 20.630972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13 [ 20.631024] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.631073] page_type: f5(slab) [ 20.631111] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.631162] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.631204] page dumped because: kasan: bad access detected [ 20.631238] [ 20.631258] Memory state around the buggy address: [ 20.631291] fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.631532] fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.631671] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.631818] ^ [ 20.632199] fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.632283] fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.633024] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 20.633976] __kasan_check_write+0x20/0x30 [ 20.634318] [ 20.634338] Allocated by task 265: [ 20.634377] kasan_save_stack+0x3c/0x68 [ 20.634418] kasan_save_track+0x20/0x40 [ 20.634467] kasan_save_alloc_info+0x40/0x58 [ 20.634508] __kasan_kmalloc+0xd4/0xd8 [ 20.634548] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.634588] kasan_atomics+0xb8/0x2e0 [ 20.634631] kunit_try_run_case+0x170/0x3f0 [ 20.634670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.634724] kthread+0x328/0x630 [ 20.634758] ret_from_fork+0x10/0x20 [ 20.634796] [ 20.634828] The buggy address belongs to the object at fff00000c6f13780 [ 20.634828] which belongs to the cache kmalloc-64 of size 64 [ 20.634885] The buggy address is located 0 bytes to the right of [ 20.634885] allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0) [ 20.634947] [ 20.634970] The buggy address belongs to the physical page: [ 20.635019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13 [ 20.635072] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.635118] page_type: f5(slab) [ 20.635155] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.635212] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.635255] page dumped because: kasan: bad access detected [ 20.635288] [ 20.635308] Memory state around the buggy address: [ 20.635346] fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.635394] fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.635438] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.635478] ^ [ 20.635512] fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.635555] fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.635595] ================================================================== [ 20.851869] ================================================================== [ 20.852236] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 20.852528] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265 [ 20.852675] [ 20.852753] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.852914] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.852971] Hardware name: linux,dummy-virt (DT) [ 20.853006] Call trace: [ 20.853051] show_stack+0x20/0x38 (C) [ 20.853105] dump_stack_lvl+0x8c/0xd0 [ 20.853151] print_report+0x118/0x608 [ 20.853219] kasan_report+0xdc/0x128 [ 20.853441] kasan_check_range+0x100/0x1a8 [ 20.853533] __kasan_check_write+0x20/0x30 [ 20.853652] kasan_atomics_helper+0x1414/0x4858 [ 20.853702] kasan_atomics+0x198/0x2e0 [ 20.853778] kunit_try_run_case+0x170/0x3f0 [ 20.854109] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.854177] kthread+0x328/0x630 [ 20.854263] ret_from_fork+0x10/0x20 [ 20.854317] [ 20.854366] Allocated by task 265: [ 20.854400] kasan_save_stack+0x3c/0x68 [ 20.854467] kasan_save_track+0x20/0x40 [ 20.854555] kasan_save_alloc_info+0x40/0x58 [ 20.854636] __kasan_kmalloc+0xd4/0xd8 [ 20.854702] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.854744] kasan_atomics+0xb8/0x2e0 [ 20.854781] kunit_try_run_case+0x170/0x3f0 [ 20.854834] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.854877] kthread+0x328/0x630 [ 20.854926] ret_from_fork+0x10/0x20 [ 20.854965] [ 20.854986] The buggy address belongs to the object at fff00000c6f13780 [ 20.854986] which belongs to the cache kmalloc-64 of size 64 [ 20.855045] The buggy address is located 0 bytes to the right of [ 20.855045] allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0) [ 20.855109] [ 20.855130] The buggy address belongs to the physical page: [ 20.855162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13 [ 20.855216] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.855264] page_type: f5(slab) [ 20.855302] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.855355] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.855398] page dumped because: kasan: bad access detected [ 20.855433] [ 20.855453] Memory state around the buggy address: [ 20.855486] fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.855531] fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.855575] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.855616] ^ [ 20.855649] fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.855692] fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.855730] ================================================================== [ 20.752970] ================================================================== [ 20.753019] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 20.753069] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265 [ 20.753119] [ 20.753150] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.753231] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.753259] Hardware name: linux,dummy-virt (DT) [ 20.753292] Call trace: [ 20.753340] show_stack+0x20/0x38 (C) [ 20.753391] dump_stack_lvl+0x8c/0xd0 [ 20.753448] print_report+0x118/0x608 [ 20.753506] kasan_report+0xdc/0x128 [ 20.753553] __asan_report_store8_noabort+0x20/0x30 [ 20.753603] kasan_atomics_helper+0x3e5c/0x4858 [ 20.753661] kasan_atomics+0x198/0x2e0 [ 20.753709] kunit_try_run_case+0x170/0x3f0 [ 20.753757] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.753824] kthread+0x328/0x630 [ 20.753867] ret_from_fork+0x10/0x20 [ 20.753916] [ 20.753936] Allocated by task 265: [ 20.753963] kasan_save_stack+0x3c/0x68 [ 20.754006] kasan_save_track+0x20/0x40 [ 20.754044] kasan_save_alloc_info+0x40/0x58 [ 20.754451] __kasan_kmalloc+0xd4/0xd8 [ 20.754606] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.754660] kasan_atomics+0xb8/0x2e0 [ 20.754849] kunit_try_run_case+0x170/0x3f0 [ 20.754901] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.755068] kthread+0x328/0x630 [ 20.755214] ret_from_fork+0x10/0x20 [ 20.755389] [ 20.755487] The buggy address belongs to the object at fff00000c6f13780 [ 20.755487] which belongs to the cache kmalloc-64 of size 64 [ 20.755547] The buggy address is located 0 bytes to the right of [ 20.755547] allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0) [ 20.755728] [ 20.755753] The buggy address belongs to the physical page: [ 20.755786] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13 [ 20.755852] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.755967] page_type: f5(slab) [ 20.756139] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.756216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.756350] page dumped because: kasan: bad access detected [ 20.756630] [ 20.756712] Memory state around the buggy address: [ 20.756813] fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.756917] fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.756990] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.757031] ^ [ 20.757066] fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.757109] fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.757285] ================================================================== [ 20.779131] ================================================================== [ 20.779439] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 20.780196] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265 [ 20.780300] [ 20.780506] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.780893] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.780986] Hardware name: linux,dummy-virt (DT) [ 20.781147] Call trace: [ 20.781254] show_stack+0x20/0x38 (C) [ 20.781329] dump_stack_lvl+0x8c/0xd0 [ 20.781657] print_report+0x118/0x608 [ 20.781781] kasan_report+0xdc/0x128 [ 20.782182] kasan_check_range+0x100/0x1a8 [ 20.782363] __kasan_check_write+0x20/0x30 [ 20.782514] kasan_atomics_helper+0xff0/0x4858 [ 20.782658] kasan_atomics+0x198/0x2e0 [ 20.782862] kunit_try_run_case+0x170/0x3f0 [ 20.783076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.783429] kthread+0x328/0x630 [ 20.783593] ret_from_fork+0x10/0x20 [ 20.783850] [ 20.783880] Allocated by task 265: [ 20.783916] kasan_save_stack+0x3c/0x68 [ 20.784275] kasan_save_track+0x20/0x40 [ 20.784362] kasan_save_alloc_info+0x40/0x58 [ 20.784670] __kasan_kmalloc+0xd4/0xd8 [ 20.784778] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.784891] kasan_atomics+0xb8/0x2e0 [ 20.785009] kunit_try_run_case+0x170/0x3f0 [ 20.785239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.785290] kthread+0x328/0x630 [ 20.785517] ret_from_fork+0x10/0x20 [ 20.785721] [ 20.785774] The buggy address belongs to the object at fff00000c6f13780 [ 20.785774] which belongs to the cache kmalloc-64 of size 64 [ 20.786015] The buggy address is located 0 bytes to the right of [ 20.786015] allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0) [ 20.786096] [ 20.786118] The buggy address belongs to the physical page: [ 20.786761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13 [ 20.786848] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.787118] page_type: f5(slab) [ 20.787165] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.787496] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.787906] page dumped because: kasan: bad access detected [ 20.788011] [ 20.788032] Memory state around the buggy address: [ 20.788069] fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.788629] fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.788895] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.788938] ^ [ 20.788974] fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.789210] fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.789517] ================================================================== [ 20.869186] ================================================================== [ 20.869236] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 20.869287] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265 [ 20.869338] [ 20.869370] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.869473] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.869503] Hardware name: linux,dummy-virt (DT) [ 20.869539] Call trace: [ 20.869565] show_stack+0x20/0x38 (C) [ 20.869613] dump_stack_lvl+0x8c/0xd0 [ 20.869666] print_report+0x118/0x608 [ 20.869713] kasan_report+0xdc/0x128 [ 20.869760] kasan_check_range+0x100/0x1a8 [ 20.869821] __kasan_check_write+0x20/0x30 [ 20.869875] kasan_atomics_helper+0x154c/0x4858 [ 20.869926] kasan_atomics+0x198/0x2e0 [ 20.869980] kunit_try_run_case+0x170/0x3f0 [ 20.870030] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.870083] kthread+0x328/0x630 [ 20.870125] ret_from_fork+0x10/0x20 [ 20.870173] [ 20.870202] Allocated by task 265: [ 20.870231] kasan_save_stack+0x3c/0x68 [ 20.870273] kasan_save_track+0x20/0x40 [ 20.870312] kasan_save_alloc_info+0x40/0x58 [ 20.870354] __kasan_kmalloc+0xd4/0xd8 [ 20.870392] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.870432] kasan_atomics+0xb8/0x2e0 [ 20.870478] kunit_try_run_case+0x170/0x3f0 [ 20.870518] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.870561] kthread+0x328/0x630 [ 20.870611] ret_from_fork+0x10/0x20 [ 20.870650] [ 20.870670] The buggy address belongs to the object at fff00000c6f13780 [ 20.870670] which belongs to the cache kmalloc-64 of size 64 [ 20.870738] The buggy address is located 0 bytes to the right of [ 20.870738] allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0) [ 20.870812] [ 20.870832] The buggy address belongs to the physical page: [ 20.870866] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13 [ 20.870924] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.870971] page_type: f5(slab) [ 20.871008] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.871060] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.871102] page dumped because: kasan: bad access detected [ 20.871136] [ 20.871353] Memory state around the buggy address: [ 20.871724] fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.871776] fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.871857] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.871902] ^ [ 20.871965] fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.872010] fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.872172] ================================================================== [ 20.802059] ================================================================== [ 20.802488] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 20.802611] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265 [ 20.802663] [ 20.802697] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.803106] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.803503] Hardware name: linux,dummy-virt (DT) [ 20.803593] Call trace: [ 20.803638] show_stack+0x20/0x38 (C) [ 20.803691] dump_stack_lvl+0x8c/0xd0 [ 20.803778] print_report+0x118/0x608 [ 20.804136] kasan_report+0xdc/0x128 [ 20.804276] kasan_check_range+0x100/0x1a8 [ 20.804619] __kasan_check_write+0x20/0x30 [ 20.804788] kasan_atomics_helper+0x10c0/0x4858 [ 20.805036] kasan_atomics+0x198/0x2e0 [ 20.805085] kunit_try_run_case+0x170/0x3f0 [ 20.805429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.805512] kthread+0x328/0x630 [ 20.805859] ret_from_fork+0x10/0x20 [ 20.805930] [ 20.805953] Allocated by task 265: [ 20.805982] kasan_save_stack+0x3c/0x68 [ 20.806063] kasan_save_track+0x20/0x40 [ 20.806104] kasan_save_alloc_info+0x40/0x58 [ 20.806145] __kasan_kmalloc+0xd4/0xd8 [ 20.806212] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.806252] kasan_atomics+0xb8/0x2e0 [ 20.806293] kunit_try_run_case+0x170/0x3f0 [ 20.806342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.806388] kthread+0x328/0x630 [ 20.806430] ret_from_fork+0x10/0x20 [ 20.806469] [ 20.806492] The buggy address belongs to the object at fff00000c6f13780 [ 20.806492] which belongs to the cache kmalloc-64 of size 64 [ 20.806551] The buggy address is located 0 bytes to the right of [ 20.806551] allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0) [ 20.806616] [ 20.806646] The buggy address belongs to the physical page: [ 20.806681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13 [ 20.806745] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.808844] page_type: f5(slab) [ 20.808909] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.808962] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.809005] page dumped because: kasan: bad access detected [ 20.809040] [ 20.809060] Memory state around the buggy address: [ 20.809094] fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.809140] fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.809185] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.809226] ^ [ 20.809260] fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.809303] fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.809341] ================================================================== [ 20.765375] ================================================================== [ 20.765431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 20.765483] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265 [ 20.765534] [ 20.765566] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.765647] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.765773] Hardware name: linux,dummy-virt (DT) [ 20.765830] Call trace: [ 20.765855] show_stack+0x20/0x38 (C) [ 20.765907] dump_stack_lvl+0x8c/0xd0 [ 20.765955] print_report+0x118/0x608 [ 20.766196] kasan_report+0xdc/0x128 [ 20.766370] kasan_check_range+0x100/0x1a8 [ 20.766433] __kasan_check_write+0x20/0x30 [ 20.766721] kasan_atomics_helper+0xf20/0x4858 [ 20.767062] kasan_atomics+0x198/0x2e0 [ 20.767383] kunit_try_run_case+0x170/0x3f0 [ 20.767594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.767720] kthread+0x328/0x630 [ 20.767948] ret_from_fork+0x10/0x20 [ 20.768024] [ 20.768046] Allocated by task 265: [ 20.768270] kasan_save_stack+0x3c/0x68 [ 20.768441] kasan_save_track+0x20/0x40 [ 20.768961] kasan_save_alloc_info+0x40/0x58 [ 20.769378] __kasan_kmalloc+0xd4/0xd8 [ 20.769643] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.769692] kasan_atomics+0xb8/0x2e0 [ 20.770048] kunit_try_run_case+0x170/0x3f0 [ 20.770547] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.770743] kthread+0x328/0x630 [ 20.770787] ret_from_fork+0x10/0x20 [ 20.770850] [ 20.770884] The buggy address belongs to the object at fff00000c6f13780 [ 20.770884] which belongs to the cache kmalloc-64 of size 64 [ 20.771172] The buggy address is located 0 bytes to the right of [ 20.771172] allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0) [ 20.771480] [ 20.771661] The buggy address belongs to the physical page: [ 20.771821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13 [ 20.771884] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.771942] page_type: f5(slab) [ 20.771984] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.772595] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.772743] page dumped because: kasan: bad access detected [ 20.772823] [ 20.772975] Memory state around the buggy address: [ 20.773214] fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.773568] fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.773751] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.773987] ^ [ 20.774086] fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.774294] fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.774479] ================================================================== [ 20.741630] ================================================================== [ 20.741685] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 20.741765] Read of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265 [ 20.741971] [ 20.742006] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.742086] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.742427] Hardware name: linux,dummy-virt (DT) [ 20.742495] Call trace: [ 20.742522] show_stack+0x20/0x38 (C) [ 20.742585] dump_stack_lvl+0x8c/0xd0 [ 20.742638] print_report+0x118/0x608 [ 20.742687] kasan_report+0xdc/0x128 [ 20.742735] __asan_report_load8_noabort+0x20/0x30 [ 20.742782] kasan_atomics_helper+0x3f58/0x4858 [ 20.742847] kasan_atomics+0x198/0x2e0 [ 20.742894] kunit_try_run_case+0x170/0x3f0 [ 20.742980] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.743033] kthread+0x328/0x630 [ 20.743156] ret_from_fork+0x10/0x20 [ 20.743435] [ 20.743718] Allocated by task 265: [ 20.744036] kasan_save_stack+0x3c/0x68 [ 20.744176] kasan_save_track+0x20/0x40 [ 20.744249] kasan_save_alloc_info+0x40/0x58 [ 20.744290] __kasan_kmalloc+0xd4/0xd8 [ 20.744329] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.744397] kasan_atomics+0xb8/0x2e0 [ 20.744435] kunit_try_run_case+0x170/0x3f0 [ 20.744507] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.744553] kthread+0x328/0x630 [ 20.744671] ret_from_fork+0x10/0x20 [ 20.744853] [ 20.744994] The buggy address belongs to the object at fff00000c6f13780 [ 20.744994] which belongs to the cache kmalloc-64 of size 64 [ 20.745091] The buggy address is located 0 bytes to the right of [ 20.745091] allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0) [ 20.745378] [ 20.745414] The buggy address belongs to the physical page: [ 20.745531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13 [ 20.745598] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.745648] page_type: f5(slab) [ 20.745686] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.745749] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.745797] page dumped because: kasan: bad access detected [ 20.745868] [ 20.745899] Memory state around the buggy address: [ 20.745939] fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.745992] fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.746037] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.746076] ^ [ 20.746113] fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.746157] fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.746207] ================================================================== [ 20.818646] ================================================================== [ 20.818703] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 20.818963] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265 [ 20.819076] [ 20.819204] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.819393] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.819748] Hardware name: linux,dummy-virt (DT) [ 20.819920] Call trace: [ 20.820021] show_stack+0x20/0x38 (C) [ 20.820204] dump_stack_lvl+0x8c/0xd0 [ 20.820357] print_report+0x118/0x608 [ 20.820478] kasan_report+0xdc/0x128 [ 20.820547] kasan_check_range+0x100/0x1a8 [ 20.820596] __kasan_check_write+0x20/0x30 [ 20.820642] kasan_atomics_helper+0x1190/0x4858 [ 20.820692] kasan_atomics+0x198/0x2e0 [ 20.821061] kunit_try_run_case+0x170/0x3f0 [ 20.821211] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.821393] kthread+0x328/0x630 [ 20.821485] ret_from_fork+0x10/0x20 [ 20.821877] [ 20.821926] Allocated by task 265: [ 20.822072] kasan_save_stack+0x3c/0x68 [ 20.822157] kasan_save_track+0x20/0x40 [ 20.822197] kasan_save_alloc_info+0x40/0x58 [ 20.822546] __kasan_kmalloc+0xd4/0xd8 [ 20.822687] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.822778] kasan_atomics+0xb8/0x2e0 [ 20.822885] kunit_try_run_case+0x170/0x3f0 [ 20.822954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.823002] kthread+0x328/0x630 [ 20.823216] ret_from_fork+0x10/0x20 [ 20.823371] [ 20.823470] The buggy address belongs to the object at fff00000c6f13780 [ 20.823470] which belongs to the cache kmalloc-64 of size 64 [ 20.823641] The buggy address is located 0 bytes to the right of [ 20.823641] allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0) [ 20.823769] [ 20.823882] The buggy address belongs to the physical page: [ 20.823934] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13 [ 20.823989] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.824065] page_type: f5(slab) [ 20.824104] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.824157] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.824200] page dumped because: kasan: bad access detected [ 20.824235] [ 20.824255] Memory state around the buggy address: [ 20.824290] fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.824852] fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.824936] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.824979] ^ [ 20.825016] fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.825059] fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.825109] ================================================================== [ 20.889458] ================================================================== [ 20.889646] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 20.889695] Read of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265 [ 20.889877] [ 20.889920] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.890060] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.890104] Hardware name: linux,dummy-virt (DT) [ 20.890138] Call trace: [ 20.890161] show_stack+0x20/0x38 (C) [ 20.890225] dump_stack_lvl+0x8c/0xd0 [ 20.890273] print_report+0x118/0x608 [ 20.890322] kasan_report+0xdc/0x128 [ 20.890368] __asan_report_load8_noabort+0x20/0x30 [ 20.890417] kasan_atomics_helper+0x3df4/0x4858 [ 20.890467] kasan_atomics+0x198/0x2e0 [ 20.890521] kunit_try_run_case+0x170/0x3f0 [ 20.890584] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.890648] kthread+0x328/0x630 [ 20.890691] ret_from_fork+0x10/0x20 [ 20.890741] [ 20.890769] Allocated by task 265: [ 20.890797] kasan_save_stack+0x3c/0x68 [ 20.890853] kasan_save_track+0x20/0x40 [ 20.890893] kasan_save_alloc_info+0x40/0x58 [ 20.890936] __kasan_kmalloc+0xd4/0xd8 [ 20.890975] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.891015] kasan_atomics+0xb8/0x2e0 [ 20.891053] kunit_try_run_case+0x170/0x3f0 [ 20.891090] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.891136] kthread+0x328/0x630 [ 20.891178] ret_from_fork+0x10/0x20 [ 20.891215] [ 20.891236] The buggy address belongs to the object at fff00000c6f13780 [ 20.891236] which belongs to the cache kmalloc-64 of size 64 [ 20.891304] The buggy address is located 0 bytes to the right of [ 20.891304] allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0) [ 20.891370] [ 20.891390] The buggy address belongs to the physical page: [ 20.891423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13 [ 20.891475] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.891524] page_type: f5(slab) [ 20.891572] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.891624] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.891675] page dumped because: kasan: bad access detected [ 20.891710] [ 20.891743] Memory state around the buggy address: [ 20.891777] fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.891831] fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.891875] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.891919] ^ [ 20.891953] fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.891997] fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.892036] ================================================================== [ 20.775337] ================================================================== [ 20.775393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 20.775445] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265 [ 20.775772] [ 20.775873] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.775970] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.775998] Hardware name: linux,dummy-virt (DT) [ 20.776031] Call trace: [ 20.776065] show_stack+0x20/0x38 (C) [ 20.776120] dump_stack_lvl+0x8c/0xd0 [ 20.776169] print_report+0x118/0x608 [ 20.776218] kasan_report+0xdc/0x128 [ 20.776265] kasan_check_range+0x100/0x1a8 [ 20.776315] __kasan_check_write+0x20/0x30 [ 20.776361] kasan_atomics_helper+0xf88/0x4858 [ 20.776416] kasan_atomics+0x198/0x2e0 [ 20.776474] kunit_try_run_case+0x170/0x3f0 [ 20.776521] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.776574] kthread+0x328/0x630 [ 20.776628] ret_from_fork+0x10/0x20 [ 20.776675] [ 20.776696] Allocated by task 265: [ 20.776725] kasan_save_stack+0x3c/0x68 [ 20.776776] kasan_save_track+0x20/0x40 [ 20.776827] kasan_save_alloc_info+0x40/0x58 [ 20.776872] __kasan_kmalloc+0xd4/0xd8 [ 20.776910] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.776952] kasan_atomics+0xb8/0x2e0 [ 20.776989] kunit_try_run_case+0x170/0x3f0 [ 20.777038] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.777085] kthread+0x328/0x630 [ 20.777136] ret_from_fork+0x10/0x20 [ 20.777174] [ 20.777195] The buggy address belongs to the object at fff00000c6f13780 [ 20.777195] which belongs to the cache kmalloc-64 of size 64 [ 20.777254] The buggy address is located 0 bytes to the right of [ 20.777254] allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0) [ 20.777318] [ 20.777340] The buggy address belongs to the physical page: [ 20.777373] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13 [ 20.777426] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.777474] page_type: f5(slab) [ 20.777512] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.777563] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.777605] page dumped because: kasan: bad access detected [ 20.777638] [ 20.777659] Memory state around the buggy address: [ 20.777692] fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.777738] fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.777780] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.778309] ^ [ 20.778353] fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.778427] fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.778471] ================================================================== [ 20.843277] ================================================================== [ 20.843325] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 20.843399] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265 [ 20.843566] [ 20.843632] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.843736] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.843794] Hardware name: linux,dummy-virt (DT) [ 20.843843] Call trace: [ 20.843906] show_stack+0x20/0x38 (C) [ 20.843990] dump_stack_lvl+0x8c/0xd0 [ 20.844040] print_report+0x118/0x608 [ 20.844088] kasan_report+0xdc/0x128 [ 20.844134] kasan_check_range+0x100/0x1a8 [ 20.844254] __kasan_check_write+0x20/0x30 [ 20.844309] kasan_atomics_helper+0x1384/0x4858 [ 20.844454] kasan_atomics+0x198/0x2e0 [ 20.844548] kunit_try_run_case+0x170/0x3f0 [ 20.844598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.844651] kthread+0x328/0x630 [ 20.844696] ret_from_fork+0x10/0x20 [ 20.844742] [ 20.844763] Allocated by task 265: [ 20.844793] kasan_save_stack+0x3c/0x68 [ 20.844848] kasan_save_track+0x20/0x40 [ 20.844888] kasan_save_alloc_info+0x40/0x58 [ 20.844941] __kasan_kmalloc+0xd4/0xd8 [ 20.844979] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.845020] kasan_atomics+0xb8/0x2e0 [ 20.845066] kunit_try_run_case+0x170/0x3f0 [ 20.845108] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.845152] kthread+0x328/0x630 [ 20.845195] ret_from_fork+0x10/0x20 [ 20.845233] [ 20.845259] The buggy address belongs to the object at fff00000c6f13780 [ 20.845259] which belongs to the cache kmalloc-64 of size 64 [ 20.845319] The buggy address is located 0 bytes to the right of [ 20.845319] allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0) [ 20.845384] [ 20.845413] The buggy address belongs to the physical page: [ 20.845446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13 [ 20.845497] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.845545] page_type: f5(slab) [ 20.845583] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.845635] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.845677] page dumped because: kasan: bad access detected [ 20.845711] [ 20.845730] Memory state around the buggy address: [ 20.845763] fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.846351] fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.846412] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.846548] ^ [ 20.846587] fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.846631] fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.846895] ================================================================== [ 20.610967] ================================================================== [ 20.611058] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 20.611196] Write of size 4 at addr fff00000c6f137b0 by task kunit_try_catch/265 [ 20.611266] [ 20.611297] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.611378] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.611463] Hardware name: linux,dummy-virt (DT) [ 20.611500] Call trace: [ 20.611524] show_stack+0x20/0x38 (C) [ 20.611707] dump_stack_lvl+0x8c/0xd0 [ 20.611871] print_report+0x118/0x608 [ 20.611942] kasan_report+0xdc/0x128 [ 20.612018] kasan_check_range+0x100/0x1a8 [ 20.612113] kasan_atomics_helper+0x894/0x4858 [ 20.612171] kasan_atomics+0x198/0x2e0 [ 20.612218] kunit_try_run_case+0x170/0x3f0 [ 20.612326] kthread+0x328/0x630 [ 20.612370] ret_from_fork+0x10/0x20 [ 20.612419] [ 20.612440] Allocated by task 265: [ 20.612480] kasan_save_stack+0x3c/0x68 [ 20.612531] kasan_save_track+0x20/0x40 [ 20.612581] kasan_save_alloc_info+0x40/0x58 [ 20.612719] kasan_atomics+0xb8/0x2e0 [ 20.612758] kunit_try_run_case+0x170/0x3f0 [ 20.612798] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.613581] [ 20.613654] The buggy address belongs to the object at fff00000c6f13780 [ 20.613654] which belongs to the cache kmalloc-64 of size 64 [ 20.613923] [ 20.614055] The buggy address belongs to the physical page: [ 20.614121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13 [ 20.614185] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.614251] page_type: f5(slab) [ 20.614313] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.614364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.614580] page dumped because: kasan: bad access detected [ 20.614699] [ 20.614820] Memory state around the buggy address: [ 20.614858] fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.615034] fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.615325] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.615495] ^ [ 20.615542] fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.615585] fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.615770] ================================================================== [ 20.905233] ================================================================== [ 20.905285] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 20.905336] Write of size 8 at addr fff00000c6f137b0 by task kunit_try_catch/265 [ 20.905385] [ 20.905420] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.905502] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.905529] Hardware name: linux,dummy-virt (DT) [ 20.905562] Call trace: [ 20.905586] show_stack+0x20/0x38 (C) [ 20.905635] dump_stack_lvl+0x8c/0xd0 [ 20.905681] print_report+0x118/0x608 [ 20.905730] kasan_report+0xdc/0x128 [ 20.905776] kasan_check_range+0x100/0x1a8 [ 20.905926] __kasan_check_write+0x20/0x30 [ 20.906072] kasan_atomics_helper+0x175c/0x4858 [ 20.906134] kasan_atomics+0x198/0x2e0 [ 20.906231] kunit_try_run_case+0x170/0x3f0 [ 20.906285] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.906339] kthread+0x328/0x630 [ 20.906383] ret_from_fork+0x10/0x20 [ 20.906430] [ 20.906486] Allocated by task 265: [ 20.906537] kasan_save_stack+0x3c/0x68 [ 20.906587] kasan_save_track+0x20/0x40 [ 20.906726] kasan_save_alloc_info+0x40/0x58 [ 20.906769] __kasan_kmalloc+0xd4/0xd8 [ 20.906817] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.906860] kasan_atomics+0xb8/0x2e0 [ 20.906896] kunit_try_run_case+0x170/0x3f0 [ 20.907661] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.907727] kthread+0x328/0x630 [ 20.907770] ret_from_fork+0x10/0x20 [ 20.908763] [ 20.908866] The buggy address belongs to the object at fff00000c6f13780 [ 20.908866] which belongs to the cache kmalloc-64 of size 64 [ 20.909385] The buggy address is located 0 bytes to the right of [ 20.909385] allocated 48-byte region [fff00000c6f13780, fff00000c6f137b0) [ 20.909896] [ 20.910308] The buggy address belongs to the physical page: [ 20.910470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f13 [ 20.910628] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.910706] page_type: f5(slab) [ 20.911756] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.911940] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.912373] page dumped because: kasan: bad access detected [ 20.912427] [ 20.912700] Memory state around the buggy address: [ 20.912833] fff00000c6f13680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.912881] fff00000c6f13700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.913533] >fff00000c6f13780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.913581] ^ [ 20.913618] fff00000c6f13800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.915064] fff00000c6f13880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.915315] ==================================================================
[ 15.377868] ================================================================== [ 15.378134] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 15.378496] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.379035] [ 15.379130] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.379178] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.379192] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.379228] Call Trace: [ 15.379250] <TASK> [ 15.379271] dump_stack_lvl+0x73/0xb0 [ 15.379302] print_report+0xd1/0x650 [ 15.379326] ? __virt_addr_valid+0x1db/0x2d0 [ 15.379350] ? kasan_atomics_helper+0x1467/0x5450 [ 15.379371] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.379394] ? kasan_atomics_helper+0x1467/0x5450 [ 15.379416] kasan_report+0x141/0x180 [ 15.379438] ? kasan_atomics_helper+0x1467/0x5450 [ 15.379464] kasan_check_range+0x10c/0x1c0 [ 15.379489] __kasan_check_write+0x18/0x20 [ 15.379508] kasan_atomics_helper+0x1467/0x5450 [ 15.379531] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.379554] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.379578] ? ret_from_fork_asm+0x1a/0x30 [ 15.379602] ? kasan_atomics+0x152/0x310 [ 15.379629] kasan_atomics+0x1dc/0x310 [ 15.379652] ? __pfx_kasan_atomics+0x10/0x10 [ 15.379676] ? __pfx_read_tsc+0x10/0x10 [ 15.379699] ? ktime_get_ts64+0x86/0x230 [ 15.379723] kunit_try_run_case+0x1a5/0x480 [ 15.379749] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.379771] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.379795] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.379818] ? __kthread_parkme+0x82/0x180 [ 15.379839] ? preempt_count_sub+0x50/0x80 [ 15.379863] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.379886] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.379908] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.379932] kthread+0x337/0x6f0 [ 15.379952] ? trace_preempt_on+0x20/0xc0 [ 15.379976] ? __pfx_kthread+0x10/0x10 [ 15.380009] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.380032] ? calculate_sigpending+0x7b/0xa0 [ 15.380057] ? __pfx_kthread+0x10/0x10 [ 15.380078] ret_from_fork+0x116/0x1d0 [ 15.380097] ? __pfx_kthread+0x10/0x10 [ 15.380118] ret_from_fork_asm+0x1a/0x30 [ 15.380148] </TASK> [ 15.380160] [ 15.387812] Allocated by task 282: [ 15.388003] kasan_save_stack+0x45/0x70 [ 15.388196] kasan_save_track+0x18/0x40 [ 15.388404] kasan_save_alloc_info+0x3b/0x50 [ 15.388601] __kasan_kmalloc+0xb7/0xc0 [ 15.388745] __kmalloc_cache_noprof+0x189/0x420 [ 15.388912] kasan_atomics+0x95/0x310 [ 15.389045] kunit_try_run_case+0x1a5/0x480 [ 15.389193] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.389698] kthread+0x337/0x6f0 [ 15.389879] ret_from_fork+0x116/0x1d0 [ 15.390037] ret_from_fork_asm+0x1a/0x30 [ 15.390181] [ 15.390274] The buggy address belongs to the object at ffff888103991d00 [ 15.390274] which belongs to the cache kmalloc-64 of size 64 [ 15.390817] The buggy address is located 0 bytes to the right of [ 15.390817] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.391197] [ 15.391281] The buggy address belongs to the physical page: [ 15.391457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.391702] flags: 0x200000000000000(node=0|zone=2) [ 15.391920] page_type: f5(slab) [ 15.392089] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.392435] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.392978] page dumped because: kasan: bad access detected [ 15.393375] [ 15.393571] Memory state around the buggy address: [ 15.393799] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.394024] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.394255] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.394586] ^ [ 15.394814] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.395121] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.395568] ================================================================== [ 15.396120] ================================================================== [ 15.396495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 15.397033] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.397381] [ 15.397521] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.397575] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.397589] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.397613] Call Trace: [ 15.397639] <TASK> [ 15.397661] dump_stack_lvl+0x73/0xb0 [ 15.397692] print_report+0xd1/0x650 [ 15.397718] ? __virt_addr_valid+0x1db/0x2d0 [ 15.397742] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.397764] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.397786] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.397809] kasan_report+0x141/0x180 [ 15.397831] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.397857] __asan_report_store8_noabort+0x1b/0x30 [ 15.397878] kasan_atomics_helper+0x50d4/0x5450 [ 15.397901] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.397922] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.397948] ? ret_from_fork_asm+0x1a/0x30 [ 15.397971] ? kasan_atomics+0x152/0x310 [ 15.397997] kasan_atomics+0x1dc/0x310 [ 15.398021] ? __pfx_kasan_atomics+0x10/0x10 [ 15.398045] ? __pfx_read_tsc+0x10/0x10 [ 15.398066] ? ktime_get_ts64+0x86/0x230 [ 15.398091] kunit_try_run_case+0x1a5/0x480 [ 15.398116] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.398139] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.398162] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.398185] ? __kthread_parkme+0x82/0x180 [ 15.398207] ? preempt_count_sub+0x50/0x80 [ 15.398243] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.398279] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.398303] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.398326] kthread+0x337/0x6f0 [ 15.398346] ? trace_preempt_on+0x20/0xc0 [ 15.398370] ? __pfx_kthread+0x10/0x10 [ 15.398390] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.398411] ? calculate_sigpending+0x7b/0xa0 [ 15.398436] ? __pfx_kthread+0x10/0x10 [ 15.398458] ret_from_fork+0x116/0x1d0 [ 15.398476] ? __pfx_kthread+0x10/0x10 [ 15.398497] ret_from_fork_asm+0x1a/0x30 [ 15.398527] </TASK> [ 15.398540] [ 15.406132] Allocated by task 282: [ 15.406398] kasan_save_stack+0x45/0x70 [ 15.406556] kasan_save_track+0x18/0x40 [ 15.406691] kasan_save_alloc_info+0x3b/0x50 [ 15.406839] __kasan_kmalloc+0xb7/0xc0 [ 15.407017] __kmalloc_cache_noprof+0x189/0x420 [ 15.407250] kasan_atomics+0x95/0x310 [ 15.407441] kunit_try_run_case+0x1a5/0x480 [ 15.407663] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.407913] kthread+0x337/0x6f0 [ 15.408086] ret_from_fork+0x116/0x1d0 [ 15.408270] ret_from_fork_asm+0x1a/0x30 [ 15.408441] [ 15.408522] The buggy address belongs to the object at ffff888103991d00 [ 15.408522] which belongs to the cache kmalloc-64 of size 64 [ 15.408991] The buggy address is located 0 bytes to the right of [ 15.408991] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.409514] [ 15.409616] The buggy address belongs to the physical page: [ 15.409863] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.410170] flags: 0x200000000000000(node=0|zone=2) [ 15.410396] page_type: f5(slab) [ 15.410558] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.410875] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.411162] page dumped because: kasan: bad access detected [ 15.411485] [ 15.411558] Memory state around the buggy address: [ 15.411765] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.412026] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.412255] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.412590] ^ [ 15.412820] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.413079] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.413474] ================================================================== [ 15.937711] ================================================================== [ 15.937963] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 15.938212] Read of size 8 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.938768] [ 15.938885] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.938932] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.938944] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.938968] Call Trace: [ 15.938988] <TASK> [ 15.939009] dump_stack_lvl+0x73/0xb0 [ 15.939039] print_report+0xd1/0x650 [ 15.939067] ? __virt_addr_valid+0x1db/0x2d0 [ 15.939091] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.939113] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.939135] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.939157] kasan_report+0x141/0x180 [ 15.939180] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.939247] __asan_report_load8_noabort+0x18/0x20 [ 15.939286] kasan_atomics_helper+0x4fa5/0x5450 [ 15.939322] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.939346] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.939370] ? ret_from_fork_asm+0x1a/0x30 [ 15.939394] ? kasan_atomics+0x152/0x310 [ 15.939421] kasan_atomics+0x1dc/0x310 [ 15.939444] ? __pfx_kasan_atomics+0x10/0x10 [ 15.939469] ? __pfx_read_tsc+0x10/0x10 [ 15.939490] ? ktime_get_ts64+0x86/0x230 [ 15.939515] kunit_try_run_case+0x1a5/0x480 [ 15.939540] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.939563] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.939589] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.939612] ? __kthread_parkme+0x82/0x180 [ 15.939634] ? preempt_count_sub+0x50/0x80 [ 15.939658] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.939691] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.939715] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.939748] kthread+0x337/0x6f0 [ 15.939768] ? trace_preempt_on+0x20/0xc0 [ 15.939793] ? __pfx_kthread+0x10/0x10 [ 15.939813] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.939834] ? calculate_sigpending+0x7b/0xa0 [ 15.939859] ? __pfx_kthread+0x10/0x10 [ 15.939881] ret_from_fork+0x116/0x1d0 [ 15.939900] ? __pfx_kthread+0x10/0x10 [ 15.939921] ret_from_fork_asm+0x1a/0x30 [ 15.939952] </TASK> [ 15.939964] [ 15.948231] Allocated by task 282: [ 15.948464] kasan_save_stack+0x45/0x70 [ 15.948684] kasan_save_track+0x18/0x40 [ 15.948912] kasan_save_alloc_info+0x3b/0x50 [ 15.949122] __kasan_kmalloc+0xb7/0xc0 [ 15.949370] __kmalloc_cache_noprof+0x189/0x420 [ 15.949576] kasan_atomics+0x95/0x310 [ 15.949808] kunit_try_run_case+0x1a5/0x480 [ 15.949985] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.950266] kthread+0x337/0x6f0 [ 15.950488] ret_from_fork+0x116/0x1d0 [ 15.950653] ret_from_fork_asm+0x1a/0x30 [ 15.950821] [ 15.950906] The buggy address belongs to the object at ffff888103991d00 [ 15.950906] which belongs to the cache kmalloc-64 of size 64 [ 15.951426] The buggy address is located 0 bytes to the right of [ 15.951426] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.951985] [ 15.952084] The buggy address belongs to the physical page: [ 15.952799] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.953058] flags: 0x200000000000000(node=0|zone=2) [ 15.953237] page_type: f5(slab) [ 15.953361] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.953586] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.955970] page dumped because: kasan: bad access detected [ 15.956289] [ 15.956445] Memory state around the buggy address: [ 15.956681] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.957017] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.957370] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.957589] ^ [ 15.957749] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.958076] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.958356] ================================================================== [ 15.148454] ================================================================== [ 15.148751] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 15.149079] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.149599] [ 15.149733] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.149784] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.149797] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.149822] Call Trace: [ 15.149844] <TASK> [ 15.149865] dump_stack_lvl+0x73/0xb0 [ 15.149902] print_report+0xd1/0x650 [ 15.149926] ? __virt_addr_valid+0x1db/0x2d0 [ 15.149949] ? kasan_atomics_helper+0x1079/0x5450 [ 15.149972] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.149995] ? kasan_atomics_helper+0x1079/0x5450 [ 15.150017] kasan_report+0x141/0x180 [ 15.150040] ? kasan_atomics_helper+0x1079/0x5450 [ 15.150067] kasan_check_range+0x10c/0x1c0 [ 15.150092] __kasan_check_write+0x18/0x20 [ 15.150111] kasan_atomics_helper+0x1079/0x5450 [ 15.150134] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.150157] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.150182] ? ret_from_fork_asm+0x1a/0x30 [ 15.150205] ? kasan_atomics+0x152/0x310 [ 15.150244] kasan_atomics+0x1dc/0x310 [ 15.150288] ? __pfx_kasan_atomics+0x10/0x10 [ 15.150314] ? __pfx_read_tsc+0x10/0x10 [ 15.150336] ? ktime_get_ts64+0x86/0x230 [ 15.150362] kunit_try_run_case+0x1a5/0x480 [ 15.150387] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.150411] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.150435] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.150458] ? __kthread_parkme+0x82/0x180 [ 15.150481] ? preempt_count_sub+0x50/0x80 [ 15.150505] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.150529] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.150552] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.150575] kthread+0x337/0x6f0 [ 15.150596] ? trace_preempt_on+0x20/0xc0 [ 15.150620] ? __pfx_kthread+0x10/0x10 [ 15.150641] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.150663] ? calculate_sigpending+0x7b/0xa0 [ 15.150688] ? __pfx_kthread+0x10/0x10 [ 15.150710] ret_from_fork+0x116/0x1d0 [ 15.150729] ? __pfx_kthread+0x10/0x10 [ 15.150751] ret_from_fork_asm+0x1a/0x30 [ 15.150781] </TASK> [ 15.150794] [ 15.160534] Allocated by task 282: [ 15.160748] kasan_save_stack+0x45/0x70 [ 15.160969] kasan_save_track+0x18/0x40 [ 15.161154] kasan_save_alloc_info+0x3b/0x50 [ 15.161763] __kasan_kmalloc+0xb7/0xc0 [ 15.162016] __kmalloc_cache_noprof+0x189/0x420 [ 15.162449] kasan_atomics+0x95/0x310 [ 15.162760] kunit_try_run_case+0x1a5/0x480 [ 15.163158] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.163612] kthread+0x337/0x6f0 [ 15.163795] ret_from_fork+0x116/0x1d0 [ 15.163970] ret_from_fork_asm+0x1a/0x30 [ 15.164151] [ 15.164253] The buggy address belongs to the object at ffff888103991d00 [ 15.164253] which belongs to the cache kmalloc-64 of size 64 [ 15.164743] The buggy address is located 0 bytes to the right of [ 15.164743] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.167288] [ 15.167480] The buggy address belongs to the physical page: [ 15.167990] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.168552] flags: 0x200000000000000(node=0|zone=2) [ 15.169644] page_type: f5(slab) [ 15.169793] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.170034] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.170289] page dumped because: kasan: bad access detected [ 15.170467] [ 15.170540] Memory state around the buggy address: [ 15.170705] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.170923] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.171141] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.171924] ^ [ 15.173043] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.173700] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.174591] ================================================================== [ 14.493375] ================================================================== [ 14.493713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 14.494091] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282 [ 14.494505] [ 14.494621] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.494671] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.494706] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.494729] Call Trace: [ 14.494744] <TASK> [ 14.494763] dump_stack_lvl+0x73/0xb0 [ 14.494793] print_report+0xd1/0x650 [ 14.494817] ? __virt_addr_valid+0x1db/0x2d0 [ 14.494839] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.494861] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.494883] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.494905] kasan_report+0x141/0x180 [ 14.494927] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.494951] __asan_report_store4_noabort+0x1b/0x30 [ 14.494971] kasan_atomics_helper+0x4ba2/0x5450 [ 14.494992] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.495014] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.495037] ? ret_from_fork_asm+0x1a/0x30 [ 14.495057] ? kasan_atomics+0x152/0x310 [ 14.495239] kasan_atomics+0x1dc/0x310 [ 14.495270] ? __pfx_kasan_atomics+0x10/0x10 [ 14.495390] ? __pfx_read_tsc+0x10/0x10 [ 14.495419] ? ktime_get_ts64+0x86/0x230 [ 14.495445] kunit_try_run_case+0x1a5/0x480 [ 14.495471] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.495492] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.495516] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.495538] ? __kthread_parkme+0x82/0x180 [ 14.495558] ? preempt_count_sub+0x50/0x80 [ 14.495582] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.495606] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.495627] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.495650] kthread+0x337/0x6f0 [ 14.495668] ? trace_preempt_on+0x20/0xc0 [ 14.495691] ? __pfx_kthread+0x10/0x10 [ 14.495711] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.495731] ? calculate_sigpending+0x7b/0xa0 [ 14.495756] ? __pfx_kthread+0x10/0x10 [ 14.495776] ret_from_fork+0x116/0x1d0 [ 14.495794] ? __pfx_kthread+0x10/0x10 [ 14.495814] ret_from_fork_asm+0x1a/0x30 [ 14.495842] </TASK> [ 14.495854] [ 14.508048] Allocated by task 282: [ 14.508447] kasan_save_stack+0x45/0x70 [ 14.508911] kasan_save_track+0x18/0x40 [ 14.509117] kasan_save_alloc_info+0x3b/0x50 [ 14.509538] __kasan_kmalloc+0xb7/0xc0 [ 14.509989] __kmalloc_cache_noprof+0x189/0x420 [ 14.510514] kasan_atomics+0x95/0x310 [ 14.510683] kunit_try_run_case+0x1a5/0x480 [ 14.510895] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.511129] kthread+0x337/0x6f0 [ 14.511634] ret_from_fork+0x116/0x1d0 [ 14.511915] ret_from_fork_asm+0x1a/0x30 [ 14.512363] [ 14.512615] The buggy address belongs to the object at ffff888103991d00 [ 14.512615] which belongs to the cache kmalloc-64 of size 64 [ 14.513397] The buggy address is located 0 bytes to the right of [ 14.513397] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 14.514413] [ 14.514526] The buggy address belongs to the physical page: [ 14.514763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 14.515083] flags: 0x200000000000000(node=0|zone=2) [ 14.515742] page_type: f5(slab) [ 14.516041] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.516574] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.517119] page dumped because: kasan: bad access detected [ 14.517670] [ 14.517916] Memory state around the buggy address: [ 14.518152] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.518879] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.519183] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.519684] ^ [ 14.519908] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.520439] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.520703] ================================================================== [ 15.548333] ================================================================== [ 15.548962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 15.549595] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.550160] [ 15.550452] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.550512] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.550527] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.550594] Call Trace: [ 15.550619] <TASK> [ 15.550642] dump_stack_lvl+0x73/0xb0 [ 15.550679] print_report+0xd1/0x650 [ 15.550704] ? __virt_addr_valid+0x1db/0x2d0 [ 15.550728] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.550750] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.550774] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.550796] kasan_report+0x141/0x180 [ 15.550817] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.550843] kasan_check_range+0x10c/0x1c0 [ 15.550867] __kasan_check_write+0x18/0x20 [ 15.550887] kasan_atomics_helper+0x18b1/0x5450 [ 15.550910] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.550933] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.550958] ? ret_from_fork_asm+0x1a/0x30 [ 15.550981] ? kasan_atomics+0x152/0x310 [ 15.551008] kasan_atomics+0x1dc/0x310 [ 15.551031] ? __pfx_kasan_atomics+0x10/0x10 [ 15.551056] ? __pfx_read_tsc+0x10/0x10 [ 15.551078] ? ktime_get_ts64+0x86/0x230 [ 15.551102] kunit_try_run_case+0x1a5/0x480 [ 15.551128] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.551150] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.551174] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.551197] ? __kthread_parkme+0x82/0x180 [ 15.551229] ? preempt_count_sub+0x50/0x80 [ 15.551253] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.551277] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.551301] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.551324] kthread+0x337/0x6f0 [ 15.551344] ? trace_preempt_on+0x20/0xc0 [ 15.551369] ? __pfx_kthread+0x10/0x10 [ 15.551390] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.551411] ? calculate_sigpending+0x7b/0xa0 [ 15.551437] ? __pfx_kthread+0x10/0x10 [ 15.551459] ret_from_fork+0x116/0x1d0 [ 15.551478] ? __pfx_kthread+0x10/0x10 [ 15.551499] ret_from_fork_asm+0x1a/0x30 [ 15.551529] </TASK> [ 15.551542] [ 15.559194] Allocated by task 282: [ 15.559462] kasan_save_stack+0x45/0x70 [ 15.559701] kasan_save_track+0x18/0x40 [ 15.559873] kasan_save_alloc_info+0x3b/0x50 [ 15.560067] __kasan_kmalloc+0xb7/0xc0 [ 15.560320] __kmalloc_cache_noprof+0x189/0x420 [ 15.560523] kasan_atomics+0x95/0x310 [ 15.560659] kunit_try_run_case+0x1a5/0x480 [ 15.560878] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.561163] kthread+0x337/0x6f0 [ 15.561382] ret_from_fork+0x116/0x1d0 [ 15.561553] ret_from_fork_asm+0x1a/0x30 [ 15.561757] [ 15.561858] The buggy address belongs to the object at ffff888103991d00 [ 15.561858] which belongs to the cache kmalloc-64 of size 64 [ 15.562448] The buggy address is located 0 bytes to the right of [ 15.562448] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.562823] [ 15.562900] The buggy address belongs to the physical page: [ 15.563097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.563526] flags: 0x200000000000000(node=0|zone=2) [ 15.564003] page_type: f5(slab) [ 15.564175] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.564511] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.564804] page dumped because: kasan: bad access detected [ 15.564978] [ 15.565050] Memory state around the buggy address: [ 15.565211] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.565537] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.565889] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.566213] ^ [ 15.566502] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.566855] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.567144] ================================================================== [ 15.764901] ================================================================== [ 15.765356] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 15.765659] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.765889] [ 15.765979] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.766027] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.766041] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.766065] Call Trace: [ 15.766086] <TASK> [ 15.766107] dump_stack_lvl+0x73/0xb0 [ 15.766137] print_report+0xd1/0x650 [ 15.766160] ? __virt_addr_valid+0x1db/0x2d0 [ 15.766184] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.766206] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.766241] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.766271] kasan_report+0x141/0x180 [ 15.766293] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.766319] kasan_check_range+0x10c/0x1c0 [ 15.766342] __kasan_check_write+0x18/0x20 [ 15.766361] kasan_atomics_helper+0x1eaa/0x5450 [ 15.766384] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.766406] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.766430] ? ret_from_fork_asm+0x1a/0x30 [ 15.766453] ? kasan_atomics+0x152/0x310 [ 15.766480] kasan_atomics+0x1dc/0x310 [ 15.766503] ? __pfx_kasan_atomics+0x10/0x10 [ 15.766527] ? __pfx_read_tsc+0x10/0x10 [ 15.766549] ? ktime_get_ts64+0x86/0x230 [ 15.766574] kunit_try_run_case+0x1a5/0x480 [ 15.766599] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.766621] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.766645] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.766668] ? __kthread_parkme+0x82/0x180 [ 15.766689] ? preempt_count_sub+0x50/0x80 [ 15.766713] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.766737] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.766760] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.766783] kthread+0x337/0x6f0 [ 15.766803] ? trace_preempt_on+0x20/0xc0 [ 15.766827] ? __pfx_kthread+0x10/0x10 [ 15.766848] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.766869] ? calculate_sigpending+0x7b/0xa0 [ 15.766894] ? __pfx_kthread+0x10/0x10 [ 15.766916] ret_from_fork+0x116/0x1d0 [ 15.766935] ? __pfx_kthread+0x10/0x10 [ 15.766956] ret_from_fork_asm+0x1a/0x30 [ 15.766988] </TASK> [ 15.767000] [ 15.775002] Allocated by task 282: [ 15.775193] kasan_save_stack+0x45/0x70 [ 15.775483] kasan_save_track+0x18/0x40 [ 15.775653] kasan_save_alloc_info+0x3b/0x50 [ 15.775856] __kasan_kmalloc+0xb7/0xc0 [ 15.775988] __kmalloc_cache_noprof+0x189/0x420 [ 15.776146] kasan_atomics+0x95/0x310 [ 15.777133] kunit_try_run_case+0x1a5/0x480 [ 15.777820] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.778527] kthread+0x337/0x6f0 [ 15.778976] ret_from_fork+0x116/0x1d0 [ 15.779428] ret_from_fork_asm+0x1a/0x30 [ 15.779582] [ 15.779659] The buggy address belongs to the object at ffff888103991d00 [ 15.779659] which belongs to the cache kmalloc-64 of size 64 [ 15.780016] The buggy address is located 0 bytes to the right of [ 15.780016] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.780445] [ 15.780550] The buggy address belongs to the physical page: [ 15.780776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.781112] flags: 0x200000000000000(node=0|zone=2) [ 15.781292] page_type: f5(slab) [ 15.781463] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.781819] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.782098] page dumped because: kasan: bad access detected [ 15.782381] [ 15.782479] Memory state around the buggy address: [ 15.782713] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.782993] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.783291] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.783565] ^ [ 15.783773] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.784049] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.784280] ================================================================== [ 15.980724] ================================================================== [ 15.981308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 15.981621] Read of size 8 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.981919] [ 15.982039] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.982088] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.982101] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.982126] Call Trace: [ 15.982149] <TASK> [ 15.982171] dump_stack_lvl+0x73/0xb0 [ 15.982202] print_report+0xd1/0x650 [ 15.982238] ? __virt_addr_valid+0x1db/0x2d0 [ 15.982263] ? kasan_atomics_helper+0x5115/0x5450 [ 15.982284] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.982307] ? kasan_atomics_helper+0x5115/0x5450 [ 15.982329] kasan_report+0x141/0x180 [ 15.982350] ? kasan_atomics_helper+0x5115/0x5450 [ 15.982377] __asan_report_load8_noabort+0x18/0x20 [ 15.982403] kasan_atomics_helper+0x5115/0x5450 [ 15.982426] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.982449] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.982475] ? ret_from_fork_asm+0x1a/0x30 [ 15.982497] ? kasan_atomics+0x152/0x310 [ 15.982524] kasan_atomics+0x1dc/0x310 [ 15.982547] ? __pfx_kasan_atomics+0x10/0x10 [ 15.982570] ? __pfx_read_tsc+0x10/0x10 [ 15.982592] ? ktime_get_ts64+0x86/0x230 [ 15.982616] kunit_try_run_case+0x1a5/0x480 [ 15.982642] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.982664] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.982688] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.982711] ? __kthread_parkme+0x82/0x180 [ 15.982732] ? preempt_count_sub+0x50/0x80 [ 15.982770] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.982796] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.982820] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.982843] kthread+0x337/0x6f0 [ 15.982864] ? trace_preempt_on+0x20/0xc0 [ 15.982887] ? __pfx_kthread+0x10/0x10 [ 15.982907] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.982929] ? calculate_sigpending+0x7b/0xa0 [ 15.982954] ? __pfx_kthread+0x10/0x10 [ 15.982979] ret_from_fork+0x116/0x1d0 [ 15.982999] ? __pfx_kthread+0x10/0x10 [ 15.983020] ret_from_fork_asm+0x1a/0x30 [ 15.983051] </TASK> [ 15.983064] [ 15.990773] Allocated by task 282: [ 15.990955] kasan_save_stack+0x45/0x70 [ 15.991168] kasan_save_track+0x18/0x40 [ 15.991316] kasan_save_alloc_info+0x3b/0x50 [ 15.991714] __kasan_kmalloc+0xb7/0xc0 [ 15.991883] __kmalloc_cache_noprof+0x189/0x420 [ 15.992063] kasan_atomics+0x95/0x310 [ 15.992199] kunit_try_run_case+0x1a5/0x480 [ 15.992614] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.992858] kthread+0x337/0x6f0 [ 15.992983] ret_from_fork+0x116/0x1d0 [ 15.993118] ret_from_fork_asm+0x1a/0x30 [ 15.993272] [ 15.993345] The buggy address belongs to the object at ffff888103991d00 [ 15.993345] which belongs to the cache kmalloc-64 of size 64 [ 15.993701] The buggy address is located 0 bytes to the right of [ 15.993701] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.994173] [ 15.994280] The buggy address belongs to the physical page: [ 15.994546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.994901] flags: 0x200000000000000(node=0|zone=2) [ 15.995138] page_type: f5(slab) [ 15.995361] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.995702] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.996033] page dumped because: kasan: bad access detected [ 15.996264] [ 15.996359] Memory state around the buggy address: [ 15.996544] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.996763] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.996990] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.997393] ^ [ 15.997622] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.997943] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.998237] ================================================================== [ 14.881234] ================================================================== [ 14.881549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 14.881905] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282 [ 14.882693] [ 14.882821] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.883286] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.883307] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.883332] Call Trace: [ 14.883356] <TASK> [ 14.883380] dump_stack_lvl+0x73/0xb0 [ 14.883422] print_report+0xd1/0x650 [ 14.883448] ? __virt_addr_valid+0x1db/0x2d0 [ 14.883473] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.883495] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.883517] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.883540] kasan_report+0x141/0x180 [ 14.883562] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.883588] kasan_check_range+0x10c/0x1c0 [ 14.883613] __kasan_check_write+0x18/0x20 [ 14.883633] kasan_atomics_helper+0xa2b/0x5450 [ 14.883655] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.883678] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.883702] ? ret_from_fork_asm+0x1a/0x30 [ 14.883726] ? kasan_atomics+0x152/0x310 [ 14.883753] kasan_atomics+0x1dc/0x310 [ 14.883776] ? __pfx_kasan_atomics+0x10/0x10 [ 14.883799] ? __pfx_read_tsc+0x10/0x10 [ 14.883821] ? ktime_get_ts64+0x86/0x230 [ 14.883846] kunit_try_run_case+0x1a5/0x480 [ 14.883872] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.883894] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.883919] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.883941] ? __kthread_parkme+0x82/0x180 [ 14.883963] ? preempt_count_sub+0x50/0x80 [ 14.883987] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.884011] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.884035] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.884058] kthread+0x337/0x6f0 [ 14.884077] ? trace_preempt_on+0x20/0xc0 [ 14.884104] ? __pfx_kthread+0x10/0x10 [ 14.884125] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.884147] ? calculate_sigpending+0x7b/0xa0 [ 14.884171] ? __pfx_kthread+0x10/0x10 [ 14.884193] ret_from_fork+0x116/0x1d0 [ 14.884214] ? __pfx_kthread+0x10/0x10 [ 14.884246] ret_from_fork_asm+0x1a/0x30 [ 14.884277] </TASK> [ 14.884290] [ 14.895404] Allocated by task 282: [ 14.895642] kasan_save_stack+0x45/0x70 [ 14.896142] kasan_save_track+0x18/0x40 [ 14.896504] kasan_save_alloc_info+0x3b/0x50 [ 14.896704] __kasan_kmalloc+0xb7/0xc0 [ 14.896851] __kmalloc_cache_noprof+0x189/0x420 [ 14.897010] kasan_atomics+0x95/0x310 [ 14.897212] kunit_try_run_case+0x1a5/0x480 [ 14.897650] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.898236] kthread+0x337/0x6f0 [ 14.898507] ret_from_fork+0x116/0x1d0 [ 14.898711] ret_from_fork_asm+0x1a/0x30 [ 14.898933] [ 14.899266] The buggy address belongs to the object at ffff888103991d00 [ 14.899266] which belongs to the cache kmalloc-64 of size 64 [ 14.899955] The buggy address is located 0 bytes to the right of [ 14.899955] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 14.900718] [ 14.900813] The buggy address belongs to the physical page: [ 14.901053] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 14.901493] flags: 0x200000000000000(node=0|zone=2) [ 14.901741] page_type: f5(slab) [ 14.901912] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.902283] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.902516] page dumped because: kasan: bad access detected [ 14.903770] [ 14.903897] Memory state around the buggy address: [ 14.904114] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.904367] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.905640] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.905889] ^ [ 14.906054] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.906295] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.906510] ================================================================== [ 15.747024] ================================================================== [ 15.747297] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 15.747800] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.748239] [ 15.748370] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.748420] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.748434] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.748458] Call Trace: [ 15.748479] <TASK> [ 15.748501] dump_stack_lvl+0x73/0xb0 [ 15.748531] print_report+0xd1/0x650 [ 15.748554] ? __virt_addr_valid+0x1db/0x2d0 [ 15.748577] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.748601] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.748624] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.748646] kasan_report+0x141/0x180 [ 15.748668] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.748694] kasan_check_range+0x10c/0x1c0 [ 15.748718] __kasan_check_write+0x18/0x20 [ 15.748737] kasan_atomics_helper+0x1e12/0x5450 [ 15.748760] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.748783] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.748817] ? ret_from_fork_asm+0x1a/0x30 [ 15.748839] ? kasan_atomics+0x152/0x310 [ 15.748866] kasan_atomics+0x1dc/0x310 [ 15.748889] ? __pfx_kasan_atomics+0x10/0x10 [ 15.748914] ? __pfx_read_tsc+0x10/0x10 [ 15.748936] ? ktime_get_ts64+0x86/0x230 [ 15.748961] kunit_try_run_case+0x1a5/0x480 [ 15.748987] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.749009] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.749033] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.749057] ? __kthread_parkme+0x82/0x180 [ 15.749079] ? preempt_count_sub+0x50/0x80 [ 15.749103] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.749127] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.749150] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.749173] kthread+0x337/0x6f0 [ 15.749193] ? trace_preempt_on+0x20/0xc0 [ 15.749228] ? __pfx_kthread+0x10/0x10 [ 15.749249] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.749271] ? calculate_sigpending+0x7b/0xa0 [ 15.749306] ? __pfx_kthread+0x10/0x10 [ 15.749328] ret_from_fork+0x116/0x1d0 [ 15.749346] ? __pfx_kthread+0x10/0x10 [ 15.749367] ret_from_fork_asm+0x1a/0x30 [ 15.749398] </TASK> [ 15.749409] [ 15.756723] Allocated by task 282: [ 15.756930] kasan_save_stack+0x45/0x70 [ 15.757140] kasan_save_track+0x18/0x40 [ 15.757342] kasan_save_alloc_info+0x3b/0x50 [ 15.757527] __kasan_kmalloc+0xb7/0xc0 [ 15.757661] __kmalloc_cache_noprof+0x189/0x420 [ 15.757816] kasan_atomics+0x95/0x310 [ 15.758023] kunit_try_run_case+0x1a5/0x480 [ 15.758246] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.758525] kthread+0x337/0x6f0 [ 15.758704] ret_from_fork+0x116/0x1d0 [ 15.758847] ret_from_fork_asm+0x1a/0x30 [ 15.758988] [ 15.759061] The buggy address belongs to the object at ffff888103991d00 [ 15.759061] which belongs to the cache kmalloc-64 of size 64 [ 15.759598] The buggy address is located 0 bytes to the right of [ 15.759598] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.760147] [ 15.760258] The buggy address belongs to the physical page: [ 15.760478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.760722] flags: 0x200000000000000(node=0|zone=2) [ 15.760896] page_type: f5(slab) [ 15.761074] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.761593] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.761941] page dumped because: kasan: bad access detected [ 15.762216] [ 15.762358] Memory state around the buggy address: [ 15.762559] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.762809] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.763027] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.763331] ^ [ 15.763560] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.763992] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.764215] ================================================================== [ 15.464805] ================================================================== [ 15.465176] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 15.466061] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.466440] [ 15.466578] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.466630] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.466644] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.466669] Call Trace: [ 15.466691] <TASK> [ 15.466713] dump_stack_lvl+0x73/0xb0 [ 15.466745] print_report+0xd1/0x650 [ 15.466769] ? __virt_addr_valid+0x1db/0x2d0 [ 15.466794] ? kasan_atomics_helper+0x164f/0x5450 [ 15.466816] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.466839] ? kasan_atomics_helper+0x164f/0x5450 [ 15.466861] kasan_report+0x141/0x180 [ 15.466884] ? kasan_atomics_helper+0x164f/0x5450 [ 15.466911] kasan_check_range+0x10c/0x1c0 [ 15.466934] __kasan_check_write+0x18/0x20 [ 15.466954] kasan_atomics_helper+0x164f/0x5450 [ 15.466977] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.466999] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.467024] ? ret_from_fork_asm+0x1a/0x30 [ 15.467047] ? kasan_atomics+0x152/0x310 [ 15.467073] kasan_atomics+0x1dc/0x310 [ 15.467096] ? __pfx_kasan_atomics+0x10/0x10 [ 15.467121] ? __pfx_read_tsc+0x10/0x10 [ 15.467143] ? ktime_get_ts64+0x86/0x230 [ 15.467169] kunit_try_run_case+0x1a5/0x480 [ 15.467194] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.467227] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.467251] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.467275] ? __kthread_parkme+0x82/0x180 [ 15.467297] ? preempt_count_sub+0x50/0x80 [ 15.467321] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.467345] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.467377] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.467401] kthread+0x337/0x6f0 [ 15.467421] ? trace_preempt_on+0x20/0xc0 [ 15.467444] ? __pfx_kthread+0x10/0x10 [ 15.467465] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.467486] ? calculate_sigpending+0x7b/0xa0 [ 15.467509] ? __pfx_kthread+0x10/0x10 [ 15.467532] ret_from_fork+0x116/0x1d0 [ 15.467550] ? __pfx_kthread+0x10/0x10 [ 15.467571] ret_from_fork_asm+0x1a/0x30 [ 15.467601] </TASK> [ 15.467614] [ 15.475042] Allocated by task 282: [ 15.475257] kasan_save_stack+0x45/0x70 [ 15.475468] kasan_save_track+0x18/0x40 [ 15.475659] kasan_save_alloc_info+0x3b/0x50 [ 15.475937] __kasan_kmalloc+0xb7/0xc0 [ 15.476087] __kmalloc_cache_noprof+0x189/0x420 [ 15.476254] kasan_atomics+0x95/0x310 [ 15.476446] kunit_try_run_case+0x1a5/0x480 [ 15.476661] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.476909] kthread+0x337/0x6f0 [ 15.477044] ret_from_fork+0x116/0x1d0 [ 15.477177] ret_from_fork_asm+0x1a/0x30 [ 15.477511] [ 15.477613] The buggy address belongs to the object at ffff888103991d00 [ 15.477613] which belongs to the cache kmalloc-64 of size 64 [ 15.478055] The buggy address is located 0 bytes to the right of [ 15.478055] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.478441] [ 15.478520] The buggy address belongs to the physical page: [ 15.478942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.479356] flags: 0x200000000000000(node=0|zone=2) [ 15.479593] page_type: f5(slab) [ 15.479764] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.480104] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.480494] page dumped because: kasan: bad access detected [ 15.480721] [ 15.480820] Memory state around the buggy address: [ 15.480999] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.481229] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.481477] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.481813] ^ [ 15.482039] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.482388] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.482725] ================================================================== [ 15.502807] ================================================================== [ 15.503333] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 15.503681] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.503993] [ 15.504141] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.504193] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.504207] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.504240] Call Trace: [ 15.504288] <TASK> [ 15.504311] dump_stack_lvl+0x73/0xb0 [ 15.504354] print_report+0xd1/0x650 [ 15.504379] ? __virt_addr_valid+0x1db/0x2d0 [ 15.504404] ? kasan_atomics_helper+0x177f/0x5450 [ 15.504426] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.504459] ? kasan_atomics_helper+0x177f/0x5450 [ 15.504482] kasan_report+0x141/0x180 [ 15.504505] ? kasan_atomics_helper+0x177f/0x5450 [ 15.504542] kasan_check_range+0x10c/0x1c0 [ 15.504566] __kasan_check_write+0x18/0x20 [ 15.504585] kasan_atomics_helper+0x177f/0x5450 [ 15.504617] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.504640] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.504666] ? ret_from_fork_asm+0x1a/0x30 [ 15.504700] ? kasan_atomics+0x152/0x310 [ 15.504729] kasan_atomics+0x1dc/0x310 [ 15.504751] ? __pfx_kasan_atomics+0x10/0x10 [ 15.504777] ? __pfx_read_tsc+0x10/0x10 [ 15.504807] ? ktime_get_ts64+0x86/0x230 [ 15.504833] kunit_try_run_case+0x1a5/0x480 [ 15.504859] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.504883] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.504908] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.504931] ? __kthread_parkme+0x82/0x180 [ 15.504953] ? preempt_count_sub+0x50/0x80 [ 15.504977] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.505001] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.505025] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.505049] kthread+0x337/0x6f0 [ 15.505070] ? trace_preempt_on+0x20/0xc0 [ 15.505094] ? __pfx_kthread+0x10/0x10 [ 15.505116] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.505137] ? calculate_sigpending+0x7b/0xa0 [ 15.505162] ? __pfx_kthread+0x10/0x10 [ 15.505184] ret_from_fork+0x116/0x1d0 [ 15.505203] ? __pfx_kthread+0x10/0x10 [ 15.505233] ret_from_fork_asm+0x1a/0x30 [ 15.505292] </TASK> [ 15.505306] [ 15.513088] Allocated by task 282: [ 15.513322] kasan_save_stack+0x45/0x70 [ 15.513532] kasan_save_track+0x18/0x40 [ 15.513731] kasan_save_alloc_info+0x3b/0x50 [ 15.513896] __kasan_kmalloc+0xb7/0xc0 [ 15.514030] __kmalloc_cache_noprof+0x189/0x420 [ 15.514186] kasan_atomics+0x95/0x310 [ 15.514424] kunit_try_run_case+0x1a5/0x480 [ 15.514637] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.514903] kthread+0x337/0x6f0 [ 15.515097] ret_from_fork+0x116/0x1d0 [ 15.515359] ret_from_fork_asm+0x1a/0x30 [ 15.515596] [ 15.515670] The buggy address belongs to the object at ffff888103991d00 [ 15.515670] which belongs to the cache kmalloc-64 of size 64 [ 15.516146] The buggy address is located 0 bytes to the right of [ 15.516146] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.516518] [ 15.516594] The buggy address belongs to the physical page: [ 15.516846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.517263] flags: 0x200000000000000(node=0|zone=2) [ 15.517501] page_type: f5(slab) [ 15.517670] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.518005] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.518349] page dumped because: kasan: bad access detected [ 15.518614] [ 15.518689] Memory state around the buggy address: [ 15.518848] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.519070] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.519429] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.519791] ^ [ 15.520058] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.520385] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.520713] ================================================================== [ 15.880361] ================================================================== [ 15.880733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 15.881122] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.881621] [ 15.881745] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.881794] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.881807] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.881831] Call Trace: [ 15.881854] <TASK> [ 15.881875] dump_stack_lvl+0x73/0xb0 [ 15.881907] print_report+0xd1/0x650 [ 15.881931] ? __virt_addr_valid+0x1db/0x2d0 [ 15.881954] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.881976] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.881999] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.882021] kasan_report+0x141/0x180 [ 15.882043] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.882069] kasan_check_range+0x10c/0x1c0 [ 15.882092] __kasan_check_write+0x18/0x20 [ 15.882112] kasan_atomics_helper+0x20c8/0x5450 [ 15.882146] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.882169] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.882193] ? ret_from_fork_asm+0x1a/0x30 [ 15.882237] ? kasan_atomics+0x152/0x310 [ 15.882263] kasan_atomics+0x1dc/0x310 [ 15.882286] ? __pfx_kasan_atomics+0x10/0x10 [ 15.882310] ? __pfx_read_tsc+0x10/0x10 [ 15.882331] ? ktime_get_ts64+0x86/0x230 [ 15.882356] kunit_try_run_case+0x1a5/0x480 [ 15.882381] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.882404] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.882428] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.882451] ? __kthread_parkme+0x82/0x180 [ 15.882472] ? preempt_count_sub+0x50/0x80 [ 15.882495] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.882519] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.882542] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.882566] kthread+0x337/0x6f0 [ 15.882585] ? trace_preempt_on+0x20/0xc0 [ 15.882610] ? __pfx_kthread+0x10/0x10 [ 15.882631] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.882653] ? calculate_sigpending+0x7b/0xa0 [ 15.882677] ? __pfx_kthread+0x10/0x10 [ 15.882699] ret_from_fork+0x116/0x1d0 [ 15.882718] ? __pfx_kthread+0x10/0x10 [ 15.882738] ret_from_fork_asm+0x1a/0x30 [ 15.882768] </TASK> [ 15.882781] [ 15.890867] Allocated by task 282: [ 15.891128] kasan_save_stack+0x45/0x70 [ 15.891403] kasan_save_track+0x18/0x40 [ 15.891589] kasan_save_alloc_info+0x3b/0x50 [ 15.891740] __kasan_kmalloc+0xb7/0xc0 [ 15.891875] __kmalloc_cache_noprof+0x189/0x420 [ 15.892090] kasan_atomics+0x95/0x310 [ 15.892294] kunit_try_run_case+0x1a5/0x480 [ 15.892501] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.892762] kthread+0x337/0x6f0 [ 15.892937] ret_from_fork+0x116/0x1d0 [ 15.893076] ret_from_fork_asm+0x1a/0x30 [ 15.893229] [ 15.893401] The buggy address belongs to the object at ffff888103991d00 [ 15.893401] which belongs to the cache kmalloc-64 of size 64 [ 15.893932] The buggy address is located 0 bytes to the right of [ 15.893932] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.894553] [ 15.894676] The buggy address belongs to the physical page: [ 15.894867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.895237] flags: 0x200000000000000(node=0|zone=2) [ 15.895500] page_type: f5(slab) [ 15.895669] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.896003] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.896240] page dumped because: kasan: bad access detected [ 15.896533] [ 15.896628] Memory state around the buggy address: [ 15.896829] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.897050] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.897536] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.897884] ^ [ 15.898102] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.898443] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.898748] ================================================================== [ 15.327649] ================================================================== [ 15.328210] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 15.328727] Read of size 8 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.328955] [ 15.329352] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.329447] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.329462] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.329497] Call Trace: [ 15.329521] <TASK> [ 15.329544] dump_stack_lvl+0x73/0xb0 [ 15.329577] print_report+0xd1/0x650 [ 15.329602] ? __virt_addr_valid+0x1db/0x2d0 [ 15.329690] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.329713] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.329754] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.329775] kasan_report+0x141/0x180 [ 15.329797] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.329824] kasan_check_range+0x10c/0x1c0 [ 15.329848] __kasan_check_read+0x15/0x20 [ 15.329866] kasan_atomics_helper+0x13b5/0x5450 [ 15.329890] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.329913] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.329938] ? ret_from_fork_asm+0x1a/0x30 [ 15.329961] ? kasan_atomics+0x152/0x310 [ 15.329988] kasan_atomics+0x1dc/0x310 [ 15.330010] ? __pfx_kasan_atomics+0x10/0x10 [ 15.330034] ? __pfx_read_tsc+0x10/0x10 [ 15.330056] ? ktime_get_ts64+0x86/0x230 [ 15.330082] kunit_try_run_case+0x1a5/0x480 [ 15.330108] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.330130] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.330154] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.330177] ? __kthread_parkme+0x82/0x180 [ 15.330199] ? preempt_count_sub+0x50/0x80 [ 15.330233] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.330278] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.330301] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.330325] kthread+0x337/0x6f0 [ 15.330345] ? trace_preempt_on+0x20/0xc0 [ 15.330369] ? __pfx_kthread+0x10/0x10 [ 15.330390] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.330411] ? calculate_sigpending+0x7b/0xa0 [ 15.330436] ? __pfx_kthread+0x10/0x10 [ 15.330458] ret_from_fork+0x116/0x1d0 [ 15.330476] ? __pfx_kthread+0x10/0x10 [ 15.330497] ret_from_fork_asm+0x1a/0x30 [ 15.330527] </TASK> [ 15.330540] [ 15.343391] Allocated by task 282: [ 15.343770] kasan_save_stack+0x45/0x70 [ 15.344162] kasan_save_track+0x18/0x40 [ 15.344557] kasan_save_alloc_info+0x3b/0x50 [ 15.344965] __kasan_kmalloc+0xb7/0xc0 [ 15.345351] __kmalloc_cache_noprof+0x189/0x420 [ 15.345768] kasan_atomics+0x95/0x310 [ 15.346120] kunit_try_run_case+0x1a5/0x480 [ 15.346535] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.346933] kthread+0x337/0x6f0 [ 15.347059] ret_from_fork+0x116/0x1d0 [ 15.347192] ret_from_fork_asm+0x1a/0x30 [ 15.347579] [ 15.347755] The buggy address belongs to the object at ffff888103991d00 [ 15.347755] which belongs to the cache kmalloc-64 of size 64 [ 15.348845] The buggy address is located 0 bytes to the right of [ 15.348845] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.349600] [ 15.349679] The buggy address belongs to the physical page: [ 15.350187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.350910] flags: 0x200000000000000(node=0|zone=2) [ 15.351322] page_type: f5(slab) [ 15.351451] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.351685] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.351919] page dumped because: kasan: bad access detected [ 15.352096] [ 15.352168] Memory state around the buggy address: [ 15.352538] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.353157] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.353803] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.354446] ^ [ 15.354872] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.355503] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.356116] ================================================================== [ 15.440137] ================================================================== [ 15.440804] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 15.441664] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.442367] [ 15.442722] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.442784] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.442800] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.442826] Call Trace: [ 15.442848] <TASK> [ 15.442872] dump_stack_lvl+0x73/0xb0 [ 15.442913] print_report+0xd1/0x650 [ 15.442938] ? __virt_addr_valid+0x1db/0x2d0 [ 15.442963] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.442985] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.443008] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.443030] kasan_report+0x141/0x180 [ 15.443052] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.443078] kasan_check_range+0x10c/0x1c0 [ 15.443103] __kasan_check_write+0x18/0x20 [ 15.443124] kasan_atomics_helper+0x15b6/0x5450 [ 15.443149] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.443172] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.443198] ? ret_from_fork_asm+0x1a/0x30 [ 15.443236] ? kasan_atomics+0x152/0x310 [ 15.443265] kasan_atomics+0x1dc/0x310 [ 15.443302] ? __pfx_kasan_atomics+0x10/0x10 [ 15.443328] ? __pfx_read_tsc+0x10/0x10 [ 15.443350] ? ktime_get_ts64+0x86/0x230 [ 15.443375] kunit_try_run_case+0x1a5/0x480 [ 15.443401] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.443424] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.443449] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.443471] ? __kthread_parkme+0x82/0x180 [ 15.443492] ? preempt_count_sub+0x50/0x80 [ 15.443517] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.443545] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.443569] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.443592] kthread+0x337/0x6f0 [ 15.443611] ? trace_preempt_on+0x20/0xc0 [ 15.443635] ? __pfx_kthread+0x10/0x10 [ 15.443656] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.443678] ? calculate_sigpending+0x7b/0xa0 [ 15.443701] ? __pfx_kthread+0x10/0x10 [ 15.443723] ret_from_fork+0x116/0x1d0 [ 15.443742] ? __pfx_kthread+0x10/0x10 [ 15.443763] ret_from_fork_asm+0x1a/0x30 [ 15.443793] </TASK> [ 15.443807] [ 15.454936] Allocated by task 282: [ 15.455245] kasan_save_stack+0x45/0x70 [ 15.455470] kasan_save_track+0x18/0x40 [ 15.455660] kasan_save_alloc_info+0x3b/0x50 [ 15.455852] __kasan_kmalloc+0xb7/0xc0 [ 15.456007] __kmalloc_cache_noprof+0x189/0x420 [ 15.456206] kasan_atomics+0x95/0x310 [ 15.456843] kunit_try_run_case+0x1a5/0x480 [ 15.457113] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.457423] kthread+0x337/0x6f0 [ 15.457739] ret_from_fork+0x116/0x1d0 [ 15.457950] ret_from_fork_asm+0x1a/0x30 [ 15.458269] [ 15.458475] The buggy address belongs to the object at ffff888103991d00 [ 15.458475] which belongs to the cache kmalloc-64 of size 64 [ 15.459137] The buggy address is located 0 bytes to the right of [ 15.459137] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.459745] [ 15.459830] The buggy address belongs to the physical page: [ 15.460089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.460506] flags: 0x200000000000000(node=0|zone=2) [ 15.460725] page_type: f5(slab) [ 15.460902] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.461191] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.461430] page dumped because: kasan: bad access detected [ 15.461859] [ 15.461978] Memory state around the buggy address: [ 15.462207] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.462598] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.462944] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.463246] ^ [ 15.463444] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.463654] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.463953] ================================================================== [ 14.606950] ================================================================== [ 14.607708] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 14.608077] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282 [ 14.608436] [ 14.608555] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.608604] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.608617] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.608641] Call Trace: [ 14.608664] <TASK> [ 14.608685] dump_stack_lvl+0x73/0xb0 [ 14.608718] print_report+0xd1/0x650 [ 14.608741] ? __virt_addr_valid+0x1db/0x2d0 [ 14.608766] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.608796] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.608819] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.608841] kasan_report+0x141/0x180 [ 14.608865] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.608890] kasan_check_range+0x10c/0x1c0 [ 14.608915] __kasan_check_write+0x18/0x20 [ 14.608936] kasan_atomics_helper+0x4a0/0x5450 [ 14.608959] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.608981] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.609006] ? ret_from_fork_asm+0x1a/0x30 [ 14.609029] ? kasan_atomics+0x152/0x310 [ 14.609055] kasan_atomics+0x1dc/0x310 [ 14.609078] ? __pfx_kasan_atomics+0x10/0x10 [ 14.609103] ? __pfx_read_tsc+0x10/0x10 [ 14.609124] ? ktime_get_ts64+0x86/0x230 [ 14.609149] kunit_try_run_case+0x1a5/0x480 [ 14.609174] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.609197] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.609232] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.609257] ? __kthread_parkme+0x82/0x180 [ 14.609278] ? preempt_count_sub+0x50/0x80 [ 14.609302] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.609326] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.609348] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.609371] kthread+0x337/0x6f0 [ 14.609392] ? trace_preempt_on+0x20/0xc0 [ 14.609418] ? __pfx_kthread+0x10/0x10 [ 14.609438] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.609460] ? calculate_sigpending+0x7b/0xa0 [ 14.609485] ? __pfx_kthread+0x10/0x10 [ 14.609506] ret_from_fork+0x116/0x1d0 [ 14.609525] ? __pfx_kthread+0x10/0x10 [ 14.609547] ret_from_fork_asm+0x1a/0x30 [ 14.609577] </TASK> [ 14.609591] [ 14.618427] Allocated by task 282: [ 14.618779] kasan_save_stack+0x45/0x70 [ 14.619037] kasan_save_track+0x18/0x40 [ 14.619177] kasan_save_alloc_info+0x3b/0x50 [ 14.619794] __kasan_kmalloc+0xb7/0xc0 [ 14.620003] __kmalloc_cache_noprof+0x189/0x420 [ 14.620289] kasan_atomics+0x95/0x310 [ 14.620472] kunit_try_run_case+0x1a5/0x480 [ 14.620624] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.620808] kthread+0x337/0x6f0 [ 14.620965] ret_from_fork+0x116/0x1d0 [ 14.621158] ret_from_fork_asm+0x1a/0x30 [ 14.621376] [ 14.621478] The buggy address belongs to the object at ffff888103991d00 [ 14.621478] which belongs to the cache kmalloc-64 of size 64 [ 14.622165] The buggy address is located 0 bytes to the right of [ 14.622165] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 14.622542] [ 14.622725] The buggy address belongs to the physical page: [ 14.623113] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 14.623555] flags: 0x200000000000000(node=0|zone=2) [ 14.623723] page_type: f5(slab) [ 14.623847] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.624078] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.624714] page dumped because: kasan: bad access detected [ 14.624988] [ 14.625087] Memory state around the buggy address: [ 14.625336] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.625663] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.626010] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.626243] ^ [ 14.626950] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.627590] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.627834] ================================================================== [ 14.977564] ================================================================== [ 14.977836] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 14.978150] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282 [ 14.979125] [ 14.979280] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.979332] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.979346] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.979370] Call Trace: [ 14.979385] <TASK> [ 14.979406] dump_stack_lvl+0x73/0xb0 [ 14.979442] print_report+0xd1/0x650 [ 14.979467] ? __virt_addr_valid+0x1db/0x2d0 [ 14.979491] ? kasan_atomics_helper+0xc70/0x5450 [ 14.979513] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.979535] ? kasan_atomics_helper+0xc70/0x5450 [ 14.979556] kasan_report+0x141/0x180 [ 14.979579] ? kasan_atomics_helper+0xc70/0x5450 [ 14.979604] kasan_check_range+0x10c/0x1c0 [ 14.979628] __kasan_check_write+0x18/0x20 [ 14.979649] kasan_atomics_helper+0xc70/0x5450 [ 14.979672] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.979693] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.979718] ? ret_from_fork_asm+0x1a/0x30 [ 14.979741] ? kasan_atomics+0x152/0x310 [ 14.979766] kasan_atomics+0x1dc/0x310 [ 14.979789] ? __pfx_kasan_atomics+0x10/0x10 [ 14.979814] ? __pfx_read_tsc+0x10/0x10 [ 14.979835] ? ktime_get_ts64+0x86/0x230 [ 14.979860] kunit_try_run_case+0x1a5/0x480 [ 14.979885] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.979907] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.979931] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.979955] ? __kthread_parkme+0x82/0x180 [ 14.979976] ? preempt_count_sub+0x50/0x80 [ 14.980000] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.980024] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.980047] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.980070] kthread+0x337/0x6f0 [ 14.980089] ? trace_preempt_on+0x20/0xc0 [ 14.980113] ? __pfx_kthread+0x10/0x10 [ 14.980134] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.980155] ? calculate_sigpending+0x7b/0xa0 [ 14.980179] ? __pfx_kthread+0x10/0x10 [ 14.980201] ret_from_fork+0x116/0x1d0 [ 14.980231] ? __pfx_kthread+0x10/0x10 [ 14.980253] ret_from_fork_asm+0x1a/0x30 [ 14.980300] </TASK> [ 14.980313] [ 14.987671] Allocated by task 282: [ 14.987872] kasan_save_stack+0x45/0x70 [ 14.988023] kasan_save_track+0x18/0x40 [ 14.988214] kasan_save_alloc_info+0x3b/0x50 [ 14.988621] __kasan_kmalloc+0xb7/0xc0 [ 14.988794] __kmalloc_cache_noprof+0x189/0x420 [ 14.989012] kasan_atomics+0x95/0x310 [ 14.989182] kunit_try_run_case+0x1a5/0x480 [ 14.989346] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.989597] kthread+0x337/0x6f0 [ 14.989762] ret_from_fork+0x116/0x1d0 [ 14.989892] ret_from_fork_asm+0x1a/0x30 [ 14.990056] [ 14.990153] The buggy address belongs to the object at ffff888103991d00 [ 14.990153] which belongs to the cache kmalloc-64 of size 64 [ 14.990786] The buggy address is located 0 bytes to the right of [ 14.990786] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 14.991348] [ 14.991423] The buggy address belongs to the physical page: [ 14.991650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 14.992007] flags: 0x200000000000000(node=0|zone=2) [ 14.992170] page_type: f5(slab) [ 14.992329] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.992666] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.993005] page dumped because: kasan: bad access detected [ 14.993172] [ 14.993253] Memory state around the buggy address: [ 14.993483] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.993801] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.994128] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.994416] ^ [ 14.994570] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.994786] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.994995] ================================================================== [ 15.289601] ================================================================== [ 15.289967] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 15.290335] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.290588] [ 15.290681] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.290729] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.290742] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.290768] Call Trace: [ 15.290791] <TASK> [ 15.290813] dump_stack_lvl+0x73/0xb0 [ 15.290845] print_report+0xd1/0x650 [ 15.290884] ? __virt_addr_valid+0x1db/0x2d0 [ 15.290907] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.290929] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.290953] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.290975] kasan_report+0x141/0x180 [ 15.290998] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.291024] kasan_check_range+0x10c/0x1c0 [ 15.291048] __kasan_check_write+0x18/0x20 [ 15.291068] kasan_atomics_helper+0x12e6/0x5450 [ 15.291091] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.291114] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.291138] ? ret_from_fork_asm+0x1a/0x30 [ 15.291161] ? kasan_atomics+0x152/0x310 [ 15.291188] kasan_atomics+0x1dc/0x310 [ 15.291211] ? __pfx_kasan_atomics+0x10/0x10 [ 15.291248] ? __pfx_read_tsc+0x10/0x10 [ 15.291270] ? ktime_get_ts64+0x86/0x230 [ 15.291294] kunit_try_run_case+0x1a5/0x480 [ 15.291320] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.291343] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.291368] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.291391] ? __kthread_parkme+0x82/0x180 [ 15.291412] ? preempt_count_sub+0x50/0x80 [ 15.291438] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.291462] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.291498] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.291522] kthread+0x337/0x6f0 [ 15.291543] ? trace_preempt_on+0x20/0xc0 [ 15.291567] ? __pfx_kthread+0x10/0x10 [ 15.291587] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.291609] ? calculate_sigpending+0x7b/0xa0 [ 15.291634] ? __pfx_kthread+0x10/0x10 [ 15.291656] ret_from_fork+0x116/0x1d0 [ 15.291675] ? __pfx_kthread+0x10/0x10 [ 15.291696] ret_from_fork_asm+0x1a/0x30 [ 15.291727] </TASK> [ 15.291741] [ 15.299801] Allocated by task 282: [ 15.300001] kasan_save_stack+0x45/0x70 [ 15.300229] kasan_save_track+0x18/0x40 [ 15.300651] kasan_save_alloc_info+0x3b/0x50 [ 15.300815] __kasan_kmalloc+0xb7/0xc0 [ 15.300985] __kmalloc_cache_noprof+0x189/0x420 [ 15.301209] kasan_atomics+0x95/0x310 [ 15.301468] kunit_try_run_case+0x1a5/0x480 [ 15.301663] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.301851] kthread+0x337/0x6f0 [ 15.301976] ret_from_fork+0x116/0x1d0 [ 15.302111] ret_from_fork_asm+0x1a/0x30 [ 15.302277] [ 15.302376] The buggy address belongs to the object at ffff888103991d00 [ 15.302376] which belongs to the cache kmalloc-64 of size 64 [ 15.302962] The buggy address is located 0 bytes to the right of [ 15.302962] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.303466] [ 15.303543] The buggy address belongs to the physical page: [ 15.304050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.304417] flags: 0x200000000000000(node=0|zone=2) [ 15.304640] page_type: f5(slab) [ 15.304817] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.305135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.305527] page dumped because: kasan: bad access detected [ 15.305758] [ 15.305839] Memory state around the buggy address: [ 15.306062] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.306370] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.306667] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.306984] ^ [ 15.307176] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.307405] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.307622] ================================================================== [ 15.308136] ================================================================== [ 15.308903] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 15.309261] Read of size 4 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.309486] [ 15.309578] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.309626] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.309640] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.309663] Call Trace: [ 15.309685] <TASK> [ 15.309708] dump_stack_lvl+0x73/0xb0 [ 15.309737] print_report+0xd1/0x650 [ 15.309761] ? __virt_addr_valid+0x1db/0x2d0 [ 15.309785] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.309807] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.309829] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.309852] kasan_report+0x141/0x180 [ 15.309874] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.309900] __asan_report_load4_noabort+0x18/0x20 [ 15.309925] kasan_atomics_helper+0x49ce/0x5450 [ 15.309948] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.309969] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.309995] ? ret_from_fork_asm+0x1a/0x30 [ 15.310019] ? kasan_atomics+0x152/0x310 [ 15.310046] kasan_atomics+0x1dc/0x310 [ 15.310069] ? __pfx_kasan_atomics+0x10/0x10 [ 15.310093] ? __pfx_read_tsc+0x10/0x10 [ 15.310125] ? ktime_get_ts64+0x86/0x230 [ 15.310150] kunit_try_run_case+0x1a5/0x480 [ 15.310176] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.310198] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.310235] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.310271] ? __kthread_parkme+0x82/0x180 [ 15.310293] ? preempt_count_sub+0x50/0x80 [ 15.310317] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.310341] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.310365] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.310390] kthread+0x337/0x6f0 [ 15.310413] ? trace_preempt_on+0x20/0xc0 [ 15.310439] ? __pfx_kthread+0x10/0x10 [ 15.310461] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.310483] ? calculate_sigpending+0x7b/0xa0 [ 15.310508] ? __pfx_kthread+0x10/0x10 [ 15.310531] ret_from_fork+0x116/0x1d0 [ 15.310551] ? __pfx_kthread+0x10/0x10 [ 15.310572] ret_from_fork_asm+0x1a/0x30 [ 15.310604] </TASK> [ 15.310616] [ 15.318448] Allocated by task 282: [ 15.318662] kasan_save_stack+0x45/0x70 [ 15.318872] kasan_save_track+0x18/0x40 [ 15.319043] kasan_save_alloc_info+0x3b/0x50 [ 15.319254] __kasan_kmalloc+0xb7/0xc0 [ 15.319428] __kmalloc_cache_noprof+0x189/0x420 [ 15.319644] kasan_atomics+0x95/0x310 [ 15.319816] kunit_try_run_case+0x1a5/0x480 [ 15.320023] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.320239] kthread+0x337/0x6f0 [ 15.320415] ret_from_fork+0x116/0x1d0 [ 15.320597] ret_from_fork_asm+0x1a/0x30 [ 15.320772] [ 15.320874] The buggy address belongs to the object at ffff888103991d00 [ 15.320874] which belongs to the cache kmalloc-64 of size 64 [ 15.321291] The buggy address is located 0 bytes to the right of [ 15.321291] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.321838] [ 15.321926] The buggy address belongs to the physical page: [ 15.322168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.322477] flags: 0x200000000000000(node=0|zone=2) [ 15.322647] page_type: f5(slab) [ 15.322774] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.323007] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.323249] page dumped because: kasan: bad access detected [ 15.323625] [ 15.323740] Memory state around the buggy address: [ 15.323966] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.324995] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.325280] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.325494] ^ [ 15.325651] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.325863] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.326071] ================================================================== [ 15.626866] ================================================================== [ 15.627382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 15.627830] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.628550] [ 15.628795] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.628957] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.628984] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.629008] Call Trace: [ 15.629037] <TASK> [ 15.629060] dump_stack_lvl+0x73/0xb0 [ 15.629096] print_report+0xd1/0x650 [ 15.629122] ? __virt_addr_valid+0x1db/0x2d0 [ 15.629146] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.629170] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.629193] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.629215] kasan_report+0x141/0x180 [ 15.629254] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.629313] kasan_check_range+0x10c/0x1c0 [ 15.629338] __kasan_check_write+0x18/0x20 [ 15.629358] kasan_atomics_helper+0x1b22/0x5450 [ 15.629382] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.629405] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.629430] ? ret_from_fork_asm+0x1a/0x30 [ 15.629453] ? kasan_atomics+0x152/0x310 [ 15.629479] kasan_atomics+0x1dc/0x310 [ 15.629502] ? __pfx_kasan_atomics+0x10/0x10 [ 15.629526] ? __pfx_read_tsc+0x10/0x10 [ 15.629549] ? ktime_get_ts64+0x86/0x230 [ 15.629574] kunit_try_run_case+0x1a5/0x480 [ 15.629599] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.629621] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.629646] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.629671] ? __kthread_parkme+0x82/0x180 [ 15.629692] ? preempt_count_sub+0x50/0x80 [ 15.629717] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.629742] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.629766] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.629789] kthread+0x337/0x6f0 [ 15.629809] ? trace_preempt_on+0x20/0xc0 [ 15.629832] ? __pfx_kthread+0x10/0x10 [ 15.629853] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.629875] ? calculate_sigpending+0x7b/0xa0 [ 15.629899] ? __pfx_kthread+0x10/0x10 [ 15.629921] ret_from_fork+0x116/0x1d0 [ 15.629940] ? __pfx_kthread+0x10/0x10 [ 15.629960] ret_from_fork_asm+0x1a/0x30 [ 15.629991] </TASK> [ 15.630004] [ 15.642578] Allocated by task 282: [ 15.642790] kasan_save_stack+0x45/0x70 [ 15.642993] kasan_save_track+0x18/0x40 [ 15.643173] kasan_save_alloc_info+0x3b/0x50 [ 15.643734] __kasan_kmalloc+0xb7/0xc0 [ 15.644136] __kmalloc_cache_noprof+0x189/0x420 [ 15.644572] kasan_atomics+0x95/0x310 [ 15.644910] kunit_try_run_case+0x1a5/0x480 [ 15.645119] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.645714] kthread+0x337/0x6f0 [ 15.645971] ret_from_fork+0x116/0x1d0 [ 15.646303] ret_from_fork_asm+0x1a/0x30 [ 15.646510] [ 15.646606] The buggy address belongs to the object at ffff888103991d00 [ 15.646606] which belongs to the cache kmalloc-64 of size 64 [ 15.647089] The buggy address is located 0 bytes to the right of [ 15.647089] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.648048] [ 15.648308] The buggy address belongs to the physical page: [ 15.648761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.649526] flags: 0x200000000000000(node=0|zone=2) [ 15.649768] page_type: f5(slab) [ 15.649932] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.650516] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.650867] page dumped because: kasan: bad access detected [ 15.651097] [ 15.651187] Memory state around the buggy address: [ 15.651872] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.652390] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.652865] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.653161] ^ [ 15.653793] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.654267] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.654720] ================================================================== [ 15.833168] ================================================================== [ 15.833945] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 15.834501] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.835157] [ 15.835265] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.835318] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.835331] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.835356] Call Trace: [ 15.835378] <TASK> [ 15.835401] dump_stack_lvl+0x73/0xb0 [ 15.835437] print_report+0xd1/0x650 [ 15.835461] ? __virt_addr_valid+0x1db/0x2d0 [ 15.835486] ? kasan_atomics_helper+0x2006/0x5450 [ 15.835508] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.835531] ? kasan_atomics_helper+0x2006/0x5450 [ 15.835553] kasan_report+0x141/0x180 [ 15.835575] ? kasan_atomics_helper+0x2006/0x5450 [ 15.835601] kasan_check_range+0x10c/0x1c0 [ 15.835624] __kasan_check_write+0x18/0x20 [ 15.835644] kasan_atomics_helper+0x2006/0x5450 [ 15.835667] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.835688] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.835713] ? ret_from_fork_asm+0x1a/0x30 [ 15.835735] ? kasan_atomics+0x152/0x310 [ 15.835762] kasan_atomics+0x1dc/0x310 [ 15.835785] ? __pfx_kasan_atomics+0x10/0x10 [ 15.835810] ? __pfx_read_tsc+0x10/0x10 [ 15.835831] ? ktime_get_ts64+0x86/0x230 [ 15.835855] kunit_try_run_case+0x1a5/0x480 [ 15.835881] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.835904] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.835928] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.835951] ? __kthread_parkme+0x82/0x180 [ 15.835973] ? preempt_count_sub+0x50/0x80 [ 15.835998] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.836022] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.836045] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.836068] kthread+0x337/0x6f0 [ 15.836087] ? trace_preempt_on+0x20/0xc0 [ 15.836111] ? __pfx_kthread+0x10/0x10 [ 15.836133] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.836154] ? calculate_sigpending+0x7b/0xa0 [ 15.836179] ? __pfx_kthread+0x10/0x10 [ 15.836201] ret_from_fork+0x116/0x1d0 [ 15.836237] ? __pfx_kthread+0x10/0x10 [ 15.836258] ret_from_fork_asm+0x1a/0x30 [ 15.836289] </TASK> [ 15.836301] [ 15.851478] Allocated by task 282: [ 15.851868] kasan_save_stack+0x45/0x70 [ 15.852295] kasan_save_track+0x18/0x40 [ 15.852601] kasan_save_alloc_info+0x3b/0x50 [ 15.852968] __kasan_kmalloc+0xb7/0xc0 [ 15.853105] __kmalloc_cache_noprof+0x189/0x420 [ 15.853296] kasan_atomics+0x95/0x310 [ 15.853649] kunit_try_run_case+0x1a5/0x480 [ 15.854051] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.854591] kthread+0x337/0x6f0 [ 15.854926] ret_from_fork+0x116/0x1d0 [ 15.855349] ret_from_fork_asm+0x1a/0x30 [ 15.855633] [ 15.855816] The buggy address belongs to the object at ffff888103991d00 [ 15.855816] which belongs to the cache kmalloc-64 of size 64 [ 15.856176] The buggy address is located 0 bytes to the right of [ 15.856176] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.856735] [ 15.856864] The buggy address belongs to the physical page: [ 15.857091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.857434] flags: 0x200000000000000(node=0|zone=2) [ 15.857669] page_type: f5(slab) [ 15.857841] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.858131] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.858472] page dumped because: kasan: bad access detected [ 15.858657] [ 15.858754] Memory state around the buggy address: [ 15.858984] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.859233] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.859575] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.859788] ^ [ 15.859967] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.860372] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.860636] ================================================================== [ 15.723432] ================================================================== [ 15.723766] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 15.724096] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.724597] [ 15.724872] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.724928] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.724942] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.724967] Call Trace: [ 15.724989] <TASK> [ 15.725011] dump_stack_lvl+0x73/0xb0 [ 15.725044] print_report+0xd1/0x650 [ 15.725066] ? __virt_addr_valid+0x1db/0x2d0 [ 15.725091] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.725113] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.725135] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.725158] kasan_report+0x141/0x180 [ 15.725180] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.725205] kasan_check_range+0x10c/0x1c0 [ 15.725245] __kasan_check_write+0x18/0x20 [ 15.725334] kasan_atomics_helper+0x1d7a/0x5450 [ 15.725360] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.725383] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.725408] ? ret_from_fork_asm+0x1a/0x30 [ 15.725431] ? kasan_atomics+0x152/0x310 [ 15.725458] kasan_atomics+0x1dc/0x310 [ 15.725480] ? __pfx_kasan_atomics+0x10/0x10 [ 15.725505] ? __pfx_read_tsc+0x10/0x10 [ 15.725526] ? ktime_get_ts64+0x86/0x230 [ 15.725552] kunit_try_run_case+0x1a5/0x480 [ 15.725578] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.725601] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.725624] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.725648] ? __kthread_parkme+0x82/0x180 [ 15.725669] ? preempt_count_sub+0x50/0x80 [ 15.725693] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.725717] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.725740] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.725764] kthread+0x337/0x6f0 [ 15.725784] ? trace_preempt_on+0x20/0xc0 [ 15.725808] ? __pfx_kthread+0x10/0x10 [ 15.725830] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.725850] ? calculate_sigpending+0x7b/0xa0 [ 15.725875] ? __pfx_kthread+0x10/0x10 [ 15.725897] ret_from_fork+0x116/0x1d0 [ 15.725916] ? __pfx_kthread+0x10/0x10 [ 15.725937] ret_from_fork_asm+0x1a/0x30 [ 15.725967] </TASK> [ 15.725979] [ 15.736999] Allocated by task 282: [ 15.737168] kasan_save_stack+0x45/0x70 [ 15.737348] kasan_save_track+0x18/0x40 [ 15.737564] kasan_save_alloc_info+0x3b/0x50 [ 15.738137] __kasan_kmalloc+0xb7/0xc0 [ 15.738340] __kmalloc_cache_noprof+0x189/0x420 [ 15.738686] kasan_atomics+0x95/0x310 [ 15.738833] kunit_try_run_case+0x1a5/0x480 [ 15.739148] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.739435] kthread+0x337/0x6f0 [ 15.739723] ret_from_fork+0x116/0x1d0 [ 15.739885] ret_from_fork_asm+0x1a/0x30 [ 15.740182] [ 15.740295] The buggy address belongs to the object at ffff888103991d00 [ 15.740295] which belongs to the cache kmalloc-64 of size 64 [ 15.740804] The buggy address is located 0 bytes to the right of [ 15.740804] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.741559] [ 15.741660] The buggy address belongs to the physical page: [ 15.741840] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.742358] flags: 0x200000000000000(node=0|zone=2) [ 15.742658] page_type: f5(slab) [ 15.742804] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.743235] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.743623] page dumped because: kasan: bad access detected [ 15.743875] [ 15.744061] Memory state around the buggy address: [ 15.744336] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.744711] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.745027] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.745448] ^ [ 15.745617] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.746072] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.746352] ================================================================== [ 15.201572] ================================================================== [ 15.202016] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 15.202500] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.202830] [ 15.203091] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.203155] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.203169] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.203193] Call Trace: [ 15.203215] <TASK> [ 15.203249] dump_stack_lvl+0x73/0xb0 [ 15.203282] print_report+0xd1/0x650 [ 15.203306] ? __virt_addr_valid+0x1db/0x2d0 [ 15.203331] ? kasan_atomics_helper+0x1148/0x5450 [ 15.203397] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.203457] ? kasan_atomics_helper+0x1148/0x5450 [ 15.203480] kasan_report+0x141/0x180 [ 15.203505] ? kasan_atomics_helper+0x1148/0x5450 [ 15.203533] kasan_check_range+0x10c/0x1c0 [ 15.203557] __kasan_check_write+0x18/0x20 [ 15.203577] kasan_atomics_helper+0x1148/0x5450 [ 15.203600] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.203624] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.203656] ? ret_from_fork_asm+0x1a/0x30 [ 15.203682] ? kasan_atomics+0x152/0x310 [ 15.203709] kasan_atomics+0x1dc/0x310 [ 15.203733] ? __pfx_kasan_atomics+0x10/0x10 [ 15.203760] ? __pfx_read_tsc+0x10/0x10 [ 15.203782] ? ktime_get_ts64+0x86/0x230 [ 15.203807] kunit_try_run_case+0x1a5/0x480 [ 15.203833] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.203857] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.203881] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.203904] ? __kthread_parkme+0x82/0x180 [ 15.203926] ? preempt_count_sub+0x50/0x80 [ 15.203951] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.203974] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.203998] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.204022] kthread+0x337/0x6f0 [ 15.204041] ? trace_preempt_on+0x20/0xc0 [ 15.204065] ? __pfx_kthread+0x10/0x10 [ 15.204085] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.204107] ? calculate_sigpending+0x7b/0xa0 [ 15.204131] ? __pfx_kthread+0x10/0x10 [ 15.204153] ret_from_fork+0x116/0x1d0 [ 15.204173] ? __pfx_kthread+0x10/0x10 [ 15.204194] ret_from_fork_asm+0x1a/0x30 [ 15.204233] </TASK> [ 15.204246] [ 15.213735] Allocated by task 282: [ 15.213944] kasan_save_stack+0x45/0x70 [ 15.214202] kasan_save_track+0x18/0x40 [ 15.214544] kasan_save_alloc_info+0x3b/0x50 [ 15.214766] __kasan_kmalloc+0xb7/0xc0 [ 15.214958] __kmalloc_cache_noprof+0x189/0x420 [ 15.215169] kasan_atomics+0x95/0x310 [ 15.215479] kunit_try_run_case+0x1a5/0x480 [ 15.215695] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.215873] kthread+0x337/0x6f0 [ 15.215997] ret_from_fork+0x116/0x1d0 [ 15.216133] ret_from_fork_asm+0x1a/0x30 [ 15.216384] [ 15.216484] The buggy address belongs to the object at ffff888103991d00 [ 15.216484] which belongs to the cache kmalloc-64 of size 64 [ 15.217038] The buggy address is located 0 bytes to the right of [ 15.217038] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.217678] [ 15.217759] The buggy address belongs to the physical page: [ 15.218053] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.218310] flags: 0x200000000000000(node=0|zone=2) [ 15.218788] page_type: f5(slab) [ 15.218977] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.219261] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.219620] page dumped because: kasan: bad access detected [ 15.219971] [ 15.220111] Memory state around the buggy address: [ 15.220395] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.220633] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.220860] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.221168] ^ [ 15.221406] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.221735] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.222266] ================================================================== [ 15.802841] ================================================================== [ 15.803279] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 15.803657] Read of size 8 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.803992] [ 15.804108] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.804157] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.804170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.804194] Call Trace: [ 15.804240] <TASK> [ 15.804261] dump_stack_lvl+0x73/0xb0 [ 15.804292] print_report+0xd1/0x650 [ 15.804315] ? __virt_addr_valid+0x1db/0x2d0 [ 15.804340] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.804360] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.804383] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.804405] kasan_report+0x141/0x180 [ 15.804438] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.804464] __asan_report_load8_noabort+0x18/0x20 [ 15.804489] kasan_atomics_helper+0x4f71/0x5450 [ 15.804511] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.804534] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.804558] ? ret_from_fork_asm+0x1a/0x30 [ 15.804581] ? kasan_atomics+0x152/0x310 [ 15.804607] kasan_atomics+0x1dc/0x310 [ 15.804629] ? __pfx_kasan_atomics+0x10/0x10 [ 15.804654] ? __pfx_read_tsc+0x10/0x10 [ 15.804676] ? ktime_get_ts64+0x86/0x230 [ 15.804701] kunit_try_run_case+0x1a5/0x480 [ 15.804726] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.804749] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.804774] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.804806] ? __kthread_parkme+0x82/0x180 [ 15.804828] ? preempt_count_sub+0x50/0x80 [ 15.804853] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.804876] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.804899] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.804922] kthread+0x337/0x6f0 [ 15.804942] ? trace_preempt_on+0x20/0xc0 [ 15.804967] ? __pfx_kthread+0x10/0x10 [ 15.804988] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.805019] ? calculate_sigpending+0x7b/0xa0 [ 15.805044] ? __pfx_kthread+0x10/0x10 [ 15.805066] ret_from_fork+0x116/0x1d0 [ 15.805085] ? __pfx_kthread+0x10/0x10 [ 15.805105] ret_from_fork_asm+0x1a/0x30 [ 15.805137] </TASK> [ 15.805149] [ 15.818825] Allocated by task 282: [ 15.819008] kasan_save_stack+0x45/0x70 [ 15.819179] kasan_save_track+0x18/0x40 [ 15.819387] kasan_save_alloc_info+0x3b/0x50 [ 15.819665] __kasan_kmalloc+0xb7/0xc0 [ 15.820658] __kmalloc_cache_noprof+0x189/0x420 [ 15.821033] kasan_atomics+0x95/0x310 [ 15.821195] kunit_try_run_case+0x1a5/0x480 [ 15.821691] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.822121] kthread+0x337/0x6f0 [ 15.822277] ret_from_fork+0x116/0x1d0 [ 15.822688] ret_from_fork_asm+0x1a/0x30 [ 15.823081] [ 15.823256] The buggy address belongs to the object at ffff888103991d00 [ 15.823256] which belongs to the cache kmalloc-64 of size 64 [ 15.823927] The buggy address is located 0 bytes to the right of [ 15.823927] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.824407] [ 15.824613] The buggy address belongs to the physical page: [ 15.825174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.826004] flags: 0x200000000000000(node=0|zone=2) [ 15.826549] page_type: f5(slab) [ 15.826889] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.827624] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.828155] page dumped because: kasan: bad access detected [ 15.828503] [ 15.828724] Memory state around the buggy address: [ 15.829100] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.829381] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.829841] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.830053] ^ [ 15.830208] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.831199] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.831999] ================================================================== [ 15.483580] ================================================================== [ 15.483872] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 15.484422] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.484702] [ 15.484827] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.484876] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.484890] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.484915] Call Trace: [ 15.484937] <TASK> [ 15.484959] dump_stack_lvl+0x73/0xb0 [ 15.484991] print_report+0xd1/0x650 [ 15.485016] ? __virt_addr_valid+0x1db/0x2d0 [ 15.485040] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.485062] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.485085] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.485110] kasan_report+0x141/0x180 [ 15.485133] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.485160] kasan_check_range+0x10c/0x1c0 [ 15.485184] __kasan_check_write+0x18/0x20 [ 15.485204] kasan_atomics_helper+0x16e7/0x5450 [ 15.485239] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.485276] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.485302] ? ret_from_fork_asm+0x1a/0x30 [ 15.485325] ? kasan_atomics+0x152/0x310 [ 15.485352] kasan_atomics+0x1dc/0x310 [ 15.485375] ? __pfx_kasan_atomics+0x10/0x10 [ 15.485399] ? __pfx_read_tsc+0x10/0x10 [ 15.485422] ? ktime_get_ts64+0x86/0x230 [ 15.485447] kunit_try_run_case+0x1a5/0x480 [ 15.485472] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.485495] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.485519] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.485543] ? __kthread_parkme+0x82/0x180 [ 15.485564] ? preempt_count_sub+0x50/0x80 [ 15.485589] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.485613] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.485636] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.485660] kthread+0x337/0x6f0 [ 15.485680] ? trace_preempt_on+0x20/0xc0 [ 15.485704] ? __pfx_kthread+0x10/0x10 [ 15.485725] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.485746] ? calculate_sigpending+0x7b/0xa0 [ 15.485771] ? __pfx_kthread+0x10/0x10 [ 15.485792] ret_from_fork+0x116/0x1d0 [ 15.485812] ? __pfx_kthread+0x10/0x10 [ 15.485832] ret_from_fork_asm+0x1a/0x30 [ 15.485863] </TASK> [ 15.485875] [ 15.493374] Allocated by task 282: [ 15.493545] kasan_save_stack+0x45/0x70 [ 15.493756] kasan_save_track+0x18/0x40 [ 15.493954] kasan_save_alloc_info+0x3b/0x50 [ 15.494130] __kasan_kmalloc+0xb7/0xc0 [ 15.494354] __kmalloc_cache_noprof+0x189/0x420 [ 15.494511] kasan_atomics+0x95/0x310 [ 15.494646] kunit_try_run_case+0x1a5/0x480 [ 15.494792] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.494968] kthread+0x337/0x6f0 [ 15.495089] ret_from_fork+0x116/0x1d0 [ 15.495233] ret_from_fork_asm+0x1a/0x30 [ 15.495431] [ 15.495543] The buggy address belongs to the object at ffff888103991d00 [ 15.495543] which belongs to the cache kmalloc-64 of size 64 [ 15.496074] The buggy address is located 0 bytes to the right of [ 15.496074] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.496624] [ 15.496705] The buggy address belongs to the physical page: [ 15.496891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.497135] flags: 0x200000000000000(node=0|zone=2) [ 15.497843] page_type: f5(slab) [ 15.498538] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.499139] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.499535] page dumped because: kasan: bad access detected [ 15.499789] [ 15.499865] Memory state around the buggy address: [ 15.500040] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.500422] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.500744] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.501050] ^ [ 15.501210] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.501554] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.501903] ================================================================== [ 15.917855] ================================================================== [ 15.918211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 15.918746] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.918972] [ 15.919064] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.919111] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.919124] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.919148] Call Trace: [ 15.919169] <TASK> [ 15.919189] dump_stack_lvl+0x73/0xb0 [ 15.919232] print_report+0xd1/0x650 [ 15.919255] ? __virt_addr_valid+0x1db/0x2d0 [ 15.919280] ? kasan_atomics_helper+0x218a/0x5450 [ 15.919301] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.919324] ? kasan_atomics_helper+0x218a/0x5450 [ 15.919346] kasan_report+0x141/0x180 [ 15.919368] ? kasan_atomics_helper+0x218a/0x5450 [ 15.919394] kasan_check_range+0x10c/0x1c0 [ 15.919419] __kasan_check_write+0x18/0x20 [ 15.919438] kasan_atomics_helper+0x218a/0x5450 [ 15.919461] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.919484] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.919509] ? ret_from_fork_asm+0x1a/0x30 [ 15.919532] ? kasan_atomics+0x152/0x310 [ 15.919558] kasan_atomics+0x1dc/0x310 [ 15.919581] ? __pfx_kasan_atomics+0x10/0x10 [ 15.919605] ? __pfx_read_tsc+0x10/0x10 [ 15.919626] ? ktime_get_ts64+0x86/0x230 [ 15.919651] kunit_try_run_case+0x1a5/0x480 [ 15.919676] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.919699] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.919723] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.919745] ? __kthread_parkme+0x82/0x180 [ 15.919766] ? preempt_count_sub+0x50/0x80 [ 15.919790] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.919813] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.919838] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.919861] kthread+0x337/0x6f0 [ 15.919881] ? trace_preempt_on+0x20/0xc0 [ 15.919906] ? __pfx_kthread+0x10/0x10 [ 15.919926] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.919947] ? calculate_sigpending+0x7b/0xa0 [ 15.919972] ? __pfx_kthread+0x10/0x10 [ 15.919994] ret_from_fork+0x116/0x1d0 [ 15.920013] ? __pfx_kthread+0x10/0x10 [ 15.920034] ret_from_fork_asm+0x1a/0x30 [ 15.920065] </TASK> [ 15.920092] [ 15.928472] Allocated by task 282: [ 15.928627] kasan_save_stack+0x45/0x70 [ 15.928879] kasan_save_track+0x18/0x40 [ 15.929075] kasan_save_alloc_info+0x3b/0x50 [ 15.929292] __kasan_kmalloc+0xb7/0xc0 [ 15.929479] __kmalloc_cache_noprof+0x189/0x420 [ 15.929700] kasan_atomics+0x95/0x310 [ 15.929886] kunit_try_run_case+0x1a5/0x480 [ 15.930297] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.930550] kthread+0x337/0x6f0 [ 15.930716] ret_from_fork+0x116/0x1d0 [ 15.930902] ret_from_fork_asm+0x1a/0x30 [ 15.931098] [ 15.931196] The buggy address belongs to the object at ffff888103991d00 [ 15.931196] which belongs to the cache kmalloc-64 of size 64 [ 15.931742] The buggy address is located 0 bytes to the right of [ 15.931742] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.932146] [ 15.932231] The buggy address belongs to the physical page: [ 15.932802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.933141] flags: 0x200000000000000(node=0|zone=2) [ 15.933436] page_type: f5(slab) [ 15.933565] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.933797] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.934026] page dumped because: kasan: bad access detected [ 15.934198] [ 15.934297] Memory state around the buggy address: [ 15.934733] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.935464] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.935801] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.936018] ^ [ 15.936174] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.936818] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.937109] ================================================================== [ 15.567834] ================================================================== [ 15.568195] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 15.568590] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.568897] [ 15.569030] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.569090] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.569104] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.569129] Call Trace: [ 15.569151] <TASK> [ 15.569180] dump_stack_lvl+0x73/0xb0 [ 15.569214] print_report+0xd1/0x650 [ 15.569253] ? __virt_addr_valid+0x1db/0x2d0 [ 15.569288] ? kasan_atomics_helper+0x194a/0x5450 [ 15.569310] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.569333] ? kasan_atomics_helper+0x194a/0x5450 [ 15.569355] kasan_report+0x141/0x180 [ 15.569378] ? kasan_atomics_helper+0x194a/0x5450 [ 15.569404] kasan_check_range+0x10c/0x1c0 [ 15.569429] __kasan_check_write+0x18/0x20 [ 15.569449] kasan_atomics_helper+0x194a/0x5450 [ 15.569472] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.569495] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.569520] ? ret_from_fork_asm+0x1a/0x30 [ 15.569543] ? kasan_atomics+0x152/0x310 [ 15.569570] kasan_atomics+0x1dc/0x310 [ 15.569593] ? __pfx_kasan_atomics+0x10/0x10 [ 15.569617] ? __pfx_read_tsc+0x10/0x10 [ 15.569639] ? ktime_get_ts64+0x86/0x230 [ 15.569663] kunit_try_run_case+0x1a5/0x480 [ 15.569690] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.569712] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.569747] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.569770] ? __kthread_parkme+0x82/0x180 [ 15.569792] ? preempt_count_sub+0x50/0x80 [ 15.569827] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.569851] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.569874] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.569898] kthread+0x337/0x6f0 [ 15.569918] ? trace_preempt_on+0x20/0xc0 [ 15.569942] ? __pfx_kthread+0x10/0x10 [ 15.569962] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.569984] ? calculate_sigpending+0x7b/0xa0 [ 15.570009] ? __pfx_kthread+0x10/0x10 [ 15.570032] ret_from_fork+0x116/0x1d0 [ 15.570051] ? __pfx_kthread+0x10/0x10 [ 15.570073] ret_from_fork_asm+0x1a/0x30 [ 15.570105] </TASK> [ 15.570117] [ 15.578049] Allocated by task 282: [ 15.578208] kasan_save_stack+0x45/0x70 [ 15.578444] kasan_save_track+0x18/0x40 [ 15.578638] kasan_save_alloc_info+0x3b/0x50 [ 15.578847] __kasan_kmalloc+0xb7/0xc0 [ 15.579023] __kmalloc_cache_noprof+0x189/0x420 [ 15.579273] kasan_atomics+0x95/0x310 [ 15.579446] kunit_try_run_case+0x1a5/0x480 [ 15.579594] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.579770] kthread+0x337/0x6f0 [ 15.579944] ret_from_fork+0x116/0x1d0 [ 15.580159] ret_from_fork_asm+0x1a/0x30 [ 15.580499] [ 15.580599] The buggy address belongs to the object at ffff888103991d00 [ 15.580599] which belongs to the cache kmalloc-64 of size 64 [ 15.581056] The buggy address is located 0 bytes to the right of [ 15.581056] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.581630] [ 15.581749] The buggy address belongs to the physical page: [ 15.581975] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.582380] flags: 0x200000000000000(node=0|zone=2) [ 15.582608] page_type: f5(slab) [ 15.582792] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.583110] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.583484] page dumped because: kasan: bad access detected [ 15.583733] [ 15.583824] Memory state around the buggy address: [ 15.584044] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.584396] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.584640] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.584864] ^ [ 15.585022] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.585248] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.585703] ================================================================== [ 15.899381] ================================================================== [ 15.899666] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 15.899910] Read of size 8 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.900131] [ 15.900269] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.900317] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.900331] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.900355] Call Trace: [ 15.900388] <TASK> [ 15.900410] dump_stack_lvl+0x73/0xb0 [ 15.900454] print_report+0xd1/0x650 [ 15.900479] ? __virt_addr_valid+0x1db/0x2d0 [ 15.900502] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.900524] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.900546] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.900568] kasan_report+0x141/0x180 [ 15.900591] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.900617] __asan_report_load8_noabort+0x18/0x20 [ 15.900641] kasan_atomics_helper+0x4fb2/0x5450 [ 15.900664] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.900686] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.900711] ? ret_from_fork_asm+0x1a/0x30 [ 15.900734] ? kasan_atomics+0x152/0x310 [ 15.900761] kasan_atomics+0x1dc/0x310 [ 15.900784] ? __pfx_kasan_atomics+0x10/0x10 [ 15.900819] ? __pfx_read_tsc+0x10/0x10 [ 15.900843] ? ktime_get_ts64+0x86/0x230 [ 15.900868] kunit_try_run_case+0x1a5/0x480 [ 15.900894] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.900917] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.900941] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.900965] ? __kthread_parkme+0x82/0x180 [ 15.900986] ? preempt_count_sub+0x50/0x80 [ 15.901011] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.901037] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.901061] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.901085] kthread+0x337/0x6f0 [ 15.901105] ? trace_preempt_on+0x20/0xc0 [ 15.901129] ? __pfx_kthread+0x10/0x10 [ 15.901150] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.901171] ? calculate_sigpending+0x7b/0xa0 [ 15.901196] ? __pfx_kthread+0x10/0x10 [ 15.901226] ret_from_fork+0x116/0x1d0 [ 15.901246] ? __pfx_kthread+0x10/0x10 [ 15.901277] ret_from_fork_asm+0x1a/0x30 [ 15.901308] </TASK> [ 15.901321] [ 15.909440] Allocated by task 282: [ 15.909642] kasan_save_stack+0x45/0x70 [ 15.909865] kasan_save_track+0x18/0x40 [ 15.910134] kasan_save_alloc_info+0x3b/0x50 [ 15.910380] __kasan_kmalloc+0xb7/0xc0 [ 15.910573] __kmalloc_cache_noprof+0x189/0x420 [ 15.910742] kasan_atomics+0x95/0x310 [ 15.910904] kunit_try_run_case+0x1a5/0x480 [ 15.911140] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.911388] kthread+0x337/0x6f0 [ 15.911562] ret_from_fork+0x116/0x1d0 [ 15.911697] ret_from_fork_asm+0x1a/0x30 [ 15.911858] [ 15.911931] The buggy address belongs to the object at ffff888103991d00 [ 15.911931] which belongs to the cache kmalloc-64 of size 64 [ 15.912766] The buggy address is located 0 bytes to the right of [ 15.912766] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.913277] [ 15.913377] The buggy address belongs to the physical page: [ 15.913608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.913849] flags: 0x200000000000000(node=0|zone=2) [ 15.914015] page_type: f5(slab) [ 15.914140] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.914379] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.914608] page dumped because: kasan: bad access detected [ 15.914778] [ 15.914848] Memory state around the buggy address: [ 15.915085] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.915680] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.916003] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.916398] ^ [ 15.916631] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.916951] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.917256] ================================================================== [ 14.689401] ================================================================== [ 14.690167] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 14.690629] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282 [ 14.690952] [ 14.691079] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.691130] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.691155] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.691180] Call Trace: [ 14.691203] <TASK> [ 14.691243] dump_stack_lvl+0x73/0xb0 [ 14.691275] print_report+0xd1/0x650 [ 14.691299] ? __virt_addr_valid+0x1db/0x2d0 [ 14.691324] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.691347] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.691430] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.691484] kasan_report+0x141/0x180 [ 14.691507] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.691534] kasan_check_range+0x10c/0x1c0 [ 14.691559] __kasan_check_write+0x18/0x20 [ 14.691579] kasan_atomics_helper+0x5fe/0x5450 [ 14.691602] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.691624] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.691649] ? ret_from_fork_asm+0x1a/0x30 [ 14.691671] ? kasan_atomics+0x152/0x310 [ 14.691698] kasan_atomics+0x1dc/0x310 [ 14.691721] ? __pfx_kasan_atomics+0x10/0x10 [ 14.691746] ? __pfx_read_tsc+0x10/0x10 [ 14.691768] ? ktime_get_ts64+0x86/0x230 [ 14.691793] kunit_try_run_case+0x1a5/0x480 [ 14.691818] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.691841] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.691865] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.691888] ? __kthread_parkme+0x82/0x180 [ 14.691909] ? preempt_count_sub+0x50/0x80 [ 14.691933] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.691957] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.691991] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.692014] kthread+0x337/0x6f0 [ 14.692034] ? trace_preempt_on+0x20/0xc0 [ 14.692071] ? __pfx_kthread+0x10/0x10 [ 14.692092] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.692115] ? calculate_sigpending+0x7b/0xa0 [ 14.692139] ? __pfx_kthread+0x10/0x10 [ 14.692161] ret_from_fork+0x116/0x1d0 [ 14.692179] ? __pfx_kthread+0x10/0x10 [ 14.692201] ret_from_fork_asm+0x1a/0x30 [ 14.692282] </TASK> [ 14.692296] [ 14.701961] Allocated by task 282: [ 14.702185] kasan_save_stack+0x45/0x70 [ 14.702402] kasan_save_track+0x18/0x40 [ 14.702645] kasan_save_alloc_info+0x3b/0x50 [ 14.702803] __kasan_kmalloc+0xb7/0xc0 [ 14.702974] __kmalloc_cache_noprof+0x189/0x420 [ 14.703191] kasan_atomics+0x95/0x310 [ 14.703396] kunit_try_run_case+0x1a5/0x480 [ 14.703546] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.703723] kthread+0x337/0x6f0 [ 14.704021] ret_from_fork+0x116/0x1d0 [ 14.704295] ret_from_fork_asm+0x1a/0x30 [ 14.704850] [ 14.704960] The buggy address belongs to the object at ffff888103991d00 [ 14.704960] which belongs to the cache kmalloc-64 of size 64 [ 14.706148] The buggy address is located 0 bytes to the right of [ 14.706148] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 14.706912] [ 14.707018] The buggy address belongs to the physical page: [ 14.707637] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 14.708282] flags: 0x200000000000000(node=0|zone=2) [ 14.708515] page_type: f5(slab) [ 14.708675] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.708983] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.709955] page dumped because: kasan: bad access detected [ 14.710483] [ 14.710619] Memory state around the buggy address: [ 14.711010] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.711250] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.711466] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.711676] ^ [ 14.711840] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.712058] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.713102] ================================================================== [ 15.126347] ================================================================== [ 15.126877] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 15.127122] Read of size 4 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.127462] [ 15.127603] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.127653] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.127667] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.127692] Call Trace: [ 15.127714] <TASK> [ 15.127736] dump_stack_lvl+0x73/0xb0 [ 15.127767] print_report+0xd1/0x650 [ 15.127791] ? __virt_addr_valid+0x1db/0x2d0 [ 15.127815] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.127837] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.127860] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.127882] kasan_report+0x141/0x180 [ 15.127904] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.127931] __asan_report_load4_noabort+0x18/0x20 [ 15.127957] kasan_atomics_helper+0x4a36/0x5450 [ 15.127981] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.128003] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.128030] ? ret_from_fork_asm+0x1a/0x30 [ 15.128053] ? kasan_atomics+0x152/0x310 [ 15.128080] kasan_atomics+0x1dc/0x310 [ 15.128103] ? __pfx_kasan_atomics+0x10/0x10 [ 15.128128] ? __pfx_read_tsc+0x10/0x10 [ 15.128150] ? ktime_get_ts64+0x86/0x230 [ 15.128176] kunit_try_run_case+0x1a5/0x480 [ 15.128202] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.128235] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.128259] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.128284] ? __kthread_parkme+0x82/0x180 [ 15.128306] ? preempt_count_sub+0x50/0x80 [ 15.128331] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.128355] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.128380] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.128404] kthread+0x337/0x6f0 [ 15.128425] ? trace_preempt_on+0x20/0xc0 [ 15.128449] ? __pfx_kthread+0x10/0x10 [ 15.128471] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.128494] ? calculate_sigpending+0x7b/0xa0 [ 15.128518] ? __pfx_kthread+0x10/0x10 [ 15.128540] ret_from_fork+0x116/0x1d0 [ 15.128574] ? __pfx_kthread+0x10/0x10 [ 15.128596] ret_from_fork_asm+0x1a/0x30 [ 15.128627] </TASK> [ 15.128640] [ 15.136074] Allocated by task 282: [ 15.136243] kasan_save_stack+0x45/0x70 [ 15.136488] kasan_save_track+0x18/0x40 [ 15.136706] kasan_save_alloc_info+0x3b/0x50 [ 15.136924] __kasan_kmalloc+0xb7/0xc0 [ 15.137134] __kmalloc_cache_noprof+0x189/0x420 [ 15.137521] kasan_atomics+0x95/0x310 [ 15.137720] kunit_try_run_case+0x1a5/0x480 [ 15.137892] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.138066] kthread+0x337/0x6f0 [ 15.138191] ret_from_fork+0x116/0x1d0 [ 15.138334] ret_from_fork_asm+0x1a/0x30 [ 15.138473] [ 15.138547] The buggy address belongs to the object at ffff888103991d00 [ 15.138547] which belongs to the cache kmalloc-64 of size 64 [ 15.138918] The buggy address is located 0 bytes to the right of [ 15.138918] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.140117] [ 15.140231] The buggy address belongs to the physical page: [ 15.140890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.141409] flags: 0x200000000000000(node=0|zone=2) [ 15.142398] page_type: f5(slab) [ 15.142986] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.143499] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.143744] page dumped because: kasan: bad access detected [ 15.143918] [ 15.143993] Memory state around the buggy address: [ 15.144156] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.144800] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.145552] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.146182] ^ [ 15.146649] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.147294] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.147816] ================================================================== [ 15.521732] ================================================================== [ 15.522346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 15.522665] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.522994] [ 15.523112] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.523160] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.523174] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.523198] Call Trace: [ 15.523233] <TASK> [ 15.523272] dump_stack_lvl+0x73/0xb0 [ 15.523305] print_report+0xd1/0x650 [ 15.523330] ? __virt_addr_valid+0x1db/0x2d0 [ 15.523354] ? kasan_atomics_helper+0x1818/0x5450 [ 15.523376] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.523398] ? kasan_atomics_helper+0x1818/0x5450 [ 15.523421] kasan_report+0x141/0x180 [ 15.523443] ? kasan_atomics_helper+0x1818/0x5450 [ 15.523480] kasan_check_range+0x10c/0x1c0 [ 15.523504] __kasan_check_write+0x18/0x20 [ 15.523524] kasan_atomics_helper+0x1818/0x5450 [ 15.523558] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.523581] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.523606] ? ret_from_fork_asm+0x1a/0x30 [ 15.523629] ? kasan_atomics+0x152/0x310 [ 15.523656] kasan_atomics+0x1dc/0x310 [ 15.523680] ? __pfx_kasan_atomics+0x10/0x10 [ 15.523705] ? __pfx_read_tsc+0x10/0x10 [ 15.523727] ? ktime_get_ts64+0x86/0x230 [ 15.523752] kunit_try_run_case+0x1a5/0x480 [ 15.523777] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.523799] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.523824] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.523847] ? __kthread_parkme+0x82/0x180 [ 15.523868] ? preempt_count_sub+0x50/0x80 [ 15.523893] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.523917] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.523940] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.523964] kthread+0x337/0x6f0 [ 15.523984] ? trace_preempt_on+0x20/0xc0 [ 15.524008] ? __pfx_kthread+0x10/0x10 [ 15.524029] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.524052] ? calculate_sigpending+0x7b/0xa0 [ 15.524087] ? __pfx_kthread+0x10/0x10 [ 15.524109] ret_from_fork+0x116/0x1d0 [ 15.524128] ? __pfx_kthread+0x10/0x10 [ 15.524160] ret_from_fork_asm+0x1a/0x30 [ 15.524191] </TASK> [ 15.524204] [ 15.533864] Allocated by task 282: [ 15.534082] kasan_save_stack+0x45/0x70 [ 15.534563] kasan_save_track+0x18/0x40 [ 15.534761] kasan_save_alloc_info+0x3b/0x50 [ 15.534953] __kasan_kmalloc+0xb7/0xc0 [ 15.535136] __kmalloc_cache_noprof+0x189/0x420 [ 15.535770] kasan_atomics+0x95/0x310 [ 15.536048] kunit_try_run_case+0x1a5/0x480 [ 15.536468] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.536906] kthread+0x337/0x6f0 [ 15.537207] ret_from_fork+0x116/0x1d0 [ 15.537642] ret_from_fork_asm+0x1a/0x30 [ 15.537972] [ 15.538075] The buggy address belongs to the object at ffff888103991d00 [ 15.538075] which belongs to the cache kmalloc-64 of size 64 [ 15.538895] The buggy address is located 0 bytes to the right of [ 15.538895] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.539681] [ 15.539932] The buggy address belongs to the physical page: [ 15.540386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.540914] flags: 0x200000000000000(node=0|zone=2) [ 15.541323] page_type: f5(slab) [ 15.541487] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.541796] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.542099] page dumped because: kasan: bad access detected [ 15.542730] [ 15.542835] Memory state around the buggy address: [ 15.543301] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.543950] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.544541] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.545084] ^ [ 15.545695] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.546143] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.546982] ================================================================== [ 15.247420] ================================================================== [ 15.248231] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 15.248688] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.249151] [ 15.249429] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.249487] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.249560] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.249587] Call Trace: [ 15.249609] <TASK> [ 15.249631] dump_stack_lvl+0x73/0xb0 [ 15.249667] print_report+0xd1/0x650 [ 15.249693] ? __virt_addr_valid+0x1db/0x2d0 [ 15.249716] ? kasan_atomics_helper+0x1217/0x5450 [ 15.249739] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.249762] ? kasan_atomics_helper+0x1217/0x5450 [ 15.249787] kasan_report+0x141/0x180 [ 15.249809] ? kasan_atomics_helper+0x1217/0x5450 [ 15.249836] kasan_check_range+0x10c/0x1c0 [ 15.249860] __kasan_check_write+0x18/0x20 [ 15.249880] kasan_atomics_helper+0x1217/0x5450 [ 15.249903] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.249925] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.249951] ? ret_from_fork_asm+0x1a/0x30 [ 15.249974] ? kasan_atomics+0x152/0x310 [ 15.250000] kasan_atomics+0x1dc/0x310 [ 15.250022] ? __pfx_kasan_atomics+0x10/0x10 [ 15.250047] ? __pfx_read_tsc+0x10/0x10 [ 15.250069] ? ktime_get_ts64+0x86/0x230 [ 15.250093] kunit_try_run_case+0x1a5/0x480 [ 15.250119] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.250141] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.250165] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.250189] ? __kthread_parkme+0x82/0x180 [ 15.250211] ? preempt_count_sub+0x50/0x80 [ 15.250251] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.250276] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.250300] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.250324] kthread+0x337/0x6f0 [ 15.250344] ? trace_preempt_on+0x20/0xc0 [ 15.250368] ? __pfx_kthread+0x10/0x10 [ 15.250390] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.250411] ? calculate_sigpending+0x7b/0xa0 [ 15.250436] ? __pfx_kthread+0x10/0x10 [ 15.250458] ret_from_fork+0x116/0x1d0 [ 15.250477] ? __pfx_kthread+0x10/0x10 [ 15.250498] ret_from_fork_asm+0x1a/0x30 [ 15.250528] </TASK> [ 15.250541] [ 15.260740] Allocated by task 282: [ 15.261056] kasan_save_stack+0x45/0x70 [ 15.261280] kasan_save_track+0x18/0x40 [ 15.261600] kasan_save_alloc_info+0x3b/0x50 [ 15.261819] __kasan_kmalloc+0xb7/0xc0 [ 15.262069] __kmalloc_cache_noprof+0x189/0x420 [ 15.262324] kasan_atomics+0x95/0x310 [ 15.262658] kunit_try_run_case+0x1a5/0x480 [ 15.262871] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.263238] kthread+0x337/0x6f0 [ 15.263403] ret_from_fork+0x116/0x1d0 [ 15.263698] ret_from_fork_asm+0x1a/0x30 [ 15.263972] [ 15.264067] The buggy address belongs to the object at ffff888103991d00 [ 15.264067] which belongs to the cache kmalloc-64 of size 64 [ 15.264745] The buggy address is located 0 bytes to the right of [ 15.264745] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.265469] [ 15.265573] The buggy address belongs to the physical page: [ 15.265789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.266200] flags: 0x200000000000000(node=0|zone=2) [ 15.266601] page_type: f5(slab) [ 15.266755] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.267231] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.267661] page dumped because: kasan: bad access detected [ 15.267861] [ 15.268026] Memory state around the buggy address: [ 15.268387] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.268682] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.268982] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.269287] ^ [ 15.269741] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.270020] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.270448] ================================================================== [ 14.587190] ================================================================== [ 14.587745] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 14.587999] Read of size 4 at addr ffff888103991d30 by task kunit_try_catch/282 [ 14.588237] [ 14.588330] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.588379] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.588393] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.588417] Call Trace: [ 14.588440] <TASK> [ 14.588463] dump_stack_lvl+0x73/0xb0 [ 14.588494] print_report+0xd1/0x650 [ 14.588518] ? __virt_addr_valid+0x1db/0x2d0 [ 14.588543] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.588566] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.588588] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.588610] kasan_report+0x141/0x180 [ 14.588633] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.588659] __asan_report_load4_noabort+0x18/0x20 [ 14.588685] kasan_atomics_helper+0x4b54/0x5450 [ 14.588707] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.588730] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.588771] ? ret_from_fork_asm+0x1a/0x30 [ 14.588804] ? kasan_atomics+0x152/0x310 [ 14.588831] kasan_atomics+0x1dc/0x310 [ 14.588855] ? __pfx_kasan_atomics+0x10/0x10 [ 14.588879] ? __pfx_read_tsc+0x10/0x10 [ 14.588902] ? ktime_get_ts64+0x86/0x230 [ 14.588927] kunit_try_run_case+0x1a5/0x480 [ 14.588953] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.588980] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.589006] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.589030] ? __kthread_parkme+0x82/0x180 [ 14.589053] ? preempt_count_sub+0x50/0x80 [ 14.589078] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.589102] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.589128] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.589152] kthread+0x337/0x6f0 [ 14.589173] ? trace_preempt_on+0x20/0xc0 [ 14.589197] ? __pfx_kthread+0x10/0x10 [ 14.589230] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.589253] ? calculate_sigpending+0x7b/0xa0 [ 14.589279] ? __pfx_kthread+0x10/0x10 [ 14.589302] ret_from_fork+0x116/0x1d0 [ 14.589323] ? __pfx_kthread+0x10/0x10 [ 14.589344] ret_from_fork_asm+0x1a/0x30 [ 14.589376] </TASK> [ 14.589388] [ 14.598242] Allocated by task 282: [ 14.598506] kasan_save_stack+0x45/0x70 [ 14.598679] kasan_save_track+0x18/0x40 [ 14.598877] kasan_save_alloc_info+0x3b/0x50 [ 14.599071] __kasan_kmalloc+0xb7/0xc0 [ 14.599632] __kmalloc_cache_noprof+0x189/0x420 [ 14.599855] kasan_atomics+0x95/0x310 [ 14.600012] kunit_try_run_case+0x1a5/0x480 [ 14.600161] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.600457] kthread+0x337/0x6f0 [ 14.600750] ret_from_fork+0x116/0x1d0 [ 14.600936] ret_from_fork_asm+0x1a/0x30 [ 14.601097] [ 14.601257] The buggy address belongs to the object at ffff888103991d00 [ 14.601257] which belongs to the cache kmalloc-64 of size 64 [ 14.601703] The buggy address is located 0 bytes to the right of [ 14.601703] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 14.602073] [ 14.602150] The buggy address belongs to the physical page: [ 14.602413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 14.602770] flags: 0x200000000000000(node=0|zone=2) [ 14.603009] page_type: f5(slab) [ 14.603429] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.603734] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.603964] page dumped because: kasan: bad access detected [ 14.604138] [ 14.604210] Memory state around the buggy address: [ 14.604383] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.604685] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.605215] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.605687] ^ [ 14.605920] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.606209] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.606456] ================================================================== [ 14.666267] ================================================================== [ 14.666918] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 14.667444] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282 [ 14.667949] [ 14.668177] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.668242] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.668256] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.668281] Call Trace: [ 14.668305] <TASK> [ 14.668328] dump_stack_lvl+0x73/0xb0 [ 14.668374] print_report+0xd1/0x650 [ 14.668399] ? __virt_addr_valid+0x1db/0x2d0 [ 14.668427] ? kasan_atomics_helper+0x565/0x5450 [ 14.668450] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.668475] ? kasan_atomics_helper+0x565/0x5450 [ 14.668498] kasan_report+0x141/0x180 [ 14.668520] ? kasan_atomics_helper+0x565/0x5450 [ 14.668546] kasan_check_range+0x10c/0x1c0 [ 14.668571] __kasan_check_write+0x18/0x20 [ 14.668591] kasan_atomics_helper+0x565/0x5450 [ 14.668615] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.668638] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.668666] ? ret_from_fork_asm+0x1a/0x30 [ 14.668691] ? kasan_atomics+0x152/0x310 [ 14.668718] kasan_atomics+0x1dc/0x310 [ 14.668742] ? __pfx_kasan_atomics+0x10/0x10 [ 14.668767] ? __pfx_read_tsc+0x10/0x10 [ 14.668798] ? ktime_get_ts64+0x86/0x230 [ 14.668823] kunit_try_run_case+0x1a5/0x480 [ 14.668850] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.668874] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.668899] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.668922] ? __kthread_parkme+0x82/0x180 [ 14.668944] ? preempt_count_sub+0x50/0x80 [ 14.668968] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.668991] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.669016] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.669039] kthread+0x337/0x6f0 [ 14.669060] ? trace_preempt_on+0x20/0xc0 [ 14.669084] ? __pfx_kthread+0x10/0x10 [ 14.669106] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.669127] ? calculate_sigpending+0x7b/0xa0 [ 14.669152] ? __pfx_kthread+0x10/0x10 [ 14.669173] ret_from_fork+0x116/0x1d0 [ 14.669193] ? __pfx_kthread+0x10/0x10 [ 14.669213] ret_from_fork_asm+0x1a/0x30 [ 14.669253] </TASK> [ 14.669276] [ 14.679854] Allocated by task 282: [ 14.680090] kasan_save_stack+0x45/0x70 [ 14.680512] kasan_save_track+0x18/0x40 [ 14.680719] kasan_save_alloc_info+0x3b/0x50 [ 14.680950] __kasan_kmalloc+0xb7/0xc0 [ 14.681170] __kmalloc_cache_noprof+0x189/0x420 [ 14.681463] kasan_atomics+0x95/0x310 [ 14.681619] kunit_try_run_case+0x1a5/0x480 [ 14.681772] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.681991] kthread+0x337/0x6f0 [ 14.682170] ret_from_fork+0x116/0x1d0 [ 14.682468] ret_from_fork_asm+0x1a/0x30 [ 14.682711] [ 14.682812] The buggy address belongs to the object at ffff888103991d00 [ 14.682812] which belongs to the cache kmalloc-64 of size 64 [ 14.683804] The buggy address is located 0 bytes to the right of [ 14.683804] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 14.684236] [ 14.684363] The buggy address belongs to the physical page: [ 14.684636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 14.685115] flags: 0x200000000000000(node=0|zone=2) [ 14.685418] page_type: f5(slab) [ 14.685551] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.685859] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.686192] page dumped because: kasan: bad access detected [ 14.686451] [ 14.686523] Memory state around the buggy address: [ 14.686685] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.687420] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.687738] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.687969] ^ [ 14.688283] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.688610] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.688897] ================================================================== [ 15.034320] ================================================================== [ 15.034642] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 15.035024] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.035408] [ 15.035507] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.035556] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.035570] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.035593] Call Trace: [ 15.035615] <TASK> [ 15.035637] dump_stack_lvl+0x73/0xb0 [ 15.035669] print_report+0xd1/0x650 [ 15.035694] ? __virt_addr_valid+0x1db/0x2d0 [ 15.035719] ? kasan_atomics_helper+0xde0/0x5450 [ 15.035741] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.035764] ? kasan_atomics_helper+0xde0/0x5450 [ 15.035786] kasan_report+0x141/0x180 [ 15.035809] ? kasan_atomics_helper+0xde0/0x5450 [ 15.035837] kasan_check_range+0x10c/0x1c0 [ 15.035864] __kasan_check_write+0x18/0x20 [ 15.035885] kasan_atomics_helper+0xde0/0x5450 [ 15.035909] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.035933] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.035958] ? ret_from_fork_asm+0x1a/0x30 [ 15.035982] ? kasan_atomics+0x152/0x310 [ 15.036009] kasan_atomics+0x1dc/0x310 [ 15.036035] ? __pfx_kasan_atomics+0x10/0x10 [ 15.036060] ? __pfx_read_tsc+0x10/0x10 [ 15.036083] ? ktime_get_ts64+0x86/0x230 [ 15.036108] kunit_try_run_case+0x1a5/0x480 [ 15.036133] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.036156] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.036181] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.036204] ? __kthread_parkme+0x82/0x180 [ 15.036240] ? preempt_count_sub+0x50/0x80 [ 15.036264] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.036288] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.036312] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.036337] kthread+0x337/0x6f0 [ 15.036357] ? trace_preempt_on+0x20/0xc0 [ 15.036382] ? __pfx_kthread+0x10/0x10 [ 15.036414] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.036458] ? calculate_sigpending+0x7b/0xa0 [ 15.036483] ? __pfx_kthread+0x10/0x10 [ 15.036505] ret_from_fork+0x116/0x1d0 [ 15.036525] ? __pfx_kthread+0x10/0x10 [ 15.036545] ret_from_fork_asm+0x1a/0x30 [ 15.036576] </TASK> [ 15.036589] [ 15.044595] Allocated by task 282: [ 15.044790] kasan_save_stack+0x45/0x70 [ 15.045030] kasan_save_track+0x18/0x40 [ 15.045187] kasan_save_alloc_info+0x3b/0x50 [ 15.045557] __kasan_kmalloc+0xb7/0xc0 [ 15.045696] __kmalloc_cache_noprof+0x189/0x420 [ 15.045854] kasan_atomics+0x95/0x310 [ 15.045988] kunit_try_run_case+0x1a5/0x480 [ 15.046231] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.046503] kthread+0x337/0x6f0 [ 15.046672] ret_from_fork+0x116/0x1d0 [ 15.046860] ret_from_fork_asm+0x1a/0x30 [ 15.047035] [ 15.047108] The buggy address belongs to the object at ffff888103991d00 [ 15.047108] which belongs to the cache kmalloc-64 of size 64 [ 15.047642] The buggy address is located 0 bytes to the right of [ 15.047642] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.048086] [ 15.048163] The buggy address belongs to the physical page: [ 15.048428] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.048836] flags: 0x200000000000000(node=0|zone=2) [ 15.049102] page_type: f5(slab) [ 15.049301] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.049612] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.049840] page dumped because: kasan: bad access detected [ 15.050014] [ 15.050088] Memory state around the buggy address: [ 15.050264] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.050595] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.050930] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.051264] ^ [ 15.051555] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.051857] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.052180] ================================================================== [ 15.655500] ================================================================== [ 15.655809] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 15.656159] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.656518] [ 15.656653] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.656705] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.656719] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.656743] Call Trace: [ 15.656765] <TASK> [ 15.656801] dump_stack_lvl+0x73/0xb0 [ 15.656846] print_report+0xd1/0x650 [ 15.656870] ? __virt_addr_valid+0x1db/0x2d0 [ 15.656895] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.656931] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.656964] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.656987] kasan_report+0x141/0x180 [ 15.657021] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.657048] kasan_check_range+0x10c/0x1c0 [ 15.657072] __kasan_check_write+0x18/0x20 [ 15.657092] kasan_atomics_helper+0x1c18/0x5450 [ 15.657114] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.657137] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.657162] ? ret_from_fork_asm+0x1a/0x30 [ 15.657185] ? kasan_atomics+0x152/0x310 [ 15.657211] kasan_atomics+0x1dc/0x310 [ 15.657243] ? __pfx_kasan_atomics+0x10/0x10 [ 15.657280] ? __pfx_read_tsc+0x10/0x10 [ 15.657311] ? ktime_get_ts64+0x86/0x230 [ 15.657337] kunit_try_run_case+0x1a5/0x480 [ 15.657363] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.657397] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.657422] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.657446] ? __kthread_parkme+0x82/0x180 [ 15.657467] ? preempt_count_sub+0x50/0x80 [ 15.657491] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.657515] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.657538] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.657561] kthread+0x337/0x6f0 [ 15.657581] ? trace_preempt_on+0x20/0xc0 [ 15.657606] ? __pfx_kthread+0x10/0x10 [ 15.657626] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.657647] ? calculate_sigpending+0x7b/0xa0 [ 15.657672] ? __pfx_kthread+0x10/0x10 [ 15.657694] ret_from_fork+0x116/0x1d0 [ 15.657713] ? __pfx_kthread+0x10/0x10 [ 15.657743] ret_from_fork_asm+0x1a/0x30 [ 15.657774] </TASK> [ 15.657786] [ 15.665710] Allocated by task 282: [ 15.665921] kasan_save_stack+0x45/0x70 [ 15.666115] kasan_save_track+0x18/0x40 [ 15.666338] kasan_save_alloc_info+0x3b/0x50 [ 15.666552] __kasan_kmalloc+0xb7/0xc0 [ 15.666739] __kmalloc_cache_noprof+0x189/0x420 [ 15.666960] kasan_atomics+0x95/0x310 [ 15.667097] kunit_try_run_case+0x1a5/0x480 [ 15.667319] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.667595] kthread+0x337/0x6f0 [ 15.667766] ret_from_fork+0x116/0x1d0 [ 15.667946] ret_from_fork_asm+0x1a/0x30 [ 15.668088] [ 15.668185] The buggy address belongs to the object at ffff888103991d00 [ 15.668185] which belongs to the cache kmalloc-64 of size 64 [ 15.668886] The buggy address is located 0 bytes to the right of [ 15.668886] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.669359] [ 15.669459] The buggy address belongs to the physical page: [ 15.669825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.670317] flags: 0x200000000000000(node=0|zone=2) [ 15.670575] page_type: f5(slab) [ 15.670738] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.671080] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.671424] page dumped because: kasan: bad access detected [ 15.671727] [ 15.671836] Memory state around the buggy address: [ 15.672060] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.672354] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.672684] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.672987] ^ [ 15.673172] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.673401] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.673617] ================================================================== [ 15.106528] ================================================================== [ 15.106988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 15.107264] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.107637] [ 15.107773] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.107837] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.107860] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.107885] Call Trace: [ 15.107908] <TASK> [ 15.107930] dump_stack_lvl+0x73/0xb0 [ 15.107963] print_report+0xd1/0x650 [ 15.108005] ? __virt_addr_valid+0x1db/0x2d0 [ 15.108043] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.108065] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.108087] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.108109] kasan_report+0x141/0x180 [ 15.108132] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.108158] kasan_check_range+0x10c/0x1c0 [ 15.108184] __kasan_check_write+0x18/0x20 [ 15.108204] kasan_atomics_helper+0xfa9/0x5450 [ 15.108240] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.108262] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.108287] ? ret_from_fork_asm+0x1a/0x30 [ 15.108311] ? kasan_atomics+0x152/0x310 [ 15.108337] kasan_atomics+0x1dc/0x310 [ 15.108360] ? __pfx_kasan_atomics+0x10/0x10 [ 15.108385] ? __pfx_read_tsc+0x10/0x10 [ 15.108419] ? ktime_get_ts64+0x86/0x230 [ 15.108444] kunit_try_run_case+0x1a5/0x480 [ 15.108470] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.108492] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.108517] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.108541] ? __kthread_parkme+0x82/0x180 [ 15.108563] ? preempt_count_sub+0x50/0x80 [ 15.108587] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.108612] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.108637] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.108661] kthread+0x337/0x6f0 [ 15.108680] ? trace_preempt_on+0x20/0xc0 [ 15.108704] ? __pfx_kthread+0x10/0x10 [ 15.108725] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.108747] ? calculate_sigpending+0x7b/0xa0 [ 15.108771] ? __pfx_kthread+0x10/0x10 [ 15.108802] ret_from_fork+0x116/0x1d0 [ 15.108821] ? __pfx_kthread+0x10/0x10 [ 15.108841] ret_from_fork_asm+0x1a/0x30 [ 15.108873] </TASK> [ 15.108885] [ 15.117791] Allocated by task 282: [ 15.118006] kasan_save_stack+0x45/0x70 [ 15.118254] kasan_save_track+0x18/0x40 [ 15.118470] kasan_save_alloc_info+0x3b/0x50 [ 15.118690] __kasan_kmalloc+0xb7/0xc0 [ 15.118886] __kmalloc_cache_noprof+0x189/0x420 [ 15.119117] kasan_atomics+0x95/0x310 [ 15.119330] kunit_try_run_case+0x1a5/0x480 [ 15.119544] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.119800] kthread+0x337/0x6f0 [ 15.119953] ret_from_fork+0x116/0x1d0 [ 15.120089] ret_from_fork_asm+0x1a/0x30 [ 15.120320] [ 15.120402] The buggy address belongs to the object at ffff888103991d00 [ 15.120402] which belongs to the cache kmalloc-64 of size 64 [ 15.120825] The buggy address is located 0 bytes to the right of [ 15.120825] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.121427] [ 15.121504] The buggy address belongs to the physical page: [ 15.121681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.121919] flags: 0x200000000000000(node=0|zone=2) [ 15.122082] page_type: f5(slab) [ 15.122288] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.122623] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.122952] page dumped because: kasan: bad access detected [ 15.123306] [ 15.123400] Memory state around the buggy address: [ 15.123605] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.123816] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.124026] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.124244] ^ [ 15.124477] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.125040] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.125604] ================================================================== [ 14.714090] ================================================================== [ 14.714664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 14.715052] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282 [ 14.715744] [ 14.715867] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.715926] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.715941] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.715967] Call Trace: [ 14.715990] <TASK> [ 14.716013] dump_stack_lvl+0x73/0xb0 [ 14.716047] print_report+0xd1/0x650 [ 14.716072] ? __virt_addr_valid+0x1db/0x2d0 [ 14.716095] ? kasan_atomics_helper+0x697/0x5450 [ 14.716117] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.716140] ? kasan_atomics_helper+0x697/0x5450 [ 14.716161] kasan_report+0x141/0x180 [ 14.716185] ? kasan_atomics_helper+0x697/0x5450 [ 14.716491] kasan_check_range+0x10c/0x1c0 [ 14.716521] __kasan_check_write+0x18/0x20 [ 14.716541] kasan_atomics_helper+0x697/0x5450 [ 14.716564] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.716587] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.716657] ? ret_from_fork_asm+0x1a/0x30 [ 14.716682] ? kasan_atomics+0x152/0x310 [ 14.716710] kasan_atomics+0x1dc/0x310 [ 14.716734] ? __pfx_kasan_atomics+0x10/0x10 [ 14.716758] ? __pfx_read_tsc+0x10/0x10 [ 14.716781] ? ktime_get_ts64+0x86/0x230 [ 14.716815] kunit_try_run_case+0x1a5/0x480 [ 14.716842] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.716864] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.716889] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.716913] ? __kthread_parkme+0x82/0x180 [ 14.716935] ? preempt_count_sub+0x50/0x80 [ 14.716960] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.716984] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.717006] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.717030] kthread+0x337/0x6f0 [ 14.717052] ? trace_preempt_on+0x20/0xc0 [ 14.717076] ? __pfx_kthread+0x10/0x10 [ 14.717097] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.717118] ? calculate_sigpending+0x7b/0xa0 [ 14.717143] ? __pfx_kthread+0x10/0x10 [ 14.717164] ret_from_fork+0x116/0x1d0 [ 14.717184] ? __pfx_kthread+0x10/0x10 [ 14.717206] ret_from_fork_asm+0x1a/0x30 [ 14.717246] </TASK> [ 14.717259] [ 14.730972] Allocated by task 282: [ 14.731198] kasan_save_stack+0x45/0x70 [ 14.731719] kasan_save_track+0x18/0x40 [ 14.732069] kasan_save_alloc_info+0x3b/0x50 [ 14.732453] __kasan_kmalloc+0xb7/0xc0 [ 14.732742] __kmalloc_cache_noprof+0x189/0x420 [ 14.732977] kasan_atomics+0x95/0x310 [ 14.733159] kunit_try_run_case+0x1a5/0x480 [ 14.733678] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.733994] kthread+0x337/0x6f0 [ 14.734317] ret_from_fork+0x116/0x1d0 [ 14.734626] ret_from_fork_asm+0x1a/0x30 [ 14.734820] [ 14.734918] The buggy address belongs to the object at ffff888103991d00 [ 14.734918] which belongs to the cache kmalloc-64 of size 64 [ 14.735663] The buggy address is located 0 bytes to the right of [ 14.735663] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 14.736660] [ 14.736777] The buggy address belongs to the physical page: [ 14.737024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 14.737700] flags: 0x200000000000000(node=0|zone=2) [ 14.738016] page_type: f5(slab) [ 14.738325] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.739068] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.739632] page dumped because: kasan: bad access detected [ 14.739869] [ 14.739959] Memory state around the buggy address: [ 14.740174] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.741331] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.741654] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.741943] ^ [ 14.742147] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.742899] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.743492] ================================================================== [ 14.521849] ================================================================== [ 14.522179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 14.523048] Read of size 4 at addr ffff888103991d30 by task kunit_try_catch/282 [ 14.523726] [ 14.523866] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.523920] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.523932] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.523957] Call Trace: [ 14.523979] <TASK> [ 14.524000] dump_stack_lvl+0x73/0xb0 [ 14.524035] print_report+0xd1/0x650 [ 14.524059] ? __virt_addr_valid+0x1db/0x2d0 [ 14.524082] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.524103] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.524123] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.524144] kasan_report+0x141/0x180 [ 14.524165] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.524190] __asan_report_load4_noabort+0x18/0x20 [ 14.524504] kasan_atomics_helper+0x4b88/0x5450 [ 14.524530] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.524551] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.524577] ? ret_from_fork_asm+0x1a/0x30 [ 14.524608] ? kasan_atomics+0x152/0x310 [ 14.524633] kasan_atomics+0x1dc/0x310 [ 14.524656] ? __pfx_kasan_atomics+0x10/0x10 [ 14.524680] ? __pfx_read_tsc+0x10/0x10 [ 14.524701] ? ktime_get_ts64+0x86/0x230 [ 14.524725] kunit_try_run_case+0x1a5/0x480 [ 14.524750] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.524771] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.524802] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.524826] ? __kthread_parkme+0x82/0x180 [ 14.524847] ? preempt_count_sub+0x50/0x80 [ 14.524869] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.524892] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.524914] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.524935] kthread+0x337/0x6f0 [ 14.524954] ? trace_preempt_on+0x20/0xc0 [ 14.524977] ? __pfx_kthread+0x10/0x10 [ 14.524997] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.525017] ? calculate_sigpending+0x7b/0xa0 [ 14.525041] ? __pfx_kthread+0x10/0x10 [ 14.525061] ret_from_fork+0x116/0x1d0 [ 14.525079] ? __pfx_kthread+0x10/0x10 [ 14.525099] ret_from_fork_asm+0x1a/0x30 [ 14.525127] </TASK> [ 14.525140] [ 14.537764] Allocated by task 282: [ 14.537982] kasan_save_stack+0x45/0x70 [ 14.538152] kasan_save_track+0x18/0x40 [ 14.538298] kasan_save_alloc_info+0x3b/0x50 [ 14.538593] __kasan_kmalloc+0xb7/0xc0 [ 14.539323] __kmalloc_cache_noprof+0x189/0x420 [ 14.539572] kasan_atomics+0x95/0x310 [ 14.539901] kunit_try_run_case+0x1a5/0x480 [ 14.540089] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.540365] kthread+0x337/0x6f0 [ 14.540540] ret_from_fork+0x116/0x1d0 [ 14.540714] ret_from_fork_asm+0x1a/0x30 [ 14.540907] [ 14.540983] The buggy address belongs to the object at ffff888103991d00 [ 14.540983] which belongs to the cache kmalloc-64 of size 64 [ 14.541478] The buggy address is located 0 bytes to the right of [ 14.541478] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 14.542125] [ 14.542286] The buggy address belongs to the physical page: [ 14.542518] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 14.542850] flags: 0x200000000000000(node=0|zone=2) [ 14.543070] page_type: f5(slab) [ 14.543285] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.543587] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.543877] page dumped because: kasan: bad access detected [ 14.544087] [ 14.544184] Memory state around the buggy address: [ 14.544835] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.545132] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.545422] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.545917] ^ [ 14.546084] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.546580] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.546963] ================================================================== [ 14.768902] ================================================================== [ 14.769589] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 14.770246] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282 [ 14.771034] [ 14.771314] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.771388] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.771425] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.771499] Call Trace: [ 14.771524] <TASK> [ 14.771547] dump_stack_lvl+0x73/0xb0 [ 14.771583] print_report+0xd1/0x650 [ 14.771608] ? __virt_addr_valid+0x1db/0x2d0 [ 14.771633] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.771655] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.771678] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.771701] kasan_report+0x141/0x180 [ 14.771724] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.771750] kasan_check_range+0x10c/0x1c0 [ 14.771774] __kasan_check_write+0x18/0x20 [ 14.771795] kasan_atomics_helper+0x7c7/0x5450 [ 14.771818] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.771840] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.771866] ? ret_from_fork_asm+0x1a/0x30 [ 14.771888] ? kasan_atomics+0x152/0x310 [ 14.771915] kasan_atomics+0x1dc/0x310 [ 14.771938] ? __pfx_kasan_atomics+0x10/0x10 [ 14.771962] ? __pfx_read_tsc+0x10/0x10 [ 14.771983] ? ktime_get_ts64+0x86/0x230 [ 14.772008] kunit_try_run_case+0x1a5/0x480 [ 14.772033] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.772056] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.772079] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.772102] ? __kthread_parkme+0x82/0x180 [ 14.772127] ? preempt_count_sub+0x50/0x80 [ 14.772150] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.772175] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.772197] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.772234] kthread+0x337/0x6f0 [ 14.772267] ? trace_preempt_on+0x20/0xc0 [ 14.772291] ? __pfx_kthread+0x10/0x10 [ 14.772312] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.772334] ? calculate_sigpending+0x7b/0xa0 [ 14.772358] ? __pfx_kthread+0x10/0x10 [ 14.772380] ret_from_fork+0x116/0x1d0 [ 14.772399] ? __pfx_kthread+0x10/0x10 [ 14.772420] ret_from_fork_asm+0x1a/0x30 [ 14.772449] </TASK> [ 14.772462] [ 14.786724] Allocated by task 282: [ 14.787184] kasan_save_stack+0x45/0x70 [ 14.787633] kasan_save_track+0x18/0x40 [ 14.787793] kasan_save_alloc_info+0x3b/0x50 [ 14.787941] __kasan_kmalloc+0xb7/0xc0 [ 14.788073] __kmalloc_cache_noprof+0x189/0x420 [ 14.788513] kasan_atomics+0x95/0x310 [ 14.788875] kunit_try_run_case+0x1a5/0x480 [ 14.789335] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.789604] kthread+0x337/0x6f0 [ 14.789760] ret_from_fork+0x116/0x1d0 [ 14.789933] ret_from_fork_asm+0x1a/0x30 [ 14.790118] [ 14.790211] The buggy address belongs to the object at ffff888103991d00 [ 14.790211] which belongs to the cache kmalloc-64 of size 64 [ 14.791622] The buggy address is located 0 bytes to the right of [ 14.791622] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 14.792170] [ 14.792572] The buggy address belongs to the physical page: [ 14.792968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 14.793974] flags: 0x200000000000000(node=0|zone=2) [ 14.794437] page_type: f5(slab) [ 14.794815] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.795134] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.795680] page dumped because: kasan: bad access detected [ 14.795958] [ 14.796057] Memory state around the buggy address: [ 14.796538] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.797108] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.797932] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.798452] ^ [ 14.798895] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.799379] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.799851] ================================================================== [ 14.800551] ================================================================== [ 14.800899] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 14.801571] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282 [ 14.802133] [ 14.802403] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.802462] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.802487] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.802513] Call Trace: [ 14.802544] <TASK> [ 14.802567] dump_stack_lvl+0x73/0xb0 [ 14.802605] print_report+0xd1/0x650 [ 14.802629] ? __virt_addr_valid+0x1db/0x2d0 [ 14.802654] ? kasan_atomics_helper+0x860/0x5450 [ 14.802677] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.802700] ? kasan_atomics_helper+0x860/0x5450 [ 14.802722] kasan_report+0x141/0x180 [ 14.802744] ? kasan_atomics_helper+0x860/0x5450 [ 14.802770] kasan_check_range+0x10c/0x1c0 [ 14.802795] __kasan_check_write+0x18/0x20 [ 14.802815] kasan_atomics_helper+0x860/0x5450 [ 14.802840] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.802863] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.802890] ? ret_from_fork_asm+0x1a/0x30 [ 14.802913] ? kasan_atomics+0x152/0x310 [ 14.802940] kasan_atomics+0x1dc/0x310 [ 14.802963] ? __pfx_kasan_atomics+0x10/0x10 [ 14.802988] ? __pfx_read_tsc+0x10/0x10 [ 14.803010] ? ktime_get_ts64+0x86/0x230 [ 14.803036] kunit_try_run_case+0x1a5/0x480 [ 14.803061] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.803083] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.803107] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.803130] ? __kthread_parkme+0x82/0x180 [ 14.803151] ? preempt_count_sub+0x50/0x80 [ 14.803175] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.803199] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.803236] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.803260] kthread+0x337/0x6f0 [ 14.803281] ? trace_preempt_on+0x20/0xc0 [ 14.803305] ? __pfx_kthread+0x10/0x10 [ 14.803327] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.803348] ? calculate_sigpending+0x7b/0xa0 [ 14.803375] ? __pfx_kthread+0x10/0x10 [ 14.803399] ret_from_fork+0x116/0x1d0 [ 14.803418] ? __pfx_kthread+0x10/0x10 [ 14.803440] ret_from_fork_asm+0x1a/0x30 [ 14.803470] </TASK> [ 14.803482] [ 14.814465] Allocated by task 282: [ 14.814724] kasan_save_stack+0x45/0x70 [ 14.814901] kasan_save_track+0x18/0x40 [ 14.815039] kasan_save_alloc_info+0x3b/0x50 [ 14.815375] __kasan_kmalloc+0xb7/0xc0 [ 14.815635] __kmalloc_cache_noprof+0x189/0x420 [ 14.815833] kasan_atomics+0x95/0x310 [ 14.816093] kunit_try_run_case+0x1a5/0x480 [ 14.816350] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.816522] kthread+0x337/0x6f0 [ 14.816668] ret_from_fork+0x116/0x1d0 [ 14.816867] ret_from_fork_asm+0x1a/0x30 [ 14.817069] [ 14.817168] The buggy address belongs to the object at ffff888103991d00 [ 14.817168] which belongs to the cache kmalloc-64 of size 64 [ 14.818517] The buggy address is located 0 bytes to the right of [ 14.818517] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 14.819045] [ 14.819409] The buggy address belongs to the physical page: [ 14.819784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 14.820175] flags: 0x200000000000000(node=0|zone=2) [ 14.820456] page_type: f5(slab) [ 14.821049] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.821734] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.822142] page dumped because: kasan: bad access detected [ 14.822561] [ 14.822885] Memory state around the buggy address: [ 14.823118] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.823583] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.823998] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.824451] ^ [ 14.824798] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.825131] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.825689] ================================================================== [ 15.084479] ================================================================== [ 15.084867] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 15.085339] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.085692] [ 15.085809] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.085861] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.085876] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.085900] Call Trace: [ 15.085922] <TASK> [ 15.085944] dump_stack_lvl+0x73/0xb0 [ 15.085976] print_report+0xd1/0x650 [ 15.086001] ? __virt_addr_valid+0x1db/0x2d0 [ 15.086025] ? kasan_atomics_helper+0xf10/0x5450 [ 15.086048] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.086071] ? kasan_atomics_helper+0xf10/0x5450 [ 15.086093] kasan_report+0x141/0x180 [ 15.086116] ? kasan_atomics_helper+0xf10/0x5450 [ 15.086142] kasan_check_range+0x10c/0x1c0 [ 15.086166] __kasan_check_write+0x18/0x20 [ 15.086185] kasan_atomics_helper+0xf10/0x5450 [ 15.086209] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.086248] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.086293] ? ret_from_fork_asm+0x1a/0x30 [ 15.086339] ? kasan_atomics+0x152/0x310 [ 15.086367] kasan_atomics+0x1dc/0x310 [ 15.086406] ? __pfx_kasan_atomics+0x10/0x10 [ 15.086432] ? __pfx_read_tsc+0x10/0x10 [ 15.086468] ? ktime_get_ts64+0x86/0x230 [ 15.086494] kunit_try_run_case+0x1a5/0x480 [ 15.086520] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.086542] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.086567] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.086590] ? __kthread_parkme+0x82/0x180 [ 15.086612] ? preempt_count_sub+0x50/0x80 [ 15.086636] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.086660] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.086684] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.086708] kthread+0x337/0x6f0 [ 15.086728] ? trace_preempt_on+0x20/0xc0 [ 15.086771] ? __pfx_kthread+0x10/0x10 [ 15.086793] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.086814] ? calculate_sigpending+0x7b/0xa0 [ 15.086839] ? __pfx_kthread+0x10/0x10 [ 15.086861] ret_from_fork+0x116/0x1d0 [ 15.086879] ? __pfx_kthread+0x10/0x10 [ 15.086900] ret_from_fork_asm+0x1a/0x30 [ 15.086948] </TASK> [ 15.086961] [ 15.097729] Allocated by task 282: [ 15.097887] kasan_save_stack+0x45/0x70 [ 15.098046] kasan_save_track+0x18/0x40 [ 15.098272] kasan_save_alloc_info+0x3b/0x50 [ 15.098513] __kasan_kmalloc+0xb7/0xc0 [ 15.098727] __kmalloc_cache_noprof+0x189/0x420 [ 15.099000] kasan_atomics+0x95/0x310 [ 15.099199] kunit_try_run_case+0x1a5/0x480 [ 15.099452] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.099667] kthread+0x337/0x6f0 [ 15.099790] ret_from_fork+0x116/0x1d0 [ 15.099920] ret_from_fork_asm+0x1a/0x30 [ 15.100118] [ 15.100251] The buggy address belongs to the object at ffff888103991d00 [ 15.100251] which belongs to the cache kmalloc-64 of size 64 [ 15.100850] The buggy address is located 0 bytes to the right of [ 15.100850] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.101381] [ 15.101458] The buggy address belongs to the physical page: [ 15.101651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.102024] flags: 0x200000000000000(node=0|zone=2) [ 15.102343] page_type: f5(slab) [ 15.102534] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.102849] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.103159] page dumped because: kasan: bad access detected [ 15.103442] [ 15.103543] Memory state around the buggy address: [ 15.103772] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.104059] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.104280] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.104730] ^ [ 15.104966] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.105380] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.105708] ================================================================== [ 15.271275] ================================================================== [ 15.272019] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 15.272514] Read of size 4 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.272833] [ 15.272954] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.273005] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.273019] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.273043] Call Trace: [ 15.273065] <TASK> [ 15.273087] dump_stack_lvl+0x73/0xb0 [ 15.273122] print_report+0xd1/0x650 [ 15.273147] ? __virt_addr_valid+0x1db/0x2d0 [ 15.273173] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.273195] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.273231] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.273254] kasan_report+0x141/0x180 [ 15.273277] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.273303] __asan_report_load4_noabort+0x18/0x20 [ 15.273327] kasan_atomics_helper+0x49e8/0x5450 [ 15.273350] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.273373] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.273399] ? ret_from_fork_asm+0x1a/0x30 [ 15.273421] ? kasan_atomics+0x152/0x310 [ 15.273447] kasan_atomics+0x1dc/0x310 [ 15.273471] ? __pfx_kasan_atomics+0x10/0x10 [ 15.273495] ? __pfx_read_tsc+0x10/0x10 [ 15.273517] ? ktime_get_ts64+0x86/0x230 [ 15.273542] kunit_try_run_case+0x1a5/0x480 [ 15.273568] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.273603] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.273628] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.273651] ? __kthread_parkme+0x82/0x180 [ 15.273672] ? preempt_count_sub+0x50/0x80 [ 15.273697] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.273721] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.273744] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.273768] kthread+0x337/0x6f0 [ 15.273787] ? trace_preempt_on+0x20/0xc0 [ 15.273812] ? __pfx_kthread+0x10/0x10 [ 15.273833] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.273855] ? calculate_sigpending+0x7b/0xa0 [ 15.273880] ? __pfx_kthread+0x10/0x10 [ 15.273901] ret_from_fork+0x116/0x1d0 [ 15.273920] ? __pfx_kthread+0x10/0x10 [ 15.273941] ret_from_fork_asm+0x1a/0x30 [ 15.273971] </TASK> [ 15.273983] [ 15.281439] Allocated by task 282: [ 15.281628] kasan_save_stack+0x45/0x70 [ 15.281831] kasan_save_track+0x18/0x40 [ 15.282006] kasan_save_alloc_info+0x3b/0x50 [ 15.282196] __kasan_kmalloc+0xb7/0xc0 [ 15.282434] __kmalloc_cache_noprof+0x189/0x420 [ 15.282592] kasan_atomics+0x95/0x310 [ 15.282727] kunit_try_run_case+0x1a5/0x480 [ 15.282879] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.283131] kthread+0x337/0x6f0 [ 15.283315] ret_from_fork+0x116/0x1d0 [ 15.283571] ret_from_fork_asm+0x1a/0x30 [ 15.283718] [ 15.283791] The buggy address belongs to the object at ffff888103991d00 [ 15.283791] which belongs to the cache kmalloc-64 of size 64 [ 15.284386] The buggy address is located 0 bytes to the right of [ 15.284386] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.284896] [ 15.284990] The buggy address belongs to the physical page: [ 15.285167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.285424] flags: 0x200000000000000(node=0|zone=2) [ 15.285680] page_type: f5(slab) [ 15.285859] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.286234] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.286579] page dumped because: kasan: bad access detected [ 15.286837] [ 15.286919] Memory state around the buggy address: [ 15.287122] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.287449] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.287693] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.287997] ^ [ 15.288235] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.288551] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.288854] ================================================================== [ 14.744156] ================================================================== [ 14.744550] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 14.744919] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282 [ 14.745232] [ 14.745330] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.745382] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.745397] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.745421] Call Trace: [ 14.745444] <TASK> [ 14.745466] dump_stack_lvl+0x73/0xb0 [ 14.745518] print_report+0xd1/0x650 [ 14.745543] ? __virt_addr_valid+0x1db/0x2d0 [ 14.745566] ? kasan_atomics_helper+0x72f/0x5450 [ 14.745588] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.745611] ? kasan_atomics_helper+0x72f/0x5450 [ 14.745633] kasan_report+0x141/0x180 [ 14.745656] ? kasan_atomics_helper+0x72f/0x5450 [ 14.745682] kasan_check_range+0x10c/0x1c0 [ 14.745706] __kasan_check_write+0x18/0x20 [ 14.745724] kasan_atomics_helper+0x72f/0x5450 [ 14.745749] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.745771] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.745796] ? ret_from_fork_asm+0x1a/0x30 [ 14.745820] ? kasan_atomics+0x152/0x310 [ 14.745845] kasan_atomics+0x1dc/0x310 [ 14.745869] ? __pfx_kasan_atomics+0x10/0x10 [ 14.745892] ? __pfx_read_tsc+0x10/0x10 [ 14.745914] ? ktime_get_ts64+0x86/0x230 [ 14.745939] kunit_try_run_case+0x1a5/0x480 [ 14.745965] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.745988] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.746011] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.746034] ? __kthread_parkme+0x82/0x180 [ 14.746056] ? preempt_count_sub+0x50/0x80 [ 14.746080] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.746104] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.746127] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.746150] kthread+0x337/0x6f0 [ 14.746169] ? trace_preempt_on+0x20/0xc0 [ 14.746194] ? __pfx_kthread+0x10/0x10 [ 14.746214] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.746247] ? calculate_sigpending+0x7b/0xa0 [ 14.746271] ? __pfx_kthread+0x10/0x10 [ 14.746293] ret_from_fork+0x116/0x1d0 [ 14.746311] ? __pfx_kthread+0x10/0x10 [ 14.746332] ret_from_fork_asm+0x1a/0x30 [ 14.746362] </TASK> [ 14.746376] [ 14.755113] Allocated by task 282: [ 14.755330] kasan_save_stack+0x45/0x70 [ 14.755541] kasan_save_track+0x18/0x40 [ 14.755738] kasan_save_alloc_info+0x3b/0x50 [ 14.755912] __kasan_kmalloc+0xb7/0xc0 [ 14.756104] __kmalloc_cache_noprof+0x189/0x420 [ 14.757495] kasan_atomics+0x95/0x310 [ 14.757865] kunit_try_run_case+0x1a5/0x480 [ 14.758032] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.758213] kthread+0x337/0x6f0 [ 14.758353] ret_from_fork+0x116/0x1d0 [ 14.758490] ret_from_fork_asm+0x1a/0x30 [ 14.758631] [ 14.758709] The buggy address belongs to the object at ffff888103991d00 [ 14.758709] which belongs to the cache kmalloc-64 of size 64 [ 14.759071] The buggy address is located 0 bytes to the right of [ 14.759071] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 14.760705] [ 14.761174] The buggy address belongs to the physical page: [ 14.762077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 14.762562] flags: 0x200000000000000(node=0|zone=2) [ 14.762742] page_type: f5(slab) [ 14.762872] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.763108] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.763809] page dumped because: kasan: bad access detected [ 14.764296] [ 14.764558] Memory state around the buggy address: [ 14.764963] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.765247] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.765915] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.766627] ^ [ 14.766864] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.767157] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.767682] ================================================================== [ 14.856144] ================================================================== [ 14.856891] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 14.857439] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282 [ 14.857678] [ 14.857801] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.857852] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.857866] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.857890] Call Trace: [ 14.857913] <TASK> [ 14.857937] dump_stack_lvl+0x73/0xb0 [ 14.857973] print_report+0xd1/0x650 [ 14.857998] ? __virt_addr_valid+0x1db/0x2d0 [ 14.858021] ? kasan_atomics_helper+0x992/0x5450 [ 14.858043] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.858066] ? kasan_atomics_helper+0x992/0x5450 [ 14.858357] kasan_report+0x141/0x180 [ 14.858382] ? kasan_atomics_helper+0x992/0x5450 [ 14.858408] kasan_check_range+0x10c/0x1c0 [ 14.858432] __kasan_check_write+0x18/0x20 [ 14.858453] kasan_atomics_helper+0x992/0x5450 [ 14.858475] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.858498] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.858523] ? ret_from_fork_asm+0x1a/0x30 [ 14.858547] ? kasan_atomics+0x152/0x310 [ 14.858573] kasan_atomics+0x1dc/0x310 [ 14.858596] ? __pfx_kasan_atomics+0x10/0x10 [ 14.858624] ? __pfx_read_tsc+0x10/0x10 [ 14.858648] ? ktime_get_ts64+0x86/0x230 [ 14.858673] kunit_try_run_case+0x1a5/0x480 [ 14.858699] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.858722] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.858748] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.858771] ? __kthread_parkme+0x82/0x180 [ 14.858793] ? preempt_count_sub+0x50/0x80 [ 14.858817] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.858841] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.858864] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.858888] kthread+0x337/0x6f0 [ 14.858908] ? trace_preempt_on+0x20/0xc0 [ 14.858932] ? __pfx_kthread+0x10/0x10 [ 14.858952] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.858974] ? calculate_sigpending+0x7b/0xa0 [ 14.858999] ? __pfx_kthread+0x10/0x10 [ 14.859021] ret_from_fork+0x116/0x1d0 [ 14.859040] ? __pfx_kthread+0x10/0x10 [ 14.859061] ret_from_fork_asm+0x1a/0x30 [ 14.859092] </TASK> [ 14.859104] [ 14.869753] Allocated by task 282: [ 14.870003] kasan_save_stack+0x45/0x70 [ 14.870172] kasan_save_track+0x18/0x40 [ 14.870350] kasan_save_alloc_info+0x3b/0x50 [ 14.870613] __kasan_kmalloc+0xb7/0xc0 [ 14.871022] __kmalloc_cache_noprof+0x189/0x420 [ 14.871244] kasan_atomics+0x95/0x310 [ 14.871437] kunit_try_run_case+0x1a5/0x480 [ 14.871990] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.872189] kthread+0x337/0x6f0 [ 14.872509] ret_from_fork+0x116/0x1d0 [ 14.872686] ret_from_fork_asm+0x1a/0x30 [ 14.872871] [ 14.872974] The buggy address belongs to the object at ffff888103991d00 [ 14.872974] which belongs to the cache kmalloc-64 of size 64 [ 14.873857] The buggy address is located 0 bytes to the right of [ 14.873857] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 14.874545] [ 14.874745] The buggy address belongs to the physical page: [ 14.874985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 14.875249] flags: 0x200000000000000(node=0|zone=2) [ 14.875493] page_type: f5(slab) [ 14.875944] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.876550] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.877050] page dumped because: kasan: bad access detected [ 14.877404] [ 14.877494] Memory state around the buggy address: [ 14.877754] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.878070] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.878567] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.878860] ^ [ 14.879185] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.879720] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.880041] ================================================================== [ 15.053918] ================================================================== [ 15.054872] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 15.055153] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.055412] [ 15.055510] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.055561] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.055575] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.055600] Call Trace: [ 15.055623] <TASK> [ 15.055647] dump_stack_lvl+0x73/0xb0 [ 15.055683] print_report+0xd1/0x650 [ 15.055708] ? __virt_addr_valid+0x1db/0x2d0 [ 15.055732] ? kasan_atomics_helper+0xe78/0x5450 [ 15.055754] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.055777] ? kasan_atomics_helper+0xe78/0x5450 [ 15.055799] kasan_report+0x141/0x180 [ 15.055821] ? kasan_atomics_helper+0xe78/0x5450 [ 15.055847] kasan_check_range+0x10c/0x1c0 [ 15.055871] __kasan_check_write+0x18/0x20 [ 15.055892] kasan_atomics_helper+0xe78/0x5450 [ 15.055917] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.055940] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.055965] ? ret_from_fork_asm+0x1a/0x30 [ 15.055988] ? kasan_atomics+0x152/0x310 [ 15.056015] kasan_atomics+0x1dc/0x310 [ 15.056038] ? __pfx_kasan_atomics+0x10/0x10 [ 15.056062] ? __pfx_read_tsc+0x10/0x10 [ 15.056084] ? ktime_get_ts64+0x86/0x230 [ 15.056110] kunit_try_run_case+0x1a5/0x480 [ 15.056135] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.056158] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.056183] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.056207] ? __kthread_parkme+0x82/0x180 [ 15.056239] ? preempt_count_sub+0x50/0x80 [ 15.056264] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.056287] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.056310] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.056334] kthread+0x337/0x6f0 [ 15.056355] ? trace_preempt_on+0x20/0xc0 [ 15.056379] ? __pfx_kthread+0x10/0x10 [ 15.056401] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.056422] ? calculate_sigpending+0x7b/0xa0 [ 15.056447] ? __pfx_kthread+0x10/0x10 [ 15.056471] ret_from_fork+0x116/0x1d0 [ 15.056491] ? __pfx_kthread+0x10/0x10 [ 15.056512] ret_from_fork_asm+0x1a/0x30 [ 15.056543] </TASK> [ 15.056555] [ 15.071884] Allocated by task 282: [ 15.072058] kasan_save_stack+0x45/0x70 [ 15.072216] kasan_save_track+0x18/0x40 [ 15.072665] kasan_save_alloc_info+0x3b/0x50 [ 15.073089] __kasan_kmalloc+0xb7/0xc0 [ 15.073524] __kmalloc_cache_noprof+0x189/0x420 [ 15.073961] kasan_atomics+0x95/0x310 [ 15.074374] kunit_try_run_case+0x1a5/0x480 [ 15.074786] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.075296] kthread+0x337/0x6f0 [ 15.075538] ret_from_fork+0x116/0x1d0 [ 15.075896] ret_from_fork_asm+0x1a/0x30 [ 15.076036] [ 15.076109] The buggy address belongs to the object at ffff888103991d00 [ 15.076109] which belongs to the cache kmalloc-64 of size 64 [ 15.076565] The buggy address is located 0 bytes to the right of [ 15.076565] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.077673] [ 15.077885] The buggy address belongs to the physical page: [ 15.078434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.079183] flags: 0x200000000000000(node=0|zone=2) [ 15.079709] page_type: f5(slab) [ 15.079937] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.080165] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.080735] page dumped because: kasan: bad access detected [ 15.081243] [ 15.081428] Memory state around the buggy address: [ 15.081873] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.082512] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.082823] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.083033] ^ [ 15.083189] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.083495] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.083774] ================================================================== [ 15.605844] ================================================================== [ 15.606198] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 15.606526] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.606751] [ 15.606844] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.606890] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.606903] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.606927] Call Trace: [ 15.606950] <TASK> [ 15.606971] dump_stack_lvl+0x73/0xb0 [ 15.607002] print_report+0xd1/0x650 [ 15.607027] ? __virt_addr_valid+0x1db/0x2d0 [ 15.607050] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.607072] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.607095] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.607116] kasan_report+0x141/0x180 [ 15.607139] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.607176] kasan_check_range+0x10c/0x1c0 [ 15.607200] __kasan_check_write+0x18/0x20 [ 15.607236] kasan_atomics_helper+0x1a7f/0x5450 [ 15.607270] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.607292] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.607317] ? ret_from_fork_asm+0x1a/0x30 [ 15.607340] ? kasan_atomics+0x152/0x310 [ 15.607367] kasan_atomics+0x1dc/0x310 [ 15.607390] ? __pfx_kasan_atomics+0x10/0x10 [ 15.607414] ? __pfx_read_tsc+0x10/0x10 [ 15.607436] ? ktime_get_ts64+0x86/0x230 [ 15.607460] kunit_try_run_case+0x1a5/0x480 [ 15.607486] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.607509] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.607533] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.607557] ? __kthread_parkme+0x82/0x180 [ 15.607577] ? preempt_count_sub+0x50/0x80 [ 15.607602] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.607627] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.607650] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.607673] kthread+0x337/0x6f0 [ 15.607692] ? trace_preempt_on+0x20/0xc0 [ 15.607716] ? __pfx_kthread+0x10/0x10 [ 15.607737] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.607758] ? calculate_sigpending+0x7b/0xa0 [ 15.607783] ? __pfx_kthread+0x10/0x10 [ 15.607805] ret_from_fork+0x116/0x1d0 [ 15.607824] ? __pfx_kthread+0x10/0x10 [ 15.607845] ret_from_fork_asm+0x1a/0x30 [ 15.607886] </TASK> [ 15.607901] [ 15.616024] Allocated by task 282: [ 15.616426] kasan_save_stack+0x45/0x70 [ 15.616693] kasan_save_track+0x18/0x40 [ 15.616903] kasan_save_alloc_info+0x3b/0x50 [ 15.617116] __kasan_kmalloc+0xb7/0xc0 [ 15.617275] __kmalloc_cache_noprof+0x189/0x420 [ 15.617505] kasan_atomics+0x95/0x310 [ 15.617703] kunit_try_run_case+0x1a5/0x480 [ 15.617899] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.618126] kthread+0x337/0x6f0 [ 15.618369] ret_from_fork+0x116/0x1d0 [ 15.618569] ret_from_fork_asm+0x1a/0x30 [ 15.618795] [ 15.618897] The buggy address belongs to the object at ffff888103991d00 [ 15.618897] which belongs to the cache kmalloc-64 of size 64 [ 15.619512] The buggy address is located 0 bytes to the right of [ 15.619512] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.619882] [ 15.620031] The buggy address belongs to the physical page: [ 15.620366] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.620741] flags: 0x200000000000000(node=0|zone=2) [ 15.620989] page_type: f5(slab) [ 15.621114] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.621363] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.621597] page dumped because: kasan: bad access detected [ 15.621823] [ 15.621933] Memory state around the buggy address: [ 15.622161] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.622791] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.623113] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.624393] ^ [ 15.624673] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.624912] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.625129] ================================================================== [ 15.961526] ================================================================== [ 15.961988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 15.963051] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.963342] [ 15.963442] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.963493] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.963507] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.963532] Call Trace: [ 15.963554] <TASK> [ 15.963577] dump_stack_lvl+0x73/0xb0 [ 15.963612] print_report+0xd1/0x650 [ 15.963637] ? __virt_addr_valid+0x1db/0x2d0 [ 15.963661] ? kasan_atomics_helper+0x224c/0x5450 [ 15.963683] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.963705] ? kasan_atomics_helper+0x224c/0x5450 [ 15.963728] kasan_report+0x141/0x180 [ 15.963752] ? kasan_atomics_helper+0x224c/0x5450 [ 15.963778] kasan_check_range+0x10c/0x1c0 [ 15.963803] __kasan_check_write+0x18/0x20 [ 15.963823] kasan_atomics_helper+0x224c/0x5450 [ 15.963846] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.963869] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.963894] ? ret_from_fork_asm+0x1a/0x30 [ 15.963916] ? kasan_atomics+0x152/0x310 [ 15.963943] kasan_atomics+0x1dc/0x310 [ 15.963966] ? __pfx_kasan_atomics+0x10/0x10 [ 15.963989] ? __pfx_read_tsc+0x10/0x10 [ 15.964014] ? ktime_get_ts64+0x86/0x230 [ 15.964073] kunit_try_run_case+0x1a5/0x480 [ 15.964105] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.964128] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.964152] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.964176] ? __kthread_parkme+0x82/0x180 [ 15.964196] ? preempt_count_sub+0x50/0x80 [ 15.964252] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.964277] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.964299] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.964322] kthread+0x337/0x6f0 [ 15.964343] ? trace_preempt_on+0x20/0xc0 [ 15.964367] ? __pfx_kthread+0x10/0x10 [ 15.964387] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.964409] ? calculate_sigpending+0x7b/0xa0 [ 15.964434] ? __pfx_kthread+0x10/0x10 [ 15.964456] ret_from_fork+0x116/0x1d0 [ 15.964475] ? __pfx_kthread+0x10/0x10 [ 15.964496] ret_from_fork_asm+0x1a/0x30 [ 15.964527] </TASK> [ 15.964540] [ 15.972891] Allocated by task 282: [ 15.973118] kasan_save_stack+0x45/0x70 [ 15.973358] kasan_save_track+0x18/0x40 [ 15.973535] kasan_save_alloc_info+0x3b/0x50 [ 15.973682] __kasan_kmalloc+0xb7/0xc0 [ 15.973811] __kmalloc_cache_noprof+0x189/0x420 [ 15.973964] kasan_atomics+0x95/0x310 [ 15.974148] kunit_try_run_case+0x1a5/0x480 [ 15.974360] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.974615] kthread+0x337/0x6f0 [ 15.974783] ret_from_fork+0x116/0x1d0 [ 15.974943] ret_from_fork_asm+0x1a/0x30 [ 15.975080] [ 15.975151] The buggy address belongs to the object at ffff888103991d00 [ 15.975151] which belongs to the cache kmalloc-64 of size 64 [ 15.975907] The buggy address is located 0 bytes to the right of [ 15.975907] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.976437] [ 15.976528] The buggy address belongs to the physical page: [ 15.976762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.977071] flags: 0x200000000000000(node=0|zone=2) [ 15.977249] page_type: f5(slab) [ 15.977371] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.977713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.978058] page dumped because: kasan: bad access detected [ 15.978238] [ 15.978346] Memory state around the buggy address: [ 15.978576] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.978865] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.979150] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.979427] ^ [ 15.979580] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.979790] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.980092] ================================================================== [ 14.457496] ================================================================== [ 14.458787] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 14.459571] Read of size 4 at addr ffff888103991d30 by task kunit_try_catch/282 [ 14.460624] [ 14.461031] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.461309] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.461368] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.461394] Call Trace: [ 14.461414] <TASK> [ 14.461439] dump_stack_lvl+0x73/0xb0 [ 14.461482] print_report+0xd1/0x650 [ 14.461506] ? __virt_addr_valid+0x1db/0x2d0 [ 14.461528] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.461549] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.461571] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.461591] kasan_report+0x141/0x180 [ 14.461612] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.461637] __asan_report_load4_noabort+0x18/0x20 [ 14.461660] kasan_atomics_helper+0x4bbc/0x5450 [ 14.461681] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.461702] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.461726] ? ret_from_fork_asm+0x1a/0x30 [ 14.461747] ? kasan_atomics+0x152/0x310 [ 14.461771] kasan_atomics+0x1dc/0x310 [ 14.461793] ? __pfx_kasan_atomics+0x10/0x10 [ 14.461816] ? __pfx_read_tsc+0x10/0x10 [ 14.461836] ? ktime_get_ts64+0x86/0x230 [ 14.461859] kunit_try_run_case+0x1a5/0x480 [ 14.461885] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.461906] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.461930] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.461952] ? __kthread_parkme+0x82/0x180 [ 14.461972] ? preempt_count_sub+0x50/0x80 [ 14.461994] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.462017] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.462038] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.462061] kthread+0x337/0x6f0 [ 14.462081] ? trace_preempt_on+0x20/0xc0 [ 14.462104] ? __pfx_kthread+0x10/0x10 [ 14.462123] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.462143] ? calculate_sigpending+0x7b/0xa0 [ 14.462166] ? __pfx_kthread+0x10/0x10 [ 14.462187] ret_from_fork+0x116/0x1d0 [ 14.462234] ? __pfx_kthread+0x10/0x10 [ 14.462254] ret_from_fork_asm+0x1a/0x30 [ 14.462284] </TASK> [ 14.462296] [ 14.479346] Allocated by task 282: [ 14.479559] kasan_save_stack+0x45/0x70 [ 14.479768] kasan_save_track+0x18/0x40 [ 14.479941] kasan_save_alloc_info+0x3b/0x50 [ 14.480133] __kasan_kmalloc+0xb7/0xc0 [ 14.480671] __kmalloc_cache_noprof+0x189/0x420 [ 14.481044] kasan_atomics+0x95/0x310 [ 14.481522] kunit_try_run_case+0x1a5/0x480 [ 14.481791] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.482209] kthread+0x337/0x6f0 [ 14.482533] ret_from_fork+0x116/0x1d0 [ 14.482748] ret_from_fork_asm+0x1a/0x30 [ 14.482950] [ 14.483086] The buggy address belongs to the object at ffff888103991d00 [ 14.483086] which belongs to the cache kmalloc-64 of size 64 [ 14.484077] The buggy address is located 0 bytes to the right of [ 14.484077] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 14.484958] [ 14.485237] The buggy address belongs to the physical page: [ 14.485701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 14.486046] flags: 0x200000000000000(node=0|zone=2) [ 14.486569] page_type: f5(slab) [ 14.486801] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.487373] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.487877] page dumped because: kasan: bad access detected [ 14.488085] [ 14.488178] Memory state around the buggy address: [ 14.488721] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.489294] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.489595] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.489887] ^ [ 14.490096] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.490757] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.491256] ================================================================== [ 15.175725] ================================================================== [ 15.176903] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 15.177911] Read of size 4 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.178905] [ 15.179229] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.179366] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.179381] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.179407] Call Trace: [ 15.179430] <TASK> [ 15.179453] dump_stack_lvl+0x73/0xb0 [ 15.179496] print_report+0xd1/0x650 [ 15.179523] ? __virt_addr_valid+0x1db/0x2d0 [ 15.179552] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.179575] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.179714] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.179742] kasan_report+0x141/0x180 [ 15.179767] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.179794] __asan_report_load4_noabort+0x18/0x20 [ 15.179820] kasan_atomics_helper+0x4a1c/0x5450 [ 15.179842] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.179865] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.179891] ? ret_from_fork_asm+0x1a/0x30 [ 15.179914] ? kasan_atomics+0x152/0x310 [ 15.179940] kasan_atomics+0x1dc/0x310 [ 15.179965] ? __pfx_kasan_atomics+0x10/0x10 [ 15.179992] ? __pfx_read_tsc+0x10/0x10 [ 15.180017] ? ktime_get_ts64+0x86/0x230 [ 15.180042] kunit_try_run_case+0x1a5/0x480 [ 15.180068] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.180091] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.180116] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.180139] ? __kthread_parkme+0x82/0x180 [ 15.180161] ? preempt_count_sub+0x50/0x80 [ 15.180186] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.180209] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.180270] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.180295] kthread+0x337/0x6f0 [ 15.180314] ? trace_preempt_on+0x20/0xc0 [ 15.180338] ? __pfx_kthread+0x10/0x10 [ 15.180359] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.180381] ? calculate_sigpending+0x7b/0xa0 [ 15.180405] ? __pfx_kthread+0x10/0x10 [ 15.180427] ret_from_fork+0x116/0x1d0 [ 15.180447] ? __pfx_kthread+0x10/0x10 [ 15.180469] ret_from_fork_asm+0x1a/0x30 [ 15.180500] </TASK> [ 15.180512] [ 15.191303] Allocated by task 282: [ 15.191531] kasan_save_stack+0x45/0x70 [ 15.191883] kasan_save_track+0x18/0x40 [ 15.192080] kasan_save_alloc_info+0x3b/0x50 [ 15.192485] __kasan_kmalloc+0xb7/0xc0 [ 15.192663] __kmalloc_cache_noprof+0x189/0x420 [ 15.193003] kasan_atomics+0x95/0x310 [ 15.193190] kunit_try_run_case+0x1a5/0x480 [ 15.193600] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.193786] kthread+0x337/0x6f0 [ 15.193913] ret_from_fork+0x116/0x1d0 [ 15.194108] ret_from_fork_asm+0x1a/0x30 [ 15.194463] [ 15.194673] The buggy address belongs to the object at ffff888103991d00 [ 15.194673] which belongs to the cache kmalloc-64 of size 64 [ 15.195228] The buggy address is located 0 bytes to the right of [ 15.195228] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.195755] [ 15.195980] The buggy address belongs to the physical page: [ 15.196370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.196813] flags: 0x200000000000000(node=0|zone=2) [ 15.197127] page_type: f5(slab) [ 15.197351] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.197745] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.198067] page dumped because: kasan: bad access detected [ 15.198294] [ 15.198401] Memory state around the buggy address: [ 15.198588] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.199059] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.199519] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.199875] ^ [ 15.200062] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.200415] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.200741] ================================================================== [ 15.674148] ================================================================== [ 15.674512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 15.675164] Read of size 8 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.675679] [ 15.675782] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.675841] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.675856] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.675888] Call Trace: [ 15.675910] <TASK> [ 15.675933] dump_stack_lvl+0x73/0xb0 [ 15.675966] print_report+0xd1/0x650 [ 15.675992] ? __virt_addr_valid+0x1db/0x2d0 [ 15.676017] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.676042] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.676067] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.676090] kasan_report+0x141/0x180 [ 15.676113] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.676141] __asan_report_load8_noabort+0x18/0x20 [ 15.676166] kasan_atomics_helper+0x4f30/0x5450 [ 15.676190] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.676213] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.676250] ? ret_from_fork_asm+0x1a/0x30 [ 15.676286] ? kasan_atomics+0x152/0x310 [ 15.676314] kasan_atomics+0x1dc/0x310 [ 15.676339] ? __pfx_kasan_atomics+0x10/0x10 [ 15.676365] ? __pfx_read_tsc+0x10/0x10 [ 15.676388] ? ktime_get_ts64+0x86/0x230 [ 15.676414] kunit_try_run_case+0x1a5/0x480 [ 15.676441] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.676467] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.676495] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.676521] ? __kthread_parkme+0x82/0x180 [ 15.676544] ? preempt_count_sub+0x50/0x80 [ 15.676582] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.676609] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.676633] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.676677] kthread+0x337/0x6f0 [ 15.676699] ? trace_preempt_on+0x20/0xc0 [ 15.676723] ? __pfx_kthread+0x10/0x10 [ 15.676755] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.676777] ? calculate_sigpending+0x7b/0xa0 [ 15.676817] ? __pfx_kthread+0x10/0x10 [ 15.676839] ret_from_fork+0x116/0x1d0 [ 15.676857] ? __pfx_kthread+0x10/0x10 [ 15.676878] ret_from_fork_asm+0x1a/0x30 [ 15.676909] </TASK> [ 15.676923] [ 15.684758] Allocated by task 282: [ 15.684983] kasan_save_stack+0x45/0x70 [ 15.685246] kasan_save_track+0x18/0x40 [ 15.685472] kasan_save_alloc_info+0x3b/0x50 [ 15.685829] __kasan_kmalloc+0xb7/0xc0 [ 15.686025] __kmalloc_cache_noprof+0x189/0x420 [ 15.686286] kasan_atomics+0x95/0x310 [ 15.686488] kunit_try_run_case+0x1a5/0x480 [ 15.686651] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.687001] kthread+0x337/0x6f0 [ 15.687199] ret_from_fork+0x116/0x1d0 [ 15.687406] ret_from_fork_asm+0x1a/0x30 [ 15.687694] [ 15.687783] The buggy address belongs to the object at ffff888103991d00 [ 15.687783] which belongs to the cache kmalloc-64 of size 64 [ 15.688294] The buggy address is located 0 bytes to the right of [ 15.688294] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.688814] [ 15.688936] The buggy address belongs to the physical page: [ 15.689131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.689535] flags: 0x200000000000000(node=0|zone=2) [ 15.689712] page_type: f5(slab) [ 15.689837] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.690069] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.690313] page dumped because: kasan: bad access detected [ 15.690486] [ 15.690556] Memory state around the buggy address: [ 15.692594] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.693002] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.693431] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.693653] ^ [ 15.693814] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.694096] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.694354] ================================================================== [ 15.784920] ================================================================== [ 15.785552] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 15.785867] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.786179] [ 15.786324] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.786372] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.786385] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.786409] Call Trace: [ 15.786430] <TASK> [ 15.786451] dump_stack_lvl+0x73/0xb0 [ 15.786482] print_report+0xd1/0x650 [ 15.786505] ? __virt_addr_valid+0x1db/0x2d0 [ 15.786528] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.786550] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.786573] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.786594] kasan_report+0x141/0x180 [ 15.786617] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.786644] kasan_check_range+0x10c/0x1c0 [ 15.786671] __kasan_check_write+0x18/0x20 [ 15.786691] kasan_atomics_helper+0x1f43/0x5450 [ 15.786715] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.786737] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.786763] ? ret_from_fork_asm+0x1a/0x30 [ 15.786787] ? kasan_atomics+0x152/0x310 [ 15.786813] kasan_atomics+0x1dc/0x310 [ 15.786836] ? __pfx_kasan_atomics+0x10/0x10 [ 15.786861] ? __pfx_read_tsc+0x10/0x10 [ 15.786883] ? ktime_get_ts64+0x86/0x230 [ 15.786909] kunit_try_run_case+0x1a5/0x480 [ 15.786934] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.786956] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.786981] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.787004] ? __kthread_parkme+0x82/0x180 [ 15.787024] ? preempt_count_sub+0x50/0x80 [ 15.787049] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.787072] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.787096] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.787119] kthread+0x337/0x6f0 [ 15.787138] ? trace_preempt_on+0x20/0xc0 [ 15.787162] ? __pfx_kthread+0x10/0x10 [ 15.787183] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.787204] ? calculate_sigpending+0x7b/0xa0 [ 15.787240] ? __pfx_kthread+0x10/0x10 [ 15.787276] ret_from_fork+0x116/0x1d0 [ 15.787295] ? __pfx_kthread+0x10/0x10 [ 15.787316] ret_from_fork_asm+0x1a/0x30 [ 15.787346] </TASK> [ 15.787358] [ 15.794533] Allocated by task 282: [ 15.794746] kasan_save_stack+0x45/0x70 [ 15.794956] kasan_save_track+0x18/0x40 [ 15.795149] kasan_save_alloc_info+0x3b/0x50 [ 15.795392] __kasan_kmalloc+0xb7/0xc0 [ 15.795585] __kmalloc_cache_noprof+0x189/0x420 [ 15.795812] kasan_atomics+0x95/0x310 [ 15.796002] kunit_try_run_case+0x1a5/0x480 [ 15.796214] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.796509] kthread+0x337/0x6f0 [ 15.796667] ret_from_fork+0x116/0x1d0 [ 15.796857] ret_from_fork_asm+0x1a/0x30 [ 15.797020] [ 15.797093] The buggy address belongs to the object at ffff888103991d00 [ 15.797093] which belongs to the cache kmalloc-64 of size 64 [ 15.797701] The buggy address is located 0 bytes to the right of [ 15.797701] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.798425] [ 15.798529] The buggy address belongs to the physical page: [ 15.798770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.799087] flags: 0x200000000000000(node=0|zone=2) [ 15.799266] page_type: f5(slab) [ 15.799441] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.799788] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.800096] page dumped because: kasan: bad access detected [ 15.800280] [ 15.800351] Memory state around the buggy address: [ 15.800509] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.800726] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.801075] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.801419] ^ [ 15.801719] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.801933] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.802146] ================================================================== [ 14.826402] ================================================================== [ 14.826836] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 14.827253] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282 [ 14.828388] [ 14.828694] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.828757] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.828773] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.828810] Call Trace: [ 14.828833] <TASK> [ 14.828856] dump_stack_lvl+0x73/0xb0 [ 14.828899] print_report+0xd1/0x650 [ 14.828925] ? __virt_addr_valid+0x1db/0x2d0 [ 14.828950] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.828973] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.828996] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.829018] kasan_report+0x141/0x180 [ 14.829041] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.829067] kasan_check_range+0x10c/0x1c0 [ 14.829092] __kasan_check_write+0x18/0x20 [ 14.829114] kasan_atomics_helper+0x8f9/0x5450 [ 14.829137] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.829160] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.829185] ? ret_from_fork_asm+0x1a/0x30 [ 14.829237] ? kasan_atomics+0x152/0x310 [ 14.829264] kasan_atomics+0x1dc/0x310 [ 14.829287] ? __pfx_kasan_atomics+0x10/0x10 [ 14.829313] ? __pfx_read_tsc+0x10/0x10 [ 14.829335] ? ktime_get_ts64+0x86/0x230 [ 14.829360] kunit_try_run_case+0x1a5/0x480 [ 14.829386] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.829408] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.829433] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.829456] ? __kthread_parkme+0x82/0x180 [ 14.829477] ? preempt_count_sub+0x50/0x80 [ 14.829502] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.829525] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.829548] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.829571] kthread+0x337/0x6f0 [ 14.829591] ? trace_preempt_on+0x20/0xc0 [ 14.829615] ? __pfx_kthread+0x10/0x10 [ 14.829636] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.829657] ? calculate_sigpending+0x7b/0xa0 [ 14.829682] ? __pfx_kthread+0x10/0x10 [ 14.829703] ret_from_fork+0x116/0x1d0 [ 14.829722] ? __pfx_kthread+0x10/0x10 [ 14.829742] ret_from_fork_asm+0x1a/0x30 [ 14.829773] </TASK> [ 14.829784] [ 14.844408] Allocated by task 282: [ 14.844691] kasan_save_stack+0x45/0x70 [ 14.844870] kasan_save_track+0x18/0x40 [ 14.845008] kasan_save_alloc_info+0x3b/0x50 [ 14.845159] __kasan_kmalloc+0xb7/0xc0 [ 14.845315] __kmalloc_cache_noprof+0x189/0x420 [ 14.845587] kasan_atomics+0x95/0x310 [ 14.845807] kunit_try_run_case+0x1a5/0x480 [ 14.846000] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.846365] kthread+0x337/0x6f0 [ 14.846593] ret_from_fork+0x116/0x1d0 [ 14.846824] ret_from_fork_asm+0x1a/0x30 [ 14.846965] [ 14.847069] The buggy address belongs to the object at ffff888103991d00 [ 14.847069] which belongs to the cache kmalloc-64 of size 64 [ 14.847819] The buggy address is located 0 bytes to the right of [ 14.847819] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 14.848439] [ 14.848523] The buggy address belongs to the physical page: [ 14.849009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 14.849760] flags: 0x200000000000000(node=0|zone=2) [ 14.850001] page_type: f5(slab) [ 14.850175] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.850924] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.851480] page dumped because: kasan: bad access detected [ 14.851897] [ 14.851979] Memory state around the buggy address: [ 14.852433] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.852862] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.853755] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.854065] ^ [ 14.854407] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.854742] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.855046] ================================================================== [ 15.861338] ================================================================== [ 15.861757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 15.862032] Read of size 8 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.862502] [ 15.862670] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.862733] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.862746] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.862782] Call Trace: [ 15.862804] <TASK> [ 15.862827] dump_stack_lvl+0x73/0xb0 [ 15.862858] print_report+0xd1/0x650 [ 15.862882] ? __virt_addr_valid+0x1db/0x2d0 [ 15.862915] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.862937] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.862960] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.862993] kasan_report+0x141/0x180 [ 15.863015] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.863041] __asan_report_load8_noabort+0x18/0x20 [ 15.863066] kasan_atomics_helper+0x4f98/0x5450 [ 15.863098] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.863120] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.863145] ? ret_from_fork_asm+0x1a/0x30 [ 15.863178] ? kasan_atomics+0x152/0x310 [ 15.863205] kasan_atomics+0x1dc/0x310 [ 15.863238] ? __pfx_kasan_atomics+0x10/0x10 [ 15.863262] ? __pfx_read_tsc+0x10/0x10 [ 15.863292] ? ktime_get_ts64+0x86/0x230 [ 15.863318] kunit_try_run_case+0x1a5/0x480 [ 15.863353] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.863377] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.863400] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.863424] ? __kthread_parkme+0x82/0x180 [ 15.863445] ? preempt_count_sub+0x50/0x80 [ 15.863469] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.863493] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.863516] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.863540] kthread+0x337/0x6f0 [ 15.863560] ? trace_preempt_on+0x20/0xc0 [ 15.863583] ? __pfx_kthread+0x10/0x10 [ 15.863604] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.863625] ? calculate_sigpending+0x7b/0xa0 [ 15.863659] ? __pfx_kthread+0x10/0x10 [ 15.863681] ret_from_fork+0x116/0x1d0 [ 15.863700] ? __pfx_kthread+0x10/0x10 [ 15.863731] ret_from_fork_asm+0x1a/0x30 [ 15.863764] </TASK> [ 15.863777] [ 15.871563] Allocated by task 282: [ 15.871722] kasan_save_stack+0x45/0x70 [ 15.871920] kasan_save_track+0x18/0x40 [ 15.872112] kasan_save_alloc_info+0x3b/0x50 [ 15.872328] __kasan_kmalloc+0xb7/0xc0 [ 15.872499] __kmalloc_cache_noprof+0x189/0x420 [ 15.872664] kasan_atomics+0x95/0x310 [ 15.872808] kunit_try_run_case+0x1a5/0x480 [ 15.873188] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.873725] kthread+0x337/0x6f0 [ 15.873870] ret_from_fork+0x116/0x1d0 [ 15.874046] ret_from_fork_asm+0x1a/0x30 [ 15.874189] [ 15.874272] The buggy address belongs to the object at ffff888103991d00 [ 15.874272] which belongs to the cache kmalloc-64 of size 64 [ 15.874821] The buggy address is located 0 bytes to the right of [ 15.874821] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.875529] [ 15.875720] The buggy address belongs to the physical page: [ 15.875920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.876163] flags: 0x200000000000000(node=0|zone=2) [ 15.876344] page_type: f5(slab) [ 15.876550] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.876906] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.877280] page dumped because: kasan: bad access detected [ 15.877582] [ 15.877735] Memory state around the buggy address: [ 15.877987] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.878214] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.878440] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.878749] ^ [ 15.878970] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.879334] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.879560] ================================================================== [ 14.995721] ================================================================== [ 14.996913] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 14.997408] Read of size 4 at addr ffff888103991d30 by task kunit_try_catch/282 [ 14.997730] [ 14.997844] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.997893] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.997906] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.997930] Call Trace: [ 14.997952] <TASK> [ 14.997973] dump_stack_lvl+0x73/0xb0 [ 14.998006] print_report+0xd1/0x650 [ 14.998030] ? __virt_addr_valid+0x1db/0x2d0 [ 14.998054] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.998077] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.998099] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.998121] kasan_report+0x141/0x180 [ 14.998143] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.998169] __asan_report_load4_noabort+0x18/0x20 [ 14.998194] kasan_atomics_helper+0x4a84/0x5450 [ 14.998216] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.998253] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.998292] ? ret_from_fork_asm+0x1a/0x30 [ 14.998316] ? kasan_atomics+0x152/0x310 [ 14.998342] kasan_atomics+0x1dc/0x310 [ 14.998365] ? __pfx_kasan_atomics+0x10/0x10 [ 14.998389] ? __pfx_read_tsc+0x10/0x10 [ 14.998411] ? ktime_get_ts64+0x86/0x230 [ 14.998437] kunit_try_run_case+0x1a5/0x480 [ 14.998462] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.998485] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.998509] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.998532] ? __kthread_parkme+0x82/0x180 [ 14.998553] ? preempt_count_sub+0x50/0x80 [ 14.998579] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.998603] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.998625] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.998649] kthread+0x337/0x6f0 [ 14.998670] ? trace_preempt_on+0x20/0xc0 [ 14.998694] ? __pfx_kthread+0x10/0x10 [ 14.998715] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.998736] ? calculate_sigpending+0x7b/0xa0 [ 14.998761] ? __pfx_kthread+0x10/0x10 [ 14.998782] ret_from_fork+0x116/0x1d0 [ 14.998801] ? __pfx_kthread+0x10/0x10 [ 14.998823] ret_from_fork_asm+0x1a/0x30 [ 14.998854] </TASK> [ 14.998867] [ 15.006256] Allocated by task 282: [ 15.006466] kasan_save_stack+0x45/0x70 [ 15.006677] kasan_save_track+0x18/0x40 [ 15.006866] kasan_save_alloc_info+0x3b/0x50 [ 15.007041] __kasan_kmalloc+0xb7/0xc0 [ 15.007225] __kmalloc_cache_noprof+0x189/0x420 [ 15.007382] kasan_atomics+0x95/0x310 [ 15.007516] kunit_try_run_case+0x1a5/0x480 [ 15.007664] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.007838] kthread+0x337/0x6f0 [ 15.007962] ret_from_fork+0x116/0x1d0 [ 15.008096] ret_from_fork_asm+0x1a/0x30 [ 15.008354] [ 15.008466] The buggy address belongs to the object at ffff888103991d00 [ 15.008466] which belongs to the cache kmalloc-64 of size 64 [ 15.009004] The buggy address is located 0 bytes to the right of [ 15.009004] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.009757] [ 15.009833] The buggy address belongs to the physical page: [ 15.010007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.010259] flags: 0x200000000000000(node=0|zone=2) [ 15.010424] page_type: f5(slab) [ 15.010547] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.010775] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.011558] page dumped because: kasan: bad access detected [ 15.011813] [ 15.011908] Memory state around the buggy address: [ 15.012138] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.012627] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.012958] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.013284] ^ [ 15.013567] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.013827] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.014129] ================================================================== [ 15.222987] ================================================================== [ 15.223412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 15.224351] Read of size 4 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.224997] [ 15.225109] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.225162] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.225175] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.225200] Call Trace: [ 15.225234] <TASK> [ 15.225256] dump_stack_lvl+0x73/0xb0 [ 15.225293] print_report+0xd1/0x650 [ 15.225318] ? __virt_addr_valid+0x1db/0x2d0 [ 15.225342] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.225365] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.225388] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.225410] kasan_report+0x141/0x180 [ 15.225432] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.225459] __asan_report_load4_noabort+0x18/0x20 [ 15.225485] kasan_atomics_helper+0x4a02/0x5450 [ 15.225509] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.225531] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.225557] ? ret_from_fork_asm+0x1a/0x30 [ 15.225580] ? kasan_atomics+0x152/0x310 [ 15.225607] kasan_atomics+0x1dc/0x310 [ 15.225630] ? __pfx_kasan_atomics+0x10/0x10 [ 15.225655] ? __pfx_read_tsc+0x10/0x10 [ 15.225676] ? ktime_get_ts64+0x86/0x230 [ 15.225702] kunit_try_run_case+0x1a5/0x480 [ 15.225727] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.225750] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.225775] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.225798] ? __kthread_parkme+0x82/0x180 [ 15.225820] ? preempt_count_sub+0x50/0x80 [ 15.225844] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.225868] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.225891] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.225915] kthread+0x337/0x6f0 [ 15.225935] ? trace_preempt_on+0x20/0xc0 [ 15.225960] ? __pfx_kthread+0x10/0x10 [ 15.225981] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.226003] ? calculate_sigpending+0x7b/0xa0 [ 15.226027] ? __pfx_kthread+0x10/0x10 [ 15.226049] ret_from_fork+0x116/0x1d0 [ 15.226068] ? __pfx_kthread+0x10/0x10 [ 15.226089] ret_from_fork_asm+0x1a/0x30 [ 15.226119] </TASK> [ 15.226132] [ 15.236541] Allocated by task 282: [ 15.236764] kasan_save_stack+0x45/0x70 [ 15.236984] kasan_save_track+0x18/0x40 [ 15.237162] kasan_save_alloc_info+0x3b/0x50 [ 15.237818] __kasan_kmalloc+0xb7/0xc0 [ 15.238080] __kmalloc_cache_noprof+0x189/0x420 [ 15.238524] kasan_atomics+0x95/0x310 [ 15.238783] kunit_try_run_case+0x1a5/0x480 [ 15.239093] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.239558] kthread+0x337/0x6f0 [ 15.239862] ret_from_fork+0x116/0x1d0 [ 15.240046] ret_from_fork_asm+0x1a/0x30 [ 15.240240] [ 15.240335] The buggy address belongs to the object at ffff888103991d00 [ 15.240335] which belongs to the cache kmalloc-64 of size 64 [ 15.240776] The buggy address is located 0 bytes to the right of [ 15.240776] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.241272] [ 15.241376] The buggy address belongs to the physical page: [ 15.241664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.242394] flags: 0x200000000000000(node=0|zone=2) [ 15.242616] page_type: f5(slab) [ 15.242800] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.243102] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.243801] page dumped because: kasan: bad access detected [ 15.244011] [ 15.244107] Memory state around the buggy address: [ 15.244626] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.244903] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.245340] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.245726] ^ [ 15.245945] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.246411] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.246718] ================================================================== [ 15.695080] ================================================================== [ 15.697607] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 15.699473] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.700020] [ 15.700157] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.700212] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.700423] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.700860] Call Trace: [ 15.700885] <TASK> [ 15.700911] dump_stack_lvl+0x73/0xb0 [ 15.700956] print_report+0xd1/0x650 [ 15.700981] ? __virt_addr_valid+0x1db/0x2d0 [ 15.701005] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.701027] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.701050] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.701073] kasan_report+0x141/0x180 [ 15.701096] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.701122] kasan_check_range+0x10c/0x1c0 [ 15.701146] __kasan_check_write+0x18/0x20 [ 15.701167] kasan_atomics_helper+0x1ce1/0x5450 [ 15.701189] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.701212] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.701250] ? ret_from_fork_asm+0x1a/0x30 [ 15.701274] ? kasan_atomics+0x152/0x310 [ 15.701320] kasan_atomics+0x1dc/0x310 [ 15.701344] ? __pfx_kasan_atomics+0x10/0x10 [ 15.701368] ? __pfx_read_tsc+0x10/0x10 [ 15.701391] ? ktime_get_ts64+0x86/0x230 [ 15.701415] kunit_try_run_case+0x1a5/0x480 [ 15.701778] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.701805] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.701829] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.701853] ? __kthread_parkme+0x82/0x180 [ 15.701875] ? preempt_count_sub+0x50/0x80 [ 15.701900] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.701924] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.701947] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.701971] kthread+0x337/0x6f0 [ 15.701991] ? trace_preempt_on+0x20/0xc0 [ 15.702016] ? __pfx_kthread+0x10/0x10 [ 15.702037] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.702059] ? calculate_sigpending+0x7b/0xa0 [ 15.702084] ? __pfx_kthread+0x10/0x10 [ 15.702106] ret_from_fork+0x116/0x1d0 [ 15.702125] ? __pfx_kthread+0x10/0x10 [ 15.702146] ret_from_fork_asm+0x1a/0x30 [ 15.702177] </TASK> [ 15.702190] [ 15.712725] Allocated by task 282: [ 15.713010] kasan_save_stack+0x45/0x70 [ 15.713312] kasan_save_track+0x18/0x40 [ 15.713581] kasan_save_alloc_info+0x3b/0x50 [ 15.713751] __kasan_kmalloc+0xb7/0xc0 [ 15.713947] __kmalloc_cache_noprof+0x189/0x420 [ 15.714363] kasan_atomics+0x95/0x310 [ 15.714628] kunit_try_run_case+0x1a5/0x480 [ 15.714787] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.715122] kthread+0x337/0x6f0 [ 15.715299] ret_from_fork+0x116/0x1d0 [ 15.715470] ret_from_fork_asm+0x1a/0x30 [ 15.715659] [ 15.715754] The buggy address belongs to the object at ffff888103991d00 [ 15.715754] which belongs to the cache kmalloc-64 of size 64 [ 15.716243] The buggy address is located 0 bytes to the right of [ 15.716243] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.717124] [ 15.717325] The buggy address belongs to the physical page: [ 15.717643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.717959] flags: 0x200000000000000(node=0|zone=2) [ 15.718343] page_type: f5(slab) [ 15.718560] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.718942] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.719326] page dumped because: kasan: bad access detected [ 15.719588] [ 15.719805] Memory state around the buggy address: [ 15.719980] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.720508] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.720829] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.721125] ^ [ 15.721569] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.721886] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.722233] ================================================================== [ 14.566497] ================================================================== [ 14.566783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 14.567108] Read of size 4 at addr ffff888103991d30 by task kunit_try_catch/282 [ 14.567770] [ 14.567902] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.567952] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.567966] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.567990] Call Trace: [ 14.568012] <TASK> [ 14.568034] dump_stack_lvl+0x73/0xb0 [ 14.568069] print_report+0xd1/0x650 [ 14.568094] ? __virt_addr_valid+0x1db/0x2d0 [ 14.568119] ? kasan_atomics_helper+0x3df/0x5450 [ 14.568141] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.568163] ? kasan_atomics_helper+0x3df/0x5450 [ 14.568185] kasan_report+0x141/0x180 [ 14.568207] ? kasan_atomics_helper+0x3df/0x5450 [ 14.568246] kasan_check_range+0x10c/0x1c0 [ 14.568271] __kasan_check_read+0x15/0x20 [ 14.568291] kasan_atomics_helper+0x3df/0x5450 [ 14.568314] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.568336] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.568361] ? ret_from_fork_asm+0x1a/0x30 [ 14.568385] ? kasan_atomics+0x152/0x310 [ 14.568411] kasan_atomics+0x1dc/0x310 [ 14.568433] ? __pfx_kasan_atomics+0x10/0x10 [ 14.568545] ? __pfx_read_tsc+0x10/0x10 [ 14.568569] ? ktime_get_ts64+0x86/0x230 [ 14.568595] kunit_try_run_case+0x1a5/0x480 [ 14.568623] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.568647] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.568672] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.568696] ? __kthread_parkme+0x82/0x180 [ 14.568718] ? preempt_count_sub+0x50/0x80 [ 14.568742] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.568766] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.568801] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.568825] kthread+0x337/0x6f0 [ 14.568845] ? trace_preempt_on+0x20/0xc0 [ 14.568870] ? __pfx_kthread+0x10/0x10 [ 14.568891] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.568913] ? calculate_sigpending+0x7b/0xa0 [ 14.568937] ? __pfx_kthread+0x10/0x10 [ 14.568959] ret_from_fork+0x116/0x1d0 [ 14.568978] ? __pfx_kthread+0x10/0x10 [ 14.568999] ret_from_fork_asm+0x1a/0x30 [ 14.569029] </TASK> [ 14.569042] [ 14.577473] Allocated by task 282: [ 14.577844] kasan_save_stack+0x45/0x70 [ 14.578075] kasan_save_track+0x18/0x40 [ 14.578350] kasan_save_alloc_info+0x3b/0x50 [ 14.578569] __kasan_kmalloc+0xb7/0xc0 [ 14.578764] __kmalloc_cache_noprof+0x189/0x420 [ 14.578991] kasan_atomics+0x95/0x310 [ 14.579186] kunit_try_run_case+0x1a5/0x480 [ 14.579509] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.579730] kthread+0x337/0x6f0 [ 14.579864] ret_from_fork+0x116/0x1d0 [ 14.579999] ret_from_fork_asm+0x1a/0x30 [ 14.580140] [ 14.580213] The buggy address belongs to the object at ffff888103991d00 [ 14.580213] which belongs to the cache kmalloc-64 of size 64 [ 14.581275] The buggy address is located 0 bytes to the right of [ 14.581275] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 14.581847] [ 14.581925] The buggy address belongs to the physical page: [ 14.582105] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 14.582469] flags: 0x200000000000000(node=0|zone=2) [ 14.582744] page_type: f5(slab) [ 14.582871] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.583104] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.583418] page dumped because: kasan: bad access detected [ 14.583756] [ 14.583855] Memory state around the buggy address: [ 14.584095] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.584797] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.585057] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.585290] ^ [ 14.585604] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.586028] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.586375] ================================================================== [ 14.907043] ================================================================== [ 14.908080] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 14.909944] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282 [ 14.910971] [ 14.911172] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.911341] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.911357] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.911382] Call Trace: [ 14.911405] <TASK> [ 14.911429] dump_stack_lvl+0x73/0xb0 [ 14.911473] print_report+0xd1/0x650 [ 14.911498] ? __virt_addr_valid+0x1db/0x2d0 [ 14.911522] ? kasan_atomics_helper+0xac7/0x5450 [ 14.911546] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.911568] ? kasan_atomics_helper+0xac7/0x5450 [ 14.911591] kasan_report+0x141/0x180 [ 14.911613] ? kasan_atomics_helper+0xac7/0x5450 [ 14.911897] kasan_check_range+0x10c/0x1c0 [ 14.911936] __kasan_check_write+0x18/0x20 [ 14.911959] kasan_atomics_helper+0xac7/0x5450 [ 14.911984] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.912007] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.912032] ? ret_from_fork_asm+0x1a/0x30 [ 14.912054] ? kasan_atomics+0x152/0x310 [ 14.912082] kasan_atomics+0x1dc/0x310 [ 14.912104] ? __pfx_kasan_atomics+0x10/0x10 [ 14.912129] ? __pfx_read_tsc+0x10/0x10 [ 14.912151] ? ktime_get_ts64+0x86/0x230 [ 14.912175] kunit_try_run_case+0x1a5/0x480 [ 14.912690] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.912722] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.912766] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.912798] ? __kthread_parkme+0x82/0x180 [ 14.912862] ? preempt_count_sub+0x50/0x80 [ 14.912888] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.912924] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.912947] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.912971] kthread+0x337/0x6f0 [ 14.912991] ? trace_preempt_on+0x20/0xc0 [ 14.913016] ? __pfx_kthread+0x10/0x10 [ 14.913037] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.913059] ? calculate_sigpending+0x7b/0xa0 [ 14.913083] ? __pfx_kthread+0x10/0x10 [ 14.913105] ret_from_fork+0x116/0x1d0 [ 14.913125] ? __pfx_kthread+0x10/0x10 [ 14.913145] ret_from_fork_asm+0x1a/0x30 [ 14.913177] </TASK> [ 14.913316] [ 14.929860] Allocated by task 282: [ 14.930077] kasan_save_stack+0x45/0x70 [ 14.930553] kasan_save_track+0x18/0x40 [ 14.930798] kasan_save_alloc_info+0x3b/0x50 [ 14.931250] __kasan_kmalloc+0xb7/0xc0 [ 14.931674] __kmalloc_cache_noprof+0x189/0x420 [ 14.932090] kasan_atomics+0x95/0x310 [ 14.932335] kunit_try_run_case+0x1a5/0x480 [ 14.932535] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.933029] kthread+0x337/0x6f0 [ 14.933345] ret_from_fork+0x116/0x1d0 [ 14.933656] ret_from_fork_asm+0x1a/0x30 [ 14.934102] [ 14.934315] The buggy address belongs to the object at ffff888103991d00 [ 14.934315] which belongs to the cache kmalloc-64 of size 64 [ 14.935136] The buggy address is located 0 bytes to the right of [ 14.935136] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 14.936661] [ 14.936943] The buggy address belongs to the physical page: [ 14.937436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 14.937813] flags: 0x200000000000000(node=0|zone=2) [ 14.938575] page_type: f5(slab) [ 14.938888] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.939404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.939978] page dumped because: kasan: bad access detected [ 14.940161] [ 14.940333] Memory state around the buggy address: [ 14.941011] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.941795] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.942514] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.942759] ^ [ 14.942919] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.943137] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.943368] ================================================================== [ 15.015117] ================================================================== [ 15.015935] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 15.016182] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.016423] [ 15.016520] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.016569] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.016584] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.016608] Call Trace: [ 15.016630] <TASK> [ 15.016651] dump_stack_lvl+0x73/0xb0 [ 15.016681] print_report+0xd1/0x650 [ 15.016705] ? __virt_addr_valid+0x1db/0x2d0 [ 15.016731] ? kasan_atomics_helper+0xd47/0x5450 [ 15.016753] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.016776] ? kasan_atomics_helper+0xd47/0x5450 [ 15.016806] kasan_report+0x141/0x180 [ 15.016828] ? kasan_atomics_helper+0xd47/0x5450 [ 15.016854] kasan_check_range+0x10c/0x1c0 [ 15.016879] __kasan_check_write+0x18/0x20 [ 15.016897] kasan_atomics_helper+0xd47/0x5450 [ 15.016921] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.016943] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.016969] ? ret_from_fork_asm+0x1a/0x30 [ 15.016990] ? kasan_atomics+0x152/0x310 [ 15.017034] kasan_atomics+0x1dc/0x310 [ 15.017082] ? __pfx_kasan_atomics+0x10/0x10 [ 15.017106] ? __pfx_read_tsc+0x10/0x10 [ 15.017127] ? ktime_get_ts64+0x86/0x230 [ 15.017153] kunit_try_run_case+0x1a5/0x480 [ 15.017178] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.017200] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.017236] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.017259] ? __kthread_parkme+0x82/0x180 [ 15.017281] ? preempt_count_sub+0x50/0x80 [ 15.017304] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.017328] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.017351] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.017375] kthread+0x337/0x6f0 [ 15.017394] ? trace_preempt_on+0x20/0xc0 [ 15.017418] ? __pfx_kthread+0x10/0x10 [ 15.017439] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.017479] ? calculate_sigpending+0x7b/0xa0 [ 15.017504] ? __pfx_kthread+0x10/0x10 [ 15.017525] ret_from_fork+0x116/0x1d0 [ 15.017545] ? __pfx_kthread+0x10/0x10 [ 15.017565] ret_from_fork_asm+0x1a/0x30 [ 15.017596] </TASK> [ 15.017609] [ 15.025535] Allocated by task 282: [ 15.025757] kasan_save_stack+0x45/0x70 [ 15.026081] kasan_save_track+0x18/0x40 [ 15.026311] kasan_save_alloc_info+0x3b/0x50 [ 15.026544] __kasan_kmalloc+0xb7/0xc0 [ 15.026741] __kmalloc_cache_noprof+0x189/0x420 [ 15.026929] kasan_atomics+0x95/0x310 [ 15.027060] kunit_try_run_case+0x1a5/0x480 [ 15.027313] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.027562] kthread+0x337/0x6f0 [ 15.027732] ret_from_fork+0x116/0x1d0 [ 15.027914] ret_from_fork_asm+0x1a/0x30 [ 15.028050] [ 15.028121] The buggy address belongs to the object at ffff888103991d00 [ 15.028121] which belongs to the cache kmalloc-64 of size 64 [ 15.028866] The buggy address is located 0 bytes to the right of [ 15.028866] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.029401] [ 15.029481] The buggy address belongs to the physical page: [ 15.029789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.030157] flags: 0x200000000000000(node=0|zone=2) [ 15.030410] page_type: f5(slab) [ 15.030534] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.030758] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.030977] page dumped because: kasan: bad access detected [ 15.031144] [ 15.031213] Memory state around the buggy address: [ 15.031454] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.031788] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.032120] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.032466] ^ [ 15.032622] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.032986] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.033330] ================================================================== [ 15.414107] ================================================================== [ 15.414431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 15.414776] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.415073] [ 15.415169] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.415216] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.415240] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.415278] Call Trace: [ 15.415300] <TASK> [ 15.415321] dump_stack_lvl+0x73/0xb0 [ 15.415351] print_report+0xd1/0x650 [ 15.415375] ? __virt_addr_valid+0x1db/0x2d0 [ 15.415399] ? kasan_atomics_helper+0x151d/0x5450 [ 15.415420] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.415442] ? kasan_atomics_helper+0x151d/0x5450 [ 15.415463] kasan_report+0x141/0x180 [ 15.415485] ? kasan_atomics_helper+0x151d/0x5450 [ 15.415512] kasan_check_range+0x10c/0x1c0 [ 15.415535] __kasan_check_write+0x18/0x20 [ 15.415555] kasan_atomics_helper+0x151d/0x5450 [ 15.415577] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.415600] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.415629] ? ret_from_fork_asm+0x1a/0x30 [ 15.415651] ? kasan_atomics+0x152/0x310 [ 15.415678] kasan_atomics+0x1dc/0x310 [ 15.415700] ? __pfx_kasan_atomics+0x10/0x10 [ 15.415725] ? __pfx_read_tsc+0x10/0x10 [ 15.415746] ? ktime_get_ts64+0x86/0x230 [ 15.415771] kunit_try_run_case+0x1a5/0x480 [ 15.415797] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.415819] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.415843] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.415866] ? __kthread_parkme+0x82/0x180 [ 15.415886] ? preempt_count_sub+0x50/0x80 [ 15.415911] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.415934] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.415957] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.415979] kthread+0x337/0x6f0 [ 15.416000] ? trace_preempt_on+0x20/0xc0 [ 15.416023] ? __pfx_kthread+0x10/0x10 [ 15.416044] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.416065] ? calculate_sigpending+0x7b/0xa0 [ 15.416089] ? __pfx_kthread+0x10/0x10 [ 15.416110] ret_from_fork+0x116/0x1d0 [ 15.416129] ? __pfx_kthread+0x10/0x10 [ 15.416150] ret_from_fork_asm+0x1a/0x30 [ 15.416179] </TASK> [ 15.416191] [ 15.423542] Allocated by task 282: [ 15.423753] kasan_save_stack+0x45/0x70 [ 15.423975] kasan_save_track+0x18/0x40 [ 15.424171] kasan_save_alloc_info+0x3b/0x50 [ 15.424551] __kasan_kmalloc+0xb7/0xc0 [ 15.424746] __kmalloc_cache_noprof+0x189/0x420 [ 15.424978] kasan_atomics+0x95/0x310 [ 15.425171] kunit_try_run_case+0x1a5/0x480 [ 15.425412] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.425614] kthread+0x337/0x6f0 [ 15.425783] ret_from_fork+0x116/0x1d0 [ 15.425939] ret_from_fork_asm+0x1a/0x30 [ 15.426081] [ 15.426153] The buggy address belongs to the object at ffff888103991d00 [ 15.426153] which belongs to the cache kmalloc-64 of size 64 [ 15.426963] The buggy address is located 0 bytes to the right of [ 15.426963] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.427470] [ 15.427579] The buggy address belongs to the physical page: [ 15.427770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.428126] flags: 0x200000000000000(node=0|zone=2) [ 15.428370] page_type: f5(slab) [ 15.428501] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.428740] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.428989] page dumped because: kasan: bad access detected [ 15.429163] [ 15.429244] Memory state around the buggy address: [ 15.429470] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.430110] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.435822] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.436853] ^ [ 15.437409] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.437646] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.437866] ================================================================== [ 15.586489] ================================================================== [ 15.587276] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 15.587579] Write of size 8 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.587911] [ 15.588035] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.588096] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.588109] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.588134] Call Trace: [ 15.588156] <TASK> [ 15.588178] dump_stack_lvl+0x73/0xb0 [ 15.588208] print_report+0xd1/0x650 [ 15.588242] ? __virt_addr_valid+0x1db/0x2d0 [ 15.588266] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.588287] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.588310] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.588332] kasan_report+0x141/0x180 [ 15.588354] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.588380] kasan_check_range+0x10c/0x1c0 [ 15.588404] __kasan_check_write+0x18/0x20 [ 15.588424] kasan_atomics_helper+0x19e3/0x5450 [ 15.588446] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.588468] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.588493] ? ret_from_fork_asm+0x1a/0x30 [ 15.588516] ? kasan_atomics+0x152/0x310 [ 15.588542] kasan_atomics+0x1dc/0x310 [ 15.588565] ? __pfx_kasan_atomics+0x10/0x10 [ 15.588601] ? __pfx_read_tsc+0x10/0x10 [ 15.588624] ? ktime_get_ts64+0x86/0x230 [ 15.588650] kunit_try_run_case+0x1a5/0x480 [ 15.588700] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.588730] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.588765] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.588796] ? __kthread_parkme+0x82/0x180 [ 15.588818] ? preempt_count_sub+0x50/0x80 [ 15.588843] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.588867] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.588890] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.588914] kthread+0x337/0x6f0 [ 15.588934] ? trace_preempt_on+0x20/0xc0 [ 15.588960] ? __pfx_kthread+0x10/0x10 [ 15.588981] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.589002] ? calculate_sigpending+0x7b/0xa0 [ 15.589027] ? __pfx_kthread+0x10/0x10 [ 15.589049] ret_from_fork+0x116/0x1d0 [ 15.589092] ? __pfx_kthread+0x10/0x10 [ 15.589113] ret_from_fork_asm+0x1a/0x30 [ 15.589144] </TASK> [ 15.589157] [ 15.597243] Allocated by task 282: [ 15.597468] kasan_save_stack+0x45/0x70 [ 15.597635] kasan_save_track+0x18/0x40 [ 15.597801] kasan_save_alloc_info+0x3b/0x50 [ 15.598027] __kasan_kmalloc+0xb7/0xc0 [ 15.598174] __kmalloc_cache_noprof+0x189/0x420 [ 15.598558] kasan_atomics+0x95/0x310 [ 15.598728] kunit_try_run_case+0x1a5/0x480 [ 15.598911] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.599139] kthread+0x337/0x6f0 [ 15.599372] ret_from_fork+0x116/0x1d0 [ 15.599520] ret_from_fork_asm+0x1a/0x30 [ 15.599661] [ 15.599736] The buggy address belongs to the object at ffff888103991d00 [ 15.599736] which belongs to the cache kmalloc-64 of size 64 [ 15.600090] The buggy address is located 0 bytes to the right of [ 15.600090] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.600467] [ 15.600544] The buggy address belongs to the physical page: [ 15.600808] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.601556] flags: 0x200000000000000(node=0|zone=2) [ 15.601806] page_type: f5(slab) [ 15.601977] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.602330] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.602722] page dumped because: kasan: bad access detected [ 15.603169] [ 15.603252] Memory state around the buggy address: [ 15.603489] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.603728] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.603947] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.604161] ^ [ 15.604533] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.604865] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.605185] ================================================================== [ 14.628590] ================================================================== [ 14.628930] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 14.629729] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282 [ 14.630424] [ 14.630615] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.630670] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.630684] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.630709] Call Trace: [ 14.630731] <TASK> [ 14.630753] dump_stack_lvl+0x73/0xb0 [ 14.630791] print_report+0xd1/0x650 [ 14.630816] ? __virt_addr_valid+0x1db/0x2d0 [ 14.630840] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.630865] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.630888] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.630912] kasan_report+0x141/0x180 [ 14.630934] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.630961] __asan_report_store4_noabort+0x1b/0x30 [ 14.630982] kasan_atomics_helper+0x4b3a/0x5450 [ 14.631005] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.631027] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.631052] ? ret_from_fork_asm+0x1a/0x30 [ 14.631075] ? kasan_atomics+0x152/0x310 [ 14.631101] kasan_atomics+0x1dc/0x310 [ 14.631124] ? __pfx_kasan_atomics+0x10/0x10 [ 14.631148] ? __pfx_read_tsc+0x10/0x10 [ 14.631171] ? ktime_get_ts64+0x86/0x230 [ 14.631195] kunit_try_run_case+0x1a5/0x480 [ 14.631349] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.631390] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.631415] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.631439] ? __kthread_parkme+0x82/0x180 [ 14.631509] ? preempt_count_sub+0x50/0x80 [ 14.631535] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.631559] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.631583] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.631606] kthread+0x337/0x6f0 [ 14.631628] ? trace_preempt_on+0x20/0xc0 [ 14.631651] ? __pfx_kthread+0x10/0x10 [ 14.631673] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.631694] ? calculate_sigpending+0x7b/0xa0 [ 14.631719] ? __pfx_kthread+0x10/0x10 [ 14.631741] ret_from_fork+0x116/0x1d0 [ 14.631760] ? __pfx_kthread+0x10/0x10 [ 14.631781] ret_from_fork_asm+0x1a/0x30 [ 14.631813] </TASK> [ 14.631826] [ 14.647519] Allocated by task 282: [ 14.649056] kasan_save_stack+0x45/0x70 [ 14.649781] kasan_save_track+0x18/0x40 [ 14.650693] kasan_save_alloc_info+0x3b/0x50 [ 14.651174] __kasan_kmalloc+0xb7/0xc0 [ 14.651844] __kmalloc_cache_noprof+0x189/0x420 [ 14.652019] kasan_atomics+0x95/0x310 [ 14.652159] kunit_try_run_case+0x1a5/0x480 [ 14.653388] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.654047] kthread+0x337/0x6f0 [ 14.654568] ret_from_fork+0x116/0x1d0 [ 14.655138] ret_from_fork_asm+0x1a/0x30 [ 14.655670] [ 14.655981] The buggy address belongs to the object at ffff888103991d00 [ 14.655981] which belongs to the cache kmalloc-64 of size 64 [ 14.656767] The buggy address is located 0 bytes to the right of [ 14.656767] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 14.657164] [ 14.657274] The buggy address belongs to the physical page: [ 14.657946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 14.658739] flags: 0x200000000000000(node=0|zone=2) [ 14.658927] page_type: f5(slab) [ 14.659084] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.660024] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.660671] page dumped because: kasan: bad access detected [ 14.660860] [ 14.660935] Memory state around the buggy address: [ 14.661099] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.661715] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.662836] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.663604] ^ [ 14.664055] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.664780] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.665515] ================================================================== [ 14.944406] ================================================================== [ 14.945049] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 14.945723] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282 [ 14.946500] [ 14.946762] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.946819] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.946833] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.946858] Call Trace: [ 14.946879] <TASK> [ 14.946902] dump_stack_lvl+0x73/0xb0 [ 14.946938] print_report+0xd1/0x650 [ 14.946963] ? __virt_addr_valid+0x1db/0x2d0 [ 14.946986] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.947008] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.947032] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.947053] kasan_report+0x141/0x180 [ 14.947076] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.947103] kasan_check_range+0x10c/0x1c0 [ 14.947127] __kasan_check_write+0x18/0x20 [ 14.947147] kasan_atomics_helper+0xb6a/0x5450 [ 14.947169] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.947192] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.947230] ? ret_from_fork_asm+0x1a/0x30 [ 14.947298] ? kasan_atomics+0x152/0x310 [ 14.947327] kasan_atomics+0x1dc/0x310 [ 14.947352] ? __pfx_kasan_atomics+0x10/0x10 [ 14.947376] ? __pfx_read_tsc+0x10/0x10 [ 14.947397] ? ktime_get_ts64+0x86/0x230 [ 14.947422] kunit_try_run_case+0x1a5/0x480 [ 14.947448] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.947470] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.947495] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.947518] ? __kthread_parkme+0x82/0x180 [ 14.947540] ? preempt_count_sub+0x50/0x80 [ 14.947564] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.947587] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.947611] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.947634] kthread+0x337/0x6f0 [ 14.947654] ? trace_preempt_on+0x20/0xc0 [ 14.947679] ? __pfx_kthread+0x10/0x10 [ 14.947700] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.947722] ? calculate_sigpending+0x7b/0xa0 [ 14.947747] ? __pfx_kthread+0x10/0x10 [ 14.947771] ret_from_fork+0x116/0x1d0 [ 14.947792] ? __pfx_kthread+0x10/0x10 [ 14.947815] ret_from_fork_asm+0x1a/0x30 [ 14.947847] </TASK> [ 14.947860] [ 14.962820] Allocated by task 282: [ 14.962996] kasan_save_stack+0x45/0x70 [ 14.963162] kasan_save_track+0x18/0x40 [ 14.963675] kasan_save_alloc_info+0x3b/0x50 [ 14.963875] __kasan_kmalloc+0xb7/0xc0 [ 14.964050] __kmalloc_cache_noprof+0x189/0x420 [ 14.964603] kasan_atomics+0x95/0x310 [ 14.964885] kunit_try_run_case+0x1a5/0x480 [ 14.965245] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.965668] kthread+0x337/0x6f0 [ 14.965865] ret_from_fork+0x116/0x1d0 [ 14.966208] ret_from_fork_asm+0x1a/0x30 [ 14.966714] [ 14.966888] The buggy address belongs to the object at ffff888103991d00 [ 14.966888] which belongs to the cache kmalloc-64 of size 64 [ 14.967915] The buggy address is located 0 bytes to the right of [ 14.967915] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 14.968700] [ 14.968947] The buggy address belongs to the physical page: [ 14.969397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 14.969743] flags: 0x200000000000000(node=0|zone=2) [ 14.969975] page_type: f5(slab) [ 14.970142] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.971869] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.972480] page dumped because: kasan: bad access detected [ 14.972718] [ 14.972817] Memory state around the buggy address: [ 14.973032] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.973791] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.974344] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.975000] ^ [ 14.975574] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.975987] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.976550] ================================================================== [ 14.547519] ================================================================== [ 14.547807] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 14.548163] Write of size 4 at addr ffff888103991d30 by task kunit_try_catch/282 [ 14.548543] [ 14.548670] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.548723] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.548736] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.548761] Call Trace: [ 14.548783] <TASK> [ 14.548812] dump_stack_lvl+0x73/0xb0 [ 14.548845] print_report+0xd1/0x650 [ 14.548870] ? __virt_addr_valid+0x1db/0x2d0 [ 14.548894] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.548915] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.548938] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.548960] kasan_report+0x141/0x180 [ 14.548982] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.549009] __asan_report_store4_noabort+0x1b/0x30 [ 14.549029] kasan_atomics_helper+0x4b6e/0x5450 [ 14.549052] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.549074] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.549099] ? ret_from_fork_asm+0x1a/0x30 [ 14.549122] ? kasan_atomics+0x152/0x310 [ 14.549148] kasan_atomics+0x1dc/0x310 [ 14.549171] ? __pfx_kasan_atomics+0x10/0x10 [ 14.549196] ? __pfx_read_tsc+0x10/0x10 [ 14.549231] ? ktime_get_ts64+0x86/0x230 [ 14.549256] kunit_try_run_case+0x1a5/0x480 [ 14.549283] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.549306] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.549330] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.549353] ? __kthread_parkme+0x82/0x180 [ 14.549375] ? preempt_count_sub+0x50/0x80 [ 14.549399] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.549423] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.549446] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.549469] kthread+0x337/0x6f0 [ 14.549489] ? trace_preempt_on+0x20/0xc0 [ 14.549535] ? __pfx_kthread+0x10/0x10 [ 14.549557] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.549579] ? calculate_sigpending+0x7b/0xa0 [ 14.549604] ? __pfx_kthread+0x10/0x10 [ 14.549627] ret_from_fork+0x116/0x1d0 [ 14.549646] ? __pfx_kthread+0x10/0x10 [ 14.549667] ret_from_fork_asm+0x1a/0x30 [ 14.549699] </TASK> [ 14.549711] [ 14.557499] Allocated by task 282: [ 14.557664] kasan_save_stack+0x45/0x70 [ 14.557876] kasan_save_track+0x18/0x40 [ 14.558070] kasan_save_alloc_info+0x3b/0x50 [ 14.558289] __kasan_kmalloc+0xb7/0xc0 [ 14.558548] __kmalloc_cache_noprof+0x189/0x420 [ 14.558784] kasan_atomics+0x95/0x310 [ 14.558974] kunit_try_run_case+0x1a5/0x480 [ 14.559170] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.559471] kthread+0x337/0x6f0 [ 14.559629] ret_from_fork+0x116/0x1d0 [ 14.559809] ret_from_fork_asm+0x1a/0x30 [ 14.559976] [ 14.560074] The buggy address belongs to the object at ffff888103991d00 [ 14.560074] which belongs to the cache kmalloc-64 of size 64 [ 14.561199] The buggy address is located 0 bytes to the right of [ 14.561199] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 14.561809] [ 14.561887] The buggy address belongs to the physical page: [ 14.562064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 14.562377] flags: 0x200000000000000(node=0|zone=2) [ 14.562614] page_type: f5(slab) [ 14.562782] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.563263] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.563536] page dumped because: kasan: bad access detected [ 14.563712] [ 14.563784] Memory state around the buggy address: [ 14.563984] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.564386] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.564716] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.565043] ^ [ 14.565300] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.565620] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.565867] ================================================================== [ 15.357213] ================================================================== [ 15.357907] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 15.358727] Read of size 8 at addr ffff888103991d30 by task kunit_try_catch/282 [ 15.359002] [ 15.359184] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.359254] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.359267] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.359306] Call Trace: [ 15.359328] <TASK> [ 15.359351] dump_stack_lvl+0x73/0xb0 [ 15.359384] print_report+0xd1/0x650 [ 15.359415] ? __virt_addr_valid+0x1db/0x2d0 [ 15.359439] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.359462] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.359484] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.359507] kasan_report+0x141/0x180 [ 15.359529] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.359556] __asan_report_load8_noabort+0x18/0x20 [ 15.359581] kasan_atomics_helper+0x4eae/0x5450 [ 15.359604] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.359626] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.359652] ? ret_from_fork_asm+0x1a/0x30 [ 15.359674] ? kasan_atomics+0x152/0x310 [ 15.359700] kasan_atomics+0x1dc/0x310 [ 15.359723] ? __pfx_kasan_atomics+0x10/0x10 [ 15.359747] ? __pfx_read_tsc+0x10/0x10 [ 15.359769] ? ktime_get_ts64+0x86/0x230 [ 15.359797] kunit_try_run_case+0x1a5/0x480 [ 15.359822] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.359845] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.359870] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.359893] ? __kthread_parkme+0x82/0x180 [ 15.359914] ? preempt_count_sub+0x50/0x80 [ 15.359939] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.359963] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.359986] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.360010] kthread+0x337/0x6f0 [ 15.360029] ? trace_preempt_on+0x20/0xc0 [ 15.360053] ? __pfx_kthread+0x10/0x10 [ 15.360074] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.360096] ? calculate_sigpending+0x7b/0xa0 [ 15.360121] ? __pfx_kthread+0x10/0x10 [ 15.360143] ret_from_fork+0x116/0x1d0 [ 15.360161] ? __pfx_kthread+0x10/0x10 [ 15.360183] ret_from_fork_asm+0x1a/0x30 [ 15.360215] </TASK> [ 15.360240] [ 15.369698] Allocated by task 282: [ 15.369875] kasan_save_stack+0x45/0x70 [ 15.370031] kasan_save_track+0x18/0x40 [ 15.370240] kasan_save_alloc_info+0x3b/0x50 [ 15.370541] __kasan_kmalloc+0xb7/0xc0 [ 15.370706] __kmalloc_cache_noprof+0x189/0x420 [ 15.370909] kasan_atomics+0x95/0x310 [ 15.371087] kunit_try_run_case+0x1a5/0x480 [ 15.371331] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.371545] kthread+0x337/0x6f0 [ 15.371713] ret_from_fork+0x116/0x1d0 [ 15.371847] ret_from_fork_asm+0x1a/0x30 [ 15.371989] [ 15.372074] The buggy address belongs to the object at ffff888103991d00 [ 15.372074] which belongs to the cache kmalloc-64 of size 64 [ 15.372739] The buggy address is located 0 bytes to the right of [ 15.372739] allocated 48-byte region [ffff888103991d00, ffff888103991d30) [ 15.373172] [ 15.373257] The buggy address belongs to the physical page: [ 15.373449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103991 [ 15.373905] flags: 0x200000000000000(node=0|zone=2) [ 15.374150] page_type: f5(slab) [ 15.374341] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.374664] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.374961] page dumped because: kasan: bad access detected [ 15.375188] [ 15.375319] Memory state around the buggy address: [ 15.375484] ffff888103991c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.375767] ffff888103991c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.376094] >ffff888103991d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.376421] ^ [ 15.376625] ffff888103991d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.376925] ffff888103991e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.377198] ==================================================================