Date
July 5, 2025, 11:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 22.741216] ================================================================== [ 22.741317] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 22.741439] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266 [ 22.741548] [ 22.741617] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.741805] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.741868] Hardware name: linux,dummy-virt (DT) [ 22.741941] Call trace: [ 22.741992] show_stack+0x20/0x38 (C) [ 22.742103] dump_stack_lvl+0x8c/0xd0 [ 22.742209] print_report+0x118/0x608 [ 22.742312] kasan_report+0xdc/0x128 [ 22.742435] kasan_check_range+0x100/0x1a8 [ 22.742559] __kasan_check_write+0x20/0x30 [ 22.742662] kasan_atomics_helper+0x1414/0x4858 [ 22.742772] kasan_atomics+0x198/0x2e0 [ 22.742880] kunit_try_run_case+0x170/0x3f0 [ 22.742989] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.743109] kthread+0x328/0x630 [ 22.743203] ret_from_fork+0x10/0x20 [ 22.743308] [ 22.744857] Allocated by task 266: [ 22.745301] kasan_save_stack+0x3c/0x68 [ 22.745649] kasan_save_track+0x20/0x40 [ 22.746533] kasan_save_alloc_info+0x40/0x58 [ 22.746645] __kasan_kmalloc+0xd4/0xd8 [ 22.746735] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.746819] kasan_atomics+0xb8/0x2e0 [ 22.746884] kunit_try_run_case+0x170/0x3f0 [ 22.746967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.747060] kthread+0x328/0x630 [ 22.747140] ret_from_fork+0x10/0x20 [ 22.747230] [ 22.747284] The buggy address belongs to the object at fff00000c79e4c00 [ 22.747284] which belongs to the cache kmalloc-64 of size 64 [ 22.747440] The buggy address is located 0 bytes to the right of [ 22.747440] allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30) [ 22.747593] [ 22.748387] The buggy address belongs to the physical page: [ 22.748485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4 [ 22.748664] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.748826] page_type: f5(slab) [ 22.748910] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.749037] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.749144] page dumped because: kasan: bad access detected [ 22.749229] [ 22.749285] Memory state around the buggy address: [ 22.749383] fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.749561] fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.749784] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.749939] ^ [ 22.750056] fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.750156] fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.750540] ================================================================== [ 22.484441] ================================================================== [ 22.484610] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 22.484779] Write of size 4 at addr fff00000c79e4c30 by task kunit_try_catch/266 [ 22.484900] [ 22.484973] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.485156] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.485219] Hardware name: linux,dummy-virt (DT) [ 22.485284] Call trace: [ 22.485340] show_stack+0x20/0x38 (C) [ 22.485468] dump_stack_lvl+0x8c/0xd0 [ 22.485572] print_report+0x118/0x608 [ 22.485684] kasan_report+0xdc/0x128 [ 22.485840] kasan_check_range+0x100/0x1a8 [ 22.485951] __kasan_check_write+0x20/0x30 [ 22.486089] kasan_atomics_helper+0xd3c/0x4858 [ 22.486193] kasan_atomics+0x198/0x2e0 [ 22.486323] kunit_try_run_case+0x170/0x3f0 [ 22.486488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.486697] kthread+0x328/0x630 [ 22.487161] ret_from_fork+0x10/0x20 [ 22.489377] [ 22.489448] Allocated by task 266: [ 22.489526] kasan_save_stack+0x3c/0x68 [ 22.489673] kasan_save_track+0x20/0x40 [ 22.489769] kasan_save_alloc_info+0x40/0x58 [ 22.489870] __kasan_kmalloc+0xd4/0xd8 [ 22.489964] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.490095] kasan_atomics+0xb8/0x2e0 [ 22.490321] kunit_try_run_case+0x170/0x3f0 [ 22.490451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.491404] kthread+0x328/0x630 [ 22.491652] ret_from_fork+0x10/0x20 [ 22.491743] [ 22.492329] The buggy address belongs to the object at fff00000c79e4c00 [ 22.492329] which belongs to the cache kmalloc-64 of size 64 [ 22.492676] The buggy address is located 0 bytes to the right of [ 22.492676] allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30) [ 22.492891] [ 22.492968] The buggy address belongs to the physical page: [ 22.493036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4 [ 22.493154] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.493269] page_type: f5(slab) [ 22.493396] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.493567] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.493702] page dumped because: kasan: bad access detected [ 22.493810] [ 22.493876] Memory state around the buggy address: [ 22.493982] fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.494254] fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.494489] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.494583] ^ [ 22.494661] fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.494743] fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.494818] ================================================================== [ 22.828096] ================================================================== [ 22.828229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 22.828343] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266 [ 22.828620] [ 22.828717] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.829377] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.829486] Hardware name: linux,dummy-virt (DT) [ 22.829667] Call trace: [ 22.829765] show_stack+0x20/0x38 (C) [ 22.829999] dump_stack_lvl+0x8c/0xd0 [ 22.830180] print_report+0x118/0x608 [ 22.830295] kasan_report+0xdc/0x128 [ 22.830623] kasan_check_range+0x100/0x1a8 [ 22.830823] __kasan_check_write+0x20/0x30 [ 22.831047] kasan_atomics_helper+0x16d0/0x4858 [ 22.831184] kasan_atomics+0x198/0x2e0 [ 22.831294] kunit_try_run_case+0x170/0x3f0 [ 22.831427] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.831556] kthread+0x328/0x630 [ 22.831659] ret_from_fork+0x10/0x20 [ 22.831769] [ 22.831815] Allocated by task 266: [ 22.831882] kasan_save_stack+0x3c/0x68 [ 22.831977] kasan_save_track+0x20/0x40 [ 22.832069] kasan_save_alloc_info+0x40/0x58 [ 22.832683] __kasan_kmalloc+0xd4/0xd8 [ 22.832853] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.833057] kasan_atomics+0xb8/0x2e0 [ 22.833241] kunit_try_run_case+0x170/0x3f0 [ 22.833334] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.833813] kthread+0x328/0x630 [ 22.834029] ret_from_fork+0x10/0x20 [ 22.834616] [ 22.834713] The buggy address belongs to the object at fff00000c79e4c00 [ 22.834713] which belongs to the cache kmalloc-64 of size 64 [ 22.835120] The buggy address is located 0 bytes to the right of [ 22.835120] allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30) [ 22.835606] [ 22.835787] The buggy address belongs to the physical page: [ 22.835935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4 [ 22.836314] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.836757] page_type: f5(slab) [ 22.836964] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.837095] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.837198] page dumped because: kasan: bad access detected [ 22.837696] [ 22.837901] Memory state around the buggy address: [ 22.837987] fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.838186] fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.838476] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.838651] ^ [ 22.838744] fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.839172] fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.839308] ================================================================== [ 22.508251] ================================================================== [ 22.508389] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 22.508498] Read of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266 [ 22.508614] [ 22.508687] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.508878] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.508945] Hardware name: linux,dummy-virt (DT) [ 22.509016] Call trace: [ 22.509071] show_stack+0x20/0x38 (C) [ 22.509177] dump_stack_lvl+0x8c/0xd0 [ 22.509287] print_report+0x118/0x608 [ 22.511438] kasan_report+0xdc/0x128 [ 22.512220] kasan_check_range+0x100/0x1a8 [ 22.512786] __kasan_check_read+0x20/0x30 [ 22.513410] kasan_atomics_helper+0xdd4/0x4858 [ 22.514755] kasan_atomics+0x198/0x2e0 [ 22.515128] kunit_try_run_case+0x170/0x3f0 [ 22.515447] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.515969] kthread+0x328/0x630 [ 22.516500] ret_from_fork+0x10/0x20 [ 22.516609] [ 22.517370] Allocated by task 266: [ 22.517721] kasan_save_stack+0x3c/0x68 [ 22.518065] kasan_save_track+0x20/0x40 [ 22.518191] kasan_save_alloc_info+0x40/0x58 [ 22.518303] __kasan_kmalloc+0xd4/0xd8 [ 22.518406] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.518500] kasan_atomics+0xb8/0x2e0 [ 22.518571] kunit_try_run_case+0x170/0x3f0 [ 22.518650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.518747] kthread+0x328/0x630 [ 22.518823] ret_from_fork+0x10/0x20 [ 22.518926] [ 22.518973] The buggy address belongs to the object at fff00000c79e4c00 [ 22.518973] which belongs to the cache kmalloc-64 of size 64 [ 22.519323] The buggy address is located 0 bytes to the right of [ 22.519323] allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30) [ 22.519721] [ 22.519788] The buggy address belongs to the physical page: [ 22.519858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4 [ 22.519979] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.520093] page_type: f5(slab) [ 22.520181] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.520300] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.520407] page dumped because: kasan: bad access detected [ 22.520479] [ 22.520646] Memory state around the buggy address: [ 22.520950] fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.521472] fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.521582] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.521800] ^ [ 22.521925] fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.522045] fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.522160] ================================================================== [ 22.261600] ================================================================== [ 22.261727] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 22.262226] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.263036] kasan_atomics_helper+0x3f94/0x4858 [ 22.266130] [ 22.266253] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4 [ 22.266839] page dumped because: kasan: bad access detected [ 22.266964] Memory state around the buggy address: [ 22.267260] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.268040] fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.269120] ================================================================== [ 22.638402] ================================================================== [ 22.638556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 22.638808] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266 [ 22.639476] [ 22.639794] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.640139] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.640212] Hardware name: linux,dummy-virt (DT) [ 22.640650] Call trace: [ 22.640965] show_stack+0x20/0x38 (C) [ 22.641144] dump_stack_lvl+0x8c/0xd0 [ 22.641317] print_report+0x118/0x608 [ 22.641440] kasan_report+0xdc/0x128 [ 22.641941] kasan_check_range+0x100/0x1a8 [ 22.642075] __kasan_check_write+0x20/0x30 [ 22.642186] kasan_atomics_helper+0x1128/0x4858 [ 22.642303] kasan_atomics+0x198/0x2e0 [ 22.642948] kunit_try_run_case+0x170/0x3f0 [ 22.643286] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.643688] kthread+0x328/0x630 [ 22.643980] ret_from_fork+0x10/0x20 [ 22.644183] [ 22.644244] Allocated by task 266: [ 22.644328] kasan_save_stack+0x3c/0x68 [ 22.644447] kasan_save_track+0x20/0x40 [ 22.644529] kasan_save_alloc_info+0x40/0x58 [ 22.644622] __kasan_kmalloc+0xd4/0xd8 [ 22.644872] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.645000] kasan_atomics+0xb8/0x2e0 [ 22.645262] kunit_try_run_case+0x170/0x3f0 [ 22.646181] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.646258] kthread+0x328/0x630 [ 22.646297] ret_from_fork+0x10/0x20 [ 22.646336] [ 22.646383] The buggy address belongs to the object at fff00000c79e4c00 [ 22.646383] which belongs to the cache kmalloc-64 of size 64 [ 22.646573] The buggy address is located 0 bytes to the right of [ 22.646573] allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30) [ 22.646702] [ 22.646751] The buggy address belongs to the physical page: [ 22.646824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4 [ 22.646972] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.647087] page_type: f5(slab) [ 22.647178] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.647299] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.647421] page dumped because: kasan: bad access detected [ 22.647536] [ 22.647607] Memory state around the buggy address: [ 22.647699] fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.647804] fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.647941] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.648070] ^ [ 22.648165] fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.648267] fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.648373] ================================================================== [ 22.550268] ================================================================== [ 22.550558] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 22.550705] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266 [ 22.550822] [ 22.550893] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.551579] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.551718] Hardware name: linux,dummy-virt (DT) [ 22.551909] Call trace: [ 22.552001] show_stack+0x20/0x38 (C) [ 22.552214] dump_stack_lvl+0x8c/0xd0 [ 22.552317] print_report+0x118/0x608 [ 22.552437] kasan_report+0xdc/0x128 [ 22.552546] kasan_check_range+0x100/0x1a8 [ 22.552660] __kasan_check_write+0x20/0x30 [ 22.552768] kasan_atomics_helper+0xeb8/0x4858 [ 22.552878] kasan_atomics+0x198/0x2e0 [ 22.552986] kunit_try_run_case+0x170/0x3f0 [ 22.553098] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.553231] kthread+0x328/0x630 [ 22.553795] ret_from_fork+0x10/0x20 [ 22.554063] [ 22.554125] Allocated by task 266: [ 22.554344] kasan_save_stack+0x3c/0x68 [ 22.554560] kasan_save_track+0x20/0x40 [ 22.554898] kasan_save_alloc_info+0x40/0x58 [ 22.555110] __kasan_kmalloc+0xd4/0xd8 [ 22.555818] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.555970] kasan_atomics+0xb8/0x2e0 [ 22.556055] kunit_try_run_case+0x170/0x3f0 [ 22.556445] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.556548] kthread+0x328/0x630 [ 22.556956] ret_from_fork+0x10/0x20 [ 22.557260] [ 22.557314] The buggy address belongs to the object at fff00000c79e4c00 [ 22.557314] which belongs to the cache kmalloc-64 of size 64 [ 22.557768] The buggy address is located 0 bytes to the right of [ 22.557768] allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30) [ 22.558153] [ 22.558212] The buggy address belongs to the physical page: [ 22.558403] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4 [ 22.558566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.558698] page_type: f5(slab) [ 22.558883] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.559009] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.559291] page dumped because: kasan: bad access detected [ 22.559393] [ 22.559450] Memory state around the buggy address: [ 22.559609] fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.559833] fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.560182] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.560442] ^ [ 22.560531] fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.560703] fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.560796] ================================================================== [ 22.772272] ================================================================== [ 22.772453] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 22.772817] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266 [ 22.773037] [ 22.773188] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.773560] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.773731] Hardware name: linux,dummy-virt (DT) [ 22.773804] Call trace: [ 22.773861] show_stack+0x20/0x38 (C) [ 22.774124] dump_stack_lvl+0x8c/0xd0 [ 22.774286] print_report+0x118/0x608 [ 22.774416] kasan_report+0xdc/0x128 [ 22.774543] kasan_check_range+0x100/0x1a8 [ 22.774664] __kasan_check_write+0x20/0x30 [ 22.774809] kasan_atomics_helper+0x154c/0x4858 [ 22.774930] kasan_atomics+0x198/0x2e0 [ 22.775040] kunit_try_run_case+0x170/0x3f0 [ 22.775504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.775737] kthread+0x328/0x630 [ 22.775838] ret_from_fork+0x10/0x20 [ 22.776025] [ 22.776182] Allocated by task 266: [ 22.776296] kasan_save_stack+0x3c/0x68 [ 22.776698] kasan_save_track+0x20/0x40 [ 22.776919] kasan_save_alloc_info+0x40/0x58 [ 22.777130] __kasan_kmalloc+0xd4/0xd8 [ 22.777466] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.777577] kasan_atomics+0xb8/0x2e0 [ 22.777704] kunit_try_run_case+0x170/0x3f0 [ 22.777803] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.777910] kthread+0x328/0x630 [ 22.778056] ret_from_fork+0x10/0x20 [ 22.778144] [ 22.778240] The buggy address belongs to the object at fff00000c79e4c00 [ 22.778240] which belongs to the cache kmalloc-64 of size 64 [ 22.778608] The buggy address is located 0 bytes to the right of [ 22.778608] allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30) [ 22.778802] [ 22.778855] The buggy address belongs to the physical page: [ 22.779068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4 [ 22.779346] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.779734] page_type: f5(slab) [ 22.779886] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.780021] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.780127] page dumped because: kasan: bad access detected [ 22.780208] [ 22.780260] Memory state around the buggy address: [ 22.780339] fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.780448] fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.780546] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.780653] ^ [ 22.781178] fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.781539] fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.781752] ================================================================== [ 22.602900] ================================================================== [ 22.603430] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 22.603671] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266 [ 22.603800] [ 22.603875] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.604063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.604313] Hardware name: linux,dummy-virt (DT) [ 22.605350] Call trace: [ 22.605442] show_stack+0x20/0x38 (C) [ 22.606046] dump_stack_lvl+0x8c/0xd0 [ 22.606198] print_report+0x118/0x608 [ 22.606315] kasan_report+0xdc/0x128 [ 22.606842] kasan_check_range+0x100/0x1a8 [ 22.607118] __kasan_check_write+0x20/0x30 [ 22.607429] kasan_atomics_helper+0x1058/0x4858 [ 22.607606] kasan_atomics+0x198/0x2e0 [ 22.608160] kunit_try_run_case+0x170/0x3f0 [ 22.608660] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.609261] kthread+0x328/0x630 [ 22.609472] ret_from_fork+0x10/0x20 [ 22.609593] [ 22.609647] Allocated by task 266: [ 22.609715] kasan_save_stack+0x3c/0x68 [ 22.610099] kasan_save_track+0x20/0x40 [ 22.610564] kasan_save_alloc_info+0x40/0x58 [ 22.610830] __kasan_kmalloc+0xd4/0xd8 [ 22.610934] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.611231] kasan_atomics+0xb8/0x2e0 [ 22.611816] kunit_try_run_case+0x170/0x3f0 [ 22.611959] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.612064] kthread+0x328/0x630 [ 22.612147] ret_from_fork+0x10/0x20 [ 22.612704] [ 22.612774] The buggy address belongs to the object at fff00000c79e4c00 [ 22.612774] which belongs to the cache kmalloc-64 of size 64 [ 22.612921] The buggy address is located 0 bytes to the right of [ 22.612921] allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30) [ 22.613073] [ 22.613658] The buggy address belongs to the physical page: [ 22.614159] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4 [ 22.614452] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.614866] page_type: f5(slab) [ 22.615111] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.615570] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.615944] page dumped because: kasan: bad access detected [ 22.616029] [ 22.616080] Memory state around the buggy address: [ 22.616755] fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.617238] fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.617384] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.617481] ^ [ 22.618048] fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.618374] fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.618566] ================================================================== [ 22.622782] ================================================================== [ 22.622925] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 22.623048] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266 [ 22.623170] [ 22.623243] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.623453] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.623521] Hardware name: linux,dummy-virt (DT) [ 22.623599] Call trace: [ 22.623661] show_stack+0x20/0x38 (C) [ 22.623778] dump_stack_lvl+0x8c/0xd0 [ 22.623888] print_report+0x118/0x608 [ 22.623998] kasan_report+0xdc/0x128 [ 22.625180] kasan_check_range+0x100/0x1a8 [ 22.626091] __kasan_check_write+0x20/0x30 [ 22.626205] kasan_atomics_helper+0x10c0/0x4858 [ 22.626315] kasan_atomics+0x198/0x2e0 [ 22.627576] kunit_try_run_case+0x170/0x3f0 [ 22.627968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.628109] kthread+0x328/0x630 [ 22.628289] ret_from_fork+0x10/0x20 [ 22.628716] [ 22.629142] Allocated by task 266: [ 22.629244] kasan_save_stack+0x3c/0x68 [ 22.629350] kasan_save_track+0x20/0x40 [ 22.629604] kasan_save_alloc_info+0x40/0x58 [ 22.629708] __kasan_kmalloc+0xd4/0xd8 [ 22.630137] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.631005] kasan_atomics+0xb8/0x2e0 [ 22.631104] kunit_try_run_case+0x170/0x3f0 [ 22.631187] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.631268] kthread+0x328/0x630 [ 22.631340] ret_from_fork+0x10/0x20 [ 22.631443] [ 22.631495] The buggy address belongs to the object at fff00000c79e4c00 [ 22.631495] which belongs to the cache kmalloc-64 of size 64 [ 22.631640] The buggy address is located 0 bytes to the right of [ 22.631640] allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30) [ 22.631795] [ 22.631844] The buggy address belongs to the physical page: [ 22.631919] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4 [ 22.632039] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.632154] page_type: f5(slab) [ 22.632247] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.634221] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.634523] page dumped because: kasan: bad access detected [ 22.634631] [ 22.635025] Memory state around the buggy address: [ 22.635383] fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.635658] fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.635765] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.635868] ^ [ 22.635953] fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.636056] fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.636704] ================================================================== [ 22.419822] ================================================================== [ 22.419948] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 22.420066] Write of size 4 at addr fff00000c79e4c30 by task kunit_try_catch/266 [ 22.420181] [ 22.420250] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.420461] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.420531] Hardware name: linux,dummy-virt (DT) [ 22.420607] Call trace: [ 22.420660] show_stack+0x20/0x38 (C) [ 22.420768] dump_stack_lvl+0x8c/0xd0 [ 22.421138] print_report+0x118/0x608 [ 22.422594] __kasan_check_write+0x20/0x30 [ 22.424222] __kasan_kmalloc+0xd4/0xd8 [ 22.424338] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.424486] kasan_atomics+0xb8/0x2e0 [ 22.424603] kunit_try_run_case+0x170/0x3f0 [ 22.424690] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.424787] kthread+0x328/0x630 [ 22.424883] ret_from_fork+0x10/0x20 [ 22.424970] [ 22.425018] The buggy address belongs to the object at fff00000c79e4c00 [ 22.425018] which belongs to the cache kmalloc-64 of size 64 [ 22.425157] The buggy address is located 0 bytes to the right of [ 22.425157] allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30) [ 22.425314] [ 22.425382] The buggy address belongs to the physical page: [ 22.425589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.426068] [ 22.426599] ^ [ 22.430253] kasan_save_stack+0x3c/0x68 [ 22.430654] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.430754] kasan_atomics+0xb8/0x2e0 [ 22.431440] The buggy address is located 0 bytes to the right of [ 22.431440] allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30) [ 22.433112] page dumped because: kasan: bad access detected [ 22.434086] ^ [ 22.437107] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.439587] kasan_atomics+0xb8/0x2e0 [ 22.440394] The buggy address belongs to the object at fff00000c79e4c00 [ 22.440394] which belongs to the cache kmalloc-64 of size 64 [ 22.441586] page dumped because: kasan: bad access detected [ 22.441657] [ 22.441707] Memory state around the buggy address: [ 22.441875] fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.443606] Read of size 4 at addr fff00000c79e4c30 by task kunit_try_catch/266 [ 22.447707] kthread+0x328/0x630 [ 22.448645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4 [ 22.449869] fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.453909] __kasan_kmalloc+0xd4/0xd8 [ 22.454176] kunit_try_run_case+0x170/0x3f0 [ 22.454264] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.454376] kthread+0x328/0x630 [ 22.454453] ret_from_fork+0x10/0x20 [ 22.454788] The buggy address is located 0 bytes to the right of [ 22.454788] allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30) [ 22.456648] page dumped because: kasan: bad access detected [ 22.457178] fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.457860] fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.460245] kasan_report+0xdc/0x128 [ 22.462264] __kasan_kmalloc+0xd4/0xd8 [ 22.462817] kthread+0x328/0x630 [ 22.463062] ret_from_fork+0x10/0x20 [ 22.463486] The buggy address is located 0 bytes to the right of [ 22.463486] allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30) [ 22.464302] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.464827] fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.465363] ================================================================== [ 22.649909] ================================================================== [ 22.650073] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 22.650244] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266 [ 22.650432] [ 22.650560] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.650721] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.651161] Hardware name: linux,dummy-virt (DT) [ 22.651249] Call trace: [ 22.651475] show_stack+0x20/0x38 (C) [ 22.651714] dump_stack_lvl+0x8c/0xd0 [ 22.652076] print_report+0x118/0x608 [ 22.652289] kasan_report+0xdc/0x128 [ 22.652424] kasan_check_range+0x100/0x1a8 [ 22.652549] __kasan_check_write+0x20/0x30 [ 22.652668] kasan_atomics_helper+0x1190/0x4858 [ 22.652780] kasan_atomics+0x198/0x2e0 [ 22.652877] kunit_try_run_case+0x170/0x3f0 [ 22.652985] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.653108] kthread+0x328/0x630 [ 22.653465] ret_from_fork+0x10/0x20 [ 22.653727] [ 22.653797] Allocated by task 266: [ 22.653896] kasan_save_stack+0x3c/0x68 [ 22.654130] kasan_save_track+0x20/0x40 [ 22.654232] kasan_save_alloc_info+0x40/0x58 [ 22.654326] __kasan_kmalloc+0xd4/0xd8 [ 22.654506] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.654609] kasan_atomics+0xb8/0x2e0 [ 22.654731] kunit_try_run_case+0x170/0x3f0 [ 22.654805] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.654899] kthread+0x328/0x630 [ 22.654973] ret_from_fork+0x10/0x20 [ 22.655575] [ 22.655903] The buggy address belongs to the object at fff00000c79e4c00 [ 22.655903] which belongs to the cache kmalloc-64 of size 64 [ 22.656261] The buggy address is located 0 bytes to the right of [ 22.656261] allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30) [ 22.656784] [ 22.657142] The buggy address belongs to the physical page: [ 22.657418] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4 [ 22.657553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.658020] page_type: f5(slab) [ 22.658382] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.658892] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.659178] page dumped because: kasan: bad access detected [ 22.659546] [ 22.659616] Memory state around the buggy address: [ 22.659889] fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.660030] fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.660128] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.660260] ^ [ 22.660371] fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.660477] fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.660572] ================================================================== [ 22.855348] ================================================================== [ 22.855507] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 22.855661] Read of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266 [ 22.855819] [ 22.855911] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.856122] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.856174] Hardware name: linux,dummy-virt (DT) [ 22.856238] Call trace: [ 22.856285] show_stack+0x20/0x38 (C) [ 22.856410] dump_stack_lvl+0x8c/0xd0 [ 22.856512] print_report+0x118/0x608 [ 22.856654] kasan_report+0xdc/0x128 [ 22.856806] __asan_report_load8_noabort+0x20/0x30 [ 22.856955] kasan_atomics_helper+0x3e20/0x4858 [ 22.857112] kasan_atomics+0x198/0x2e0 [ 22.857229] kunit_try_run_case+0x170/0x3f0 [ 22.857364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.857471] kthread+0x328/0x630 [ 22.857591] ret_from_fork+0x10/0x20 [ 22.857720] [ 22.857779] Allocated by task 266: [ 22.857870] kasan_save_stack+0x3c/0x68 [ 22.858039] kasan_save_track+0x20/0x40 [ 22.858257] kasan_save_alloc_info+0x40/0x58 [ 22.858485] __kasan_kmalloc+0xd4/0xd8 [ 22.858574] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.859095] kasan_atomics+0xb8/0x2e0 [ 22.859301] kunit_try_run_case+0x170/0x3f0 [ 22.859448] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.859547] kthread+0x328/0x630 [ 22.859614] ret_from_fork+0x10/0x20 [ 22.859680] [ 22.859943] The buggy address belongs to the object at fff00000c79e4c00 [ 22.859943] which belongs to the cache kmalloc-64 of size 64 [ 22.860215] The buggy address is located 0 bytes to the right of [ 22.860215] allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30) [ 22.860557] [ 22.860613] The buggy address belongs to the physical page: [ 22.860688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4 [ 22.860811] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.860912] page_type: f5(slab) [ 22.860995] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.861121] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.861260] page dumped because: kasan: bad access detected [ 22.861388] [ 22.861458] Memory state around the buggy address: [ 22.861560] fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.861705] fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.861845] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.861971] ^ [ 22.862041] fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.862128] fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.862245] ================================================================== [ 22.863319] ================================================================== [ 22.863446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 22.863569] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266 [ 22.863690] [ 22.863761] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.863964] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.864033] Hardware name: linux,dummy-virt (DT) [ 22.864111] Call trace: [ 22.864168] show_stack+0x20/0x38 (C) [ 22.864282] dump_stack_lvl+0x8c/0xd0 [ 22.864451] print_report+0x118/0x608 [ 22.864910] kasan_report+0xdc/0x128 [ 22.865189] kasan_check_range+0x100/0x1a8 [ 22.865307] __kasan_check_write+0x20/0x30 [ 22.865430] kasan_atomics_helper+0x17ec/0x4858 [ 22.866215] kasan_atomics+0x198/0x2e0 [ 22.866367] kunit_try_run_case+0x170/0x3f0 [ 22.866748] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.867266] kthread+0x328/0x630 [ 22.867450] ret_from_fork+0x10/0x20 [ 22.867565] [ 22.867613] Allocated by task 266: [ 22.867851] kasan_save_stack+0x3c/0x68 [ 22.868327] kasan_save_track+0x20/0x40 [ 22.868553] kasan_save_alloc_info+0x40/0x58 [ 22.868772] __kasan_kmalloc+0xd4/0xd8 [ 22.868933] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.869021] kasan_atomics+0xb8/0x2e0 [ 22.869105] kunit_try_run_case+0x170/0x3f0 [ 22.869194] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.869299] kthread+0x328/0x630 [ 22.869394] ret_from_fork+0x10/0x20 [ 22.869486] [ 22.869537] The buggy address belongs to the object at fff00000c79e4c00 [ 22.869537] which belongs to the cache kmalloc-64 of size 64 [ 22.870166] The buggy address is located 0 bytes to the right of [ 22.870166] allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30) [ 22.870845] [ 22.870967] The buggy address belongs to the physical page: [ 22.871233] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4 [ 22.871754] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.871998] page_type: f5(slab) [ 22.872480] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.872934] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.873179] page dumped because: kasan: bad access detected [ 22.873329] [ 22.873398] Memory state around the buggy address: [ 22.873779] fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.874083] fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.874460] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.874590] ^ [ 22.874768] fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.875005] fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.875272] ================================================================== [ 22.751456] ================================================================== [ 22.751578] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 22.751692] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266 [ 22.752442] [ 22.752545] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.753659] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.753793] Hardware name: linux,dummy-virt (DT) [ 22.754249] Call trace: [ 22.754386] show_stack+0x20/0x38 (C) [ 22.755000] dump_stack_lvl+0x8c/0xd0 [ 22.755108] print_report+0x118/0x608 [ 22.755655] kasan_report+0xdc/0x128 [ 22.755971] kasan_check_range+0x100/0x1a8 [ 22.756099] __kasan_check_write+0x20/0x30 [ 22.756204] kasan_atomics_helper+0x147c/0x4858 [ 22.756587] kasan_atomics+0x198/0x2e0 [ 22.756698] kunit_try_run_case+0x170/0x3f0 [ 22.757542] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.757726] kthread+0x328/0x630 [ 22.757894] ret_from_fork+0x10/0x20 [ 22.758219] [ 22.758597] Allocated by task 266: [ 22.758686] kasan_save_stack+0x3c/0x68 [ 22.759037] kasan_save_track+0x20/0x40 [ 22.759154] kasan_save_alloc_info+0x40/0x58 [ 22.759249] __kasan_kmalloc+0xd4/0xd8 [ 22.759338] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.761115] kasan_atomics+0xb8/0x2e0 [ 22.761244] kunit_try_run_case+0x170/0x3f0 [ 22.761375] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.761488] kthread+0x328/0x630 [ 22.761564] ret_from_fork+0x10/0x20 [ 22.761658] [ 22.761730] The buggy address belongs to the object at fff00000c79e4c00 [ 22.761730] which belongs to the cache kmalloc-64 of size 64 [ 22.761863] The buggy address is located 0 bytes to the right of [ 22.761863] allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30) [ 22.762002] [ 22.762046] The buggy address belongs to the physical page: [ 22.762116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4 [ 22.762320] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.762477] page_type: f5(slab) [ 22.762955] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.763128] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.763245] page dumped because: kasan: bad access detected [ 22.763332] [ 22.763400] Memory state around the buggy address: [ 22.763473] fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.763560] fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.763976] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.764119] ^ [ 22.764212] fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.764315] fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.764433] ================================================================== [ 22.585855] ================================================================== [ 22.585978] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 22.586750] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266 [ 22.587106] [ 22.587661] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.588099] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.588346] Hardware name: linux,dummy-virt (DT) [ 22.588449] Call trace: [ 22.588592] show_stack+0x20/0x38 (C) [ 22.588965] dump_stack_lvl+0x8c/0xd0 [ 22.589531] print_report+0x118/0x608 [ 22.589837] kasan_report+0xdc/0x128 [ 22.589955] kasan_check_range+0x100/0x1a8 [ 22.590057] __kasan_check_write+0x20/0x30 [ 22.590171] kasan_atomics_helper+0xff0/0x4858 [ 22.590288] kasan_atomics+0x198/0x2e0 [ 22.591591] kunit_try_run_case+0x170/0x3f0 [ 22.592332] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.592514] kthread+0x328/0x630 [ 22.592841] ret_from_fork+0x10/0x20 [ 22.593320] [ 22.593440] Allocated by task 266: [ 22.593646] kasan_save_stack+0x3c/0x68 [ 22.593758] kasan_save_track+0x20/0x40 [ 22.593844] kasan_save_alloc_info+0x40/0x58 [ 22.593933] __kasan_kmalloc+0xd4/0xd8 [ 22.594243] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.594581] kasan_atomics+0xb8/0x2e0 [ 22.596226] kunit_try_run_case+0x170/0x3f0 [ 22.596370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.596492] kthread+0x328/0x630 [ 22.596577] ret_from_fork+0x10/0x20 [ 22.596680] [ 22.596735] The buggy address belongs to the object at fff00000c79e4c00 [ 22.596735] which belongs to the cache kmalloc-64 of size 64 [ 22.596876] The buggy address is located 0 bytes to the right of [ 22.596876] allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30) [ 22.597491] [ 22.597569] The buggy address belongs to the physical page: [ 22.597660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4 [ 22.597921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.598041] page_type: f5(slab) [ 22.598635] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.598784] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.598870] page dumped because: kasan: bad access detected [ 22.598942] [ 22.598990] Memory state around the buggy address: [ 22.599068] fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.600008] fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.600648] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.600761] ^ [ 22.600843] fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.600941] fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.601026] ================================================================== [ 22.724809] ================================================================== [ 22.724929] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 22.725048] Read of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266 [ 22.725168] [ 22.725238] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.726460] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.726709] Hardware name: linux,dummy-virt (DT) [ 22.727426] Call trace: [ 22.728219] show_stack+0x20/0x38 (C) [ 22.728728] dump_stack_lvl+0x8c/0xd0 [ 22.729365] print_report+0x118/0x608 [ 22.730049] kasan_report+0xdc/0x128 [ 22.730274] __asan_report_load8_noabort+0x20/0x30 [ 22.731045] kasan_atomics_helper+0x3f04/0x4858 [ 22.731521] kasan_atomics+0x198/0x2e0 [ 22.731756] kunit_try_run_case+0x170/0x3f0 [ 22.731882] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.732009] kthread+0x328/0x630 [ 22.732112] ret_from_fork+0x10/0x20 [ 22.732221] [ 22.732271] Allocated by task 266: [ 22.732336] kasan_save_stack+0x3c/0x68 [ 22.732446] kasan_save_track+0x20/0x40 [ 22.732538] kasan_save_alloc_info+0x40/0x58 [ 22.732634] __kasan_kmalloc+0xd4/0xd8 [ 22.732719] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.732812] kasan_atomics+0xb8/0x2e0 [ 22.733329] kunit_try_run_case+0x170/0x3f0 [ 22.734601] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.735284] kthread+0x328/0x630 [ 22.735680] ret_from_fork+0x10/0x20 [ 22.736289] [ 22.736601] The buggy address belongs to the object at fff00000c79e4c00 [ 22.736601] which belongs to the cache kmalloc-64 of size 64 [ 22.737427] The buggy address is located 0 bytes to the right of [ 22.737427] allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30) [ 22.737923] [ 22.737980] The buggy address belongs to the physical page: [ 22.739341] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4 [ 22.739510] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.740200] page_type: f5(slab) [ 22.740304] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.740434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.740496] page dumped because: kasan: bad access detected [ 22.740534] [ 22.740557] Memory state around the buggy address: [ 22.740593] fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.740640] fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.740684] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.740725] ^ [ 22.740763] fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.740805] fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.740845] ================================================================== [ 22.532288] ================================================================== [ 22.532421] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 22.532537] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266 [ 22.532646] [ 22.532713] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.532914] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.532972] Hardware name: linux,dummy-virt (DT) [ 22.533042] Call trace: [ 22.533370] show_stack+0x20/0x38 (C) [ 22.533716] dump_stack_lvl+0x8c/0xd0 [ 22.533826] print_report+0x118/0x608 [ 22.534251] kasan_report+0xdc/0x128 [ 22.534705] kasan_check_range+0x100/0x1a8 [ 22.534867] __kasan_check_write+0x20/0x30 [ 22.535017] kasan_atomics_helper+0xe44/0x4858 [ 22.535174] kasan_atomics+0x198/0x2e0 [ 22.535265] kunit_try_run_case+0x170/0x3f0 [ 22.535348] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.535499] kthread+0x328/0x630 [ 22.535593] ret_from_fork+0x10/0x20 [ 22.535692] [ 22.535735] Allocated by task 266: [ 22.535799] kasan_save_stack+0x3c/0x68 [ 22.535883] kasan_save_track+0x20/0x40 [ 22.536128] kasan_save_alloc_info+0x40/0x58 [ 22.536245] __kasan_kmalloc+0xd4/0xd8 [ 22.536401] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.536847] kasan_atomics+0xb8/0x2e0 [ 22.536959] kunit_try_run_case+0x170/0x3f0 [ 22.537260] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.537822] kthread+0x328/0x630 [ 22.537922] ret_from_fork+0x10/0x20 [ 22.538006] [ 22.538348] The buggy address belongs to the object at fff00000c79e4c00 [ 22.538348] which belongs to the cache kmalloc-64 of size 64 [ 22.538931] The buggy address is located 0 bytes to the right of [ 22.538931] allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30) [ 22.539080] [ 22.539131] The buggy address belongs to the physical page: [ 22.539206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4 [ 22.539876] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.540304] page_type: f5(slab) [ 22.540430] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.540967] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.541204] page dumped because: kasan: bad access detected [ 22.541298] [ 22.541346] Memory state around the buggy address: [ 22.541922] fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.542192] fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.542293] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.542604] ^ [ 22.542805] fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.543240] fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.543384] ================================================================== [ 22.384833] ================================================================== [ 22.384983] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 22.385136] Read of size 4 at addr fff00000c79e4c30 by task kunit_try_catch/266 [ 22.385289] [ 22.385402] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.385660] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.385731] Hardware name: linux,dummy-virt (DT) [ 22.387686] kasan_save_track+0x20/0x40 [ 22.388020] __kasan_kmalloc+0xd4/0xd8 [ 22.389221] The buggy address belongs to the physical page: [ 22.392410] Write of size 4 at addr fff00000c79e4c30 by task kunit_try_catch/266 [ 22.392958] show_stack+0x20/0x38 (C) [ 22.393069] dump_stack_lvl+0x8c/0xd0 [ 22.393179] print_report+0x118/0x608 [ 22.393285] kasan_report+0xdc/0x128 [ 22.393406] kasan_check_range+0x100/0x1a8 [ 22.393518] __kasan_check_write+0x20/0x30 [ 22.393623] kasan_atomics_helper+0x934/0x4858 [ 22.393733] kasan_atomics+0x198/0x2e0 [ 22.393844] kunit_try_run_case+0x170/0x3f0 [ 22.393955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.394058] kthread+0x328/0x630 [ 22.394156] ret_from_fork+0x10/0x20 [ 22.394286] [ 22.394364] Allocated by task 266: [ 22.394457] kasan_save_stack+0x3c/0x68 [ 22.394564] kasan_save_track+0x20/0x40 [ 22.394644] kasan_save_alloc_info+0x40/0x58 [ 22.394735] __kasan_kmalloc+0xd4/0xd8 [ 22.394828] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.394934] kasan_atomics+0xb8/0x2e0 [ 22.395044] kunit_try_run_case+0x170/0x3f0 [ 22.395125] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.395221] kthread+0x328/0x630 [ 22.395332] ret_from_fork+0x10/0x20 [ 22.395438] [ 22.395484] The buggy address belongs to the object at fff00000c79e4c00 [ 22.395484] which belongs to the cache kmalloc-64 of size 64 [ 22.395597] The buggy address is located 0 bytes to the right of [ 22.395597] allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30) [ 22.395722] [ 22.395766] The buggy address belongs to the physical page: [ 22.395850] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4 [ 22.395976] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.396077] page_type: f5(slab) [ 22.396162] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.396279] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.396382] page dumped because: kasan: bad access detected [ 22.396462] [ 22.396509] Memory state around the buggy address: [ 22.396586] fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.396689] fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.396797] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.397000] ^ [ 22.397080] fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.397170] fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.397293] ================================================================== [ 22.562417] ================================================================== [ 22.562775] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 22.562991] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266 [ 22.563094] [ 22.563163] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.563450] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.563541] Hardware name: linux,dummy-virt (DT) [ 22.563616] Call trace: [ 22.563645] show_stack+0x20/0x38 (C) [ 22.563705] dump_stack_lvl+0x8c/0xd0 [ 22.563765] print_report+0x118/0x608 [ 22.563869] kasan_report+0xdc/0x128 [ 22.563973] kasan_check_range+0x100/0x1a8 [ 22.564086] __kasan_check_write+0x20/0x30 [ 22.564191] kasan_atomics_helper+0xf20/0x4858 [ 22.564301] kasan_atomics+0x198/0x2e0 [ 22.564422] kunit_try_run_case+0x170/0x3f0 [ 22.564525] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.564649] kthread+0x328/0x630 [ 22.564743] ret_from_fork+0x10/0x20 [ 22.564850] [ 22.564896] Allocated by task 266: [ 22.564963] kasan_save_stack+0x3c/0x68 [ 22.565054] kasan_save_track+0x20/0x40 [ 22.565142] kasan_save_alloc_info+0x40/0x58 [ 22.565231] __kasan_kmalloc+0xd4/0xd8 [ 22.565323] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.565458] kasan_atomics+0xb8/0x2e0 [ 22.565703] kunit_try_run_case+0x170/0x3f0 [ 22.565818] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.565933] kthread+0x328/0x630 [ 22.566134] ret_from_fork+0x10/0x20 [ 22.566242] [ 22.566525] The buggy address belongs to the object at fff00000c79e4c00 [ 22.566525] which belongs to the cache kmalloc-64 of size 64 [ 22.566681] The buggy address is located 0 bytes to the right of [ 22.566681] allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30) [ 22.566829] [ 22.566877] The buggy address belongs to the physical page: [ 22.567056] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4 [ 22.567282] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.567624] page_type: f5(slab) [ 22.567732] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.567951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.568063] page dumped because: kasan: bad access detected [ 22.568141] [ 22.568396] Memory state around the buggy address: [ 22.568486] fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.568612] fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.568908] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.569011] ^ [ 22.569111] fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.569218] fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.569315] ================================================================== [ 22.476128] ================================================================== [ 22.476274] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 22.476405] Read of size 4 at addr fff00000c79e4c30 by task kunit_try_catch/266 [ 22.476932] [ 22.477029] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.477218] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.477286] Hardware name: linux,dummy-virt (DT) [ 22.477597] Call trace: [ 22.477677] show_stack+0x20/0x38 (C) [ 22.477881] dump_stack_lvl+0x8c/0xd0 [ 22.478254] print_report+0x118/0x608 [ 22.478378] kasan_report+0xdc/0x128 [ 22.478596] __asan_report_load4_noabort+0x20/0x30 [ 22.478735] kasan_atomics_helper+0x3dd8/0x4858 [ 22.478856] kasan_atomics+0x198/0x2e0 [ 22.479207] kunit_try_run_case+0x170/0x3f0 [ 22.479461] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.479601] kthread+0x328/0x630 [ 22.479780] ret_from_fork+0x10/0x20 [ 22.480087] [ 22.480138] Allocated by task 266: [ 22.480257] kasan_save_stack+0x3c/0x68 [ 22.480505] kasan_save_track+0x20/0x40 [ 22.480806] kasan_save_alloc_info+0x40/0x58 [ 22.480903] __kasan_kmalloc+0xd4/0xd8 [ 22.481000] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.481410] kasan_atomics+0xb8/0x2e0 [ 22.481508] kunit_try_run_case+0x170/0x3f0 [ 22.481555] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.481602] kthread+0x328/0x630 [ 22.481639] ret_from_fork+0x10/0x20 [ 22.481677] [ 22.481702] The buggy address belongs to the object at fff00000c79e4c00 [ 22.481702] which belongs to the cache kmalloc-64 of size 64 [ 22.481763] The buggy address is located 0 bytes to the right of [ 22.481763] allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30) [ 22.481827] [ 22.481849] The buggy address belongs to the physical page: [ 22.481884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4 [ 22.481938] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.481988] page_type: f5(slab) [ 22.482161] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.482648] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.482806] page dumped because: kasan: bad access detected [ 22.482880] [ 22.482943] Memory state around the buggy address: [ 22.483032] fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.483125] fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.483219] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.483310] ^ [ 22.483398] fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.483493] fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.483590] ================================================================== [ 22.397789] ================================================================== [ 22.397898] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 22.398060] Write of size 4 at addr fff00000c79e4c30 by task kunit_try_catch/266 [ 22.398205] [ 22.398301] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.398501] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.398567] Hardware name: linux,dummy-virt (DT) [ 22.398635] Call trace: [ 22.398699] show_stack+0x20/0x38 (C) [ 22.398862] dump_stack_lvl+0x8c/0xd0 [ 22.398978] print_report+0x118/0x608 [ 22.399088] kasan_report+0xdc/0x128 [ 22.399187] kasan_check_range+0x100/0x1a8 [ 22.399297] __kasan_check_write+0x20/0x30 [ 22.399411] kasan_atomics_helper+0x99c/0x4858 [ 22.399513] kasan_atomics+0x198/0x2e0 [ 22.399647] kunit_try_run_case+0x170/0x3f0 [ 22.399772] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.399904] kthread+0x328/0x630 [ 22.400014] ret_from_fork+0x10/0x20 [ 22.400110] [ 22.400156] Allocated by task 266: [ 22.400218] kasan_save_stack+0x3c/0x68 [ 22.400308] kasan_save_track+0x20/0x40 [ 22.400421] kasan_save_alloc_info+0x40/0x58 [ 22.400600] __kasan_kmalloc+0xd4/0xd8 [ 22.400709] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.400823] kasan_atomics+0xb8/0x2e0 [ 22.400910] kunit_try_run_case+0x170/0x3f0 [ 22.400994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.401095] kthread+0x328/0x630 [ 22.401175] ret_from_fork+0x10/0x20 [ 22.401257] [ 22.401305] The buggy address belongs to the object at fff00000c79e4c00 [ 22.401305] which belongs to the cache kmalloc-64 of size 64 [ 22.401444] The buggy address is located 0 bytes to the right of [ 22.401444] allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30) [ 22.401594] [ 22.401644] The buggy address belongs to the physical page: [ 22.401715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4 [ 22.401868] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.401978] page_type: f5(slab) [ 22.402065] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.402224] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.402351] page dumped because: kasan: bad access detected [ 22.402488] [ 22.402564] Memory state around the buggy address: [ 22.402674] fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.402824] fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.402968] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.403099] ^ [ 22.403218] fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.403372] fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.403455] ================================================================== [ 22.708408] ================================================================== [ 22.708534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 22.708657] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266 [ 22.708776] [ 22.708851] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.709039] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.709104] Hardware name: linux,dummy-virt (DT) [ 22.709563] Call trace: [ 22.710723] show_stack+0x20/0x38 (C) [ 22.710879] dump_stack_lvl+0x8c/0xd0 [ 22.711001] print_report+0x118/0x608 [ 22.711401] kasan_report+0xdc/0x128 [ 22.711722] kasan_check_range+0x100/0x1a8 [ 22.712117] __kasan_check_write+0x20/0x30 [ 22.712410] kasan_atomics_helper+0x1384/0x4858 [ 22.712711] kasan_atomics+0x198/0x2e0 [ 22.713027] kunit_try_run_case+0x170/0x3f0 [ 22.713328] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.713767] kthread+0x328/0x630 [ 22.714057] ret_from_fork+0x10/0x20 [ 22.714550] [ 22.714622] Allocated by task 266: [ 22.714799] kasan_save_stack+0x3c/0x68 [ 22.714926] kasan_save_track+0x20/0x40 [ 22.715077] kasan_save_alloc_info+0x40/0x58 [ 22.715164] __kasan_kmalloc+0xd4/0xd8 [ 22.715475] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.715783] kasan_atomics+0xb8/0x2e0 [ 22.716902] kunit_try_run_case+0x170/0x3f0 [ 22.717041] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.717141] kthread+0x328/0x630 [ 22.717225] ret_from_fork+0x10/0x20 [ 22.717661] [ 22.717752] The buggy address belongs to the object at fff00000c79e4c00 [ 22.717752] which belongs to the cache kmalloc-64 of size 64 [ 22.717928] The buggy address is located 0 bytes to the right of [ 22.717928] allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30) [ 22.718086] [ 22.718135] The buggy address belongs to the physical page: [ 22.718201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4 [ 22.718891] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.719478] page_type: f5(slab) [ 22.719770] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.719916] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.720015] page dumped because: kasan: bad access detected [ 22.720712] [ 22.720778] Memory state around the buggy address: [ 22.720859] fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.721300] fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.721750] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.721895] ^ [ 22.722583] fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.722696] fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.722769] ================================================================== [ 22.847203] ================================================================== [ 22.847332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 22.847471] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266 [ 22.847976] [ 22.848069] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.848418] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.848488] Hardware name: linux,dummy-virt (DT) [ 22.848742] Call trace: [ 22.848823] show_stack+0x20/0x38 (C) [ 22.848954] dump_stack_lvl+0x8c/0xd0 [ 22.849185] print_report+0x118/0x608 [ 22.849408] kasan_report+0xdc/0x128 [ 22.849532] kasan_check_range+0x100/0x1a8 [ 22.849877] __kasan_check_write+0x20/0x30 [ 22.850241] kasan_atomics_helper+0x175c/0x4858 [ 22.850872] kasan_atomics+0x198/0x2e0 [ 22.851037] kunit_try_run_case+0x170/0x3f0 [ 22.851158] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.851370] kthread+0x328/0x630 [ 22.851469] ret_from_fork+0x10/0x20 [ 22.851814] [ 22.851990] Allocated by task 266: [ 22.852191] kasan_save_stack+0x3c/0x68 [ 22.852563] kasan_save_track+0x20/0x40 [ 22.852819] kasan_save_alloc_info+0x40/0x58 [ 22.852938] __kasan_kmalloc+0xd4/0xd8 [ 22.853032] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.853200] kasan_atomics+0xb8/0x2e0 [ 22.853281] kunit_try_run_case+0x170/0x3f0 [ 22.853653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.853845] kthread+0x328/0x630 [ 22.853947] ret_from_fork+0x10/0x20 [ 22.854067] [ 22.854116] The buggy address belongs to the object at fff00000c79e4c00 [ 22.854116] which belongs to the cache kmalloc-64 of size 64 [ 22.854222] The buggy address is located 0 bytes to the right of [ 22.854222] allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30) [ 22.854291] [ 22.854317] The buggy address belongs to the physical page: [ 22.854379] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4 [ 22.854470] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.854525] page_type: f5(slab) [ 22.854568] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.854622] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.854666] page dumped because: kasan: bad access detected [ 22.854713] [ 22.854735] Memory state around the buggy address: [ 22.854770] fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.854816] fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.854861] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.854900] ^ [ 22.854937] fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.854981] fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.855019] ================================================================== [ 22.692850] ================================================================== [ 22.692966] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 22.693079] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266 [ 22.693196] [ 22.693269] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.693474] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.693539] Hardware name: linux,dummy-virt (DT) [ 22.693614] Call trace: [ 22.695149] show_stack+0x20/0x38 (C) [ 22.695341] dump_stack_lvl+0x8c/0xd0 [ 22.695471] print_report+0x118/0x608 [ 22.695573] kasan_report+0xdc/0x128 [ 22.695687] kasan_check_range+0x100/0x1a8 [ 22.696342] __kasan_check_write+0x20/0x30 [ 22.696781] kasan_atomics_helper+0x12d8/0x4858 [ 22.696894] kasan_atomics+0x198/0x2e0 [ 22.697465] kunit_try_run_case+0x170/0x3f0 [ 22.697860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.698707] kthread+0x328/0x630 [ 22.698841] ret_from_fork+0x10/0x20 [ 22.699006] [ 22.699311] Allocated by task 266: [ 22.699393] kasan_save_stack+0x3c/0x68 [ 22.699487] kasan_save_track+0x20/0x40 [ 22.699568] kasan_save_alloc_info+0x40/0x58 [ 22.700122] __kasan_kmalloc+0xd4/0xd8 [ 22.700561] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.700733] kasan_atomics+0xb8/0x2e0 [ 22.700829] kunit_try_run_case+0x170/0x3f0 [ 22.701895] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.702021] kthread+0x328/0x630 [ 22.702105] ret_from_fork+0x10/0x20 [ 22.702430] [ 22.702543] The buggy address belongs to the object at fff00000c79e4c00 [ 22.702543] which belongs to the cache kmalloc-64 of size 64 [ 22.702685] The buggy address is located 0 bytes to the right of [ 22.702685] allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30) [ 22.702983] [ 22.703709] The buggy address belongs to the physical page: [ 22.703813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4 [ 22.703942] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.704388] page_type: f5(slab) [ 22.704499] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.704625] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.705426] page dumped because: kasan: bad access detected [ 22.705589] [ 22.705660] Memory state around the buggy address: [ 22.706089] fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.706211] fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.706294] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.706392] ^ [ 22.706488] fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.707172] fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.707445] ================================================================== [ 22.765088] ================================================================== [ 22.765202] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 22.765309] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266 [ 22.765769] [ 22.765866] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.766054] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.766204] Hardware name: linux,dummy-virt (DT) [ 22.766463] Call trace: [ 22.766549] show_stack+0x20/0x38 (C) [ 22.766662] dump_stack_lvl+0x8c/0xd0 [ 22.766749] print_report+0x118/0x608 [ 22.766999] kasan_report+0xdc/0x128 [ 22.767125] kasan_check_range+0x100/0x1a8 [ 22.767231] __kasan_check_write+0x20/0x30 [ 22.767540] kasan_atomics_helper+0x14e4/0x4858 [ 22.767670] kasan_atomics+0x198/0x2e0 [ 22.767782] kunit_try_run_case+0x170/0x3f0 [ 22.768097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.768316] kthread+0x328/0x630 [ 22.768444] ret_from_fork+0x10/0x20 [ 22.768569] [ 22.768623] Allocated by task 266: [ 22.768693] kasan_save_stack+0x3c/0x68 [ 22.768784] kasan_save_track+0x20/0x40 [ 22.768884] kasan_save_alloc_info+0x40/0x58 [ 22.768966] __kasan_kmalloc+0xd4/0xd8 [ 22.769050] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.769424] kasan_atomics+0xb8/0x2e0 [ 22.769610] kunit_try_run_case+0x170/0x3f0 [ 22.769708] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.769973] kthread+0x328/0x630 [ 22.770835] ret_from_fork+0x10/0x20 [ 22.770939] [ 22.770966] The buggy address belongs to the object at fff00000c79e4c00 [ 22.770966] which belongs to the cache kmalloc-64 of size 64 [ 22.771031] The buggy address is located 0 bytes to the right of [ 22.771031] allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30) [ 22.771096] [ 22.771118] The buggy address belongs to the physical page: [ 22.771153] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4 [ 22.771206] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.771256] page_type: f5(slab) [ 22.771298] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.771352] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.771413] page dumped because: kasan: bad access detected [ 22.771447] [ 22.771470] Memory state around the buggy address: [ 22.771505] fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.771550] fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.771594] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.771635] ^ [ 22.771669] fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.771712] fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.771750] ================================================================== [ 22.570060] ================================================================== [ 22.570623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 22.570848] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266 [ 22.570994] [ 22.571075] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.571495] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.571769] Hardware name: linux,dummy-virt (DT) [ 22.572136] Call trace: [ 22.572497] show_stack+0x20/0x38 (C) [ 22.572937] dump_stack_lvl+0x8c/0xd0 [ 22.573158] print_report+0x118/0x608 [ 22.573388] kasan_report+0xdc/0x128 [ 22.573506] kasan_check_range+0x100/0x1a8 [ 22.573617] __kasan_check_write+0x20/0x30 [ 22.573730] kasan_atomics_helper+0xf88/0x4858 [ 22.573847] kasan_atomics+0x198/0x2e0 [ 22.574762] kunit_try_run_case+0x170/0x3f0 [ 22.575073] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.575606] kthread+0x328/0x630 [ 22.575734] ret_from_fork+0x10/0x20 [ 22.576461] [ 22.576772] Allocated by task 266: [ 22.576874] kasan_save_stack+0x3c/0x68 [ 22.577222] kasan_save_track+0x20/0x40 [ 22.577378] kasan_save_alloc_info+0x40/0x58 [ 22.577901] __kasan_kmalloc+0xd4/0xd8 [ 22.578378] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.578493] kasan_atomics+0xb8/0x2e0 [ 22.578585] kunit_try_run_case+0x170/0x3f0 [ 22.578670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.578776] kthread+0x328/0x630 [ 22.578863] ret_from_fork+0x10/0x20 [ 22.579388] [ 22.579529] The buggy address belongs to the object at fff00000c79e4c00 [ 22.579529] which belongs to the cache kmalloc-64 of size 64 [ 22.579687] The buggy address is located 0 bytes to the right of [ 22.579687] allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30) [ 22.580519] [ 22.580696] The buggy address belongs to the physical page: [ 22.580779] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4 [ 22.581548] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.581749] page_type: f5(slab) [ 22.581851] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.582222] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.582686] page dumped because: kasan: bad access detected [ 22.582824] [ 22.582996] Memory state around the buggy address: [ 22.583074] fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.583171] fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.583270] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.583379] ^ [ 22.583682] fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.584022] fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.584754] ================================================================== [ 22.522860] ================================================================== [ 22.523155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 22.523305] Read of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266 [ 22.523478] [ 22.523587] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.523841] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.523934] Hardware name: linux,dummy-virt (DT) [ 22.524037] Call trace: [ 22.524107] show_stack+0x20/0x38 (C) [ 22.524255] dump_stack_lvl+0x8c/0xd0 [ 22.524425] print_report+0x118/0x608 [ 22.524576] kasan_report+0xdc/0x128 [ 22.524691] __asan_report_load8_noabort+0x20/0x30 [ 22.524796] kasan_atomics_helper+0x3f58/0x4858 [ 22.524925] kasan_atomics+0x198/0x2e0 [ 22.525072] kunit_try_run_case+0x170/0x3f0 [ 22.525225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.525656] kthread+0x328/0x630 [ 22.525942] ret_from_fork+0x10/0x20 [ 22.526278] [ 22.526457] Allocated by task 266: [ 22.526651] kasan_save_stack+0x3c/0x68 [ 22.526757] kasan_save_track+0x20/0x40 [ 22.526840] kasan_save_alloc_info+0x40/0x58 [ 22.526911] __kasan_kmalloc+0xd4/0xd8 [ 22.526995] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.527079] kasan_atomics+0xb8/0x2e0 [ 22.527280] kunit_try_run_case+0x170/0x3f0 [ 22.527387] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.527485] kthread+0x328/0x630 [ 22.527568] ret_from_fork+0x10/0x20 [ 22.527657] [ 22.527703] The buggy address belongs to the object at fff00000c79e4c00 [ 22.527703] which belongs to the cache kmalloc-64 of size 64 [ 22.528696] The buggy address is located 0 bytes to the right of [ 22.528696] allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30) [ 22.528860] [ 22.528998] The buggy address belongs to the physical page: [ 22.529076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4 [ 22.529202] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.529315] page_type: f5(slab) [ 22.529417] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.529543] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.529683] page dumped because: kasan: bad access detected [ 22.529772] [ 22.529815] Memory state around the buggy address: [ 22.529887] fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.530019] fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.530102] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.530185] ^ [ 22.531154] fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.531369] fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.531493] ================================================================== [ 22.544209] ================================================================== [ 22.544336] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 22.544482] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266 [ 22.544604] [ 22.544705] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.544889] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.544955] Hardware name: linux,dummy-virt (DT) [ 22.545035] Call trace: [ 22.545087] show_stack+0x20/0x38 (C) [ 22.545210] dump_stack_lvl+0x8c/0xd0 [ 22.545319] print_report+0x118/0x608 [ 22.545451] kasan_report+0xdc/0x128 [ 22.545562] __asan_report_store8_noabort+0x20/0x30 [ 22.545675] kasan_atomics_helper+0x3e5c/0x4858 [ 22.545790] kasan_atomics+0x198/0x2e0 [ 22.545893] kunit_try_run_case+0x170/0x3f0 [ 22.546008] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.546121] kthread+0x328/0x630 [ 22.546217] ret_from_fork+0x10/0x20 [ 22.546336] [ 22.546403] Allocated by task 266: [ 22.546482] kasan_save_stack+0x3c/0x68 [ 22.546592] kasan_save_track+0x20/0x40 [ 22.546682] kasan_save_alloc_info+0x40/0x58 [ 22.546789] __kasan_kmalloc+0xd4/0xd8 [ 22.546905] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.547011] kasan_atomics+0xb8/0x2e0 [ 22.547103] kunit_try_run_case+0x170/0x3f0 [ 22.547201] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.547310] kthread+0x328/0x630 [ 22.547413] ret_from_fork+0x10/0x20 [ 22.547493] [ 22.547545] The buggy address belongs to the object at fff00000c79e4c00 [ 22.547545] which belongs to the cache kmalloc-64 of size 64 [ 22.547686] The buggy address is located 0 bytes to the right of [ 22.547686] allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30) [ 22.547870] [ 22.547925] The buggy address belongs to the physical page: [ 22.548003] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4 [ 22.548124] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.548257] page_type: f5(slab) [ 22.548381] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.548561] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.548672] page dumped because: kasan: bad access detected [ 22.548736] [ 22.548770] Memory state around the buggy address: [ 22.548999] fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.549122] fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.549222] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.549306] ^ [ 22.549404] fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.549499] fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.549615] ================================================================== [ 22.660992] ================================================================== [ 22.661093] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 22.661203] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266 [ 22.661318] [ 22.661906] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.662103] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.662684] Hardware name: linux,dummy-virt (DT) [ 22.662793] Call trace: [ 22.662862] show_stack+0x20/0x38 (C) [ 22.663422] dump_stack_lvl+0x8c/0xd0 [ 22.663591] print_report+0x118/0x608 [ 22.664548] kasan_report+0xdc/0x128 [ 22.664762] kasan_check_range+0x100/0x1a8 [ 22.664875] __kasan_check_write+0x20/0x30 [ 22.665243] kasan_atomics_helper+0x11f8/0x4858 [ 22.665383] kasan_atomics+0x198/0x2e0 [ 22.665562] kunit_try_run_case+0x170/0x3f0 [ 22.666062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.666335] kthread+0x328/0x630 [ 22.666926] ret_from_fork+0x10/0x20 [ 22.667134] [ 22.667205] Allocated by task 266: [ 22.667278] kasan_save_stack+0x3c/0x68 [ 22.667376] kasan_save_track+0x20/0x40 [ 22.667452] kasan_save_alloc_info+0x40/0x58 [ 22.667539] __kasan_kmalloc+0xd4/0xd8 [ 22.668266] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.668536] kasan_atomics+0xb8/0x2e0 [ 22.668639] kunit_try_run_case+0x170/0x3f0 [ 22.668810] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.668912] kthread+0x328/0x630 [ 22.668990] ret_from_fork+0x10/0x20 [ 22.669705] [ 22.669780] The buggy address belongs to the object at fff00000c79e4c00 [ 22.669780] which belongs to the cache kmalloc-64 of size 64 [ 22.669918] The buggy address is located 0 bytes to the right of [ 22.669918] allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30) [ 22.670792] [ 22.670866] The buggy address belongs to the physical page: [ 22.670940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4 [ 22.671047] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.671156] page_type: f5(slab) [ 22.671505] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.672018] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.672126] page dumped because: kasan: bad access detected [ 22.672208] [ 22.672261] Memory state around the buggy address: [ 22.672895] fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.673479] fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.673757] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.674039] ^ [ 22.674312] fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.674928] fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.675391] ================================================================== [ 22.797478] ================================================================== [ 22.797595] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 22.798325] Read of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266 [ 22.798500] [ 22.798566] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.798731] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.799050] Hardware name: linux,dummy-virt (DT) [ 22.799588] Call trace: [ 22.799658] show_stack+0x20/0x38 (C) [ 22.799776] dump_stack_lvl+0x8c/0xd0 [ 22.799883] print_report+0x118/0x608 [ 22.799995] kasan_report+0xdc/0x128 [ 22.800124] __asan_report_load8_noabort+0x20/0x30 [ 22.800248] kasan_atomics_helper+0x3db0/0x4858 [ 22.802037] kasan_atomics+0x198/0x2e0 [ 22.802183] kunit_try_run_case+0x170/0x3f0 [ 22.802292] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.802434] kthread+0x328/0x630 [ 22.802505] ret_from_fork+0x10/0x20 [ 22.802558] [ 22.802584] Allocated by task 266: [ 22.802640] kasan_save_stack+0x3c/0x68 [ 22.802691] kasan_save_track+0x20/0x40 [ 22.802732] kasan_save_alloc_info+0x40/0x58 [ 22.802776] __kasan_kmalloc+0xd4/0xd8 [ 22.802815] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.802858] kasan_atomics+0xb8/0x2e0 [ 22.802897] kunit_try_run_case+0x170/0x3f0 [ 22.802939] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.802984] kthread+0x328/0x630 [ 22.803019] ret_from_fork+0x10/0x20 [ 22.803058] [ 22.803082] The buggy address belongs to the object at fff00000c79e4c00 [ 22.803082] which belongs to the cache kmalloc-64 of size 64 [ 22.803143] The buggy address is located 0 bytes to the right of [ 22.803143] allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30) [ 22.803209] [ 22.803232] The buggy address belongs to the physical page: [ 22.803266] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4 [ 22.803322] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.803408] page_type: f5(slab) [ 22.803528] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.803673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.803853] page dumped because: kasan: bad access detected [ 22.803940] [ 22.804038] Memory state around the buggy address: [ 22.804125] fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.804296] fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.804610] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.804708] ^ [ 22.804897] fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.804951] fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.804995] ================================================================== [ 22.805288] ================================================================== [ 22.805338] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 22.805453] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266 [ 22.805567] [ 22.805637] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.805865] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.805939] Hardware name: linux,dummy-virt (DT) [ 22.806014] Call trace: [ 22.806073] show_stack+0x20/0x38 (C) [ 22.806233] dump_stack_lvl+0x8c/0xd0 [ 22.806401] print_report+0x118/0x608 [ 22.806576] kasan_report+0xdc/0x128 [ 22.806733] kasan_check_range+0x100/0x1a8 [ 22.806884] __kasan_check_write+0x20/0x30 [ 22.807038] kasan_atomics_helper+0x1644/0x4858 [ 22.807156] kasan_atomics+0x198/0x2e0 [ 22.807285] kunit_try_run_case+0x170/0x3f0 [ 22.807419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.807535] kthread+0x328/0x630 [ 22.807849] ret_from_fork+0x10/0x20 [ 22.808046] [ 22.808100] Allocated by task 266: [ 22.808494] kasan_save_stack+0x3c/0x68 [ 22.808837] kasan_save_track+0x20/0x40 [ 22.808923] kasan_save_alloc_info+0x40/0x58 [ 22.809014] __kasan_kmalloc+0xd4/0xd8 [ 22.809087] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.809164] kasan_atomics+0xb8/0x2e0 [ 22.809538] kunit_try_run_case+0x170/0x3f0 [ 22.809685] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.809795] kthread+0x328/0x630 [ 22.809882] ret_from_fork+0x10/0x20 [ 22.809969] [ 22.810022] The buggy address belongs to the object at fff00000c79e4c00 [ 22.810022] which belongs to the cache kmalloc-64 of size 64 [ 22.810434] The buggy address is located 0 bytes to the right of [ 22.810434] allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30) [ 22.810586] [ 22.810636] The buggy address belongs to the physical page: [ 22.810730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4 [ 22.810911] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.811070] page_type: f5(slab) [ 22.811188] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.811314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.811420] page dumped because: kasan: bad access detected [ 22.811493] [ 22.811540] Memory state around the buggy address: [ 22.811945] fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.812049] fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.812149] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.812241] ^ [ 22.812762] fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.812884] fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.812981] ================================================================== [ 22.404697] ================================================================== [ 22.404831] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 22.404972] Write of size 4 at addr fff00000c79e4c30 by task kunit_try_catch/266 [ 22.405284] [ 22.405380] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.406629] kasan_atomics+0x198/0x2e0 [ 22.407214] [ 22.407262] Allocated by task 266: [ 22.407327] kasan_save_stack+0x3c/0x68 [ 22.407472] kasan_save_track+0x20/0x40 [ 22.407633] kasan_save_alloc_info+0x40/0x58 [ 22.407734] __kasan_kmalloc+0xd4/0xd8 [ 22.407814] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.407909] kasan_atomics+0xb8/0x2e0 [ 22.407995] kunit_try_run_case+0x170/0x3f0 [ 22.408091] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.408213] kthread+0x328/0x630 [ 22.408321] ret_from_fork+0x10/0x20 [ 22.408433] [ 22.408504] The buggy address belongs to the object at fff00000c79e4c00 [ 22.408504] which belongs to the cache kmalloc-64 of size 64 [ 22.408666] The buggy address is located 0 bytes to the right of [ 22.408666] allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30) [ 22.408814] [ 22.408871] The buggy address belongs to the physical page: [ 22.408940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4 [ 22.409087] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.409242] page_type: f5(slab) [ 22.409375] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.409544] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.409682] page dumped because: kasan: bad access detected [ 22.409789] [ 22.409854] Memory state around the buggy address: [ 22.409957] fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.410057] fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.410149] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.410281] ^ [ 22.410380] fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.410487] fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.410585] ================================================================== [ 22.782567] ================================================================== [ 22.782677] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 22.782788] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266 [ 22.782903] [ 22.783422] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.783650] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.783720] Hardware name: linux,dummy-virt (DT) [ 22.783998] Call trace: [ 22.784082] show_stack+0x20/0x38 (C) [ 22.784491] dump_stack_lvl+0x8c/0xd0 [ 22.784608] print_report+0x118/0x608 [ 22.784712] kasan_report+0xdc/0x128 [ 22.785456] kasan_check_range+0x100/0x1a8 [ 22.785665] __kasan_check_write+0x20/0x30 [ 22.785766] kasan_atomics_helper+0x15b4/0x4858 [ 22.786122] kasan_atomics+0x198/0x2e0 [ 22.786620] kunit_try_run_case+0x170/0x3f0 [ 22.787039] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.787502] kthread+0x328/0x630 [ 22.787623] ret_from_fork+0x10/0x20 [ 22.787736] [ 22.787783] Allocated by task 266: [ 22.788242] kasan_save_stack+0x3c/0x68 [ 22.788571] kasan_save_track+0x20/0x40 [ 22.788676] kasan_save_alloc_info+0x40/0x58 [ 22.789219] __kasan_kmalloc+0xd4/0xd8 [ 22.789451] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.789569] kasan_atomics+0xb8/0x2e0 [ 22.790072] kunit_try_run_case+0x170/0x3f0 [ 22.790555] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.790684] kthread+0x328/0x630 [ 22.790934] ret_from_fork+0x10/0x20 [ 22.791069] [ 22.791113] The buggy address belongs to the object at fff00000c79e4c00 [ 22.791113] which belongs to the cache kmalloc-64 of size 64 [ 22.791237] The buggy address is located 0 bytes to the right of [ 22.791237] allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30) [ 22.791877] [ 22.792155] The buggy address belongs to the physical page: [ 22.792257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4 [ 22.792384] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.793068] page_type: f5(slab) [ 22.793492] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.793792] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.793895] page dumped because: kasan: bad access detected [ 22.793970] [ 22.794324] Memory state around the buggy address: [ 22.794437] fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.794984] fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.795586] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.795756] ^ [ 22.795850] fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.796312] fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.796580] ================================================================== [ 22.839724] ================================================================== [ 22.839885] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 22.840004] Read of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266 [ 22.840132] [ 22.840239] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.840445] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.840516] Hardware name: linux,dummy-virt (DT) [ 22.840589] Call trace: [ 22.840644] show_stack+0x20/0x38 (C) [ 22.840755] dump_stack_lvl+0x8c/0xd0 [ 22.840872] print_report+0x118/0x608 [ 22.841020] kasan_report+0xdc/0x128 [ 22.841125] __asan_report_load8_noabort+0x20/0x30 [ 22.841276] kasan_atomics_helper+0x3e10/0x4858 [ 22.841814] kasan_atomics+0x198/0x2e0 [ 22.841982] kunit_try_run_case+0x170/0x3f0 [ 22.842114] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.842326] kthread+0x328/0x630 [ 22.842456] ret_from_fork+0x10/0x20 [ 22.842615] [ 22.842691] Allocated by task 266: [ 22.842763] kasan_save_stack+0x3c/0x68 [ 22.842863] kasan_save_track+0x20/0x40 [ 22.842953] kasan_save_alloc_info+0x40/0x58 [ 22.843050] __kasan_kmalloc+0xd4/0xd8 [ 22.843154] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.843271] kasan_atomics+0xb8/0x2e0 [ 22.843341] kunit_try_run_case+0x170/0x3f0 [ 22.843436] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.843537] kthread+0x328/0x630 [ 22.843648] ret_from_fork+0x10/0x20 [ 22.843724] [ 22.843772] The buggy address belongs to the object at fff00000c79e4c00 [ 22.843772] which belongs to the cache kmalloc-64 of size 64 [ 22.843948] The buggy address is located 0 bytes to the right of [ 22.843948] allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30) [ 22.844107] [ 22.844164] The buggy address belongs to the physical page: [ 22.844240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4 [ 22.844373] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.844493] page_type: f5(slab) [ 22.844580] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.844734] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.844848] page dumped because: kasan: bad access detected [ 22.844927] [ 22.844991] Memory state around the buggy address: [ 22.845242] fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.845455] fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.845673] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.845773] ^ [ 22.845860] fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.845957] fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.846473] ================================================================== [ 22.676696] ================================================================== [ 22.676820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 22.676934] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266 [ 22.677051] [ 22.677661] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.678132] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.678413] Hardware name: linux,dummy-virt (DT) [ 22.678858] Call trace: [ 22.679040] show_stack+0x20/0x38 (C) [ 22.679186] dump_stack_lvl+0x8c/0xd0 [ 22.679283] print_report+0x118/0x608 [ 22.679611] kasan_report+0xdc/0x128 [ 22.680052] kasan_check_range+0x100/0x1a8 [ 22.680174] __kasan_check_write+0x20/0x30 [ 22.680706] kasan_atomics_helper+0x126c/0x4858 [ 22.680840] kasan_atomics+0x198/0x2e0 [ 22.680945] kunit_try_run_case+0x170/0x3f0 [ 22.681605] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.682031] kthread+0x328/0x630 [ 22.682158] ret_from_fork+0x10/0x20 [ 22.682316] [ 22.682645] Allocated by task 266: [ 22.682733] kasan_save_stack+0x3c/0x68 [ 22.682845] kasan_save_track+0x20/0x40 [ 22.683494] kasan_save_alloc_info+0x40/0x58 [ 22.683662] __kasan_kmalloc+0xd4/0xd8 [ 22.683756] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.683936] kasan_atomics+0xb8/0x2e0 [ 22.684024] kunit_try_run_case+0x170/0x3f0 [ 22.684526] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.684648] kthread+0x328/0x630 [ 22.685065] ret_from_fork+0x10/0x20 [ 22.685719] [ 22.685788] The buggy address belongs to the object at fff00000c79e4c00 [ 22.685788] which belongs to the cache kmalloc-64 of size 64 [ 22.686049] The buggy address is located 0 bytes to the right of [ 22.686049] allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30) [ 22.686476] [ 22.686829] The buggy address belongs to the physical page: [ 22.687191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4 [ 22.687573] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.687707] page_type: f5(slab) [ 22.688470] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.688610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.689239] page dumped because: kasan: bad access detected [ 22.689529] [ 22.689852] Memory state around the buggy address: [ 22.689954] fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.690270] fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.690395] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.690493] ^ [ 22.691056] fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.691544] fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.691674] ================================================================== [ 22.813890] ================================================================== [ 22.814302] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 22.815118] Read of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266 [ 22.815258] [ 22.815517] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.815838] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.816060] Hardware name: linux,dummy-virt (DT) [ 22.816285] Call trace: [ 22.816380] show_stack+0x20/0x38 (C) [ 22.816928] dump_stack_lvl+0x8c/0xd0 [ 22.817049] print_report+0x118/0x608 [ 22.817160] kasan_report+0xdc/0x128 [ 22.817272] __asan_report_load8_noabort+0x20/0x30 [ 22.817406] kasan_atomics_helper+0x3df4/0x4858 [ 22.817531] kasan_atomics+0x198/0x2e0 [ 22.817641] kunit_try_run_case+0x170/0x3f0 [ 22.817758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.818682] kthread+0x328/0x630 [ 22.820126] ret_from_fork+0x10/0x20 [ 22.821025] [ 22.821114] Allocated by task 266: [ 22.821207] kasan_save_stack+0x3c/0x68 [ 22.821578] kasan_save_track+0x20/0x40 [ 22.821774] kasan_save_alloc_info+0x40/0x58 [ 22.822064] __kasan_kmalloc+0xd4/0xd8 [ 22.822628] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.822799] kasan_atomics+0xb8/0x2e0 [ 22.822881] kunit_try_run_case+0x170/0x3f0 [ 22.823312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.823577] kthread+0x328/0x630 [ 22.823769] ret_from_fork+0x10/0x20 [ 22.823946] [ 22.824139] The buggy address belongs to the object at fff00000c79e4c00 [ 22.824139] which belongs to the cache kmalloc-64 of size 64 [ 22.824643] The buggy address is located 0 bytes to the right of [ 22.824643] allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30) [ 22.824815] [ 22.824885] The buggy address belongs to the physical page: [ 22.824955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4 [ 22.825076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.825189] page_type: f5(slab) [ 22.825277] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.825411] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.825508] page dumped because: kasan: bad access detected [ 22.825579] [ 22.825625] Memory state around the buggy address: [ 22.825701] fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.825807] fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.825911] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.826052] ^ [ 22.826134] fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.826238] fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.826331] ================================================================== [ 22.495779] ================================================================== [ 22.495883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 22.496279] Read of size 4 at addr fff00000c79e4c30 by task kunit_try_catch/266 [ 22.496480] [ 22.496583] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.496839] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.496905] Hardware name: linux,dummy-virt (DT) [ 22.496973] Call trace: [ 22.497020] show_stack+0x20/0x38 (C) [ 22.497271] dump_stack_lvl+0x8c/0xd0 [ 22.497489] print_report+0x118/0x608 [ 22.497692] kasan_report+0xdc/0x128 [ 22.497868] __asan_report_load4_noabort+0x20/0x30 [ 22.498016] kasan_atomics_helper+0x3e04/0x4858 [ 22.498134] kasan_atomics+0x198/0x2e0 [ 22.498277] kunit_try_run_case+0x170/0x3f0 [ 22.498687] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.498992] kthread+0x328/0x630 [ 22.499094] ret_from_fork+0x10/0x20 [ 22.499454] [ 22.499531] Allocated by task 266: [ 22.499612] kasan_save_stack+0x3c/0x68 [ 22.499722] kasan_save_track+0x20/0x40 [ 22.499839] kasan_save_alloc_info+0x40/0x58 [ 22.499962] __kasan_kmalloc+0xd4/0xd8 [ 22.500051] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.500126] kasan_atomics+0xb8/0x2e0 [ 22.500580] kunit_try_run_case+0x170/0x3f0 [ 22.500704] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.500811] kthread+0x328/0x630 [ 22.500916] ret_from_fork+0x10/0x20 [ 22.500998] [ 22.501040] The buggy address belongs to the object at fff00000c79e4c00 [ 22.501040] which belongs to the cache kmalloc-64 of size 64 [ 22.501182] The buggy address is located 0 bytes to the right of [ 22.501182] allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30) [ 22.501337] [ 22.501410] The buggy address belongs to the physical page: [ 22.501481] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4 [ 22.501722] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.501996] page_type: f5(slab) [ 22.502081] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.502266] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.502370] page dumped because: kasan: bad access detected [ 22.502692] [ 22.502781] Memory state around the buggy address: [ 22.502994] fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.503334] fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.503665] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.503752] ^ [ 22.503832] fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.505011] fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.505292] ================================================================== [ 22.411866] ================================================================== [ 22.411982] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 22.412091] Write of size 4 at addr fff00000c79e4c30 by task kunit_try_catch/266 [ 22.412210] [ 22.412278] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.412708] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.412839] Hardware name: linux,dummy-virt (DT) [ 22.412916] Call trace: [ 22.412973] show_stack+0x20/0x38 (C) [ 22.413107] dump_stack_lvl+0x8c/0xd0 [ 22.413212] print_report+0x118/0x608 [ 22.413350] kasan_report+0xdc/0x128 [ 22.413528] kasan_check_range+0x100/0x1a8 [ 22.413685] __kasan_check_write+0x20/0x30 [ 22.413829] kasan_atomics_helper+0xa6c/0x4858 [ 22.413985] kasan_atomics+0x198/0x2e0 [ 22.414131] kunit_try_run_case+0x170/0x3f0 [ 22.414270] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.414400] kthread+0x328/0x630 [ 22.414506] ret_from_fork+0x10/0x20 [ 22.414624] [ 22.414672] Allocated by task 266: [ 22.414738] kasan_save_stack+0x3c/0x68 [ 22.414841] kasan_save_track+0x20/0x40 [ 22.414966] kasan_save_alloc_info+0x40/0x58 [ 22.415056] __kasan_kmalloc+0xd4/0xd8 [ 22.415144] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.415249] kasan_atomics+0xb8/0x2e0 [ 22.415344] kunit_try_run_case+0x170/0x3f0 [ 22.415462] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.415580] kthread+0x328/0x630 [ 22.415650] ret_from_fork+0x10/0x20 [ 22.415727] [ 22.415805] The buggy address belongs to the object at fff00000c79e4c00 [ 22.415805] which belongs to the cache kmalloc-64 of size 64 [ 22.415981] The buggy address is located 0 bytes to the right of [ 22.415981] allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30) [ 22.416155] [ 22.416203] The buggy address belongs to the physical page: [ 22.416278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4 [ 22.416411] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.416527] page_type: f5(slab) [ 22.416692] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.416835] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.416919] page dumped because: kasan: bad access detected [ 22.416979] [ 22.417455] Memory state around the buggy address: [ 22.417552] fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.417605] fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.417651] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.417691] ^ [ 22.417729] fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.417772] fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.417812] ==================================================================
[ 16.892393] ================================================================== [ 16.892755] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 16.893098] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 16.893393] [ 16.893499] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.893555] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.893572] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.893601] Call Trace: [ 16.893624] <TASK> [ 16.893710] dump_stack_lvl+0x73/0xb0 [ 16.893754] print_report+0xd1/0x650 [ 16.893783] ? __virt_addr_valid+0x1db/0x2d0 [ 16.893854] ? kasan_atomics_helper+0xac7/0x5450 [ 16.893884] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.893913] ? kasan_atomics_helper+0xac7/0x5450 [ 16.893940] kasan_report+0x141/0x180 [ 16.893969] ? kasan_atomics_helper+0xac7/0x5450 [ 16.894001] kasan_check_range+0x10c/0x1c0 [ 16.894031] __kasan_check_write+0x18/0x20 [ 16.894056] kasan_atomics_helper+0xac7/0x5450 [ 16.894084] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.894112] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.894143] ? kasan_atomics+0x152/0x310 [ 16.894177] kasan_atomics+0x1dc/0x310 [ 16.894205] ? __pfx_kasan_atomics+0x10/0x10 [ 16.894236] ? __pfx_read_tsc+0x10/0x10 [ 16.894263] ? ktime_get_ts64+0x86/0x230 [ 16.894292] kunit_try_run_case+0x1a5/0x480 [ 16.894324] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.894351] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.894382] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.894411] ? __kthread_parkme+0x82/0x180 [ 16.894442] ? preempt_count_sub+0x50/0x80 [ 16.894471] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.894500] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.894529] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.894558] kthread+0x337/0x6f0 [ 16.894582] ? trace_preempt_on+0x20/0xc0 [ 16.894611] ? __pfx_kthread+0x10/0x10 [ 16.894637] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.894677] ? calculate_sigpending+0x7b/0xa0 [ 16.894707] ? __pfx_kthread+0x10/0x10 [ 16.894733] ret_from_fork+0x116/0x1d0 [ 16.894757] ? __pfx_kthread+0x10/0x10 [ 16.894782] ret_from_fork_asm+0x1a/0x30 [ 16.894868] </TASK> [ 16.894883] [ 16.904927] Allocated by task 283: [ 16.905121] kasan_save_stack+0x45/0x70 [ 16.905303] kasan_save_track+0x18/0x40 [ 16.905466] kasan_save_alloc_info+0x3b/0x50 [ 16.905713] __kasan_kmalloc+0xb7/0xc0 [ 16.905938] __kmalloc_cache_noprof+0x189/0x420 [ 16.906207] kasan_atomics+0x95/0x310 [ 16.906441] kunit_try_run_case+0x1a5/0x480 [ 16.906713] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.906920] kthread+0x337/0x6f0 [ 16.907065] ret_from_fork+0x116/0x1d0 [ 16.907270] ret_from_fork_asm+0x1a/0x30 [ 16.907509] [ 16.907624] The buggy address belongs to the object at ffff888103349180 [ 16.907624] which belongs to the cache kmalloc-64 of size 64 [ 16.908276] The buggy address is located 0 bytes to the right of [ 16.908276] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 16.910687] [ 16.911109] The buggy address belongs to the physical page: [ 16.911364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 16.911683] flags: 0x200000000000000(node=0|zone=2) [ 16.912009] page_type: f5(slab) [ 16.912578] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.913535] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.914769] page dumped because: kasan: bad access detected [ 16.915560] [ 16.915773] Memory state around the buggy address: [ 16.916382] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.916743] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.917028] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.917915] ^ [ 16.918465] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.919321] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.920078] ================================================================== [ 16.519549] ================================================================== [ 16.519863] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 16.520788] Read of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 16.521488] [ 16.521887] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.521953] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.521971] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.522000] Call Trace: [ 16.522024] <TASK> [ 16.522048] dump_stack_lvl+0x73/0xb0 [ 16.522086] print_report+0xd1/0x650 [ 16.522117] ? __virt_addr_valid+0x1db/0x2d0 [ 16.522146] ? kasan_atomics_helper+0x4b54/0x5450 [ 16.522173] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.522202] ? kasan_atomics_helper+0x4b54/0x5450 [ 16.522230] kasan_report+0x141/0x180 [ 16.522259] ? kasan_atomics_helper+0x4b54/0x5450 [ 16.522291] __asan_report_load4_noabort+0x18/0x20 [ 16.522322] kasan_atomics_helper+0x4b54/0x5450 [ 16.522349] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.522376] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.522408] ? kasan_atomics+0x152/0x310 [ 16.522449] kasan_atomics+0x1dc/0x310 [ 16.522476] ? __pfx_kasan_atomics+0x10/0x10 [ 16.522507] ? __pfx_read_tsc+0x10/0x10 [ 16.522533] ? ktime_get_ts64+0x86/0x230 [ 16.522564] kunit_try_run_case+0x1a5/0x480 [ 16.522595] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.522623] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.522666] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.522695] ? __kthread_parkme+0x82/0x180 [ 16.522721] ? preempt_count_sub+0x50/0x80 [ 16.522751] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.522781] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.522809] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.522839] kthread+0x337/0x6f0 [ 16.522863] ? trace_preempt_on+0x20/0xc0 [ 16.522893] ? __pfx_kthread+0x10/0x10 [ 16.522920] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.522945] ? calculate_sigpending+0x7b/0xa0 [ 16.522975] ? __pfx_kthread+0x10/0x10 [ 16.523003] ret_from_fork+0x116/0x1d0 [ 16.523026] ? __pfx_kthread+0x10/0x10 [ 16.523052] ret_from_fork_asm+0x1a/0x30 [ 16.523091] </TASK> [ 16.523106] [ 16.536469] Allocated by task 283: [ 16.536719] kasan_save_stack+0x45/0x70 [ 16.537494] kasan_save_track+0x18/0x40 [ 16.537939] kasan_save_alloc_info+0x3b/0x50 [ 16.538297] __kasan_kmalloc+0xb7/0xc0 [ 16.538630] __kmalloc_cache_noprof+0x189/0x420 [ 16.538900] kasan_atomics+0x95/0x310 [ 16.539270] kunit_try_run_case+0x1a5/0x480 [ 16.539509] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.539971] kthread+0x337/0x6f0 [ 16.540144] ret_from_fork+0x116/0x1d0 [ 16.540545] ret_from_fork_asm+0x1a/0x30 [ 16.540922] [ 16.541158] The buggy address belongs to the object at ffff888103349180 [ 16.541158] which belongs to the cache kmalloc-64 of size 64 [ 16.541871] The buggy address is located 0 bytes to the right of [ 16.541871] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 16.542664] [ 16.543537] The buggy address belongs to the physical page: [ 16.544412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 16.544737] flags: 0x200000000000000(node=0|zone=2) [ 16.544942] page_type: f5(slab) [ 16.545095] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.545367] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.545637] page dumped because: kasan: bad access detected [ 16.546981] [ 16.547083] Memory state around the buggy address: [ 16.547293] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.547567] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.548420] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.549616] ^ [ 16.551005] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.552399] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.553826] ================================================================== [ 16.869561] ================================================================== [ 16.870269] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 16.870634] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 16.870979] [ 16.871185] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.871248] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.871266] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.871296] Call Trace: [ 16.871322] <TASK> [ 16.871349] dump_stack_lvl+0x73/0xb0 [ 16.871386] print_report+0xd1/0x650 [ 16.871414] ? __virt_addr_valid+0x1db/0x2d0 [ 16.871445] ? kasan_atomics_helper+0xa2b/0x5450 [ 16.871471] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.871500] ? kasan_atomics_helper+0xa2b/0x5450 [ 16.871527] kasan_report+0x141/0x180 [ 16.871556] ? kasan_atomics_helper+0xa2b/0x5450 [ 16.871588] kasan_check_range+0x10c/0x1c0 [ 16.871619] __kasan_check_write+0x18/0x20 [ 16.871644] kasan_atomics_helper+0xa2b/0x5450 [ 16.871688] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.871716] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.871748] ? kasan_atomics+0x152/0x310 [ 16.871794] kasan_atomics+0x1dc/0x310 [ 16.871824] ? __pfx_kasan_atomics+0x10/0x10 [ 16.871855] ? __pfx_read_tsc+0x10/0x10 [ 16.871883] ? ktime_get_ts64+0x86/0x230 [ 16.871913] kunit_try_run_case+0x1a5/0x480 [ 16.871945] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.871974] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.872003] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.872033] ? __kthread_parkme+0x82/0x180 [ 16.872059] ? preempt_count_sub+0x50/0x80 [ 16.872089] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.872119] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.872148] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.872177] kthread+0x337/0x6f0 [ 16.872203] ? trace_preempt_on+0x20/0xc0 [ 16.872233] ? __pfx_kthread+0x10/0x10 [ 16.872259] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.872286] ? calculate_sigpending+0x7b/0xa0 [ 16.872315] ? __pfx_kthread+0x10/0x10 [ 16.872344] ret_from_fork+0x116/0x1d0 [ 16.872368] ? __pfx_kthread+0x10/0x10 [ 16.872393] ret_from_fork_asm+0x1a/0x30 [ 16.872432] </TASK> [ 16.872448] [ 16.881702] Allocated by task 283: [ 16.881970] kasan_save_stack+0x45/0x70 [ 16.882212] kasan_save_track+0x18/0x40 [ 16.882383] kasan_save_alloc_info+0x3b/0x50 [ 16.882568] __kasan_kmalloc+0xb7/0xc0 [ 16.882769] __kmalloc_cache_noprof+0x189/0x420 [ 16.883253] kasan_atomics+0x95/0x310 [ 16.883494] kunit_try_run_case+0x1a5/0x480 [ 16.883744] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.884035] kthread+0x337/0x6f0 [ 16.884304] ret_from_fork+0x116/0x1d0 [ 16.884521] ret_from_fork_asm+0x1a/0x30 [ 16.884766] [ 16.884885] The buggy address belongs to the object at ffff888103349180 [ 16.884885] which belongs to the cache kmalloc-64 of size 64 [ 16.885291] The buggy address is located 0 bytes to the right of [ 16.885291] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 16.886020] [ 16.886141] The buggy address belongs to the physical page: [ 16.886447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 16.887063] flags: 0x200000000000000(node=0|zone=2) [ 16.887271] page_type: f5(slab) [ 16.887418] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.887710] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.888630] page dumped because: kasan: bad access detected [ 16.889238] [ 16.889373] Memory state around the buggy address: [ 16.889634] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.890241] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.890594] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.890877] ^ [ 16.891058] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.891378] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.891777] ================================================================== [ 17.316965] ================================================================== [ 17.317598] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 17.318098] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 17.318440] [ 17.318585] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.318690] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.318710] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.318743] Call Trace: [ 17.318768] <TASK> [ 17.318794] dump_stack_lvl+0x73/0xb0 [ 17.318832] print_report+0xd1/0x650 [ 17.318862] ? __virt_addr_valid+0x1db/0x2d0 [ 17.318893] ? kasan_atomics_helper+0x12e6/0x5450 [ 17.318920] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.318950] ? kasan_atomics_helper+0x12e6/0x5450 [ 17.318978] kasan_report+0x141/0x180 [ 17.319008] ? kasan_atomics_helper+0x12e6/0x5450 [ 17.319041] kasan_check_range+0x10c/0x1c0 [ 17.319071] __kasan_check_write+0x18/0x20 [ 17.319095] kasan_atomics_helper+0x12e6/0x5450 [ 17.319124] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.319152] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.319184] ? kasan_atomics+0x152/0x310 [ 17.319219] kasan_atomics+0x1dc/0x310 [ 17.319248] ? __pfx_kasan_atomics+0x10/0x10 [ 17.319279] ? __pfx_read_tsc+0x10/0x10 [ 17.319308] ? ktime_get_ts64+0x86/0x230 [ 17.319339] kunit_try_run_case+0x1a5/0x480 [ 17.319370] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.319400] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.319431] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.319459] ? __kthread_parkme+0x82/0x180 [ 17.319485] ? preempt_count_sub+0x50/0x80 [ 17.319515] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.319544] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.319573] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.319602] kthread+0x337/0x6f0 [ 17.319627] ? trace_preempt_on+0x20/0xc0 [ 17.319668] ? __pfx_kthread+0x10/0x10 [ 17.319694] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.319720] ? calculate_sigpending+0x7b/0xa0 [ 17.319750] ? __pfx_kthread+0x10/0x10 [ 17.319793] ret_from_fork+0x116/0x1d0 [ 17.319816] ? __pfx_kthread+0x10/0x10 [ 17.319843] ret_from_fork_asm+0x1a/0x30 [ 17.319881] </TASK> [ 17.319896] [ 17.329103] Allocated by task 283: [ 17.329300] kasan_save_stack+0x45/0x70 [ 17.329476] kasan_save_track+0x18/0x40 [ 17.329684] kasan_save_alloc_info+0x3b/0x50 [ 17.329939] __kasan_kmalloc+0xb7/0xc0 [ 17.330169] __kmalloc_cache_noprof+0x189/0x420 [ 17.330527] kasan_atomics+0x95/0x310 [ 17.330853] kunit_try_run_case+0x1a5/0x480 [ 17.331046] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.331257] kthread+0x337/0x6f0 [ 17.331469] ret_from_fork+0x116/0x1d0 [ 17.331713] ret_from_fork_asm+0x1a/0x30 [ 17.331977] [ 17.332072] The buggy address belongs to the object at ffff888103349180 [ 17.332072] which belongs to the cache kmalloc-64 of size 64 [ 17.332604] The buggy address is located 0 bytes to the right of [ 17.332604] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 17.333056] [ 17.333148] The buggy address belongs to the physical page: [ 17.333434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 17.333868] flags: 0x200000000000000(node=0|zone=2) [ 17.334167] page_type: f5(slab) [ 17.334372] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.334802] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.335117] page dumped because: kasan: bad access detected [ 17.335328] [ 17.335416] Memory state around the buggy address: [ 17.335616] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.336315] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.336725] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.337138] ^ [ 17.337394] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.337763] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.338099] ================================================================== [ 17.338880] ================================================================== [ 17.339258] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 17.339570] Read of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 17.340153] [ 17.340302] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.340360] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.340377] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.340406] Call Trace: [ 17.340429] <TASK> [ 17.340452] dump_stack_lvl+0x73/0xb0 [ 17.340489] print_report+0xd1/0x650 [ 17.340517] ? __virt_addr_valid+0x1db/0x2d0 [ 17.340548] ? kasan_atomics_helper+0x49ce/0x5450 [ 17.340575] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.340604] ? kasan_atomics_helper+0x49ce/0x5450 [ 17.340633] kasan_report+0x141/0x180 [ 17.340675] ? kasan_atomics_helper+0x49ce/0x5450 [ 17.340708] __asan_report_load4_noabort+0x18/0x20 [ 17.340739] kasan_atomics_helper+0x49ce/0x5450 [ 17.340769] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.342719] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.342764] ? kasan_atomics+0x152/0x310 [ 17.342802] kasan_atomics+0x1dc/0x310 [ 17.342837] ? __pfx_kasan_atomics+0x10/0x10 [ 17.342869] ? __pfx_read_tsc+0x10/0x10 [ 17.342897] ? ktime_get_ts64+0x86/0x230 [ 17.342928] kunit_try_run_case+0x1a5/0x480 [ 17.342959] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.342988] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.343018] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.343048] ? __kthread_parkme+0x82/0x180 [ 17.343074] ? preempt_count_sub+0x50/0x80 [ 17.343105] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.343136] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.343166] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.343195] kthread+0x337/0x6f0 [ 17.343220] ? trace_preempt_on+0x20/0xc0 [ 17.343250] ? __pfx_kthread+0x10/0x10 [ 17.343276] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.343303] ? calculate_sigpending+0x7b/0xa0 [ 17.343332] ? __pfx_kthread+0x10/0x10 [ 17.343360] ret_from_fork+0x116/0x1d0 [ 17.343383] ? __pfx_kthread+0x10/0x10 [ 17.343410] ret_from_fork_asm+0x1a/0x30 [ 17.343449] </TASK> [ 17.343464] [ 17.353729] Allocated by task 283: [ 17.354011] kasan_save_stack+0x45/0x70 [ 17.354371] kasan_save_track+0x18/0x40 [ 17.354589] kasan_save_alloc_info+0x3b/0x50 [ 17.354845] __kasan_kmalloc+0xb7/0xc0 [ 17.356138] __kmalloc_cache_noprof+0x189/0x420 [ 17.356361] kasan_atomics+0x95/0x310 [ 17.356597] kunit_try_run_case+0x1a5/0x480 [ 17.356869] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.357141] kthread+0x337/0x6f0 [ 17.357293] ret_from_fork+0x116/0x1d0 [ 17.357564] ret_from_fork_asm+0x1a/0x30 [ 17.357915] [ 17.358016] The buggy address belongs to the object at ffff888103349180 [ 17.358016] which belongs to the cache kmalloc-64 of size 64 [ 17.358457] The buggy address is located 0 bytes to the right of [ 17.358457] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 17.359477] [ 17.359625] The buggy address belongs to the physical page: [ 17.360081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 17.360458] flags: 0x200000000000000(node=0|zone=2) [ 17.360769] page_type: f5(slab) [ 17.360960] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.361274] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.361552] page dumped because: kasan: bad access detected [ 17.361852] [ 17.361971] Memory state around the buggy address: [ 17.362248] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.362739] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.363007] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.363444] ^ [ 17.363743] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.364158] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.364550] ================================================================== [ 17.552054] ================================================================== [ 17.552837] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 17.553578] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 17.553892] [ 17.554003] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.554060] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.554078] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.554107] Call Trace: [ 17.554130] <TASK> [ 17.554161] dump_stack_lvl+0x73/0xb0 [ 17.554210] print_report+0xd1/0x650 [ 17.554238] ? __virt_addr_valid+0x1db/0x2d0 [ 17.554281] ? kasan_atomics_helper+0x16e7/0x5450 [ 17.554309] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.554337] ? kasan_atomics_helper+0x16e7/0x5450 [ 17.554363] kasan_report+0x141/0x180 [ 17.554391] ? kasan_atomics_helper+0x16e7/0x5450 [ 17.554429] kasan_check_range+0x10c/0x1c0 [ 17.554459] __kasan_check_write+0x18/0x20 [ 17.554483] kasan_atomics_helper+0x16e7/0x5450 [ 17.554511] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.554539] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.554569] ? kasan_atomics+0x152/0x310 [ 17.554603] kasan_atomics+0x1dc/0x310 [ 17.554632] ? __pfx_kasan_atomics+0x10/0x10 [ 17.554674] ? __pfx_read_tsc+0x10/0x10 [ 17.554702] ? ktime_get_ts64+0x86/0x230 [ 17.554731] kunit_try_run_case+0x1a5/0x480 [ 17.554761] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.554802] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.554832] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.554860] ? __kthread_parkme+0x82/0x180 [ 17.554886] ? preempt_count_sub+0x50/0x80 [ 17.554915] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.554944] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.554984] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.555012] kthread+0x337/0x6f0 [ 17.555036] ? trace_preempt_on+0x20/0xc0 [ 17.555080] ? __pfx_kthread+0x10/0x10 [ 17.555105] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.555132] ? calculate_sigpending+0x7b/0xa0 [ 17.555161] ? __pfx_kthread+0x10/0x10 [ 17.555187] ret_from_fork+0x116/0x1d0 [ 17.555211] ? __pfx_kthread+0x10/0x10 [ 17.555237] ret_from_fork_asm+0x1a/0x30 [ 17.555275] </TASK> [ 17.555300] [ 17.564557] Allocated by task 283: [ 17.564796] kasan_save_stack+0x45/0x70 [ 17.565041] kasan_save_track+0x18/0x40 [ 17.565280] kasan_save_alloc_info+0x3b/0x50 [ 17.565520] __kasan_kmalloc+0xb7/0xc0 [ 17.565692] __kmalloc_cache_noprof+0x189/0x420 [ 17.566203] kasan_atomics+0x95/0x310 [ 17.566435] kunit_try_run_case+0x1a5/0x480 [ 17.566614] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.566836] kthread+0x337/0x6f0 [ 17.566984] ret_from_fork+0x116/0x1d0 [ 17.567144] ret_from_fork_asm+0x1a/0x30 [ 17.567315] [ 17.567404] The buggy address belongs to the object at ffff888103349180 [ 17.567404] which belongs to the cache kmalloc-64 of size 64 [ 17.567996] The buggy address is located 0 bytes to the right of [ 17.567996] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 17.568698] [ 17.568821] The buggy address belongs to the physical page: [ 17.569135] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 17.569502] flags: 0x200000000000000(node=0|zone=2) [ 17.569718] page_type: f5(slab) [ 17.569869] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.570151] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.570511] page dumped because: kasan: bad access detected [ 17.570913] [ 17.571048] Memory state around the buggy address: [ 17.571373] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.571820] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.572271] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.572693] ^ [ 17.573218] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.573615] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.573983] ================================================================== [ 17.773045] ================================================================== [ 17.773342] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 17.773634] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 17.776383] [ 17.776942] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.777009] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.777028] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.777058] Call Trace: [ 17.777084] <TASK> [ 17.777110] dump_stack_lvl+0x73/0xb0 [ 17.777150] print_report+0xd1/0x650 [ 17.777178] ? __virt_addr_valid+0x1db/0x2d0 [ 17.777209] ? kasan_atomics_helper+0x1c18/0x5450 [ 17.777236] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.777265] ? kasan_atomics_helper+0x1c18/0x5450 [ 17.777293] kasan_report+0x141/0x180 [ 17.777323] ? kasan_atomics_helper+0x1c18/0x5450 [ 17.777357] kasan_check_range+0x10c/0x1c0 [ 17.777387] __kasan_check_write+0x18/0x20 [ 17.777412] kasan_atomics_helper+0x1c18/0x5450 [ 17.777441] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.777469] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.777501] ? kasan_atomics+0x152/0x310 [ 17.777535] kasan_atomics+0x1dc/0x310 [ 17.777563] ? __pfx_kasan_atomics+0x10/0x10 [ 17.777593] ? __pfx_read_tsc+0x10/0x10 [ 17.777620] ? ktime_get_ts64+0x86/0x230 [ 17.777666] kunit_try_run_case+0x1a5/0x480 [ 17.777698] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.777725] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.778044] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.778137] ? __kthread_parkme+0x82/0x180 [ 17.778165] ? preempt_count_sub+0x50/0x80 [ 17.778195] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.778225] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.778254] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.778282] kthread+0x337/0x6f0 [ 17.778307] ? trace_preempt_on+0x20/0xc0 [ 17.778338] ? __pfx_kthread+0x10/0x10 [ 17.778364] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.778391] ? calculate_sigpending+0x7b/0xa0 [ 17.778425] ? __pfx_kthread+0x10/0x10 [ 17.778452] ret_from_fork+0x116/0x1d0 [ 17.778476] ? __pfx_kthread+0x10/0x10 [ 17.778502] ret_from_fork_asm+0x1a/0x30 [ 17.778540] </TASK> [ 17.778555] [ 17.802432] Allocated by task 283: [ 17.803367] kasan_save_stack+0x45/0x70 [ 17.804311] kasan_save_track+0x18/0x40 [ 17.805149] kasan_save_alloc_info+0x3b/0x50 [ 17.805918] __kasan_kmalloc+0xb7/0xc0 [ 17.806096] __kmalloc_cache_noprof+0x189/0x420 [ 17.806289] kasan_atomics+0x95/0x310 [ 17.806467] kunit_try_run_case+0x1a5/0x480 [ 17.807432] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.808397] kthread+0x337/0x6f0 [ 17.808949] ret_from_fork+0x116/0x1d0 [ 17.809632] ret_from_fork_asm+0x1a/0x30 [ 17.810318] [ 17.810736] The buggy address belongs to the object at ffff888103349180 [ 17.810736] which belongs to the cache kmalloc-64 of size 64 [ 17.811608] The buggy address is located 0 bytes to the right of [ 17.811608] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 17.813444] [ 17.813938] The buggy address belongs to the physical page: [ 17.814694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 17.815505] flags: 0x200000000000000(node=0|zone=2) [ 17.816380] page_type: f5(slab) [ 17.817023] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.817537] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.818038] page dumped because: kasan: bad access detected [ 17.818634] [ 17.819041] Memory state around the buggy address: [ 17.819596] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.819901] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.820634] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.821472] ^ [ 17.822009] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.822288] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.822556] ================================================================== [ 17.931434] ================================================================== [ 17.931909] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 17.932261] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 17.933006] [ 17.933329] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.933393] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.933411] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.933440] Call Trace: [ 17.933466] <TASK> [ 17.933490] dump_stack_lvl+0x73/0xb0 [ 17.933529] print_report+0xd1/0x650 [ 17.933557] ? __virt_addr_valid+0x1db/0x2d0 [ 17.933588] ? kasan_atomics_helper+0x1eaa/0x5450 [ 17.933615] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.933659] ? kasan_atomics_helper+0x1eaa/0x5450 [ 17.933688] kasan_report+0x141/0x180 [ 17.933716] ? kasan_atomics_helper+0x1eaa/0x5450 [ 17.933749] kasan_check_range+0x10c/0x1c0 [ 17.934199] __kasan_check_write+0x18/0x20 [ 17.934235] kasan_atomics_helper+0x1eaa/0x5450 [ 17.934265] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.934295] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.934340] ? kasan_atomics+0x152/0x310 [ 17.934373] kasan_atomics+0x1dc/0x310 [ 17.934402] ? __pfx_kasan_atomics+0x10/0x10 [ 17.934436] ? __pfx_read_tsc+0x10/0x10 [ 17.934465] ? ktime_get_ts64+0x86/0x230 [ 17.934495] kunit_try_run_case+0x1a5/0x480 [ 17.934528] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.934556] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.934586] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.934615] ? __kthread_parkme+0x82/0x180 [ 17.934641] ? preempt_count_sub+0x50/0x80 [ 17.934683] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.934713] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.934742] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.935019] kthread+0x337/0x6f0 [ 17.935058] ? trace_preempt_on+0x20/0xc0 [ 17.935090] ? __pfx_kthread+0x10/0x10 [ 17.935117] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.935145] ? calculate_sigpending+0x7b/0xa0 [ 17.935176] ? __pfx_kthread+0x10/0x10 [ 17.935203] ret_from_fork+0x116/0x1d0 [ 17.935228] ? __pfx_kthread+0x10/0x10 [ 17.935254] ret_from_fork_asm+0x1a/0x30 [ 17.935293] </TASK> [ 17.935309] [ 17.947740] Allocated by task 283: [ 17.948271] kasan_save_stack+0x45/0x70 [ 17.948526] kasan_save_track+0x18/0x40 [ 17.948740] kasan_save_alloc_info+0x3b/0x50 [ 17.949243] __kasan_kmalloc+0xb7/0xc0 [ 17.949467] __kmalloc_cache_noprof+0x189/0x420 [ 17.949701] kasan_atomics+0x95/0x310 [ 17.949935] kunit_try_run_case+0x1a5/0x480 [ 17.950411] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.950814] kthread+0x337/0x6f0 [ 17.951024] ret_from_fork+0x116/0x1d0 [ 17.951258] ret_from_fork_asm+0x1a/0x30 [ 17.951491] [ 17.951611] The buggy address belongs to the object at ffff888103349180 [ 17.951611] which belongs to the cache kmalloc-64 of size 64 [ 17.953056] The buggy address is located 0 bytes to the right of [ 17.953056] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 17.953882] [ 17.954229] The buggy address belongs to the physical page: [ 17.954946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 17.955558] flags: 0x200000000000000(node=0|zone=2) [ 17.955800] page_type: f5(slab) [ 17.956177] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.957024] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.957814] page dumped because: kasan: bad access detected [ 17.958271] [ 17.958359] Memory state around the buggy address: [ 17.958556] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.958939] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.959665] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.960569] ^ [ 17.961207] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.962015] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.962751] ================================================================== [ 17.851695] ================================================================== [ 17.852037] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 17.852793] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 17.853511] [ 17.853731] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.853789] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.853806] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.853855] Call Trace: [ 17.853877] <TASK> [ 17.853898] dump_stack_lvl+0x73/0xb0 [ 17.853934] print_report+0xd1/0x650 [ 17.853961] ? __virt_addr_valid+0x1db/0x2d0 [ 17.853990] ? kasan_atomics_helper+0x1ce1/0x5450 [ 17.854016] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.854043] ? kasan_atomics_helper+0x1ce1/0x5450 [ 17.854070] kasan_report+0x141/0x180 [ 17.854097] ? kasan_atomics_helper+0x1ce1/0x5450 [ 17.854128] kasan_check_range+0x10c/0x1c0 [ 17.854158] __kasan_check_write+0x18/0x20 [ 17.854182] kasan_atomics_helper+0x1ce1/0x5450 [ 17.854210] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.854237] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.854267] ? kasan_atomics+0x152/0x310 [ 17.854300] kasan_atomics+0x1dc/0x310 [ 17.854328] ? __pfx_kasan_atomics+0x10/0x10 [ 17.854359] ? __pfx_read_tsc+0x10/0x10 [ 17.854386] ? ktime_get_ts64+0x86/0x230 [ 17.854416] kunit_try_run_case+0x1a5/0x480 [ 17.854456] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.854486] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.854517] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.854546] ? __kthread_parkme+0x82/0x180 [ 17.854571] ? preempt_count_sub+0x50/0x80 [ 17.854600] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.854630] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.854673] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.854703] kthread+0x337/0x6f0 [ 17.854727] ? trace_preempt_on+0x20/0xc0 [ 17.854755] ? __pfx_kthread+0x10/0x10 [ 17.854792] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.854819] ? calculate_sigpending+0x7b/0xa0 [ 17.854847] ? __pfx_kthread+0x10/0x10 [ 17.854874] ret_from_fork+0x116/0x1d0 [ 17.854897] ? __pfx_kthread+0x10/0x10 [ 17.854922] ret_from_fork_asm+0x1a/0x30 [ 17.854959] </TASK> [ 17.854973] [ 17.864939] Allocated by task 283: [ 17.865112] kasan_save_stack+0x45/0x70 [ 17.865294] kasan_save_track+0x18/0x40 [ 17.865515] kasan_save_alloc_info+0x3b/0x50 [ 17.865783] __kasan_kmalloc+0xb7/0xc0 [ 17.866016] __kmalloc_cache_noprof+0x189/0x420 [ 17.866487] kasan_atomics+0x95/0x310 [ 17.866689] kunit_try_run_case+0x1a5/0x480 [ 17.866868] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.867180] kthread+0x337/0x6f0 [ 17.867392] ret_from_fork+0x116/0x1d0 [ 17.867611] ret_from_fork_asm+0x1a/0x30 [ 17.867852] [ 17.867969] The buggy address belongs to the object at ffff888103349180 [ 17.867969] which belongs to the cache kmalloc-64 of size 64 [ 17.868538] The buggy address is located 0 bytes to the right of [ 17.868538] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 17.869249] [ 17.869370] The buggy address belongs to the physical page: [ 17.869661] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 17.870054] flags: 0x200000000000000(node=0|zone=2) [ 17.870323] page_type: f5(slab) [ 17.870519] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.870904] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.874716] page dumped because: kasan: bad access detected [ 17.874960] [ 17.875059] Memory state around the buggy address: [ 17.875253] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.875561] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.877249] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.877537] ^ [ 17.877745] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.879953] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.880234] ================================================================== [ 17.824078] ================================================================== [ 17.824562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 17.825055] Read of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 17.825379] [ 17.825521] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.825581] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.825598] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.825627] Call Trace: [ 17.825667] <TASK> [ 17.825693] dump_stack_lvl+0x73/0xb0 [ 17.825732] print_report+0xd1/0x650 [ 17.825761] ? __virt_addr_valid+0x1db/0x2d0 [ 17.825791] ? kasan_atomics_helper+0x4f30/0x5450 [ 17.825817] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.825845] ? kasan_atomics_helper+0x4f30/0x5450 [ 17.825872] kasan_report+0x141/0x180 [ 17.825900] ? kasan_atomics_helper+0x4f30/0x5450 [ 17.825934] __asan_report_load8_noabort+0x18/0x20 [ 17.825965] kasan_atomics_helper+0x4f30/0x5450 [ 17.825994] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.826022] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.826054] ? kasan_atomics+0x152/0x310 [ 17.826088] kasan_atomics+0x1dc/0x310 [ 17.826117] ? __pfx_kasan_atomics+0x10/0x10 [ 17.826149] ? __pfx_read_tsc+0x10/0x10 [ 17.826180] ? ktime_get_ts64+0x86/0x230 [ 17.826212] kunit_try_run_case+0x1a5/0x480 [ 17.826244] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.826272] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.826302] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.826331] ? __kthread_parkme+0x82/0x180 [ 17.826357] ? preempt_count_sub+0x50/0x80 [ 17.826388] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.826423] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.826453] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.826481] kthread+0x337/0x6f0 [ 17.826505] ? trace_preempt_on+0x20/0xc0 [ 17.826535] ? __pfx_kthread+0x10/0x10 [ 17.826560] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.826586] ? calculate_sigpending+0x7b/0xa0 [ 17.826617] ? __pfx_kthread+0x10/0x10 [ 17.826654] ret_from_fork+0x116/0x1d0 [ 17.826677] ? __pfx_kthread+0x10/0x10 [ 17.826702] ret_from_fork_asm+0x1a/0x30 [ 17.826741] </TASK> [ 17.826757] [ 17.838196] Allocated by task 283: [ 17.838478] kasan_save_stack+0x45/0x70 [ 17.838931] kasan_save_track+0x18/0x40 [ 17.839294] kasan_save_alloc_info+0x3b/0x50 [ 17.839539] __kasan_kmalloc+0xb7/0xc0 [ 17.839757] __kmalloc_cache_noprof+0x189/0x420 [ 17.840294] kasan_atomics+0x95/0x310 [ 17.840707] kunit_try_run_case+0x1a5/0x480 [ 17.841308] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.841735] kthread+0x337/0x6f0 [ 17.842081] ret_from_fork+0x116/0x1d0 [ 17.842309] ret_from_fork_asm+0x1a/0x30 [ 17.842539] [ 17.842667] The buggy address belongs to the object at ffff888103349180 [ 17.842667] which belongs to the cache kmalloc-64 of size 64 [ 17.843282] The buggy address is located 0 bytes to the right of [ 17.843282] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 17.843914] [ 17.844071] The buggy address belongs to the physical page: [ 17.844363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 17.844669] flags: 0x200000000000000(node=0|zone=2) [ 17.845199] page_type: f5(slab) [ 17.845409] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.845829] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.846274] page dumped because: kasan: bad access detected [ 17.846589] [ 17.846691] Memory state around the buggy address: [ 17.847131] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.847623] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.848531] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.848916] ^ [ 17.849347] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.849839] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.850442] ================================================================== [ 16.678347] ================================================================== [ 16.678728] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 16.679630] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 16.680157] [ 16.680274] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.680329] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.680347] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.680375] Call Trace: [ 16.680398] <TASK> [ 16.680422] dump_stack_lvl+0x73/0xb0 [ 16.680458] print_report+0xd1/0x650 [ 16.680487] ? __virt_addr_valid+0x1db/0x2d0 [ 16.680517] ? kasan_atomics_helper+0x697/0x5450 [ 16.680544] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.680571] ? kasan_atomics_helper+0x697/0x5450 [ 16.680599] kasan_report+0x141/0x180 [ 16.680627] ? kasan_atomics_helper+0x697/0x5450 [ 16.680674] kasan_check_range+0x10c/0x1c0 [ 16.680704] __kasan_check_write+0x18/0x20 [ 16.680729] kasan_atomics_helper+0x697/0x5450 [ 16.680758] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.680786] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.680864] ? kasan_atomics+0x152/0x310 [ 16.680899] kasan_atomics+0x1dc/0x310 [ 16.680928] ? __pfx_kasan_atomics+0x10/0x10 [ 16.680959] ? __pfx_read_tsc+0x10/0x10 [ 16.680986] ? ktime_get_ts64+0x86/0x230 [ 16.681017] kunit_try_run_case+0x1a5/0x480 [ 16.681049] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.681077] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.681107] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.681136] ? __kthread_parkme+0x82/0x180 [ 16.681161] ? preempt_count_sub+0x50/0x80 [ 16.681191] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.681221] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.681250] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.681279] kthread+0x337/0x6f0 [ 16.681304] ? trace_preempt_on+0x20/0xc0 [ 16.681334] ? __pfx_kthread+0x10/0x10 [ 16.681360] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.681386] ? calculate_sigpending+0x7b/0xa0 [ 16.681416] ? __pfx_kthread+0x10/0x10 [ 16.681443] ret_from_fork+0x116/0x1d0 [ 16.681467] ? __pfx_kthread+0x10/0x10 [ 16.681494] ret_from_fork_asm+0x1a/0x30 [ 16.681531] </TASK> [ 16.681545] [ 16.691429] Allocated by task 283: [ 16.691601] kasan_save_stack+0x45/0x70 [ 16.692113] kasan_save_track+0x18/0x40 [ 16.692355] kasan_save_alloc_info+0x3b/0x50 [ 16.692614] __kasan_kmalloc+0xb7/0xc0 [ 16.693128] __kmalloc_cache_noprof+0x189/0x420 [ 16.693361] kasan_atomics+0x95/0x310 [ 16.693567] kunit_try_run_case+0x1a5/0x480 [ 16.693761] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.693975] kthread+0x337/0x6f0 [ 16.694123] ret_from_fork+0x116/0x1d0 [ 16.694284] ret_from_fork_asm+0x1a/0x30 [ 16.694626] [ 16.694761] The buggy address belongs to the object at ffff888103349180 [ 16.694761] which belongs to the cache kmalloc-64 of size 64 [ 16.695413] The buggy address is located 0 bytes to the right of [ 16.695413] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 16.696070] [ 16.696161] The buggy address belongs to the physical page: [ 16.696371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 16.697116] flags: 0x200000000000000(node=0|zone=2) [ 16.697414] page_type: f5(slab) [ 16.697625] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.698065] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.698437] page dumped because: kasan: bad access detected [ 16.698660] [ 16.698782] Memory state around the buggy address: [ 16.699057] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.699453] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.699860] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.700165] ^ [ 16.700352] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.700612] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.701661] ================================================================== [ 17.112951] ================================================================== [ 17.113538] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 17.114195] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 17.114741] [ 17.114930] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.114990] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.115007] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.115038] Call Trace: [ 17.115056] <TASK> [ 17.115078] dump_stack_lvl+0x73/0xb0 [ 17.115129] print_report+0xd1/0x650 [ 17.115157] ? __virt_addr_valid+0x1db/0x2d0 [ 17.115200] ? kasan_atomics_helper+0xfa9/0x5450 [ 17.115226] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.115255] ? kasan_atomics_helper+0xfa9/0x5450 [ 17.115282] kasan_report+0x141/0x180 [ 17.115310] ? kasan_atomics_helper+0xfa9/0x5450 [ 17.115343] kasan_check_range+0x10c/0x1c0 [ 17.115373] __kasan_check_write+0x18/0x20 [ 17.115397] kasan_atomics_helper+0xfa9/0x5450 [ 17.115436] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.115464] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.115508] ? kasan_atomics+0x152/0x310 [ 17.115542] kasan_atomics+0x1dc/0x310 [ 17.115571] ? __pfx_kasan_atomics+0x10/0x10 [ 17.115601] ? __pfx_read_tsc+0x10/0x10 [ 17.115628] ? ktime_get_ts64+0x86/0x230 [ 17.115670] kunit_try_run_case+0x1a5/0x480 [ 17.115700] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.115728] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.115757] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.115812] ? __kthread_parkme+0x82/0x180 [ 17.115839] ? preempt_count_sub+0x50/0x80 [ 17.115881] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.115910] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.115939] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.115967] kthread+0x337/0x6f0 [ 17.116003] ? trace_preempt_on+0x20/0xc0 [ 17.116034] ? __pfx_kthread+0x10/0x10 [ 17.116061] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.116101] ? calculate_sigpending+0x7b/0xa0 [ 17.116131] ? __pfx_kthread+0x10/0x10 [ 17.116159] ret_from_fork+0x116/0x1d0 [ 17.116182] ? __pfx_kthread+0x10/0x10 [ 17.116208] ret_from_fork_asm+0x1a/0x30 [ 17.116247] </TASK> [ 17.116261] [ 17.125773] Allocated by task 283: [ 17.126006] kasan_save_stack+0x45/0x70 [ 17.126290] kasan_save_track+0x18/0x40 [ 17.126501] kasan_save_alloc_info+0x3b/0x50 [ 17.126696] __kasan_kmalloc+0xb7/0xc0 [ 17.126858] __kmalloc_cache_noprof+0x189/0x420 [ 17.127177] kasan_atomics+0x95/0x310 [ 17.127410] kunit_try_run_case+0x1a5/0x480 [ 17.127699] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.128020] kthread+0x337/0x6f0 [ 17.128277] ret_from_fork+0x116/0x1d0 [ 17.128558] ret_from_fork_asm+0x1a/0x30 [ 17.128777] [ 17.128866] The buggy address belongs to the object at ffff888103349180 [ 17.128866] which belongs to the cache kmalloc-64 of size 64 [ 17.129321] The buggy address is located 0 bytes to the right of [ 17.129321] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 17.130063] [ 17.130200] The buggy address belongs to the physical page: [ 17.130585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 17.130889] flags: 0x200000000000000(node=0|zone=2) [ 17.131091] page_type: f5(slab) [ 17.131240] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.131678] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.132127] page dumped because: kasan: bad access detected [ 17.132473] [ 17.132618] Memory state around the buggy address: [ 17.132958] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.133305] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.133601] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.134295] ^ [ 17.134573] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.134985] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.135243] ================================================================== [ 17.484590] ================================================================== [ 17.484899] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 17.485591] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 17.486017] [ 17.486156] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.486215] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.486232] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.486259] Call Trace: [ 17.486283] <TASK> [ 17.486307] dump_stack_lvl+0x73/0xb0 [ 17.486343] print_report+0xd1/0x650 [ 17.486372] ? __virt_addr_valid+0x1db/0x2d0 [ 17.486403] ? kasan_atomics_helper+0x151d/0x5450 [ 17.486433] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.486461] ? kasan_atomics_helper+0x151d/0x5450 [ 17.486491] kasan_report+0x141/0x180 [ 17.486520] ? kasan_atomics_helper+0x151d/0x5450 [ 17.486552] kasan_check_range+0x10c/0x1c0 [ 17.486581] __kasan_check_write+0x18/0x20 [ 17.486606] kasan_atomics_helper+0x151d/0x5450 [ 17.486633] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.486674] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.486706] ? kasan_atomics+0x152/0x310 [ 17.486740] kasan_atomics+0x1dc/0x310 [ 17.486781] ? __pfx_kasan_atomics+0x10/0x10 [ 17.486811] ? __pfx_read_tsc+0x10/0x10 [ 17.486837] ? ktime_get_ts64+0x86/0x230 [ 17.486867] kunit_try_run_case+0x1a5/0x480 [ 17.486897] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.486924] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.486954] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.486982] ? __kthread_parkme+0x82/0x180 [ 17.487008] ? preempt_count_sub+0x50/0x80 [ 17.487037] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.487066] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.487094] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.487123] kthread+0x337/0x6f0 [ 17.487146] ? trace_preempt_on+0x20/0xc0 [ 17.487175] ? __pfx_kthread+0x10/0x10 [ 17.487201] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.487227] ? calculate_sigpending+0x7b/0xa0 [ 17.487256] ? __pfx_kthread+0x10/0x10 [ 17.487283] ret_from_fork+0x116/0x1d0 [ 17.487305] ? __pfx_kthread+0x10/0x10 [ 17.487331] ret_from_fork_asm+0x1a/0x30 [ 17.487368] </TASK> [ 17.487382] [ 17.496013] Allocated by task 283: [ 17.496239] kasan_save_stack+0x45/0x70 [ 17.496482] kasan_save_track+0x18/0x40 [ 17.496702] kasan_save_alloc_info+0x3b/0x50 [ 17.497101] __kasan_kmalloc+0xb7/0xc0 [ 17.497336] __kmalloc_cache_noprof+0x189/0x420 [ 17.497592] kasan_atomics+0x95/0x310 [ 17.497769] kunit_try_run_case+0x1a5/0x480 [ 17.497949] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.498513] kthread+0x337/0x6f0 [ 17.498766] ret_from_fork+0x116/0x1d0 [ 17.499029] ret_from_fork_asm+0x1a/0x30 [ 17.499353] [ 17.499500] The buggy address belongs to the object at ffff888103349180 [ 17.499500] which belongs to the cache kmalloc-64 of size 64 [ 17.500061] The buggy address is located 0 bytes to the right of [ 17.500061] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 17.500770] [ 17.500883] The buggy address belongs to the physical page: [ 17.501196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 17.501602] flags: 0x200000000000000(node=0|zone=2) [ 17.501914] page_type: f5(slab) [ 17.502110] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.502519] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.502969] page dumped because: kasan: bad access detected [ 17.503230] [ 17.503347] Memory state around the buggy address: [ 17.503582] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.503981] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.504379] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.504795] ^ [ 17.505026] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.505353] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.505612] ================================================================== [ 17.233152] ================================================================== [ 17.233700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 17.234177] Read of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 17.234589] [ 17.234714] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.234775] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.234804] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.234835] Call Trace: [ 17.234862] <TASK> [ 17.234887] dump_stack_lvl+0x73/0xb0 [ 17.234965] print_report+0xd1/0x650 [ 17.234994] ? __virt_addr_valid+0x1db/0x2d0 [ 17.235059] ? kasan_atomics_helper+0x4a02/0x5450 [ 17.235117] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.235147] ? kasan_atomics_helper+0x4a02/0x5450 [ 17.235175] kasan_report+0x141/0x180 [ 17.235217] ? kasan_atomics_helper+0x4a02/0x5450 [ 17.235250] __asan_report_load4_noabort+0x18/0x20 [ 17.235280] kasan_atomics_helper+0x4a02/0x5450 [ 17.235309] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.235339] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.235401] ? kasan_atomics+0x152/0x310 [ 17.235436] kasan_atomics+0x1dc/0x310 [ 17.235465] ? __pfx_kasan_atomics+0x10/0x10 [ 17.235508] ? __pfx_read_tsc+0x10/0x10 [ 17.235567] ? ktime_get_ts64+0x86/0x230 [ 17.235596] kunit_try_run_case+0x1a5/0x480 [ 17.235640] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.235679] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.235709] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.235737] ? __kthread_parkme+0x82/0x180 [ 17.235762] ? preempt_count_sub+0x50/0x80 [ 17.235838] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.235869] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.235932] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.235961] kthread+0x337/0x6f0 [ 17.236000] ? trace_preempt_on+0x20/0xc0 [ 17.236030] ? __pfx_kthread+0x10/0x10 [ 17.236057] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.236083] ? calculate_sigpending+0x7b/0xa0 [ 17.236143] ? __pfx_kthread+0x10/0x10 [ 17.236171] ret_from_fork+0x116/0x1d0 [ 17.236194] ? __pfx_kthread+0x10/0x10 [ 17.236232] ret_from_fork_asm+0x1a/0x30 [ 17.236270] </TASK> [ 17.236285] [ 17.246157] Allocated by task 283: [ 17.246384] kasan_save_stack+0x45/0x70 [ 17.246668] kasan_save_track+0x18/0x40 [ 17.246998] kasan_save_alloc_info+0x3b/0x50 [ 17.247277] __kasan_kmalloc+0xb7/0xc0 [ 17.247506] __kmalloc_cache_noprof+0x189/0x420 [ 17.247712] kasan_atomics+0x95/0x310 [ 17.248150] kunit_try_run_case+0x1a5/0x480 [ 17.248405] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.248752] kthread+0x337/0x6f0 [ 17.248986] ret_from_fork+0x116/0x1d0 [ 17.249240] ret_from_fork_asm+0x1a/0x30 [ 17.249462] [ 17.249568] The buggy address belongs to the object at ffff888103349180 [ 17.249568] which belongs to the cache kmalloc-64 of size 64 [ 17.250312] The buggy address is located 0 bytes to the right of [ 17.250312] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 17.251017] [ 17.251111] The buggy address belongs to the physical page: [ 17.251462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 17.251926] flags: 0x200000000000000(node=0|zone=2) [ 17.252298] page_type: f5(slab) [ 17.252525] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.253032] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.253449] page dumped because: kasan: bad access detected [ 17.253771] [ 17.253972] Memory state around the buggy address: [ 17.254255] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.254665] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.255183] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.255558] ^ [ 17.255953] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.256422] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.256964] ================================================================== [ 18.144695] ================================================================== [ 18.145853] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 18.146632] Read of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 18.147484] [ 18.147748] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 18.147835] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.147853] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.147882] Call Trace: [ 18.147911] <TASK> [ 18.147939] dump_stack_lvl+0x73/0xb0 [ 18.147977] print_report+0xd1/0x650 [ 18.148008] ? __virt_addr_valid+0x1db/0x2d0 [ 18.148039] ? kasan_atomics_helper+0x4fa5/0x5450 [ 18.148067] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.148095] ? kasan_atomics_helper+0x4fa5/0x5450 [ 18.148122] kasan_report+0x141/0x180 [ 18.148151] ? kasan_atomics_helper+0x4fa5/0x5450 [ 18.148184] __asan_report_load8_noabort+0x18/0x20 [ 18.148215] kasan_atomics_helper+0x4fa5/0x5450 [ 18.148276] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.148305] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.148338] ? kasan_atomics+0x152/0x310 [ 18.148373] kasan_atomics+0x1dc/0x310 [ 18.148402] ? __pfx_kasan_atomics+0x10/0x10 [ 18.148446] ? __pfx_read_tsc+0x10/0x10 [ 18.148474] ? ktime_get_ts64+0x86/0x230 [ 18.148518] kunit_try_run_case+0x1a5/0x480 [ 18.148550] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.148579] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.148610] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.148639] ? __kthread_parkme+0x82/0x180 [ 18.148684] ? preempt_count_sub+0x50/0x80 [ 18.148715] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.148804] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.148834] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.148878] kthread+0x337/0x6f0 [ 18.148903] ? trace_preempt_on+0x20/0xc0 [ 18.148956] ? __pfx_kthread+0x10/0x10 [ 18.148993] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.149021] ? calculate_sigpending+0x7b/0xa0 [ 18.149065] ? __pfx_kthread+0x10/0x10 [ 18.149093] ret_from_fork+0x116/0x1d0 [ 18.149138] ? __pfx_kthread+0x10/0x10 [ 18.149176] ret_from_fork_asm+0x1a/0x30 [ 18.149216] </TASK> [ 18.149247] [ 18.164000] Allocated by task 283: [ 18.164429] kasan_save_stack+0x45/0x70 [ 18.164900] kasan_save_track+0x18/0x40 [ 18.165376] kasan_save_alloc_info+0x3b/0x50 [ 18.165902] __kasan_kmalloc+0xb7/0xc0 [ 18.166337] __kmalloc_cache_noprof+0x189/0x420 [ 18.166888] kasan_atomics+0x95/0x310 [ 18.167317] kunit_try_run_case+0x1a5/0x480 [ 18.167814] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.168394] kthread+0x337/0x6f0 [ 18.168669] ret_from_fork+0x116/0x1d0 [ 18.169099] ret_from_fork_asm+0x1a/0x30 [ 18.169280] [ 18.169373] The buggy address belongs to the object at ffff888103349180 [ 18.169373] which belongs to the cache kmalloc-64 of size 64 [ 18.170169] The buggy address is located 0 bytes to the right of [ 18.170169] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 18.171162] [ 18.171361] The buggy address belongs to the physical page: [ 18.171732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 18.172378] flags: 0x200000000000000(node=0|zone=2) [ 18.172588] page_type: f5(slab) [ 18.172954] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.173778] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.174565] page dumped because: kasan: bad access detected [ 18.175005] [ 18.175098] Memory state around the buggy address: [ 18.175292] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.175557] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.176240] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.177009] ^ [ 18.177521] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.178306] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.179100] ================================================================== [ 17.257929] ================================================================== [ 17.258814] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 17.259262] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 17.259697] [ 17.259908] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.259980] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.259998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.260027] Call Trace: [ 17.260084] <TASK> [ 17.260108] dump_stack_lvl+0x73/0xb0 [ 17.260161] print_report+0xd1/0x650 [ 17.260190] ? __virt_addr_valid+0x1db/0x2d0 [ 17.260252] ? kasan_atomics_helper+0x1217/0x5450 [ 17.260281] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.260309] ? kasan_atomics_helper+0x1217/0x5450 [ 17.260353] kasan_report+0x141/0x180 [ 17.260412] ? kasan_atomics_helper+0x1217/0x5450 [ 17.260446] kasan_check_range+0x10c/0x1c0 [ 17.260478] __kasan_check_write+0x18/0x20 [ 17.260516] kasan_atomics_helper+0x1217/0x5450 [ 17.260545] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.260602] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.260635] ? kasan_atomics+0x152/0x310 [ 17.260691] kasan_atomics+0x1dc/0x310 [ 17.260720] ? __pfx_kasan_atomics+0x10/0x10 [ 17.260751] ? __pfx_read_tsc+0x10/0x10 [ 17.260812] ? ktime_get_ts64+0x86/0x230 [ 17.260843] kunit_try_run_case+0x1a5/0x480 [ 17.260887] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.260915] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.260946] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.260978] ? __kthread_parkme+0x82/0x180 [ 17.261004] ? preempt_count_sub+0x50/0x80 [ 17.261067] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.261097] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.261140] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.261169] kthread+0x337/0x6f0 [ 17.261207] ? trace_preempt_on+0x20/0xc0 [ 17.261239] ? __pfx_kthread+0x10/0x10 [ 17.261265] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.261291] ? calculate_sigpending+0x7b/0xa0 [ 17.261321] ? __pfx_kthread+0x10/0x10 [ 17.261348] ret_from_fork+0x116/0x1d0 [ 17.261370] ? __pfx_kthread+0x10/0x10 [ 17.261398] ret_from_fork_asm+0x1a/0x30 [ 17.261435] </TASK> [ 17.261451] [ 17.271763] Allocated by task 283: [ 17.272024] kasan_save_stack+0x45/0x70 [ 17.272316] kasan_save_track+0x18/0x40 [ 17.272627] kasan_save_alloc_info+0x3b/0x50 [ 17.273191] __kasan_kmalloc+0xb7/0xc0 [ 17.273422] __kmalloc_cache_noprof+0x189/0x420 [ 17.273716] kasan_atomics+0x95/0x310 [ 17.274129] kunit_try_run_case+0x1a5/0x480 [ 17.274439] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.274672] kthread+0x337/0x6f0 [ 17.274821] ret_from_fork+0x116/0x1d0 [ 17.275192] ret_from_fork_asm+0x1a/0x30 [ 17.275521] [ 17.275744] The buggy address belongs to the object at ffff888103349180 [ 17.275744] which belongs to the cache kmalloc-64 of size 64 [ 17.276513] The buggy address is located 0 bytes to the right of [ 17.276513] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 17.277143] [ 17.277403] The buggy address belongs to the physical page: [ 17.277818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 17.278288] flags: 0x200000000000000(node=0|zone=2) [ 17.278510] page_type: f5(slab) [ 17.278733] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.279216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.279562] page dumped because: kasan: bad access detected [ 17.279985] [ 17.280114] Memory state around the buggy address: [ 17.280309] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.280760] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.281221] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.281634] ^ [ 17.281999] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.282436] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.282865] ================================================================== [ 16.621012] ================================================================== [ 16.621460] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 16.621859] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 16.622269] [ 16.622425] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.622485] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.622504] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.622533] Call Trace: [ 16.622561] <TASK> [ 16.622585] dump_stack_lvl+0x73/0xb0 [ 16.622624] print_report+0xd1/0x650 [ 16.622669] ? __virt_addr_valid+0x1db/0x2d0 [ 16.622699] ? kasan_atomics_helper+0x565/0x5450 [ 16.622726] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.622755] ? kasan_atomics_helper+0x565/0x5450 [ 16.622782] kasan_report+0x141/0x180 [ 16.622812] ? kasan_atomics_helper+0x565/0x5450 [ 16.622845] kasan_check_range+0x10c/0x1c0 [ 16.622875] __kasan_check_write+0x18/0x20 [ 16.622899] kasan_atomics_helper+0x565/0x5450 [ 16.622927] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.622955] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.622990] ? kasan_atomics+0x152/0x310 [ 16.623024] kasan_atomics+0x1dc/0x310 [ 16.623053] ? __pfx_kasan_atomics+0x10/0x10 [ 16.623083] ? __pfx_read_tsc+0x10/0x10 [ 16.623110] ? ktime_get_ts64+0x86/0x230 [ 16.623141] kunit_try_run_case+0x1a5/0x480 [ 16.623172] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.623200] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.623230] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.623259] ? __kthread_parkme+0x82/0x180 [ 16.623285] ? preempt_count_sub+0x50/0x80 [ 16.623316] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.623346] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.623374] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.623403] kthread+0x337/0x6f0 [ 16.623428] ? trace_preempt_on+0x20/0xc0 [ 16.623458] ? __pfx_kthread+0x10/0x10 [ 16.623484] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.623510] ? calculate_sigpending+0x7b/0xa0 [ 16.623541] ? __pfx_kthread+0x10/0x10 [ 16.623568] ret_from_fork+0x116/0x1d0 [ 16.623592] ? __pfx_kthread+0x10/0x10 [ 16.623618] ret_from_fork_asm+0x1a/0x30 [ 16.623668] </TASK> [ 16.623683] [ 16.637342] Allocated by task 283: [ 16.637570] kasan_save_stack+0x45/0x70 [ 16.637773] kasan_save_track+0x18/0x40 [ 16.637941] kasan_save_alloc_info+0x3b/0x50 [ 16.638227] __kasan_kmalloc+0xb7/0xc0 [ 16.638619] __kmalloc_cache_noprof+0x189/0x420 [ 16.639302] kasan_atomics+0x95/0x310 [ 16.639975] kunit_try_run_case+0x1a5/0x480 [ 16.640224] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.640675] kthread+0x337/0x6f0 [ 16.641054] ret_from_fork+0x116/0x1d0 [ 16.641452] ret_from_fork_asm+0x1a/0x30 [ 16.641710] [ 16.642068] The buggy address belongs to the object at ffff888103349180 [ 16.642068] which belongs to the cache kmalloc-64 of size 64 [ 16.643705] The buggy address is located 0 bytes to the right of [ 16.643705] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 16.644676] [ 16.644790] The buggy address belongs to the physical page: [ 16.645479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 16.646433] flags: 0x200000000000000(node=0|zone=2) [ 16.647125] page_type: f5(slab) [ 16.647547] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.648425] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.649409] page dumped because: kasan: bad access detected [ 16.649632] [ 16.649737] Memory state around the buggy address: [ 16.650025] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.650768] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.651588] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.652403] ^ [ 16.653007] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.654040] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.654310] ================================================================== [ 17.283701] ================================================================== [ 17.284439] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 17.285401] Read of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 17.285934] [ 17.286316] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.286380] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.286438] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.286467] Call Trace: [ 17.286492] <TASK> [ 17.286528] dump_stack_lvl+0x73/0xb0 [ 17.286568] print_report+0xd1/0x650 [ 17.286596] ? __virt_addr_valid+0x1db/0x2d0 [ 17.286627] ? kasan_atomics_helper+0x49e8/0x5450 [ 17.286665] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.286694] ? kasan_atomics_helper+0x49e8/0x5450 [ 17.286722] kasan_report+0x141/0x180 [ 17.286785] ? kasan_atomics_helper+0x49e8/0x5450 [ 17.286832] __asan_report_load4_noabort+0x18/0x20 [ 17.286877] kasan_atomics_helper+0x49e8/0x5450 [ 17.286907] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.286936] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.286969] ? kasan_atomics+0x152/0x310 [ 17.287023] kasan_atomics+0x1dc/0x310 [ 17.287068] ? __pfx_kasan_atomics+0x10/0x10 [ 17.287115] ? __pfx_read_tsc+0x10/0x10 [ 17.287143] ? ktime_get_ts64+0x86/0x230 [ 17.287174] kunit_try_run_case+0x1a5/0x480 [ 17.287222] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.287267] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.287308] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.287338] ? __kthread_parkme+0x82/0x180 [ 17.287365] ? preempt_count_sub+0x50/0x80 [ 17.287408] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.287439] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.287467] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.287496] kthread+0x337/0x6f0 [ 17.287522] ? trace_preempt_on+0x20/0xc0 [ 17.287552] ? __pfx_kthread+0x10/0x10 [ 17.287579] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.287605] ? calculate_sigpending+0x7b/0xa0 [ 17.287636] ? __pfx_kthread+0x10/0x10 [ 17.287673] ret_from_fork+0x116/0x1d0 [ 17.287697] ? __pfx_kthread+0x10/0x10 [ 17.287722] ret_from_fork_asm+0x1a/0x30 [ 17.287761] </TASK> [ 17.287786] [ 17.299493] Allocated by task 283: [ 17.300043] kasan_save_stack+0x45/0x70 [ 17.300304] kasan_save_track+0x18/0x40 [ 17.300525] kasan_save_alloc_info+0x3b/0x50 [ 17.300779] __kasan_kmalloc+0xb7/0xc0 [ 17.300993] __kmalloc_cache_noprof+0x189/0x420 [ 17.301241] kasan_atomics+0x95/0x310 [ 17.301458] kunit_try_run_case+0x1a5/0x480 [ 17.302132] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.302847] kthread+0x337/0x6f0 [ 17.303341] ret_from_fork+0x116/0x1d0 [ 17.303853] ret_from_fork_asm+0x1a/0x30 [ 17.304378] [ 17.304590] The buggy address belongs to the object at ffff888103349180 [ 17.304590] which belongs to the cache kmalloc-64 of size 64 [ 17.305401] The buggy address is located 0 bytes to the right of [ 17.305401] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 17.306736] [ 17.306963] The buggy address belongs to the physical page: [ 17.307661] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 17.308791] flags: 0x200000000000000(node=0|zone=2) [ 17.309291] page_type: f5(slab) [ 17.309750] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.310463] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.311360] page dumped because: kasan: bad access detected [ 17.312084] [ 17.312298] Memory state around the buggy address: [ 17.312823] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.313512] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.314090] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.314432] ^ [ 17.314695] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.315369] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.316201] ================================================================== [ 16.799310] ================================================================== [ 16.800095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 16.800405] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 16.800679] [ 16.801031] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.801091] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.801108] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.801138] Call Trace: [ 16.801164] <TASK> [ 16.801190] dump_stack_lvl+0x73/0xb0 [ 16.801227] print_report+0xd1/0x650 [ 16.801255] ? __virt_addr_valid+0x1db/0x2d0 [ 16.801284] ? kasan_atomics_helper+0x8f9/0x5450 [ 16.801310] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.801340] ? kasan_atomics_helper+0x8f9/0x5450 [ 16.801368] kasan_report+0x141/0x180 [ 16.801396] ? kasan_atomics_helper+0x8f9/0x5450 [ 16.801429] kasan_check_range+0x10c/0x1c0 [ 16.801459] __kasan_check_write+0x18/0x20 [ 16.801484] kasan_atomics_helper+0x8f9/0x5450 [ 16.801512] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.801584] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.801630] ? kasan_atomics+0x152/0x310 [ 16.801676] kasan_atomics+0x1dc/0x310 [ 16.801705] ? __pfx_kasan_atomics+0x10/0x10 [ 16.801739] ? __pfx_read_tsc+0x10/0x10 [ 16.801767] ? ktime_get_ts64+0x86/0x230 [ 16.801817] kunit_try_run_case+0x1a5/0x480 [ 16.801849] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.801877] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.801906] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.801936] ? __kthread_parkme+0x82/0x180 [ 16.801962] ? preempt_count_sub+0x50/0x80 [ 16.801992] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.802021] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.802049] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.802079] kthread+0x337/0x6f0 [ 16.802104] ? trace_preempt_on+0x20/0xc0 [ 16.802134] ? __pfx_kthread+0x10/0x10 [ 16.802160] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.802187] ? calculate_sigpending+0x7b/0xa0 [ 16.802218] ? __pfx_kthread+0x10/0x10 [ 16.802244] ret_from_fork+0x116/0x1d0 [ 16.802268] ? __pfx_kthread+0x10/0x10 [ 16.802294] ret_from_fork_asm+0x1a/0x30 [ 16.802332] </TASK> [ 16.802348] [ 16.818474] Allocated by task 283: [ 16.818892] kasan_save_stack+0x45/0x70 [ 16.819359] kasan_save_track+0x18/0x40 [ 16.819784] kasan_save_alloc_info+0x3b/0x50 [ 16.820497] __kasan_kmalloc+0xb7/0xc0 [ 16.821143] __kmalloc_cache_noprof+0x189/0x420 [ 16.821621] kasan_atomics+0x95/0x310 [ 16.822085] kunit_try_run_case+0x1a5/0x480 [ 16.823068] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.823396] kthread+0x337/0x6f0 [ 16.823548] ret_from_fork+0x116/0x1d0 [ 16.823722] ret_from_fork_asm+0x1a/0x30 [ 16.824272] [ 16.824499] The buggy address belongs to the object at ffff888103349180 [ 16.824499] which belongs to the cache kmalloc-64 of size 64 [ 16.825980] The buggy address is located 0 bytes to the right of [ 16.825980] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 16.827568] [ 16.827830] The buggy address belongs to the physical page: [ 16.828194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 16.828480] flags: 0x200000000000000(node=0|zone=2) [ 16.828692] page_type: f5(slab) [ 16.829040] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.830029] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.830989] page dumped because: kasan: bad access detected [ 16.831544] [ 16.831744] Memory state around the buggy address: [ 16.832316] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.833106] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.833952] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.834227] ^ [ 16.834757] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.835506] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.835952] ================================================================== [ 17.087518] ================================================================== [ 17.087837] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 17.088192] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 17.088574] [ 17.088697] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.088754] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.088771] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.088800] Call Trace: [ 17.088825] <TASK> [ 17.088848] dump_stack_lvl+0x73/0xb0 [ 17.088884] print_report+0xd1/0x650 [ 17.088912] ? __virt_addr_valid+0x1db/0x2d0 [ 17.088940] ? kasan_atomics_helper+0xf10/0x5450 [ 17.088966] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.088994] ? kasan_atomics_helper+0xf10/0x5450 [ 17.089020] kasan_report+0x141/0x180 [ 17.089048] ? kasan_atomics_helper+0xf10/0x5450 [ 17.089079] kasan_check_range+0x10c/0x1c0 [ 17.089107] __kasan_check_write+0x18/0x20 [ 17.089131] kasan_atomics_helper+0xf10/0x5450 [ 17.089158] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.089185] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.089217] ? kasan_atomics+0x152/0x310 [ 17.089249] kasan_atomics+0x1dc/0x310 [ 17.089277] ? __pfx_kasan_atomics+0x10/0x10 [ 17.089306] ? __pfx_read_tsc+0x10/0x10 [ 17.089333] ? ktime_get_ts64+0x86/0x230 [ 17.089361] kunit_try_run_case+0x1a5/0x480 [ 17.089430] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.089459] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.089489] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.089516] ? __kthread_parkme+0x82/0x180 [ 17.089541] ? preempt_count_sub+0x50/0x80 [ 17.089570] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.089599] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.089627] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.089733] kthread+0x337/0x6f0 [ 17.089762] ? trace_preempt_on+0x20/0xc0 [ 17.089953] ? __pfx_kthread+0x10/0x10 [ 17.090005] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.090032] ? calculate_sigpending+0x7b/0xa0 [ 17.090078] ? __pfx_kthread+0x10/0x10 [ 17.090105] ret_from_fork+0x116/0x1d0 [ 17.090143] ? __pfx_kthread+0x10/0x10 [ 17.090169] ret_from_fork_asm+0x1a/0x30 [ 17.090221] </TASK> [ 17.090236] [ 17.101137] Allocated by task 283: [ 17.101402] kasan_save_stack+0x45/0x70 [ 17.101631] kasan_save_track+0x18/0x40 [ 17.101908] kasan_save_alloc_info+0x3b/0x50 [ 17.102210] __kasan_kmalloc+0xb7/0xc0 [ 17.102459] __kmalloc_cache_noprof+0x189/0x420 [ 17.102673] kasan_atomics+0x95/0x310 [ 17.102848] kunit_try_run_case+0x1a5/0x480 [ 17.103030] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.103308] kthread+0x337/0x6f0 [ 17.103572] ret_from_fork+0x116/0x1d0 [ 17.103902] ret_from_fork_asm+0x1a/0x30 [ 17.104155] [ 17.104273] The buggy address belongs to the object at ffff888103349180 [ 17.104273] which belongs to the cache kmalloc-64 of size 64 [ 17.105309] The buggy address is located 0 bytes to the right of [ 17.105309] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 17.105895] [ 17.105986] The buggy address belongs to the physical page: [ 17.106193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 17.106663] flags: 0x200000000000000(node=0|zone=2) [ 17.107247] page_type: f5(slab) [ 17.107411] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.107918] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.108345] page dumped because: kasan: bad access detected [ 17.108655] [ 17.108749] Memory state around the buggy address: [ 17.109143] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.109410] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.110149] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.110593] ^ [ 17.111042] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.111468] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.111906] ================================================================== [ 16.376095] ================================================================== [ 16.376891] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 16.377382] Read of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 16.377747] [ 16.377956] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.378016] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.378032] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.378061] Call Trace: [ 16.378077] <TASK> [ 16.378100] dump_stack_lvl+0x73/0xb0 [ 16.378140] print_report+0xd1/0x650 [ 16.378167] ? __virt_addr_valid+0x1db/0x2d0 [ 16.378197] ? kasan_atomics_helper+0x4bbc/0x5450 [ 16.378223] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.378249] ? kasan_atomics_helper+0x4bbc/0x5450 [ 16.378275] kasan_report+0x141/0x180 [ 16.378301] ? kasan_atomics_helper+0x4bbc/0x5450 [ 16.378332] __asan_report_load4_noabort+0x18/0x20 [ 16.378362] kasan_atomics_helper+0x4bbc/0x5450 [ 16.378391] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.378417] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.378456] ? kasan_atomics+0x152/0x310 [ 16.378488] kasan_atomics+0x1dc/0x310 [ 16.378517] ? __pfx_kasan_atomics+0x10/0x10 [ 16.378546] ? __pfx_read_tsc+0x10/0x10 [ 16.378572] ? ktime_get_ts64+0x86/0x230 [ 16.378628] kunit_try_run_case+0x1a5/0x480 [ 16.378671] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.378697] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.378725] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.378753] ? __kthread_parkme+0x82/0x180 [ 16.378842] ? preempt_count_sub+0x50/0x80 [ 16.378877] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.378904] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.378932] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.378959] kthread+0x337/0x6f0 [ 16.378982] ? trace_preempt_on+0x20/0xc0 [ 16.379013] ? __pfx_kthread+0x10/0x10 [ 16.379036] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.379061] ? calculate_sigpending+0x7b/0xa0 [ 16.379090] ? __pfx_kthread+0x10/0x10 [ 16.379116] ret_from_fork+0x116/0x1d0 [ 16.379138] ? __pfx_kthread+0x10/0x10 [ 16.379163] ret_from_fork_asm+0x1a/0x30 [ 16.379204] </TASK> [ 16.379218] [ 16.390729] Allocated by task 283: [ 16.391194] kasan_save_stack+0x45/0x70 [ 16.391719] kasan_save_track+0x18/0x40 [ 16.392298] kasan_save_alloc_info+0x3b/0x50 [ 16.392913] __kasan_kmalloc+0xb7/0xc0 [ 16.393341] __kmalloc_cache_noprof+0x189/0x420 [ 16.393875] kasan_atomics+0x95/0x310 [ 16.394288] kunit_try_run_case+0x1a5/0x480 [ 16.394872] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.395454] kthread+0x337/0x6f0 [ 16.395843] ret_from_fork+0x116/0x1d0 [ 16.396394] ret_from_fork_asm+0x1a/0x30 [ 16.396830] [ 16.397073] The buggy address belongs to the object at ffff888103349180 [ 16.397073] which belongs to the cache kmalloc-64 of size 64 [ 16.398309] The buggy address is located 0 bytes to the right of [ 16.398309] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 16.399073] [ 16.399168] The buggy address belongs to the physical page: [ 16.399395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 16.399737] flags: 0x200000000000000(node=0|zone=2) [ 16.400414] page_type: f5(slab) [ 16.400884] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.401634] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.402076] page dumped because: kasan: bad access detected [ 16.402706] [ 16.402965] Memory state around the buggy address: [ 16.403311] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.403800] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.404559] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.405207] ^ [ 16.405687] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.406247] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.407089] ================================================================== [ 16.555565] ================================================================== [ 16.556231] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 16.556803] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 16.557267] [ 16.557389] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.557449] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.557467] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.557496] Call Trace: [ 16.557523] <TASK> [ 16.557549] dump_stack_lvl+0x73/0xb0 [ 16.557587] print_report+0xd1/0x650 [ 16.557616] ? __virt_addr_valid+0x1db/0x2d0 [ 16.557981] ? kasan_atomics_helper+0x4a0/0x5450 [ 16.558021] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.558050] ? kasan_atomics_helper+0x4a0/0x5450 [ 16.558078] kasan_report+0x141/0x180 [ 16.558107] ? kasan_atomics_helper+0x4a0/0x5450 [ 16.558140] kasan_check_range+0x10c/0x1c0 [ 16.558170] __kasan_check_write+0x18/0x20 [ 16.558194] kasan_atomics_helper+0x4a0/0x5450 [ 16.558223] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.558251] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.558283] ? kasan_atomics+0x152/0x310 [ 16.558317] kasan_atomics+0x1dc/0x310 [ 16.558346] ? __pfx_kasan_atomics+0x10/0x10 [ 16.558376] ? __pfx_read_tsc+0x10/0x10 [ 16.558403] ? ktime_get_ts64+0x86/0x230 [ 16.558440] kunit_try_run_case+0x1a5/0x480 [ 16.558472] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.558499] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.558530] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.558560] ? __kthread_parkme+0x82/0x180 [ 16.558587] ? preempt_count_sub+0x50/0x80 [ 16.558617] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.558672] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.558701] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.558730] kthread+0x337/0x6f0 [ 16.558756] ? trace_preempt_on+0x20/0xc0 [ 16.558822] ? __pfx_kthread+0x10/0x10 [ 16.558849] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.558878] ? calculate_sigpending+0x7b/0xa0 [ 16.558908] ? __pfx_kthread+0x10/0x10 [ 16.558935] ret_from_fork+0x116/0x1d0 [ 16.558959] ? __pfx_kthread+0x10/0x10 [ 16.558985] ret_from_fork_asm+0x1a/0x30 [ 16.559024] </TASK> [ 16.559039] [ 16.574642] Allocated by task 283: [ 16.575391] kasan_save_stack+0x45/0x70 [ 16.575992] kasan_save_track+0x18/0x40 [ 16.576285] kasan_save_alloc_info+0x3b/0x50 [ 16.576472] __kasan_kmalloc+0xb7/0xc0 [ 16.576636] __kmalloc_cache_noprof+0x189/0x420 [ 16.577099] kasan_atomics+0x95/0x310 [ 16.577528] kunit_try_run_case+0x1a5/0x480 [ 16.578108] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.578715] kthread+0x337/0x6f0 [ 16.579187] ret_from_fork+0x116/0x1d0 [ 16.579618] ret_from_fork_asm+0x1a/0x30 [ 16.580160] [ 16.580260] The buggy address belongs to the object at ffff888103349180 [ 16.580260] which belongs to the cache kmalloc-64 of size 64 [ 16.580789] The buggy address is located 0 bytes to the right of [ 16.580789] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 16.582235] [ 16.582443] The buggy address belongs to the physical page: [ 16.583124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 16.583954] flags: 0x200000000000000(node=0|zone=2) [ 16.584157] page_type: f5(slab) [ 16.584305] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.584575] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.584867] page dumped because: kasan: bad access detected [ 16.585071] [ 16.585155] Memory state around the buggy address: [ 16.585340] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.585591] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.585949] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.586298] ^ [ 16.586503] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.586879] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.587218] ================================================================== [ 16.702340] ================================================================== [ 16.702728] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 16.703514] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 16.704082] [ 16.704213] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.704271] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.704287] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.704315] Call Trace: [ 16.704342] <TASK> [ 16.704367] dump_stack_lvl+0x73/0xb0 [ 16.704402] print_report+0xd1/0x650 [ 16.704431] ? __virt_addr_valid+0x1db/0x2d0 [ 16.704462] ? kasan_atomics_helper+0x72f/0x5450 [ 16.704490] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.704517] ? kasan_atomics_helper+0x72f/0x5450 [ 16.704545] kasan_report+0x141/0x180 [ 16.704574] ? kasan_atomics_helper+0x72f/0x5450 [ 16.704606] kasan_check_range+0x10c/0x1c0 [ 16.704636] __kasan_check_write+0x18/0x20 [ 16.704675] kasan_atomics_helper+0x72f/0x5450 [ 16.704703] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.704732] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.704765] ? kasan_atomics+0x152/0x310 [ 16.704800] kasan_atomics+0x1dc/0x310 [ 16.704831] ? __pfx_kasan_atomics+0x10/0x10 [ 16.704879] ? __pfx_read_tsc+0x10/0x10 [ 16.704907] ? ktime_get_ts64+0x86/0x230 [ 16.704939] kunit_try_run_case+0x1a5/0x480 [ 16.704971] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.704999] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.705030] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.705059] ? __kthread_parkme+0x82/0x180 [ 16.705087] ? preempt_count_sub+0x50/0x80 [ 16.705118] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.705147] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.705177] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.705206] kthread+0x337/0x6f0 [ 16.705232] ? trace_preempt_on+0x20/0xc0 [ 16.705262] ? __pfx_kthread+0x10/0x10 [ 16.705288] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.705315] ? calculate_sigpending+0x7b/0xa0 [ 16.705346] ? __pfx_kthread+0x10/0x10 [ 16.705373] ret_from_fork+0x116/0x1d0 [ 16.705398] ? __pfx_kthread+0x10/0x10 [ 16.705423] ret_from_fork_asm+0x1a/0x30 [ 16.705461] </TASK> [ 16.705475] [ 16.715278] Allocated by task 283: [ 16.715445] kasan_save_stack+0x45/0x70 [ 16.715624] kasan_save_track+0x18/0x40 [ 16.716029] kasan_save_alloc_info+0x3b/0x50 [ 16.716295] __kasan_kmalloc+0xb7/0xc0 [ 16.716527] __kmalloc_cache_noprof+0x189/0x420 [ 16.716810] kasan_atomics+0x95/0x310 [ 16.717045] kunit_try_run_case+0x1a5/0x480 [ 16.717508] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.718594] kthread+0x337/0x6f0 [ 16.718872] ret_from_fork+0x116/0x1d0 [ 16.719106] ret_from_fork_asm+0x1a/0x30 [ 16.719284] [ 16.719377] The buggy address belongs to the object at ffff888103349180 [ 16.719377] which belongs to the cache kmalloc-64 of size 64 [ 16.721432] The buggy address is located 0 bytes to the right of [ 16.721432] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 16.723402] [ 16.723873] The buggy address belongs to the physical page: [ 16.725048] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 16.726353] flags: 0x200000000000000(node=0|zone=2) [ 16.727168] page_type: f5(slab) [ 16.727615] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.728967] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.729256] page dumped because: kasan: bad access detected [ 16.729471] [ 16.729562] Memory state around the buggy address: [ 16.730164] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.731048] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.731900] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.732665] ^ [ 16.733275] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.733594] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.734592] ================================================================== [ 17.182099] ================================================================== [ 17.182475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 17.182906] Read of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 17.183293] [ 17.183415] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.183471] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.183488] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.183517] Call Trace: [ 17.183539] <TASK> [ 17.183561] dump_stack_lvl+0x73/0xb0 [ 17.183596] print_report+0xd1/0x650 [ 17.183623] ? __virt_addr_valid+0x1db/0x2d0 [ 17.183923] ? kasan_atomics_helper+0x4a1c/0x5450 [ 17.183956] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.183984] ? kasan_atomics_helper+0x4a1c/0x5450 [ 17.184012] kasan_report+0x141/0x180 [ 17.184040] ? kasan_atomics_helper+0x4a1c/0x5450 [ 17.184074] __asan_report_load4_noabort+0x18/0x20 [ 17.184121] kasan_atomics_helper+0x4a1c/0x5450 [ 17.184149] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.184191] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.184223] ? kasan_atomics+0x152/0x310 [ 17.184257] kasan_atomics+0x1dc/0x310 [ 17.184296] ? __pfx_kasan_atomics+0x10/0x10 [ 17.184326] ? __pfx_read_tsc+0x10/0x10 [ 17.184352] ? ktime_get_ts64+0x86/0x230 [ 17.184394] kunit_try_run_case+0x1a5/0x480 [ 17.184424] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.184452] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.184492] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.184520] ? __kthread_parkme+0x82/0x180 [ 17.184545] ? preempt_count_sub+0x50/0x80 [ 17.184587] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.184615] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.184644] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.184692] kthread+0x337/0x6f0 [ 17.184718] ? trace_preempt_on+0x20/0xc0 [ 17.184747] ? __pfx_kthread+0x10/0x10 [ 17.184786] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.184830] ? calculate_sigpending+0x7b/0xa0 [ 17.184859] ? __pfx_kthread+0x10/0x10 [ 17.184886] ret_from_fork+0x116/0x1d0 [ 17.184908] ? __pfx_kthread+0x10/0x10 [ 17.184946] ret_from_fork_asm+0x1a/0x30 [ 17.184983] </TASK> [ 17.185010] [ 17.194432] Allocated by task 283: [ 17.194638] kasan_save_stack+0x45/0x70 [ 17.194939] kasan_save_track+0x18/0x40 [ 17.195150] kasan_save_alloc_info+0x3b/0x50 [ 17.195412] __kasan_kmalloc+0xb7/0xc0 [ 17.195676] __kmalloc_cache_noprof+0x189/0x420 [ 17.195995] kasan_atomics+0x95/0x310 [ 17.196253] kunit_try_run_case+0x1a5/0x480 [ 17.196468] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.196786] kthread+0x337/0x6f0 [ 17.197006] ret_from_fork+0x116/0x1d0 [ 17.197188] ret_from_fork_asm+0x1a/0x30 [ 17.197361] [ 17.197452] The buggy address belongs to the object at ffff888103349180 [ 17.197452] which belongs to the cache kmalloc-64 of size 64 [ 17.198010] The buggy address is located 0 bytes to the right of [ 17.198010] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 17.198708] [ 17.198883] The buggy address belongs to the physical page: [ 17.199145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 17.199439] flags: 0x200000000000000(node=0|zone=2) [ 17.199703] page_type: f5(slab) [ 17.199945] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.200392] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.200750] page dumped because: kasan: bad access detected [ 17.201057] [ 17.201194] Memory state around the buggy address: [ 17.201452] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.201845] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.202241] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.202509] ^ [ 17.202859] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.203675] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.204675] ================================================================== [ 18.208048] ================================================================== [ 18.208436] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 18.208877] Read of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 18.209151] [ 18.209292] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 18.209361] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.209379] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.209407] Call Trace: [ 18.209444] <TASK> [ 18.209468] dump_stack_lvl+0x73/0xb0 [ 18.209507] print_report+0xd1/0x650 [ 18.209535] ? __virt_addr_valid+0x1db/0x2d0 [ 18.209564] ? kasan_atomics_helper+0x5115/0x5450 [ 18.209592] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.209622] ? kasan_atomics_helper+0x5115/0x5450 [ 18.209662] kasan_report+0x141/0x180 [ 18.209692] ? kasan_atomics_helper+0x5115/0x5450 [ 18.209724] __asan_report_load8_noabort+0x18/0x20 [ 18.209755] kasan_atomics_helper+0x5115/0x5450 [ 18.209798] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.209826] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.209870] ? kasan_atomics+0x152/0x310 [ 18.209904] kasan_atomics+0x1dc/0x310 [ 18.209947] ? __pfx_kasan_atomics+0x10/0x10 [ 18.209977] ? __pfx_read_tsc+0x10/0x10 [ 18.210004] ? ktime_get_ts64+0x86/0x230 [ 18.210035] kunit_try_run_case+0x1a5/0x480 [ 18.210066] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.210105] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.210135] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.210176] ? __kthread_parkme+0x82/0x180 [ 18.210203] ? preempt_count_sub+0x50/0x80 [ 18.210233] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.210263] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.210292] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.210332] kthread+0x337/0x6f0 [ 18.210357] ? trace_preempt_on+0x20/0xc0 [ 18.210399] ? __pfx_kthread+0x10/0x10 [ 18.210430] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.210457] ? calculate_sigpending+0x7b/0xa0 [ 18.210487] ? __pfx_kthread+0x10/0x10 [ 18.210515] ret_from_fork+0x116/0x1d0 [ 18.210539] ? __pfx_kthread+0x10/0x10 [ 18.210564] ret_from_fork_asm+0x1a/0x30 [ 18.210604] </TASK> [ 18.210618] [ 18.222178] Allocated by task 283: [ 18.222567] kasan_save_stack+0x45/0x70 [ 18.222966] kasan_save_track+0x18/0x40 [ 18.223138] kasan_save_alloc_info+0x3b/0x50 [ 18.223317] __kasan_kmalloc+0xb7/0xc0 [ 18.223477] __kmalloc_cache_noprof+0x189/0x420 [ 18.223679] kasan_atomics+0x95/0x310 [ 18.223972] kunit_try_run_case+0x1a5/0x480 [ 18.224243] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.224562] kthread+0x337/0x6f0 [ 18.224827] ret_from_fork+0x116/0x1d0 [ 18.225063] ret_from_fork_asm+0x1a/0x30 [ 18.225289] [ 18.225408] The buggy address belongs to the object at ffff888103349180 [ 18.225408] which belongs to the cache kmalloc-64 of size 64 [ 18.226198] The buggy address is located 0 bytes to the right of [ 18.226198] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 18.226878] [ 18.227104] The buggy address belongs to the physical page: [ 18.227433] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 18.227914] flags: 0x200000000000000(node=0|zone=2) [ 18.228247] page_type: f5(slab) [ 18.228450] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.228914] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.229289] page dumped because: kasan: bad access detected [ 18.229511] [ 18.229628] Memory state around the buggy address: [ 18.230036] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.230561] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.230881] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.231364] ^ [ 18.231728] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.232334] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.232641] ================================================================== [ 17.529425] ================================================================== [ 17.529777] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 17.530189] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 17.530803] [ 17.531052] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.531110] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.531126] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.531154] Call Trace: [ 17.531176] <TASK> [ 17.531197] dump_stack_lvl+0x73/0xb0 [ 17.531231] print_report+0xd1/0x650 [ 17.531258] ? __virt_addr_valid+0x1db/0x2d0 [ 17.531287] ? kasan_atomics_helper+0x164f/0x5450 [ 17.531313] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.531342] ? kasan_atomics_helper+0x164f/0x5450 [ 17.531372] kasan_report+0x141/0x180 [ 17.531404] ? kasan_atomics_helper+0x164f/0x5450 [ 17.531437] kasan_check_range+0x10c/0x1c0 [ 17.531468] __kasan_check_write+0x18/0x20 [ 17.531492] kasan_atomics_helper+0x164f/0x5450 [ 17.531521] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.531550] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.531581] ? kasan_atomics+0x152/0x310 [ 17.531614] kasan_atomics+0x1dc/0x310 [ 17.531659] ? __pfx_kasan_atomics+0x10/0x10 [ 17.531689] ? __pfx_read_tsc+0x10/0x10 [ 17.531716] ? ktime_get_ts64+0x86/0x230 [ 17.531745] kunit_try_run_case+0x1a5/0x480 [ 17.531784] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.531812] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.531840] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.531869] ? __kthread_parkme+0x82/0x180 [ 17.531895] ? preempt_count_sub+0x50/0x80 [ 17.531924] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.531965] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.531993] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.532035] kthread+0x337/0x6f0 [ 17.532070] ? trace_preempt_on+0x20/0xc0 [ 17.532100] ? __pfx_kthread+0x10/0x10 [ 17.532139] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.532166] ? calculate_sigpending+0x7b/0xa0 [ 17.532195] ? __pfx_kthread+0x10/0x10 [ 17.532222] ret_from_fork+0x116/0x1d0 [ 17.532246] ? __pfx_kthread+0x10/0x10 [ 17.532272] ret_from_fork_asm+0x1a/0x30 [ 17.532311] </TASK> [ 17.532325] [ 17.541883] Allocated by task 283: [ 17.542050] kasan_save_stack+0x45/0x70 [ 17.542262] kasan_save_track+0x18/0x40 [ 17.542519] kasan_save_alloc_info+0x3b/0x50 [ 17.542780] __kasan_kmalloc+0xb7/0xc0 [ 17.543049] __kmalloc_cache_noprof+0x189/0x420 [ 17.543310] kasan_atomics+0x95/0x310 [ 17.543506] kunit_try_run_case+0x1a5/0x480 [ 17.543798] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.544080] kthread+0x337/0x6f0 [ 17.544289] ret_from_fork+0x116/0x1d0 [ 17.544503] ret_from_fork_asm+0x1a/0x30 [ 17.544756] [ 17.544886] The buggy address belongs to the object at ffff888103349180 [ 17.544886] which belongs to the cache kmalloc-64 of size 64 [ 17.545361] The buggy address is located 0 bytes to the right of [ 17.545361] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 17.546024] [ 17.546172] The buggy address belongs to the physical page: [ 17.546398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 17.546799] flags: 0x200000000000000(node=0|zone=2) [ 17.547090] page_type: f5(slab) [ 17.547325] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.547732] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.548201] page dumped because: kasan: bad access detected [ 17.548530] [ 17.548634] Memory state around the buggy address: [ 17.549059] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.549424] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.549806] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.550174] ^ [ 17.550439] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.550859] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.551236] ================================================================== [ 16.589893] ================================================================== [ 16.590289] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 16.590679] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 16.591281] [ 16.591403] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.591462] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.591480] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.591508] Call Trace: [ 16.591532] <TASK> [ 16.591557] dump_stack_lvl+0x73/0xb0 [ 16.591596] print_report+0xd1/0x650 [ 16.591625] ? __virt_addr_valid+0x1db/0x2d0 [ 16.591671] ? kasan_atomics_helper+0x4b3a/0x5450 [ 16.591698] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.591726] ? kasan_atomics_helper+0x4b3a/0x5450 [ 16.591753] kasan_report+0x141/0x180 [ 16.592004] ? kasan_atomics_helper+0x4b3a/0x5450 [ 16.592038] __asan_report_store4_noabort+0x1b/0x30 [ 16.592064] kasan_atomics_helper+0x4b3a/0x5450 [ 16.592093] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.592121] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.592154] ? kasan_atomics+0x152/0x310 [ 16.592189] kasan_atomics+0x1dc/0x310 [ 16.592218] ? __pfx_kasan_atomics+0x10/0x10 [ 16.592248] ? __pfx_read_tsc+0x10/0x10 [ 16.592276] ? ktime_get_ts64+0x86/0x230 [ 16.592307] kunit_try_run_case+0x1a5/0x480 [ 16.592338] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.592366] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.592396] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.592425] ? __kthread_parkme+0x82/0x180 [ 16.592452] ? preempt_count_sub+0x50/0x80 [ 16.592483] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.592513] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.592541] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.592569] kthread+0x337/0x6f0 [ 16.592594] ? trace_preempt_on+0x20/0xc0 [ 16.592623] ? __pfx_kthread+0x10/0x10 [ 16.592664] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.592690] ? calculate_sigpending+0x7b/0xa0 [ 16.592721] ? __pfx_kthread+0x10/0x10 [ 16.592747] ret_from_fork+0x116/0x1d0 [ 16.592867] ? __pfx_kthread+0x10/0x10 [ 16.592896] ret_from_fork_asm+0x1a/0x30 [ 16.592936] </TASK> [ 16.592951] [ 16.605587] Allocated by task 283: [ 16.606357] kasan_save_stack+0x45/0x70 [ 16.606584] kasan_save_track+0x18/0x40 [ 16.607068] kasan_save_alloc_info+0x3b/0x50 [ 16.607284] __kasan_kmalloc+0xb7/0xc0 [ 16.607679] __kmalloc_cache_noprof+0x189/0x420 [ 16.608341] kasan_atomics+0x95/0x310 [ 16.608580] kunit_try_run_case+0x1a5/0x480 [ 16.609070] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.609486] kthread+0x337/0x6f0 [ 16.609825] ret_from_fork+0x116/0x1d0 [ 16.610190] ret_from_fork_asm+0x1a/0x30 [ 16.610598] [ 16.610744] The buggy address belongs to the object at ffff888103349180 [ 16.610744] which belongs to the cache kmalloc-64 of size 64 [ 16.611732] The buggy address is located 0 bytes to the right of [ 16.611732] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 16.612760] [ 16.613147] The buggy address belongs to the physical page: [ 16.613528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 16.614068] flags: 0x200000000000000(node=0|zone=2) [ 16.614484] page_type: f5(slab) [ 16.614644] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.615348] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.615848] page dumped because: kasan: bad access detected [ 16.616266] [ 16.616507] Memory state around the buggy address: [ 16.616777] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.617373] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.618012] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.618379] ^ [ 16.618778] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.619560] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.620172] ================================================================== [ 17.984839] ================================================================== [ 17.985499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 17.985973] Read of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 17.986244] [ 17.986352] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.986408] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.986429] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.986475] Call Trace: [ 17.986499] <TASK> [ 17.986522] dump_stack_lvl+0x73/0xb0 [ 17.986558] print_report+0xd1/0x650 [ 17.986586] ? __virt_addr_valid+0x1db/0x2d0 [ 17.986615] ? kasan_atomics_helper+0x4f71/0x5450 [ 17.986642] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.986684] ? kasan_atomics_helper+0x4f71/0x5450 [ 17.986712] kasan_report+0x141/0x180 [ 17.986741] ? kasan_atomics_helper+0x4f71/0x5450 [ 17.986775] __asan_report_load8_noabort+0x18/0x20 [ 17.986807] kasan_atomics_helper+0x4f71/0x5450 [ 17.986836] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.986865] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.986897] ? kasan_atomics+0x152/0x310 [ 17.986932] kasan_atomics+0x1dc/0x310 [ 17.986960] ? __pfx_kasan_atomics+0x10/0x10 [ 17.986991] ? __pfx_read_tsc+0x10/0x10 [ 17.987019] ? ktime_get_ts64+0x86/0x230 [ 17.987049] kunit_try_run_case+0x1a5/0x480 [ 17.987081] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.987109] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.987139] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.987168] ? __kthread_parkme+0x82/0x180 [ 17.987194] ? preempt_count_sub+0x50/0x80 [ 17.987224] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.987254] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.987283] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.987313] kthread+0x337/0x6f0 [ 17.987338] ? trace_preempt_on+0x20/0xc0 [ 17.987368] ? __pfx_kthread+0x10/0x10 [ 17.987395] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.987422] ? calculate_sigpending+0x7b/0xa0 [ 17.987452] ? __pfx_kthread+0x10/0x10 [ 17.987480] ret_from_fork+0x116/0x1d0 [ 17.987504] ? __pfx_kthread+0x10/0x10 [ 17.987531] ret_from_fork_asm+0x1a/0x30 [ 17.987570] </TASK> [ 17.987585] [ 17.997180] Allocated by task 283: [ 17.997383] kasan_save_stack+0x45/0x70 [ 17.997655] kasan_save_track+0x18/0x40 [ 17.997960] kasan_save_alloc_info+0x3b/0x50 [ 17.998145] __kasan_kmalloc+0xb7/0xc0 [ 17.998309] __kmalloc_cache_noprof+0x189/0x420 [ 17.998505] kasan_atomics+0x95/0x310 [ 17.998685] kunit_try_run_case+0x1a5/0x480 [ 17.998989] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.999299] kthread+0x337/0x6f0 [ 17.999503] ret_from_fork+0x116/0x1d0 [ 17.999741] ret_from_fork_asm+0x1a/0x30 [ 17.999979] [ 18.000097] The buggy address belongs to the object at ffff888103349180 [ 18.000097] which belongs to the cache kmalloc-64 of size 64 [ 18.000564] The buggy address is located 0 bytes to the right of [ 18.000564] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 18.001613] [ 18.001747] The buggy address belongs to the physical page: [ 18.002018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 18.002400] flags: 0x200000000000000(node=0|zone=2) [ 18.002681] page_type: f5(slab) [ 18.002878] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.003245] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.003602] page dumped because: kasan: bad access detected [ 18.003926] [ 18.004045] Memory state around the buggy address: [ 18.004292] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.004667] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.005046] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.005369] ^ [ 18.005638] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.006043] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.006329] ================================================================== [ 17.657770] ================================================================== [ 17.659463] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 17.660215] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 17.660504] [ 17.660619] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.660695] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.660711] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.660740] Call Trace: [ 17.660766] <TASK> [ 17.660789] dump_stack_lvl+0x73/0xb0 [ 17.660937] print_report+0xd1/0x650 [ 17.660967] ? __virt_addr_valid+0x1db/0x2d0 [ 17.661045] ? kasan_atomics_helper+0x194a/0x5450 [ 17.661073] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.661158] ? kasan_atomics_helper+0x194a/0x5450 [ 17.661186] kasan_report+0x141/0x180 [ 17.661229] ? kasan_atomics_helper+0x194a/0x5450 [ 17.661262] kasan_check_range+0x10c/0x1c0 [ 17.661293] __kasan_check_write+0x18/0x20 [ 17.661318] kasan_atomics_helper+0x194a/0x5450 [ 17.661347] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.661375] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.661407] ? kasan_atomics+0x152/0x310 [ 17.661440] kasan_atomics+0x1dc/0x310 [ 17.661469] ? __pfx_kasan_atomics+0x10/0x10 [ 17.661499] ? __pfx_read_tsc+0x10/0x10 [ 17.661527] ? ktime_get_ts64+0x86/0x230 [ 17.661557] kunit_try_run_case+0x1a5/0x480 [ 17.661588] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.661615] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.661656] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.661684] ? __kthread_parkme+0x82/0x180 [ 17.661708] ? preempt_count_sub+0x50/0x80 [ 17.661739] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.661778] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.661806] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.661836] kthread+0x337/0x6f0 [ 17.661861] ? trace_preempt_on+0x20/0xc0 [ 17.661890] ? __pfx_kthread+0x10/0x10 [ 17.661916] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.661943] ? calculate_sigpending+0x7b/0xa0 [ 17.661973] ? __pfx_kthread+0x10/0x10 [ 17.661999] ret_from_fork+0x116/0x1d0 [ 17.662024] ? __pfx_kthread+0x10/0x10 [ 17.662049] ret_from_fork_asm+0x1a/0x30 [ 17.662087] </TASK> [ 17.662103] [ 17.677274] Allocated by task 283: [ 17.677787] kasan_save_stack+0x45/0x70 [ 17.678280] kasan_save_track+0x18/0x40 [ 17.678731] kasan_save_alloc_info+0x3b/0x50 [ 17.679232] __kasan_kmalloc+0xb7/0xc0 [ 17.679665] __kmalloc_cache_noprof+0x189/0x420 [ 17.679947] kasan_atomics+0x95/0x310 [ 17.680394] kunit_try_run_case+0x1a5/0x480 [ 17.680896] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.681568] kthread+0x337/0x6f0 [ 17.681731] ret_from_fork+0x116/0x1d0 [ 17.682178] ret_from_fork_asm+0x1a/0x30 [ 17.682633] [ 17.682867] The buggy address belongs to the object at ffff888103349180 [ 17.682867] which belongs to the cache kmalloc-64 of size 64 [ 17.683744] The buggy address is located 0 bytes to the right of [ 17.683744] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 17.684188] [ 17.684282] The buggy address belongs to the physical page: [ 17.684496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 17.685113] flags: 0x200000000000000(node=0|zone=2) [ 17.685688] page_type: f5(slab) [ 17.686200] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.687112] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.687940] page dumped because: kasan: bad access detected [ 17.688755] [ 17.688983] Memory state around the buggy address: [ 17.689525] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.690516] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.691276] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.692050] ^ [ 17.692574] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.693169] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.693625] ================================================================== [ 16.948172] ================================================================== [ 16.948523] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 16.949158] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 16.949563] [ 16.949696] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.949755] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.949772] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.949802] Call Trace: [ 16.949827] <TASK> [ 16.949853] dump_stack_lvl+0x73/0xb0 [ 16.949936] print_report+0xd1/0x650 [ 16.949965] ? __virt_addr_valid+0x1db/0x2d0 [ 16.950010] ? kasan_atomics_helper+0xc70/0x5450 [ 16.950037] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.950065] ? kasan_atomics_helper+0xc70/0x5450 [ 16.950092] kasan_report+0x141/0x180 [ 16.950213] ? kasan_atomics_helper+0xc70/0x5450 [ 16.950262] kasan_check_range+0x10c/0x1c0 [ 16.950292] __kasan_check_write+0x18/0x20 [ 16.950317] kasan_atomics_helper+0xc70/0x5450 [ 16.950345] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.950373] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.950408] ? kasan_atomics+0x152/0x310 [ 16.950448] kasan_atomics+0x1dc/0x310 [ 16.950477] ? __pfx_kasan_atomics+0x10/0x10 [ 16.950508] ? __pfx_read_tsc+0x10/0x10 [ 16.950537] ? ktime_get_ts64+0x86/0x230 [ 16.950567] kunit_try_run_case+0x1a5/0x480 [ 16.950635] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.950683] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.950748] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.950854] ? __kthread_parkme+0x82/0x180 [ 16.950886] ? preempt_count_sub+0x50/0x80 [ 16.950917] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.950947] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.950977] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.951007] kthread+0x337/0x6f0 [ 16.951032] ? trace_preempt_on+0x20/0xc0 [ 16.951063] ? __pfx_kthread+0x10/0x10 [ 16.951088] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.951114] ? calculate_sigpending+0x7b/0xa0 [ 16.951145] ? __pfx_kthread+0x10/0x10 [ 16.951171] ret_from_fork+0x116/0x1d0 [ 16.951195] ? __pfx_kthread+0x10/0x10 [ 16.951221] ret_from_fork_asm+0x1a/0x30 [ 16.951260] </TASK> [ 16.951275] [ 16.963173] Allocated by task 283: [ 16.963509] kasan_save_stack+0x45/0x70 [ 16.964153] kasan_save_track+0x18/0x40 [ 16.964363] kasan_save_alloc_info+0x3b/0x50 [ 16.964549] __kasan_kmalloc+0xb7/0xc0 [ 16.964892] __kmalloc_cache_noprof+0x189/0x420 [ 16.965191] kasan_atomics+0x95/0x310 [ 16.965389] kunit_try_run_case+0x1a5/0x480 [ 16.965639] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.966002] kthread+0x337/0x6f0 [ 16.966205] ret_from_fork+0x116/0x1d0 [ 16.966426] ret_from_fork_asm+0x1a/0x30 [ 16.966667] [ 16.966865] The buggy address belongs to the object at ffff888103349180 [ 16.966865] which belongs to the cache kmalloc-64 of size 64 [ 16.967492] The buggy address is located 0 bytes to the right of [ 16.967492] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 16.968005] [ 16.968132] The buggy address belongs to the physical page: [ 16.968508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 16.968968] flags: 0x200000000000000(node=0|zone=2) [ 16.969349] page_type: f5(slab) [ 16.969535] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.969836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.970320] page dumped because: kasan: bad access detected [ 16.970658] [ 16.970780] Memory state around the buggy address: [ 16.971514] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.971941] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.972357] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.972720] ^ [ 16.973100] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.973433] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.973867] ================================================================== [ 17.746156] ================================================================== [ 17.746588] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 17.747089] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 17.747470] [ 17.747585] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.747641] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.747672] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.747702] Call Trace: [ 17.747727] <TASK> [ 17.747792] dump_stack_lvl+0x73/0xb0 [ 17.747829] print_report+0xd1/0x650 [ 17.747904] ? __virt_addr_valid+0x1db/0x2d0 [ 17.747934] ? kasan_atomics_helper+0x1b22/0x5450 [ 17.747976] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.748005] ? kasan_atomics_helper+0x1b22/0x5450 [ 17.748033] kasan_report+0x141/0x180 [ 17.748061] ? kasan_atomics_helper+0x1b22/0x5450 [ 17.748094] kasan_check_range+0x10c/0x1c0 [ 17.748141] __kasan_check_write+0x18/0x20 [ 17.748166] kasan_atomics_helper+0x1b22/0x5450 [ 17.748194] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.748223] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.748256] ? kasan_atomics+0x152/0x310 [ 17.748289] kasan_atomics+0x1dc/0x310 [ 17.748318] ? __pfx_kasan_atomics+0x10/0x10 [ 17.748348] ? __pfx_read_tsc+0x10/0x10 [ 17.748376] ? ktime_get_ts64+0x86/0x230 [ 17.748405] kunit_try_run_case+0x1a5/0x480 [ 17.748436] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.748464] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.748495] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.748524] ? __kthread_parkme+0x82/0x180 [ 17.748550] ? preempt_count_sub+0x50/0x80 [ 17.748580] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.748608] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.748637] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.748676] kthread+0x337/0x6f0 [ 17.748701] ? trace_preempt_on+0x20/0xc0 [ 17.748742] ? __pfx_kthread+0x10/0x10 [ 17.748781] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.748820] ? calculate_sigpending+0x7b/0xa0 [ 17.748851] ? __pfx_kthread+0x10/0x10 [ 17.748878] ret_from_fork+0x116/0x1d0 [ 17.748902] ? __pfx_kthread+0x10/0x10 [ 17.748928] ret_from_fork_asm+0x1a/0x30 [ 17.748967] </TASK> [ 17.748981] [ 17.758690] Allocated by task 283: [ 17.758959] kasan_save_stack+0x45/0x70 [ 17.759242] kasan_save_track+0x18/0x40 [ 17.759490] kasan_save_alloc_info+0x3b/0x50 [ 17.759733] __kasan_kmalloc+0xb7/0xc0 [ 17.759984] __kmalloc_cache_noprof+0x189/0x420 [ 17.760171] kasan_atomics+0x95/0x310 [ 17.760371] kunit_try_run_case+0x1a5/0x480 [ 17.760618] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.760983] kthread+0x337/0x6f0 [ 17.761156] ret_from_fork+0x116/0x1d0 [ 17.761402] ret_from_fork_asm+0x1a/0x30 [ 17.761569] [ 17.761667] The buggy address belongs to the object at ffff888103349180 [ 17.761667] which belongs to the cache kmalloc-64 of size 64 [ 17.762369] The buggy address is located 0 bytes to the right of [ 17.762369] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 17.762934] [ 17.763055] The buggy address belongs to the physical page: [ 17.763382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 17.763824] flags: 0x200000000000000(node=0|zone=2) [ 17.764044] page_type: f5(slab) [ 17.764252] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.764699] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.765129] page dumped because: kasan: bad access detected [ 17.765403] [ 17.765518] Memory state around the buggy address: [ 17.765744] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.768133] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.768638] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.769837] ^ [ 17.770636] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.771822] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.772320] ================================================================== [ 16.974548] ================================================================== [ 16.975073] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 16.975564] Read of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 16.975961] [ 16.976242] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.976304] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.976322] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.976351] Call Trace: [ 16.976377] <TASK> [ 16.976401] dump_stack_lvl+0x73/0xb0 [ 16.976468] print_report+0xd1/0x650 [ 16.976497] ? __virt_addr_valid+0x1db/0x2d0 [ 16.976527] ? kasan_atomics_helper+0x4a84/0x5450 [ 16.976554] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.976604] ? kasan_atomics_helper+0x4a84/0x5450 [ 16.976633] kasan_report+0x141/0x180 [ 16.976682] ? kasan_atomics_helper+0x4a84/0x5450 [ 16.976715] __asan_report_load4_noabort+0x18/0x20 [ 16.976747] kasan_atomics_helper+0x4a84/0x5450 [ 16.976786] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.976866] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.976900] ? kasan_atomics+0x152/0x310 [ 16.976934] kasan_atomics+0x1dc/0x310 [ 16.977008] ? __pfx_kasan_atomics+0x10/0x10 [ 16.977041] ? __pfx_read_tsc+0x10/0x10 [ 16.977096] ? ktime_get_ts64+0x86/0x230 [ 16.977128] kunit_try_run_case+0x1a5/0x480 [ 16.977161] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.977190] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.977220] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.977250] ? __kthread_parkme+0x82/0x180 [ 16.977277] ? preempt_count_sub+0x50/0x80 [ 16.977307] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.977338] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.977367] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.977397] kthread+0x337/0x6f0 [ 16.977421] ? trace_preempt_on+0x20/0xc0 [ 16.977451] ? __pfx_kthread+0x10/0x10 [ 16.977477] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.977504] ? calculate_sigpending+0x7b/0xa0 [ 16.977534] ? __pfx_kthread+0x10/0x10 [ 16.977561] ret_from_fork+0x116/0x1d0 [ 16.977586] ? __pfx_kthread+0x10/0x10 [ 16.977611] ret_from_fork_asm+0x1a/0x30 [ 16.977661] </TASK> [ 16.977675] [ 16.988217] Allocated by task 283: [ 16.988580] kasan_save_stack+0x45/0x70 [ 16.988995] kasan_save_track+0x18/0x40 [ 16.989287] kasan_save_alloc_info+0x3b/0x50 [ 16.989661] __kasan_kmalloc+0xb7/0xc0 [ 16.989841] __kmalloc_cache_noprof+0x189/0x420 [ 16.990031] kasan_atomics+0x95/0x310 [ 16.990194] kunit_try_run_case+0x1a5/0x480 [ 16.990526] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.990912] kthread+0x337/0x6f0 [ 16.991128] ret_from_fork+0x116/0x1d0 [ 16.991354] ret_from_fork_asm+0x1a/0x30 [ 16.991579] [ 16.991683] The buggy address belongs to the object at ffff888103349180 [ 16.991683] which belongs to the cache kmalloc-64 of size 64 [ 16.992432] The buggy address is located 0 bytes to the right of [ 16.992432] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 16.993506] [ 16.993629] The buggy address belongs to the physical page: [ 16.994072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 16.994500] flags: 0x200000000000000(node=0|zone=2) [ 16.994827] page_type: f5(slab) [ 16.995149] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.995558] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.996112] page dumped because: kasan: bad access detected [ 16.996416] [ 16.996618] Memory state around the buggy address: [ 16.997217] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.997588] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.998132] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.998465] ^ [ 16.998808] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.999265] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.999830] ================================================================== [ 17.034558] ================================================================== [ 17.035032] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 17.035414] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 17.036061] [ 17.036636] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.036732] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.036750] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.036786] Call Trace: [ 17.036904] <TASK> [ 17.036937] dump_stack_lvl+0x73/0xb0 [ 17.036978] print_report+0xd1/0x650 [ 17.037006] ? __virt_addr_valid+0x1db/0x2d0 [ 17.037037] ? kasan_atomics_helper+0xde0/0x5450 [ 17.037064] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.037091] ? kasan_atomics_helper+0xde0/0x5450 [ 17.037120] kasan_report+0x141/0x180 [ 17.037149] ? kasan_atomics_helper+0xde0/0x5450 [ 17.037182] kasan_check_range+0x10c/0x1c0 [ 17.037211] __kasan_check_write+0x18/0x20 [ 17.037236] kasan_atomics_helper+0xde0/0x5450 [ 17.037265] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.037292] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.037325] ? kasan_atomics+0x152/0x310 [ 17.037359] kasan_atomics+0x1dc/0x310 [ 17.037388] ? __pfx_kasan_atomics+0x10/0x10 [ 17.037418] ? __pfx_read_tsc+0x10/0x10 [ 17.037445] ? ktime_get_ts64+0x86/0x230 [ 17.037476] kunit_try_run_case+0x1a5/0x480 [ 17.037508] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.037537] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.037567] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.037597] ? __kthread_parkme+0x82/0x180 [ 17.037623] ? preempt_count_sub+0x50/0x80 [ 17.037668] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.037698] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.037728] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.037757] kthread+0x337/0x6f0 [ 17.037783] ? trace_preempt_on+0x20/0xc0 [ 17.037864] ? __pfx_kthread+0x10/0x10 [ 17.037891] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.037919] ? calculate_sigpending+0x7b/0xa0 [ 17.037949] ? __pfx_kthread+0x10/0x10 [ 17.037976] ret_from_fork+0x116/0x1d0 [ 17.037999] ? __pfx_kthread+0x10/0x10 [ 17.038026] ret_from_fork_asm+0x1a/0x30 [ 17.038065] </TASK> [ 17.038081] [ 17.048787] Allocated by task 283: [ 17.049127] kasan_save_stack+0x45/0x70 [ 17.049341] kasan_save_track+0x18/0x40 [ 17.049577] kasan_save_alloc_info+0x3b/0x50 [ 17.050035] __kasan_kmalloc+0xb7/0xc0 [ 17.050268] __kmalloc_cache_noprof+0x189/0x420 [ 17.050547] kasan_atomics+0x95/0x310 [ 17.050803] kunit_try_run_case+0x1a5/0x480 [ 17.051125] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.051431] kthread+0x337/0x6f0 [ 17.051631] ret_from_fork+0x116/0x1d0 [ 17.052138] ret_from_fork_asm+0x1a/0x30 [ 17.052558] [ 17.052724] The buggy address belongs to the object at ffff888103349180 [ 17.052724] which belongs to the cache kmalloc-64 of size 64 [ 17.053392] The buggy address is located 0 bytes to the right of [ 17.053392] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 17.054094] [ 17.054301] The buggy address belongs to the physical page: [ 17.054621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 17.055077] flags: 0x200000000000000(node=0|zone=2) [ 17.055289] page_type: f5(slab) [ 17.055444] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.055911] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.056515] page dumped because: kasan: bad access detected [ 17.056787] [ 17.056915] Memory state around the buggy address: [ 17.057222] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.057624] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.057903] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.058253] ^ [ 17.058539] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.058953] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.059999] ================================================================== [ 16.735597] ================================================================== [ 16.735988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 16.736442] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 16.736866] [ 16.737072] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.737133] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.737150] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.737194] Call Trace: [ 16.737220] <TASK> [ 16.737246] dump_stack_lvl+0x73/0xb0 [ 16.737302] print_report+0xd1/0x650 [ 16.737332] ? __virt_addr_valid+0x1db/0x2d0 [ 16.737362] ? kasan_atomics_helper+0x7c7/0x5450 [ 16.737389] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.737420] ? kasan_atomics_helper+0x7c7/0x5450 [ 16.737446] kasan_report+0x141/0x180 [ 16.737475] ? kasan_atomics_helper+0x7c7/0x5450 [ 16.737508] kasan_check_range+0x10c/0x1c0 [ 16.737538] __kasan_check_write+0x18/0x20 [ 16.737563] kasan_atomics_helper+0x7c7/0x5450 [ 16.737600] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.737628] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.737680] ? kasan_atomics+0x152/0x310 [ 16.737714] kasan_atomics+0x1dc/0x310 [ 16.737743] ? __pfx_kasan_atomics+0x10/0x10 [ 16.737788] ? __pfx_read_tsc+0x10/0x10 [ 16.737817] ? ktime_get_ts64+0x86/0x230 [ 16.737848] kunit_try_run_case+0x1a5/0x480 [ 16.737879] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.737908] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.737939] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.737969] ? __kthread_parkme+0x82/0x180 [ 16.737995] ? preempt_count_sub+0x50/0x80 [ 16.738025] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.738054] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.738084] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.738114] kthread+0x337/0x6f0 [ 16.738169] ? trace_preempt_on+0x20/0xc0 [ 16.738199] ? __pfx_kthread+0x10/0x10 [ 16.738226] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.738308] ? calculate_sigpending+0x7b/0xa0 [ 16.738341] ? __pfx_kthread+0x10/0x10 [ 16.738369] ret_from_fork+0x116/0x1d0 [ 16.738394] ? __pfx_kthread+0x10/0x10 [ 16.738425] ret_from_fork_asm+0x1a/0x30 [ 16.738465] </TASK> [ 16.738481] [ 16.751140] Allocated by task 283: [ 16.751381] kasan_save_stack+0x45/0x70 [ 16.751620] kasan_save_track+0x18/0x40 [ 16.752218] kasan_save_alloc_info+0x3b/0x50 [ 16.752476] __kasan_kmalloc+0xb7/0xc0 [ 16.752707] __kmalloc_cache_noprof+0x189/0x420 [ 16.753009] kasan_atomics+0x95/0x310 [ 16.753359] kunit_try_run_case+0x1a5/0x480 [ 16.753586] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.754334] kthread+0x337/0x6f0 [ 16.754519] ret_from_fork+0x116/0x1d0 [ 16.754772] ret_from_fork_asm+0x1a/0x30 [ 16.755096] [ 16.755200] The buggy address belongs to the object at ffff888103349180 [ 16.755200] which belongs to the cache kmalloc-64 of size 64 [ 16.756408] The buggy address is located 0 bytes to the right of [ 16.756408] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 16.757318] [ 16.757452] The buggy address belongs to the physical page: [ 16.757997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 16.758531] flags: 0x200000000000000(node=0|zone=2) [ 16.758825] page_type: f5(slab) [ 16.759332] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.759914] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.760217] page dumped because: kasan: bad access detected [ 16.760431] [ 16.760520] Memory state around the buggy address: [ 16.760736] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.761465] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.761781] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.762363] ^ [ 16.762809] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.763276] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.763592] ================================================================== [ 16.439291] ================================================================== [ 16.439738] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 16.440764] Read of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 16.441563] [ 16.441702] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.441762] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.441788] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.441816] Call Trace: [ 16.441836] <TASK> [ 16.441859] dump_stack_lvl+0x73/0xb0 [ 16.441895] print_report+0xd1/0x650 [ 16.441922] ? __virt_addr_valid+0x1db/0x2d0 [ 16.441950] ? kasan_atomics_helper+0x4b88/0x5450 [ 16.441975] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.442001] ? kasan_atomics_helper+0x4b88/0x5450 [ 16.442026] kasan_report+0x141/0x180 [ 16.442052] ? kasan_atomics_helper+0x4b88/0x5450 [ 16.442084] __asan_report_load4_noabort+0x18/0x20 [ 16.442113] kasan_atomics_helper+0x4b88/0x5450 [ 16.442140] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.442166] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.442195] ? kasan_atomics+0x152/0x310 [ 16.442227] kasan_atomics+0x1dc/0x310 [ 16.442253] ? __pfx_kasan_atomics+0x10/0x10 [ 16.442282] ? __pfx_read_tsc+0x10/0x10 [ 16.442307] ? ktime_get_ts64+0x86/0x230 [ 16.442336] kunit_try_run_case+0x1a5/0x480 [ 16.442365] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.442390] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.442423] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.442450] ? __kthread_parkme+0x82/0x180 [ 16.442474] ? preempt_count_sub+0x50/0x80 [ 16.442503] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.442529] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.442555] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.442583] kthread+0x337/0x6f0 [ 16.442608] ? trace_preempt_on+0x20/0xc0 [ 16.442791] ? __pfx_kthread+0x10/0x10 [ 16.442820] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.442868] ? calculate_sigpending+0x7b/0xa0 [ 16.442899] ? __pfx_kthread+0x10/0x10 [ 16.442927] ret_from_fork+0x116/0x1d0 [ 16.442953] ? __pfx_kthread+0x10/0x10 [ 16.442979] ret_from_fork_asm+0x1a/0x30 [ 16.443019] </TASK> [ 16.443034] [ 16.455244] Allocated by task 283: [ 16.455449] kasan_save_stack+0x45/0x70 [ 16.455724] kasan_save_track+0x18/0x40 [ 16.455984] kasan_save_alloc_info+0x3b/0x50 [ 16.456242] __kasan_kmalloc+0xb7/0xc0 [ 16.456405] __kmalloc_cache_noprof+0x189/0x420 [ 16.456594] kasan_atomics+0x95/0x310 [ 16.456782] kunit_try_run_case+0x1a5/0x480 [ 16.457034] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.457353] kthread+0x337/0x6f0 [ 16.457561] ret_from_fork+0x116/0x1d0 [ 16.457880] ret_from_fork_asm+0x1a/0x30 [ 16.458095] [ 16.458217] The buggy address belongs to the object at ffff888103349180 [ 16.458217] which belongs to the cache kmalloc-64 of size 64 [ 16.458722] The buggy address is located 0 bytes to the right of [ 16.458722] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 16.459521] [ 16.459644] The buggy address belongs to the physical page: [ 16.459967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 16.460466] flags: 0x200000000000000(node=0|zone=2) [ 16.460705] page_type: f5(slab) [ 16.461185] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.461572] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.462067] page dumped because: kasan: bad access detected [ 16.462350] [ 16.462457] Memory state around the buggy address: [ 16.462756] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.463164] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.463504] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.463931] ^ [ 16.464175] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.464528] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.464848] ================================================================== [ 17.365507] ================================================================== [ 17.365933] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 17.366349] Read of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 17.366713] [ 17.366860] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.366920] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.366938] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.366967] Call Trace: [ 17.366993] <TASK> [ 17.367019] dump_stack_lvl+0x73/0xb0 [ 17.367055] print_report+0xd1/0x650 [ 17.367085] ? __virt_addr_valid+0x1db/0x2d0 [ 17.367116] ? kasan_atomics_helper+0x13b5/0x5450 [ 17.367143] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.367171] ? kasan_atomics_helper+0x13b5/0x5450 [ 17.367199] kasan_report+0x141/0x180 [ 17.367227] ? kasan_atomics_helper+0x13b5/0x5450 [ 17.367261] kasan_check_range+0x10c/0x1c0 [ 17.367291] __kasan_check_read+0x15/0x20 [ 17.367315] kasan_atomics_helper+0x13b5/0x5450 [ 17.367343] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.367374] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.367407] ? kasan_atomics+0x152/0x310 [ 17.367442] kasan_atomics+0x1dc/0x310 [ 17.367471] ? __pfx_kasan_atomics+0x10/0x10 [ 17.367502] ? __pfx_read_tsc+0x10/0x10 [ 17.367529] ? ktime_get_ts64+0x86/0x230 [ 17.367560] kunit_try_run_case+0x1a5/0x480 [ 17.367591] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.367620] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.367665] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.367694] ? __kthread_parkme+0x82/0x180 [ 17.367719] ? preempt_count_sub+0x50/0x80 [ 17.367750] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.367795] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.367824] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.367853] kthread+0x337/0x6f0 [ 17.367878] ? trace_preempt_on+0x20/0xc0 [ 17.367908] ? __pfx_kthread+0x10/0x10 [ 17.367934] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.367961] ? calculate_sigpending+0x7b/0xa0 [ 17.367991] ? __pfx_kthread+0x10/0x10 [ 17.368018] ret_from_fork+0x116/0x1d0 [ 17.368041] ? __pfx_kthread+0x10/0x10 [ 17.368067] ret_from_fork_asm+0x1a/0x30 [ 17.368105] </TASK> [ 17.368121] [ 17.377321] Allocated by task 283: [ 17.377527] kasan_save_stack+0x45/0x70 [ 17.377768] kasan_save_track+0x18/0x40 [ 17.377982] kasan_save_alloc_info+0x3b/0x50 [ 17.378246] __kasan_kmalloc+0xb7/0xc0 [ 17.378448] __kmalloc_cache_noprof+0x189/0x420 [ 17.378708] kasan_atomics+0x95/0x310 [ 17.378876] kunit_try_run_case+0x1a5/0x480 [ 17.379088] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.379404] kthread+0x337/0x6f0 [ 17.379578] ret_from_fork+0x116/0x1d0 [ 17.379752] ret_from_fork_asm+0x1a/0x30 [ 17.379956] [ 17.380079] The buggy address belongs to the object at ffff888103349180 [ 17.380079] which belongs to the cache kmalloc-64 of size 64 [ 17.380741] The buggy address is located 0 bytes to the right of [ 17.380741] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 17.381342] [ 17.381463] The buggy address belongs to the physical page: [ 17.381744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 17.382120] flags: 0x200000000000000(node=0|zone=2) [ 17.382407] page_type: f5(slab) [ 17.382570] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.383010] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.383368] page dumped because: kasan: bad access detected [ 17.383658] [ 17.383764] Memory state around the buggy address: [ 17.383994] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.384258] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.384519] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.384855] ^ [ 17.385223] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.385600] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.385920] ================================================================== [ 17.425411] ================================================================== [ 17.425800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 17.426611] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 17.427067] [ 17.427204] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.427263] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.427281] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.427311] Call Trace: [ 17.427337] <TASK> [ 17.427364] dump_stack_lvl+0x73/0xb0 [ 17.427403] print_report+0xd1/0x650 [ 17.427434] ? __virt_addr_valid+0x1db/0x2d0 [ 17.427465] ? kasan_atomics_helper+0x1467/0x5450 [ 17.427493] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.427521] ? kasan_atomics_helper+0x1467/0x5450 [ 17.427550] kasan_report+0x141/0x180 [ 17.427580] ? kasan_atomics_helper+0x1467/0x5450 [ 17.427613] kasan_check_range+0x10c/0x1c0 [ 17.427643] __kasan_check_write+0x18/0x20 [ 17.427684] kasan_atomics_helper+0x1467/0x5450 [ 17.427712] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.427742] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.427775] ? kasan_atomics+0x152/0x310 [ 17.427809] kasan_atomics+0x1dc/0x310 [ 17.427838] ? __pfx_kasan_atomics+0x10/0x10 [ 17.427869] ? __pfx_read_tsc+0x10/0x10 [ 17.427897] ? ktime_get_ts64+0x86/0x230 [ 17.427927] kunit_try_run_case+0x1a5/0x480 [ 17.427960] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.427988] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.428019] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.428049] ? __kthread_parkme+0x82/0x180 [ 17.428074] ? preempt_count_sub+0x50/0x80 [ 17.428106] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.428137] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.428166] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.428196] kthread+0x337/0x6f0 [ 17.428221] ? trace_preempt_on+0x20/0xc0 [ 17.428251] ? __pfx_kthread+0x10/0x10 [ 17.428278] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.428304] ? calculate_sigpending+0x7b/0xa0 [ 17.428335] ? __pfx_kthread+0x10/0x10 [ 17.428363] ret_from_fork+0x116/0x1d0 [ 17.428387] ? __pfx_kthread+0x10/0x10 [ 17.428412] ret_from_fork_asm+0x1a/0x30 [ 17.428453] </TASK> [ 17.428470] [ 17.439983] Allocated by task 283: [ 17.440456] kasan_save_stack+0x45/0x70 [ 17.440692] kasan_save_track+0x18/0x40 [ 17.441070] kasan_save_alloc_info+0x3b/0x50 [ 17.441309] __kasan_kmalloc+0xb7/0xc0 [ 17.441528] __kmalloc_cache_noprof+0x189/0x420 [ 17.442130] kasan_atomics+0x95/0x310 [ 17.442370] kunit_try_run_case+0x1a5/0x480 [ 17.442722] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.443139] kthread+0x337/0x6f0 [ 17.443521] ret_from_fork+0x116/0x1d0 [ 17.443765] ret_from_fork_asm+0x1a/0x30 [ 17.444114] [ 17.444213] The buggy address belongs to the object at ffff888103349180 [ 17.444213] which belongs to the cache kmalloc-64 of size 64 [ 17.445119] The buggy address is located 0 bytes to the right of [ 17.445119] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 17.445826] [ 17.445977] The buggy address belongs to the physical page: [ 17.446369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 17.446993] flags: 0x200000000000000(node=0|zone=2) [ 17.447361] page_type: f5(slab) [ 17.447541] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.448245] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.448756] page dumped because: kasan: bad access detected [ 17.449183] [ 17.449308] Memory state around the buggy address: [ 17.449745] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.450140] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.450523] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.451212] ^ [ 17.451475] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.451993] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.452475] ================================================================== [ 17.880983] ================================================================== [ 17.882236] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 17.883098] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 17.884026] [ 17.884429] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.884493] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.884512] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.884542] Call Trace: [ 17.884569] <TASK> [ 17.884596] dump_stack_lvl+0x73/0xb0 [ 17.884634] print_report+0xd1/0x650 [ 17.884678] ? __virt_addr_valid+0x1db/0x2d0 [ 17.884708] ? kasan_atomics_helper+0x1d7a/0x5450 [ 17.884736] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.884772] ? kasan_atomics_helper+0x1d7a/0x5450 [ 17.884800] kasan_report+0x141/0x180 [ 17.884829] ? kasan_atomics_helper+0x1d7a/0x5450 [ 17.884863] kasan_check_range+0x10c/0x1c0 [ 17.884892] __kasan_check_write+0x18/0x20 [ 17.884917] kasan_atomics_helper+0x1d7a/0x5450 [ 17.884945] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.884973] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.885031] ? kasan_atomics+0x152/0x310 [ 17.885064] kasan_atomics+0x1dc/0x310 [ 17.885092] ? __pfx_kasan_atomics+0x10/0x10 [ 17.885123] ? __pfx_read_tsc+0x10/0x10 [ 17.885150] ? ktime_get_ts64+0x86/0x230 [ 17.885181] kunit_try_run_case+0x1a5/0x480 [ 17.885213] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.885242] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.885272] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.885301] ? __kthread_parkme+0x82/0x180 [ 17.885328] ? preempt_count_sub+0x50/0x80 [ 17.885358] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.885387] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.885416] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.885445] kthread+0x337/0x6f0 [ 17.885472] ? trace_preempt_on+0x20/0xc0 [ 17.885503] ? __pfx_kthread+0x10/0x10 [ 17.885529] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.885556] ? calculate_sigpending+0x7b/0xa0 [ 17.885586] ? __pfx_kthread+0x10/0x10 [ 17.885613] ret_from_fork+0x116/0x1d0 [ 17.885636] ? __pfx_kthread+0x10/0x10 [ 17.885674] ret_from_fork_asm+0x1a/0x30 [ 17.885714] </TASK> [ 17.885731] [ 17.897506] Allocated by task 283: [ 17.897785] kasan_save_stack+0x45/0x70 [ 17.898036] kasan_save_track+0x18/0x40 [ 17.898207] kasan_save_alloc_info+0x3b/0x50 [ 17.898400] __kasan_kmalloc+0xb7/0xc0 [ 17.898624] __kmalloc_cache_noprof+0x189/0x420 [ 17.898943] kasan_atomics+0x95/0x310 [ 17.899210] kunit_try_run_case+0x1a5/0x480 [ 17.899699] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.900036] kthread+0x337/0x6f0 [ 17.900187] ret_from_fork+0x116/0x1d0 [ 17.900416] ret_from_fork_asm+0x1a/0x30 [ 17.900667] [ 17.900814] The buggy address belongs to the object at ffff888103349180 [ 17.900814] which belongs to the cache kmalloc-64 of size 64 [ 17.901278] The buggy address is located 0 bytes to the right of [ 17.901278] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 17.902069] [ 17.902189] The buggy address belongs to the physical page: [ 17.902457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 17.902977] flags: 0x200000000000000(node=0|zone=2) [ 17.903279] page_type: f5(slab) [ 17.903454] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.903780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.904184] page dumped because: kasan: bad access detected [ 17.904440] [ 17.904561] Memory state around the buggy address: [ 17.904886] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.905229] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.905546] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.905934] ^ [ 17.906232] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.906639] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.907069] ================================================================== [ 18.036144] ================================================================== [ 18.036583] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 18.037987] Read of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 18.038455] [ 18.038602] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 18.038713] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.038732] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.038762] Call Trace: [ 18.038803] <TASK> [ 18.038828] dump_stack_lvl+0x73/0xb0 [ 18.038867] print_report+0xd1/0x650 [ 18.038918] ? __virt_addr_valid+0x1db/0x2d0 [ 18.038961] ? kasan_atomics_helper+0x4f98/0x5450 [ 18.038988] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.039031] ? kasan_atomics_helper+0x4f98/0x5450 [ 18.039058] kasan_report+0x141/0x180 [ 18.039087] ? kasan_atomics_helper+0x4f98/0x5450 [ 18.039120] __asan_report_load8_noabort+0x18/0x20 [ 18.039150] kasan_atomics_helper+0x4f98/0x5450 [ 18.039211] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.039239] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.039284] ? kasan_atomics+0x152/0x310 [ 18.039318] kasan_atomics+0x1dc/0x310 [ 18.039347] ? __pfx_kasan_atomics+0x10/0x10 [ 18.039408] ? __pfx_read_tsc+0x10/0x10 [ 18.039435] ? ktime_get_ts64+0x86/0x230 [ 18.039479] kunit_try_run_case+0x1a5/0x480 [ 18.039511] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.039539] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.039571] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.039600] ? __kthread_parkme+0x82/0x180 [ 18.039627] ? preempt_count_sub+0x50/0x80 [ 18.039668] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.039697] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.039726] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.039755] kthread+0x337/0x6f0 [ 18.039790] ? trace_preempt_on+0x20/0xc0 [ 18.039822] ? __pfx_kthread+0x10/0x10 [ 18.039848] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.039874] ? calculate_sigpending+0x7b/0xa0 [ 18.039905] ? __pfx_kthread+0x10/0x10 [ 18.039932] ret_from_fork+0x116/0x1d0 [ 18.039956] ? __pfx_kthread+0x10/0x10 [ 18.039982] ret_from_fork_asm+0x1a/0x30 [ 18.040022] </TASK> [ 18.040038] [ 18.053614] Allocated by task 283: [ 18.053988] kasan_save_stack+0x45/0x70 [ 18.054302] kasan_save_track+0x18/0x40 [ 18.054597] kasan_save_alloc_info+0x3b/0x50 [ 18.054974] __kasan_kmalloc+0xb7/0xc0 [ 18.055193] __kmalloc_cache_noprof+0x189/0x420 [ 18.055465] kasan_atomics+0x95/0x310 [ 18.055814] kunit_try_run_case+0x1a5/0x480 [ 18.056045] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.056395] kthread+0x337/0x6f0 [ 18.056592] ret_from_fork+0x116/0x1d0 [ 18.056884] ret_from_fork_asm+0x1a/0x30 [ 18.057152] [ 18.057281] The buggy address belongs to the object at ffff888103349180 [ 18.057281] which belongs to the cache kmalloc-64 of size 64 [ 18.057956] The buggy address is located 0 bytes to the right of [ 18.057956] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 18.058685] [ 18.058849] The buggy address belongs to the physical page: [ 18.059114] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 18.059578] flags: 0x200000000000000(node=0|zone=2) [ 18.059958] page_type: f5(slab) [ 18.060201] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.060613] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.061071] page dumped because: kasan: bad access detected [ 18.061444] [ 18.061603] Memory state around the buggy address: [ 18.061885] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.062390] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.062940] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.063276] ^ [ 18.063625] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.064217] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.064616] ================================================================== [ 17.158630] ================================================================== [ 17.159054] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 17.159417] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 17.159965] [ 17.160130] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.160186] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.160203] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.160233] Call Trace: [ 17.160266] <TASK> [ 17.160287] dump_stack_lvl+0x73/0xb0 [ 17.160337] print_report+0xd1/0x650 [ 17.160365] ? __virt_addr_valid+0x1db/0x2d0 [ 17.160394] ? kasan_atomics_helper+0x1079/0x5450 [ 17.160421] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.160460] ? kasan_atomics_helper+0x1079/0x5450 [ 17.160488] kasan_report+0x141/0x180 [ 17.160528] ? kasan_atomics_helper+0x1079/0x5450 [ 17.160562] kasan_check_range+0x10c/0x1c0 [ 17.160592] __kasan_check_write+0x18/0x20 [ 17.160617] kasan_atomics_helper+0x1079/0x5450 [ 17.160673] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.160700] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.160731] ? kasan_atomics+0x152/0x310 [ 17.160764] kasan_atomics+0x1dc/0x310 [ 17.160806] ? __pfx_kasan_atomics+0x10/0x10 [ 17.160836] ? __pfx_read_tsc+0x10/0x10 [ 17.160863] ? ktime_get_ts64+0x86/0x230 [ 17.160904] kunit_try_run_case+0x1a5/0x480 [ 17.160934] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.160974] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.161004] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.161032] ? __kthread_parkme+0x82/0x180 [ 17.161056] ? preempt_count_sub+0x50/0x80 [ 17.161086] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.161116] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.161144] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.161173] kthread+0x337/0x6f0 [ 17.161197] ? trace_preempt_on+0x20/0xc0 [ 17.161237] ? __pfx_kthread+0x10/0x10 [ 17.161262] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.161288] ? calculate_sigpending+0x7b/0xa0 [ 17.161330] ? __pfx_kthread+0x10/0x10 [ 17.161358] ret_from_fork+0x116/0x1d0 [ 17.161382] ? __pfx_kthread+0x10/0x10 [ 17.161407] ret_from_fork_asm+0x1a/0x30 [ 17.161445] </TASK> [ 17.161459] [ 17.170835] Allocated by task 283: [ 17.171057] kasan_save_stack+0x45/0x70 [ 17.171293] kasan_save_track+0x18/0x40 [ 17.171531] kasan_save_alloc_info+0x3b/0x50 [ 17.171793] __kasan_kmalloc+0xb7/0xc0 [ 17.172010] __kmalloc_cache_noprof+0x189/0x420 [ 17.172268] kasan_atomics+0x95/0x310 [ 17.172502] kunit_try_run_case+0x1a5/0x480 [ 17.172765] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.173137] kthread+0x337/0x6f0 [ 17.173285] ret_from_fork+0x116/0x1d0 [ 17.173479] ret_from_fork_asm+0x1a/0x30 [ 17.173741] [ 17.173858] The buggy address belongs to the object at ffff888103349180 [ 17.173858] which belongs to the cache kmalloc-64 of size 64 [ 17.174597] The buggy address is located 0 bytes to the right of [ 17.174597] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 17.175317] [ 17.175408] The buggy address belongs to the physical page: [ 17.175622] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 17.176461] flags: 0x200000000000000(node=0|zone=2) [ 17.176781] page_type: f5(slab) [ 17.177002] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.177335] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.177611] page dumped because: kasan: bad access detected [ 17.177881] [ 17.178017] Memory state around the buggy address: [ 17.178327] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.178778] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.179299] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.179741] ^ [ 17.179947] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.180525] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.181541] ================================================================== [ 18.006980] ================================================================== [ 18.007411] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 18.007981] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 18.008344] [ 18.008476] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 18.008533] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.008551] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.008579] Call Trace: [ 18.008603] <TASK> [ 18.008626] dump_stack_lvl+0x73/0xb0 [ 18.008674] print_report+0xd1/0x650 [ 18.008701] ? __virt_addr_valid+0x1db/0x2d0 [ 18.008732] ? kasan_atomics_helper+0x2006/0x5450 [ 18.008760] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.008788] ? kasan_atomics_helper+0x2006/0x5450 [ 18.008816] kasan_report+0x141/0x180 [ 18.008844] ? kasan_atomics_helper+0x2006/0x5450 [ 18.008877] kasan_check_range+0x10c/0x1c0 [ 18.008907] __kasan_check_write+0x18/0x20 [ 18.008933] kasan_atomics_helper+0x2006/0x5450 [ 18.008962] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.008990] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.009021] ? kasan_atomics+0x152/0x310 [ 18.009056] kasan_atomics+0x1dc/0x310 [ 18.009085] ? __pfx_kasan_atomics+0x10/0x10 [ 18.009116] ? __pfx_read_tsc+0x10/0x10 [ 18.009144] ? ktime_get_ts64+0x86/0x230 [ 18.009174] kunit_try_run_case+0x1a5/0x480 [ 18.009205] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.009233] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.009263] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.009292] ? __kthread_parkme+0x82/0x180 [ 18.009318] ? preempt_count_sub+0x50/0x80 [ 18.009349] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.009378] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.009407] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.009437] kthread+0x337/0x6f0 [ 18.009462] ? trace_preempt_on+0x20/0xc0 [ 18.009492] ? __pfx_kthread+0x10/0x10 [ 18.009519] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.009548] ? calculate_sigpending+0x7b/0xa0 [ 18.009579] ? __pfx_kthread+0x10/0x10 [ 18.009607] ret_from_fork+0x116/0x1d0 [ 18.009631] ? __pfx_kthread+0x10/0x10 [ 18.009668] ret_from_fork_asm+0x1a/0x30 [ 18.009707] </TASK> [ 18.009723] [ 18.022398] Allocated by task 283: [ 18.023088] kasan_save_stack+0x45/0x70 [ 18.023298] kasan_save_track+0x18/0x40 [ 18.023469] kasan_save_alloc_info+0x3b/0x50 [ 18.023672] __kasan_kmalloc+0xb7/0xc0 [ 18.024199] __kmalloc_cache_noprof+0x189/0x420 [ 18.024753] kasan_atomics+0x95/0x310 [ 18.025096] kunit_try_run_case+0x1a5/0x480 [ 18.025426] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.025662] kthread+0x337/0x6f0 [ 18.025848] ret_from_fork+0x116/0x1d0 [ 18.026362] ret_from_fork_asm+0x1a/0x30 [ 18.026894] [ 18.027137] The buggy address belongs to the object at ffff888103349180 [ 18.027137] which belongs to the cache kmalloc-64 of size 64 [ 18.028509] The buggy address is located 0 bytes to the right of [ 18.028509] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 18.029371] [ 18.029614] The buggy address belongs to the physical page: [ 18.030302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 18.030878] flags: 0x200000000000000(node=0|zone=2) [ 18.031090] page_type: f5(slab) [ 18.031241] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.031523] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.031882] page dumped because: kasan: bad access detected [ 18.032143] [ 18.032254] Memory state around the buggy address: [ 18.032530] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.032951] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.033317] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.033731] ^ [ 18.033979] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.034386] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.034822] ================================================================== [ 18.092592] ================================================================== [ 18.092917] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 18.093355] Read of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 18.093720] [ 18.093880] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 18.093939] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.093958] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.093986] Call Trace: [ 18.094009] <TASK> [ 18.094032] dump_stack_lvl+0x73/0xb0 [ 18.094068] print_report+0xd1/0x650 [ 18.094096] ? __virt_addr_valid+0x1db/0x2d0 [ 18.094124] ? kasan_atomics_helper+0x4fb2/0x5450 [ 18.094153] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.094180] ? kasan_atomics_helper+0x4fb2/0x5450 [ 18.094208] kasan_report+0x141/0x180 [ 18.094236] ? kasan_atomics_helper+0x4fb2/0x5450 [ 18.094269] __asan_report_load8_noabort+0x18/0x20 [ 18.094299] kasan_atomics_helper+0x4fb2/0x5450 [ 18.094327] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.094355] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.094386] ? kasan_atomics+0x152/0x310 [ 18.094425] kasan_atomics+0x1dc/0x310 [ 18.094454] ? __pfx_kasan_atomics+0x10/0x10 [ 18.094483] ? __pfx_read_tsc+0x10/0x10 [ 18.094510] ? ktime_get_ts64+0x86/0x230 [ 18.094540] kunit_try_run_case+0x1a5/0x480 [ 18.094571] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.094600] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.094630] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.094674] ? __kthread_parkme+0x82/0x180 [ 18.094700] ? preempt_count_sub+0x50/0x80 [ 18.094730] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.094760] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.094789] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.094818] kthread+0x337/0x6f0 [ 18.094843] ? trace_preempt_on+0x20/0xc0 [ 18.094873] ? __pfx_kthread+0x10/0x10 [ 18.094899] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.094925] ? calculate_sigpending+0x7b/0xa0 [ 18.094956] ? __pfx_kthread+0x10/0x10 [ 18.094982] ret_from_fork+0x116/0x1d0 [ 18.095006] ? __pfx_kthread+0x10/0x10 [ 18.095032] ret_from_fork_asm+0x1a/0x30 [ 18.095071] </TASK> [ 18.095086] [ 18.103712] Allocated by task 283: [ 18.103955] kasan_save_stack+0x45/0x70 [ 18.104185] kasan_save_track+0x18/0x40 [ 18.104416] kasan_save_alloc_info+0x3b/0x50 [ 18.104631] __kasan_kmalloc+0xb7/0xc0 [ 18.104877] __kmalloc_cache_noprof+0x189/0x420 [ 18.105140] kasan_atomics+0x95/0x310 [ 18.105318] kunit_try_run_case+0x1a5/0x480 [ 18.105502] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.105860] kthread+0x337/0x6f0 [ 18.106066] ret_from_fork+0x116/0x1d0 [ 18.106290] ret_from_fork_asm+0x1a/0x30 [ 18.106541] [ 18.106666] The buggy address belongs to the object at ffff888103349180 [ 18.106666] which belongs to the cache kmalloc-64 of size 64 [ 18.107390] The buggy address is located 0 bytes to the right of [ 18.107390] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 18.108022] [ 18.108116] The buggy address belongs to the physical page: [ 18.108329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 18.108622] flags: 0x200000000000000(node=0|zone=2) [ 18.108917] page_type: f5(slab) [ 18.109122] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.109826] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.110120] page dumped because: kasan: bad access detected [ 18.110338] [ 18.110434] Memory state around the buggy address: [ 18.110625] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.111035] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.111425] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.111814] ^ [ 18.112090] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.112489] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.112970] ================================================================== [ 17.453987] ================================================================== [ 17.454363] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 17.454928] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 17.455260] [ 17.455404] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.455464] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.455481] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.455509] Call Trace: [ 17.455533] <TASK> [ 17.455557] dump_stack_lvl+0x73/0xb0 [ 17.455592] print_report+0xd1/0x650 [ 17.455620] ? __virt_addr_valid+0x1db/0x2d0 [ 17.455664] ? kasan_atomics_helper+0x50d4/0x5450 [ 17.455691] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.455721] ? kasan_atomics_helper+0x50d4/0x5450 [ 17.455749] kasan_report+0x141/0x180 [ 17.455776] ? kasan_atomics_helper+0x50d4/0x5450 [ 17.455809] __asan_report_store8_noabort+0x1b/0x30 [ 17.455835] kasan_atomics_helper+0x50d4/0x5450 [ 17.455863] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.455889] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.455921] ? kasan_atomics+0x152/0x310 [ 17.455954] kasan_atomics+0x1dc/0x310 [ 17.455982] ? __pfx_kasan_atomics+0x10/0x10 [ 17.456012] ? __pfx_read_tsc+0x10/0x10 [ 17.456038] ? ktime_get_ts64+0x86/0x230 [ 17.456068] kunit_try_run_case+0x1a5/0x480 [ 17.456099] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.456126] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.456156] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.456185] ? __kthread_parkme+0x82/0x180 [ 17.456211] ? preempt_count_sub+0x50/0x80 [ 17.456240] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.456269] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.456297] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.456326] kthread+0x337/0x6f0 [ 17.456349] ? trace_preempt_on+0x20/0xc0 [ 17.456379] ? __pfx_kthread+0x10/0x10 [ 17.456405] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.456431] ? calculate_sigpending+0x7b/0xa0 [ 17.456461] ? __pfx_kthread+0x10/0x10 [ 17.456487] ret_from_fork+0x116/0x1d0 [ 17.456510] ? __pfx_kthread+0x10/0x10 [ 17.456536] ret_from_fork_asm+0x1a/0x30 [ 17.456574] </TASK> [ 17.456588] [ 17.469175] Allocated by task 283: [ 17.469507] kasan_save_stack+0x45/0x70 [ 17.470220] kasan_save_track+0x18/0x40 [ 17.470457] kasan_save_alloc_info+0x3b/0x50 [ 17.470693] __kasan_kmalloc+0xb7/0xc0 [ 17.471195] __kmalloc_cache_noprof+0x189/0x420 [ 17.471658] kasan_atomics+0x95/0x310 [ 17.472018] kunit_try_run_case+0x1a5/0x480 [ 17.472452] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.472751] kthread+0x337/0x6f0 [ 17.472942] ret_from_fork+0x116/0x1d0 [ 17.473150] ret_from_fork_asm+0x1a/0x30 [ 17.473363] [ 17.473475] The buggy address belongs to the object at ffff888103349180 [ 17.473475] which belongs to the cache kmalloc-64 of size 64 [ 17.474499] The buggy address is located 0 bytes to the right of [ 17.474499] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 17.475626] [ 17.475915] The buggy address belongs to the physical page: [ 17.476351] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 17.476762] flags: 0x200000000000000(node=0|zone=2) [ 17.477284] page_type: f5(slab) [ 17.477631] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.478149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.478527] page dumped because: kasan: bad access detected [ 17.479101] [ 17.479377] Memory state around the buggy address: [ 17.479859] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.480354] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.481027] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.481472] ^ [ 17.481727] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.482512] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.483430] ================================================================== [ 17.060555] ================================================================== [ 17.061513] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 17.061955] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 17.062406] [ 17.062587] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.062658] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.062676] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.062706] Call Trace: [ 17.062743] <TASK> [ 17.062769] dump_stack_lvl+0x73/0xb0 [ 17.062806] print_report+0xd1/0x650 [ 17.062905] ? __virt_addr_valid+0x1db/0x2d0 [ 17.062940] ? kasan_atomics_helper+0xe78/0x5450 [ 17.062966] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.063008] ? kasan_atomics_helper+0xe78/0x5450 [ 17.063034] kasan_report+0x141/0x180 [ 17.063076] ? kasan_atomics_helper+0xe78/0x5450 [ 17.063108] kasan_check_range+0x10c/0x1c0 [ 17.063138] __kasan_check_write+0x18/0x20 [ 17.063161] kasan_atomics_helper+0xe78/0x5450 [ 17.063200] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.063229] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.063273] ? kasan_atomics+0x152/0x310 [ 17.063306] kasan_atomics+0x1dc/0x310 [ 17.063335] ? __pfx_kasan_atomics+0x10/0x10 [ 17.063364] ? __pfx_read_tsc+0x10/0x10 [ 17.063392] ? ktime_get_ts64+0x86/0x230 [ 17.063423] kunit_try_run_case+0x1a5/0x480 [ 17.063454] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.063481] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.063510] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.063540] ? __kthread_parkme+0x82/0x180 [ 17.063565] ? preempt_count_sub+0x50/0x80 [ 17.063594] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.063625] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.063664] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.063694] kthread+0x337/0x6f0 [ 17.063718] ? trace_preempt_on+0x20/0xc0 [ 17.063748] ? __pfx_kthread+0x10/0x10 [ 17.063774] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.063801] ? calculate_sigpending+0x7b/0xa0 [ 17.063831] ? __pfx_kthread+0x10/0x10 [ 17.063858] ret_from_fork+0x116/0x1d0 [ 17.063882] ? __pfx_kthread+0x10/0x10 [ 17.063908] ret_from_fork_asm+0x1a/0x30 [ 17.063947] </TASK> [ 17.063962] [ 17.074158] Allocated by task 283: [ 17.074335] kasan_save_stack+0x45/0x70 [ 17.074519] kasan_save_track+0x18/0x40 [ 17.074740] kasan_save_alloc_info+0x3b/0x50 [ 17.074939] __kasan_kmalloc+0xb7/0xc0 [ 17.075096] __kmalloc_cache_noprof+0x189/0x420 [ 17.075279] kasan_atomics+0x95/0x310 [ 17.075438] kunit_try_run_case+0x1a5/0x480 [ 17.075759] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.076092] kthread+0x337/0x6f0 [ 17.076394] ret_from_fork+0x116/0x1d0 [ 17.076671] ret_from_fork_asm+0x1a/0x30 [ 17.076978] [ 17.077096] The buggy address belongs to the object at ffff888103349180 [ 17.077096] which belongs to the cache kmalloc-64 of size 64 [ 17.077747] The buggy address is located 0 bytes to the right of [ 17.077747] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 17.078631] [ 17.078787] The buggy address belongs to the physical page: [ 17.080424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 17.080868] flags: 0x200000000000000(node=0|zone=2) [ 17.081153] page_type: f5(slab) [ 17.082620] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.083077] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.083351] page dumped because: kasan: bad access detected [ 17.083557] [ 17.083656] Memory state around the buggy address: [ 17.083903] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.084158] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.084409] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.085549] ^ [ 17.086095] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.086416] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.086937] ================================================================== [ 17.386627] ================================================================== [ 17.387491] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 17.387923] Read of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 17.388330] [ 17.388473] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.388527] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.388543] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.388571] Call Trace: [ 17.388591] <TASK> [ 17.388613] dump_stack_lvl+0x73/0xb0 [ 17.388660] print_report+0xd1/0x650 [ 17.388688] ? __virt_addr_valid+0x1db/0x2d0 [ 17.388718] ? kasan_atomics_helper+0x4eae/0x5450 [ 17.388745] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.388790] ? kasan_atomics_helper+0x4eae/0x5450 [ 17.388817] kasan_report+0x141/0x180 [ 17.388846] ? kasan_atomics_helper+0x4eae/0x5450 [ 17.388879] __asan_report_load8_noabort+0x18/0x20 [ 17.388912] kasan_atomics_helper+0x4eae/0x5450 [ 17.388945] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.388974] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.389005] ? kasan_atomics+0x152/0x310 [ 17.389038] kasan_atomics+0x1dc/0x310 [ 17.389067] ? __pfx_kasan_atomics+0x10/0x10 [ 17.389097] ? __pfx_read_tsc+0x10/0x10 [ 17.389123] ? ktime_get_ts64+0x86/0x230 [ 17.389153] kunit_try_run_case+0x1a5/0x480 [ 17.389182] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.389210] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.389240] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.389268] ? __kthread_parkme+0x82/0x180 [ 17.389294] ? preempt_count_sub+0x50/0x80 [ 17.389323] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.389352] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.389380] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.389409] kthread+0x337/0x6f0 [ 17.389434] ? trace_preempt_on+0x20/0xc0 [ 17.389462] ? __pfx_kthread+0x10/0x10 [ 17.389488] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.389514] ? calculate_sigpending+0x7b/0xa0 [ 17.389543] ? __pfx_kthread+0x10/0x10 [ 17.389570] ret_from_fork+0x116/0x1d0 [ 17.389594] ? __pfx_kthread+0x10/0x10 [ 17.389619] ret_from_fork_asm+0x1a/0x30 [ 17.389681] </TASK> [ 17.389697] [ 17.407900] Allocated by task 283: [ 17.408330] kasan_save_stack+0x45/0x70 [ 17.408808] kasan_save_track+0x18/0x40 [ 17.409250] kasan_save_alloc_info+0x3b/0x50 [ 17.409723] __kasan_kmalloc+0xb7/0xc0 [ 17.410231] __kmalloc_cache_noprof+0x189/0x420 [ 17.410471] kasan_atomics+0x95/0x310 [ 17.410636] kunit_try_run_case+0x1a5/0x480 [ 17.410936] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.411482] kthread+0x337/0x6f0 [ 17.411910] ret_from_fork+0x116/0x1d0 [ 17.412346] ret_from_fork_asm+0x1a/0x30 [ 17.412806] [ 17.413073] The buggy address belongs to the object at ffff888103349180 [ 17.413073] which belongs to the cache kmalloc-64 of size 64 [ 17.414248] The buggy address is located 0 bytes to the right of [ 17.414248] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 17.414711] [ 17.414873] The buggy address belongs to the physical page: [ 17.415467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 17.416542] flags: 0x200000000000000(node=0|zone=2) [ 17.417273] page_type: f5(slab) [ 17.417662] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.418757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.419639] page dumped because: kasan: bad access detected [ 17.419953] [ 17.420170] Memory state around the buggy address: [ 17.420720] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.421606] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.422500] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.423031] ^ [ 17.423551] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.424011] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.424276] ================================================================== [ 16.654809] ================================================================== [ 16.655296] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 16.655635] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 16.656262] [ 16.656404] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.656462] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.656480] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.656508] Call Trace: [ 16.656534] <TASK> [ 16.656559] dump_stack_lvl+0x73/0xb0 [ 16.656598] print_report+0xd1/0x650 [ 16.656627] ? __virt_addr_valid+0x1db/0x2d0 [ 16.656668] ? kasan_atomics_helper+0x5fe/0x5450 [ 16.656695] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.656724] ? kasan_atomics_helper+0x5fe/0x5450 [ 16.656751] kasan_report+0x141/0x180 [ 16.656779] ? kasan_atomics_helper+0x5fe/0x5450 [ 16.656812] kasan_check_range+0x10c/0x1c0 [ 16.656842] __kasan_check_write+0x18/0x20 [ 16.656866] kasan_atomics_helper+0x5fe/0x5450 [ 16.656894] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.656983] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.657018] ? kasan_atomics+0x152/0x310 [ 16.657052] kasan_atomics+0x1dc/0x310 [ 16.657080] ? __pfx_kasan_atomics+0x10/0x10 [ 16.657110] ? __pfx_read_tsc+0x10/0x10 [ 16.657138] ? ktime_get_ts64+0x86/0x230 [ 16.657169] kunit_try_run_case+0x1a5/0x480 [ 16.657200] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.657228] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.657260] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.657288] ? __kthread_parkme+0x82/0x180 [ 16.657314] ? preempt_count_sub+0x50/0x80 [ 16.657345] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.657375] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.657404] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.657433] kthread+0x337/0x6f0 [ 16.657458] ? trace_preempt_on+0x20/0xc0 [ 16.657488] ? __pfx_kthread+0x10/0x10 [ 16.657514] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.657540] ? calculate_sigpending+0x7b/0xa0 [ 16.657569] ? __pfx_kthread+0x10/0x10 [ 16.657597] ret_from_fork+0x116/0x1d0 [ 16.657621] ? __pfx_kthread+0x10/0x10 [ 16.657660] ret_from_fork_asm+0x1a/0x30 [ 16.657699] </TASK> [ 16.657713] [ 16.667567] Allocated by task 283: [ 16.667888] kasan_save_stack+0x45/0x70 [ 16.668108] kasan_save_track+0x18/0x40 [ 16.668342] kasan_save_alloc_info+0x3b/0x50 [ 16.668556] __kasan_kmalloc+0xb7/0xc0 [ 16.668828] __kmalloc_cache_noprof+0x189/0x420 [ 16.669022] kasan_atomics+0x95/0x310 [ 16.669189] kunit_try_run_case+0x1a5/0x480 [ 16.669441] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.669750] kthread+0x337/0x6f0 [ 16.670015] ret_from_fork+0x116/0x1d0 [ 16.670236] ret_from_fork_asm+0x1a/0x30 [ 16.670454] [ 16.670574] The buggy address belongs to the object at ffff888103349180 [ 16.670574] which belongs to the cache kmalloc-64 of size 64 [ 16.671108] The buggy address is located 0 bytes to the right of [ 16.671108] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 16.671771] [ 16.671863] The buggy address belongs to the physical page: [ 16.672076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 16.672367] flags: 0x200000000000000(node=0|zone=2) [ 16.672780] page_type: f5(slab) [ 16.673049] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.673462] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.673779] page dumped because: kasan: bad access detected [ 16.673988] [ 16.674074] Memory state around the buggy address: [ 16.674264] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.674617] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.675584] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.676352] ^ [ 16.676659] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.677405] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.677755] ================================================================== [ 17.136156] ================================================================== [ 17.136622] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 17.137276] Read of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 17.137640] [ 17.137812] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.137880] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.137897] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.137923] Call Trace: [ 17.137941] <TASK> [ 17.137973] dump_stack_lvl+0x73/0xb0 [ 17.138010] print_report+0xd1/0x650 [ 17.138051] ? __virt_addr_valid+0x1db/0x2d0 [ 17.138080] ? kasan_atomics_helper+0x4a36/0x5450 [ 17.138108] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.138140] ? kasan_atomics_helper+0x4a36/0x5450 [ 17.138180] kasan_report+0x141/0x180 [ 17.138207] ? kasan_atomics_helper+0x4a36/0x5450 [ 17.138254] __asan_report_load4_noabort+0x18/0x20 [ 17.138285] kasan_atomics_helper+0x4a36/0x5450 [ 17.138314] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.138342] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.138385] ? kasan_atomics+0x152/0x310 [ 17.138424] kasan_atomics+0x1dc/0x310 [ 17.138466] ? __pfx_kasan_atomics+0x10/0x10 [ 17.138495] ? __pfx_read_tsc+0x10/0x10 [ 17.138522] ? ktime_get_ts64+0x86/0x230 [ 17.138563] kunit_try_run_case+0x1a5/0x480 [ 17.138592] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.138620] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.138672] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.138701] ? __kthread_parkme+0x82/0x180 [ 17.138738] ? preempt_count_sub+0x50/0x80 [ 17.138782] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.138821] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.138850] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.138879] kthread+0x337/0x6f0 [ 17.138919] ? trace_preempt_on+0x20/0xc0 [ 17.138948] ? __pfx_kthread+0x10/0x10 [ 17.138986] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.139023] ? calculate_sigpending+0x7b/0xa0 [ 17.139053] ? __pfx_kthread+0x10/0x10 [ 17.139079] ret_from_fork+0x116/0x1d0 [ 17.139116] ? __pfx_kthread+0x10/0x10 [ 17.139142] ret_from_fork_asm+0x1a/0x30 [ 17.139195] </TASK> [ 17.139209] [ 17.148491] Allocated by task 283: [ 17.148717] kasan_save_stack+0x45/0x70 [ 17.149205] kasan_save_track+0x18/0x40 [ 17.149381] kasan_save_alloc_info+0x3b/0x50 [ 17.149570] __kasan_kmalloc+0xb7/0xc0 [ 17.149910] __kmalloc_cache_noprof+0x189/0x420 [ 17.150182] kasan_atomics+0x95/0x310 [ 17.150400] kunit_try_run_case+0x1a5/0x480 [ 17.150665] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.150995] kthread+0x337/0x6f0 [ 17.151151] ret_from_fork+0x116/0x1d0 [ 17.151411] ret_from_fork_asm+0x1a/0x30 [ 17.151624] [ 17.151759] The buggy address belongs to the object at ffff888103349180 [ 17.151759] which belongs to the cache kmalloc-64 of size 64 [ 17.152356] The buggy address is located 0 bytes to the right of [ 17.152356] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 17.153044] [ 17.153168] The buggy address belongs to the physical page: [ 17.153470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 17.153945] flags: 0x200000000000000(node=0|zone=2) [ 17.154149] page_type: f5(slab) [ 17.154298] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.154582] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.154997] page dumped because: kasan: bad access detected [ 17.155336] [ 17.155456] Memory state around the buggy address: [ 17.155733] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.156068] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.156329] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.156603] ^ [ 17.157019] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.157435] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.157935] ================================================================== [ 17.506967] ================================================================== [ 17.507410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 17.507938] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 17.508218] [ 17.508326] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.508378] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.508395] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.508424] Call Trace: [ 17.508446] <TASK> [ 17.508465] dump_stack_lvl+0x73/0xb0 [ 17.508499] print_report+0xd1/0x650 [ 17.508541] ? __virt_addr_valid+0x1db/0x2d0 [ 17.508570] ? kasan_atomics_helper+0x15b6/0x5450 [ 17.508596] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.508637] ? kasan_atomics_helper+0x15b6/0x5450 [ 17.508675] kasan_report+0x141/0x180 [ 17.508703] ? kasan_atomics_helper+0x15b6/0x5450 [ 17.508735] kasan_check_range+0x10c/0x1c0 [ 17.508763] __kasan_check_write+0x18/0x20 [ 17.508788] kasan_atomics_helper+0x15b6/0x5450 [ 17.508815] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.508854] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.508897] ? kasan_atomics+0x152/0x310 [ 17.508944] kasan_atomics+0x1dc/0x310 [ 17.508973] ? __pfx_kasan_atomics+0x10/0x10 [ 17.509003] ? __pfx_read_tsc+0x10/0x10 [ 17.509029] ? ktime_get_ts64+0x86/0x230 [ 17.509061] kunit_try_run_case+0x1a5/0x480 [ 17.509092] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.509120] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.509150] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.509180] ? __kthread_parkme+0x82/0x180 [ 17.509206] ? preempt_count_sub+0x50/0x80 [ 17.509236] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.509266] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.509295] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.509324] kthread+0x337/0x6f0 [ 17.509350] ? trace_preempt_on+0x20/0xc0 [ 17.509380] ? __pfx_kthread+0x10/0x10 [ 17.509406] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.509433] ? calculate_sigpending+0x7b/0xa0 [ 17.509475] ? __pfx_kthread+0x10/0x10 [ 17.509503] ret_from_fork+0x116/0x1d0 [ 17.509538] ? __pfx_kthread+0x10/0x10 [ 17.509565] ret_from_fork_asm+0x1a/0x30 [ 17.509603] </TASK> [ 17.509618] [ 17.519323] Allocated by task 283: [ 17.519518] kasan_save_stack+0x45/0x70 [ 17.519710] kasan_save_track+0x18/0x40 [ 17.519877] kasan_save_alloc_info+0x3b/0x50 [ 17.520073] __kasan_kmalloc+0xb7/0xc0 [ 17.520331] __kmalloc_cache_noprof+0x189/0x420 [ 17.520603] kasan_atomics+0x95/0x310 [ 17.520836] kunit_try_run_case+0x1a5/0x480 [ 17.521200] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.521491] kthread+0x337/0x6f0 [ 17.521640] ret_from_fork+0x116/0x1d0 [ 17.521909] ret_from_fork_asm+0x1a/0x30 [ 17.522156] [ 17.522276] The buggy address belongs to the object at ffff888103349180 [ 17.522276] which belongs to the cache kmalloc-64 of size 64 [ 17.523015] The buggy address is located 0 bytes to the right of [ 17.523015] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 17.523692] [ 17.523828] The buggy address belongs to the physical page: [ 17.524111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 17.524512] flags: 0x200000000000000(node=0|zone=2) [ 17.524805] page_type: f5(slab) [ 17.525018] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.525417] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.525743] page dumped because: kasan: bad access detected [ 17.526074] [ 17.526203] Memory state around the buggy address: [ 17.526440] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.526881] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.527246] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.527620] ^ [ 17.527918] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.528276] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.528612] ================================================================== [ 16.920588] ================================================================== [ 16.921261] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 16.921876] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 16.922952] [ 16.923227] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.923287] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.923319] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.923348] Call Trace: [ 16.923373] <TASK> [ 16.923398] dump_stack_lvl+0x73/0xb0 [ 16.923437] print_report+0xd1/0x650 [ 16.923466] ? __virt_addr_valid+0x1db/0x2d0 [ 16.923497] ? kasan_atomics_helper+0xb6a/0x5450 [ 16.923525] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.923555] ? kasan_atomics_helper+0xb6a/0x5450 [ 16.923582] kasan_report+0x141/0x180 [ 16.923610] ? kasan_atomics_helper+0xb6a/0x5450 [ 16.923643] kasan_check_range+0x10c/0x1c0 [ 16.923687] __kasan_check_write+0x18/0x20 [ 16.923725] kasan_atomics_helper+0xb6a/0x5450 [ 16.923754] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.923796] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.923846] ? kasan_atomics+0x152/0x310 [ 16.923896] kasan_atomics+0x1dc/0x310 [ 16.923925] ? __pfx_kasan_atomics+0x10/0x10 [ 16.923956] ? __pfx_read_tsc+0x10/0x10 [ 16.923982] ? ktime_get_ts64+0x86/0x230 [ 16.924012] kunit_try_run_case+0x1a5/0x480 [ 16.924043] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.924069] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.924101] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.924129] ? __kthread_parkme+0x82/0x180 [ 16.924155] ? preempt_count_sub+0x50/0x80 [ 16.924186] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.924215] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.924244] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.924272] kthread+0x337/0x6f0 [ 16.924297] ? trace_preempt_on+0x20/0xc0 [ 16.924326] ? __pfx_kthread+0x10/0x10 [ 16.924351] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.924379] ? calculate_sigpending+0x7b/0xa0 [ 16.924409] ? __pfx_kthread+0x10/0x10 [ 16.924435] ret_from_fork+0x116/0x1d0 [ 16.924459] ? __pfx_kthread+0x10/0x10 [ 16.924484] ret_from_fork_asm+0x1a/0x30 [ 16.924523] </TASK> [ 16.924538] [ 16.936089] Allocated by task 283: [ 16.936489] kasan_save_stack+0x45/0x70 [ 16.936766] kasan_save_track+0x18/0x40 [ 16.937146] kasan_save_alloc_info+0x3b/0x50 [ 16.937379] __kasan_kmalloc+0xb7/0xc0 [ 16.937697] __kmalloc_cache_noprof+0x189/0x420 [ 16.937974] kasan_atomics+0x95/0x310 [ 16.938518] kunit_try_run_case+0x1a5/0x480 [ 16.938795] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.939095] kthread+0x337/0x6f0 [ 16.939293] ret_from_fork+0x116/0x1d0 [ 16.939474] ret_from_fork_asm+0x1a/0x30 [ 16.939715] [ 16.939974] The buggy address belongs to the object at ffff888103349180 [ 16.939974] which belongs to the cache kmalloc-64 of size 64 [ 16.940581] The buggy address is located 0 bytes to the right of [ 16.940581] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 16.941247] [ 16.941429] The buggy address belongs to the physical page: [ 16.941757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 16.942291] flags: 0x200000000000000(node=0|zone=2) [ 16.942589] page_type: f5(slab) [ 16.942842] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.943389] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.943786] page dumped because: kasan: bad access detected [ 16.944459] [ 16.944697] Memory state around the buggy address: [ 16.945054] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.945450] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.945918] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.946252] ^ [ 16.946542] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.947042] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.947378] ================================================================== [ 16.488734] ================================================================== [ 16.489624] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 16.490136] Read of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 16.490526] [ 16.490691] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.490750] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.490769] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.490799] Call Trace: [ 16.490887] <TASK> [ 16.490915] dump_stack_lvl+0x73/0xb0 [ 16.490953] print_report+0xd1/0x650 [ 16.490983] ? __virt_addr_valid+0x1db/0x2d0 [ 16.491013] ? kasan_atomics_helper+0x3df/0x5450 [ 16.491039] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.491069] ? kasan_atomics_helper+0x3df/0x5450 [ 16.491097] kasan_report+0x141/0x180 [ 16.491124] ? kasan_atomics_helper+0x3df/0x5450 [ 16.491158] kasan_check_range+0x10c/0x1c0 [ 16.491188] __kasan_check_read+0x15/0x20 [ 16.491213] kasan_atomics_helper+0x3df/0x5450 [ 16.491241] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.491269] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.491301] ? kasan_atomics+0x152/0x310 [ 16.491334] kasan_atomics+0x1dc/0x310 [ 16.491364] ? __pfx_kasan_atomics+0x10/0x10 [ 16.491395] ? __pfx_read_tsc+0x10/0x10 [ 16.491422] ? ktime_get_ts64+0x86/0x230 [ 16.491453] kunit_try_run_case+0x1a5/0x480 [ 16.491484] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.491512] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.491541] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.491571] ? __kthread_parkme+0x82/0x180 [ 16.491596] ? preempt_count_sub+0x50/0x80 [ 16.491626] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.491670] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.491699] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.491729] kthread+0x337/0x6f0 [ 16.491754] ? trace_preempt_on+0x20/0xc0 [ 16.491784] ? __pfx_kthread+0x10/0x10 [ 16.491809] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.491835] ? calculate_sigpending+0x7b/0xa0 [ 16.491865] ? __pfx_kthread+0x10/0x10 [ 16.491893] ret_from_fork+0x116/0x1d0 [ 16.491916] ? __pfx_kthread+0x10/0x10 [ 16.491941] ret_from_fork_asm+0x1a/0x30 [ 16.491985] </TASK> [ 16.492000] [ 16.502615] Allocated by task 283: [ 16.503750] kasan_save_stack+0x45/0x70 [ 16.504323] kasan_save_track+0x18/0x40 [ 16.504512] kasan_save_alloc_info+0x3b/0x50 [ 16.504710] __kasan_kmalloc+0xb7/0xc0 [ 16.504884] __kmalloc_cache_noprof+0x189/0x420 [ 16.505078] kasan_atomics+0x95/0x310 [ 16.505243] kunit_try_run_case+0x1a5/0x480 [ 16.505424] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.505638] kthread+0x337/0x6f0 [ 16.506871] ret_from_fork+0x116/0x1d0 [ 16.507507] ret_from_fork_asm+0x1a/0x30 [ 16.508376] [ 16.508952] The buggy address belongs to the object at ffff888103349180 [ 16.508952] which belongs to the cache kmalloc-64 of size 64 [ 16.511288] The buggy address is located 0 bytes to the right of [ 16.511288] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 16.512332] [ 16.512442] The buggy address belongs to the physical page: [ 16.512676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 16.513063] flags: 0x200000000000000(node=0|zone=2) [ 16.513398] page_type: f5(slab) [ 16.513595] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.514486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.514987] page dumped because: kasan: bad access detected [ 16.515279] [ 16.515392] Memory state around the buggy address: [ 16.516032] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.516409] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.516921] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.517437] ^ [ 16.517718] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.518287] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.518734] ================================================================== [ 17.206353] ================================================================== [ 17.207087] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 17.207892] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 17.208399] [ 17.208689] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.208746] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.208798] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.208845] Call Trace: [ 17.208911] <TASK> [ 17.208935] dump_stack_lvl+0x73/0xb0 [ 17.208971] print_report+0xd1/0x650 [ 17.209012] ? __virt_addr_valid+0x1db/0x2d0 [ 17.209042] ? kasan_atomics_helper+0x1148/0x5450 [ 17.209069] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.209098] ? kasan_atomics_helper+0x1148/0x5450 [ 17.209125] kasan_report+0x141/0x180 [ 17.209154] ? kasan_atomics_helper+0x1148/0x5450 [ 17.209186] kasan_check_range+0x10c/0x1c0 [ 17.209216] __kasan_check_write+0x18/0x20 [ 17.209242] kasan_atomics_helper+0x1148/0x5450 [ 17.209270] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.209299] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.209332] ? kasan_atomics+0x152/0x310 [ 17.209365] kasan_atomics+0x1dc/0x310 [ 17.209394] ? __pfx_kasan_atomics+0x10/0x10 [ 17.209424] ? __pfx_read_tsc+0x10/0x10 [ 17.209452] ? ktime_get_ts64+0x86/0x230 [ 17.209483] kunit_try_run_case+0x1a5/0x480 [ 17.209514] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.209541] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.209571] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.209600] ? __kthread_parkme+0x82/0x180 [ 17.209626] ? preempt_count_sub+0x50/0x80 [ 17.209667] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.209696] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.209724] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.209754] kthread+0x337/0x6f0 [ 17.209794] ? trace_preempt_on+0x20/0xc0 [ 17.209824] ? __pfx_kthread+0x10/0x10 [ 17.209850] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.209876] ? calculate_sigpending+0x7b/0xa0 [ 17.209906] ? __pfx_kthread+0x10/0x10 [ 17.209933] ret_from_fork+0x116/0x1d0 [ 17.209956] ? __pfx_kthread+0x10/0x10 [ 17.209982] ret_from_fork_asm+0x1a/0x30 [ 17.210020] </TASK> [ 17.210035] [ 17.221431] Allocated by task 283: [ 17.221628] kasan_save_stack+0x45/0x70 [ 17.221931] kasan_save_track+0x18/0x40 [ 17.222194] kasan_save_alloc_info+0x3b/0x50 [ 17.222447] __kasan_kmalloc+0xb7/0xc0 [ 17.222606] __kmalloc_cache_noprof+0x189/0x420 [ 17.222937] kasan_atomics+0x95/0x310 [ 17.223347] kunit_try_run_case+0x1a5/0x480 [ 17.223634] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.223990] kthread+0x337/0x6f0 [ 17.224138] ret_from_fork+0x116/0x1d0 [ 17.224470] ret_from_fork_asm+0x1a/0x30 [ 17.224806] [ 17.225069] The buggy address belongs to the object at ffff888103349180 [ 17.225069] which belongs to the cache kmalloc-64 of size 64 [ 17.225580] The buggy address is located 0 bytes to the right of [ 17.225580] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 17.226490] [ 17.226636] The buggy address belongs to the physical page: [ 17.227030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 17.227486] flags: 0x200000000000000(node=0|zone=2) [ 17.227794] page_type: f5(slab) [ 17.228046] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.228392] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.228671] page dumped because: kasan: bad access detected [ 17.229253] [ 17.229387] Memory state around the buggy address: [ 17.229695] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.229953] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.230240] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.230695] ^ [ 17.231261] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.231802] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.232175] ================================================================== [ 16.764681] ================================================================== [ 16.765374] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 16.765834] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 16.766221] [ 16.766352] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.766409] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.766431] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.766460] Call Trace: [ 16.766485] <TASK> [ 16.766508] dump_stack_lvl+0x73/0xb0 [ 16.766544] print_report+0xd1/0x650 [ 16.766573] ? __virt_addr_valid+0x1db/0x2d0 [ 16.766603] ? kasan_atomics_helper+0x860/0x5450 [ 16.766630] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.766672] ? kasan_atomics_helper+0x860/0x5450 [ 16.766699] kasan_report+0x141/0x180 [ 16.766728] ? kasan_atomics_helper+0x860/0x5450 [ 16.766763] kasan_check_range+0x10c/0x1c0 [ 16.766795] __kasan_check_write+0x18/0x20 [ 16.766820] kasan_atomics_helper+0x860/0x5450 [ 16.766849] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.766877] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.766908] ? kasan_atomics+0x152/0x310 [ 16.766942] kasan_atomics+0x1dc/0x310 [ 16.766971] ? __pfx_kasan_atomics+0x10/0x10 [ 16.767004] ? __pfx_read_tsc+0x10/0x10 [ 16.767034] ? ktime_get_ts64+0x86/0x230 [ 16.767066] kunit_try_run_case+0x1a5/0x480 [ 16.767097] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.767125] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.767156] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.767185] ? __kthread_parkme+0x82/0x180 [ 16.767212] ? preempt_count_sub+0x50/0x80 [ 16.767242] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.767273] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.767305] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.767348] kthread+0x337/0x6f0 [ 16.767372] ? trace_preempt_on+0x20/0xc0 [ 16.767402] ? __pfx_kthread+0x10/0x10 [ 16.767429] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.767457] ? calculate_sigpending+0x7b/0xa0 [ 16.767487] ? __pfx_kthread+0x10/0x10 [ 16.767513] ret_from_fork+0x116/0x1d0 [ 16.767537] ? __pfx_kthread+0x10/0x10 [ 16.767563] ret_from_fork_asm+0x1a/0x30 [ 16.767601] </TASK> [ 16.767618] [ 16.779916] Allocated by task 283: [ 16.780414] kasan_save_stack+0x45/0x70 [ 16.781016] kasan_save_track+0x18/0x40 [ 16.781476] kasan_save_alloc_info+0x3b/0x50 [ 16.782023] __kasan_kmalloc+0xb7/0xc0 [ 16.782582] __kmalloc_cache_noprof+0x189/0x420 [ 16.783079] kasan_atomics+0x95/0x310 [ 16.783636] kunit_try_run_case+0x1a5/0x480 [ 16.784278] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.784965] kthread+0x337/0x6f0 [ 16.785484] ret_from_fork+0x116/0x1d0 [ 16.786186] ret_from_fork_asm+0x1a/0x30 [ 16.786671] [ 16.786871] The buggy address belongs to the object at ffff888103349180 [ 16.786871] which belongs to the cache kmalloc-64 of size 64 [ 16.787556] The buggy address is located 0 bytes to the right of [ 16.787556] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 16.789045] [ 16.789337] The buggy address belongs to the physical page: [ 16.790106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 16.791198] flags: 0x200000000000000(node=0|zone=2) [ 16.791684] page_type: f5(slab) [ 16.791865] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.792851] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.793463] page dumped because: kasan: bad access detected [ 16.793694] [ 16.793787] Memory state around the buggy address: [ 16.794004] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.795055] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.795662] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.796424] ^ [ 16.796620] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.797293] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.798152] ================================================================== [ 17.574668] ================================================================== [ 17.575356] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 17.575701] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 17.576211] [ 17.576357] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.576427] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.576445] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.576486] Call Trace: [ 17.576511] <TASK> [ 17.576533] dump_stack_lvl+0x73/0xb0 [ 17.576569] print_report+0xd1/0x650 [ 17.576597] ? __virt_addr_valid+0x1db/0x2d0 [ 17.576627] ? kasan_atomics_helper+0x177f/0x5450 [ 17.576665] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.576693] ? kasan_atomics_helper+0x177f/0x5450 [ 17.576722] kasan_report+0x141/0x180 [ 17.576750] ? kasan_atomics_helper+0x177f/0x5450 [ 17.576791] kasan_check_range+0x10c/0x1c0 [ 17.576832] __kasan_check_write+0x18/0x20 [ 17.576856] kasan_atomics_helper+0x177f/0x5450 [ 17.576883] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.576925] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.576956] ? kasan_atomics+0x152/0x310 [ 17.576990] kasan_atomics+0x1dc/0x310 [ 17.577019] ? __pfx_kasan_atomics+0x10/0x10 [ 17.577049] ? __pfx_read_tsc+0x10/0x10 [ 17.577076] ? ktime_get_ts64+0x86/0x230 [ 17.577106] kunit_try_run_case+0x1a5/0x480 [ 17.577137] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.577163] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.577204] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.577233] ? __kthread_parkme+0x82/0x180 [ 17.577258] ? preempt_count_sub+0x50/0x80 [ 17.577301] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.577331] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.577359] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.577398] kthread+0x337/0x6f0 [ 17.577423] ? trace_preempt_on+0x20/0xc0 [ 17.577467] ? __pfx_kthread+0x10/0x10 [ 17.577492] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.577519] ? calculate_sigpending+0x7b/0xa0 [ 17.577561] ? __pfx_kthread+0x10/0x10 [ 17.577588] ret_from_fork+0x116/0x1d0 [ 17.577611] ? __pfx_kthread+0x10/0x10 [ 17.577638] ret_from_fork_asm+0x1a/0x30 [ 17.577687] </TASK> [ 17.577702] [ 17.587075] Allocated by task 283: [ 17.587336] kasan_save_stack+0x45/0x70 [ 17.587564] kasan_save_track+0x18/0x40 [ 17.588566] kasan_save_alloc_info+0x3b/0x50 [ 17.589249] __kasan_kmalloc+0xb7/0xc0 [ 17.589429] __kmalloc_cache_noprof+0x189/0x420 [ 17.589624] kasan_atomics+0x95/0x310 [ 17.589801] kunit_try_run_case+0x1a5/0x480 [ 17.589979] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.590190] kthread+0x337/0x6f0 [ 17.590338] ret_from_fork+0x116/0x1d0 [ 17.590505] ret_from_fork_asm+0x1a/0x30 [ 17.590965] [ 17.591158] The buggy address belongs to the object at ffff888103349180 [ 17.591158] which belongs to the cache kmalloc-64 of size 64 [ 17.592707] The buggy address is located 0 bytes to the right of [ 17.592707] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 17.594193] [ 17.594413] The buggy address belongs to the physical page: [ 17.595076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 17.595948] flags: 0x200000000000000(node=0|zone=2) [ 17.596506] page_type: f5(slab) [ 17.596904] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.597693] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.598590] page dumped because: kasan: bad access detected [ 17.599236] [ 17.599424] Memory state around the buggy address: [ 17.599971] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.600522] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.600819] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.601561] ^ [ 17.602153] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.602933] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.603686] ================================================================== [ 17.000358] ================================================================== [ 17.000806] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 17.001377] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 17.001829] [ 17.001948] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.002081] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.002103] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.002147] Call Trace: [ 17.002171] <TASK> [ 17.002193] dump_stack_lvl+0x73/0xb0 [ 17.002230] print_report+0xd1/0x650 [ 17.002259] ? __virt_addr_valid+0x1db/0x2d0 [ 17.002288] ? kasan_atomics_helper+0xd47/0x5450 [ 17.002315] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.002344] ? kasan_atomics_helper+0xd47/0x5450 [ 17.002371] kasan_report+0x141/0x180 [ 17.002399] ? kasan_atomics_helper+0xd47/0x5450 [ 17.002439] kasan_check_range+0x10c/0x1c0 [ 17.002511] __kasan_check_write+0x18/0x20 [ 17.002537] kasan_atomics_helper+0xd47/0x5450 [ 17.002593] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.002622] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.002678] ? kasan_atomics+0x152/0x310 [ 17.002711] kasan_atomics+0x1dc/0x310 [ 17.002740] ? __pfx_kasan_atomics+0x10/0x10 [ 17.002783] ? __pfx_read_tsc+0x10/0x10 [ 17.002858] ? ktime_get_ts64+0x86/0x230 [ 17.002919] kunit_try_run_case+0x1a5/0x480 [ 17.002952] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.003010] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.003041] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.003101] ? __kthread_parkme+0x82/0x180 [ 17.003128] ? preempt_count_sub+0x50/0x80 [ 17.003171] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.003200] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.003229] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.003258] kthread+0x337/0x6f0 [ 17.003284] ? trace_preempt_on+0x20/0xc0 [ 17.003313] ? __pfx_kthread+0x10/0x10 [ 17.003339] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.003366] ? calculate_sigpending+0x7b/0xa0 [ 17.003397] ? __pfx_kthread+0x10/0x10 [ 17.003424] ret_from_fork+0x116/0x1d0 [ 17.003448] ? __pfx_kthread+0x10/0x10 [ 17.003474] ret_from_fork_asm+0x1a/0x30 [ 17.003512] </TASK> [ 17.003527] [ 17.014531] Allocated by task 283: [ 17.014733] kasan_save_stack+0x45/0x70 [ 17.015028] kasan_save_track+0x18/0x40 [ 17.015377] kasan_save_alloc_info+0x3b/0x50 [ 17.015664] __kasan_kmalloc+0xb7/0xc0 [ 17.015962] __kmalloc_cache_noprof+0x189/0x420 [ 17.016478] kasan_atomics+0x95/0x310 [ 17.017349] kunit_try_run_case+0x1a5/0x480 [ 17.018153] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.018636] kthread+0x337/0x6f0 [ 17.019354] ret_from_fork+0x116/0x1d0 [ 17.019761] ret_from_fork_asm+0x1a/0x30 [ 17.020275] [ 17.020723] The buggy address belongs to the object at ffff888103349180 [ 17.020723] which belongs to the cache kmalloc-64 of size 64 [ 17.022120] The buggy address is located 0 bytes to the right of [ 17.022120] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 17.023912] [ 17.024079] The buggy address belongs to the physical page: [ 17.024606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 17.025105] flags: 0x200000000000000(node=0|zone=2) [ 17.025382] page_type: f5(slab) [ 17.025577] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.026678] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.027639] page dumped because: kasan: bad access detected [ 17.028208] [ 17.028336] Memory state around the buggy address: [ 17.028597] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.029217] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.029582] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.030677] ^ [ 17.031611] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.032348] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.032721] ================================================================== [ 17.604586] ================================================================== [ 17.605395] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 17.605878] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 17.606821] [ 17.606962] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.607023] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.607041] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.607071] Call Trace: [ 17.607097] <TASK> [ 17.607122] dump_stack_lvl+0x73/0xb0 [ 17.607162] print_report+0xd1/0x650 [ 17.607190] ? __virt_addr_valid+0x1db/0x2d0 [ 17.607220] ? kasan_atomics_helper+0x1818/0x5450 [ 17.607249] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.607278] ? kasan_atomics_helper+0x1818/0x5450 [ 17.607305] kasan_report+0x141/0x180 [ 17.607333] ? kasan_atomics_helper+0x1818/0x5450 [ 17.607366] kasan_check_range+0x10c/0x1c0 [ 17.607395] __kasan_check_write+0x18/0x20 [ 17.607420] kasan_atomics_helper+0x1818/0x5450 [ 17.607449] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.607476] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.607508] ? kasan_atomics+0x152/0x310 [ 17.607541] kasan_atomics+0x1dc/0x310 [ 17.607570] ? __pfx_kasan_atomics+0x10/0x10 [ 17.607600] ? __pfx_read_tsc+0x10/0x10 [ 17.607625] ? ktime_get_ts64+0x86/0x230 [ 17.607790] kunit_try_run_case+0x1a5/0x480 [ 17.607829] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.607858] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.607888] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.607930] ? __kthread_parkme+0x82/0x180 [ 17.607969] ? preempt_count_sub+0x50/0x80 [ 17.607998] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.608042] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.608070] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.608099] kthread+0x337/0x6f0 [ 17.608124] ? trace_preempt_on+0x20/0xc0 [ 17.608153] ? __pfx_kthread+0x10/0x10 [ 17.608180] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.608207] ? calculate_sigpending+0x7b/0xa0 [ 17.608236] ? __pfx_kthread+0x10/0x10 [ 17.608263] ret_from_fork+0x116/0x1d0 [ 17.608286] ? __pfx_kthread+0x10/0x10 [ 17.608312] ret_from_fork_asm+0x1a/0x30 [ 17.608351] </TASK> [ 17.608367] [ 17.621823] Allocated by task 283: [ 17.622066] kasan_save_stack+0x45/0x70 [ 17.622316] kasan_save_track+0x18/0x40 [ 17.622485] kasan_save_alloc_info+0x3b/0x50 [ 17.622687] __kasan_kmalloc+0xb7/0xc0 [ 17.623034] __kmalloc_cache_noprof+0x189/0x420 [ 17.623305] kasan_atomics+0x95/0x310 [ 17.623540] kunit_try_run_case+0x1a5/0x480 [ 17.623872] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.624154] kthread+0x337/0x6f0 [ 17.624336] ret_from_fork+0x116/0x1d0 [ 17.624533] ret_from_fork_asm+0x1a/0x30 [ 17.624749] [ 17.624881] The buggy address belongs to the object at ffff888103349180 [ 17.624881] which belongs to the cache kmalloc-64 of size 64 [ 17.625465] The buggy address is located 0 bytes to the right of [ 17.625465] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 17.626129] [ 17.626222] The buggy address belongs to the physical page: [ 17.626440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 17.627052] flags: 0x200000000000000(node=0|zone=2) [ 17.627313] page_type: f5(slab) [ 17.627518] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.627847] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.628211] page dumped because: kasan: bad access detected [ 17.628490] [ 17.628606] Memory state around the buggy address: [ 17.628914] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.629175] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.629435] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.629756] ^ [ 17.630026] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.630408] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.630791] ================================================================== [ 17.631524] ================================================================== [ 17.631887] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 17.632250] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 17.632716] [ 17.632897] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.632953] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.632970] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.632999] Call Trace: [ 17.633022] <TASK> [ 17.633047] dump_stack_lvl+0x73/0xb0 [ 17.633082] print_report+0xd1/0x650 [ 17.633109] ? __virt_addr_valid+0x1db/0x2d0 [ 17.633139] ? kasan_atomics_helper+0x18b1/0x5450 [ 17.633166] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.633194] ? kasan_atomics_helper+0x18b1/0x5450 [ 17.633222] kasan_report+0x141/0x180 [ 17.633250] ? kasan_atomics_helper+0x18b1/0x5450 [ 17.633283] kasan_check_range+0x10c/0x1c0 [ 17.633313] __kasan_check_write+0x18/0x20 [ 17.633338] kasan_atomics_helper+0x18b1/0x5450 [ 17.633367] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.633394] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.633426] ? kasan_atomics+0x152/0x310 [ 17.633459] kasan_atomics+0x1dc/0x310 [ 17.633488] ? __pfx_kasan_atomics+0x10/0x10 [ 17.633518] ? __pfx_read_tsc+0x10/0x10 [ 17.633546] ? ktime_get_ts64+0x86/0x230 [ 17.633576] kunit_try_run_case+0x1a5/0x480 [ 17.633605] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.633633] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.633677] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.633705] ? __kthread_parkme+0x82/0x180 [ 17.633731] ? preempt_count_sub+0x50/0x80 [ 17.633761] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.633790] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.633819] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.633848] kthread+0x337/0x6f0 [ 17.633872] ? trace_preempt_on+0x20/0xc0 [ 17.633901] ? __pfx_kthread+0x10/0x10 [ 17.633927] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.633953] ? calculate_sigpending+0x7b/0xa0 [ 17.633984] ? __pfx_kthread+0x10/0x10 [ 17.634010] ret_from_fork+0x116/0x1d0 [ 17.634034] ? __pfx_kthread+0x10/0x10 [ 17.634060] ret_from_fork_asm+0x1a/0x30 [ 17.634098] </TASK> [ 17.634113] [ 17.642933] Allocated by task 283: [ 17.643165] kasan_save_stack+0x45/0x70 [ 17.643413] kasan_save_track+0x18/0x40 [ 17.643593] kasan_save_alloc_info+0x3b/0x50 [ 17.643805] __kasan_kmalloc+0xb7/0xc0 [ 17.644036] __kmalloc_cache_noprof+0x189/0x420 [ 17.644313] kasan_atomics+0x95/0x310 [ 17.644545] kunit_try_run_case+0x1a5/0x480 [ 17.644737] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.644952] kthread+0x337/0x6f0 [ 17.645100] ret_from_fork+0x116/0x1d0 [ 17.645509] ret_from_fork_asm+0x1a/0x30 [ 17.645755] [ 17.645976] The buggy address belongs to the object at ffff888103349180 [ 17.645976] which belongs to the cache kmalloc-64 of size 64 [ 17.646836] The buggy address is located 0 bytes to the right of [ 17.646836] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 17.647283] [ 17.647409] The buggy address belongs to the physical page: [ 17.647950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 17.648380] flags: 0x200000000000000(node=0|zone=2) [ 17.648684] page_type: f5(slab) [ 17.648836] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.649117] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.649391] page dumped because: kasan: bad access detected [ 17.649600] [ 17.650579] Memory state around the buggy address: [ 17.651854] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.652761] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.653923] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.654195] ^ [ 17.654392] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.655019] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.656283] ================================================================== [ 17.907949] ================================================================== [ 17.908326] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 17.908914] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 17.909339] [ 17.909455] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.909513] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.909531] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.909561] Call Trace: [ 17.909585] <TASK> [ 17.909612] dump_stack_lvl+0x73/0xb0 [ 17.909700] print_report+0xd1/0x650 [ 17.909729] ? __virt_addr_valid+0x1db/0x2d0 [ 17.909761] ? kasan_atomics_helper+0x1e12/0x5450 [ 17.909788] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.909817] ? kasan_atomics_helper+0x1e12/0x5450 [ 17.909844] kasan_report+0x141/0x180 [ 17.909873] ? kasan_atomics_helper+0x1e12/0x5450 [ 17.909905] kasan_check_range+0x10c/0x1c0 [ 17.909936] __kasan_check_write+0x18/0x20 [ 17.909981] kasan_atomics_helper+0x1e12/0x5450 [ 17.910011] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.910043] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.910077] ? kasan_atomics+0x152/0x310 [ 17.910114] kasan_atomics+0x1dc/0x310 [ 17.910142] ? __pfx_kasan_atomics+0x10/0x10 [ 17.910174] ? __pfx_read_tsc+0x10/0x10 [ 17.910202] ? ktime_get_ts64+0x86/0x230 [ 17.910233] kunit_try_run_case+0x1a5/0x480 [ 17.910264] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.910294] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.910325] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.910355] ? __kthread_parkme+0x82/0x180 [ 17.910382] ? preempt_count_sub+0x50/0x80 [ 17.910413] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.910448] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.910478] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.910507] kthread+0x337/0x6f0 [ 17.910533] ? trace_preempt_on+0x20/0xc0 [ 17.910584] ? __pfx_kthread+0x10/0x10 [ 17.910610] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.910638] ? calculate_sigpending+0x7b/0xa0 [ 17.910678] ? __pfx_kthread+0x10/0x10 [ 17.910707] ret_from_fork+0x116/0x1d0 [ 17.910730] ? __pfx_kthread+0x10/0x10 [ 17.910756] ret_from_fork_asm+0x1a/0x30 [ 17.910794] </TASK> [ 17.910810] [ 17.920261] Allocated by task 283: [ 17.920700] kasan_save_stack+0x45/0x70 [ 17.920885] kasan_save_track+0x18/0x40 [ 17.921055] kasan_save_alloc_info+0x3b/0x50 [ 17.921596] __kasan_kmalloc+0xb7/0xc0 [ 17.921857] __kmalloc_cache_noprof+0x189/0x420 [ 17.922139] kasan_atomics+0x95/0x310 [ 17.922310] kunit_try_run_case+0x1a5/0x480 [ 17.922500] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.922849] kthread+0x337/0x6f0 [ 17.923060] ret_from_fork+0x116/0x1d0 [ 17.923289] ret_from_fork_asm+0x1a/0x30 [ 17.923534] [ 17.923667] The buggy address belongs to the object at ffff888103349180 [ 17.923667] which belongs to the cache kmalloc-64 of size 64 [ 17.924244] The buggy address is located 0 bytes to the right of [ 17.924244] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 17.924790] [ 17.924913] The buggy address belongs to the physical page: [ 17.925255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 17.925709] flags: 0x200000000000000(node=0|zone=2) [ 17.926021] page_type: f5(slab) [ 17.926235] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.926607] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.926980] page dumped because: kasan: bad access detected [ 17.927500] [ 17.927599] Memory state around the buggy address: [ 17.927851] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.928118] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.928609] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.929069] ^ [ 17.929537] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.930033] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.930438] ================================================================== [ 16.465348] ================================================================== [ 16.465769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 16.466197] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 16.466519] [ 16.466632] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.466700] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.466716] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.466746] Call Trace: [ 16.466770] <TASK> [ 16.467013] dump_stack_lvl+0x73/0xb0 [ 16.467066] print_report+0xd1/0x650 [ 16.467096] ? __virt_addr_valid+0x1db/0x2d0 [ 16.467128] ? kasan_atomics_helper+0x4b6e/0x5450 [ 16.467154] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.467183] ? kasan_atomics_helper+0x4b6e/0x5450 [ 16.467212] kasan_report+0x141/0x180 [ 16.467240] ? kasan_atomics_helper+0x4b6e/0x5450 [ 16.467275] __asan_report_store4_noabort+0x1b/0x30 [ 16.467302] kasan_atomics_helper+0x4b6e/0x5450 [ 16.467331] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.467358] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.467390] ? kasan_atomics+0x152/0x310 [ 16.467424] kasan_atomics+0x1dc/0x310 [ 16.467453] ? __pfx_kasan_atomics+0x10/0x10 [ 16.467483] ? __pfx_read_tsc+0x10/0x10 [ 16.467510] ? ktime_get_ts64+0x86/0x230 [ 16.467541] kunit_try_run_case+0x1a5/0x480 [ 16.467571] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.467599] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.467629] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.467676] ? __kthread_parkme+0x82/0x180 [ 16.467701] ? preempt_count_sub+0x50/0x80 [ 16.467731] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.467762] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.467858] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.467891] kthread+0x337/0x6f0 [ 16.467917] ? trace_preempt_on+0x20/0xc0 [ 16.467947] ? __pfx_kthread+0x10/0x10 [ 16.467974] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.468001] ? calculate_sigpending+0x7b/0xa0 [ 16.468032] ? __pfx_kthread+0x10/0x10 [ 16.468059] ret_from_fork+0x116/0x1d0 [ 16.468084] ? __pfx_kthread+0x10/0x10 [ 16.468111] ret_from_fork_asm+0x1a/0x30 [ 16.468150] </TASK> [ 16.468167] [ 16.477991] Allocated by task 283: [ 16.478233] kasan_save_stack+0x45/0x70 [ 16.478492] kasan_save_track+0x18/0x40 [ 16.478756] kasan_save_alloc_info+0x3b/0x50 [ 16.479013] __kasan_kmalloc+0xb7/0xc0 [ 16.479241] __kmalloc_cache_noprof+0x189/0x420 [ 16.479434] kasan_atomics+0x95/0x310 [ 16.479632] kunit_try_run_case+0x1a5/0x480 [ 16.480034] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.480338] kthread+0x337/0x6f0 [ 16.480520] ret_from_fork+0x116/0x1d0 [ 16.480700] ret_from_fork_asm+0x1a/0x30 [ 16.481114] [ 16.481242] The buggy address belongs to the object at ffff888103349180 [ 16.481242] which belongs to the cache kmalloc-64 of size 64 [ 16.481760] The buggy address is located 0 bytes to the right of [ 16.481760] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 16.482230] [ 16.482348] The buggy address belongs to the physical page: [ 16.482924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 16.483322] flags: 0x200000000000000(node=0|zone=2) [ 16.483529] page_type: f5(slab) [ 16.483694] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.484389] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.484889] page dumped because: kasan: bad access detected [ 16.485171] [ 16.485267] Memory state around the buggy address: [ 16.485501] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.486155] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.486437] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.486756] ^ [ 16.487072] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.487467] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.488085] ================================================================== [ 17.963821] ================================================================== [ 17.964303] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 17.964687] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 17.965029] [ 17.965171] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.965229] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.965246] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.965274] Call Trace: [ 17.965299] <TASK> [ 17.965322] dump_stack_lvl+0x73/0xb0 [ 17.965358] print_report+0xd1/0x650 [ 17.965386] ? __virt_addr_valid+0x1db/0x2d0 [ 17.965415] ? kasan_atomics_helper+0x1f43/0x5450 [ 17.965441] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.965470] ? kasan_atomics_helper+0x1f43/0x5450 [ 17.965497] kasan_report+0x141/0x180 [ 17.965525] ? kasan_atomics_helper+0x1f43/0x5450 [ 17.965558] kasan_check_range+0x10c/0x1c0 [ 17.965587] __kasan_check_write+0x18/0x20 [ 17.965612] kasan_atomics_helper+0x1f43/0x5450 [ 17.965640] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.965681] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.965712] ? kasan_atomics+0x152/0x310 [ 17.965746] kasan_atomics+0x1dc/0x310 [ 17.965787] ? __pfx_kasan_atomics+0x10/0x10 [ 17.965817] ? __pfx_read_tsc+0x10/0x10 [ 17.965843] ? ktime_get_ts64+0x86/0x230 [ 17.965874] kunit_try_run_case+0x1a5/0x480 [ 17.965904] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.965932] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.965962] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.965991] ? __kthread_parkme+0x82/0x180 [ 17.966018] ? preempt_count_sub+0x50/0x80 [ 17.966048] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.966078] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.966106] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.966137] kthread+0x337/0x6f0 [ 17.966162] ? trace_preempt_on+0x20/0xc0 [ 17.966192] ? __pfx_kthread+0x10/0x10 [ 17.966218] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.966244] ? calculate_sigpending+0x7b/0xa0 [ 17.966274] ? __pfx_kthread+0x10/0x10 [ 17.966301] ret_from_fork+0x116/0x1d0 [ 17.966325] ? __pfx_kthread+0x10/0x10 [ 17.966351] ret_from_fork_asm+0x1a/0x30 [ 17.966389] </TASK> [ 17.966404] [ 17.975120] Allocated by task 283: [ 17.975279] kasan_save_stack+0x45/0x70 [ 17.975524] kasan_save_track+0x18/0x40 [ 17.975773] kasan_save_alloc_info+0x3b/0x50 [ 17.976043] __kasan_kmalloc+0xb7/0xc0 [ 17.976441] __kmalloc_cache_noprof+0x189/0x420 [ 17.976685] kasan_atomics+0x95/0x310 [ 17.976864] kunit_try_run_case+0x1a5/0x480 [ 17.977158] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.977468] kthread+0x337/0x6f0 [ 17.977639] ret_from_fork+0x116/0x1d0 [ 17.977877] ret_from_fork_asm+0x1a/0x30 [ 17.978097] [ 17.978217] The buggy address belongs to the object at ffff888103349180 [ 17.978217] which belongs to the cache kmalloc-64 of size 64 [ 17.978777] The buggy address is located 0 bytes to the right of [ 17.978777] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 17.979380] [ 17.979473] The buggy address belongs to the physical page: [ 17.979758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 17.980468] flags: 0x200000000000000(node=0|zone=2) [ 17.980760] page_type: f5(slab) [ 17.980949] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.981231] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.981539] page dumped because: kasan: bad access detected [ 17.981875] [ 17.981983] Memory state around the buggy address: [ 17.982252] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.982587] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.983024] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.983358] ^ [ 17.983574] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.983851] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.984111] ================================================================== [ 17.694555] ================================================================== [ 17.695361] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 17.695877] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 17.696795] [ 17.697036] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.697095] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.697114] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.697143] Call Trace: [ 17.697168] <TASK> [ 17.697193] dump_stack_lvl+0x73/0xb0 [ 17.697231] print_report+0xd1/0x650 [ 17.697260] ? __virt_addr_valid+0x1db/0x2d0 [ 17.697291] ? kasan_atomics_helper+0x19e3/0x5450 [ 17.697331] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.697359] ? kasan_atomics_helper+0x19e3/0x5450 [ 17.697388] kasan_report+0x141/0x180 [ 17.697439] ? kasan_atomics_helper+0x19e3/0x5450 [ 17.697473] kasan_check_range+0x10c/0x1c0 [ 17.697516] __kasan_check_write+0x18/0x20 [ 17.697541] kasan_atomics_helper+0x19e3/0x5450 [ 17.697570] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.697598] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.697630] ? kasan_atomics+0x152/0x310 [ 17.697676] kasan_atomics+0x1dc/0x310 [ 17.697705] ? __pfx_kasan_atomics+0x10/0x10 [ 17.697736] ? __pfx_read_tsc+0x10/0x10 [ 17.697762] ? ktime_get_ts64+0x86/0x230 [ 17.697806] kunit_try_run_case+0x1a5/0x480 [ 17.697837] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.697869] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.697901] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.697929] ? __kthread_parkme+0x82/0x180 [ 17.697955] ? preempt_count_sub+0x50/0x80 [ 17.697984] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.698015] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.698043] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.698072] kthread+0x337/0x6f0 [ 17.698098] ? trace_preempt_on+0x20/0xc0 [ 17.698129] ? __pfx_kthread+0x10/0x10 [ 17.698157] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.698183] ? calculate_sigpending+0x7b/0xa0 [ 17.698213] ? __pfx_kthread+0x10/0x10 [ 17.698239] ret_from_fork+0x116/0x1d0 [ 17.698263] ? __pfx_kthread+0x10/0x10 [ 17.698288] ret_from_fork_asm+0x1a/0x30 [ 17.698327] </TASK> [ 17.698342] [ 17.711781] Allocated by task 283: [ 17.712014] kasan_save_stack+0x45/0x70 [ 17.712270] kasan_save_track+0x18/0x40 [ 17.712482] kasan_save_alloc_info+0x3b/0x50 [ 17.712759] __kasan_kmalloc+0xb7/0xc0 [ 17.713030] __kmalloc_cache_noprof+0x189/0x420 [ 17.713361] kasan_atomics+0x95/0x310 [ 17.713589] kunit_try_run_case+0x1a5/0x480 [ 17.713858] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.714180] kthread+0x337/0x6f0 [ 17.714328] ret_from_fork+0x116/0x1d0 [ 17.714494] ret_from_fork_asm+0x1a/0x30 [ 17.714750] [ 17.714932] The buggy address belongs to the object at ffff888103349180 [ 17.714932] which belongs to the cache kmalloc-64 of size 64 [ 17.715417] The buggy address is located 0 bytes to the right of [ 17.715417] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 17.716292] [ 17.716387] The buggy address belongs to the physical page: [ 17.716601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 17.717384] flags: 0x200000000000000(node=0|zone=2) [ 17.717694] page_type: f5(slab) [ 17.717954] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.718364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.718753] page dumped because: kasan: bad access detected [ 17.719104] [ 17.719207] Memory state around the buggy address: [ 17.719409] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.719869] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.720413] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.720733] ^ [ 17.721178] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.721535] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.721975] ================================================================== [ 18.180256] ================================================================== [ 18.181151] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 18.182085] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 18.182978] [ 18.183215] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 18.183298] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.183317] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.183347] Call Trace: [ 18.183384] <TASK> [ 18.183410] dump_stack_lvl+0x73/0xb0 [ 18.183447] print_report+0xd1/0x650 [ 18.183477] ? __virt_addr_valid+0x1db/0x2d0 [ 18.183507] ? kasan_atomics_helper+0x224c/0x5450 [ 18.183534] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.183563] ? kasan_atomics_helper+0x224c/0x5450 [ 18.183589] kasan_report+0x141/0x180 [ 18.183618] ? kasan_atomics_helper+0x224c/0x5450 [ 18.183664] kasan_check_range+0x10c/0x1c0 [ 18.183695] __kasan_check_write+0x18/0x20 [ 18.183720] kasan_atomics_helper+0x224c/0x5450 [ 18.183750] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.183802] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.183835] ? kasan_atomics+0x152/0x310 [ 18.183869] kasan_atomics+0x1dc/0x310 [ 18.183898] ? __pfx_kasan_atomics+0x10/0x10 [ 18.183930] ? __pfx_read_tsc+0x10/0x10 [ 18.183957] ? ktime_get_ts64+0x86/0x230 [ 18.183989] kunit_try_run_case+0x1a5/0x480 [ 18.184024] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.184053] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.184083] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.184113] ? __kthread_parkme+0x82/0x180 [ 18.184140] ? preempt_count_sub+0x50/0x80 [ 18.184172] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.184202] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.184231] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.184261] kthread+0x337/0x6f0 [ 18.184285] ? trace_preempt_on+0x20/0xc0 [ 18.184316] ? __pfx_kthread+0x10/0x10 [ 18.184344] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.184372] ? calculate_sigpending+0x7b/0xa0 [ 18.184403] ? __pfx_kthread+0x10/0x10 [ 18.184430] ret_from_fork+0x116/0x1d0 [ 18.184454] ? __pfx_kthread+0x10/0x10 [ 18.184480] ret_from_fork_asm+0x1a/0x30 [ 18.184521] </TASK> [ 18.184536] [ 18.197570] Allocated by task 283: [ 18.197873] kasan_save_stack+0x45/0x70 [ 18.198144] kasan_save_track+0x18/0x40 [ 18.198345] kasan_save_alloc_info+0x3b/0x50 [ 18.198535] __kasan_kmalloc+0xb7/0xc0 [ 18.198836] __kmalloc_cache_noprof+0x189/0x420 [ 18.199111] kasan_atomics+0x95/0x310 [ 18.199367] kunit_try_run_case+0x1a5/0x480 [ 18.199582] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.200036] kthread+0x337/0x6f0 [ 18.200229] ret_from_fork+0x116/0x1d0 [ 18.200468] ret_from_fork_asm+0x1a/0x30 [ 18.200717] [ 18.200892] The buggy address belongs to the object at ffff888103349180 [ 18.200892] which belongs to the cache kmalloc-64 of size 64 [ 18.201494] The buggy address is located 0 bytes to the right of [ 18.201494] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 18.201954] [ 18.202145] The buggy address belongs to the physical page: [ 18.202461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 18.203055] flags: 0x200000000000000(node=0|zone=2) [ 18.203285] page_type: f5(slab) [ 18.203520] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.203969] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.204383] page dumped because: kasan: bad access detected [ 18.204594] [ 18.204696] Memory state around the buggy address: [ 18.205048] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.205440] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.205900] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.206273] ^ [ 18.206470] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.206823] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.207243] ================================================================== [ 18.065635] ================================================================== [ 18.066150] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 18.066561] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 18.067179] [ 18.067349] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 18.067453] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.067513] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.067543] Call Trace: [ 18.067568] <TASK> [ 18.067605] dump_stack_lvl+0x73/0xb0 [ 18.067655] print_report+0xd1/0x650 [ 18.067684] ? __virt_addr_valid+0x1db/0x2d0 [ 18.067715] ? kasan_atomics_helper+0x20c8/0x5450 [ 18.067744] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.067784] ? kasan_atomics_helper+0x20c8/0x5450 [ 18.067814] kasan_report+0x141/0x180 [ 18.067843] ? kasan_atomics_helper+0x20c8/0x5450 [ 18.067912] kasan_check_range+0x10c/0x1c0 [ 18.067972] __kasan_check_write+0x18/0x20 [ 18.067997] kasan_atomics_helper+0x20c8/0x5450 [ 18.068059] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.068088] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.068131] ? kasan_atomics+0x152/0x310 [ 18.068166] kasan_atomics+0x1dc/0x310 [ 18.068194] ? __pfx_kasan_atomics+0x10/0x10 [ 18.068225] ? __pfx_read_tsc+0x10/0x10 [ 18.068253] ? ktime_get_ts64+0x86/0x230 [ 18.068284] kunit_try_run_case+0x1a5/0x480 [ 18.068315] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.068343] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.068374] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.068435] ? __kthread_parkme+0x82/0x180 [ 18.068461] ? preempt_count_sub+0x50/0x80 [ 18.068492] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.068534] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.068565] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.068623] kthread+0x337/0x6f0 [ 18.068668] ? trace_preempt_on+0x20/0xc0 [ 18.068700] ? __pfx_kthread+0x10/0x10 [ 18.068725] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.068752] ? calculate_sigpending+0x7b/0xa0 [ 18.068814] ? __pfx_kthread+0x10/0x10 [ 18.068843] ret_from_fork+0x116/0x1d0 [ 18.068895] ? __pfx_kthread+0x10/0x10 [ 18.068923] ret_from_fork_asm+0x1a/0x30 [ 18.068962] </TASK> [ 18.068977] [ 18.079320] Allocated by task 283: [ 18.079586] kasan_save_stack+0x45/0x70 [ 18.079868] kasan_save_track+0x18/0x40 [ 18.080164] kasan_save_alloc_info+0x3b/0x50 [ 18.080448] __kasan_kmalloc+0xb7/0xc0 [ 18.080721] __kmalloc_cache_noprof+0x189/0x420 [ 18.081055] kasan_atomics+0x95/0x310 [ 18.081282] kunit_try_run_case+0x1a5/0x480 [ 18.081500] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.081773] kthread+0x337/0x6f0 [ 18.082140] ret_from_fork+0x116/0x1d0 [ 18.082346] ret_from_fork_asm+0x1a/0x30 [ 18.082603] [ 18.082762] The buggy address belongs to the object at ffff888103349180 [ 18.082762] which belongs to the cache kmalloc-64 of size 64 [ 18.083380] The buggy address is located 0 bytes to the right of [ 18.083380] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 18.083822] [ 18.083943] The buggy address belongs to the physical page: [ 18.084245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 18.084722] flags: 0x200000000000000(node=0|zone=2) [ 18.085208] page_type: f5(slab) [ 18.085385] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.086500] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.087344] page dumped because: kasan: bad access detected [ 18.087985] [ 18.088128] Memory state around the buggy address: [ 18.088393] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.089025] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.089543] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.090195] ^ [ 18.090472] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.091055] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.091837] ================================================================== [ 16.837025] ================================================================== [ 16.837608] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 16.838541] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 16.838920] [ 16.839032] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.839092] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.839108] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.839137] Call Trace: [ 16.839163] <TASK> [ 16.839191] dump_stack_lvl+0x73/0xb0 [ 16.839228] print_report+0xd1/0x650 [ 16.839255] ? __virt_addr_valid+0x1db/0x2d0 [ 16.839284] ? kasan_atomics_helper+0x992/0x5450 [ 16.839312] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.839341] ? kasan_atomics_helper+0x992/0x5450 [ 16.839368] kasan_report+0x141/0x180 [ 16.839398] ? kasan_atomics_helper+0x992/0x5450 [ 16.839430] kasan_check_range+0x10c/0x1c0 [ 16.839460] __kasan_check_write+0x18/0x20 [ 16.839485] kasan_atomics_helper+0x992/0x5450 [ 16.839513] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.839540] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.839574] ? kasan_atomics+0x152/0x310 [ 16.839608] kasan_atomics+0x1dc/0x310 [ 16.839636] ? __pfx_kasan_atomics+0x10/0x10 [ 16.839682] ? __pfx_read_tsc+0x10/0x10 [ 16.839708] ? ktime_get_ts64+0x86/0x230 [ 16.839739] kunit_try_run_case+0x1a5/0x480 [ 16.839784] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.839836] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.839867] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.839896] ? __kthread_parkme+0x82/0x180 [ 16.839922] ? preempt_count_sub+0x50/0x80 [ 16.839953] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.839983] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.840011] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.840040] kthread+0x337/0x6f0 [ 16.840064] ? trace_preempt_on+0x20/0xc0 [ 16.840094] ? __pfx_kthread+0x10/0x10 [ 16.840119] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.840146] ? calculate_sigpending+0x7b/0xa0 [ 16.840177] ? __pfx_kthread+0x10/0x10 [ 16.840204] ret_from_fork+0x116/0x1d0 [ 16.840228] ? __pfx_kthread+0x10/0x10 [ 16.840253] ret_from_fork_asm+0x1a/0x30 [ 16.840293] </TASK> [ 16.840308] [ 16.856493] Allocated by task 283: [ 16.856697] kasan_save_stack+0x45/0x70 [ 16.856932] kasan_save_track+0x18/0x40 [ 16.857348] kasan_save_alloc_info+0x3b/0x50 [ 16.857817] __kasan_kmalloc+0xb7/0xc0 [ 16.858276] __kmalloc_cache_noprof+0x189/0x420 [ 16.858799] kasan_atomics+0x95/0x310 [ 16.859445] kunit_try_run_case+0x1a5/0x480 [ 16.860021] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.860616] kthread+0x337/0x6f0 [ 16.861083] ret_from_fork+0x116/0x1d0 [ 16.861410] ret_from_fork_asm+0x1a/0x30 [ 16.861586] [ 16.861693] The buggy address belongs to the object at ffff888103349180 [ 16.861693] which belongs to the cache kmalloc-64 of size 64 [ 16.862294] The buggy address is located 0 bytes to the right of [ 16.862294] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 16.863078] [ 16.863207] The buggy address belongs to the physical page: [ 16.863481] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 16.863845] flags: 0x200000000000000(node=0|zone=2) [ 16.864136] page_type: f5(slab) [ 16.864402] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.864730] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.865143] page dumped because: kasan: bad access detected [ 16.865506] [ 16.866088] Memory state around the buggy address: [ 16.866344] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.866713] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.867168] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.867737] ^ [ 16.868117] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.868418] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.868807] ================================================================== [ 18.113592] ================================================================== [ 18.114275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 18.114687] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 18.114962] [ 18.115071] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 18.115126] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.115143] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.115171] Call Trace: [ 18.115193] <TASK> [ 18.115215] dump_stack_lvl+0x73/0xb0 [ 18.115248] print_report+0xd1/0x650 [ 18.115276] ? __virt_addr_valid+0x1db/0x2d0 [ 18.115306] ? kasan_atomics_helper+0x218a/0x5450 [ 18.115332] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.115360] ? kasan_atomics_helper+0x218a/0x5450 [ 18.115401] kasan_report+0x141/0x180 [ 18.115428] ? kasan_atomics_helper+0x218a/0x5450 [ 18.115462] kasan_check_range+0x10c/0x1c0 [ 18.115492] __kasan_check_write+0x18/0x20 [ 18.115550] kasan_atomics_helper+0x218a/0x5450 [ 18.115579] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 18.115607] ? __kmalloc_cache_noprof+0x189/0x420 [ 18.115638] ? kasan_atomics+0x152/0x310 [ 18.115685] kasan_atomics+0x1dc/0x310 [ 18.115714] ? __pfx_kasan_atomics+0x10/0x10 [ 18.115744] ? __pfx_read_tsc+0x10/0x10 [ 18.115771] ? ktime_get_ts64+0x86/0x230 [ 18.115801] kunit_try_run_case+0x1a5/0x480 [ 18.115832] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.115859] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.115889] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.115918] ? __kthread_parkme+0x82/0x180 [ 18.115980] ? preempt_count_sub+0x50/0x80 [ 18.116011] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.116041] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.116069] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.116098] kthread+0x337/0x6f0 [ 18.116123] ? trace_preempt_on+0x20/0xc0 [ 18.116152] ? __pfx_kthread+0x10/0x10 [ 18.116178] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.116205] ? calculate_sigpending+0x7b/0xa0 [ 18.116234] ? __pfx_kthread+0x10/0x10 [ 18.116261] ret_from_fork+0x116/0x1d0 [ 18.116284] ? __pfx_kthread+0x10/0x10 [ 18.116311] ret_from_fork_asm+0x1a/0x30 [ 18.116348] </TASK> [ 18.116364] [ 18.129913] Allocated by task 283: [ 18.130164] kasan_save_stack+0x45/0x70 [ 18.130423] kasan_save_track+0x18/0x40 [ 18.130643] kasan_save_alloc_info+0x3b/0x50 [ 18.131343] __kasan_kmalloc+0xb7/0xc0 [ 18.131535] __kmalloc_cache_noprof+0x189/0x420 [ 18.131992] kasan_atomics+0x95/0x310 [ 18.132339] kunit_try_run_case+0x1a5/0x480 [ 18.132701] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.133165] kthread+0x337/0x6f0 [ 18.133334] ret_from_fork+0x116/0x1d0 [ 18.133720] ret_from_fork_asm+0x1a/0x30 [ 18.134560] [ 18.134691] The buggy address belongs to the object at ffff888103349180 [ 18.134691] which belongs to the cache kmalloc-64 of size 64 [ 18.135124] The buggy address is located 0 bytes to the right of [ 18.135124] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 18.135566] [ 18.135672] The buggy address belongs to the physical page: [ 18.135886] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 18.136183] flags: 0x200000000000000(node=0|zone=2) [ 18.136386] page_type: f5(slab) [ 18.137313] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.137617] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.137931] page dumped because: kasan: bad access detected [ 18.138151] [ 18.138241] Memory state around the buggy address: [ 18.138443] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.138883] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.139775] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.140472] ^ [ 18.141239] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.141996] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.142727] ================================================================== [ 16.408124] ================================================================== [ 16.409384] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 16.410214] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 16.410742] [ 16.410922] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.410995] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.411011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.411038] Call Trace: [ 16.411072] <TASK> [ 16.411093] dump_stack_lvl+0x73/0xb0 [ 16.411129] print_report+0xd1/0x650 [ 16.411157] ? __virt_addr_valid+0x1db/0x2d0 [ 16.411197] ? kasan_atomics_helper+0x4ba2/0x5450 [ 16.411222] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.411248] ? kasan_atomics_helper+0x4ba2/0x5450 [ 16.411285] kasan_report+0x141/0x180 [ 16.411311] ? kasan_atomics_helper+0x4ba2/0x5450 [ 16.411343] __asan_report_store4_noabort+0x1b/0x30 [ 16.411367] kasan_atomics_helper+0x4ba2/0x5450 [ 16.411393] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.411418] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.411448] ? kasan_atomics+0x152/0x310 [ 16.411479] kasan_atomics+0x1dc/0x310 [ 16.411506] ? __pfx_kasan_atomics+0x10/0x10 [ 16.411533] ? __pfx_read_tsc+0x10/0x10 [ 16.411559] ? ktime_get_ts64+0x86/0x230 [ 16.411587] kunit_try_run_case+0x1a5/0x480 [ 16.411616] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.411641] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.411680] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.411707] ? __kthread_parkme+0x82/0x180 [ 16.411730] ? preempt_count_sub+0x50/0x80 [ 16.411757] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.411785] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.411831] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.411857] kthread+0x337/0x6f0 [ 16.411881] ? trace_preempt_on+0x20/0xc0 [ 16.411908] ? __pfx_kthread+0x10/0x10 [ 16.411931] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.411956] ? calculate_sigpending+0x7b/0xa0 [ 16.411984] ? __pfx_kthread+0x10/0x10 [ 16.412008] ret_from_fork+0x116/0x1d0 [ 16.412029] ? __pfx_kthread+0x10/0x10 [ 16.412054] ret_from_fork_asm+0x1a/0x30 [ 16.412091] </TASK> [ 16.412104] [ 16.426961] Allocated by task 283: [ 16.427136] kasan_save_stack+0x45/0x70 [ 16.427321] kasan_save_track+0x18/0x40 [ 16.427491] kasan_save_alloc_info+0x3b/0x50 [ 16.427697] __kasan_kmalloc+0xb7/0xc0 [ 16.428066] __kmalloc_cache_noprof+0x189/0x420 [ 16.428315] kasan_atomics+0x95/0x310 [ 16.428479] kunit_try_run_case+0x1a5/0x480 [ 16.428672] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.428976] kthread+0x337/0x6f0 [ 16.429431] ret_from_fork+0x116/0x1d0 [ 16.429629] ret_from_fork_asm+0x1a/0x30 [ 16.429816] [ 16.429930] The buggy address belongs to the object at ffff888103349180 [ 16.429930] which belongs to the cache kmalloc-64 of size 64 [ 16.430574] The buggy address is located 0 bytes to the right of [ 16.430574] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 16.431244] [ 16.431338] The buggy address belongs to the physical page: [ 16.431606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 16.432112] flags: 0x200000000000000(node=0|zone=2) [ 16.432391] page_type: f5(slab) [ 16.432599] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.432891] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.433435] page dumped because: kasan: bad access detected [ 16.433828] [ 16.433929] Memory state around the buggy address: [ 16.434233] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.434611] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.435058] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.435354] ^ [ 16.435619] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.435937] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.436301] ================================================================== [ 17.722730] ================================================================== [ 17.723154] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 17.723726] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283 [ 17.724006] [ 17.724164] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.724262] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.724279] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.724322] Call Trace: [ 17.724343] <TASK> [ 17.724364] dump_stack_lvl+0x73/0xb0 [ 17.724402] print_report+0xd1/0x650 [ 17.724433] ? __virt_addr_valid+0x1db/0x2d0 [ 17.724500] ? kasan_atomics_helper+0x1a7f/0x5450 [ 17.724530] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.724573] ? kasan_atomics_helper+0x1a7f/0x5450 [ 17.724601] kasan_report+0x141/0x180 [ 17.724630] ? kasan_atomics_helper+0x1a7f/0x5450 [ 17.724675] kasan_check_range+0x10c/0x1c0 [ 17.724705] __kasan_check_write+0x18/0x20 [ 17.724767] kasan_atomics_helper+0x1a7f/0x5450 [ 17.724797] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.724837] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.724869] ? kasan_atomics+0x152/0x310 [ 17.724904] kasan_atomics+0x1dc/0x310 [ 17.724933] ? __pfx_kasan_atomics+0x10/0x10 [ 17.724963] ? __pfx_read_tsc+0x10/0x10 [ 17.724991] ? ktime_get_ts64+0x86/0x230 [ 17.725034] kunit_try_run_case+0x1a5/0x480 [ 17.725066] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.725095] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.725162] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.725191] ? __kthread_parkme+0x82/0x180 [ 17.725229] ? preempt_count_sub+0x50/0x80 [ 17.725259] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.725287] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.725318] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.725352] kthread+0x337/0x6f0 [ 17.725377] ? trace_preempt_on+0x20/0xc0 [ 17.725407] ? __pfx_kthread+0x10/0x10 [ 17.725434] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.725461] ? calculate_sigpending+0x7b/0xa0 [ 17.725491] ? __pfx_kthread+0x10/0x10 [ 17.725518] ret_from_fork+0x116/0x1d0 [ 17.725542] ? __pfx_kthread+0x10/0x10 [ 17.725568] ret_from_fork_asm+0x1a/0x30 [ 17.725608] </TASK> [ 17.725623] [ 17.735281] Allocated by task 283: [ 17.735518] kasan_save_stack+0x45/0x70 [ 17.735830] kasan_save_track+0x18/0x40 [ 17.736084] kasan_save_alloc_info+0x3b/0x50 [ 17.736341] __kasan_kmalloc+0xb7/0xc0 [ 17.736579] __kmalloc_cache_noprof+0x189/0x420 [ 17.736791] kasan_atomics+0x95/0x310 [ 17.737039] kunit_try_run_case+0x1a5/0x480 [ 17.737350] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.737743] kthread+0x337/0x6f0 [ 17.737944] ret_from_fork+0x116/0x1d0 [ 17.738112] ret_from_fork_asm+0x1a/0x30 [ 17.738421] [ 17.738549] The buggy address belongs to the object at ffff888103349180 [ 17.738549] which belongs to the cache kmalloc-64 of size 64 [ 17.739263] The buggy address is located 0 bytes to the right of [ 17.739263] allocated 48-byte region [ffff888103349180, ffff8881033491b0) [ 17.739998] [ 17.740094] The buggy address belongs to the physical page: [ 17.740348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349 [ 17.740824] flags: 0x200000000000000(node=0|zone=2) [ 17.741054] page_type: f5(slab) [ 17.741206] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.741526] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.742202] page dumped because: kasan: bad access detected [ 17.742677] [ 17.742771] Memory state around the buggy address: [ 17.743112] ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.743447] ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.743788] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.744217] ^ [ 17.744513] ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.745123] ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.745431] ==================================================================