Date
July 5, 2025, 11:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 21.098301] ================================================================== [ 21.098353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 21.098404] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265 [ 21.098455] [ 21.098494] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.098915] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.099042] Hardware name: linux,dummy-virt (DT) [ 21.099075] Call trace: [ 21.099099] show_stack+0x20/0x38 (C) [ 21.099211] dump_stack_lvl+0x8c/0xd0 [ 21.099292] print_report+0x118/0x608 [ 21.099339] kasan_report+0xdc/0x128 [ 21.099385] kasan_check_range+0x100/0x1a8 [ 21.099439] __kasan_check_write+0x20/0x30 [ 21.099484] kasan_atomics_helper+0x154c/0x4858 [ 21.099538] kasan_atomics+0x198/0x2e0 [ 21.099776] kunit_try_run_case+0x170/0x3f0 [ 21.099861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.099945] kthread+0x328/0x630 [ 21.100188] ret_from_fork+0x10/0x20 [ 21.100697] [ 21.100975] Allocated by task 265: [ 21.101050] kasan_save_stack+0x3c/0x68 [ 21.101171] kasan_save_track+0x20/0x40 [ 21.101212] kasan_save_alloc_info+0x40/0x58 [ 21.101254] __kasan_kmalloc+0xd4/0xd8 [ 21.101293] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.101332] kasan_atomics+0xb8/0x2e0 [ 21.101373] kunit_try_run_case+0x170/0x3f0 [ 21.101413] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.101486] kthread+0x328/0x630 [ 21.101520] ret_from_fork+0x10/0x20 [ 21.101557] [ 21.101580] The buggy address belongs to the object at fff00000c78ca300 [ 21.101580] which belongs to the cache kmalloc-64 of size 64 [ 21.101960] The buggy address is located 0 bytes to the right of [ 21.101960] allocated 48-byte region [fff00000c78ca300, fff00000c78ca330) [ 21.102060] [ 21.102094] The buggy address belongs to the physical page: [ 21.102128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca [ 21.102427] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.102489] page_type: f5(slab) [ 21.102666] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.102746] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.102788] page dumped because: kasan: bad access detected [ 21.103055] [ 21.103244] Memory state around the buggy address: [ 21.103312] fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.103412] fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.103457] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.103498] ^ [ 21.103566] fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.103838] fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.103987] ================================================================== [ 21.129143] ================================================================== [ 21.129206] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 21.129256] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265 [ 21.129305] [ 21.129337] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.129416] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.129444] Hardware name: linux,dummy-virt (DT) [ 21.129477] Call trace: [ 21.129500] show_stack+0x20/0x38 (C) [ 21.129548] dump_stack_lvl+0x8c/0xd0 [ 21.129598] print_report+0x118/0x608 [ 21.129647] kasan_report+0xdc/0x128 [ 21.129759] kasan_check_range+0x100/0x1a8 [ 21.129817] __kasan_check_write+0x20/0x30 [ 21.130055] kasan_atomics_helper+0x16d0/0x4858 [ 21.130106] kasan_atomics+0x198/0x2e0 [ 21.130161] kunit_try_run_case+0x170/0x3f0 [ 21.130216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.130435] kthread+0x328/0x630 [ 21.130478] ret_from_fork+0x10/0x20 [ 21.130726] [ 21.130753] Allocated by task 265: [ 21.130840] kasan_save_stack+0x3c/0x68 [ 21.130882] kasan_save_track+0x20/0x40 [ 21.130922] kasan_save_alloc_info+0x40/0x58 [ 21.130962] __kasan_kmalloc+0xd4/0xd8 [ 21.131006] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.131051] kasan_atomics+0xb8/0x2e0 [ 21.131179] kunit_try_run_case+0x170/0x3f0 [ 21.131218] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.131263] kthread+0x328/0x630 [ 21.131295] ret_from_fork+0x10/0x20 [ 21.131333] [ 21.131353] The buggy address belongs to the object at fff00000c78ca300 [ 21.131353] which belongs to the cache kmalloc-64 of size 64 [ 21.131684] The buggy address is located 0 bytes to the right of [ 21.131684] allocated 48-byte region [fff00000c78ca300, fff00000c78ca330) [ 21.131752] [ 21.131774] The buggy address belongs to the physical page: [ 21.131806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca [ 21.132226] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.132301] page_type: f5(slab) [ 21.132358] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.132412] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.132576] page dumped because: kasan: bad access detected [ 21.132611] [ 21.132631] Memory state around the buggy address: [ 21.132666] fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.132711] fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.132789] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.132829] ^ [ 21.132865] fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.132907] fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.133197] ================================================================== [ 21.141117] ================================================================== [ 21.141175] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 21.141226] Read of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265 [ 21.141351] [ 21.141385] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.141465] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.141494] Hardware name: linux,dummy-virt (DT) [ 21.141525] Call trace: [ 21.141630] show_stack+0x20/0x38 (C) [ 21.141750] dump_stack_lvl+0x8c/0xd0 [ 21.141802] print_report+0x118/0x608 [ 21.141866] kasan_report+0xdc/0x128 [ 21.141915] __asan_report_load8_noabort+0x20/0x30 [ 21.141974] kasan_atomics_helper+0x3e20/0x4858 [ 21.142025] kasan_atomics+0x198/0x2e0 [ 21.142071] kunit_try_run_case+0x170/0x3f0 [ 21.142119] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.142183] kthread+0x328/0x630 [ 21.142234] ret_from_fork+0x10/0x20 [ 21.142483] [ 21.142601] Allocated by task 265: [ 21.142692] kasan_save_stack+0x3c/0x68 [ 21.142733] kasan_save_track+0x20/0x40 [ 21.142930] kasan_save_alloc_info+0x40/0x58 [ 21.143137] __kasan_kmalloc+0xd4/0xd8 [ 21.143470] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.143512] kasan_atomics+0xb8/0x2e0 [ 21.143549] kunit_try_run_case+0x170/0x3f0 [ 21.143588] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.143631] kthread+0x328/0x630 [ 21.143665] ret_from_fork+0x10/0x20 [ 21.143702] [ 21.143722] The buggy address belongs to the object at fff00000c78ca300 [ 21.143722] which belongs to the cache kmalloc-64 of size 64 [ 21.143779] The buggy address is located 0 bytes to the right of [ 21.143779] allocated 48-byte region [fff00000c78ca300, fff00000c78ca330) [ 21.143982] [ 21.144005] The buggy address belongs to the physical page: [ 21.144037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca [ 21.144189] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.144293] page_type: f5(slab) [ 21.144446] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.144499] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.144561] page dumped because: kasan: bad access detected [ 21.144597] [ 21.144617] Memory state around the buggy address: [ 21.144649] fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.144700] fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.144745] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.144785] ^ [ 21.144819] fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.144898] fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.144972] ================================================================== [ 20.984596] ================================================================== [ 20.984646] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 20.985178] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265 [ 20.985233] [ 20.985265] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.985345] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.985373] Hardware name: linux,dummy-virt (DT) [ 20.986104] Call trace: [ 20.986142] show_stack+0x20/0x38 (C) [ 20.986212] dump_stack_lvl+0x8c/0xd0 [ 20.986300] print_report+0x118/0x608 [ 20.986348] kasan_report+0xdc/0x128 [ 20.986402] __asan_report_store8_noabort+0x20/0x30 [ 20.986512] kasan_atomics_helper+0x3e5c/0x4858 [ 20.986565] kasan_atomics+0x198/0x2e0 [ 20.986658] kunit_try_run_case+0x170/0x3f0 [ 20.986705] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.986758] kthread+0x328/0x630 [ 20.987114] ret_from_fork+0x10/0x20 [ 20.987269] [ 20.987305] Allocated by task 265: [ 20.987449] kasan_save_stack+0x3c/0x68 [ 20.987553] kasan_save_track+0x20/0x40 [ 20.987942] kasan_save_alloc_info+0x40/0x58 [ 20.988137] __kasan_kmalloc+0xd4/0xd8 [ 20.988189] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.988231] kasan_atomics+0xb8/0x2e0 [ 20.988269] kunit_try_run_case+0x170/0x3f0 [ 20.988310] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.988356] kthread+0x328/0x630 [ 20.988390] ret_from_fork+0x10/0x20 [ 20.988427] [ 20.989024] The buggy address belongs to the object at fff00000c78ca300 [ 20.989024] which belongs to the cache kmalloc-64 of size 64 [ 20.989138] The buggy address is located 0 bytes to the right of [ 20.989138] allocated 48-byte region [fff00000c78ca300, fff00000c78ca330) [ 20.989214] [ 20.989247] The buggy address belongs to the physical page: [ 20.989280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca [ 20.989802] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.989871] page_type: f5(slab) [ 20.989919] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.990159] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.990207] page dumped because: kasan: bad access detected [ 20.990262] [ 20.990282] Memory state around the buggy address: [ 20.990317] fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.990571] fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.990989] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.991263] ^ [ 20.991398] fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.991746] fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.992135] ================================================================== [ 21.045172] ================================================================== [ 21.045534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 21.045593] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265 [ 21.045650] [ 21.045805] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.046224] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.046289] Hardware name: linux,dummy-virt (DT) [ 21.046321] Call trace: [ 21.046346] show_stack+0x20/0x38 (C) [ 21.046519] dump_stack_lvl+0x8c/0xd0 [ 21.046569] print_report+0x118/0x608 [ 21.046615] kasan_report+0xdc/0x128 [ 21.046662] kasan_check_range+0x100/0x1a8 [ 21.046710] __kasan_check_write+0x20/0x30 [ 21.046756] kasan_atomics_helper+0x11f8/0x4858 [ 21.046817] kasan_atomics+0x198/0x2e0 [ 21.046865] kunit_try_run_case+0x170/0x3f0 [ 21.047008] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.047259] kthread+0x328/0x630 [ 21.047450] ret_from_fork+0x10/0x20 [ 21.047921] [ 21.047946] Allocated by task 265: [ 21.047976] kasan_save_stack+0x3c/0x68 [ 21.048416] kasan_save_track+0x20/0x40 [ 21.048507] kasan_save_alloc_info+0x40/0x58 [ 21.048550] __kasan_kmalloc+0xd4/0xd8 [ 21.048587] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.048742] kasan_atomics+0xb8/0x2e0 [ 21.048780] kunit_try_run_case+0x170/0x3f0 [ 21.048822] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.048865] kthread+0x328/0x630 [ 21.048936] ret_from_fork+0x10/0x20 [ 21.048973] [ 21.048998] The buggy address belongs to the object at fff00000c78ca300 [ 21.048998] which belongs to the cache kmalloc-64 of size 64 [ 21.049074] The buggy address is located 0 bytes to the right of [ 21.049074] allocated 48-byte region [fff00000c78ca300, fff00000c78ca330) [ 21.049140] [ 21.049187] The buggy address belongs to the physical page: [ 21.049368] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca [ 21.049441] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.049588] page_type: f5(slab) [ 21.049706] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.049777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.049820] page dumped because: kasan: bad access detected [ 21.049853] [ 21.049876] Memory state around the buggy address: [ 21.049977] fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.050114] fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.050168] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.050208] ^ [ 21.050243] fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.050284] fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.050323] ================================================================== [ 21.133530] ================================================================== [ 21.133579] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 21.133628] Read of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265 [ 21.133708] [ 21.133740] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.133836] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.133865] Hardware name: linux,dummy-virt (DT) [ 21.133897] Call trace: [ 21.133920] show_stack+0x20/0x38 (C) [ 21.134007] dump_stack_lvl+0x8c/0xd0 [ 21.134134] print_report+0x118/0x608 [ 21.134195] kasan_report+0xdc/0x128 [ 21.134241] __asan_report_load8_noabort+0x20/0x30 [ 21.134290] kasan_atomics_helper+0x3e10/0x4858 [ 21.134338] kasan_atomics+0x198/0x2e0 [ 21.134385] kunit_try_run_case+0x170/0x3f0 [ 21.134440] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.134712] kthread+0x328/0x630 [ 21.134929] ret_from_fork+0x10/0x20 [ 21.135099] [ 21.135119] Allocated by task 265: [ 21.135220] kasan_save_stack+0x3c/0x68 [ 21.135443] kasan_save_track+0x20/0x40 [ 21.135640] kasan_save_alloc_info+0x40/0x58 [ 21.135852] __kasan_kmalloc+0xd4/0xd8 [ 21.135945] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.135986] kasan_atomics+0xb8/0x2e0 [ 21.136022] kunit_try_run_case+0x170/0x3f0 [ 21.136062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.136107] kthread+0x328/0x630 [ 21.136140] ret_from_fork+0x10/0x20 [ 21.136184] [ 21.136204] The buggy address belongs to the object at fff00000c78ca300 [ 21.136204] which belongs to the cache kmalloc-64 of size 64 [ 21.136316] The buggy address is located 0 bytes to the right of [ 21.136316] allocated 48-byte region [fff00000c78ca300, fff00000c78ca330) [ 21.136382] [ 21.136405] The buggy address belongs to the physical page: [ 21.136479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca [ 21.136537] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.136586] page_type: f5(slab) [ 21.136623] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.136674] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.136717] page dumped because: kasan: bad access detected [ 21.136751] [ 21.136770] Memory state around the buggy address: [ 21.136802] fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.136847] fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.136892] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.136931] ^ [ 21.136967] fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.137011] fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.137048] ================================================================== [ 21.076907] ================================================================== [ 21.077038] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 21.077092] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265 [ 21.077376] [ 21.077411] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.077491] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.077519] Hardware name: linux,dummy-virt (DT) [ 21.077553] Call trace: [ 21.077577] show_stack+0x20/0x38 (C) [ 21.077628] dump_stack_lvl+0x8c/0xd0 [ 21.077688] print_report+0x118/0x608 [ 21.077736] kasan_report+0xdc/0x128 [ 21.078008] kasan_check_range+0x100/0x1a8 [ 21.078210] __kasan_check_write+0x20/0x30 [ 21.078596] kasan_atomics_helper+0x1414/0x4858 [ 21.078962] kasan_atomics+0x198/0x2e0 [ 21.079020] kunit_try_run_case+0x170/0x3f0 [ 21.079238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.079298] kthread+0x328/0x630 [ 21.080756] ret_from_fork+0x10/0x20 [ 21.080900] [ 21.080984] Allocated by task 265: [ 21.081079] kasan_save_stack+0x3c/0x68 [ 21.081231] kasan_save_track+0x20/0x40 [ 21.081272] kasan_save_alloc_info+0x40/0x58 [ 21.081336] __kasan_kmalloc+0xd4/0xd8 [ 21.081536] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.081601] kasan_atomics+0xb8/0x2e0 [ 21.081637] kunit_try_run_case+0x170/0x3f0 [ 21.081678] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.081744] kthread+0x328/0x630 [ 21.081918] ret_from_fork+0x10/0x20 [ 21.082006] [ 21.082029] The buggy address belongs to the object at fff00000c78ca300 [ 21.082029] which belongs to the cache kmalloc-64 of size 64 [ 21.082268] The buggy address is located 0 bytes to the right of [ 21.082268] allocated 48-byte region [fff00000c78ca300, fff00000c78ca330) [ 21.082333] [ 21.082360] The buggy address belongs to the physical page: [ 21.082512] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca [ 21.082577] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.082625] page_type: f5(slab) [ 21.082671] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.082859] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.082903] page dumped because: kasan: bad access detected [ 21.082936] [ 21.082957] Memory state around the buggy address: [ 21.082995] fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.083040] fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.083084] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.083623] ^ [ 21.084091] fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.084581] fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.084698] ================================================================== [ 20.961749] ================================================================== [ 20.961811] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 20.962035] Read of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265 [ 20.962509] [ 20.962794] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.962884] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.962912] Hardware name: linux,dummy-virt (DT) [ 20.962944] Call trace: [ 20.962968] show_stack+0x20/0x38 (C) [ 20.963035] dump_stack_lvl+0x8c/0xd0 [ 20.963082] print_report+0x118/0x608 [ 20.963498] kasan_report+0xdc/0x128 [ 20.963930] kasan_check_range+0x100/0x1a8 [ 20.964078] __kasan_check_read+0x20/0x30 [ 20.964133] kasan_atomics_helper+0xdd4/0x4858 [ 20.964418] kasan_atomics+0x198/0x2e0 [ 20.964646] kunit_try_run_case+0x170/0x3f0 [ 20.964700] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.964837] kthread+0x328/0x630 [ 20.965137] ret_from_fork+0x10/0x20 [ 20.965707] [ 20.965746] Allocated by task 265: [ 20.965784] kasan_save_stack+0x3c/0x68 [ 20.965858] kasan_save_track+0x20/0x40 [ 20.965966] kasan_save_alloc_info+0x40/0x58 [ 20.966060] __kasan_kmalloc+0xd4/0xd8 [ 20.966138] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.966283] kasan_atomics+0xb8/0x2e0 [ 20.966353] kunit_try_run_case+0x170/0x3f0 [ 20.966393] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.966480] kthread+0x328/0x630 [ 20.966604] ret_from_fork+0x10/0x20 [ 20.966687] [ 20.966737] The buggy address belongs to the object at fff00000c78ca300 [ 20.966737] which belongs to the cache kmalloc-64 of size 64 [ 20.966798] The buggy address is located 0 bytes to the right of [ 20.966798] allocated 48-byte region [fff00000c78ca300, fff00000c78ca330) [ 20.966862] [ 20.966924] The buggy address belongs to the physical page: [ 20.966956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca [ 20.967083] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.967571] page_type: f5(slab) [ 20.967619] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.968254] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.968300] page dumped because: kasan: bad access detected [ 20.968395] [ 20.968521] Memory state around the buggy address: [ 20.969009] fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.969169] fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.969266] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.969392] ^ [ 20.969428] fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.969693] fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.969791] ================================================================== [ 21.050981] ================================================================== [ 21.051033] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 21.051082] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265 [ 21.051132] [ 21.051176] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.051263] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.051290] Hardware name: linux,dummy-virt (DT) [ 21.051323] Call trace: [ 21.051362] show_stack+0x20/0x38 (C) [ 21.051412] dump_stack_lvl+0x8c/0xd0 [ 21.051486] print_report+0x118/0x608 [ 21.051532] kasan_report+0xdc/0x128 [ 21.051913] kasan_check_range+0x100/0x1a8 [ 21.052361] __kasan_check_write+0x20/0x30 [ 21.052435] kasan_atomics_helper+0x126c/0x4858 [ 21.052484] kasan_atomics+0x198/0x2e0 [ 21.052635] kunit_try_run_case+0x170/0x3f0 [ 21.052763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.052841] kthread+0x328/0x630 [ 21.052884] ret_from_fork+0x10/0x20 [ 21.052943] [ 21.052964] Allocated by task 265: [ 21.052993] kasan_save_stack+0x3c/0x68 [ 21.053200] kasan_save_track+0x20/0x40 [ 21.053589] kasan_save_alloc_info+0x40/0x58 [ 21.053658] __kasan_kmalloc+0xd4/0xd8 [ 21.053697] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.053739] kasan_atomics+0xb8/0x2e0 [ 21.053775] kunit_try_run_case+0x170/0x3f0 [ 21.053816] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.053859] kthread+0x328/0x630 [ 21.053940] ret_from_fork+0x10/0x20 [ 21.053977] [ 21.054000] The buggy address belongs to the object at fff00000c78ca300 [ 21.054000] which belongs to the cache kmalloc-64 of size 64 [ 21.054060] The buggy address is located 0 bytes to the right of [ 21.054060] allocated 48-byte region [fff00000c78ca300, fff00000c78ca330) [ 21.054407] [ 21.054431] The buggy address belongs to the physical page: [ 21.054463] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca [ 21.054590] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.054669] page_type: f5(slab) [ 21.054777] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.054838] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.054880] page dumped because: kasan: bad access detected [ 21.054933] [ 21.054971] Memory state around the buggy address: [ 21.055010] fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.055138] fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.055516] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.055841] ^ [ 21.055992] fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.056274] fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.056319] ================================================================== [ 20.946417] ================================================================== [ 20.946622] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 20.946674] Write of size 4 at addr fff00000c78ca330 by task kunit_try_catch/265 [ 20.947195] [ 20.947326] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.947613] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.947650] Hardware name: linux,dummy-virt (DT) [ 20.947707] Call trace: [ 20.947732] show_stack+0x20/0x38 (C) [ 20.947783] dump_stack_lvl+0x8c/0xd0 [ 20.948007] print_report+0x118/0x608 [ 20.948055] kasan_report+0xdc/0x128 [ 20.948233] kasan_check_range+0x100/0x1a8 [ 20.948320] __kasan_check_write+0x20/0x30 [ 20.948370] kasan_atomics_helper+0xd3c/0x4858 [ 20.948750] kasan_atomics+0x198/0x2e0 [ 20.948812] kunit_try_run_case+0x170/0x3f0 [ 20.948863] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.948918] kthread+0x328/0x630 [ 20.949202] ret_from_fork+0x10/0x20 [ 20.949253] [ 20.949274] Allocated by task 265: [ 20.949468] kasan_save_stack+0x3c/0x68 [ 20.949644] kasan_save_track+0x20/0x40 [ 20.949702] kasan_save_alloc_info+0x40/0x58 [ 20.949746] __kasan_kmalloc+0xd4/0xd8 [ 20.949797] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.949838] kasan_atomics+0xb8/0x2e0 [ 20.950073] kunit_try_run_case+0x170/0x3f0 [ 20.950118] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.950174] kthread+0x328/0x630 [ 20.950224] ret_from_fork+0x10/0x20 [ 20.950262] [ 20.950463] The buggy address belongs to the object at fff00000c78ca300 [ 20.950463] which belongs to the cache kmalloc-64 of size 64 [ 20.950984] The buggy address is located 0 bytes to the right of [ 20.950984] allocated 48-byte region [fff00000c78ca300, fff00000c78ca330) [ 20.951095] [ 20.951118] The buggy address belongs to the physical page: [ 20.951161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca [ 20.951217] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.951903] page_type: f5(slab) [ 20.951976] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.952026] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.952067] page dumped because: kasan: bad access detected [ 20.952100] [ 20.952189] Memory state around the buggy address: [ 20.952227] fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.952528] fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.952606] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.952645] ^ [ 20.952681] fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.952892] fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.952932] ================================================================== [ 20.953921] ================================================================== [ 20.954055] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 20.954130] Read of size 4 at addr fff00000c78ca330 by task kunit_try_catch/265 [ 20.954193] [ 20.954225] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.954776] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.954807] Hardware name: linux,dummy-virt (DT) [ 20.955182] Call trace: [ 20.955247] show_stack+0x20/0x38 (C) [ 20.955572] dump_stack_lvl+0x8c/0xd0 [ 20.955902] print_report+0x118/0x608 [ 20.955984] kasan_report+0xdc/0x128 [ 20.956033] __asan_report_load4_noabort+0x20/0x30 [ 20.956107] kasan_atomics_helper+0x3e04/0x4858 [ 20.956223] kasan_atomics+0x198/0x2e0 [ 20.956425] kunit_try_run_case+0x170/0x3f0 [ 20.956474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.956528] kthread+0x328/0x630 [ 20.956570] ret_from_fork+0x10/0x20 [ 20.957473] [ 20.957597] Allocated by task 265: [ 20.957869] kasan_save_stack+0x3c/0x68 [ 20.957918] kasan_save_track+0x20/0x40 [ 20.958172] kasan_save_alloc_info+0x40/0x58 [ 20.958400] __kasan_kmalloc+0xd4/0xd8 [ 20.958498] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.958573] kasan_atomics+0xb8/0x2e0 [ 20.958611] kunit_try_run_case+0x170/0x3f0 [ 20.958650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.958696] kthread+0x328/0x630 [ 20.958767] ret_from_fork+0x10/0x20 [ 20.958823] [ 20.958899] The buggy address belongs to the object at fff00000c78ca300 [ 20.958899] which belongs to the cache kmalloc-64 of size 64 [ 20.958966] The buggy address is located 0 bytes to the right of [ 20.958966] allocated 48-byte region [fff00000c78ca300, fff00000c78ca330) [ 20.959239] [ 20.959282] The buggy address belongs to the physical page: [ 20.959398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca [ 20.959452] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.959501] page_type: f5(slab) [ 20.959547] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.959713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.959753] page dumped because: kasan: bad access detected [ 20.959918] [ 20.959939] Memory state around the buggy address: [ 20.959972] fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.960018] fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.960061] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.960102] ^ [ 20.960136] fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.960359] fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.961212] ================================================================== [ 20.888756] ================================================================== [ 20.888811] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 20.889211] Write of size 4 at addr fff00000c78ca330 by task kunit_try_catch/265 [ 20.889510] [ 20.889544] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.889638] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.889667] Hardware name: linux,dummy-virt (DT) [ 20.891363] kunit_try_run_case+0x170/0x3f0 [ 20.892661] kasan_save_alloc_info+0x40/0x58 [ 20.892705] __kasan_kmalloc+0xd4/0xd8 [ 20.893028] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.893197] kasan_atomics+0xb8/0x2e0 [ 20.893236] kunit_try_run_case+0x170/0x3f0 [ 20.893601] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.893777] kthread+0x328/0x630 [ 20.893811] ret_from_fork+0x10/0x20 [ 20.894060] [ 20.894290] The buggy address belongs to the object at fff00000c78ca300 [ 20.894290] which belongs to the cache kmalloc-64 of size 64 [ 20.895438] page dumped because: kasan: bad access detected [ 20.896165] ^ [ 20.898339] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.900006] __kasan_check_write+0x20/0x30 [ 20.901052] kasan_save_track+0x20/0x40 [ 20.901405] __kasan_kmalloc+0xd4/0xd8 [ 20.901540] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.901621] kasan_atomics+0xb8/0x2e0 [ 20.901670] kunit_try_run_case+0x170/0x3f0 [ 20.901806] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.901852] kthread+0x328/0x630 [ 20.901926] ret_from_fork+0x10/0x20 [ 20.902113] [ 20.902417] The buggy address belongs to the object at fff00000c78ca300 [ 20.902417] which belongs to the cache kmalloc-64 of size 64 [ 20.902485] The buggy address is located 0 bytes to the right of [ 20.902485] allocated 48-byte region [fff00000c78ca300, fff00000c78ca330) [ 20.902549] [ 20.902865] The buggy address belongs to the physical page: [ 20.902985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca [ 20.903043] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.903113] page_type: f5(slab) [ 20.903168] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.903249] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.903290] page dumped because: kasan: bad access detected [ 20.903323] [ 20.903342] Memory state around the buggy address: [ 20.904006] fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.904771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 20.906003] __asan_report_load4_noabort+0x20/0x30 [ 20.906415] kasan_save_stack+0x3c/0x68 [ 20.907189] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.908245] The buggy address is located 0 bytes to the right of [ 20.908245] allocated 48-byte region [fff00000c78ca300, fff00000c78ca330) [ 20.909330] fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.909839] fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.911343] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.913367] show_stack+0x20/0x38 (C) [ 20.914879] __kasan_kmalloc+0xd4/0xd8 [ 20.914960] kasan_atomics+0xb8/0x2e0 [ 20.915002] kunit_try_run_case+0x170/0x3f0 [ 20.915241] The buggy address belongs to the object at fff00000c78ca300 [ 20.915241] which belongs to the cache kmalloc-64 of size 64 [ 20.917115] page dumped because: kasan: bad access detected [ 20.917306] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.918075] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.919595] kasan_save_alloc_info+0x40/0x58 [ 20.919973] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.920865] ================================================================== [ 21.137308] ================================================================== [ 21.137375] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 21.137431] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265 [ 21.137595] [ 21.137625] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.137707] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.137735] Hardware name: linux,dummy-virt (DT) [ 21.137765] Call trace: [ 21.137788] show_stack+0x20/0x38 (C) [ 21.137837] dump_stack_lvl+0x8c/0xd0 [ 21.137884] print_report+0x118/0x608 [ 21.137942] kasan_report+0xdc/0x128 [ 21.137989] kasan_check_range+0x100/0x1a8 [ 21.138037] __kasan_check_write+0x20/0x30 [ 21.138113] kasan_atomics_helper+0x175c/0x4858 [ 21.138173] kasan_atomics+0x198/0x2e0 [ 21.138220] kunit_try_run_case+0x170/0x3f0 [ 21.138290] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.138344] kthread+0x328/0x630 [ 21.138522] ret_from_fork+0x10/0x20 [ 21.138788] [ 21.138923] Allocated by task 265: [ 21.138951] kasan_save_stack+0x3c/0x68 [ 21.139000] kasan_save_track+0x20/0x40 [ 21.139160] kasan_save_alloc_info+0x40/0x58 [ 21.139203] __kasan_kmalloc+0xd4/0xd8 [ 21.139240] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.139302] kasan_atomics+0xb8/0x2e0 [ 21.139351] kunit_try_run_case+0x170/0x3f0 [ 21.139392] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.139440] kthread+0x328/0x630 [ 21.139473] ret_from_fork+0x10/0x20 [ 21.139596] [ 21.139624] The buggy address belongs to the object at fff00000c78ca300 [ 21.139624] which belongs to the cache kmalloc-64 of size 64 [ 21.140010] The buggy address is located 0 bytes to the right of [ 21.140010] allocated 48-byte region [fff00000c78ca300, fff00000c78ca330) [ 21.140107] [ 21.140130] The buggy address belongs to the physical page: [ 21.140171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca [ 21.140223] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.140273] page_type: f5(slab) [ 21.140310] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.140361] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.140403] page dumped because: kasan: bad access detected [ 21.140437] [ 21.140457] Memory state around the buggy address: [ 21.140495] fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.140540] fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.140586] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.140661] ^ [ 21.140702] fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.140748] fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.140817] ================================================================== [ 21.038178] ================================================================== [ 21.038228] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 21.038680] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265 [ 21.039056] [ 21.039231] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.039495] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.039600] Hardware name: linux,dummy-virt (DT) [ 21.039633] Call trace: [ 21.039657] show_stack+0x20/0x38 (C) [ 21.039712] dump_stack_lvl+0x8c/0xd0 [ 21.039761] print_report+0x118/0x608 [ 21.039808] kasan_report+0xdc/0x128 [ 21.039853] kasan_check_range+0x100/0x1a8 [ 21.039963] __kasan_check_write+0x20/0x30 [ 21.040202] kasan_atomics_helper+0x1190/0x4858 [ 21.040263] kasan_atomics+0x198/0x2e0 [ 21.040309] kunit_try_run_case+0x170/0x3f0 [ 21.040470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.040627] kthread+0x328/0x630 [ 21.040792] ret_from_fork+0x10/0x20 [ 21.041045] [ 21.041168] Allocated by task 265: [ 21.041330] kasan_save_stack+0x3c/0x68 [ 21.041414] kasan_save_track+0x20/0x40 [ 21.041467] kasan_save_alloc_info+0x40/0x58 [ 21.041507] __kasan_kmalloc+0xd4/0xd8 [ 21.041548] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.041627] kasan_atomics+0xb8/0x2e0 [ 21.041780] kunit_try_run_case+0x170/0x3f0 [ 21.041827] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.042013] kthread+0x328/0x630 [ 21.042046] ret_from_fork+0x10/0x20 [ 21.042118] [ 21.042370] The buggy address belongs to the object at fff00000c78ca300 [ 21.042370] which belongs to the cache kmalloc-64 of size 64 [ 21.042438] The buggy address is located 0 bytes to the right of [ 21.042438] allocated 48-byte region [fff00000c78ca300, fff00000c78ca330) [ 21.042503] [ 21.042526] The buggy address belongs to the physical page: [ 21.042557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca [ 21.042610] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.043148] page_type: f5(slab) [ 21.043354] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.043408] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.044328] page dumped because: kasan: bad access detected [ 21.044386] [ 21.044408] Memory state around the buggy address: [ 21.044450] fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.044520] fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.044563] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.044621] ^ [ 21.044667] fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.044844] fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.044946] ================================================================== [ 21.026719] ================================================================== [ 21.026770] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 21.026821] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265 [ 21.027259] [ 21.027485] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.027613] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.027643] Hardware name: linux,dummy-virt (DT) [ 21.027673] Call trace: [ 21.027697] show_stack+0x20/0x38 (C) [ 21.027747] dump_stack_lvl+0x8c/0xd0 [ 21.027795] print_report+0x118/0x608 [ 21.027842] kasan_report+0xdc/0x128 [ 21.027938] kasan_check_range+0x100/0x1a8 [ 21.027987] __kasan_check_write+0x20/0x30 [ 21.028034] kasan_atomics_helper+0x10c0/0x4858 [ 21.028084] kasan_atomics+0x198/0x2e0 [ 21.028372] kunit_try_run_case+0x170/0x3f0 [ 21.028428] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.028528] kthread+0x328/0x630 [ 21.028571] ret_from_fork+0x10/0x20 [ 21.028620] [ 21.028641] Allocated by task 265: [ 21.028867] kasan_save_stack+0x3c/0x68 [ 21.029009] kasan_save_track+0x20/0x40 [ 21.029047] kasan_save_alloc_info+0x40/0x58 [ 21.029089] __kasan_kmalloc+0xd4/0xd8 [ 21.029126] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.029379] kasan_atomics+0xb8/0x2e0 [ 21.029494] kunit_try_run_case+0x170/0x3f0 [ 21.029534] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.029580] kthread+0x328/0x630 [ 21.029615] ret_from_fork+0x10/0x20 [ 21.029653] [ 21.029928] The buggy address belongs to the object at fff00000c78ca300 [ 21.029928] which belongs to the cache kmalloc-64 of size 64 [ 21.030226] The buggy address is located 0 bytes to the right of [ 21.030226] allocated 48-byte region [fff00000c78ca300, fff00000c78ca330) [ 21.030295] [ 21.030316] The buggy address belongs to the physical page: [ 21.030453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca [ 21.030540] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.030697] page_type: f5(slab) [ 21.030742] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.030893] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.030935] page dumped because: kasan: bad access detected [ 21.031054] [ 21.031128] Memory state around the buggy address: [ 21.031171] fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.031216] fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.031269] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.031310] ^ [ 21.031344] fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.031390] fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.031550] ================================================================== [ 21.092329] ================================================================== [ 21.092375] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 21.092422] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265 [ 21.092719] [ 21.092823] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.092907] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.092936] Hardware name: linux,dummy-virt (DT) [ 21.092969] Call trace: [ 21.093000] show_stack+0x20/0x38 (C) [ 21.093051] dump_stack_lvl+0x8c/0xd0 [ 21.093097] print_report+0x118/0x608 [ 21.093144] kasan_report+0xdc/0x128 [ 21.093200] kasan_check_range+0x100/0x1a8 [ 21.093257] __kasan_check_write+0x20/0x30 [ 21.093479] kasan_atomics_helper+0x14e4/0x4858 [ 21.093724] kasan_atomics+0x198/0x2e0 [ 21.093949] kunit_try_run_case+0x170/0x3f0 [ 21.094026] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.094665] kthread+0x328/0x630 [ 21.094730] ret_from_fork+0x10/0x20 [ 21.094996] [ 21.095027] Allocated by task 265: [ 21.095058] kasan_save_stack+0x3c/0x68 [ 21.095101] kasan_save_track+0x20/0x40 [ 21.095161] kasan_save_alloc_info+0x40/0x58 [ 21.095305] __kasan_kmalloc+0xd4/0xd8 [ 21.095345] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.095384] kasan_atomics+0xb8/0x2e0 [ 21.095577] kunit_try_run_case+0x170/0x3f0 [ 21.095729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.095812] kthread+0x328/0x630 [ 21.095955] ret_from_fork+0x10/0x20 [ 21.095995] [ 21.096018] The buggy address belongs to the object at fff00000c78ca300 [ 21.096018] which belongs to the cache kmalloc-64 of size 64 [ 21.096406] The buggy address is located 0 bytes to the right of [ 21.096406] allocated 48-byte region [fff00000c78ca300, fff00000c78ca330) [ 21.096474] [ 21.096497] The buggy address belongs to the physical page: [ 21.096571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca [ 21.096646] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.096694] page_type: f5(slab) [ 21.096734] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.096971] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.097085] page dumped because: kasan: bad access detected [ 21.097137] [ 21.097169] Memory state around the buggy address: [ 21.097203] fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.097248] fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.097320] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.097361] ^ [ 21.097660] fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.097768] fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.097921] ================================================================== [ 21.063654] ================================================================== [ 21.063709] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 21.063759] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265 [ 21.063809] [ 21.063841] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.063976] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.064339] Hardware name: linux,dummy-virt (DT) [ 21.064380] Call trace: [ 21.064429] show_stack+0x20/0x38 (C) [ 21.064484] dump_stack_lvl+0x8c/0xd0 [ 21.064650] print_report+0x118/0x608 [ 21.064736] kasan_report+0xdc/0x128 [ 21.064819] kasan_check_range+0x100/0x1a8 [ 21.064874] __kasan_check_write+0x20/0x30 [ 21.064952] kasan_atomics_helper+0x1384/0x4858 [ 21.065001] kasan_atomics+0x198/0x2e0 [ 21.065076] kunit_try_run_case+0x170/0x3f0 [ 21.065326] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.065382] kthread+0x328/0x630 [ 21.065446] ret_from_fork+0x10/0x20 [ 21.065545] [ 21.065566] Allocated by task 265: [ 21.065693] kasan_save_stack+0x3c/0x68 [ 21.065869] kasan_save_track+0x20/0x40 [ 21.065928] kasan_save_alloc_info+0x40/0x58 [ 21.065970] __kasan_kmalloc+0xd4/0xd8 [ 21.066008] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.066049] kasan_atomics+0xb8/0x2e0 [ 21.066085] kunit_try_run_case+0x170/0x3f0 [ 21.066128] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.066564] kthread+0x328/0x630 [ 21.066610] ret_from_fork+0x10/0x20 [ 21.066648] [ 21.066671] The buggy address belongs to the object at fff00000c78ca300 [ 21.066671] which belongs to the cache kmalloc-64 of size 64 [ 21.067027] The buggy address is located 0 bytes to the right of [ 21.067027] allocated 48-byte region [fff00000c78ca300, fff00000c78ca330) [ 21.068121] [ 21.068391] The buggy address belongs to the physical page: [ 21.068431] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca [ 21.068513] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.068565] page_type: f5(slab) [ 21.068605] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.068692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.068735] page dumped because: kasan: bad access detected [ 21.068955] [ 21.068988] Memory state around the buggy address: [ 21.069023] fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.069133] fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.069431] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.069548] ^ [ 21.069583] fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.069710] fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.069875] ================================================================== [ 21.011407] ================================================================== [ 21.011658] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 21.011827] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265 [ 21.011929] [ 21.011963] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.012044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.012072] Hardware name: linux,dummy-virt (DT) [ 21.012104] Call trace: [ 21.012127] show_stack+0x20/0x38 (C) [ 21.012829] dump_stack_lvl+0x8c/0xd0 [ 21.012893] print_report+0x118/0x608 [ 21.013007] kasan_report+0xdc/0x128 [ 21.013116] kasan_check_range+0x100/0x1a8 [ 21.013177] __kasan_check_write+0x20/0x30 [ 21.013318] kasan_atomics_helper+0xff0/0x4858 [ 21.013403] kasan_atomics+0x198/0x2e0 [ 21.013448] kunit_try_run_case+0x170/0x3f0 [ 21.013538] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.013612] kthread+0x328/0x630 [ 21.013758] ret_from_fork+0x10/0x20 [ 21.014180] [ 21.014232] Allocated by task 265: [ 21.014340] kasan_save_stack+0x3c/0x68 [ 21.014388] kasan_save_track+0x20/0x40 [ 21.014447] kasan_save_alloc_info+0x40/0x58 [ 21.014554] __kasan_kmalloc+0xd4/0xd8 [ 21.014596] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.014851] kasan_atomics+0xb8/0x2e0 [ 21.014963] kunit_try_run_case+0x170/0x3f0 [ 21.015286] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.015505] kthread+0x328/0x630 [ 21.015629] ret_from_fork+0x10/0x20 [ 21.015670] [ 21.015693] The buggy address belongs to the object at fff00000c78ca300 [ 21.015693] which belongs to the cache kmalloc-64 of size 64 [ 21.016078] The buggy address is located 0 bytes to the right of [ 21.016078] allocated 48-byte region [fff00000c78ca300, fff00000c78ca330) [ 21.016164] [ 21.016187] The buggy address belongs to the physical page: [ 21.016232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca [ 21.016286] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.017512] page_type: f5(slab) [ 21.017631] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.017807] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.017878] page dumped because: kasan: bad access detected [ 21.017911] [ 21.017932] Memory state around the buggy address: [ 21.017966] fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.018362] fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.018448] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.018622] ^ [ 21.018830] fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.018902] fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.018944] ================================================================== [ 21.111107] ================================================================== [ 21.111341] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 21.111683] Read of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265 [ 21.111762] [ 21.111792] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.112280] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.112313] Hardware name: linux,dummy-virt (DT) [ 21.112348] Call trace: [ 21.112371] show_stack+0x20/0x38 (C) [ 21.112450] dump_stack_lvl+0x8c/0xd0 [ 21.112497] print_report+0x118/0x608 [ 21.112545] kasan_report+0xdc/0x128 [ 21.112630] __asan_report_load8_noabort+0x20/0x30 [ 21.112680] kasan_atomics_helper+0x3db0/0x4858 [ 21.112966] kasan_atomics+0x198/0x2e0 [ 21.113115] kunit_try_run_case+0x170/0x3f0 [ 21.113175] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.113230] kthread+0x328/0x630 [ 21.113519] ret_from_fork+0x10/0x20 [ 21.113604] [ 21.113637] Allocated by task 265: [ 21.113666] kasan_save_stack+0x3c/0x68 [ 21.113806] kasan_save_track+0x20/0x40 [ 21.113864] kasan_save_alloc_info+0x40/0x58 [ 21.113929] __kasan_kmalloc+0xd4/0xd8 [ 21.113966] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.114068] kasan_atomics+0xb8/0x2e0 [ 21.114104] kunit_try_run_case+0x170/0x3f0 [ 21.114146] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.114201] kthread+0x328/0x630 [ 21.114236] ret_from_fork+0x10/0x20 [ 21.114343] [ 21.114393] The buggy address belongs to the object at fff00000c78ca300 [ 21.114393] which belongs to the cache kmalloc-64 of size 64 [ 21.114501] The buggy address is located 0 bytes to the right of [ 21.114501] allocated 48-byte region [fff00000c78ca300, fff00000c78ca330) [ 21.114614] [ 21.114690] The buggy address belongs to the physical page: [ 21.114721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca [ 21.114831] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.114981] page_type: f5(slab) [ 21.115058] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.115195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.115237] page dumped because: kasan: bad access detected [ 21.115269] [ 21.115433] Memory state around the buggy address: [ 21.115634] fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.115686] fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.115731] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.115772] ^ [ 21.115807] fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.115849] fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.115898] ================================================================== [ 21.020486] ================================================================== [ 21.021032] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 21.021085] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265 [ 21.021135] [ 21.021177] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.021265] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.021294] Hardware name: linux,dummy-virt (DT) [ 21.021326] Call trace: [ 21.021350] show_stack+0x20/0x38 (C) [ 21.021498] dump_stack_lvl+0x8c/0xd0 [ 21.021726] print_report+0x118/0x608 [ 21.021976] kasan_report+0xdc/0x128 [ 21.022172] kasan_check_range+0x100/0x1a8 [ 21.022222] __kasan_check_write+0x20/0x30 [ 21.022267] kasan_atomics_helper+0x1058/0x4858 [ 21.022316] kasan_atomics+0x198/0x2e0 [ 21.022660] kunit_try_run_case+0x170/0x3f0 [ 21.022714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.022768] kthread+0x328/0x630 [ 21.022812] ret_from_fork+0x10/0x20 [ 21.022861] [ 21.022892] Allocated by task 265: [ 21.022922] kasan_save_stack+0x3c/0x68 [ 21.022964] kasan_save_track+0x20/0x40 [ 21.023346] kasan_save_alloc_info+0x40/0x58 [ 21.023405] __kasan_kmalloc+0xd4/0xd8 [ 21.023574] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.023682] kasan_atomics+0xb8/0x2e0 [ 21.023719] kunit_try_run_case+0x170/0x3f0 [ 21.023836] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.023929] kthread+0x328/0x630 [ 21.023964] ret_from_fork+0x10/0x20 [ 21.024004] [ 21.024211] The buggy address belongs to the object at fff00000c78ca300 [ 21.024211] which belongs to the cache kmalloc-64 of size 64 [ 21.024409] The buggy address is located 0 bytes to the right of [ 21.024409] allocated 48-byte region [fff00000c78ca300, fff00000c78ca330) [ 21.024480] [ 21.024515] The buggy address belongs to the physical page: [ 21.024649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca [ 21.024870] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.024957] page_type: f5(slab) [ 21.024999] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.025126] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.025206] page dumped because: kasan: bad access detected [ 21.025352] [ 21.025408] Memory state around the buggy address: [ 21.025441] fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.025487] fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.025594] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.025647] ^ [ 21.025681] fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.025838] fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.026009] ================================================================== [ 20.858749] ================================================================== [ 20.858800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 20.858851] Read of size 4 at addr fff00000c78ca330 by task kunit_try_catch/265 [ 20.858901] [ 20.858931] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.859019] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.859048] Hardware name: linux,dummy-virt (DT) [ 20.859081] Call trace: [ 20.859103] show_stack+0x20/0x38 (C) [ 20.859165] dump_stack_lvl+0x8c/0xd0 [ 20.859211] print_report+0x118/0x608 [ 20.859655] kasan_report+0xdc/0x128 [ 20.860125] __asan_report_load4_noabort+0x20/0x30 [ 20.860191] kasan_atomics_helper+0x42d8/0x4858 [ 20.860313] kunit_try_run_case+0x170/0x3f0 [ 20.861436] __kasan_kmalloc+0xd4/0xd8 [ 20.862170] kthread+0x328/0x630 [ 20.864307] fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.866356] kasan_report+0xdc/0x128 [ 20.867008] kasan_check_range+0x100/0x1a8 [ 20.867334] __kasan_check_write+0x20/0x30 [ 20.867550] kasan_atomics_helper+0x934/0x4858 [ 20.867751] kasan_atomics+0x198/0x2e0 [ 20.868018] kunit_try_run_case+0x170/0x3f0 [ 20.868096] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.868214] kthread+0x328/0x630 [ 20.868382] ret_from_fork+0x10/0x20 [ 20.868501] [ 20.868550] Allocated by task 265: [ 20.868620] kasan_save_stack+0x3c/0x68 [ 20.868706] kasan_save_track+0x20/0x40 [ 20.868748] kasan_save_alloc_info+0x40/0x58 [ 20.868847] __kasan_kmalloc+0xd4/0xd8 [ 20.868885] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.868948] kasan_atomics+0xb8/0x2e0 [ 20.868987] kunit_try_run_case+0x170/0x3f0 [ 20.869024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.869068] kthread+0x328/0x630 [ 20.869370] ret_from_fork+0x10/0x20 [ 20.869489] [ 20.869546] The buggy address belongs to the object at fff00000c78ca300 [ 20.869546] which belongs to the cache kmalloc-64 of size 64 [ 20.869683] The buggy address is located 0 bytes to the right of [ 20.869683] allocated 48-byte region [fff00000c78ca300, fff00000c78ca330) [ 20.869787] [ 20.869808] The buggy address belongs to the physical page: [ 20.869841] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca [ 20.869897] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.869948] page_type: f5(slab) [ 20.869998] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.870051] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.870261] page dumped because: kasan: bad access detected [ 20.870990] fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.873473] print_report+0x118/0x608 [ 20.874595] ret_from_fork+0x10/0x20 [ 20.875671] ret_from_fork+0x10/0x20 [ 20.875967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca [ 20.877475] ================================================================== [ 20.992716] ================================================================== [ 20.992768] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 20.992819] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265 [ 20.993224] [ 20.993316] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.993399] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.993426] Hardware name: linux,dummy-virt (DT) [ 20.993467] Call trace: [ 20.993600] show_stack+0x20/0x38 (C) [ 20.993859] dump_stack_lvl+0x8c/0xd0 [ 20.993919] print_report+0x118/0x608 [ 20.994002] kasan_report+0xdc/0x128 [ 20.994120] kasan_check_range+0x100/0x1a8 [ 20.994185] __kasan_check_write+0x20/0x30 [ 20.994339] kasan_atomics_helper+0xeb8/0x4858 [ 20.994426] kasan_atomics+0x198/0x2e0 [ 20.994550] kunit_try_run_case+0x170/0x3f0 [ 20.994597] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.994650] kthread+0x328/0x630 [ 20.994691] ret_from_fork+0x10/0x20 [ 20.994740] [ 20.994760] Allocated by task 265: [ 20.994788] kasan_save_stack+0x3c/0x68 [ 20.994832] kasan_save_track+0x20/0x40 [ 20.994870] kasan_save_alloc_info+0x40/0x58 [ 20.994910] __kasan_kmalloc+0xd4/0xd8 [ 20.994958] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.995071] kasan_atomics+0xb8/0x2e0 [ 20.995134] kunit_try_run_case+0x170/0x3f0 [ 20.995194] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.995239] kthread+0x328/0x630 [ 20.995603] ret_from_fork+0x10/0x20 [ 20.995774] [ 20.996479] The buggy address belongs to the object at fff00000c78ca300 [ 20.996479] which belongs to the cache kmalloc-64 of size 64 [ 20.996881] The buggy address is located 0 bytes to the right of [ 20.996881] allocated 48-byte region [fff00000c78ca300, fff00000c78ca330) [ 20.997533] [ 20.997625] The buggy address belongs to the physical page: [ 20.997883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca [ 20.998047] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.998302] page_type: f5(slab) [ 20.998348] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.998990] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.999054] page dumped because: kasan: bad access detected [ 20.999108] [ 20.999130] Memory state around the buggy address: [ 20.999175] fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.999276] fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.999574] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.999616] ^ [ 20.999654] fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.000014] fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.000056] ================================================================== [ 21.070205] ================================================================== [ 21.070256] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 21.070654] Read of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265 [ 21.070714] [ 21.070751] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.071028] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.071058] Hardware name: linux,dummy-virt (DT) [ 21.071091] Call trace: [ 21.071113] show_stack+0x20/0x38 (C) [ 21.071181] dump_stack_lvl+0x8c/0xd0 [ 21.071407] print_report+0x118/0x608 [ 21.071457] kasan_report+0xdc/0x128 [ 21.071548] __asan_report_load8_noabort+0x20/0x30 [ 21.071659] kasan_atomics_helper+0x3f04/0x4858 [ 21.071707] kasan_atomics+0x198/0x2e0 [ 21.071760] kunit_try_run_case+0x170/0x3f0 [ 21.071969] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.072025] kthread+0x328/0x630 [ 21.072137] ret_from_fork+0x10/0x20 [ 21.072200] [ 21.072755] Allocated by task 265: [ 21.072798] kasan_save_stack+0x3c/0x68 [ 21.072947] kasan_save_track+0x20/0x40 [ 21.072993] kasan_save_alloc_info+0x40/0x58 [ 21.073166] __kasan_kmalloc+0xd4/0xd8 [ 21.073205] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.073355] kasan_atomics+0xb8/0x2e0 [ 21.073398] kunit_try_run_case+0x170/0x3f0 [ 21.073438] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.073663] kthread+0x328/0x630 [ 21.073743] ret_from_fork+0x10/0x20 [ 21.073831] [ 21.073854] The buggy address belongs to the object at fff00000c78ca300 [ 21.073854] which belongs to the cache kmalloc-64 of size 64 [ 21.073930] The buggy address is located 0 bytes to the right of [ 21.073930] allocated 48-byte region [fff00000c78ca300, fff00000c78ca330) [ 21.073995] [ 21.074368] The buggy address belongs to the physical page: [ 21.074407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca [ 21.074463] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.074511] page_type: f5(slab) [ 21.074551] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.074834] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.074952] page dumped because: kasan: bad access detected [ 21.075218] [ 21.075298] Memory state around the buggy address: [ 21.075335] fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.075501] fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.075547] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.075588] ^ [ 21.076070] fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.076119] fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.076169] ================================================================== [ 21.085571] ================================================================== [ 21.085921] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 21.085982] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265 [ 21.086064] [ 21.086207] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.086443] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.086512] Hardware name: linux,dummy-virt (DT) [ 21.086544] Call trace: [ 21.086567] show_stack+0x20/0x38 (C) [ 21.086617] dump_stack_lvl+0x8c/0xd0 [ 21.086762] print_report+0x118/0x608 [ 21.087340] kasan_report+0xdc/0x128 [ 21.087480] kasan_check_range+0x100/0x1a8 [ 21.087534] __kasan_check_write+0x20/0x30 [ 21.087580] kasan_atomics_helper+0x147c/0x4858 [ 21.087649] kasan_atomics+0x198/0x2e0 [ 21.087756] kunit_try_run_case+0x170/0x3f0 [ 21.087802] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.087856] kthread+0x328/0x630 [ 21.088441] ret_from_fork+0x10/0x20 [ 21.088763] [ 21.088793] Allocated by task 265: [ 21.088878] kasan_save_stack+0x3c/0x68 [ 21.089001] kasan_save_track+0x20/0x40 [ 21.089043] kasan_save_alloc_info+0x40/0x58 [ 21.089085] __kasan_kmalloc+0xd4/0xd8 [ 21.089123] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.089202] kasan_atomics+0xb8/0x2e0 [ 21.089242] kunit_try_run_case+0x170/0x3f0 [ 21.089303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.089348] kthread+0x328/0x630 [ 21.089381] ret_from_fork+0x10/0x20 [ 21.089418] [ 21.089441] The buggy address belongs to the object at fff00000c78ca300 [ 21.089441] which belongs to the cache kmalloc-64 of size 64 [ 21.089811] The buggy address is located 0 bytes to the right of [ 21.089811] allocated 48-byte region [fff00000c78ca300, fff00000c78ca330) [ 21.090067] [ 21.090170] The buggy address belongs to the physical page: [ 21.090220] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca [ 21.090323] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.090390] page_type: f5(slab) [ 21.090430] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.090482] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.090524] page dumped because: kasan: bad access detected [ 21.090750] [ 21.091101] Memory state around the buggy address: [ 21.091145] fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.091211] fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.091538] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.091647] ^ [ 21.092011] fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.092081] fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.092119] ================================================================== [ 21.116785] ================================================================== [ 21.116885] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 21.116945] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265 [ 21.117013] [ 21.117047] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.117127] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.117332] Hardware name: linux,dummy-virt (DT) [ 21.117379] Call trace: [ 21.117538] show_stack+0x20/0x38 (C) [ 21.117592] dump_stack_lvl+0x8c/0xd0 [ 21.117640] print_report+0x118/0x608 [ 21.117832] kasan_report+0xdc/0x128 [ 21.117898] kasan_check_range+0x100/0x1a8 [ 21.117946] __kasan_check_write+0x20/0x30 [ 21.118201] kasan_atomics_helper+0x1644/0x4858 [ 21.118282] kasan_atomics+0x198/0x2e0 [ 21.118608] kunit_try_run_case+0x170/0x3f0 [ 21.118700] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.118842] kthread+0x328/0x630 [ 21.118890] ret_from_fork+0x10/0x20 [ 21.118939] [ 21.119029] Allocated by task 265: [ 21.119246] kasan_save_stack+0x3c/0x68 [ 21.119334] kasan_save_track+0x20/0x40 [ 21.119446] kasan_save_alloc_info+0x40/0x58 [ 21.119488] __kasan_kmalloc+0xd4/0xd8 [ 21.119526] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.119568] kasan_atomics+0xb8/0x2e0 [ 21.119604] kunit_try_run_case+0x170/0x3f0 [ 21.119644] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.119981] kthread+0x328/0x630 [ 21.120329] ret_from_fork+0x10/0x20 [ 21.120377] [ 21.120401] The buggy address belongs to the object at fff00000c78ca300 [ 21.120401] which belongs to the cache kmalloc-64 of size 64 [ 21.120461] The buggy address is located 0 bytes to the right of [ 21.120461] allocated 48-byte region [fff00000c78ca300, fff00000c78ca330) [ 21.120555] [ 21.120581] The buggy address belongs to the physical page: [ 21.120619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca [ 21.120671] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.120744] page_type: f5(slab) [ 21.120783] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.120836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.120885] page dumped because: kasan: bad access detected [ 21.120919] [ 21.120940] Memory state around the buggy address: [ 21.121232] fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.121438] fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.121485] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.121527] ^ [ 21.121563] fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.121606] fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.121646] ================================================================== [ 20.977198] ================================================================== [ 20.977333] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 20.977386] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265 [ 20.977437] [ 20.977478] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.977771] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.977938] Hardware name: linux,dummy-virt (DT) [ 20.978172] Call trace: [ 20.978207] show_stack+0x20/0x38 (C) [ 20.978260] dump_stack_lvl+0x8c/0xd0 [ 20.978307] print_report+0x118/0x608 [ 20.978354] kasan_report+0xdc/0x128 [ 20.978399] kasan_check_range+0x100/0x1a8 [ 20.978628] __kasan_check_write+0x20/0x30 [ 20.978901] kasan_atomics_helper+0xe44/0x4858 [ 20.979184] kasan_atomics+0x198/0x2e0 [ 20.979437] kunit_try_run_case+0x170/0x3f0 [ 20.979547] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.979599] kthread+0x328/0x630 [ 20.980648] ret_from_fork+0x10/0x20 [ 20.980721] [ 20.980743] Allocated by task 265: [ 20.981255] kasan_save_stack+0x3c/0x68 [ 20.981354] kasan_save_track+0x20/0x40 [ 20.981398] kasan_save_alloc_info+0x40/0x58 [ 20.981667] __kasan_kmalloc+0xd4/0xd8 [ 20.981809] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.981854] kasan_atomics+0xb8/0x2e0 [ 20.982340] kunit_try_run_case+0x170/0x3f0 [ 20.982408] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.982454] kthread+0x328/0x630 [ 20.982487] ret_from_fork+0x10/0x20 [ 20.982525] [ 20.982547] The buggy address belongs to the object at fff00000c78ca300 [ 20.982547] which belongs to the cache kmalloc-64 of size 64 [ 20.982607] The buggy address is located 0 bytes to the right of [ 20.982607] allocated 48-byte region [fff00000c78ca300, fff00000c78ca330) [ 20.982694] [ 20.982807] The buggy address belongs to the physical page: [ 20.982874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca [ 20.983022] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.983099] page_type: f5(slab) [ 20.983140] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.983203] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.983249] page dumped because: kasan: bad access detected [ 20.983283] [ 20.983360] Memory state around the buggy address: [ 20.983541] fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.983658] fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.983704] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.983756] ^ [ 20.983791] fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.983909] fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.983953] ================================================================== [ 20.939931] ================================================================== [ 20.940614] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 20.940858] Read of size 4 at addr fff00000c78ca330 by task kunit_try_catch/265 [ 20.940918] [ 20.940956] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.941105] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.941133] Hardware name: linux,dummy-virt (DT) [ 20.941175] Call trace: [ 20.941197] show_stack+0x20/0x38 (C) [ 20.941374] dump_stack_lvl+0x8c/0xd0 [ 20.941720] print_report+0x118/0x608 [ 20.941775] kasan_report+0xdc/0x128 [ 20.941821] __asan_report_load4_noabort+0x20/0x30 [ 20.941882] kasan_atomics_helper+0x3dd8/0x4858 [ 20.941932] kasan_atomics+0x198/0x2e0 [ 20.942416] kunit_try_run_case+0x170/0x3f0 [ 20.942602] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.942657] kthread+0x328/0x630 [ 20.942903] ret_from_fork+0x10/0x20 [ 20.943061] [ 20.943215] Allocated by task 265: [ 20.943248] kasan_save_stack+0x3c/0x68 [ 20.943432] kasan_save_track+0x20/0x40 [ 20.943478] kasan_save_alloc_info+0x40/0x58 [ 20.943527] __kasan_kmalloc+0xd4/0xd8 [ 20.943565] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.944043] kasan_atomics+0xb8/0x2e0 [ 20.944089] kunit_try_run_case+0x170/0x3f0 [ 20.944376] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.944456] kthread+0x328/0x630 [ 20.944493] ret_from_fork+0x10/0x20 [ 20.944533] [ 20.944554] The buggy address belongs to the object at fff00000c78ca300 [ 20.944554] which belongs to the cache kmalloc-64 of size 64 [ 20.944614] The buggy address is located 0 bytes to the right of [ 20.944614] allocated 48-byte region [fff00000c78ca300, fff00000c78ca330) [ 20.944681] [ 20.944702] The buggy address belongs to the physical page: [ 20.944735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca [ 20.944846] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.944993] page_type: f5(slab) [ 20.945067] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.945255] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.945296] page dumped because: kasan: bad access detected [ 20.945329] [ 20.945349] Memory state around the buggy address: [ 20.945381] fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.945488] fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.945682] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.945775] ^ [ 20.945809] fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.945908] fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.946055] ================================================================== [ 21.032620] ================================================================== [ 21.032672] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 21.032724] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265 [ 21.032774] [ 21.032814] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.032995] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.033047] Hardware name: linux,dummy-virt (DT) [ 21.033082] Call trace: [ 21.033105] show_stack+0x20/0x38 (C) [ 21.033262] dump_stack_lvl+0x8c/0xd0 [ 21.033322] print_report+0x118/0x608 [ 21.033877] kasan_report+0xdc/0x128 [ 21.034211] kasan_check_range+0x100/0x1a8 [ 21.034274] __kasan_check_write+0x20/0x30 [ 21.034416] kasan_atomics_helper+0x1128/0x4858 [ 21.034465] kasan_atomics+0x198/0x2e0 [ 21.034613] kunit_try_run_case+0x170/0x3f0 [ 21.034908] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.035017] kthread+0x328/0x630 [ 21.035061] ret_from_fork+0x10/0x20 [ 21.035107] [ 21.035133] Allocated by task 265: [ 21.035186] kasan_save_stack+0x3c/0x68 [ 21.035229] kasan_save_track+0x20/0x40 [ 21.035358] kasan_save_alloc_info+0x40/0x58 [ 21.035522] __kasan_kmalloc+0xd4/0xd8 [ 21.035563] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.035604] kasan_atomics+0xb8/0x2e0 [ 21.035641] kunit_try_run_case+0x170/0x3f0 [ 21.035680] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.036270] kthread+0x328/0x630 [ 21.036315] ret_from_fork+0x10/0x20 [ 21.036353] [ 21.036375] The buggy address belongs to the object at fff00000c78ca300 [ 21.036375] which belongs to the cache kmalloc-64 of size 64 [ 21.036434] The buggy address is located 0 bytes to the right of [ 21.036434] allocated 48-byte region [fff00000c78ca300, fff00000c78ca330) [ 21.036527] [ 21.036712] The buggy address belongs to the physical page: [ 21.036753] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca [ 21.036931] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.036983] page_type: f5(slab) [ 21.037110] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.037259] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.037344] page dumped because: kasan: bad access detected [ 21.037406] [ 21.037465] Memory state around the buggy address: [ 21.037500] fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.037547] fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.037615] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.037655] ^ [ 21.037735] fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.037777] fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.037864] ================================================================== [ 21.056864] ================================================================== [ 21.057104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 21.057167] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265 [ 21.057218] [ 21.057249] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.057347] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.057446] Hardware name: linux,dummy-virt (DT) [ 21.057478] Call trace: [ 21.057503] show_stack+0x20/0x38 (C) [ 21.057716] dump_stack_lvl+0x8c/0xd0 [ 21.057895] print_report+0x118/0x608 [ 21.057988] kasan_report+0xdc/0x128 [ 21.058515] kasan_check_range+0x100/0x1a8 [ 21.058992] __kasan_check_write+0x20/0x30 [ 21.059058] kasan_atomics_helper+0x12d8/0x4858 [ 21.059108] kasan_atomics+0x198/0x2e0 [ 21.059166] kunit_try_run_case+0x170/0x3f0 [ 21.059223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.059277] kthread+0x328/0x630 [ 21.059450] ret_from_fork+0x10/0x20 [ 21.059547] [ 21.059638] Allocated by task 265: [ 21.059666] kasan_save_stack+0x3c/0x68 [ 21.059709] kasan_save_track+0x20/0x40 [ 21.060293] kasan_save_alloc_info+0x40/0x58 [ 21.060343] __kasan_kmalloc+0xd4/0xd8 [ 21.060381] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.060440] kasan_atomics+0xb8/0x2e0 [ 21.060476] kunit_try_run_case+0x170/0x3f0 [ 21.060517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.060796] kthread+0x328/0x630 [ 21.060891] ret_from_fork+0x10/0x20 [ 21.060946] [ 21.061052] The buggy address belongs to the object at fff00000c78ca300 [ 21.061052] which belongs to the cache kmalloc-64 of size 64 [ 21.061130] The buggy address is located 0 bytes to the right of [ 21.061130] allocated 48-byte region [fff00000c78ca300, fff00000c78ca330) [ 21.061296] [ 21.061568] The buggy address belongs to the physical page: [ 21.061605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca [ 21.061693] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.061745] page_type: f5(slab) [ 21.061934] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.062021] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.062064] page dumped because: kasan: bad access detected [ 21.062163] [ 21.062185] Memory state around the buggy address: [ 21.062219] fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.062455] fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.062504] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.062546] ^ [ 21.062581] fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.062622] fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.062671] ================================================================== [ 21.104620] ================================================================== [ 21.104670] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 21.104764] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265 [ 21.104819] [ 21.104848] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.105275] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.105308] Hardware name: linux,dummy-virt (DT) [ 21.105409] Call trace: [ 21.105438] show_stack+0x20/0x38 (C) [ 21.105490] dump_stack_lvl+0x8c/0xd0 [ 21.105538] print_report+0x118/0x608 [ 21.105627] kasan_report+0xdc/0x128 [ 21.105674] kasan_check_range+0x100/0x1a8 [ 21.106836] __kasan_check_write+0x20/0x30 [ 21.106901] kasan_atomics_helper+0x15b4/0x4858 [ 21.106954] kasan_atomics+0x198/0x2e0 [ 21.107009] kunit_try_run_case+0x170/0x3f0 [ 21.107056] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.107110] kthread+0x328/0x630 [ 21.107167] ret_from_fork+0x10/0x20 [ 21.107575] [ 21.107717] Allocated by task 265: [ 21.107921] kasan_save_stack+0x3c/0x68 [ 21.107968] kasan_save_track+0x20/0x40 [ 21.108009] kasan_save_alloc_info+0x40/0x58 [ 21.108050] __kasan_kmalloc+0xd4/0xd8 [ 21.108089] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.108459] kasan_atomics+0xb8/0x2e0 [ 21.108504] kunit_try_run_case+0x170/0x3f0 [ 21.108672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.108723] kthread+0x328/0x630 [ 21.108756] ret_from_fork+0x10/0x20 [ 21.108794] [ 21.108881] The buggy address belongs to the object at fff00000c78ca300 [ 21.108881] which belongs to the cache kmalloc-64 of size 64 [ 21.108943] The buggy address is located 0 bytes to the right of [ 21.108943] allocated 48-byte region [fff00000c78ca300, fff00000c78ca330) [ 21.109080] [ 21.109137] The buggy address belongs to the physical page: [ 21.109388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca [ 21.109644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.109699] page_type: f5(slab) [ 21.109739] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.109791] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.109842] page dumped because: kasan: bad access detected [ 21.109876] [ 21.109897] Memory state around the buggy address: [ 21.110196] fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.110327] fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.110374] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.110545] ^ [ 21.110581] fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.110626] fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.110918] ================================================================== [ 21.122075] ================================================================== [ 21.122122] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 21.122311] Read of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265 [ 21.122569] [ 21.122762] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.122919] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.122949] Hardware name: linux,dummy-virt (DT) [ 21.122993] Call trace: [ 21.123051] show_stack+0x20/0x38 (C) [ 21.123104] dump_stack_lvl+0x8c/0xd0 [ 21.123162] print_report+0x118/0x608 [ 21.123452] kasan_report+0xdc/0x128 [ 21.123531] __asan_report_load8_noabort+0x20/0x30 [ 21.123587] kasan_atomics_helper+0x3df4/0x4858 [ 21.123842] kasan_atomics+0x198/0x2e0 [ 21.123936] kunit_try_run_case+0x170/0x3f0 [ 21.123989] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.124043] kthread+0x328/0x630 [ 21.124205] ret_from_fork+0x10/0x20 [ 21.124347] [ 21.124372] Allocated by task 265: [ 21.124403] kasan_save_stack+0x3c/0x68 [ 21.124446] kasan_save_track+0x20/0x40 [ 21.124485] kasan_save_alloc_info+0x40/0x58 [ 21.124525] __kasan_kmalloc+0xd4/0xd8 [ 21.124563] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.124602] kasan_atomics+0xb8/0x2e0 [ 21.124640] kunit_try_run_case+0x170/0x3f0 [ 21.124680] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.124850] kthread+0x328/0x630 [ 21.124947] ret_from_fork+0x10/0x20 [ 21.125033] [ 21.125068] The buggy address belongs to the object at fff00000c78ca300 [ 21.125068] which belongs to the cache kmalloc-64 of size 64 [ 21.125127] The buggy address is located 0 bytes to the right of [ 21.125127] allocated 48-byte region [fff00000c78ca300, fff00000c78ca330) [ 21.125204] [ 21.125630] The buggy address belongs to the physical page: [ 21.126914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca [ 21.127284] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.127452] page_type: f5(slab) [ 21.127535] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.127777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.127832] page dumped because: kasan: bad access detected [ 21.127867] [ 21.127916] Memory state around the buggy address: [ 21.127951] fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.127997] fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.128398] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.128452] ^ [ 21.128496] fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.128539] fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.128819] ================================================================== [ 21.008551] ================================================================== [ 21.008603] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 21.008652] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265 [ 21.008703] [ 21.008732] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.008814] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.008841] Hardware name: linux,dummy-virt (DT) [ 21.008873] Call trace: [ 21.008895] show_stack+0x20/0x38 (C) [ 21.008944] dump_stack_lvl+0x8c/0xd0 [ 21.008989] print_report+0x118/0x608 [ 21.009036] kasan_report+0xdc/0x128 [ 21.009081] kasan_check_range+0x100/0x1a8 [ 21.009131] __kasan_check_write+0x20/0x30 [ 21.009198] kasan_atomics_helper+0xf88/0x4858 [ 21.009248] kasan_atomics+0x198/0x2e0 [ 21.009295] kunit_try_run_case+0x170/0x3f0 [ 21.009342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.009395] kthread+0x328/0x630 [ 21.009438] ret_from_fork+0x10/0x20 [ 21.009487] [ 21.009509] Allocated by task 265: [ 21.009537] kasan_save_stack+0x3c/0x68 [ 21.009586] kasan_save_track+0x20/0x40 [ 21.009625] kasan_save_alloc_info+0x40/0x58 [ 21.009667] __kasan_kmalloc+0xd4/0xd8 [ 21.009704] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.009743] kasan_atomics+0xb8/0x2e0 [ 21.009781] kunit_try_run_case+0x170/0x3f0 [ 21.009820] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.009867] kthread+0x328/0x630 [ 21.009901] ret_from_fork+0x10/0x20 [ 21.009939] [ 21.009959] The buggy address belongs to the object at fff00000c78ca300 [ 21.009959] which belongs to the cache kmalloc-64 of size 64 [ 21.010017] The buggy address is located 0 bytes to the right of [ 21.010017] allocated 48-byte region [fff00000c78ca300, fff00000c78ca330) [ 21.010080] [ 21.010101] The buggy address belongs to the physical page: [ 21.010133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca [ 21.010542] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.010595] page_type: f5(slab) [ 21.010635] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.010688] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.010731] page dumped because: kasan: bad access detected [ 21.010792] [ 21.010913] Memory state around the buggy address: [ 21.011030] fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.011075] fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.011118] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.011168] ^ [ 21.011201] fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.011246] fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.011286] ================================================================== [ 21.000905] ================================================================== [ 21.000975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 21.001025] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265 [ 21.001077] [ 21.001111] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.001204] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.001233] Hardware name: linux,dummy-virt (DT) [ 21.001265] Call trace: [ 21.001288] show_stack+0x20/0x38 (C) [ 21.001336] dump_stack_lvl+0x8c/0xd0 [ 21.001383] print_report+0x118/0x608 [ 21.001442] kasan_report+0xdc/0x128 [ 21.001495] kasan_check_range+0x100/0x1a8 [ 21.001704] __kasan_check_write+0x20/0x30 [ 21.001753] kasan_atomics_helper+0xf20/0x4858 [ 21.002229] kasan_atomics+0x198/0x2e0 [ 21.002546] kunit_try_run_case+0x170/0x3f0 [ 21.002949] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.003263] kthread+0x328/0x630 [ 21.003310] ret_from_fork+0x10/0x20 [ 21.003358] [ 21.003381] Allocated by task 265: [ 21.003410] kasan_save_stack+0x3c/0x68 [ 21.003454] kasan_save_track+0x20/0x40 [ 21.003501] kasan_save_alloc_info+0x40/0x58 [ 21.003558] __kasan_kmalloc+0xd4/0xd8 [ 21.003748] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.003930] kasan_atomics+0xb8/0x2e0 [ 21.003972] kunit_try_run_case+0x170/0x3f0 [ 21.004012] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.004553] kthread+0x328/0x630 [ 21.004837] ret_from_fork+0x10/0x20 [ 21.004879] [ 21.005050] The buggy address belongs to the object at fff00000c78ca300 [ 21.005050] which belongs to the cache kmalloc-64 of size 64 [ 21.005509] The buggy address is located 0 bytes to the right of [ 21.005509] allocated 48-byte region [fff00000c78ca300, fff00000c78ca330) [ 21.005648] [ 21.005673] The buggy address belongs to the physical page: [ 21.005706] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca [ 21.005772] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.005821] page_type: f5(slab) [ 21.006246] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.006499] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.006542] page dumped because: kasan: bad access detected [ 21.006865] [ 21.007120] Memory state around the buggy address: [ 21.007197] fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.007274] fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.007422] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.007513] ^ [ 21.007694] fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.007865] fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.007997] ================================================================== [ 20.970113] ================================================================== [ 20.970172] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 20.970223] Read of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265 [ 20.970426] [ 20.970717] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.970989] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.971018] Hardware name: linux,dummy-virt (DT) [ 20.971051] Call trace: [ 20.971074] show_stack+0x20/0x38 (C) [ 20.971129] dump_stack_lvl+0x8c/0xd0 [ 20.971188] print_report+0x118/0x608 [ 20.971238] kasan_report+0xdc/0x128 [ 20.971285] __asan_report_load8_noabort+0x20/0x30 [ 20.971342] kasan_atomics_helper+0x3f58/0x4858 [ 20.971390] kasan_atomics+0x198/0x2e0 [ 20.971437] kunit_try_run_case+0x170/0x3f0 [ 20.971564] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.972099] kthread+0x328/0x630 [ 20.972145] ret_from_fork+0x10/0x20 [ 20.972208] [ 20.972230] Allocated by task 265: [ 20.972284] kasan_save_stack+0x3c/0x68 [ 20.972328] kasan_save_track+0x20/0x40 [ 20.972493] kasan_save_alloc_info+0x40/0x58 [ 20.972699] __kasan_kmalloc+0xd4/0xd8 [ 20.972773] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.972814] kasan_atomics+0xb8/0x2e0 [ 20.972851] kunit_try_run_case+0x170/0x3f0 [ 20.972924] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.973003] kthread+0x328/0x630 [ 20.973069] ret_from_fork+0x10/0x20 [ 20.973118] [ 20.973188] The buggy address belongs to the object at fff00000c78ca300 [ 20.973188] which belongs to the cache kmalloc-64 of size 64 [ 20.973343] The buggy address is located 0 bytes to the right of [ 20.973343] allocated 48-byte region [fff00000c78ca300, fff00000c78ca330) [ 20.973412] [ 20.973443] The buggy address belongs to the physical page: [ 20.973584] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca [ 20.974278] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.974330] page_type: f5(slab) [ 20.974368] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.974420] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.974463] page dumped because: kasan: bad access detected [ 20.974494] [ 20.974513] Memory state around the buggy address: [ 20.975339] fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.975388] fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.975912] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.976370] ^ [ 20.976526] fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.976631] fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.976745] ================================================================== [ 21.145400] ================================================================== [ 21.145447] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 21.145497] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265 [ 21.145549] [ 21.145580] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.145662] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.145689] Hardware name: linux,dummy-virt (DT) [ 21.145721] Call trace: [ 21.145744] show_stack+0x20/0x38 (C) [ 21.145791] dump_stack_lvl+0x8c/0xd0 [ 21.145860] print_report+0x118/0x608 [ 21.146121] kasan_report+0xdc/0x128 [ 21.146363] kasan_check_range+0x100/0x1a8 [ 21.146522] __kasan_check_write+0x20/0x30 [ 21.146626] kasan_atomics_helper+0x17ec/0x4858 [ 21.146871] kasan_atomics+0x198/0x2e0 [ 21.147095] kunit_try_run_case+0x170/0x3f0 [ 21.147200] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.147254] kthread+0x328/0x630 [ 21.147299] ret_from_fork+0x10/0x20 [ 21.147346] [ 21.147367] Allocated by task 265: [ 21.147396] kasan_save_stack+0x3c/0x68 [ 21.147463] kasan_save_track+0x20/0x40 [ 21.147506] kasan_save_alloc_info+0x40/0x58 [ 21.147546] __kasan_kmalloc+0xd4/0xd8 [ 21.147585] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.147625] kasan_atomics+0xb8/0x2e0 [ 21.147662] kunit_try_run_case+0x170/0x3f0 [ 21.147702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.147745] kthread+0x328/0x630 [ 21.147780] ret_from_fork+0x10/0x20 [ 21.147851] [ 21.147948] The buggy address belongs to the object at fff00000c78ca300 [ 21.147948] which belongs to the cache kmalloc-64 of size 64 [ 21.148007] The buggy address is located 0 bytes to the right of [ 21.148007] allocated 48-byte region [fff00000c78ca300, fff00000c78ca330) [ 21.148073] [ 21.148106] The buggy address belongs to the physical page: [ 21.148187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca [ 21.148241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.148289] page_type: f5(slab) [ 21.148328] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.148379] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.148469] page dumped because: kasan: bad access detected [ 21.148512] [ 21.148531] Memory state around the buggy address: [ 21.148565] fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.148609] fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.148702] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.148795] ^ [ 21.148900] fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.149044] fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.149173] ==================================================================
[ 16.684351] ================================================================== [ 16.684727] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 16.685597] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 16.686107] [ 16.686278] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.686338] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.686354] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.686537] Call Trace: [ 16.686566] <TASK> [ 16.686591] dump_stack_lvl+0x73/0xb0 [ 16.686633] print_report+0xd1/0x650 [ 16.686663] ? __virt_addr_valid+0x1db/0x2d0 [ 16.686692] ? kasan_atomics_helper+0x992/0x5450 [ 16.686719] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.686747] ? kasan_atomics_helper+0x992/0x5450 [ 16.686773] kasan_report+0x141/0x180 [ 16.686815] ? kasan_atomics_helper+0x992/0x5450 [ 16.686848] kasan_check_range+0x10c/0x1c0 [ 16.686878] __kasan_check_write+0x18/0x20 [ 16.686901] kasan_atomics_helper+0x992/0x5450 [ 16.686929] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.686956] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.686986] ? kasan_atomics+0x152/0x310 [ 16.687018] kasan_atomics+0x1dc/0x310 [ 16.687045] ? __pfx_kasan_atomics+0x10/0x10 [ 16.687075] ? __pfx_read_tsc+0x10/0x10 [ 16.687116] ? ktime_get_ts64+0x86/0x230 [ 16.687148] kunit_try_run_case+0x1a5/0x480 [ 16.687180] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.687208] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.687238] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.687267] ? __kthread_parkme+0x82/0x180 [ 16.687293] ? preempt_count_sub+0x50/0x80 [ 16.687323] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.687351] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.687379] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.687407] kthread+0x337/0x6f0 [ 16.687431] ? trace_preempt_on+0x20/0xc0 [ 16.687461] ? __pfx_kthread+0x10/0x10 [ 16.687486] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.687512] ? calculate_sigpending+0x7b/0xa0 [ 16.687541] ? __pfx_kthread+0x10/0x10 [ 16.687568] ret_from_fork+0x116/0x1d0 [ 16.687591] ? __pfx_kthread+0x10/0x10 [ 16.687616] ret_from_fork_asm+0x1a/0x30 [ 16.687654] </TASK> [ 16.687670] [ 16.699047] Allocated by task 283: [ 16.699403] kasan_save_stack+0x45/0x70 [ 16.699589] kasan_save_track+0x18/0x40 [ 16.699940] kasan_save_alloc_info+0x3b/0x50 [ 16.700214] __kasan_kmalloc+0xb7/0xc0 [ 16.700429] __kmalloc_cache_noprof+0x189/0x420 [ 16.700651] kasan_atomics+0x95/0x310 [ 16.700872] kunit_try_run_case+0x1a5/0x480 [ 16.701099] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.701690] kthread+0x337/0x6f0 [ 16.701898] ret_from_fork+0x116/0x1d0 [ 16.702280] ret_from_fork_asm+0x1a/0x30 [ 16.702517] [ 16.702759] The buggy address belongs to the object at ffff88810392bb00 [ 16.702759] which belongs to the cache kmalloc-64 of size 64 [ 16.703413] The buggy address is located 0 bytes to the right of [ 16.703413] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 16.704174] [ 16.704486] The buggy address belongs to the physical page: [ 16.704859] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 16.705353] flags: 0x200000000000000(node=0|zone=2) [ 16.705594] page_type: f5(slab) [ 16.705807] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.706451] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.706816] page dumped because: kasan: bad access detected [ 16.707194] [ 16.707283] Memory state around the buggy address: [ 16.707530] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.708034] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.708511] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.708853] ^ [ 16.709086] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.709626] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.710094] ================================================================== [ 16.970483] ================================================================== [ 16.970881] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 16.971330] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 16.971648] [ 16.971753] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.971817] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.971832] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.971860] Call Trace: [ 16.971882] <TASK> [ 16.971903] dump_stack_lvl+0x73/0xb0 [ 16.971936] print_report+0xd1/0x650 [ 16.971964] ? __virt_addr_valid+0x1db/0x2d0 [ 16.971992] ? kasan_atomics_helper+0x1079/0x5450 [ 16.972018] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.972044] ? kasan_atomics_helper+0x1079/0x5450 [ 16.972070] kasan_report+0x141/0x180 [ 16.972110] ? kasan_atomics_helper+0x1079/0x5450 [ 16.972143] kasan_check_range+0x10c/0x1c0 [ 16.972172] __kasan_check_write+0x18/0x20 [ 16.972195] kasan_atomics_helper+0x1079/0x5450 [ 16.972223] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.972249] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.972280] ? kasan_atomics+0x152/0x310 [ 16.972312] kasan_atomics+0x1dc/0x310 [ 16.972340] ? __pfx_kasan_atomics+0x10/0x10 [ 16.972370] ? __pfx_read_tsc+0x10/0x10 [ 16.972396] ? ktime_get_ts64+0x86/0x230 [ 16.972425] kunit_try_run_case+0x1a5/0x480 [ 16.972454] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.972481] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.972510] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.972538] ? __kthread_parkme+0x82/0x180 [ 16.972564] ? preempt_count_sub+0x50/0x80 [ 16.972592] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.972620] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.972649] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.972676] kthread+0x337/0x6f0 [ 16.972702] ? trace_preempt_on+0x20/0xc0 [ 16.972732] ? __pfx_kthread+0x10/0x10 [ 16.972757] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.972783] ? calculate_sigpending+0x7b/0xa0 [ 16.972826] ? __pfx_kthread+0x10/0x10 [ 16.972853] ret_from_fork+0x116/0x1d0 [ 16.972877] ? __pfx_kthread+0x10/0x10 [ 16.972903] ret_from_fork_asm+0x1a/0x30 [ 16.972939] </TASK> [ 16.972954] [ 16.981550] Allocated by task 283: [ 16.981755] kasan_save_stack+0x45/0x70 [ 16.981980] kasan_save_track+0x18/0x40 [ 16.982243] kasan_save_alloc_info+0x3b/0x50 [ 16.982450] __kasan_kmalloc+0xb7/0xc0 [ 16.982672] __kmalloc_cache_noprof+0x189/0x420 [ 16.982918] kasan_atomics+0x95/0x310 [ 16.983125] kunit_try_run_case+0x1a5/0x480 [ 16.983299] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.983500] kthread+0x337/0x6f0 [ 16.983649] ret_from_fork+0x116/0x1d0 [ 16.983962] ret_from_fork_asm+0x1a/0x30 [ 16.984190] [ 16.984349] The buggy address belongs to the object at ffff88810392bb00 [ 16.984349] which belongs to the cache kmalloc-64 of size 64 [ 16.984910] The buggy address is located 0 bytes to the right of [ 16.984910] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 16.985601] [ 16.985698] The buggy address belongs to the physical page: [ 16.985908] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 16.986183] flags: 0x200000000000000(node=0|zone=2) [ 16.986372] page_type: f5(slab) [ 16.986512] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.986957] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.987654] page dumped because: kasan: bad access detected [ 16.988053] [ 16.988198] Memory state around the buggy address: [ 16.988384] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.988639] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.988903] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.989305] ^ [ 16.989577] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.989973] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.990696] ================================================================== [ 17.318540] ================================================================== [ 17.318876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 17.319527] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 17.319955] [ 17.320117] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.320210] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.320226] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.320255] Call Trace: [ 17.320278] <TASK> [ 17.320331] dump_stack_lvl+0x73/0xb0 [ 17.320368] print_report+0xd1/0x650 [ 17.320395] ? __virt_addr_valid+0x1db/0x2d0 [ 17.320423] ? kasan_atomics_helper+0x164f/0x5450 [ 17.320450] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.320477] ? kasan_atomics_helper+0x164f/0x5450 [ 17.320538] kasan_report+0x141/0x180 [ 17.320565] ? kasan_atomics_helper+0x164f/0x5450 [ 17.320597] kasan_check_range+0x10c/0x1c0 [ 17.320625] __kasan_check_write+0x18/0x20 [ 17.320648] kasan_atomics_helper+0x164f/0x5450 [ 17.320676] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.320703] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.320733] ? kasan_atomics+0x152/0x310 [ 17.320766] kasan_atomics+0x1dc/0x310 [ 17.320805] ? __pfx_kasan_atomics+0x10/0x10 [ 17.320835] ? __pfx_read_tsc+0x10/0x10 [ 17.320861] ? ktime_get_ts64+0x86/0x230 [ 17.320891] kunit_try_run_case+0x1a5/0x480 [ 17.320920] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.320947] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.320977] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.321005] ? __kthread_parkme+0x82/0x180 [ 17.321032] ? preempt_count_sub+0x50/0x80 [ 17.321062] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.321146] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.321174] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.321203] kthread+0x337/0x6f0 [ 17.321228] ? trace_preempt_on+0x20/0xc0 [ 17.321257] ? __pfx_kthread+0x10/0x10 [ 17.321283] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.321309] ? calculate_sigpending+0x7b/0xa0 [ 17.321344] ? __pfx_kthread+0x10/0x10 [ 17.321371] ret_from_fork+0x116/0x1d0 [ 17.321394] ? __pfx_kthread+0x10/0x10 [ 17.321420] ret_from_fork_asm+0x1a/0x30 [ 17.321458] </TASK> [ 17.321473] [ 17.330800] Allocated by task 283: [ 17.331021] kasan_save_stack+0x45/0x70 [ 17.331324] kasan_save_track+0x18/0x40 [ 17.331558] kasan_save_alloc_info+0x3b/0x50 [ 17.331733] __kasan_kmalloc+0xb7/0xc0 [ 17.331902] __kmalloc_cache_noprof+0x189/0x420 [ 17.332268] kasan_atomics+0x95/0x310 [ 17.332563] kunit_try_run_case+0x1a5/0x480 [ 17.332857] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.333228] kthread+0x337/0x6f0 [ 17.333428] ret_from_fork+0x116/0x1d0 [ 17.333591] ret_from_fork_asm+0x1a/0x30 [ 17.333878] [ 17.334000] The buggy address belongs to the object at ffff88810392bb00 [ 17.334000] which belongs to the cache kmalloc-64 of size 64 [ 17.334657] The buggy address is located 0 bytes to the right of [ 17.334657] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 17.335375] [ 17.335497] The buggy address belongs to the physical page: [ 17.335811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 17.336288] flags: 0x200000000000000(node=0|zone=2) [ 17.336499] page_type: f5(slab) [ 17.336642] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.337053] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.337494] page dumped because: kasan: bad access detected [ 17.337804] [ 17.337909] Memory state around the buggy address: [ 17.338255] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.338626] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.338997] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.339418] ^ [ 17.339680] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.340020] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.340385] ================================================================== [ 16.873199] ================================================================== [ 16.873667] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 16.874067] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 16.874418] [ 16.874567] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.874614] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.874630] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.874656] Call Trace: [ 16.874676] <TASK> [ 16.874696] dump_stack_lvl+0x73/0xb0 [ 16.874731] print_report+0xd1/0x650 [ 16.874758] ? __virt_addr_valid+0x1db/0x2d0 [ 16.874786] ? kasan_atomics_helper+0xe78/0x5450 [ 16.874828] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.874855] ? kasan_atomics_helper+0xe78/0x5450 [ 16.874881] kasan_report+0x141/0x180 [ 16.874908] ? kasan_atomics_helper+0xe78/0x5450 [ 16.874940] kasan_check_range+0x10c/0x1c0 [ 16.874970] __kasan_check_write+0x18/0x20 [ 16.874993] kasan_atomics_helper+0xe78/0x5450 [ 16.875023] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.875050] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.875080] ? kasan_atomics+0x152/0x310 [ 16.875125] kasan_atomics+0x1dc/0x310 [ 16.875152] ? __pfx_kasan_atomics+0x10/0x10 [ 16.875182] ? __pfx_read_tsc+0x10/0x10 [ 16.875207] ? ktime_get_ts64+0x86/0x230 [ 16.875236] kunit_try_run_case+0x1a5/0x480 [ 16.875265] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.875291] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.875321] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.875349] ? __kthread_parkme+0x82/0x180 [ 16.875374] ? preempt_count_sub+0x50/0x80 [ 16.875402] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.875430] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.875459] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.875486] kthread+0x337/0x6f0 [ 16.875510] ? trace_preempt_on+0x20/0xc0 [ 16.875539] ? __pfx_kthread+0x10/0x10 [ 16.875563] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.875588] ? calculate_sigpending+0x7b/0xa0 [ 16.875617] ? __pfx_kthread+0x10/0x10 [ 16.875643] ret_from_fork+0x116/0x1d0 [ 16.875665] ? __pfx_kthread+0x10/0x10 [ 16.875690] ret_from_fork_asm+0x1a/0x30 [ 16.875727] </TASK> [ 16.875741] [ 16.884115] Allocated by task 283: [ 16.884279] kasan_save_stack+0x45/0x70 [ 16.884449] kasan_save_track+0x18/0x40 [ 16.884619] kasan_save_alloc_info+0x3b/0x50 [ 16.884879] __kasan_kmalloc+0xb7/0xc0 [ 16.885104] __kmalloc_cache_noprof+0x189/0x420 [ 16.885372] kasan_atomics+0x95/0x310 [ 16.885594] kunit_try_run_case+0x1a5/0x480 [ 16.885843] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.886360] kthread+0x337/0x6f0 [ 16.886516] ret_from_fork+0x116/0x1d0 [ 16.886715] ret_from_fork_asm+0x1a/0x30 [ 16.886893] [ 16.886977] The buggy address belongs to the object at ffff88810392bb00 [ 16.886977] which belongs to the cache kmalloc-64 of size 64 [ 16.887413] The buggy address is located 0 bytes to the right of [ 16.887413] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 16.888512] [ 16.888628] The buggy address belongs to the physical page: [ 16.888905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 16.889287] flags: 0x200000000000000(node=0|zone=2) [ 16.889544] page_type: f5(slab) [ 16.889731] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.890080] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.890470] page dumped because: kasan: bad access detected [ 16.890735] [ 16.890838] Memory state around the buggy address: [ 16.891088] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.891408] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.891760] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.892107] ^ [ 16.892325] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.892579] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.892898] ================================================================== [ 16.852921] ================================================================== [ 16.853225] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 16.853683] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 16.853984] [ 16.854118] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.854170] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.854189] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.854218] Call Trace: [ 16.854238] <TASK> [ 16.854260] dump_stack_lvl+0x73/0xb0 [ 16.854295] print_report+0xd1/0x650 [ 16.854323] ? __virt_addr_valid+0x1db/0x2d0 [ 16.854350] ? kasan_atomics_helper+0xde0/0x5450 [ 16.854376] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.854402] ? kasan_atomics_helper+0xde0/0x5450 [ 16.854428] kasan_report+0x141/0x180 [ 16.854454] ? kasan_atomics_helper+0xde0/0x5450 [ 16.854485] kasan_check_range+0x10c/0x1c0 [ 16.854513] __kasan_check_write+0x18/0x20 [ 16.854536] kasan_atomics_helper+0xde0/0x5450 [ 16.854563] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.854589] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.854619] ? kasan_atomics+0x152/0x310 [ 16.854651] kasan_atomics+0x1dc/0x310 [ 16.854678] ? __pfx_kasan_atomics+0x10/0x10 [ 16.854708] ? __pfx_read_tsc+0x10/0x10 [ 16.854733] ? ktime_get_ts64+0x86/0x230 [ 16.854762] kunit_try_run_case+0x1a5/0x480 [ 16.854806] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.854833] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.854863] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.854891] ? __kthread_parkme+0x82/0x180 [ 16.854916] ? preempt_count_sub+0x50/0x80 [ 16.854946] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.854976] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.855004] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.855033] kthread+0x337/0x6f0 [ 16.855057] ? trace_preempt_on+0x20/0xc0 [ 16.855085] ? __pfx_kthread+0x10/0x10 [ 16.855111] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.855136] ? calculate_sigpending+0x7b/0xa0 [ 16.855166] ? __pfx_kthread+0x10/0x10 [ 16.855192] ret_from_fork+0x116/0x1d0 [ 16.855216] ? __pfx_kthread+0x10/0x10 [ 16.855241] ret_from_fork_asm+0x1a/0x30 [ 16.855278] </TASK> [ 16.855294] [ 16.863826] Allocated by task 283: [ 16.863999] kasan_save_stack+0x45/0x70 [ 16.864354] kasan_save_track+0x18/0x40 [ 16.864543] kasan_save_alloc_info+0x3b/0x50 [ 16.864732] __kasan_kmalloc+0xb7/0xc0 [ 16.864890] __kmalloc_cache_noprof+0x189/0x420 [ 16.865064] kasan_atomics+0x95/0x310 [ 16.865254] kunit_try_run_case+0x1a5/0x480 [ 16.865499] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.865781] kthread+0x337/0x6f0 [ 16.866000] ret_from_fork+0x116/0x1d0 [ 16.866215] ret_from_fork_asm+0x1a/0x30 [ 16.866480] [ 16.866560] The buggy address belongs to the object at ffff88810392bb00 [ 16.866560] which belongs to the cache kmalloc-64 of size 64 [ 16.866960] The buggy address is located 0 bytes to the right of [ 16.866960] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 16.867972] [ 16.868060] The buggy address belongs to the physical page: [ 16.868368] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 16.868647] flags: 0x200000000000000(node=0|zone=2) [ 16.868854] page_type: f5(slab) [ 16.869049] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.869730] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.870115] page dumped because: kasan: bad access detected [ 16.870307] [ 16.870387] Memory state around the buggy address: [ 16.870558] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.870898] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.871373] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.871626] ^ [ 16.871807] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.872274] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.872636] ================================================================== [ 16.425739] ================================================================== [ 16.426172] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 16.426849] Read of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 16.427587] [ 16.427899] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.428129] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.428359] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.428402] Call Trace: [ 16.428425] <TASK> [ 16.428448] dump_stack_lvl+0x73/0xb0 [ 16.428491] print_report+0xd1/0x650 [ 16.428519] ? __virt_addr_valid+0x1db/0x2d0 [ 16.428551] ? kasan_atomics_helper+0x4b54/0x5450 [ 16.428579] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.428611] ? kasan_atomics_helper+0x4b54/0x5450 [ 16.428641] kasan_report+0x141/0x180 [ 16.428671] ? kasan_atomics_helper+0x4b54/0x5450 [ 16.428705] __asan_report_load4_noabort+0x18/0x20 [ 16.428738] kasan_atomics_helper+0x4b54/0x5450 [ 16.428769] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.428816] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.428851] ? kasan_atomics+0x152/0x310 [ 16.428885] kasan_atomics+0x1dc/0x310 [ 16.428914] ? __pfx_kasan_atomics+0x10/0x10 [ 16.428945] ? __pfx_read_tsc+0x10/0x10 [ 16.428973] ? ktime_get_ts64+0x86/0x230 [ 16.429004] kunit_try_run_case+0x1a5/0x480 [ 16.429035] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.429066] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.429098] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.429129] ? __kthread_parkme+0x82/0x180 [ 16.429157] ? preempt_count_sub+0x50/0x80 [ 16.429188] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.429221] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.429253] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.429287] kthread+0x337/0x6f0 [ 16.429311] ? trace_preempt_on+0x20/0xc0 [ 16.429349] ? __pfx_kthread+0x10/0x10 [ 16.429377] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.429407] ? calculate_sigpending+0x7b/0xa0 [ 16.429439] ? __pfx_kthread+0x10/0x10 [ 16.429467] ret_from_fork+0x116/0x1d0 [ 16.429492] ? __pfx_kthread+0x10/0x10 [ 16.429519] ret_from_fork_asm+0x1a/0x30 [ 16.429558] </TASK> [ 16.429573] [ 16.442243] Allocated by task 283: [ 16.442576] kasan_save_stack+0x45/0x70 [ 16.442971] kasan_save_track+0x18/0x40 [ 16.443401] kasan_save_alloc_info+0x3b/0x50 [ 16.443760] __kasan_kmalloc+0xb7/0xc0 [ 16.444031] __kmalloc_cache_noprof+0x189/0x420 [ 16.444554] kasan_atomics+0x95/0x310 [ 16.444812] kunit_try_run_case+0x1a5/0x480 [ 16.445253] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.445561] kthread+0x337/0x6f0 [ 16.445753] ret_from_fork+0x116/0x1d0 [ 16.446233] ret_from_fork_asm+0x1a/0x30 [ 16.446504] [ 16.446619] The buggy address belongs to the object at ffff88810392bb00 [ 16.446619] which belongs to the cache kmalloc-64 of size 64 [ 16.447632] The buggy address is located 0 bytes to the right of [ 16.447632] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 16.448460] [ 16.448564] The buggy address belongs to the physical page: [ 16.448878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 16.449648] flags: 0x200000000000000(node=0|zone=2) [ 16.450107] page_type: f5(slab) [ 16.450259] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.450711] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.451334] page dumped because: kasan: bad access detected [ 16.451661] [ 16.451769] Memory state around the buggy address: [ 16.452006] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.452684] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.453180] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.453490] ^ [ 16.453765] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.454421] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.454742] ================================================================== [ 16.575523] ================================================================== [ 16.576039] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 16.576477] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 16.576871] [ 16.577099] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.577205] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.577298] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.577326] Call Trace: [ 16.577350] <TASK> [ 16.577384] dump_stack_lvl+0x73/0xb0 [ 16.577421] print_report+0xd1/0x650 [ 16.577448] ? __virt_addr_valid+0x1db/0x2d0 [ 16.577477] ? kasan_atomics_helper+0x72f/0x5450 [ 16.577503] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.577581] ? kasan_atomics_helper+0x72f/0x5450 [ 16.577610] kasan_report+0x141/0x180 [ 16.577651] ? kasan_atomics_helper+0x72f/0x5450 [ 16.577725] kasan_check_range+0x10c/0x1c0 [ 16.577755] __kasan_check_write+0x18/0x20 [ 16.577801] kasan_atomics_helper+0x72f/0x5450 [ 16.577829] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.577856] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.577887] ? kasan_atomics+0x152/0x310 [ 16.577920] kasan_atomics+0x1dc/0x310 [ 16.577948] ? __pfx_kasan_atomics+0x10/0x10 [ 16.577978] ? __pfx_read_tsc+0x10/0x10 [ 16.578005] ? ktime_get_ts64+0x86/0x230 [ 16.578036] kunit_try_run_case+0x1a5/0x480 [ 16.578091] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.578118] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.578147] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.578175] ? __kthread_parkme+0x82/0x180 [ 16.578200] ? preempt_count_sub+0x50/0x80 [ 16.578229] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.578258] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.578285] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.578314] kthread+0x337/0x6f0 [ 16.578339] ? trace_preempt_on+0x20/0xc0 [ 16.578369] ? __pfx_kthread+0x10/0x10 [ 16.578394] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.578421] ? calculate_sigpending+0x7b/0xa0 [ 16.578449] ? __pfx_kthread+0x10/0x10 [ 16.578475] ret_from_fork+0x116/0x1d0 [ 16.578497] ? __pfx_kthread+0x10/0x10 [ 16.578524] ret_from_fork_asm+0x1a/0x30 [ 16.578561] </TASK> [ 16.578576] [ 16.588962] Allocated by task 283: [ 16.589272] kasan_save_stack+0x45/0x70 [ 16.589607] kasan_save_track+0x18/0x40 [ 16.589856] kasan_save_alloc_info+0x3b/0x50 [ 16.590258] __kasan_kmalloc+0xb7/0xc0 [ 16.590483] __kmalloc_cache_noprof+0x189/0x420 [ 16.590688] kasan_atomics+0x95/0x310 [ 16.591004] kunit_try_run_case+0x1a5/0x480 [ 16.591339] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.591665] kthread+0x337/0x6f0 [ 16.591850] ret_from_fork+0x116/0x1d0 [ 16.592216] ret_from_fork_asm+0x1a/0x30 [ 16.592395] [ 16.592576] The buggy address belongs to the object at ffff88810392bb00 [ 16.592576] which belongs to the cache kmalloc-64 of size 64 [ 16.593345] The buggy address is located 0 bytes to the right of [ 16.593345] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 16.593978] [ 16.594185] The buggy address belongs to the physical page: [ 16.594461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 16.594956] flags: 0x200000000000000(node=0|zone=2) [ 16.595253] page_type: f5(slab) [ 16.595465] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.595986] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.596463] page dumped because: kasan: bad access detected [ 16.596800] [ 16.596908] Memory state around the buggy address: [ 16.597321] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.597690] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.598056] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.598448] ^ [ 16.598693] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.599036] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.599426] ================================================================== [ 16.923405] ================================================================== [ 16.923776] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 16.924165] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 16.924584] [ 16.924699] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.924754] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.924773] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.924821] Call Trace: [ 16.924846] <TASK> [ 16.924870] dump_stack_lvl+0x73/0xb0 [ 16.924909] print_report+0xd1/0x650 [ 16.924939] ? __virt_addr_valid+0x1db/0x2d0 [ 16.924970] ? kasan_atomics_helper+0xfa9/0x5450 [ 16.924997] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.925024] ? kasan_atomics_helper+0xfa9/0x5450 [ 16.925052] kasan_report+0x141/0x180 [ 16.925080] ? kasan_atomics_helper+0xfa9/0x5450 [ 16.925112] kasan_check_range+0x10c/0x1c0 [ 16.925141] __kasan_check_write+0x18/0x20 [ 16.925166] kasan_atomics_helper+0xfa9/0x5450 [ 16.925193] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.925220] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.925251] ? kasan_atomics+0x152/0x310 [ 16.925284] kasan_atomics+0x1dc/0x310 [ 16.925312] ? __pfx_kasan_atomics+0x10/0x10 [ 16.925347] ? __pfx_read_tsc+0x10/0x10 [ 16.925374] ? ktime_get_ts64+0x86/0x230 [ 16.925404] kunit_try_run_case+0x1a5/0x480 [ 16.925433] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.925461] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.925490] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.925521] ? __kthread_parkme+0x82/0x180 [ 16.925548] ? preempt_count_sub+0x50/0x80 [ 16.925578] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.925607] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.925635] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.925664] kthread+0x337/0x6f0 [ 16.925687] ? trace_preempt_on+0x20/0xc0 [ 16.925717] ? __pfx_kthread+0x10/0x10 [ 16.925742] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.925768] ? calculate_sigpending+0x7b/0xa0 [ 16.925808] ? __pfx_kthread+0x10/0x10 [ 16.925835] ret_from_fork+0x116/0x1d0 [ 16.925859] ? __pfx_kthread+0x10/0x10 [ 16.925884] ret_from_fork_asm+0x1a/0x30 [ 16.925922] </TASK> [ 16.925940] [ 16.936998] Allocated by task 283: [ 16.937569] kasan_save_stack+0x45/0x70 [ 16.937759] kasan_save_track+0x18/0x40 [ 16.938159] kasan_save_alloc_info+0x3b/0x50 [ 16.938487] __kasan_kmalloc+0xb7/0xc0 [ 16.938780] __kmalloc_cache_noprof+0x189/0x420 [ 16.939118] kasan_atomics+0x95/0x310 [ 16.939487] kunit_try_run_case+0x1a5/0x480 [ 16.939817] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.940192] kthread+0x337/0x6f0 [ 16.940347] ret_from_fork+0x116/0x1d0 [ 16.940569] ret_from_fork_asm+0x1a/0x30 [ 16.940785] [ 16.940915] The buggy address belongs to the object at ffff88810392bb00 [ 16.940915] which belongs to the cache kmalloc-64 of size 64 [ 16.941757] The buggy address is located 0 bytes to the right of [ 16.941757] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 16.942610] [ 16.942712] The buggy address belongs to the physical page: [ 16.943183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 16.943554] flags: 0x200000000000000(node=0|zone=2) [ 16.943944] page_type: f5(slab) [ 16.944212] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.944576] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.944971] page dumped because: kasan: bad access detected [ 16.945467] [ 16.945592] Memory state around the buggy address: [ 16.945918] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.946414] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.946836] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.947334] ^ [ 16.947719] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.948167] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.948599] ================================================================== [ 17.341329] ================================================================== [ 17.341785] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 17.342263] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 17.342691] [ 17.342829] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.342922] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.342939] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.342966] Call Trace: [ 17.342988] <TASK> [ 17.343010] dump_stack_lvl+0x73/0xb0 [ 17.343107] print_report+0xd1/0x650 [ 17.343136] ? __virt_addr_valid+0x1db/0x2d0 [ 17.343163] ? kasan_atomics_helper+0x16e7/0x5450 [ 17.343189] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.343253] ? kasan_atomics_helper+0x16e7/0x5450 [ 17.343279] kasan_report+0x141/0x180 [ 17.343308] ? kasan_atomics_helper+0x16e7/0x5450 [ 17.343339] kasan_check_range+0x10c/0x1c0 [ 17.343367] __kasan_check_write+0x18/0x20 [ 17.343422] kasan_atomics_helper+0x16e7/0x5450 [ 17.343450] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.343477] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.343508] ? kasan_atomics+0x152/0x310 [ 17.343540] kasan_atomics+0x1dc/0x310 [ 17.343568] ? __pfx_kasan_atomics+0x10/0x10 [ 17.343598] ? __pfx_read_tsc+0x10/0x10 [ 17.343623] ? ktime_get_ts64+0x86/0x230 [ 17.343708] kunit_try_run_case+0x1a5/0x480 [ 17.343739] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.343765] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.343804] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.343833] ? __kthread_parkme+0x82/0x180 [ 17.343860] ? preempt_count_sub+0x50/0x80 [ 17.343889] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.343918] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.343945] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.343974] kthread+0x337/0x6f0 [ 17.343999] ? trace_preempt_on+0x20/0xc0 [ 17.344027] ? __pfx_kthread+0x10/0x10 [ 17.344054] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.344103] ? calculate_sigpending+0x7b/0xa0 [ 17.344133] ? __pfx_kthread+0x10/0x10 [ 17.344159] ret_from_fork+0x116/0x1d0 [ 17.344182] ? __pfx_kthread+0x10/0x10 [ 17.344209] ret_from_fork_asm+0x1a/0x30 [ 17.344250] </TASK> [ 17.344267] [ 17.353685] Allocated by task 283: [ 17.353913] kasan_save_stack+0x45/0x70 [ 17.354219] kasan_save_track+0x18/0x40 [ 17.354480] kasan_save_alloc_info+0x3b/0x50 [ 17.354747] __kasan_kmalloc+0xb7/0xc0 [ 17.355015] __kmalloc_cache_noprof+0x189/0x420 [ 17.355336] kasan_atomics+0x95/0x310 [ 17.355540] kunit_try_run_case+0x1a5/0x480 [ 17.355774] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.356100] kthread+0x337/0x6f0 [ 17.356330] ret_from_fork+0x116/0x1d0 [ 17.356596] ret_from_fork_asm+0x1a/0x30 [ 17.356854] [ 17.357216] The buggy address belongs to the object at ffff88810392bb00 [ 17.357216] which belongs to the cache kmalloc-64 of size 64 [ 17.357917] The buggy address is located 0 bytes to the right of [ 17.357917] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 17.358476] [ 17.358569] The buggy address belongs to the physical page: [ 17.358770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 17.359264] flags: 0x200000000000000(node=0|zone=2) [ 17.359610] page_type: f5(slab) [ 17.359932] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.360402] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.360739] page dumped because: kasan: bad access detected [ 17.361033] [ 17.361233] Memory state around the buggy address: [ 17.361519] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.361898] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.362240] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.362500] ^ [ 17.362806] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.363241] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.363598] ================================================================== [ 16.829929] ================================================================== [ 16.830803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 16.831877] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 16.832596] [ 16.832831] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.832885] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.832903] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.832932] Call Trace: [ 16.832954] <TASK> [ 16.832977] dump_stack_lvl+0x73/0xb0 [ 16.833014] print_report+0xd1/0x650 [ 16.833042] ? __virt_addr_valid+0x1db/0x2d0 [ 16.833071] ? kasan_atomics_helper+0xd47/0x5450 [ 16.833096] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.833122] ? kasan_atomics_helper+0xd47/0x5450 [ 16.833148] kasan_report+0x141/0x180 [ 16.833175] ? kasan_atomics_helper+0xd47/0x5450 [ 16.833206] kasan_check_range+0x10c/0x1c0 [ 16.833234] __kasan_check_write+0x18/0x20 [ 16.833259] kasan_atomics_helper+0xd47/0x5450 [ 16.833287] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.833315] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.833350] ? kasan_atomics+0x152/0x310 [ 16.833382] kasan_atomics+0x1dc/0x310 [ 16.833410] ? __pfx_kasan_atomics+0x10/0x10 [ 16.833439] ? __pfx_read_tsc+0x10/0x10 [ 16.833465] ? ktime_get_ts64+0x86/0x230 [ 16.833494] kunit_try_run_case+0x1a5/0x480 [ 16.833523] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.833550] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.833578] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.833606] ? __kthread_parkme+0x82/0x180 [ 16.833632] ? preempt_count_sub+0x50/0x80 [ 16.833660] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.833690] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.833717] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.833745] kthread+0x337/0x6f0 [ 16.833767] ? trace_preempt_on+0x20/0xc0 [ 16.833806] ? __pfx_kthread+0x10/0x10 [ 16.833832] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.833858] ? calculate_sigpending+0x7b/0xa0 [ 16.833887] ? __pfx_kthread+0x10/0x10 [ 16.833913] ret_from_fork+0x116/0x1d0 [ 16.833935] ? __pfx_kthread+0x10/0x10 [ 16.833959] ret_from_fork_asm+0x1a/0x30 [ 16.833996] </TASK> [ 16.834011] [ 16.843740] Allocated by task 283: [ 16.843916] kasan_save_stack+0x45/0x70 [ 16.844174] kasan_save_track+0x18/0x40 [ 16.844399] kasan_save_alloc_info+0x3b/0x50 [ 16.844646] __kasan_kmalloc+0xb7/0xc0 [ 16.844873] __kmalloc_cache_noprof+0x189/0x420 [ 16.845161] kasan_atomics+0x95/0x310 [ 16.845348] kunit_try_run_case+0x1a5/0x480 [ 16.845564] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.845779] kthread+0x337/0x6f0 [ 16.845932] ret_from_fork+0x116/0x1d0 [ 16.846126] ret_from_fork_asm+0x1a/0x30 [ 16.846362] [ 16.846473] The buggy address belongs to the object at ffff88810392bb00 [ 16.846473] which belongs to the cache kmalloc-64 of size 64 [ 16.847130] The buggy address is located 0 bytes to the right of [ 16.847130] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 16.847618] [ 16.847704] The buggy address belongs to the physical page: [ 16.847914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 16.848321] flags: 0x200000000000000(node=0|zone=2) [ 16.848594] page_type: f5(slab) [ 16.848753] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.849031] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.849419] page dumped because: kasan: bad access detected [ 16.849719] [ 16.849845] Memory state around the buggy address: [ 16.850103] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.850704] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.850981] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.851255] ^ [ 16.851524] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.851899] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.852278] ================================================================== [ 17.663837] ================================================================== [ 17.664291] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 17.664679] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 17.664948] [ 17.665057] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.665110] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.665137] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.665166] Call Trace: [ 17.665191] <TASK> [ 17.665213] dump_stack_lvl+0x73/0xb0 [ 17.665253] print_report+0xd1/0x650 [ 17.665295] ? __virt_addr_valid+0x1db/0x2d0 [ 17.665325] ? kasan_atomics_helper+0x1eaa/0x5450 [ 17.665356] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.665398] ? kasan_atomics_helper+0x1eaa/0x5450 [ 17.665425] kasan_report+0x141/0x180 [ 17.665453] ? kasan_atomics_helper+0x1eaa/0x5450 [ 17.665485] kasan_check_range+0x10c/0x1c0 [ 17.665514] __kasan_check_write+0x18/0x20 [ 17.665542] kasan_atomics_helper+0x1eaa/0x5450 [ 17.665572] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.665611] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.665644] ? kasan_atomics+0x152/0x310 [ 17.665689] kasan_atomics+0x1dc/0x310 [ 17.665718] ? __pfx_kasan_atomics+0x10/0x10 [ 17.665749] ? __pfx_read_tsc+0x10/0x10 [ 17.665776] ? ktime_get_ts64+0x86/0x230 [ 17.665818] kunit_try_run_case+0x1a5/0x480 [ 17.665849] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.665877] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.665908] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.665936] ? __kthread_parkme+0x82/0x180 [ 17.665963] ? preempt_count_sub+0x50/0x80 [ 17.665993] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.666022] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.666050] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.666079] kthread+0x337/0x6f0 [ 17.666116] ? trace_preempt_on+0x20/0xc0 [ 17.666145] ? __pfx_kthread+0x10/0x10 [ 17.666171] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.666196] ? calculate_sigpending+0x7b/0xa0 [ 17.666236] ? __pfx_kthread+0x10/0x10 [ 17.666262] ret_from_fork+0x116/0x1d0 [ 17.666285] ? __pfx_kthread+0x10/0x10 [ 17.666322] ret_from_fork_asm+0x1a/0x30 [ 17.666361] </TASK> [ 17.666377] [ 17.675802] Allocated by task 283: [ 17.676064] kasan_save_stack+0x45/0x70 [ 17.676301] kasan_save_track+0x18/0x40 [ 17.676523] kasan_save_alloc_info+0x3b/0x50 [ 17.676765] __kasan_kmalloc+0xb7/0xc0 [ 17.677225] __kmalloc_cache_noprof+0x189/0x420 [ 17.677490] kasan_atomics+0x95/0x310 [ 17.677683] kunit_try_run_case+0x1a5/0x480 [ 17.677951] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.678237] kthread+0x337/0x6f0 [ 17.678387] ret_from_fork+0x116/0x1d0 [ 17.678544] ret_from_fork_asm+0x1a/0x30 [ 17.678708] [ 17.678826] The buggy address belongs to the object at ffff88810392bb00 [ 17.678826] which belongs to the cache kmalloc-64 of size 64 [ 17.679669] The buggy address is located 0 bytes to the right of [ 17.679669] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 17.680341] [ 17.680465] The buggy address belongs to the physical page: [ 17.680745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 17.681218] flags: 0x200000000000000(node=0|zone=2) [ 17.681481] page_type: f5(slab) [ 17.681681] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.682073] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.682455] page dumped because: kasan: bad access detected [ 17.682657] [ 17.682743] Memory state around the buggy address: [ 17.682935] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.683348] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.683727] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.684094] ^ [ 17.684354] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.684948] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.685494] ================================================================== [ 17.774186] ================================================================== [ 17.774519] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 17.774921] Read of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 17.775244] [ 17.775419] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.775473] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.775506] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.775535] Call Trace: [ 17.775558] <TASK> [ 17.775582] dump_stack_lvl+0x73/0xb0 [ 17.775619] print_report+0xd1/0x650 [ 17.775649] ? __virt_addr_valid+0x1db/0x2d0 [ 17.775678] ? kasan_atomics_helper+0x4f98/0x5450 [ 17.775704] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.775732] ? kasan_atomics_helper+0x4f98/0x5450 [ 17.775760] kasan_report+0x141/0x180 [ 17.775801] ? kasan_atomics_helper+0x4f98/0x5450 [ 17.775833] __asan_report_load8_noabort+0x18/0x20 [ 17.775863] kasan_atomics_helper+0x4f98/0x5450 [ 17.775891] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.775917] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.775950] ? kasan_atomics+0x152/0x310 [ 17.775982] kasan_atomics+0x1dc/0x310 [ 17.776010] ? __pfx_kasan_atomics+0x10/0x10 [ 17.776040] ? __pfx_read_tsc+0x10/0x10 [ 17.776067] ? ktime_get_ts64+0x86/0x230 [ 17.776111] kunit_try_run_case+0x1a5/0x480 [ 17.776141] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.776168] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.776197] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.776226] ? __kthread_parkme+0x82/0x180 [ 17.776252] ? preempt_count_sub+0x50/0x80 [ 17.776281] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.776310] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.776337] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.776365] kthread+0x337/0x6f0 [ 17.776390] ? trace_preempt_on+0x20/0xc0 [ 17.776418] ? __pfx_kthread+0x10/0x10 [ 17.776444] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.776470] ? calculate_sigpending+0x7b/0xa0 [ 17.776499] ? __pfx_kthread+0x10/0x10 [ 17.776526] ret_from_fork+0x116/0x1d0 [ 17.776550] ? __pfx_kthread+0x10/0x10 [ 17.776576] ret_from_fork_asm+0x1a/0x30 [ 17.776613] </TASK> [ 17.776629] [ 17.788127] Allocated by task 283: [ 17.788359] kasan_save_stack+0x45/0x70 [ 17.788594] kasan_save_track+0x18/0x40 [ 17.788814] kasan_save_alloc_info+0x3b/0x50 [ 17.789068] __kasan_kmalloc+0xb7/0xc0 [ 17.789660] __kmalloc_cache_noprof+0x189/0x420 [ 17.789924] kasan_atomics+0x95/0x310 [ 17.790285] kunit_try_run_case+0x1a5/0x480 [ 17.790618] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.790885] kthread+0x337/0x6f0 [ 17.791331] ret_from_fork+0x116/0x1d0 [ 17.791639] ret_from_fork_asm+0x1a/0x30 [ 17.791839] [ 17.791940] The buggy address belongs to the object at ffff88810392bb00 [ 17.791940] which belongs to the cache kmalloc-64 of size 64 [ 17.792875] The buggy address is located 0 bytes to the right of [ 17.792875] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 17.793817] [ 17.794017] The buggy address belongs to the physical page: [ 17.794367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 17.794846] flags: 0x200000000000000(node=0|zone=2) [ 17.795236] page_type: f5(slab) [ 17.795435] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.795825] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.796405] page dumped because: kasan: bad access detected [ 17.796643] [ 17.796730] Memory state around the buggy address: [ 17.796979] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.797726] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.798020] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.798274] ^ [ 17.798454] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.798702] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.798960] ================================================================== [ 16.753592] ================================================================== [ 16.754026] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 16.754541] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 16.754893] [ 16.754998] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.755049] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.755065] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.755112] Call Trace: [ 16.755132] <TASK> [ 16.755153] dump_stack_lvl+0x73/0xb0 [ 16.755187] print_report+0xd1/0x650 [ 16.755213] ? __virt_addr_valid+0x1db/0x2d0 [ 16.755241] ? kasan_atomics_helper+0xb6a/0x5450 [ 16.755266] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.755294] ? kasan_atomics_helper+0xb6a/0x5450 [ 16.755319] kasan_report+0x141/0x180 [ 16.755346] ? kasan_atomics_helper+0xb6a/0x5450 [ 16.755379] kasan_check_range+0x10c/0x1c0 [ 16.755413] __kasan_check_write+0x18/0x20 [ 16.755438] kasan_atomics_helper+0xb6a/0x5450 [ 16.755465] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.755491] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.755521] ? kasan_atomics+0x152/0x310 [ 16.755554] kasan_atomics+0x1dc/0x310 [ 16.755580] ? __pfx_kasan_atomics+0x10/0x10 [ 16.755610] ? __pfx_read_tsc+0x10/0x10 [ 16.755637] ? ktime_get_ts64+0x86/0x230 [ 16.755666] kunit_try_run_case+0x1a5/0x480 [ 16.755695] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.755721] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.755749] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.755777] ? __kthread_parkme+0x82/0x180 [ 16.755815] ? preempt_count_sub+0x50/0x80 [ 16.755843] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.755872] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.755899] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.755927] kthread+0x337/0x6f0 [ 16.755951] ? trace_preempt_on+0x20/0xc0 [ 16.755980] ? __pfx_kthread+0x10/0x10 [ 16.756005] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.756030] ? calculate_sigpending+0x7b/0xa0 [ 16.756059] ? __pfx_kthread+0x10/0x10 [ 16.756085] ret_from_fork+0x116/0x1d0 [ 16.756121] ? __pfx_kthread+0x10/0x10 [ 16.756146] ret_from_fork_asm+0x1a/0x30 [ 16.756182] </TASK> [ 16.756198] [ 16.764620] Allocated by task 283: [ 16.764802] kasan_save_stack+0x45/0x70 [ 16.765034] kasan_save_track+0x18/0x40 [ 16.765510] kasan_save_alloc_info+0x3b/0x50 [ 16.765758] __kasan_kmalloc+0xb7/0xc0 [ 16.765991] __kmalloc_cache_noprof+0x189/0x420 [ 16.766266] kasan_atomics+0x95/0x310 [ 16.766425] kunit_try_run_case+0x1a5/0x480 [ 16.766598] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.766812] kthread+0x337/0x6f0 [ 16.766979] ret_from_fork+0x116/0x1d0 [ 16.767255] ret_from_fork_asm+0x1a/0x30 [ 16.767488] [ 16.767602] The buggy address belongs to the object at ffff88810392bb00 [ 16.767602] which belongs to the cache kmalloc-64 of size 64 [ 16.768418] The buggy address is located 0 bytes to the right of [ 16.768418] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 16.769013] [ 16.769122] The buggy address belongs to the physical page: [ 16.769416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 16.769697] flags: 0x200000000000000(node=0|zone=2) [ 16.769903] page_type: f5(slab) [ 16.770047] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.770439] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.770873] page dumped because: kasan: bad access detected [ 16.771263] [ 16.771375] Memory state around the buggy address: [ 16.771606] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.771867] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.772121] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.772813] ^ [ 16.773078] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.773454] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.773805] ================================================================== [ 17.295675] ================================================================== [ 17.296001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 17.296509] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 17.296939] [ 17.297133] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.297187] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.297203] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.297231] Call Trace: [ 17.297253] <TASK> [ 17.297275] dump_stack_lvl+0x73/0xb0 [ 17.297311] print_report+0xd1/0x650 [ 17.297343] ? __virt_addr_valid+0x1db/0x2d0 [ 17.297371] ? kasan_atomics_helper+0x15b6/0x5450 [ 17.297397] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.297423] ? kasan_atomics_helper+0x15b6/0x5450 [ 17.297450] kasan_report+0x141/0x180 [ 17.297477] ? kasan_atomics_helper+0x15b6/0x5450 [ 17.297508] kasan_check_range+0x10c/0x1c0 [ 17.297536] __kasan_check_write+0x18/0x20 [ 17.297562] kasan_atomics_helper+0x15b6/0x5450 [ 17.297634] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.297690] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.297721] ? kasan_atomics+0x152/0x310 [ 17.297781] kasan_atomics+0x1dc/0x310 [ 17.297821] ? __pfx_kasan_atomics+0x10/0x10 [ 17.297851] ? __pfx_read_tsc+0x10/0x10 [ 17.297877] ? ktime_get_ts64+0x86/0x230 [ 17.297907] kunit_try_run_case+0x1a5/0x480 [ 17.297936] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.297962] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.297993] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.298021] ? __kthread_parkme+0x82/0x180 [ 17.298047] ? preempt_count_sub+0x50/0x80 [ 17.298099] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.298129] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.298156] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.298185] kthread+0x337/0x6f0 [ 17.298208] ? trace_preempt_on+0x20/0xc0 [ 17.298236] ? __pfx_kthread+0x10/0x10 [ 17.298262] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.298288] ? calculate_sigpending+0x7b/0xa0 [ 17.298316] ? __pfx_kthread+0x10/0x10 [ 17.298342] ret_from_fork+0x116/0x1d0 [ 17.298365] ? __pfx_kthread+0x10/0x10 [ 17.298390] ret_from_fork_asm+0x1a/0x30 [ 17.298427] </TASK> [ 17.298443] [ 17.308042] Allocated by task 283: [ 17.308341] kasan_save_stack+0x45/0x70 [ 17.308566] kasan_save_track+0x18/0x40 [ 17.308813] kasan_save_alloc_info+0x3b/0x50 [ 17.309099] __kasan_kmalloc+0xb7/0xc0 [ 17.309317] __kmalloc_cache_noprof+0x189/0x420 [ 17.309598] kasan_atomics+0x95/0x310 [ 17.309890] kunit_try_run_case+0x1a5/0x480 [ 17.310183] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.310499] kthread+0x337/0x6f0 [ 17.310686] ret_from_fork+0x116/0x1d0 [ 17.310988] ret_from_fork_asm+0x1a/0x30 [ 17.311283] [ 17.311391] The buggy address belongs to the object at ffff88810392bb00 [ 17.311391] which belongs to the cache kmalloc-64 of size 64 [ 17.312028] The buggy address is located 0 bytes to the right of [ 17.312028] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 17.312683] [ 17.312814] The buggy address belongs to the physical page: [ 17.313139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 17.313606] flags: 0x200000000000000(node=0|zone=2) [ 17.313903] page_type: f5(slab) [ 17.314155] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.314579] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.314952] page dumped because: kasan: bad access detected [ 17.315266] [ 17.315370] Memory state around the buggy address: [ 17.315652] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.315941] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.316278] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.316730] ^ [ 17.317029] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.317440] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.317852] ================================================================== [ 16.710885] ================================================================== [ 16.711577] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 16.711946] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 16.712467] [ 16.712579] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.712631] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.712848] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.712880] Call Trace: [ 16.712965] <TASK> [ 16.712987] dump_stack_lvl+0x73/0xb0 [ 16.713025] print_report+0xd1/0x650 [ 16.713052] ? __virt_addr_valid+0x1db/0x2d0 [ 16.713081] ? kasan_atomics_helper+0xa2b/0x5450 [ 16.713118] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.713145] ? kasan_atomics_helper+0xa2b/0x5450 [ 16.713171] kasan_report+0x141/0x180 [ 16.713197] ? kasan_atomics_helper+0xa2b/0x5450 [ 16.713229] kasan_check_range+0x10c/0x1c0 [ 16.713257] __kasan_check_write+0x18/0x20 [ 16.713281] kasan_atomics_helper+0xa2b/0x5450 [ 16.713307] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.713339] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.713370] ? kasan_atomics+0x152/0x310 [ 16.713401] kasan_atomics+0x1dc/0x310 [ 16.713429] ? __pfx_kasan_atomics+0x10/0x10 [ 16.713458] ? __pfx_read_tsc+0x10/0x10 [ 16.713484] ? ktime_get_ts64+0x86/0x230 [ 16.713513] kunit_try_run_case+0x1a5/0x480 [ 16.713541] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.713566] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.713596] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.713623] ? __kthread_parkme+0x82/0x180 [ 16.713648] ? preempt_count_sub+0x50/0x80 [ 16.713677] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.713704] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.713731] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.713759] kthread+0x337/0x6f0 [ 16.713784] ? trace_preempt_on+0x20/0xc0 [ 16.713825] ? __pfx_kthread+0x10/0x10 [ 16.713850] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.713875] ? calculate_sigpending+0x7b/0xa0 [ 16.713903] ? __pfx_kthread+0x10/0x10 [ 16.713929] ret_from_fork+0x116/0x1d0 [ 16.713952] ? __pfx_kthread+0x10/0x10 [ 16.713977] ret_from_fork_asm+0x1a/0x30 [ 16.714014] </TASK> [ 16.714030] [ 16.723700] Allocated by task 283: [ 16.724019] kasan_save_stack+0x45/0x70 [ 16.724322] kasan_save_track+0x18/0x40 [ 16.724477] kasan_save_alloc_info+0x3b/0x50 [ 16.724645] __kasan_kmalloc+0xb7/0xc0 [ 16.724831] __kmalloc_cache_noprof+0x189/0x420 [ 16.725098] kasan_atomics+0x95/0x310 [ 16.725319] kunit_try_run_case+0x1a5/0x480 [ 16.725565] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.725873] kthread+0x337/0x6f0 [ 16.726053] ret_from_fork+0x116/0x1d0 [ 16.726240] ret_from_fork_asm+0x1a/0x30 [ 16.726417] [ 16.726532] The buggy address belongs to the object at ffff88810392bb00 [ 16.726532] which belongs to the cache kmalloc-64 of size 64 [ 16.727194] The buggy address is located 0 bytes to the right of [ 16.727194] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 16.727735] [ 16.727861] The buggy address belongs to the physical page: [ 16.728082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 16.728497] flags: 0x200000000000000(node=0|zone=2) [ 16.728732] page_type: f5(slab) [ 16.728936] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.729223] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.729569] page dumped because: kasan: bad access detected [ 16.729940] [ 16.730052] Memory state around the buggy address: [ 16.730242] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.730500] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.730880] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.731391] ^ [ 16.731588] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.731849] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.732223] ================================================================== [ 16.503295] ================================================================== [ 16.503683] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 16.504154] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 16.504654] [ 16.504843] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.504898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.504915] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.504944] Call Trace: [ 16.504962] <TASK> [ 16.505016] dump_stack_lvl+0x73/0xb0 [ 16.505053] print_report+0xd1/0x650 [ 16.505081] ? __virt_addr_valid+0x1db/0x2d0 [ 16.505109] ? kasan_atomics_helper+0x565/0x5450 [ 16.505147] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.505175] ? kasan_atomics_helper+0x565/0x5450 [ 16.505238] kasan_report+0x141/0x180 [ 16.505266] ? kasan_atomics_helper+0x565/0x5450 [ 16.505298] kasan_check_range+0x10c/0x1c0 [ 16.505328] __kasan_check_write+0x18/0x20 [ 16.505371] kasan_atomics_helper+0x565/0x5450 [ 16.505399] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.505426] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.505457] ? kasan_atomics+0x152/0x310 [ 16.505492] kasan_atomics+0x1dc/0x310 [ 16.505559] ? __pfx_kasan_atomics+0x10/0x10 [ 16.505590] ? __pfx_read_tsc+0x10/0x10 [ 16.505617] ? ktime_get_ts64+0x86/0x230 [ 16.505646] kunit_try_run_case+0x1a5/0x480 [ 16.505676] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.505704] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.505770] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.505808] ? __kthread_parkme+0x82/0x180 [ 16.505833] ? preempt_count_sub+0x50/0x80 [ 16.505862] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.505925] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.505954] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.505982] kthread+0x337/0x6f0 [ 16.506007] ? trace_preempt_on+0x20/0xc0 [ 16.506070] ? __pfx_kthread+0x10/0x10 [ 16.506097] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.506124] ? calculate_sigpending+0x7b/0xa0 [ 16.506167] ? __pfx_kthread+0x10/0x10 [ 16.506194] ret_from_fork+0x116/0x1d0 [ 16.506217] ? __pfx_kthread+0x10/0x10 [ 16.506242] ret_from_fork_asm+0x1a/0x30 [ 16.506314] </TASK> [ 16.506332] [ 16.515850] Allocated by task 283: [ 16.516072] kasan_save_stack+0x45/0x70 [ 16.516444] kasan_save_track+0x18/0x40 [ 16.516641] kasan_save_alloc_info+0x3b/0x50 [ 16.516897] __kasan_kmalloc+0xb7/0xc0 [ 16.517054] __kmalloc_cache_noprof+0x189/0x420 [ 16.517237] kasan_atomics+0x95/0x310 [ 16.517408] kunit_try_run_case+0x1a5/0x480 [ 16.517582] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.517784] kthread+0x337/0x6f0 [ 16.518041] ret_from_fork+0x116/0x1d0 [ 16.518454] ret_from_fork_asm+0x1a/0x30 [ 16.518682] [ 16.518803] The buggy address belongs to the object at ffff88810392bb00 [ 16.518803] which belongs to the cache kmalloc-64 of size 64 [ 16.519857] The buggy address is located 0 bytes to the right of [ 16.519857] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 16.520629] [ 16.520716] The buggy address belongs to the physical page: [ 16.520923] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 16.521261] flags: 0x200000000000000(node=0|zone=2) [ 16.521573] page_type: f5(slab) [ 16.521796] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.522385] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.522768] page dumped because: kasan: bad access detected [ 16.523037] [ 16.523120] Memory state around the buggy address: [ 16.523300] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.523540] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.524200] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.525656] ^ [ 16.525954] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.526979] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.527621] ================================================================== [ 17.746554] ================================================================== [ 17.746900] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 17.747624] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 17.747997] [ 17.748135] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.748192] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.748209] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.748238] Call Trace: [ 17.748260] <TASK> [ 17.748281] dump_stack_lvl+0x73/0xb0 [ 17.748319] print_report+0xd1/0x650 [ 17.748349] ? __virt_addr_valid+0x1db/0x2d0 [ 17.748377] ? kasan_atomics_helper+0x2006/0x5450 [ 17.748403] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.748430] ? kasan_atomics_helper+0x2006/0x5450 [ 17.748456] kasan_report+0x141/0x180 [ 17.748482] ? kasan_atomics_helper+0x2006/0x5450 [ 17.748515] kasan_check_range+0x10c/0x1c0 [ 17.748544] __kasan_check_write+0x18/0x20 [ 17.748567] kasan_atomics_helper+0x2006/0x5450 [ 17.748595] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.748621] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.748652] ? kasan_atomics+0x152/0x310 [ 17.748684] kasan_atomics+0x1dc/0x310 [ 17.748713] ? __pfx_kasan_atomics+0x10/0x10 [ 17.748741] ? __pfx_read_tsc+0x10/0x10 [ 17.748767] ? ktime_get_ts64+0x86/0x230 [ 17.748810] kunit_try_run_case+0x1a5/0x480 [ 17.748839] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.748865] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.748894] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.748921] ? __kthread_parkme+0x82/0x180 [ 17.748948] ? preempt_count_sub+0x50/0x80 [ 17.748977] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.749006] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.749033] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.749061] kthread+0x337/0x6f0 [ 17.749103] ? trace_preempt_on+0x20/0xc0 [ 17.749133] ? __pfx_kthread+0x10/0x10 [ 17.749158] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.749184] ? calculate_sigpending+0x7b/0xa0 [ 17.749214] ? __pfx_kthread+0x10/0x10 [ 17.749240] ret_from_fork+0x116/0x1d0 [ 17.749262] ? __pfx_kthread+0x10/0x10 [ 17.749288] ret_from_fork_asm+0x1a/0x30 [ 17.749325] </TASK> [ 17.749347] [ 17.762239] Allocated by task 283: [ 17.762621] kasan_save_stack+0x45/0x70 [ 17.763039] kasan_save_track+0x18/0x40 [ 17.763472] kasan_save_alloc_info+0x3b/0x50 [ 17.763996] __kasan_kmalloc+0xb7/0xc0 [ 17.764479] __kmalloc_cache_noprof+0x189/0x420 [ 17.764944] kasan_atomics+0x95/0x310 [ 17.765410] kunit_try_run_case+0x1a5/0x480 [ 17.765831] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.766034] kthread+0x337/0x6f0 [ 17.766263] ret_from_fork+0x116/0x1d0 [ 17.766657] ret_from_fork_asm+0x1a/0x30 [ 17.767078] [ 17.767273] The buggy address belongs to the object at ffff88810392bb00 [ 17.767273] which belongs to the cache kmalloc-64 of size 64 [ 17.768249] The buggy address is located 0 bytes to the right of [ 17.768249] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 17.768663] [ 17.768748] The buggy address belongs to the physical page: [ 17.768971] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 17.769438] flags: 0x200000000000000(node=0|zone=2) [ 17.769673] page_type: f5(slab) [ 17.769885] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.770203] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.770573] page dumped because: kasan: bad access detected [ 17.770924] [ 17.771022] Memory state around the buggy address: [ 17.771340] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.771670] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.772029] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.772341] ^ [ 17.772531] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.772890] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.773138] ================================================================== [ 16.652055] ================================================================== [ 16.652359] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 16.652635] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 16.652909] [ 16.653018] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.653073] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.653089] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.653117] Call Trace: [ 16.653142] <TASK> [ 16.653164] dump_stack_lvl+0x73/0xb0 [ 16.653201] print_report+0xd1/0x650 [ 16.653229] ? __virt_addr_valid+0x1db/0x2d0 [ 16.653256] ? kasan_atomics_helper+0x8f9/0x5450 [ 16.653281] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.653308] ? kasan_atomics_helper+0x8f9/0x5450 [ 16.653339] kasan_report+0x141/0x180 [ 16.653366] ? kasan_atomics_helper+0x8f9/0x5450 [ 16.653397] kasan_check_range+0x10c/0x1c0 [ 16.653425] __kasan_check_write+0x18/0x20 [ 16.653448] kasan_atomics_helper+0x8f9/0x5450 [ 16.653475] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.653503] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.653534] ? kasan_atomics+0x152/0x310 [ 16.653566] kasan_atomics+0x1dc/0x310 [ 16.653593] ? __pfx_kasan_atomics+0x10/0x10 [ 16.653622] ? __pfx_read_tsc+0x10/0x10 [ 16.653650] ? ktime_get_ts64+0x86/0x230 [ 16.653680] kunit_try_run_case+0x1a5/0x480 [ 16.653709] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.653738] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.653769] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.656139] ? __kthread_parkme+0x82/0x180 [ 16.656188] ? preempt_count_sub+0x50/0x80 [ 16.656220] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.656253] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.656283] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.656313] kthread+0x337/0x6f0 [ 16.656340] ? trace_preempt_on+0x20/0xc0 [ 16.656370] ? __pfx_kthread+0x10/0x10 [ 16.656396] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.656424] ? calculate_sigpending+0x7b/0xa0 [ 16.656453] ? __pfx_kthread+0x10/0x10 [ 16.656480] ret_from_fork+0x116/0x1d0 [ 16.656506] ? __pfx_kthread+0x10/0x10 [ 16.656533] ret_from_fork_asm+0x1a/0x30 [ 16.656572] </TASK> [ 16.656589] [ 16.671633] Allocated by task 283: [ 16.671869] kasan_save_stack+0x45/0x70 [ 16.672419] kasan_save_track+0x18/0x40 [ 16.672676] kasan_save_alloc_info+0x3b/0x50 [ 16.673326] __kasan_kmalloc+0xb7/0xc0 [ 16.673554] __kmalloc_cache_noprof+0x189/0x420 [ 16.673837] kasan_atomics+0x95/0x310 [ 16.674031] kunit_try_run_case+0x1a5/0x480 [ 16.674207] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.674533] kthread+0x337/0x6f0 [ 16.674712] ret_from_fork+0x116/0x1d0 [ 16.674962] ret_from_fork_asm+0x1a/0x30 [ 16.675220] [ 16.675306] The buggy address belongs to the object at ffff88810392bb00 [ 16.675306] which belongs to the cache kmalloc-64 of size 64 [ 16.675858] The buggy address is located 0 bytes to the right of [ 16.675858] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 16.676450] [ 16.676536] The buggy address belongs to the physical page: [ 16.676990] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 16.677526] flags: 0x200000000000000(node=0|zone=2) [ 16.677782] page_type: f5(slab) [ 16.677984] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.678750] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.679293] page dumped because: kasan: bad access detected [ 16.679655] [ 16.679748] Memory state around the buggy address: [ 16.680191] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.680641] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.681223] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.682005] ^ [ 16.682539] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.683191] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.683441] ================================================================== [ 17.424817] ================================================================== [ 17.425377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 17.425749] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 17.426067] [ 17.426194] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.426245] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.426263] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.426291] Call Trace: [ 17.426312] <TASK> [ 17.426333] dump_stack_lvl+0x73/0xb0 [ 17.426366] print_report+0xd1/0x650 [ 17.426395] ? __virt_addr_valid+0x1db/0x2d0 [ 17.426423] ? kasan_atomics_helper+0x194a/0x5450 [ 17.426449] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.426478] ? kasan_atomics_helper+0x194a/0x5450 [ 17.426508] kasan_report+0x141/0x180 [ 17.426536] ? kasan_atomics_helper+0x194a/0x5450 [ 17.426566] kasan_check_range+0x10c/0x1c0 [ 17.426596] __kasan_check_write+0x18/0x20 [ 17.426619] kasan_atomics_helper+0x194a/0x5450 [ 17.426647] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.426673] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.426704] ? kasan_atomics+0x152/0x310 [ 17.426737] kasan_atomics+0x1dc/0x310 [ 17.426764] ? __pfx_kasan_atomics+0x10/0x10 [ 17.426806] ? __pfx_read_tsc+0x10/0x10 [ 17.426832] ? ktime_get_ts64+0x86/0x230 [ 17.426862] kunit_try_run_case+0x1a5/0x480 [ 17.426891] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.426919] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.426947] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.426977] ? __kthread_parkme+0x82/0x180 [ 17.427002] ? preempt_count_sub+0x50/0x80 [ 17.427031] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.427058] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.427109] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.427138] kthread+0x337/0x6f0 [ 17.427161] ? trace_preempt_on+0x20/0xc0 [ 17.427190] ? __pfx_kthread+0x10/0x10 [ 17.427215] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.427241] ? calculate_sigpending+0x7b/0xa0 [ 17.427269] ? __pfx_kthread+0x10/0x10 [ 17.427295] ret_from_fork+0x116/0x1d0 [ 17.427318] ? __pfx_kthread+0x10/0x10 [ 17.427344] ret_from_fork_asm+0x1a/0x30 [ 17.427380] </TASK> [ 17.427395] [ 17.443527] Allocated by task 283: [ 17.443829] kasan_save_stack+0x45/0x70 [ 17.444088] kasan_save_track+0x18/0x40 [ 17.444508] kasan_save_alloc_info+0x3b/0x50 [ 17.444816] __kasan_kmalloc+0xb7/0xc0 [ 17.445248] __kmalloc_cache_noprof+0x189/0x420 [ 17.445642] kasan_atomics+0x95/0x310 [ 17.445893] kunit_try_run_case+0x1a5/0x480 [ 17.446344] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.446758] kthread+0x337/0x6f0 [ 17.446965] ret_from_fork+0x116/0x1d0 [ 17.447584] ret_from_fork_asm+0x1a/0x30 [ 17.447840] [ 17.447936] The buggy address belongs to the object at ffff88810392bb00 [ 17.447936] which belongs to the cache kmalloc-64 of size 64 [ 17.449004] The buggy address is located 0 bytes to the right of [ 17.449004] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 17.449785] [ 17.450035] The buggy address belongs to the physical page: [ 17.450494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 17.451000] flags: 0x200000000000000(node=0|zone=2) [ 17.451372] page_type: f5(slab) [ 17.451659] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.452081] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.452457] page dumped because: kasan: bad access detected [ 17.452748] [ 17.452861] Memory state around the buggy address: [ 17.453540] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.453892] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.454484] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.454932] ^ [ 17.455384] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.455874] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.456405] ================================================================== [ 16.455509] ================================================================== [ 16.455844] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 16.456740] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 16.457512] [ 16.457671] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.457859] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.457882] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.457912] Call Trace: [ 16.457936] <TASK> [ 16.457961] dump_stack_lvl+0x73/0xb0 [ 16.458002] print_report+0xd1/0x650 [ 16.458031] ? __virt_addr_valid+0x1db/0x2d0 [ 16.458060] ? kasan_atomics_helper+0x4a0/0x5450 [ 16.458087] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.458115] ? kasan_atomics_helper+0x4a0/0x5450 [ 16.458141] kasan_report+0x141/0x180 [ 16.458169] ? kasan_atomics_helper+0x4a0/0x5450 [ 16.458201] kasan_check_range+0x10c/0x1c0 [ 16.458232] __kasan_check_write+0x18/0x20 [ 16.458255] kasan_atomics_helper+0x4a0/0x5450 [ 16.458311] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.458338] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.458370] ? kasan_atomics+0x152/0x310 [ 16.458404] kasan_atomics+0x1dc/0x310 [ 16.458431] ? __pfx_kasan_atomics+0x10/0x10 [ 16.458461] ? __pfx_read_tsc+0x10/0x10 [ 16.458486] ? ktime_get_ts64+0x86/0x230 [ 16.458516] kunit_try_run_case+0x1a5/0x480 [ 16.458546] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.458572] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.458601] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.458629] ? __kthread_parkme+0x82/0x180 [ 16.458655] ? preempt_count_sub+0x50/0x80 [ 16.458684] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.458714] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.458742] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.458770] kthread+0x337/0x6f0 [ 16.458809] ? trace_preempt_on+0x20/0xc0 [ 16.458839] ? __pfx_kthread+0x10/0x10 [ 16.458865] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.458890] ? calculate_sigpending+0x7b/0xa0 [ 16.458919] ? __pfx_kthread+0x10/0x10 [ 16.458945] ret_from_fork+0x116/0x1d0 [ 16.458969] ? __pfx_kthread+0x10/0x10 [ 16.458994] ret_from_fork_asm+0x1a/0x30 [ 16.459031] </TASK> [ 16.459045] [ 16.469474] Allocated by task 283: [ 16.469694] kasan_save_stack+0x45/0x70 [ 16.469941] kasan_save_track+0x18/0x40 [ 16.470160] kasan_save_alloc_info+0x3b/0x50 [ 16.470483] __kasan_kmalloc+0xb7/0xc0 [ 16.470676] __kmalloc_cache_noprof+0x189/0x420 [ 16.470935] kasan_atomics+0x95/0x310 [ 16.471133] kunit_try_run_case+0x1a5/0x480 [ 16.471396] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.471593] kthread+0x337/0x6f0 [ 16.471730] ret_from_fork+0x116/0x1d0 [ 16.471910] ret_from_fork_asm+0x1a/0x30 [ 16.472195] [ 16.472369] The buggy address belongs to the object at ffff88810392bb00 [ 16.472369] which belongs to the cache kmalloc-64 of size 64 [ 16.473018] The buggy address is located 0 bytes to the right of [ 16.473018] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 16.473745] [ 16.473854] The buggy address belongs to the physical page: [ 16.474185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 16.474635] flags: 0x200000000000000(node=0|zone=2) [ 16.475045] page_type: f5(slab) [ 16.475449] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.475848] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.476358] page dumped because: kasan: bad access detected [ 16.476551] [ 16.476633] Memory state around the buggy address: [ 16.476819] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.477067] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.477505] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.477886] ^ [ 16.478280] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.478651] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.479028] ================================================================== [ 17.272952] ================================================================== [ 17.273825] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 17.274131] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 17.274521] [ 17.274707] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.274765] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.274784] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.274862] Call Trace: [ 17.274887] <TASK> [ 17.274911] dump_stack_lvl+0x73/0xb0 [ 17.274949] print_report+0xd1/0x650 [ 17.274977] ? __virt_addr_valid+0x1db/0x2d0 [ 17.275042] ? kasan_atomics_helper+0x151d/0x5450 [ 17.275068] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.275111] ? kasan_atomics_helper+0x151d/0x5450 [ 17.275138] kasan_report+0x141/0x180 [ 17.275200] ? kasan_atomics_helper+0x151d/0x5450 [ 17.275233] kasan_check_range+0x10c/0x1c0 [ 17.275333] __kasan_check_write+0x18/0x20 [ 17.275362] kasan_atomics_helper+0x151d/0x5450 [ 17.275391] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.275418] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.275450] ? kasan_atomics+0x152/0x310 [ 17.275528] kasan_atomics+0x1dc/0x310 [ 17.275557] ? __pfx_kasan_atomics+0x10/0x10 [ 17.275588] ? __pfx_read_tsc+0x10/0x10 [ 17.275614] ? ktime_get_ts64+0x86/0x230 [ 17.275681] kunit_try_run_case+0x1a5/0x480 [ 17.275712] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.275739] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.275768] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.275809] ? __kthread_parkme+0x82/0x180 [ 17.275836] ? preempt_count_sub+0x50/0x80 [ 17.275866] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.275896] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.275924] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.275953] kthread+0x337/0x6f0 [ 17.275977] ? trace_preempt_on+0x20/0xc0 [ 17.276007] ? __pfx_kthread+0x10/0x10 [ 17.276032] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.276059] ? calculate_sigpending+0x7b/0xa0 [ 17.276089] ? __pfx_kthread+0x10/0x10 [ 17.276128] ret_from_fork+0x116/0x1d0 [ 17.276153] ? __pfx_kthread+0x10/0x10 [ 17.276178] ret_from_fork_asm+0x1a/0x30 [ 17.276216] </TASK> [ 17.276231] [ 17.285386] Allocated by task 283: [ 17.285617] kasan_save_stack+0x45/0x70 [ 17.285876] kasan_save_track+0x18/0x40 [ 17.286159] kasan_save_alloc_info+0x3b/0x50 [ 17.286431] __kasan_kmalloc+0xb7/0xc0 [ 17.286660] __kmalloc_cache_noprof+0x189/0x420 [ 17.286966] kasan_atomics+0x95/0x310 [ 17.287313] kunit_try_run_case+0x1a5/0x480 [ 17.287565] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.287877] kthread+0x337/0x6f0 [ 17.288094] ret_from_fork+0x116/0x1d0 [ 17.288312] ret_from_fork_asm+0x1a/0x30 [ 17.288536] [ 17.288652] The buggy address belongs to the object at ffff88810392bb00 [ 17.288652] which belongs to the cache kmalloc-64 of size 64 [ 17.289192] The buggy address is located 0 bytes to the right of [ 17.289192] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 17.289882] [ 17.290002] The buggy address belongs to the physical page: [ 17.290357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 17.290706] flags: 0x200000000000000(node=0|zone=2) [ 17.290911] page_type: f5(slab) [ 17.291184] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.291586] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.291957] page dumped because: kasan: bad access detected [ 17.292193] [ 17.292343] Memory state around the buggy address: [ 17.292606] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.292996] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.293431] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.293806] ^ [ 17.294013] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.294347] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.294715] ================================================================== [ 16.395651] ================================================================== [ 16.396014] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 16.396302] Read of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 16.396557] [ 16.396691] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.396743] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.396759] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.397692] Call Trace: [ 16.397726] <TASK> [ 16.397748] dump_stack_lvl+0x73/0xb0 [ 16.397804] print_report+0xd1/0x650 [ 16.397833] ? __virt_addr_valid+0x1db/0x2d0 [ 16.397861] ? kasan_atomics_helper+0x3df/0x5450 [ 16.397885] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.397912] ? kasan_atomics_helper+0x3df/0x5450 [ 16.397937] kasan_report+0x141/0x180 [ 16.397964] ? kasan_atomics_helper+0x3df/0x5450 [ 16.397994] kasan_check_range+0x10c/0x1c0 [ 16.398022] __kasan_check_read+0x15/0x20 [ 16.398044] kasan_atomics_helper+0x3df/0x5450 [ 16.398071] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.398097] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.398127] ? kasan_atomics+0x152/0x310 [ 16.398158] kasan_atomics+0x1dc/0x310 [ 16.398184] ? __pfx_kasan_atomics+0x10/0x10 [ 16.398213] ? __pfx_read_tsc+0x10/0x10 [ 16.398239] ? ktime_get_ts64+0x86/0x230 [ 16.398267] kunit_try_run_case+0x1a5/0x480 [ 16.398294] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.398322] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.398350] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.398377] ? __kthread_parkme+0x82/0x180 [ 16.398403] ? preempt_count_sub+0x50/0x80 [ 16.398467] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.398496] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.398523] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.398552] kthread+0x337/0x6f0 [ 16.398576] ? trace_preempt_on+0x20/0xc0 [ 16.398605] ? __pfx_kthread+0x10/0x10 [ 16.398631] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.398657] ? calculate_sigpending+0x7b/0xa0 [ 16.398686] ? __pfx_kthread+0x10/0x10 [ 16.398711] ret_from_fork+0x116/0x1d0 [ 16.398735] ? __pfx_kthread+0x10/0x10 [ 16.398760] ret_from_fork_asm+0x1a/0x30 [ 16.398807] </TASK> [ 16.398823] [ 16.411813] Allocated by task 283: [ 16.412037] kasan_save_stack+0x45/0x70 [ 16.412482] kasan_save_track+0x18/0x40 [ 16.413018] kasan_save_alloc_info+0x3b/0x50 [ 16.413587] __kasan_kmalloc+0xb7/0xc0 [ 16.413873] __kmalloc_cache_noprof+0x189/0x420 [ 16.414512] kasan_atomics+0x95/0x310 [ 16.414779] kunit_try_run_case+0x1a5/0x480 [ 16.415344] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.415617] kthread+0x337/0x6f0 [ 16.415812] ret_from_fork+0x116/0x1d0 [ 16.416018] ret_from_fork_asm+0x1a/0x30 [ 16.416668] [ 16.416943] The buggy address belongs to the object at ffff88810392bb00 [ 16.416943] which belongs to the cache kmalloc-64 of size 64 [ 16.417961] The buggy address is located 0 bytes to the right of [ 16.417961] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 16.419058] [ 16.419180] The buggy address belongs to the physical page: [ 16.419662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 16.420323] flags: 0x200000000000000(node=0|zone=2) [ 16.420598] page_type: f5(slab) [ 16.420784] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.421103] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.421572] page dumped because: kasan: bad access detected [ 16.421847] [ 16.421934] Memory state around the buggy address: [ 16.422175] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.422920] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.423351] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.423815] ^ [ 16.424053] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.424559] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.424896] ================================================================== [ 17.405250] ================================================================== [ 17.405661] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 17.406027] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 17.406433] [ 17.406569] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.406623] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.406639] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.406667] Call Trace: [ 17.406688] <TASK> [ 17.406708] dump_stack_lvl+0x73/0xb0 [ 17.406744] print_report+0xd1/0x650 [ 17.406772] ? __virt_addr_valid+0x1db/0x2d0 [ 17.406812] ? kasan_atomics_helper+0x18b1/0x5450 [ 17.406839] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.406865] ? kasan_atomics_helper+0x18b1/0x5450 [ 17.406892] kasan_report+0x141/0x180 [ 17.406920] ? kasan_atomics_helper+0x18b1/0x5450 [ 17.406952] kasan_check_range+0x10c/0x1c0 [ 17.406979] __kasan_check_write+0x18/0x20 [ 17.407003] kasan_atomics_helper+0x18b1/0x5450 [ 17.407030] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.407056] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.407111] ? kasan_atomics+0x152/0x310 [ 17.407142] kasan_atomics+0x1dc/0x310 [ 17.407169] ? __pfx_kasan_atomics+0x10/0x10 [ 17.407197] ? __pfx_read_tsc+0x10/0x10 [ 17.407224] ? ktime_get_ts64+0x86/0x230 [ 17.407252] kunit_try_run_case+0x1a5/0x480 [ 17.407282] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.407309] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.407338] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.407366] ? __kthread_parkme+0x82/0x180 [ 17.407392] ? preempt_count_sub+0x50/0x80 [ 17.407421] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.407448] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.407476] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.407504] kthread+0x337/0x6f0 [ 17.407527] ? trace_preempt_on+0x20/0xc0 [ 17.407555] ? __pfx_kthread+0x10/0x10 [ 17.407580] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.407605] ? calculate_sigpending+0x7b/0xa0 [ 17.407634] ? __pfx_kthread+0x10/0x10 [ 17.407660] ret_from_fork+0x116/0x1d0 [ 17.407683] ? __pfx_kthread+0x10/0x10 [ 17.407708] ret_from_fork_asm+0x1a/0x30 [ 17.407744] </TASK> [ 17.407760] [ 17.415992] Allocated by task 283: [ 17.416226] kasan_save_stack+0x45/0x70 [ 17.416434] kasan_save_track+0x18/0x40 [ 17.416617] kasan_save_alloc_info+0x3b/0x50 [ 17.416800] __kasan_kmalloc+0xb7/0xc0 [ 17.416954] __kmalloc_cache_noprof+0x189/0x420 [ 17.417164] kasan_atomics+0x95/0x310 [ 17.417387] kunit_try_run_case+0x1a5/0x480 [ 17.417634] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.417962] kthread+0x337/0x6f0 [ 17.418172] ret_from_fork+0x116/0x1d0 [ 17.418330] ret_from_fork_asm+0x1a/0x30 [ 17.418492] [ 17.418578] The buggy address belongs to the object at ffff88810392bb00 [ 17.418578] which belongs to the cache kmalloc-64 of size 64 [ 17.419223] The buggy address is located 0 bytes to the right of [ 17.419223] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 17.419873] [ 17.419961] The buggy address belongs to the physical page: [ 17.420262] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 17.420618] flags: 0x200000000000000(node=0|zone=2) [ 17.420821] page_type: f5(slab) [ 17.421017] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.421440] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.421723] page dumped because: kasan: bad access detected [ 17.422030] [ 17.422168] Memory state around the buggy address: [ 17.422396] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.422736] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.423064] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.423362] ^ [ 17.423548] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.423808] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.424199] ================================================================== [ 17.503678] ================================================================== [ 17.504299] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 17.505313] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 17.505995] [ 17.506115] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.506171] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.506187] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.506215] Call Trace: [ 17.506237] <TASK> [ 17.506259] dump_stack_lvl+0x73/0xb0 [ 17.506299] print_report+0xd1/0x650 [ 17.506342] ? __virt_addr_valid+0x1db/0x2d0 [ 17.506370] ? kasan_atomics_helper+0x1b22/0x5450 [ 17.506396] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.506422] ? kasan_atomics_helper+0x1b22/0x5450 [ 17.506489] kasan_report+0x141/0x180 [ 17.506517] ? kasan_atomics_helper+0x1b22/0x5450 [ 17.506593] kasan_check_range+0x10c/0x1c0 [ 17.506623] __kasan_check_write+0x18/0x20 [ 17.506659] kasan_atomics_helper+0x1b22/0x5450 [ 17.506687] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.506714] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.506743] ? kasan_atomics+0x152/0x310 [ 17.506775] kasan_atomics+0x1dc/0x310 [ 17.506812] ? __pfx_kasan_atomics+0x10/0x10 [ 17.506841] ? __pfx_read_tsc+0x10/0x10 [ 17.506867] ? ktime_get_ts64+0x86/0x230 [ 17.506896] kunit_try_run_case+0x1a5/0x480 [ 17.506924] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.506952] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.506982] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.507010] ? __kthread_parkme+0x82/0x180 [ 17.507036] ? preempt_count_sub+0x50/0x80 [ 17.507066] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.507108] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.507136] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.507164] kthread+0x337/0x6f0 [ 17.507188] ? trace_preempt_on+0x20/0xc0 [ 17.507216] ? __pfx_kthread+0x10/0x10 [ 17.507241] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.507267] ? calculate_sigpending+0x7b/0xa0 [ 17.507295] ? __pfx_kthread+0x10/0x10 [ 17.507321] ret_from_fork+0x116/0x1d0 [ 17.507344] ? __pfx_kthread+0x10/0x10 [ 17.507368] ret_from_fork_asm+0x1a/0x30 [ 17.507406] </TASK> [ 17.507421] [ 17.521121] Allocated by task 283: [ 17.521491] kasan_save_stack+0x45/0x70 [ 17.521741] kasan_save_track+0x18/0x40 [ 17.521975] kasan_save_alloc_info+0x3b/0x50 [ 17.522572] __kasan_kmalloc+0xb7/0xc0 [ 17.522749] __kmalloc_cache_noprof+0x189/0x420 [ 17.523287] kasan_atomics+0x95/0x310 [ 17.523677] kunit_try_run_case+0x1a5/0x480 [ 17.523951] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.524390] kthread+0x337/0x6f0 [ 17.524728] ret_from_fork+0x116/0x1d0 [ 17.524918] ret_from_fork_asm+0x1a/0x30 [ 17.525464] [ 17.525620] The buggy address belongs to the object at ffff88810392bb00 [ 17.525620] which belongs to the cache kmalloc-64 of size 64 [ 17.526271] The buggy address is located 0 bytes to the right of [ 17.526271] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 17.527031] [ 17.527399] The buggy address belongs to the physical page: [ 17.527701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 17.528234] flags: 0x200000000000000(node=0|zone=2) [ 17.528516] page_type: f5(slab) [ 17.528762] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.529153] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.529594] page dumped because: kasan: bad access detected [ 17.529904] [ 17.530033] Memory state around the buggy address: [ 17.530249] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.530627] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.531130] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.531418] ^ [ 17.531703] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.532026] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.532508] ================================================================== [ 17.717980] ================================================================== [ 17.718459] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 17.718882] Read of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 17.719566] [ 17.719714] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.720060] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.720083] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.720127] Call Trace: [ 17.720153] <TASK> [ 17.720177] dump_stack_lvl+0x73/0xb0 [ 17.720217] print_report+0xd1/0x650 [ 17.720245] ? __virt_addr_valid+0x1db/0x2d0 [ 17.720274] ? kasan_atomics_helper+0x4f71/0x5450 [ 17.720302] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.720330] ? kasan_atomics_helper+0x4f71/0x5450 [ 17.720357] kasan_report+0x141/0x180 [ 17.720384] ? kasan_atomics_helper+0x4f71/0x5450 [ 17.720415] __asan_report_load8_noabort+0x18/0x20 [ 17.720445] kasan_atomics_helper+0x4f71/0x5450 [ 17.720472] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.720499] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.720530] ? kasan_atomics+0x152/0x310 [ 17.720563] kasan_atomics+0x1dc/0x310 [ 17.720590] ? __pfx_kasan_atomics+0x10/0x10 [ 17.720620] ? __pfx_read_tsc+0x10/0x10 [ 17.720645] ? ktime_get_ts64+0x86/0x230 [ 17.720676] kunit_try_run_case+0x1a5/0x480 [ 17.720706] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.720733] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.720763] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.720805] ? __kthread_parkme+0x82/0x180 [ 17.720832] ? preempt_count_sub+0x50/0x80 [ 17.720861] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.720891] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.720919] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.720948] kthread+0x337/0x6f0 [ 17.720972] ? trace_preempt_on+0x20/0xc0 [ 17.721001] ? __pfx_kthread+0x10/0x10 [ 17.721026] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.721053] ? calculate_sigpending+0x7b/0xa0 [ 17.721200] ? __pfx_kthread+0x10/0x10 [ 17.721232] ret_from_fork+0x116/0x1d0 [ 17.721260] ? __pfx_kthread+0x10/0x10 [ 17.721286] ret_from_fork_asm+0x1a/0x30 [ 17.721325] </TASK> [ 17.721347] [ 17.732828] Allocated by task 283: [ 17.733323] kasan_save_stack+0x45/0x70 [ 17.733676] kasan_save_track+0x18/0x40 [ 17.734025] kasan_save_alloc_info+0x3b/0x50 [ 17.734353] __kasan_kmalloc+0xb7/0xc0 [ 17.734568] __kmalloc_cache_noprof+0x189/0x420 [ 17.734828] kasan_atomics+0x95/0x310 [ 17.735035] kunit_try_run_case+0x1a5/0x480 [ 17.735554] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.735784] kthread+0x337/0x6f0 [ 17.736183] ret_from_fork+0x116/0x1d0 [ 17.736497] ret_from_fork_asm+0x1a/0x30 [ 17.736836] [ 17.736932] The buggy address belongs to the object at ffff88810392bb00 [ 17.736932] which belongs to the cache kmalloc-64 of size 64 [ 17.737841] The buggy address is located 0 bytes to the right of [ 17.737841] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 17.738659] [ 17.738889] The buggy address belongs to the physical page: [ 17.739330] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 17.739808] flags: 0x200000000000000(node=0|zone=2) [ 17.740070] page_type: f5(slab) [ 17.740411] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.740901] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.741465] page dumped because: kasan: bad access detected [ 17.741822] [ 17.741944] Memory state around the buggy address: [ 17.742363] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.742866] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.743382] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.743820] ^ [ 17.744254] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.744696] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.745210] ================================================================== [ 16.949401] ================================================================== [ 16.949703] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 16.950469] Read of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 16.950860] [ 16.950997] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.951050] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.951067] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.951282] Call Trace: [ 16.951307] <TASK> [ 16.951331] dump_stack_lvl+0x73/0xb0 [ 16.951370] print_report+0xd1/0x650 [ 16.951469] ? __virt_addr_valid+0x1db/0x2d0 [ 16.951499] ? kasan_atomics_helper+0x4a36/0x5450 [ 16.951525] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.951552] ? kasan_atomics_helper+0x4a36/0x5450 [ 16.951579] kasan_report+0x141/0x180 [ 16.951607] ? kasan_atomics_helper+0x4a36/0x5450 [ 16.951639] __asan_report_load4_noabort+0x18/0x20 [ 16.951668] kasan_atomics_helper+0x4a36/0x5450 [ 16.951695] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.951723] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.951754] ? kasan_atomics+0x152/0x310 [ 16.951800] kasan_atomics+0x1dc/0x310 [ 16.951829] ? __pfx_kasan_atomics+0x10/0x10 [ 16.951861] ? __pfx_read_tsc+0x10/0x10 [ 16.951890] ? ktime_get_ts64+0x86/0x230 [ 16.951923] kunit_try_run_case+0x1a5/0x480 [ 16.951953] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.951981] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.952011] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.952041] ? __kthread_parkme+0x82/0x180 [ 16.952068] ? preempt_count_sub+0x50/0x80 [ 16.952098] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.952129] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.952157] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.952185] kthread+0x337/0x6f0 [ 16.952210] ? trace_preempt_on+0x20/0xc0 [ 16.952239] ? __pfx_kthread+0x10/0x10 [ 16.952264] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.952291] ? calculate_sigpending+0x7b/0xa0 [ 16.952320] ? __pfx_kthread+0x10/0x10 [ 16.952347] ret_from_fork+0x116/0x1d0 [ 16.952370] ? __pfx_kthread+0x10/0x10 [ 16.952395] ret_from_fork_asm+0x1a/0x30 [ 16.952433] </TASK> [ 16.952450] [ 16.960933] Allocated by task 283: [ 16.961108] kasan_save_stack+0x45/0x70 [ 16.961298] kasan_save_track+0x18/0x40 [ 16.961526] kasan_save_alloc_info+0x3b/0x50 [ 16.961773] __kasan_kmalloc+0xb7/0xc0 [ 16.961958] __kmalloc_cache_noprof+0x189/0x420 [ 16.962274] kasan_atomics+0x95/0x310 [ 16.962500] kunit_try_run_case+0x1a5/0x480 [ 16.962694] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.962998] kthread+0x337/0x6f0 [ 16.963217] ret_from_fork+0x116/0x1d0 [ 16.963409] ret_from_fork_asm+0x1a/0x30 [ 16.963597] [ 16.963716] The buggy address belongs to the object at ffff88810392bb00 [ 16.963716] which belongs to the cache kmalloc-64 of size 64 [ 16.964293] The buggy address is located 0 bytes to the right of [ 16.964293] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 16.964807] [ 16.964895] The buggy address belongs to the physical page: [ 16.965098] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 16.965395] flags: 0x200000000000000(node=0|zone=2) [ 16.965671] page_type: f5(slab) [ 16.965878] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.966501] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.966767] page dumped because: kasan: bad access detected [ 16.967095] [ 16.967213] Memory state around the buggy address: [ 16.967477] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.967826] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.968087] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.968336] ^ [ 16.968619] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.969015] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.969645] ================================================================== [ 16.625171] ================================================================== [ 16.625575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 16.626135] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 16.626543] [ 16.626672] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.626765] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.626782] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.626870] Call Trace: [ 16.626894] <TASK> [ 16.626929] dump_stack_lvl+0x73/0xb0 [ 16.626966] print_report+0xd1/0x650 [ 16.626994] ? __virt_addr_valid+0x1db/0x2d0 [ 16.627053] ? kasan_atomics_helper+0x860/0x5450 [ 16.627080] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.627153] ? kasan_atomics_helper+0x860/0x5450 [ 16.627193] kasan_report+0x141/0x180 [ 16.627220] ? kasan_atomics_helper+0x860/0x5450 [ 16.627251] kasan_check_range+0x10c/0x1c0 [ 16.627281] __kasan_check_write+0x18/0x20 [ 16.627306] kasan_atomics_helper+0x860/0x5450 [ 16.627333] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.627360] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.627391] ? kasan_atomics+0x152/0x310 [ 16.627424] kasan_atomics+0x1dc/0x310 [ 16.627453] ? __pfx_kasan_atomics+0x10/0x10 [ 16.627483] ? __pfx_read_tsc+0x10/0x10 [ 16.627509] ? ktime_get_ts64+0x86/0x230 [ 16.627539] kunit_try_run_case+0x1a5/0x480 [ 16.627569] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.627597] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.627627] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.627656] ? __kthread_parkme+0x82/0x180 [ 16.627681] ? preempt_count_sub+0x50/0x80 [ 16.627711] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.627741] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.627770] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.627810] kthread+0x337/0x6f0 [ 16.627835] ? trace_preempt_on+0x20/0xc0 [ 16.627864] ? __pfx_kthread+0x10/0x10 [ 16.627889] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.627916] ? calculate_sigpending+0x7b/0xa0 [ 16.627944] ? __pfx_kthread+0x10/0x10 [ 16.627970] ret_from_fork+0x116/0x1d0 [ 16.627995] ? __pfx_kthread+0x10/0x10 [ 16.628021] ret_from_fork_asm+0x1a/0x30 [ 16.628058] </TASK> [ 16.628074] [ 16.638874] Allocated by task 283: [ 16.639223] kasan_save_stack+0x45/0x70 [ 16.639533] kasan_save_track+0x18/0x40 [ 16.639695] kasan_save_alloc_info+0x3b/0x50 [ 16.639921] __kasan_kmalloc+0xb7/0xc0 [ 16.640145] __kmalloc_cache_noprof+0x189/0x420 [ 16.640629] kasan_atomics+0x95/0x310 [ 16.640863] kunit_try_run_case+0x1a5/0x480 [ 16.641066] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.641436] kthread+0x337/0x6f0 [ 16.641662] ret_from_fork+0x116/0x1d0 [ 16.642051] ret_from_fork_asm+0x1a/0x30 [ 16.642306] [ 16.642409] The buggy address belongs to the object at ffff88810392bb00 [ 16.642409] which belongs to the cache kmalloc-64 of size 64 [ 16.643179] The buggy address is located 0 bytes to the right of [ 16.643179] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 16.643894] [ 16.643986] The buggy address belongs to the physical page: [ 16.644430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 16.644931] flags: 0x200000000000000(node=0|zone=2) [ 16.645284] page_type: f5(slab) [ 16.645479] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.645859] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.646364] page dumped because: kasan: bad access detected [ 16.646674] [ 16.646798] Memory state around the buggy address: [ 16.647183] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.647584] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.648006] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.648421] ^ [ 16.649279] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.649703] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.650588] ================================================================== [ 17.480251] ================================================================== [ 17.480719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 17.481300] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 17.481735] [ 17.481898] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.481955] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.481972] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.482002] Call Trace: [ 17.482028] <TASK> [ 17.482052] dump_stack_lvl+0x73/0xb0 [ 17.482103] print_report+0xd1/0x650 [ 17.482133] ? __virt_addr_valid+0x1db/0x2d0 [ 17.482164] ? kasan_atomics_helper+0x1a7f/0x5450 [ 17.482191] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.482246] ? kasan_atomics_helper+0x1a7f/0x5450 [ 17.482274] kasan_report+0x141/0x180 [ 17.482302] ? kasan_atomics_helper+0x1a7f/0x5450 [ 17.482335] kasan_check_range+0x10c/0x1c0 [ 17.482364] __kasan_check_write+0x18/0x20 [ 17.482387] kasan_atomics_helper+0x1a7f/0x5450 [ 17.482436] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.482462] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.482493] ? kasan_atomics+0x152/0x310 [ 17.482527] kasan_atomics+0x1dc/0x310 [ 17.482555] ? __pfx_kasan_atomics+0x10/0x10 [ 17.482586] ? __pfx_read_tsc+0x10/0x10 [ 17.482612] ? ktime_get_ts64+0x86/0x230 [ 17.482642] kunit_try_run_case+0x1a5/0x480 [ 17.482673] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.482719] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.482766] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.482825] ? __kthread_parkme+0x82/0x180 [ 17.482868] ? preempt_count_sub+0x50/0x80 [ 17.482898] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.482927] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.482972] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.483016] kthread+0x337/0x6f0 [ 17.483042] ? trace_preempt_on+0x20/0xc0 [ 17.483070] ? __pfx_kthread+0x10/0x10 [ 17.483108] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.483135] ? calculate_sigpending+0x7b/0xa0 [ 17.483164] ? __pfx_kthread+0x10/0x10 [ 17.483191] ret_from_fork+0x116/0x1d0 [ 17.483215] ? __pfx_kthread+0x10/0x10 [ 17.483241] ret_from_fork_asm+0x1a/0x30 [ 17.483278] </TASK> [ 17.483294] [ 17.492571] Allocated by task 283: [ 17.492761] kasan_save_stack+0x45/0x70 [ 17.493033] kasan_save_track+0x18/0x40 [ 17.493304] kasan_save_alloc_info+0x3b/0x50 [ 17.493555] __kasan_kmalloc+0xb7/0xc0 [ 17.493774] __kmalloc_cache_noprof+0x189/0x420 [ 17.494005] kasan_atomics+0x95/0x310 [ 17.494189] kunit_try_run_case+0x1a5/0x480 [ 17.494498] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.494845] kthread+0x337/0x6f0 [ 17.495048] ret_from_fork+0x116/0x1d0 [ 17.495272] ret_from_fork_asm+0x1a/0x30 [ 17.495449] [ 17.495567] The buggy address belongs to the object at ffff88810392bb00 [ 17.495567] which belongs to the cache kmalloc-64 of size 64 [ 17.496253] The buggy address is located 0 bytes to the right of [ 17.496253] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 17.497113] [ 17.497205] The buggy address belongs to the physical page: [ 17.497415] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 17.497881] flags: 0x200000000000000(node=0|zone=2) [ 17.498261] page_type: f5(slab) [ 17.498465] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.498829] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.499121] page dumped because: kasan: bad access detected [ 17.499444] [ 17.499597] Memory state around the buggy address: [ 17.499915] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.500575] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.501672] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.501965] ^ [ 17.502161] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.502415] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.502671] ================================================================== [ 16.600385] ================================================================== [ 16.600959] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 16.601388] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 16.602016] [ 16.602208] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.602262] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.602278] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.602306] Call Trace: [ 16.602328] <TASK> [ 16.602350] dump_stack_lvl+0x73/0xb0 [ 16.602440] print_report+0xd1/0x650 [ 16.602469] ? __virt_addr_valid+0x1db/0x2d0 [ 16.602510] ? kasan_atomics_helper+0x7c7/0x5450 [ 16.602537] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.602565] ? kasan_atomics_helper+0x7c7/0x5450 [ 16.602591] kasan_report+0x141/0x180 [ 16.602619] ? kasan_atomics_helper+0x7c7/0x5450 [ 16.602695] kasan_check_range+0x10c/0x1c0 [ 16.602724] __kasan_check_write+0x18/0x20 [ 16.602809] kasan_atomics_helper+0x7c7/0x5450 [ 16.602836] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.602876] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.602908] ? kasan_atomics+0x152/0x310 [ 16.602940] kasan_atomics+0x1dc/0x310 [ 16.602968] ? __pfx_kasan_atomics+0x10/0x10 [ 16.602998] ? __pfx_read_tsc+0x10/0x10 [ 16.603025] ? ktime_get_ts64+0x86/0x230 [ 16.603054] kunit_try_run_case+0x1a5/0x480 [ 16.603084] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.603125] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.603155] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.603184] ? __kthread_parkme+0x82/0x180 [ 16.603209] ? preempt_count_sub+0x50/0x80 [ 16.603238] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.603267] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.603297] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.603326] kthread+0x337/0x6f0 [ 16.603350] ? trace_preempt_on+0x20/0xc0 [ 16.603380] ? __pfx_kthread+0x10/0x10 [ 16.603405] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.603430] ? calculate_sigpending+0x7b/0xa0 [ 16.603459] ? __pfx_kthread+0x10/0x10 [ 16.603484] ret_from_fork+0x116/0x1d0 [ 16.603508] ? __pfx_kthread+0x10/0x10 [ 16.603532] ret_from_fork_asm+0x1a/0x30 [ 16.603569] </TASK> [ 16.603584] [ 16.613717] Allocated by task 283: [ 16.613998] kasan_save_stack+0x45/0x70 [ 16.614537] kasan_save_track+0x18/0x40 [ 16.614770] kasan_save_alloc_info+0x3b/0x50 [ 16.615153] __kasan_kmalloc+0xb7/0xc0 [ 16.615387] __kmalloc_cache_noprof+0x189/0x420 [ 16.615610] kasan_atomics+0x95/0x310 [ 16.615766] kunit_try_run_case+0x1a5/0x480 [ 16.616073] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.616538] kthread+0x337/0x6f0 [ 16.616708] ret_from_fork+0x116/0x1d0 [ 16.616997] ret_from_fork_asm+0x1a/0x30 [ 16.617259] [ 16.617352] The buggy address belongs to the object at ffff88810392bb00 [ 16.617352] which belongs to the cache kmalloc-64 of size 64 [ 16.617956] The buggy address is located 0 bytes to the right of [ 16.617956] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 16.618803] [ 16.618908] The buggy address belongs to the physical page: [ 16.619189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 16.619704] flags: 0x200000000000000(node=0|zone=2) [ 16.620021] page_type: f5(slab) [ 16.620232] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.620673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.621079] page dumped because: kasan: bad access detected [ 16.621458] [ 16.621672] Memory state around the buggy address: [ 16.621913] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.622259] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.622696] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.623048] ^ [ 16.623473] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.623874] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.624302] ================================================================== [ 17.094840] ================================================================== [ 17.095439] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 17.095735] Read of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 17.096151] [ 17.096284] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.096335] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.096350] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.096377] Call Trace: [ 17.096399] <TASK> [ 17.096418] dump_stack_lvl+0x73/0xb0 [ 17.096454] print_report+0xd1/0x650 [ 17.096481] ? __virt_addr_valid+0x1db/0x2d0 [ 17.096509] ? kasan_atomics_helper+0x49e8/0x5450 [ 17.096535] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.096563] ? kasan_atomics_helper+0x49e8/0x5450 [ 17.096590] kasan_report+0x141/0x180 [ 17.096617] ? kasan_atomics_helper+0x49e8/0x5450 [ 17.096648] __asan_report_load4_noabort+0x18/0x20 [ 17.096677] kasan_atomics_helper+0x49e8/0x5450 [ 17.096703] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.096729] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.096760] ? kasan_atomics+0x152/0x310 [ 17.096803] kasan_atomics+0x1dc/0x310 [ 17.096831] ? __pfx_kasan_atomics+0x10/0x10 [ 17.096859] ? __pfx_read_tsc+0x10/0x10 [ 17.096885] ? ktime_get_ts64+0x86/0x230 [ 17.096913] kunit_try_run_case+0x1a5/0x480 [ 17.096941] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.096979] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.097008] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.097034] ? __kthread_parkme+0x82/0x180 [ 17.097067] ? preempt_count_sub+0x50/0x80 [ 17.097117] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.097146] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.097188] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.097216] kthread+0x337/0x6f0 [ 17.097240] ? trace_preempt_on+0x20/0xc0 [ 17.097268] ? __pfx_kthread+0x10/0x10 [ 17.097294] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.097318] ? calculate_sigpending+0x7b/0xa0 [ 17.097352] ? __pfx_kthread+0x10/0x10 [ 17.097379] ret_from_fork+0x116/0x1d0 [ 17.097402] ? __pfx_kthread+0x10/0x10 [ 17.097427] ret_from_fork_asm+0x1a/0x30 [ 17.097464] </TASK> [ 17.097480] [ 17.106259] Allocated by task 283: [ 17.106484] kasan_save_stack+0x45/0x70 [ 17.106711] kasan_save_track+0x18/0x40 [ 17.106930] kasan_save_alloc_info+0x3b/0x50 [ 17.107117] __kasan_kmalloc+0xb7/0xc0 [ 17.107362] __kmalloc_cache_noprof+0x189/0x420 [ 17.107614] kasan_atomics+0x95/0x310 [ 17.107769] kunit_try_run_case+0x1a5/0x480 [ 17.108018] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.108365] kthread+0x337/0x6f0 [ 17.108505] ret_from_fork+0x116/0x1d0 [ 17.108728] ret_from_fork_asm+0x1a/0x30 [ 17.108985] [ 17.109099] The buggy address belongs to the object at ffff88810392bb00 [ 17.109099] which belongs to the cache kmalloc-64 of size 64 [ 17.109679] The buggy address is located 0 bytes to the right of [ 17.109679] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 17.110297] [ 17.110415] The buggy address belongs to the physical page: [ 17.110622] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 17.111013] flags: 0x200000000000000(node=0|zone=2) [ 17.111215] page_type: f5(slab) [ 17.111357] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.111778] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.112224] page dumped because: kasan: bad access detected [ 17.112546] [ 17.112672] Memory state around the buggy address: [ 17.112867] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.113117] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.113368] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.113611] ^ [ 17.113809] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.114171] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.114529] ================================================================== [ 17.226027] ================================================================== [ 17.226531] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 17.226975] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 17.227420] [ 17.227527] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.227582] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.227598] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.227627] Call Trace: [ 17.227648] <TASK> [ 17.227667] dump_stack_lvl+0x73/0xb0 [ 17.227704] print_report+0xd1/0x650 [ 17.227732] ? __virt_addr_valid+0x1db/0x2d0 [ 17.227762] ? kasan_atomics_helper+0x1467/0x5450 [ 17.227801] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.227829] ? kasan_atomics_helper+0x1467/0x5450 [ 17.227856] kasan_report+0x141/0x180 [ 17.227883] ? kasan_atomics_helper+0x1467/0x5450 [ 17.227916] kasan_check_range+0x10c/0x1c0 [ 17.227947] __kasan_check_write+0x18/0x20 [ 17.228017] kasan_atomics_helper+0x1467/0x5450 [ 17.228068] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.228111] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.228144] ? kasan_atomics+0x152/0x310 [ 17.228176] kasan_atomics+0x1dc/0x310 [ 17.228204] ? __pfx_kasan_atomics+0x10/0x10 [ 17.228234] ? __pfx_read_tsc+0x10/0x10 [ 17.228260] ? ktime_get_ts64+0x86/0x230 [ 17.228327] kunit_try_run_case+0x1a5/0x480 [ 17.228357] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.228384] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.228414] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.228443] ? __kthread_parkme+0x82/0x180 [ 17.228469] ? preempt_count_sub+0x50/0x80 [ 17.228498] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.228527] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.228581] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.228610] kthread+0x337/0x6f0 [ 17.228636] ? trace_preempt_on+0x20/0xc0 [ 17.228666] ? __pfx_kthread+0x10/0x10 [ 17.228691] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.228717] ? calculate_sigpending+0x7b/0xa0 [ 17.228747] ? __pfx_kthread+0x10/0x10 [ 17.228773] ret_from_fork+0x116/0x1d0 [ 17.228808] ? __pfx_kthread+0x10/0x10 [ 17.228833] ret_from_fork_asm+0x1a/0x30 [ 17.228872] </TASK> [ 17.228887] [ 17.238701] Allocated by task 283: [ 17.238981] kasan_save_stack+0x45/0x70 [ 17.239281] kasan_save_track+0x18/0x40 [ 17.239469] kasan_save_alloc_info+0x3b/0x50 [ 17.239672] __kasan_kmalloc+0xb7/0xc0 [ 17.239896] __kmalloc_cache_noprof+0x189/0x420 [ 17.240257] kasan_atomics+0x95/0x310 [ 17.240457] kunit_try_run_case+0x1a5/0x480 [ 17.240624] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.240923] kthread+0x337/0x6f0 [ 17.241218] ret_from_fork+0x116/0x1d0 [ 17.241585] ret_from_fork_asm+0x1a/0x30 [ 17.241749] [ 17.241915] The buggy address belongs to the object at ffff88810392bb00 [ 17.241915] which belongs to the cache kmalloc-64 of size 64 [ 17.242713] The buggy address is located 0 bytes to the right of [ 17.242713] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 17.243380] [ 17.243495] The buggy address belongs to the physical page: [ 17.243846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 17.244310] flags: 0x200000000000000(node=0|zone=2) [ 17.244596] page_type: f5(slab) [ 17.244800] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.245237] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.245615] page dumped because: kasan: bad access detected [ 17.245939] [ 17.246085] Memory state around the buggy address: [ 17.246447] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.246829] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.247215] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.247567] ^ [ 17.247846] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.248272] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.248670] ================================================================== [ 16.315980] ================================================================== [ 16.316616] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 16.317068] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 16.317579] [ 16.317762] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.317919] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.317935] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.317961] Call Trace: [ 16.317979] <TASK> [ 16.317999] dump_stack_lvl+0x73/0xb0 [ 16.318034] print_report+0xd1/0x650 [ 16.318061] ? __virt_addr_valid+0x1db/0x2d0 [ 16.318087] ? kasan_atomics_helper+0x4ba2/0x5450 [ 16.318235] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.318262] ? kasan_atomics_helper+0x4ba2/0x5450 [ 16.318287] kasan_report+0x141/0x180 [ 16.318313] ? kasan_atomics_helper+0x4ba2/0x5450 [ 16.318342] __asan_report_store4_noabort+0x1b/0x30 [ 16.318365] kasan_atomics_helper+0x4ba2/0x5450 [ 16.318389] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.318415] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.318444] ? kasan_atomics+0x152/0x310 [ 16.318473] kasan_atomics+0x1dc/0x310 [ 16.318499] ? __pfx_kasan_atomics+0x10/0x10 [ 16.318526] ? __pfx_read_tsc+0x10/0x10 [ 16.318550] ? ktime_get_ts64+0x86/0x230 [ 16.318578] kunit_try_run_case+0x1a5/0x480 [ 16.318607] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.318631] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.318660] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.318687] ? __kthread_parkme+0x82/0x180 [ 16.318711] ? preempt_count_sub+0x50/0x80 [ 16.318738] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.318765] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.318802] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.318828] kthread+0x337/0x6f0 [ 16.318850] ? trace_preempt_on+0x20/0xc0 [ 16.318876] ? __pfx_kthread+0x10/0x10 [ 16.318900] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.318924] ? calculate_sigpending+0x7b/0xa0 [ 16.318951] ? __pfx_kthread+0x10/0x10 [ 16.318976] ret_from_fork+0x116/0x1d0 [ 16.318998] ? __pfx_kthread+0x10/0x10 [ 16.319021] ret_from_fork_asm+0x1a/0x30 [ 16.319055] </TASK> [ 16.319069] [ 16.334578] Allocated by task 283: [ 16.334979] kasan_save_stack+0x45/0x70 [ 16.335289] kasan_save_track+0x18/0x40 [ 16.335708] kasan_save_alloc_info+0x3b/0x50 [ 16.336021] __kasan_kmalloc+0xb7/0xc0 [ 16.336201] __kmalloc_cache_noprof+0x189/0x420 [ 16.336384] kasan_atomics+0x95/0x310 [ 16.336799] kunit_try_run_case+0x1a5/0x480 [ 16.337353] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.337931] kthread+0x337/0x6f0 [ 16.338324] ret_from_fork+0x116/0x1d0 [ 16.338624] ret_from_fork_asm+0x1a/0x30 [ 16.338804] [ 16.338889] The buggy address belongs to the object at ffff88810392bb00 [ 16.338889] which belongs to the cache kmalloc-64 of size 64 [ 16.339333] The buggy address is located 0 bytes to the right of [ 16.339333] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 16.340042] [ 16.340401] The buggy address belongs to the physical page: [ 16.340706] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 16.341054] flags: 0x200000000000000(node=0|zone=2) [ 16.341371] page_type: f5(slab) [ 16.341571] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.341962] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.342502] page dumped because: kasan: bad access detected [ 16.342749] [ 16.342870] Memory state around the buggy address: [ 16.343117] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.343536] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.343823] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.344160] ^ [ 16.344547] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.344912] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.345386] ================================================================== [ 16.528301] ================================================================== [ 16.528782] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 16.529071] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 16.530851] [ 16.531191] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.531420] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.531444] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.531517] Call Trace: [ 16.531540] <TASK> [ 16.531565] dump_stack_lvl+0x73/0xb0 [ 16.531608] print_report+0xd1/0x650 [ 16.531639] ? __virt_addr_valid+0x1db/0x2d0 [ 16.531669] ? kasan_atomics_helper+0x5fe/0x5450 [ 16.531695] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.531721] ? kasan_atomics_helper+0x5fe/0x5450 [ 16.531748] kasan_report+0x141/0x180 [ 16.531775] ? kasan_atomics_helper+0x5fe/0x5450 [ 16.531819] kasan_check_range+0x10c/0x1c0 [ 16.531849] __kasan_check_write+0x18/0x20 [ 16.531872] kasan_atomics_helper+0x5fe/0x5450 [ 16.531899] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.531926] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.531957] ? kasan_atomics+0x152/0x310 [ 16.531989] kasan_atomics+0x1dc/0x310 [ 16.532017] ? __pfx_kasan_atomics+0x10/0x10 [ 16.532046] ? __pfx_read_tsc+0x10/0x10 [ 16.532080] ? ktime_get_ts64+0x86/0x230 [ 16.532123] kunit_try_run_case+0x1a5/0x480 [ 16.532155] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.532183] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.532212] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.532239] ? __kthread_parkme+0x82/0x180 [ 16.532265] ? preempt_count_sub+0x50/0x80 [ 16.532293] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.532322] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.532349] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.532377] kthread+0x337/0x6f0 [ 16.532401] ? trace_preempt_on+0x20/0xc0 [ 16.532430] ? __pfx_kthread+0x10/0x10 [ 16.532458] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.532485] ? calculate_sigpending+0x7b/0xa0 [ 16.532514] ? __pfx_kthread+0x10/0x10 [ 16.532539] ret_from_fork+0x116/0x1d0 [ 16.532563] ? __pfx_kthread+0x10/0x10 [ 16.532588] ret_from_fork_asm+0x1a/0x30 [ 16.532626] </TASK> [ 16.532641] [ 16.541925] Allocated by task 283: [ 16.542182] kasan_save_stack+0x45/0x70 [ 16.542452] kasan_save_track+0x18/0x40 [ 16.542708] kasan_save_alloc_info+0x3b/0x50 [ 16.542904] __kasan_kmalloc+0xb7/0xc0 [ 16.543056] __kmalloc_cache_noprof+0x189/0x420 [ 16.543232] kasan_atomics+0x95/0x310 [ 16.543690] kunit_try_run_case+0x1a5/0x480 [ 16.543944] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.544445] kthread+0x337/0x6f0 [ 16.544627] ret_from_fork+0x116/0x1d0 [ 16.545010] ret_from_fork_asm+0x1a/0x30 [ 16.545384] [ 16.545496] The buggy address belongs to the object at ffff88810392bb00 [ 16.545496] which belongs to the cache kmalloc-64 of size 64 [ 16.546189] The buggy address is located 0 bytes to the right of [ 16.546189] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 16.546712] [ 16.546811] The buggy address belongs to the physical page: [ 16.547120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 16.547593] flags: 0x200000000000000(node=0|zone=2) [ 16.547918] page_type: f5(slab) [ 16.548166] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.548526] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.548782] page dumped because: kasan: bad access detected [ 16.549128] [ 16.549278] Memory state around the buggy address: [ 16.549575] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.549956] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.550387] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.550742] ^ [ 16.551020] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.551396] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.551635] ================================================================== [ 17.074064] ================================================================== [ 17.074397] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 17.075040] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 17.075468] [ 17.075606] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.075658] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.075675] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.075704] Call Trace: [ 17.075725] <TASK> [ 17.075754] dump_stack_lvl+0x73/0xb0 [ 17.075811] print_report+0xd1/0x650 [ 17.075839] ? __virt_addr_valid+0x1db/0x2d0 [ 17.075868] ? kasan_atomics_helper+0x1217/0x5450 [ 17.075894] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.075922] ? kasan_atomics_helper+0x1217/0x5450 [ 17.075950] kasan_report+0x141/0x180 [ 17.075977] ? kasan_atomics_helper+0x1217/0x5450 [ 17.076009] kasan_check_range+0x10c/0x1c0 [ 17.076038] __kasan_check_write+0x18/0x20 [ 17.076063] kasan_atomics_helper+0x1217/0x5450 [ 17.076104] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.076132] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.076173] ? kasan_atomics+0x152/0x310 [ 17.076205] kasan_atomics+0x1dc/0x310 [ 17.076245] ? __pfx_kasan_atomics+0x10/0x10 [ 17.076274] ? __pfx_read_tsc+0x10/0x10 [ 17.076299] ? ktime_get_ts64+0x86/0x230 [ 17.076330] kunit_try_run_case+0x1a5/0x480 [ 17.076370] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.076396] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.076437] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.076465] ? __kthread_parkme+0x82/0x180 [ 17.076491] ? preempt_count_sub+0x50/0x80 [ 17.076519] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.076557] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.076585] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.076625] kthread+0x337/0x6f0 [ 17.076649] ? trace_preempt_on+0x20/0xc0 [ 17.076678] ? __pfx_kthread+0x10/0x10 [ 17.076703] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.076736] ? calculate_sigpending+0x7b/0xa0 [ 17.076765] ? __pfx_kthread+0x10/0x10 [ 17.076808] ret_from_fork+0x116/0x1d0 [ 17.076832] ? __pfx_kthread+0x10/0x10 [ 17.076857] ret_from_fork_asm+0x1a/0x30 [ 17.076893] </TASK> [ 17.076909] [ 17.085689] Allocated by task 283: [ 17.085914] kasan_save_stack+0x45/0x70 [ 17.086116] kasan_save_track+0x18/0x40 [ 17.086367] kasan_save_alloc_info+0x3b/0x50 [ 17.086578] __kasan_kmalloc+0xb7/0xc0 [ 17.086730] __kmalloc_cache_noprof+0x189/0x420 [ 17.086914] kasan_atomics+0x95/0x310 [ 17.087065] kunit_try_run_case+0x1a5/0x480 [ 17.087230] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.087424] kthread+0x337/0x6f0 [ 17.087625] ret_from_fork+0x116/0x1d0 [ 17.087882] ret_from_fork_asm+0x1a/0x30 [ 17.088106] [ 17.088214] The buggy address belongs to the object at ffff88810392bb00 [ 17.088214] which belongs to the cache kmalloc-64 of size 64 [ 17.088864] The buggy address is located 0 bytes to the right of [ 17.088864] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 17.089493] [ 17.089577] The buggy address belongs to the physical page: [ 17.089772] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 17.090061] flags: 0x200000000000000(node=0|zone=2) [ 17.090345] page_type: f5(slab) [ 17.090576] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.090992] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.091456] page dumped because: kasan: bad access detected [ 17.091752] [ 17.091883] Memory state around the buggy address: [ 17.092164] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.092501] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.092869] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.093327] ^ [ 17.093565] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.093917] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.094323] ================================================================== [ 16.345902] ================================================================== [ 16.346251] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 16.346591] Read of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 16.346970] [ 16.347104] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.347155] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.347170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.347196] Call Trace: [ 16.347216] <TASK> [ 16.347235] dump_stack_lvl+0x73/0xb0 [ 16.347269] print_report+0xd1/0x650 [ 16.347295] ? __virt_addr_valid+0x1db/0x2d0 [ 16.347321] ? kasan_atomics_helper+0x4b88/0x5450 [ 16.347345] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.347370] ? kasan_atomics_helper+0x4b88/0x5450 [ 16.347393] kasan_report+0x141/0x180 [ 16.347419] ? kasan_atomics_helper+0x4b88/0x5450 [ 16.347449] __asan_report_load4_noabort+0x18/0x20 [ 16.347475] kasan_atomics_helper+0x4b88/0x5450 [ 16.347502] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.347526] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.347555] ? kasan_atomics+0x152/0x310 [ 16.347585] kasan_atomics+0x1dc/0x310 [ 16.347611] ? __pfx_kasan_atomics+0x10/0x10 [ 16.347637] ? __pfx_read_tsc+0x10/0x10 [ 16.347662] ? ktime_get_ts64+0x86/0x230 [ 16.347690] kunit_try_run_case+0x1a5/0x480 [ 16.347718] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.347743] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.347770] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.347868] ? __kthread_parkme+0x82/0x180 [ 16.347895] ? preempt_count_sub+0x50/0x80 [ 16.347923] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.347950] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.347977] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.348003] kthread+0x337/0x6f0 [ 16.348025] ? trace_preempt_on+0x20/0xc0 [ 16.348053] ? __pfx_kthread+0x10/0x10 [ 16.348076] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.348111] ? calculate_sigpending+0x7b/0xa0 [ 16.348139] ? __pfx_kthread+0x10/0x10 [ 16.348331] ret_from_fork+0x116/0x1d0 [ 16.348357] ? __pfx_kthread+0x10/0x10 [ 16.348381] ret_from_fork_asm+0x1a/0x30 [ 16.348417] </TASK> [ 16.348431] [ 16.357753] Allocated by task 283: [ 16.357937] kasan_save_stack+0x45/0x70 [ 16.358337] kasan_save_track+0x18/0x40 [ 16.358543] kasan_save_alloc_info+0x3b/0x50 [ 16.358739] __kasan_kmalloc+0xb7/0xc0 [ 16.358909] __kmalloc_cache_noprof+0x189/0x420 [ 16.359126] kasan_atomics+0x95/0x310 [ 16.359342] kunit_try_run_case+0x1a5/0x480 [ 16.359582] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.359856] kthread+0x337/0x6f0 [ 16.359998] ret_from_fork+0x116/0x1d0 [ 16.360154] ret_from_fork_asm+0x1a/0x30 [ 16.360390] [ 16.360508] The buggy address belongs to the object at ffff88810392bb00 [ 16.360508] which belongs to the cache kmalloc-64 of size 64 [ 16.361135] The buggy address is located 0 bytes to the right of [ 16.361135] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 16.361865] [ 16.361950] The buggy address belongs to the physical page: [ 16.362150] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 16.362424] flags: 0x200000000000000(node=0|zone=2) [ 16.363057] page_type: f5(slab) [ 16.363275] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.363630] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.364238] page dumped because: kasan: bad access detected [ 16.364508] [ 16.364592] Memory state around the buggy address: [ 16.364777] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.365229] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.365613] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.366005] ^ [ 16.366456] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.366830] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.367109] ================================================================== [ 17.148065] ================================================================== [ 17.149169] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 17.149607] Read of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 17.149943] [ 17.150060] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.150117] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.150134] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.150165] Call Trace: [ 17.150189] <TASK> [ 17.150213] dump_stack_lvl+0x73/0xb0 [ 17.150251] print_report+0xd1/0x650 [ 17.150279] ? __virt_addr_valid+0x1db/0x2d0 [ 17.150307] ? kasan_atomics_helper+0x49ce/0x5450 [ 17.150333] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.150360] ? kasan_atomics_helper+0x49ce/0x5450 [ 17.150388] kasan_report+0x141/0x180 [ 17.150417] ? kasan_atomics_helper+0x49ce/0x5450 [ 17.150449] __asan_report_load4_noabort+0x18/0x20 [ 17.150480] kasan_atomics_helper+0x49ce/0x5450 [ 17.150507] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.150533] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.150564] ? kasan_atomics+0x152/0x310 [ 17.150596] kasan_atomics+0x1dc/0x310 [ 17.150624] ? __pfx_kasan_atomics+0x10/0x10 [ 17.150652] ? __pfx_read_tsc+0x10/0x10 [ 17.150679] ? ktime_get_ts64+0x86/0x230 [ 17.150708] kunit_try_run_case+0x1a5/0x480 [ 17.150738] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.150765] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.150808] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.150836] ? __kthread_parkme+0x82/0x180 [ 17.150861] ? preempt_count_sub+0x50/0x80 [ 17.150891] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.150920] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.150948] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.150975] kthread+0x337/0x6f0 [ 17.150999] ? trace_preempt_on+0x20/0xc0 [ 17.151028] ? __pfx_kthread+0x10/0x10 [ 17.151055] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.151082] ? calculate_sigpending+0x7b/0xa0 [ 17.151125] ? __pfx_kthread+0x10/0x10 [ 17.151151] ret_from_fork+0x116/0x1d0 [ 17.151175] ? __pfx_kthread+0x10/0x10 [ 17.151199] ret_from_fork_asm+0x1a/0x30 [ 17.151236] </TASK> [ 17.151253] [ 17.160690] Allocated by task 283: [ 17.160857] kasan_save_stack+0x45/0x70 [ 17.161025] kasan_save_track+0x18/0x40 [ 17.161182] kasan_save_alloc_info+0x3b/0x50 [ 17.161467] __kasan_kmalloc+0xb7/0xc0 [ 17.161683] __kmalloc_cache_noprof+0x189/0x420 [ 17.162195] kasan_atomics+0x95/0x310 [ 17.162428] kunit_try_run_case+0x1a5/0x480 [ 17.162663] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.162911] kthread+0x337/0x6f0 [ 17.163651] ret_from_fork+0x116/0x1d0 [ 17.163982] ret_from_fork_asm+0x1a/0x30 [ 17.164385] [ 17.164504] The buggy address belongs to the object at ffff88810392bb00 [ 17.164504] which belongs to the cache kmalloc-64 of size 64 [ 17.164970] The buggy address is located 0 bytes to the right of [ 17.164970] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 17.165608] [ 17.165710] The buggy address belongs to the physical page: [ 17.166025] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 17.166568] flags: 0x200000000000000(node=0|zone=2) [ 17.166815] page_type: f5(slab) [ 17.167006] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.167316] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.167854] page dumped because: kasan: bad access detected [ 17.168060] [ 17.168156] Memory state around the buggy address: [ 17.168422] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.168779] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.169038] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.170929] ^ [ 17.171167] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.171431] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.171684] ================================================================== [ 16.479634] ================================================================== [ 16.480031] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 16.480412] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 16.480816] [ 16.480925] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.480976] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.480993] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.481021] Call Trace: [ 16.481042] <TASK> [ 16.481062] dump_stack_lvl+0x73/0xb0 [ 16.481097] print_report+0xd1/0x650 [ 16.481141] ? __virt_addr_valid+0x1db/0x2d0 [ 16.481170] ? kasan_atomics_helper+0x4b3a/0x5450 [ 16.481196] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.481225] ? kasan_atomics_helper+0x4b3a/0x5450 [ 16.481252] kasan_report+0x141/0x180 [ 16.481279] ? kasan_atomics_helper+0x4b3a/0x5450 [ 16.481348] __asan_report_store4_noabort+0x1b/0x30 [ 16.481377] kasan_atomics_helper+0x4b3a/0x5450 [ 16.481422] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.481466] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.481513] ? kasan_atomics+0x152/0x310 [ 16.481560] kasan_atomics+0x1dc/0x310 [ 16.481602] ? __pfx_kasan_atomics+0x10/0x10 [ 16.481647] ? __pfx_read_tsc+0x10/0x10 [ 16.481687] ? ktime_get_ts64+0x86/0x230 [ 16.481732] kunit_try_run_case+0x1a5/0x480 [ 16.481770] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.481808] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.481838] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.481865] ? __kthread_parkme+0x82/0x180 [ 16.481890] ? preempt_count_sub+0x50/0x80 [ 16.481919] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.481947] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.481974] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.482002] kthread+0x337/0x6f0 [ 16.482025] ? trace_preempt_on+0x20/0xc0 [ 16.482054] ? __pfx_kthread+0x10/0x10 [ 16.482078] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.482104] ? calculate_sigpending+0x7b/0xa0 [ 16.482133] ? __pfx_kthread+0x10/0x10 [ 16.482159] ret_from_fork+0x116/0x1d0 [ 16.482181] ? __pfx_kthread+0x10/0x10 [ 16.482206] ret_from_fork_asm+0x1a/0x30 [ 16.482242] </TASK> [ 16.482258] [ 16.491669] Allocated by task 283: [ 16.491943] kasan_save_stack+0x45/0x70 [ 16.492126] kasan_save_track+0x18/0x40 [ 16.492281] kasan_save_alloc_info+0x3b/0x50 [ 16.492674] __kasan_kmalloc+0xb7/0xc0 [ 16.493095] __kmalloc_cache_noprof+0x189/0x420 [ 16.493346] kasan_atomics+0x95/0x310 [ 16.494177] kunit_try_run_case+0x1a5/0x480 [ 16.494450] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.494647] kthread+0x337/0x6f0 [ 16.494863] ret_from_fork+0x116/0x1d0 [ 16.495023] ret_from_fork_asm+0x1a/0x30 [ 16.495237] [ 16.495879] The buggy address belongs to the object at ffff88810392bb00 [ 16.495879] which belongs to the cache kmalloc-64 of size 64 [ 16.496492] The buggy address is located 0 bytes to the right of [ 16.496492] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 16.497188] [ 16.497300] The buggy address belongs to the physical page: [ 16.497596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 16.497992] flags: 0x200000000000000(node=0|zone=2) [ 16.498408] page_type: f5(slab) [ 16.498550] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.498818] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.499342] page dumped because: kasan: bad access detected [ 16.499759] [ 16.499860] Memory state around the buggy address: [ 16.500154] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.500709] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.501090] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.501510] ^ [ 16.501770] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.502194] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.502542] ================================================================== [ 17.614506] ================================================================== [ 17.614845] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 17.615166] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 17.615830] [ 17.616044] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.616095] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.616112] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.616139] Call Trace: [ 17.616159] <TASK> [ 17.616179] dump_stack_lvl+0x73/0xb0 [ 17.616216] print_report+0xd1/0x650 [ 17.616243] ? __virt_addr_valid+0x1db/0x2d0 [ 17.616271] ? kasan_atomics_helper+0x1d7a/0x5450 [ 17.616297] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.616324] ? kasan_atomics_helper+0x1d7a/0x5450 [ 17.616351] kasan_report+0x141/0x180 [ 17.616378] ? kasan_atomics_helper+0x1d7a/0x5450 [ 17.616410] kasan_check_range+0x10c/0x1c0 [ 17.616439] __kasan_check_write+0x18/0x20 [ 17.616463] kasan_atomics_helper+0x1d7a/0x5450 [ 17.616491] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.616519] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.616550] ? kasan_atomics+0x152/0x310 [ 17.616582] kasan_atomics+0x1dc/0x310 [ 17.616609] ? __pfx_kasan_atomics+0x10/0x10 [ 17.616660] ? __pfx_read_tsc+0x10/0x10 [ 17.616686] ? ktime_get_ts64+0x86/0x230 [ 17.616716] kunit_try_run_case+0x1a5/0x480 [ 17.616746] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.616796] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.616835] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.616876] ? __kthread_parkme+0x82/0x180 [ 17.616904] ? preempt_count_sub+0x50/0x80 [ 17.616933] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.616961] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.616989] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.617017] kthread+0x337/0x6f0 [ 17.617041] ? trace_preempt_on+0x20/0xc0 [ 17.617071] ? __pfx_kthread+0x10/0x10 [ 17.617102] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.617129] ? calculate_sigpending+0x7b/0xa0 [ 17.617157] ? __pfx_kthread+0x10/0x10 [ 17.617195] ret_from_fork+0x116/0x1d0 [ 17.617218] ? __pfx_kthread+0x10/0x10 [ 17.617242] ret_from_fork_asm+0x1a/0x30 [ 17.617292] </TASK> [ 17.617307] [ 17.627037] Allocated by task 283: [ 17.627328] kasan_save_stack+0x45/0x70 [ 17.627563] kasan_save_track+0x18/0x40 [ 17.627781] kasan_save_alloc_info+0x3b/0x50 [ 17.628047] __kasan_kmalloc+0xb7/0xc0 [ 17.628206] __kmalloc_cache_noprof+0x189/0x420 [ 17.628390] kasan_atomics+0x95/0x310 [ 17.628549] kunit_try_run_case+0x1a5/0x480 [ 17.628722] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.629247] kthread+0x337/0x6f0 [ 17.629492] ret_from_fork+0x116/0x1d0 [ 17.629712] ret_from_fork_asm+0x1a/0x30 [ 17.629950] [ 17.630058] The buggy address belongs to the object at ffff88810392bb00 [ 17.630058] which belongs to the cache kmalloc-64 of size 64 [ 17.630466] The buggy address is located 0 bytes to the right of [ 17.630466] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 17.630901] [ 17.631130] The buggy address belongs to the physical page: [ 17.631484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 17.631924] flags: 0x200000000000000(node=0|zone=2) [ 17.632210] page_type: f5(slab) [ 17.632414] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.632976] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.633474] page dumped because: kasan: bad access detected [ 17.633818] [ 17.633999] Memory state around the buggy address: [ 17.634281] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.634594] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.634944] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.635535] ^ [ 17.635813] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.636444] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.636953] ================================================================== [ 16.774719] ================================================================== [ 16.775708] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 16.776112] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 16.776377] [ 16.776588] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.776643] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.776660] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.776688] Call Trace: [ 16.776711] <TASK> [ 16.776734] dump_stack_lvl+0x73/0xb0 [ 16.776771] print_report+0xd1/0x650 [ 16.776814] ? __virt_addr_valid+0x1db/0x2d0 [ 16.776843] ? kasan_atomics_helper+0xc70/0x5450 [ 16.776870] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.776898] ? kasan_atomics_helper+0xc70/0x5450 [ 16.776924] kasan_report+0x141/0x180 [ 16.776951] ? kasan_atomics_helper+0xc70/0x5450 [ 16.776983] kasan_check_range+0x10c/0x1c0 [ 16.777011] __kasan_check_write+0x18/0x20 [ 16.777035] kasan_atomics_helper+0xc70/0x5450 [ 16.777062] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.777100] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.777131] ? kasan_atomics+0x152/0x310 [ 16.777164] kasan_atomics+0x1dc/0x310 [ 16.777191] ? __pfx_kasan_atomics+0x10/0x10 [ 16.777219] ? __pfx_read_tsc+0x10/0x10 [ 16.777245] ? ktime_get_ts64+0x86/0x230 [ 16.777274] kunit_try_run_case+0x1a5/0x480 [ 16.777304] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.777330] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.777365] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.777393] ? __kthread_parkme+0x82/0x180 [ 16.777417] ? preempt_count_sub+0x50/0x80 [ 16.777447] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.777474] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.777501] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.777528] kthread+0x337/0x6f0 [ 16.777552] ? trace_preempt_on+0x20/0xc0 [ 16.777581] ? __pfx_kthread+0x10/0x10 [ 16.777606] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.777631] ? calculate_sigpending+0x7b/0xa0 [ 16.777660] ? __pfx_kthread+0x10/0x10 [ 16.777685] ret_from_fork+0x116/0x1d0 [ 16.777708] ? __pfx_kthread+0x10/0x10 [ 16.777732] ret_from_fork_asm+0x1a/0x30 [ 16.777769] </TASK> [ 16.777784] [ 16.786452] Allocated by task 283: [ 16.786613] kasan_save_stack+0x45/0x70 [ 16.786838] kasan_save_track+0x18/0x40 [ 16.787062] kasan_save_alloc_info+0x3b/0x50 [ 16.787324] __kasan_kmalloc+0xb7/0xc0 [ 16.787543] __kmalloc_cache_noprof+0x189/0x420 [ 16.787817] kasan_atomics+0x95/0x310 [ 16.788016] kunit_try_run_case+0x1a5/0x480 [ 16.788253] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.788517] kthread+0x337/0x6f0 [ 16.788714] ret_from_fork+0x116/0x1d0 [ 16.788893] ret_from_fork_asm+0x1a/0x30 [ 16.789159] [ 16.789259] The buggy address belongs to the object at ffff88810392bb00 [ 16.789259] which belongs to the cache kmalloc-64 of size 64 [ 16.789667] The buggy address is located 0 bytes to the right of [ 16.789667] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 16.790099] [ 16.790188] The buggy address belongs to the physical page: [ 16.790451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 16.790881] flags: 0x200000000000000(node=0|zone=2) [ 16.791210] page_type: f5(slab) [ 16.791404] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.791822] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.792101] page dumped because: kasan: bad access detected [ 16.792392] [ 16.792504] Memory state around the buggy address: [ 16.792764] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.793140] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.793409] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.793663] ^ [ 16.793910] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.794509] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.794882] ================================================================== [ 17.799725] ================================================================== [ 17.800245] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 17.801233] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 17.801640] [ 17.801782] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.801852] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.801868] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.801897] Call Trace: [ 17.801920] <TASK> [ 17.801943] dump_stack_lvl+0x73/0xb0 [ 17.801980] print_report+0xd1/0x650 [ 17.802009] ? __virt_addr_valid+0x1db/0x2d0 [ 17.802036] ? kasan_atomics_helper+0x20c8/0x5450 [ 17.802062] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.802089] ? kasan_atomics_helper+0x20c8/0x5450 [ 17.802115] kasan_report+0x141/0x180 [ 17.802142] ? kasan_atomics_helper+0x20c8/0x5450 [ 17.802174] kasan_check_range+0x10c/0x1c0 [ 17.802204] __kasan_check_write+0x18/0x20 [ 17.802229] kasan_atomics_helper+0x20c8/0x5450 [ 17.802256] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.802283] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.802313] ? kasan_atomics+0x152/0x310 [ 17.802346] kasan_atomics+0x1dc/0x310 [ 17.802373] ? __pfx_kasan_atomics+0x10/0x10 [ 17.802404] ? __pfx_read_tsc+0x10/0x10 [ 17.802433] ? ktime_get_ts64+0x86/0x230 [ 17.802464] kunit_try_run_case+0x1a5/0x480 [ 17.802493] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.802521] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.802552] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.802581] ? __kthread_parkme+0x82/0x180 [ 17.802607] ? preempt_count_sub+0x50/0x80 [ 17.802638] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.802667] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.802697] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.802724] kthread+0x337/0x6f0 [ 17.802748] ? trace_preempt_on+0x20/0xc0 [ 17.802776] ? __pfx_kthread+0x10/0x10 [ 17.802969] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.803000] ? calculate_sigpending+0x7b/0xa0 [ 17.803030] ? __pfx_kthread+0x10/0x10 [ 17.803056] ret_from_fork+0x116/0x1d0 [ 17.803081] ? __pfx_kthread+0x10/0x10 [ 17.803107] ret_from_fork_asm+0x1a/0x30 [ 17.803145] </TASK> [ 17.803160] [ 17.812021] Allocated by task 283: [ 17.812179] kasan_save_stack+0x45/0x70 [ 17.812346] kasan_save_track+0x18/0x40 [ 17.812495] kasan_save_alloc_info+0x3b/0x50 [ 17.812658] __kasan_kmalloc+0xb7/0xc0 [ 17.812833] __kmalloc_cache_noprof+0x189/0x420 [ 17.814022] kasan_atomics+0x95/0x310 [ 17.814445] kunit_try_run_case+0x1a5/0x480 [ 17.814779] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.815114] kthread+0x337/0x6f0 [ 17.815318] ret_from_fork+0x116/0x1d0 [ 17.815540] ret_from_fork_asm+0x1a/0x30 [ 17.815877] [ 17.815995] The buggy address belongs to the object at ffff88810392bb00 [ 17.815995] which belongs to the cache kmalloc-64 of size 64 [ 17.816537] The buggy address is located 0 bytes to the right of [ 17.816537] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 17.817079] [ 17.817620] The buggy address belongs to the physical page: [ 17.818194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 17.818989] flags: 0x200000000000000(node=0|zone=2) [ 17.819245] page_type: f5(slab) [ 17.819430] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.819735] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.820736] page dumped because: kasan: bad access detected [ 17.821015] [ 17.821218] Memory state around the buggy address: [ 17.821591] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.821951] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.822439] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.822846] ^ [ 17.823134] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.823651] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.824007] ================================================================== [ 16.991219] ================================================================== [ 16.991558] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 16.991933] Read of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 16.992346] [ 16.992475] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.992524] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.992540] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.992566] Call Trace: [ 16.992584] <TASK> [ 16.992603] dump_stack_lvl+0x73/0xb0 [ 16.992637] print_report+0xd1/0x650 [ 16.992665] ? __virt_addr_valid+0x1db/0x2d0 [ 16.992693] ? kasan_atomics_helper+0x4a1c/0x5450 [ 16.992718] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.992745] ? kasan_atomics_helper+0x4a1c/0x5450 [ 16.992771] kasan_report+0x141/0x180 [ 16.992811] ? kasan_atomics_helper+0x4a1c/0x5450 [ 16.992844] __asan_report_load4_noabort+0x18/0x20 [ 16.992873] kasan_atomics_helper+0x4a1c/0x5450 [ 16.992900] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.992927] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.992957] ? kasan_atomics+0x152/0x310 [ 16.992991] kasan_atomics+0x1dc/0x310 [ 16.993018] ? __pfx_kasan_atomics+0x10/0x10 [ 16.993047] ? __pfx_read_tsc+0x10/0x10 [ 16.993073] ? ktime_get_ts64+0x86/0x230 [ 16.993102] kunit_try_run_case+0x1a5/0x480 [ 16.993131] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.993157] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.993185] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.993229] ? __kthread_parkme+0x82/0x180 [ 16.993254] ? preempt_count_sub+0x50/0x80 [ 16.993282] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.993311] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.993343] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.993373] kthread+0x337/0x6f0 [ 16.993399] ? trace_preempt_on+0x20/0xc0 [ 16.993428] ? __pfx_kthread+0x10/0x10 [ 16.993453] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.993479] ? calculate_sigpending+0x7b/0xa0 [ 16.993508] ? __pfx_kthread+0x10/0x10 [ 16.993535] ret_from_fork+0x116/0x1d0 [ 16.993558] ? __pfx_kthread+0x10/0x10 [ 16.993583] ret_from_fork_asm+0x1a/0x30 [ 16.993620] </TASK> [ 16.993636] [ 17.006186] Allocated by task 283: [ 17.006673] kasan_save_stack+0x45/0x70 [ 17.007150] kasan_save_track+0x18/0x40 [ 17.007626] kasan_save_alloc_info+0x3b/0x50 [ 17.008071] __kasan_kmalloc+0xb7/0xc0 [ 17.008308] __kmalloc_cache_noprof+0x189/0x420 [ 17.008496] kasan_atomics+0x95/0x310 [ 17.008657] kunit_try_run_case+0x1a5/0x480 [ 17.008871] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.009479] kthread+0x337/0x6f0 [ 17.009868] ret_from_fork+0x116/0x1d0 [ 17.010327] ret_from_fork_asm+0x1a/0x30 [ 17.010756] [ 17.010962] The buggy address belongs to the object at ffff88810392bb00 [ 17.010962] which belongs to the cache kmalloc-64 of size 64 [ 17.012399] The buggy address is located 0 bytes to the right of [ 17.012399] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 17.013721] [ 17.013823] The buggy address belongs to the physical page: [ 17.014025] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 17.014675] flags: 0x200000000000000(node=0|zone=2) [ 17.015268] page_type: f5(slab) [ 17.015687] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.016528] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.017343] page dumped because: kasan: bad access detected [ 17.018018] [ 17.018207] Memory state around the buggy address: [ 17.018681] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.019082] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.019828] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.020448] ^ [ 17.020645] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.020920] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.021191] ================================================================== [ 17.825146] ================================================================== [ 17.825779] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 17.826315] Read of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 17.826596] [ 17.826740] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.826807] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.826824] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.826854] Call Trace: [ 17.826876] <TASK> [ 17.826895] dump_stack_lvl+0x73/0xb0 [ 17.826931] print_report+0xd1/0x650 [ 17.826960] ? __virt_addr_valid+0x1db/0x2d0 [ 17.826990] ? kasan_atomics_helper+0x4fb2/0x5450 [ 17.827016] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.827043] ? kasan_atomics_helper+0x4fb2/0x5450 [ 17.827070] kasan_report+0x141/0x180 [ 17.827098] ? kasan_atomics_helper+0x4fb2/0x5450 [ 17.827130] __asan_report_load8_noabort+0x18/0x20 [ 17.827158] kasan_atomics_helper+0x4fb2/0x5450 [ 17.827186] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.827212] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.827243] ? kasan_atomics+0x152/0x310 [ 17.827276] kasan_atomics+0x1dc/0x310 [ 17.827303] ? __pfx_kasan_atomics+0x10/0x10 [ 17.827332] ? __pfx_read_tsc+0x10/0x10 [ 17.827360] ? ktime_get_ts64+0x86/0x230 [ 17.827389] kunit_try_run_case+0x1a5/0x480 [ 17.827418] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.827446] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.827475] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.827503] ? __kthread_parkme+0x82/0x180 [ 17.827529] ? preempt_count_sub+0x50/0x80 [ 17.827559] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.827587] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.827615] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.827645] kthread+0x337/0x6f0 [ 17.827669] ? trace_preempt_on+0x20/0xc0 [ 17.827698] ? __pfx_kthread+0x10/0x10 [ 17.827724] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.827751] ? calculate_sigpending+0x7b/0xa0 [ 17.827780] ? __pfx_kthread+0x10/0x10 [ 17.827818] ret_from_fork+0x116/0x1d0 [ 17.827842] ? __pfx_kthread+0x10/0x10 [ 17.827868] ret_from_fork_asm+0x1a/0x30 [ 17.827905] </TASK> [ 17.827921] [ 17.836569] Allocated by task 283: [ 17.836757] kasan_save_stack+0x45/0x70 [ 17.836939] kasan_save_track+0x18/0x40 [ 17.837107] kasan_save_alloc_info+0x3b/0x50 [ 17.837371] __kasan_kmalloc+0xb7/0xc0 [ 17.837606] __kmalloc_cache_noprof+0x189/0x420 [ 17.837875] kasan_atomics+0x95/0x310 [ 17.838098] kunit_try_run_case+0x1a5/0x480 [ 17.838329] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.838569] kthread+0x337/0x6f0 [ 17.838750] ret_from_fork+0x116/0x1d0 [ 17.838989] ret_from_fork_asm+0x1a/0x30 [ 17.839217] [ 17.839334] The buggy address belongs to the object at ffff88810392bb00 [ 17.839334] which belongs to the cache kmalloc-64 of size 64 [ 17.839859] The buggy address is located 0 bytes to the right of [ 17.839859] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 17.840479] [ 17.840582] The buggy address belongs to the physical page: [ 17.840839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 17.841124] flags: 0x200000000000000(node=0|zone=2) [ 17.841319] page_type: f5(slab) [ 17.841468] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.841843] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.842286] page dumped because: kasan: bad access detected [ 17.842578] [ 17.842669] Memory state around the buggy address: [ 17.842863] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.843157] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.843530] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.843914] ^ [ 17.844195] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.844512] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.844816] ================================================================== [ 17.592611] ================================================================== [ 17.592996] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 17.594203] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 17.594583] [ 17.594719] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.594774] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.594801] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.594828] Call Trace: [ 17.594850] <TASK> [ 17.594872] dump_stack_lvl+0x73/0xb0 [ 17.594910] print_report+0xd1/0x650 [ 17.594938] ? __virt_addr_valid+0x1db/0x2d0 [ 17.594966] ? kasan_atomics_helper+0x1ce1/0x5450 [ 17.594992] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.595032] ? kasan_atomics_helper+0x1ce1/0x5450 [ 17.595060] kasan_report+0x141/0x180 [ 17.595111] ? kasan_atomics_helper+0x1ce1/0x5450 [ 17.595145] kasan_check_range+0x10c/0x1c0 [ 17.595174] __kasan_check_write+0x18/0x20 [ 17.595198] kasan_atomics_helper+0x1ce1/0x5450 [ 17.595226] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.595252] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.595283] ? kasan_atomics+0x152/0x310 [ 17.595314] kasan_atomics+0x1dc/0x310 [ 17.595342] ? __pfx_kasan_atomics+0x10/0x10 [ 17.595371] ? __pfx_read_tsc+0x10/0x10 [ 17.595397] ? ktime_get_ts64+0x86/0x230 [ 17.595429] kunit_try_run_case+0x1a5/0x480 [ 17.595460] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.595487] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.595517] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.595545] ? __kthread_parkme+0x82/0x180 [ 17.595570] ? preempt_count_sub+0x50/0x80 [ 17.595598] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.595627] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.595655] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.595684] kthread+0x337/0x6f0 [ 17.595708] ? trace_preempt_on+0x20/0xc0 [ 17.595737] ? __pfx_kthread+0x10/0x10 [ 17.595762] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.595799] ? calculate_sigpending+0x7b/0xa0 [ 17.595829] ? __pfx_kthread+0x10/0x10 [ 17.595856] ret_from_fork+0x116/0x1d0 [ 17.595881] ? __pfx_kthread+0x10/0x10 [ 17.595909] ret_from_fork_asm+0x1a/0x30 [ 17.595946] </TASK> [ 17.595963] [ 17.604882] Allocated by task 283: [ 17.605062] kasan_save_stack+0x45/0x70 [ 17.605321] kasan_save_track+0x18/0x40 [ 17.605538] kasan_save_alloc_info+0x3b/0x50 [ 17.605808] __kasan_kmalloc+0xb7/0xc0 [ 17.606013] __kmalloc_cache_noprof+0x189/0x420 [ 17.606345] kasan_atomics+0x95/0x310 [ 17.606543] kunit_try_run_case+0x1a5/0x480 [ 17.606806] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.607080] kthread+0x337/0x6f0 [ 17.607281] ret_from_fork+0x116/0x1d0 [ 17.607492] ret_from_fork_asm+0x1a/0x30 [ 17.607711] [ 17.607814] The buggy address belongs to the object at ffff88810392bb00 [ 17.607814] which belongs to the cache kmalloc-64 of size 64 [ 17.608217] The buggy address is located 0 bytes to the right of [ 17.608217] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 17.608768] [ 17.608944] The buggy address belongs to the physical page: [ 17.609379] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 17.609655] flags: 0x200000000000000(node=0|zone=2) [ 17.609884] page_type: f5(slab) [ 17.610081] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.610502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.610913] page dumped because: kasan: bad access detected [ 17.611237] [ 17.611320] Memory state around the buggy address: [ 17.611499] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.611839] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.612426] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.612772] ^ [ 17.613006] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.613394] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.613758] ================================================================== [ 17.364538] ================================================================== [ 17.364964] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 17.365395] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 17.365777] [ 17.365952] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.366039] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.366056] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.366106] Call Trace: [ 17.366125] <TASK> [ 17.366146] dump_stack_lvl+0x73/0xb0 [ 17.366184] print_report+0xd1/0x650 [ 17.366211] ? __virt_addr_valid+0x1db/0x2d0 [ 17.366239] ? kasan_atomics_helper+0x177f/0x5450 [ 17.366263] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.366290] ? kasan_atomics_helper+0x177f/0x5450 [ 17.366317] kasan_report+0x141/0x180 [ 17.366343] ? kasan_atomics_helper+0x177f/0x5450 [ 17.366374] kasan_check_range+0x10c/0x1c0 [ 17.366403] __kasan_check_write+0x18/0x20 [ 17.366425] kasan_atomics_helper+0x177f/0x5450 [ 17.366452] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.366479] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.366509] ? kasan_atomics+0x152/0x310 [ 17.366539] kasan_atomics+0x1dc/0x310 [ 17.366566] ? __pfx_kasan_atomics+0x10/0x10 [ 17.366595] ? __pfx_read_tsc+0x10/0x10 [ 17.366620] ? ktime_get_ts64+0x86/0x230 [ 17.366648] kunit_try_run_case+0x1a5/0x480 [ 17.366677] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.366704] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.366758] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.366795] ? __kthread_parkme+0x82/0x180 [ 17.366821] ? preempt_count_sub+0x50/0x80 [ 17.366849] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.366876] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.366903] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.366930] kthread+0x337/0x6f0 [ 17.366954] ? trace_preempt_on+0x20/0xc0 [ 17.366983] ? __pfx_kthread+0x10/0x10 [ 17.367008] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.367033] ? calculate_sigpending+0x7b/0xa0 [ 17.367062] ? __pfx_kthread+0x10/0x10 [ 17.367110] ret_from_fork+0x116/0x1d0 [ 17.367133] ? __pfx_kthread+0x10/0x10 [ 17.367158] ret_from_fork_asm+0x1a/0x30 [ 17.367195] </TASK> [ 17.367210] [ 17.375890] Allocated by task 283: [ 17.376118] kasan_save_stack+0x45/0x70 [ 17.376288] kasan_save_track+0x18/0x40 [ 17.376533] kasan_save_alloc_info+0x3b/0x50 [ 17.376776] __kasan_kmalloc+0xb7/0xc0 [ 17.376996] __kmalloc_cache_noprof+0x189/0x420 [ 17.377249] kasan_atomics+0x95/0x310 [ 17.377477] kunit_try_run_case+0x1a5/0x480 [ 17.377721] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.378019] kthread+0x337/0x6f0 [ 17.378264] ret_from_fork+0x116/0x1d0 [ 17.378455] ret_from_fork_asm+0x1a/0x30 [ 17.378621] [ 17.378710] The buggy address belongs to the object at ffff88810392bb00 [ 17.378710] which belongs to the cache kmalloc-64 of size 64 [ 17.379290] The buggy address is located 0 bytes to the right of [ 17.379290] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 17.379935] [ 17.380050] The buggy address belongs to the physical page: [ 17.380343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 17.380629] flags: 0x200000000000000(node=0|zone=2) [ 17.380918] page_type: f5(slab) [ 17.381179] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.381591] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.381965] page dumped because: kasan: bad access detected [ 17.382229] [ 17.382342] Memory state around the buggy address: [ 17.382610] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.382959] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.383366] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.383715] ^ [ 17.383976] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.384281] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.384615] ================================================================== [ 16.287936] ================================================================== [ 16.288845] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 16.289670] Read of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 16.290425] [ 16.290609] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.290667] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.290684] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.290711] Call Trace: [ 16.290726] <TASK> [ 16.290748] dump_stack_lvl+0x73/0xb0 [ 16.290802] print_report+0xd1/0x650 [ 16.290829] ? __virt_addr_valid+0x1db/0x2d0 [ 16.290895] ? kasan_atomics_helper+0x4bbc/0x5450 [ 16.290920] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.290958] ? kasan_atomics_helper+0x4bbc/0x5450 [ 16.290984] kasan_report+0x141/0x180 [ 16.291009] ? kasan_atomics_helper+0x4bbc/0x5450 [ 16.291039] __asan_report_load4_noabort+0x18/0x20 [ 16.291065] kasan_atomics_helper+0x4bbc/0x5450 [ 16.291113] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.291205] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.291240] ? kasan_atomics+0x152/0x310 [ 16.291270] kasan_atomics+0x1dc/0x310 [ 16.291297] ? __pfx_kasan_atomics+0x10/0x10 [ 16.291326] ? __pfx_read_tsc+0x10/0x10 [ 16.291351] ? ktime_get_ts64+0x86/0x230 [ 16.291380] kunit_try_run_case+0x1a5/0x480 [ 16.291410] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.291435] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.291465] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.291491] ? __kthread_parkme+0x82/0x180 [ 16.291515] ? preempt_count_sub+0x50/0x80 [ 16.291542] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.291569] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.291594] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.291621] kthread+0x337/0x6f0 [ 16.291642] ? trace_preempt_on+0x20/0xc0 [ 16.291669] ? __pfx_kthread+0x10/0x10 [ 16.291692] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.291716] ? calculate_sigpending+0x7b/0xa0 [ 16.291745] ? __pfx_kthread+0x10/0x10 [ 16.291769] ret_from_fork+0x116/0x1d0 [ 16.291803] ? __pfx_kthread+0x10/0x10 [ 16.291827] ret_from_fork_asm+0x1a/0x30 [ 16.291864] </TASK> [ 16.291878] [ 16.302971] Allocated by task 283: [ 16.303471] kasan_save_stack+0x45/0x70 [ 16.303710] kasan_save_track+0x18/0x40 [ 16.304001] kasan_save_alloc_info+0x3b/0x50 [ 16.304195] __kasan_kmalloc+0xb7/0xc0 [ 16.304731] __kmalloc_cache_noprof+0x189/0x420 [ 16.304989] kasan_atomics+0x95/0x310 [ 16.305347] kunit_try_run_case+0x1a5/0x480 [ 16.305552] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.305810] kthread+0x337/0x6f0 [ 16.306006] ret_from_fork+0x116/0x1d0 [ 16.306459] ret_from_fork_asm+0x1a/0x30 [ 16.306740] [ 16.306847] The buggy address belongs to the object at ffff88810392bb00 [ 16.306847] which belongs to the cache kmalloc-64 of size 64 [ 16.307755] The buggy address is located 0 bytes to the right of [ 16.307755] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 16.308578] [ 16.308703] The buggy address belongs to the physical page: [ 16.309011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 16.309540] flags: 0x200000000000000(node=0|zone=2) [ 16.309894] page_type: f5(slab) [ 16.310103] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.310611] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.311023] page dumped because: kasan: bad access detected [ 16.311510] [ 16.311632] Memory state around the buggy address: [ 16.311995] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.312391] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.313007] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.313560] ^ [ 16.313840] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.314379] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.314706] ================================================================== [ 17.913940] ================================================================== [ 17.914677] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 17.915005] Read of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 17.915509] [ 17.915635] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.915686] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.915702] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.915730] Call Trace: [ 17.915751] <TASK> [ 17.915772] dump_stack_lvl+0x73/0xb0 [ 17.915821] print_report+0xd1/0x650 [ 17.915848] ? __virt_addr_valid+0x1db/0x2d0 [ 17.915875] ? kasan_atomics_helper+0x5115/0x5450 [ 17.915902] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.915927] ? kasan_atomics_helper+0x5115/0x5450 [ 17.915953] kasan_report+0x141/0x180 [ 17.915981] ? kasan_atomics_helper+0x5115/0x5450 [ 17.916013] __asan_report_load8_noabort+0x18/0x20 [ 17.916042] kasan_atomics_helper+0x5115/0x5450 [ 17.916070] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.916096] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.916130] ? kasan_atomics+0x152/0x310 [ 17.916163] kasan_atomics+0x1dc/0x310 [ 17.916190] ? __pfx_kasan_atomics+0x10/0x10 [ 17.916219] ? __pfx_read_tsc+0x10/0x10 [ 17.916244] ? ktime_get_ts64+0x86/0x230 [ 17.916273] kunit_try_run_case+0x1a5/0x480 [ 17.916302] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.916329] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.916357] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.916385] ? __kthread_parkme+0x82/0x180 [ 17.916411] ? preempt_count_sub+0x50/0x80 [ 17.916440] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.916469] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.916497] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.916525] kthread+0x337/0x6f0 [ 17.916548] ? trace_preempt_on+0x20/0xc0 [ 17.916577] ? __pfx_kthread+0x10/0x10 [ 17.916602] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.916629] ? calculate_sigpending+0x7b/0xa0 [ 17.916658] ? __pfx_kthread+0x10/0x10 [ 17.916683] ret_from_fork+0x116/0x1d0 [ 17.916707] ? __pfx_kthread+0x10/0x10 [ 17.916732] ret_from_fork_asm+0x1a/0x30 [ 17.916769] </TASK> [ 17.916783] [ 17.928953] Allocated by task 283: [ 17.929429] kasan_save_stack+0x45/0x70 [ 17.929670] kasan_save_track+0x18/0x40 [ 17.929905] kasan_save_alloc_info+0x3b/0x50 [ 17.930407] __kasan_kmalloc+0xb7/0xc0 [ 17.930667] __kmalloc_cache_noprof+0x189/0x420 [ 17.931106] kasan_atomics+0x95/0x310 [ 17.931457] kunit_try_run_case+0x1a5/0x480 [ 17.931854] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.932336] kthread+0x337/0x6f0 [ 17.932631] ret_from_fork+0x116/0x1d0 [ 17.932977] ret_from_fork_asm+0x1a/0x30 [ 17.933322] [ 17.933592] The buggy address belongs to the object at ffff88810392bb00 [ 17.933592] which belongs to the cache kmalloc-64 of size 64 [ 17.934401] The buggy address is located 0 bytes to the right of [ 17.934401] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 17.935481] [ 17.935604] The buggy address belongs to the physical page: [ 17.935889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 17.936568] flags: 0x200000000000000(node=0|zone=2) [ 17.937075] page_type: f5(slab) [ 17.937435] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.937825] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.938453] page dumped because: kasan: bad access detected [ 17.938975] [ 17.939273] Memory state around the buggy address: [ 17.939725] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.940287] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.940802] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.941406] ^ [ 17.941742] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.942379] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.942730] ================================================================== [ 16.732986] ================================================================== [ 16.733400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 16.733700] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 16.734088] [ 16.734225] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.734277] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.734293] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.734320] Call Trace: [ 16.734340] <TASK> [ 16.734357] dump_stack_lvl+0x73/0xb0 [ 16.734393] print_report+0xd1/0x650 [ 16.734420] ? __virt_addr_valid+0x1db/0x2d0 [ 16.734449] ? kasan_atomics_helper+0xac7/0x5450 [ 16.734473] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.734500] ? kasan_atomics_helper+0xac7/0x5450 [ 16.734525] kasan_report+0x141/0x180 [ 16.734552] ? kasan_atomics_helper+0xac7/0x5450 [ 16.734584] kasan_check_range+0x10c/0x1c0 [ 16.734612] __kasan_check_write+0x18/0x20 [ 16.734636] kasan_atomics_helper+0xac7/0x5450 [ 16.734663] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.734690] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.734721] ? kasan_atomics+0x152/0x310 [ 16.734752] kasan_atomics+0x1dc/0x310 [ 16.734780] ? __pfx_kasan_atomics+0x10/0x10 [ 16.734822] ? __pfx_read_tsc+0x10/0x10 [ 16.734848] ? ktime_get_ts64+0x86/0x230 [ 16.734876] kunit_try_run_case+0x1a5/0x480 [ 16.734907] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.734933] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.734962] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.734990] ? __kthread_parkme+0x82/0x180 [ 16.735015] ? preempt_count_sub+0x50/0x80 [ 16.735043] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.735072] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.735114] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.735142] kthread+0x337/0x6f0 [ 16.735166] ? trace_preempt_on+0x20/0xc0 [ 16.735194] ? __pfx_kthread+0x10/0x10 [ 16.735219] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.735245] ? calculate_sigpending+0x7b/0xa0 [ 16.735275] ? __pfx_kthread+0x10/0x10 [ 16.735300] ret_from_fork+0x116/0x1d0 [ 16.735323] ? __pfx_kthread+0x10/0x10 [ 16.735348] ret_from_fork_asm+0x1a/0x30 [ 16.735385] </TASK> [ 16.735399] [ 16.744040] Allocated by task 283: [ 16.744276] kasan_save_stack+0x45/0x70 [ 16.744440] kasan_save_track+0x18/0x40 [ 16.744663] kasan_save_alloc_info+0x3b/0x50 [ 16.744921] __kasan_kmalloc+0xb7/0xc0 [ 16.745151] __kmalloc_cache_noprof+0x189/0x420 [ 16.745350] kasan_atomics+0x95/0x310 [ 16.745506] kunit_try_run_case+0x1a5/0x480 [ 16.745676] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.745889] kthread+0x337/0x6f0 [ 16.746050] ret_from_fork+0x116/0x1d0 [ 16.746426] ret_from_fork_asm+0x1a/0x30 [ 16.746664] [ 16.746784] The buggy address belongs to the object at ffff88810392bb00 [ 16.746784] which belongs to the cache kmalloc-64 of size 64 [ 16.747425] The buggy address is located 0 bytes to the right of [ 16.747425] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 16.748204] [ 16.748326] The buggy address belongs to the physical page: [ 16.748564] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 16.748880] flags: 0x200000000000000(node=0|zone=2) [ 16.749070] page_type: f5(slab) [ 16.749456] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.750101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.750483] page dumped because: kasan: bad access detected [ 16.750684] [ 16.750767] Memory state around the buggy address: [ 16.750957] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.751277] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.751641] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.752124] ^ [ 16.752318] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.752566] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.752819] ================================================================== [ 17.022308] ================================================================== [ 17.023053] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 17.023916] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 17.024778] [ 17.025128] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.025200] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.025216] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.025258] Call Trace: [ 17.025283] <TASK> [ 17.025306] dump_stack_lvl+0x73/0xb0 [ 17.025350] print_report+0xd1/0x650 [ 17.025391] ? __virt_addr_valid+0x1db/0x2d0 [ 17.025421] ? kasan_atomics_helper+0x1148/0x5450 [ 17.025447] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.025488] ? kasan_atomics_helper+0x1148/0x5450 [ 17.025515] kasan_report+0x141/0x180 [ 17.025542] ? kasan_atomics_helper+0x1148/0x5450 [ 17.025573] kasan_check_range+0x10c/0x1c0 [ 17.025603] __kasan_check_write+0x18/0x20 [ 17.025627] kasan_atomics_helper+0x1148/0x5450 [ 17.025656] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.025683] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.025714] ? kasan_atomics+0x152/0x310 [ 17.025748] kasan_atomics+0x1dc/0x310 [ 17.025775] ? __pfx_kasan_atomics+0x10/0x10 [ 17.025818] ? __pfx_read_tsc+0x10/0x10 [ 17.025844] ? ktime_get_ts64+0x86/0x230 [ 17.025874] kunit_try_run_case+0x1a5/0x480 [ 17.025904] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.025931] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.025960] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.025989] ? __kthread_parkme+0x82/0x180 [ 17.026014] ? preempt_count_sub+0x50/0x80 [ 17.026044] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.026073] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.026113] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.026141] kthread+0x337/0x6f0 [ 17.026165] ? trace_preempt_on+0x20/0xc0 [ 17.026194] ? __pfx_kthread+0x10/0x10 [ 17.026219] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.026245] ? calculate_sigpending+0x7b/0xa0 [ 17.026274] ? __pfx_kthread+0x10/0x10 [ 17.026300] ret_from_fork+0x116/0x1d0 [ 17.026323] ? __pfx_kthread+0x10/0x10 [ 17.026348] ret_from_fork_asm+0x1a/0x30 [ 17.026386] </TASK> [ 17.026402] [ 17.039155] Allocated by task 283: [ 17.039379] kasan_save_stack+0x45/0x70 [ 17.039604] kasan_save_track+0x18/0x40 [ 17.039831] kasan_save_alloc_info+0x3b/0x50 [ 17.040062] __kasan_kmalloc+0xb7/0xc0 [ 17.040645] __kmalloc_cache_noprof+0x189/0x420 [ 17.041107] kasan_atomics+0x95/0x310 [ 17.041323] kunit_try_run_case+0x1a5/0x480 [ 17.041554] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.041836] kthread+0x337/0x6f0 [ 17.042021] ret_from_fork+0x116/0x1d0 [ 17.042696] ret_from_fork_asm+0x1a/0x30 [ 17.043005] [ 17.043299] The buggy address belongs to the object at ffff88810392bb00 [ 17.043299] which belongs to the cache kmalloc-64 of size 64 [ 17.044399] The buggy address is located 0 bytes to the right of [ 17.044399] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 17.045012] [ 17.045422] The buggy address belongs to the physical page: [ 17.045937] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 17.046601] flags: 0x200000000000000(node=0|zone=2) [ 17.046883] page_type: f5(slab) [ 17.047071] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.047443] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.048112] page dumped because: kasan: bad access detected [ 17.048635] [ 17.048917] Memory state around the buggy address: [ 17.049429] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.050108] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.050852] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.051369] ^ [ 17.051621] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.051971] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.052607] ================================================================== [ 17.865995] ================================================================== [ 17.867300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 17.867681] Read of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 17.868034] [ 17.868200] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.868251] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.868266] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.868292] Call Trace: [ 17.868314] <TASK> [ 17.868334] dump_stack_lvl+0x73/0xb0 [ 17.868370] print_report+0xd1/0x650 [ 17.868398] ? __virt_addr_valid+0x1db/0x2d0 [ 17.868424] ? kasan_atomics_helper+0x4fa5/0x5450 [ 17.868450] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.868477] ? kasan_atomics_helper+0x4fa5/0x5450 [ 17.868502] kasan_report+0x141/0x180 [ 17.868529] ? kasan_atomics_helper+0x4fa5/0x5450 [ 17.868561] __asan_report_load8_noabort+0x18/0x20 [ 17.868591] kasan_atomics_helper+0x4fa5/0x5450 [ 17.868618] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.868644] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.868674] ? kasan_atomics+0x152/0x310 [ 17.868706] kasan_atomics+0x1dc/0x310 [ 17.868733] ? __pfx_kasan_atomics+0x10/0x10 [ 17.868762] ? __pfx_read_tsc+0x10/0x10 [ 17.868802] ? ktime_get_ts64+0x86/0x230 [ 17.868832] kunit_try_run_case+0x1a5/0x480 [ 17.868861] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.868887] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.868917] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.868945] ? __kthread_parkme+0x82/0x180 [ 17.868970] ? preempt_count_sub+0x50/0x80 [ 17.868999] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.869027] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.869055] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.869094] kthread+0x337/0x6f0 [ 17.869119] ? trace_preempt_on+0x20/0xc0 [ 17.869146] ? __pfx_kthread+0x10/0x10 [ 17.869172] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.869197] ? calculate_sigpending+0x7b/0xa0 [ 17.869226] ? __pfx_kthread+0x10/0x10 [ 17.869251] ret_from_fork+0x116/0x1d0 [ 17.869274] ? __pfx_kthread+0x10/0x10 [ 17.869299] ret_from_fork_asm+0x1a/0x30 [ 17.869342] </TASK> [ 17.869356] [ 17.880945] Allocated by task 283: [ 17.881306] kasan_save_stack+0x45/0x70 [ 17.881509] kasan_save_track+0x18/0x40 [ 17.881740] kasan_save_alloc_info+0x3b/0x50 [ 17.881989] __kasan_kmalloc+0xb7/0xc0 [ 17.882184] __kmalloc_cache_noprof+0x189/0x420 [ 17.882699] kasan_atomics+0x95/0x310 [ 17.882986] kunit_try_run_case+0x1a5/0x480 [ 17.883299] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.883648] kthread+0x337/0x6f0 [ 17.883876] ret_from_fork+0x116/0x1d0 [ 17.884249] ret_from_fork_asm+0x1a/0x30 [ 17.884476] [ 17.884577] The buggy address belongs to the object at ffff88810392bb00 [ 17.884577] which belongs to the cache kmalloc-64 of size 64 [ 17.885474] The buggy address is located 0 bytes to the right of [ 17.885474] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 17.886148] [ 17.886245] The buggy address belongs to the physical page: [ 17.886541] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 17.886949] flags: 0x200000000000000(node=0|zone=2) [ 17.887510] page_type: f5(slab) [ 17.887682] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.888303] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.888751] page dumped because: kasan: bad access detected [ 17.889024] [ 17.889329] Memory state around the buggy address: [ 17.889581] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.890103] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.890562] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.890949] ^ [ 17.891319] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.891810] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.892285] ================================================================== [ 17.385598] ================================================================== [ 17.385993] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 17.386358] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 17.386702] [ 17.386852] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.386905] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.386922] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.386949] Call Trace: [ 17.386971] <TASK> [ 17.386992] dump_stack_lvl+0x73/0xb0 [ 17.387028] print_report+0xd1/0x650 [ 17.387055] ? __virt_addr_valid+0x1db/0x2d0 [ 17.387081] ? kasan_atomics_helper+0x1818/0x5450 [ 17.387107] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.387133] ? kasan_atomics_helper+0x1818/0x5450 [ 17.387158] kasan_report+0x141/0x180 [ 17.387185] ? kasan_atomics_helper+0x1818/0x5450 [ 17.387216] kasan_check_range+0x10c/0x1c0 [ 17.387244] __kasan_check_write+0x18/0x20 [ 17.387267] kasan_atomics_helper+0x1818/0x5450 [ 17.387293] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.387319] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.387349] ? kasan_atomics+0x152/0x310 [ 17.387421] kasan_atomics+0x1dc/0x310 [ 17.387449] ? __pfx_kasan_atomics+0x10/0x10 [ 17.387492] ? __pfx_read_tsc+0x10/0x10 [ 17.387518] ? ktime_get_ts64+0x86/0x230 [ 17.387546] kunit_try_run_case+0x1a5/0x480 [ 17.387574] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.387601] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.387630] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.387656] ? __kthread_parkme+0x82/0x180 [ 17.387681] ? preempt_count_sub+0x50/0x80 [ 17.387710] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.387737] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.387808] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.387838] kthread+0x337/0x6f0 [ 17.387864] ? trace_preempt_on+0x20/0xc0 [ 17.387893] ? __pfx_kthread+0x10/0x10 [ 17.387919] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.387945] ? calculate_sigpending+0x7b/0xa0 [ 17.387974] ? __pfx_kthread+0x10/0x10 [ 17.387999] ret_from_fork+0x116/0x1d0 [ 17.388022] ? __pfx_kthread+0x10/0x10 [ 17.388048] ret_from_fork_asm+0x1a/0x30 [ 17.388105] </TASK> [ 17.388119] [ 17.396293] Allocated by task 283: [ 17.396445] kasan_save_stack+0x45/0x70 [ 17.396615] kasan_save_track+0x18/0x40 [ 17.396822] kasan_save_alloc_info+0x3b/0x50 [ 17.397067] __kasan_kmalloc+0xb7/0xc0 [ 17.397308] __kmalloc_cache_noprof+0x189/0x420 [ 17.397577] kasan_atomics+0x95/0x310 [ 17.397809] kunit_try_run_case+0x1a5/0x480 [ 17.398021] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.398313] kthread+0x337/0x6f0 [ 17.398511] ret_from_fork+0x116/0x1d0 [ 17.398715] ret_from_fork_asm+0x1a/0x30 [ 17.398917] [ 17.399036] The buggy address belongs to the object at ffff88810392bb00 [ 17.399036] which belongs to the cache kmalloc-64 of size 64 [ 17.399557] The buggy address is located 0 bytes to the right of [ 17.399557] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 17.400158] [ 17.400250] The buggy address belongs to the physical page: [ 17.400451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 17.400730] flags: 0x200000000000000(node=0|zone=2) [ 17.400933] page_type: f5(slab) [ 17.401134] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.401536] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.401928] page dumped because: kasan: bad access detected [ 17.402251] [ 17.402365] Memory state around the buggy address: [ 17.402551] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.402809] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.403062] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.403447] ^ [ 17.403708] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.404104] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.404473] ================================================================== [ 16.795665] ================================================================== [ 16.796055] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 16.798033] Read of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 16.800605] [ 16.800740] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.800817] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.800834] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.800863] Call Trace: [ 16.800888] <TASK> [ 16.800912] dump_stack_lvl+0x73/0xb0 [ 16.800955] print_report+0xd1/0x650 [ 16.800983] ? __virt_addr_valid+0x1db/0x2d0 [ 16.801012] ? kasan_atomics_helper+0x4a84/0x5450 [ 16.801039] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.801066] ? kasan_atomics_helper+0x4a84/0x5450 [ 16.801502] kasan_report+0x141/0x180 [ 16.801535] ? kasan_atomics_helper+0x4a84/0x5450 [ 16.801569] __asan_report_load4_noabort+0x18/0x20 [ 16.801600] kasan_atomics_helper+0x4a84/0x5450 [ 16.801628] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.801656] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.801689] ? kasan_atomics+0x152/0x310 [ 16.801722] kasan_atomics+0x1dc/0x310 [ 16.801749] ? __pfx_kasan_atomics+0x10/0x10 [ 16.801778] ? __pfx_read_tsc+0x10/0x10 [ 16.801819] ? ktime_get_ts64+0x86/0x230 [ 16.801849] kunit_try_run_case+0x1a5/0x480 [ 16.801877] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.801906] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.801937] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.801964] ? __kthread_parkme+0x82/0x180 [ 16.801990] ? preempt_count_sub+0x50/0x80 [ 16.802022] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.802051] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.802125] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.802285] kthread+0x337/0x6f0 [ 16.802313] ? trace_preempt_on+0x20/0xc0 [ 16.802343] ? __pfx_kthread+0x10/0x10 [ 16.802368] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.802395] ? calculate_sigpending+0x7b/0xa0 [ 16.802425] ? __pfx_kthread+0x10/0x10 [ 16.802450] ret_from_fork+0x116/0x1d0 [ 16.802477] ? __pfx_kthread+0x10/0x10 [ 16.802503] ret_from_fork_asm+0x1a/0x30 [ 16.802540] </TASK> [ 16.802558] [ 16.814698] Allocated by task 283: [ 16.815116] kasan_save_stack+0x45/0x70 [ 16.815373] kasan_save_track+0x18/0x40 [ 16.815531] kasan_save_alloc_info+0x3b/0x50 [ 16.815701] __kasan_kmalloc+0xb7/0xc0 [ 16.815869] __kmalloc_cache_noprof+0x189/0x420 [ 16.816051] kasan_atomics+0x95/0x310 [ 16.816769] kunit_try_run_case+0x1a5/0x480 [ 16.817349] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.818001] kthread+0x337/0x6f0 [ 16.818479] ret_from_fork+0x116/0x1d0 [ 16.819032] ret_from_fork_asm+0x1a/0x30 [ 16.819641] [ 16.819968] The buggy address belongs to the object at ffff88810392bb00 [ 16.819968] which belongs to the cache kmalloc-64 of size 64 [ 16.821286] The buggy address is located 0 bytes to the right of [ 16.821286] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 16.822022] [ 16.822137] The buggy address belongs to the physical page: [ 16.822692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 16.823521] flags: 0x200000000000000(node=0|zone=2) [ 16.824062] page_type: f5(slab) [ 16.824365] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.824625] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.825620] page dumped because: kasan: bad access detected [ 16.826202] [ 16.826408] Memory state around the buggy address: [ 16.826902] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.827169] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.827415] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.827653] ^ [ 16.827842] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.828083] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.828753] ================================================================== [ 17.686156] ================================================================== [ 17.686577] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 17.686865] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 17.687272] [ 17.687410] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.687476] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.687491] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.687532] Call Trace: [ 17.687555] <TASK> [ 17.687576] dump_stack_lvl+0x73/0xb0 [ 17.687612] print_report+0xd1/0x650 [ 17.687640] ? __virt_addr_valid+0x1db/0x2d0 [ 17.687669] ? kasan_atomics_helper+0x1f43/0x5450 [ 17.687695] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.687724] ? kasan_atomics_helper+0x1f43/0x5450 [ 17.687762] kasan_report+0x141/0x180 [ 17.687807] ? kasan_atomics_helper+0x1f43/0x5450 [ 17.687840] kasan_check_range+0x10c/0x1c0 [ 17.687869] __kasan_check_write+0x18/0x20 [ 17.687893] kasan_atomics_helper+0x1f43/0x5450 [ 17.687920] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.687947] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.687978] ? kasan_atomics+0x152/0x310 [ 17.688011] kasan_atomics+0x1dc/0x310 [ 17.688039] ? __pfx_kasan_atomics+0x10/0x10 [ 17.688069] ? __pfx_read_tsc+0x10/0x10 [ 17.688095] ? ktime_get_ts64+0x86/0x230 [ 17.688125] kunit_try_run_case+0x1a5/0x480 [ 17.688156] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.688184] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.688213] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.688243] ? __kthread_parkme+0x82/0x180 [ 17.688270] ? preempt_count_sub+0x50/0x80 [ 17.688300] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.688330] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.688358] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.688387] kthread+0x337/0x6f0 [ 17.688410] ? trace_preempt_on+0x20/0xc0 [ 17.688439] ? __pfx_kthread+0x10/0x10 [ 17.688465] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.688491] ? calculate_sigpending+0x7b/0xa0 [ 17.688520] ? __pfx_kthread+0x10/0x10 [ 17.688548] ret_from_fork+0x116/0x1d0 [ 17.688572] ? __pfx_kthread+0x10/0x10 [ 17.688596] ret_from_fork_asm+0x1a/0x30 [ 17.688645] </TASK> [ 17.688659] [ 17.705069] Allocated by task 283: [ 17.705846] kasan_save_stack+0x45/0x70 [ 17.706235] kasan_save_track+0x18/0x40 [ 17.706556] kasan_save_alloc_info+0x3b/0x50 [ 17.706920] __kasan_kmalloc+0xb7/0xc0 [ 17.707263] __kmalloc_cache_noprof+0x189/0x420 [ 17.707529] kasan_atomics+0x95/0x310 [ 17.707943] kunit_try_run_case+0x1a5/0x480 [ 17.708281] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.708566] kthread+0x337/0x6f0 [ 17.708903] ret_from_fork+0x116/0x1d0 [ 17.709273] ret_from_fork_asm+0x1a/0x30 [ 17.709595] [ 17.709739] The buggy address belongs to the object at ffff88810392bb00 [ 17.709739] which belongs to the cache kmalloc-64 of size 64 [ 17.710686] The buggy address is located 0 bytes to the right of [ 17.710686] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 17.711505] [ 17.711631] The buggy address belongs to the physical page: [ 17.712097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 17.712632] flags: 0x200000000000000(node=0|zone=2) [ 17.713025] page_type: f5(slab) [ 17.713284] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.713842] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.714352] page dumped because: kasan: bad access detected [ 17.714612] [ 17.714734] Memory state around the buggy address: [ 17.715012] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.715415] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.715746] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.716105] ^ [ 17.716313] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.716659] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.717019] ================================================================== [ 17.845575] ================================================================== [ 17.846007] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 17.846657] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 17.847027] [ 17.847209] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.847262] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.847278] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.847305] Call Trace: [ 17.847326] <TASK> [ 17.847347] dump_stack_lvl+0x73/0xb0 [ 17.847381] print_report+0xd1/0x650 [ 17.847410] ? __virt_addr_valid+0x1db/0x2d0 [ 17.847438] ? kasan_atomics_helper+0x218a/0x5450 [ 17.847463] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.847492] ? kasan_atomics_helper+0x218a/0x5450 [ 17.847519] kasan_report+0x141/0x180 [ 17.847548] ? kasan_atomics_helper+0x218a/0x5450 [ 17.847583] kasan_check_range+0x10c/0x1c0 [ 17.847613] __kasan_check_write+0x18/0x20 [ 17.847637] kasan_atomics_helper+0x218a/0x5450 [ 17.847666] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.847695] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.847726] ? kasan_atomics+0x152/0x310 [ 17.847759] kasan_atomics+0x1dc/0x310 [ 17.847800] ? __pfx_kasan_atomics+0x10/0x10 [ 17.847833] ? __pfx_read_tsc+0x10/0x10 [ 17.847860] ? ktime_get_ts64+0x86/0x230 [ 17.847889] kunit_try_run_case+0x1a5/0x480 [ 17.847918] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.847945] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.847975] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.848003] ? __kthread_parkme+0x82/0x180 [ 17.848029] ? preempt_count_sub+0x50/0x80 [ 17.848059] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.848088] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.848130] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.848159] kthread+0x337/0x6f0 [ 17.848184] ? trace_preempt_on+0x20/0xc0 [ 17.848212] ? __pfx_kthread+0x10/0x10 [ 17.848237] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.848263] ? calculate_sigpending+0x7b/0xa0 [ 17.848292] ? __pfx_kthread+0x10/0x10 [ 17.848319] ret_from_fork+0x116/0x1d0 [ 17.848342] ? __pfx_kthread+0x10/0x10 [ 17.848367] ret_from_fork_asm+0x1a/0x30 [ 17.848405] </TASK> [ 17.848420] [ 17.857248] Allocated by task 283: [ 17.857469] kasan_save_stack+0x45/0x70 [ 17.857686] kasan_save_track+0x18/0x40 [ 17.857891] kasan_save_alloc_info+0x3b/0x50 [ 17.858120] __kasan_kmalloc+0xb7/0xc0 [ 17.858289] __kmalloc_cache_noprof+0x189/0x420 [ 17.858543] kasan_atomics+0x95/0x310 [ 17.858728] kunit_try_run_case+0x1a5/0x480 [ 17.858923] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.859126] kthread+0x337/0x6f0 [ 17.859317] ret_from_fork+0x116/0x1d0 [ 17.859539] ret_from_fork_asm+0x1a/0x30 [ 17.859771] [ 17.859991] The buggy address belongs to the object at ffff88810392bb00 [ 17.859991] which belongs to the cache kmalloc-64 of size 64 [ 17.860455] The buggy address is located 0 bytes to the right of [ 17.860455] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 17.861076] [ 17.861197] The buggy address belongs to the physical page: [ 17.861466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 17.861774] flags: 0x200000000000000(node=0|zone=2) [ 17.861972] page_type: f5(slab) [ 17.862113] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.862375] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.862743] page dumped because: kasan: bad access detected [ 17.863053] [ 17.863226] Memory state around the buggy address: [ 17.863481] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.863749] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.864136] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.864436] ^ [ 17.864612] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.864870] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.865299] ================================================================== [ 16.552809] ================================================================== [ 16.553120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 16.553530] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 16.554354] [ 16.554468] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.554521] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.554538] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.554564] Call Trace: [ 16.554582] <TASK> [ 16.554654] dump_stack_lvl+0x73/0xb0 [ 16.554723] print_report+0xd1/0x650 [ 16.554781] ? __virt_addr_valid+0x1db/0x2d0 [ 16.554850] ? kasan_atomics_helper+0x697/0x5450 [ 16.554876] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.554957] ? kasan_atomics_helper+0x697/0x5450 [ 16.554983] kasan_report+0x141/0x180 [ 16.555036] ? kasan_atomics_helper+0x697/0x5450 [ 16.555112] kasan_check_range+0x10c/0x1c0 [ 16.555141] __kasan_check_write+0x18/0x20 [ 16.555166] kasan_atomics_helper+0x697/0x5450 [ 16.555193] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.555220] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.555252] ? kasan_atomics+0x152/0x310 [ 16.555283] kasan_atomics+0x1dc/0x310 [ 16.555311] ? __pfx_kasan_atomics+0x10/0x10 [ 16.555341] ? __pfx_read_tsc+0x10/0x10 [ 16.555367] ? ktime_get_ts64+0x86/0x230 [ 16.555396] kunit_try_run_case+0x1a5/0x480 [ 16.555426] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.555453] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.555482] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.555510] ? __kthread_parkme+0x82/0x180 [ 16.555534] ? preempt_count_sub+0x50/0x80 [ 16.555562] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.555591] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.555618] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.555646] kthread+0x337/0x6f0 [ 16.555669] ? trace_preempt_on+0x20/0xc0 [ 16.555697] ? __pfx_kthread+0x10/0x10 [ 16.555722] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.555747] ? calculate_sigpending+0x7b/0xa0 [ 16.555776] ? __pfx_kthread+0x10/0x10 [ 16.555815] ret_from_fork+0x116/0x1d0 [ 16.555838] ? __pfx_kthread+0x10/0x10 [ 16.555864] ret_from_fork_asm+0x1a/0x30 [ 16.555900] </TASK> [ 16.555916] [ 16.564716] Allocated by task 283: [ 16.565197] kasan_save_stack+0x45/0x70 [ 16.565508] kasan_save_track+0x18/0x40 [ 16.565837] kasan_save_alloc_info+0x3b/0x50 [ 16.566104] __kasan_kmalloc+0xb7/0xc0 [ 16.566320] __kmalloc_cache_noprof+0x189/0x420 [ 16.566578] kasan_atomics+0x95/0x310 [ 16.566898] kunit_try_run_case+0x1a5/0x480 [ 16.567107] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.567305] kthread+0x337/0x6f0 [ 16.567442] ret_from_fork+0x116/0x1d0 [ 16.567708] ret_from_fork_asm+0x1a/0x30 [ 16.568210] [ 16.568327] The buggy address belongs to the object at ffff88810392bb00 [ 16.568327] which belongs to the cache kmalloc-64 of size 64 [ 16.569039] The buggy address is located 0 bytes to the right of [ 16.569039] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 16.569775] [ 16.569921] The buggy address belongs to the physical page: [ 16.570144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 16.570546] flags: 0x200000000000000(node=0|zone=2) [ 16.571055] page_type: f5(slab) [ 16.571326] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.571645] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.572157] page dumped because: kasan: bad access detected [ 16.572463] [ 16.572574] Memory state around the buggy address: [ 16.572869] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.573212] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.573541] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.573883] ^ [ 16.574119] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.574449] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.574856] ================================================================== [ 17.637962] ================================================================== [ 17.638867] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 17.639897] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 17.640718] [ 17.640953] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.641008] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.641024] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.641052] Call Trace: [ 17.641074] <TASK> [ 17.641137] dump_stack_lvl+0x73/0xb0 [ 17.641175] print_report+0xd1/0x650 [ 17.641218] ? __virt_addr_valid+0x1db/0x2d0 [ 17.641246] ? kasan_atomics_helper+0x1e12/0x5450 [ 17.641272] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.641299] ? kasan_atomics_helper+0x1e12/0x5450 [ 17.641326] kasan_report+0x141/0x180 [ 17.641359] ? kasan_atomics_helper+0x1e12/0x5450 [ 17.641390] kasan_check_range+0x10c/0x1c0 [ 17.641419] __kasan_check_write+0x18/0x20 [ 17.641443] kasan_atomics_helper+0x1e12/0x5450 [ 17.641470] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.641498] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.641527] ? kasan_atomics+0x152/0x310 [ 17.641560] kasan_atomics+0x1dc/0x310 [ 17.641588] ? __pfx_kasan_atomics+0x10/0x10 [ 17.641617] ? __pfx_read_tsc+0x10/0x10 [ 17.641642] ? ktime_get_ts64+0x86/0x230 [ 17.641672] kunit_try_run_case+0x1a5/0x480 [ 17.641701] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.641728] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.641757] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.641785] ? __kthread_parkme+0x82/0x180 [ 17.641821] ? preempt_count_sub+0x50/0x80 [ 17.641850] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.641878] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.641909] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.641935] kthread+0x337/0x6f0 [ 17.641958] ? trace_preempt_on+0x20/0xc0 [ 17.641987] ? __pfx_kthread+0x10/0x10 [ 17.642011] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.642036] ? calculate_sigpending+0x7b/0xa0 [ 17.642066] ? __pfx_kthread+0x10/0x10 [ 17.642105] ret_from_fork+0x116/0x1d0 [ 17.642129] ? __pfx_kthread+0x10/0x10 [ 17.642153] ret_from_fork_asm+0x1a/0x30 [ 17.642191] </TASK> [ 17.642207] [ 17.654005] Allocated by task 283: [ 17.654266] kasan_save_stack+0x45/0x70 [ 17.654504] kasan_save_track+0x18/0x40 [ 17.654664] kasan_save_alloc_info+0x3b/0x50 [ 17.654848] __kasan_kmalloc+0xb7/0xc0 [ 17.655065] __kmalloc_cache_noprof+0x189/0x420 [ 17.655344] kasan_atomics+0x95/0x310 [ 17.655558] kunit_try_run_case+0x1a5/0x480 [ 17.655810] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.656138] kthread+0x337/0x6f0 [ 17.656323] ret_from_fork+0x116/0x1d0 [ 17.656499] ret_from_fork_asm+0x1a/0x30 [ 17.656758] [ 17.656873] The buggy address belongs to the object at ffff88810392bb00 [ 17.656873] which belongs to the cache kmalloc-64 of size 64 [ 17.657482] The buggy address is located 0 bytes to the right of [ 17.657482] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 17.657975] [ 17.658097] The buggy address belongs to the physical page: [ 17.658385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 17.659069] flags: 0x200000000000000(node=0|zone=2) [ 17.659327] page_type: f5(slab) [ 17.659473] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.659865] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.660313] page dumped because: kasan: bad access detected [ 17.660611] [ 17.660724] Memory state around the buggy address: [ 17.660984] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.661368] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.661799] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.662140] ^ [ 17.662413] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.662716] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.663093] ================================================================== [ 17.053255] ================================================================== [ 17.053699] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 17.054112] Read of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 17.054442] [ 17.054585] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.054639] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.054656] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.054683] Call Trace: [ 17.054706] <TASK> [ 17.054728] dump_stack_lvl+0x73/0xb0 [ 17.054774] print_report+0xd1/0x650 [ 17.054820] ? __virt_addr_valid+0x1db/0x2d0 [ 17.054848] ? kasan_atomics_helper+0x4a02/0x5450 [ 17.054873] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.054900] ? kasan_atomics_helper+0x4a02/0x5450 [ 17.054928] kasan_report+0x141/0x180 [ 17.054956] ? kasan_atomics_helper+0x4a02/0x5450 [ 17.054990] __asan_report_load4_noabort+0x18/0x20 [ 17.055021] kasan_atomics_helper+0x4a02/0x5450 [ 17.055048] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.055075] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.055118] ? kasan_atomics+0x152/0x310 [ 17.055162] kasan_atomics+0x1dc/0x310 [ 17.055189] ? __pfx_kasan_atomics+0x10/0x10 [ 17.055219] ? __pfx_read_tsc+0x10/0x10 [ 17.055258] ? ktime_get_ts64+0x86/0x230 [ 17.055287] kunit_try_run_case+0x1a5/0x480 [ 17.055315] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.055343] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.055372] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.055400] ? __kthread_parkme+0x82/0x180 [ 17.055426] ? preempt_count_sub+0x50/0x80 [ 17.055454] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.055484] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.055511] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.055539] kthread+0x337/0x6f0 [ 17.055564] ? trace_preempt_on+0x20/0xc0 [ 17.055592] ? __pfx_kthread+0x10/0x10 [ 17.055618] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.055655] ? calculate_sigpending+0x7b/0xa0 [ 17.055684] ? __pfx_kthread+0x10/0x10 [ 17.055723] ret_from_fork+0x116/0x1d0 [ 17.055747] ? __pfx_kthread+0x10/0x10 [ 17.055772] ret_from_fork_asm+0x1a/0x30 [ 17.055819] </TASK> [ 17.055834] [ 17.064707] Allocated by task 283: [ 17.064923] kasan_save_stack+0x45/0x70 [ 17.065204] kasan_save_track+0x18/0x40 [ 17.065387] kasan_save_alloc_info+0x3b/0x50 [ 17.065644] __kasan_kmalloc+0xb7/0xc0 [ 17.065888] __kmalloc_cache_noprof+0x189/0x420 [ 17.066135] kasan_atomics+0x95/0x310 [ 17.066352] kunit_try_run_case+0x1a5/0x480 [ 17.066522] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.066764] kthread+0x337/0x6f0 [ 17.066979] ret_from_fork+0x116/0x1d0 [ 17.067194] ret_from_fork_asm+0x1a/0x30 [ 17.067424] [ 17.067626] The buggy address belongs to the object at ffff88810392bb00 [ 17.067626] which belongs to the cache kmalloc-64 of size 64 [ 17.068210] The buggy address is located 0 bytes to the right of [ 17.068210] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 17.068838] [ 17.068945] The buggy address belongs to the physical page: [ 17.069301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 17.069695] flags: 0x200000000000000(node=0|zone=2) [ 17.069972] page_type: f5(slab) [ 17.070202] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.070577] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.070963] page dumped because: kasan: bad access detected [ 17.071312] [ 17.071414] Memory state around the buggy address: [ 17.071594] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.071858] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.072109] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.072492] ^ [ 17.072751] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.073161] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.073503] ================================================================== [ 16.367738] ================================================================== [ 16.368089] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 16.368474] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 16.368760] [ 16.368988] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.369043] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.369056] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.369082] Call Trace: [ 16.369104] <TASK> [ 16.369127] dump_stack_lvl+0x73/0xb0 [ 16.369206] print_report+0xd1/0x650 [ 16.369233] ? __virt_addr_valid+0x1db/0x2d0 [ 16.369258] ? kasan_atomics_helper+0x4b6e/0x5450 [ 16.369282] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.369307] ? kasan_atomics_helper+0x4b6e/0x5450 [ 16.369338] kasan_report+0x141/0x180 [ 16.369362] ? kasan_atomics_helper+0x4b6e/0x5450 [ 16.369393] __asan_report_store4_noabort+0x1b/0x30 [ 16.369417] kasan_atomics_helper+0x4b6e/0x5450 [ 16.369443] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.369467] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.369497] ? kasan_atomics+0x152/0x310 [ 16.369529] kasan_atomics+0x1dc/0x310 [ 16.369554] ? __pfx_kasan_atomics+0x10/0x10 [ 16.369582] ? __pfx_read_tsc+0x10/0x10 [ 16.369608] ? ktime_get_ts64+0x86/0x230 [ 16.369636] kunit_try_run_case+0x1a5/0x480 [ 16.369665] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.369690] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.369719] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.369890] ? __kthread_parkme+0x82/0x180 [ 16.369918] ? preempt_count_sub+0x50/0x80 [ 16.369990] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.370020] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.370048] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.370077] kthread+0x337/0x6f0 [ 16.370115] ? trace_preempt_on+0x20/0xc0 [ 16.370358] ? __pfx_kthread+0x10/0x10 [ 16.370394] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.370423] ? calculate_sigpending+0x7b/0xa0 [ 16.370453] ? __pfx_kthread+0x10/0x10 [ 16.370480] ret_from_fork+0x116/0x1d0 [ 16.370505] ? __pfx_kthread+0x10/0x10 [ 16.370530] ret_from_fork_asm+0x1a/0x30 [ 16.370568] </TASK> [ 16.370585] [ 16.379954] Allocated by task 283: [ 16.380339] kasan_save_stack+0x45/0x70 [ 16.380588] kasan_save_track+0x18/0x40 [ 16.380841] kasan_save_alloc_info+0x3b/0x50 [ 16.381079] __kasan_kmalloc+0xb7/0xc0 [ 16.381322] __kmalloc_cache_noprof+0x189/0x420 [ 16.381577] kasan_atomics+0x95/0x310 [ 16.381809] kunit_try_run_case+0x1a5/0x480 [ 16.382073] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.382415] kthread+0x337/0x6f0 [ 16.382883] ret_from_fork+0x116/0x1d0 [ 16.383059] ret_from_fork_asm+0x1a/0x30 [ 16.383382] [ 16.383523] The buggy address belongs to the object at ffff88810392bb00 [ 16.383523] which belongs to the cache kmalloc-64 of size 64 [ 16.384013] The buggy address is located 0 bytes to the right of [ 16.384013] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 16.384522] [ 16.384623] The buggy address belongs to the physical page: [ 16.386855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 16.387266] flags: 0x200000000000000(node=0|zone=2) [ 16.388116] page_type: f5(slab) [ 16.388304] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.388566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.388883] page dumped because: kasan: bad access detected [ 16.389112] [ 16.389196] Memory state around the buggy address: [ 16.389379] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.389711] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.390836] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.391104] ^ [ 16.391579] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.392746] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.394989] ================================================================== [ 17.457938] ================================================================== [ 17.458426] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 17.458784] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 17.459197] [ 17.459354] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.459410] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.459451] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.459481] Call Trace: [ 17.459507] <TASK> [ 17.459530] dump_stack_lvl+0x73/0xb0 [ 17.459585] print_report+0xd1/0x650 [ 17.459614] ? __virt_addr_valid+0x1db/0x2d0 [ 17.459642] ? kasan_atomics_helper+0x19e3/0x5450 [ 17.459667] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.459694] ? kasan_atomics_helper+0x19e3/0x5450 [ 17.459721] kasan_report+0x141/0x180 [ 17.459747] ? kasan_atomics_helper+0x19e3/0x5450 [ 17.459777] kasan_check_range+0x10c/0x1c0 [ 17.459818] __kasan_check_write+0x18/0x20 [ 17.459862] kasan_atomics_helper+0x19e3/0x5450 [ 17.459889] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.459916] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.459946] ? kasan_atomics+0x152/0x310 [ 17.459977] kasan_atomics+0x1dc/0x310 [ 17.460004] ? __pfx_kasan_atomics+0x10/0x10 [ 17.460052] ? __pfx_read_tsc+0x10/0x10 [ 17.460077] ? ktime_get_ts64+0x86/0x230 [ 17.460106] kunit_try_run_case+0x1a5/0x480 [ 17.460135] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.460161] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.460204] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.460232] ? __kthread_parkme+0x82/0x180 [ 17.460257] ? preempt_count_sub+0x50/0x80 [ 17.460285] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.460314] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.460340] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.460367] kthread+0x337/0x6f0 [ 17.460390] ? trace_preempt_on+0x20/0xc0 [ 17.460418] ? __pfx_kthread+0x10/0x10 [ 17.460443] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.460468] ? calculate_sigpending+0x7b/0xa0 [ 17.460497] ? __pfx_kthread+0x10/0x10 [ 17.460522] ret_from_fork+0x116/0x1d0 [ 17.460544] ? __pfx_kthread+0x10/0x10 [ 17.460568] ret_from_fork_asm+0x1a/0x30 [ 17.460605] </TASK> [ 17.460620] [ 17.469662] Allocated by task 283: [ 17.469879] kasan_save_stack+0x45/0x70 [ 17.470140] kasan_save_track+0x18/0x40 [ 17.470365] kasan_save_alloc_info+0x3b/0x50 [ 17.470613] __kasan_kmalloc+0xb7/0xc0 [ 17.470813] __kmalloc_cache_noprof+0x189/0x420 [ 17.471094] kasan_atomics+0x95/0x310 [ 17.471356] kunit_try_run_case+0x1a5/0x480 [ 17.471590] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.471874] kthread+0x337/0x6f0 [ 17.472089] ret_from_fork+0x116/0x1d0 [ 17.472313] ret_from_fork_asm+0x1a/0x30 [ 17.472548] [ 17.472635] The buggy address belongs to the object at ffff88810392bb00 [ 17.472635] which belongs to the cache kmalloc-64 of size 64 [ 17.473336] The buggy address is located 0 bytes to the right of [ 17.473336] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 17.473982] [ 17.474123] The buggy address belongs to the physical page: [ 17.474476] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 17.474948] flags: 0x200000000000000(node=0|zone=2) [ 17.475225] page_type: f5(slab) [ 17.475424] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.476061] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.476338] page dumped because: kasan: bad access detected [ 17.476536] [ 17.476620] Memory state around the buggy address: [ 17.476813] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.477138] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.477516] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.477959] ^ [ 17.478403] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.478799] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.479264] ================================================================== [ 17.203432] ================================================================== [ 17.203903] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 17.204223] Read of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 17.204642] [ 17.204809] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.204864] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.204881] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.204908] Call Trace: [ 17.204931] <TASK> [ 17.204953] dump_stack_lvl+0x73/0xb0 [ 17.204990] print_report+0xd1/0x650 [ 17.205017] ? __virt_addr_valid+0x1db/0x2d0 [ 17.205046] ? kasan_atomics_helper+0x4eae/0x5450 [ 17.205072] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.205140] ? kasan_atomics_helper+0x4eae/0x5450 [ 17.205169] kasan_report+0x141/0x180 [ 17.205196] ? kasan_atomics_helper+0x4eae/0x5450 [ 17.205248] __asan_report_load8_noabort+0x18/0x20 [ 17.205278] kasan_atomics_helper+0x4eae/0x5450 [ 17.205306] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.205338] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.205370] ? kasan_atomics+0x152/0x310 [ 17.205403] kasan_atomics+0x1dc/0x310 [ 17.205431] ? __pfx_kasan_atomics+0x10/0x10 [ 17.205480] ? __pfx_read_tsc+0x10/0x10 [ 17.205521] ? ktime_get_ts64+0x86/0x230 [ 17.205552] kunit_try_run_case+0x1a5/0x480 [ 17.205582] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.205610] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.205639] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.205668] ? __kthread_parkme+0x82/0x180 [ 17.205693] ? preempt_count_sub+0x50/0x80 [ 17.205724] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.205753] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.205781] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.205821] kthread+0x337/0x6f0 [ 17.205845] ? trace_preempt_on+0x20/0xc0 [ 17.205874] ? __pfx_kthread+0x10/0x10 [ 17.205900] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.205926] ? calculate_sigpending+0x7b/0xa0 [ 17.205956] ? __pfx_kthread+0x10/0x10 [ 17.205982] ret_from_fork+0x116/0x1d0 [ 17.206006] ? __pfx_kthread+0x10/0x10 [ 17.206031] ret_from_fork_asm+0x1a/0x30 [ 17.206069] </TASK> [ 17.206086] [ 17.215338] Allocated by task 283: [ 17.215599] kasan_save_stack+0x45/0x70 [ 17.215893] kasan_save_track+0x18/0x40 [ 17.216119] kasan_save_alloc_info+0x3b/0x50 [ 17.216440] __kasan_kmalloc+0xb7/0xc0 [ 17.216626] __kmalloc_cache_noprof+0x189/0x420 [ 17.216874] kasan_atomics+0x95/0x310 [ 17.217172] kunit_try_run_case+0x1a5/0x480 [ 17.217465] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.217751] kthread+0x337/0x6f0 [ 17.218010] ret_from_fork+0x116/0x1d0 [ 17.218284] ret_from_fork_asm+0x1a/0x30 [ 17.218613] [ 17.218731] The buggy address belongs to the object at ffff88810392bb00 [ 17.218731] which belongs to the cache kmalloc-64 of size 64 [ 17.219288] The buggy address is located 0 bytes to the right of [ 17.219288] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 17.219976] [ 17.220130] The buggy address belongs to the physical page: [ 17.220371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 17.220655] flags: 0x200000000000000(node=0|zone=2) [ 17.220891] page_type: f5(slab) [ 17.221096] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.221504] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.221948] page dumped because: kasan: bad access detected [ 17.222213] [ 17.222296] Memory state around the buggy address: [ 17.222479] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.222733] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.222998] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.223580] ^ [ 17.224111] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.224589] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.225084] ================================================================== [ 17.893423] ================================================================== [ 17.893723] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 17.894133] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 17.894521] [ 17.894659] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.894714] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.894730] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.894757] Call Trace: [ 17.894782] <TASK> [ 17.894817] dump_stack_lvl+0x73/0xb0 [ 17.894853] print_report+0xd1/0x650 [ 17.894881] ? __virt_addr_valid+0x1db/0x2d0 [ 17.894909] ? kasan_atomics_helper+0x224c/0x5450 [ 17.894934] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.894962] ? kasan_atomics_helper+0x224c/0x5450 [ 17.894988] kasan_report+0x141/0x180 [ 17.895015] ? kasan_atomics_helper+0x224c/0x5450 [ 17.895049] kasan_check_range+0x10c/0x1c0 [ 17.895078] __kasan_check_write+0x18/0x20 [ 17.895102] kasan_atomics_helper+0x224c/0x5450 [ 17.895130] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.895171] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.895201] ? kasan_atomics+0x152/0x310 [ 17.895234] kasan_atomics+0x1dc/0x310 [ 17.895262] ? __pfx_kasan_atomics+0x10/0x10 [ 17.895292] ? __pfx_read_tsc+0x10/0x10 [ 17.895318] ? ktime_get_ts64+0x86/0x230 [ 17.895348] kunit_try_run_case+0x1a5/0x480 [ 17.895377] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.895404] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.895434] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.895464] ? __kthread_parkme+0x82/0x180 [ 17.895489] ? preempt_count_sub+0x50/0x80 [ 17.895519] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.895548] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.895576] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.895604] kthread+0x337/0x6f0 [ 17.895628] ? trace_preempt_on+0x20/0xc0 [ 17.895657] ? __pfx_kthread+0x10/0x10 [ 17.895682] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.895709] ? calculate_sigpending+0x7b/0xa0 [ 17.895739] ? __pfx_kthread+0x10/0x10 [ 17.895764] ret_from_fork+0x116/0x1d0 [ 17.895801] ? __pfx_kthread+0x10/0x10 [ 17.895826] ret_from_fork_asm+0x1a/0x30 [ 17.895864] </TASK> [ 17.895879] [ 17.904599] Allocated by task 283: [ 17.904823] kasan_save_stack+0x45/0x70 [ 17.905054] kasan_save_track+0x18/0x40 [ 17.905236] kasan_save_alloc_info+0x3b/0x50 [ 17.905420] __kasan_kmalloc+0xb7/0xc0 [ 17.905577] __kmalloc_cache_noprof+0x189/0x420 [ 17.905818] kasan_atomics+0x95/0x310 [ 17.906003] kunit_try_run_case+0x1a5/0x480 [ 17.906300] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.906578] kthread+0x337/0x6f0 [ 17.906748] ret_from_fork+0x116/0x1d0 [ 17.906918] ret_from_fork_asm+0x1a/0x30 [ 17.907083] [ 17.907168] The buggy address belongs to the object at ffff88810392bb00 [ 17.907168] which belongs to the cache kmalloc-64 of size 64 [ 17.907733] The buggy address is located 0 bytes to the right of [ 17.907733] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 17.908240] [ 17.908325] The buggy address belongs to the physical page: [ 17.908525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 17.909276] flags: 0x200000000000000(node=0|zone=2) [ 17.909558] page_type: f5(slab) [ 17.909758] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.910249] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.910620] page dumped because: kasan: bad access detected [ 17.910899] [ 17.911012] Memory state around the buggy address: [ 17.911325] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.911619] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.911883] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.912242] ^ [ 17.912523] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.912822] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.913305] ================================================================== [ 17.249555] ================================================================== [ 17.249907] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 17.250407] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 17.250777] [ 17.250934] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.250994] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.251010] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.251037] Call Trace: [ 17.251058] <TASK> [ 17.251079] dump_stack_lvl+0x73/0xb0 [ 17.251117] print_report+0xd1/0x650 [ 17.251146] ? __virt_addr_valid+0x1db/0x2d0 [ 17.251213] ? kasan_atomics_helper+0x50d4/0x5450 [ 17.251238] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.251266] ? kasan_atomics_helper+0x50d4/0x5450 [ 17.251293] kasan_report+0x141/0x180 [ 17.251353] ? kasan_atomics_helper+0x50d4/0x5450 [ 17.251387] __asan_report_store8_noabort+0x1b/0x30 [ 17.251414] kasan_atomics_helper+0x50d4/0x5450 [ 17.251441] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.251500] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.251531] ? kasan_atomics+0x152/0x310 [ 17.251564] kasan_atomics+0x1dc/0x310 [ 17.251592] ? __pfx_kasan_atomics+0x10/0x10 [ 17.251653] ? __pfx_read_tsc+0x10/0x10 [ 17.251681] ? ktime_get_ts64+0x86/0x230 [ 17.251711] kunit_try_run_case+0x1a5/0x480 [ 17.251739] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.251809] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.251841] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.251869] ? __kthread_parkme+0x82/0x180 [ 17.251895] ? preempt_count_sub+0x50/0x80 [ 17.251925] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.251982] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.252009] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.252038] kthread+0x337/0x6f0 [ 17.252063] ? trace_preempt_on+0x20/0xc0 [ 17.252092] ? __pfx_kthread+0x10/0x10 [ 17.252118] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.252144] ? calculate_sigpending+0x7b/0xa0 [ 17.252208] ? __pfx_kthread+0x10/0x10 [ 17.252236] ret_from_fork+0x116/0x1d0 [ 17.252259] ? __pfx_kthread+0x10/0x10 [ 17.252285] ret_from_fork_asm+0x1a/0x30 [ 17.252323] </TASK> [ 17.252339] [ 17.261462] Allocated by task 283: [ 17.261693] kasan_save_stack+0x45/0x70 [ 17.261986] kasan_save_track+0x18/0x40 [ 17.262292] kasan_save_alloc_info+0x3b/0x50 [ 17.262695] __kasan_kmalloc+0xb7/0xc0 [ 17.262925] __kmalloc_cache_noprof+0x189/0x420 [ 17.263179] kasan_atomics+0x95/0x310 [ 17.263508] kunit_try_run_case+0x1a5/0x480 [ 17.263675] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.263879] kthread+0x337/0x6f0 [ 17.264017] ret_from_fork+0x116/0x1d0 [ 17.264453] ret_from_fork_asm+0x1a/0x30 [ 17.264685] [ 17.264859] The buggy address belongs to the object at ffff88810392bb00 [ 17.264859] which belongs to the cache kmalloc-64 of size 64 [ 17.265544] The buggy address is located 0 bytes to the right of [ 17.265544] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 17.265962] [ 17.266130] The buggy address belongs to the physical page: [ 17.266420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 17.266831] flags: 0x200000000000000(node=0|zone=2) [ 17.267118] page_type: f5(slab) [ 17.267315] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.267724] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.267996] page dumped because: kasan: bad access detected [ 17.268471] [ 17.268626] Memory state around the buggy address: [ 17.268999] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.269591] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.269934] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.270331] ^ [ 17.270507] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.270749] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.271160] ================================================================== [ 17.533259] ================================================================== [ 17.533643] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 17.534056] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 17.534527] [ 17.534680] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.534747] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.534764] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.534802] Call Trace: [ 17.534824] <TASK> [ 17.534846] dump_stack_lvl+0x73/0xb0 [ 17.534896] print_report+0xd1/0x650 [ 17.534925] ? __virt_addr_valid+0x1db/0x2d0 [ 17.534953] ? kasan_atomics_helper+0x1c18/0x5450 [ 17.534979] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.535007] ? kasan_atomics_helper+0x1c18/0x5450 [ 17.535033] kasan_report+0x141/0x180 [ 17.535059] ? kasan_atomics_helper+0x1c18/0x5450 [ 17.535103] kasan_check_range+0x10c/0x1c0 [ 17.535131] __kasan_check_write+0x18/0x20 [ 17.535166] kasan_atomics_helper+0x1c18/0x5450 [ 17.535194] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.535221] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.535274] ? kasan_atomics+0x152/0x310 [ 17.535305] kasan_atomics+0x1dc/0x310 [ 17.535344] ? __pfx_kasan_atomics+0x10/0x10 [ 17.535374] ? __pfx_read_tsc+0x10/0x10 [ 17.535399] ? ktime_get_ts64+0x86/0x230 [ 17.535428] kunit_try_run_case+0x1a5/0x480 [ 17.535457] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.535484] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.535514] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.535542] ? __kthread_parkme+0x82/0x180 [ 17.535567] ? preempt_count_sub+0x50/0x80 [ 17.535596] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.535634] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.535663] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.535697] kthread+0x337/0x6f0 [ 17.535721] ? trace_preempt_on+0x20/0xc0 [ 17.535750] ? __pfx_kthread+0x10/0x10 [ 17.535775] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.535810] ? calculate_sigpending+0x7b/0xa0 [ 17.535840] ? __pfx_kthread+0x10/0x10 [ 17.535865] ret_from_fork+0x116/0x1d0 [ 17.535888] ? __pfx_kthread+0x10/0x10 [ 17.535913] ret_from_fork_asm+0x1a/0x30 [ 17.535950] </TASK> [ 17.535966] [ 17.544635] Allocated by task 283: [ 17.544885] kasan_save_stack+0x45/0x70 [ 17.545199] kasan_save_track+0x18/0x40 [ 17.545377] kasan_save_alloc_info+0x3b/0x50 [ 17.545633] __kasan_kmalloc+0xb7/0xc0 [ 17.545839] __kmalloc_cache_noprof+0x189/0x420 [ 17.546055] kasan_atomics+0x95/0x310 [ 17.546296] kunit_try_run_case+0x1a5/0x480 [ 17.546525] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.546826] kthread+0x337/0x6f0 [ 17.547057] ret_from_fork+0x116/0x1d0 [ 17.547278] ret_from_fork_asm+0x1a/0x30 [ 17.547474] [ 17.547561] The buggy address belongs to the object at ffff88810392bb00 [ 17.547561] which belongs to the cache kmalloc-64 of size 64 [ 17.548080] The buggy address is located 0 bytes to the right of [ 17.548080] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 17.548711] [ 17.548841] The buggy address belongs to the physical page: [ 17.549190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 17.549484] flags: 0x200000000000000(node=0|zone=2) [ 17.549675] page_type: f5(slab) [ 17.549825] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.550242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.550627] page dumped because: kasan: bad access detected [ 17.551444] [ 17.551653] Memory state around the buggy address: [ 17.551859] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.552947] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.553372] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.553708] ^ [ 17.553967] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.554963] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.555685] ================================================================== [ 17.115372] ================================================================== [ 17.115750] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 17.116223] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 17.116484] [ 17.116588] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.116638] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.116654] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.116682] Call Trace: [ 17.116702] <TASK> [ 17.116722] dump_stack_lvl+0x73/0xb0 [ 17.116758] print_report+0xd1/0x650 [ 17.116801] ? __virt_addr_valid+0x1db/0x2d0 [ 17.116829] ? kasan_atomics_helper+0x12e6/0x5450 [ 17.116856] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.116883] ? kasan_atomics_helper+0x12e6/0x5450 [ 17.116910] kasan_report+0x141/0x180 [ 17.116949] ? kasan_atomics_helper+0x12e6/0x5450 [ 17.116981] kasan_check_range+0x10c/0x1c0 [ 17.117022] __kasan_check_write+0x18/0x20 [ 17.117046] kasan_atomics_helper+0x12e6/0x5450 [ 17.117074] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.117114] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.117145] ? kasan_atomics+0x152/0x310 [ 17.117178] kasan_atomics+0x1dc/0x310 [ 17.117206] ? __pfx_kasan_atomics+0x10/0x10 [ 17.117234] ? __pfx_read_tsc+0x10/0x10 [ 17.117261] ? ktime_get_ts64+0x86/0x230 [ 17.117300] kunit_try_run_case+0x1a5/0x480 [ 17.117328] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.117372] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.117401] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.117429] ? __kthread_parkme+0x82/0x180 [ 17.117454] ? preempt_count_sub+0x50/0x80 [ 17.117483] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.117511] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.117539] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.117566] kthread+0x337/0x6f0 [ 17.117590] ? trace_preempt_on+0x20/0xc0 [ 17.117618] ? __pfx_kthread+0x10/0x10 [ 17.117654] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.117680] ? calculate_sigpending+0x7b/0xa0 [ 17.117721] ? __pfx_kthread+0x10/0x10 [ 17.117747] ret_from_fork+0x116/0x1d0 [ 17.117770] ? __pfx_kthread+0x10/0x10 [ 17.117804] ret_from_fork_asm+0x1a/0x30 [ 17.117841] </TASK> [ 17.117855] [ 17.130535] Allocated by task 283: [ 17.131219] kasan_save_stack+0x45/0x70 [ 17.131559] kasan_save_track+0x18/0x40 [ 17.131735] kasan_save_alloc_info+0x3b/0x50 [ 17.131969] __kasan_kmalloc+0xb7/0xc0 [ 17.132469] __kmalloc_cache_noprof+0x189/0x420 [ 17.132990] kasan_atomics+0x95/0x310 [ 17.133563] kunit_try_run_case+0x1a5/0x480 [ 17.134056] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.134558] kthread+0x337/0x6f0 [ 17.134718] ret_from_fork+0x116/0x1d0 [ 17.134899] ret_from_fork_asm+0x1a/0x30 [ 17.135069] [ 17.135604] The buggy address belongs to the object at ffff88810392bb00 [ 17.135604] which belongs to the cache kmalloc-64 of size 64 [ 17.137251] The buggy address is located 0 bytes to the right of [ 17.137251] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 17.138877] [ 17.138991] The buggy address belongs to the physical page: [ 17.139549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 17.140744] flags: 0x200000000000000(node=0|zone=2) [ 17.141468] page_type: f5(slab) [ 17.141639] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.141927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.142635] page dumped because: kasan: bad access detected [ 17.143116] [ 17.143241] Memory state around the buggy address: [ 17.143501] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.143868] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.144585] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.145390] ^ [ 17.145735] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.146606] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.147142] ================================================================== [ 17.172272] ================================================================== [ 17.172554] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 17.174899] Read of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 17.175982] [ 17.176558] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.176627] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.176647] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.176678] Call Trace: [ 17.176704] <TASK> [ 17.176730] dump_stack_lvl+0x73/0xb0 [ 17.176774] print_report+0xd1/0x650 [ 17.176820] ? __virt_addr_valid+0x1db/0x2d0 [ 17.176850] ? kasan_atomics_helper+0x13b5/0x5450 [ 17.176878] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.176907] ? kasan_atomics_helper+0x13b5/0x5450 [ 17.176934] kasan_report+0x141/0x180 [ 17.176961] ? kasan_atomics_helper+0x13b5/0x5450 [ 17.176993] kasan_check_range+0x10c/0x1c0 [ 17.177021] __kasan_check_read+0x15/0x20 [ 17.177045] kasan_atomics_helper+0x13b5/0x5450 [ 17.177433] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.177480] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.177514] ? kasan_atomics+0x152/0x310 [ 17.177547] kasan_atomics+0x1dc/0x310 [ 17.177576] ? __pfx_kasan_atomics+0x10/0x10 [ 17.177606] ? __pfx_read_tsc+0x10/0x10 [ 17.177634] ? ktime_get_ts64+0x86/0x230 [ 17.177665] kunit_try_run_case+0x1a5/0x480 [ 17.177695] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.177722] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.177753] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.177781] ? __kthread_parkme+0x82/0x180 [ 17.177828] ? preempt_count_sub+0x50/0x80 [ 17.177859] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.177888] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.177914] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.177943] kthread+0x337/0x6f0 [ 17.177968] ? trace_preempt_on+0x20/0xc0 [ 17.177996] ? __pfx_kthread+0x10/0x10 [ 17.178022] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.178049] ? calculate_sigpending+0x7b/0xa0 [ 17.178107] ? __pfx_kthread+0x10/0x10 [ 17.178133] ret_from_fork+0x116/0x1d0 [ 17.178160] ? __pfx_kthread+0x10/0x10 [ 17.178185] ret_from_fork_asm+0x1a/0x30 [ 17.178224] </TASK> [ 17.178242] [ 17.191170] Allocated by task 283: [ 17.191410] kasan_save_stack+0x45/0x70 [ 17.191802] kasan_save_track+0x18/0x40 [ 17.192115] kasan_save_alloc_info+0x3b/0x50 [ 17.192373] __kasan_kmalloc+0xb7/0xc0 [ 17.192745] __kmalloc_cache_noprof+0x189/0x420 [ 17.193103] kasan_atomics+0x95/0x310 [ 17.193519] kunit_try_run_case+0x1a5/0x480 [ 17.193739] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.194267] kthread+0x337/0x6f0 [ 17.194481] ret_from_fork+0x116/0x1d0 [ 17.194774] ret_from_fork_asm+0x1a/0x30 [ 17.195037] [ 17.195157] The buggy address belongs to the object at ffff88810392bb00 [ 17.195157] which belongs to the cache kmalloc-64 of size 64 [ 17.195941] The buggy address is located 0 bytes to the right of [ 17.195941] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 17.196700] [ 17.197056] The buggy address belongs to the physical page: [ 17.197386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 17.197805] flags: 0x200000000000000(node=0|zone=2) [ 17.198390] page_type: f5(slab) [ 17.198767] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.199253] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.199514] page dumped because: kasan: bad access detected [ 17.199711] [ 17.199806] Memory state around the buggy address: [ 17.200052] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.200399] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.200873] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.201168] ^ [ 17.201440] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.201815] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.202163] ================================================================== [ 17.556948] ================================================================== [ 17.557915] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 17.558515] Read of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 17.559108] [ 17.559246] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 17.559301] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.559319] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.559348] Call Trace: [ 17.559372] <TASK> [ 17.559395] dump_stack_lvl+0x73/0xb0 [ 17.559434] print_report+0xd1/0x650 [ 17.559463] ? __virt_addr_valid+0x1db/0x2d0 [ 17.559491] ? kasan_atomics_helper+0x4f30/0x5450 [ 17.559518] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.559546] ? kasan_atomics_helper+0x4f30/0x5450 [ 17.559575] kasan_report+0x141/0x180 [ 17.559604] ? kasan_atomics_helper+0x4f30/0x5450 [ 17.559636] __asan_report_load8_noabort+0x18/0x20 [ 17.559667] kasan_atomics_helper+0x4f30/0x5450 [ 17.559695] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.559723] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.559754] ? kasan_atomics+0x152/0x310 [ 17.560011] kasan_atomics+0x1dc/0x310 [ 17.560056] ? __pfx_kasan_atomics+0x10/0x10 [ 17.560105] ? __pfx_read_tsc+0x10/0x10 [ 17.560189] ? ktime_get_ts64+0x86/0x230 [ 17.560222] kunit_try_run_case+0x1a5/0x480 [ 17.560252] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.560280] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.560310] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.560339] ? __kthread_parkme+0x82/0x180 [ 17.560364] ? preempt_count_sub+0x50/0x80 [ 17.560394] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.560422] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.560451] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.560480] kthread+0x337/0x6f0 [ 17.560504] ? trace_preempt_on+0x20/0xc0 [ 17.560533] ? __pfx_kthread+0x10/0x10 [ 17.560558] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.560585] ? calculate_sigpending+0x7b/0xa0 [ 17.560616] ? __pfx_kthread+0x10/0x10 [ 17.560642] ret_from_fork+0x116/0x1d0 [ 17.560667] ? __pfx_kthread+0x10/0x10 [ 17.560692] ret_from_fork_asm+0x1a/0x30 [ 17.560730] </TASK> [ 17.560745] [ 17.575555] Allocated by task 283: [ 17.575979] kasan_save_stack+0x45/0x70 [ 17.576644] kasan_save_track+0x18/0x40 [ 17.576967] kasan_save_alloc_info+0x3b/0x50 [ 17.577494] __kasan_kmalloc+0xb7/0xc0 [ 17.577856] __kmalloc_cache_noprof+0x189/0x420 [ 17.578703] kasan_atomics+0x95/0x310 [ 17.578945] kunit_try_run_case+0x1a5/0x480 [ 17.579317] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.579749] kthread+0x337/0x6f0 [ 17.579950] ret_from_fork+0x116/0x1d0 [ 17.580464] ret_from_fork_asm+0x1a/0x30 [ 17.580930] [ 17.581209] The buggy address belongs to the object at ffff88810392bb00 [ 17.581209] which belongs to the cache kmalloc-64 of size 64 [ 17.581828] The buggy address is located 0 bytes to the right of [ 17.581828] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 17.582983] [ 17.583253] The buggy address belongs to the physical page: [ 17.583685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 17.584583] flags: 0x200000000000000(node=0|zone=2) [ 17.584953] page_type: f5(slab) [ 17.585300] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.585870] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.586584] page dumped because: kasan: bad access detected [ 17.586907] [ 17.587014] Memory state around the buggy address: [ 17.587525] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.588247] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.588781] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.589726] ^ [ 17.590184] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.590846] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.591531] ================================================================== [ 16.893741] ================================================================== [ 16.894247] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 16.894763] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283 [ 16.895070] [ 16.895178] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.895229] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.895246] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.895273] Call Trace: [ 16.895296] <TASK> [ 16.895316] dump_stack_lvl+0x73/0xb0 [ 16.895351] print_report+0xd1/0x650 [ 16.895378] ? __virt_addr_valid+0x1db/0x2d0 [ 16.895407] ? kasan_atomics_helper+0xf10/0x5450 [ 16.895432] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.895459] ? kasan_atomics_helper+0xf10/0x5450 [ 16.895498] kasan_report+0x141/0x180 [ 16.895524] ? kasan_atomics_helper+0xf10/0x5450 [ 16.895556] kasan_check_range+0x10c/0x1c0 [ 16.895586] __kasan_check_write+0x18/0x20 [ 16.895614] kasan_atomics_helper+0xf10/0x5450 [ 16.895642] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.895670] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.895702] ? kasan_atomics+0x152/0x310 [ 16.895735] kasan_atomics+0x1dc/0x310 [ 16.895763] ? __pfx_kasan_atomics+0x10/0x10 [ 16.895806] ? __pfx_read_tsc+0x10/0x10 [ 16.895833] ? ktime_get_ts64+0x86/0x230 [ 16.895863] kunit_try_run_case+0x1a5/0x480 [ 16.895891] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.895919] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.895949] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.895978] ? __kthread_parkme+0x82/0x180 [ 16.896002] ? preempt_count_sub+0x50/0x80 [ 16.896034] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.896064] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.896093] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.896121] kthread+0x337/0x6f0 [ 16.896146] ? trace_preempt_on+0x20/0xc0 [ 16.896174] ? __pfx_kthread+0x10/0x10 [ 16.896200] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.896236] ? calculate_sigpending+0x7b/0xa0 [ 16.896265] ? __pfx_kthread+0x10/0x10 [ 16.896292] ret_from_fork+0x116/0x1d0 [ 16.896316] ? __pfx_kthread+0x10/0x10 [ 16.896342] ret_from_fork_asm+0x1a/0x30 [ 16.896380] </TASK> [ 16.896395] [ 16.905760] Allocated by task 283: [ 16.905935] kasan_save_stack+0x45/0x70 [ 16.906131] kasan_save_track+0x18/0x40 [ 16.906363] kasan_save_alloc_info+0x3b/0x50 [ 16.906607] __kasan_kmalloc+0xb7/0xc0 [ 16.906837] __kmalloc_cache_noprof+0x189/0x420 [ 16.907069] kasan_atomics+0x95/0x310 [ 16.907270] kunit_try_run_case+0x1a5/0x480 [ 16.907462] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.907761] kthread+0x337/0x6f0 [ 16.907923] ret_from_fork+0x116/0x1d0 [ 16.908084] ret_from_fork_asm+0x1a/0x30 [ 16.908246] [ 16.908333] The buggy address belongs to the object at ffff88810392bb00 [ 16.908333] which belongs to the cache kmalloc-64 of size 64 [ 16.908742] The buggy address is located 0 bytes to the right of [ 16.908742] allocated 48-byte region [ffff88810392bb00, ffff88810392bb30) [ 16.913257] [ 16.913721] The buggy address belongs to the physical page: [ 16.914876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b [ 16.915938] flags: 0x200000000000000(node=0|zone=2) [ 16.916846] page_type: f5(slab) [ 16.918148] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.919234] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.919932] page dumped because: kasan: bad access detected [ 16.920261] [ 16.920361] Memory state around the buggy address: [ 16.920605] ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.920956] ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.921323] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.921693] ^ [ 16.921951] ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.922351] ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.922627] ==================================================================