Date
July 2, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 21.179495] ================================================================== [ 21.179565] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 21.179801] Read of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265 [ 21.179883] [ 21.180017] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.180107] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.180219] Hardware name: linux,dummy-virt (DT) [ 21.180507] Call trace: [ 21.180589] show_stack+0x20/0x38 (C) [ 21.180808] dump_stack_lvl+0x8c/0xd0 [ 21.181118] print_report+0x118/0x608 [ 21.181200] kasan_report+0xdc/0x128 [ 21.181455] __asan_report_load8_noabort+0x20/0x30 [ 21.181635] kasan_atomics_helper+0x3db0/0x4858 [ 21.181841] kasan_atomics+0x198/0x2e0 [ 21.181940] kunit_try_run_case+0x170/0x3f0 [ 21.182288] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.182418] kthread+0x328/0x630 [ 21.182515] ret_from_fork+0x10/0x20 [ 21.182966] [ 21.183031] Allocated by task 265: [ 21.183150] kasan_save_stack+0x3c/0x68 [ 21.183432] kasan_save_track+0x20/0x40 [ 21.183600] kasan_save_alloc_info+0x40/0x58 [ 21.183902] __kasan_kmalloc+0xd4/0xd8 [ 21.184129] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.184215] kasan_atomics+0xb8/0x2e0 [ 21.184388] kunit_try_run_case+0x170/0x3f0 [ 21.184476] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.184777] kthread+0x328/0x630 [ 21.184981] ret_from_fork+0x10/0x20 [ 21.185263] [ 21.185436] The buggy address belongs to the object at fff00000c58ac280 [ 21.185436] which belongs to the cache kmalloc-64 of size 64 [ 21.185672] The buggy address is located 0 bytes to the right of [ 21.185672] allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0) [ 21.185878] [ 21.185947] The buggy address belongs to the physical page: [ 21.186017] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac [ 21.186227] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.186452] page_type: f5(slab) [ 21.186535] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.186883] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.187071] page dumped because: kasan: bad access detected [ 21.187123] [ 21.187145] Memory state around the buggy address: [ 21.187370] fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.187506] fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.188181] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.188424] ^ [ 21.188494] fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.188813] fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.188864] ================================================================== [ 21.037799] ================================================================== [ 21.037851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 21.037957] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265 [ 21.038011] [ 21.038045] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.038620] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.038674] Hardware name: linux,dummy-virt (DT) [ 21.038708] Call trace: [ 21.038914] show_stack+0x20/0x38 (C) [ 21.038980] dump_stack_lvl+0x8c/0xd0 [ 21.039031] print_report+0x118/0x608 [ 21.039077] kasan_report+0xdc/0x128 [ 21.039126] kasan_check_range+0x100/0x1a8 [ 21.039358] __kasan_check_write+0x20/0x30 [ 21.039486] kasan_atomics_helper+0xf88/0x4858 [ 21.039543] kasan_atomics+0x198/0x2e0 [ 21.039612] kunit_try_run_case+0x170/0x3f0 [ 21.039663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.039723] kthread+0x328/0x630 [ 21.039766] ret_from_fork+0x10/0x20 [ 21.039819] [ 21.039841] Allocated by task 265: [ 21.039871] kasan_save_stack+0x3c/0x68 [ 21.039925] kasan_save_track+0x20/0x40 [ 21.039973] kasan_save_alloc_info+0x40/0x58 [ 21.040016] __kasan_kmalloc+0xd4/0xd8 [ 21.040060] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.040103] kasan_atomics+0xb8/0x2e0 [ 21.040139] kunit_try_run_case+0x170/0x3f0 [ 21.040177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.040231] kthread+0x328/0x630 [ 21.040267] ret_from_fork+0x10/0x20 [ 21.040305] [ 21.040337] The buggy address belongs to the object at fff00000c58ac280 [ 21.040337] which belongs to the cache kmalloc-64 of size 64 [ 21.040398] The buggy address is located 0 bytes to the right of [ 21.040398] allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0) [ 21.040462] [ 21.040484] The buggy address belongs to the physical page: [ 21.040517] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac [ 21.040569] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.040628] page_type: f5(slab) [ 21.040670] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.040750] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.041065] page dumped because: kasan: bad access detected [ 21.041322] [ 21.041758] Memory state around the buggy address: [ 21.042169] fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.042243] fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.042312] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.042525] ^ [ 21.042714] fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.043086] fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.043173] ================================================================== [ 20.875551] ================================================================== [ 20.875773] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 20.876027] Write of size 4 at addr fff00000c58ac2b0 by task kunit_try_catch/265 [ 20.876264] [ 20.876349] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.876445] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.876520] Hardware name: linux,dummy-virt (DT) [ 20.876591] Call trace: [ 20.876643] show_stack+0x20/0x38 (C) [ 20.877162] dump_stack_lvl+0x8c/0xd0 [ 20.877372] print_report+0x118/0x608 [ 20.877479] kasan_report+0xdc/0x128 [ 20.877717] kasan_check_range+0x100/0x1a8 [ 20.877908] __kasan_check_write+0x20/0x30 [ 20.878023] kasan_atomics_helper+0xa04/0x4858 [ 20.878094] kasan_atomics+0x198/0x2e0 [ 20.878293] kunit_try_run_case+0x170/0x3f0 [ 20.878490] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.878701] kthread+0x328/0x630 [ 20.878803] ret_from_fork+0x10/0x20 [ 20.878925] [ 20.879025] Allocated by task 265: [ 20.879057] kasan_save_stack+0x3c/0x68 [ 20.879411] kasan_save_track+0x20/0x40 [ 20.879528] kasan_save_alloc_info+0x40/0x58 [ 20.879659] __kasan_kmalloc+0xd4/0xd8 [ 20.879734] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.879858] kasan_atomics+0xb8/0x2e0 [ 20.879938] kunit_try_run_case+0x170/0x3f0 [ 20.879997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.880228] kthread+0x328/0x630 [ 20.880324] ret_from_fork+0x10/0x20 [ 20.880544] [ 20.880676] The buggy address belongs to the object at fff00000c58ac280 [ 20.880676] which belongs to the cache kmalloc-64 of size 64 [ 20.880740] The buggy address is located 0 bytes to the right of [ 20.880740] allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0) [ 20.880805] [ 20.880833] The buggy address belongs to the physical page: [ 20.880867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac [ 20.881120] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.881402] page_type: f5(slab) [ 20.881496] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.881695] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.881763] page dumped because: kasan: bad access detected [ 20.881804] [ 20.881839] Memory state around the buggy address: [ 20.881874] fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.881919] fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.881966] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.882022] ^ [ 20.882058] fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.882102] fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.882142] ================================================================== [ 20.991671] ================================================================== [ 20.991720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 20.991801] Read of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265 [ 20.992039] [ 20.992083] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.992528] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.992624] Hardware name: linux,dummy-virt (DT) [ 20.992661] Call trace: [ 20.992686] show_stack+0x20/0x38 (C) [ 20.992794] dump_stack_lvl+0x8c/0xd0 [ 20.992844] print_report+0x118/0x608 [ 20.993276] kasan_report+0xdc/0x128 [ 20.993567] __asan_report_load8_noabort+0x20/0x30 [ 20.994000] kasan_atomics_helper+0x3f58/0x4858 [ 20.994266] kasan_atomics+0x198/0x2e0 [ 20.994369] kunit_try_run_case+0x170/0x3f0 [ 20.994541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.994624] kthread+0x328/0x630 [ 20.994797] ret_from_fork+0x10/0x20 [ 20.995074] [ 20.995122] Allocated by task 265: [ 20.995328] kasan_save_stack+0x3c/0x68 [ 20.995558] kasan_save_track+0x20/0x40 [ 20.995671] kasan_save_alloc_info+0x40/0x58 [ 20.995730] __kasan_kmalloc+0xd4/0xd8 [ 20.995948] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.996061] kasan_atomics+0xb8/0x2e0 [ 20.996654] kunit_try_run_case+0x170/0x3f0 [ 20.996773] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.996834] kthread+0x328/0x630 [ 20.997059] ret_from_fork+0x10/0x20 [ 20.997317] [ 20.997377] The buggy address belongs to the object at fff00000c58ac280 [ 20.997377] which belongs to the cache kmalloc-64 of size 64 [ 20.997590] The buggy address is located 0 bytes to the right of [ 20.997590] allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0) [ 20.997829] [ 20.997886] The buggy address belongs to the physical page: [ 20.997938] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac [ 20.997997] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.998205] page_type: f5(slab) [ 20.998383] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.998454] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.998499] page dumped because: kasan: bad access detected [ 20.998532] [ 20.998565] Memory state around the buggy address: [ 20.998839] fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.999014] fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.999081] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.999421] ^ [ 20.999569] fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.999632] fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.000108] ================================================================== [ 21.222471] ================================================================== [ 21.222604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 21.222760] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265 [ 21.222824] [ 21.222863] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.223165] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.223209] Hardware name: linux,dummy-virt (DT) [ 21.223244] Call trace: [ 21.223318] show_stack+0x20/0x38 (C) [ 21.223374] dump_stack_lvl+0x8c/0xd0 [ 21.223429] print_report+0x118/0x608 [ 21.223522] kasan_report+0xdc/0x128 [ 21.223584] kasan_check_range+0x100/0x1a8 [ 21.223635] __kasan_check_write+0x20/0x30 [ 21.223700] kasan_atomics_helper+0x175c/0x4858 [ 21.223752] kasan_atomics+0x198/0x2e0 [ 21.223799] kunit_try_run_case+0x170/0x3f0 [ 21.224186] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.224398] kthread+0x328/0x630 [ 21.224483] ret_from_fork+0x10/0x20 [ 21.224534] [ 21.224629] Allocated by task 265: [ 21.224662] kasan_save_stack+0x3c/0x68 [ 21.224713] kasan_save_track+0x20/0x40 [ 21.224760] kasan_save_alloc_info+0x40/0x58 [ 21.224939] __kasan_kmalloc+0xd4/0xd8 [ 21.225196] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.225291] kasan_atomics+0xb8/0x2e0 [ 21.225675] kunit_try_run_case+0x170/0x3f0 [ 21.225824] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.225925] kthread+0x328/0x630 [ 21.226006] ret_from_fork+0x10/0x20 [ 21.226136] [ 21.226160] The buggy address belongs to the object at fff00000c58ac280 [ 21.226160] which belongs to the cache kmalloc-64 of size 64 [ 21.226571] The buggy address is located 0 bytes to the right of [ 21.226571] allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0) [ 21.227044] [ 21.227169] The buggy address belongs to the physical page: [ 21.227477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac [ 21.227646] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.228196] page_type: f5(slab) [ 21.228539] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.228648] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.228703] page dumped because: kasan: bad access detected [ 21.228761] [ 21.228987] Memory state around the buggy address: [ 21.229226] fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.229598] fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.229753] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.229994] ^ [ 21.230167] fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.230290] fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.230331] ================================================================== [ 21.062403] ================================================================== [ 21.062723] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 21.063020] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265 [ 21.063145] [ 21.063180] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.063360] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.063419] Hardware name: linux,dummy-virt (DT) [ 21.063453] Call trace: [ 21.063479] show_stack+0x20/0x38 (C) [ 21.063548] dump_stack_lvl+0x8c/0xd0 [ 21.063610] print_report+0x118/0x608 [ 21.063885] kasan_report+0xdc/0x128 [ 21.064210] kasan_check_range+0x100/0x1a8 [ 21.064499] __kasan_check_write+0x20/0x30 [ 21.064619] kasan_atomics_helper+0x10c0/0x4858 [ 21.064969] kasan_atomics+0x198/0x2e0 [ 21.065184] kunit_try_run_case+0x170/0x3f0 [ 21.065324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.065608] kthread+0x328/0x630 [ 21.065843] ret_from_fork+0x10/0x20 [ 21.066155] [ 21.066250] Allocated by task 265: [ 21.066422] kasan_save_stack+0x3c/0x68 [ 21.066533] kasan_save_track+0x20/0x40 [ 21.066687] kasan_save_alloc_info+0x40/0x58 [ 21.066922] __kasan_kmalloc+0xd4/0xd8 [ 21.067090] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.067412] kasan_atomics+0xb8/0x2e0 [ 21.067683] kunit_try_run_case+0x170/0x3f0 [ 21.067894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.067943] kthread+0x328/0x630 [ 21.067979] ret_from_fork+0x10/0x20 [ 21.068157] [ 21.068227] The buggy address belongs to the object at fff00000c58ac280 [ 21.068227] which belongs to the cache kmalloc-64 of size 64 [ 21.068383] The buggy address is located 0 bytes to the right of [ 21.068383] allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0) [ 21.068454] [ 21.068488] The buggy address belongs to the physical page: [ 21.068537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac [ 21.068612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.068667] page_type: f5(slab) [ 21.068930] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.069222] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.069313] page dumped because: kasan: bad access detected [ 21.069350] [ 21.069370] Memory state around the buggy address: [ 21.069405] fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.069451] fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.069760] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.070178] ^ [ 21.070350] fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.070477] fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.070518] ================================================================== [ 21.145432] ================================================================== [ 21.145486] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 21.145535] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265 [ 21.145597] [ 21.145629] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.146103] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.146373] Hardware name: linux,dummy-virt (DT) [ 21.146417] Call trace: [ 21.146443] show_stack+0x20/0x38 (C) [ 21.146496] dump_stack_lvl+0x8c/0xd0 [ 21.146626] print_report+0x118/0x608 [ 21.146678] kasan_report+0xdc/0x128 [ 21.146731] kasan_check_range+0x100/0x1a8 [ 21.147121] __kasan_check_write+0x20/0x30 [ 21.147470] kasan_atomics_helper+0x147c/0x4858 [ 21.147627] kasan_atomics+0x198/0x2e0 [ 21.147682] kunit_try_run_case+0x170/0x3f0 [ 21.147759] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.147867] kthread+0x328/0x630 [ 21.147915] ret_from_fork+0x10/0x20 [ 21.147979] [ 21.148010] Allocated by task 265: [ 21.148293] kasan_save_stack+0x3c/0x68 [ 21.148359] kasan_save_track+0x20/0x40 [ 21.148484] kasan_save_alloc_info+0x40/0x58 [ 21.148538] __kasan_kmalloc+0xd4/0xd8 [ 21.148716] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.148929] kasan_atomics+0xb8/0x2e0 [ 21.149045] kunit_try_run_case+0x170/0x3f0 [ 21.149098] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.149151] kthread+0x328/0x630 [ 21.149340] ret_from_fork+0x10/0x20 [ 21.149572] [ 21.150006] The buggy address belongs to the object at fff00000c58ac280 [ 21.150006] which belongs to the cache kmalloc-64 of size 64 [ 21.150160] The buggy address is located 0 bytes to the right of [ 21.150160] allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0) [ 21.150514] [ 21.150731] The buggy address belongs to the physical page: [ 21.151013] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac [ 21.151356] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.151773] page_type: f5(slab) [ 21.151848] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.152058] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.152220] page dumped because: kasan: bad access detected [ 21.152560] [ 21.152690] Memory state around the buggy address: [ 21.152749] fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.152818] fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.153027] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.153271] ^ [ 21.153316] fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.153362] fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.153400] ================================================================== [ 21.018222] ================================================================== [ 21.018490] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 21.018757] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265 [ 21.018833] [ 21.019382] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.019603] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.019646] Hardware name: linux,dummy-virt (DT) [ 21.019704] Call trace: [ 21.019832] show_stack+0x20/0x38 (C) [ 21.019890] dump_stack_lvl+0x8c/0xd0 [ 21.019937] print_report+0x118/0x608 [ 21.020015] kasan_report+0xdc/0x128 [ 21.020080] kasan_check_range+0x100/0x1a8 [ 21.020539] __kasan_check_write+0x20/0x30 [ 21.020634] kasan_atomics_helper+0xeb8/0x4858 [ 21.020724] kasan_atomics+0x198/0x2e0 [ 21.020794] kunit_try_run_case+0x170/0x3f0 [ 21.020890] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.021049] kthread+0x328/0x630 [ 21.021119] ret_from_fork+0x10/0x20 [ 21.021414] [ 21.021513] Allocated by task 265: [ 21.021967] kasan_save_stack+0x3c/0x68 [ 21.022059] kasan_save_track+0x20/0x40 [ 21.022194] kasan_save_alloc_info+0x40/0x58 [ 21.022259] __kasan_kmalloc+0xd4/0xd8 [ 21.022559] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.022682] kasan_atomics+0xb8/0x2e0 [ 21.022723] kunit_try_run_case+0x170/0x3f0 [ 21.022927] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.022977] kthread+0x328/0x630 [ 21.023013] ret_from_fork+0x10/0x20 [ 21.023052] [ 21.023075] The buggy address belongs to the object at fff00000c58ac280 [ 21.023075] which belongs to the cache kmalloc-64 of size 64 [ 21.023146] The buggy address is located 0 bytes to the right of [ 21.023146] allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0) [ 21.023217] [ 21.023241] The buggy address belongs to the physical page: [ 21.023303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac [ 21.023366] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.023416] page_type: f5(slab) [ 21.023456] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.023513] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.023556] page dumped because: kasan: bad access detected [ 21.023633] [ 21.023688] Memory state around the buggy address: [ 21.023766] fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.023848] fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.024447] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.024797] ^ [ 21.025078] fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.025298] fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.025640] ================================================================== [ 21.127055] ================================================================== [ 21.127230] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 21.127290] Read of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265 [ 21.127364] [ 21.127396] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.127488] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.127520] Hardware name: linux,dummy-virt (DT) [ 21.127554] Call trace: [ 21.127591] show_stack+0x20/0x38 (C) [ 21.127643] dump_stack_lvl+0x8c/0xd0 [ 21.127695] print_report+0x118/0x608 [ 21.127741] kasan_report+0xdc/0x128 [ 21.127790] __asan_report_load8_noabort+0x20/0x30 [ 21.127847] kasan_atomics_helper+0x3f04/0x4858 [ 21.127898] kasan_atomics+0x198/0x2e0 [ 21.127946] kunit_try_run_case+0x170/0x3f0 [ 21.127993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.128057] kthread+0x328/0x630 [ 21.128107] ret_from_fork+0x10/0x20 [ 21.128163] [ 21.128184] Allocated by task 265: [ 21.128223] kasan_save_stack+0x3c/0x68 [ 21.128265] kasan_save_track+0x20/0x40 [ 21.128305] kasan_save_alloc_info+0x40/0x58 [ 21.128345] __kasan_kmalloc+0xd4/0xd8 [ 21.128383] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.128433] kasan_atomics+0xb8/0x2e0 [ 21.128470] kunit_try_run_case+0x170/0x3f0 [ 21.128518] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.128563] kthread+0x328/0x630 [ 21.128605] ret_from_fork+0x10/0x20 [ 21.128666] [ 21.128688] The buggy address belongs to the object at fff00000c58ac280 [ 21.128688] which belongs to the cache kmalloc-64 of size 64 [ 21.129004] The buggy address is located 0 bytes to the right of [ 21.129004] allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0) [ 21.129446] [ 21.129604] The buggy address belongs to the physical page: [ 21.130279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac [ 21.130371] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.130445] page_type: f5(slab) [ 21.130864] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.131077] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.131442] page dumped because: kasan: bad access detected [ 21.131518] [ 21.132028] Memory state around the buggy address: [ 21.132500] fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.132555] fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.132746] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.132861] ^ [ 21.133068] fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.133288] fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.133487] ================================================================== [ 20.976078] ================================================================== [ 20.976152] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 20.976213] Read of size 4 at addr fff00000c58ac2b0 by task kunit_try_catch/265 [ 20.976355] [ 20.976390] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.976474] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.976509] Hardware name: linux,dummy-virt (DT) [ 20.976679] Call trace: [ 20.976715] show_stack+0x20/0x38 (C) [ 20.976769] dump_stack_lvl+0x8c/0xd0 [ 20.976819] print_report+0x118/0x608 [ 20.976866] kasan_report+0xdc/0x128 [ 20.976914] __asan_report_load4_noabort+0x20/0x30 [ 20.977107] kasan_atomics_helper+0x3e04/0x4858 [ 20.977176] kasan_atomics+0x198/0x2e0 [ 20.977223] kunit_try_run_case+0x170/0x3f0 [ 20.977273] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.977327] kthread+0x328/0x630 [ 20.977370] ret_from_fork+0x10/0x20 [ 20.977421] [ 20.977451] Allocated by task 265: [ 20.977481] kasan_save_stack+0x3c/0x68 [ 20.977522] kasan_save_track+0x20/0x40 [ 20.977562] kasan_save_alloc_info+0x40/0x58 [ 20.978276] __kasan_kmalloc+0xd4/0xd8 [ 20.978380] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.978469] kasan_atomics+0xb8/0x2e0 [ 20.978690] kunit_try_run_case+0x170/0x3f0 [ 20.978822] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.978979] kthread+0x328/0x630 [ 20.979228] ret_from_fork+0x10/0x20 [ 20.979429] [ 20.979457] The buggy address belongs to the object at fff00000c58ac280 [ 20.979457] which belongs to the cache kmalloc-64 of size 64 [ 20.979720] The buggy address is located 0 bytes to the right of [ 20.979720] allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0) [ 20.980016] [ 20.980146] The buggy address belongs to the physical page: [ 20.980246] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac [ 20.980321] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.980572] page_type: f5(slab) [ 20.980809] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.981025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.981128] page dumped because: kasan: bad access detected [ 20.981346] [ 20.981415] Memory state around the buggy address: [ 20.981629] fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.981735] fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.981809] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.981952] ^ [ 20.982008] fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.982086] fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.982232] ================================================================== [ 20.966545] ================================================================== [ 20.966743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 20.966807] Write of size 4 at addr fff00000c58ac2b0 by task kunit_try_catch/265 [ 20.967159] [ 20.967212] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.967310] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.967714] Hardware name: linux,dummy-virt (DT) [ 20.967767] Call trace: [ 20.967876] show_stack+0x20/0x38 (C) [ 20.968013] dump_stack_lvl+0x8c/0xd0 [ 20.968081] print_report+0x118/0x608 [ 20.968129] kasan_report+0xdc/0x128 [ 20.968364] kasan_check_range+0x100/0x1a8 [ 20.968591] __kasan_check_write+0x20/0x30 [ 20.968877] kasan_atomics_helper+0xd3c/0x4858 [ 20.969099] kasan_atomics+0x198/0x2e0 [ 20.969180] kunit_try_run_case+0x170/0x3f0 [ 20.969322] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.969380] kthread+0x328/0x630 [ 20.969426] ret_from_fork+0x10/0x20 [ 20.969481] [ 20.969501] Allocated by task 265: [ 20.969695] kasan_save_stack+0x3c/0x68 [ 20.969843] kasan_save_track+0x20/0x40 [ 20.970010] kasan_save_alloc_info+0x40/0x58 [ 20.970234] __kasan_kmalloc+0xd4/0xd8 [ 20.970404] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.970699] kasan_atomics+0xb8/0x2e0 [ 20.971091] kunit_try_run_case+0x170/0x3f0 [ 20.971310] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.971444] kthread+0x328/0x630 [ 20.971714] ret_from_fork+0x10/0x20 [ 20.971802] [ 20.972005] The buggy address belongs to the object at fff00000c58ac280 [ 20.972005] which belongs to the cache kmalloc-64 of size 64 [ 20.972125] The buggy address is located 0 bytes to the right of [ 20.972125] allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0) [ 20.972441] [ 20.972735] The buggy address belongs to the physical page: [ 20.972782] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac [ 20.973021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.973247] page_type: f5(slab) [ 20.973303] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.973423] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.973515] page dumped because: kasan: bad access detected [ 20.973653] [ 20.973675] Memory state around the buggy address: [ 20.973709] fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.973754] fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.973990] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.974074] ^ [ 20.974348] fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.974609] fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.975136] ================================================================== [ 21.154540] ================================================================== [ 21.154695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 21.154750] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265 [ 21.154803] [ 21.154837] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.155228] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.155272] Hardware name: linux,dummy-virt (DT) [ 21.155451] Call trace: [ 21.155488] show_stack+0x20/0x38 (C) [ 21.155542] dump_stack_lvl+0x8c/0xd0 [ 21.155784] print_report+0x118/0x608 [ 21.155900] kasan_report+0xdc/0x128 [ 21.155984] kasan_check_range+0x100/0x1a8 [ 21.156034] __kasan_check_write+0x20/0x30 [ 21.156088] kasan_atomics_helper+0x14e4/0x4858 [ 21.156339] kasan_atomics+0x198/0x2e0 [ 21.156592] kunit_try_run_case+0x170/0x3f0 [ 21.156645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.156923] kthread+0x328/0x630 [ 21.156989] ret_from_fork+0x10/0x20 [ 21.157374] [ 21.157694] Allocated by task 265: [ 21.157846] kasan_save_stack+0x3c/0x68 [ 21.157944] kasan_save_track+0x20/0x40 [ 21.158071] kasan_save_alloc_info+0x40/0x58 [ 21.158119] __kasan_kmalloc+0xd4/0xd8 [ 21.158167] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.158215] kasan_atomics+0xb8/0x2e0 [ 21.158282] kunit_try_run_case+0x170/0x3f0 [ 21.158325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.158372] kthread+0x328/0x630 [ 21.158407] ret_from_fork+0x10/0x20 [ 21.158445] [ 21.158478] The buggy address belongs to the object at fff00000c58ac280 [ 21.158478] which belongs to the cache kmalloc-64 of size 64 [ 21.158540] The buggy address is located 0 bytes to the right of [ 21.158540] allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0) [ 21.158618] [ 21.158657] The buggy address belongs to the physical page: [ 21.158723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac [ 21.158799] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.158852] page_type: f5(slab) [ 21.158894] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.158953] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.158996] page dumped because: kasan: bad access detected [ 21.159036] [ 21.159065] Memory state around the buggy address: [ 21.159098] fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.159145] fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.159190] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.159235] ^ [ 21.159271] fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.159326] fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.159365] ================================================================== [ 21.230952] ================================================================== [ 21.231281] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 21.231450] Read of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265 [ 21.231512] [ 21.231545] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.231803] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.231837] Hardware name: linux,dummy-virt (DT) [ 21.232012] Call trace: [ 21.232059] show_stack+0x20/0x38 (C) [ 21.232113] dump_stack_lvl+0x8c/0xd0 [ 21.232223] print_report+0x118/0x608 [ 21.232290] kasan_report+0xdc/0x128 [ 21.232346] __asan_report_load8_noabort+0x20/0x30 [ 21.232525] kasan_atomics_helper+0x3e20/0x4858 [ 21.232605] kasan_atomics+0x198/0x2e0 [ 21.232826] kunit_try_run_case+0x170/0x3f0 [ 21.233202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.233296] kthread+0x328/0x630 [ 21.233427] ret_from_fork+0x10/0x20 [ 21.233661] [ 21.233695] Allocated by task 265: [ 21.233726] kasan_save_stack+0x3c/0x68 [ 21.233772] kasan_save_track+0x20/0x40 [ 21.233919] kasan_save_alloc_info+0x40/0x58 [ 21.234103] __kasan_kmalloc+0xd4/0xd8 [ 21.234200] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.234596] kasan_atomics+0xb8/0x2e0 [ 21.234735] kunit_try_run_case+0x170/0x3f0 [ 21.234877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.234955] kthread+0x328/0x630 [ 21.235000] ret_from_fork+0x10/0x20 [ 21.235046] [ 21.235210] The buggy address belongs to the object at fff00000c58ac280 [ 21.235210] which belongs to the cache kmalloc-64 of size 64 [ 21.235609] The buggy address is located 0 bytes to the right of [ 21.235609] allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0) [ 21.235769] [ 21.235837] The buggy address belongs to the physical page: [ 21.235879] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac [ 21.236056] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.236453] page_type: f5(slab) [ 21.236663] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.236742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.236793] page dumped because: kasan: bad access detected [ 21.236828] [ 21.236847] Memory state around the buggy address: [ 21.237080] fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.237302] fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.237484] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.237530] ^ [ 21.237566] fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.237624] fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.237792] ================================================================== [ 21.080055] ================================================================== [ 21.080126] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 21.080177] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265 [ 21.080521] [ 21.080596] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.080777] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.081301] Hardware name: linux,dummy-virt (DT) [ 21.081421] Call trace: [ 21.081511] show_stack+0x20/0x38 (C) [ 21.082104] dump_stack_lvl+0x8c/0xd0 [ 21.082169] print_report+0x118/0x608 [ 21.082414] kasan_report+0xdc/0x128 [ 21.082678] kasan_check_range+0x100/0x1a8 [ 21.082906] __kasan_check_write+0x20/0x30 [ 21.083146] kasan_atomics_helper+0x1190/0x4858 [ 21.083241] kasan_atomics+0x198/0x2e0 [ 21.083494] kunit_try_run_case+0x170/0x3f0 [ 21.083707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.084067] kthread+0x328/0x630 [ 21.084156] ret_from_fork+0x10/0x20 [ 21.084301] [ 21.084325] Allocated by task 265: [ 21.084355] kasan_save_stack+0x3c/0x68 [ 21.084705] kasan_save_track+0x20/0x40 [ 21.085230] kasan_save_alloc_info+0x40/0x58 [ 21.085515] __kasan_kmalloc+0xd4/0xd8 [ 21.085596] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.085639] kasan_atomics+0xb8/0x2e0 [ 21.085684] kunit_try_run_case+0x170/0x3f0 [ 21.085723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.085992] kthread+0x328/0x630 [ 21.086275] ret_from_fork+0x10/0x20 [ 21.086453] [ 21.086634] The buggy address belongs to the object at fff00000c58ac280 [ 21.086634] which belongs to the cache kmalloc-64 of size 64 [ 21.087061] The buggy address is located 0 bytes to the right of [ 21.087061] allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0) [ 21.087139] [ 21.087342] The buggy address belongs to the physical page: [ 21.087386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac [ 21.087754] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.088007] page_type: f5(slab) [ 21.088053] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.088340] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.088518] page dumped because: kasan: bad access detected [ 21.088598] [ 21.088754] Memory state around the buggy address: [ 21.088803] fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.088858] fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.088904] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.089323] ^ [ 21.089584] fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.089675] fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.089717] ================================================================== [ 21.238383] ================================================================== [ 21.238435] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 21.238487] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265 [ 21.238539] [ 21.238611] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.238696] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.238725] Hardware name: linux,dummy-virt (DT) [ 21.238761] Call trace: [ 21.238794] show_stack+0x20/0x38 (C) [ 21.238855] dump_stack_lvl+0x8c/0xd0 [ 21.238902] print_report+0x118/0x608 [ 21.238951] kasan_report+0xdc/0x128 [ 21.238997] kasan_check_range+0x100/0x1a8 [ 21.239056] __kasan_check_write+0x20/0x30 [ 21.239103] kasan_atomics_helper+0x17ec/0x4858 [ 21.239158] kasan_atomics+0x198/0x2e0 [ 21.239204] kunit_try_run_case+0x170/0x3f0 [ 21.239252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.239304] kthread+0x328/0x630 [ 21.239347] ret_from_fork+0x10/0x20 [ 21.239404] [ 21.239425] Allocated by task 265: [ 21.239452] kasan_save_stack+0x3c/0x68 [ 21.239494] kasan_save_track+0x20/0x40 [ 21.239532] kasan_save_alloc_info+0x40/0x58 [ 21.239656] __kasan_kmalloc+0xd4/0xd8 [ 21.239915] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.240882] kasan_atomics+0xb8/0x2e0 [ 21.240975] kunit_try_run_case+0x170/0x3f0 [ 21.241063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.241149] kthread+0x328/0x630 [ 21.241201] ret_from_fork+0x10/0x20 [ 21.241278] [ 21.241466] The buggy address belongs to the object at fff00000c58ac280 [ 21.241466] which belongs to the cache kmalloc-64 of size 64 [ 21.241550] The buggy address is located 0 bytes to the right of [ 21.241550] allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0) [ 21.242244] [ 21.242288] The buggy address belongs to the physical page: [ 21.242497] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac [ 21.242821] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.243220] page_type: f5(slab) [ 21.243345] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.243405] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.243650] page dumped because: kasan: bad access detected [ 21.244084] [ 21.244318] Memory state around the buggy address: [ 21.244455] fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.244878] fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.245030] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.245077] ^ [ 21.245140] fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.245193] fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.245558] ================================================================== [ 21.135237] ================================================================== [ 21.135292] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 21.135342] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265 [ 21.135790] [ 21.136110] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.136226] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.136254] Hardware name: linux,dummy-virt (DT) [ 21.136289] Call trace: [ 21.136681] show_stack+0x20/0x38 (C) [ 21.136846] dump_stack_lvl+0x8c/0xd0 [ 21.137045] print_report+0x118/0x608 [ 21.137098] kasan_report+0xdc/0x128 [ 21.137439] kasan_check_range+0x100/0x1a8 [ 21.137690] __kasan_check_write+0x20/0x30 [ 21.137881] kasan_atomics_helper+0x1414/0x4858 [ 21.138026] kasan_atomics+0x198/0x2e0 [ 21.138132] kunit_try_run_case+0x170/0x3f0 [ 21.138279] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.138522] kthread+0x328/0x630 [ 21.138657] ret_from_fork+0x10/0x20 [ 21.139031] [ 21.139169] Allocated by task 265: [ 21.139270] kasan_save_stack+0x3c/0x68 [ 21.139368] kasan_save_track+0x20/0x40 [ 21.139554] kasan_save_alloc_info+0x40/0x58 [ 21.139609] __kasan_kmalloc+0xd4/0xd8 [ 21.139794] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.140014] kasan_atomics+0xb8/0x2e0 [ 21.140215] kunit_try_run_case+0x170/0x3f0 [ 21.140327] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.140595] kthread+0x328/0x630 [ 21.140741] ret_from_fork+0x10/0x20 [ 21.140820] [ 21.140858] The buggy address belongs to the object at fff00000c58ac280 [ 21.140858] which belongs to the cache kmalloc-64 of size 64 [ 21.140926] The buggy address is located 0 bytes to the right of [ 21.140926] allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0) [ 21.141174] [ 21.141557] The buggy address belongs to the physical page: [ 21.141693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac [ 21.141824] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.141902] page_type: f5(slab) [ 21.141943] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.142124] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.142332] page dumped because: kasan: bad access detected [ 21.142557] [ 21.142716] Memory state around the buggy address: [ 21.142756] fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.143120] fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.143360] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.143563] ^ [ 21.143816] fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.143983] fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.144181] ================================================================== [ 20.903464] ================================================================== [ 20.903528] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 20.903709] Read of size 4 at addr fff00000c58ac2b0 by task kunit_try_catch/265 [ 20.903940] [ 20.903983] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.904316] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.905417] kasan_report+0xdc/0x128 [ 20.907344] kasan_save_stack+0x3c/0x68 [ 20.909944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac [ 20.914506] kunit_try_run_case+0x170/0x3f0 [ 20.916813] kthread+0x328/0x630 [ 20.917696] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac [ 20.923837] Call trace: [ 20.926172] kasan_save_track+0x20/0x40 [ 20.928445] [ 20.929767] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.931442] Hardware name: linux,dummy-virt (DT) [ 20.933645] kthread+0x328/0x630 [ 20.935256] kasan_atomics+0xb8/0x2e0 [ 20.936589] The buggy address is located 0 bytes to the right of [ 20.936589] allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0) [ 20.938978] ^ [ 20.943130] kasan_atomics+0x198/0x2e0 [ 20.943931] kthread+0x328/0x630 [ 20.944100] The buggy address is located 0 bytes to the right of [ 20.944100] allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0) [ 20.945331] ^ [ 20.947547] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 20.951313] kasan_atomics+0xb8/0x2e0 [ 20.951933] kthread+0x328/0x630 [ 20.952028] ret_from_fork+0x10/0x20 [ 20.952178] [ 20.952203] The buggy address belongs to the object at fff00000c58ac280 [ 20.952203] which belongs to the cache kmalloc-64 of size 64 [ 20.952295] The buggy address is located 0 bytes to the right of [ 20.952295] allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0) [ 20.952726] [ 20.952772] The buggy address belongs to the physical page: [ 20.953117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac [ 20.953173] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.953356] page_type: f5(slab) [ 20.953462] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.953873] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.954093] page dumped because: kasan: bad access detected [ 20.954622] [ 20.954918] Memory state around the buggy address: [ 20.955019] fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.955102] fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.955185] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.955338] ^ [ 20.955595] fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.955816] fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.956062] ================================================================== [ 21.108122] ================================================================== [ 21.108182] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 21.108274] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265 [ 21.108542] [ 21.108594] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.108827] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.109183] Hardware name: linux,dummy-virt (DT) [ 21.109304] Call trace: [ 21.109438] show_stack+0x20/0x38 (C) [ 21.109614] dump_stack_lvl+0x8c/0xd0 [ 21.109718] print_report+0x118/0x608 [ 21.109887] kasan_report+0xdc/0x128 [ 21.109935] kasan_check_range+0x100/0x1a8 [ 21.109992] __kasan_check_write+0x20/0x30 [ 21.110038] kasan_atomics_helper+0x12d8/0x4858 [ 21.110467] kasan_atomics+0x198/0x2e0 [ 21.110705] kunit_try_run_case+0x170/0x3f0 [ 21.110963] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.111138] kthread+0x328/0x630 [ 21.111263] ret_from_fork+0x10/0x20 [ 21.111315] [ 21.111723] Allocated by task 265: [ 21.111785] kasan_save_stack+0x3c/0x68 [ 21.112188] kasan_save_track+0x20/0x40 [ 21.112336] kasan_save_alloc_info+0x40/0x58 [ 21.112414] __kasan_kmalloc+0xd4/0xd8 [ 21.112516] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.112561] kasan_atomics+0xb8/0x2e0 [ 21.112785] kunit_try_run_case+0x170/0x3f0 [ 21.113205] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.113538] kthread+0x328/0x630 [ 21.113736] ret_from_fork+0x10/0x20 [ 21.113811] [ 21.113865] The buggy address belongs to the object at fff00000c58ac280 [ 21.113865] which belongs to the cache kmalloc-64 of size 64 [ 21.114134] The buggy address is located 0 bytes to the right of [ 21.114134] allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0) [ 21.114533] [ 21.114599] The buggy address belongs to the physical page: [ 21.114869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac [ 21.114963] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.115214] page_type: f5(slab) [ 21.115263] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.115316] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.115587] page dumped because: kasan: bad access detected [ 21.115678] [ 21.115712] Memory state around the buggy address: [ 21.115774] fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.115822] fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.115868] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.115909] ^ [ 21.115946] fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.115989] fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.116029] ================================================================== [ 20.983262] ================================================================== [ 20.983479] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 20.983610] Read of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265 [ 20.983705] [ 20.983740] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.983954] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.984046] Hardware name: linux,dummy-virt (DT) [ 20.984081] Call trace: [ 20.984214] show_stack+0x20/0x38 (C) [ 20.984375] dump_stack_lvl+0x8c/0xd0 [ 20.984468] print_report+0x118/0x608 [ 20.984689] kasan_report+0xdc/0x128 [ 20.984758] kasan_check_range+0x100/0x1a8 [ 20.985040] __kasan_check_read+0x20/0x30 [ 20.985187] kasan_atomics_helper+0xdd4/0x4858 [ 20.985316] kasan_atomics+0x198/0x2e0 [ 20.985442] kunit_try_run_case+0x170/0x3f0 [ 20.985517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.985586] kthread+0x328/0x630 [ 20.985632] ret_from_fork+0x10/0x20 [ 20.985681] [ 20.985701] Allocated by task 265: [ 20.985733] kasan_save_stack+0x3c/0x68 [ 20.985774] kasan_save_track+0x20/0x40 [ 20.985813] kasan_save_alloc_info+0x40/0x58 [ 20.985855] __kasan_kmalloc+0xd4/0xd8 [ 20.985893] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.987025] kasan_atomics+0xb8/0x2e0 [ 20.987130] kunit_try_run_case+0x170/0x3f0 [ 20.987191] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.987260] kthread+0x328/0x630 [ 20.987296] ret_from_fork+0x10/0x20 [ 20.987669] [ 20.987709] The buggy address belongs to the object at fff00000c58ac280 [ 20.987709] which belongs to the cache kmalloc-64 of size 64 [ 20.988215] The buggy address is located 0 bytes to the right of [ 20.988215] allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0) [ 20.988302] [ 20.988325] The buggy address belongs to the physical page: [ 20.988359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac [ 20.988549] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.988872] page_type: f5(slab) [ 20.988918] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.989196] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.989362] page dumped because: kasan: bad access detected [ 20.989583] [ 20.989683] Memory state around the buggy address: [ 20.989759] fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.989813] fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.990021] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.990350] ^ [ 20.990668] fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.990780] fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.990867] ================================================================== [ 21.027374] ================================================================== [ 21.027558] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 21.027629] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265 [ 21.027688] [ 21.027721] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.027810] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.028288] Hardware name: linux,dummy-virt (DT) [ 21.028341] Call trace: [ 21.028492] show_stack+0x20/0x38 (C) [ 21.028572] dump_stack_lvl+0x8c/0xd0 [ 21.028972] print_report+0x118/0x608 [ 21.029077] kasan_report+0xdc/0x128 [ 21.029257] kasan_check_range+0x100/0x1a8 [ 21.029492] __kasan_check_write+0x20/0x30 [ 21.029623] kasan_atomics_helper+0xf20/0x4858 [ 21.029771] kasan_atomics+0x198/0x2e0 [ 21.029946] kunit_try_run_case+0x170/0x3f0 [ 21.030188] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.030375] kthread+0x328/0x630 [ 21.030453] ret_from_fork+0x10/0x20 [ 21.030770] [ 21.030907] Allocated by task 265: [ 21.030985] kasan_save_stack+0x3c/0x68 [ 21.031066] kasan_save_track+0x20/0x40 [ 21.031207] kasan_save_alloc_info+0x40/0x58 [ 21.031251] __kasan_kmalloc+0xd4/0xd8 [ 21.031464] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.031602] kasan_atomics+0xb8/0x2e0 [ 21.031883] kunit_try_run_case+0x170/0x3f0 [ 21.032878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.032979] kthread+0x328/0x630 [ 21.033041] ret_from_fork+0x10/0x20 [ 21.033115] [ 21.033157] The buggy address belongs to the object at fff00000c58ac280 [ 21.033157] which belongs to the cache kmalloc-64 of size 64 [ 21.033253] The buggy address is located 0 bytes to the right of [ 21.033253] allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0) [ 21.033626] [ 21.033735] The buggy address belongs to the physical page: [ 21.033846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac [ 21.034316] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.034730] page_type: f5(slab) [ 21.034785] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.035087] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.035139] page dumped because: kasan: bad access detected [ 21.035450] [ 21.035518] Memory state around the buggy address: [ 21.035784] fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.036071] fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.036343] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.036533] ^ [ 21.036685] fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.036824] fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.036993] ================================================================== [ 21.096631] ================================================================== [ 21.097213] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 21.097300] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265 [ 21.097351] [ 21.097654] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.097895] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.098151] Hardware name: linux,dummy-virt (DT) [ 21.098280] Call trace: [ 21.098435] show_stack+0x20/0x38 (C) [ 21.098705] dump_stack_lvl+0x8c/0xd0 [ 21.099002] print_report+0x118/0x608 [ 21.099184] kasan_report+0xdc/0x128 [ 21.099378] kasan_check_range+0x100/0x1a8 [ 21.099476] __kasan_check_write+0x20/0x30 [ 21.099560] kasan_atomics_helper+0x126c/0x4858 [ 21.099912] kasan_atomics+0x198/0x2e0 [ 21.100110] kunit_try_run_case+0x170/0x3f0 [ 21.100194] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.100365] kthread+0x328/0x630 [ 21.100483] ret_from_fork+0x10/0x20 [ 21.100771] [ 21.100929] Allocated by task 265: [ 21.101176] kasan_save_stack+0x3c/0x68 [ 21.101417] kasan_save_track+0x20/0x40 [ 21.101601] kasan_save_alloc_info+0x40/0x58 [ 21.101691] __kasan_kmalloc+0xd4/0xd8 [ 21.101907] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.102100] kasan_atomics+0xb8/0x2e0 [ 21.102403] kunit_try_run_case+0x170/0x3f0 [ 21.102590] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.102743] kthread+0x328/0x630 [ 21.102824] ret_from_fork+0x10/0x20 [ 21.103017] [ 21.103089] The buggy address belongs to the object at fff00000c58ac280 [ 21.103089] which belongs to the cache kmalloc-64 of size 64 [ 21.103162] The buggy address is located 0 bytes to the right of [ 21.103162] allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0) [ 21.103431] [ 21.103549] The buggy address belongs to the physical page: [ 21.103637] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac [ 21.103995] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.104176] page_type: f5(slab) [ 21.104619] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.104841] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.105020] page dumped because: kasan: bad access detected [ 21.105365] [ 21.105653] Memory state around the buggy address: [ 21.105760] fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.105918] fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.105973] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.106315] ^ [ 21.106566] fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.106901] fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.107136] ================================================================== [ 21.197560] ================================================================== [ 21.197924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 21.197994] Read of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265 [ 21.198079] [ 21.198114] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.198312] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.198354] Hardware name: linux,dummy-virt (DT) [ 21.198389] Call trace: [ 21.198500] show_stack+0x20/0x38 (C) [ 21.198563] dump_stack_lvl+0x8c/0xd0 [ 21.198758] print_report+0x118/0x608 [ 21.198821] kasan_report+0xdc/0x128 [ 21.198872] __asan_report_load8_noabort+0x20/0x30 [ 21.198922] kasan_atomics_helper+0x3df4/0x4858 [ 21.199374] kasan_atomics+0x198/0x2e0 [ 21.199446] kunit_try_run_case+0x170/0x3f0 [ 21.199499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.199773] kthread+0x328/0x630 [ 21.199836] ret_from_fork+0x10/0x20 [ 21.200116] [ 21.200151] Allocated by task 265: [ 21.200335] kasan_save_stack+0x3c/0x68 [ 21.200414] kasan_save_track+0x20/0x40 [ 21.200554] kasan_save_alloc_info+0x40/0x58 [ 21.200614] __kasan_kmalloc+0xd4/0xd8 [ 21.200652] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.200844] kasan_atomics+0xb8/0x2e0 [ 21.201262] kunit_try_run_case+0x170/0x3f0 [ 21.201449] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.201604] kthread+0x328/0x630 [ 21.201699] ret_from_fork+0x10/0x20 [ 21.201796] [ 21.201931] The buggy address belongs to the object at fff00000c58ac280 [ 21.201931] which belongs to the cache kmalloc-64 of size 64 [ 21.202135] The buggy address is located 0 bytes to the right of [ 21.202135] allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0) [ 21.202617] [ 21.202838] The buggy address belongs to the physical page: [ 21.203067] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac [ 21.203263] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.203344] page_type: f5(slab) [ 21.203781] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.204046] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.204153] page dumped because: kasan: bad access detected [ 21.204446] [ 21.204525] Memory state around the buggy address: [ 21.204564] fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.205147] fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.205291] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.205731] ^ [ 21.205789] fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.205846] fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.206073] ================================================================== [ 21.008178] ================================================================== [ 21.008238] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 21.008290] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265 [ 21.008361] [ 21.008395] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.008477] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.008691] Hardware name: linux,dummy-virt (DT) [ 21.008745] Call trace: [ 21.008771] show_stack+0x20/0x38 (C) [ 21.009068] dump_stack_lvl+0x8c/0xd0 [ 21.009138] print_report+0x118/0x608 [ 21.009373] kasan_report+0xdc/0x128 [ 21.009466] __asan_report_store8_noabort+0x20/0x30 [ 21.009650] kasan_atomics_helper+0x3e5c/0x4858 [ 21.009731] kasan_atomics+0x198/0x2e0 [ 21.009780] kunit_try_run_case+0x170/0x3f0 [ 21.009829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.010493] kthread+0x328/0x630 [ 21.010658] ret_from_fork+0x10/0x20 [ 21.010775] [ 21.010953] Allocated by task 265: [ 21.011036] kasan_save_stack+0x3c/0x68 [ 21.011224] kasan_save_track+0x20/0x40 [ 21.011507] kasan_save_alloc_info+0x40/0x58 [ 21.011809] __kasan_kmalloc+0xd4/0xd8 [ 21.012029] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.012477] kasan_atomics+0xb8/0x2e0 [ 21.012527] kunit_try_run_case+0x170/0x3f0 [ 21.012991] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.013095] kthread+0x328/0x630 [ 21.013159] ret_from_fork+0x10/0x20 [ 21.013198] [ 21.013219] The buggy address belongs to the object at fff00000c58ac280 [ 21.013219] which belongs to the cache kmalloc-64 of size 64 [ 21.013864] The buggy address is located 0 bytes to the right of [ 21.013864] allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0) [ 21.014085] [ 21.014229] The buggy address belongs to the physical page: [ 21.014453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac [ 21.014791] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.015073] page_type: f5(slab) [ 21.015504] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.015615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.015815] page dumped because: kasan: bad access detected [ 21.015857] [ 21.015877] Memory state around the buggy address: [ 21.015925] fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.016321] fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.016491] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.016867] ^ [ 21.016914] fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.016960] fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.017002] ================================================================== [ 21.117919] ================================================================== [ 21.118327] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 21.118401] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265 [ 21.118616] [ 21.118834] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.118931] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.118959] Hardware name: linux,dummy-virt (DT) [ 21.118992] Call trace: [ 21.119134] show_stack+0x20/0x38 (C) [ 21.119238] dump_stack_lvl+0x8c/0xd0 [ 21.119474] print_report+0x118/0x608 [ 21.119536] kasan_report+0xdc/0x128 [ 21.119597] kasan_check_range+0x100/0x1a8 [ 21.119648] __kasan_check_write+0x20/0x30 [ 21.119693] kasan_atomics_helper+0x1384/0x4858 [ 21.120148] kasan_atomics+0x198/0x2e0 [ 21.120255] kunit_try_run_case+0x170/0x3f0 [ 21.120308] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.120363] kthread+0x328/0x630 [ 21.120587] ret_from_fork+0x10/0x20 [ 21.120789] [ 21.120823] Allocated by task 265: [ 21.120914] kasan_save_stack+0x3c/0x68 [ 21.121282] kasan_save_track+0x20/0x40 [ 21.121359] kasan_save_alloc_info+0x40/0x58 [ 21.121476] __kasan_kmalloc+0xd4/0xd8 [ 21.121535] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.121672] kasan_atomics+0xb8/0x2e0 [ 21.121712] kunit_try_run_case+0x170/0x3f0 [ 21.121752] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.121798] kthread+0x328/0x630 [ 21.122275] ret_from_fork+0x10/0x20 [ 21.122440] [ 21.122561] The buggy address belongs to the object at fff00000c58ac280 [ 21.122561] which belongs to the cache kmalloc-64 of size 64 [ 21.122649] The buggy address is located 0 bytes to the right of [ 21.122649] allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0) [ 21.122891] [ 21.123003] The buggy address belongs to the physical page: [ 21.123158] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac [ 21.123428] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.123623] page_type: f5(slab) [ 21.123812] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.123993] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.124602] page dumped because: kasan: bad access detected [ 21.125118] [ 21.125147] Memory state around the buggy address: [ 21.125186] fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.125233] fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.125432] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.125565] ^ [ 21.125993] fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.126137] fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.126250] ================================================================== [ 20.847487] ================================================================== [ 20.847535] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 20.848009] Read of size 4 at addr fff00000c58ac2b0 by task kunit_try_catch/265 [ 20.848362] [ 20.848411] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.848496] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.848526] Hardware name: linux,dummy-virt (DT) [ 20.848559] Call trace: [ 20.848595] show_stack+0x20/0x38 (C) [ 20.848961] dump_stack_lvl+0x8c/0xd0 [ 20.849101] print_report+0x118/0x608 [ 20.849301] kasan_report+0xdc/0x128 [ 20.849374] __asan_report_load4_noabort+0x20/0x30 [ 20.849450] kasan_atomics_helper+0x42d8/0x4858 [ 20.849531] kasan_atomics+0x198/0x2e0 [ 20.849714] kunit_try_run_case+0x170/0x3f0 [ 20.850076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.850312] kthread+0x328/0x630 [ 20.850615] ret_from_fork+0x10/0x20 [ 20.850895] [ 20.850924] Allocated by task 265: [ 20.850990] kasan_save_stack+0x3c/0x68 [ 20.851223] kasan_save_track+0x20/0x40 [ 20.851496] kasan_save_alloc_info+0x40/0x58 [ 20.851664] __kasan_kmalloc+0xd4/0xd8 [ 20.851760] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.851808] kasan_atomics+0xb8/0x2e0 [ 20.852104] kunit_try_run_case+0x170/0x3f0 [ 20.852287] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.852409] kthread+0x328/0x630 [ 20.852487] ret_from_fork+0x10/0x20 [ 20.852606] [ 20.852674] The buggy address belongs to the object at fff00000c58ac280 [ 20.852674] which belongs to the cache kmalloc-64 of size 64 [ 20.852935] The buggy address is located 0 bytes to the right of [ 20.852935] allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0) [ 20.853937] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.856169] ================================================================== [ 20.883644] ================================================================== [ 20.883697] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 20.883747] Write of size 4 at addr fff00000c58ac2b0 by task kunit_try_catch/265 [ 20.884151] [ 20.884204] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.884291] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.884725] Hardware name: linux,dummy-virt (DT) [ 20.884761] Call trace: [ 20.884786] show_stack+0x20/0x38 (C) [ 20.884914] dump_stack_lvl+0x8c/0xd0 [ 20.885011] print_report+0x118/0x608 [ 20.885094] kasan_report+0xdc/0x128 [ 20.885218] kasan_check_range+0x100/0x1a8 [ 20.885272] __kasan_check_write+0x20/0x30 [ 20.885319] kasan_atomics_helper+0xa6c/0x4858 [ 20.885594] kasan_atomics+0x198/0x2e0 [ 20.885811] kunit_try_run_case+0x170/0x3f0 [ 20.885918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.886078] kthread+0x328/0x630 [ 20.886186] ret_from_fork+0x10/0x20 [ 20.886259] [ 20.886282] Allocated by task 265: [ 20.886642] kasan_save_stack+0x3c/0x68 [ 20.886767] kasan_save_track+0x20/0x40 [ 20.886858] kasan_save_alloc_info+0x40/0x58 [ 20.887056] __kasan_kmalloc+0xd4/0xd8 [ 20.887146] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.887504] kasan_atomics+0xb8/0x2e0 [ 20.888194] kunit_try_run_case+0x170/0x3f0 [ 20.888279] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.888379] kthread+0x328/0x630 [ 20.888650] ret_from_fork+0x10/0x20 [ 20.888828] [ 20.888883] The buggy address belongs to the object at fff00000c58ac280 [ 20.888883] which belongs to the cache kmalloc-64 of size 64 [ 20.889503] The buggy address is located 0 bytes to the right of [ 20.889503] allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0) [ 20.889754] [ 20.889834] The buggy address belongs to the physical page: [ 20.889967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac [ 20.890177] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.890420] page_type: f5(slab) [ 20.890485] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.890721] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.890970] page dumped because: kasan: bad access detected [ 20.891055] [ 20.891123] Memory state around the buggy address: [ 20.891241] fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.891287] fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.891342] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.891382] ^ [ 20.891417] fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.891471] fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.891520] ================================================================== [ 21.001404] ================================================================== [ 21.001543] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 21.001626] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265 [ 21.001731] [ 21.001767] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.001850] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.002219] Hardware name: linux,dummy-virt (DT) [ 21.002275] Call trace: [ 21.002456] show_stack+0x20/0x38 (C) [ 21.002520] dump_stack_lvl+0x8c/0xd0 [ 21.002749] print_report+0x118/0x608 [ 21.002890] kasan_report+0xdc/0x128 [ 21.003001] kasan_check_range+0x100/0x1a8 [ 21.003053] __kasan_check_write+0x20/0x30 [ 21.003410] kasan_atomics_helper+0xe44/0x4858 [ 21.003660] kasan_atomics+0x198/0x2e0 [ 21.003758] kunit_try_run_case+0x170/0x3f0 [ 21.003948] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.004067] kthread+0x328/0x630 [ 21.004143] ret_from_fork+0x10/0x20 [ 21.004192] [ 21.004382] Allocated by task 265: [ 21.004535] kasan_save_stack+0x3c/0x68 [ 21.004602] kasan_save_track+0x20/0x40 [ 21.004881] kasan_save_alloc_info+0x40/0x58 [ 21.005092] __kasan_kmalloc+0xd4/0xd8 [ 21.005168] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.005465] kasan_atomics+0xb8/0x2e0 [ 21.005694] kunit_try_run_case+0x170/0x3f0 [ 21.005752] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.005998] kthread+0x328/0x630 [ 21.006044] ret_from_fork+0x10/0x20 [ 21.006275] [ 21.006304] The buggy address belongs to the object at fff00000c58ac280 [ 21.006304] which belongs to the cache kmalloc-64 of size 64 [ 21.006387] The buggy address is located 0 bytes to the right of [ 21.006387] allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0) [ 21.006453] [ 21.006474] The buggy address belongs to the physical page: [ 21.006517] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac [ 21.006572] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.006643] page_type: f5(slab) [ 21.006696] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.006764] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.006807] page dumped because: kasan: bad access detected [ 21.006847] [ 21.006869] Memory state around the buggy address: [ 21.006902] fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.006957] fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.007004] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.007043] ^ [ 21.007080] fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.007132] fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.007187] ================================================================== [ 21.054013] ================================================================== [ 21.054073] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 21.054193] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265 [ 21.054251] [ 21.054284] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.054536] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.055006] Hardware name: linux,dummy-virt (DT) [ 21.055059] Call trace: [ 21.055234] show_stack+0x20/0x38 (C) [ 21.055318] dump_stack_lvl+0x8c/0xd0 [ 21.055368] print_report+0x118/0x608 [ 21.055571] kasan_report+0xdc/0x128 [ 21.055633] kasan_check_range+0x100/0x1a8 [ 21.055912] __kasan_check_write+0x20/0x30 [ 21.055982] kasan_atomics_helper+0x1058/0x4858 [ 21.056246] kasan_atomics+0x198/0x2e0 [ 21.056336] kunit_try_run_case+0x170/0x3f0 [ 21.056435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.056551] kthread+0x328/0x630 [ 21.056612] ret_from_fork+0x10/0x20 [ 21.056661] [ 21.056682] Allocated by task 265: [ 21.056730] kasan_save_stack+0x3c/0x68 [ 21.056929] kasan_save_track+0x20/0x40 [ 21.057268] kasan_save_alloc_info+0x40/0x58 [ 21.057504] __kasan_kmalloc+0xd4/0xd8 [ 21.057699] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.057805] kasan_atomics+0xb8/0x2e0 [ 21.057862] kunit_try_run_case+0x170/0x3f0 [ 21.057902] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.057946] kthread+0x328/0x630 [ 21.057981] ret_from_fork+0x10/0x20 [ 21.058527] [ 21.058758] The buggy address belongs to the object at fff00000c58ac280 [ 21.058758] which belongs to the cache kmalloc-64 of size 64 [ 21.058991] The buggy address is located 0 bytes to the right of [ 21.058991] allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0) [ 21.059267] [ 21.059307] The buggy address belongs to the physical page: [ 21.059714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac [ 21.059949] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.060276] page_type: f5(slab) [ 21.060509] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.060681] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.060773] page dumped because: kasan: bad access detected [ 21.060809] [ 21.060829] Memory state around the buggy address: [ 21.060867] fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.061091] fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.061333] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.061381] ^ [ 21.061433] fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.061482] fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.061521] ================================================================== [ 20.957926] ================================================================== [ 20.958121] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 20.958180] Read of size 4 at addr fff00000c58ac2b0 by task kunit_try_catch/265 [ 20.958487] [ 20.958595] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.958944] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.958992] Hardware name: linux,dummy-virt (DT) [ 20.959253] Call trace: [ 20.959295] show_stack+0x20/0x38 (C) [ 20.959350] dump_stack_lvl+0x8c/0xd0 [ 20.959401] print_report+0x118/0x608 [ 20.959450] kasan_report+0xdc/0x128 [ 20.959799] __asan_report_load4_noabort+0x20/0x30 [ 20.960100] kasan_atomics_helper+0x3dd8/0x4858 [ 20.960233] kasan_atomics+0x198/0x2e0 [ 20.960287] kunit_try_run_case+0x170/0x3f0 [ 20.960345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.960643] kthread+0x328/0x630 [ 20.960804] ret_from_fork+0x10/0x20 [ 20.961026] [ 20.961053] Allocated by task 265: [ 20.961084] kasan_save_stack+0x3c/0x68 [ 20.961132] kasan_save_track+0x20/0x40 [ 20.961180] kasan_save_alloc_info+0x40/0x58 [ 20.961398] __kasan_kmalloc+0xd4/0xd8 [ 20.961493] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.961590] kasan_atomics+0xb8/0x2e0 [ 20.961633] kunit_try_run_case+0x170/0x3f0 [ 20.961673] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.961732] kthread+0x328/0x630 [ 20.961776] ret_from_fork+0x10/0x20 [ 20.961814] [ 20.961851] The buggy address belongs to the object at fff00000c58ac280 [ 20.961851] which belongs to the cache kmalloc-64 of size 64 [ 20.961922] The buggy address is located 0 bytes to the right of [ 20.961922] allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0) [ 20.961991] [ 20.962012] The buggy address belongs to the physical page: [ 20.962055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac [ 20.962119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.962169] page_type: f5(slab) [ 20.962218] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.962271] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.962324] page dumped because: kasan: bad access detected [ 20.962367] [ 20.962387] Memory state around the buggy address: [ 20.962420] fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.962469] fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.962515] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.962555] ^ [ 20.962611] fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.963040] fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.963101] ================================================================== [ 21.090878] ================================================================== [ 21.090931] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 21.091106] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265 [ 21.091274] [ 21.091312] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.091796] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.091841] Hardware name: linux,dummy-virt (DT) [ 21.091877] Call trace: [ 21.091994] show_stack+0x20/0x38 (C) [ 21.092056] dump_stack_lvl+0x8c/0xd0 [ 21.092299] print_report+0x118/0x608 [ 21.092410] kasan_report+0xdc/0x128 [ 21.092497] kasan_check_range+0x100/0x1a8 [ 21.092551] __kasan_check_write+0x20/0x30 [ 21.093002] kasan_atomics_helper+0x11f8/0x4858 [ 21.093193] kasan_atomics+0x198/0x2e0 [ 21.093301] kunit_try_run_case+0x170/0x3f0 [ 21.093588] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.093836] kthread+0x328/0x630 [ 21.093947] ret_from_fork+0x10/0x20 [ 21.094101] [ 21.094126] Allocated by task 265: [ 21.094158] kasan_save_stack+0x3c/0x68 [ 21.094281] kasan_save_track+0x20/0x40 [ 21.094346] kasan_save_alloc_info+0x40/0x58 [ 21.094390] __kasan_kmalloc+0xd4/0xd8 [ 21.094432] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.094473] kasan_atomics+0xb8/0x2e0 [ 21.094511] kunit_try_run_case+0x170/0x3f0 [ 21.094550] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.094608] kthread+0x328/0x630 [ 21.094642] ret_from_fork+0x10/0x20 [ 21.094680] [ 21.094711] The buggy address belongs to the object at fff00000c58ac280 [ 21.094711] which belongs to the cache kmalloc-64 of size 64 [ 21.094771] The buggy address is located 0 bytes to the right of [ 21.094771] allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0) [ 21.094851] [ 21.094872] The buggy address belongs to the physical page: [ 21.094929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac [ 21.094982] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.095041] page_type: f5(slab) [ 21.095081] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.095148] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.095191] page dumped because: kasan: bad access detected [ 21.095235] [ 21.095268] Memory state around the buggy address: [ 21.095302] fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.095348] fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.095392] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.095434] ^ [ 21.095479] fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.095529] fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.095569] ================================================================== [ 21.160634] ================================================================== [ 21.160725] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 21.161039] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265 [ 21.161348] [ 21.161482] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.162149] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.162293] Hardware name: linux,dummy-virt (DT) [ 21.162450] Call trace: [ 21.162709] show_stack+0x20/0x38 (C) [ 21.162807] dump_stack_lvl+0x8c/0xd0 [ 21.163044] print_report+0x118/0x608 [ 21.163308] kasan_report+0xdc/0x128 [ 21.163856] kasan_check_range+0x100/0x1a8 [ 21.164083] __kasan_check_write+0x20/0x30 [ 21.164275] kasan_atomics_helper+0x154c/0x4858 [ 21.164528] kasan_atomics+0x198/0x2e0 [ 21.164657] kunit_try_run_case+0x170/0x3f0 [ 21.164757] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.164847] kthread+0x328/0x630 [ 21.164949] ret_from_fork+0x10/0x20 [ 21.165000] [ 21.165021] Allocated by task 265: [ 21.165342] kasan_save_stack+0x3c/0x68 [ 21.165772] kasan_save_track+0x20/0x40 [ 21.165873] kasan_save_alloc_info+0x40/0x58 [ 21.166005] __kasan_kmalloc+0xd4/0xd8 [ 21.166094] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.166325] kasan_atomics+0xb8/0x2e0 [ 21.166446] kunit_try_run_case+0x170/0x3f0 [ 21.166717] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.166770] kthread+0x328/0x630 [ 21.166806] ret_from_fork+0x10/0x20 [ 21.167108] [ 21.167561] The buggy address belongs to the object at fff00000c58ac280 [ 21.167561] which belongs to the cache kmalloc-64 of size 64 [ 21.167740] The buggy address is located 0 bytes to the right of [ 21.167740] allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0) [ 21.168293] [ 21.168364] The buggy address belongs to the physical page: [ 21.168511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac [ 21.168784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.168986] page_type: f5(slab) [ 21.169050] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.169289] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.169368] page dumped because: kasan: bad access detected [ 21.169660] [ 21.169968] Memory state around the buggy address: [ 21.170151] fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.170203] fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.170394] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.170441] ^ [ 21.170488] fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.170732] fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.171053] ================================================================== [ 21.210592] ================================================================== [ 21.210672] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 21.210724] Read of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265 [ 21.210884] [ 21.211459] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.211568] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.211611] Hardware name: linux,dummy-virt (DT) [ 21.212211] Call trace: [ 21.212276] show_stack+0x20/0x38 (C) [ 21.212559] dump_stack_lvl+0x8c/0xd0 [ 21.212643] print_report+0x118/0x608 [ 21.213025] kasan_report+0xdc/0x128 [ 21.213242] __asan_report_load8_noabort+0x20/0x30 [ 21.213744] kasan_atomics_helper+0x3e10/0x4858 [ 21.213854] kasan_atomics+0x198/0x2e0 [ 21.213942] kunit_try_run_case+0x170/0x3f0 [ 21.214089] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.214149] kthread+0x328/0x630 [ 21.214315] ret_from_fork+0x10/0x20 [ 21.214568] [ 21.214623] Allocated by task 265: [ 21.214882] kasan_save_stack+0x3c/0x68 [ 21.215122] kasan_save_track+0x20/0x40 [ 21.215203] kasan_save_alloc_info+0x40/0x58 [ 21.215289] __kasan_kmalloc+0xd4/0xd8 [ 21.215425] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.215488] kasan_atomics+0xb8/0x2e0 [ 21.215747] kunit_try_run_case+0x170/0x3f0 [ 21.216130] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.216308] kthread+0x328/0x630 [ 21.216425] ret_from_fork+0x10/0x20 [ 21.216539] [ 21.216628] The buggy address belongs to the object at fff00000c58ac280 [ 21.216628] which belongs to the cache kmalloc-64 of size 64 [ 21.216829] The buggy address is located 0 bytes to the right of [ 21.216829] allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0) [ 21.217078] [ 21.217154] The buggy address belongs to the physical page: [ 21.217260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac [ 21.217355] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.217677] page_type: f5(slab) [ 21.217731] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.218129] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.218334] page dumped because: kasan: bad access detected [ 21.218484] [ 21.218644] Memory state around the buggy address: [ 21.218812] fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.218870] fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.219277] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.219454] ^ [ 21.219557] fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.219621] fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.219822] ================================================================== [ 21.190193] ================================================================== [ 21.190426] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 21.190598] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265 [ 21.190652] [ 21.190687] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.190894] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.190953] Hardware name: linux,dummy-virt (DT) [ 21.190988] Call trace: [ 21.191028] show_stack+0x20/0x38 (C) [ 21.191161] dump_stack_lvl+0x8c/0xd0 [ 21.191210] print_report+0x118/0x608 [ 21.191259] kasan_report+0xdc/0x128 [ 21.191476] kasan_check_range+0x100/0x1a8 [ 21.191606] __kasan_check_write+0x20/0x30 [ 21.191762] kasan_atomics_helper+0x1644/0x4858 [ 21.191816] kasan_atomics+0x198/0x2e0 [ 21.191863] kunit_try_run_case+0x170/0x3f0 [ 21.191911] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.191965] kthread+0x328/0x630 [ 21.192010] ret_from_fork+0x10/0x20 [ 21.192058] [ 21.192078] Allocated by task 265: [ 21.192123] kasan_save_stack+0x3c/0x68 [ 21.192166] kasan_save_track+0x20/0x40 [ 21.192214] kasan_save_alloc_info+0x40/0x58 [ 21.192263] __kasan_kmalloc+0xd4/0xd8 [ 21.192302] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.192344] kasan_atomics+0xb8/0x2e0 [ 21.192380] kunit_try_run_case+0x170/0x3f0 [ 21.192428] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.192483] kthread+0x328/0x630 [ 21.192517] ret_from_fork+0x10/0x20 [ 21.192555] [ 21.192955] The buggy address belongs to the object at fff00000c58ac280 [ 21.192955] which belongs to the cache kmalloc-64 of size 64 [ 21.193272] The buggy address is located 0 bytes to the right of [ 21.193272] allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0) [ 21.193568] [ 21.193605] The buggy address belongs to the physical page: [ 21.194031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac [ 21.194363] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.194500] page_type: f5(slab) [ 21.194549] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.195433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.195543] page dumped because: kasan: bad access detected [ 21.195790] [ 21.195828] Memory state around the buggy address: [ 21.195950] fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.196022] fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.196373] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.196515] ^ [ 21.196558] fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.196779] fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.196960] ================================================================== [ 20.894366] ================================================================== [ 20.894837] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 20.895058] Write of size 4 at addr fff00000c58ac2b0 by task kunit_try_catch/265 [ 20.895323] [ 20.895374] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.895466] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.895496] Hardware name: linux,dummy-virt (DT) [ 20.895688] Call trace: [ 20.895752] show_stack+0x20/0x38 (C) [ 20.895941] dump_stack_lvl+0x8c/0xd0 [ 20.896004] print_report+0x118/0x608 [ 20.896052] kasan_report+0xdc/0x128 [ 20.896100] kasan_check_range+0x100/0x1a8 [ 20.896160] __kasan_check_write+0x20/0x30 [ 20.896208] kasan_atomics_helper+0xad4/0x4858 [ 20.896258] kasan_atomics+0x198/0x2e0 [ 20.896305] kunit_try_run_case+0x170/0x3f0 [ 20.896358] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.896423] kthread+0x328/0x630 [ 20.896468] ret_from_fork+0x10/0x20 [ 20.896518] [ 20.896541] Allocated by task 265: [ 20.896571] kasan_save_stack+0x3c/0x68 [ 20.896627] kasan_save_track+0x20/0x40 [ 20.896665] kasan_save_alloc_info+0x40/0x58 [ 20.896708] __kasan_kmalloc+0xd4/0xd8 [ 20.896745] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.897005] kasan_atomics+0xb8/0x2e0 [ 20.897325] kunit_try_run_case+0x170/0x3f0 [ 20.897522] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.897699] kthread+0x328/0x630 [ 20.897771] ret_from_fork+0x10/0x20 [ 20.898168] [ 20.898357] The buggy address belongs to the object at fff00000c58ac280 [ 20.898357] which belongs to the cache kmalloc-64 of size 64 [ 20.898470] The buggy address is located 0 bytes to the right of [ 20.898470] allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0) [ 20.898920] [ 20.898949] The buggy address belongs to the physical page: [ 20.899177] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac [ 20.899392] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.899617] page_type: f5(slab) [ 20.900041] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.900233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.900441] page dumped because: kasan: bad access detected [ 20.900510] [ 20.900530] Memory state around the buggy address: [ 20.900756] fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.900966] fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.901029] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.901069] ^ [ 20.901105] fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.901316] fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.901422] ================================================================== [ 20.866608] ================================================================== [ 20.866665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 20.866938] Write of size 4 at addr fff00000c58ac2b0 by task kunit_try_catch/265 [ 20.867467] [ 20.867736] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.868006] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.868041] Hardware name: linux,dummy-virt (DT) [ 20.868326] Call trace: [ 20.868543] show_stack+0x20/0x38 (C) [ 20.868632] dump_stack_lvl+0x8c/0xd0 [ 20.868688] print_report+0x118/0x608 [ 20.869149] kasan_report+0xdc/0x128 [ 20.869226] kasan_check_range+0x100/0x1a8 [ 20.869307] __kasan_check_write+0x20/0x30 [ 20.869418] kasan_atomics_helper+0x99c/0x4858 [ 20.869471] kasan_atomics+0x198/0x2e0 [ 20.869697] kunit_try_run_case+0x170/0x3f0 [ 20.869918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.870163] kthread+0x328/0x630 [ 20.870339] ret_from_fork+0x10/0x20 [ 20.870508] [ 20.870533] Allocated by task 265: [ 20.870608] kasan_save_stack+0x3c/0x68 [ 20.870767] kasan_save_track+0x20/0x40 [ 20.870969] kasan_save_alloc_info+0x40/0x58 [ 20.871073] __kasan_kmalloc+0xd4/0xd8 [ 20.871135] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.871178] kasan_atomics+0xb8/0x2e0 [ 20.871215] kunit_try_run_case+0x170/0x3f0 [ 20.871276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.871323] kthread+0x328/0x630 [ 20.871364] ret_from_fork+0x10/0x20 [ 20.871412] [ 20.871448] The buggy address belongs to the object at fff00000c58ac280 [ 20.871448] which belongs to the cache kmalloc-64 of size 64 [ 20.871511] The buggy address is located 0 bytes to the right of [ 20.871511] allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0) [ 20.871587] [ 20.871642] The buggy address belongs to the physical page: [ 20.871676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac [ 20.872310] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.872406] page_type: f5(slab) [ 20.872496] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.873086] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.873178] page dumped because: kasan: bad access detected [ 20.873230] [ 20.873253] Memory state around the buggy address: [ 20.873288] fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.873685] fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.873738] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.873902] ^ [ 20.873989] fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.874376] fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.874445] ================================================================== [ 21.071648] ================================================================== [ 21.071800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 21.071854] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265 [ 21.071906] [ 21.071936] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.072416] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.072619] Hardware name: linux,dummy-virt (DT) [ 21.072738] Call trace: [ 21.072836] show_stack+0x20/0x38 (C) [ 21.072928] dump_stack_lvl+0x8c/0xd0 [ 21.073072] print_report+0x118/0x608 [ 21.073189] kasan_report+0xdc/0x128 [ 21.073237] kasan_check_range+0x100/0x1a8 [ 21.073292] __kasan_check_write+0x20/0x30 [ 21.073565] kasan_atomics_helper+0x1128/0x4858 [ 21.073784] kasan_atomics+0x198/0x2e0 [ 21.073990] kunit_try_run_case+0x170/0x3f0 [ 21.074226] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.074330] kthread+0x328/0x630 [ 21.074621] ret_from_fork+0x10/0x20 [ 21.075114] [ 21.075440] Allocated by task 265: [ 21.075553] kasan_save_stack+0x3c/0x68 [ 21.075659] kasan_save_track+0x20/0x40 [ 21.075813] kasan_save_alloc_info+0x40/0x58 [ 21.076005] __kasan_kmalloc+0xd4/0xd8 [ 21.076221] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.076454] kasan_atomics+0xb8/0x2e0 [ 21.076546] kunit_try_run_case+0x170/0x3f0 [ 21.076850] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.076901] kthread+0x328/0x630 [ 21.076952] ret_from_fork+0x10/0x20 [ 21.077109] [ 21.077174] The buggy address belongs to the object at fff00000c58ac280 [ 21.077174] which belongs to the cache kmalloc-64 of size 64 [ 21.077378] The buggy address is located 0 bytes to the right of [ 21.077378] allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0) [ 21.077508] [ 21.077879] The buggy address belongs to the physical page: [ 21.077929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac [ 21.077984] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.078446] page_type: f5(slab) [ 21.078667] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.078783] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.078955] page dumped because: kasan: bad access detected [ 21.079212] [ 21.079300] Memory state around the buggy address: [ 21.079342] fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.079543] fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.079601] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.079642] ^ [ 21.079686] fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.079741] fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.079792] ================================================================== [ 21.171873] ================================================================== [ 21.171926] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 21.172149] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265 [ 21.172343] [ 21.172601] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.173009] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.173104] Hardware name: linux,dummy-virt (DT) [ 21.173174] Call trace: [ 21.173238] show_stack+0x20/0x38 (C) [ 21.173388] dump_stack_lvl+0x8c/0xd0 [ 21.173478] print_report+0x118/0x608 [ 21.173691] kasan_report+0xdc/0x128 [ 21.173749] kasan_check_range+0x100/0x1a8 [ 21.173866] __kasan_check_write+0x20/0x30 [ 21.174106] kasan_atomics_helper+0x15b4/0x4858 [ 21.174471] kasan_atomics+0x198/0x2e0 [ 21.174636] kunit_try_run_case+0x170/0x3f0 [ 21.174732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.174826] kthread+0x328/0x630 [ 21.174965] ret_from_fork+0x10/0x20 [ 21.175016] [ 21.175221] Allocated by task 265: [ 21.175397] kasan_save_stack+0x3c/0x68 [ 21.175654] kasan_save_track+0x20/0x40 [ 21.175879] kasan_save_alloc_info+0x40/0x58 [ 21.175976] __kasan_kmalloc+0xd4/0xd8 [ 21.176217] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.176357] kasan_atomics+0xb8/0x2e0 [ 21.176684] kunit_try_run_case+0x170/0x3f0 [ 21.176778] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.177031] kthread+0x328/0x630 [ 21.177142] ret_from_fork+0x10/0x20 [ 21.177240] [ 21.177425] The buggy address belongs to the object at fff00000c58ac280 [ 21.177425] which belongs to the cache kmalloc-64 of size 64 [ 21.177591] The buggy address is located 0 bytes to the right of [ 21.177591] allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0) [ 21.177730] [ 21.177820] The buggy address belongs to the physical page: [ 21.177855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac [ 21.177909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.177980] page_type: f5(slab) [ 21.178020] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.178079] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.178122] page dumped because: kasan: bad access detected [ 21.178162] [ 21.178191] Memory state around the buggy address: [ 21.178226] fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.178274] fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.178321] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.178371] ^ [ 21.178429] fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.178494] fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.178539] ================================================================== [ 21.206507] ================================================================== [ 21.206559] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 21.206636] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265 [ 21.206689] [ 21.206720] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.206803] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.206848] Hardware name: linux,dummy-virt (DT) [ 21.206880] Call trace: [ 21.206909] show_stack+0x20/0x38 (C) [ 21.206959] dump_stack_lvl+0x8c/0xd0 [ 21.207007] print_report+0x118/0x608 [ 21.207064] kasan_report+0xdc/0x128 [ 21.207112] kasan_check_range+0x100/0x1a8 [ 21.207160] __kasan_check_write+0x20/0x30 [ 21.207207] kasan_atomics_helper+0x16d0/0x4858 [ 21.207257] kasan_atomics+0x198/0x2e0 [ 21.207303] kunit_try_run_case+0x170/0x3f0 [ 21.207361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.207416] kthread+0x328/0x630 [ 21.207466] ret_from_fork+0x10/0x20 [ 21.207515] [ 21.207534] Allocated by task 265: [ 21.207589] kasan_save_stack+0x3c/0x68 [ 21.207636] kasan_save_track+0x20/0x40 [ 21.207684] kasan_save_alloc_info+0x40/0x58 [ 21.207728] __kasan_kmalloc+0xd4/0xd8 [ 21.207766] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.207812] kasan_atomics+0xb8/0x2e0 [ 21.207860] kunit_try_run_case+0x170/0x3f0 [ 21.207899] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.207945] kthread+0x328/0x630 [ 21.207978] ret_from_fork+0x10/0x20 [ 21.208015] [ 21.208045] The buggy address belongs to the object at fff00000c58ac280 [ 21.208045] which belongs to the cache kmalloc-64 of size 64 [ 21.208113] The buggy address is located 0 bytes to the right of [ 21.208113] allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0) [ 21.208181] [ 21.208209] The buggy address belongs to the physical page: [ 21.208242] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac [ 21.208295] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.208344] page_type: f5(slab) [ 21.208383] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.208434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.208477] page dumped because: kasan: bad access detected [ 21.208511] [ 21.208531] Memory state around the buggy address: [ 21.208563] fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.208617] fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.209130] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.209185] ^ [ 21.209223] fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.209400] fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.209969] ================================================================== [ 21.043938] ================================================================== [ 21.043993] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 21.044204] Write of size 8 at addr fff00000c58ac2b0 by task kunit_try_catch/265 [ 21.044297] [ 21.044334] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.044589] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.044791] Hardware name: linux,dummy-virt (DT) [ 21.045124] Call trace: [ 21.045193] show_stack+0x20/0x38 (C) [ 21.045411] dump_stack_lvl+0x8c/0xd0 [ 21.045603] print_report+0x118/0x608 [ 21.045833] kasan_report+0xdc/0x128 [ 21.045960] kasan_check_range+0x100/0x1a8 [ 21.046074] __kasan_check_write+0x20/0x30 [ 21.046269] kasan_atomics_helper+0xff0/0x4858 [ 21.046539] kasan_atomics+0x198/0x2e0 [ 21.046663] kunit_try_run_case+0x170/0x3f0 [ 21.046755] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.046834] kthread+0x328/0x630 [ 21.046878] ret_from_fork+0x10/0x20 [ 21.047107] [ 21.047517] Allocated by task 265: [ 21.047609] kasan_save_stack+0x3c/0x68 [ 21.047763] kasan_save_track+0x20/0x40 [ 21.047860] kasan_save_alloc_info+0x40/0x58 [ 21.048001] __kasan_kmalloc+0xd4/0xd8 [ 21.048052] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.048095] kasan_atomics+0xb8/0x2e0 [ 21.048318] kunit_try_run_case+0x170/0x3f0 [ 21.048732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.048950] kthread+0x328/0x630 [ 21.048994] ret_from_fork+0x10/0x20 [ 21.049034] [ 21.049058] The buggy address belongs to the object at fff00000c58ac280 [ 21.049058] which belongs to the cache kmalloc-64 of size 64 [ 21.049334] The buggy address is located 0 bytes to the right of [ 21.049334] allocated 48-byte region [fff00000c58ac280, fff00000c58ac2b0) [ 21.049530] [ 21.049597] The buggy address belongs to the physical page: [ 21.049650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac [ 21.049965] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.050030] page_type: f5(slab) [ 21.050269] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.050341] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.050583] page dumped because: kasan: bad access detected [ 21.050624] [ 21.051167] Memory state around the buggy address: [ 21.051433] fff00000c58ac180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.051496] fff00000c58ac200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.051825] >fff00000c58ac280: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.052136] ^ [ 21.052296] fff00000c58ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.052688] fff00000c58ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.053052] ==================================================================
[ 14.787154] ================================================================== [ 14.787512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 14.788143] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.788408] [ 14.788521] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.788576] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.788590] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.788611] Call Trace: [ 14.788638] <TASK> [ 14.788654] dump_stack_lvl+0x73/0xb0 [ 14.788691] print_report+0xd1/0x650 [ 14.788716] ? __virt_addr_valid+0x1db/0x2d0 [ 14.788759] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.788782] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.788804] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.788826] kasan_report+0x141/0x180 [ 14.788849] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.788874] kasan_check_range+0x10c/0x1c0 [ 14.788898] __kasan_check_write+0x18/0x20 [ 14.788918] kasan_atomics_helper+0x16e7/0x5450 [ 14.788941] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.788963] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.788989] ? kasan_atomics+0x152/0x310 [ 14.789016] kasan_atomics+0x1dc/0x310 [ 14.789039] ? __pfx_kasan_atomics+0x10/0x10 [ 14.789073] ? __pfx_read_tsc+0x10/0x10 [ 14.789094] ? ktime_get_ts64+0x86/0x230 [ 14.789130] kunit_try_run_case+0x1a5/0x480 [ 14.789155] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.789179] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.789203] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.789236] ? __kthread_parkme+0x82/0x180 [ 14.789257] ? preempt_count_sub+0x50/0x80 [ 14.789282] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.789316] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.789340] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.789373] kthread+0x337/0x6f0 [ 14.789402] ? trace_preempt_on+0x20/0xc0 [ 14.789426] ? __pfx_kthread+0x10/0x10 [ 14.789448] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.789480] ? calculate_sigpending+0x7b/0xa0 [ 14.789504] ? __pfx_kthread+0x10/0x10 [ 14.789526] ret_from_fork+0x116/0x1d0 [ 14.789546] ? __pfx_kthread+0x10/0x10 [ 14.789575] ret_from_fork_asm+0x1a/0x30 [ 14.789606] </TASK> [ 14.789618] [ 14.797444] Allocated by task 284: [ 14.797652] kasan_save_stack+0x45/0x70 [ 14.798001] kasan_save_track+0x18/0x40 [ 14.798195] kasan_save_alloc_info+0x3b/0x50 [ 14.798440] __kasan_kmalloc+0xb7/0xc0 [ 14.798632] __kmalloc_cache_noprof+0x189/0x420 [ 14.798893] kasan_atomics+0x95/0x310 [ 14.799070] kunit_try_run_case+0x1a5/0x480 [ 14.799278] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.799542] kthread+0x337/0x6f0 [ 14.799705] ret_from_fork+0x116/0x1d0 [ 14.799873] ret_from_fork_asm+0x1a/0x30 [ 14.800095] [ 14.800181] The buggy address belongs to the object at ffff888103128480 [ 14.800181] which belongs to the cache kmalloc-64 of size 64 [ 14.800679] The buggy address is located 0 bytes to the right of [ 14.800679] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.801246] [ 14.801355] The buggy address belongs to the physical page: [ 14.801579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.801953] flags: 0x200000000000000(node=0|zone=2) [ 14.802200] page_type: f5(slab) [ 14.802334] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.802718] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.803004] page dumped because: kasan: bad access detected [ 14.803285] [ 14.803391] Memory state around the buggy address: [ 14.803606] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.803844] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.804072] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.804317] ^ [ 14.804548] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.805236] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.805544] ================================================================== [ 15.110580] ================================================================== [ 15.111023] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 15.111387] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 15.111662] [ 15.111753] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.111798] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.111812] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.111834] Call Trace: [ 15.111854] <TASK> [ 15.111874] dump_stack_lvl+0x73/0xb0 [ 15.111902] print_report+0xd1/0x650 [ 15.111926] ? __virt_addr_valid+0x1db/0x2d0 [ 15.111950] ? kasan_atomics_helper+0x2006/0x5450 [ 15.111972] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.111995] ? kasan_atomics_helper+0x2006/0x5450 [ 15.112017] kasan_report+0x141/0x180 [ 15.112041] ? kasan_atomics_helper+0x2006/0x5450 [ 15.112067] kasan_check_range+0x10c/0x1c0 [ 15.112091] __kasan_check_write+0x18/0x20 [ 15.112111] kasan_atomics_helper+0x2006/0x5450 [ 15.112135] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.112157] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.112183] ? kasan_atomics+0x152/0x310 [ 15.112211] kasan_atomics+0x1dc/0x310 [ 15.112246] ? __pfx_kasan_atomics+0x10/0x10 [ 15.112271] ? __pfx_read_tsc+0x10/0x10 [ 15.112293] ? ktime_get_ts64+0x86/0x230 [ 15.112317] kunit_try_run_case+0x1a5/0x480 [ 15.112354] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.112377] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.112402] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.112425] ? __kthread_parkme+0x82/0x180 [ 15.112448] ? preempt_count_sub+0x50/0x80 [ 15.112473] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.112497] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.112521] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.112546] kthread+0x337/0x6f0 [ 15.112566] ? trace_preempt_on+0x20/0xc0 [ 15.112591] ? __pfx_kthread+0x10/0x10 [ 15.112613] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.112636] ? calculate_sigpending+0x7b/0xa0 [ 15.112661] ? __pfx_kthread+0x10/0x10 [ 15.112683] ret_from_fork+0x116/0x1d0 [ 15.112702] ? __pfx_kthread+0x10/0x10 [ 15.112724] ret_from_fork_asm+0x1a/0x30 [ 15.112756] </TASK> [ 15.112768] [ 15.120391] Allocated by task 284: [ 15.120525] kasan_save_stack+0x45/0x70 [ 15.120724] kasan_save_track+0x18/0x40 [ 15.120950] kasan_save_alloc_info+0x3b/0x50 [ 15.121160] __kasan_kmalloc+0xb7/0xc0 [ 15.121356] __kmalloc_cache_noprof+0x189/0x420 [ 15.121585] kasan_atomics+0x95/0x310 [ 15.121812] kunit_try_run_case+0x1a5/0x480 [ 15.122023] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.122233] kthread+0x337/0x6f0 [ 15.122390] ret_from_fork+0x116/0x1d0 [ 15.122527] ret_from_fork_asm+0x1a/0x30 [ 15.122667] [ 15.122738] The buggy address belongs to the object at ffff888103128480 [ 15.122738] which belongs to the cache kmalloc-64 of size 64 [ 15.123371] The buggy address is located 0 bytes to the right of [ 15.123371] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 15.123872] [ 15.123946] The buggy address belongs to the physical page: [ 15.124120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 15.124368] flags: 0x200000000000000(node=0|zone=2) [ 15.124674] page_type: f5(slab) [ 15.124953] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.125289] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.125621] page dumped because: kasan: bad access detected [ 15.125936] [ 15.126031] Memory state around the buggy address: [ 15.126227] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.126511] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.126774] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.127079] ^ [ 15.127262] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.127493] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.127725] ================================================================== [ 13.928350] ================================================================== [ 13.928803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 13.929115] Read of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 13.929421] [ 13.929507] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.929548] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.929560] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.929631] Call Trace: [ 13.929647] <TASK> [ 13.929675] dump_stack_lvl+0x73/0xb0 [ 13.929701] print_report+0xd1/0x650 [ 13.929722] ? __virt_addr_valid+0x1db/0x2d0 [ 13.929744] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.929764] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.929785] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.929806] kasan_report+0x141/0x180 [ 13.929827] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.929851] __asan_report_load4_noabort+0x18/0x20 [ 13.929876] kasan_atomics_helper+0x4b88/0x5450 [ 13.929897] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.929917] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.929944] ? kasan_atomics+0x152/0x310 [ 13.929969] kasan_atomics+0x1dc/0x310 [ 13.930001] ? __pfx_kasan_atomics+0x10/0x10 [ 13.930025] ? __pfx_read_tsc+0x10/0x10 [ 13.930043] ? ktime_get_ts64+0x86/0x230 [ 13.930078] kunit_try_run_case+0x1a5/0x480 [ 13.930101] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.930123] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.930154] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.930177] ? __kthread_parkme+0x82/0x180 [ 13.930197] ? preempt_count_sub+0x50/0x80 [ 13.930220] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.930253] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.930275] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.930298] kthread+0x337/0x6f0 [ 13.930318] ? trace_preempt_on+0x20/0xc0 [ 13.930341] ? __pfx_kthread+0x10/0x10 [ 13.930370] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.930390] ? calculate_sigpending+0x7b/0xa0 [ 13.930421] ? __pfx_kthread+0x10/0x10 [ 13.930441] ret_from_fork+0x116/0x1d0 [ 13.930459] ? __pfx_kthread+0x10/0x10 [ 13.930484] ret_from_fork_asm+0x1a/0x30 [ 13.930514] </TASK> [ 13.930526] [ 13.938655] Allocated by task 284: [ 13.938844] kasan_save_stack+0x45/0x70 [ 13.939296] kasan_save_track+0x18/0x40 [ 13.939541] kasan_save_alloc_info+0x3b/0x50 [ 13.939994] __kasan_kmalloc+0xb7/0xc0 [ 13.940166] __kmalloc_cache_noprof+0x189/0x420 [ 13.940459] kasan_atomics+0x95/0x310 [ 13.940650] kunit_try_run_case+0x1a5/0x480 [ 13.941012] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.941272] kthread+0x337/0x6f0 [ 13.941426] ret_from_fork+0x116/0x1d0 [ 13.941561] ret_from_fork_asm+0x1a/0x30 [ 13.941859] [ 13.941972] The buggy address belongs to the object at ffff888103128480 [ 13.941972] which belongs to the cache kmalloc-64 of size 64 [ 13.942424] The buggy address is located 0 bytes to the right of [ 13.942424] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 13.942904] [ 13.943032] The buggy address belongs to the physical page: [ 13.943316] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 13.943939] flags: 0x200000000000000(node=0|zone=2) [ 13.944106] page_type: f5(slab) [ 13.944228] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.944901] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.945228] page dumped because: kasan: bad access detected [ 13.945485] [ 13.945558] Memory state around the buggy address: [ 13.945933] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.946202] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.946447] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.947065] ^ [ 13.947320] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.947713] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.948022] ================================================================== [ 14.118252] ================================================================== [ 14.118892] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 14.119238] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.119645] [ 14.119781] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.119825] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.119838] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.119860] Call Trace: [ 14.119876] <TASK> [ 14.119893] dump_stack_lvl+0x73/0xb0 [ 14.119922] print_report+0xd1/0x650 [ 14.119946] ? __virt_addr_valid+0x1db/0x2d0 [ 14.119970] ? kasan_atomics_helper+0x72f/0x5450 [ 14.119992] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.120016] ? kasan_atomics_helper+0x72f/0x5450 [ 14.120038] kasan_report+0x141/0x180 [ 14.120061] ? kasan_atomics_helper+0x72f/0x5450 [ 14.120088] kasan_check_range+0x10c/0x1c0 [ 14.120112] __kasan_check_write+0x18/0x20 [ 14.120132] kasan_atomics_helper+0x72f/0x5450 [ 14.120169] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.120192] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.120231] ? kasan_atomics+0x152/0x310 [ 14.120259] kasan_atomics+0x1dc/0x310 [ 14.120283] ? __pfx_kasan_atomics+0x10/0x10 [ 14.120307] ? __pfx_read_tsc+0x10/0x10 [ 14.120328] ? ktime_get_ts64+0x86/0x230 [ 14.120362] kunit_try_run_case+0x1a5/0x480 [ 14.120386] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.120408] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.120433] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.120458] ? __kthread_parkme+0x82/0x180 [ 14.120480] ? preempt_count_sub+0x50/0x80 [ 14.120507] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.120532] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.120556] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.120624] kthread+0x337/0x6f0 [ 14.120647] ? trace_preempt_on+0x20/0xc0 [ 14.120672] ? __pfx_kthread+0x10/0x10 [ 14.120694] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.120717] ? calculate_sigpending+0x7b/0xa0 [ 14.120750] ? __pfx_kthread+0x10/0x10 [ 14.120772] ret_from_fork+0x116/0x1d0 [ 14.120792] ? __pfx_kthread+0x10/0x10 [ 14.120813] ret_from_fork_asm+0x1a/0x30 [ 14.120844] </TASK> [ 14.120856] [ 14.129431] Allocated by task 284: [ 14.129895] kasan_save_stack+0x45/0x70 [ 14.130083] kasan_save_track+0x18/0x40 [ 14.130227] kasan_save_alloc_info+0x3b/0x50 [ 14.130444] __kasan_kmalloc+0xb7/0xc0 [ 14.130720] __kmalloc_cache_noprof+0x189/0x420 [ 14.130902] kasan_atomics+0x95/0x310 [ 14.131038] kunit_try_run_case+0x1a5/0x480 [ 14.131242] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.131561] kthread+0x337/0x6f0 [ 14.131848] ret_from_fork+0x116/0x1d0 [ 14.132037] ret_from_fork_asm+0x1a/0x30 [ 14.132265] [ 14.132342] The buggy address belongs to the object at ffff888103128480 [ 14.132342] which belongs to the cache kmalloc-64 of size 64 [ 14.132786] The buggy address is located 0 bytes to the right of [ 14.132786] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.133556] [ 14.133717] The buggy address belongs to the physical page: [ 14.133998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.134243] flags: 0x200000000000000(node=0|zone=2) [ 14.134417] page_type: f5(slab) [ 14.134542] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.135135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.135506] page dumped because: kasan: bad access detected [ 14.135969] [ 14.136104] Memory state around the buggy address: [ 14.136331] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.136569] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.137193] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.137472] ^ [ 14.137671] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.138030] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.138669] ================================================================== [ 14.374648] ================================================================== [ 14.375384] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 14.375673] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.376077] [ 14.376221] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.376263] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.376276] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.376297] Call Trace: [ 14.376310] <TASK> [ 14.376327] dump_stack_lvl+0x73/0xb0 [ 14.376375] print_report+0xd1/0x650 [ 14.376399] ? __virt_addr_valid+0x1db/0x2d0 [ 14.376424] ? kasan_atomics_helper+0xe78/0x5450 [ 14.376457] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.376480] ? kasan_atomics_helper+0xe78/0x5450 [ 14.376501] kasan_report+0x141/0x180 [ 14.376533] ? kasan_atomics_helper+0xe78/0x5450 [ 14.376560] kasan_check_range+0x10c/0x1c0 [ 14.376585] __kasan_check_write+0x18/0x20 [ 14.376615] kasan_atomics_helper+0xe78/0x5450 [ 14.376638] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.376661] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.376696] ? kasan_atomics+0x152/0x310 [ 14.376724] kasan_atomics+0x1dc/0x310 [ 14.376747] ? __pfx_kasan_atomics+0x10/0x10 [ 14.376781] ? __pfx_read_tsc+0x10/0x10 [ 14.376803] ? ktime_get_ts64+0x86/0x230 [ 14.376828] kunit_try_run_case+0x1a5/0x480 [ 14.376852] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.376884] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.376908] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.376932] ? __kthread_parkme+0x82/0x180 [ 14.376965] ? preempt_count_sub+0x50/0x80 [ 14.376989] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.377014] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.377037] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.377070] kthread+0x337/0x6f0 [ 14.377090] ? trace_preempt_on+0x20/0xc0 [ 14.377115] ? __pfx_kthread+0x10/0x10 [ 14.377146] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.377168] ? calculate_sigpending+0x7b/0xa0 [ 14.377193] ? __pfx_kthread+0x10/0x10 [ 14.377224] ret_from_fork+0x116/0x1d0 [ 14.377244] ? __pfx_kthread+0x10/0x10 [ 14.377265] ret_from_fork_asm+0x1a/0x30 [ 14.377307] </TASK> [ 14.377319] [ 14.384999] Allocated by task 284: [ 14.385159] kasan_save_stack+0x45/0x70 [ 14.385397] kasan_save_track+0x18/0x40 [ 14.385565] kasan_save_alloc_info+0x3b/0x50 [ 14.385802] __kasan_kmalloc+0xb7/0xc0 [ 14.385951] __kmalloc_cache_noprof+0x189/0x420 [ 14.386187] kasan_atomics+0x95/0x310 [ 14.386401] kunit_try_run_case+0x1a5/0x480 [ 14.386597] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.386867] kthread+0x337/0x6f0 [ 14.387032] ret_from_fork+0x116/0x1d0 [ 14.387225] ret_from_fork_asm+0x1a/0x30 [ 14.387393] [ 14.387468] The buggy address belongs to the object at ffff888103128480 [ 14.387468] which belongs to the cache kmalloc-64 of size 64 [ 14.387822] The buggy address is located 0 bytes to the right of [ 14.387822] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.388243] [ 14.388360] The buggy address belongs to the physical page: [ 14.388615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.389282] flags: 0x200000000000000(node=0|zone=2) [ 14.389530] page_type: f5(slab) [ 14.389698] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.390085] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.390434] page dumped because: kasan: bad access detected [ 14.390619] [ 14.390689] Memory state around the buggy address: [ 14.390845] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.391061] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.391276] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.391510] ^ [ 14.391897] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.392246] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.392594] ================================================================== [ 14.492118] ================================================================== [ 14.492412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 14.492854] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.493167] [ 14.493302] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.493370] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.493384] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.493405] Call Trace: [ 14.493424] <TASK> [ 14.493453] dump_stack_lvl+0x73/0xb0 [ 14.493482] print_report+0xd1/0x650 [ 14.493507] ? __virt_addr_valid+0x1db/0x2d0 [ 14.493543] ? kasan_atomics_helper+0x1148/0x5450 [ 14.493565] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.493833] ? kasan_atomics_helper+0x1148/0x5450 [ 14.493868] kasan_report+0x141/0x180 [ 14.493892] ? kasan_atomics_helper+0x1148/0x5450 [ 14.493919] kasan_check_range+0x10c/0x1c0 [ 14.493955] __kasan_check_write+0x18/0x20 [ 14.493974] kasan_atomics_helper+0x1148/0x5450 [ 14.493998] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.494021] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.494056] ? kasan_atomics+0x152/0x310 [ 14.494084] kasan_atomics+0x1dc/0x310 [ 14.494117] ? __pfx_kasan_atomics+0x10/0x10 [ 14.494142] ? __pfx_read_tsc+0x10/0x10 [ 14.494163] ? ktime_get_ts64+0x86/0x230 [ 14.494189] kunit_try_run_case+0x1a5/0x480 [ 14.494214] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.494246] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.494271] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.494304] ? __kthread_parkme+0x82/0x180 [ 14.494326] ? preempt_count_sub+0x50/0x80 [ 14.494359] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.494383] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.494416] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.494441] kthread+0x337/0x6f0 [ 14.494461] ? trace_preempt_on+0x20/0xc0 [ 14.494498] ? __pfx_kthread+0x10/0x10 [ 14.494520] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.494542] ? calculate_sigpending+0x7b/0xa0 [ 14.494576] ? __pfx_kthread+0x10/0x10 [ 14.494599] ret_from_fork+0x116/0x1d0 [ 14.494618] ? __pfx_kthread+0x10/0x10 [ 14.494640] ret_from_fork_asm+0x1a/0x30 [ 14.494673] </TASK> [ 14.494684] [ 14.506215] Allocated by task 284: [ 14.506437] kasan_save_stack+0x45/0x70 [ 14.506635] kasan_save_track+0x18/0x40 [ 14.507132] kasan_save_alloc_info+0x3b/0x50 [ 14.507385] __kasan_kmalloc+0xb7/0xc0 [ 14.507567] __kmalloc_cache_noprof+0x189/0x420 [ 14.507966] kasan_atomics+0x95/0x310 [ 14.508282] kunit_try_run_case+0x1a5/0x480 [ 14.508683] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.509079] kthread+0x337/0x6f0 [ 14.509250] ret_from_fork+0x116/0x1d0 [ 14.509440] ret_from_fork_asm+0x1a/0x30 [ 14.509629] [ 14.509722] The buggy address belongs to the object at ffff888103128480 [ 14.509722] which belongs to the cache kmalloc-64 of size 64 [ 14.510206] The buggy address is located 0 bytes to the right of [ 14.510206] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.511450] [ 14.511702] The buggy address belongs to the physical page: [ 14.512357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.512829] flags: 0x200000000000000(node=0|zone=2) [ 14.513061] page_type: f5(slab) [ 14.513224] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.513543] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.514232] page dumped because: kasan: bad access detected [ 14.514539] [ 14.514774] Memory state around the buggy address: [ 14.515137] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.515450] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.515964] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.516438] ^ [ 14.516613] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.516848] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.517065] ================================================================== [ 14.011321] ================================================================== [ 14.011763] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 14.012067] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.012400] [ 14.012511] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.012554] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.012611] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.012633] Call Trace: [ 14.012646] <TASK> [ 14.012664] dump_stack_lvl+0x73/0xb0 [ 14.012692] print_report+0xd1/0x650 [ 14.012717] ? __virt_addr_valid+0x1db/0x2d0 [ 14.012741] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.012763] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.012787] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.012808] kasan_report+0x141/0x180 [ 14.012831] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.012857] kasan_check_range+0x10c/0x1c0 [ 14.012882] __kasan_check_write+0x18/0x20 [ 14.012902] kasan_atomics_helper+0x4a0/0x5450 [ 14.012925] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.012947] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.012973] ? kasan_atomics+0x152/0x310 [ 14.013000] kasan_atomics+0x1dc/0x310 [ 14.013024] ? __pfx_kasan_atomics+0x10/0x10 [ 14.013048] ? __pfx_read_tsc+0x10/0x10 [ 14.013069] ? ktime_get_ts64+0x86/0x230 [ 14.013094] kunit_try_run_case+0x1a5/0x480 [ 14.013118] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.013141] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.013165] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.013187] ? __kthread_parkme+0x82/0x180 [ 14.013209] ? preempt_count_sub+0x50/0x80 [ 14.013233] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.013257] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.013281] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.013303] kthread+0x337/0x6f0 [ 14.013324] ? trace_preempt_on+0x20/0xc0 [ 14.013348] ? __pfx_kthread+0x10/0x10 [ 14.013382] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.013403] ? calculate_sigpending+0x7b/0xa0 [ 14.013426] ? __pfx_kthread+0x10/0x10 [ 14.013448] ret_from_fork+0x116/0x1d0 [ 14.013467] ? __pfx_kthread+0x10/0x10 [ 14.013488] ret_from_fork_asm+0x1a/0x30 [ 14.013519] </TASK> [ 14.013531] [ 14.022133] Allocated by task 284: [ 14.022370] kasan_save_stack+0x45/0x70 [ 14.022732] kasan_save_track+0x18/0x40 [ 14.022963] kasan_save_alloc_info+0x3b/0x50 [ 14.023271] __kasan_kmalloc+0xb7/0xc0 [ 14.023485] __kmalloc_cache_noprof+0x189/0x420 [ 14.023859] kasan_atomics+0x95/0x310 [ 14.024072] kunit_try_run_case+0x1a5/0x480 [ 14.024276] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.024539] kthread+0x337/0x6f0 [ 14.024797] ret_from_fork+0x116/0x1d0 [ 14.024980] ret_from_fork_asm+0x1a/0x30 [ 14.025181] [ 14.025281] The buggy address belongs to the object at ffff888103128480 [ 14.025281] which belongs to the cache kmalloc-64 of size 64 [ 14.025861] The buggy address is located 0 bytes to the right of [ 14.025861] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.026229] [ 14.026303] The buggy address belongs to the physical page: [ 14.026595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.026952] flags: 0x200000000000000(node=0|zone=2) [ 14.027187] page_type: f5(slab) [ 14.027309] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.027572] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.028182] page dumped because: kasan: bad access detected [ 14.028486] [ 14.028804] Memory state around the buggy address: [ 14.029029] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.029251] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.029630] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.030174] ^ [ 14.030421] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.030768] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.031157] ================================================================== [ 14.595828] ================================================================== [ 14.596186] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 14.596550] Read of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.597015] [ 14.597128] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.597172] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.597186] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.597208] Call Trace: [ 14.597225] <TASK> [ 14.597243] dump_stack_lvl+0x73/0xb0 [ 14.597270] print_report+0xd1/0x650 [ 14.597294] ? __virt_addr_valid+0x1db/0x2d0 [ 14.597318] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.597339] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.597376] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.597398] kasan_report+0x141/0x180 [ 14.597420] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.597446] __asan_report_load4_noabort+0x18/0x20 [ 14.597471] kasan_atomics_helper+0x49ce/0x5450 [ 14.597494] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.597516] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.597542] ? kasan_atomics+0x152/0x310 [ 14.597568] kasan_atomics+0x1dc/0x310 [ 14.597593] ? __pfx_kasan_atomics+0x10/0x10 [ 14.597617] ? __pfx_read_tsc+0x10/0x10 [ 14.597639] ? ktime_get_ts64+0x86/0x230 [ 14.597663] kunit_try_run_case+0x1a5/0x480 [ 14.597687] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.597710] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.597733] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.597769] ? __kthread_parkme+0x82/0x180 [ 14.597791] ? preempt_count_sub+0x50/0x80 [ 14.597815] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.597839] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.597862] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.597885] kthread+0x337/0x6f0 [ 14.597905] ? trace_preempt_on+0x20/0xc0 [ 14.597929] ? __pfx_kthread+0x10/0x10 [ 14.597950] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.597971] ? calculate_sigpending+0x7b/0xa0 [ 14.597995] ? __pfx_kthread+0x10/0x10 [ 14.598018] ret_from_fork+0x116/0x1d0 [ 14.598036] ? __pfx_kthread+0x10/0x10 [ 14.598057] ret_from_fork_asm+0x1a/0x30 [ 14.598088] </TASK> [ 14.598100] [ 14.605541] Allocated by task 284: [ 14.605739] kasan_save_stack+0x45/0x70 [ 14.605956] kasan_save_track+0x18/0x40 [ 14.606151] kasan_save_alloc_info+0x3b/0x50 [ 14.606380] __kasan_kmalloc+0xb7/0xc0 [ 14.606579] __kmalloc_cache_noprof+0x189/0x420 [ 14.606809] kasan_atomics+0x95/0x310 [ 14.607013] kunit_try_run_case+0x1a5/0x480 [ 14.607190] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.607420] kthread+0x337/0x6f0 [ 14.607578] ret_from_fork+0x116/0x1d0 [ 14.607716] ret_from_fork_asm+0x1a/0x30 [ 14.607858] [ 14.607931] The buggy address belongs to the object at ffff888103128480 [ 14.607931] which belongs to the cache kmalloc-64 of size 64 [ 14.608587] The buggy address is located 0 bytes to the right of [ 14.608587] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.609034] [ 14.609149] The buggy address belongs to the physical page: [ 14.609422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.610246] flags: 0x200000000000000(node=0|zone=2) [ 14.610507] page_type: f5(slab) [ 14.610664] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.611866] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.612777] page dumped because: kasan: bad access detected [ 14.613261] [ 14.613695] Memory state around the buggy address: [ 14.614301] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.615113] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.615870] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.616463] ^ [ 14.616628] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.616854] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.617074] ================================================================== [ 14.691342] ================================================================== [ 14.691849] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 14.692305] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.692545] [ 14.692633] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.692677] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.692690] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.692713] Call Trace: [ 14.692731] <TASK> [ 14.692758] dump_stack_lvl+0x73/0xb0 [ 14.692786] print_report+0xd1/0x650 [ 14.692811] ? __virt_addr_valid+0x1db/0x2d0 [ 14.692834] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.692879] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.692902] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.692924] kasan_report+0x141/0x180 [ 14.692947] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.692973] __asan_report_store8_noabort+0x1b/0x30 [ 14.692995] kasan_atomics_helper+0x50d4/0x5450 [ 14.693018] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.693040] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.693067] ? kasan_atomics+0x152/0x310 [ 14.693094] kasan_atomics+0x1dc/0x310 [ 14.693117] ? __pfx_kasan_atomics+0x10/0x10 [ 14.693141] ? __pfx_read_tsc+0x10/0x10 [ 14.693163] ? ktime_get_ts64+0x86/0x230 [ 14.693188] kunit_try_run_case+0x1a5/0x480 [ 14.693212] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.693235] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.693259] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.693282] ? __kthread_parkme+0x82/0x180 [ 14.693303] ? preempt_count_sub+0x50/0x80 [ 14.693326] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.693361] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.693384] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.693408] kthread+0x337/0x6f0 [ 14.693428] ? trace_preempt_on+0x20/0xc0 [ 14.693452] ? __pfx_kthread+0x10/0x10 [ 14.693473] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.693495] ? calculate_sigpending+0x7b/0xa0 [ 14.693519] ? __pfx_kthread+0x10/0x10 [ 14.693541] ret_from_fork+0x116/0x1d0 [ 14.693562] ? __pfx_kthread+0x10/0x10 [ 14.693583] ret_from_fork_asm+0x1a/0x30 [ 14.693614] </TASK> [ 14.693627] [ 14.704629] Allocated by task 284: [ 14.704839] kasan_save_stack+0x45/0x70 [ 14.704989] kasan_save_track+0x18/0x40 [ 14.705186] kasan_save_alloc_info+0x3b/0x50 [ 14.705428] __kasan_kmalloc+0xb7/0xc0 [ 14.705632] __kmalloc_cache_noprof+0x189/0x420 [ 14.705823] kasan_atomics+0x95/0x310 [ 14.706038] kunit_try_run_case+0x1a5/0x480 [ 14.706269] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.706541] kthread+0x337/0x6f0 [ 14.706700] ret_from_fork+0x116/0x1d0 [ 14.706859] ret_from_fork_asm+0x1a/0x30 [ 14.707099] [ 14.707223] The buggy address belongs to the object at ffff888103128480 [ 14.707223] which belongs to the cache kmalloc-64 of size 64 [ 14.707773] The buggy address is located 0 bytes to the right of [ 14.707773] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.708363] [ 14.708463] The buggy address belongs to the physical page: [ 14.708725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.709009] flags: 0x200000000000000(node=0|zone=2) [ 14.709175] page_type: f5(slab) [ 14.709296] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.710020] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.710388] page dumped because: kasan: bad access detected [ 14.710640] [ 14.710749] Memory state around the buggy address: [ 14.710955] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.711201] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.711517] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.711738] ^ [ 14.712006] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.712324] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.712620] ================================================================== [ 14.763779] ================================================================== [ 14.764113] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 14.764442] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.765145] [ 14.765424] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.765474] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.765487] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.765511] Call Trace: [ 14.765527] <TASK> [ 14.765551] dump_stack_lvl+0x73/0xb0 [ 14.765581] print_report+0xd1/0x650 [ 14.765605] ? __virt_addr_valid+0x1db/0x2d0 [ 14.765629] ? kasan_atomics_helper+0x164f/0x5450 [ 14.765650] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.765673] ? kasan_atomics_helper+0x164f/0x5450 [ 14.765695] kasan_report+0x141/0x180 [ 14.765718] ? kasan_atomics_helper+0x164f/0x5450 [ 14.765776] kasan_check_range+0x10c/0x1c0 [ 14.765802] __kasan_check_write+0x18/0x20 [ 14.765822] kasan_atomics_helper+0x164f/0x5450 [ 14.765846] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.765868] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.765894] ? kasan_atomics+0x152/0x310 [ 14.765921] kasan_atomics+0x1dc/0x310 [ 14.765945] ? __pfx_kasan_atomics+0x10/0x10 [ 14.765969] ? __pfx_read_tsc+0x10/0x10 [ 14.765991] ? ktime_get_ts64+0x86/0x230 [ 14.766016] kunit_try_run_case+0x1a5/0x480 [ 14.766042] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.766064] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.766088] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.766111] ? __kthread_parkme+0x82/0x180 [ 14.766133] ? preempt_count_sub+0x50/0x80 [ 14.766157] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.766181] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.766205] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.766228] kthread+0x337/0x6f0 [ 14.766249] ? trace_preempt_on+0x20/0xc0 [ 14.766272] ? __pfx_kthread+0x10/0x10 [ 14.766295] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.766317] ? calculate_sigpending+0x7b/0xa0 [ 14.766341] ? __pfx_kthread+0x10/0x10 [ 14.766374] ret_from_fork+0x116/0x1d0 [ 14.766394] ? __pfx_kthread+0x10/0x10 [ 14.766415] ret_from_fork_asm+0x1a/0x30 [ 14.766445] </TASK> [ 14.766458] [ 14.778505] Allocated by task 284: [ 14.778722] kasan_save_stack+0x45/0x70 [ 14.778933] kasan_save_track+0x18/0x40 [ 14.779138] kasan_save_alloc_info+0x3b/0x50 [ 14.779368] __kasan_kmalloc+0xb7/0xc0 [ 14.779531] __kmalloc_cache_noprof+0x189/0x420 [ 14.779836] kasan_atomics+0x95/0x310 [ 14.780018] kunit_try_run_case+0x1a5/0x480 [ 14.780225] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.780474] kthread+0x337/0x6f0 [ 14.780618] ret_from_fork+0x116/0x1d0 [ 14.780828] ret_from_fork_asm+0x1a/0x30 [ 14.781094] [ 14.781169] The buggy address belongs to the object at ffff888103128480 [ 14.781169] which belongs to the cache kmalloc-64 of size 64 [ 14.781714] The buggy address is located 0 bytes to the right of [ 14.781714] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.782228] [ 14.782330] The buggy address belongs to the physical page: [ 14.782596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.783030] flags: 0x200000000000000(node=0|zone=2) [ 14.783227] page_type: f5(slab) [ 14.783362] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.783717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.784062] page dumped because: kasan: bad access detected [ 14.784299] [ 14.784378] Memory state around the buggy address: [ 14.784571] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.784956] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.785304] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.785619] ^ [ 14.786036] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.786340] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.786623] ================================================================== [ 14.888875] ================================================================== [ 14.889230] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 14.889635] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.890002] [ 14.890118] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.890161] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.890174] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.890196] Call Trace: [ 14.890212] <TASK> [ 14.890228] dump_stack_lvl+0x73/0xb0 [ 14.890256] print_report+0xd1/0x650 [ 14.890278] ? __virt_addr_valid+0x1db/0x2d0 [ 14.890301] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.890323] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.890357] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.890378] kasan_report+0x141/0x180 [ 14.890401] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.890428] kasan_check_range+0x10c/0x1c0 [ 14.890452] __kasan_check_write+0x18/0x20 [ 14.890471] kasan_atomics_helper+0x19e3/0x5450 [ 14.890494] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.890528] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.890554] ? kasan_atomics+0x152/0x310 [ 14.890582] kasan_atomics+0x1dc/0x310 [ 14.890616] ? __pfx_kasan_atomics+0x10/0x10 [ 14.890641] ? __pfx_read_tsc+0x10/0x10 [ 14.890664] ? ktime_get_ts64+0x86/0x230 [ 14.890689] kunit_try_run_case+0x1a5/0x480 [ 14.890713] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.890736] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.890760] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.890792] ? __kthread_parkme+0x82/0x180 [ 14.890814] ? preempt_count_sub+0x50/0x80 [ 14.890838] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.890873] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.890896] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.890920] kthread+0x337/0x6f0 [ 14.890939] ? trace_preempt_on+0x20/0xc0 [ 14.890963] ? __pfx_kthread+0x10/0x10 [ 14.890984] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.891005] ? calculate_sigpending+0x7b/0xa0 [ 14.891030] ? __pfx_kthread+0x10/0x10 [ 14.891052] ret_from_fork+0x116/0x1d0 [ 14.891070] ? __pfx_kthread+0x10/0x10 [ 14.891092] ret_from_fork_asm+0x1a/0x30 [ 14.891132] </TASK> [ 14.891143] [ 14.904906] Allocated by task 284: [ 14.905257] kasan_save_stack+0x45/0x70 [ 14.905583] kasan_save_track+0x18/0x40 [ 14.905722] kasan_save_alloc_info+0x3b/0x50 [ 14.905871] __kasan_kmalloc+0xb7/0xc0 [ 14.906005] __kmalloc_cache_noprof+0x189/0x420 [ 14.906166] kasan_atomics+0x95/0x310 [ 14.906305] kunit_try_run_case+0x1a5/0x480 [ 14.906470] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.906679] kthread+0x337/0x6f0 [ 14.906867] ret_from_fork+0x116/0x1d0 [ 14.907060] ret_from_fork_asm+0x1a/0x30 [ 14.907256] [ 14.907363] The buggy address belongs to the object at ffff888103128480 [ 14.907363] which belongs to the cache kmalloc-64 of size 64 [ 14.907792] The buggy address is located 0 bytes to the right of [ 14.907792] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.908366] [ 14.908444] The buggy address belongs to the physical page: [ 14.908631] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.909189] flags: 0x200000000000000(node=0|zone=2) [ 14.909402] page_type: f5(slab) [ 14.909531] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.909894] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.910235] page dumped because: kasan: bad access detected [ 14.910498] [ 14.910594] Memory state around the buggy address: [ 14.910829] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.911187] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.911517] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.911805] ^ [ 14.912048] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.912273] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.912604] ================================================================== [ 14.205808] ================================================================== [ 14.206168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 14.206507] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.206927] [ 14.207045] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.207089] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.207102] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.207124] Call Trace: [ 14.207140] <TASK> [ 14.207156] dump_stack_lvl+0x73/0xb0 [ 14.207185] print_report+0xd1/0x650 [ 14.207209] ? __virt_addr_valid+0x1db/0x2d0 [ 14.207234] ? kasan_atomics_helper+0x992/0x5450 [ 14.207256] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.207279] ? kasan_atomics_helper+0x992/0x5450 [ 14.207301] kasan_report+0x141/0x180 [ 14.207333] ? kasan_atomics_helper+0x992/0x5450 [ 14.207376] kasan_check_range+0x10c/0x1c0 [ 14.207400] __kasan_check_write+0x18/0x20 [ 14.207419] kasan_atomics_helper+0x992/0x5450 [ 14.207442] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.207465] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.207490] ? kasan_atomics+0x152/0x310 [ 14.207526] kasan_atomics+0x1dc/0x310 [ 14.207549] ? __pfx_kasan_atomics+0x10/0x10 [ 14.207584] ? __pfx_read_tsc+0x10/0x10 [ 14.207615] ? ktime_get_ts64+0x86/0x230 [ 14.207640] kunit_try_run_case+0x1a5/0x480 [ 14.207669] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.207692] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.207758] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.207794] ? __kthread_parkme+0x82/0x180 [ 14.207816] ? preempt_count_sub+0x50/0x80 [ 14.207841] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.207866] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.207889] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.207913] kthread+0x337/0x6f0 [ 14.207934] ? trace_preempt_on+0x20/0xc0 [ 14.207959] ? __pfx_kthread+0x10/0x10 [ 14.207981] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.208003] ? calculate_sigpending+0x7b/0xa0 [ 14.208027] ? __pfx_kthread+0x10/0x10 [ 14.208050] ret_from_fork+0x116/0x1d0 [ 14.208070] ? __pfx_kthread+0x10/0x10 [ 14.208101] ret_from_fork_asm+0x1a/0x30 [ 14.208133] </TASK> [ 14.208145] [ 14.217231] Allocated by task 284: [ 14.217465] kasan_save_stack+0x45/0x70 [ 14.217777] kasan_save_track+0x18/0x40 [ 14.218022] kasan_save_alloc_info+0x3b/0x50 [ 14.218254] __kasan_kmalloc+0xb7/0xc0 [ 14.218414] __kmalloc_cache_noprof+0x189/0x420 [ 14.218574] kasan_atomics+0x95/0x310 [ 14.218709] kunit_try_run_case+0x1a5/0x480 [ 14.219140] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.219456] kthread+0x337/0x6f0 [ 14.219631] ret_from_fork+0x116/0x1d0 [ 14.219828] ret_from_fork_asm+0x1a/0x30 [ 14.220125] [ 14.220265] The buggy address belongs to the object at ffff888103128480 [ 14.220265] which belongs to the cache kmalloc-64 of size 64 [ 14.220631] The buggy address is located 0 bytes to the right of [ 14.220631] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.221253] [ 14.221584] The buggy address belongs to the physical page: [ 14.222035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.222285] flags: 0x200000000000000(node=0|zone=2) [ 14.222626] page_type: f5(slab) [ 14.222864] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.223256] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.223689] page dumped because: kasan: bad access detected [ 14.223977] [ 14.224091] Memory state around the buggy address: [ 14.224369] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.224844] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.225187] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.225441] ^ [ 14.225938] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.226400] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.226620] ================================================================== [ 14.271481] ================================================================== [ 14.271895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 14.272229] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.272493] [ 14.272640] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.272684] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.272696] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.272760] Call Trace: [ 14.272778] <TASK> [ 14.272808] dump_stack_lvl+0x73/0xb0 [ 14.272836] print_report+0xd1/0x650 [ 14.272860] ? __virt_addr_valid+0x1db/0x2d0 [ 14.272883] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.272905] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.272928] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.272949] kasan_report+0x141/0x180 [ 14.272972] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.272998] kasan_check_range+0x10c/0x1c0 [ 14.273023] __kasan_check_write+0x18/0x20 [ 14.273053] kasan_atomics_helper+0xb6a/0x5450 [ 14.273076] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.273098] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.273139] ? kasan_atomics+0x152/0x310 [ 14.273165] kasan_atomics+0x1dc/0x310 [ 14.273199] ? __pfx_kasan_atomics+0x10/0x10 [ 14.273224] ? __pfx_read_tsc+0x10/0x10 [ 14.273245] ? ktime_get_ts64+0x86/0x230 [ 14.273270] kunit_try_run_case+0x1a5/0x480 [ 14.273295] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.273318] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.273341] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.273373] ? __kthread_parkme+0x82/0x180 [ 14.273395] ? preempt_count_sub+0x50/0x80 [ 14.273419] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.273452] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.273475] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.273499] kthread+0x337/0x6f0 [ 14.273529] ? trace_preempt_on+0x20/0xc0 [ 14.273554] ? __pfx_kthread+0x10/0x10 [ 14.273609] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.273633] ? calculate_sigpending+0x7b/0xa0 [ 14.273666] ? __pfx_kthread+0x10/0x10 [ 14.273690] ret_from_fork+0x116/0x1d0 [ 14.273709] ? __pfx_kthread+0x10/0x10 [ 14.273741] ret_from_fork_asm+0x1a/0x30 [ 14.273773] </TASK> [ 14.273785] [ 14.282228] Allocated by task 284: [ 14.282423] kasan_save_stack+0x45/0x70 [ 14.282709] kasan_save_track+0x18/0x40 [ 14.283023] kasan_save_alloc_info+0x3b/0x50 [ 14.283227] __kasan_kmalloc+0xb7/0xc0 [ 14.283437] __kmalloc_cache_noprof+0x189/0x420 [ 14.283652] kasan_atomics+0x95/0x310 [ 14.283967] kunit_try_run_case+0x1a5/0x480 [ 14.284169] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.284430] kthread+0x337/0x6f0 [ 14.284616] ret_from_fork+0x116/0x1d0 [ 14.284844] ret_from_fork_asm+0x1a/0x30 [ 14.285018] [ 14.285092] The buggy address belongs to the object at ffff888103128480 [ 14.285092] which belongs to the cache kmalloc-64 of size 64 [ 14.285453] The buggy address is located 0 bytes to the right of [ 14.285453] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.286112] [ 14.286211] The buggy address belongs to the physical page: [ 14.286823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.287174] flags: 0x200000000000000(node=0|zone=2) [ 14.287436] page_type: f5(slab) [ 14.287574] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.288007] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.288236] page dumped because: kasan: bad access detected [ 14.288658] [ 14.288780] Memory state around the buggy address: [ 14.289078] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.289299] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.289528] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.289746] ^ [ 14.290038] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.290439] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.290792] ================================================================== [ 14.314467] ================================================================== [ 14.314867] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 14.315201] Read of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.315528] [ 14.315706] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.315793] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.315810] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.315832] Call Trace: [ 14.315851] <TASK> [ 14.315869] dump_stack_lvl+0x73/0xb0 [ 14.315898] print_report+0xd1/0x650 [ 14.315922] ? __virt_addr_valid+0x1db/0x2d0 [ 14.315946] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.315980] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.316004] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.316027] kasan_report+0x141/0x180 [ 14.316061] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.316088] __asan_report_load4_noabort+0x18/0x20 [ 14.316114] kasan_atomics_helper+0x4a84/0x5450 [ 14.316137] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.316160] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.316186] ? kasan_atomics+0x152/0x310 [ 14.316212] kasan_atomics+0x1dc/0x310 [ 14.316236] ? __pfx_kasan_atomics+0x10/0x10 [ 14.316270] ? __pfx_read_tsc+0x10/0x10 [ 14.316291] ? ktime_get_ts64+0x86/0x230 [ 14.316315] kunit_try_run_case+0x1a5/0x480 [ 14.316361] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.316385] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.316408] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.316440] ? __kthread_parkme+0x82/0x180 [ 14.316462] ? preempt_count_sub+0x50/0x80 [ 14.316486] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.316522] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.316545] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.316569] kthread+0x337/0x6f0 [ 14.316629] ? trace_preempt_on+0x20/0xc0 [ 14.316657] ? __pfx_kthread+0x10/0x10 [ 14.316678] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.316700] ? calculate_sigpending+0x7b/0xa0 [ 14.316725] ? __pfx_kthread+0x10/0x10 [ 14.316747] ret_from_fork+0x116/0x1d0 [ 14.316766] ? __pfx_kthread+0x10/0x10 [ 14.316787] ret_from_fork_asm+0x1a/0x30 [ 14.316818] </TASK> [ 14.316830] [ 14.325643] Allocated by task 284: [ 14.325873] kasan_save_stack+0x45/0x70 [ 14.326092] kasan_save_track+0x18/0x40 [ 14.326288] kasan_save_alloc_info+0x3b/0x50 [ 14.326483] __kasan_kmalloc+0xb7/0xc0 [ 14.326775] __kmalloc_cache_noprof+0x189/0x420 [ 14.326984] kasan_atomics+0x95/0x310 [ 14.327186] kunit_try_run_case+0x1a5/0x480 [ 14.327412] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.327728] kthread+0x337/0x6f0 [ 14.327926] ret_from_fork+0x116/0x1d0 [ 14.328126] ret_from_fork_asm+0x1a/0x30 [ 14.328310] [ 14.328427] The buggy address belongs to the object at ffff888103128480 [ 14.328427] which belongs to the cache kmalloc-64 of size 64 [ 14.329115] The buggy address is located 0 bytes to the right of [ 14.329115] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.329702] [ 14.329940] The buggy address belongs to the physical page: [ 14.330203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.330575] flags: 0x200000000000000(node=0|zone=2) [ 14.330743] page_type: f5(slab) [ 14.330866] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.331170] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.331442] page dumped because: kasan: bad access detected [ 14.331725] [ 14.331812] Memory state around the buggy address: [ 14.331970] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.332336] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.332840] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.333176] ^ [ 14.333397] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.333872] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.334236] ================================================================== [ 14.334750] ================================================================== [ 14.335280] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 14.335629] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.336049] [ 14.336160] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.336206] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.336229] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.336252] Call Trace: [ 14.336268] <TASK> [ 14.336297] dump_stack_lvl+0x73/0xb0 [ 14.336329] print_report+0xd1/0x650 [ 14.336365] ? __virt_addr_valid+0x1db/0x2d0 [ 14.336398] ? kasan_atomics_helper+0xd47/0x5450 [ 14.336420] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.336443] ? kasan_atomics_helper+0xd47/0x5450 [ 14.336476] kasan_report+0x141/0x180 [ 14.336499] ? kasan_atomics_helper+0xd47/0x5450 [ 14.336526] kasan_check_range+0x10c/0x1c0 [ 14.336550] __kasan_check_write+0x18/0x20 [ 14.336590] kasan_atomics_helper+0xd47/0x5450 [ 14.336614] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.336636] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.336719] ? kasan_atomics+0x152/0x310 [ 14.336747] kasan_atomics+0x1dc/0x310 [ 14.336771] ? __pfx_kasan_atomics+0x10/0x10 [ 14.336795] ? __pfx_read_tsc+0x10/0x10 [ 14.336828] ? ktime_get_ts64+0x86/0x230 [ 14.336852] kunit_try_run_case+0x1a5/0x480 [ 14.336878] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.336913] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.336938] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.336962] ? __kthread_parkme+0x82/0x180 [ 14.336984] ? preempt_count_sub+0x50/0x80 [ 14.337009] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.337033] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.337057] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.337091] kthread+0x337/0x6f0 [ 14.337111] ? trace_preempt_on+0x20/0xc0 [ 14.337135] ? __pfx_kthread+0x10/0x10 [ 14.337168] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.337190] ? calculate_sigpending+0x7b/0xa0 [ 14.337214] ? __pfx_kthread+0x10/0x10 [ 14.337236] ret_from_fork+0x116/0x1d0 [ 14.337256] ? __pfx_kthread+0x10/0x10 [ 14.337278] ret_from_fork_asm+0x1a/0x30 [ 14.337308] </TASK> [ 14.337320] [ 14.345616] Allocated by task 284: [ 14.345811] kasan_save_stack+0x45/0x70 [ 14.346022] kasan_save_track+0x18/0x40 [ 14.346650] kasan_save_alloc_info+0x3b/0x50 [ 14.346976] __kasan_kmalloc+0xb7/0xc0 [ 14.347132] __kmalloc_cache_noprof+0x189/0x420 [ 14.347520] kasan_atomics+0x95/0x310 [ 14.347830] kunit_try_run_case+0x1a5/0x480 [ 14.348054] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.348322] kthread+0x337/0x6f0 [ 14.348504] ret_from_fork+0x116/0x1d0 [ 14.348647] ret_from_fork_asm+0x1a/0x30 [ 14.348786] [ 14.348859] The buggy address belongs to the object at ffff888103128480 [ 14.348859] which belongs to the cache kmalloc-64 of size 64 [ 14.349774] The buggy address is located 0 bytes to the right of [ 14.349774] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.350146] [ 14.350221] The buggy address belongs to the physical page: [ 14.350496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.351111] flags: 0x200000000000000(node=0|zone=2) [ 14.351388] page_type: f5(slab) [ 14.351623] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.352044] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.352292] page dumped because: kasan: bad access detected [ 14.352592] [ 14.352689] Memory state around the buggy address: [ 14.353013] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.353247] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.353564] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.353927] ^ [ 14.354184] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.354460] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.355042] ================================================================== [ 14.448967] ================================================================== [ 14.449631] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 14.450400] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.450735] [ 14.450861] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.450906] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.450919] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.450940] Call Trace: [ 14.450956] <TASK> [ 14.450974] dump_stack_lvl+0x73/0xb0 [ 14.451003] print_report+0xd1/0x650 [ 14.451028] ? __virt_addr_valid+0x1db/0x2d0 [ 14.451053] ? kasan_atomics_helper+0x1079/0x5450 [ 14.451075] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.451098] ? kasan_atomics_helper+0x1079/0x5450 [ 14.451120] kasan_report+0x141/0x180 [ 14.451142] ? kasan_atomics_helper+0x1079/0x5450 [ 14.451169] kasan_check_range+0x10c/0x1c0 [ 14.451194] __kasan_check_write+0x18/0x20 [ 14.451214] kasan_atomics_helper+0x1079/0x5450 [ 14.451237] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.451260] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.451287] ? kasan_atomics+0x152/0x310 [ 14.451315] kasan_atomics+0x1dc/0x310 [ 14.451337] ? __pfx_kasan_atomics+0x10/0x10 [ 14.451373] ? __pfx_read_tsc+0x10/0x10 [ 14.451394] ? ktime_get_ts64+0x86/0x230 [ 14.451419] kunit_try_run_case+0x1a5/0x480 [ 14.451444] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.451467] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.451491] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.451514] ? __kthread_parkme+0x82/0x180 [ 14.451537] ? preempt_count_sub+0x50/0x80 [ 14.451561] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.451585] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.451620] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.451645] kthread+0x337/0x6f0 [ 14.451670] ? trace_preempt_on+0x20/0xc0 [ 14.451708] ? __pfx_kthread+0x10/0x10 [ 14.451729] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.451762] ? calculate_sigpending+0x7b/0xa0 [ 14.451809] ? __pfx_kthread+0x10/0x10 [ 14.451831] ret_from_fork+0x116/0x1d0 [ 14.451850] ? __pfx_kthread+0x10/0x10 [ 14.451872] ret_from_fork_asm+0x1a/0x30 [ 14.451914] </TASK> [ 14.451926] [ 14.459620] Allocated by task 284: [ 14.459872] kasan_save_stack+0x45/0x70 [ 14.460069] kasan_save_track+0x18/0x40 [ 14.460266] kasan_save_alloc_info+0x3b/0x50 [ 14.460437] __kasan_kmalloc+0xb7/0xc0 [ 14.460571] __kmalloc_cache_noprof+0x189/0x420 [ 14.460727] kasan_atomics+0x95/0x310 [ 14.460928] kunit_try_run_case+0x1a5/0x480 [ 14.461161] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.461462] kthread+0x337/0x6f0 [ 14.461589] ret_from_fork+0x116/0x1d0 [ 14.461723] ret_from_fork_asm+0x1a/0x30 [ 14.463029] [ 14.463139] The buggy address belongs to the object at ffff888103128480 [ 14.463139] which belongs to the cache kmalloc-64 of size 64 [ 14.463691] The buggy address is located 0 bytes to the right of [ 14.463691] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.464231] [ 14.464308] The buggy address belongs to the physical page: [ 14.464496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.465304] flags: 0x200000000000000(node=0|zone=2) [ 14.465721] page_type: f5(slab) [ 14.466288] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.467233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.467937] page dumped because: kasan: bad access detected [ 14.468441] [ 14.468604] Memory state around the buggy address: [ 14.468922] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.469142] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.469374] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.469590] ^ [ 14.469754] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.469970] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.470185] ================================================================== [ 14.913298] ================================================================== [ 14.913612] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 14.914046] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.914364] [ 14.914454] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.914498] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.914511] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.914532] Call Trace: [ 14.914549] <TASK> [ 14.914566] dump_stack_lvl+0x73/0xb0 [ 14.914607] print_report+0xd1/0x650 [ 14.914631] ? __virt_addr_valid+0x1db/0x2d0 [ 14.914653] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.914675] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.914697] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.914719] kasan_report+0x141/0x180 [ 14.914742] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.914768] kasan_check_range+0x10c/0x1c0 [ 14.914792] __kasan_check_write+0x18/0x20 [ 14.914812] kasan_atomics_helper+0x1a7f/0x5450 [ 14.914844] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.914878] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.914904] ? kasan_atomics+0x152/0x310 [ 14.914930] kasan_atomics+0x1dc/0x310 [ 14.914965] ? __pfx_kasan_atomics+0x10/0x10 [ 14.914989] ? __pfx_read_tsc+0x10/0x10 [ 14.915012] ? ktime_get_ts64+0x86/0x230 [ 14.915037] kunit_try_run_case+0x1a5/0x480 [ 14.915061] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.915084] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.915108] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.915142] ? __kthread_parkme+0x82/0x180 [ 14.915163] ? preempt_count_sub+0x50/0x80 [ 14.915187] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.915211] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.915234] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.915258] kthread+0x337/0x6f0 [ 14.915277] ? trace_preempt_on+0x20/0xc0 [ 14.915301] ? __pfx_kthread+0x10/0x10 [ 14.915323] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.915363] ? calculate_sigpending+0x7b/0xa0 [ 14.915386] ? __pfx_kthread+0x10/0x10 [ 14.915409] ret_from_fork+0x116/0x1d0 [ 14.915438] ? __pfx_kthread+0x10/0x10 [ 14.915460] ret_from_fork_asm+0x1a/0x30 [ 14.915491] </TASK> [ 14.915502] [ 14.923401] Allocated by task 284: [ 14.923568] kasan_save_stack+0x45/0x70 [ 14.923717] kasan_save_track+0x18/0x40 [ 14.923853] kasan_save_alloc_info+0x3b/0x50 [ 14.924041] __kasan_kmalloc+0xb7/0xc0 [ 14.924239] __kmalloc_cache_noprof+0x189/0x420 [ 14.924490] kasan_atomics+0x95/0x310 [ 14.924680] kunit_try_run_case+0x1a5/0x480 [ 14.925048] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.925279] kthread+0x337/0x6f0 [ 14.925412] ret_from_fork+0x116/0x1d0 [ 14.925558] ret_from_fork_asm+0x1a/0x30 [ 14.925764] [ 14.925860] The buggy address belongs to the object at ffff888103128480 [ 14.925860] which belongs to the cache kmalloc-64 of size 64 [ 14.926278] The buggy address is located 0 bytes to the right of [ 14.926278] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.926670] [ 14.926767] The buggy address belongs to the physical page: [ 14.927185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.927548] flags: 0x200000000000000(node=0|zone=2) [ 14.927782] page_type: f5(slab) [ 14.927936] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.928171] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.928411] page dumped because: kasan: bad access detected [ 14.928866] [ 14.928961] Memory state around the buggy address: [ 14.929198] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.929568] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.930066] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.930421] ^ [ 14.930594] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.930979] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.931352] ================================================================== [ 14.641030] ================================================================== [ 14.641556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 14.642319] Read of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.642730] [ 14.642844] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.642889] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.642902] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.642923] Call Trace: [ 14.642978] <TASK> [ 14.642997] dump_stack_lvl+0x73/0xb0 [ 14.643025] print_report+0xd1/0x650 [ 14.643050] ? __virt_addr_valid+0x1db/0x2d0 [ 14.643074] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.643097] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.643146] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.643168] kasan_report+0x141/0x180 [ 14.643190] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.643217] __asan_report_load8_noabort+0x18/0x20 [ 14.643243] kasan_atomics_helper+0x4eae/0x5450 [ 14.643266] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.643288] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.643314] ? kasan_atomics+0x152/0x310 [ 14.643341] kasan_atomics+0x1dc/0x310 [ 14.643375] ? __pfx_kasan_atomics+0x10/0x10 [ 14.643400] ? __pfx_read_tsc+0x10/0x10 [ 14.643421] ? ktime_get_ts64+0x86/0x230 [ 14.643446] kunit_try_run_case+0x1a5/0x480 [ 14.643470] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.643492] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.643516] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.643540] ? __kthread_parkme+0x82/0x180 [ 14.643562] ? preempt_count_sub+0x50/0x80 [ 14.643587] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.643611] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.643634] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.643664] kthread+0x337/0x6f0 [ 14.643685] ? trace_preempt_on+0x20/0xc0 [ 14.643709] ? __pfx_kthread+0x10/0x10 [ 14.643730] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.643771] ? calculate_sigpending+0x7b/0xa0 [ 14.643796] ? __pfx_kthread+0x10/0x10 [ 14.643818] ret_from_fork+0x116/0x1d0 [ 14.643837] ? __pfx_kthread+0x10/0x10 [ 14.643858] ret_from_fork_asm+0x1a/0x30 [ 14.643890] </TASK> [ 14.643902] [ 14.653491] Allocated by task 284: [ 14.653659] kasan_save_stack+0x45/0x70 [ 14.654184] kasan_save_track+0x18/0x40 [ 14.654607] kasan_save_alloc_info+0x3b/0x50 [ 14.655100] __kasan_kmalloc+0xb7/0xc0 [ 14.655341] __kmalloc_cache_noprof+0x189/0x420 [ 14.655679] kasan_atomics+0x95/0x310 [ 14.656170] kunit_try_run_case+0x1a5/0x480 [ 14.656450] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.656869] kthread+0x337/0x6f0 [ 14.657177] ret_from_fork+0x116/0x1d0 [ 14.657373] ret_from_fork_asm+0x1a/0x30 [ 14.657559] [ 14.657653] The buggy address belongs to the object at ffff888103128480 [ 14.657653] which belongs to the cache kmalloc-64 of size 64 [ 14.658634] The buggy address is located 0 bytes to the right of [ 14.658634] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.659523] [ 14.659632] The buggy address belongs to the physical page: [ 14.660072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.660549] flags: 0x200000000000000(node=0|zone=2) [ 14.660965] page_type: f5(slab) [ 14.661191] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.661717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.662232] page dumped because: kasan: bad access detected [ 14.662489] [ 14.662581] Memory state around the buggy address: [ 14.663054] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.663603] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.664336] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.664793] ^ [ 14.665143] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.665588] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.666234] ================================================================== [ 14.052332] ================================================================== [ 14.052787] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 14.053345] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.053811] [ 14.053905] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.053954] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.053967] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.053990] Call Trace: [ 14.054007] <TASK> [ 14.054025] dump_stack_lvl+0x73/0xb0 [ 14.054054] print_report+0xd1/0x650 [ 14.054090] ? __virt_addr_valid+0x1db/0x2d0 [ 14.054114] ? kasan_atomics_helper+0x565/0x5450 [ 14.054137] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.054172] ? kasan_atomics_helper+0x565/0x5450 [ 14.054194] kasan_report+0x141/0x180 [ 14.054217] ? kasan_atomics_helper+0x565/0x5450 [ 14.054244] kasan_check_range+0x10c/0x1c0 [ 14.054277] __kasan_check_write+0x18/0x20 [ 14.054298] kasan_atomics_helper+0x565/0x5450 [ 14.054327] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.054350] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.054386] ? kasan_atomics+0x152/0x310 [ 14.054414] kasan_atomics+0x1dc/0x310 [ 14.054437] ? __pfx_kasan_atomics+0x10/0x10 [ 14.054462] ? __pfx_read_tsc+0x10/0x10 [ 14.054484] ? ktime_get_ts64+0x86/0x230 [ 14.054509] kunit_try_run_case+0x1a5/0x480 [ 14.054533] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.054556] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.054620] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.054660] ? __kthread_parkme+0x82/0x180 [ 14.054681] ? preempt_count_sub+0x50/0x80 [ 14.054718] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.054743] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.054766] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.054790] kthread+0x337/0x6f0 [ 14.054810] ? trace_preempt_on+0x20/0xc0 [ 14.054844] ? __pfx_kthread+0x10/0x10 [ 14.054865] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.054887] ? calculate_sigpending+0x7b/0xa0 [ 14.054922] ? __pfx_kthread+0x10/0x10 [ 14.054944] ret_from_fork+0x116/0x1d0 [ 14.054963] ? __pfx_kthread+0x10/0x10 [ 14.054993] ret_from_fork_asm+0x1a/0x30 [ 14.055024] </TASK> [ 14.055036] [ 14.068161] Allocated by task 284: [ 14.068513] kasan_save_stack+0x45/0x70 [ 14.068917] kasan_save_track+0x18/0x40 [ 14.069261] kasan_save_alloc_info+0x3b/0x50 [ 14.069618] __kasan_kmalloc+0xb7/0xc0 [ 14.069982] __kmalloc_cache_noprof+0x189/0x420 [ 14.070145] kasan_atomics+0x95/0x310 [ 14.070282] kunit_try_run_case+0x1a5/0x480 [ 14.070437] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.070641] kthread+0x337/0x6f0 [ 14.070765] ret_from_fork+0x116/0x1d0 [ 14.070980] ret_from_fork_asm+0x1a/0x30 [ 14.071382] [ 14.071484] The buggy address belongs to the object at ffff888103128480 [ 14.071484] which belongs to the cache kmalloc-64 of size 64 [ 14.072056] The buggy address is located 0 bytes to the right of [ 14.072056] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.072588] [ 14.072682] The buggy address belongs to the physical page: [ 14.073103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.073448] flags: 0x200000000000000(node=0|zone=2) [ 14.073673] page_type: f5(slab) [ 14.073845] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.074173] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.074509] page dumped because: kasan: bad access detected [ 14.074807] [ 14.074925] Memory state around the buggy address: [ 14.075140] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.075455] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.075931] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.076206] ^ [ 14.076422] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.076806] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.077221] ================================================================== [ 14.355714] ================================================================== [ 14.356219] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 14.356555] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.357111] [ 14.357252] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.357298] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.357311] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.357333] Call Trace: [ 14.357345] <TASK> [ 14.357382] dump_stack_lvl+0x73/0xb0 [ 14.357412] print_report+0xd1/0x650 [ 14.357436] ? __virt_addr_valid+0x1db/0x2d0 [ 14.357472] ? kasan_atomics_helper+0xde0/0x5450 [ 14.357494] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.357516] ? kasan_atomics_helper+0xde0/0x5450 [ 14.357538] kasan_report+0x141/0x180 [ 14.357569] ? kasan_atomics_helper+0xde0/0x5450 [ 14.357596] kasan_check_range+0x10c/0x1c0 [ 14.357630] __kasan_check_write+0x18/0x20 [ 14.357651] kasan_atomics_helper+0xde0/0x5450 [ 14.357674] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.357697] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.357724] ? kasan_atomics+0x152/0x310 [ 14.357764] kasan_atomics+0x1dc/0x310 [ 14.357796] ? __pfx_kasan_atomics+0x10/0x10 [ 14.357821] ? __pfx_read_tsc+0x10/0x10 [ 14.357855] ? ktime_get_ts64+0x86/0x230 [ 14.357881] kunit_try_run_case+0x1a5/0x480 [ 14.357906] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.357929] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.357954] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.357978] ? __kthread_parkme+0x82/0x180 [ 14.358000] ? preempt_count_sub+0x50/0x80 [ 14.358025] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.358050] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.358073] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.358098] kthread+0x337/0x6f0 [ 14.358118] ? trace_preempt_on+0x20/0xc0 [ 14.358144] ? __pfx_kthread+0x10/0x10 [ 14.358165] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.358187] ? calculate_sigpending+0x7b/0xa0 [ 14.358212] ? __pfx_kthread+0x10/0x10 [ 14.358235] ret_from_fork+0x116/0x1d0 [ 14.358255] ? __pfx_kthread+0x10/0x10 [ 14.358277] ret_from_fork_asm+0x1a/0x30 [ 14.358309] </TASK> [ 14.358322] [ 14.366380] Allocated by task 284: [ 14.366596] kasan_save_stack+0x45/0x70 [ 14.366824] kasan_save_track+0x18/0x40 [ 14.367013] kasan_save_alloc_info+0x3b/0x50 [ 14.367293] __kasan_kmalloc+0xb7/0xc0 [ 14.367494] __kmalloc_cache_noprof+0x189/0x420 [ 14.367703] kasan_atomics+0x95/0x310 [ 14.367904] kunit_try_run_case+0x1a5/0x480 [ 14.368112] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.368361] kthread+0x337/0x6f0 [ 14.368486] ret_from_fork+0x116/0x1d0 [ 14.368696] ret_from_fork_asm+0x1a/0x30 [ 14.368891] [ 14.369012] The buggy address belongs to the object at ffff888103128480 [ 14.369012] which belongs to the cache kmalloc-64 of size 64 [ 14.369499] The buggy address is located 0 bytes to the right of [ 14.369499] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.370110] [ 14.370202] The buggy address belongs to the physical page: [ 14.370436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.370804] flags: 0x200000000000000(node=0|zone=2) [ 14.371028] page_type: f5(slab) [ 14.371180] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.371419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.371644] page dumped because: kasan: bad access detected [ 14.371842] [ 14.371969] Memory state around the buggy address: [ 14.372198] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.372534] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.372986] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.373249] ^ [ 14.373411] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.373626] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.373900] ================================================================== [ 15.069454] ================================================================== [ 15.069806] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 15.070248] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 15.070637] [ 15.070988] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.071040] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.071054] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.071075] Call Trace: [ 15.071095] <TASK> [ 15.071114] dump_stack_lvl+0x73/0xb0 [ 15.071145] print_report+0xd1/0x650 [ 15.071170] ? __virt_addr_valid+0x1db/0x2d0 [ 15.071194] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.071216] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.071239] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.071261] kasan_report+0x141/0x180 [ 15.071284] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.071311] kasan_check_range+0x10c/0x1c0 [ 15.071336] __kasan_check_write+0x18/0x20 [ 15.071368] kasan_atomics_helper+0x1f43/0x5450 [ 15.071392] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.071415] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.071441] ? kasan_atomics+0x152/0x310 [ 15.071469] kasan_atomics+0x1dc/0x310 [ 15.071492] ? __pfx_kasan_atomics+0x10/0x10 [ 15.071517] ? __pfx_read_tsc+0x10/0x10 [ 15.071539] ? ktime_get_ts64+0x86/0x230 [ 15.071564] kunit_try_run_case+0x1a5/0x480 [ 15.071589] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.071612] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.071638] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.071667] ? __kthread_parkme+0x82/0x180 [ 15.071689] ? preempt_count_sub+0x50/0x80 [ 15.071713] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.071747] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.071771] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.071794] kthread+0x337/0x6f0 [ 15.071816] ? trace_preempt_on+0x20/0xc0 [ 15.071841] ? __pfx_kthread+0x10/0x10 [ 15.071863] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.071884] ? calculate_sigpending+0x7b/0xa0 [ 15.071908] ? __pfx_kthread+0x10/0x10 [ 15.071931] ret_from_fork+0x116/0x1d0 [ 15.071949] ? __pfx_kthread+0x10/0x10 [ 15.071969] ret_from_fork_asm+0x1a/0x30 [ 15.072002] </TASK> [ 15.072015] [ 15.081857] Allocated by task 284: [ 15.082173] kasan_save_stack+0x45/0x70 [ 15.082412] kasan_save_track+0x18/0x40 [ 15.082592] kasan_save_alloc_info+0x3b/0x50 [ 15.082966] __kasan_kmalloc+0xb7/0xc0 [ 15.083155] __kmalloc_cache_noprof+0x189/0x420 [ 15.083437] kasan_atomics+0x95/0x310 [ 15.083584] kunit_try_run_case+0x1a5/0x480 [ 15.083987] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.084301] kthread+0x337/0x6f0 [ 15.084454] ret_from_fork+0x116/0x1d0 [ 15.084638] ret_from_fork_asm+0x1a/0x30 [ 15.085005] [ 15.085113] The buggy address belongs to the object at ffff888103128480 [ 15.085113] which belongs to the cache kmalloc-64 of size 64 [ 15.085644] The buggy address is located 0 bytes to the right of [ 15.085644] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 15.086384] [ 15.086484] The buggy address belongs to the physical page: [ 15.086718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 15.087046] flags: 0x200000000000000(node=0|zone=2) [ 15.087262] page_type: f5(slab) [ 15.087425] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.087745] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.088491] page dumped because: kasan: bad access detected [ 15.088744] [ 15.088998] Memory state around the buggy address: [ 15.089225] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.089638] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.090064] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.090463] ^ [ 15.090643] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.091161] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.091553] ================================================================== [ 15.255682] ================================================================== [ 15.256042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 15.256469] Read of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 15.256692] [ 15.256776] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.256817] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.256829] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.256850] Call Trace: [ 15.256865] <TASK> [ 15.256881] dump_stack_lvl+0x73/0xb0 [ 15.256909] print_report+0xd1/0x650 [ 15.256932] ? __virt_addr_valid+0x1db/0x2d0 [ 15.256957] ? kasan_atomics_helper+0x5115/0x5450 [ 15.256978] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.257000] ? kasan_atomics_helper+0x5115/0x5450 [ 15.257023] kasan_report+0x141/0x180 [ 15.257046] ? kasan_atomics_helper+0x5115/0x5450 [ 15.257073] __asan_report_load8_noabort+0x18/0x20 [ 15.257098] kasan_atomics_helper+0x5115/0x5450 [ 15.257121] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.257143] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.257168] ? kasan_atomics+0x152/0x310 [ 15.257195] kasan_atomics+0x1dc/0x310 [ 15.257218] ? __pfx_kasan_atomics+0x10/0x10 [ 15.257243] ? __pfx_read_tsc+0x10/0x10 [ 15.257264] ? ktime_get_ts64+0x86/0x230 [ 15.257289] kunit_try_run_case+0x1a5/0x480 [ 15.257313] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.257335] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.257373] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.257396] ? __kthread_parkme+0x82/0x180 [ 15.257417] ? preempt_count_sub+0x50/0x80 [ 15.257441] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.257466] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.257489] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.257512] kthread+0x337/0x6f0 [ 15.257532] ? trace_preempt_on+0x20/0xc0 [ 15.257556] ? __pfx_kthread+0x10/0x10 [ 15.257578] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.257599] ? calculate_sigpending+0x7b/0xa0 [ 15.257623] ? __pfx_kthread+0x10/0x10 [ 15.257645] ret_from_fork+0x116/0x1d0 [ 15.257664] ? __pfx_kthread+0x10/0x10 [ 15.257685] ret_from_fork_asm+0x1a/0x30 [ 15.257716] </TASK> [ 15.257728] [ 15.265679] Allocated by task 284: [ 15.265867] kasan_save_stack+0x45/0x70 [ 15.266071] kasan_save_track+0x18/0x40 [ 15.266409] kasan_save_alloc_info+0x3b/0x50 [ 15.266559] __kasan_kmalloc+0xb7/0xc0 [ 15.266693] __kmalloc_cache_noprof+0x189/0x420 [ 15.266847] kasan_atomics+0x95/0x310 [ 15.267189] kunit_try_run_case+0x1a5/0x480 [ 15.267414] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.267677] kthread+0x337/0x6f0 [ 15.267847] ret_from_fork+0x116/0x1d0 [ 15.268113] ret_from_fork_asm+0x1a/0x30 [ 15.268296] [ 15.268457] The buggy address belongs to the object at ffff888103128480 [ 15.268457] which belongs to the cache kmalloc-64 of size 64 [ 15.268815] The buggy address is located 0 bytes to the right of [ 15.268815] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 15.269538] [ 15.269637] The buggy address belongs to the physical page: [ 15.269922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 15.270160] flags: 0x200000000000000(node=0|zone=2) [ 15.270324] page_type: f5(slab) [ 15.270454] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.270798] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.271134] page dumped because: kasan: bad access detected [ 15.271400] [ 15.271496] Memory state around the buggy address: [ 15.271729] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.272028] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.272242] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.272794] ^ [ 15.273008] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.273255] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.273478] ================================================================== [ 14.291486] ================================================================== [ 14.291924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 14.292309] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.292680] [ 14.292993] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.293041] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.293055] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.293077] Call Trace: [ 14.293092] <TASK> [ 14.293109] dump_stack_lvl+0x73/0xb0 [ 14.293138] print_report+0xd1/0x650 [ 14.293162] ? __virt_addr_valid+0x1db/0x2d0 [ 14.293186] ? kasan_atomics_helper+0xc70/0x5450 [ 14.293207] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.293230] ? kasan_atomics_helper+0xc70/0x5450 [ 14.293254] kasan_report+0x141/0x180 [ 14.293278] ? kasan_atomics_helper+0xc70/0x5450 [ 14.293303] kasan_check_range+0x10c/0x1c0 [ 14.293327] __kasan_check_write+0x18/0x20 [ 14.293347] kasan_atomics_helper+0xc70/0x5450 [ 14.293380] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.293403] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.293430] ? kasan_atomics+0x152/0x310 [ 14.293456] kasan_atomics+0x1dc/0x310 [ 14.293479] ? __pfx_kasan_atomics+0x10/0x10 [ 14.293504] ? __pfx_read_tsc+0x10/0x10 [ 14.293526] ? ktime_get_ts64+0x86/0x230 [ 14.293550] kunit_try_run_case+0x1a5/0x480 [ 14.293575] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.293703] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.293730] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.293753] ? __kthread_parkme+0x82/0x180 [ 14.293787] ? preempt_count_sub+0x50/0x80 [ 14.293813] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.293837] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.293861] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.293885] kthread+0x337/0x6f0 [ 14.293908] ? trace_preempt_on+0x20/0xc0 [ 14.293936] ? __pfx_kthread+0x10/0x10 [ 14.293958] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.293980] ? calculate_sigpending+0x7b/0xa0 [ 14.294005] ? __pfx_kthread+0x10/0x10 [ 14.294027] ret_from_fork+0x116/0x1d0 [ 14.294047] ? __pfx_kthread+0x10/0x10 [ 14.294068] ret_from_fork_asm+0x1a/0x30 [ 14.294099] </TASK> [ 14.294111] [ 14.302669] Allocated by task 284: [ 14.302892] kasan_save_stack+0x45/0x70 [ 14.303098] kasan_save_track+0x18/0x40 [ 14.303280] kasan_save_alloc_info+0x3b/0x50 [ 14.303501] __kasan_kmalloc+0xb7/0xc0 [ 14.303984] __kmalloc_cache_noprof+0x189/0x420 [ 14.304201] kasan_atomics+0x95/0x310 [ 14.304368] kunit_try_run_case+0x1a5/0x480 [ 14.304672] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.305010] kthread+0x337/0x6f0 [ 14.305198] ret_from_fork+0x116/0x1d0 [ 14.305405] ret_from_fork_asm+0x1a/0x30 [ 14.305844] [ 14.306037] The buggy address belongs to the object at ffff888103128480 [ 14.306037] which belongs to the cache kmalloc-64 of size 64 [ 14.307079] The buggy address is located 0 bytes to the right of [ 14.307079] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.308087] [ 14.308321] The buggy address belongs to the physical page: [ 14.308738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.309089] flags: 0x200000000000000(node=0|zone=2) [ 14.309312] page_type: f5(slab) [ 14.309482] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.310129] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.310460] page dumped because: kasan: bad access detected [ 14.311166] [ 14.311283] Memory state around the buggy address: [ 14.311502] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.311867] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.312164] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.312458] ^ [ 14.313045] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.313564] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.314017] ================================================================== [ 14.430906] ================================================================== [ 14.431363] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 14.431810] Read of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.432166] [ 14.432304] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.432371] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.432384] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.432407] Call Trace: [ 14.432426] <TASK> [ 14.432446] dump_stack_lvl+0x73/0xb0 [ 14.432474] print_report+0xd1/0x650 [ 14.432498] ? __virt_addr_valid+0x1db/0x2d0 [ 14.432523] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.432544] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.432567] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.432589] kasan_report+0x141/0x180 [ 14.432611] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.432638] __asan_report_load4_noabort+0x18/0x20 [ 14.432663] kasan_atomics_helper+0x4a36/0x5450 [ 14.432696] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.432720] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.432768] ? kasan_atomics+0x152/0x310 [ 14.432795] kasan_atomics+0x1dc/0x310 [ 14.432819] ? __pfx_kasan_atomics+0x10/0x10 [ 14.432844] ? __pfx_read_tsc+0x10/0x10 [ 14.432865] ? ktime_get_ts64+0x86/0x230 [ 14.432890] kunit_try_run_case+0x1a5/0x480 [ 14.432915] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.432938] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.432963] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.432986] ? __kthread_parkme+0x82/0x180 [ 14.433009] ? preempt_count_sub+0x50/0x80 [ 14.433034] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.433058] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.433081] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.433105] kthread+0x337/0x6f0 [ 14.433134] ? trace_preempt_on+0x20/0xc0 [ 14.433160] ? __pfx_kthread+0x10/0x10 [ 14.433181] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.433213] ? calculate_sigpending+0x7b/0xa0 [ 14.433238] ? __pfx_kthread+0x10/0x10 [ 14.433260] ret_from_fork+0x116/0x1d0 [ 14.433279] ? __pfx_kthread+0x10/0x10 [ 14.433308] ret_from_fork_asm+0x1a/0x30 [ 14.433339] </TASK> [ 14.433366] [ 14.440711] Allocated by task 284: [ 14.440925] kasan_save_stack+0x45/0x70 [ 14.441164] kasan_save_track+0x18/0x40 [ 14.441398] kasan_save_alloc_info+0x3b/0x50 [ 14.441657] __kasan_kmalloc+0xb7/0xc0 [ 14.441921] __kmalloc_cache_noprof+0x189/0x420 [ 14.442145] kasan_atomics+0x95/0x310 [ 14.442334] kunit_try_run_case+0x1a5/0x480 [ 14.442553] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.442850] kthread+0x337/0x6f0 [ 14.442984] ret_from_fork+0x116/0x1d0 [ 14.443119] ret_from_fork_asm+0x1a/0x30 [ 14.443259] [ 14.443338] The buggy address belongs to the object at ffff888103128480 [ 14.443338] which belongs to the cache kmalloc-64 of size 64 [ 14.444121] The buggy address is located 0 bytes to the right of [ 14.444121] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.444642] [ 14.444774] The buggy address belongs to the physical page: [ 14.444983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.445334] flags: 0x200000000000000(node=0|zone=2) [ 14.445572] page_type: f5(slab) [ 14.445747] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.446063] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.446364] page dumped because: kasan: bad access detected [ 14.446538] [ 14.446608] Memory state around the buggy address: [ 14.446851] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.447223] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.447551] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.447909] ^ [ 14.448067] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.448283] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.448507] ================================================================== [ 14.869260] ================================================================== [ 14.870004] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 14.870667] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.871176] [ 14.871267] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.871312] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.871335] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.871366] Call Trace: [ 14.871382] <TASK> [ 14.871400] dump_stack_lvl+0x73/0xb0 [ 14.871440] print_report+0xd1/0x650 [ 14.871463] ? __virt_addr_valid+0x1db/0x2d0 [ 14.871486] ? kasan_atomics_helper+0x194a/0x5450 [ 14.871508] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.871530] ? kasan_atomics_helper+0x194a/0x5450 [ 14.871552] kasan_report+0x141/0x180 [ 14.871575] ? kasan_atomics_helper+0x194a/0x5450 [ 14.871602] kasan_check_range+0x10c/0x1c0 [ 14.871626] __kasan_check_write+0x18/0x20 [ 14.871645] kasan_atomics_helper+0x194a/0x5450 [ 14.871674] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.871705] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.871731] ? kasan_atomics+0x152/0x310 [ 14.871759] kasan_atomics+0x1dc/0x310 [ 14.871792] ? __pfx_kasan_atomics+0x10/0x10 [ 14.871817] ? __pfx_read_tsc+0x10/0x10 [ 14.871839] ? ktime_get_ts64+0x86/0x230 [ 14.871863] kunit_try_run_case+0x1a5/0x480 [ 14.871888] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.871910] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.871934] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.871966] ? __kthread_parkme+0x82/0x180 [ 14.871987] ? preempt_count_sub+0x50/0x80 [ 14.872011] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.872036] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.872058] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.872081] kthread+0x337/0x6f0 [ 14.872102] ? trace_preempt_on+0x20/0xc0 [ 14.872126] ? __pfx_kthread+0x10/0x10 [ 14.872147] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.872169] ? calculate_sigpending+0x7b/0xa0 [ 14.872193] ? __pfx_kthread+0x10/0x10 [ 14.872215] ret_from_fork+0x116/0x1d0 [ 14.872233] ? __pfx_kthread+0x10/0x10 [ 14.872254] ret_from_fork_asm+0x1a/0x30 [ 14.872285] </TASK> [ 14.872297] [ 14.880449] Allocated by task 284: [ 14.880657] kasan_save_stack+0x45/0x70 [ 14.880917] kasan_save_track+0x18/0x40 [ 14.881089] kasan_save_alloc_info+0x3b/0x50 [ 14.881340] __kasan_kmalloc+0xb7/0xc0 [ 14.881522] __kmalloc_cache_noprof+0x189/0x420 [ 14.881749] kasan_atomics+0x95/0x310 [ 14.881941] kunit_try_run_case+0x1a5/0x480 [ 14.882138] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.882386] kthread+0x337/0x6f0 [ 14.882511] ret_from_fork+0x116/0x1d0 [ 14.882716] ret_from_fork_asm+0x1a/0x30 [ 14.882938] [ 14.883033] The buggy address belongs to the object at ffff888103128480 [ 14.883033] which belongs to the cache kmalloc-64 of size 64 [ 14.883711] The buggy address is located 0 bytes to the right of [ 14.883711] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.884243] [ 14.884319] The buggy address belongs to the physical page: [ 14.884606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.884950] flags: 0x200000000000000(node=0|zone=2) [ 14.885181] page_type: f5(slab) [ 14.885372] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.885659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.886038] page dumped because: kasan: bad access detected [ 14.886247] [ 14.886321] Memory state around the buggy address: [ 14.886498] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.886724] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.887043] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.887367] ^ [ 14.887618] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.887976] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.888196] ================================================================== [ 14.250285] ================================================================== [ 14.250720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 14.251052] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.251312] [ 14.251416] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.251462] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.251475] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.251496] Call Trace: [ 14.251514] <TASK> [ 14.251530] dump_stack_lvl+0x73/0xb0 [ 14.251560] print_report+0xd1/0x650 [ 14.251583] ? __virt_addr_valid+0x1db/0x2d0 [ 14.251607] ? kasan_atomics_helper+0xac7/0x5450 [ 14.251628] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.251651] ? kasan_atomics_helper+0xac7/0x5450 [ 14.251678] kasan_report+0x141/0x180 [ 14.251700] ? kasan_atomics_helper+0xac7/0x5450 [ 14.251727] kasan_check_range+0x10c/0x1c0 [ 14.251751] __kasan_check_write+0x18/0x20 [ 14.251772] kasan_atomics_helper+0xac7/0x5450 [ 14.251795] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.251817] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.251843] ? kasan_atomics+0x152/0x310 [ 14.251872] kasan_atomics+0x1dc/0x310 [ 14.251894] ? __pfx_kasan_atomics+0x10/0x10 [ 14.251921] ? __pfx_read_tsc+0x10/0x10 [ 14.251942] ? ktime_get_ts64+0x86/0x230 [ 14.251967] kunit_try_run_case+0x1a5/0x480 [ 14.251992] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.252015] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.252039] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.252062] ? __kthread_parkme+0x82/0x180 [ 14.252083] ? preempt_count_sub+0x50/0x80 [ 14.252108] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.252132] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.252156] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.252180] kthread+0x337/0x6f0 [ 14.252200] ? trace_preempt_on+0x20/0xc0 [ 14.252225] ? __pfx_kthread+0x10/0x10 [ 14.252246] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.252268] ? calculate_sigpending+0x7b/0xa0 [ 14.252292] ? __pfx_kthread+0x10/0x10 [ 14.252315] ret_from_fork+0x116/0x1d0 [ 14.252333] ? __pfx_kthread+0x10/0x10 [ 14.252426] ret_from_fork_asm+0x1a/0x30 [ 14.252462] </TASK> [ 14.252473] [ 14.262080] Allocated by task 284: [ 14.262252] kasan_save_stack+0x45/0x70 [ 14.262479] kasan_save_track+0x18/0x40 [ 14.262877] kasan_save_alloc_info+0x3b/0x50 [ 14.263110] __kasan_kmalloc+0xb7/0xc0 [ 14.263306] __kmalloc_cache_noprof+0x189/0x420 [ 14.263522] kasan_atomics+0x95/0x310 [ 14.263836] kunit_try_run_case+0x1a5/0x480 [ 14.264055] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.264285] kthread+0x337/0x6f0 [ 14.264467] ret_from_fork+0x116/0x1d0 [ 14.264678] ret_from_fork_asm+0x1a/0x30 [ 14.264954] [ 14.265074] The buggy address belongs to the object at ffff888103128480 [ 14.265074] which belongs to the cache kmalloc-64 of size 64 [ 14.265547] The buggy address is located 0 bytes to the right of [ 14.265547] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.266089] [ 14.266167] The buggy address belongs to the physical page: [ 14.266392] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.266807] flags: 0x200000000000000(node=0|zone=2) [ 14.267110] page_type: f5(slab) [ 14.267284] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.267525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.267947] page dumped because: kasan: bad access detected [ 14.268222] [ 14.268562] Memory state around the buggy address: [ 14.268785] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.269182] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.269471] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.270005] ^ [ 14.270174] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.270407] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.270957] ================================================================== [ 14.227343] ================================================================== [ 14.227759] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 14.228212] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.228565] [ 14.228695] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.228826] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.228854] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.228875] Call Trace: [ 14.228891] <TASK> [ 14.228908] dump_stack_lvl+0x73/0xb0 [ 14.228948] print_report+0xd1/0x650 [ 14.228972] ? __virt_addr_valid+0x1db/0x2d0 [ 14.229012] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.229033] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.229069] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.229091] kasan_report+0x141/0x180 [ 14.229127] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.229180] kasan_check_range+0x10c/0x1c0 [ 14.229214] __kasan_check_write+0x18/0x20 [ 14.229234] kasan_atomics_helper+0xa2b/0x5450 [ 14.229256] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.229291] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.229317] ? kasan_atomics+0x152/0x310 [ 14.229362] kasan_atomics+0x1dc/0x310 [ 14.229385] ? __pfx_kasan_atomics+0x10/0x10 [ 14.229410] ? __pfx_read_tsc+0x10/0x10 [ 14.229431] ? ktime_get_ts64+0x86/0x230 [ 14.229456] kunit_try_run_case+0x1a5/0x480 [ 14.229481] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.229505] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.229529] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.229553] ? __kthread_parkme+0x82/0x180 [ 14.229584] ? preempt_count_sub+0x50/0x80 [ 14.229608] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.229688] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.229716] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.229754] kthread+0x337/0x6f0 [ 14.229775] ? trace_preempt_on+0x20/0xc0 [ 14.229800] ? __pfx_kthread+0x10/0x10 [ 14.229851] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.229887] ? calculate_sigpending+0x7b/0xa0 [ 14.229938] ? __pfx_kthread+0x10/0x10 [ 14.229962] ret_from_fork+0x116/0x1d0 [ 14.230003] ? __pfx_kthread+0x10/0x10 [ 14.230037] ret_from_fork_asm+0x1a/0x30 [ 14.230081] </TASK> [ 14.230094] [ 14.239969] Allocated by task 284: [ 14.240209] kasan_save_stack+0x45/0x70 [ 14.240443] kasan_save_track+0x18/0x40 [ 14.240682] kasan_save_alloc_info+0x3b/0x50 [ 14.240929] __kasan_kmalloc+0xb7/0xc0 [ 14.241147] __kmalloc_cache_noprof+0x189/0x420 [ 14.241365] kasan_atomics+0x95/0x310 [ 14.241590] kunit_try_run_case+0x1a5/0x480 [ 14.241890] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.242168] kthread+0x337/0x6f0 [ 14.242389] ret_from_fork+0x116/0x1d0 [ 14.242589] ret_from_fork_asm+0x1a/0x30 [ 14.242839] [ 14.243165] The buggy address belongs to the object at ffff888103128480 [ 14.243165] which belongs to the cache kmalloc-64 of size 64 [ 14.243925] The buggy address is located 0 bytes to the right of [ 14.243925] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.244522] [ 14.244640] The buggy address belongs to the physical page: [ 14.244934] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.245306] flags: 0x200000000000000(node=0|zone=2) [ 14.245636] page_type: f5(slab) [ 14.245762] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.246382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.246871] page dumped because: kasan: bad access detected [ 14.247163] [ 14.247239] Memory state around the buggy address: [ 14.247410] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.247648] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.248016] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.248426] ^ [ 14.248916] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.249322] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.249544] ================================================================== [ 13.990794] ================================================================== [ 13.991218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 13.991523] Read of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 13.992213] [ 13.992338] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.992520] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.992547] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.992568] Call Trace: [ 13.992623] <TASK> [ 13.992639] dump_stack_lvl+0x73/0xb0 [ 13.992669] print_report+0xd1/0x650 [ 13.992693] ? __virt_addr_valid+0x1db/0x2d0 [ 13.992717] ? kasan_atomics_helper+0x4b54/0x5450 [ 13.992739] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.992761] ? kasan_atomics_helper+0x4b54/0x5450 [ 13.992784] kasan_report+0x141/0x180 [ 13.992806] ? kasan_atomics_helper+0x4b54/0x5450 [ 13.992833] __asan_report_load4_noabort+0x18/0x20 [ 13.992869] kasan_atomics_helper+0x4b54/0x5450 [ 13.992892] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.992914] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.992951] ? kasan_atomics+0x152/0x310 [ 13.992978] kasan_atomics+0x1dc/0x310 [ 13.993001] ? __pfx_kasan_atomics+0x10/0x10 [ 13.993024] ? __pfx_read_tsc+0x10/0x10 [ 13.993046] ? ktime_get_ts64+0x86/0x230 [ 13.993070] kunit_try_run_case+0x1a5/0x480 [ 13.993095] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.993117] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.993141] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.993163] ? __kthread_parkme+0x82/0x180 [ 13.993185] ? preempt_count_sub+0x50/0x80 [ 13.993208] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.993232] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.993265] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.993289] kthread+0x337/0x6f0 [ 13.993309] ? trace_preempt_on+0x20/0xc0 [ 13.993344] ? __pfx_kthread+0x10/0x10 [ 13.993373] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.993394] ? calculate_sigpending+0x7b/0xa0 [ 13.993419] ? __pfx_kthread+0x10/0x10 [ 13.993450] ret_from_fork+0x116/0x1d0 [ 13.993469] ? __pfx_kthread+0x10/0x10 [ 13.993489] ret_from_fork_asm+0x1a/0x30 [ 13.993530] </TASK> [ 13.993542] [ 14.001560] Allocated by task 284: [ 14.002064] kasan_save_stack+0x45/0x70 [ 14.002295] kasan_save_track+0x18/0x40 [ 14.002665] kasan_save_alloc_info+0x3b/0x50 [ 14.003074] __kasan_kmalloc+0xb7/0xc0 [ 14.003213] __kmalloc_cache_noprof+0x189/0x420 [ 14.003448] kasan_atomics+0x95/0x310 [ 14.003688] kunit_try_run_case+0x1a5/0x480 [ 14.003987] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.004257] kthread+0x337/0x6f0 [ 14.004454] ret_from_fork+0x116/0x1d0 [ 14.004681] ret_from_fork_asm+0x1a/0x30 [ 14.004883] [ 14.004983] The buggy address belongs to the object at ffff888103128480 [ 14.004983] which belongs to the cache kmalloc-64 of size 64 [ 14.005485] The buggy address is located 0 bytes to the right of [ 14.005485] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.005951] [ 14.006025] The buggy address belongs to the physical page: [ 14.006198] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.006705] flags: 0x200000000000000(node=0|zone=2) [ 14.007031] page_type: f5(slab) [ 14.007202] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.007563] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.008085] page dumped because: kasan: bad access detected [ 14.008277] [ 14.008350] Memory state around the buggy address: [ 14.008549] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.008958] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.009311] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.009639] ^ [ 14.009912] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.010200] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.010531] ================================================================== [ 14.393179] ================================================================== [ 14.393678] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 14.394113] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.394465] [ 14.394551] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.394592] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.394605] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.394625] Call Trace: [ 14.394640] <TASK> [ 14.394655] dump_stack_lvl+0x73/0xb0 [ 14.394684] print_report+0xd1/0x650 [ 14.394707] ? __virt_addr_valid+0x1db/0x2d0 [ 14.394730] ? kasan_atomics_helper+0xf10/0x5450 [ 14.394751] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.394774] ? kasan_atomics_helper+0xf10/0x5450 [ 14.394796] kasan_report+0x141/0x180 [ 14.394820] ? kasan_atomics_helper+0xf10/0x5450 [ 14.394847] kasan_check_range+0x10c/0x1c0 [ 14.394871] __kasan_check_write+0x18/0x20 [ 14.394892] kasan_atomics_helper+0xf10/0x5450 [ 14.394915] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.394938] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.394964] ? kasan_atomics+0x152/0x310 [ 14.394991] kasan_atomics+0x1dc/0x310 [ 14.395015] ? __pfx_kasan_atomics+0x10/0x10 [ 14.395041] ? __pfx_read_tsc+0x10/0x10 [ 14.395062] ? ktime_get_ts64+0x86/0x230 [ 14.395086] kunit_try_run_case+0x1a5/0x480 [ 14.395111] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.395134] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.395158] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.395182] ? __kthread_parkme+0x82/0x180 [ 14.395204] ? preempt_count_sub+0x50/0x80 [ 14.395228] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.395252] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.395289] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.395314] kthread+0x337/0x6f0 [ 14.395334] ? trace_preempt_on+0x20/0xc0 [ 14.395374] ? __pfx_kthread+0x10/0x10 [ 14.395395] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.395417] ? calculate_sigpending+0x7b/0xa0 [ 14.395441] ? __pfx_kthread+0x10/0x10 [ 14.395464] ret_from_fork+0x116/0x1d0 [ 14.395483] ? __pfx_kthread+0x10/0x10 [ 14.395504] ret_from_fork_asm+0x1a/0x30 [ 14.395535] </TASK> [ 14.395547] [ 14.403774] Allocated by task 284: [ 14.403983] kasan_save_stack+0x45/0x70 [ 14.404157] kasan_save_track+0x18/0x40 [ 14.404363] kasan_save_alloc_info+0x3b/0x50 [ 14.404570] __kasan_kmalloc+0xb7/0xc0 [ 14.404753] __kmalloc_cache_noprof+0x189/0x420 [ 14.404933] kasan_atomics+0x95/0x310 [ 14.405144] kunit_try_run_case+0x1a5/0x480 [ 14.405310] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.405494] kthread+0x337/0x6f0 [ 14.405619] ret_from_fork+0x116/0x1d0 [ 14.405822] ret_from_fork_asm+0x1a/0x30 [ 14.406042] [ 14.406139] The buggy address belongs to the object at ffff888103128480 [ 14.406139] which belongs to the cache kmalloc-64 of size 64 [ 14.406616] The buggy address is located 0 bytes to the right of [ 14.406616] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.407558] [ 14.407635] The buggy address belongs to the physical page: [ 14.407953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.408196] flags: 0x200000000000000(node=0|zone=2) [ 14.408420] page_type: f5(slab) [ 14.408591] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.409220] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.409520] page dumped because: kasan: bad access detected [ 14.409810] [ 14.409893] Memory state around the buggy address: [ 14.410101] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.410441] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.410736] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.411049] ^ [ 14.411261] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.411578] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.411892] ================================================================== [ 15.092292] ================================================================== [ 15.093023] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 15.093451] Read of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 15.093804] [ 15.093921] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.093967] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.093981] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.094004] Call Trace: [ 15.094022] <TASK> [ 15.094043] dump_stack_lvl+0x73/0xb0 [ 15.094073] print_report+0xd1/0x650 [ 15.094098] ? __virt_addr_valid+0x1db/0x2d0 [ 15.094123] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.094146] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.094168] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.094191] kasan_report+0x141/0x180 [ 15.094213] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.094240] __asan_report_load8_noabort+0x18/0x20 [ 15.094265] kasan_atomics_helper+0x4f71/0x5450 [ 15.094289] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.094312] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.094338] ? kasan_atomics+0x152/0x310 [ 15.094378] kasan_atomics+0x1dc/0x310 [ 15.094401] ? __pfx_kasan_atomics+0x10/0x10 [ 15.094426] ? __pfx_read_tsc+0x10/0x10 [ 15.094448] ? ktime_get_ts64+0x86/0x230 [ 15.094473] kunit_try_run_case+0x1a5/0x480 [ 15.094498] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.094521] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.094546] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.094570] ? __kthread_parkme+0x82/0x180 [ 15.094592] ? preempt_count_sub+0x50/0x80 [ 15.094618] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.094643] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.094666] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.094690] kthread+0x337/0x6f0 [ 15.094711] ? trace_preempt_on+0x20/0xc0 [ 15.094747] ? __pfx_kthread+0x10/0x10 [ 15.094769] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.094791] ? calculate_sigpending+0x7b/0xa0 [ 15.094815] ? __pfx_kthread+0x10/0x10 [ 15.094838] ret_from_fork+0x116/0x1d0 [ 15.094858] ? __pfx_kthread+0x10/0x10 [ 15.094879] ret_from_fork_asm+0x1a/0x30 [ 15.094911] </TASK> [ 15.094923] [ 15.102202] Allocated by task 284: [ 15.102400] kasan_save_stack+0x45/0x70 [ 15.102685] kasan_save_track+0x18/0x40 [ 15.102967] kasan_save_alloc_info+0x3b/0x50 [ 15.103180] __kasan_kmalloc+0xb7/0xc0 [ 15.103361] __kmalloc_cache_noprof+0x189/0x420 [ 15.103560] kasan_atomics+0x95/0x310 [ 15.103703] kunit_try_run_case+0x1a5/0x480 [ 15.103914] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.104293] kthread+0x337/0x6f0 [ 15.104440] ret_from_fork+0x116/0x1d0 [ 15.104619] ret_from_fork_asm+0x1a/0x30 [ 15.104839] [ 15.104932] The buggy address belongs to the object at ffff888103128480 [ 15.104932] which belongs to the cache kmalloc-64 of size 64 [ 15.105289] The buggy address is located 0 bytes to the right of [ 15.105289] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 15.105703] [ 15.105806] The buggy address belongs to the physical page: [ 15.106061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 15.106424] flags: 0x200000000000000(node=0|zone=2) [ 15.106611] page_type: f5(slab) [ 15.106735] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.106965] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.107404] page dumped because: kasan: bad access detected [ 15.107661] [ 15.107767] Memory state around the buggy address: [ 15.107997] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.108316] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.108641] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.108976] ^ [ 15.109170] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.109435] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.109682] ================================================================== [ 14.542458] ================================================================== [ 14.542789] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 14.543046] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.543388] [ 14.543503] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.543548] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.543562] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.543585] Call Trace: [ 14.543603] <TASK> [ 14.543623] dump_stack_lvl+0x73/0xb0 [ 14.543652] print_report+0xd1/0x650 [ 14.543681] ? __virt_addr_valid+0x1db/0x2d0 [ 14.543706] ? kasan_atomics_helper+0x1217/0x5450 [ 14.543728] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.543759] ? kasan_atomics_helper+0x1217/0x5450 [ 14.543782] kasan_report+0x141/0x180 [ 14.543804] ? kasan_atomics_helper+0x1217/0x5450 [ 14.543830] kasan_check_range+0x10c/0x1c0 [ 14.543855] __kasan_check_write+0x18/0x20 [ 14.543876] kasan_atomics_helper+0x1217/0x5450 [ 14.543898] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.543921] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.543949] ? kasan_atomics+0x152/0x310 [ 14.543976] kasan_atomics+0x1dc/0x310 [ 14.543999] ? __pfx_kasan_atomics+0x10/0x10 [ 14.544023] ? __pfx_read_tsc+0x10/0x10 [ 14.544045] ? ktime_get_ts64+0x86/0x230 [ 14.544069] kunit_try_run_case+0x1a5/0x480 [ 14.544095] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.544117] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.544141] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.544165] ? __kthread_parkme+0x82/0x180 [ 14.544188] ? preempt_count_sub+0x50/0x80 [ 14.544212] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.544237] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.544260] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.544283] kthread+0x337/0x6f0 [ 14.544303] ? trace_preempt_on+0x20/0xc0 [ 14.544327] ? __pfx_kthread+0x10/0x10 [ 14.544360] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.544382] ? calculate_sigpending+0x7b/0xa0 [ 14.544406] ? __pfx_kthread+0x10/0x10 [ 14.544428] ret_from_fork+0x116/0x1d0 [ 14.544447] ? __pfx_kthread+0x10/0x10 [ 14.544468] ret_from_fork_asm+0x1a/0x30 [ 14.544499] </TASK> [ 14.544512] [ 14.551823] Allocated by task 284: [ 14.551959] kasan_save_stack+0x45/0x70 [ 14.552127] kasan_save_track+0x18/0x40 [ 14.552329] kasan_save_alloc_info+0x3b/0x50 [ 14.552555] __kasan_kmalloc+0xb7/0xc0 [ 14.552758] __kmalloc_cache_noprof+0x189/0x420 [ 14.552956] kasan_atomics+0x95/0x310 [ 14.553143] kunit_try_run_case+0x1a5/0x480 [ 14.553317] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.553545] kthread+0x337/0x6f0 [ 14.553715] ret_from_fork+0x116/0x1d0 [ 14.553892] ret_from_fork_asm+0x1a/0x30 [ 14.554034] [ 14.554130] The buggy address belongs to the object at ffff888103128480 [ 14.554130] which belongs to the cache kmalloc-64 of size 64 [ 14.554639] The buggy address is located 0 bytes to the right of [ 14.554639] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.555230] [ 14.555305] The buggy address belongs to the physical page: [ 14.555493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.555738] flags: 0x200000000000000(node=0|zone=2) [ 14.555969] page_type: f5(slab) [ 14.556136] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.556619] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.556952] page dumped because: kasan: bad access detected [ 14.557176] [ 14.557246] Memory state around the buggy address: [ 14.557411] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.557628] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.557954] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.558272] ^ [ 14.558511] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.558829] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.559246] ================================================================== [ 14.825369] ================================================================== [ 14.825868] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 14.826195] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.826526] [ 14.826639] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.826694] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.826706] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.826749] Call Trace: [ 14.826766] <TASK> [ 14.826781] dump_stack_lvl+0x73/0xb0 [ 14.826808] print_report+0xd1/0x650 [ 14.826832] ? __virt_addr_valid+0x1db/0x2d0 [ 14.826864] ? kasan_atomics_helper+0x1818/0x5450 [ 14.826886] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.826909] ? kasan_atomics_helper+0x1818/0x5450 [ 14.826942] kasan_report+0x141/0x180 [ 14.826964] ? kasan_atomics_helper+0x1818/0x5450 [ 14.826990] kasan_check_range+0x10c/0x1c0 [ 14.827014] __kasan_check_write+0x18/0x20 [ 14.827033] kasan_atomics_helper+0x1818/0x5450 [ 14.827065] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.827088] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.827113] ? kasan_atomics+0x152/0x310 [ 14.827150] kasan_atomics+0x1dc/0x310 [ 14.827174] ? __pfx_kasan_atomics+0x10/0x10 [ 14.827197] ? __pfx_read_tsc+0x10/0x10 [ 14.827218] ? ktime_get_ts64+0x86/0x230 [ 14.827243] kunit_try_run_case+0x1a5/0x480 [ 14.827267] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.827290] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.827314] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.827337] ? __kthread_parkme+0x82/0x180 [ 14.827377] ? preempt_count_sub+0x50/0x80 [ 14.827400] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.827424] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.827458] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.827481] kthread+0x337/0x6f0 [ 14.827502] ? trace_preempt_on+0x20/0xc0 [ 14.827526] ? __pfx_kthread+0x10/0x10 [ 14.827548] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.827570] ? calculate_sigpending+0x7b/0xa0 [ 14.827594] ? __pfx_kthread+0x10/0x10 [ 14.827615] ret_from_fork+0x116/0x1d0 [ 14.827634] ? __pfx_kthread+0x10/0x10 [ 14.827660] ret_from_fork_asm+0x1a/0x30 [ 14.827691] </TASK> [ 14.827703] [ 14.835495] Allocated by task 284: [ 14.835677] kasan_save_stack+0x45/0x70 [ 14.835946] kasan_save_track+0x18/0x40 [ 14.836107] kasan_save_alloc_info+0x3b/0x50 [ 14.836359] __kasan_kmalloc+0xb7/0xc0 [ 14.836574] __kmalloc_cache_noprof+0x189/0x420 [ 14.836754] kasan_atomics+0x95/0x310 [ 14.836967] kunit_try_run_case+0x1a5/0x480 [ 14.837127] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.837301] kthread+0x337/0x6f0 [ 14.837437] ret_from_fork+0x116/0x1d0 [ 14.837574] ret_from_fork_asm+0x1a/0x30 [ 14.837716] [ 14.837822] The buggy address belongs to the object at ffff888103128480 [ 14.837822] which belongs to the cache kmalloc-64 of size 64 [ 14.838367] The buggy address is located 0 bytes to the right of [ 14.838367] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.839145] [ 14.839255] The buggy address belongs to the physical page: [ 14.839454] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.839704] flags: 0x200000000000000(node=0|zone=2) [ 14.839869] page_type: f5(slab) [ 14.840030] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.840405] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.840781] page dumped because: kasan: bad access detected [ 14.841285] [ 14.841398] Memory state around the buggy address: [ 14.841639] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.842119] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.842338] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.842623] ^ [ 14.842854] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.843159] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.843382] ================================================================== [ 14.713210] ================================================================== [ 14.713595] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 14.713946] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.714171] [ 14.714257] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.714464] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.714479] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.714501] Call Trace: [ 14.714517] <TASK> [ 14.714548] dump_stack_lvl+0x73/0xb0 [ 14.714590] print_report+0xd1/0x650 [ 14.714629] ? __virt_addr_valid+0x1db/0x2d0 [ 14.714677] ? kasan_atomics_helper+0x151d/0x5450 [ 14.714699] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.714722] ? kasan_atomics_helper+0x151d/0x5450 [ 14.714753] kasan_report+0x141/0x180 [ 14.714777] ? kasan_atomics_helper+0x151d/0x5450 [ 14.714803] kasan_check_range+0x10c/0x1c0 [ 14.714828] __kasan_check_write+0x18/0x20 [ 14.714848] kasan_atomics_helper+0x151d/0x5450 [ 14.714871] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.714894] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.714919] ? kasan_atomics+0x152/0x310 [ 14.714946] kasan_atomics+0x1dc/0x310 [ 14.714969] ? __pfx_kasan_atomics+0x10/0x10 [ 14.714994] ? __pfx_read_tsc+0x10/0x10 [ 14.715015] ? ktime_get_ts64+0x86/0x230 [ 14.715040] kunit_try_run_case+0x1a5/0x480 [ 14.715065] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.715088] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.715112] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.715136] ? __kthread_parkme+0x82/0x180 [ 14.715157] ? preempt_count_sub+0x50/0x80 [ 14.715182] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.715207] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.715230] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.715254] kthread+0x337/0x6f0 [ 14.715274] ? trace_preempt_on+0x20/0xc0 [ 14.715318] ? __pfx_kthread+0x10/0x10 [ 14.715339] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.715372] ? calculate_sigpending+0x7b/0xa0 [ 14.715396] ? __pfx_kthread+0x10/0x10 [ 14.715419] ret_from_fork+0x116/0x1d0 [ 14.715437] ? __pfx_kthread+0x10/0x10 [ 14.715458] ret_from_fork_asm+0x1a/0x30 [ 14.715506] </TASK> [ 14.715518] [ 14.723902] Allocated by task 284: [ 14.724100] kasan_save_stack+0x45/0x70 [ 14.724273] kasan_save_track+0x18/0x40 [ 14.724502] kasan_save_alloc_info+0x3b/0x50 [ 14.724722] __kasan_kmalloc+0xb7/0xc0 [ 14.724929] __kmalloc_cache_noprof+0x189/0x420 [ 14.725177] kasan_atomics+0x95/0x310 [ 14.725373] kunit_try_run_case+0x1a5/0x480 [ 14.725578] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.725825] kthread+0x337/0x6f0 [ 14.726033] ret_from_fork+0x116/0x1d0 [ 14.726164] ret_from_fork_asm+0x1a/0x30 [ 14.726540] [ 14.726651] The buggy address belongs to the object at ffff888103128480 [ 14.726651] which belongs to the cache kmalloc-64 of size 64 [ 14.727266] The buggy address is located 0 bytes to the right of [ 14.727266] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.728398] [ 14.728579] The buggy address belongs to the physical page: [ 14.728769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.729014] flags: 0x200000000000000(node=0|zone=2) [ 14.729175] page_type: f5(slab) [ 14.729292] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.730463] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.730935] page dumped because: kasan: bad access detected [ 14.731118] [ 14.731190] Memory state around the buggy address: [ 14.731367] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.731979] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.732626] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.733254] ^ [ 14.733701] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.734240] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.734694] ================================================================== [ 14.412481] ================================================================== [ 14.412963] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 14.413202] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.413473] [ 14.413586] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.413629] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.413643] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.413665] Call Trace: [ 14.413693] <TASK> [ 14.413713] dump_stack_lvl+0x73/0xb0 [ 14.413741] print_report+0xd1/0x650 [ 14.413777] ? __virt_addr_valid+0x1db/0x2d0 [ 14.413803] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.413825] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.413848] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.413870] kasan_report+0x141/0x180 [ 14.413892] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.413919] kasan_check_range+0x10c/0x1c0 [ 14.413943] __kasan_check_write+0x18/0x20 [ 14.413963] kasan_atomics_helper+0xfa9/0x5450 [ 14.413986] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.414009] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.414035] ? kasan_atomics+0x152/0x310 [ 14.414063] kasan_atomics+0x1dc/0x310 [ 14.414085] ? __pfx_kasan_atomics+0x10/0x10 [ 14.414110] ? __pfx_read_tsc+0x10/0x10 [ 14.414131] ? ktime_get_ts64+0x86/0x230 [ 14.414157] kunit_try_run_case+0x1a5/0x480 [ 14.414182] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.414205] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.414229] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.414253] ? __kthread_parkme+0x82/0x180 [ 14.414275] ? preempt_count_sub+0x50/0x80 [ 14.414300] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.414338] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.414371] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.414395] kthread+0x337/0x6f0 [ 14.414415] ? trace_preempt_on+0x20/0xc0 [ 14.414450] ? __pfx_kthread+0x10/0x10 [ 14.414471] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.414493] ? calculate_sigpending+0x7b/0xa0 [ 14.414529] ? __pfx_kthread+0x10/0x10 [ 14.414551] ret_from_fork+0x116/0x1d0 [ 14.414571] ? __pfx_kthread+0x10/0x10 [ 14.414592] ret_from_fork_asm+0x1a/0x30 [ 14.414632] </TASK> [ 14.414645] [ 14.422663] Allocated by task 284: [ 14.422897] kasan_save_stack+0x45/0x70 [ 14.423107] kasan_save_track+0x18/0x40 [ 14.423301] kasan_save_alloc_info+0x3b/0x50 [ 14.423505] __kasan_kmalloc+0xb7/0xc0 [ 14.423640] __kmalloc_cache_noprof+0x189/0x420 [ 14.423917] kasan_atomics+0x95/0x310 [ 14.424231] kunit_try_run_case+0x1a5/0x480 [ 14.424452] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.424687] kthread+0x337/0x6f0 [ 14.424844] ret_from_fork+0x116/0x1d0 [ 14.425023] ret_from_fork_asm+0x1a/0x30 [ 14.425167] [ 14.425240] The buggy address belongs to the object at ffff888103128480 [ 14.425240] which belongs to the cache kmalloc-64 of size 64 [ 14.425601] The buggy address is located 0 bytes to the right of [ 14.425601] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.425964] [ 14.426039] The buggy address belongs to the physical page: [ 14.426249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.426845] flags: 0x200000000000000(node=0|zone=2) [ 14.427100] page_type: f5(slab) [ 14.427271] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.427620] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.427960] page dumped because: kasan: bad access detected [ 14.428215] [ 14.428391] Memory state around the buggy address: [ 14.428558] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.428844] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.429163] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.429485] ^ [ 14.429690] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.430104] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.430440] ================================================================== [ 13.948508] ================================================================== [ 13.948952] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 13.949218] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 13.949626] [ 13.949749] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.949793] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.949817] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.949838] Call Trace: [ 13.949854] <TASK> [ 13.949870] dump_stack_lvl+0x73/0xb0 [ 13.949898] print_report+0xd1/0x650 [ 13.949930] ? __virt_addr_valid+0x1db/0x2d0 [ 13.949954] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.949986] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.950009] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.950031] kasan_report+0x141/0x180 [ 13.950054] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.950090] __asan_report_store4_noabort+0x1b/0x30 [ 13.950111] kasan_atomics_helper+0x4b6e/0x5450 [ 13.950133] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.950167] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.950192] ? kasan_atomics+0x152/0x310 [ 13.950220] kasan_atomics+0x1dc/0x310 [ 13.950243] ? __pfx_kasan_atomics+0x10/0x10 [ 13.950267] ? __pfx_read_tsc+0x10/0x10 [ 13.950289] ? ktime_get_ts64+0x86/0x230 [ 13.950321] kunit_try_run_case+0x1a5/0x480 [ 13.950345] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.950383] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.950407] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.950431] ? __kthread_parkme+0x82/0x180 [ 13.950452] ? preempt_count_sub+0x50/0x80 [ 13.950477] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.950500] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.950524] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.950547] kthread+0x337/0x6f0 [ 13.950607] ? trace_preempt_on+0x20/0xc0 [ 13.950634] ? __pfx_kthread+0x10/0x10 [ 13.950655] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.950677] ? calculate_sigpending+0x7b/0xa0 [ 13.950701] ? __pfx_kthread+0x10/0x10 [ 13.950723] ret_from_fork+0x116/0x1d0 [ 13.950742] ? __pfx_kthread+0x10/0x10 [ 13.950764] ret_from_fork_asm+0x1a/0x30 [ 13.950795] </TASK> [ 13.950817] [ 13.959041] Allocated by task 284: [ 13.959271] kasan_save_stack+0x45/0x70 [ 13.959511] kasan_save_track+0x18/0x40 [ 13.959878] kasan_save_alloc_info+0x3b/0x50 [ 13.960107] __kasan_kmalloc+0xb7/0xc0 [ 13.960247] __kmalloc_cache_noprof+0x189/0x420 [ 13.960475] kasan_atomics+0x95/0x310 [ 13.960685] kunit_try_run_case+0x1a5/0x480 [ 13.961106] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.961422] kthread+0x337/0x6f0 [ 13.961703] ret_from_fork+0x116/0x1d0 [ 13.961896] ret_from_fork_asm+0x1a/0x30 [ 13.962086] [ 13.962159] The buggy address belongs to the object at ffff888103128480 [ 13.962159] which belongs to the cache kmalloc-64 of size 64 [ 13.962663] The buggy address is located 0 bytes to the right of [ 13.962663] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 13.963158] [ 13.963236] The buggy address belongs to the physical page: [ 13.963423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 13.964128] flags: 0x200000000000000(node=0|zone=2) [ 13.964508] page_type: f5(slab) [ 13.965027] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.965432] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.966375] page dumped because: kasan: bad access detected [ 13.966753] [ 13.966935] Memory state around the buggy address: [ 13.967305] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.967683] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.968055] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.968434] ^ [ 13.968904] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.969218] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.969814] ================================================================== [ 14.517563] ================================================================== [ 14.517863] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 14.518305] Read of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.518914] [ 14.519220] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.519269] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.519283] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.519306] Call Trace: [ 14.519328] <TASK> [ 14.519360] dump_stack_lvl+0x73/0xb0 [ 14.519390] print_report+0xd1/0x650 [ 14.519415] ? __virt_addr_valid+0x1db/0x2d0 [ 14.519439] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.519461] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.519495] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.519517] kasan_report+0x141/0x180 [ 14.519540] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.519566] __asan_report_load4_noabort+0x18/0x20 [ 14.519591] kasan_atomics_helper+0x4a02/0x5450 [ 14.519614] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.519637] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.519668] ? kasan_atomics+0x152/0x310 [ 14.519695] kasan_atomics+0x1dc/0x310 [ 14.519718] ? __pfx_kasan_atomics+0x10/0x10 [ 14.519749] ? __pfx_read_tsc+0x10/0x10 [ 14.519796] ? ktime_get_ts64+0x86/0x230 [ 14.519821] kunit_try_run_case+0x1a5/0x480 [ 14.519849] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.519872] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.519897] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.519919] ? __kthread_parkme+0x82/0x180 [ 14.519942] ? preempt_count_sub+0x50/0x80 [ 14.519967] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.519993] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.520016] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.520040] kthread+0x337/0x6f0 [ 14.520060] ? trace_preempt_on+0x20/0xc0 [ 14.520085] ? __pfx_kthread+0x10/0x10 [ 14.520107] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.520128] ? calculate_sigpending+0x7b/0xa0 [ 14.520153] ? __pfx_kthread+0x10/0x10 [ 14.520175] ret_from_fork+0x116/0x1d0 [ 14.520193] ? __pfx_kthread+0x10/0x10 [ 14.520214] ret_from_fork_asm+0x1a/0x30 [ 14.520247] </TASK> [ 14.520261] [ 14.534098] Allocated by task 284: [ 14.534329] kasan_save_stack+0x45/0x70 [ 14.534491] kasan_save_track+0x18/0x40 [ 14.534624] kasan_save_alloc_info+0x3b/0x50 [ 14.534786] __kasan_kmalloc+0xb7/0xc0 [ 14.534929] __kmalloc_cache_noprof+0x189/0x420 [ 14.535151] kasan_atomics+0x95/0x310 [ 14.535357] kunit_try_run_case+0x1a5/0x480 [ 14.535553] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.535747] kthread+0x337/0x6f0 [ 14.535885] ret_from_fork+0x116/0x1d0 [ 14.536097] ret_from_fork_asm+0x1a/0x30 [ 14.536391] [ 14.536501] The buggy address belongs to the object at ffff888103128480 [ 14.536501] which belongs to the cache kmalloc-64 of size 64 [ 14.537049] The buggy address is located 0 bytes to the right of [ 14.537049] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.537527] [ 14.537603] The buggy address belongs to the physical page: [ 14.537888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.538245] flags: 0x200000000000000(node=0|zone=2) [ 14.538466] page_type: f5(slab) [ 14.538588] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.538973] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.539328] page dumped because: kasan: bad access detected [ 14.539586] [ 14.539669] Memory state around the buggy address: [ 14.539905] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.540146] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.540413] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.540746] ^ [ 14.541036] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.541276] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.541620] ================================================================== [ 14.950062] ================================================================== [ 14.950531] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 14.950907] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.951239] [ 14.951363] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.951408] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.951422] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.951443] Call Trace: [ 14.951458] <TASK> [ 14.951472] dump_stack_lvl+0x73/0xb0 [ 14.951498] print_report+0xd1/0x650 [ 14.951522] ? __virt_addr_valid+0x1db/0x2d0 [ 14.951544] ? kasan_atomics_helper+0x1c18/0x5450 [ 14.951566] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.951589] ? kasan_atomics_helper+0x1c18/0x5450 [ 14.951611] kasan_report+0x141/0x180 [ 14.951635] ? kasan_atomics_helper+0x1c18/0x5450 [ 14.951664] kasan_check_range+0x10c/0x1c0 [ 14.951699] __kasan_check_write+0x18/0x20 [ 14.951719] kasan_atomics_helper+0x1c18/0x5450 [ 14.951741] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.951785] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.951811] ? kasan_atomics+0x152/0x310 [ 14.951838] kasan_atomics+0x1dc/0x310 [ 14.951861] ? __pfx_kasan_atomics+0x10/0x10 [ 14.951886] ? __pfx_read_tsc+0x10/0x10 [ 14.951908] ? ktime_get_ts64+0x86/0x230 [ 14.951932] kunit_try_run_case+0x1a5/0x480 [ 14.951955] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.951978] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.952001] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.952024] ? __kthread_parkme+0x82/0x180 [ 14.952046] ? preempt_count_sub+0x50/0x80 [ 14.952070] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.952093] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.952117] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.952140] kthread+0x337/0x6f0 [ 14.952160] ? trace_preempt_on+0x20/0xc0 [ 14.952184] ? __pfx_kthread+0x10/0x10 [ 14.952205] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.952226] ? calculate_sigpending+0x7b/0xa0 [ 14.952251] ? __pfx_kthread+0x10/0x10 [ 14.952273] ret_from_fork+0x116/0x1d0 [ 14.952293] ? __pfx_kthread+0x10/0x10 [ 14.952313] ret_from_fork_asm+0x1a/0x30 [ 14.952353] </TASK> [ 14.952365] [ 14.959893] Allocated by task 284: [ 14.960230] kasan_save_stack+0x45/0x70 [ 14.960459] kasan_save_track+0x18/0x40 [ 14.960654] kasan_save_alloc_info+0x3b/0x50 [ 14.961032] __kasan_kmalloc+0xb7/0xc0 [ 14.961221] __kmalloc_cache_noprof+0x189/0x420 [ 14.961454] kasan_atomics+0x95/0x310 [ 14.961645] kunit_try_run_case+0x1a5/0x480 [ 14.962008] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.962205] kthread+0x337/0x6f0 [ 14.962329] ret_from_fork+0x116/0x1d0 [ 14.962479] ret_from_fork_asm+0x1a/0x30 [ 14.962620] [ 14.962692] The buggy address belongs to the object at ffff888103128480 [ 14.962692] which belongs to the cache kmalloc-64 of size 64 [ 14.963893] The buggy address is located 0 bytes to the right of [ 14.963893] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.964465] [ 14.964580] The buggy address belongs to the physical page: [ 14.964768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.965149] flags: 0x200000000000000(node=0|zone=2) [ 14.965401] page_type: f5(slab) [ 14.965589] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.965946] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.966264] page dumped because: kasan: bad access detected [ 14.966522] [ 14.966614] Memory state around the buggy address: [ 14.966865] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.967167] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.967503] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.967824] ^ [ 14.968083] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.968415] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.968727] ================================================================== [ 15.028969] ================================================================== [ 15.029317] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 15.029655] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 15.030061] [ 15.030170] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.030217] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.030242] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.030264] Call Trace: [ 15.030285] <TASK> [ 15.030304] dump_stack_lvl+0x73/0xb0 [ 15.030340] print_report+0xd1/0x650 [ 15.030383] ? __virt_addr_valid+0x1db/0x2d0 [ 15.030407] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.030429] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.030453] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.030475] kasan_report+0x141/0x180 [ 15.030508] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.030535] kasan_check_range+0x10c/0x1c0 [ 15.030559] __kasan_check_write+0x18/0x20 [ 15.030592] kasan_atomics_helper+0x1e12/0x5450 [ 15.030616] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.030639] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.030676] ? kasan_atomics+0x152/0x310 [ 15.030704] kasan_atomics+0x1dc/0x310 [ 15.030727] ? __pfx_kasan_atomics+0x10/0x10 [ 15.030764] ? __pfx_read_tsc+0x10/0x10 [ 15.030786] ? ktime_get_ts64+0x86/0x230 [ 15.030811] kunit_try_run_case+0x1a5/0x480 [ 15.030837] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.030859] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.030895] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.030919] ? __kthread_parkme+0x82/0x180 [ 15.030941] ? preempt_count_sub+0x50/0x80 [ 15.030978] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.031002] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.031025] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.031059] kthread+0x337/0x6f0 [ 15.031079] ? trace_preempt_on+0x20/0xc0 [ 15.031103] ? __pfx_kthread+0x10/0x10 [ 15.031136] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.031158] ? calculate_sigpending+0x7b/0xa0 [ 15.031183] ? __pfx_kthread+0x10/0x10 [ 15.031216] ret_from_fork+0x116/0x1d0 [ 15.031234] ? __pfx_kthread+0x10/0x10 [ 15.031256] ret_from_fork_asm+0x1a/0x30 [ 15.031298] </TASK> [ 15.031312] [ 15.039315] Allocated by task 284: [ 15.039467] kasan_save_stack+0x45/0x70 [ 15.039704] kasan_save_track+0x18/0x40 [ 15.039897] kasan_save_alloc_info+0x3b/0x50 [ 15.040105] __kasan_kmalloc+0xb7/0xc0 [ 15.040402] __kmalloc_cache_noprof+0x189/0x420 [ 15.040625] kasan_atomics+0x95/0x310 [ 15.040830] kunit_try_run_case+0x1a5/0x480 [ 15.041036] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.041290] kthread+0x337/0x6f0 [ 15.041457] ret_from_fork+0x116/0x1d0 [ 15.041637] ret_from_fork_asm+0x1a/0x30 [ 15.041924] [ 15.042024] The buggy address belongs to the object at ffff888103128480 [ 15.042024] which belongs to the cache kmalloc-64 of size 64 [ 15.042404] The buggy address is located 0 bytes to the right of [ 15.042404] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 15.042815] [ 15.042953] The buggy address belongs to the physical page: [ 15.043229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 15.043598] flags: 0x200000000000000(node=0|zone=2) [ 15.043933] page_type: f5(slab) [ 15.044060] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.044293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.044559] page dumped because: kasan: bad access detected [ 15.044900] [ 15.044996] Memory state around the buggy address: [ 15.045245] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.045601] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.045952] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.046169] ^ [ 15.046330] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.046675] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.046993] ================================================================== [ 15.047585] ================================================================== [ 15.048131] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 15.048487] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 15.048830] [ 15.048952] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.049011] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.049024] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.049047] Call Trace: [ 15.049066] <TASK> [ 15.049096] dump_stack_lvl+0x73/0xb0 [ 15.049125] print_report+0xd1/0x650 [ 15.049152] ? __virt_addr_valid+0x1db/0x2d0 [ 15.049177] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.049199] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.049222] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.049243] kasan_report+0x141/0x180 [ 15.049266] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.049294] kasan_check_range+0x10c/0x1c0 [ 15.049318] __kasan_check_write+0x18/0x20 [ 15.049338] kasan_atomics_helper+0x1eaa/0x5450 [ 15.049381] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.049403] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.049431] ? kasan_atomics+0x152/0x310 [ 15.049469] kasan_atomics+0x1dc/0x310 [ 15.049493] ? __pfx_kasan_atomics+0x10/0x10 [ 15.049517] ? __pfx_read_tsc+0x10/0x10 [ 15.049540] ? ktime_get_ts64+0x86/0x230 [ 15.049566] kunit_try_run_case+0x1a5/0x480 [ 15.049591] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.049614] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.049639] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.049662] ? __kthread_parkme+0x82/0x180 [ 15.049684] ? preempt_count_sub+0x50/0x80 [ 15.049709] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.049745] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.049769] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.049792] kthread+0x337/0x6f0 [ 15.049812] ? trace_preempt_on+0x20/0xc0 [ 15.049837] ? __pfx_kthread+0x10/0x10 [ 15.049867] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.049889] ? calculate_sigpending+0x7b/0xa0 [ 15.049914] ? __pfx_kthread+0x10/0x10 [ 15.049942] ret_from_fork+0x116/0x1d0 [ 15.049960] ? __pfx_kthread+0x10/0x10 [ 15.049982] ret_from_fork_asm+0x1a/0x30 [ 15.050013] </TASK> [ 15.050025] [ 15.058080] Allocated by task 284: [ 15.058272] kasan_save_stack+0x45/0x70 [ 15.058503] kasan_save_track+0x18/0x40 [ 15.058688] kasan_save_alloc_info+0x3b/0x50 [ 15.058907] __kasan_kmalloc+0xb7/0xc0 [ 15.059105] __kmalloc_cache_noprof+0x189/0x420 [ 15.059329] kasan_atomics+0x95/0x310 [ 15.059494] kunit_try_run_case+0x1a5/0x480 [ 15.059644] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.059946] kthread+0x337/0x6f0 [ 15.060152] ret_from_fork+0x116/0x1d0 [ 15.060354] ret_from_fork_asm+0x1a/0x30 [ 15.060532] [ 15.060603] The buggy address belongs to the object at ffff888103128480 [ 15.060603] which belongs to the cache kmalloc-64 of size 64 [ 15.060956] The buggy address is located 0 bytes to the right of [ 15.060956] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 15.061433] [ 15.061531] The buggy address belongs to the physical page: [ 15.061784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 15.062305] flags: 0x200000000000000(node=0|zone=2) [ 15.063318] page_type: f5(slab) [ 15.063814] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.064223] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.064581] page dumped because: kasan: bad access detected [ 15.065432] [ 15.065530] Memory state around the buggy address: [ 15.065695] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.066182] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.066575] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.067136] ^ [ 15.067458] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.067869] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.068243] ================================================================== [ 14.077874] ================================================================== [ 14.078285] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 14.078656] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.078996] [ 14.079112] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.079167] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.079181] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.079214] Call Trace: [ 14.079232] <TASK> [ 14.079249] dump_stack_lvl+0x73/0xb0 [ 14.079278] print_report+0xd1/0x650 [ 14.079302] ? __virt_addr_valid+0x1db/0x2d0 [ 14.079326] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.079348] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.079382] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.079404] kasan_report+0x141/0x180 [ 14.079427] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.079462] kasan_check_range+0x10c/0x1c0 [ 14.079487] __kasan_check_write+0x18/0x20 [ 14.079508] kasan_atomics_helper+0x5fe/0x5450 [ 14.079542] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.079565] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.079592] ? kasan_atomics+0x152/0x310 [ 14.079619] kasan_atomics+0x1dc/0x310 [ 14.079643] ? __pfx_kasan_atomics+0x10/0x10 [ 14.079672] ? __pfx_read_tsc+0x10/0x10 [ 14.079694] ? ktime_get_ts64+0x86/0x230 [ 14.079718] kunit_try_run_case+0x1a5/0x480 [ 14.079744] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.079766] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.079789] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.079872] ? __kthread_parkme+0x82/0x180 [ 14.079896] ? preempt_count_sub+0x50/0x80 [ 14.079920] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.079955] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.079979] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.080002] kthread+0x337/0x6f0 [ 14.080034] ? trace_preempt_on+0x20/0xc0 [ 14.080059] ? __pfx_kthread+0x10/0x10 [ 14.080080] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.080101] ? calculate_sigpending+0x7b/0xa0 [ 14.080126] ? __pfx_kthread+0x10/0x10 [ 14.080148] ret_from_fork+0x116/0x1d0 [ 14.080167] ? __pfx_kthread+0x10/0x10 [ 14.080188] ret_from_fork_asm+0x1a/0x30 [ 14.080219] </TASK> [ 14.080231] [ 14.088930] Allocated by task 284: [ 14.089069] kasan_save_stack+0x45/0x70 [ 14.089231] kasan_save_track+0x18/0x40 [ 14.089435] kasan_save_alloc_info+0x3b/0x50 [ 14.089653] __kasan_kmalloc+0xb7/0xc0 [ 14.090095] __kmalloc_cache_noprof+0x189/0x420 [ 14.090314] kasan_atomics+0x95/0x310 [ 14.090505] kunit_try_run_case+0x1a5/0x480 [ 14.090765] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.091065] kthread+0x337/0x6f0 [ 14.091193] ret_from_fork+0x116/0x1d0 [ 14.091325] ret_from_fork_asm+0x1a/0x30 [ 14.091471] [ 14.091579] The buggy address belongs to the object at ffff888103128480 [ 14.091579] which belongs to the cache kmalloc-64 of size 64 [ 14.092130] The buggy address is located 0 bytes to the right of [ 14.092130] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.092547] [ 14.092622] The buggy address belongs to the physical page: [ 14.093077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.093468] flags: 0x200000000000000(node=0|zone=2) [ 14.093734] page_type: f5(slab) [ 14.093998] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.094321] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.094723] page dumped because: kasan: bad access detected [ 14.094947] [ 14.095095] Memory state around the buggy address: [ 14.095304] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.095626] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.096199] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.096519] ^ [ 14.096672] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.096879] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.097213] ================================================================== [ 15.238073] ================================================================== [ 15.238631] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 15.238993] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 15.239303] [ 15.239414] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.239458] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.239471] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.239493] Call Trace: [ 15.239509] <TASK> [ 15.239526] dump_stack_lvl+0x73/0xb0 [ 15.239556] print_report+0xd1/0x650 [ 15.239579] ? __virt_addr_valid+0x1db/0x2d0 [ 15.239603] ? kasan_atomics_helper+0x224c/0x5450 [ 15.239625] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.239647] ? kasan_atomics_helper+0x224c/0x5450 [ 15.239675] kasan_report+0x141/0x180 [ 15.239699] ? kasan_atomics_helper+0x224c/0x5450 [ 15.239728] kasan_check_range+0x10c/0x1c0 [ 15.239752] __kasan_check_write+0x18/0x20 [ 15.239773] kasan_atomics_helper+0x224c/0x5450 [ 15.239796] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.239819] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.239844] ? kasan_atomics+0x152/0x310 [ 15.239871] kasan_atomics+0x1dc/0x310 [ 15.239895] ? __pfx_kasan_atomics+0x10/0x10 [ 15.239921] ? __pfx_read_tsc+0x10/0x10 [ 15.239942] ? ktime_get_ts64+0x86/0x230 [ 15.239967] kunit_try_run_case+0x1a5/0x480 [ 15.239992] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.240015] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.240040] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.240063] ? __kthread_parkme+0x82/0x180 [ 15.240085] ? preempt_count_sub+0x50/0x80 [ 15.240110] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.240135] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.240160] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.240184] kthread+0x337/0x6f0 [ 15.240205] ? trace_preempt_on+0x20/0xc0 [ 15.240229] ? __pfx_kthread+0x10/0x10 [ 15.240251] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.240272] ? calculate_sigpending+0x7b/0xa0 [ 15.240296] ? __pfx_kthread+0x10/0x10 [ 15.240319] ret_from_fork+0x116/0x1d0 [ 15.240337] ? __pfx_kthread+0x10/0x10 [ 15.240368] ret_from_fork_asm+0x1a/0x30 [ 15.240400] </TASK> [ 15.240412] [ 15.247660] Allocated by task 284: [ 15.247851] kasan_save_stack+0x45/0x70 [ 15.248053] kasan_save_track+0x18/0x40 [ 15.248223] kasan_save_alloc_info+0x3b/0x50 [ 15.248409] __kasan_kmalloc+0xb7/0xc0 [ 15.248551] __kmalloc_cache_noprof+0x189/0x420 [ 15.248799] kasan_atomics+0x95/0x310 [ 15.248989] kunit_try_run_case+0x1a5/0x480 [ 15.249136] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.249333] kthread+0x337/0x6f0 [ 15.249519] ret_from_fork+0x116/0x1d0 [ 15.249708] ret_from_fork_asm+0x1a/0x30 [ 15.249921] [ 15.250006] The buggy address belongs to the object at ffff888103128480 [ 15.250006] which belongs to the cache kmalloc-64 of size 64 [ 15.250368] The buggy address is located 0 bytes to the right of [ 15.250368] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 15.251030] [ 15.251222] The buggy address belongs to the physical page: [ 15.251461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 15.251706] flags: 0x200000000000000(node=0|zone=2) [ 15.251869] page_type: f5(slab) [ 15.251988] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.252326] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.252676] page dumped because: kasan: bad access detected [ 15.252924] [ 15.253019] Memory state around the buggy address: [ 15.253249] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.253576] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.253926] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.254158] ^ [ 15.254320] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.254649] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.255068] ================================================================== [ 14.843905] ================================================================== [ 14.844431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 14.845075] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.845450] [ 14.845583] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.845626] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.845638] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.845660] Call Trace: [ 14.845676] <TASK> [ 14.845692] dump_stack_lvl+0x73/0xb0 [ 14.845719] print_report+0xd1/0x650 [ 14.845742] ? __virt_addr_valid+0x1db/0x2d0 [ 14.845766] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.845787] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.845810] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.845832] kasan_report+0x141/0x180 [ 14.845854] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.845881] kasan_check_range+0x10c/0x1c0 [ 14.845905] __kasan_check_write+0x18/0x20 [ 14.845924] kasan_atomics_helper+0x18b1/0x5450 [ 14.845948] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.845970] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.845996] ? kasan_atomics+0x152/0x310 [ 14.846023] kasan_atomics+0x1dc/0x310 [ 14.846048] ? __pfx_kasan_atomics+0x10/0x10 [ 14.846086] ? __pfx_read_tsc+0x10/0x10 [ 14.846107] ? ktime_get_ts64+0x86/0x230 [ 14.846132] kunit_try_run_case+0x1a5/0x480 [ 14.846169] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.846192] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.846217] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.846240] ? __kthread_parkme+0x82/0x180 [ 14.846262] ? preempt_count_sub+0x50/0x80 [ 14.846288] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.846312] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.846337] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.846368] kthread+0x337/0x6f0 [ 14.846388] ? trace_preempt_on+0x20/0xc0 [ 14.846413] ? __pfx_kthread+0x10/0x10 [ 14.846434] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.846455] ? calculate_sigpending+0x7b/0xa0 [ 14.846489] ? __pfx_kthread+0x10/0x10 [ 14.846511] ret_from_fork+0x116/0x1d0 [ 14.846530] ? __pfx_kthread+0x10/0x10 [ 14.846562] ret_from_fork_asm+0x1a/0x30 [ 14.846594] </TASK> [ 14.846605] [ 14.855777] Allocated by task 284: [ 14.855953] kasan_save_stack+0x45/0x70 [ 14.856131] kasan_save_track+0x18/0x40 [ 14.856549] kasan_save_alloc_info+0x3b/0x50 [ 14.857095] __kasan_kmalloc+0xb7/0xc0 [ 14.857495] __kmalloc_cache_noprof+0x189/0x420 [ 14.857838] kasan_atomics+0x95/0x310 [ 14.858119] kunit_try_run_case+0x1a5/0x480 [ 14.858534] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.858713] kthread+0x337/0x6f0 [ 14.858858] ret_from_fork+0x116/0x1d0 [ 14.859212] ret_from_fork_asm+0x1a/0x30 [ 14.859589] [ 14.859751] The buggy address belongs to the object at ffff888103128480 [ 14.859751] which belongs to the cache kmalloc-64 of size 64 [ 14.860572] The buggy address is located 0 bytes to the right of [ 14.860572] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.861420] [ 14.861495] The buggy address belongs to the physical page: [ 14.861669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.862296] flags: 0x200000000000000(node=0|zone=2) [ 14.862763] page_type: f5(slab) [ 14.863080] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.863749] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.864413] page dumped because: kasan: bad access detected [ 14.864939] [ 14.865096] Memory state around the buggy address: [ 14.865428] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.865648] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.866152] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.866793] ^ [ 14.867230] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.867873] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.868560] ================================================================== [ 15.192035] ================================================================== [ 15.192376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 15.193123] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 15.193514] [ 15.193634] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.193804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.193820] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.193843] Call Trace: [ 15.193865] <TASK> [ 15.193885] dump_stack_lvl+0x73/0xb0 [ 15.193915] print_report+0xd1/0x650 [ 15.193940] ? __virt_addr_valid+0x1db/0x2d0 [ 15.193965] ? kasan_atomics_helper+0x218a/0x5450 [ 15.193987] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.194010] ? kasan_atomics_helper+0x218a/0x5450 [ 15.194032] kasan_report+0x141/0x180 [ 15.194055] ? kasan_atomics_helper+0x218a/0x5450 [ 15.194083] kasan_check_range+0x10c/0x1c0 [ 15.194107] __kasan_check_write+0x18/0x20 [ 15.194128] kasan_atomics_helper+0x218a/0x5450 [ 15.194152] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.194175] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.194201] ? kasan_atomics+0x152/0x310 [ 15.194229] kasan_atomics+0x1dc/0x310 [ 15.194252] ? __pfx_kasan_atomics+0x10/0x10 [ 15.194277] ? __pfx_read_tsc+0x10/0x10 [ 15.194299] ? ktime_get_ts64+0x86/0x230 [ 15.194324] kunit_try_run_case+0x1a5/0x480 [ 15.194362] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.194385] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.194410] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.194434] ? __kthread_parkme+0x82/0x180 [ 15.194456] ? preempt_count_sub+0x50/0x80 [ 15.194481] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.194506] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.194529] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.194553] kthread+0x337/0x6f0 [ 15.194574] ? trace_preempt_on+0x20/0xc0 [ 15.194598] ? __pfx_kthread+0x10/0x10 [ 15.194620] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.194642] ? calculate_sigpending+0x7b/0xa0 [ 15.194666] ? __pfx_kthread+0x10/0x10 [ 15.194688] ret_from_fork+0x116/0x1d0 [ 15.194707] ? __pfx_kthread+0x10/0x10 [ 15.194728] ret_from_fork_asm+0x1a/0x30 [ 15.194761] </TASK> [ 15.194774] [ 15.204566] Allocated by task 284: [ 15.204713] kasan_save_stack+0x45/0x70 [ 15.205226] kasan_save_track+0x18/0x40 [ 15.205405] kasan_save_alloc_info+0x3b/0x50 [ 15.205765] __kasan_kmalloc+0xb7/0xc0 [ 15.205959] __kmalloc_cache_noprof+0x189/0x420 [ 15.206282] kasan_atomics+0x95/0x310 [ 15.206560] kunit_try_run_case+0x1a5/0x480 [ 15.206905] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.207145] kthread+0x337/0x6f0 [ 15.207306] ret_from_fork+0x116/0x1d0 [ 15.207506] ret_from_fork_asm+0x1a/0x30 [ 15.207702] [ 15.208054] The buggy address belongs to the object at ffff888103128480 [ 15.208054] which belongs to the cache kmalloc-64 of size 64 [ 15.208584] The buggy address is located 0 bytes to the right of [ 15.208584] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 15.209389] [ 15.209500] The buggy address belongs to the physical page: [ 15.209849] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 15.210227] flags: 0x200000000000000(node=0|zone=2) [ 15.210534] page_type: f5(slab) [ 15.210706] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.211152] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.211540] page dumped because: kasan: bad access detected [ 15.211921] [ 15.212091] Memory state around the buggy address: [ 15.212289] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.212602] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.213146] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.213529] ^ [ 15.213716] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.214142] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.214527] ================================================================== [ 13.907609] ================================================================== [ 13.907993] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 13.908337] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 13.908646] [ 13.908996] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.909065] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.909076] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.909096] Call Trace: [ 13.909108] <TASK> [ 13.909123] dump_stack_lvl+0x73/0xb0 [ 13.909164] print_report+0xd1/0x650 [ 13.909187] ? __virt_addr_valid+0x1db/0x2d0 [ 13.909208] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.909229] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.909249] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.909269] kasan_report+0x141/0x180 [ 13.909291] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.909323] __asan_report_store4_noabort+0x1b/0x30 [ 13.909343] kasan_atomics_helper+0x4ba2/0x5450 [ 13.909379] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.909402] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.909426] ? kasan_atomics+0x152/0x310 [ 13.909452] kasan_atomics+0x1dc/0x310 [ 13.909474] ? __pfx_kasan_atomics+0x10/0x10 [ 13.909497] ? __pfx_read_tsc+0x10/0x10 [ 13.909518] ? ktime_get_ts64+0x86/0x230 [ 13.909541] kunit_try_run_case+0x1a5/0x480 [ 13.909564] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.909640] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.909668] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.909690] ? __kthread_parkme+0x82/0x180 [ 13.909722] ? preempt_count_sub+0x50/0x80 [ 13.909745] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.909768] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.909791] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.909814] kthread+0x337/0x6f0 [ 13.909832] ? trace_preempt_on+0x20/0xc0 [ 13.909856] ? __pfx_kthread+0x10/0x10 [ 13.909876] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.909896] ? calculate_sigpending+0x7b/0xa0 [ 13.909919] ? __pfx_kthread+0x10/0x10 [ 13.909939] ret_from_fork+0x116/0x1d0 [ 13.909957] ? __pfx_kthread+0x10/0x10 [ 13.909976] ret_from_fork_asm+0x1a/0x30 [ 13.910006] </TASK> [ 13.910017] [ 13.918899] Allocated by task 284: [ 13.919039] kasan_save_stack+0x45/0x70 [ 13.919239] kasan_save_track+0x18/0x40 [ 13.919634] kasan_save_alloc_info+0x3b/0x50 [ 13.919871] __kasan_kmalloc+0xb7/0xc0 [ 13.920005] __kmalloc_cache_noprof+0x189/0x420 [ 13.920158] kasan_atomics+0x95/0x310 [ 13.920343] kunit_try_run_case+0x1a5/0x480 [ 13.920566] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.920873] kthread+0x337/0x6f0 [ 13.921200] ret_from_fork+0x116/0x1d0 [ 13.921507] ret_from_fork_asm+0x1a/0x30 [ 13.921855] [ 13.921933] The buggy address belongs to the object at ffff888103128480 [ 13.921933] which belongs to the cache kmalloc-64 of size 64 [ 13.922360] The buggy address is located 0 bytes to the right of [ 13.922360] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 13.922873] [ 13.922984] The buggy address belongs to the physical page: [ 13.923534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 13.923961] flags: 0x200000000000000(node=0|zone=2) [ 13.924181] page_type: f5(slab) [ 13.924303] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.924550] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.924993] page dumped because: kasan: bad access detected [ 13.925280] [ 13.925394] Memory state around the buggy address: [ 13.925719] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.926019] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.926339] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.926759] ^ [ 13.926969] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.927283] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.927566] ================================================================== [ 15.146017] ================================================================== [ 15.146980] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 15.147336] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 15.147836] [ 15.147954] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.147998] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.148011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.148034] Call Trace: [ 15.148054] <TASK> [ 15.148073] dump_stack_lvl+0x73/0xb0 [ 15.148101] print_report+0xd1/0x650 [ 15.148127] ? __virt_addr_valid+0x1db/0x2d0 [ 15.148150] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.148172] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.148194] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.148216] kasan_report+0x141/0x180 [ 15.148239] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.148266] kasan_check_range+0x10c/0x1c0 [ 15.148290] __kasan_check_write+0x18/0x20 [ 15.148310] kasan_atomics_helper+0x20c8/0x5450 [ 15.148333] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.148367] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.148393] ? kasan_atomics+0x152/0x310 [ 15.148420] kasan_atomics+0x1dc/0x310 [ 15.148444] ? __pfx_kasan_atomics+0x10/0x10 [ 15.148470] ? __pfx_read_tsc+0x10/0x10 [ 15.148492] ? ktime_get_ts64+0x86/0x230 [ 15.148517] kunit_try_run_case+0x1a5/0x480 [ 15.148541] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.148564] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.148590] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.148614] ? __kthread_parkme+0x82/0x180 [ 15.148636] ? preempt_count_sub+0x50/0x80 [ 15.148661] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.148686] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.148710] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.148734] kthread+0x337/0x6f0 [ 15.148753] ? trace_preempt_on+0x20/0xc0 [ 15.148779] ? __pfx_kthread+0x10/0x10 [ 15.148800] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.148822] ? calculate_sigpending+0x7b/0xa0 [ 15.148847] ? __pfx_kthread+0x10/0x10 [ 15.148880] ret_from_fork+0x116/0x1d0 [ 15.148899] ? __pfx_kthread+0x10/0x10 [ 15.148921] ret_from_fork_asm+0x1a/0x30 [ 15.148952] </TASK> [ 15.148964] [ 15.158467] Allocated by task 284: [ 15.158755] kasan_save_stack+0x45/0x70 [ 15.158941] kasan_save_track+0x18/0x40 [ 15.159126] kasan_save_alloc_info+0x3b/0x50 [ 15.159324] __kasan_kmalloc+0xb7/0xc0 [ 15.159510] __kmalloc_cache_noprof+0x189/0x420 [ 15.159719] kasan_atomics+0x95/0x310 [ 15.160267] kunit_try_run_case+0x1a5/0x480 [ 15.160444] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.160832] kthread+0x337/0x6f0 [ 15.161081] ret_from_fork+0x116/0x1d0 [ 15.161305] ret_from_fork_asm+0x1a/0x30 [ 15.161523] [ 15.161747] The buggy address belongs to the object at ffff888103128480 [ 15.161747] which belongs to the cache kmalloc-64 of size 64 [ 15.162323] The buggy address is located 0 bytes to the right of [ 15.162323] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 15.162855] [ 15.163028] The buggy address belongs to the physical page: [ 15.163328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 15.163708] flags: 0x200000000000000(node=0|zone=2) [ 15.164156] page_type: f5(slab) [ 15.164304] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.164713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.165025] page dumped because: kasan: bad access detected [ 15.165364] [ 15.165465] Memory state around the buggy address: [ 15.165834] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.166274] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.166561] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.166978] ^ [ 15.167181] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.167604] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.167991] ================================================================== [ 14.618402] ================================================================== [ 14.618678] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 14.619297] Read of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.619677] [ 14.619822] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.619893] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.619906] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.619928] Call Trace: [ 14.619947] <TASK> [ 14.619965] dump_stack_lvl+0x73/0xb0 [ 14.619994] print_report+0xd1/0x650 [ 14.620017] ? __virt_addr_valid+0x1db/0x2d0 [ 14.620041] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.620062] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.620117] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.620140] kasan_report+0x141/0x180 [ 14.620163] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.620189] kasan_check_range+0x10c/0x1c0 [ 14.620213] __kasan_check_read+0x15/0x20 [ 14.620233] kasan_atomics_helper+0x13b5/0x5450 [ 14.620256] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.620279] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.620306] ? kasan_atomics+0x152/0x310 [ 14.620369] kasan_atomics+0x1dc/0x310 [ 14.620392] ? __pfx_kasan_atomics+0x10/0x10 [ 14.620418] ? __pfx_read_tsc+0x10/0x10 [ 14.620439] ? ktime_get_ts64+0x86/0x230 [ 14.620465] kunit_try_run_case+0x1a5/0x480 [ 14.620488] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.620512] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.620536] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.620559] ? __kthread_parkme+0x82/0x180 [ 14.620581] ? preempt_count_sub+0x50/0x80 [ 14.620605] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.620629] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.620653] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.620676] kthread+0x337/0x6f0 [ 14.620696] ? trace_preempt_on+0x20/0xc0 [ 14.620720] ? __pfx_kthread+0x10/0x10 [ 14.620752] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.620775] ? calculate_sigpending+0x7b/0xa0 [ 14.620799] ? __pfx_kthread+0x10/0x10 [ 14.620821] ret_from_fork+0x116/0x1d0 [ 14.620840] ? __pfx_kthread+0x10/0x10 [ 14.620862] ret_from_fork_asm+0x1a/0x30 [ 14.620893] </TASK> [ 14.620905] [ 14.631275] Allocated by task 284: [ 14.631463] kasan_save_stack+0x45/0x70 [ 14.631652] kasan_save_track+0x18/0x40 [ 14.632254] kasan_save_alloc_info+0x3b/0x50 [ 14.632483] __kasan_kmalloc+0xb7/0xc0 [ 14.632941] __kmalloc_cache_noprof+0x189/0x420 [ 14.633151] kasan_atomics+0x95/0x310 [ 14.633323] kunit_try_run_case+0x1a5/0x480 [ 14.633477] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.633810] kthread+0x337/0x6f0 [ 14.634090] ret_from_fork+0x116/0x1d0 [ 14.634242] ret_from_fork_asm+0x1a/0x30 [ 14.634488] [ 14.634616] The buggy address belongs to the object at ffff888103128480 [ 14.634616] which belongs to the cache kmalloc-64 of size 64 [ 14.635227] The buggy address is located 0 bytes to the right of [ 14.635227] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.635858] [ 14.635948] The buggy address belongs to the physical page: [ 14.636236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.636526] flags: 0x200000000000000(node=0|zone=2) [ 14.636774] page_type: f5(slab) [ 14.637008] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.637359] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.637692] page dumped because: kasan: bad access detected [ 14.638034] [ 14.638169] Memory state around the buggy address: [ 14.638335] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.638676] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.639115] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.639445] ^ [ 14.639690] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.639992] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.640339] ================================================================== [ 14.139174] ================================================================== [ 14.139693] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 14.140152] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.140483] [ 14.140673] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.140733] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.140746] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.140768] Call Trace: [ 14.140785] <TASK> [ 14.140825] dump_stack_lvl+0x73/0xb0 [ 14.140855] print_report+0xd1/0x650 [ 14.140879] ? __virt_addr_valid+0x1db/0x2d0 [ 14.140914] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.140936] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.140959] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.140982] kasan_report+0x141/0x180 [ 14.141004] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.141031] kasan_check_range+0x10c/0x1c0 [ 14.141087] __kasan_check_write+0x18/0x20 [ 14.141107] kasan_atomics_helper+0x7c7/0x5450 [ 14.141143] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.141167] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.141194] ? kasan_atomics+0x152/0x310 [ 14.141221] kasan_atomics+0x1dc/0x310 [ 14.141245] ? __pfx_kasan_atomics+0x10/0x10 [ 14.141270] ? __pfx_read_tsc+0x10/0x10 [ 14.141291] ? ktime_get_ts64+0x86/0x230 [ 14.141316] kunit_try_run_case+0x1a5/0x480 [ 14.141341] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.141374] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.141399] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.141422] ? __kthread_parkme+0x82/0x180 [ 14.141444] ? preempt_count_sub+0x50/0x80 [ 14.141468] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.141491] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.141515] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.141538] kthread+0x337/0x6f0 [ 14.141629] ? trace_preempt_on+0x20/0xc0 [ 14.141668] ? __pfx_kthread+0x10/0x10 [ 14.141689] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.141711] ? calculate_sigpending+0x7b/0xa0 [ 14.141735] ? __pfx_kthread+0x10/0x10 [ 14.141767] ret_from_fork+0x116/0x1d0 [ 14.141786] ? __pfx_kthread+0x10/0x10 [ 14.141807] ret_from_fork_asm+0x1a/0x30 [ 14.141839] </TASK> [ 14.141851] [ 14.151763] Allocated by task 284: [ 14.152167] kasan_save_stack+0x45/0x70 [ 14.152318] kasan_save_track+0x18/0x40 [ 14.152462] kasan_save_alloc_info+0x3b/0x50 [ 14.152714] __kasan_kmalloc+0xb7/0xc0 [ 14.153189] __kmalloc_cache_noprof+0x189/0x420 [ 14.153638] kasan_atomics+0x95/0x310 [ 14.154142] kunit_try_run_case+0x1a5/0x480 [ 14.154608] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.155126] kthread+0x337/0x6f0 [ 14.155306] ret_from_fork+0x116/0x1d0 [ 14.155574] ret_from_fork_asm+0x1a/0x30 [ 14.156183] [ 14.156346] The buggy address belongs to the object at ffff888103128480 [ 14.156346] which belongs to the cache kmalloc-64 of size 64 [ 14.157252] The buggy address is located 0 bytes to the right of [ 14.157252] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.158133] [ 14.158330] The buggy address belongs to the physical page: [ 14.158924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.159257] flags: 0x200000000000000(node=0|zone=2) [ 14.159437] page_type: f5(slab) [ 14.159561] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.160277] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.161172] page dumped because: kasan: bad access detected [ 14.161745] [ 14.161983] Memory state around the buggy address: [ 14.162424] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.163163] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.163526] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.164285] ^ [ 14.164677] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.165030] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.165258] ================================================================== [ 15.168642] ================================================================== [ 15.168948] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 15.169292] Read of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 15.170241] [ 15.170441] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.170491] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.170504] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.170527] Call Trace: [ 15.170545] <TASK> [ 15.170629] dump_stack_lvl+0x73/0xb0 [ 15.170663] print_report+0xd1/0x650 [ 15.170689] ? __virt_addr_valid+0x1db/0x2d0 [ 15.170714] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.170748] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.170771] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.170793] kasan_report+0x141/0x180 [ 15.170816] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.170842] __asan_report_load8_noabort+0x18/0x20 [ 15.170867] kasan_atomics_helper+0x4fb2/0x5450 [ 15.170890] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.170913] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.170939] ? kasan_atomics+0x152/0x310 [ 15.170966] kasan_atomics+0x1dc/0x310 [ 15.170988] ? __pfx_kasan_atomics+0x10/0x10 [ 15.171013] ? __pfx_read_tsc+0x10/0x10 [ 15.171035] ? ktime_get_ts64+0x86/0x230 [ 15.171059] kunit_try_run_case+0x1a5/0x480 [ 15.171084] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.171108] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.171132] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.171156] ? __kthread_parkme+0x82/0x180 [ 15.171178] ? preempt_count_sub+0x50/0x80 [ 15.171202] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.171226] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.171249] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.171273] kthread+0x337/0x6f0 [ 15.171293] ? trace_preempt_on+0x20/0xc0 [ 15.171317] ? __pfx_kthread+0x10/0x10 [ 15.171339] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.171373] ? calculate_sigpending+0x7b/0xa0 [ 15.171398] ? __pfx_kthread+0x10/0x10 [ 15.171421] ret_from_fork+0x116/0x1d0 [ 15.171440] ? __pfx_kthread+0x10/0x10 [ 15.171462] ret_from_fork_asm+0x1a/0x30 [ 15.171495] </TASK> [ 15.171507] [ 15.181186] Allocated by task 284: [ 15.181505] kasan_save_stack+0x45/0x70 [ 15.181713] kasan_save_track+0x18/0x40 [ 15.182051] kasan_save_alloc_info+0x3b/0x50 [ 15.182322] __kasan_kmalloc+0xb7/0xc0 [ 15.182488] __kmalloc_cache_noprof+0x189/0x420 [ 15.182930] kasan_atomics+0x95/0x310 [ 15.183116] kunit_try_run_case+0x1a5/0x480 [ 15.183428] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.183676] kthread+0x337/0x6f0 [ 15.184043] ret_from_fork+0x116/0x1d0 [ 15.184217] ret_from_fork_asm+0x1a/0x30 [ 15.184521] [ 15.184623] The buggy address belongs to the object at ffff888103128480 [ 15.184623] which belongs to the cache kmalloc-64 of size 64 [ 15.185249] The buggy address is located 0 bytes to the right of [ 15.185249] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 15.185760] [ 15.186128] The buggy address belongs to the physical page: [ 15.186399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 15.186823] flags: 0x200000000000000(node=0|zone=2) [ 15.187050] page_type: f5(slab) [ 15.187334] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.187749] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.188170] page dumped because: kasan: bad access detected [ 15.188489] [ 15.188567] Memory state around the buggy address: [ 15.188851] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.189271] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.189652] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.190000] ^ [ 15.190328] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.190641] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.191055] ================================================================== [ 14.931849] ================================================================== [ 14.932269] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 14.932714] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.933006] [ 14.933093] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.933134] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.933147] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.933168] Call Trace: [ 14.933184] <TASK> [ 14.933219] dump_stack_lvl+0x73/0xb0 [ 14.933246] print_report+0xd1/0x650 [ 14.933270] ? __virt_addr_valid+0x1db/0x2d0 [ 14.933294] ? kasan_atomics_helper+0x1b22/0x5450 [ 14.933316] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.933338] ? kasan_atomics_helper+0x1b22/0x5450 [ 14.933372] kasan_report+0x141/0x180 [ 14.933405] ? kasan_atomics_helper+0x1b22/0x5450 [ 14.933430] kasan_check_range+0x10c/0x1c0 [ 14.933466] __kasan_check_write+0x18/0x20 [ 14.933486] kasan_atomics_helper+0x1b22/0x5450 [ 14.933509] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.933531] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.933557] ? kasan_atomics+0x152/0x310 [ 14.933593] kasan_atomics+0x1dc/0x310 [ 14.933617] ? __pfx_kasan_atomics+0x10/0x10 [ 14.933651] ? __pfx_read_tsc+0x10/0x10 [ 14.933672] ? ktime_get_ts64+0x86/0x230 [ 14.933696] kunit_try_run_case+0x1a5/0x480 [ 14.933730] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.933754] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.933778] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.933811] ? __kthread_parkme+0x82/0x180 [ 14.933832] ? preempt_count_sub+0x50/0x80 [ 14.933856] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.933880] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.933903] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.933935] kthread+0x337/0x6f0 [ 14.933954] ? trace_preempt_on+0x20/0xc0 [ 14.933979] ? __pfx_kthread+0x10/0x10 [ 14.934011] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.934033] ? calculate_sigpending+0x7b/0xa0 [ 14.934058] ? __pfx_kthread+0x10/0x10 [ 14.934088] ret_from_fork+0x116/0x1d0 [ 14.934107] ? __pfx_kthread+0x10/0x10 [ 14.934128] ret_from_fork_asm+0x1a/0x30 [ 14.934169] </TASK> [ 14.934183] [ 14.941975] Allocated by task 284: [ 14.942166] kasan_save_stack+0x45/0x70 [ 14.942381] kasan_save_track+0x18/0x40 [ 14.942563] kasan_save_alloc_info+0x3b/0x50 [ 14.942784] __kasan_kmalloc+0xb7/0xc0 [ 14.942973] __kmalloc_cache_noprof+0x189/0x420 [ 14.943192] kasan_atomics+0x95/0x310 [ 14.943368] kunit_try_run_case+0x1a5/0x480 [ 14.943559] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.943741] kthread+0x337/0x6f0 [ 14.943865] ret_from_fork+0x116/0x1d0 [ 14.943999] ret_from_fork_asm+0x1a/0x30 [ 14.944139] [ 14.944211] The buggy address belongs to the object at ffff888103128480 [ 14.944211] which belongs to the cache kmalloc-64 of size 64 [ 14.944652] The buggy address is located 0 bytes to the right of [ 14.944652] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.945274] [ 14.945381] The buggy address belongs to the physical page: [ 14.945634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.946004] flags: 0x200000000000000(node=0|zone=2) [ 14.946240] page_type: f5(slab) [ 14.946420] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.946681] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.947225] page dumped because: kasan: bad access detected [ 14.947502] [ 14.947575] Memory state around the buggy address: [ 14.947739] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.948074] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.948430] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.948755] ^ [ 14.948930] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.949147] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.949421] ================================================================== [ 15.009671] ================================================================== [ 15.010577] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 15.010820] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 15.011209] [ 15.011327] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.011381] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.011394] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.011426] Call Trace: [ 15.011444] <TASK> [ 15.011462] dump_stack_lvl+0x73/0xb0 [ 15.011503] print_report+0xd1/0x650 [ 15.011526] ? __virt_addr_valid+0x1db/0x2d0 [ 15.011550] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.011572] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.011595] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.011618] kasan_report+0x141/0x180 [ 15.011641] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.011674] kasan_check_range+0x10c/0x1c0 [ 15.011698] __kasan_check_write+0x18/0x20 [ 15.011718] kasan_atomics_helper+0x1d7a/0x5450 [ 15.011752] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.011774] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.011801] ? kasan_atomics+0x152/0x310 [ 15.011828] kasan_atomics+0x1dc/0x310 [ 15.011851] ? __pfx_kasan_atomics+0x10/0x10 [ 15.011876] ? __pfx_read_tsc+0x10/0x10 [ 15.011897] ? ktime_get_ts64+0x86/0x230 [ 15.011923] kunit_try_run_case+0x1a5/0x480 [ 15.011958] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.011980] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.012005] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.012038] ? __kthread_parkme+0x82/0x180 [ 15.012059] ? preempt_count_sub+0x50/0x80 [ 15.012083] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.012108] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.012131] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.012154] kthread+0x337/0x6f0 [ 15.012175] ? trace_preempt_on+0x20/0xc0 [ 15.012199] ? __pfx_kthread+0x10/0x10 [ 15.012221] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.012242] ? calculate_sigpending+0x7b/0xa0 [ 15.012267] ? __pfx_kthread+0x10/0x10 [ 15.012290] ret_from_fork+0x116/0x1d0 [ 15.012309] ? __pfx_kthread+0x10/0x10 [ 15.012330] ret_from_fork_asm+0x1a/0x30 [ 15.012381] </TASK> [ 15.012393] [ 15.019973] Allocated by task 284: [ 15.020165] kasan_save_stack+0x45/0x70 [ 15.020335] kasan_save_track+0x18/0x40 [ 15.020558] kasan_save_alloc_info+0x3b/0x50 [ 15.020710] __kasan_kmalloc+0xb7/0xc0 [ 15.020843] __kmalloc_cache_noprof+0x189/0x420 [ 15.021014] kasan_atomics+0x95/0x310 [ 15.021184] kunit_try_run_case+0x1a5/0x480 [ 15.021356] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.021629] kthread+0x337/0x6f0 [ 15.021820] ret_from_fork+0x116/0x1d0 [ 15.022037] ret_from_fork_asm+0x1a/0x30 [ 15.022205] [ 15.022278] The buggy address belongs to the object at ffff888103128480 [ 15.022278] which belongs to the cache kmalloc-64 of size 64 [ 15.022665] The buggy address is located 0 bytes to the right of [ 15.022665] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 15.023208] [ 15.023319] The buggy address belongs to the physical page: [ 15.023621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 15.023921] flags: 0x200000000000000(node=0|zone=2) [ 15.024087] page_type: f5(slab) [ 15.024212] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.024545] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.025130] page dumped because: kasan: bad access detected [ 15.025402] [ 15.025490] Memory state around the buggy address: [ 15.025718] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.026029] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.026356] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.026657] ^ [ 15.026929] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.027242] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.027562] ================================================================== [ 14.735809] ================================================================== [ 14.736206] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 14.736855] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.737357] [ 14.737449] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.737494] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.737507] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.737530] Call Trace: [ 14.737547] <TASK> [ 14.737563] dump_stack_lvl+0x73/0xb0 [ 14.737590] print_report+0xd1/0x650 [ 14.737614] ? __virt_addr_valid+0x1db/0x2d0 [ 14.737638] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.737661] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.737684] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.737706] kasan_report+0x141/0x180 [ 14.737757] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.737785] kasan_check_range+0x10c/0x1c0 [ 14.737809] __kasan_check_write+0x18/0x20 [ 14.737829] kasan_atomics_helper+0x15b6/0x5450 [ 14.737863] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.737885] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.737911] ? kasan_atomics+0x152/0x310 [ 14.737949] kasan_atomics+0x1dc/0x310 [ 14.737973] ? __pfx_kasan_atomics+0x10/0x10 [ 14.737998] ? __pfx_read_tsc+0x10/0x10 [ 14.738019] ? ktime_get_ts64+0x86/0x230 [ 14.738042] kunit_try_run_case+0x1a5/0x480 [ 14.738068] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.738091] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.738115] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.738138] ? __kthread_parkme+0x82/0x180 [ 14.738160] ? preempt_count_sub+0x50/0x80 [ 14.738184] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.738208] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.738232] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.738255] kthread+0x337/0x6f0 [ 14.738276] ? trace_preempt_on+0x20/0xc0 [ 14.738302] ? __pfx_kthread+0x10/0x10 [ 14.738324] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.738361] ? calculate_sigpending+0x7b/0xa0 [ 14.738387] ? __pfx_kthread+0x10/0x10 [ 14.738410] ret_from_fork+0x116/0x1d0 [ 14.738428] ? __pfx_kthread+0x10/0x10 [ 14.738450] ret_from_fork_asm+0x1a/0x30 [ 14.738481] </TASK> [ 14.738493] [ 14.751717] Allocated by task 284: [ 14.752017] kasan_save_stack+0x45/0x70 [ 14.752166] kasan_save_track+0x18/0x40 [ 14.752305] kasan_save_alloc_info+0x3b/0x50 [ 14.752475] __kasan_kmalloc+0xb7/0xc0 [ 14.752611] __kmalloc_cache_noprof+0x189/0x420 [ 14.752921] kasan_atomics+0x95/0x310 [ 14.753117] kunit_try_run_case+0x1a5/0x480 [ 14.753314] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.753554] kthread+0x337/0x6f0 [ 14.753707] ret_from_fork+0x116/0x1d0 [ 14.754448] ret_from_fork_asm+0x1a/0x30 [ 14.754752] [ 14.755001] The buggy address belongs to the object at ffff888103128480 [ 14.755001] which belongs to the cache kmalloc-64 of size 64 [ 14.755486] The buggy address is located 0 bytes to the right of [ 14.755486] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.756304] [ 14.756459] The buggy address belongs to the physical page: [ 14.756676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.757505] flags: 0x200000000000000(node=0|zone=2) [ 14.757919] page_type: f5(slab) [ 14.758222] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.758714] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.759250] page dumped because: kasan: bad access detected [ 14.759502] [ 14.759595] Memory state around the buggy address: [ 14.760119] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.760444] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.760733] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.761422] ^ [ 14.761730] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.762202] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.762512] ================================================================== [ 13.970494] ================================================================== [ 13.970748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 13.971246] Read of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 13.971560] [ 13.971662] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.971709] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.971723] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.971744] Call Trace: [ 13.971761] <TASK> [ 13.971778] dump_stack_lvl+0x73/0xb0 [ 13.971804] print_report+0xd1/0x650 [ 13.971828] ? __virt_addr_valid+0x1db/0x2d0 [ 13.971851] ? kasan_atomics_helper+0x3df/0x5450 [ 13.971871] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.971895] ? kasan_atomics_helper+0x3df/0x5450 [ 13.971917] kasan_report+0x141/0x180 [ 13.971940] ? kasan_atomics_helper+0x3df/0x5450 [ 13.971965] kasan_check_range+0x10c/0x1c0 [ 13.971990] __kasan_check_read+0x15/0x20 [ 13.972009] kasan_atomics_helper+0x3df/0x5450 [ 13.972032] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.972054] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.972081] ? kasan_atomics+0x152/0x310 [ 13.972107] kasan_atomics+0x1dc/0x310 [ 13.972130] ? __pfx_kasan_atomics+0x10/0x10 [ 13.972155] ? __pfx_read_tsc+0x10/0x10 [ 13.972175] ? ktime_get_ts64+0x86/0x230 [ 13.972199] kunit_try_run_case+0x1a5/0x480 [ 13.972224] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.972247] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.972271] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.972294] ? __kthread_parkme+0x82/0x180 [ 13.972315] ? preempt_count_sub+0x50/0x80 [ 13.972339] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.972372] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.972397] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.972431] kthread+0x337/0x6f0 [ 13.972452] ? trace_preempt_on+0x20/0xc0 [ 13.972476] ? __pfx_kthread+0x10/0x10 [ 13.972508] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.972530] ? calculate_sigpending+0x7b/0xa0 [ 13.972554] ? __pfx_kthread+0x10/0x10 [ 13.972576] ret_from_fork+0x116/0x1d0 [ 13.972595] ? __pfx_kthread+0x10/0x10 [ 13.972616] ret_from_fork_asm+0x1a/0x30 [ 13.972647] </TASK> [ 13.972659] [ 13.981137] Allocated by task 284: [ 13.981330] kasan_save_stack+0x45/0x70 [ 13.981544] kasan_save_track+0x18/0x40 [ 13.981844] kasan_save_alloc_info+0x3b/0x50 [ 13.982084] __kasan_kmalloc+0xb7/0xc0 [ 13.982221] __kmalloc_cache_noprof+0x189/0x420 [ 13.982450] kasan_atomics+0x95/0x310 [ 13.982766] kunit_try_run_case+0x1a5/0x480 [ 13.982969] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.983225] kthread+0x337/0x6f0 [ 13.983422] ret_from_fork+0x116/0x1d0 [ 13.983639] ret_from_fork_asm+0x1a/0x30 [ 13.983940] [ 13.984030] The buggy address belongs to the object at ffff888103128480 [ 13.984030] which belongs to the cache kmalloc-64 of size 64 [ 13.984442] The buggy address is located 0 bytes to the right of [ 13.984442] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 13.985033] [ 13.985218] The buggy address belongs to the physical page: [ 13.985484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 13.986120] flags: 0x200000000000000(node=0|zone=2) [ 13.986411] page_type: f5(slab) [ 13.986544] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.986777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.987295] page dumped because: kasan: bad access detected [ 13.987569] [ 13.987736] Memory state around the buggy address: [ 13.988017] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.988426] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.988860] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.989128] ^ [ 13.989285] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.989696] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.990168] ================================================================== [ 14.165715] ================================================================== [ 14.166129] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 14.166598] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.166909] [ 14.167028] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.167073] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.167096] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.167119] Call Trace: [ 14.167136] <TASK> [ 14.167155] dump_stack_lvl+0x73/0xb0 [ 14.167196] print_report+0xd1/0x650 [ 14.167221] ? __virt_addr_valid+0x1db/0x2d0 [ 14.167245] ? kasan_atomics_helper+0x860/0x5450 [ 14.167267] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.167290] ? kasan_atomics_helper+0x860/0x5450 [ 14.167314] kasan_report+0x141/0x180 [ 14.167337] ? kasan_atomics_helper+0x860/0x5450 [ 14.167373] kasan_check_range+0x10c/0x1c0 [ 14.167408] __kasan_check_write+0x18/0x20 [ 14.167432] kasan_atomics_helper+0x860/0x5450 [ 14.167456] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.167492] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.167519] ? kasan_atomics+0x152/0x310 [ 14.167556] kasan_atomics+0x1dc/0x310 [ 14.167581] ? __pfx_kasan_atomics+0x10/0x10 [ 14.167655] ? __pfx_read_tsc+0x10/0x10 [ 14.167686] ? ktime_get_ts64+0x86/0x230 [ 14.167712] kunit_try_run_case+0x1a5/0x480 [ 14.167739] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.167762] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.167786] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.167810] ? __kthread_parkme+0x82/0x180 [ 14.167832] ? preempt_count_sub+0x50/0x80 [ 14.167868] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.167892] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.167916] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.167951] kthread+0x337/0x6f0 [ 14.167981] ? trace_preempt_on+0x20/0xc0 [ 14.168005] ? __pfx_kthread+0x10/0x10 [ 14.168027] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.168059] ? calculate_sigpending+0x7b/0xa0 [ 14.168084] ? __pfx_kthread+0x10/0x10 [ 14.168106] ret_from_fork+0x116/0x1d0 [ 14.168125] ? __pfx_kthread+0x10/0x10 [ 14.168146] ret_from_fork_asm+0x1a/0x30 [ 14.168177] </TASK> [ 14.168190] [ 14.176672] Allocated by task 284: [ 14.177023] kasan_save_stack+0x45/0x70 [ 14.177215] kasan_save_track+0x18/0x40 [ 14.177358] kasan_save_alloc_info+0x3b/0x50 [ 14.177584] __kasan_kmalloc+0xb7/0xc0 [ 14.177905] __kmalloc_cache_noprof+0x189/0x420 [ 14.178143] kasan_atomics+0x95/0x310 [ 14.178340] kunit_try_run_case+0x1a5/0x480 [ 14.178605] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.178895] kthread+0x337/0x6f0 [ 14.179018] ret_from_fork+0x116/0x1d0 [ 14.179148] ret_from_fork_asm+0x1a/0x30 [ 14.179283] [ 14.179388] The buggy address belongs to the object at ffff888103128480 [ 14.179388] which belongs to the cache kmalloc-64 of size 64 [ 14.179912] The buggy address is located 0 bytes to the right of [ 14.179912] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.180307] [ 14.180425] The buggy address belongs to the physical page: [ 14.180944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.181311] flags: 0x200000000000000(node=0|zone=2) [ 14.181610] page_type: f5(slab) [ 14.181745] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.182105] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.182421] page dumped because: kasan: bad access detected [ 14.182706] [ 14.182854] Memory state around the buggy address: [ 14.183072] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.183386] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.183603] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.183815] ^ [ 14.184114] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.184443] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.184988] ================================================================== [ 14.559806] ================================================================== [ 14.560112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 14.560392] Read of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.560715] [ 14.560808] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.560852] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.560865] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.560886] Call Trace: [ 14.560903] <TASK> [ 14.560920] dump_stack_lvl+0x73/0xb0 [ 14.560947] print_report+0xd1/0x650 [ 14.560970] ? __virt_addr_valid+0x1db/0x2d0 [ 14.560994] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.561016] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.561037] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.561059] kasan_report+0x141/0x180 [ 14.561082] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.561107] __asan_report_load4_noabort+0x18/0x20 [ 14.561131] kasan_atomics_helper+0x49e8/0x5450 [ 14.561153] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.561175] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.561201] ? kasan_atomics+0x152/0x310 [ 14.561227] kasan_atomics+0x1dc/0x310 [ 14.561251] ? __pfx_kasan_atomics+0x10/0x10 [ 14.561296] ? __pfx_read_tsc+0x10/0x10 [ 14.561318] ? ktime_get_ts64+0x86/0x230 [ 14.561343] kunit_try_run_case+0x1a5/0x480 [ 14.561379] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.561402] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.561426] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.561449] ? __kthread_parkme+0x82/0x180 [ 14.561472] ? preempt_count_sub+0x50/0x80 [ 14.561498] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.561522] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.561544] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.561567] kthread+0x337/0x6f0 [ 14.561588] ? trace_preempt_on+0x20/0xc0 [ 14.561612] ? __pfx_kthread+0x10/0x10 [ 14.561633] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.561654] ? calculate_sigpending+0x7b/0xa0 [ 14.561678] ? __pfx_kthread+0x10/0x10 [ 14.561700] ret_from_fork+0x116/0x1d0 [ 14.561718] ? __pfx_kthread+0x10/0x10 [ 14.561740] ret_from_fork_asm+0x1a/0x30 [ 14.561778] </TASK> [ 14.561789] [ 14.569366] Allocated by task 284: [ 14.569507] kasan_save_stack+0x45/0x70 [ 14.569651] kasan_save_track+0x18/0x40 [ 14.569785] kasan_save_alloc_info+0x3b/0x50 [ 14.569933] __kasan_kmalloc+0xb7/0xc0 [ 14.570067] __kmalloc_cache_noprof+0x189/0x420 [ 14.570292] kasan_atomics+0x95/0x310 [ 14.570495] kunit_try_run_case+0x1a5/0x480 [ 14.570712] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.571087] kthread+0x337/0x6f0 [ 14.571261] ret_from_fork+0x116/0x1d0 [ 14.571464] ret_from_fork_asm+0x1a/0x30 [ 14.571676] [ 14.571770] The buggy address belongs to the object at ffff888103128480 [ 14.571770] which belongs to the cache kmalloc-64 of size 64 [ 14.572358] The buggy address is located 0 bytes to the right of [ 14.572358] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.572723] [ 14.572822] The buggy address belongs to the physical page: [ 14.573080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.573678] flags: 0x200000000000000(node=0|zone=2) [ 14.573924] page_type: f5(slab) [ 14.574093] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.574331] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.574567] page dumped because: kasan: bad access detected [ 14.574739] [ 14.574809] Memory state around the buggy address: [ 14.574963] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.575280] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.575601] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.576093] ^ [ 14.576312] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.576596] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.576894] ================================================================== [ 14.031556] ================================================================== [ 14.032241] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 14.032691] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.033042] [ 14.033135] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.033180] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.033194] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.033217] Call Trace: [ 14.033235] <TASK> [ 14.033253] dump_stack_lvl+0x73/0xb0 [ 14.033281] print_report+0xd1/0x650 [ 14.033304] ? __virt_addr_valid+0x1db/0x2d0 [ 14.033329] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.033362] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.033386] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.033410] kasan_report+0x141/0x180 [ 14.033432] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.033458] __asan_report_store4_noabort+0x1b/0x30 [ 14.033480] kasan_atomics_helper+0x4b3a/0x5450 [ 14.033513] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.033536] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.033574] ? kasan_atomics+0x152/0x310 [ 14.033675] kasan_atomics+0x1dc/0x310 [ 14.033701] ? __pfx_kasan_atomics+0x10/0x10 [ 14.033725] ? __pfx_read_tsc+0x10/0x10 [ 14.033758] ? ktime_get_ts64+0x86/0x230 [ 14.033782] kunit_try_run_case+0x1a5/0x480 [ 14.033807] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.033829] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.033854] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.033877] ? __kthread_parkme+0x82/0x180 [ 14.033899] ? preempt_count_sub+0x50/0x80 [ 14.033924] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.033948] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.033970] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.033994] kthread+0x337/0x6f0 [ 14.034014] ? trace_preempt_on+0x20/0xc0 [ 14.034039] ? __pfx_kthread+0x10/0x10 [ 14.034060] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.034081] ? calculate_sigpending+0x7b/0xa0 [ 14.034104] ? __pfx_kthread+0x10/0x10 [ 14.034127] ret_from_fork+0x116/0x1d0 [ 14.034145] ? __pfx_kthread+0x10/0x10 [ 14.034167] ret_from_fork_asm+0x1a/0x30 [ 14.034198] </TASK> [ 14.034210] [ 14.042622] Allocated by task 284: [ 14.042921] kasan_save_stack+0x45/0x70 [ 14.043182] kasan_save_track+0x18/0x40 [ 14.043344] kasan_save_alloc_info+0x3b/0x50 [ 14.043743] __kasan_kmalloc+0xb7/0xc0 [ 14.043971] __kmalloc_cache_noprof+0x189/0x420 [ 14.044133] kasan_atomics+0x95/0x310 [ 14.044307] kunit_try_run_case+0x1a5/0x480 [ 14.044559] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.044984] kthread+0x337/0x6f0 [ 14.045160] ret_from_fork+0x116/0x1d0 [ 14.045333] ret_from_fork_asm+0x1a/0x30 [ 14.045514] [ 14.045628] The buggy address belongs to the object at ffff888103128480 [ 14.045628] which belongs to the cache kmalloc-64 of size 64 [ 14.046215] The buggy address is located 0 bytes to the right of [ 14.046215] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.046779] [ 14.046941] The buggy address belongs to the physical page: [ 14.047116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.047361] flags: 0x200000000000000(node=0|zone=2) [ 14.047529] page_type: f5(slab) [ 14.047837] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.048635] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.049002] page dumped because: kasan: bad access detected [ 14.049179] [ 14.049252] Memory state around the buggy address: [ 14.049421] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.049983] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.050327] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.050925] ^ [ 14.051168] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.051462] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.051749] ================================================================== [ 14.667194] ================================================================== [ 14.667519] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 14.668567] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.669042] [ 14.669288] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.669338] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.669364] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.669387] Call Trace: [ 14.669404] <TASK> [ 14.669457] dump_stack_lvl+0x73/0xb0 [ 14.669490] print_report+0xd1/0x650 [ 14.669514] ? __virt_addr_valid+0x1db/0x2d0 [ 14.669538] ? kasan_atomics_helper+0x1467/0x5450 [ 14.669560] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.669585] ? kasan_atomics_helper+0x1467/0x5450 [ 14.669607] kasan_report+0x141/0x180 [ 14.669631] ? kasan_atomics_helper+0x1467/0x5450 [ 14.669659] kasan_check_range+0x10c/0x1c0 [ 14.669683] __kasan_check_write+0x18/0x20 [ 14.669703] kasan_atomics_helper+0x1467/0x5450 [ 14.669727] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.669764] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.669791] ? kasan_atomics+0x152/0x310 [ 14.669818] kasan_atomics+0x1dc/0x310 [ 14.669841] ? __pfx_kasan_atomics+0x10/0x10 [ 14.669866] ? __pfx_read_tsc+0x10/0x10 [ 14.669888] ? ktime_get_ts64+0x86/0x230 [ 14.669913] kunit_try_run_case+0x1a5/0x480 [ 14.669938] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.669960] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.669984] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.670007] ? __kthread_parkme+0x82/0x180 [ 14.670030] ? preempt_count_sub+0x50/0x80 [ 14.670054] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.670079] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.670102] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.670126] kthread+0x337/0x6f0 [ 14.670147] ? trace_preempt_on+0x20/0xc0 [ 14.670171] ? __pfx_kthread+0x10/0x10 [ 14.670192] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.670213] ? calculate_sigpending+0x7b/0xa0 [ 14.670238] ? __pfx_kthread+0x10/0x10 [ 14.670260] ret_from_fork+0x116/0x1d0 [ 14.670279] ? __pfx_kthread+0x10/0x10 [ 14.670301] ret_from_fork_asm+0x1a/0x30 [ 14.670332] </TASK> [ 14.670344] [ 14.678730] Allocated by task 284: [ 14.678889] kasan_save_stack+0x45/0x70 [ 14.679039] kasan_save_track+0x18/0x40 [ 14.679201] kasan_save_alloc_info+0x3b/0x50 [ 14.679409] __kasan_kmalloc+0xb7/0xc0 [ 14.679584] __kmalloc_cache_noprof+0x189/0x420 [ 14.680316] kasan_atomics+0x95/0x310 [ 14.680677] kunit_try_run_case+0x1a5/0x480 [ 14.681096] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.681361] kthread+0x337/0x6f0 [ 14.681524] ret_from_fork+0x116/0x1d0 [ 14.681697] ret_from_fork_asm+0x1a/0x30 [ 14.682305] [ 14.682488] The buggy address belongs to the object at ffff888103128480 [ 14.682488] which belongs to the cache kmalloc-64 of size 64 [ 14.683555] The buggy address is located 0 bytes to the right of [ 14.683555] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.684319] [ 14.684438] The buggy address belongs to the physical page: [ 14.684680] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.685396] flags: 0x200000000000000(node=0|zone=2) [ 14.685587] page_type: f5(slab) [ 14.685714] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.686001] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.686293] page dumped because: kasan: bad access detected [ 14.686479] [ 14.686554] Memory state around the buggy address: [ 14.686711] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.687322] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.687958] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.688554] ^ [ 14.688982] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.689602] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.689932] ================================================================== [ 14.185381] ================================================================== [ 14.186065] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 14.186433] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.187003] [ 14.187132] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.187190] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.187203] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.187226] Call Trace: [ 14.187255] <TASK> [ 14.187273] dump_stack_lvl+0x73/0xb0 [ 14.187302] print_report+0xd1/0x650 [ 14.187326] ? __virt_addr_valid+0x1db/0x2d0 [ 14.187360] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.187382] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.187406] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.187428] kasan_report+0x141/0x180 [ 14.187451] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.187478] kasan_check_range+0x10c/0x1c0 [ 14.187503] __kasan_check_write+0x18/0x20 [ 14.187523] kasan_atomics_helper+0x8f9/0x5450 [ 14.187547] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.187569] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.187606] ? kasan_atomics+0x152/0x310 [ 14.187634] kasan_atomics+0x1dc/0x310 [ 14.187674] ? __pfx_kasan_atomics+0x10/0x10 [ 14.187699] ? __pfx_read_tsc+0x10/0x10 [ 14.187722] ? ktime_get_ts64+0x86/0x230 [ 14.187747] kunit_try_run_case+0x1a5/0x480 [ 14.187771] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.187794] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.187818] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.187842] ? __kthread_parkme+0x82/0x180 [ 14.187865] ? preempt_count_sub+0x50/0x80 [ 14.187909] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.187934] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.187958] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.187982] kthread+0x337/0x6f0 [ 14.188002] ? trace_preempt_on+0x20/0xc0 [ 14.188027] ? __pfx_kthread+0x10/0x10 [ 14.188049] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.188145] ? calculate_sigpending+0x7b/0xa0 [ 14.188179] ? __pfx_kthread+0x10/0x10 [ 14.188201] ret_from_fork+0x116/0x1d0 [ 14.188221] ? __pfx_kthread+0x10/0x10 [ 14.188253] ret_from_fork_asm+0x1a/0x30 [ 14.188283] </TASK> [ 14.188295] [ 14.196497] Allocated by task 284: [ 14.196669] kasan_save_stack+0x45/0x70 [ 14.197035] kasan_save_track+0x18/0x40 [ 14.197299] kasan_save_alloc_info+0x3b/0x50 [ 14.197525] __kasan_kmalloc+0xb7/0xc0 [ 14.197851] __kmalloc_cache_noprof+0x189/0x420 [ 14.198056] kasan_atomics+0x95/0x310 [ 14.198252] kunit_try_run_case+0x1a5/0x480 [ 14.198411] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.198694] kthread+0x337/0x6f0 [ 14.198926] ret_from_fork+0x116/0x1d0 [ 14.199073] ret_from_fork_asm+0x1a/0x30 [ 14.199273] [ 14.199371] The buggy address belongs to the object at ffff888103128480 [ 14.199371] which belongs to the cache kmalloc-64 of size 64 [ 14.199970] The buggy address is located 0 bytes to the right of [ 14.199970] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.200342] [ 14.200427] The buggy address belongs to the physical page: [ 14.200672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.201148] flags: 0x200000000000000(node=0|zone=2) [ 14.201421] page_type: f5(slab) [ 14.201668] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.202155] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.202398] page dumped because: kasan: bad access detected [ 14.202571] [ 14.202701] Memory state around the buggy address: [ 14.202975] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.203704] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.204071] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.204397] ^ [ 14.204628] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.205001] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.205242] ================================================================== [ 14.471308] ================================================================== [ 14.472340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 14.472680] Read of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.473031] [ 14.473154] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.473198] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.473212] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.473234] Call Trace: [ 14.473253] <TASK> [ 14.473272] dump_stack_lvl+0x73/0xb0 [ 14.473302] print_report+0xd1/0x650 [ 14.473327] ? __virt_addr_valid+0x1db/0x2d0 [ 14.473361] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.473385] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.473408] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.473429] kasan_report+0x141/0x180 [ 14.473452] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.473478] __asan_report_load4_noabort+0x18/0x20 [ 14.473505] kasan_atomics_helper+0x4a1c/0x5450 [ 14.473528] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.473551] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.473577] ? kasan_atomics+0x152/0x310 [ 14.473603] kasan_atomics+0x1dc/0x310 [ 14.473628] ? __pfx_kasan_atomics+0x10/0x10 [ 14.473653] ? __pfx_read_tsc+0x10/0x10 [ 14.473675] ? ktime_get_ts64+0x86/0x230 [ 14.473699] kunit_try_run_case+0x1a5/0x480 [ 14.473725] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.473747] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.473772] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.473796] ? __kthread_parkme+0x82/0x180 [ 14.473818] ? preempt_count_sub+0x50/0x80 [ 14.473843] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.473867] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.473890] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.473914] kthread+0x337/0x6f0 [ 14.473934] ? trace_preempt_on+0x20/0xc0 [ 14.473959] ? __pfx_kthread+0x10/0x10 [ 14.473982] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.474004] ? calculate_sigpending+0x7b/0xa0 [ 14.474029] ? __pfx_kthread+0x10/0x10 [ 14.474051] ret_from_fork+0x116/0x1d0 [ 14.474070] ? __pfx_kthread+0x10/0x10 [ 14.474091] ret_from_fork_asm+0x1a/0x30 [ 14.474122] </TASK> [ 14.474135] [ 14.482730] Allocated by task 284: [ 14.482868] kasan_save_stack+0x45/0x70 [ 14.483034] kasan_save_track+0x18/0x40 [ 14.483276] kasan_save_alloc_info+0x3b/0x50 [ 14.483714] __kasan_kmalloc+0xb7/0xc0 [ 14.483929] __kmalloc_cache_noprof+0x189/0x420 [ 14.484144] kasan_atomics+0x95/0x310 [ 14.484308] kunit_try_run_case+0x1a5/0x480 [ 14.484491] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.484762] kthread+0x337/0x6f0 [ 14.484974] ret_from_fork+0x116/0x1d0 [ 14.485106] ret_from_fork_asm+0x1a/0x30 [ 14.485302] [ 14.485445] The buggy address belongs to the object at ffff888103128480 [ 14.485445] which belongs to the cache kmalloc-64 of size 64 [ 14.485975] The buggy address is located 0 bytes to the right of [ 14.485975] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.486666] [ 14.486800] The buggy address belongs to the physical page: [ 14.487076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.487476] flags: 0x200000000000000(node=0|zone=2) [ 14.487735] page_type: f5(slab) [ 14.487913] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.488280] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.488642] page dumped because: kasan: bad access detected [ 14.488912] [ 14.488994] Memory state around the buggy address: [ 14.489232] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.489608] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.489980] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.490290] ^ [ 14.490522] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.490741] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.490947] ================================================================== [ 14.806396] ================================================================== [ 14.807436] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 14.807809] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.808142] [ 14.808261] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.808304] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.808317] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.808339] Call Trace: [ 14.808376] <TASK> [ 14.808392] dump_stack_lvl+0x73/0xb0 [ 14.808420] print_report+0xd1/0x650 [ 14.808457] ? __virt_addr_valid+0x1db/0x2d0 [ 14.808480] ? kasan_atomics_helper+0x177f/0x5450 [ 14.808502] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.808525] ? kasan_atomics_helper+0x177f/0x5450 [ 14.808556] kasan_report+0x141/0x180 [ 14.808579] ? kasan_atomics_helper+0x177f/0x5450 [ 14.808616] kasan_check_range+0x10c/0x1c0 [ 14.808641] __kasan_check_write+0x18/0x20 [ 14.808660] kasan_atomics_helper+0x177f/0x5450 [ 14.808692] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.808715] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.808740] ? kasan_atomics+0x152/0x310 [ 14.808778] kasan_atomics+0x1dc/0x310 [ 14.808801] ? __pfx_kasan_atomics+0x10/0x10 [ 14.808825] ? __pfx_read_tsc+0x10/0x10 [ 14.808846] ? ktime_get_ts64+0x86/0x230 [ 14.808871] kunit_try_run_case+0x1a5/0x480 [ 14.808894] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.808927] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.808952] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.808987] ? __kthread_parkme+0x82/0x180 [ 14.809008] ? preempt_count_sub+0x50/0x80 [ 14.809033] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.809057] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.809089] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.809114] kthread+0x337/0x6f0 [ 14.809134] ? trace_preempt_on+0x20/0xc0 [ 14.809168] ? __pfx_kthread+0x10/0x10 [ 14.809190] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.809211] ? calculate_sigpending+0x7b/0xa0 [ 14.809235] ? __pfx_kthread+0x10/0x10 [ 14.809257] ret_from_fork+0x116/0x1d0 [ 14.809283] ? __pfx_kthread+0x10/0x10 [ 14.809304] ret_from_fork_asm+0x1a/0x30 [ 14.809335] </TASK> [ 14.809363] [ 14.817029] Allocated by task 284: [ 14.817161] kasan_save_stack+0x45/0x70 [ 14.817333] kasan_save_track+0x18/0x40 [ 14.817551] kasan_save_alloc_info+0x3b/0x50 [ 14.817758] __kasan_kmalloc+0xb7/0xc0 [ 14.817945] __kmalloc_cache_noprof+0x189/0x420 [ 14.818166] kasan_atomics+0x95/0x310 [ 14.818361] kunit_try_run_case+0x1a5/0x480 [ 14.818563] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.818850] kthread+0x337/0x6f0 [ 14.819020] ret_from_fork+0x116/0x1d0 [ 14.819168] ret_from_fork_asm+0x1a/0x30 [ 14.819306] [ 14.819389] The buggy address belongs to the object at ffff888103128480 [ 14.819389] which belongs to the cache kmalloc-64 of size 64 [ 14.819889] The buggy address is located 0 bytes to the right of [ 14.819889] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.820446] [ 14.820544] The buggy address belongs to the physical page: [ 14.820837] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.821081] flags: 0x200000000000000(node=0|zone=2) [ 14.821246] page_type: f5(slab) [ 14.821382] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.821699] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.822173] page dumped because: kasan: bad access detected [ 14.822476] [ 14.822575] Memory state around the buggy address: [ 14.822851] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.823195] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.823497] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.823847] ^ [ 14.824057] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.824367] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.824666] ================================================================== [ 14.989248] ================================================================== [ 14.989671] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 14.990106] Write of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.990381] [ 14.990470] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.990513] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.990526] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.990547] Call Trace: [ 14.990563] <TASK> [ 14.990579] dump_stack_lvl+0x73/0xb0 [ 14.990605] print_report+0xd1/0x650 [ 14.990629] ? __virt_addr_valid+0x1db/0x2d0 [ 14.990652] ? kasan_atomics_helper+0x1ce1/0x5450 [ 14.990674] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.990697] ? kasan_atomics_helper+0x1ce1/0x5450 [ 14.990720] kasan_report+0x141/0x180 [ 14.990744] ? kasan_atomics_helper+0x1ce1/0x5450 [ 14.990771] kasan_check_range+0x10c/0x1c0 [ 14.990795] __kasan_check_write+0x18/0x20 [ 14.990815] kasan_atomics_helper+0x1ce1/0x5450 [ 14.990838] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.990861] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.990887] ? kasan_atomics+0x152/0x310 [ 14.990915] kasan_atomics+0x1dc/0x310 [ 14.990937] ? __pfx_kasan_atomics+0x10/0x10 [ 14.990962] ? __pfx_read_tsc+0x10/0x10 [ 14.990983] ? ktime_get_ts64+0x86/0x230 [ 14.991006] kunit_try_run_case+0x1a5/0x480 [ 14.991030] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.991053] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.991077] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.991100] ? __kthread_parkme+0x82/0x180 [ 14.991122] ? preempt_count_sub+0x50/0x80 [ 14.991146] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.991171] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.991194] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.991218] kthread+0x337/0x6f0 [ 14.991238] ? trace_preempt_on+0x20/0xc0 [ 14.991262] ? __pfx_kthread+0x10/0x10 [ 14.991283] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.991304] ? calculate_sigpending+0x7b/0xa0 [ 14.991328] ? __pfx_kthread+0x10/0x10 [ 14.991392] ret_from_fork+0x116/0x1d0 [ 14.991413] ? __pfx_kthread+0x10/0x10 [ 14.991434] ret_from_fork_asm+0x1a/0x30 [ 14.991476] </TASK> [ 14.991488] [ 14.999872] Allocated by task 284: [ 15.000054] kasan_save_stack+0x45/0x70 [ 15.000302] kasan_save_track+0x18/0x40 [ 15.000522] kasan_save_alloc_info+0x3b/0x50 [ 15.000769] __kasan_kmalloc+0xb7/0xc0 [ 15.000961] __kmalloc_cache_noprof+0x189/0x420 [ 15.001236] kasan_atomics+0x95/0x310 [ 15.001540] kunit_try_run_case+0x1a5/0x480 [ 15.001768] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.002020] kthread+0x337/0x6f0 [ 15.002189] ret_from_fork+0x116/0x1d0 [ 15.002457] ret_from_fork_asm+0x1a/0x30 [ 15.002598] [ 15.002684] The buggy address belongs to the object at ffff888103128480 [ 15.002684] which belongs to the cache kmalloc-64 of size 64 [ 15.003502] The buggy address is located 0 bytes to the right of [ 15.003502] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 15.004473] [ 15.004615] The buggy address belongs to the physical page: [ 15.004915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 15.005201] flags: 0x200000000000000(node=0|zone=2) [ 15.005378] page_type: f5(slab) [ 15.005588] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.006080] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.006422] page dumped because: kasan: bad access detected [ 15.006595] [ 15.006665] Memory state around the buggy address: [ 15.007078] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.007498] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.007951] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.008212] ^ [ 15.008410] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.008778] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.009042] ================================================================== [ 15.215644] ================================================================== [ 15.216079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 15.216409] Read of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 15.216901] [ 15.217002] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.217194] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.217259] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.217281] Call Trace: [ 15.217298] <TASK> [ 15.217316] dump_stack_lvl+0x73/0xb0 [ 15.217360] print_report+0xd1/0x650 [ 15.217385] ? __virt_addr_valid+0x1db/0x2d0 [ 15.217409] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.217431] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.217453] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.217475] kasan_report+0x141/0x180 [ 15.217498] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.217525] __asan_report_load8_noabort+0x18/0x20 [ 15.217550] kasan_atomics_helper+0x4fa5/0x5450 [ 15.217574] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.217596] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.217622] ? kasan_atomics+0x152/0x310 [ 15.217649] kasan_atomics+0x1dc/0x310 [ 15.217672] ? __pfx_kasan_atomics+0x10/0x10 [ 15.217697] ? __pfx_read_tsc+0x10/0x10 [ 15.217718] ? ktime_get_ts64+0x86/0x230 [ 15.217754] kunit_try_run_case+0x1a5/0x480 [ 15.217779] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.217802] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.217826] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.217849] ? __kthread_parkme+0x82/0x180 [ 15.217871] ? preempt_count_sub+0x50/0x80 [ 15.217896] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.217920] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.217944] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.217967] kthread+0x337/0x6f0 [ 15.217987] ? trace_preempt_on+0x20/0xc0 [ 15.218012] ? __pfx_kthread+0x10/0x10 [ 15.218033] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.218054] ? calculate_sigpending+0x7b/0xa0 [ 15.218079] ? __pfx_kthread+0x10/0x10 [ 15.218100] ret_from_fork+0x116/0x1d0 [ 15.218119] ? __pfx_kthread+0x10/0x10 [ 15.218140] ret_from_fork_asm+0x1a/0x30 [ 15.218171] </TASK> [ 15.218183] [ 15.227691] Allocated by task 284: [ 15.228062] kasan_save_stack+0x45/0x70 [ 15.228319] kasan_save_track+0x18/0x40 [ 15.228593] kasan_save_alloc_info+0x3b/0x50 [ 15.228762] __kasan_kmalloc+0xb7/0xc0 [ 15.229098] __kmalloc_cache_noprof+0x189/0x420 [ 15.229305] kasan_atomics+0x95/0x310 [ 15.229646] kunit_try_run_case+0x1a5/0x480 [ 15.229884] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.230121] kthread+0x337/0x6f0 [ 15.230277] ret_from_fork+0x116/0x1d0 [ 15.230455] ret_from_fork_asm+0x1a/0x30 [ 15.230641] [ 15.230720] The buggy address belongs to the object at ffff888103128480 [ 15.230720] which belongs to the cache kmalloc-64 of size 64 [ 15.231511] The buggy address is located 0 bytes to the right of [ 15.231511] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 15.232261] [ 15.232375] The buggy address belongs to the physical page: [ 15.232721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 15.233131] flags: 0x200000000000000(node=0|zone=2) [ 15.233416] page_type: f5(slab) [ 15.233628] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.234048] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.234431] page dumped because: kasan: bad access detected [ 15.234666] [ 15.234844] Memory state around the buggy address: [ 15.235080] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.235469] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.235775] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.236231] ^ [ 15.236520] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.236885] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.237247] ================================================================== [ 14.969210] ================================================================== [ 14.969704] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 14.970429] Read of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.970805] [ 14.970917] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.970959] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.970972] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.970994] Call Trace: [ 14.971009] <TASK> [ 14.971025] dump_stack_lvl+0x73/0xb0 [ 14.971053] print_report+0xd1/0x650 [ 14.971077] ? __virt_addr_valid+0x1db/0x2d0 [ 14.971100] ? kasan_atomics_helper+0x4f30/0x5450 [ 14.971122] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.971145] ? kasan_atomics_helper+0x4f30/0x5450 [ 14.971168] kasan_report+0x141/0x180 [ 14.971190] ? kasan_atomics_helper+0x4f30/0x5450 [ 14.971217] __asan_report_load8_noabort+0x18/0x20 [ 14.971242] kasan_atomics_helper+0x4f30/0x5450 [ 14.971265] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.971287] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.971313] ? kasan_atomics+0x152/0x310 [ 14.971339] kasan_atomics+0x1dc/0x310 [ 14.971373] ? __pfx_kasan_atomics+0x10/0x10 [ 14.971397] ? __pfx_read_tsc+0x10/0x10 [ 14.971418] ? ktime_get_ts64+0x86/0x230 [ 14.971443] kunit_try_run_case+0x1a5/0x480 [ 14.971466] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.971490] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.971513] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.971536] ? __kthread_parkme+0x82/0x180 [ 14.971558] ? preempt_count_sub+0x50/0x80 [ 14.971582] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.971608] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.971636] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.971669] kthread+0x337/0x6f0 [ 14.971689] ? trace_preempt_on+0x20/0xc0 [ 14.971713] ? __pfx_kthread+0x10/0x10 [ 14.971734] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.971757] ? calculate_sigpending+0x7b/0xa0 [ 14.971780] ? __pfx_kthread+0x10/0x10 [ 14.971803] ret_from_fork+0x116/0x1d0 [ 14.971822] ? __pfx_kthread+0x10/0x10 [ 14.971865] ret_from_fork_asm+0x1a/0x30 [ 14.971921] </TASK> [ 14.971932] [ 14.980135] Allocated by task 284: [ 14.980341] kasan_save_stack+0x45/0x70 [ 14.980581] kasan_save_track+0x18/0x40 [ 14.980792] kasan_save_alloc_info+0x3b/0x50 [ 14.980991] __kasan_kmalloc+0xb7/0xc0 [ 14.981217] __kmalloc_cache_noprof+0x189/0x420 [ 14.981460] kasan_atomics+0x95/0x310 [ 14.981666] kunit_try_run_case+0x1a5/0x480 [ 14.981907] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.982175] kthread+0x337/0x6f0 [ 14.982358] ret_from_fork+0x116/0x1d0 [ 14.982568] ret_from_fork_asm+0x1a/0x30 [ 14.982808] [ 14.982921] The buggy address belongs to the object at ffff888103128480 [ 14.982921] which belongs to the cache kmalloc-64 of size 64 [ 14.983491] The buggy address is located 0 bytes to the right of [ 14.983491] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.984051] [ 14.984166] The buggy address belongs to the physical page: [ 14.984410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.984767] flags: 0x200000000000000(node=0|zone=2) [ 14.985037] page_type: f5(slab) [ 14.985259] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.985650] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.985996] page dumped because: kasan: bad access detected [ 14.986201] [ 14.986272] Memory state around the buggy address: [ 14.986433] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.986750] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.987143] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.987543] ^ [ 14.987874] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.988144] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.988432] ================================================================== [ 14.577520] ================================================================== [ 14.578560] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 14.578905] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.579158] [ 14.579247] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.579291] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.579304] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.579325] Call Trace: [ 14.579343] <TASK> [ 14.579373] dump_stack_lvl+0x73/0xb0 [ 14.579400] print_report+0xd1/0x650 [ 14.579424] ? __virt_addr_valid+0x1db/0x2d0 [ 14.579447] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.579469] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.579492] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.579515] kasan_report+0x141/0x180 [ 14.579537] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.579563] kasan_check_range+0x10c/0x1c0 [ 14.579588] __kasan_check_write+0x18/0x20 [ 14.579607] kasan_atomics_helper+0x12e6/0x5450 [ 14.579630] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.579653] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.579683] ? kasan_atomics+0x152/0x310 [ 14.579710] kasan_atomics+0x1dc/0x310 [ 14.579733] ? __pfx_kasan_atomics+0x10/0x10 [ 14.579759] ? __pfx_read_tsc+0x10/0x10 [ 14.579781] ? ktime_get_ts64+0x86/0x230 [ 14.579807] kunit_try_run_case+0x1a5/0x480 [ 14.579831] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.579853] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.579878] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.579900] ? __kthread_parkme+0x82/0x180 [ 14.579922] ? preempt_count_sub+0x50/0x80 [ 14.579946] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.579970] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.579994] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.580016] kthread+0x337/0x6f0 [ 14.580037] ? trace_preempt_on+0x20/0xc0 [ 14.580062] ? __pfx_kthread+0x10/0x10 [ 14.580083] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.580105] ? calculate_sigpending+0x7b/0xa0 [ 14.580130] ? __pfx_kthread+0x10/0x10 [ 14.580152] ret_from_fork+0x116/0x1d0 [ 14.580170] ? __pfx_kthread+0x10/0x10 [ 14.580191] ret_from_fork_asm+0x1a/0x30 [ 14.580223] </TASK> [ 14.580235] [ 14.587678] Allocated by task 284: [ 14.587867] kasan_save_stack+0x45/0x70 [ 14.588069] kasan_save_track+0x18/0x40 [ 14.588268] kasan_save_alloc_info+0x3b/0x50 [ 14.588456] __kasan_kmalloc+0xb7/0xc0 [ 14.588590] __kmalloc_cache_noprof+0x189/0x420 [ 14.588744] kasan_atomics+0x95/0x310 [ 14.588878] kunit_try_run_case+0x1a5/0x480 [ 14.589023] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.589196] kthread+0x337/0x6f0 [ 14.589404] ret_from_fork+0x116/0x1d0 [ 14.589599] ret_from_fork_asm+0x1a/0x30 [ 14.589860] [ 14.589955] The buggy address belongs to the object at ffff888103128480 [ 14.589955] which belongs to the cache kmalloc-64 of size 64 [ 14.590490] The buggy address is located 0 bytes to the right of [ 14.590490] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.591337] [ 14.591423] The buggy address belongs to the physical page: [ 14.591597] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.591841] flags: 0x200000000000000(node=0|zone=2) [ 14.592004] page_type: f5(slab) [ 14.592124] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.592820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.593160] page dumped because: kasan: bad access detected [ 14.593374] [ 14.593444] Memory state around the buggy address: [ 14.593600] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.593991] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.594310] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.594651] ^ [ 14.594862] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.595079] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.595290] ================================================================== [ 13.874789] ================================================================== [ 13.876244] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 13.877038] Read of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 13.877438] [ 13.877536] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.877590] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.877602] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.877623] Call Trace: [ 13.877636] <TASK> [ 13.877654] dump_stack_lvl+0x73/0xb0 [ 13.877685] print_report+0xd1/0x650 [ 13.877708] ? __virt_addr_valid+0x1db/0x2d0 [ 13.877731] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.877750] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.877772] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.877792] kasan_report+0x141/0x180 [ 13.877813] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.877838] __asan_report_load4_noabort+0x18/0x20 [ 13.877861] kasan_atomics_helper+0x4bbc/0x5450 [ 13.877882] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.877903] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.877929] ? kasan_atomics+0x152/0x310 [ 13.877956] kasan_atomics+0x1dc/0x310 [ 13.877978] ? __pfx_kasan_atomics+0x10/0x10 [ 13.878001] ? __pfx_read_tsc+0x10/0x10 [ 13.878023] ? ktime_get_ts64+0x86/0x230 [ 13.878047] kunit_try_run_case+0x1a5/0x480 [ 13.878073] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.878094] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.878116] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.878138] ? __kthread_parkme+0x82/0x180 [ 13.878158] ? preempt_count_sub+0x50/0x80 [ 13.878182] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.878205] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.878227] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.878249] kthread+0x337/0x6f0 [ 13.878268] ? trace_preempt_on+0x20/0xc0 [ 13.878291] ? __pfx_kthread+0x10/0x10 [ 13.878312] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.878332] ? calculate_sigpending+0x7b/0xa0 [ 13.878366] ? __pfx_kthread+0x10/0x10 [ 13.878387] ret_from_fork+0x116/0x1d0 [ 13.878404] ? __pfx_kthread+0x10/0x10 [ 13.878424] ret_from_fork_asm+0x1a/0x30 [ 13.878455] </TASK> [ 13.878466] [ 13.891810] Allocated by task 284: [ 13.892204] kasan_save_stack+0x45/0x70 [ 13.892679] kasan_save_track+0x18/0x40 [ 13.893143] kasan_save_alloc_info+0x3b/0x50 [ 13.893584] __kasan_kmalloc+0xb7/0xc0 [ 13.894049] __kmalloc_cache_noprof+0x189/0x420 [ 13.894515] kasan_atomics+0x95/0x310 [ 13.894915] kunit_try_run_case+0x1a5/0x480 [ 13.895139] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.895307] kthread+0x337/0x6f0 [ 13.895437] ret_from_fork+0x116/0x1d0 [ 13.895669] ret_from_fork_asm+0x1a/0x30 [ 13.896166] [ 13.896388] The buggy address belongs to the object at ffff888103128480 [ 13.896388] which belongs to the cache kmalloc-64 of size 64 [ 13.897679] The buggy address is located 0 bytes to the right of [ 13.897679] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 13.899100] [ 13.899278] The buggy address belongs to the physical page: [ 13.899767] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 13.900605] flags: 0x200000000000000(node=0|zone=2) [ 13.901079] page_type: f5(slab) [ 13.901238] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.902016] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.902512] page dumped because: kasan: bad access detected [ 13.903079] [ 13.903216] Memory state around the buggy address: [ 13.903957] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.904211] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.905045] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.905825] ^ [ 13.905984] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.906190] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.906424] ================================================================== [ 15.128425] ================================================================== [ 15.129050] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 15.129413] Read of size 8 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 15.129751] [ 15.129853] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.129898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.129911] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.129932] Call Trace: [ 15.129951] <TASK> [ 15.129968] dump_stack_lvl+0x73/0xb0 [ 15.129997] print_report+0xd1/0x650 [ 15.130020] ? __virt_addr_valid+0x1db/0x2d0 [ 15.130044] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.130067] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.130088] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.130111] kasan_report+0x141/0x180 [ 15.130134] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.130160] __asan_report_load8_noabort+0x18/0x20 [ 15.130185] kasan_atomics_helper+0x4f98/0x5450 [ 15.130208] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.130230] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.130256] ? kasan_atomics+0x152/0x310 [ 15.130283] kasan_atomics+0x1dc/0x310 [ 15.130307] ? __pfx_kasan_atomics+0x10/0x10 [ 15.130331] ? __pfx_read_tsc+0x10/0x10 [ 15.130365] ? ktime_get_ts64+0x86/0x230 [ 15.130389] kunit_try_run_case+0x1a5/0x480 [ 15.130414] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.130436] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.130462] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.130485] ? __kthread_parkme+0x82/0x180 [ 15.130506] ? preempt_count_sub+0x50/0x80 [ 15.130531] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.130555] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.130579] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.130602] kthread+0x337/0x6f0 [ 15.130622] ? trace_preempt_on+0x20/0xc0 [ 15.130648] ? __pfx_kthread+0x10/0x10 [ 15.130669] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.130691] ? calculate_sigpending+0x7b/0xa0 [ 15.130717] ? __pfx_kthread+0x10/0x10 [ 15.130751] ret_from_fork+0x116/0x1d0 [ 15.130770] ? __pfx_kthread+0x10/0x10 [ 15.130792] ret_from_fork_asm+0x1a/0x30 [ 15.130823] </TASK> [ 15.130835] [ 15.138060] Allocated by task 284: [ 15.138242] kasan_save_stack+0x45/0x70 [ 15.138443] kasan_save_track+0x18/0x40 [ 15.138616] kasan_save_alloc_info+0x3b/0x50 [ 15.138852] __kasan_kmalloc+0xb7/0xc0 [ 15.139019] __kmalloc_cache_noprof+0x189/0x420 [ 15.139227] kasan_atomics+0x95/0x310 [ 15.139404] kunit_try_run_case+0x1a5/0x480 [ 15.139559] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.139751] kthread+0x337/0x6f0 [ 15.139923] ret_from_fork+0x116/0x1d0 [ 15.140109] ret_from_fork_asm+0x1a/0x30 [ 15.140306] [ 15.140428] The buggy address belongs to the object at ffff888103128480 [ 15.140428] which belongs to the cache kmalloc-64 of size 64 [ 15.140920] The buggy address is located 0 bytes to the right of [ 15.140920] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 15.141424] [ 15.141524] The buggy address belongs to the physical page: [ 15.141807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 15.142112] flags: 0x200000000000000(node=0|zone=2) [ 15.142325] page_type: f5(slab) [ 15.142482] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.142715] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.142943] page dumped because: kasan: bad access detected [ 15.143116] [ 15.143186] Memory state around the buggy address: [ 15.143361] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.143684] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.144259] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.144572] ^ [ 15.144729] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.145049] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.145292] ================================================================== [ 14.097654] ================================================================== [ 14.098039] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 14.098302] Write of size 4 at addr ffff8881031284b0 by task kunit_try_catch/284 [ 14.098830] [ 14.098983] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.099029] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.099042] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.099074] Call Trace: [ 14.099092] <TASK> [ 14.099119] dump_stack_lvl+0x73/0xb0 [ 14.099147] print_report+0xd1/0x650 [ 14.099171] ? __virt_addr_valid+0x1db/0x2d0 [ 14.099205] ? kasan_atomics_helper+0x697/0x5450 [ 14.099228] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.099251] ? kasan_atomics_helper+0x697/0x5450 [ 14.099273] kasan_report+0x141/0x180 [ 14.099296] ? kasan_atomics_helper+0x697/0x5450 [ 14.099325] kasan_check_range+0x10c/0x1c0 [ 14.099358] __kasan_check_write+0x18/0x20 [ 14.099379] kasan_atomics_helper+0x697/0x5450 [ 14.099402] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.099425] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.099452] ? kasan_atomics+0x152/0x310 [ 14.099479] kasan_atomics+0x1dc/0x310 [ 14.099503] ? __pfx_kasan_atomics+0x10/0x10 [ 14.099536] ? __pfx_read_tsc+0x10/0x10 [ 14.099557] ? ktime_get_ts64+0x86/0x230 [ 14.099636] kunit_try_run_case+0x1a5/0x480 [ 14.099671] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.099693] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.099728] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.099752] ? __kthread_parkme+0x82/0x180 [ 14.099773] ? preempt_count_sub+0x50/0x80 [ 14.099797] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.099821] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.099854] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.099878] kthread+0x337/0x6f0 [ 14.099899] ? trace_preempt_on+0x20/0xc0 [ 14.099934] ? __pfx_kthread+0x10/0x10 [ 14.099955] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.099977] ? calculate_sigpending+0x7b/0xa0 [ 14.100002] ? __pfx_kthread+0x10/0x10 [ 14.100024] ret_from_fork+0x116/0x1d0 [ 14.100043] ? __pfx_kthread+0x10/0x10 [ 14.100064] ret_from_fork_asm+0x1a/0x30 [ 14.100095] </TASK> [ 14.100107] [ 14.108668] Allocated by task 284: [ 14.108940] kasan_save_stack+0x45/0x70 [ 14.109106] kasan_save_track+0x18/0x40 [ 14.109244] kasan_save_alloc_info+0x3b/0x50 [ 14.109402] __kasan_kmalloc+0xb7/0xc0 [ 14.109612] __kmalloc_cache_noprof+0x189/0x420 [ 14.109837] kasan_atomics+0x95/0x310 [ 14.110032] kunit_try_run_case+0x1a5/0x480 [ 14.110236] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.110660] kthread+0x337/0x6f0 [ 14.110907] ret_from_fork+0x116/0x1d0 [ 14.111084] ret_from_fork_asm+0x1a/0x30 [ 14.111224] [ 14.111298] The buggy address belongs to the object at ffff888103128480 [ 14.111298] which belongs to the cache kmalloc-64 of size 64 [ 14.112086] The buggy address is located 0 bytes to the right of [ 14.112086] allocated 48-byte region [ffff888103128480, ffff8881031284b0) [ 14.112797] [ 14.112898] The buggy address belongs to the physical page: [ 14.113134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103128 [ 14.113484] flags: 0x200000000000000(node=0|zone=2) [ 14.113711] page_type: f5(slab) [ 14.113944] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.114239] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.114533] page dumped because: kasan: bad access detected [ 14.114837] [ 14.114948] Memory state around the buggy address: [ 14.115183] ffff888103128380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.115498] ffff888103128400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.115865] >ffff888103128480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.116083] ^ [ 14.116238] ffff888103128500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.116518] ffff888103128580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.117189] ==================================================================