Date
July 10, 2025, 11:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.848911] ================================================================== [ 18.848964] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 18.849103] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265 [ 18.849163] [ 18.849194] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.849286] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.849325] Hardware name: linux,dummy-virt (DT) [ 18.849360] Call trace: [ 18.849383] show_stack+0x20/0x38 (C) [ 18.849435] dump_stack_lvl+0x8c/0xd0 [ 18.849482] print_report+0x118/0x608 [ 18.849531] kasan_report+0xdc/0x128 [ 18.849578] kasan_check_range+0x100/0x1a8 [ 18.849629] __kasan_check_write+0x20/0x30 [ 18.849675] kasan_atomics_helper+0x14e4/0x4858 [ 18.849726] kasan_atomics+0x198/0x2e0 [ 18.849775] kunit_try_run_case+0x170/0x3f0 [ 18.849827] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.849883] kthread+0x328/0x630 [ 18.849933] ret_from_fork+0x10/0x20 [ 18.849990] [ 18.850011] Allocated by task 265: [ 18.850042] kasan_save_stack+0x3c/0x68 [ 18.850094] kasan_save_track+0x20/0x40 [ 18.850150] kasan_save_alloc_info+0x40/0x58 [ 18.850193] __kasan_kmalloc+0xd4/0xd8 [ 18.850233] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.850273] kasan_atomics+0xb8/0x2e0 [ 18.850313] kunit_try_run_case+0x170/0x3f0 [ 18.850361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.850408] kthread+0x328/0x630 [ 18.850441] ret_from_fork+0x10/0x20 [ 18.850485] [ 18.850508] The buggy address belongs to the object at fff00000c635c500 [ 18.850508] which belongs to the cache kmalloc-64 of size 64 [ 18.850567] The buggy address is located 0 bytes to the right of [ 18.850567] allocated 48-byte region [fff00000c635c500, fff00000c635c530) [ 18.850640] [ 18.850662] The buggy address belongs to the physical page: [ 18.850695] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c [ 18.850747] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.850796] page_type: f5(slab) [ 18.850835] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.850897] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.850941] page dumped because: kasan: bad access detected [ 18.850975] [ 18.850996] Memory state around the buggy address: [ 18.851045] fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.851474] fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.851831] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.851990] ^ [ 18.852114] fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.852214] fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.852305] ================================================================== [ 18.744358] ================================================================== [ 18.744429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 18.744483] Read of size 8 at addr fff00000c635c530 by task kunit_try_catch/265 [ 18.744546] [ 18.744584] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.744676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.744729] Hardware name: linux,dummy-virt (DT) [ 18.744778] Call trace: [ 18.744817] show_stack+0x20/0x38 (C) [ 18.744877] dump_stack_lvl+0x8c/0xd0 [ 18.744936] print_report+0x118/0x608 [ 18.744989] kasan_report+0xdc/0x128 [ 18.745036] __asan_report_load8_noabort+0x20/0x30 [ 18.745103] kasan_atomics_helper+0x3f58/0x4858 [ 18.745193] kasan_atomics+0x198/0x2e0 [ 18.745355] kunit_try_run_case+0x170/0x3f0 [ 18.745418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.745484] kthread+0x328/0x630 [ 18.745539] ret_from_fork+0x10/0x20 [ 18.745597] [ 18.745620] Allocated by task 265: [ 18.745660] kasan_save_stack+0x3c/0x68 [ 18.748121] kasan_save_track+0x20/0x40 [ 18.748763] kasan_save_alloc_info+0x40/0x58 [ 18.749109] __kasan_kmalloc+0xd4/0xd8 [ 18.749248] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.749293] kasan_atomics+0xb8/0x2e0 [ 18.749769] kunit_try_run_case+0x170/0x3f0 [ 18.751099] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.751171] kthread+0x328/0x630 [ 18.751208] ret_from_fork+0x10/0x20 [ 18.751246] [ 18.751270] The buggy address belongs to the object at fff00000c635c500 [ 18.751270] which belongs to the cache kmalloc-64 of size 64 [ 18.751381] The buggy address is located 0 bytes to the right of [ 18.751381] allocated 48-byte region [fff00000c635c500, fff00000c635c530) [ 18.751928] [ 18.751978] The buggy address belongs to the physical page: [ 18.752012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c [ 18.752069] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.752159] page_type: f5(slab) [ 18.752202] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.752383] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.752454] page dumped because: kasan: bad access detected [ 18.752521] [ 18.752562] Memory state around the buggy address: [ 18.752653] fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.752729] fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.752793] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.753055] ^ [ 18.753134] fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.753200] fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.753303] ================================================================== [ 18.857612] ================================================================== [ 18.857669] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 18.857720] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265 [ 18.857849] [ 18.857988] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.858156] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.858226] Hardware name: linux,dummy-virt (DT) [ 18.858309] Call trace: [ 18.858348] show_stack+0x20/0x38 (C) [ 18.858435] dump_stack_lvl+0x8c/0xd0 [ 18.858548] print_report+0x118/0x608 [ 18.858649] kasan_report+0xdc/0x128 [ 18.858709] kasan_check_range+0x100/0x1a8 [ 18.858784] __kasan_check_write+0x20/0x30 [ 18.858842] kasan_atomics_helper+0x15b4/0x4858 [ 18.858894] kasan_atomics+0x198/0x2e0 [ 18.858943] kunit_try_run_case+0x170/0x3f0 [ 18.858991] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.859189] kthread+0x328/0x630 [ 18.859417] ret_from_fork+0x10/0x20 [ 18.859505] [ 18.859750] Allocated by task 265: [ 18.859841] kasan_save_stack+0x3c/0x68 [ 18.859933] kasan_save_track+0x20/0x40 [ 18.860033] kasan_save_alloc_info+0x40/0x58 [ 18.860145] __kasan_kmalloc+0xd4/0xd8 [ 18.860234] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.860308] kasan_atomics+0xb8/0x2e0 [ 18.860377] kunit_try_run_case+0x170/0x3f0 [ 18.860473] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.860579] kthread+0x328/0x630 [ 18.860632] ret_from_fork+0x10/0x20 [ 18.860671] [ 18.860797] The buggy address belongs to the object at fff00000c635c500 [ 18.860797] which belongs to the cache kmalloc-64 of size 64 [ 18.861058] The buggy address is located 0 bytes to the right of [ 18.861058] allocated 48-byte region [fff00000c635c500, fff00000c635c530) [ 18.861163] [ 18.861337] The buggy address belongs to the physical page: [ 18.861497] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c [ 18.861595] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.861645] page_type: f5(slab) [ 18.861691] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.861871] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.862086] page dumped because: kasan: bad access detected [ 18.862197] [ 18.862257] Memory state around the buggy address: [ 18.862533] fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.862639] fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.862721] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.862764] ^ [ 18.862799] fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.862843] fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.862881] ================================================================== [ 18.775059] ================================================================== [ 18.775129] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 18.775182] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265 [ 18.775243] [ 18.775287] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.775373] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.775400] Hardware name: linux,dummy-virt (DT) [ 18.775434] Call trace: [ 18.775458] show_stack+0x20/0x38 (C) [ 18.775510] dump_stack_lvl+0x8c/0xd0 [ 18.775559] print_report+0x118/0x608 [ 18.775609] kasan_report+0xdc/0x128 [ 18.775656] kasan_check_range+0x100/0x1a8 [ 18.775729] __kasan_check_write+0x20/0x30 [ 18.775779] kasan_atomics_helper+0xf88/0x4858 [ 18.775829] kasan_atomics+0x198/0x2e0 [ 18.775877] kunit_try_run_case+0x170/0x3f0 [ 18.775931] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.775989] kthread+0x328/0x630 [ 18.776041] ret_from_fork+0x10/0x20 [ 18.776110] [ 18.776131] Allocated by task 265: [ 18.776160] kasan_save_stack+0x3c/0x68 [ 18.776204] kasan_save_track+0x20/0x40 [ 18.776243] kasan_save_alloc_info+0x40/0x58 [ 18.776297] __kasan_kmalloc+0xd4/0xd8 [ 18.776335] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.776377] kasan_atomics+0xb8/0x2e0 [ 18.776415] kunit_try_run_case+0x170/0x3f0 [ 18.776456] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.776503] kthread+0x328/0x630 [ 18.776544] ret_from_fork+0x10/0x20 [ 18.776586] [ 18.776607] The buggy address belongs to the object at fff00000c635c500 [ 18.776607] which belongs to the cache kmalloc-64 of size 64 [ 18.776680] The buggy address is located 0 bytes to the right of [ 18.776680] allocated 48-byte region [fff00000c635c500, fff00000c635c530) [ 18.776745] [ 18.776767] The buggy address belongs to the physical page: [ 18.776800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c [ 18.776864] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.776916] page_type: f5(slab) [ 18.776957] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.777009] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.777052] page dumped because: kasan: bad access detected [ 18.777494] [ 18.777529] Memory state around the buggy address: [ 18.777877] fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.778241] fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.778287] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.778340] ^ [ 18.778374] fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.778421] fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.778461] ================================================================== [ 18.824467] ================================================================== [ 18.824520] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 18.824592] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265 [ 18.824803] [ 18.824845] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.825052] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.825093] Hardware name: linux,dummy-virt (DT) [ 18.825229] Call trace: [ 18.825304] show_stack+0x20/0x38 (C) [ 18.825403] dump_stack_lvl+0x8c/0xd0 [ 18.825465] print_report+0x118/0x608 [ 18.825540] kasan_report+0xdc/0x128 [ 18.828207] kasan_check_range+0x100/0x1a8 [ 18.828670] __kasan_check_write+0x20/0x30 [ 18.828739] kasan_atomics_helper+0x1384/0x4858 [ 18.829014] kasan_atomics+0x198/0x2e0 [ 18.829159] kunit_try_run_case+0x170/0x3f0 [ 18.829216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.829286] kthread+0x328/0x630 [ 18.829330] ret_from_fork+0x10/0x20 [ 18.829418] [ 18.829440] Allocated by task 265: [ 18.829470] kasan_save_stack+0x3c/0x68 [ 18.829515] kasan_save_track+0x20/0x40 [ 18.829714] kasan_save_alloc_info+0x40/0x58 [ 18.829759] __kasan_kmalloc+0xd4/0xd8 [ 18.830216] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.830569] kasan_atomics+0xb8/0x2e0 [ 18.830621] kunit_try_run_case+0x170/0x3f0 [ 18.831185] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.831265] kthread+0x328/0x630 [ 18.831542] ret_from_fork+0x10/0x20 [ 18.831590] [ 18.831616] The buggy address belongs to the object at fff00000c635c500 [ 18.831616] which belongs to the cache kmalloc-64 of size 64 [ 18.831678] The buggy address is located 0 bytes to the right of [ 18.831678] allocated 48-byte region [fff00000c635c500, fff00000c635c530) [ 18.831898] [ 18.831957] The buggy address belongs to the physical page: [ 18.832028] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c [ 18.832125] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.832212] page_type: f5(slab) [ 18.832275] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.832481] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.832627] page dumped because: kasan: bad access detected [ 18.832704] [ 18.832815] Memory state around the buggy address: [ 18.832891] fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.832938] fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.832983] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.833190] ^ [ 18.833273] fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.833392] fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.833532] ================================================================== [ 18.883449] ================================================================== [ 18.883506] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 18.883560] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265 [ 18.883627] [ 18.883799] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.884098] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.884190] Hardware name: linux,dummy-virt (DT) [ 18.884227] Call trace: [ 18.884252] show_stack+0x20/0x38 (C) [ 18.884306] dump_stack_lvl+0x8c/0xd0 [ 18.884372] print_report+0x118/0x608 [ 18.884439] kasan_report+0xdc/0x128 [ 18.884495] kasan_check_range+0x100/0x1a8 [ 18.884709] __kasan_check_write+0x20/0x30 [ 18.884789] kasan_atomics_helper+0x16d0/0x4858 [ 18.884843] kasan_atomics+0x198/0x2e0 [ 18.884899] kunit_try_run_case+0x170/0x3f0 [ 18.884966] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.885031] kthread+0x328/0x630 [ 18.885089] ret_from_fork+0x10/0x20 [ 18.885147] [ 18.885176] Allocated by task 265: [ 18.885214] kasan_save_stack+0x3c/0x68 [ 18.885291] kasan_save_track+0x20/0x40 [ 18.885333] kasan_save_alloc_info+0x40/0x58 [ 18.885383] __kasan_kmalloc+0xd4/0xd8 [ 18.885476] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.885519] kasan_atomics+0xb8/0x2e0 [ 18.885558] kunit_try_run_case+0x170/0x3f0 [ 18.885598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.885913] kthread+0x328/0x630 [ 18.885996] ret_from_fork+0x10/0x20 [ 18.886048] [ 18.886092] The buggy address belongs to the object at fff00000c635c500 [ 18.886092] which belongs to the cache kmalloc-64 of size 64 [ 18.886167] The buggy address is located 0 bytes to the right of [ 18.886167] allocated 48-byte region [fff00000c635c500, fff00000c635c530) [ 18.886410] [ 18.886441] The buggy address belongs to the physical page: [ 18.886477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c [ 18.886534] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.886585] page_type: f5(slab) [ 18.886790] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.886877] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.886974] page dumped because: kasan: bad access detected [ 18.887032] [ 18.887366] Memory state around the buggy address: [ 18.887434] fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.887500] fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.887563] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.887617] ^ [ 18.887654] fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.887724] fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.887776] ================================================================== [ 18.779317] ================================================================== [ 18.779394] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 18.779449] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265 [ 18.779499] [ 18.779533] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.779616] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.779645] Hardware name: linux,dummy-virt (DT) [ 18.779823] Call trace: [ 18.779858] show_stack+0x20/0x38 (C) [ 18.779931] dump_stack_lvl+0x8c/0xd0 [ 18.779983] print_report+0x118/0x608 [ 18.780042] kasan_report+0xdc/0x128 [ 18.780266] kasan_check_range+0x100/0x1a8 [ 18.780333] __kasan_check_write+0x20/0x30 [ 18.780409] kasan_atomics_helper+0xff0/0x4858 [ 18.780461] kasan_atomics+0x198/0x2e0 [ 18.780514] kunit_try_run_case+0x170/0x3f0 [ 18.780570] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.780635] kthread+0x328/0x630 [ 18.780687] ret_from_fork+0x10/0x20 [ 18.780739] [ 18.780759] Allocated by task 265: [ 18.780797] kasan_save_stack+0x3c/0x68 [ 18.780849] kasan_save_track+0x20/0x40 [ 18.780896] kasan_save_alloc_info+0x40/0x58 [ 18.780940] __kasan_kmalloc+0xd4/0xd8 [ 18.780989] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.781039] kasan_atomics+0xb8/0x2e0 [ 18.781090] kunit_try_run_case+0x170/0x3f0 [ 18.781131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.781271] kthread+0x328/0x630 [ 18.781310] ret_from_fork+0x10/0x20 [ 18.781457] [ 18.781506] The buggy address belongs to the object at fff00000c635c500 [ 18.781506] which belongs to the cache kmalloc-64 of size 64 [ 18.781592] The buggy address is located 0 bytes to the right of [ 18.781592] allocated 48-byte region [fff00000c635c500, fff00000c635c530) [ 18.781658] [ 18.781811] The buggy address belongs to the physical page: [ 18.781870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c [ 18.781932] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.782049] page_type: f5(slab) [ 18.782099] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.782180] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.782223] page dumped because: kasan: bad access detected [ 18.782257] [ 18.782306] Memory state around the buggy address: [ 18.782340] fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.782386] fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.782601] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.782679] ^ [ 18.782734] fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.782795] fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.782837] ================================================================== [ 18.863653] ================================================================== [ 18.866268] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 18.866352] Read of size 8 at addr fff00000c635c530 by task kunit_try_catch/265 [ 18.867183] [ 18.867788] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.868353] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.868437] Hardware name: linux,dummy-virt (DT) [ 18.868482] Call trace: [ 18.868532] show_stack+0x20/0x38 (C) [ 18.868655] dump_stack_lvl+0x8c/0xd0 [ 18.868731] print_report+0x118/0x608 [ 18.868848] kasan_report+0xdc/0x128 [ 18.868935] __asan_report_load8_noabort+0x20/0x30 [ 18.868993] kasan_atomics_helper+0x3db0/0x4858 [ 18.869045] kasan_atomics+0x198/0x2e0 [ 18.869341] kunit_try_run_case+0x170/0x3f0 [ 18.869470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.869568] kthread+0x328/0x630 [ 18.869612] ret_from_fork+0x10/0x20 [ 18.869683] [ 18.869719] Allocated by task 265: [ 18.869749] kasan_save_stack+0x3c/0x68 [ 18.869795] kasan_save_track+0x20/0x40 [ 18.869849] kasan_save_alloc_info+0x40/0x58 [ 18.869892] __kasan_kmalloc+0xd4/0xd8 [ 18.869946] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.869998] kasan_atomics+0xb8/0x2e0 [ 18.870035] kunit_try_run_case+0x170/0x3f0 [ 18.870089] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.870135] kthread+0x328/0x630 [ 18.870181] ret_from_fork+0x10/0x20 [ 18.870218] [ 18.870261] The buggy address belongs to the object at fff00000c635c500 [ 18.870261] which belongs to the cache kmalloc-64 of size 64 [ 18.870323] The buggy address is located 0 bytes to the right of [ 18.870323] allocated 48-byte region [fff00000c635c500, fff00000c635c530) [ 18.870389] [ 18.870413] The buggy address belongs to the physical page: [ 18.870447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c [ 18.870512] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.870565] page_type: f5(slab) [ 18.870606] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.870660] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.870704] page dumped because: kasan: bad access detected [ 18.870737] [ 18.870767] Memory state around the buggy address: [ 18.870802] fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.870854] fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.870899] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.870942] ^ [ 18.871006] fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.871049] fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.871976] ================================================================== [ 18.726659] ================================================================== [ 18.726725] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 18.726782] Write of size 4 at addr fff00000c635c530 by task kunit_try_catch/265 [ 18.726834] [ 18.726886] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.726969] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.726998] Hardware name: linux,dummy-virt (DT) [ 18.727183] Call trace: [ 18.727304] show_stack+0x20/0x38 (C) [ 18.727419] dump_stack_lvl+0x8c/0xd0 [ 18.727486] print_report+0x118/0x608 [ 18.727540] kasan_report+0xdc/0x128 [ 18.727747] kasan_check_range+0x100/0x1a8 [ 18.727802] __kasan_check_write+0x20/0x30 [ 18.727989] kasan_atomics_helper+0xd3c/0x4858 [ 18.728103] kasan_atomics+0x198/0x2e0 [ 18.728160] kunit_try_run_case+0x170/0x3f0 [ 18.728211] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.728275] kthread+0x328/0x630 [ 18.728331] ret_from_fork+0x10/0x20 [ 18.728388] [ 18.728417] Allocated by task 265: [ 18.728454] kasan_save_stack+0x3c/0x68 [ 18.728499] kasan_save_track+0x20/0x40 [ 18.728555] kasan_save_alloc_info+0x40/0x58 [ 18.728650] __kasan_kmalloc+0xd4/0xd8 [ 18.728692] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.728735] kasan_atomics+0xb8/0x2e0 [ 18.728772] kunit_try_run_case+0x170/0x3f0 [ 18.728813] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.728859] kthread+0x328/0x630 [ 18.729110] ret_from_fork+0x10/0x20 [ 18.729262] [ 18.729290] The buggy address belongs to the object at fff00000c635c500 [ 18.729290] which belongs to the cache kmalloc-64 of size 64 [ 18.729707] The buggy address is located 0 bytes to the right of [ 18.729707] allocated 48-byte region [fff00000c635c500, fff00000c635c530) [ 18.730054] [ 18.730110] The buggy address belongs to the physical page: [ 18.730153] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c [ 18.730208] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.730285] page_type: f5(slab) [ 18.730327] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.730377] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.730419] page dumped because: kasan: bad access detected [ 18.730768] [ 18.730818] Memory state around the buggy address: [ 18.730875] fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.730952] fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.731036] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.731076] ^ [ 18.731122] fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.731284] fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.731328] ================================================================== [ 18.763259] ================================================================== [ 18.763312] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 18.763370] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265 [ 18.763456] [ 18.763495] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.763589] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.763754] Hardware name: linux,dummy-virt (DT) [ 18.763791] Call trace: [ 18.763920] show_stack+0x20/0x38 (C) [ 18.763996] dump_stack_lvl+0x8c/0xd0 [ 18.764052] print_report+0x118/0x608 [ 18.764132] kasan_report+0xdc/0x128 [ 18.764189] kasan_check_range+0x100/0x1a8 [ 18.764241] __kasan_check_write+0x20/0x30 [ 18.764298] kasan_atomics_helper+0xeb8/0x4858 [ 18.764363] kasan_atomics+0x198/0x2e0 [ 18.764419] kunit_try_run_case+0x170/0x3f0 [ 18.764475] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.764538] kthread+0x328/0x630 [ 18.764630] ret_from_fork+0x10/0x20 [ 18.764682] [ 18.764702] Allocated by task 265: [ 18.764731] kasan_save_stack+0x3c/0x68 [ 18.764790] kasan_save_track+0x20/0x40 [ 18.764836] kasan_save_alloc_info+0x40/0x58 [ 18.764994] __kasan_kmalloc+0xd4/0xd8 [ 18.765150] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.765205] kasan_atomics+0xb8/0x2e0 [ 18.765247] kunit_try_run_case+0x170/0x3f0 [ 18.765397] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.765537] kthread+0x328/0x630 [ 18.765583] ret_from_fork+0x10/0x20 [ 18.765768] [ 18.765940] The buggy address belongs to the object at fff00000c635c500 [ 18.765940] which belongs to the cache kmalloc-64 of size 64 [ 18.766145] The buggy address is located 0 bytes to the right of [ 18.766145] allocated 48-byte region [fff00000c635c500, fff00000c635c530) [ 18.766238] [ 18.766304] The buggy address belongs to the physical page: [ 18.766566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c [ 18.766693] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.766841] page_type: f5(slab) [ 18.766917] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.766969] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.767012] page dumped because: kasan: bad access detected [ 18.767207] [ 18.767237] Memory state around the buggy address: [ 18.767274] fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.767536] fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.767612] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.767688] ^ [ 18.768015] fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.768109] fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.768167] ================================================================== [ 18.797830] ================================================================== [ 18.797924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 18.797987] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265 [ 18.798060] [ 18.798401] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.798550] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.798630] Hardware name: linux,dummy-virt (DT) [ 18.798723] Call trace: [ 18.798790] show_stack+0x20/0x38 (C) [ 18.798906] dump_stack_lvl+0x8c/0xd0 [ 18.799004] print_report+0x118/0x608 [ 18.799111] kasan_report+0xdc/0x128 [ 18.799195] kasan_check_range+0x100/0x1a8 [ 18.799247] __kasan_check_write+0x20/0x30 [ 18.799295] kasan_atomics_helper+0x1128/0x4858 [ 18.799346] kasan_atomics+0x198/0x2e0 [ 18.799394] kunit_try_run_case+0x170/0x3f0 [ 18.799444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.799657] kthread+0x328/0x630 [ 18.799763] ret_from_fork+0x10/0x20 [ 18.799881] [ 18.800210] Allocated by task 265: [ 18.800276] kasan_save_stack+0x3c/0x68 [ 18.800351] kasan_save_track+0x20/0x40 [ 18.800430] kasan_save_alloc_info+0x40/0x58 [ 18.800525] __kasan_kmalloc+0xd4/0xd8 [ 18.800603] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.800666] kasan_atomics+0xb8/0x2e0 [ 18.800725] kunit_try_run_case+0x170/0x3f0 [ 18.800792] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.800865] kthread+0x328/0x630 [ 18.800923] ret_from_fork+0x10/0x20 [ 18.800980] [ 18.801001] The buggy address belongs to the object at fff00000c635c500 [ 18.801001] which belongs to the cache kmalloc-64 of size 64 [ 18.801370] The buggy address is located 0 bytes to the right of [ 18.801370] allocated 48-byte region [fff00000c635c500, fff00000c635c530) [ 18.801486] [ 18.801524] The buggy address belongs to the physical page: [ 18.801591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c [ 18.801960] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.802033] page_type: f5(slab) [ 18.802120] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.802238] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.802282] page dumped because: kasan: bad access detected [ 18.802322] [ 18.802342] Memory state around the buggy address: [ 18.802377] fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.802423] fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.802469] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.802511] ^ [ 18.802686] fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.802973] fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.803042] ================================================================== [ 18.888223] ================================================================== [ 18.888383] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 18.888448] Read of size 8 at addr fff00000c635c530 by task kunit_try_catch/265 [ 18.888511] [ 18.888560] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.888651] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.888688] Hardware name: linux,dummy-virt (DT) [ 18.888731] Call trace: [ 18.888767] show_stack+0x20/0x38 (C) [ 18.888834] dump_stack_lvl+0x8c/0xd0 [ 18.888885] print_report+0x118/0x608 [ 18.888941] kasan_report+0xdc/0x128 [ 18.889184] __asan_report_load8_noabort+0x20/0x30 [ 18.889263] kasan_atomics_helper+0x3e10/0x4858 [ 18.889331] kasan_atomics+0x198/0x2e0 [ 18.889384] kunit_try_run_case+0x170/0x3f0 [ 18.889452] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.889529] kthread+0x328/0x630 [ 18.889575] ret_from_fork+0x10/0x20 [ 18.889627] [ 18.889647] Allocated by task 265: [ 18.889676] kasan_save_stack+0x3c/0x68 [ 18.889742] kasan_save_track+0x20/0x40 [ 18.889837] kasan_save_alloc_info+0x40/0x58 [ 18.889912] __kasan_kmalloc+0xd4/0xd8 [ 18.889951] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.890177] kasan_atomics+0xb8/0x2e0 [ 18.890391] kunit_try_run_case+0x170/0x3f0 [ 18.890437] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.890492] kthread+0x328/0x630 [ 18.890541] ret_from_fork+0x10/0x20 [ 18.890579] [ 18.890599] The buggy address belongs to the object at fff00000c635c500 [ 18.890599] which belongs to the cache kmalloc-64 of size 64 [ 18.890660] The buggy address is located 0 bytes to the right of [ 18.890660] allocated 48-byte region [fff00000c635c500, fff00000c635c530) [ 18.890736] [ 18.890767] The buggy address belongs to the physical page: [ 18.890813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c [ 18.890869] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.890924] page_type: f5(slab) [ 18.890963] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.891016] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.891070] page dumped because: kasan: bad access detected [ 18.891130] [ 18.891150] Memory state around the buggy address: [ 18.891183] fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.891238] fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.891298] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.891338] ^ [ 18.891374] fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.891428] fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.891466] ================================================================== [ 18.813873] ================================================================== [ 18.814033] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 18.814117] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265 [ 18.814224] [ 18.814296] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.814432] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.814502] Hardware name: linux,dummy-virt (DT) [ 18.814610] Call trace: [ 18.814669] show_stack+0x20/0x38 (C) [ 18.814720] dump_stack_lvl+0x8c/0xd0 [ 18.814771] print_report+0x118/0x608 [ 18.814922] kasan_report+0xdc/0x128 [ 18.814982] kasan_check_range+0x100/0x1a8 [ 18.815032] __kasan_check_write+0x20/0x30 [ 18.815180] kasan_atomics_helper+0x126c/0x4858 [ 18.815247] kasan_atomics+0x198/0x2e0 [ 18.815329] kunit_try_run_case+0x170/0x3f0 [ 18.815466] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.815563] kthread+0x328/0x630 [ 18.815617] ret_from_fork+0x10/0x20 [ 18.815667] [ 18.815687] Allocated by task 265: [ 18.815871] kasan_save_stack+0x3c/0x68 [ 18.815955] kasan_save_track+0x20/0x40 [ 18.816033] kasan_save_alloc_info+0x40/0x58 [ 18.816136] __kasan_kmalloc+0xd4/0xd8 [ 18.816214] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.816333] kasan_atomics+0xb8/0x2e0 [ 18.816411] kunit_try_run_case+0x170/0x3f0 [ 18.816487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.816598] kthread+0x328/0x630 [ 18.816653] ret_from_fork+0x10/0x20 [ 18.816690] [ 18.816954] The buggy address belongs to the object at fff00000c635c500 [ 18.816954] which belongs to the cache kmalloc-64 of size 64 [ 18.817060] The buggy address is located 0 bytes to the right of [ 18.817060] allocated 48-byte region [fff00000c635c500, fff00000c635c530) [ 18.817177] [ 18.817258] The buggy address belongs to the physical page: [ 18.817331] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c [ 18.817690] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.817794] page_type: f5(slab) [ 18.817867] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.817935] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.818000] page dumped because: kasan: bad access detected [ 18.818033] [ 18.818055] Memory state around the buggy address: [ 18.818343] fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.818474] fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.818554] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.818641] ^ [ 18.818735] fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.818812] fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.818871] ================================================================== [ 18.664800] ================================================================== [ 18.664912] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 18.665116] Write of size 4 at addr fff00000c635c530 by task kunit_try_catch/265 [ 18.665180] [ 18.665968] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.668249] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.668477] Hardware name: linux,dummy-virt (DT) [ 18.668646] Call trace: [ 18.668982] show_stack+0x20/0x38 (C) [ 18.669976] dump_stack_lvl+0x8c/0xd0 [ 18.670123] print_report+0x118/0x608 [ 18.670994] kasan_report+0xdc/0x128 [ 18.671154] kasan_check_range+0x100/0x1a8 [ 18.671215] __kasan_check_write+0x20/0x30 [ 18.671264] kasan_atomics_helper+0xa6c/0x4858 [ 18.671524] kasan_atomics+0x198/0x2e0 [ 18.671748] kunit_try_run_case+0x170/0x3f0 [ 18.671898] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.672016] kthread+0x328/0x630 [ 18.672141] ret_from_fork+0x10/0x20 [ 18.672274] [ 18.672320] Allocated by task 265: [ 18.672383] kasan_save_stack+0x3c/0x68 [ 18.672555] kasan_save_track+0x20/0x40 [ 18.672693] kasan_save_alloc_info+0x40/0x58 [ 18.672822] __kasan_kmalloc+0xd4/0xd8 [ 18.672900] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.672982] kasan_atomics+0xb8/0x2e0 [ 18.673120] kunit_try_run_case+0x170/0x3f0 [ 18.673273] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.673348] kthread+0x328/0x630 [ 18.673396] ret_from_fork+0x10/0x20 [ 18.673576] [ 18.673686] The buggy address belongs to the object at fff00000c635c500 [ 18.673686] which belongs to the cache kmalloc-64 of size 64 [ 18.673876] The buggy address is located 0 bytes to the right of [ 18.673876] allocated 48-byte region [fff00000c635c500, fff00000c635c530) [ 18.673975] [ 18.674031] The buggy address belongs to the physical page: [ 18.674094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c [ 18.674223] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.674312] page_type: f5(slab) [ 18.674501] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.674651] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.674813] page dumped because: kasan: bad access detected [ 18.674863] [ 18.674960] Memory state around the buggy address: [ 18.675014] fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.675059] fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.675130] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.675286] ^ [ 18.675407] fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.675555] fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.675634] ================================================================== [ 18.804553] ================================================================== [ 18.804771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 18.804854] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265 [ 18.804907] [ 18.804945] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.805058] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.805117] Hardware name: linux,dummy-virt (DT) [ 18.805151] Call trace: [ 18.805175] show_stack+0x20/0x38 (C) [ 18.805235] dump_stack_lvl+0x8c/0xd0 [ 18.805507] print_report+0x118/0x608 [ 18.805603] kasan_report+0xdc/0x128 [ 18.805653] kasan_check_range+0x100/0x1a8 [ 18.805721] __kasan_check_write+0x20/0x30 [ 18.805859] kasan_atomics_helper+0x1190/0x4858 [ 18.806031] kasan_atomics+0x198/0x2e0 [ 18.806265] kunit_try_run_case+0x170/0x3f0 [ 18.806461] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.806563] kthread+0x328/0x630 [ 18.806674] ret_from_fork+0x10/0x20 [ 18.806732] [ 18.806752] Allocated by task 265: [ 18.806813] kasan_save_stack+0x3c/0x68 [ 18.806855] kasan_save_track+0x20/0x40 [ 18.806912] kasan_save_alloc_info+0x40/0x58 [ 18.806954] __kasan_kmalloc+0xd4/0xd8 [ 18.807004] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.807046] kasan_atomics+0xb8/0x2e0 [ 18.807096] kunit_try_run_case+0x170/0x3f0 [ 18.807137] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.807411] kthread+0x328/0x630 [ 18.807462] ret_from_fork+0x10/0x20 [ 18.807814] [ 18.807865] The buggy address belongs to the object at fff00000c635c500 [ 18.807865] which belongs to the cache kmalloc-64 of size 64 [ 18.807981] The buggy address is located 0 bytes to the right of [ 18.807981] allocated 48-byte region [fff00000c635c500, fff00000c635c530) [ 18.808063] [ 18.808324] The buggy address belongs to the physical page: [ 18.808388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c [ 18.808451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.808542] page_type: f5(slab) [ 18.808620] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.808674] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.808717] page dumped because: kasan: bad access detected [ 18.808951] [ 18.808978] Memory state around the buggy address: [ 18.809124] fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.809207] fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.809478] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.809555] ^ [ 18.809643] fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.809712] fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.809760] ================================================================== [ 18.651502] ================================================================== [ 18.651607] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 18.651680] Write of size 4 at addr fff00000c635c530 by task kunit_try_catch/265 [ 18.651736] [ 18.651787] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.652157] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.652266] Hardware name: linux,dummy-virt (DT) [ 18.652392] Call trace: [ 18.652418] show_stack+0x20/0x38 (C) [ 18.652523] dump_stack_lvl+0x8c/0xd0 [ 18.652576] print_report+0x118/0x608 [ 18.652681] kasan_report+0xdc/0x128 [ 18.652734] kasan_check_range+0x100/0x1a8 [ 18.652788] __kasan_check_write+0x20/0x30 [ 18.652868] kasan_atomics_helper+0xa04/0x4858 [ 18.652922] kasan_atomics+0x198/0x2e0 [ 18.652990] kunit_try_run_case+0x170/0x3f0 [ 18.653103] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.653223] kthread+0x328/0x630 [ 18.653273] ret_from_fork+0x10/0x20 [ 18.653330] [ 18.653358] Allocated by task 265: [ 18.653566] kasan_save_stack+0x3c/0x68 [ 18.653809] kasan_save_track+0x20/0x40 [ 18.653869] kasan_save_alloc_info+0x40/0x58 [ 18.653911] __kasan_kmalloc+0xd4/0xd8 [ 18.654848] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.655074] kasan_atomics+0xb8/0x2e0 [ 18.655301] kunit_try_run_case+0x170/0x3f0 [ 18.655999] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.656170] kthread+0x328/0x630 [ 18.656220] ret_from_fork+0x10/0x20 [ 18.656436] [ 18.656570] The buggy address belongs to the object at fff00000c635c500 [ 18.656570] which belongs to the cache kmalloc-64 of size 64 [ 18.656659] The buggy address is located 0 bytes to the right of [ 18.656659] allocated 48-byte region [fff00000c635c500, fff00000c635c530) [ 18.656806] [ 18.657271] The buggy address belongs to the physical page: [ 18.657342] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c [ 18.658604] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.660801] page_type: f5(slab) [ 18.661322] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.661780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.661840] page dumped because: kasan: bad access detected [ 18.663072] [ 18.663283] Memory state around the buggy address: [ 18.663327] fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.663399] fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.663447] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.663496] ^ [ 18.663533] fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.663579] fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.663621] ================================================================== [ 18.843431] ================================================================== [ 18.843480] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 18.843600] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265 [ 18.843753] [ 18.844010] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.844122] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.844159] Hardware name: linux,dummy-virt (DT) [ 18.844195] Call trace: [ 18.844224] show_stack+0x20/0x38 (C) [ 18.844286] dump_stack_lvl+0x8c/0xd0 [ 18.844393] print_report+0x118/0x608 [ 18.844552] kasan_report+0xdc/0x128 [ 18.844613] kasan_check_range+0x100/0x1a8 [ 18.844666] __kasan_check_write+0x20/0x30 [ 18.844958] kasan_atomics_helper+0x147c/0x4858 [ 18.845044] kasan_atomics+0x198/0x2e0 [ 18.845107] kunit_try_run_case+0x170/0x3f0 [ 18.845164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.845229] kthread+0x328/0x630 [ 18.845292] ret_from_fork+0x10/0x20 [ 18.845394] [ 18.845562] Allocated by task 265: [ 18.845606] kasan_save_stack+0x3c/0x68 [ 18.845668] kasan_save_track+0x20/0x40 [ 18.845725] kasan_save_alloc_info+0x40/0x58 [ 18.845768] __kasan_kmalloc+0xd4/0xd8 [ 18.845827] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.845905] kasan_atomics+0xb8/0x2e0 [ 18.845945] kunit_try_run_case+0x170/0x3f0 [ 18.845985] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.846032] kthread+0x328/0x630 [ 18.846066] ret_from_fork+0x10/0x20 [ 18.846339] [ 18.846423] The buggy address belongs to the object at fff00000c635c500 [ 18.846423] which belongs to the cache kmalloc-64 of size 64 [ 18.846499] The buggy address is located 0 bytes to the right of [ 18.846499] allocated 48-byte region [fff00000c635c500, fff00000c635c530) [ 18.846581] [ 18.846635] The buggy address belongs to the physical page: [ 18.846894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c [ 18.846994] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.847110] page_type: f5(slab) [ 18.847196] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.847295] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.847338] page dumped because: kasan: bad access detected [ 18.847371] [ 18.847393] Memory state around the buggy address: [ 18.847692] fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.847796] fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.847870] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.847944] ^ [ 18.848242] fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.848325] fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.848405] ================================================================== [ 18.839108] ================================================================== [ 18.839363] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 18.839424] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265 [ 18.839537] [ 18.839592] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.839676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.839703] Hardware name: linux,dummy-virt (DT) [ 18.839753] Call trace: [ 18.839982] show_stack+0x20/0x38 (C) [ 18.840061] dump_stack_lvl+0x8c/0xd0 [ 18.840129] print_report+0x118/0x608 [ 18.840186] kasan_report+0xdc/0x128 [ 18.840242] kasan_check_range+0x100/0x1a8 [ 18.840293] __kasan_check_write+0x20/0x30 [ 18.840342] kasan_atomics_helper+0x1414/0x4858 [ 18.840392] kasan_atomics+0x198/0x2e0 [ 18.840450] kunit_try_run_case+0x170/0x3f0 [ 18.840502] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.840558] kthread+0x328/0x630 [ 18.840601] ret_from_fork+0x10/0x20 [ 18.840659] [ 18.840688] Allocated by task 265: [ 18.840717] kasan_save_stack+0x3c/0x68 [ 18.840760] kasan_save_track+0x20/0x40 [ 18.840808] kasan_save_alloc_info+0x40/0x58 [ 18.840852] __kasan_kmalloc+0xd4/0xd8 [ 18.840903] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.840954] kasan_atomics+0xb8/0x2e0 [ 18.840992] kunit_try_run_case+0x170/0x3f0 [ 18.841035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.841344] kthread+0x328/0x630 [ 18.841398] ret_from_fork+0x10/0x20 [ 18.841438] [ 18.841462] The buggy address belongs to the object at fff00000c635c500 [ 18.841462] which belongs to the cache kmalloc-64 of size 64 [ 18.841691] The buggy address is located 0 bytes to the right of [ 18.841691] allocated 48-byte region [fff00000c635c500, fff00000c635c530) [ 18.841793] [ 18.841826] The buggy address belongs to the physical page: [ 18.841879] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c [ 18.841933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.842006] page_type: f5(slab) [ 18.842290] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.842387] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.842455] page dumped because: kasan: bad access detected [ 18.842552] [ 18.842581] Memory state around the buggy address: [ 18.842616] fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.842662] fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.842708] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.842750] ^ [ 18.842820] fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.842866] fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.843026] ================================================================== [ 18.682899] ================================================================== [ 18.682953] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 18.683005] Read of size 4 at addr fff00000c635c530 by task kunit_try_catch/265 [ 18.683056] [ 18.683101] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.683197] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.683485] __asan_report_load4_noabort+0x20/0x30 [ 18.686173] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c [ 18.687435] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.698506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.701109] [ 18.701979] kasan_atomics_helper+0xc08/0x4858 [ 18.703736] kunit_try_run_case+0x170/0x3f0 [ 18.704819] [ 18.705128] page_type: f5(slab) [ 18.705793] Memory state around the buggy address: [ 18.706418] fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.712379] kasan_save_track+0x20/0x40 [ 18.713330] kthread+0x328/0x630 [ 18.714347] page_type: f5(slab) [ 18.715014] fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.717343] [ 18.717906] print_report+0x118/0x608 [ 18.718919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.719002] ret_from_fork+0x10/0x20 [ 18.719041] [ 18.719086] The buggy address belongs to the object at fff00000c635c500 [ 18.719086] which belongs to the cache kmalloc-64 of size 64 [ 18.719148] The buggy address is located 0 bytes to the right of [ 18.719148] allocated 48-byte region [fff00000c635c500, fff00000c635c530) [ 18.719214] [ 18.719261] The buggy address belongs to the physical page: [ 18.719297] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c [ 18.719362] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.719418] page_type: f5(slab) [ 18.719459] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.719511] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.719554] page dumped because: kasan: bad access detected [ 18.719587] [ 18.719613] Memory state around the buggy address: [ 18.719645] fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.719691] fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.719734] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.719774] ^ [ 18.719809] fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.719868] fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.719918] ================================================================== [ 18.783849] ================================================================== [ 18.783915] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 18.783978] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265 [ 18.784293] [ 18.784350] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.784446] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.784483] Hardware name: linux,dummy-virt (DT) [ 18.784517] Call trace: [ 18.784553] show_stack+0x20/0x38 (C) [ 18.784608] dump_stack_lvl+0x8c/0xd0 [ 18.784665] print_report+0x118/0x608 [ 18.784721] kasan_report+0xdc/0x128 [ 18.784802] kasan_check_range+0x100/0x1a8 [ 18.784869] __kasan_check_write+0x20/0x30 [ 18.784916] kasan_atomics_helper+0x1058/0x4858 [ 18.784968] kasan_atomics+0x198/0x2e0 [ 18.785199] kunit_try_run_case+0x170/0x3f0 [ 18.785339] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.785421] kthread+0x328/0x630 [ 18.785474] ret_from_fork+0x10/0x20 [ 18.785537] [ 18.785657] Allocated by task 265: [ 18.785804] kasan_save_stack+0x3c/0x68 [ 18.785895] kasan_save_track+0x20/0x40 [ 18.785983] kasan_save_alloc_info+0x40/0x58 [ 18.786096] __kasan_kmalloc+0xd4/0xd8 [ 18.786780] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.786834] kasan_atomics+0xb8/0x2e0 [ 18.786871] kunit_try_run_case+0x170/0x3f0 [ 18.786912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.786960] kthread+0x328/0x630 [ 18.787769] ret_from_fork+0x10/0x20 [ 18.789338] [ 18.789688] The buggy address belongs to the object at fff00000c635c500 [ 18.789688] which belongs to the cache kmalloc-64 of size 64 [ 18.790371] The buggy address is located 0 bytes to the right of [ 18.790371] allocated 48-byte region [fff00000c635c500, fff00000c635c530) [ 18.790642] [ 18.790679] The buggy address belongs to the physical page: [ 18.790737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c [ 18.790815] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.790901] page_type: f5(slab) [ 18.790988] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.791042] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.791266] page dumped because: kasan: bad access detected [ 18.791391] [ 18.791415] Memory state around the buggy address: [ 18.791453] fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.791500] fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.791598] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.791666] ^ [ 18.791719] fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.791789] fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.791858] ================================================================== [ 18.732522] ================================================================== [ 18.732602] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 18.732656] Read of size 4 at addr fff00000c635c530 by task kunit_try_catch/265 [ 18.732713] [ 18.732745] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.732854] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.732883] Hardware name: linux,dummy-virt (DT) [ 18.732917] Call trace: [ 18.732940] show_stack+0x20/0x38 (C) [ 18.733238] dump_stack_lvl+0x8c/0xd0 [ 18.733334] print_report+0x118/0x608 [ 18.733388] kasan_report+0xdc/0x128 [ 18.733444] __asan_report_load4_noabort+0x20/0x30 [ 18.733505] kasan_atomics_helper+0x3e04/0x4858 [ 18.733712] kasan_atomics+0x198/0x2e0 [ 18.733936] kunit_try_run_case+0x170/0x3f0 [ 18.734058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.734155] kthread+0x328/0x630 [ 18.734227] ret_from_fork+0x10/0x20 [ 18.734342] [ 18.734390] Allocated by task 265: [ 18.734461] kasan_save_stack+0x3c/0x68 [ 18.734506] kasan_save_track+0x20/0x40 [ 18.734568] kasan_save_alloc_info+0x40/0x58 [ 18.734612] __kasan_kmalloc+0xd4/0xd8 [ 18.734652] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.734922] kasan_atomics+0xb8/0x2e0 [ 18.735042] kunit_try_run_case+0x170/0x3f0 [ 18.735122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.735440] kthread+0x328/0x630 [ 18.735507] ret_from_fork+0x10/0x20 [ 18.735611] [ 18.735681] The buggy address belongs to the object at fff00000c635c500 [ 18.735681] which belongs to the cache kmalloc-64 of size 64 [ 18.735812] The buggy address is located 0 bytes to the right of [ 18.735812] allocated 48-byte region [fff00000c635c500, fff00000c635c530) [ 18.735879] [ 18.735902] The buggy address belongs to the physical page: [ 18.736052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c [ 18.736286] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.736391] page_type: f5(slab) [ 18.736484] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.736729] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.736802] page dumped because: kasan: bad access detected [ 18.736895] [ 18.736954] Memory state around the buggy address: [ 18.737007] fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.737054] fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.737214] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.737434] ^ [ 18.737493] fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.737556] fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.737733] ================================================================== [ 18.759703] ================================================================== [ 18.759756] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 18.759811] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265 [ 18.759863] [ 18.759897] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.759980] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.760009] Hardware name: linux,dummy-virt (DT) [ 18.760041] Call trace: [ 18.760066] show_stack+0x20/0x38 (C) [ 18.760140] dump_stack_lvl+0x8c/0xd0 [ 18.760193] print_report+0x118/0x608 [ 18.760241] kasan_report+0xdc/0x128 [ 18.760290] __asan_report_store8_noabort+0x20/0x30 [ 18.760352] kasan_atomics_helper+0x3e5c/0x4858 [ 18.760405] kasan_atomics+0x198/0x2e0 [ 18.760454] kunit_try_run_case+0x170/0x3f0 [ 18.760506] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.760563] kthread+0x328/0x630 [ 18.760608] ret_from_fork+0x10/0x20 [ 18.760659] [ 18.760681] Allocated by task 265: [ 18.760709] kasan_save_stack+0x3c/0x68 [ 18.760751] kasan_save_track+0x20/0x40 [ 18.760791] kasan_save_alloc_info+0x40/0x58 [ 18.760834] __kasan_kmalloc+0xd4/0xd8 [ 18.760882] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.760925] kasan_atomics+0xb8/0x2e0 [ 18.760964] kunit_try_run_case+0x170/0x3f0 [ 18.761004] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.761051] kthread+0x328/0x630 [ 18.761098] ret_from_fork+0x10/0x20 [ 18.761136] [ 18.761158] The buggy address belongs to the object at fff00000c635c500 [ 18.761158] which belongs to the cache kmalloc-64 of size 64 [ 18.761252] The buggy address is located 0 bytes to the right of [ 18.761252] allocated 48-byte region [fff00000c635c500, fff00000c635c530) [ 18.761319] [ 18.761341] The buggy address belongs to the physical page: [ 18.761374] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c [ 18.761428] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.761478] page_type: f5(slab) [ 18.761519] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.761572] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.761617] page dumped because: kasan: bad access detected [ 18.761651] [ 18.761671] Memory state around the buggy address: [ 18.762100] fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.762180] fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.762227] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.762411] ^ [ 18.762454] fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.762516] fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.762556] ================================================================== [ 18.810291] ================================================================== [ 18.810349] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 18.810547] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265 [ 18.810609] [ 18.810643] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.810726] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.810753] Hardware name: linux,dummy-virt (DT) [ 18.810786] Call trace: [ 18.810811] show_stack+0x20/0x38 (C) [ 18.810863] dump_stack_lvl+0x8c/0xd0 [ 18.810922] print_report+0x118/0x608 [ 18.810971] kasan_report+0xdc/0x128 [ 18.811028] kasan_check_range+0x100/0x1a8 [ 18.811091] __kasan_check_write+0x20/0x30 [ 18.811140] kasan_atomics_helper+0x11f8/0x4858 [ 18.811201] kasan_atomics+0x198/0x2e0 [ 18.811250] kunit_try_run_case+0x170/0x3f0 [ 18.811302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.811363] kthread+0x328/0x630 [ 18.811416] ret_from_fork+0x10/0x20 [ 18.811466] [ 18.811502] Allocated by task 265: [ 18.811531] kasan_save_stack+0x3c/0x68 [ 18.811574] kasan_save_track+0x20/0x40 [ 18.811613] kasan_save_alloc_info+0x40/0x58 [ 18.811665] __kasan_kmalloc+0xd4/0xd8 [ 18.811704] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.811752] kasan_atomics+0xb8/0x2e0 [ 18.811790] kunit_try_run_case+0x170/0x3f0 [ 18.811832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.811878] kthread+0x328/0x630 [ 18.811913] ret_from_fork+0x10/0x20 [ 18.811950] [ 18.811987] The buggy address belongs to the object at fff00000c635c500 [ 18.811987] which belongs to the cache kmalloc-64 of size 64 [ 18.812046] The buggy address is located 0 bytes to the right of [ 18.812046] allocated 48-byte region [fff00000c635c500, fff00000c635c530) [ 18.812359] [ 18.812394] The buggy address belongs to the physical page: [ 18.812590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c [ 18.812663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.812850] page_type: f5(slab) [ 18.812897] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.812951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.812995] page dumped because: kasan: bad access detected [ 18.813045] [ 18.813182] Memory state around the buggy address: [ 18.813219] fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.813266] fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.813348] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.813491] ^ [ 18.813568] fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.813613] fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.813660] ================================================================== [ 18.852755] ================================================================== [ 18.852811] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 18.852862] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265 [ 18.852969] [ 18.853003] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.853100] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.853129] Hardware name: linux,dummy-virt (DT) [ 18.853181] Call trace: [ 18.853205] show_stack+0x20/0x38 (C) [ 18.853307] dump_stack_lvl+0x8c/0xd0 [ 18.853361] print_report+0x118/0x608 [ 18.853427] kasan_report+0xdc/0x128 [ 18.853475] kasan_check_range+0x100/0x1a8 [ 18.853526] __kasan_check_write+0x20/0x30 [ 18.853597] kasan_atomics_helper+0x154c/0x4858 [ 18.853650] kasan_atomics+0x198/0x2e0 [ 18.853833] kunit_try_run_case+0x170/0x3f0 [ 18.853908] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.853980] kthread+0x328/0x630 [ 18.854026] ret_from_fork+0x10/0x20 [ 18.854237] [ 18.854333] Allocated by task 265: [ 18.854401] kasan_save_stack+0x3c/0x68 [ 18.854471] kasan_save_track+0x20/0x40 [ 18.854512] kasan_save_alloc_info+0x40/0x58 [ 18.854774] __kasan_kmalloc+0xd4/0xd8 [ 18.854843] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.854895] kasan_atomics+0xb8/0x2e0 [ 18.854955] kunit_try_run_case+0x170/0x3f0 [ 18.855045] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.855127] kthread+0x328/0x630 [ 18.855186] ret_from_fork+0x10/0x20 [ 18.855299] [ 18.855347] The buggy address belongs to the object at fff00000c635c500 [ 18.855347] which belongs to the cache kmalloc-64 of size 64 [ 18.855436] The buggy address is located 0 bytes to the right of [ 18.855436] allocated 48-byte region [fff00000c635c500, fff00000c635c530) [ 18.855540] [ 18.855594] The buggy address belongs to the physical page: [ 18.855627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c [ 18.855680] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.855866] page_type: f5(slab) [ 18.855910] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.855963] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.856028] page dumped because: kasan: bad access detected [ 18.856061] [ 18.856094] Memory state around the buggy address: [ 18.856128] fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.856466] fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.856532] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.856611] ^ [ 18.856681] fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.857010] fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.857122] ================================================================== [ 18.896758] ================================================================== [ 18.896805] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 18.896921] Read of size 8 at addr fff00000c635c530 by task kunit_try_catch/265 [ 18.896974] [ 18.897140] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.897241] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.897285] Hardware name: linux,dummy-virt (DT) [ 18.897562] Call trace: [ 18.897596] show_stack+0x20/0x38 (C) [ 18.897652] dump_stack_lvl+0x8c/0xd0 [ 18.897764] print_report+0x118/0x608 [ 18.897886] kasan_report+0xdc/0x128 [ 18.898253] __asan_report_load8_noabort+0x20/0x30 [ 18.898438] kasan_atomics_helper+0x3e20/0x4858 [ 18.898552] kasan_atomics+0x198/0x2e0 [ 18.898639] kunit_try_run_case+0x170/0x3f0 [ 18.898702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.898804] kthread+0x328/0x630 [ 18.898882] ret_from_fork+0x10/0x20 [ 18.898951] [ 18.898971] Allocated by task 265: [ 18.899186] kasan_save_stack+0x3c/0x68 [ 18.899367] kasan_save_track+0x20/0x40 [ 18.899452] kasan_save_alloc_info+0x40/0x58 [ 18.899521] __kasan_kmalloc+0xd4/0xd8 [ 18.899586] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.899855] kasan_atomics+0xb8/0x2e0 [ 18.899968] kunit_try_run_case+0x170/0x3f0 [ 18.900098] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.900174] kthread+0x328/0x630 [ 18.900259] ret_from_fork+0x10/0x20 [ 18.900347] [ 18.900418] The buggy address belongs to the object at fff00000c635c500 [ 18.900418] which belongs to the cache kmalloc-64 of size 64 [ 18.900501] The buggy address is located 0 bytes to the right of [ 18.900501] allocated 48-byte region [fff00000c635c500, fff00000c635c530) [ 18.900641] [ 18.900711] The buggy address belongs to the physical page: [ 18.900743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c [ 18.900798] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.901076] page_type: f5(slab) [ 18.901628] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.901736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.901815] page dumped because: kasan: bad access detected [ 18.901883] [ 18.902168] Memory state around the buggy address: [ 18.902235] fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.902283] fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.902444] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.902495] ^ [ 18.902530] fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.904965] fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.905378] ================================================================== [ 18.739747] ================================================================== [ 18.739819] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 18.739903] Read of size 8 at addr fff00000c635c530 by task kunit_try_catch/265 [ 18.739963] [ 18.740000] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.740105] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.740148] Hardware name: linux,dummy-virt (DT) [ 18.740197] Call trace: [ 18.740221] show_stack+0x20/0x38 (C) [ 18.740272] dump_stack_lvl+0x8c/0xd0 [ 18.740328] print_report+0x118/0x608 [ 18.740585] kasan_report+0xdc/0x128 [ 18.740661] kasan_check_range+0x100/0x1a8 [ 18.740733] __kasan_check_read+0x20/0x30 [ 18.740787] kasan_atomics_helper+0xdd4/0x4858 [ 18.740840] kasan_atomics+0x198/0x2e0 [ 18.740896] kunit_try_run_case+0x170/0x3f0 [ 18.741197] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.741280] kthread+0x328/0x630 [ 18.741337] ret_from_fork+0x10/0x20 [ 18.741392] [ 18.741417] Allocated by task 265: [ 18.741455] kasan_save_stack+0x3c/0x68 [ 18.741508] kasan_save_track+0x20/0x40 [ 18.741556] kasan_save_alloc_info+0x40/0x58 [ 18.741600] __kasan_kmalloc+0xd4/0xd8 [ 18.741654] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.741716] kasan_atomics+0xb8/0x2e0 [ 18.741823] kunit_try_run_case+0x170/0x3f0 [ 18.741867] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.741930] kthread+0x328/0x630 [ 18.741967] ret_from_fork+0x10/0x20 [ 18.742335] [ 18.742385] The buggy address belongs to the object at fff00000c635c500 [ 18.742385] which belongs to the cache kmalloc-64 of size 64 [ 18.742507] The buggy address is located 0 bytes to the right of [ 18.742507] allocated 48-byte region [fff00000c635c500, fff00000c635c530) [ 18.742853] [ 18.742929] The buggy address belongs to the physical page: [ 18.742990] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c [ 18.743063] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.743146] page_type: f5(slab) [ 18.743192] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.743247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.743288] page dumped because: kasan: bad access detected [ 18.743331] [ 18.743374] Memory state around the buggy address: [ 18.743409] fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.743469] fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.743528] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.743577] ^ [ 18.743621] fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.743665] fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.743720] ================================================================== [ 18.907254] ================================================================== [ 18.907317] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 18.907376] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265 [ 18.907485] [ 18.907533] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.907719] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.907753] Hardware name: linux,dummy-virt (DT) [ 18.907795] Call trace: [ 18.907820] show_stack+0x20/0x38 (C) [ 18.907876] dump_stack_lvl+0x8c/0xd0 [ 18.907930] print_report+0x118/0x608 [ 18.907988] kasan_report+0xdc/0x128 [ 18.908054] kasan_check_range+0x100/0x1a8 [ 18.908119] __kasan_check_write+0x20/0x30 [ 18.908166] kasan_atomics_helper+0x17ec/0x4858 [ 18.908226] kasan_atomics+0x198/0x2e0 [ 18.908273] kunit_try_run_case+0x170/0x3f0 [ 18.908324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.908513] kthread+0x328/0x630 [ 18.908560] ret_from_fork+0x10/0x20 [ 18.908655] [ 18.908683] Allocated by task 265: [ 18.908722] kasan_save_stack+0x3c/0x68 [ 18.908775] kasan_save_track+0x20/0x40 [ 18.908817] kasan_save_alloc_info+0x40/0x58 [ 18.908928] __kasan_kmalloc+0xd4/0xd8 [ 18.909005] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.909075] kasan_atomics+0xb8/0x2e0 [ 18.909223] kunit_try_run_case+0x170/0x3f0 [ 18.909276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.909322] kthread+0x328/0x630 [ 18.909378] ret_from_fork+0x10/0x20 [ 18.909418] [ 18.909440] The buggy address belongs to the object at fff00000c635c500 [ 18.909440] which belongs to the cache kmalloc-64 of size 64 [ 18.909500] The buggy address is located 0 bytes to the right of [ 18.909500] allocated 48-byte region [fff00000c635c500, fff00000c635c530) [ 18.909575] [ 18.909599] The buggy address belongs to the physical page: [ 18.909632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c [ 18.909686] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.909738] page_type: f5(slab) [ 18.909787] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.909842] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.910106] page dumped because: kasan: bad access detected [ 18.910151] [ 18.910177] Memory state around the buggy address: [ 18.910214] fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.910387] fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.910522] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.910622] ^ [ 18.910668] fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.910728] fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.910776] ================================================================== [ 18.834159] ================================================================== [ 18.834329] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 18.834417] Read of size 8 at addr fff00000c635c530 by task kunit_try_catch/265 [ 18.834479] [ 18.834566] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.834656] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.834693] Hardware name: linux,dummy-virt (DT) [ 18.834736] Call trace: [ 18.835029] show_stack+0x20/0x38 (C) [ 18.835139] dump_stack_lvl+0x8c/0xd0 [ 18.835206] print_report+0x118/0x608 [ 18.835277] kasan_report+0xdc/0x128 [ 18.835333] __asan_report_load8_noabort+0x20/0x30 [ 18.835399] kasan_atomics_helper+0x3f04/0x4858 [ 18.835450] kasan_atomics+0x198/0x2e0 [ 18.835557] kunit_try_run_case+0x170/0x3f0 [ 18.835624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.835689] kthread+0x328/0x630 [ 18.835742] ret_from_fork+0x10/0x20 [ 18.835827] [ 18.835848] Allocated by task 265: [ 18.835876] kasan_save_stack+0x3c/0x68 [ 18.835920] kasan_save_track+0x20/0x40 [ 18.835959] kasan_save_alloc_info+0x40/0x58 [ 18.836002] __kasan_kmalloc+0xd4/0xd8 [ 18.836192] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.836401] kasan_atomics+0xb8/0x2e0 [ 18.836454] kunit_try_run_case+0x170/0x3f0 [ 18.836498] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.836631] kthread+0x328/0x630 [ 18.836670] ret_from_fork+0x10/0x20 [ 18.836763] [ 18.836890] The buggy address belongs to the object at fff00000c635c500 [ 18.836890] which belongs to the cache kmalloc-64 of size 64 [ 18.836982] The buggy address is located 0 bytes to the right of [ 18.836982] allocated 48-byte region [fff00000c635c500, fff00000c635c530) [ 18.837056] [ 18.837117] The buggy address belongs to the physical page: [ 18.837151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c [ 18.837523] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.837598] page_type: f5(slab) [ 18.837642] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.837696] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.837740] page dumped because: kasan: bad access detected [ 18.837780] [ 18.837802] Memory state around the buggy address: [ 18.837844] fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.838048] fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.838154] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.838232] ^ [ 18.838317] fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.838602] fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.838700] ================================================================== [ 18.720453] ================================================================== [ 18.721058] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 18.721136] Read of size 4 at addr fff00000c635c530 by task kunit_try_catch/265 [ 18.721188] [ 18.721219] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.721302] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.721330] Hardware name: linux,dummy-virt (DT) [ 18.721363] Call trace: [ 18.721386] show_stack+0x20/0x38 (C) [ 18.721438] dump_stack_lvl+0x8c/0xd0 [ 18.721488] print_report+0x118/0x608 [ 18.721539] kasan_report+0xdc/0x128 [ 18.721588] __asan_report_load4_noabort+0x20/0x30 [ 18.721645] kasan_atomics_helper+0x3dd8/0x4858 [ 18.721697] kasan_atomics+0x198/0x2e0 [ 18.721753] kunit_try_run_case+0x170/0x3f0 [ 18.721806] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.721867] kthread+0x328/0x630 [ 18.721915] ret_from_fork+0x10/0x20 [ 18.721966] [ 18.721985] Allocated by task 265: [ 18.722015] kasan_save_stack+0x3c/0x68 [ 18.722058] kasan_save_track+0x20/0x40 [ 18.722132] kasan_save_alloc_info+0x40/0x58 [ 18.722191] __kasan_kmalloc+0xd4/0xd8 [ 18.722229] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.722294] kasan_atomics+0xb8/0x2e0 [ 18.722333] kunit_try_run_case+0x170/0x3f0 [ 18.722374] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.722819] kthread+0x328/0x630 [ 18.722886] ret_from_fork+0x10/0x20 [ 18.723000] [ 18.723072] The buggy address belongs to the object at fff00000c635c500 [ 18.723072] which belongs to the cache kmalloc-64 of size 64 [ 18.723293] The buggy address is located 0 bytes to the right of [ 18.723293] allocated 48-byte region [fff00000c635c500, fff00000c635c530) [ 18.723440] [ 18.723590] The buggy address belongs to the physical page: [ 18.723626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c [ 18.723918] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.724075] page_type: f5(slab) [ 18.724176] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.724258] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.724405] page dumped because: kasan: bad access detected [ 18.724591] [ 18.724651] Memory state around the buggy address: [ 18.724759] fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.724831] fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.724877] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.724942] ^ [ 18.725241] fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.725319] fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.725429] ================================================================== [ 18.768679] ================================================================== [ 18.768894] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 18.768948] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265 [ 18.769191] [ 18.769258] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.769350] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.769388] Hardware name: linux,dummy-virt (DT) [ 18.769421] Call trace: [ 18.769460] show_stack+0x20/0x38 (C) [ 18.769538] dump_stack_lvl+0x8c/0xd0 [ 18.769594] print_report+0x118/0x608 [ 18.769660] kasan_report+0xdc/0x128 [ 18.769710] kasan_check_range+0x100/0x1a8 [ 18.769763] __kasan_check_write+0x20/0x30 [ 18.769821] kasan_atomics_helper+0xf20/0x4858 [ 18.769880] kasan_atomics+0x198/0x2e0 [ 18.769939] kunit_try_run_case+0x170/0x3f0 [ 18.769995] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.770051] kthread+0x328/0x630 [ 18.770411] ret_from_fork+0x10/0x20 [ 18.770644] [ 18.770684] Allocated by task 265: [ 18.770761] kasan_save_stack+0x3c/0x68 [ 18.770973] kasan_save_track+0x20/0x40 [ 18.771201] kasan_save_alloc_info+0x40/0x58 [ 18.771325] __kasan_kmalloc+0xd4/0xd8 [ 18.771404] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.771490] kasan_atomics+0xb8/0x2e0 [ 18.771610] kunit_try_run_case+0x170/0x3f0 [ 18.771677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.771751] kthread+0x328/0x630 [ 18.771786] ret_from_fork+0x10/0x20 [ 18.771825] [ 18.772091] The buggy address belongs to the object at fff00000c635c500 [ 18.772091] which belongs to the cache kmalloc-64 of size 64 [ 18.772235] The buggy address is located 0 bytes to the right of [ 18.772235] allocated 48-byte region [fff00000c635c500, fff00000c635c530) [ 18.772332] [ 18.772397] The buggy address belongs to the physical page: [ 18.772719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c [ 18.772839] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.772974] page_type: f5(slab) [ 18.773039] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.773102] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.773304] page dumped because: kasan: bad access detected [ 18.773474] [ 18.773535] Memory state around the buggy address: [ 18.773658] fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.773731] fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.774034] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.774093] ^ [ 18.774166] fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.774213] fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.774254] ================================================================== [ 18.819495] ================================================================== [ 18.819765] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 18.819826] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265 [ 18.820067] [ 18.820260] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.820376] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.820414] Hardware name: linux,dummy-virt (DT) [ 18.820448] Call trace: [ 18.820478] show_stack+0x20/0x38 (C) [ 18.820541] dump_stack_lvl+0x8c/0xd0 [ 18.820616] print_report+0x118/0x608 [ 18.820672] kasan_report+0xdc/0x128 [ 18.820728] kasan_check_range+0x100/0x1a8 [ 18.820778] __kasan_check_write+0x20/0x30 [ 18.820863] kasan_atomics_helper+0x12d8/0x4858 [ 18.820919] kasan_atomics+0x198/0x2e0 [ 18.820975] kunit_try_run_case+0x170/0x3f0 [ 18.821027] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.821127] kthread+0x328/0x630 [ 18.821171] ret_from_fork+0x10/0x20 [ 18.821222] [ 18.821249] Allocated by task 265: [ 18.821285] kasan_save_stack+0x3c/0x68 [ 18.821328] kasan_save_track+0x20/0x40 [ 18.821461] kasan_save_alloc_info+0x40/0x58 [ 18.821508] __kasan_kmalloc+0xd4/0xd8 [ 18.821591] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.821742] kasan_atomics+0xb8/0x2e0 [ 18.821883] kunit_try_run_case+0x170/0x3f0 [ 18.822062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.822148] kthread+0x328/0x630 [ 18.822221] ret_from_fork+0x10/0x20 [ 18.822289] [ 18.822356] The buggy address belongs to the object at fff00000c635c500 [ 18.822356] which belongs to the cache kmalloc-64 of size 64 [ 18.822494] The buggy address is located 0 bytes to the right of [ 18.822494] allocated 48-byte region [fff00000c635c500, fff00000c635c530) [ 18.822606] [ 18.822715] The buggy address belongs to the physical page: [ 18.822781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c [ 18.822834] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.822884] page_type: f5(slab) [ 18.823047] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.823112] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.823157] page dumped because: kasan: bad access detected [ 18.823378] [ 18.823453] Memory state around the buggy address: [ 18.823518] fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.823772] fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.823842] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.823897] ^ [ 18.823934] fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.823976] fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.824016] ================================================================== [ 18.792914] ================================================================== [ 18.792981] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 18.793105] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265 [ 18.793170] [ 18.793217] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.793550] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.793604] Hardware name: linux,dummy-virt (DT) [ 18.793642] Call trace: [ 18.793678] show_stack+0x20/0x38 (C) [ 18.793733] dump_stack_lvl+0x8c/0xd0 [ 18.793827] print_report+0x118/0x608 [ 18.793918] kasan_report+0xdc/0x128 [ 18.794028] kasan_check_range+0x100/0x1a8 [ 18.794113] __kasan_check_write+0x20/0x30 [ 18.794284] kasan_atomics_helper+0x10c0/0x4858 [ 18.794337] kasan_atomics+0x198/0x2e0 [ 18.794385] kunit_try_run_case+0x170/0x3f0 [ 18.794436] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.794492] kthread+0x328/0x630 [ 18.794689] ret_from_fork+0x10/0x20 [ 18.794776] [ 18.794816] Allocated by task 265: [ 18.794919] kasan_save_stack+0x3c/0x68 [ 18.794993] kasan_save_track+0x20/0x40 [ 18.795066] kasan_save_alloc_info+0x40/0x58 [ 18.795317] __kasan_kmalloc+0xd4/0xd8 [ 18.795421] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.795508] kasan_atomics+0xb8/0x2e0 [ 18.795587] kunit_try_run_case+0x170/0x3f0 [ 18.795661] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.795749] kthread+0x328/0x630 [ 18.795796] ret_from_fork+0x10/0x20 [ 18.795835] [ 18.795872] The buggy address belongs to the object at fff00000c635c500 [ 18.795872] which belongs to the cache kmalloc-64 of size 64 [ 18.795934] The buggy address is located 0 bytes to the right of [ 18.795934] allocated 48-byte region [fff00000c635c500, fff00000c635c530) [ 18.795999] [ 18.796038] The buggy address belongs to the physical page: [ 18.796091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c [ 18.796146] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.796209] page_type: f5(slab) [ 18.796251] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.796303] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.796346] page dumped because: kasan: bad access detected [ 18.796381] [ 18.796415] Memory state around the buggy address: [ 18.796451] fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.796497] fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.796542] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.796584] ^ [ 18.796617] fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.796670] fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.796719] ================================================================== [ 18.754504] ================================================================== [ 18.754560] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 18.754613] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265 [ 18.754825] [ 18.755015] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.755243] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.755276] Hardware name: linux,dummy-virt (DT) [ 18.755310] Call trace: [ 18.755430] show_stack+0x20/0x38 (C) [ 18.755557] dump_stack_lvl+0x8c/0xd0 [ 18.755621] print_report+0x118/0x608 [ 18.755694] kasan_report+0xdc/0x128 [ 18.755749] kasan_check_range+0x100/0x1a8 [ 18.755952] __kasan_check_write+0x20/0x30 [ 18.756069] kasan_atomics_helper+0xe44/0x4858 [ 18.756143] kasan_atomics+0x198/0x2e0 [ 18.756205] kunit_try_run_case+0x170/0x3f0 [ 18.756272] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.756337] kthread+0x328/0x630 [ 18.756385] ret_from_fork+0x10/0x20 [ 18.756455] [ 18.756484] Allocated by task 265: [ 18.756522] kasan_save_stack+0x3c/0x68 [ 18.756566] kasan_save_track+0x20/0x40 [ 18.756623] kasan_save_alloc_info+0x40/0x58 [ 18.756708] __kasan_kmalloc+0xd4/0xd8 [ 18.756755] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.756798] kasan_atomics+0xb8/0x2e0 [ 18.756837] kunit_try_run_case+0x170/0x3f0 [ 18.756878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.757094] kthread+0x328/0x630 [ 18.757139] ret_from_fork+0x10/0x20 [ 18.757271] [ 18.757298] The buggy address belongs to the object at fff00000c635c500 [ 18.757298] which belongs to the cache kmalloc-64 of size 64 [ 18.757370] The buggy address is located 0 bytes to the right of [ 18.757370] allocated 48-byte region [fff00000c635c500, fff00000c635c530) [ 18.757442] [ 18.757482] The buggy address belongs to the physical page: [ 18.757526] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c [ 18.757691] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.757745] page_type: f5(slab) [ 18.758005] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.758096] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.758142] page dumped because: kasan: bad access detected [ 18.758176] [ 18.758196] Memory state around the buggy address: [ 18.758459] fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.758566] fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.758624] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.758717] ^ [ 18.758786] fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.758878] fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.759105] ================================================================== [ 18.644711] ================================================================== [ 18.644780] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 18.644834] Write of size 4 at addr fff00000c635c530 by task kunit_try_catch/265 [ 18.644953] [ 18.645004] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.645196] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.645230] Hardware name: linux,dummy-virt (DT) [ 18.645265] Call trace: [ 18.645288] show_stack+0x20/0x38 (C) [ 18.645350] dump_stack_lvl+0x8c/0xd0 [ 18.645544] print_report+0x118/0x608 [ 18.645608] kasan_report+0xdc/0x128 [ 18.645710] kasan_check_range+0x100/0x1a8 [ 18.645962] __kasan_check_write+0x20/0x30 [ 18.646029] kasan_atomics_helper+0x99c/0x4858 [ 18.646215] kasan_atomics+0x198/0x2e0 [ 18.646275] kunit_try_run_case+0x170/0x3f0 [ 18.646327] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.646610] kthread+0x328/0x630 [ 18.646781] ret_from_fork+0x10/0x20 [ 18.646946] [ 18.647011] Allocated by task 265: [ 18.647095] kasan_save_stack+0x3c/0x68 [ 18.647268] kasan_save_track+0x20/0x40 [ 18.647345] kasan_save_alloc_info+0x40/0x58 [ 18.647398] __kasan_kmalloc+0xd4/0xd8 [ 18.647589] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.647695] kasan_atomics+0xb8/0x2e0 [ 18.647778] kunit_try_run_case+0x170/0x3f0 [ 18.647962] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.648028] kthread+0x328/0x630 [ 18.648251] ret_from_fork+0x10/0x20 [ 18.648399] [ 18.648447] The buggy address belongs to the object at fff00000c635c500 [ 18.648447] which belongs to the cache kmalloc-64 of size 64 [ 18.648612] The buggy address is located 0 bytes to the right of [ 18.648612] allocated 48-byte region [fff00000c635c500, fff00000c635c530) [ 18.648706] [ 18.648752] The buggy address belongs to the physical page: [ 18.648915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c [ 18.648982] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.649033] page_type: f5(slab) [ 18.649324] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.649448] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.649531] page dumped because: kasan: bad access detected [ 18.649888] [ 18.650104] Memory state around the buggy address: [ 18.650143] fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.650191] fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.650238] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.650279] ^ [ 18.650315] fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.650359] fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.650402] ================================================================== [ 18.891714] ================================================================== [ 18.891764] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 18.891813] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265 [ 18.891863] [ 18.891893] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.891975] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.892003] Hardware name: linux,dummy-virt (DT) [ 18.892046] Call trace: [ 18.892071] show_stack+0x20/0x38 (C) [ 18.892610] dump_stack_lvl+0x8c/0xd0 [ 18.892829] print_report+0x118/0x608 [ 18.892894] kasan_report+0xdc/0x128 [ 18.892975] kasan_check_range+0x100/0x1a8 [ 18.893031] __kasan_check_write+0x20/0x30 [ 18.893127] kasan_atomics_helper+0x175c/0x4858 [ 18.893179] kasan_atomics+0x198/0x2e0 [ 18.893228] kunit_try_run_case+0x170/0x3f0 [ 18.893564] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.893648] kthread+0x328/0x630 [ 18.893824] ret_from_fork+0x10/0x20 [ 18.894106] [ 18.894152] Allocated by task 265: [ 18.894181] kasan_save_stack+0x3c/0x68 [ 18.894240] kasan_save_track+0x20/0x40 [ 18.894320] kasan_save_alloc_info+0x40/0x58 [ 18.894390] __kasan_kmalloc+0xd4/0xd8 [ 18.894458] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.894518] kasan_atomics+0xb8/0x2e0 [ 18.894562] kunit_try_run_case+0x170/0x3f0 [ 18.894642] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.894708] kthread+0x328/0x630 [ 18.894757] ret_from_fork+0x10/0x20 [ 18.894835] [ 18.894926] The buggy address belongs to the object at fff00000c635c500 [ 18.894926] which belongs to the cache kmalloc-64 of size 64 [ 18.894987] The buggy address is located 0 bytes to the right of [ 18.894987] allocated 48-byte region [fff00000c635c500, fff00000c635c530) [ 18.895072] [ 18.895105] The buggy address belongs to the physical page: [ 18.895138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c [ 18.895191] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.895294] page_type: f5(slab) [ 18.895481] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.895559] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.895649] page dumped because: kasan: bad access detected [ 18.895717] [ 18.895771] Memory state around the buggy address: [ 18.896072] fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.896169] fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.896273] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.896341] ^ [ 18.896427] fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.896508] fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.896566] ================================================================== [ 18.877471] ================================================================== [ 18.877527] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 18.877581] Read of size 8 at addr fff00000c635c530 by task kunit_try_catch/265 [ 18.877638] [ 18.877671] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.877752] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.877835] Hardware name: linux,dummy-virt (DT) [ 18.878007] Call trace: [ 18.878242] show_stack+0x20/0x38 (C) [ 18.878331] dump_stack_lvl+0x8c/0xd0 [ 18.878425] print_report+0x118/0x608 [ 18.878504] kasan_report+0xdc/0x128 [ 18.878616] __asan_report_load8_noabort+0x20/0x30 [ 18.878712] kasan_atomics_helper+0x3df4/0x4858 [ 18.878765] kasan_atomics+0x198/0x2e0 [ 18.878923] kunit_try_run_case+0x170/0x3f0 [ 18.878975] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.879201] kthread+0x328/0x630 [ 18.879279] ret_from_fork+0x10/0x20 [ 18.879352] [ 18.879433] Allocated by task 265: [ 18.879512] kasan_save_stack+0x3c/0x68 [ 18.879785] kasan_save_track+0x20/0x40 [ 18.879920] kasan_save_alloc_info+0x40/0x58 [ 18.879993] __kasan_kmalloc+0xd4/0xd8 [ 18.880059] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.880169] kasan_atomics+0xb8/0x2e0 [ 18.880247] kunit_try_run_case+0x170/0x3f0 [ 18.880312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.880408] kthread+0x328/0x630 [ 18.880454] ret_from_fork+0x10/0x20 [ 18.880493] [ 18.880513] The buggy address belongs to the object at fff00000c635c500 [ 18.880513] which belongs to the cache kmalloc-64 of size 64 [ 18.880735] The buggy address is located 0 bytes to the right of [ 18.880735] allocated 48-byte region [fff00000c635c500, fff00000c635c530) [ 18.880917] [ 18.880976] The buggy address belongs to the physical page: [ 18.881052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c [ 18.881322] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.881399] page_type: f5(slab) [ 18.881482] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.881557] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.881645] page dumped because: kasan: bad access detected [ 18.881679] [ 18.881699] Memory state around the buggy address: [ 18.881732] fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.881779] fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.881829] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.881871] ^ [ 18.881907] fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.882040] fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.882222] ================================================================== [ 18.872307] ================================================================== [ 18.872356] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 18.872408] Write of size 8 at addr fff00000c635c530 by task kunit_try_catch/265 [ 18.872506] [ 18.872648] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.872791] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.872837] Hardware name: linux,dummy-virt (DT) [ 18.873021] Call trace: [ 18.873090] show_stack+0x20/0x38 (C) [ 18.873166] dump_stack_lvl+0x8c/0xd0 [ 18.873220] print_report+0x118/0x608 [ 18.873282] kasan_report+0xdc/0x128 [ 18.873347] kasan_check_range+0x100/0x1a8 [ 18.873398] __kasan_check_write+0x20/0x30 [ 18.873446] kasan_atomics_helper+0x1644/0x4858 [ 18.873496] kasan_atomics+0x198/0x2e0 [ 18.873566] kunit_try_run_case+0x170/0x3f0 [ 18.873721] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.873825] kthread+0x328/0x630 [ 18.873904] ret_from_fork+0x10/0x20 [ 18.873999] [ 18.874261] Allocated by task 265: [ 18.874333] kasan_save_stack+0x3c/0x68 [ 18.874409] kasan_save_track+0x20/0x40 [ 18.874451] kasan_save_alloc_info+0x40/0x58 [ 18.874519] __kasan_kmalloc+0xd4/0xd8 [ 18.874598] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.874669] kasan_atomics+0xb8/0x2e0 [ 18.874731] kunit_try_run_case+0x170/0x3f0 [ 18.874785] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.874859] kthread+0x328/0x630 [ 18.874928] ret_from_fork+0x10/0x20 [ 18.874983] [ 18.875006] The buggy address belongs to the object at fff00000c635c500 [ 18.875006] which belongs to the cache kmalloc-64 of size 64 [ 18.875088] The buggy address is located 0 bytes to the right of [ 18.875088] allocated 48-byte region [fff00000c635c500, fff00000c635c530) [ 18.875159] [ 18.875182] The buggy address belongs to the physical page: [ 18.875214] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c [ 18.875267] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.875316] page_type: f5(slab) [ 18.875504] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.875589] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.875654] page dumped because: kasan: bad access detected [ 18.875751] [ 18.875813] Memory state around the buggy address: [ 18.876062] fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.876238] fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.876285] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.876328] ^ [ 18.876384] fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.876725] fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.876822] ================================================================== [ 18.676999] ================================================================== [ 18.677061] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 18.677132] Write of size 4 at addr fff00000c635c530 by task kunit_try_catch/265 [ 18.677374] [ 18.677447] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.677537] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.677566] Hardware name: linux,dummy-virt (DT) [ 18.677694] Call trace: [ 18.677729] show_stack+0x20/0x38 (C) [ 18.677902] dump_stack_lvl+0x8c/0xd0 [ 18.677955] print_report+0x118/0x608 [ 18.678004] kasan_report+0xdc/0x128 [ 18.678443] kasan_check_range+0x100/0x1a8 [ 18.678605] __kasan_check_write+0x20/0x30 [ 18.678703] kasan_atomics_helper+0xad4/0x4858 [ 18.678790] kasan_atomics+0x198/0x2e0 [ 18.678920] kunit_try_run_case+0x170/0x3f0 [ 18.678984] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.679274] kthread+0x328/0x630 [ 18.679380] ret_from_fork+0x10/0x20 [ 18.679543] [ 18.679582] Allocated by task 265: [ 18.679631] kasan_save_stack+0x3c/0x68 [ 18.679709] kasan_save_track+0x20/0x40 [ 18.679807] kasan_save_alloc_info+0x40/0x58 [ 18.679884] __kasan_kmalloc+0xd4/0xd8 [ 18.679962] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.680006] kasan_atomics+0xb8/0x2e0 [ 18.680342] kunit_try_run_case+0x170/0x3f0 [ 18.680478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.680545] kthread+0x328/0x630 [ 18.680604] ret_from_fork+0x10/0x20 [ 18.680748] [ 18.680787] The buggy address belongs to the object at fff00000c635c500 [ 18.680787] which belongs to the cache kmalloc-64 of size 64 [ 18.680925] The buggy address is located 0 bytes to the right of [ 18.680925] allocated 48-byte region [fff00000c635c500, fff00000c635c530) [ 18.681043] [ 18.681288] The buggy address belongs to the physical page: [ 18.681436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635c [ 18.681588] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.681674] page_type: f5(slab) [ 18.681724] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.681851] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.681912] page dumped because: kasan: bad access detected [ 18.681947] [ 18.681967] Memory state around the buggy address: [ 18.682012] fff00000c635c400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.682059] fff00000c635c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.682126] >fff00000c635c500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.682167] ^ [ 18.682201] fff00000c635c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.682247] fff00000c635c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.682298] ==================================================================
[ 16.488272] ================================================================== [ 16.488870] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 16.489423] Read of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 16.489857] [ 16.489957] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.489998] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.490010] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.490031] Call Trace: [ 16.490045] <TASK> [ 16.490060] dump_stack_lvl+0x73/0xb0 [ 16.490091] print_report+0xd1/0x650 [ 16.490114] ? __virt_addr_valid+0x1db/0x2d0 [ 16.490138] ? kasan_atomics_helper+0x5115/0x5450 [ 16.490161] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.490186] ? kasan_atomics_helper+0x5115/0x5450 [ 16.490209] kasan_report+0x141/0x180 [ 16.490232] ? kasan_atomics_helper+0x5115/0x5450 [ 16.490260] __asan_report_load8_noabort+0x18/0x20 [ 16.490286] kasan_atomics_helper+0x5115/0x5450 [ 16.490310] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.490335] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.490376] ? kasan_atomics+0x152/0x310 [ 16.490404] kasan_atomics+0x1dc/0x310 [ 16.490429] ? __pfx_kasan_atomics+0x10/0x10 [ 16.490454] ? __pfx_read_tsc+0x10/0x10 [ 16.490476] ? ktime_get_ts64+0x86/0x230 [ 16.490502] kunit_try_run_case+0x1a5/0x480 [ 16.490527] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.490551] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.490576] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.490602] ? __kthread_parkme+0x82/0x180 [ 16.490624] ? preempt_count_sub+0x50/0x80 [ 16.490649] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.490675] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.490701] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.490727] kthread+0x337/0x6f0 [ 16.490747] ? trace_preempt_on+0x20/0xc0 [ 16.490772] ? __pfx_kthread+0x10/0x10 [ 16.490793] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.490817] ? calculate_sigpending+0x7b/0xa0 [ 16.490842] ? __pfx_kthread+0x10/0x10 [ 16.490864] ret_from_fork+0x116/0x1d0 [ 16.490884] ? __pfx_kthread+0x10/0x10 [ 16.490905] ret_from_fork_asm+0x1a/0x30 [ 16.490938] </TASK> [ 16.490949] [ 16.499101] Allocated by task 283: [ 16.499300] kasan_save_stack+0x45/0x70 [ 16.499615] kasan_save_track+0x18/0x40 [ 16.499813] kasan_save_alloc_info+0x3b/0x50 [ 16.500038] __kasan_kmalloc+0xb7/0xc0 [ 16.500254] __kmalloc_cache_noprof+0x189/0x420 [ 16.500553] kasan_atomics+0x95/0x310 [ 16.500770] kunit_try_run_case+0x1a5/0x480 [ 16.500998] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.501282] kthread+0x337/0x6f0 [ 16.501514] ret_from_fork+0x116/0x1d0 [ 16.501708] ret_from_fork_asm+0x1a/0x30 [ 16.501906] [ 16.502047] The buggy address belongs to the object at ffff8881039b8c80 [ 16.502047] which belongs to the cache kmalloc-64 of size 64 [ 16.502592] The buggy address is located 0 bytes to the right of [ 16.502592] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 16.503151] [ 16.503259] The buggy address belongs to the physical page: [ 16.503556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 16.503965] flags: 0x200000000000000(node=0|zone=2) [ 16.504236] page_type: f5(slab) [ 16.504471] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.504828] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.505166] page dumped because: kasan: bad access detected [ 16.505373] [ 16.505531] Memory state around the buggy address: [ 16.505758] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.506017] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.506233] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.506747] ^ [ 16.507006] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.507389] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.507744] ================================================================== [ 15.575551] ================================================================== [ 15.575884] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 15.576231] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.576634] [ 15.576750] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.576792] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.576805] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.576826] Call Trace: [ 15.576840] <TASK> [ 15.576855] dump_stack_lvl+0x73/0xb0 [ 15.576886] print_report+0xd1/0x650 [ 15.576908] ? __virt_addr_valid+0x1db/0x2d0 [ 15.576932] ? kasan_atomics_helper+0xde0/0x5450 [ 15.576956] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.576980] ? kasan_atomics_helper+0xde0/0x5450 [ 15.577004] kasan_report+0x141/0x180 [ 15.577026] ? kasan_atomics_helper+0xde0/0x5450 [ 15.577054] kasan_check_range+0x10c/0x1c0 [ 15.577079] __kasan_check_write+0x18/0x20 [ 15.577099] kasan_atomics_helper+0xde0/0x5450 [ 15.577123] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.577147] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.577173] ? kasan_atomics+0x152/0x310 [ 15.577200] kasan_atomics+0x1dc/0x310 [ 15.577224] ? __pfx_kasan_atomics+0x10/0x10 [ 15.577250] ? __pfx_read_tsc+0x10/0x10 [ 15.577273] ? ktime_get_ts64+0x86/0x230 [ 15.577297] kunit_try_run_case+0x1a5/0x480 [ 15.577322] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.577361] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.577387] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.577455] ? __kthread_parkme+0x82/0x180 [ 15.577480] ? preempt_count_sub+0x50/0x80 [ 15.577505] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.577532] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.577559] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.577586] kthread+0x337/0x6f0 [ 15.577606] ? trace_preempt_on+0x20/0xc0 [ 15.577630] ? __pfx_kthread+0x10/0x10 [ 15.577652] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.577675] ? calculate_sigpending+0x7b/0xa0 [ 15.577700] ? __pfx_kthread+0x10/0x10 [ 15.577723] ret_from_fork+0x116/0x1d0 [ 15.577743] ? __pfx_kthread+0x10/0x10 [ 15.577765] ret_from_fork_asm+0x1a/0x30 [ 15.577797] </TASK> [ 15.577808] [ 15.585188] Allocated by task 283: [ 15.585319] kasan_save_stack+0x45/0x70 [ 15.585534] kasan_save_track+0x18/0x40 [ 15.585732] kasan_save_alloc_info+0x3b/0x50 [ 15.585949] __kasan_kmalloc+0xb7/0xc0 [ 15.586388] __kmalloc_cache_noprof+0x189/0x420 [ 15.586628] kasan_atomics+0x95/0x310 [ 15.587138] kunit_try_run_case+0x1a5/0x480 [ 15.588122] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.588635] kthread+0x337/0x6f0 [ 15.589119] ret_from_fork+0x116/0x1d0 [ 15.589775] ret_from_fork_asm+0x1a/0x30 [ 15.590377] [ 15.590505] The buggy address belongs to the object at ffff8881039b8c80 [ 15.590505] which belongs to the cache kmalloc-64 of size 64 [ 15.590867] The buggy address is located 0 bytes to the right of [ 15.590867] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 15.591235] [ 15.591309] The buggy address belongs to the physical page: [ 15.592533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.593798] flags: 0x200000000000000(node=0|zone=2) [ 15.594573] page_type: f5(slab) [ 15.594962] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.595999] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.597061] page dumped because: kasan: bad access detected [ 15.597609] [ 15.597690] Memory state around the buggy address: [ 15.597848] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.598947] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.599848] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.600510] ^ [ 15.601042] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.601536] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.601757] ================================================================== [ 16.200625] ================================================================== [ 16.200961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 16.201566] Read of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 16.201867] [ 16.201977] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.202018] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.202030] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.202051] Call Trace: [ 16.202066] <TASK> [ 16.202081] dump_stack_lvl+0x73/0xb0 [ 16.202132] print_report+0xd1/0x650 [ 16.202170] ? __virt_addr_valid+0x1db/0x2d0 [ 16.202209] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.202245] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.202297] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.202333] kasan_report+0x141/0x180 [ 16.202382] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.202423] __asan_report_load8_noabort+0x18/0x20 [ 16.202464] kasan_atomics_helper+0x4f30/0x5450 [ 16.202488] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.202513] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.202538] ? kasan_atomics+0x152/0x310 [ 16.202566] kasan_atomics+0x1dc/0x310 [ 16.202590] ? __pfx_kasan_atomics+0x10/0x10 [ 16.202616] ? __pfx_read_tsc+0x10/0x10 [ 16.202638] ? ktime_get_ts64+0x86/0x230 [ 16.202663] kunit_try_run_case+0x1a5/0x480 [ 16.202688] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.202711] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.202738] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.202764] ? __kthread_parkme+0x82/0x180 [ 16.202785] ? preempt_count_sub+0x50/0x80 [ 16.202821] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.202846] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.202871] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.202899] kthread+0x337/0x6f0 [ 16.202919] ? trace_preempt_on+0x20/0xc0 [ 16.202943] ? __pfx_kthread+0x10/0x10 [ 16.202964] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.202987] ? calculate_sigpending+0x7b/0xa0 [ 16.203012] ? __pfx_kthread+0x10/0x10 [ 16.203034] ret_from_fork+0x116/0x1d0 [ 16.203054] ? __pfx_kthread+0x10/0x10 [ 16.203076] ret_from_fork_asm+0x1a/0x30 [ 16.203107] </TASK> [ 16.203118] [ 16.211892] Allocated by task 283: [ 16.212073] kasan_save_stack+0x45/0x70 [ 16.212265] kasan_save_track+0x18/0x40 [ 16.212805] kasan_save_alloc_info+0x3b/0x50 [ 16.213053] __kasan_kmalloc+0xb7/0xc0 [ 16.213480] __kmalloc_cache_noprof+0x189/0x420 [ 16.213763] kasan_atomics+0x95/0x310 [ 16.213952] kunit_try_run_case+0x1a5/0x480 [ 16.214143] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.214695] kthread+0x337/0x6f0 [ 16.215004] ret_from_fork+0x116/0x1d0 [ 16.215318] ret_from_fork_asm+0x1a/0x30 [ 16.215704] [ 16.215801] The buggy address belongs to the object at ffff8881039b8c80 [ 16.215801] which belongs to the cache kmalloc-64 of size 64 [ 16.216274] The buggy address is located 0 bytes to the right of [ 16.216274] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 16.217510] [ 16.217600] The buggy address belongs to the physical page: [ 16.217980] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 16.218602] flags: 0x200000000000000(node=0|zone=2) [ 16.218963] page_type: f5(slab) [ 16.219249] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.219925] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.220380] page dumped because: kasan: bad access detected [ 16.220889] [ 16.220993] Memory state around the buggy address: [ 16.221333] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.222131] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.222584] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.222875] ^ [ 16.223063] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.223356] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.224194] ================================================================== [ 16.247913] ================================================================== [ 16.248548] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 16.248932] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 16.249244] [ 16.249380] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.249424] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.249437] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.249478] Call Trace: [ 16.249493] <TASK> [ 16.249508] dump_stack_lvl+0x73/0xb0 [ 16.249539] print_report+0xd1/0x650 [ 16.249562] ? __virt_addr_valid+0x1db/0x2d0 [ 16.249585] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.249608] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.249649] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.249686] kasan_report+0x141/0x180 [ 16.249723] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.249777] kasan_check_range+0x10c/0x1c0 [ 16.249803] __kasan_check_write+0x18/0x20 [ 16.249837] kasan_atomics_helper+0x1d7a/0x5450 [ 16.249875] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.249913] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.249952] ? kasan_atomics+0x152/0x310 [ 16.249979] kasan_atomics+0x1dc/0x310 [ 16.250003] ? __pfx_kasan_atomics+0x10/0x10 [ 16.250028] ? __pfx_read_tsc+0x10/0x10 [ 16.250051] ? ktime_get_ts64+0x86/0x230 [ 16.250075] kunit_try_run_case+0x1a5/0x480 [ 16.250100] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.250124] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.250148] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.250174] ? __kthread_parkme+0x82/0x180 [ 16.250195] ? preempt_count_sub+0x50/0x80 [ 16.250219] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.250245] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.250271] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.250297] kthread+0x337/0x6f0 [ 16.250317] ? trace_preempt_on+0x20/0xc0 [ 16.250351] ? __pfx_kthread+0x10/0x10 [ 16.250373] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.250396] ? calculate_sigpending+0x7b/0xa0 [ 16.250431] ? __pfx_kthread+0x10/0x10 [ 16.250454] ret_from_fork+0x116/0x1d0 [ 16.250473] ? __pfx_kthread+0x10/0x10 [ 16.250495] ret_from_fork_asm+0x1a/0x30 [ 16.250545] </TASK> [ 16.250556] [ 16.258318] Allocated by task 283: [ 16.258459] kasan_save_stack+0x45/0x70 [ 16.258604] kasan_save_track+0x18/0x40 [ 16.258740] kasan_save_alloc_info+0x3b/0x50 [ 16.258952] __kasan_kmalloc+0xb7/0xc0 [ 16.259145] __kmalloc_cache_noprof+0x189/0x420 [ 16.259407] kasan_atomics+0x95/0x310 [ 16.259705] kunit_try_run_case+0x1a5/0x480 [ 16.259877] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.260052] kthread+0x337/0x6f0 [ 16.260176] ret_from_fork+0x116/0x1d0 [ 16.260309] ret_from_fork_asm+0x1a/0x30 [ 16.260736] [ 16.260836] The buggy address belongs to the object at ffff8881039b8c80 [ 16.260836] which belongs to the cache kmalloc-64 of size 64 [ 16.261408] The buggy address is located 0 bytes to the right of [ 16.261408] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 16.262037] [ 16.262168] The buggy address belongs to the physical page: [ 16.262451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 16.263077] flags: 0x200000000000000(node=0|zone=2) [ 16.263314] page_type: f5(slab) [ 16.263608] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.263950] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.264201] page dumped because: kasan: bad access detected [ 16.264388] [ 16.264574] Memory state around the buggy address: [ 16.264807] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.265153] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.265543] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.265800] ^ [ 16.265957] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.266173] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.266597] ================================================================== [ 15.379496] ================================================================== [ 15.379841] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 15.380178] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.380611] [ 15.380727] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.380768] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.380781] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.380801] Call Trace: [ 15.380817] <TASK> [ 15.380833] dump_stack_lvl+0x73/0xb0 [ 15.380862] print_report+0xd1/0x650 [ 15.380885] ? __virt_addr_valid+0x1db/0x2d0 [ 15.380908] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.380931] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.380955] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.380979] kasan_report+0x141/0x180 [ 15.381002] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.381030] kasan_check_range+0x10c/0x1c0 [ 15.381055] __kasan_check_write+0x18/0x20 [ 15.381075] kasan_atomics_helper+0x7c7/0x5450 [ 15.381099] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.381124] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.381150] ? kasan_atomics+0x152/0x310 [ 15.381177] kasan_atomics+0x1dc/0x310 [ 15.381201] ? __pfx_kasan_atomics+0x10/0x10 [ 15.381227] ? __pfx_read_tsc+0x10/0x10 [ 15.381249] ? ktime_get_ts64+0x86/0x230 [ 15.381274] kunit_try_run_case+0x1a5/0x480 [ 15.381299] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.381323] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.381436] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.381469] ? __kthread_parkme+0x82/0x180 [ 15.381491] ? preempt_count_sub+0x50/0x80 [ 15.381516] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.381542] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.381569] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.381596] kthread+0x337/0x6f0 [ 15.381616] ? trace_preempt_on+0x20/0xc0 [ 15.381640] ? __pfx_kthread+0x10/0x10 [ 15.381661] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.381684] ? calculate_sigpending+0x7b/0xa0 [ 15.381707] ? __pfx_kthread+0x10/0x10 [ 15.381750] ret_from_fork+0x116/0x1d0 [ 15.381784] ? __pfx_kthread+0x10/0x10 [ 15.381806] ret_from_fork_asm+0x1a/0x30 [ 15.381850] </TASK> [ 15.381875] [ 15.390514] Allocated by task 283: [ 15.390693] kasan_save_stack+0x45/0x70 [ 15.390870] kasan_save_track+0x18/0x40 [ 15.391009] kasan_save_alloc_info+0x3b/0x50 [ 15.391157] __kasan_kmalloc+0xb7/0xc0 [ 15.391308] __kmalloc_cache_noprof+0x189/0x420 [ 15.391842] kasan_atomics+0x95/0x310 [ 15.392063] kunit_try_run_case+0x1a5/0x480 [ 15.392303] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.392632] kthread+0x337/0x6f0 [ 15.392789] ret_from_fork+0x116/0x1d0 [ 15.393277] ret_from_fork_asm+0x1a/0x30 [ 15.393453] [ 15.393561] The buggy address belongs to the object at ffff8881039b8c80 [ 15.393561] which belongs to the cache kmalloc-64 of size 64 [ 15.394167] The buggy address is located 0 bytes to the right of [ 15.394167] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 15.394541] [ 15.394614] The buggy address belongs to the physical page: [ 15.394782] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.395014] flags: 0x200000000000000(node=0|zone=2) [ 15.395174] page_type: f5(slab) [ 15.395343] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.396053] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.396480] page dumped because: kasan: bad access detected [ 15.396777] [ 15.396908] Memory state around the buggy address: [ 15.397151] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.397590] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.397977] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.398290] ^ [ 15.398531] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.399630] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.399951] ================================================================== [ 16.098274] ================================================================== [ 16.098960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 16.099283] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 16.100127] [ 16.100401] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.100576] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.100592] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.100613] Call Trace: [ 16.100626] <TASK> [ 16.100641] dump_stack_lvl+0x73/0xb0 [ 16.100681] print_report+0xd1/0x650 [ 16.100706] ? __virt_addr_valid+0x1db/0x2d0 [ 16.100730] ? kasan_atomics_helper+0x194a/0x5450 [ 16.100754] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.100779] ? kasan_atomics_helper+0x194a/0x5450 [ 16.100803] kasan_report+0x141/0x180 [ 16.100826] ? kasan_atomics_helper+0x194a/0x5450 [ 16.100854] kasan_check_range+0x10c/0x1c0 [ 16.100878] __kasan_check_write+0x18/0x20 [ 16.100898] kasan_atomics_helper+0x194a/0x5450 [ 16.100922] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.100946] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.100972] ? kasan_atomics+0x152/0x310 [ 16.100999] kasan_atomics+0x1dc/0x310 [ 16.101023] ? __pfx_kasan_atomics+0x10/0x10 [ 16.101048] ? __pfx_read_tsc+0x10/0x10 [ 16.101070] ? ktime_get_ts64+0x86/0x230 [ 16.101094] kunit_try_run_case+0x1a5/0x480 [ 16.101118] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.101142] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.101167] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.101192] ? __kthread_parkme+0x82/0x180 [ 16.101213] ? preempt_count_sub+0x50/0x80 [ 16.101238] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.101264] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.101290] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.101316] kthread+0x337/0x6f0 [ 16.101335] ? trace_preempt_on+0x20/0xc0 [ 16.101370] ? __pfx_kthread+0x10/0x10 [ 16.101392] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.101428] ? calculate_sigpending+0x7b/0xa0 [ 16.101453] ? __pfx_kthread+0x10/0x10 [ 16.101476] ret_from_fork+0x116/0x1d0 [ 16.101494] ? __pfx_kthread+0x10/0x10 [ 16.101515] ret_from_fork_asm+0x1a/0x30 [ 16.101547] </TASK> [ 16.101559] [ 16.108875] Allocated by task 283: [ 16.109055] kasan_save_stack+0x45/0x70 [ 16.109214] kasan_save_track+0x18/0x40 [ 16.109359] kasan_save_alloc_info+0x3b/0x50 [ 16.109505] __kasan_kmalloc+0xb7/0xc0 [ 16.109688] __kmalloc_cache_noprof+0x189/0x420 [ 16.109906] kasan_atomics+0x95/0x310 [ 16.110193] kunit_try_run_case+0x1a5/0x480 [ 16.110418] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.110597] kthread+0x337/0x6f0 [ 16.110717] ret_from_fork+0x116/0x1d0 [ 16.110846] ret_from_fork_asm+0x1a/0x30 [ 16.110982] [ 16.111069] The buggy address belongs to the object at ffff8881039b8c80 [ 16.111069] which belongs to the cache kmalloc-64 of size 64 [ 16.111626] The buggy address is located 0 bytes to the right of [ 16.111626] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 16.112282] [ 16.112363] The buggy address belongs to the physical page: [ 16.112532] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 16.113000] flags: 0x200000000000000(node=0|zone=2) [ 16.113228] page_type: f5(slab) [ 16.113403] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.113699] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.113919] page dumped because: kasan: bad access detected [ 16.114108] [ 16.114200] Memory state around the buggy address: [ 16.114473] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.114798] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.115140] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.115365] ^ [ 16.115742] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.116021] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.116327] ================================================================== [ 16.157633] ================================================================== [ 16.157962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 16.158669] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 16.159005] [ 16.159249] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.159316] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.159355] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.159377] Call Trace: [ 16.159392] <TASK> [ 16.159421] dump_stack_lvl+0x73/0xb0 [ 16.159609] print_report+0xd1/0x650 [ 16.159634] ? __virt_addr_valid+0x1db/0x2d0 [ 16.159658] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.159682] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.159707] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.159729] kasan_report+0x141/0x180 [ 16.159752] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.159780] kasan_check_range+0x10c/0x1c0 [ 16.159805] __kasan_check_write+0x18/0x20 [ 16.159826] kasan_atomics_helper+0x1b22/0x5450 [ 16.159850] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.159874] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.159900] ? kasan_atomics+0x152/0x310 [ 16.159927] kasan_atomics+0x1dc/0x310 [ 16.159953] ? __pfx_kasan_atomics+0x10/0x10 [ 16.159979] ? __pfx_read_tsc+0x10/0x10 [ 16.160001] ? ktime_get_ts64+0x86/0x230 [ 16.160026] kunit_try_run_case+0x1a5/0x480 [ 16.160050] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.160074] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.160101] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.160126] ? __kthread_parkme+0x82/0x180 [ 16.160147] ? preempt_count_sub+0x50/0x80 [ 16.160177] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.160203] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.160227] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.160254] kthread+0x337/0x6f0 [ 16.160274] ? trace_preempt_on+0x20/0xc0 [ 16.160297] ? __pfx_kthread+0x10/0x10 [ 16.160319] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.160353] ? calculate_sigpending+0x7b/0xa0 [ 16.160379] ? __pfx_kthread+0x10/0x10 [ 16.160401] ret_from_fork+0x116/0x1d0 [ 16.160433] ? __pfx_kthread+0x10/0x10 [ 16.160455] ret_from_fork_asm+0x1a/0x30 [ 16.160486] </TASK> [ 16.160497] [ 16.170535] Allocated by task 283: [ 16.170897] kasan_save_stack+0x45/0x70 [ 16.171154] kasan_save_track+0x18/0x40 [ 16.171437] kasan_save_alloc_info+0x3b/0x50 [ 16.171851] __kasan_kmalloc+0xb7/0xc0 [ 16.172136] __kmalloc_cache_noprof+0x189/0x420 [ 16.172296] kasan_atomics+0x95/0x310 [ 16.172466] kunit_try_run_case+0x1a5/0x480 [ 16.172884] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.173378] kthread+0x337/0x6f0 [ 16.173700] ret_from_fork+0x116/0x1d0 [ 16.174050] ret_from_fork_asm+0x1a/0x30 [ 16.174447] [ 16.174581] The buggy address belongs to the object at ffff8881039b8c80 [ 16.174581] which belongs to the cache kmalloc-64 of size 64 [ 16.174918] The buggy address is located 0 bytes to the right of [ 16.174918] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 16.175269] [ 16.175339] The buggy address belongs to the physical page: [ 16.175587] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 16.176060] flags: 0x200000000000000(node=0|zone=2) [ 16.176228] page_type: f5(slab) [ 16.176373] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.177016] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.177392] page dumped because: kasan: bad access detected [ 16.177949] [ 16.178036] Memory state around the buggy address: [ 16.178482] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.178816] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.179235] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.179770] ^ [ 16.179971] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.180364] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.180786] ================================================================== [ 16.387264] ================================================================== [ 16.387633] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 16.387988] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 16.388321] [ 16.388463] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.388518] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.388530] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.388550] Call Trace: [ 16.388567] <TASK> [ 16.388591] dump_stack_lvl+0x73/0xb0 [ 16.388620] print_report+0xd1/0x650 [ 16.388643] ? __virt_addr_valid+0x1db/0x2d0 [ 16.388677] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.388700] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.388724] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.388756] kasan_report+0x141/0x180 [ 16.388779] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.388807] kasan_check_range+0x10c/0x1c0 [ 16.388842] __kasan_check_write+0x18/0x20 [ 16.388863] kasan_atomics_helper+0x20c8/0x5450 [ 16.388887] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.388910] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.388936] ? kasan_atomics+0x152/0x310 [ 16.388964] kasan_atomics+0x1dc/0x310 [ 16.388987] ? __pfx_kasan_atomics+0x10/0x10 [ 16.389013] ? __pfx_read_tsc+0x10/0x10 [ 16.389035] ? ktime_get_ts64+0x86/0x230 [ 16.389059] kunit_try_run_case+0x1a5/0x480 [ 16.389084] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.389108] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.389133] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.389158] ? __kthread_parkme+0x82/0x180 [ 16.389180] ? preempt_count_sub+0x50/0x80 [ 16.389204] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.389230] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.389255] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.389281] kthread+0x337/0x6f0 [ 16.389301] ? trace_preempt_on+0x20/0xc0 [ 16.389325] ? __pfx_kthread+0x10/0x10 [ 16.389359] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.389390] ? calculate_sigpending+0x7b/0xa0 [ 16.389438] ? __pfx_kthread+0x10/0x10 [ 16.389461] ret_from_fork+0x116/0x1d0 [ 16.389481] ? __pfx_kthread+0x10/0x10 [ 16.389503] ret_from_fork_asm+0x1a/0x30 [ 16.389535] </TASK> [ 16.389545] [ 16.397127] Allocated by task 283: [ 16.397300] kasan_save_stack+0x45/0x70 [ 16.397515] kasan_save_track+0x18/0x40 [ 16.397655] kasan_save_alloc_info+0x3b/0x50 [ 16.397806] __kasan_kmalloc+0xb7/0xc0 [ 16.397984] __kmalloc_cache_noprof+0x189/0x420 [ 16.398241] kasan_atomics+0x95/0x310 [ 16.398493] kunit_try_run_case+0x1a5/0x480 [ 16.398711] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.398965] kthread+0x337/0x6f0 [ 16.399113] ret_from_fork+0x116/0x1d0 [ 16.399247] ret_from_fork_asm+0x1a/0x30 [ 16.399456] [ 16.399556] The buggy address belongs to the object at ffff8881039b8c80 [ 16.399556] which belongs to the cache kmalloc-64 of size 64 [ 16.400074] The buggy address is located 0 bytes to the right of [ 16.400074] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 16.400636] [ 16.400710] The buggy address belongs to the physical page: [ 16.400882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 16.401125] flags: 0x200000000000000(node=0|zone=2) [ 16.401291] page_type: f5(slab) [ 16.401512] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.401852] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.402201] page dumped because: kasan: bad access detected [ 16.402489] [ 16.402586] Memory state around the buggy address: [ 16.402835] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.403154] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.403405] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.403620] ^ [ 16.403774] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.404069] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.404408] ================================================================== [ 15.927218] ================================================================== [ 15.927575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 15.928028] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.928261] [ 15.928438] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.928483] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.928509] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.928530] Call Trace: [ 15.928543] <TASK> [ 15.928557] dump_stack_lvl+0x73/0xb0 [ 15.928616] print_report+0xd1/0x650 [ 15.928639] ? __virt_addr_valid+0x1db/0x2d0 [ 15.928674] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.928697] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.928721] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.928745] kasan_report+0x141/0x180 [ 15.928767] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.928794] __asan_report_store8_noabort+0x1b/0x30 [ 15.928821] kasan_atomics_helper+0x50d4/0x5450 [ 15.928846] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.928870] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.928896] ? kasan_atomics+0x152/0x310 [ 15.928924] kasan_atomics+0x1dc/0x310 [ 15.928947] ? __pfx_kasan_atomics+0x10/0x10 [ 15.928973] ? __pfx_read_tsc+0x10/0x10 [ 15.928995] ? ktime_get_ts64+0x86/0x230 [ 15.929019] kunit_try_run_case+0x1a5/0x480 [ 15.929044] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.929100] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.929125] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.929178] ? __kthread_parkme+0x82/0x180 [ 15.929201] ? preempt_count_sub+0x50/0x80 [ 15.929225] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.929263] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.929289] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.929315] kthread+0x337/0x6f0 [ 15.929335] ? trace_preempt_on+0x20/0xc0 [ 15.929371] ? __pfx_kthread+0x10/0x10 [ 15.929393] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.929415] ? calculate_sigpending+0x7b/0xa0 [ 15.929440] ? __pfx_kthread+0x10/0x10 [ 15.929462] ret_from_fork+0x116/0x1d0 [ 15.929482] ? __pfx_kthread+0x10/0x10 [ 15.929504] ret_from_fork_asm+0x1a/0x30 [ 15.929535] </TASK> [ 15.929546] [ 15.937649] Allocated by task 283: [ 15.937780] kasan_save_stack+0x45/0x70 [ 15.938031] kasan_save_track+0x18/0x40 [ 15.938225] kasan_save_alloc_info+0x3b/0x50 [ 15.938532] __kasan_kmalloc+0xb7/0xc0 [ 15.938684] __kmalloc_cache_noprof+0x189/0x420 [ 15.938844] kasan_atomics+0x95/0x310 [ 15.939018] kunit_try_run_case+0x1a5/0x480 [ 15.939250] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.939639] kthread+0x337/0x6f0 [ 15.939853] ret_from_fork+0x116/0x1d0 [ 15.940044] ret_from_fork_asm+0x1a/0x30 [ 15.940192] [ 15.940366] The buggy address belongs to the object at ffff8881039b8c80 [ 15.940366] which belongs to the cache kmalloc-64 of size 64 [ 15.940823] The buggy address is located 0 bytes to the right of [ 15.940823] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 15.941174] [ 15.941266] The buggy address belongs to the physical page: [ 15.941636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.942001] flags: 0x200000000000000(node=0|zone=2) [ 15.942212] page_type: f5(slab) [ 15.942365] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.942713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.943065] page dumped because: kasan: bad access detected [ 15.943315] [ 15.943425] Memory state around the buggy address: [ 15.943647] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.943958] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.944171] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.944425] ^ [ 15.944683] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.945019] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.945402] ================================================================== [ 15.185074] ================================================================== [ 15.185335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 15.186171] Read of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.186930] [ 15.187158] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.187206] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.187219] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.187239] Call Trace: [ 15.187254] <TASK> [ 15.187427] dump_stack_lvl+0x73/0xb0 [ 15.187462] print_report+0xd1/0x650 [ 15.187485] ? __virt_addr_valid+0x1db/0x2d0 [ 15.187509] ? kasan_atomics_helper+0x3df/0x5450 [ 15.187531] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.187556] ? kasan_atomics_helper+0x3df/0x5450 [ 15.187579] kasan_report+0x141/0x180 [ 15.187602] ? kasan_atomics_helper+0x3df/0x5450 [ 15.187630] kasan_check_range+0x10c/0x1c0 [ 15.187655] __kasan_check_read+0x15/0x20 [ 15.187675] kasan_atomics_helper+0x3df/0x5450 [ 15.187699] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.187723] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.187750] ? kasan_atomics+0x152/0x310 [ 15.187777] kasan_atomics+0x1dc/0x310 [ 15.187800] ? __pfx_kasan_atomics+0x10/0x10 [ 15.187825] ? __pfx_read_tsc+0x10/0x10 [ 15.187847] ? ktime_get_ts64+0x86/0x230 [ 15.187871] kunit_try_run_case+0x1a5/0x480 [ 15.187897] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.187921] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.187946] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.187972] ? __kthread_parkme+0x82/0x180 [ 15.187993] ? preempt_count_sub+0x50/0x80 [ 15.188018] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.188044] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.188070] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.188097] kthread+0x337/0x6f0 [ 15.188117] ? trace_preempt_on+0x20/0xc0 [ 15.188142] ? __pfx_kthread+0x10/0x10 [ 15.188164] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.188191] ? calculate_sigpending+0x7b/0xa0 [ 15.188217] ? __pfx_kthread+0x10/0x10 [ 15.188239] ret_from_fork+0x116/0x1d0 [ 15.188259] ? __pfx_kthread+0x10/0x10 [ 15.188281] ret_from_fork_asm+0x1a/0x30 [ 15.188312] </TASK> [ 15.188323] [ 15.200010] Allocated by task 283: [ 15.200333] kasan_save_stack+0x45/0x70 [ 15.200697] kasan_save_track+0x18/0x40 [ 15.200866] kasan_save_alloc_info+0x3b/0x50 [ 15.201087] __kasan_kmalloc+0xb7/0xc0 [ 15.201261] __kmalloc_cache_noprof+0x189/0x420 [ 15.201871] kasan_atomics+0x95/0x310 [ 15.202040] kunit_try_run_case+0x1a5/0x480 [ 15.202394] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.202958] kthread+0x337/0x6f0 [ 15.203105] ret_from_fork+0x116/0x1d0 [ 15.203563] ret_from_fork_asm+0x1a/0x30 [ 15.203890] [ 15.204091] The buggy address belongs to the object at ffff8881039b8c80 [ 15.204091] which belongs to the cache kmalloc-64 of size 64 [ 15.205094] The buggy address is located 0 bytes to the right of [ 15.205094] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 15.205874] [ 15.205959] The buggy address belongs to the physical page: [ 15.206275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.206845] flags: 0x200000000000000(node=0|zone=2) [ 15.207169] page_type: f5(slab) [ 15.207510] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.207927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.208237] page dumped because: kasan: bad access detected [ 15.208787] [ 15.208884] Memory state around the buggy address: [ 15.209231] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.209712] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.210027] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.210361] ^ [ 15.210965] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.211367] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.211862] ================================================================== [ 15.689074] ================================================================== [ 15.689783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 15.690162] Read of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.690676] [ 15.690796] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.690836] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.690848] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.690879] Call Trace: [ 15.690892] <TASK> [ 15.690906] dump_stack_lvl+0x73/0xb0 [ 15.690935] print_report+0xd1/0x650 [ 15.690968] ? __virt_addr_valid+0x1db/0x2d0 [ 15.690991] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.691013] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.691048] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.691072] kasan_report+0x141/0x180 [ 15.691094] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.691130] __asan_report_load4_noabort+0x18/0x20 [ 15.691156] kasan_atomics_helper+0x4a36/0x5450 [ 15.691180] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.691215] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.691242] ? kasan_atomics+0x152/0x310 [ 15.691270] kasan_atomics+0x1dc/0x310 [ 15.691293] ? __pfx_kasan_atomics+0x10/0x10 [ 15.691319] ? __pfx_read_tsc+0x10/0x10 [ 15.691342] ? ktime_get_ts64+0x86/0x230 [ 15.691377] kunit_try_run_case+0x1a5/0x480 [ 15.691402] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.691434] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.691468] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.691494] ? __kthread_parkme+0x82/0x180 [ 15.691516] ? preempt_count_sub+0x50/0x80 [ 15.691551] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.691577] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.691603] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.691630] kthread+0x337/0x6f0 [ 15.691650] ? trace_preempt_on+0x20/0xc0 [ 15.691676] ? __pfx_kthread+0x10/0x10 [ 15.691698] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.691729] ? calculate_sigpending+0x7b/0xa0 [ 15.691755] ? __pfx_kthread+0x10/0x10 [ 15.691777] ret_from_fork+0x116/0x1d0 [ 15.691807] ? __pfx_kthread+0x10/0x10 [ 15.691828] ret_from_fork_asm+0x1a/0x30 [ 15.691860] </TASK> [ 15.691872] [ 15.699546] Allocated by task 283: [ 15.699827] kasan_save_stack+0x45/0x70 [ 15.699967] kasan_save_track+0x18/0x40 [ 15.700100] kasan_save_alloc_info+0x3b/0x50 [ 15.700252] __kasan_kmalloc+0xb7/0xc0 [ 15.700414] __kmalloc_cache_noprof+0x189/0x420 [ 15.700643] kasan_atomics+0x95/0x310 [ 15.700863] kunit_try_run_case+0x1a5/0x480 [ 15.701109] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.701404] kthread+0x337/0x6f0 [ 15.701585] ret_from_fork+0x116/0x1d0 [ 15.701784] ret_from_fork_asm+0x1a/0x30 [ 15.702020] [ 15.702129] The buggy address belongs to the object at ffff8881039b8c80 [ 15.702129] which belongs to the cache kmalloc-64 of size 64 [ 15.702697] The buggy address is located 0 bytes to the right of [ 15.702697] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 15.703126] [ 15.703198] The buggy address belongs to the physical page: [ 15.703388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.703771] flags: 0x200000000000000(node=0|zone=2) [ 15.704028] page_type: f5(slab) [ 15.704230] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.704564] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.704841] page dumped because: kasan: bad access detected [ 15.705120] [ 15.705214] Memory state around the buggy address: [ 15.705468] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.705734] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.706040] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.706334] ^ [ 15.706580] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.706794] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.707007] ================================================================== [ 15.868563] ================================================================== [ 15.868919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 15.869278] Read of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.869507] [ 15.869588] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.869627] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.869638] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.869675] Call Trace: [ 15.869722] <TASK> [ 15.869736] dump_stack_lvl+0x73/0xb0 [ 15.869765] print_report+0xd1/0x650 [ 15.869801] ? __virt_addr_valid+0x1db/0x2d0 [ 15.869824] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.869847] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.869871] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.869895] kasan_report+0x141/0x180 [ 15.869917] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.869945] kasan_check_range+0x10c/0x1c0 [ 15.869969] __kasan_check_read+0x15/0x20 [ 15.869989] kasan_atomics_helper+0x13b5/0x5450 [ 15.870013] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.870037] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.870063] ? kasan_atomics+0x152/0x310 [ 15.870089] kasan_atomics+0x1dc/0x310 [ 15.870113] ? __pfx_kasan_atomics+0x10/0x10 [ 15.870138] ? __pfx_read_tsc+0x10/0x10 [ 15.870161] ? ktime_get_ts64+0x86/0x230 [ 15.870185] kunit_try_run_case+0x1a5/0x480 [ 15.870210] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.870233] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.870258] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.870283] ? __kthread_parkme+0x82/0x180 [ 15.870305] ? preempt_count_sub+0x50/0x80 [ 15.870329] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.870363] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.870390] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.870460] kthread+0x337/0x6f0 [ 15.870492] ? trace_preempt_on+0x20/0xc0 [ 15.870527] ? __pfx_kthread+0x10/0x10 [ 15.870549] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.870572] ? calculate_sigpending+0x7b/0xa0 [ 15.870597] ? __pfx_kthread+0x10/0x10 [ 15.870620] ret_from_fork+0x116/0x1d0 [ 15.870639] ? __pfx_kthread+0x10/0x10 [ 15.870660] ret_from_fork_asm+0x1a/0x30 [ 15.870692] </TASK> [ 15.870703] [ 15.878589] Allocated by task 283: [ 15.878831] kasan_save_stack+0x45/0x70 [ 15.879072] kasan_save_track+0x18/0x40 [ 15.879322] kasan_save_alloc_info+0x3b/0x50 [ 15.879560] __kasan_kmalloc+0xb7/0xc0 [ 15.879697] __kmalloc_cache_noprof+0x189/0x420 [ 15.879854] kasan_atomics+0x95/0x310 [ 15.879988] kunit_try_run_case+0x1a5/0x480 [ 15.880203] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.880567] kthread+0x337/0x6f0 [ 15.880754] ret_from_fork+0x116/0x1d0 [ 15.880944] ret_from_fork_asm+0x1a/0x30 [ 15.881145] [ 15.881243] The buggy address belongs to the object at ffff8881039b8c80 [ 15.881243] which belongs to the cache kmalloc-64 of size 64 [ 15.881834] The buggy address is located 0 bytes to the right of [ 15.881834] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 15.882315] [ 15.882399] The buggy address belongs to the physical page: [ 15.882574] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.882972] flags: 0x200000000000000(node=0|zone=2) [ 15.883210] page_type: f5(slab) [ 15.883385] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.883854] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.884216] page dumped because: kasan: bad access detected [ 15.884401] [ 15.884507] Memory state around the buggy address: [ 15.884767] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.885151] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.885378] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.885646] ^ [ 15.885874] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.886195] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.886671] ================================================================== [ 15.906059] ================================================================== [ 15.906553] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 15.906959] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.907209] [ 15.907320] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.907406] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.907418] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.907451] Call Trace: [ 15.907466] <TASK> [ 15.907489] dump_stack_lvl+0x73/0xb0 [ 15.907549] print_report+0xd1/0x650 [ 15.907573] ? __virt_addr_valid+0x1db/0x2d0 [ 15.907609] ? kasan_atomics_helper+0x1467/0x5450 [ 15.907631] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.907655] ? kasan_atomics_helper+0x1467/0x5450 [ 15.907678] kasan_report+0x141/0x180 [ 15.907701] ? kasan_atomics_helper+0x1467/0x5450 [ 15.907729] kasan_check_range+0x10c/0x1c0 [ 15.907753] __kasan_check_write+0x18/0x20 [ 15.907773] kasan_atomics_helper+0x1467/0x5450 [ 15.907798] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.907853] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.907880] ? kasan_atomics+0x152/0x310 [ 15.907918] kasan_atomics+0x1dc/0x310 [ 15.907942] ? __pfx_kasan_atomics+0x10/0x10 [ 15.907994] ? __pfx_read_tsc+0x10/0x10 [ 15.908017] ? ktime_get_ts64+0x86/0x230 [ 15.908064] kunit_try_run_case+0x1a5/0x480 [ 15.908115] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.908139] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.908168] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.908204] ? __kthread_parkme+0x82/0x180 [ 15.908227] ? preempt_count_sub+0x50/0x80 [ 15.908252] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.908277] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.908303] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.908330] kthread+0x337/0x6f0 [ 15.908374] ? trace_preempt_on+0x20/0xc0 [ 15.908398] ? __pfx_kthread+0x10/0x10 [ 15.908432] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.908454] ? calculate_sigpending+0x7b/0xa0 [ 15.908479] ? __pfx_kthread+0x10/0x10 [ 15.908514] ret_from_fork+0x116/0x1d0 [ 15.908533] ? __pfx_kthread+0x10/0x10 [ 15.908554] ret_from_fork_asm+0x1a/0x30 [ 15.908597] </TASK> [ 15.908608] [ 15.917693] Allocated by task 283: [ 15.917854] kasan_save_stack+0x45/0x70 [ 15.918332] kasan_save_track+0x18/0x40 [ 15.918709] kasan_save_alloc_info+0x3b/0x50 [ 15.918947] __kasan_kmalloc+0xb7/0xc0 [ 15.919139] __kmalloc_cache_noprof+0x189/0x420 [ 15.919356] kasan_atomics+0x95/0x310 [ 15.919573] kunit_try_run_case+0x1a5/0x480 [ 15.919722] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.920198] kthread+0x337/0x6f0 [ 15.920599] ret_from_fork+0x116/0x1d0 [ 15.920746] ret_from_fork_asm+0x1a/0x30 [ 15.920945] [ 15.921030] The buggy address belongs to the object at ffff8881039b8c80 [ 15.921030] which belongs to the cache kmalloc-64 of size 64 [ 15.921510] The buggy address is located 0 bytes to the right of [ 15.921510] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 15.922162] [ 15.922286] The buggy address belongs to the physical page: [ 15.922483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.922880] flags: 0x200000000000000(node=0|zone=2) [ 15.923228] page_type: f5(slab) [ 15.923405] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.923792] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.924129] page dumped because: kasan: bad access detected [ 15.924450] [ 15.924582] Memory state around the buggy address: [ 15.924868] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.925120] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.925509] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.925873] ^ [ 15.926102] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.926502] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.926797] ================================================================== [ 15.809301] ================================================================== [ 15.809779] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 15.810038] Read of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.810375] [ 15.810536] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.810576] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.810588] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.810609] Call Trace: [ 15.810623] <TASK> [ 15.810636] dump_stack_lvl+0x73/0xb0 [ 15.810664] print_report+0xd1/0x650 [ 15.810687] ? __virt_addr_valid+0x1db/0x2d0 [ 15.810711] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.810734] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.810759] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.810782] kasan_report+0x141/0x180 [ 15.810804] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.810832] __asan_report_load4_noabort+0x18/0x20 [ 15.810857] kasan_atomics_helper+0x49e8/0x5450 [ 15.810881] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.810905] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.810931] ? kasan_atomics+0x152/0x310 [ 15.810958] kasan_atomics+0x1dc/0x310 [ 15.810982] ? __pfx_kasan_atomics+0x10/0x10 [ 15.811007] ? __pfx_read_tsc+0x10/0x10 [ 15.811029] ? ktime_get_ts64+0x86/0x230 [ 15.811053] kunit_try_run_case+0x1a5/0x480 [ 15.811078] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.811102] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.811127] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.811153] ? __kthread_parkme+0x82/0x180 [ 15.811176] ? preempt_count_sub+0x50/0x80 [ 15.811201] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.811227] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.811253] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.811279] kthread+0x337/0x6f0 [ 15.811299] ? trace_preempt_on+0x20/0xc0 [ 15.811322] ? __pfx_kthread+0x10/0x10 [ 15.811356] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.811379] ? calculate_sigpending+0x7b/0xa0 [ 15.811404] ? __pfx_kthread+0x10/0x10 [ 15.811426] ret_from_fork+0x116/0x1d0 [ 15.811446] ? __pfx_kthread+0x10/0x10 [ 15.811468] ret_from_fork_asm+0x1a/0x30 [ 15.811500] </TASK> [ 15.811511] [ 15.821173] Allocated by task 283: [ 15.821354] kasan_save_stack+0x45/0x70 [ 15.822072] kasan_save_track+0x18/0x40 [ 15.822595] kasan_save_alloc_info+0x3b/0x50 [ 15.822770] __kasan_kmalloc+0xb7/0xc0 [ 15.822908] __kmalloc_cache_noprof+0x189/0x420 [ 15.823068] kasan_atomics+0x95/0x310 [ 15.823205] kunit_try_run_case+0x1a5/0x480 [ 15.823369] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.823634] kthread+0x337/0x6f0 [ 15.823891] ret_from_fork+0x116/0x1d0 [ 15.824084] ret_from_fork_asm+0x1a/0x30 [ 15.824283] [ 15.824491] The buggy address belongs to the object at ffff8881039b8c80 [ 15.824491] which belongs to the cache kmalloc-64 of size 64 [ 15.825030] The buggy address is located 0 bytes to the right of [ 15.825030] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 15.825651] [ 15.825816] The buggy address belongs to the physical page: [ 15.826029] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.826412] flags: 0x200000000000000(node=0|zone=2) [ 15.826639] page_type: f5(slab) [ 15.826771] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.827089] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.827492] page dumped because: kasan: bad access detected [ 15.827736] [ 15.827813] Memory state around the buggy address: [ 15.827963] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.828449] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.828773] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.829043] ^ [ 15.829272] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.829697] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.829963] ================================================================== [ 16.315597] ================================================================== [ 16.315954] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 16.316201] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 16.316526] [ 16.316641] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.316686] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.316699] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.316721] Call Trace: [ 16.316737] <TASK> [ 16.316753] dump_stack_lvl+0x73/0xb0 [ 16.316783] print_report+0xd1/0x650 [ 16.316807] ? __virt_addr_valid+0x1db/0x2d0 [ 16.316830] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.316853] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.316877] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.316900] kasan_report+0x141/0x180 [ 16.316923] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.316963] kasan_check_range+0x10c/0x1c0 [ 16.316988] __kasan_check_write+0x18/0x20 [ 16.317010] kasan_atomics_helper+0x1f43/0x5450 [ 16.317045] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.317071] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.317097] ? kasan_atomics+0x152/0x310 [ 16.317125] kasan_atomics+0x1dc/0x310 [ 16.317149] ? __pfx_kasan_atomics+0x10/0x10 [ 16.317178] ? __pfx_read_tsc+0x10/0x10 [ 16.317201] ? ktime_get_ts64+0x86/0x230 [ 16.317227] kunit_try_run_case+0x1a5/0x480 [ 16.317252] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.317277] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.317312] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.317337] ? __kthread_parkme+0x82/0x180 [ 16.317374] ? preempt_count_sub+0x50/0x80 [ 16.317419] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.317446] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.317482] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.317508] kthread+0x337/0x6f0 [ 16.317528] ? trace_preempt_on+0x20/0xc0 [ 16.317563] ? __pfx_kthread+0x10/0x10 [ 16.317585] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.317609] ? calculate_sigpending+0x7b/0xa0 [ 16.317633] ? __pfx_kthread+0x10/0x10 [ 16.317655] ret_from_fork+0x116/0x1d0 [ 16.317675] ? __pfx_kthread+0x10/0x10 [ 16.317696] ret_from_fork_asm+0x1a/0x30 [ 16.317727] </TASK> [ 16.317739] [ 16.325313] Allocated by task 283: [ 16.325538] kasan_save_stack+0x45/0x70 [ 16.325744] kasan_save_track+0x18/0x40 [ 16.325936] kasan_save_alloc_info+0x3b/0x50 [ 16.326149] __kasan_kmalloc+0xb7/0xc0 [ 16.326312] __kmalloc_cache_noprof+0x189/0x420 [ 16.326513] kasan_atomics+0x95/0x310 [ 16.326705] kunit_try_run_case+0x1a5/0x480 [ 16.326915] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.327183] kthread+0x337/0x6f0 [ 16.327308] ret_from_fork+0x116/0x1d0 [ 16.327475] ret_from_fork_asm+0x1a/0x30 [ 16.327618] [ 16.327738] The buggy address belongs to the object at ffff8881039b8c80 [ 16.327738] which belongs to the cache kmalloc-64 of size 64 [ 16.328268] The buggy address is located 0 bytes to the right of [ 16.328268] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 16.328843] [ 16.328921] The buggy address belongs to the physical page: [ 16.329178] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 16.329455] flags: 0x200000000000000(node=0|zone=2) [ 16.329673] page_type: f5(slab) [ 16.329859] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.330236] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.330564] page dumped because: kasan: bad access detected [ 16.330820] [ 16.330925] Memory state around the buggy address: [ 16.331139] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.331461] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.331776] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.332080] ^ [ 16.332271] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.332610] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.332920] ================================================================== [ 15.478235] ================================================================== [ 15.478670] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 15.478962] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.479294] [ 15.479483] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.479527] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.479540] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.479562] Call Trace: [ 15.479576] <TASK> [ 15.479590] dump_stack_lvl+0x73/0xb0 [ 15.479620] print_report+0xd1/0x650 [ 15.479643] ? __virt_addr_valid+0x1db/0x2d0 [ 15.479668] ? kasan_atomics_helper+0xac7/0x5450 [ 15.479690] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.479714] ? kasan_atomics_helper+0xac7/0x5450 [ 15.479737] kasan_report+0x141/0x180 [ 15.479760] ? kasan_atomics_helper+0xac7/0x5450 [ 15.479787] kasan_check_range+0x10c/0x1c0 [ 15.479812] __kasan_check_write+0x18/0x20 [ 15.479834] kasan_atomics_helper+0xac7/0x5450 [ 15.479857] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.479881] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.479907] ? kasan_atomics+0x152/0x310 [ 15.479934] kasan_atomics+0x1dc/0x310 [ 15.479958] ? __pfx_kasan_atomics+0x10/0x10 [ 15.479985] ? __pfx_read_tsc+0x10/0x10 [ 15.480007] ? ktime_get_ts64+0x86/0x230 [ 15.480031] kunit_try_run_case+0x1a5/0x480 [ 15.480056] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.480080] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.480105] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.480130] ? __kthread_parkme+0x82/0x180 [ 15.480152] ? preempt_count_sub+0x50/0x80 [ 15.480186] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.480212] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.480237] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.480264] kthread+0x337/0x6f0 [ 15.480284] ? trace_preempt_on+0x20/0xc0 [ 15.480308] ? __pfx_kthread+0x10/0x10 [ 15.480330] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.480425] ? calculate_sigpending+0x7b/0xa0 [ 15.480452] ? __pfx_kthread+0x10/0x10 [ 15.480474] ret_from_fork+0x116/0x1d0 [ 15.480494] ? __pfx_kthread+0x10/0x10 [ 15.480515] ret_from_fork_asm+0x1a/0x30 [ 15.480547] </TASK> [ 15.480558] [ 15.488220] Allocated by task 283: [ 15.488444] kasan_save_stack+0x45/0x70 [ 15.488597] kasan_save_track+0x18/0x40 [ 15.488735] kasan_save_alloc_info+0x3b/0x50 [ 15.488948] __kasan_kmalloc+0xb7/0xc0 [ 15.489138] __kmalloc_cache_noprof+0x189/0x420 [ 15.489553] kasan_atomics+0x95/0x310 [ 15.489754] kunit_try_run_case+0x1a5/0x480 [ 15.489963] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.490216] kthread+0x337/0x6f0 [ 15.490451] ret_from_fork+0x116/0x1d0 [ 15.490654] ret_from_fork_asm+0x1a/0x30 [ 15.490835] [ 15.490915] The buggy address belongs to the object at ffff8881039b8c80 [ 15.490915] which belongs to the cache kmalloc-64 of size 64 [ 15.491406] The buggy address is located 0 bytes to the right of [ 15.491406] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 15.491796] [ 15.491869] The buggy address belongs to the physical page: [ 15.492123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.492572] flags: 0x200000000000000(node=0|zone=2) [ 15.492812] page_type: f5(slab) [ 15.492977] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.493320] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.493749] page dumped because: kasan: bad access detected [ 15.493971] [ 15.494062] Memory state around the buggy address: [ 15.494222] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.494806] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.495147] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.495576] ^ [ 15.495793] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.496051] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.496447] ================================================================== [ 15.639759] ================================================================== [ 15.641176] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 15.641722] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.642328] [ 15.642654] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.642699] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.642713] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.642734] Call Trace: [ 15.642751] <TASK> [ 15.642767] dump_stack_lvl+0x73/0xb0 [ 15.642797] print_report+0xd1/0x650 [ 15.642821] ? __virt_addr_valid+0x1db/0x2d0 [ 15.642898] ? kasan_atomics_helper+0xf10/0x5450 [ 15.642920] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.642959] ? kasan_atomics_helper+0xf10/0x5450 [ 15.642982] kasan_report+0x141/0x180 [ 15.643004] ? kasan_atomics_helper+0xf10/0x5450 [ 15.643032] kasan_check_range+0x10c/0x1c0 [ 15.643057] __kasan_check_write+0x18/0x20 [ 15.643077] kasan_atomics_helper+0xf10/0x5450 [ 15.643101] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.643125] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.643150] ? kasan_atomics+0x152/0x310 [ 15.643179] kasan_atomics+0x1dc/0x310 [ 15.643203] ? __pfx_kasan_atomics+0x10/0x10 [ 15.643228] ? __pfx_read_tsc+0x10/0x10 [ 15.643250] ? ktime_get_ts64+0x86/0x230 [ 15.643275] kunit_try_run_case+0x1a5/0x480 [ 15.643301] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.643325] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.643410] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.643439] ? __kthread_parkme+0x82/0x180 [ 15.643462] ? preempt_count_sub+0x50/0x80 [ 15.643486] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.643512] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.643539] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.643565] kthread+0x337/0x6f0 [ 15.643585] ? trace_preempt_on+0x20/0xc0 [ 15.643609] ? __pfx_kthread+0x10/0x10 [ 15.643631] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.643654] ? calculate_sigpending+0x7b/0xa0 [ 15.643680] ? __pfx_kthread+0x10/0x10 [ 15.643702] ret_from_fork+0x116/0x1d0 [ 15.643721] ? __pfx_kthread+0x10/0x10 [ 15.643743] ret_from_fork_asm+0x1a/0x30 [ 15.643776] </TASK> [ 15.643787] [ 15.657569] Allocated by task 283: [ 15.657916] kasan_save_stack+0x45/0x70 [ 15.658298] kasan_save_track+0x18/0x40 [ 15.658858] kasan_save_alloc_info+0x3b/0x50 [ 15.659282] __kasan_kmalloc+0xb7/0xc0 [ 15.659706] __kmalloc_cache_noprof+0x189/0x420 [ 15.660156] kasan_atomics+0x95/0x310 [ 15.660309] kunit_try_run_case+0x1a5/0x480 [ 15.660828] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.661310] kthread+0x337/0x6f0 [ 15.661696] ret_from_fork+0x116/0x1d0 [ 15.661963] ret_from_fork_asm+0x1a/0x30 [ 15.662302] [ 15.662433] The buggy address belongs to the object at ffff8881039b8c80 [ 15.662433] which belongs to the cache kmalloc-64 of size 64 [ 15.663141] The buggy address is located 0 bytes to the right of [ 15.663141] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 15.664116] [ 15.664289] The buggy address belongs to the physical page: [ 15.664902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.665658] flags: 0x200000000000000(node=0|zone=2) [ 15.665830] page_type: f5(slab) [ 15.665957] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.666191] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.666449] page dumped because: kasan: bad access detected [ 15.666745] [ 15.666863] Memory state around the buggy address: [ 15.667022] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.667341] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.667831] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.668148] ^ [ 15.668405] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.668673] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.669015] ================================================================== [ 16.369270] ================================================================== [ 16.369685] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 16.369943] Read of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 16.370277] [ 16.370410] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.370451] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.370463] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.370483] Call Trace: [ 16.370497] <TASK> [ 16.370520] dump_stack_lvl+0x73/0xb0 [ 16.370550] print_report+0xd1/0x650 [ 16.370573] ? __virt_addr_valid+0x1db/0x2d0 [ 16.370608] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.370631] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.370656] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.370688] kasan_report+0x141/0x180 [ 16.370711] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.370738] __asan_report_load8_noabort+0x18/0x20 [ 16.370775] kasan_atomics_helper+0x4f98/0x5450 [ 16.370799] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.370823] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.370858] ? kasan_atomics+0x152/0x310 [ 16.370886] kasan_atomics+0x1dc/0x310 [ 16.370920] ? __pfx_kasan_atomics+0x10/0x10 [ 16.370946] ? __pfx_read_tsc+0x10/0x10 [ 16.370968] ? ktime_get_ts64+0x86/0x230 [ 16.370993] kunit_try_run_case+0x1a5/0x480 [ 16.371018] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.371042] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.371067] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.371092] ? __kthread_parkme+0x82/0x180 [ 16.371114] ? preempt_count_sub+0x50/0x80 [ 16.371139] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.371164] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.371191] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.371217] kthread+0x337/0x6f0 [ 16.371246] ? trace_preempt_on+0x20/0xc0 [ 16.371270] ? __pfx_kthread+0x10/0x10 [ 16.371292] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.371326] ? calculate_sigpending+0x7b/0xa0 [ 16.371360] ? __pfx_kthread+0x10/0x10 [ 16.371382] ret_from_fork+0x116/0x1d0 [ 16.371419] ? __pfx_kthread+0x10/0x10 [ 16.371442] ret_from_fork_asm+0x1a/0x30 [ 16.371473] </TASK> [ 16.371485] [ 16.379003] Allocated by task 283: [ 16.379188] kasan_save_stack+0x45/0x70 [ 16.379412] kasan_save_track+0x18/0x40 [ 16.379627] kasan_save_alloc_info+0x3b/0x50 [ 16.379825] __kasan_kmalloc+0xb7/0xc0 [ 16.379998] __kmalloc_cache_noprof+0x189/0x420 [ 16.380156] kasan_atomics+0x95/0x310 [ 16.380296] kunit_try_run_case+0x1a5/0x480 [ 16.380478] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.380658] kthread+0x337/0x6f0 [ 16.380779] ret_from_fork+0x116/0x1d0 [ 16.380948] ret_from_fork_asm+0x1a/0x30 [ 16.381174] [ 16.381283] The buggy address belongs to the object at ffff8881039b8c80 [ 16.381283] which belongs to the cache kmalloc-64 of size 64 [ 16.381933] The buggy address is located 0 bytes to the right of [ 16.381933] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 16.382544] [ 16.382646] The buggy address belongs to the physical page: [ 16.382897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 16.383182] flags: 0x200000000000000(node=0|zone=2) [ 16.383353] page_type: f5(slab) [ 16.383498] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.383841] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.384191] page dumped because: kasan: bad access detected [ 16.384481] [ 16.384586] Memory state around the buggy address: [ 16.384808] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.385109] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.385445] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.385742] ^ [ 16.385972] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.386286] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.386627] ================================================================== [ 16.423227] ================================================================== [ 16.424201] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 16.424978] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 16.425323] [ 16.425447] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.425491] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.425503] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.425524] Call Trace: [ 16.425536] <TASK> [ 16.425552] dump_stack_lvl+0x73/0xb0 [ 16.425583] print_report+0xd1/0x650 [ 16.425606] ? __virt_addr_valid+0x1db/0x2d0 [ 16.425630] ? kasan_atomics_helper+0x218a/0x5450 [ 16.425652] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.425676] ? kasan_atomics_helper+0x218a/0x5450 [ 16.425699] kasan_report+0x141/0x180 [ 16.425722] ? kasan_atomics_helper+0x218a/0x5450 [ 16.425749] kasan_check_range+0x10c/0x1c0 [ 16.425774] __kasan_check_write+0x18/0x20 [ 16.425795] kasan_atomics_helper+0x218a/0x5450 [ 16.425819] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.425843] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.425869] ? kasan_atomics+0x152/0x310 [ 16.425897] kasan_atomics+0x1dc/0x310 [ 16.425921] ? __pfx_kasan_atomics+0x10/0x10 [ 16.425947] ? __pfx_read_tsc+0x10/0x10 [ 16.425969] ? ktime_get_ts64+0x86/0x230 [ 16.425994] kunit_try_run_case+0x1a5/0x480 [ 16.426019] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.426043] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.426068] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.426094] ? __kthread_parkme+0x82/0x180 [ 16.426116] ? preempt_count_sub+0x50/0x80 [ 16.426140] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.426166] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.426192] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.426219] kthread+0x337/0x6f0 [ 16.426238] ? trace_preempt_on+0x20/0xc0 [ 16.426262] ? __pfx_kthread+0x10/0x10 [ 16.426284] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.426307] ? calculate_sigpending+0x7b/0xa0 [ 16.426332] ? __pfx_kthread+0x10/0x10 [ 16.426721] ret_from_fork+0x116/0x1d0 [ 16.426744] ? __pfx_kthread+0x10/0x10 [ 16.426784] ret_from_fork_asm+0x1a/0x30 [ 16.426815] </TASK> [ 16.426865] [ 16.438715] Allocated by task 283: [ 16.439127] kasan_save_stack+0x45/0x70 [ 16.439418] kasan_save_track+0x18/0x40 [ 16.439787] kasan_save_alloc_info+0x3b/0x50 [ 16.440006] __kasan_kmalloc+0xb7/0xc0 [ 16.440188] __kmalloc_cache_noprof+0x189/0x420 [ 16.440656] kasan_atomics+0x95/0x310 [ 16.440938] kunit_try_run_case+0x1a5/0x480 [ 16.441383] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.441923] kthread+0x337/0x6f0 [ 16.442221] ret_from_fork+0x116/0x1d0 [ 16.442652] ret_from_fork_asm+0x1a/0x30 [ 16.442976] [ 16.443201] The buggy address belongs to the object at ffff8881039b8c80 [ 16.443201] which belongs to the cache kmalloc-64 of size 64 [ 16.444099] The buggy address is located 0 bytes to the right of [ 16.444099] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 16.444783] [ 16.444884] The buggy address belongs to the physical page: [ 16.445110] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 16.445742] flags: 0x200000000000000(node=0|zone=2) [ 16.446025] page_type: f5(slab) [ 16.446326] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.446927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.447392] page dumped because: kasan: bad access detected [ 16.447632] [ 16.447721] Memory state around the buggy address: [ 16.447928] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.448219] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.449090] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.449791] ^ [ 16.450034] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.450333] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.450614] ================================================================== [ 16.286452] ================================================================== [ 16.286799] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 16.287260] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 16.287966] [ 16.288079] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.288119] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.288132] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.288153] Call Trace: [ 16.288175] <TASK> [ 16.288189] dump_stack_lvl+0x73/0xb0 [ 16.288221] print_report+0xd1/0x650 [ 16.288244] ? __virt_addr_valid+0x1db/0x2d0 [ 16.288267] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.288290] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.288314] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.288337] kasan_report+0x141/0x180 [ 16.288374] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.288402] kasan_check_range+0x10c/0x1c0 [ 16.288427] __kasan_check_write+0x18/0x20 [ 16.288448] kasan_atomics_helper+0x1eaa/0x5450 [ 16.288472] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.288496] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.288522] ? kasan_atomics+0x152/0x310 [ 16.288550] kasan_atomics+0x1dc/0x310 [ 16.288574] ? __pfx_kasan_atomics+0x10/0x10 [ 16.288600] ? __pfx_read_tsc+0x10/0x10 [ 16.288623] ? ktime_get_ts64+0x86/0x230 [ 16.288647] kunit_try_run_case+0x1a5/0x480 [ 16.288672] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.288697] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.288723] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.288748] ? __kthread_parkme+0x82/0x180 [ 16.288770] ? preempt_count_sub+0x50/0x80 [ 16.288794] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.288821] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.288846] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.288873] kthread+0x337/0x6f0 [ 16.288892] ? trace_preempt_on+0x20/0xc0 [ 16.288916] ? __pfx_kthread+0x10/0x10 [ 16.288938] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.288960] ? calculate_sigpending+0x7b/0xa0 [ 16.288986] ? __pfx_kthread+0x10/0x10 [ 16.289008] ret_from_fork+0x116/0x1d0 [ 16.289027] ? __pfx_kthread+0x10/0x10 [ 16.289048] ret_from_fork_asm+0x1a/0x30 [ 16.289080] </TASK> [ 16.289091] [ 16.302164] Allocated by task 283: [ 16.302545] kasan_save_stack+0x45/0x70 [ 16.303159] kasan_save_track+0x18/0x40 [ 16.303589] kasan_save_alloc_info+0x3b/0x50 [ 16.303806] __kasan_kmalloc+0xb7/0xc0 [ 16.303943] __kmalloc_cache_noprof+0x189/0x420 [ 16.304458] kasan_atomics+0x95/0x310 [ 16.304796] kunit_try_run_case+0x1a5/0x480 [ 16.305455] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.305938] kthread+0x337/0x6f0 [ 16.306072] ret_from_fork+0x116/0x1d0 [ 16.306208] ret_from_fork_asm+0x1a/0x30 [ 16.306370] [ 16.306740] The buggy address belongs to the object at ffff8881039b8c80 [ 16.306740] which belongs to the cache kmalloc-64 of size 64 [ 16.307853] The buggy address is located 0 bytes to the right of [ 16.307853] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 16.308855] [ 16.308935] The buggy address belongs to the physical page: [ 16.309109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 16.309365] flags: 0x200000000000000(node=0|zone=2) [ 16.309582] page_type: f5(slab) [ 16.309749] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.310058] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.310450] page dumped because: kasan: bad access detected [ 16.310661] [ 16.310732] Memory state around the buggy address: [ 16.311034] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.311713] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.312362] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.313017] ^ [ 16.313507] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.314143] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.314803] ================================================================== [ 15.073177] ================================================================== [ 15.075013] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 15.076110] Read of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.077011] [ 15.077319] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.077387] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.077495] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.077521] Call Trace: [ 15.077534] <TASK> [ 15.077551] dump_stack_lvl+0x73/0xb0 [ 15.077584] print_report+0xd1/0x650 [ 15.077606] ? __virt_addr_valid+0x1db/0x2d0 [ 15.077630] ? kasan_atomics_helper+0x4bbc/0x5450 [ 15.077651] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.077674] ? kasan_atomics_helper+0x4bbc/0x5450 [ 15.077696] kasan_report+0x141/0x180 [ 15.077718] ? kasan_atomics_helper+0x4bbc/0x5450 [ 15.077745] __asan_report_load4_noabort+0x18/0x20 [ 15.077769] kasan_atomics_helper+0x4bbc/0x5450 [ 15.077792] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.077815] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.077840] ? kasan_atomics+0x152/0x310 [ 15.077866] kasan_atomics+0x1dc/0x310 [ 15.077889] ? __pfx_kasan_atomics+0x10/0x10 [ 15.077913] ? __pfx_read_tsc+0x10/0x10 [ 15.077934] ? ktime_get_ts64+0x86/0x230 [ 15.077959] kunit_try_run_case+0x1a5/0x480 [ 15.077983] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.078005] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.078031] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.078055] ? __kthread_parkme+0x82/0x180 [ 15.078076] ? preempt_count_sub+0x50/0x80 [ 15.078100] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.078126] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.078151] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.078178] kthread+0x337/0x6f0 [ 15.078197] ? trace_preempt_on+0x20/0xc0 [ 15.078220] ? __pfx_kthread+0x10/0x10 [ 15.078241] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.078263] ? calculate_sigpending+0x7b/0xa0 [ 15.078287] ? __pfx_kthread+0x10/0x10 [ 15.078309] ret_from_fork+0x116/0x1d0 [ 15.078327] ? __pfx_kthread+0x10/0x10 [ 15.078419] ret_from_fork_asm+0x1a/0x30 [ 15.078514] </TASK> [ 15.078527] [ 15.089516] Allocated by task 283: [ 15.089919] kasan_save_stack+0x45/0x70 [ 15.090230] kasan_save_track+0x18/0x40 [ 15.090658] kasan_save_alloc_info+0x3b/0x50 [ 15.090992] __kasan_kmalloc+0xb7/0xc0 [ 15.091252] __kmalloc_cache_noprof+0x189/0x420 [ 15.091674] kasan_atomics+0x95/0x310 [ 15.091865] kunit_try_run_case+0x1a5/0x480 [ 15.092196] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.092537] kthread+0x337/0x6f0 [ 15.092702] ret_from_fork+0x116/0x1d0 [ 15.092885] ret_from_fork_asm+0x1a/0x30 [ 15.093090] [ 15.093177] The buggy address belongs to the object at ffff8881039b8c80 [ 15.093177] which belongs to the cache kmalloc-64 of size 64 [ 15.094082] The buggy address is located 0 bytes to the right of [ 15.094082] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 15.094961] [ 15.095068] The buggy address belongs to the physical page: [ 15.095499] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.095977] flags: 0x200000000000000(node=0|zone=2) [ 15.096307] page_type: f5(slab) [ 15.096723] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.097085] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.097596] page dumped because: kasan: bad access detected [ 15.097934] [ 15.098036] Memory state around the buggy address: [ 15.098447] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.098882] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.099271] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.100005] ^ [ 15.100242] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.100785] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.101097] ================================================================== [ 15.440958] ================================================================== [ 15.441296] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 15.441742] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.442055] [ 15.442146] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.442188] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.442200] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.442220] Call Trace: [ 15.442233] <TASK> [ 15.442246] dump_stack_lvl+0x73/0xb0 [ 15.442275] print_report+0xd1/0x650 [ 15.442298] ? __virt_addr_valid+0x1db/0x2d0 [ 15.442321] ? kasan_atomics_helper+0x992/0x5450 [ 15.442418] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.442462] ? kasan_atomics_helper+0x992/0x5450 [ 15.442485] kasan_report+0x141/0x180 [ 15.442508] ? kasan_atomics_helper+0x992/0x5450 [ 15.442536] kasan_check_range+0x10c/0x1c0 [ 15.442561] __kasan_check_write+0x18/0x20 [ 15.442582] kasan_atomics_helper+0x992/0x5450 [ 15.442607] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.442631] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.442656] ? kasan_atomics+0x152/0x310 [ 15.442683] kasan_atomics+0x1dc/0x310 [ 15.442706] ? __pfx_kasan_atomics+0x10/0x10 [ 15.442731] ? __pfx_read_tsc+0x10/0x10 [ 15.442753] ? ktime_get_ts64+0x86/0x230 [ 15.442777] kunit_try_run_case+0x1a5/0x480 [ 15.442802] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.442826] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.442852] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.442878] ? __kthread_parkme+0x82/0x180 [ 15.442899] ? preempt_count_sub+0x50/0x80 [ 15.442924] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.442949] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.442974] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.443001] kthread+0x337/0x6f0 [ 15.443021] ? trace_preempt_on+0x20/0xc0 [ 15.443045] ? __pfx_kthread+0x10/0x10 [ 15.443067] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.443090] ? calculate_sigpending+0x7b/0xa0 [ 15.443115] ? __pfx_kthread+0x10/0x10 [ 15.443137] ret_from_fork+0x116/0x1d0 [ 15.443156] ? __pfx_kthread+0x10/0x10 [ 15.443178] ret_from_fork_asm+0x1a/0x30 [ 15.443209] </TASK> [ 15.443220] [ 15.451166] Allocated by task 283: [ 15.451509] kasan_save_stack+0x45/0x70 [ 15.451696] kasan_save_track+0x18/0x40 [ 15.451872] kasan_save_alloc_info+0x3b/0x50 [ 15.452083] __kasan_kmalloc+0xb7/0xc0 [ 15.452278] __kmalloc_cache_noprof+0x189/0x420 [ 15.452519] kasan_atomics+0x95/0x310 [ 15.452680] kunit_try_run_case+0x1a5/0x480 [ 15.452829] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.453007] kthread+0x337/0x6f0 [ 15.453159] ret_from_fork+0x116/0x1d0 [ 15.453435] ret_from_fork_asm+0x1a/0x30 [ 15.453645] [ 15.453743] The buggy address belongs to the object at ffff8881039b8c80 [ 15.453743] which belongs to the cache kmalloc-64 of size 64 [ 15.454270] The buggy address is located 0 bytes to the right of [ 15.454270] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 15.454866] [ 15.454957] The buggy address belongs to the physical page: [ 15.455188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.455546] flags: 0x200000000000000(node=0|zone=2) [ 15.455726] page_type: f5(slab) [ 15.455909] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.456224] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.456608] page dumped because: kasan: bad access detected [ 15.456853] [ 15.456943] Memory state around the buggy address: [ 15.457115] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.457566] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.457881] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.458196] ^ [ 15.458518] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.458846] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.459135] ================================================================== [ 16.181432] ================================================================== [ 16.181714] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 16.182471] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 16.182988] [ 16.183182] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.183230] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.183245] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.183265] Call Trace: [ 16.183279] <TASK> [ 16.183295] dump_stack_lvl+0x73/0xb0 [ 16.183327] print_report+0xd1/0x650 [ 16.183364] ? __virt_addr_valid+0x1db/0x2d0 [ 16.183388] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.183411] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.183437] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.183461] kasan_report+0x141/0x180 [ 16.183484] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.183512] kasan_check_range+0x10c/0x1c0 [ 16.183536] __kasan_check_write+0x18/0x20 [ 16.183556] kasan_atomics_helper+0x1c18/0x5450 [ 16.183580] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.183605] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.183632] ? kasan_atomics+0x152/0x310 [ 16.183660] kasan_atomics+0x1dc/0x310 [ 16.183683] ? __pfx_kasan_atomics+0x10/0x10 [ 16.183709] ? __pfx_read_tsc+0x10/0x10 [ 16.183731] ? ktime_get_ts64+0x86/0x230 [ 16.183755] kunit_try_run_case+0x1a5/0x480 [ 16.183781] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.183805] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.183830] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.183856] ? __kthread_parkme+0x82/0x180 [ 16.183877] ? preempt_count_sub+0x50/0x80 [ 16.183902] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.183928] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.183953] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.183979] kthread+0x337/0x6f0 [ 16.183999] ? trace_preempt_on+0x20/0xc0 [ 16.184023] ? __pfx_kthread+0x10/0x10 [ 16.184044] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.184067] ? calculate_sigpending+0x7b/0xa0 [ 16.184091] ? __pfx_kthread+0x10/0x10 [ 16.184113] ret_from_fork+0x116/0x1d0 [ 16.184132] ? __pfx_kthread+0x10/0x10 [ 16.184154] ret_from_fork_asm+0x1a/0x30 [ 16.184192] </TASK> [ 16.184204] [ 16.192019] Allocated by task 283: [ 16.192210] kasan_save_stack+0x45/0x70 [ 16.192404] kasan_save_track+0x18/0x40 [ 16.192611] kasan_save_alloc_info+0x3b/0x50 [ 16.192856] __kasan_kmalloc+0xb7/0xc0 [ 16.193040] __kmalloc_cache_noprof+0x189/0x420 [ 16.193309] kasan_atomics+0x95/0x310 [ 16.193511] kunit_try_run_case+0x1a5/0x480 [ 16.193729] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.193909] kthread+0x337/0x6f0 [ 16.194203] ret_from_fork+0x116/0x1d0 [ 16.194402] ret_from_fork_asm+0x1a/0x30 [ 16.194638] [ 16.194734] The buggy address belongs to the object at ffff8881039b8c80 [ 16.194734] which belongs to the cache kmalloc-64 of size 64 [ 16.195293] The buggy address is located 0 bytes to the right of [ 16.195293] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 16.195878] [ 16.195978] The buggy address belongs to the physical page: [ 16.196259] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 16.196611] flags: 0x200000000000000(node=0|zone=2) [ 16.196841] page_type: f5(slab) [ 16.196985] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.197254] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.197481] page dumped because: kasan: bad access detected [ 16.197648] [ 16.197717] Memory state around the buggy address: [ 16.198153] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.198572] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.198937] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.199259] ^ [ 16.199534] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.199826] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.200115] ================================================================== [ 15.602153] ================================================================== [ 15.602407] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 15.603058] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.603720] [ 15.603896] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.603938] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.603950] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.603971] Call Trace: [ 15.603986] <TASK> [ 15.604001] dump_stack_lvl+0x73/0xb0 [ 15.604031] print_report+0xd1/0x650 [ 15.604066] ? __virt_addr_valid+0x1db/0x2d0 [ 15.604090] ? kasan_atomics_helper+0xe78/0x5450 [ 15.604112] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.604157] ? kasan_atomics_helper+0xe78/0x5450 [ 15.604185] kasan_report+0x141/0x180 [ 15.604219] ? kasan_atomics_helper+0xe78/0x5450 [ 15.604247] kasan_check_range+0x10c/0x1c0 [ 15.604272] __kasan_check_write+0x18/0x20 [ 15.604292] kasan_atomics_helper+0xe78/0x5450 [ 15.604316] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.604368] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.604414] ? kasan_atomics+0x152/0x310 [ 15.604442] kasan_atomics+0x1dc/0x310 [ 15.604466] ? __pfx_kasan_atomics+0x10/0x10 [ 15.604492] ? __pfx_read_tsc+0x10/0x10 [ 15.604515] ? ktime_get_ts64+0x86/0x230 [ 15.604539] kunit_try_run_case+0x1a5/0x480 [ 15.604565] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.604589] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.604616] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.604642] ? __kthread_parkme+0x82/0x180 [ 15.604664] ? preempt_count_sub+0x50/0x80 [ 15.604688] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.604714] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.604739] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.604766] kthread+0x337/0x6f0 [ 15.604786] ? trace_preempt_on+0x20/0xc0 [ 15.604811] ? __pfx_kthread+0x10/0x10 [ 15.604832] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.604856] ? calculate_sigpending+0x7b/0xa0 [ 15.604880] ? __pfx_kthread+0x10/0x10 [ 15.604903] ret_from_fork+0x116/0x1d0 [ 15.604922] ? __pfx_kthread+0x10/0x10 [ 15.604944] ret_from_fork_asm+0x1a/0x30 [ 15.604975] </TASK> [ 15.604987] [ 15.621765] Allocated by task 283: [ 15.622187] kasan_save_stack+0x45/0x70 [ 15.622901] kasan_save_track+0x18/0x40 [ 15.623573] kasan_save_alloc_info+0x3b/0x50 [ 15.624135] __kasan_kmalloc+0xb7/0xc0 [ 15.624922] __kmalloc_cache_noprof+0x189/0x420 [ 15.625123] kasan_atomics+0x95/0x310 [ 15.625264] kunit_try_run_case+0x1a5/0x480 [ 15.625732] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.626450] kthread+0x337/0x6f0 [ 15.626889] ret_from_fork+0x116/0x1d0 [ 15.627371] ret_from_fork_asm+0x1a/0x30 [ 15.627721] [ 15.627803] The buggy address belongs to the object at ffff8881039b8c80 [ 15.627803] which belongs to the cache kmalloc-64 of size 64 [ 15.628172] The buggy address is located 0 bytes to the right of [ 15.628172] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 15.629516] [ 15.629876] The buggy address belongs to the physical page: [ 15.630478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.631332] flags: 0x200000000000000(node=0|zone=2) [ 15.632039] page_type: f5(slab) [ 15.632505] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.633039] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.633277] page dumped because: kasan: bad access detected [ 15.634015] [ 15.634385] Memory state around the buggy address: [ 15.634882] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.635754] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.636298] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.637293] ^ [ 15.638027] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.638688] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.639164] ================================================================== [ 15.670171] ================================================================== [ 15.670878] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 15.671216] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.671641] [ 15.671778] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.671822] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.671834] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.671855] Call Trace: [ 15.671868] <TASK> [ 15.671884] dump_stack_lvl+0x73/0xb0 [ 15.671914] print_report+0xd1/0x650 [ 15.671937] ? __virt_addr_valid+0x1db/0x2d0 [ 15.671961] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.671995] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.672020] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.672042] kasan_report+0x141/0x180 [ 15.672077] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.672105] kasan_check_range+0x10c/0x1c0 [ 15.672131] __kasan_check_write+0x18/0x20 [ 15.672153] kasan_atomics_helper+0xfa9/0x5450 [ 15.672191] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.672215] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.672251] ? kasan_atomics+0x152/0x310 [ 15.672279] kasan_atomics+0x1dc/0x310 [ 15.672302] ? __pfx_kasan_atomics+0x10/0x10 [ 15.672339] ? __pfx_read_tsc+0x10/0x10 [ 15.672371] ? ktime_get_ts64+0x86/0x230 [ 15.672397] kunit_try_run_case+0x1a5/0x480 [ 15.672433] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.672457] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.672491] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.672517] ? __kthread_parkme+0x82/0x180 [ 15.672539] ? preempt_count_sub+0x50/0x80 [ 15.672575] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.672601] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.672627] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.672655] kthread+0x337/0x6f0 [ 15.672675] ? trace_preempt_on+0x20/0xc0 [ 15.672700] ? __pfx_kthread+0x10/0x10 [ 15.672722] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.672745] ? calculate_sigpending+0x7b/0xa0 [ 15.672770] ? __pfx_kthread+0x10/0x10 [ 15.672792] ret_from_fork+0x116/0x1d0 [ 15.672812] ? __pfx_kthread+0x10/0x10 [ 15.672834] ret_from_fork_asm+0x1a/0x30 [ 15.672865] </TASK> [ 15.672877] [ 15.680884] Allocated by task 283: [ 15.681014] kasan_save_stack+0x45/0x70 [ 15.681247] kasan_save_track+0x18/0x40 [ 15.681457] kasan_save_alloc_info+0x3b/0x50 [ 15.681669] __kasan_kmalloc+0xb7/0xc0 [ 15.681857] __kmalloc_cache_noprof+0x189/0x420 [ 15.682080] kasan_atomics+0x95/0x310 [ 15.682443] kunit_try_run_case+0x1a5/0x480 [ 15.682599] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.682780] kthread+0x337/0x6f0 [ 15.682902] ret_from_fork+0x116/0x1d0 [ 15.683040] ret_from_fork_asm+0x1a/0x30 [ 15.683240] [ 15.683334] The buggy address belongs to the object at ffff8881039b8c80 [ 15.683334] which belongs to the cache kmalloc-64 of size 64 [ 15.683878] The buggy address is located 0 bytes to the right of [ 15.683878] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 15.684291] [ 15.684374] The buggy address belongs to the physical page: [ 15.684799] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.685182] flags: 0x200000000000000(node=0|zone=2) [ 15.685503] page_type: f5(slab) [ 15.685690] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.685956] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.686224] page dumped because: kasan: bad access detected [ 15.686536] [ 15.686633] Memory state around the buggy address: [ 15.686883] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.687192] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.687420] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.687686] ^ [ 15.687908] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.688357] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.688668] ================================================================== [ 16.072531] ================================================================== [ 16.073080] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 16.073324] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 16.074405] [ 16.074719] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.074766] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.074779] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.074801] Call Trace: [ 16.074816] <TASK> [ 16.074841] dump_stack_lvl+0x73/0xb0 [ 16.074873] print_report+0xd1/0x650 [ 16.074897] ? __virt_addr_valid+0x1db/0x2d0 [ 16.074922] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.074945] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.074969] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.074992] kasan_report+0x141/0x180 [ 16.075015] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.075042] kasan_check_range+0x10c/0x1c0 [ 16.075067] __kasan_check_write+0x18/0x20 [ 16.075088] kasan_atomics_helper+0x18b1/0x5450 [ 16.075111] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.075135] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.075162] ? kasan_atomics+0x152/0x310 [ 16.075189] kasan_atomics+0x1dc/0x310 [ 16.075212] ? __pfx_kasan_atomics+0x10/0x10 [ 16.075237] ? __pfx_read_tsc+0x10/0x10 [ 16.075259] ? ktime_get_ts64+0x86/0x230 [ 16.075284] kunit_try_run_case+0x1a5/0x480 [ 16.075310] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.075335] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.075369] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.075395] ? __kthread_parkme+0x82/0x180 [ 16.075448] ? preempt_count_sub+0x50/0x80 [ 16.075473] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.075499] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.075525] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.075552] kthread+0x337/0x6f0 [ 16.075572] ? trace_preempt_on+0x20/0xc0 [ 16.075597] ? __pfx_kthread+0x10/0x10 [ 16.075619] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.075641] ? calculate_sigpending+0x7b/0xa0 [ 16.075666] ? __pfx_kthread+0x10/0x10 [ 16.075689] ret_from_fork+0x116/0x1d0 [ 16.075708] ? __pfx_kthread+0x10/0x10 [ 16.075730] ret_from_fork_asm+0x1a/0x30 [ 16.075762] </TASK> [ 16.075774] [ 16.089939] Allocated by task 283: [ 16.090075] kasan_save_stack+0x45/0x70 [ 16.090224] kasan_save_track+0x18/0x40 [ 16.090377] kasan_save_alloc_info+0x3b/0x50 [ 16.090557] __kasan_kmalloc+0xb7/0xc0 [ 16.090690] __kmalloc_cache_noprof+0x189/0x420 [ 16.091012] kasan_atomics+0x95/0x310 [ 16.091232] kunit_try_run_case+0x1a5/0x480 [ 16.091391] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.091668] kthread+0x337/0x6f0 [ 16.091839] ret_from_fork+0x116/0x1d0 [ 16.092002] ret_from_fork_asm+0x1a/0x30 [ 16.092175] [ 16.092270] The buggy address belongs to the object at ffff8881039b8c80 [ 16.092270] which belongs to the cache kmalloc-64 of size 64 [ 16.092785] The buggy address is located 0 bytes to the right of [ 16.092785] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 16.093300] [ 16.093397] The buggy address belongs to the physical page: [ 16.093774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 16.094023] flags: 0x200000000000000(node=0|zone=2) [ 16.094250] page_type: f5(slab) [ 16.094414] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.094732] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.094972] page dumped because: kasan: bad access detected [ 16.095221] [ 16.095313] Memory state around the buggy address: [ 16.095553] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.096028] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.096332] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.096674] ^ [ 16.096894] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.097171] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.097444] ================================================================== [ 15.966545] ================================================================== [ 15.966829] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 15.967138] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.967672] [ 15.967760] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.967801] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.967847] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.967867] Call Trace: [ 15.967884] <TASK> [ 15.967899] dump_stack_lvl+0x73/0xb0 [ 15.967969] print_report+0xd1/0x650 [ 15.967993] ? __virt_addr_valid+0x1db/0x2d0 [ 15.968026] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.968050] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.968073] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.968097] kasan_report+0x141/0x180 [ 15.968120] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.968147] kasan_check_range+0x10c/0x1c0 [ 15.968175] __kasan_check_write+0x18/0x20 [ 15.968196] kasan_atomics_helper+0x15b6/0x5450 [ 15.968220] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.968244] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.968270] ? kasan_atomics+0x152/0x310 [ 15.968297] kasan_atomics+0x1dc/0x310 [ 15.968321] ? __pfx_kasan_atomics+0x10/0x10 [ 15.968357] ? __pfx_read_tsc+0x10/0x10 [ 15.968379] ? ktime_get_ts64+0x86/0x230 [ 15.968403] kunit_try_run_case+0x1a5/0x480 [ 15.968437] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.968461] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.968486] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.968512] ? __kthread_parkme+0x82/0x180 [ 15.968533] ? preempt_count_sub+0x50/0x80 [ 15.968558] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.968583] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.968609] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.968636] kthread+0x337/0x6f0 [ 15.968656] ? trace_preempt_on+0x20/0xc0 [ 15.968679] ? __pfx_kthread+0x10/0x10 [ 15.968701] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.968724] ? calculate_sigpending+0x7b/0xa0 [ 15.968748] ? __pfx_kthread+0x10/0x10 [ 15.968771] ret_from_fork+0x116/0x1d0 [ 15.968790] ? __pfx_kthread+0x10/0x10 [ 15.968811] ret_from_fork_asm+0x1a/0x30 [ 15.968843] </TASK> [ 15.968855] [ 15.977383] Allocated by task 283: [ 15.977562] kasan_save_stack+0x45/0x70 [ 15.977709] kasan_save_track+0x18/0x40 [ 15.977847] kasan_save_alloc_info+0x3b/0x50 [ 15.978045] __kasan_kmalloc+0xb7/0xc0 [ 15.978276] __kmalloc_cache_noprof+0x189/0x420 [ 15.978532] kasan_atomics+0x95/0x310 [ 15.978726] kunit_try_run_case+0x1a5/0x480 [ 15.979020] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.979335] kthread+0x337/0x6f0 [ 15.979615] ret_from_fork+0x116/0x1d0 [ 15.979811] ret_from_fork_asm+0x1a/0x30 [ 15.980017] [ 15.980092] The buggy address belongs to the object at ffff8881039b8c80 [ 15.980092] which belongs to the cache kmalloc-64 of size 64 [ 15.980591] The buggy address is located 0 bytes to the right of [ 15.980591] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 15.981194] [ 15.981295] The buggy address belongs to the physical page: [ 15.981535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.981949] flags: 0x200000000000000(node=0|zone=2) [ 15.982218] page_type: f5(slab) [ 15.982355] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.982588] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.982943] page dumped because: kasan: bad access detected [ 15.983243] [ 15.983337] Memory state around the buggy address: [ 15.983570] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.983912] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.984221] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.984610] ^ [ 15.984839] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.985089] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.985492] ================================================================== [ 15.129508] ================================================================== [ 15.129820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 15.130150] Read of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.131178] [ 15.131736] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.131782] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.131794] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.131814] Call Trace: [ 15.131825] <TASK> [ 15.131840] dump_stack_lvl+0x73/0xb0 [ 15.131871] print_report+0xd1/0x650 [ 15.131893] ? __virt_addr_valid+0x1db/0x2d0 [ 15.131915] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.131937] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.131960] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.131983] kasan_report+0x141/0x180 [ 15.132006] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.132032] __asan_report_load4_noabort+0x18/0x20 [ 15.132056] kasan_atomics_helper+0x4b88/0x5450 [ 15.132080] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.132102] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.132128] ? kasan_atomics+0x152/0x310 [ 15.132154] kasan_atomics+0x1dc/0x310 [ 15.132183] ? __pfx_kasan_atomics+0x10/0x10 [ 15.132208] ? __pfx_read_tsc+0x10/0x10 [ 15.132229] ? ktime_get_ts64+0x86/0x230 [ 15.132252] kunit_try_run_case+0x1a5/0x480 [ 15.132276] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.132299] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.132323] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.132412] ? __kthread_parkme+0x82/0x180 [ 15.132436] ? preempt_count_sub+0x50/0x80 [ 15.132460] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.132485] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.132510] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.132536] kthread+0x337/0x6f0 [ 15.132555] ? trace_preempt_on+0x20/0xc0 [ 15.132578] ? __pfx_kthread+0x10/0x10 [ 15.132598] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.132620] ? calculate_sigpending+0x7b/0xa0 [ 15.132644] ? __pfx_kthread+0x10/0x10 [ 15.132666] ret_from_fork+0x116/0x1d0 [ 15.132685] ? __pfx_kthread+0x10/0x10 [ 15.132705] ret_from_fork_asm+0x1a/0x30 [ 15.132736] </TASK> [ 15.132745] [ 15.143992] Allocated by task 283: [ 15.144315] kasan_save_stack+0x45/0x70 [ 15.144804] kasan_save_track+0x18/0x40 [ 15.145122] kasan_save_alloc_info+0x3b/0x50 [ 15.145321] __kasan_kmalloc+0xb7/0xc0 [ 15.145759] __kmalloc_cache_noprof+0x189/0x420 [ 15.146105] kasan_atomics+0x95/0x310 [ 15.146446] kunit_try_run_case+0x1a5/0x480 [ 15.146763] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.147117] kthread+0x337/0x6f0 [ 15.147438] ret_from_fork+0x116/0x1d0 [ 15.147768] ret_from_fork_asm+0x1a/0x30 [ 15.147971] [ 15.148084] The buggy address belongs to the object at ffff8881039b8c80 [ 15.148084] which belongs to the cache kmalloc-64 of size 64 [ 15.148793] The buggy address is located 0 bytes to the right of [ 15.148793] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 15.149305] [ 15.149416] The buggy address belongs to the physical page: [ 15.150009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.150583] flags: 0x200000000000000(node=0|zone=2) [ 15.150919] page_type: f5(slab) [ 15.151055] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.151685] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.152079] page dumped because: kasan: bad access detected [ 15.152437] [ 15.152539] Memory state around the buggy address: [ 15.152736] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.153062] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.153387] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.153988] ^ [ 15.154313] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.154868] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.155232] ================================================================== [ 15.830664] ================================================================== [ 15.831058] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 15.831498] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.831887] [ 15.832031] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.832073] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.832098] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.832118] Call Trace: [ 15.832170] <TASK> [ 15.832185] dump_stack_lvl+0x73/0xb0 [ 15.832228] print_report+0xd1/0x650 [ 15.832251] ? __virt_addr_valid+0x1db/0x2d0 [ 15.832276] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.832300] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.832324] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.832355] kasan_report+0x141/0x180 [ 15.832378] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.832426] kasan_check_range+0x10c/0x1c0 [ 15.832450] __kasan_check_write+0x18/0x20 [ 15.832471] kasan_atomics_helper+0x12e6/0x5450 [ 15.832495] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.832531] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.832567] ? kasan_atomics+0x152/0x310 [ 15.832595] kasan_atomics+0x1dc/0x310 [ 15.832619] ? __pfx_kasan_atomics+0x10/0x10 [ 15.832644] ? __pfx_read_tsc+0x10/0x10 [ 15.832700] ? ktime_get_ts64+0x86/0x230 [ 15.832725] kunit_try_run_case+0x1a5/0x480 [ 15.832762] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.832814] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.832839] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.832875] ? __kthread_parkme+0x82/0x180 [ 15.832896] ? preempt_count_sub+0x50/0x80 [ 15.832921] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.832946] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.832972] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.832998] kthread+0x337/0x6f0 [ 15.833018] ? trace_preempt_on+0x20/0xc0 [ 15.833042] ? __pfx_kthread+0x10/0x10 [ 15.833063] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.833086] ? calculate_sigpending+0x7b/0xa0 [ 15.833112] ? __pfx_kthread+0x10/0x10 [ 15.833134] ret_from_fork+0x116/0x1d0 [ 15.833153] ? __pfx_kthread+0x10/0x10 [ 15.833175] ret_from_fork_asm+0x1a/0x30 [ 15.833206] </TASK> [ 15.833217] [ 15.841161] Allocated by task 283: [ 15.841294] kasan_save_stack+0x45/0x70 [ 15.841592] kasan_save_track+0x18/0x40 [ 15.841790] kasan_save_alloc_info+0x3b/0x50 [ 15.842002] __kasan_kmalloc+0xb7/0xc0 [ 15.842176] __kmalloc_cache_noprof+0x189/0x420 [ 15.842401] kasan_atomics+0x95/0x310 [ 15.842607] kunit_try_run_case+0x1a5/0x480 [ 15.842759] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.843013] kthread+0x337/0x6f0 [ 15.843232] ret_from_fork+0x116/0x1d0 [ 15.843434] ret_from_fork_asm+0x1a/0x30 [ 15.843618] [ 15.843691] The buggy address belongs to the object at ffff8881039b8c80 [ 15.843691] which belongs to the cache kmalloc-64 of size 64 [ 15.844215] The buggy address is located 0 bytes to the right of [ 15.844215] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 15.844722] [ 15.844796] The buggy address belongs to the physical page: [ 15.844983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.845404] flags: 0x200000000000000(node=0|zone=2) [ 15.845643] page_type: f5(slab) [ 15.845870] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.846363] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.846802] page dumped because: kasan: bad access detected [ 15.847080] [ 15.847168] Memory state around the buggy address: [ 15.847317] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.847538] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.847926] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.848264] ^ [ 15.848504] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.848889] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.849294] ================================================================== [ 15.459579] ================================================================== [ 15.459932] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 15.460277] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.460715] [ 15.460826] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.460866] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.460879] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.460897] Call Trace: [ 15.460915] <TASK> [ 15.460931] dump_stack_lvl+0x73/0xb0 [ 15.460961] print_report+0xd1/0x650 [ 15.460983] ? __virt_addr_valid+0x1db/0x2d0 [ 15.461006] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.461028] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.461052] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.461075] kasan_report+0x141/0x180 [ 15.461098] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.461125] kasan_check_range+0x10c/0x1c0 [ 15.461149] __kasan_check_write+0x18/0x20 [ 15.461170] kasan_atomics_helper+0xa2b/0x5450 [ 15.461193] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.461218] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.461244] ? kasan_atomics+0x152/0x310 [ 15.461271] kasan_atomics+0x1dc/0x310 [ 15.461294] ? __pfx_kasan_atomics+0x10/0x10 [ 15.461320] ? __pfx_read_tsc+0x10/0x10 [ 15.461427] ? ktime_get_ts64+0x86/0x230 [ 15.461456] kunit_try_run_case+0x1a5/0x480 [ 15.461481] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.461505] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.461530] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.461555] ? __kthread_parkme+0x82/0x180 [ 15.461577] ? preempt_count_sub+0x50/0x80 [ 15.461601] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.461628] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.461653] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.461680] kthread+0x337/0x6f0 [ 15.461700] ? trace_preempt_on+0x20/0xc0 [ 15.461723] ? __pfx_kthread+0x10/0x10 [ 15.461745] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.461768] ? calculate_sigpending+0x7b/0xa0 [ 15.461793] ? __pfx_kthread+0x10/0x10 [ 15.461816] ret_from_fork+0x116/0x1d0 [ 15.461835] ? __pfx_kthread+0x10/0x10 [ 15.461857] ret_from_fork_asm+0x1a/0x30 [ 15.461888] </TASK> [ 15.461899] [ 15.469697] Allocated by task 283: [ 15.469881] kasan_save_stack+0x45/0x70 [ 15.470087] kasan_save_track+0x18/0x40 [ 15.470242] kasan_save_alloc_info+0x3b/0x50 [ 15.470618] __kasan_kmalloc+0xb7/0xc0 [ 15.470807] __kmalloc_cache_noprof+0x189/0x420 [ 15.471026] kasan_atomics+0x95/0x310 [ 15.471163] kunit_try_run_case+0x1a5/0x480 [ 15.471482] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.471749] kthread+0x337/0x6f0 [ 15.471901] ret_from_fork+0x116/0x1d0 [ 15.472038] ret_from_fork_asm+0x1a/0x30 [ 15.472242] [ 15.472417] The buggy address belongs to the object at ffff8881039b8c80 [ 15.472417] which belongs to the cache kmalloc-64 of size 64 [ 15.472906] The buggy address is located 0 bytes to the right of [ 15.472906] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 15.473479] [ 15.473561] The buggy address belongs to the physical page: [ 15.473760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.474049] flags: 0x200000000000000(node=0|zone=2) [ 15.474212] page_type: f5(slab) [ 15.474403] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.474776] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.475116] page dumped because: kasan: bad access detected [ 15.475628] [ 15.475732] Memory state around the buggy address: [ 15.475963] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.476219] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.476542] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.476869] ^ [ 15.477094] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.477510] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.477832] ================================================================== [ 15.311316] ================================================================== [ 15.312112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 15.312494] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.312826] [ 15.312936] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.312977] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.312990] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.313058] Call Trace: [ 15.313076] <TASK> [ 15.313091] dump_stack_lvl+0x73/0xb0 [ 15.313122] print_report+0xd1/0x650 [ 15.313146] ? __virt_addr_valid+0x1db/0x2d0 [ 15.313171] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.313193] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.313232] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.313255] kasan_report+0x141/0x180 [ 15.313290] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.313318] kasan_check_range+0x10c/0x1c0 [ 15.313343] __kasan_check_write+0x18/0x20 [ 15.313418] kasan_atomics_helper+0x5fe/0x5450 [ 15.313454] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.313479] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.313517] ? kasan_atomics+0x152/0x310 [ 15.313545] kasan_atomics+0x1dc/0x310 [ 15.313569] ? __pfx_kasan_atomics+0x10/0x10 [ 15.313595] ? __pfx_read_tsc+0x10/0x10 [ 15.313627] ? ktime_get_ts64+0x86/0x230 [ 15.313652] kunit_try_run_case+0x1a5/0x480 [ 15.313680] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.313717] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.313744] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.313769] ? __kthread_parkme+0x82/0x180 [ 15.313799] ? preempt_count_sub+0x50/0x80 [ 15.313824] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.313849] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.313886] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.313914] kthread+0x337/0x6f0 [ 15.313934] ? trace_preempt_on+0x20/0xc0 [ 15.313959] ? __pfx_kthread+0x10/0x10 [ 15.313980] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.314012] ? calculate_sigpending+0x7b/0xa0 [ 15.314036] ? __pfx_kthread+0x10/0x10 [ 15.314059] ret_from_fork+0x116/0x1d0 [ 15.314088] ? __pfx_kthread+0x10/0x10 [ 15.314110] ret_from_fork_asm+0x1a/0x30 [ 15.314143] </TASK> [ 15.314163] [ 15.325339] Allocated by task 283: [ 15.325574] kasan_save_stack+0x45/0x70 [ 15.325914] kasan_save_track+0x18/0x40 [ 15.326218] kasan_save_alloc_info+0x3b/0x50 [ 15.326734] __kasan_kmalloc+0xb7/0xc0 [ 15.326940] __kmalloc_cache_noprof+0x189/0x420 [ 15.327276] kasan_atomics+0x95/0x310 [ 15.327586] kunit_try_run_case+0x1a5/0x480 [ 15.327898] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.328242] kthread+0x337/0x6f0 [ 15.328569] ret_from_fork+0x116/0x1d0 [ 15.328750] ret_from_fork_asm+0x1a/0x30 [ 15.328953] [ 15.329037] The buggy address belongs to the object at ffff8881039b8c80 [ 15.329037] which belongs to the cache kmalloc-64 of size 64 [ 15.329900] The buggy address is located 0 bytes to the right of [ 15.329900] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 15.330616] [ 15.330943] The buggy address belongs to the physical page: [ 15.331189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.331884] flags: 0x200000000000000(node=0|zone=2) [ 15.332144] page_type: f5(slab) [ 15.332283] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.332929] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.333305] page dumped because: kasan: bad access detected [ 15.333830] [ 15.333928] Memory state around the buggy address: [ 15.334090] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.334717] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.334988] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.335303] ^ [ 15.335902] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.336129] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.336364] ================================================================== [ 15.360467] ================================================================== [ 15.360772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 15.361057] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.361360] [ 15.361471] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.361511] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.361524] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.361544] Call Trace: [ 15.361557] <TASK> [ 15.361724] dump_stack_lvl+0x73/0xb0 [ 15.361760] print_report+0xd1/0x650 [ 15.361784] ? __virt_addr_valid+0x1db/0x2d0 [ 15.361807] ? kasan_atomics_helper+0x72f/0x5450 [ 15.361830] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.361855] ? kasan_atomics_helper+0x72f/0x5450 [ 15.361879] kasan_report+0x141/0x180 [ 15.361902] ? kasan_atomics_helper+0x72f/0x5450 [ 15.361930] kasan_check_range+0x10c/0x1c0 [ 15.361956] __kasan_check_write+0x18/0x20 [ 15.361978] kasan_atomics_helper+0x72f/0x5450 [ 15.362003] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.362028] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.362054] ? kasan_atomics+0x152/0x310 [ 15.362083] kasan_atomics+0x1dc/0x310 [ 15.362107] ? __pfx_kasan_atomics+0x10/0x10 [ 15.362133] ? __pfx_read_tsc+0x10/0x10 [ 15.362156] ? ktime_get_ts64+0x86/0x230 [ 15.362180] kunit_try_run_case+0x1a5/0x480 [ 15.362205] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.362230] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.362255] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.362280] ? __kthread_parkme+0x82/0x180 [ 15.362301] ? preempt_count_sub+0x50/0x80 [ 15.362325] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.362365] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.362392] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.362417] kthread+0x337/0x6f0 [ 15.362437] ? trace_preempt_on+0x20/0xc0 [ 15.362461] ? __pfx_kthread+0x10/0x10 [ 15.362484] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.362506] ? calculate_sigpending+0x7b/0xa0 [ 15.362532] ? __pfx_kthread+0x10/0x10 [ 15.362553] ret_from_fork+0x116/0x1d0 [ 15.362573] ? __pfx_kthread+0x10/0x10 [ 15.362594] ret_from_fork_asm+0x1a/0x30 [ 15.362636] </TASK> [ 15.362694] [ 15.370547] Allocated by task 283: [ 15.370736] kasan_save_stack+0x45/0x70 [ 15.370930] kasan_save_track+0x18/0x40 [ 15.371113] kasan_save_alloc_info+0x3b/0x50 [ 15.371298] __kasan_kmalloc+0xb7/0xc0 [ 15.371448] __kmalloc_cache_noprof+0x189/0x420 [ 15.371609] kasan_atomics+0x95/0x310 [ 15.371806] kunit_try_run_case+0x1a5/0x480 [ 15.372176] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.372528] kthread+0x337/0x6f0 [ 15.372793] ret_from_fork+0x116/0x1d0 [ 15.372933] ret_from_fork_asm+0x1a/0x30 [ 15.373073] [ 15.373170] The buggy address belongs to the object at ffff8881039b8c80 [ 15.373170] which belongs to the cache kmalloc-64 of size 64 [ 15.374216] The buggy address is located 0 bytes to the right of [ 15.374216] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 15.374733] [ 15.374808] The buggy address belongs to the physical page: [ 15.375054] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.375407] flags: 0x200000000000000(node=0|zone=2) [ 15.375571] page_type: f5(slab) [ 15.375697] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.375933] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.376333] page dumped because: kasan: bad access detected [ 15.376660] [ 15.376755] Memory state around the buggy address: [ 15.376938] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.377155] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.377471] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.378175] ^ [ 15.378529] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.378819] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.379086] ================================================================== [ 15.400404] ================================================================== [ 15.401282] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 15.401929] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.402253] [ 15.402669] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.402718] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.402741] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.402763] Call Trace: [ 15.402779] <TASK> [ 15.402795] dump_stack_lvl+0x73/0xb0 [ 15.402829] print_report+0xd1/0x650 [ 15.402852] ? __virt_addr_valid+0x1db/0x2d0 [ 15.402877] ? kasan_atomics_helper+0x860/0x5450 [ 15.402899] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.402924] ? kasan_atomics_helper+0x860/0x5450 [ 15.402947] kasan_report+0x141/0x180 [ 15.402971] ? kasan_atomics_helper+0x860/0x5450 [ 15.402999] kasan_check_range+0x10c/0x1c0 [ 15.403024] __kasan_check_write+0x18/0x20 [ 15.403046] kasan_atomics_helper+0x860/0x5450 [ 15.403070] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.403094] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.403122] ? kasan_atomics+0x152/0x310 [ 15.403149] kasan_atomics+0x1dc/0x310 [ 15.403172] ? __pfx_kasan_atomics+0x10/0x10 [ 15.403198] ? __pfx_read_tsc+0x10/0x10 [ 15.403221] ? ktime_get_ts64+0x86/0x230 [ 15.403245] kunit_try_run_case+0x1a5/0x480 [ 15.403270] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.403295] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.403321] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.403627] ? __kthread_parkme+0x82/0x180 [ 15.403660] ? preempt_count_sub+0x50/0x80 [ 15.403687] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.403713] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.403741] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.403767] kthread+0x337/0x6f0 [ 15.403787] ? trace_preempt_on+0x20/0xc0 [ 15.403813] ? __pfx_kthread+0x10/0x10 [ 15.403835] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.403858] ? calculate_sigpending+0x7b/0xa0 [ 15.403884] ? __pfx_kthread+0x10/0x10 [ 15.403906] ret_from_fork+0x116/0x1d0 [ 15.403925] ? __pfx_kthread+0x10/0x10 [ 15.403947] ret_from_fork_asm+0x1a/0x30 [ 15.403978] </TASK> [ 15.403989] [ 15.412708] Allocated by task 283: [ 15.413113] kasan_save_stack+0x45/0x70 [ 15.413338] kasan_save_track+0x18/0x40 [ 15.413585] kasan_save_alloc_info+0x3b/0x50 [ 15.413821] __kasan_kmalloc+0xb7/0xc0 [ 15.413970] __kmalloc_cache_noprof+0x189/0x420 [ 15.414128] kasan_atomics+0x95/0x310 [ 15.414319] kunit_try_run_case+0x1a5/0x480 [ 15.414600] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.414882] kthread+0x337/0x6f0 [ 15.415043] ret_from_fork+0x116/0x1d0 [ 15.415233] ret_from_fork_asm+0x1a/0x30 [ 15.415541] [ 15.415620] The buggy address belongs to the object at ffff8881039b8c80 [ 15.415620] which belongs to the cache kmalloc-64 of size 64 [ 15.416133] The buggy address is located 0 bytes to the right of [ 15.416133] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 15.416735] [ 15.416841] The buggy address belongs to the physical page: [ 15.417089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.417481] flags: 0x200000000000000(node=0|zone=2) [ 15.417644] page_type: f5(slab) [ 15.417761] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.418069] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.418561] page dumped because: kasan: bad access detected [ 15.418843] [ 15.418957] Memory state around the buggy address: [ 15.419176] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.419612] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.419942] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.420262] ^ [ 15.420498] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.420821] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.421035] ================================================================== [ 15.422064] ================================================================== [ 15.422633] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 15.422988] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.423293] [ 15.423482] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.423527] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.423540] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.423560] Call Trace: [ 15.423573] <TASK> [ 15.423587] dump_stack_lvl+0x73/0xb0 [ 15.423617] print_report+0xd1/0x650 [ 15.423640] ? __virt_addr_valid+0x1db/0x2d0 [ 15.423664] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.423686] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.423710] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.423732] kasan_report+0x141/0x180 [ 15.423755] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.423783] kasan_check_range+0x10c/0x1c0 [ 15.423807] __kasan_check_write+0x18/0x20 [ 15.423828] kasan_atomics_helper+0x8f9/0x5450 [ 15.423852] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.423876] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.423903] ? kasan_atomics+0x152/0x310 [ 15.423930] kasan_atomics+0x1dc/0x310 [ 15.423954] ? __pfx_kasan_atomics+0x10/0x10 [ 15.423980] ? __pfx_read_tsc+0x10/0x10 [ 15.424002] ? ktime_get_ts64+0x86/0x230 [ 15.424027] kunit_try_run_case+0x1a5/0x480 [ 15.424052] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.424076] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.424101] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.424127] ? __kthread_parkme+0x82/0x180 [ 15.424149] ? preempt_count_sub+0x50/0x80 [ 15.424182] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.424208] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.424234] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.424261] kthread+0x337/0x6f0 [ 15.424281] ? trace_preempt_on+0x20/0xc0 [ 15.424305] ? __pfx_kthread+0x10/0x10 [ 15.424327] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.424374] ? calculate_sigpending+0x7b/0xa0 [ 15.424400] ? __pfx_kthread+0x10/0x10 [ 15.424464] ret_from_fork+0x116/0x1d0 [ 15.424486] ? __pfx_kthread+0x10/0x10 [ 15.424508] ret_from_fork_asm+0x1a/0x30 [ 15.424539] </TASK> [ 15.424551] [ 15.432519] Allocated by task 283: [ 15.432700] kasan_save_stack+0x45/0x70 [ 15.432849] kasan_save_track+0x18/0x40 [ 15.432987] kasan_save_alloc_info+0x3b/0x50 [ 15.433155] __kasan_kmalloc+0xb7/0xc0 [ 15.433318] __kmalloc_cache_noprof+0x189/0x420 [ 15.433710] kasan_atomics+0x95/0x310 [ 15.433884] kunit_try_run_case+0x1a5/0x480 [ 15.434096] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.434318] kthread+0x337/0x6f0 [ 15.434583] ret_from_fork+0x116/0x1d0 [ 15.434753] ret_from_fork_asm+0x1a/0x30 [ 15.434933] [ 15.435023] The buggy address belongs to the object at ffff8881039b8c80 [ 15.435023] which belongs to the cache kmalloc-64 of size 64 [ 15.435503] The buggy address is located 0 bytes to the right of [ 15.435503] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 15.436007] [ 15.436103] The buggy address belongs to the physical page: [ 15.436454] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.436812] flags: 0x200000000000000(node=0|zone=2) [ 15.437046] page_type: f5(slab) [ 15.437216] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.437595] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.437937] page dumped because: kasan: bad access detected [ 15.438167] [ 15.438263] Memory state around the buggy address: [ 15.438677] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.438974] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.439262] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.439613] ^ [ 15.439775] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.440106] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.440520] ================================================================== [ 15.557497] ================================================================== [ 15.557737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 15.558062] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.558562] [ 15.558680] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.558721] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.558733] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.558754] Call Trace: [ 15.558767] <TASK> [ 15.558781] dump_stack_lvl+0x73/0xb0 [ 15.558811] print_report+0xd1/0x650 [ 15.558835] ? __virt_addr_valid+0x1db/0x2d0 [ 15.558858] ? kasan_atomics_helper+0xd47/0x5450 [ 15.558880] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.558905] ? kasan_atomics_helper+0xd47/0x5450 [ 15.558929] kasan_report+0x141/0x180 [ 15.558952] ? kasan_atomics_helper+0xd47/0x5450 [ 15.558979] kasan_check_range+0x10c/0x1c0 [ 15.559004] __kasan_check_write+0x18/0x20 [ 15.559025] kasan_atomics_helper+0xd47/0x5450 [ 15.559049] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.559074] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.559101] ? kasan_atomics+0x152/0x310 [ 15.559128] kasan_atomics+0x1dc/0x310 [ 15.559152] ? __pfx_kasan_atomics+0x10/0x10 [ 15.559177] ? __pfx_read_tsc+0x10/0x10 [ 15.559199] ? ktime_get_ts64+0x86/0x230 [ 15.559224] kunit_try_run_case+0x1a5/0x480 [ 15.559249] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.559274] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.559300] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.559325] ? __kthread_parkme+0x82/0x180 [ 15.559362] ? preempt_count_sub+0x50/0x80 [ 15.559387] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.559413] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.559439] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.559466] kthread+0x337/0x6f0 [ 15.559487] ? trace_preempt_on+0x20/0xc0 [ 15.559512] ? __pfx_kthread+0x10/0x10 [ 15.559534] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.559557] ? calculate_sigpending+0x7b/0xa0 [ 15.559583] ? __pfx_kthread+0x10/0x10 [ 15.559606] ret_from_fork+0x116/0x1d0 [ 15.559626] ? __pfx_kthread+0x10/0x10 [ 15.559648] ret_from_fork_asm+0x1a/0x30 [ 15.559745] </TASK> [ 15.559758] [ 15.567543] Allocated by task 283: [ 15.567680] kasan_save_stack+0x45/0x70 [ 15.567824] kasan_save_track+0x18/0x40 [ 15.568135] kasan_save_alloc_info+0x3b/0x50 [ 15.568366] __kasan_kmalloc+0xb7/0xc0 [ 15.568651] __kmalloc_cache_noprof+0x189/0x420 [ 15.568886] kasan_atomics+0x95/0x310 [ 15.569060] kunit_try_run_case+0x1a5/0x480 [ 15.569234] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.569531] kthread+0x337/0x6f0 [ 15.569711] ret_from_fork+0x116/0x1d0 [ 15.569896] ret_from_fork_asm+0x1a/0x30 [ 15.570054] [ 15.570149] The buggy address belongs to the object at ffff8881039b8c80 [ 15.570149] which belongs to the cache kmalloc-64 of size 64 [ 15.570659] The buggy address is located 0 bytes to the right of [ 15.570659] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 15.571019] [ 15.571113] The buggy address belongs to the physical page: [ 15.571384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.571720] flags: 0x200000000000000(node=0|zone=2) [ 15.571879] page_type: f5(slab) [ 15.571999] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.572240] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.572811] page dumped because: kasan: bad access detected [ 15.573068] [ 15.573164] Memory state around the buggy address: [ 15.573406] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.573812] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.574065] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.574442] ^ [ 15.574677] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.574954] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.575160] ================================================================== [ 15.212550] ================================================================== [ 15.213191] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 15.213716] Read of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.214323] [ 15.214525] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.214669] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.214686] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.214706] Call Trace: [ 15.214724] <TASK> [ 15.214741] dump_stack_lvl+0x73/0xb0 [ 15.214773] print_report+0xd1/0x650 [ 15.214798] ? __virt_addr_valid+0x1db/0x2d0 [ 15.214820] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.214843] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.214867] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.214891] kasan_report+0x141/0x180 [ 15.214914] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.214942] __asan_report_load4_noabort+0x18/0x20 [ 15.214968] kasan_atomics_helper+0x4b54/0x5450 [ 15.214991] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.215015] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.215042] ? kasan_atomics+0x152/0x310 [ 15.215070] kasan_atomics+0x1dc/0x310 [ 15.215093] ? __pfx_kasan_atomics+0x10/0x10 [ 15.215118] ? __pfx_read_tsc+0x10/0x10 [ 15.215140] ? ktime_get_ts64+0x86/0x230 [ 15.215164] kunit_try_run_case+0x1a5/0x480 [ 15.215189] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.215213] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.215238] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.215263] ? __kthread_parkme+0x82/0x180 [ 15.215285] ? preempt_count_sub+0x50/0x80 [ 15.215309] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.215335] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.215391] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.215461] kthread+0x337/0x6f0 [ 15.215484] ? trace_preempt_on+0x20/0xc0 [ 15.215509] ? __pfx_kthread+0x10/0x10 [ 15.215531] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.215554] ? calculate_sigpending+0x7b/0xa0 [ 15.215580] ? __pfx_kthread+0x10/0x10 [ 15.215602] ret_from_fork+0x116/0x1d0 [ 15.215622] ? __pfx_kthread+0x10/0x10 [ 15.215643] ret_from_fork_asm+0x1a/0x30 [ 15.215674] </TASK> [ 15.215686] [ 15.226149] Allocated by task 283: [ 15.226619] kasan_save_stack+0x45/0x70 [ 15.226941] kasan_save_track+0x18/0x40 [ 15.227214] kasan_save_alloc_info+0x3b/0x50 [ 15.227819] __kasan_kmalloc+0xb7/0xc0 [ 15.228019] __kmalloc_cache_noprof+0x189/0x420 [ 15.228213] kasan_atomics+0x95/0x310 [ 15.228861] kunit_try_run_case+0x1a5/0x480 [ 15.229081] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.229713] kthread+0x337/0x6f0 [ 15.229898] ret_from_fork+0x116/0x1d0 [ 15.230048] ret_from_fork_asm+0x1a/0x30 [ 15.230464] [ 15.230683] The buggy address belongs to the object at ffff8881039b8c80 [ 15.230683] which belongs to the cache kmalloc-64 of size 64 [ 15.231182] The buggy address is located 0 bytes to the right of [ 15.231182] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 15.232067] [ 15.232152] The buggy address belongs to the physical page: [ 15.232778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.233249] flags: 0x200000000000000(node=0|zone=2) [ 15.233680] page_type: f5(slab) [ 15.233820] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.234291] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.234826] page dumped because: kasan: bad access detected [ 15.235151] [ 15.235234] Memory state around the buggy address: [ 15.235539] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.236215] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.236711] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.237114] ^ [ 15.237371] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.238063] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.238544] ================================================================== [ 16.451125] ================================================================== [ 16.451541] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 16.451864] Read of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 16.452195] [ 16.452306] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.452365] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.452378] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.452399] Call Trace: [ 16.452425] <TASK> [ 16.452441] dump_stack_lvl+0x73/0xb0 [ 16.452472] print_report+0xd1/0x650 [ 16.452498] ? __virt_addr_valid+0x1db/0x2d0 [ 16.452522] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.452544] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.452579] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.452603] kasan_report+0x141/0x180 [ 16.452636] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.452665] __asan_report_load8_noabort+0x18/0x20 [ 16.452691] kasan_atomics_helper+0x4fa5/0x5450 [ 16.452717] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.452749] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.452775] ? kasan_atomics+0x152/0x310 [ 16.452803] kasan_atomics+0x1dc/0x310 [ 16.452837] ? __pfx_kasan_atomics+0x10/0x10 [ 16.452863] ? __pfx_read_tsc+0x10/0x10 [ 16.452885] ? ktime_get_ts64+0x86/0x230 [ 16.452910] kunit_try_run_case+0x1a5/0x480 [ 16.452935] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.452959] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.452984] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.453010] ? __kthread_parkme+0x82/0x180 [ 16.453031] ? preempt_count_sub+0x50/0x80 [ 16.453056] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.453082] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.453108] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.453134] kthread+0x337/0x6f0 [ 16.453154] ? trace_preempt_on+0x20/0xc0 [ 16.453179] ? __pfx_kthread+0x10/0x10 [ 16.453200] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.453223] ? calculate_sigpending+0x7b/0xa0 [ 16.453249] ? __pfx_kthread+0x10/0x10 [ 16.453271] ret_from_fork+0x116/0x1d0 [ 16.453298] ? __pfx_kthread+0x10/0x10 [ 16.453320] ret_from_fork_asm+0x1a/0x30 [ 16.453368] </TASK> [ 16.453380] [ 16.461091] Allocated by task 283: [ 16.461289] kasan_save_stack+0x45/0x70 [ 16.461500] kasan_save_track+0x18/0x40 [ 16.461684] kasan_save_alloc_info+0x3b/0x50 [ 16.461901] __kasan_kmalloc+0xb7/0xc0 [ 16.462100] __kmalloc_cache_noprof+0x189/0x420 [ 16.462287] kasan_atomics+0x95/0x310 [ 16.462440] kunit_try_run_case+0x1a5/0x480 [ 16.462676] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.462938] kthread+0x337/0x6f0 [ 16.463175] ret_from_fork+0x116/0x1d0 [ 16.463313] ret_from_fork_asm+0x1a/0x30 [ 16.463681] [ 16.463778] The buggy address belongs to the object at ffff8881039b8c80 [ 16.463778] which belongs to the cache kmalloc-64 of size 64 [ 16.464220] The buggy address is located 0 bytes to the right of [ 16.464220] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 16.464637] [ 16.464747] The buggy address belongs to the physical page: [ 16.464999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 16.465397] flags: 0x200000000000000(node=0|zone=2) [ 16.465558] page_type: f5(slab) [ 16.465679] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.466045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.466401] page dumped because: kasan: bad access detected [ 16.466681] [ 16.466798] Memory state around the buggy address: [ 16.467048] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.467329] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.467883] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.468130] ^ [ 16.468292] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.468628] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.468941] ================================================================== [ 15.102892] ================================================================== [ 15.103169] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 15.103612] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.104587] [ 15.104823] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.104868] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.104880] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.104899] Call Trace: [ 15.104998] <TASK> [ 15.105017] dump_stack_lvl+0x73/0xb0 [ 15.105050] print_report+0xd1/0x650 [ 15.105073] ? __virt_addr_valid+0x1db/0x2d0 [ 15.105095] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.105117] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.105141] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.105163] kasan_report+0x141/0x180 [ 15.105184] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.105210] __asan_report_store4_noabort+0x1b/0x30 [ 15.105236] kasan_atomics_helper+0x4ba2/0x5450 [ 15.105258] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.105281] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.105305] ? kasan_atomics+0x152/0x310 [ 15.105332] kasan_atomics+0x1dc/0x310 [ 15.105423] ? __pfx_kasan_atomics+0x10/0x10 [ 15.105449] ? __pfx_read_tsc+0x10/0x10 [ 15.105470] ? ktime_get_ts64+0x86/0x230 [ 15.105494] kunit_try_run_case+0x1a5/0x480 [ 15.105518] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.105541] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.105566] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.105590] ? __kthread_parkme+0x82/0x180 [ 15.105611] ? preempt_count_sub+0x50/0x80 [ 15.105634] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.105659] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.105683] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.105709] kthread+0x337/0x6f0 [ 15.105727] ? trace_preempt_on+0x20/0xc0 [ 15.105750] ? __pfx_kthread+0x10/0x10 [ 15.105771] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.105793] ? calculate_sigpending+0x7b/0xa0 [ 15.105817] ? __pfx_kthread+0x10/0x10 [ 15.105838] ret_from_fork+0x116/0x1d0 [ 15.105857] ? __pfx_kthread+0x10/0x10 [ 15.105877] ret_from_fork_asm+0x1a/0x30 [ 15.105908] </TASK> [ 15.105918] [ 15.117167] Allocated by task 283: [ 15.117361] kasan_save_stack+0x45/0x70 [ 15.117914] kasan_save_track+0x18/0x40 [ 15.118222] kasan_save_alloc_info+0x3b/0x50 [ 15.118678] __kasan_kmalloc+0xb7/0xc0 [ 15.118863] __kmalloc_cache_noprof+0x189/0x420 [ 15.119047] kasan_atomics+0x95/0x310 [ 15.119255] kunit_try_run_case+0x1a5/0x480 [ 15.119992] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.120215] kthread+0x337/0x6f0 [ 15.120792] ret_from_fork+0x116/0x1d0 [ 15.120988] ret_from_fork_asm+0x1a/0x30 [ 15.121156] [ 15.121458] The buggy address belongs to the object at ffff8881039b8c80 [ 15.121458] which belongs to the cache kmalloc-64 of size 64 [ 15.122097] The buggy address is located 0 bytes to the right of [ 15.122097] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 15.122890] [ 15.122978] The buggy address belongs to the physical page: [ 15.123382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.123938] flags: 0x200000000000000(node=0|zone=2) [ 15.124162] page_type: f5(slab) [ 15.124316] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.125067] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.125650] page dumped because: kasan: bad access detected [ 15.125996] [ 15.126241] Memory state around the buggy address: [ 15.126560] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.126991] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.127317] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.127845] ^ [ 15.128149] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.128650] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.128946] ================================================================== [ 15.270815] ================================================================== [ 15.271576] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 15.272315] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.272888] [ 15.272984] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.273026] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.273039] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.273061] Call Trace: [ 15.273075] <TASK> [ 15.273090] dump_stack_lvl+0x73/0xb0 [ 15.273122] print_report+0xd1/0x650 [ 15.273145] ? __virt_addr_valid+0x1db/0x2d0 [ 15.273169] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.273193] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.273217] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.273240] kasan_report+0x141/0x180 [ 15.273264] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.273292] __asan_report_store4_noabort+0x1b/0x30 [ 15.273319] kasan_atomics_helper+0x4b3a/0x5450 [ 15.273344] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.273382] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.273407] ? kasan_atomics+0x152/0x310 [ 15.273435] kasan_atomics+0x1dc/0x310 [ 15.273458] ? __pfx_kasan_atomics+0x10/0x10 [ 15.273483] ? __pfx_read_tsc+0x10/0x10 [ 15.273506] ? ktime_get_ts64+0x86/0x230 [ 15.273586] kunit_try_run_case+0x1a5/0x480 [ 15.273614] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.273650] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.273677] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.273702] ? __kthread_parkme+0x82/0x180 [ 15.273725] ? preempt_count_sub+0x50/0x80 [ 15.273750] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.273775] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.273801] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.273828] kthread+0x337/0x6f0 [ 15.273847] ? trace_preempt_on+0x20/0xc0 [ 15.273872] ? __pfx_kthread+0x10/0x10 [ 15.273893] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.273915] ? calculate_sigpending+0x7b/0xa0 [ 15.273940] ? __pfx_kthread+0x10/0x10 [ 15.273962] ret_from_fork+0x116/0x1d0 [ 15.273982] ? __pfx_kthread+0x10/0x10 [ 15.274003] ret_from_fork_asm+0x1a/0x30 [ 15.274035] </TASK> [ 15.274046] [ 15.282675] Allocated by task 283: [ 15.282866] kasan_save_stack+0x45/0x70 [ 15.283071] kasan_save_track+0x18/0x40 [ 15.283258] kasan_save_alloc_info+0x3b/0x50 [ 15.283549] __kasan_kmalloc+0xb7/0xc0 [ 15.283734] __kmalloc_cache_noprof+0x189/0x420 [ 15.283964] kasan_atomics+0x95/0x310 [ 15.284155] kunit_try_run_case+0x1a5/0x480 [ 15.284403] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.284724] kthread+0x337/0x6f0 [ 15.284923] ret_from_fork+0x116/0x1d0 [ 15.285080] ret_from_fork_asm+0x1a/0x30 [ 15.285221] [ 15.285293] The buggy address belongs to the object at ffff8881039b8c80 [ 15.285293] which belongs to the cache kmalloc-64 of size 64 [ 15.285697] The buggy address is located 0 bytes to the right of [ 15.285697] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 15.286860] [ 15.286954] The buggy address belongs to the physical page: [ 15.287235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.287612] flags: 0x200000000000000(node=0|zone=2) [ 15.287784] page_type: f5(slab) [ 15.287908] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.288293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.288758] page dumped because: kasan: bad access detected [ 15.289032] [ 15.289146] Memory state around the buggy address: [ 15.289432] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.289766] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.290047] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.290369] ^ [ 15.290714] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.291023] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.291335] ================================================================== [ 15.726582] ================================================================== [ 15.727085] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 15.727467] Read of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.728000] [ 15.728100] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.728171] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.728184] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.728204] Call Trace: [ 15.728229] <TASK> [ 15.728244] dump_stack_lvl+0x73/0xb0 [ 15.728274] print_report+0xd1/0x650 [ 15.728297] ? __virt_addr_valid+0x1db/0x2d0 [ 15.728320] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.728353] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.728378] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.728401] kasan_report+0x141/0x180 [ 15.728434] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.728461] __asan_report_load4_noabort+0x18/0x20 [ 15.728487] kasan_atomics_helper+0x4a1c/0x5450 [ 15.728512] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.728536] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.728562] ? kasan_atomics+0x152/0x310 [ 15.728599] kasan_atomics+0x1dc/0x310 [ 15.728622] ? __pfx_kasan_atomics+0x10/0x10 [ 15.728648] ? __pfx_read_tsc+0x10/0x10 [ 15.728680] ? ktime_get_ts64+0x86/0x230 [ 15.728706] kunit_try_run_case+0x1a5/0x480 [ 15.728731] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.728755] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.728781] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.728806] ? __kthread_parkme+0x82/0x180 [ 15.728827] ? preempt_count_sub+0x50/0x80 [ 15.728861] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.728887] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.728923] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.728950] kthread+0x337/0x6f0 [ 15.728969] ? trace_preempt_on+0x20/0xc0 [ 15.729002] ? __pfx_kthread+0x10/0x10 [ 15.729024] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.729047] ? calculate_sigpending+0x7b/0xa0 [ 15.729082] ? __pfx_kthread+0x10/0x10 [ 15.729105] ret_from_fork+0x116/0x1d0 [ 15.729124] ? __pfx_kthread+0x10/0x10 [ 15.729146] ret_from_fork_asm+0x1a/0x30 [ 15.729187] </TASK> [ 15.729198] [ 15.737132] Allocated by task 283: [ 15.737271] kasan_save_stack+0x45/0x70 [ 15.737429] kasan_save_track+0x18/0x40 [ 15.737570] kasan_save_alloc_info+0x3b/0x50 [ 15.737723] __kasan_kmalloc+0xb7/0xc0 [ 15.737943] __kmalloc_cache_noprof+0x189/0x420 [ 15.738168] kasan_atomics+0x95/0x310 [ 15.738366] kunit_try_run_case+0x1a5/0x480 [ 15.738575] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.739022] kthread+0x337/0x6f0 [ 15.739146] ret_from_fork+0x116/0x1d0 [ 15.739281] ret_from_fork_asm+0x1a/0x30 [ 15.739476] [ 15.739574] The buggy address belongs to the object at ffff8881039b8c80 [ 15.739574] which belongs to the cache kmalloc-64 of size 64 [ 15.740141] The buggy address is located 0 bytes to the right of [ 15.740141] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 15.740958] [ 15.741049] The buggy address belongs to the physical page: [ 15.741222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.741679] flags: 0x200000000000000(node=0|zone=2) [ 15.741929] page_type: f5(slab) [ 15.742113] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.742508] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.742824] page dumped because: kasan: bad access detected [ 15.743077] [ 15.743164] Memory state around the buggy address: [ 15.743403] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.744231] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.745187] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.745809] ^ [ 15.746019] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.746309] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.747106] ================================================================== [ 16.333427] ================================================================== [ 16.333738] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 16.334286] Read of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 16.334690] [ 16.334787] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.334827] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.334839] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.334859] Call Trace: [ 16.334884] <TASK> [ 16.334899] dump_stack_lvl+0x73/0xb0 [ 16.334930] print_report+0xd1/0x650 [ 16.334965] ? __virt_addr_valid+0x1db/0x2d0 [ 16.334989] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.335012] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.335036] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.335060] kasan_report+0x141/0x180 [ 16.335083] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.335110] __asan_report_load8_noabort+0x18/0x20 [ 16.335137] kasan_atomics_helper+0x4f71/0x5450 [ 16.335170] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.335194] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.335220] ? kasan_atomics+0x152/0x310 [ 16.335258] kasan_atomics+0x1dc/0x310 [ 16.335282] ? __pfx_kasan_atomics+0x10/0x10 [ 16.335307] ? __pfx_read_tsc+0x10/0x10 [ 16.335337] ? ktime_get_ts64+0x86/0x230 [ 16.335372] kunit_try_run_case+0x1a5/0x480 [ 16.335420] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.335446] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.335472] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.335497] ? __kthread_parkme+0x82/0x180 [ 16.335519] ? preempt_count_sub+0x50/0x80 [ 16.335553] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.335580] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.335615] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.335643] kthread+0x337/0x6f0 [ 16.335663] ? trace_preempt_on+0x20/0xc0 [ 16.335688] ? __pfx_kthread+0x10/0x10 [ 16.335720] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.335742] ? calculate_sigpending+0x7b/0xa0 [ 16.335777] ? __pfx_kthread+0x10/0x10 [ 16.335802] ret_from_fork+0x116/0x1d0 [ 16.335822] ? __pfx_kthread+0x10/0x10 [ 16.335844] ret_from_fork_asm+0x1a/0x30 [ 16.335876] </TASK> [ 16.335888] [ 16.343312] Allocated by task 283: [ 16.343524] kasan_save_stack+0x45/0x70 [ 16.343733] kasan_save_track+0x18/0x40 [ 16.343928] kasan_save_alloc_info+0x3b/0x50 [ 16.344135] __kasan_kmalloc+0xb7/0xc0 [ 16.344332] __kmalloc_cache_noprof+0x189/0x420 [ 16.344585] kasan_atomics+0x95/0x310 [ 16.344745] kunit_try_run_case+0x1a5/0x480 [ 16.344972] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.345151] kthread+0x337/0x6f0 [ 16.345273] ret_from_fork+0x116/0x1d0 [ 16.345467] ret_from_fork_asm+0x1a/0x30 [ 16.345689] [ 16.345786] The buggy address belongs to the object at ffff8881039b8c80 [ 16.345786] which belongs to the cache kmalloc-64 of size 64 [ 16.346304] The buggy address is located 0 bytes to the right of [ 16.346304] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 16.346823] [ 16.346947] The buggy address belongs to the physical page: [ 16.347179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 16.347496] flags: 0x200000000000000(node=0|zone=2) [ 16.347662] page_type: f5(slab) [ 16.347784] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.348017] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.348336] page dumped because: kasan: bad access detected [ 16.348621] [ 16.348716] Memory state around the buggy address: [ 16.348938] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.349283] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.349694] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.350074] ^ [ 16.350334] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.350648] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.350962] ================================================================== [ 15.849811] ================================================================== [ 15.850178] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 15.850481] Read of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.850738] [ 15.850863] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.850906] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.850918] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.850939] Call Trace: [ 15.850952] <TASK> [ 15.850966] dump_stack_lvl+0x73/0xb0 [ 15.851021] print_report+0xd1/0x650 [ 15.851044] ? __virt_addr_valid+0x1db/0x2d0 [ 15.851079] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.851103] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.851128] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.851151] kasan_report+0x141/0x180 [ 15.851174] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.851202] __asan_report_load4_noabort+0x18/0x20 [ 15.851228] kasan_atomics_helper+0x49ce/0x5450 [ 15.851252] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.851276] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.851301] ? kasan_atomics+0x152/0x310 [ 15.851328] kasan_atomics+0x1dc/0x310 [ 15.851363] ? __pfx_kasan_atomics+0x10/0x10 [ 15.851419] ? __pfx_read_tsc+0x10/0x10 [ 15.851442] ? ktime_get_ts64+0x86/0x230 [ 15.851467] kunit_try_run_case+0x1a5/0x480 [ 15.851530] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.851554] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.851591] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.851616] ? __kthread_parkme+0x82/0x180 [ 15.851638] ? preempt_count_sub+0x50/0x80 [ 15.851663] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.851717] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.851755] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.851793] kthread+0x337/0x6f0 [ 15.851813] ? trace_preempt_on+0x20/0xc0 [ 15.851865] ? __pfx_kthread+0x10/0x10 [ 15.851898] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.851932] ? calculate_sigpending+0x7b/0xa0 [ 15.851958] ? __pfx_kthread+0x10/0x10 [ 15.851981] ret_from_fork+0x116/0x1d0 [ 15.852000] ? __pfx_kthread+0x10/0x10 [ 15.852022] ret_from_fork_asm+0x1a/0x30 [ 15.852054] </TASK> [ 15.852065] [ 15.859827] Allocated by task 283: [ 15.859950] kasan_save_stack+0x45/0x70 [ 15.860089] kasan_save_track+0x18/0x40 [ 15.860224] kasan_save_alloc_info+0x3b/0x50 [ 15.860485] __kasan_kmalloc+0xb7/0xc0 [ 15.860724] __kmalloc_cache_noprof+0x189/0x420 [ 15.861055] kasan_atomics+0x95/0x310 [ 15.861230] kunit_try_run_case+0x1a5/0x480 [ 15.861469] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.861727] kthread+0x337/0x6f0 [ 15.861874] ret_from_fork+0x116/0x1d0 [ 15.862043] ret_from_fork_asm+0x1a/0x30 [ 15.862178] [ 15.862268] The buggy address belongs to the object at ffff8881039b8c80 [ 15.862268] which belongs to the cache kmalloc-64 of size 64 [ 15.862938] The buggy address is located 0 bytes to the right of [ 15.862938] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 15.863586] [ 15.863666] The buggy address belongs to the physical page: [ 15.863961] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.864321] flags: 0x200000000000000(node=0|zone=2) [ 15.864581] page_type: f5(slab) [ 15.864845] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.865071] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.865382] page dumped because: kasan: bad access detected [ 15.865942] [ 15.866040] Memory state around the buggy address: [ 15.866191] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.866409] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.866767] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.867130] ^ [ 15.867369] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.867644] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.867998] ================================================================== [ 16.051636] ================================================================== [ 16.052001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 16.052320] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 16.052769] [ 16.052883] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.052968] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.053006] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.053037] Call Trace: [ 16.053110] <TASK> [ 16.053126] dump_stack_lvl+0x73/0xb0 [ 16.053168] print_report+0xd1/0x650 [ 16.053192] ? __virt_addr_valid+0x1db/0x2d0 [ 16.053214] ? kasan_atomics_helper+0x1818/0x5450 [ 16.053237] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.053261] ? kasan_atomics_helper+0x1818/0x5450 [ 16.053284] kasan_report+0x141/0x180 [ 16.053307] ? kasan_atomics_helper+0x1818/0x5450 [ 16.053335] kasan_check_range+0x10c/0x1c0 [ 16.053368] __kasan_check_write+0x18/0x20 [ 16.053389] kasan_atomics_helper+0x1818/0x5450 [ 16.053434] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.053457] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.053484] ? kasan_atomics+0x152/0x310 [ 16.053512] kasan_atomics+0x1dc/0x310 [ 16.053534] ? __pfx_kasan_atomics+0x10/0x10 [ 16.053560] ? __pfx_read_tsc+0x10/0x10 [ 16.053582] ? ktime_get_ts64+0x86/0x230 [ 16.053606] kunit_try_run_case+0x1a5/0x480 [ 16.053631] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.053657] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.053681] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.053706] ? __kthread_parkme+0x82/0x180 [ 16.053727] ? preempt_count_sub+0x50/0x80 [ 16.053752] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.053777] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.053803] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.053829] kthread+0x337/0x6f0 [ 16.053849] ? trace_preempt_on+0x20/0xc0 [ 16.053873] ? __pfx_kthread+0x10/0x10 [ 16.053896] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.053919] ? calculate_sigpending+0x7b/0xa0 [ 16.053944] ? __pfx_kthread+0x10/0x10 [ 16.053967] ret_from_fork+0x116/0x1d0 [ 16.053986] ? __pfx_kthread+0x10/0x10 [ 16.054007] ret_from_fork_asm+0x1a/0x30 [ 16.054039] </TASK> [ 16.054050] [ 16.062678] Allocated by task 283: [ 16.063100] kasan_save_stack+0x45/0x70 [ 16.063304] kasan_save_track+0x18/0x40 [ 16.063535] kasan_save_alloc_info+0x3b/0x50 [ 16.063691] __kasan_kmalloc+0xb7/0xc0 [ 16.063946] __kmalloc_cache_noprof+0x189/0x420 [ 16.064186] kasan_atomics+0x95/0x310 [ 16.064393] kunit_try_run_case+0x1a5/0x480 [ 16.064676] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.064936] kthread+0x337/0x6f0 [ 16.065124] ret_from_fork+0x116/0x1d0 [ 16.065288] ret_from_fork_asm+0x1a/0x30 [ 16.065587] [ 16.065777] The buggy address belongs to the object at ffff8881039b8c80 [ 16.065777] which belongs to the cache kmalloc-64 of size 64 [ 16.066262] The buggy address is located 0 bytes to the right of [ 16.066262] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 16.066831] [ 16.066936] The buggy address belongs to the physical page: [ 16.067196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 16.067580] flags: 0x200000000000000(node=0|zone=2) [ 16.067772] page_type: f5(slab) [ 16.067977] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.068431] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.068776] page dumped because: kasan: bad access detected [ 16.069030] [ 16.069124] Memory state around the buggy address: [ 16.069368] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.069690] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.070016] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.070440] ^ [ 16.070667] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.071072] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.071436] ================================================================== [ 15.707525] ================================================================== [ 15.707888] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 15.708716] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.709059] [ 15.709169] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.709223] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.709236] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.709255] Call Trace: [ 15.709284] <TASK> [ 15.709301] dump_stack_lvl+0x73/0xb0 [ 15.709330] print_report+0xd1/0x650 [ 15.709363] ? __virt_addr_valid+0x1db/0x2d0 [ 15.709385] ? kasan_atomics_helper+0x1079/0x5450 [ 15.709408] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.709433] ? kasan_atomics_helper+0x1079/0x5450 [ 15.709455] kasan_report+0x141/0x180 [ 15.709490] ? kasan_atomics_helper+0x1079/0x5450 [ 15.709517] kasan_check_range+0x10c/0x1c0 [ 15.709542] __kasan_check_write+0x18/0x20 [ 15.709563] kasan_atomics_helper+0x1079/0x5450 [ 15.709597] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.709621] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.709647] ? kasan_atomics+0x152/0x310 [ 15.709685] kasan_atomics+0x1dc/0x310 [ 15.709709] ? __pfx_kasan_atomics+0x10/0x10 [ 15.709734] ? __pfx_read_tsc+0x10/0x10 [ 15.709756] ? ktime_get_ts64+0x86/0x230 [ 15.709780] kunit_try_run_case+0x1a5/0x480 [ 15.709805] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.709829] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.709854] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.709888] ? __kthread_parkme+0x82/0x180 [ 15.709910] ? preempt_count_sub+0x50/0x80 [ 15.709935] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.709970] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.709996] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.710023] kthread+0x337/0x6f0 [ 15.710042] ? trace_preempt_on+0x20/0xc0 [ 15.710066] ? __pfx_kthread+0x10/0x10 [ 15.710088] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.710111] ? calculate_sigpending+0x7b/0xa0 [ 15.710136] ? __pfx_kthread+0x10/0x10 [ 15.710159] ret_from_fork+0x116/0x1d0 [ 15.710178] ? __pfx_kthread+0x10/0x10 [ 15.710200] ret_from_fork_asm+0x1a/0x30 [ 15.710232] </TASK> [ 15.710243] [ 15.718372] Allocated by task 283: [ 15.718584] kasan_save_stack+0x45/0x70 [ 15.718782] kasan_save_track+0x18/0x40 [ 15.718977] kasan_save_alloc_info+0x3b/0x50 [ 15.719133] __kasan_kmalloc+0xb7/0xc0 [ 15.719269] __kmalloc_cache_noprof+0x189/0x420 [ 15.719533] kasan_atomics+0x95/0x310 [ 15.719736] kunit_try_run_case+0x1a5/0x480 [ 15.719946] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.720238] kthread+0x337/0x6f0 [ 15.720376] ret_from_fork+0x116/0x1d0 [ 15.720716] ret_from_fork_asm+0x1a/0x30 [ 15.720895] [ 15.721005] The buggy address belongs to the object at ffff8881039b8c80 [ 15.721005] which belongs to the cache kmalloc-64 of size 64 [ 15.721530] The buggy address is located 0 bytes to the right of [ 15.721530] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 15.721969] [ 15.722043] The buggy address belongs to the physical page: [ 15.722295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.722674] flags: 0x200000000000000(node=0|zone=2) [ 15.722997] page_type: f5(slab) [ 15.723143] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.723387] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.723615] page dumped because: kasan: bad access detected [ 15.723806] [ 15.723898] Memory state around the buggy address: [ 15.724120] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.724464] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.724803] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.725116] ^ [ 15.725317] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.725781] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.726088] ================================================================== [ 15.986150] ================================================================== [ 15.986594] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 15.986926] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.987223] [ 15.987322] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.987375] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.987388] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.987408] Call Trace: [ 15.987471] <TASK> [ 15.987488] dump_stack_lvl+0x73/0xb0 [ 15.987518] print_report+0xd1/0x650 [ 15.987555] ? __virt_addr_valid+0x1db/0x2d0 [ 15.987579] ? kasan_atomics_helper+0x164f/0x5450 [ 15.987601] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.987625] ? kasan_atomics_helper+0x164f/0x5450 [ 15.987648] kasan_report+0x141/0x180 [ 15.987671] ? kasan_atomics_helper+0x164f/0x5450 [ 15.987698] kasan_check_range+0x10c/0x1c0 [ 15.987723] __kasan_check_write+0x18/0x20 [ 15.987743] kasan_atomics_helper+0x164f/0x5450 [ 15.987767] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.987791] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.987817] ? kasan_atomics+0x152/0x310 [ 15.987845] kasan_atomics+0x1dc/0x310 [ 15.987868] ? __pfx_kasan_atomics+0x10/0x10 [ 15.987894] ? __pfx_read_tsc+0x10/0x10 [ 15.987915] ? ktime_get_ts64+0x86/0x230 [ 15.987940] kunit_try_run_case+0x1a5/0x480 [ 15.987965] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.987990] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.988049] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.988075] ? __kthread_parkme+0x82/0x180 [ 15.988097] ? preempt_count_sub+0x50/0x80 [ 15.988165] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.988191] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.988228] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.988254] kthread+0x337/0x6f0 [ 15.988275] ? trace_preempt_on+0x20/0xc0 [ 15.988299] ? __pfx_kthread+0x10/0x10 [ 15.988321] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.988352] ? calculate_sigpending+0x7b/0xa0 [ 15.988377] ? __pfx_kthread+0x10/0x10 [ 15.988399] ret_from_fork+0x116/0x1d0 [ 15.988429] ? __pfx_kthread+0x10/0x10 [ 15.988450] ret_from_fork_asm+0x1a/0x30 [ 15.988481] </TASK> [ 15.988493] [ 15.996561] Allocated by task 283: [ 15.996713] kasan_save_stack+0x45/0x70 [ 15.996856] kasan_save_track+0x18/0x40 [ 15.997003] kasan_save_alloc_info+0x3b/0x50 [ 15.997267] __kasan_kmalloc+0xb7/0xc0 [ 15.997468] __kmalloc_cache_noprof+0x189/0x420 [ 15.997860] kasan_atomics+0x95/0x310 [ 15.998125] kunit_try_run_case+0x1a5/0x480 [ 15.998290] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.998494] kthread+0x337/0x6f0 [ 15.998666] ret_from_fork+0x116/0x1d0 [ 15.998912] ret_from_fork_asm+0x1a/0x30 [ 15.999115] [ 15.999211] The buggy address belongs to the object at ffff8881039b8c80 [ 15.999211] which belongs to the cache kmalloc-64 of size 64 [ 15.999737] The buggy address is located 0 bytes to the right of [ 15.999737] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 16.000276] [ 16.000360] The buggy address belongs to the physical page: [ 16.000534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 16.000809] flags: 0x200000000000000(node=0|zone=2) [ 16.001098] page_type: f5(slab) [ 16.001271] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.001625] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.001971] page dumped because: kasan: bad access detected [ 16.002237] [ 16.002378] Memory state around the buggy address: [ 16.002612] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.002962] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.003228] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.003453] ^ [ 16.003623] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.003945] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.004322] ================================================================== [ 15.887151] ================================================================== [ 15.887488] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 15.887958] Read of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.888235] [ 15.888317] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.888368] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.888381] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.888400] Call Trace: [ 15.888416] <TASK> [ 15.888431] dump_stack_lvl+0x73/0xb0 [ 15.888459] print_report+0xd1/0x650 [ 15.888482] ? __virt_addr_valid+0x1db/0x2d0 [ 15.888505] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.888526] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.888550] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.888573] kasan_report+0x141/0x180 [ 15.888595] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.888623] __asan_report_load8_noabort+0x18/0x20 [ 15.888649] kasan_atomics_helper+0x4eae/0x5450 [ 15.888707] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.888732] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.888769] ? kasan_atomics+0x152/0x310 [ 15.888796] kasan_atomics+0x1dc/0x310 [ 15.888820] ? __pfx_kasan_atomics+0x10/0x10 [ 15.888873] ? __pfx_read_tsc+0x10/0x10 [ 15.888894] ? ktime_get_ts64+0x86/0x230 [ 15.888929] kunit_try_run_case+0x1a5/0x480 [ 15.888955] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.888978] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.889004] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.889029] ? __kthread_parkme+0x82/0x180 [ 15.889050] ? preempt_count_sub+0x50/0x80 [ 15.889102] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.889139] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.889177] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.889203] kthread+0x337/0x6f0 [ 15.889224] ? trace_preempt_on+0x20/0xc0 [ 15.889247] ? __pfx_kthread+0x10/0x10 [ 15.889268] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.889291] ? calculate_sigpending+0x7b/0xa0 [ 15.889316] ? __pfx_kthread+0x10/0x10 [ 15.889338] ret_from_fork+0x116/0x1d0 [ 15.889366] ? __pfx_kthread+0x10/0x10 [ 15.889388] ret_from_fork_asm+0x1a/0x30 [ 15.889431] </TASK> [ 15.889442] [ 15.897156] Allocated by task 283: [ 15.897359] kasan_save_stack+0x45/0x70 [ 15.897575] kasan_save_track+0x18/0x40 [ 15.897778] kasan_save_alloc_info+0x3b/0x50 [ 15.897936] __kasan_kmalloc+0xb7/0xc0 [ 15.898111] __kmalloc_cache_noprof+0x189/0x420 [ 15.898337] kasan_atomics+0x95/0x310 [ 15.898645] kunit_try_run_case+0x1a5/0x480 [ 15.898903] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.899176] kthread+0x337/0x6f0 [ 15.899394] ret_from_fork+0x116/0x1d0 [ 15.899593] ret_from_fork_asm+0x1a/0x30 [ 15.899734] [ 15.899805] The buggy address belongs to the object at ffff8881039b8c80 [ 15.899805] which belongs to the cache kmalloc-64 of size 64 [ 15.900317] The buggy address is located 0 bytes to the right of [ 15.900317] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 15.901000] [ 15.901080] The buggy address belongs to the physical page: [ 15.901420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.901756] flags: 0x200000000000000(node=0|zone=2) [ 15.901922] page_type: f5(slab) [ 15.902045] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.902382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.902738] page dumped because: kasan: bad access detected [ 15.903031] [ 15.903169] Memory state around the buggy address: [ 15.903531] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.903835] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.904055] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.904337] ^ [ 15.904782] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.905117] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.905478] ================================================================== [ 15.156051] ================================================================== [ 15.156836] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 15.157279] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.157791] [ 15.157911] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.158273] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.158286] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.158307] Call Trace: [ 15.158322] <TASK> [ 15.158337] dump_stack_lvl+0x73/0xb0 [ 15.158390] print_report+0xd1/0x650 [ 15.158413] ? __virt_addr_valid+0x1db/0x2d0 [ 15.158437] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.158568] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.158593] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.158635] kasan_report+0x141/0x180 [ 15.158658] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.158686] __asan_report_store4_noabort+0x1b/0x30 [ 15.158713] kasan_atomics_helper+0x4b6e/0x5450 [ 15.158737] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.158761] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.158787] ? kasan_atomics+0x152/0x310 [ 15.158814] kasan_atomics+0x1dc/0x310 [ 15.158837] ? __pfx_kasan_atomics+0x10/0x10 [ 15.158862] ? __pfx_read_tsc+0x10/0x10 [ 15.158884] ? ktime_get_ts64+0x86/0x230 [ 15.158909] kunit_try_run_case+0x1a5/0x480 [ 15.158934] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.158958] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.158984] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.159009] ? __kthread_parkme+0x82/0x180 [ 15.159031] ? preempt_count_sub+0x50/0x80 [ 15.159056] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.159082] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.159108] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.159135] kthread+0x337/0x6f0 [ 15.159155] ? trace_preempt_on+0x20/0xc0 [ 15.159179] ? __pfx_kthread+0x10/0x10 [ 15.159201] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.159224] ? calculate_sigpending+0x7b/0xa0 [ 15.159249] ? __pfx_kthread+0x10/0x10 [ 15.159271] ret_from_fork+0x116/0x1d0 [ 15.159291] ? __pfx_kthread+0x10/0x10 [ 15.159313] ret_from_fork_asm+0x1a/0x30 [ 15.159356] </TASK> [ 15.159386] [ 15.171099] Allocated by task 283: [ 15.171504] kasan_save_stack+0x45/0x70 [ 15.171673] kasan_save_track+0x18/0x40 [ 15.172046] kasan_save_alloc_info+0x3b/0x50 [ 15.172510] __kasan_kmalloc+0xb7/0xc0 [ 15.172718] __kmalloc_cache_noprof+0x189/0x420 [ 15.172921] kasan_atomics+0x95/0x310 [ 15.173097] kunit_try_run_case+0x1a5/0x480 [ 15.173291] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.174340] kthread+0x337/0x6f0 [ 15.175008] ret_from_fork+0x116/0x1d0 [ 15.175184] ret_from_fork_asm+0x1a/0x30 [ 15.175375] [ 15.176026] The buggy address belongs to the object at ffff8881039b8c80 [ 15.176026] which belongs to the cache kmalloc-64 of size 64 [ 15.177316] The buggy address is located 0 bytes to the right of [ 15.177316] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 15.178132] [ 15.178327] The buggy address belongs to the physical page: [ 15.178742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.179155] flags: 0x200000000000000(node=0|zone=2) [ 15.179389] page_type: f5(slab) [ 15.179920] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.180243] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.180926] page dumped because: kasan: bad access detected [ 15.181301] [ 15.181581] Memory state around the buggy address: [ 15.181854] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.182174] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.182706] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.183101] ^ [ 15.183539] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.183989] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.184579] ================================================================== [ 15.748692] ================================================================== [ 15.749010] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 15.749327] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.750027] [ 15.750287] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.750361] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.750375] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.750395] Call Trace: [ 15.750411] <TASK> [ 15.750434] dump_stack_lvl+0x73/0xb0 [ 15.750467] print_report+0xd1/0x650 [ 15.750490] ? __virt_addr_valid+0x1db/0x2d0 [ 15.750515] ? kasan_atomics_helper+0x1148/0x5450 [ 15.750539] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.750563] ? kasan_atomics_helper+0x1148/0x5450 [ 15.750587] kasan_report+0x141/0x180 [ 15.750611] ? kasan_atomics_helper+0x1148/0x5450 [ 15.750639] kasan_check_range+0x10c/0x1c0 [ 15.750663] __kasan_check_write+0x18/0x20 [ 15.750684] kasan_atomics_helper+0x1148/0x5450 [ 15.750708] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.750732] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.750758] ? kasan_atomics+0x152/0x310 [ 15.750787] kasan_atomics+0x1dc/0x310 [ 15.750810] ? __pfx_kasan_atomics+0x10/0x10 [ 15.750836] ? __pfx_read_tsc+0x10/0x10 [ 15.750858] ? ktime_get_ts64+0x86/0x230 [ 15.750883] kunit_try_run_case+0x1a5/0x480 [ 15.750908] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.750932] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.750957] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.750982] ? __kthread_parkme+0x82/0x180 [ 15.751004] ? preempt_count_sub+0x50/0x80 [ 15.751029] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.751055] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.751081] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.751107] kthread+0x337/0x6f0 [ 15.751128] ? trace_preempt_on+0x20/0xc0 [ 15.751151] ? __pfx_kthread+0x10/0x10 [ 15.751173] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.751196] ? calculate_sigpending+0x7b/0xa0 [ 15.751221] ? __pfx_kthread+0x10/0x10 [ 15.751243] ret_from_fork+0x116/0x1d0 [ 15.751262] ? __pfx_kthread+0x10/0x10 [ 15.751284] ret_from_fork_asm+0x1a/0x30 [ 15.751315] </TASK> [ 15.751326] [ 15.759899] Allocated by task 283: [ 15.760081] kasan_save_stack+0x45/0x70 [ 15.760238] kasan_save_track+0x18/0x40 [ 15.760389] kasan_save_alloc_info+0x3b/0x50 [ 15.760641] __kasan_kmalloc+0xb7/0xc0 [ 15.760833] __kmalloc_cache_noprof+0x189/0x420 [ 15.761233] kasan_atomics+0x95/0x310 [ 15.761380] kunit_try_run_case+0x1a5/0x480 [ 15.761528] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.761787] kthread+0x337/0x6f0 [ 15.761961] ret_from_fork+0x116/0x1d0 [ 15.762178] ret_from_fork_asm+0x1a/0x30 [ 15.762422] [ 15.762521] The buggy address belongs to the object at ffff8881039b8c80 [ 15.762521] which belongs to the cache kmalloc-64 of size 64 [ 15.763029] The buggy address is located 0 bytes to the right of [ 15.763029] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 15.763456] [ 15.763531] The buggy address belongs to the physical page: [ 15.763757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.764137] flags: 0x200000000000000(node=0|zone=2) [ 15.764330] page_type: f5(slab) [ 15.764462] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.764843] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.765195] page dumped because: kasan: bad access detected [ 15.765529] [ 15.765625] Memory state around the buggy address: [ 15.765850] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.766154] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.766490] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.766779] ^ [ 15.766939] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.767250] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.767791] ================================================================== [ 16.225246] ================================================================== [ 16.226132] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 16.226548] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 16.227129] [ 16.227246] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.227290] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.227303] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.227323] Call Trace: [ 16.227339] <TASK> [ 16.227365] dump_stack_lvl+0x73/0xb0 [ 16.227397] print_report+0xd1/0x650 [ 16.227614] ? __virt_addr_valid+0x1db/0x2d0 [ 16.227640] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.227665] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.227690] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.227713] kasan_report+0x141/0x180 [ 16.227776] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.227805] kasan_check_range+0x10c/0x1c0 [ 16.227830] __kasan_check_write+0x18/0x20 [ 16.227851] kasan_atomics_helper+0x1ce1/0x5450 [ 16.227875] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.227899] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.227926] ? kasan_atomics+0x152/0x310 [ 16.227953] kasan_atomics+0x1dc/0x310 [ 16.227977] ? __pfx_kasan_atomics+0x10/0x10 [ 16.228003] ? __pfx_read_tsc+0x10/0x10 [ 16.228025] ? ktime_get_ts64+0x86/0x230 [ 16.228050] kunit_try_run_case+0x1a5/0x480 [ 16.228075] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.228099] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.228125] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.228150] ? __kthread_parkme+0x82/0x180 [ 16.228176] ? preempt_count_sub+0x50/0x80 [ 16.228200] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.228227] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.228252] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.228278] kthread+0x337/0x6f0 [ 16.228298] ? trace_preempt_on+0x20/0xc0 [ 16.228322] ? __pfx_kthread+0x10/0x10 [ 16.228355] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.228379] ? calculate_sigpending+0x7b/0xa0 [ 16.228403] ? __pfx_kthread+0x10/0x10 [ 16.228427] ret_from_fork+0x116/0x1d0 [ 16.228446] ? __pfx_kthread+0x10/0x10 [ 16.228468] ret_from_fork_asm+0x1a/0x30 [ 16.228499] </TASK> [ 16.228510] [ 16.239638] Allocated by task 283: [ 16.239828] kasan_save_stack+0x45/0x70 [ 16.240021] kasan_save_track+0x18/0x40 [ 16.240165] kasan_save_alloc_info+0x3b/0x50 [ 16.240376] __kasan_kmalloc+0xb7/0xc0 [ 16.240596] __kmalloc_cache_noprof+0x189/0x420 [ 16.240847] kasan_atomics+0x95/0x310 [ 16.241030] kunit_try_run_case+0x1a5/0x480 [ 16.241221] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.241525] kthread+0x337/0x6f0 [ 16.241709] ret_from_fork+0x116/0x1d0 [ 16.241878] ret_from_fork_asm+0x1a/0x30 [ 16.242085] [ 16.242207] The buggy address belongs to the object at ffff8881039b8c80 [ 16.242207] which belongs to the cache kmalloc-64 of size 64 [ 16.242788] The buggy address is located 0 bytes to the right of [ 16.242788] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 16.243310] [ 16.243417] The buggy address belongs to the physical page: [ 16.243636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 16.243979] flags: 0x200000000000000(node=0|zone=2) [ 16.244247] page_type: f5(slab) [ 16.244421] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.244723] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.245048] page dumped because: kasan: bad access detected [ 16.245264] [ 16.245387] Memory state around the buggy address: [ 16.245675] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.245973] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.246270] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.246610] ^ [ 16.246879] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.247196] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.247480] ================================================================== [ 15.515616] ================================================================== [ 15.515965] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 15.516309] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.516682] [ 15.516798] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.516839] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.516852] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.516871] Call Trace: [ 15.516885] <TASK> [ 15.516900] dump_stack_lvl+0x73/0xb0 [ 15.516930] print_report+0xd1/0x650 [ 15.516953] ? __virt_addr_valid+0x1db/0x2d0 [ 15.516977] ? kasan_atomics_helper+0xc70/0x5450 [ 15.516999] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.517024] ? kasan_atomics_helper+0xc70/0x5450 [ 15.517047] kasan_report+0x141/0x180 [ 15.517070] ? kasan_atomics_helper+0xc70/0x5450 [ 15.517097] kasan_check_range+0x10c/0x1c0 [ 15.519159] __kasan_check_write+0x18/0x20 [ 15.519206] kasan_atomics_helper+0xc70/0x5450 [ 15.519235] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.519260] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.519288] ? kasan_atomics+0x152/0x310 [ 15.519317] kasan_atomics+0x1dc/0x310 [ 15.519381] ? __pfx_kasan_atomics+0x10/0x10 [ 15.519425] ? __pfx_read_tsc+0x10/0x10 [ 15.519448] ? ktime_get_ts64+0x86/0x230 [ 15.519472] kunit_try_run_case+0x1a5/0x480 [ 15.519497] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.519522] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.519548] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.519573] ? __kthread_parkme+0x82/0x180 [ 15.519596] ? preempt_count_sub+0x50/0x80 [ 15.519621] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.519646] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.519671] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.519697] kthread+0x337/0x6f0 [ 15.519717] ? trace_preempt_on+0x20/0xc0 [ 15.519742] ? __pfx_kthread+0x10/0x10 [ 15.519764] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.519786] ? calculate_sigpending+0x7b/0xa0 [ 15.519811] ? __pfx_kthread+0x10/0x10 [ 15.519833] ret_from_fork+0x116/0x1d0 [ 15.519852] ? __pfx_kthread+0x10/0x10 [ 15.519873] ret_from_fork_asm+0x1a/0x30 [ 15.519918] </TASK> [ 15.519930] [ 15.529972] Allocated by task 283: [ 15.530163] kasan_save_stack+0x45/0x70 [ 15.530400] kasan_save_track+0x18/0x40 [ 15.530644] kasan_save_alloc_info+0x3b/0x50 [ 15.531062] __kasan_kmalloc+0xb7/0xc0 [ 15.531207] __kmalloc_cache_noprof+0x189/0x420 [ 15.531391] kasan_atomics+0x95/0x310 [ 15.531541] kunit_try_run_case+0x1a5/0x480 [ 15.531746] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.531999] kthread+0x337/0x6f0 [ 15.532229] ret_from_fork+0x116/0x1d0 [ 15.532434] ret_from_fork_asm+0x1a/0x30 [ 15.532793] [ 15.532895] The buggy address belongs to the object at ffff8881039b8c80 [ 15.532895] which belongs to the cache kmalloc-64 of size 64 [ 15.533305] The buggy address is located 0 bytes to the right of [ 15.533305] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 15.534118] [ 15.534220] The buggy address belongs to the physical page: [ 15.534533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.534813] flags: 0x200000000000000(node=0|zone=2) [ 15.534978] page_type: f5(slab) [ 15.535101] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.535623] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.536438] page dumped because: kasan: bad access detected [ 15.536696] [ 15.536768] Memory state around the buggy address: [ 15.536926] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.537146] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.537659] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.537986] ^ [ 15.538215] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.538592] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.538890] ================================================================== [ 15.239167] ================================================================== [ 15.239794] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 15.240131] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.240810] [ 15.240932] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.240975] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.240989] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.241011] Call Trace: [ 15.241027] <TASK> [ 15.241042] dump_stack_lvl+0x73/0xb0 [ 15.241073] print_report+0xd1/0x650 [ 15.241097] ? __virt_addr_valid+0x1db/0x2d0 [ 15.241120] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.241142] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.241167] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.241190] kasan_report+0x141/0x180 [ 15.241213] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.241241] kasan_check_range+0x10c/0x1c0 [ 15.241266] __kasan_check_write+0x18/0x20 [ 15.241287] kasan_atomics_helper+0x4a0/0x5450 [ 15.241310] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.241334] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.241646] ? kasan_atomics+0x152/0x310 [ 15.241678] kasan_atomics+0x1dc/0x310 [ 15.241704] ? __pfx_kasan_atomics+0x10/0x10 [ 15.241730] ? __pfx_read_tsc+0x10/0x10 [ 15.241753] ? ktime_get_ts64+0x86/0x230 [ 15.241778] kunit_try_run_case+0x1a5/0x480 [ 15.241802] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.241827] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.241853] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.241879] ? __kthread_parkme+0x82/0x180 [ 15.241901] ? preempt_count_sub+0x50/0x80 [ 15.241927] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.241952] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.241978] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.242006] kthread+0x337/0x6f0 [ 15.242026] ? trace_preempt_on+0x20/0xc0 [ 15.242050] ? __pfx_kthread+0x10/0x10 [ 15.242072] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.242094] ? calculate_sigpending+0x7b/0xa0 [ 15.242119] ? __pfx_kthread+0x10/0x10 [ 15.242141] ret_from_fork+0x116/0x1d0 [ 15.242160] ? __pfx_kthread+0x10/0x10 [ 15.242182] ret_from_fork_asm+0x1a/0x30 [ 15.242214] </TASK> [ 15.242225] [ 15.253337] Allocated by task 283: [ 15.253819] kasan_save_stack+0x45/0x70 [ 15.254031] kasan_save_track+0x18/0x40 [ 15.254214] kasan_save_alloc_info+0x3b/0x50 [ 15.254861] __kasan_kmalloc+0xb7/0xc0 [ 15.255185] __kmalloc_cache_noprof+0x189/0x420 [ 15.255968] kasan_atomics+0x95/0x310 [ 15.256367] kunit_try_run_case+0x1a5/0x480 [ 15.257883] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.258242] kthread+0x337/0x6f0 [ 15.258394] ret_from_fork+0x116/0x1d0 [ 15.258535] ret_from_fork_asm+0x1a/0x30 [ 15.258678] [ 15.258754] The buggy address belongs to the object at ffff8881039b8c80 [ 15.258754] which belongs to the cache kmalloc-64 of size 64 [ 15.259110] The buggy address is located 0 bytes to the right of [ 15.259110] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 15.260242] [ 15.260366] The buggy address belongs to the physical page: [ 15.262064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.262740] flags: 0x200000000000000(node=0|zone=2) [ 15.263193] page_type: f5(slab) [ 15.263830] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.264076] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.264316] page dumped because: kasan: bad access detected [ 15.265233] [ 15.265564] Memory state around the buggy address: [ 15.266211] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.267143] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.267932] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.268155] ^ [ 15.268319] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.269100] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.269861] ================================================================== [ 15.539297] ================================================================== [ 15.539662] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 15.540024] Read of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.540260] [ 15.540361] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.540403] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.540417] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.540437] Call Trace: [ 15.540454] <TASK> [ 15.540470] dump_stack_lvl+0x73/0xb0 [ 15.540562] print_report+0xd1/0x650 [ 15.540590] ? __virt_addr_valid+0x1db/0x2d0 [ 15.540613] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.540636] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.540661] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.540685] kasan_report+0x141/0x180 [ 15.540708] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.540736] __asan_report_load4_noabort+0x18/0x20 [ 15.540763] kasan_atomics_helper+0x4a84/0x5450 [ 15.540787] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.540811] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.540837] ? kasan_atomics+0x152/0x310 [ 15.540865] kasan_atomics+0x1dc/0x310 [ 15.540888] ? __pfx_kasan_atomics+0x10/0x10 [ 15.540914] ? __pfx_read_tsc+0x10/0x10 [ 15.540936] ? ktime_get_ts64+0x86/0x230 [ 15.540961] kunit_try_run_case+0x1a5/0x480 [ 15.540986] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.541010] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.541035] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.541061] ? __kthread_parkme+0x82/0x180 [ 15.541083] ? preempt_count_sub+0x50/0x80 [ 15.541107] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.541133] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.541159] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.541185] kthread+0x337/0x6f0 [ 15.541205] ? trace_preempt_on+0x20/0xc0 [ 15.541228] ? __pfx_kthread+0x10/0x10 [ 15.541250] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.541273] ? calculate_sigpending+0x7b/0xa0 [ 15.541299] ? __pfx_kthread+0x10/0x10 [ 15.541321] ret_from_fork+0x116/0x1d0 [ 15.541340] ? __pfx_kthread+0x10/0x10 [ 15.541412] ret_from_fork_asm+0x1a/0x30 [ 15.541454] </TASK> [ 15.541465] [ 15.549089] Allocated by task 283: [ 15.549249] kasan_save_stack+0x45/0x70 [ 15.549473] kasan_save_track+0x18/0x40 [ 15.549649] kasan_save_alloc_info+0x3b/0x50 [ 15.549837] __kasan_kmalloc+0xb7/0xc0 [ 15.549972] __kmalloc_cache_noprof+0x189/0x420 [ 15.550128] kasan_atomics+0x95/0x310 [ 15.550323] kunit_try_run_case+0x1a5/0x480 [ 15.550541] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.550841] kthread+0x337/0x6f0 [ 15.551025] ret_from_fork+0x116/0x1d0 [ 15.551214] ret_from_fork_asm+0x1a/0x30 [ 15.551371] [ 15.551488] The buggy address belongs to the object at ffff8881039b8c80 [ 15.551488] which belongs to the cache kmalloc-64 of size 64 [ 15.552064] The buggy address is located 0 bytes to the right of [ 15.552064] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 15.553052] [ 15.553193] The buggy address belongs to the physical page: [ 15.553477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.553815] flags: 0x200000000000000(node=0|zone=2) [ 15.554025] page_type: f5(slab) [ 15.554185] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.554539] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.554770] page dumped because: kasan: bad access detected [ 15.554968] [ 15.555064] Memory state around the buggy address: [ 15.555294] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.555731] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.556009] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.556280] ^ [ 15.556448] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.556791] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.557115] ================================================================== [ 15.946224] ================================================================== [ 15.946800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 15.947761] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.948116] [ 15.948264] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.948318] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.948330] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.948360] Call Trace: [ 15.948374] <TASK> [ 15.948388] dump_stack_lvl+0x73/0xb0 [ 15.948419] print_report+0xd1/0x650 [ 15.948443] ? __virt_addr_valid+0x1db/0x2d0 [ 15.948466] ? kasan_atomics_helper+0x151d/0x5450 [ 15.948500] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.948524] ? kasan_atomics_helper+0x151d/0x5450 [ 15.948548] kasan_report+0x141/0x180 [ 15.948571] ? kasan_atomics_helper+0x151d/0x5450 [ 15.948599] kasan_check_range+0x10c/0x1c0 [ 15.948658] __kasan_check_write+0x18/0x20 [ 15.948679] kasan_atomics_helper+0x151d/0x5450 [ 15.948742] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.948767] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.948793] ? kasan_atomics+0x152/0x310 [ 15.948831] kasan_atomics+0x1dc/0x310 [ 15.948855] ? __pfx_kasan_atomics+0x10/0x10 [ 15.948881] ? __pfx_read_tsc+0x10/0x10 [ 15.948904] ? ktime_get_ts64+0x86/0x230 [ 15.948928] kunit_try_run_case+0x1a5/0x480 [ 15.948953] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.948977] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.949002] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.949028] ? __kthread_parkme+0x82/0x180 [ 15.949049] ? preempt_count_sub+0x50/0x80 [ 15.949075] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.949101] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.949127] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.949155] kthread+0x337/0x6f0 [ 15.949177] ? trace_preempt_on+0x20/0xc0 [ 15.949201] ? __pfx_kthread+0x10/0x10 [ 15.949223] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.949246] ? calculate_sigpending+0x7b/0xa0 [ 15.949272] ? __pfx_kthread+0x10/0x10 [ 15.949295] ret_from_fork+0x116/0x1d0 [ 15.949315] ? __pfx_kthread+0x10/0x10 [ 15.949337] ret_from_fork_asm+0x1a/0x30 [ 15.949379] </TASK> [ 15.949391] [ 15.957420] Allocated by task 283: [ 15.957645] kasan_save_stack+0x45/0x70 [ 15.957856] kasan_save_track+0x18/0x40 [ 15.958092] kasan_save_alloc_info+0x3b/0x50 [ 15.958308] __kasan_kmalloc+0xb7/0xc0 [ 15.958680] __kmalloc_cache_noprof+0x189/0x420 [ 15.958945] kasan_atomics+0x95/0x310 [ 15.959155] kunit_try_run_case+0x1a5/0x480 [ 15.959397] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.959708] kthread+0x337/0x6f0 [ 15.959900] ret_from_fork+0x116/0x1d0 [ 15.960086] ret_from_fork_asm+0x1a/0x30 [ 15.960228] [ 15.960299] The buggy address belongs to the object at ffff8881039b8c80 [ 15.960299] which belongs to the cache kmalloc-64 of size 64 [ 15.961152] The buggy address is located 0 bytes to the right of [ 15.961152] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 15.961940] [ 15.962050] The buggy address belongs to the physical page: [ 15.962247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.962491] flags: 0x200000000000000(node=0|zone=2) [ 15.962722] page_type: f5(slab) [ 15.962908] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.963314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.963675] page dumped because: kasan: bad access detected [ 15.964018] [ 15.964113] Memory state around the buggy address: [ 15.964369] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.964732] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.964976] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.965182] ^ [ 15.965427] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.965747] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.966059] ================================================================== [ 16.026302] ================================================================== [ 16.026719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 16.027175] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 16.027686] [ 16.027798] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.027838] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.027850] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.027870] Call Trace: [ 16.027882] <TASK> [ 16.027897] dump_stack_lvl+0x73/0xb0 [ 16.027927] print_report+0xd1/0x650 [ 16.027950] ? __virt_addr_valid+0x1db/0x2d0 [ 16.028014] ? kasan_atomics_helper+0x177f/0x5450 [ 16.028062] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.028138] ? kasan_atomics_helper+0x177f/0x5450 [ 16.028165] kasan_report+0x141/0x180 [ 16.028201] ? kasan_atomics_helper+0x177f/0x5450 [ 16.028229] kasan_check_range+0x10c/0x1c0 [ 16.028253] __kasan_check_write+0x18/0x20 [ 16.028273] kasan_atomics_helper+0x177f/0x5450 [ 16.028297] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.028371] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.028398] ? kasan_atomics+0x152/0x310 [ 16.028465] kasan_atomics+0x1dc/0x310 [ 16.028490] ? __pfx_kasan_atomics+0x10/0x10 [ 16.028526] ? __pfx_read_tsc+0x10/0x10 [ 16.028556] ? ktime_get_ts64+0x86/0x230 [ 16.028581] kunit_try_run_case+0x1a5/0x480 [ 16.028605] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.028629] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.028654] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.028680] ? __kthread_parkme+0x82/0x180 [ 16.028701] ? preempt_count_sub+0x50/0x80 [ 16.028726] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.028752] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.028777] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.028804] kthread+0x337/0x6f0 [ 16.028823] ? trace_preempt_on+0x20/0xc0 [ 16.028848] ? __pfx_kthread+0x10/0x10 [ 16.028870] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.028892] ? calculate_sigpending+0x7b/0xa0 [ 16.028917] ? __pfx_kthread+0x10/0x10 [ 16.028940] ret_from_fork+0x116/0x1d0 [ 16.028959] ? __pfx_kthread+0x10/0x10 [ 16.028980] ret_from_fork_asm+0x1a/0x30 [ 16.029012] </TASK> [ 16.029023] [ 16.040744] Allocated by task 283: [ 16.040935] kasan_save_stack+0x45/0x70 [ 16.041092] kasan_save_track+0x18/0x40 [ 16.041234] kasan_save_alloc_info+0x3b/0x50 [ 16.041460] __kasan_kmalloc+0xb7/0xc0 [ 16.041989] __kmalloc_cache_noprof+0x189/0x420 [ 16.042980] kasan_atomics+0x95/0x310 [ 16.043209] kunit_try_run_case+0x1a5/0x480 [ 16.043871] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.044159] kthread+0x337/0x6f0 [ 16.044336] ret_from_fork+0x116/0x1d0 [ 16.044549] ret_from_fork_asm+0x1a/0x30 [ 16.044695] [ 16.044770] The buggy address belongs to the object at ffff8881039b8c80 [ 16.044770] which belongs to the cache kmalloc-64 of size 64 [ 16.045179] The buggy address is located 0 bytes to the right of [ 16.045179] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 16.045763] [ 16.045908] The buggy address belongs to the physical page: [ 16.046212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 16.046667] flags: 0x200000000000000(node=0|zone=2) [ 16.047013] page_type: f5(slab) [ 16.047238] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.047637] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.047916] page dumped because: kasan: bad access detected [ 16.048174] [ 16.048268] Memory state around the buggy address: [ 16.048592] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.048816] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.049122] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.049605] ^ [ 16.049897] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.050221] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.050639] ================================================================== [ 15.791578] ================================================================== [ 15.791916] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 15.792184] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.792687] [ 15.792800] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.792840] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.792853] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.792873] Call Trace: [ 15.792890] <TASK> [ 15.792907] dump_stack_lvl+0x73/0xb0 [ 15.792936] print_report+0xd1/0x650 [ 15.792960] ? __virt_addr_valid+0x1db/0x2d0 [ 15.792983] ? kasan_atomics_helper+0x1217/0x5450 [ 15.793006] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.793030] ? kasan_atomics_helper+0x1217/0x5450 [ 15.793053] kasan_report+0x141/0x180 [ 15.793076] ? kasan_atomics_helper+0x1217/0x5450 [ 15.793104] kasan_check_range+0x10c/0x1c0 [ 15.793128] __kasan_check_write+0x18/0x20 [ 15.793149] kasan_atomics_helper+0x1217/0x5450 [ 15.793173] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.793198] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.793224] ? kasan_atomics+0x152/0x310 [ 15.793251] kasan_atomics+0x1dc/0x310 [ 15.793274] ? __pfx_kasan_atomics+0x10/0x10 [ 15.793299] ? __pfx_read_tsc+0x10/0x10 [ 15.793320] ? ktime_get_ts64+0x86/0x230 [ 15.793360] kunit_try_run_case+0x1a5/0x480 [ 15.793385] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.793420] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.793444] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.793470] ? __kthread_parkme+0x82/0x180 [ 15.793492] ? preempt_count_sub+0x50/0x80 [ 15.793516] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.793541] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.793567] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.793593] kthread+0x337/0x6f0 [ 15.793613] ? trace_preempt_on+0x20/0xc0 [ 15.793637] ? __pfx_kthread+0x10/0x10 [ 15.793658] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.793681] ? calculate_sigpending+0x7b/0xa0 [ 15.793706] ? __pfx_kthread+0x10/0x10 [ 15.793728] ret_from_fork+0x116/0x1d0 [ 15.793747] ? __pfx_kthread+0x10/0x10 [ 15.793769] ret_from_fork_asm+0x1a/0x30 [ 15.793800] </TASK> [ 15.793811] [ 15.801165] Allocated by task 283: [ 15.801306] kasan_save_stack+0x45/0x70 [ 15.801634] kasan_save_track+0x18/0x40 [ 15.801831] kasan_save_alloc_info+0x3b/0x50 [ 15.802046] __kasan_kmalloc+0xb7/0xc0 [ 15.802239] __kmalloc_cache_noprof+0x189/0x420 [ 15.802472] kasan_atomics+0x95/0x310 [ 15.802639] kunit_try_run_case+0x1a5/0x480 [ 15.802839] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.803067] kthread+0x337/0x6f0 [ 15.803222] ret_from_fork+0x116/0x1d0 [ 15.803372] ret_from_fork_asm+0x1a/0x30 [ 15.803519] [ 15.803591] The buggy address belongs to the object at ffff8881039b8c80 [ 15.803591] which belongs to the cache kmalloc-64 of size 64 [ 15.803946] The buggy address is located 0 bytes to the right of [ 15.803946] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 15.804889] [ 15.804967] The buggy address belongs to the physical page: [ 15.805138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.805388] flags: 0x200000000000000(node=0|zone=2) [ 15.805634] page_type: f5(slab) [ 15.805804] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.806146] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.806523] page dumped because: kasan: bad access detected [ 15.806695] [ 15.806765] Memory state around the buggy address: [ 15.806920] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.807242] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.807649] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.807971] ^ [ 15.808188] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.808529] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.808821] ================================================================== [ 16.134573] ================================================================== [ 16.134918] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 16.135264] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 16.135741] [ 16.135868] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.135909] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.135933] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.135953] Call Trace: [ 16.135969] <TASK> [ 16.135984] dump_stack_lvl+0x73/0xb0 [ 16.136013] print_report+0xd1/0x650 [ 16.136036] ? __virt_addr_valid+0x1db/0x2d0 [ 16.136058] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.136080] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.136104] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.136127] kasan_report+0x141/0x180 [ 16.136150] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.136182] kasan_check_range+0x10c/0x1c0 [ 16.136206] __kasan_check_write+0x18/0x20 [ 16.136227] kasan_atomics_helper+0x1a7f/0x5450 [ 16.136250] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.136294] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.136320] ? kasan_atomics+0x152/0x310 [ 16.136357] kasan_atomics+0x1dc/0x310 [ 16.136380] ? __pfx_kasan_atomics+0x10/0x10 [ 16.136407] ? __pfx_read_tsc+0x10/0x10 [ 16.136428] ? ktime_get_ts64+0x86/0x230 [ 16.136455] kunit_try_run_case+0x1a5/0x480 [ 16.136480] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.136503] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.136529] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.136554] ? __kthread_parkme+0x82/0x180 [ 16.136575] ? preempt_count_sub+0x50/0x80 [ 16.136599] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.136625] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.136669] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.136696] kthread+0x337/0x6f0 [ 16.136716] ? trace_preempt_on+0x20/0xc0 [ 16.136739] ? __pfx_kthread+0x10/0x10 [ 16.136761] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.136783] ? calculate_sigpending+0x7b/0xa0 [ 16.136809] ? __pfx_kthread+0x10/0x10 [ 16.136833] ret_from_fork+0x116/0x1d0 [ 16.136853] ? __pfx_kthread+0x10/0x10 [ 16.136874] ret_from_fork_asm+0x1a/0x30 [ 16.136906] </TASK> [ 16.136916] [ 16.146378] Allocated by task 283: [ 16.146708] kasan_save_stack+0x45/0x70 [ 16.147000] kasan_save_track+0x18/0x40 [ 16.147279] kasan_save_alloc_info+0x3b/0x50 [ 16.147591] __kasan_kmalloc+0xb7/0xc0 [ 16.147955] __kmalloc_cache_noprof+0x189/0x420 [ 16.148280] kasan_atomics+0x95/0x310 [ 16.148589] kunit_try_run_case+0x1a5/0x480 [ 16.148903] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.149144] kthread+0x337/0x6f0 [ 16.149321] ret_from_fork+0x116/0x1d0 [ 16.149564] ret_from_fork_asm+0x1a/0x30 [ 16.149721] [ 16.149797] The buggy address belongs to the object at ffff8881039b8c80 [ 16.149797] which belongs to the cache kmalloc-64 of size 64 [ 16.150365] The buggy address is located 0 bytes to the right of [ 16.150365] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 16.151051] [ 16.151473] The buggy address belongs to the physical page: [ 16.151689] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 16.152199] flags: 0x200000000000000(node=0|zone=2) [ 16.152514] page_type: f5(slab) [ 16.152810] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.153181] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.153738] page dumped because: kasan: bad access detected [ 16.154014] [ 16.154243] Memory state around the buggy address: [ 16.154608] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.155024] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.155519] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.155827] ^ [ 16.156055] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.156373] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.156937] ================================================================== [ 15.768294] ================================================================== [ 15.768949] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 15.769274] Read of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.769638] [ 15.769762] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.769816] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.769829] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.769850] Call Trace: [ 15.769863] <TASK> [ 15.769877] dump_stack_lvl+0x73/0xb0 [ 15.769918] print_report+0xd1/0x650 [ 15.769941] ? __virt_addr_valid+0x1db/0x2d0 [ 15.769964] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.769998] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.770022] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.770045] kasan_report+0x141/0x180 [ 15.770069] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.770097] __asan_report_load4_noabort+0x18/0x20 [ 15.770122] kasan_atomics_helper+0x4a02/0x5450 [ 15.770147] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.770171] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.770196] ? kasan_atomics+0x152/0x310 [ 15.770224] kasan_atomics+0x1dc/0x310 [ 15.770248] ? __pfx_kasan_atomics+0x10/0x10 [ 15.770273] ? __pfx_read_tsc+0x10/0x10 [ 15.770295] ? ktime_get_ts64+0x86/0x230 [ 15.770320] kunit_try_run_case+0x1a5/0x480 [ 15.770353] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.770378] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.770404] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.770441] ? __kthread_parkme+0x82/0x180 [ 15.770471] ? preempt_count_sub+0x50/0x80 [ 15.770496] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.770532] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.770558] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.770585] kthread+0x337/0x6f0 [ 15.770604] ? trace_preempt_on+0x20/0xc0 [ 15.770629] ? __pfx_kthread+0x10/0x10 [ 15.770650] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.770673] ? calculate_sigpending+0x7b/0xa0 [ 15.770699] ? __pfx_kthread+0x10/0x10 [ 15.770721] ret_from_fork+0x116/0x1d0 [ 15.770741] ? __pfx_kthread+0x10/0x10 [ 15.770763] ret_from_fork_asm+0x1a/0x30 [ 15.770803] </TASK> [ 15.770814] [ 15.780667] Allocated by task 283: [ 15.781690] kasan_save_stack+0x45/0x70 [ 15.781866] kasan_save_track+0x18/0x40 [ 15.782009] kasan_save_alloc_info+0x3b/0x50 [ 15.782162] __kasan_kmalloc+0xb7/0xc0 [ 15.782296] __kmalloc_cache_noprof+0x189/0x420 [ 15.782471] kasan_atomics+0x95/0x310 [ 15.782608] kunit_try_run_case+0x1a5/0x480 [ 15.782756] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.782936] kthread+0x337/0x6f0 [ 15.783058] ret_from_fork+0x116/0x1d0 [ 15.783192] ret_from_fork_asm+0x1a/0x30 [ 15.783332] [ 15.784919] The buggy address belongs to the object at ffff8881039b8c80 [ 15.784919] which belongs to the cache kmalloc-64 of size 64 [ 15.785817] The buggy address is located 0 bytes to the right of [ 15.785817] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 15.786293] [ 15.786405] The buggy address belongs to the physical page: [ 15.786797] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.787432] flags: 0x200000000000000(node=0|zone=2) [ 15.787617] page_type: f5(slab) [ 15.787788] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.788078] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.788376] page dumped because: kasan: bad access detected [ 15.788603] [ 15.788696] Memory state around the buggy address: [ 15.788854] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.789302] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.789734] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.790011] ^ [ 15.790216] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.790599] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.790894] ================================================================== [ 16.469568] ================================================================== [ 16.470188] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 16.470599] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 16.470904] [ 16.470989] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.471029] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.471051] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.471071] Call Trace: [ 16.471086] <TASK> [ 16.471101] dump_stack_lvl+0x73/0xb0 [ 16.471142] print_report+0xd1/0x650 [ 16.471166] ? __virt_addr_valid+0x1db/0x2d0 [ 16.471188] ? kasan_atomics_helper+0x224c/0x5450 [ 16.471210] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.471245] ? kasan_atomics_helper+0x224c/0x5450 [ 16.471267] kasan_report+0x141/0x180 [ 16.471290] ? kasan_atomics_helper+0x224c/0x5450 [ 16.471328] kasan_check_range+0x10c/0x1c0 [ 16.471362] __kasan_check_write+0x18/0x20 [ 16.471383] kasan_atomics_helper+0x224c/0x5450 [ 16.471418] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.471442] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.471478] ? kasan_atomics+0x152/0x310 [ 16.471505] kasan_atomics+0x1dc/0x310 [ 16.471539] ? __pfx_kasan_atomics+0x10/0x10 [ 16.471564] ? __pfx_read_tsc+0x10/0x10 [ 16.471586] ? ktime_get_ts64+0x86/0x230 [ 16.471610] kunit_try_run_case+0x1a5/0x480 [ 16.471644] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.471668] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.471693] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.471728] ? __kthread_parkme+0x82/0x180 [ 16.471750] ? preempt_count_sub+0x50/0x80 [ 16.471774] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.471800] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.471826] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.471853] kthread+0x337/0x6f0 [ 16.471873] ? trace_preempt_on+0x20/0xc0 [ 16.471897] ? __pfx_kthread+0x10/0x10 [ 16.471919] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.471951] ? calculate_sigpending+0x7b/0xa0 [ 16.471976] ? __pfx_kthread+0x10/0x10 [ 16.471998] ret_from_fork+0x116/0x1d0 [ 16.472028] ? __pfx_kthread+0x10/0x10 [ 16.472049] ret_from_fork_asm+0x1a/0x30 [ 16.472082] </TASK> [ 16.472093] [ 16.479929] Allocated by task 283: [ 16.480098] kasan_save_stack+0x45/0x70 [ 16.480310] kasan_save_track+0x18/0x40 [ 16.480523] kasan_save_alloc_info+0x3b/0x50 [ 16.480716] __kasan_kmalloc+0xb7/0xc0 [ 16.480915] __kmalloc_cache_noprof+0x189/0x420 [ 16.481138] kasan_atomics+0x95/0x310 [ 16.481328] kunit_try_run_case+0x1a5/0x480 [ 16.481571] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.481788] kthread+0x337/0x6f0 [ 16.481911] ret_from_fork+0x116/0x1d0 [ 16.482078] ret_from_fork_asm+0x1a/0x30 [ 16.482276] [ 16.482383] The buggy address belongs to the object at ffff8881039b8c80 [ 16.482383] which belongs to the cache kmalloc-64 of size 64 [ 16.482854] The buggy address is located 0 bytes to the right of [ 16.482854] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 16.483426] [ 16.483514] The buggy address belongs to the physical page: [ 16.483688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 16.483926] flags: 0x200000000000000(node=0|zone=2) [ 16.484088] page_type: f5(slab) [ 16.484214] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.484614] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.485017] page dumped because: kasan: bad access detected [ 16.485319] [ 16.485430] Memory state around the buggy address: [ 16.485815] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.486215] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.486527] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.486879] ^ [ 16.487162] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.487567] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.487916] ================================================================== [ 16.351557] ================================================================== [ 16.351862] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 16.352100] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 16.352516] [ 16.352642] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.352695] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.352707] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.352727] Call Trace: [ 16.352741] <TASK> [ 16.352756] dump_stack_lvl+0x73/0xb0 [ 16.352785] print_report+0xd1/0x650 [ 16.352808] ? __virt_addr_valid+0x1db/0x2d0 [ 16.352831] ? kasan_atomics_helper+0x2006/0x5450 [ 16.352853] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.352878] ? kasan_atomics_helper+0x2006/0x5450 [ 16.352901] kasan_report+0x141/0x180 [ 16.352924] ? kasan_atomics_helper+0x2006/0x5450 [ 16.352952] kasan_check_range+0x10c/0x1c0 [ 16.352977] __kasan_check_write+0x18/0x20 [ 16.352997] kasan_atomics_helper+0x2006/0x5450 [ 16.353032] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.353056] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.353083] ? kasan_atomics+0x152/0x310 [ 16.353121] kasan_atomics+0x1dc/0x310 [ 16.353144] ? __pfx_kasan_atomics+0x10/0x10 [ 16.353170] ? __pfx_read_tsc+0x10/0x10 [ 16.353192] ? ktime_get_ts64+0x86/0x230 [ 16.353217] kunit_try_run_case+0x1a5/0x480 [ 16.353241] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.353265] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.353290] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.353315] ? __kthread_parkme+0x82/0x180 [ 16.353338] ? preempt_count_sub+0x50/0x80 [ 16.353372] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.353416] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.353443] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.353470] kthread+0x337/0x6f0 [ 16.353490] ? trace_preempt_on+0x20/0xc0 [ 16.353515] ? __pfx_kthread+0x10/0x10 [ 16.353536] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.353559] ? calculate_sigpending+0x7b/0xa0 [ 16.353584] ? __pfx_kthread+0x10/0x10 [ 16.353607] ret_from_fork+0x116/0x1d0 [ 16.353626] ? __pfx_kthread+0x10/0x10 [ 16.353648] ret_from_fork_asm+0x1a/0x30 [ 16.353689] </TASK> [ 16.353700] [ 16.361364] Allocated by task 283: [ 16.361556] kasan_save_stack+0x45/0x70 [ 16.361760] kasan_save_track+0x18/0x40 [ 16.361956] kasan_save_alloc_info+0x3b/0x50 [ 16.362167] __kasan_kmalloc+0xb7/0xc0 [ 16.362329] __kmalloc_cache_noprof+0x189/0x420 [ 16.362578] kasan_atomics+0x95/0x310 [ 16.362776] kunit_try_run_case+0x1a5/0x480 [ 16.362981] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.363226] kthread+0x337/0x6f0 [ 16.363430] ret_from_fork+0x116/0x1d0 [ 16.363602] ret_from_fork_asm+0x1a/0x30 [ 16.363824] [ 16.363919] The buggy address belongs to the object at ffff8881039b8c80 [ 16.363919] which belongs to the cache kmalloc-64 of size 64 [ 16.364382] The buggy address is located 0 bytes to the right of [ 16.364382] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 16.364766] [ 16.364839] The buggy address belongs to the physical page: [ 16.365011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 16.365411] flags: 0x200000000000000(node=0|zone=2) [ 16.365649] page_type: f5(slab) [ 16.365816] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.366189] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.366566] page dumped because: kasan: bad access detected [ 16.366840] [ 16.366935] Memory state around the buggy address: [ 16.367188] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.367501] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.367720] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.367933] ^ [ 16.368087] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.368386] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.368756] ================================================================== [ 16.116958] ================================================================== [ 16.117282] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 16.117641] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 16.117898] [ 16.118007] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.118047] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.118059] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.118080] Call Trace: [ 16.118093] <TASK> [ 16.118106] dump_stack_lvl+0x73/0xb0 [ 16.118135] print_report+0xd1/0x650 [ 16.118159] ? __virt_addr_valid+0x1db/0x2d0 [ 16.118181] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.118203] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.118228] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.118251] kasan_report+0x141/0x180 [ 16.118273] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.118301] kasan_check_range+0x10c/0x1c0 [ 16.118325] __kasan_check_write+0x18/0x20 [ 16.118361] kasan_atomics_helper+0x19e3/0x5450 [ 16.118386] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.118409] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.118450] ? kasan_atomics+0x152/0x310 [ 16.118477] kasan_atomics+0x1dc/0x310 [ 16.118501] ? __pfx_kasan_atomics+0x10/0x10 [ 16.118526] ? __pfx_read_tsc+0x10/0x10 [ 16.118548] ? ktime_get_ts64+0x86/0x230 [ 16.118573] kunit_try_run_case+0x1a5/0x480 [ 16.118597] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.118642] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.118669] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.118693] ? __kthread_parkme+0x82/0x180 [ 16.118715] ? preempt_count_sub+0x50/0x80 [ 16.118740] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.118765] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.118790] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.118817] kthread+0x337/0x6f0 [ 16.118836] ? trace_preempt_on+0x20/0xc0 [ 16.118875] ? __pfx_kthread+0x10/0x10 [ 16.118896] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.118919] ? calculate_sigpending+0x7b/0xa0 [ 16.118956] ? __pfx_kthread+0x10/0x10 [ 16.118979] ret_from_fork+0x116/0x1d0 [ 16.118998] ? __pfx_kthread+0x10/0x10 [ 16.119019] ret_from_fork_asm+0x1a/0x30 [ 16.119050] </TASK> [ 16.119061] [ 16.126666] Allocated by task 283: [ 16.126876] kasan_save_stack+0x45/0x70 [ 16.127084] kasan_save_track+0x18/0x40 [ 16.127282] kasan_save_alloc_info+0x3b/0x50 [ 16.127541] __kasan_kmalloc+0xb7/0xc0 [ 16.127706] __kmalloc_cache_noprof+0x189/0x420 [ 16.127932] kasan_atomics+0x95/0x310 [ 16.128101] kunit_try_run_case+0x1a5/0x480 [ 16.128249] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.128543] kthread+0x337/0x6f0 [ 16.128713] ret_from_fork+0x116/0x1d0 [ 16.128897] ret_from_fork_asm+0x1a/0x30 [ 16.129093] [ 16.129168] The buggy address belongs to the object at ffff8881039b8c80 [ 16.129168] which belongs to the cache kmalloc-64 of size 64 [ 16.129518] The buggy address is located 0 bytes to the right of [ 16.129518] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 16.130317] [ 16.130477] The buggy address belongs to the physical page: [ 16.130713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 16.130973] flags: 0x200000000000000(node=0|zone=2) [ 16.131129] page_type: f5(slab) [ 16.131246] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.131554] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.131891] page dumped because: kasan: bad access detected [ 16.132145] [ 16.132244] Memory state around the buggy address: [ 16.132556] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.132765] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.133106] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.133404] ^ [ 16.133623] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.133831] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.134038] ================================================================== [ 15.291992] ================================================================== [ 15.292328] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 15.292719] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.293041] [ 15.293148] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.293189] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.293201] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.293230] Call Trace: [ 15.293248] <TASK> [ 15.293265] dump_stack_lvl+0x73/0xb0 [ 15.293305] print_report+0xd1/0x650 [ 15.293328] ? __virt_addr_valid+0x1db/0x2d0 [ 15.293404] ? kasan_atomics_helper+0x565/0x5450 [ 15.293430] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.293455] ? kasan_atomics_helper+0x565/0x5450 [ 15.293479] kasan_report+0x141/0x180 [ 15.293502] ? kasan_atomics_helper+0x565/0x5450 [ 15.293529] kasan_check_range+0x10c/0x1c0 [ 15.293554] __kasan_check_write+0x18/0x20 [ 15.293576] kasan_atomics_helper+0x565/0x5450 [ 15.293600] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.293624] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.293651] ? kasan_atomics+0x152/0x310 [ 15.293678] kasan_atomics+0x1dc/0x310 [ 15.293702] ? __pfx_kasan_atomics+0x10/0x10 [ 15.293728] ? __pfx_read_tsc+0x10/0x10 [ 15.293749] ? ktime_get_ts64+0x86/0x230 [ 15.293774] kunit_try_run_case+0x1a5/0x480 [ 15.293799] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.293835] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.293861] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.293886] ? __kthread_parkme+0x82/0x180 [ 15.293919] ? preempt_count_sub+0x50/0x80 [ 15.293944] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.293969] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.293996] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.294022] kthread+0x337/0x6f0 [ 15.294042] ? trace_preempt_on+0x20/0xc0 [ 15.294066] ? __pfx_kthread+0x10/0x10 [ 15.294087] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.294111] ? calculate_sigpending+0x7b/0xa0 [ 15.294135] ? __pfx_kthread+0x10/0x10 [ 15.294158] ret_from_fork+0x116/0x1d0 [ 15.294177] ? __pfx_kthread+0x10/0x10 [ 15.294198] ret_from_fork_asm+0x1a/0x30 [ 15.294230] </TASK> [ 15.294240] [ 15.302673] Allocated by task 283: [ 15.302854] kasan_save_stack+0x45/0x70 [ 15.303035] kasan_save_track+0x18/0x40 [ 15.303221] kasan_save_alloc_info+0x3b/0x50 [ 15.303557] __kasan_kmalloc+0xb7/0xc0 [ 15.303757] __kmalloc_cache_noprof+0x189/0x420 [ 15.303918] kasan_atomics+0x95/0x310 [ 15.304053] kunit_try_run_case+0x1a5/0x480 [ 15.304287] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.304551] kthread+0x337/0x6f0 [ 15.304739] ret_from_fork+0x116/0x1d0 [ 15.305099] ret_from_fork_asm+0x1a/0x30 [ 15.305238] [ 15.305308] The buggy address belongs to the object at ffff8881039b8c80 [ 15.305308] which belongs to the cache kmalloc-64 of size 64 [ 15.305666] The buggy address is located 0 bytes to the right of [ 15.305666] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 15.306193] [ 15.306288] The buggy address belongs to the physical page: [ 15.306549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.306866] flags: 0x200000000000000(node=0|zone=2) [ 15.307030] page_type: f5(slab) [ 15.307152] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.307409] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.308035] page dumped because: kasan: bad access detected [ 15.308300] [ 15.308460] Memory state around the buggy address: [ 15.308949] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.309213] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.309442] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.309869] ^ [ 15.310404] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.310676] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.310898] ================================================================== [ 16.267120] ================================================================== [ 16.267587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 16.267918] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 16.268275] [ 16.268400] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.268453] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.268466] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.268487] Call Trace: [ 16.268501] <TASK> [ 16.268515] dump_stack_lvl+0x73/0xb0 [ 16.268545] print_report+0xd1/0x650 [ 16.268568] ? __virt_addr_valid+0x1db/0x2d0 [ 16.268591] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.268613] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.268638] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.268661] kasan_report+0x141/0x180 [ 16.268684] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.268712] kasan_check_range+0x10c/0x1c0 [ 16.268737] __kasan_check_write+0x18/0x20 [ 16.268758] kasan_atomics_helper+0x1e12/0x5450 [ 16.268783] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.268807] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.268834] ? kasan_atomics+0x152/0x310 [ 16.268861] kasan_atomics+0x1dc/0x310 [ 16.268885] ? __pfx_kasan_atomics+0x10/0x10 [ 16.268935] ? __pfx_read_tsc+0x10/0x10 [ 16.268957] ? ktime_get_ts64+0x86/0x230 [ 16.268997] kunit_try_run_case+0x1a5/0x480 [ 16.269022] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.269060] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.269099] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.269138] ? __kthread_parkme+0x82/0x180 [ 16.269174] ? preempt_count_sub+0x50/0x80 [ 16.269213] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.269264] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.269304] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.269331] kthread+0x337/0x6f0 [ 16.269362] ? trace_preempt_on+0x20/0xc0 [ 16.269387] ? __pfx_kthread+0x10/0x10 [ 16.269419] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.269442] ? calculate_sigpending+0x7b/0xa0 [ 16.269466] ? __pfx_kthread+0x10/0x10 [ 16.269490] ret_from_fork+0x116/0x1d0 [ 16.269509] ? __pfx_kthread+0x10/0x10 [ 16.269530] ret_from_fork_asm+0x1a/0x30 [ 16.269562] </TASK> [ 16.269572] [ 16.277628] Allocated by task 283: [ 16.277800] kasan_save_stack+0x45/0x70 [ 16.277975] kasan_save_track+0x18/0x40 [ 16.278144] kasan_save_alloc_info+0x3b/0x50 [ 16.278366] __kasan_kmalloc+0xb7/0xc0 [ 16.278635] __kmalloc_cache_noprof+0x189/0x420 [ 16.278824] kasan_atomics+0x95/0x310 [ 16.279016] kunit_try_run_case+0x1a5/0x480 [ 16.279249] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.279501] kthread+0x337/0x6f0 [ 16.279701] ret_from_fork+0x116/0x1d0 [ 16.279901] ret_from_fork_asm+0x1a/0x30 [ 16.280097] [ 16.280193] The buggy address belongs to the object at ffff8881039b8c80 [ 16.280193] which belongs to the cache kmalloc-64 of size 64 [ 16.280581] The buggy address is located 0 bytes to the right of [ 16.280581] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 16.281234] [ 16.281360] The buggy address belongs to the physical page: [ 16.281656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 16.282111] flags: 0x200000000000000(node=0|zone=2) [ 16.282365] page_type: f5(slab) [ 16.282557] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.282895] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.283225] page dumped because: kasan: bad access detected [ 16.283641] [ 16.283712] Memory state around the buggy address: [ 16.283866] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.284079] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.284296] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.284921] ^ [ 16.285175] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.285598] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.285926] ================================================================== [ 16.404954] ================================================================== [ 16.405211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 16.405537] Read of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 16.406231] [ 16.406386] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.406428] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.406440] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.406461] Call Trace: [ 16.406477] <TASK> [ 16.406492] dump_stack_lvl+0x73/0xb0 [ 16.406522] print_report+0xd1/0x650 [ 16.406545] ? __virt_addr_valid+0x1db/0x2d0 [ 16.406570] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.406593] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.406618] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.406640] kasan_report+0x141/0x180 [ 16.406663] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.406691] __asan_report_load8_noabort+0x18/0x20 [ 16.406717] kasan_atomics_helper+0x4fb2/0x5450 [ 16.406768] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.406792] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.406839] ? kasan_atomics+0x152/0x310 [ 16.406867] kasan_atomics+0x1dc/0x310 [ 16.406890] ? __pfx_kasan_atomics+0x10/0x10 [ 16.406926] ? __pfx_read_tsc+0x10/0x10 [ 16.406948] ? ktime_get_ts64+0x86/0x230 [ 16.406974] kunit_try_run_case+0x1a5/0x480 [ 16.406999] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.407023] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.407049] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.407074] ? __kthread_parkme+0x82/0x180 [ 16.407097] ? preempt_count_sub+0x50/0x80 [ 16.407122] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.407148] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.407173] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.407200] kthread+0x337/0x6f0 [ 16.407219] ? trace_preempt_on+0x20/0xc0 [ 16.407244] ? __pfx_kthread+0x10/0x10 [ 16.407266] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.407297] ? calculate_sigpending+0x7b/0xa0 [ 16.407322] ? __pfx_kthread+0x10/0x10 [ 16.407360] ret_from_fork+0x116/0x1d0 [ 16.407380] ? __pfx_kthread+0x10/0x10 [ 16.407419] ret_from_fork_asm+0x1a/0x30 [ 16.407451] </TASK> [ 16.407464] [ 16.415211] Allocated by task 283: [ 16.415338] kasan_save_stack+0x45/0x70 [ 16.415517] kasan_save_track+0x18/0x40 [ 16.415673] kasan_save_alloc_info+0x3b/0x50 [ 16.415897] __kasan_kmalloc+0xb7/0xc0 [ 16.416122] __kmalloc_cache_noprof+0x189/0x420 [ 16.416384] kasan_atomics+0x95/0x310 [ 16.416616] kunit_try_run_case+0x1a5/0x480 [ 16.416828] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.417111] kthread+0x337/0x6f0 [ 16.417280] ret_from_fork+0x116/0x1d0 [ 16.417501] ret_from_fork_asm+0x1a/0x30 [ 16.417657] [ 16.417729] The buggy address belongs to the object at ffff8881039b8c80 [ 16.417729] which belongs to the cache kmalloc-64 of size 64 [ 16.418275] The buggy address is located 0 bytes to the right of [ 16.418275] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 16.418754] [ 16.418852] The buggy address belongs to the physical page: [ 16.419098] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 16.419468] flags: 0x200000000000000(node=0|zone=2) [ 16.419698] page_type: f5(slab) [ 16.419873] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.420204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.420585] page dumped because: kasan: bad access detected [ 16.420824] [ 16.420922] Memory state around the buggy address: [ 16.421123] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.421350] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.421594] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.421840] ^ [ 16.422064] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.422426] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.422743] ================================================================== [ 16.005024] ================================================================== [ 16.006105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 16.006701] Write of size 8 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 16.007064] [ 16.007249] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.007305] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.007318] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.007339] Call Trace: [ 16.007363] <TASK> [ 16.007378] dump_stack_lvl+0x73/0xb0 [ 16.007409] print_report+0xd1/0x650 [ 16.007432] ? __virt_addr_valid+0x1db/0x2d0 [ 16.007456] ? kasan_atomics_helper+0x16e7/0x5450 [ 16.007525] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.007550] ? kasan_atomics_helper+0x16e7/0x5450 [ 16.007585] kasan_report+0x141/0x180 [ 16.007608] ? kasan_atomics_helper+0x16e7/0x5450 [ 16.007636] kasan_check_range+0x10c/0x1c0 [ 16.007660] __kasan_check_write+0x18/0x20 [ 16.007684] kasan_atomics_helper+0x16e7/0x5450 [ 16.007710] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.007735] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.007761] ? kasan_atomics+0x152/0x310 [ 16.007789] kasan_atomics+0x1dc/0x310 [ 16.007811] ? __pfx_kasan_atomics+0x10/0x10 [ 16.007837] ? __pfx_read_tsc+0x10/0x10 [ 16.007859] ? ktime_get_ts64+0x86/0x230 [ 16.007883] kunit_try_run_case+0x1a5/0x480 [ 16.007909] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.007934] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.007959] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.007985] ? __kthread_parkme+0x82/0x180 [ 16.008007] ? preempt_count_sub+0x50/0x80 [ 16.008031] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.008057] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.008083] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.008110] kthread+0x337/0x6f0 [ 16.008129] ? trace_preempt_on+0x20/0xc0 [ 16.008153] ? __pfx_kthread+0x10/0x10 [ 16.008183] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.008205] ? calculate_sigpending+0x7b/0xa0 [ 16.008230] ? __pfx_kthread+0x10/0x10 [ 16.008253] ret_from_fork+0x116/0x1d0 [ 16.008272] ? __pfx_kthread+0x10/0x10 [ 16.008293] ret_from_fork_asm+0x1a/0x30 [ 16.008326] </TASK> [ 16.008337] [ 16.016747] Allocated by task 283: [ 16.017044] kasan_save_stack+0x45/0x70 [ 16.017478] kasan_save_track+0x18/0x40 [ 16.017679] kasan_save_alloc_info+0x3b/0x50 [ 16.017894] __kasan_kmalloc+0xb7/0xc0 [ 16.018084] __kmalloc_cache_noprof+0x189/0x420 [ 16.018394] kasan_atomics+0x95/0x310 [ 16.018602] kunit_try_run_case+0x1a5/0x480 [ 16.018896] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.019224] kthread+0x337/0x6f0 [ 16.019408] ret_from_fork+0x116/0x1d0 [ 16.019718] ret_from_fork_asm+0x1a/0x30 [ 16.019922] [ 16.020019] The buggy address belongs to the object at ffff8881039b8c80 [ 16.020019] which belongs to the cache kmalloc-64 of size 64 [ 16.020693] The buggy address is located 0 bytes to the right of [ 16.020693] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 16.021171] [ 16.021391] The buggy address belongs to the physical page: [ 16.021663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 16.022008] flags: 0x200000000000000(node=0|zone=2) [ 16.022201] page_type: f5(slab) [ 16.022470] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.022824] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.023102] page dumped because: kasan: bad access detected [ 16.023363] [ 16.023568] Memory state around the buggy address: [ 16.023824] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.024088] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.024430] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.024724] ^ [ 16.024942] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.025267] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.025622] ================================================================== [ 15.337145] ================================================================== [ 15.337779] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 15.338119] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.338600] [ 15.338784] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.338830] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.338843] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.338863] Call Trace: [ 15.338877] <TASK> [ 15.338893] dump_stack_lvl+0x73/0xb0 [ 15.339066] print_report+0xd1/0x650 [ 15.339090] ? __virt_addr_valid+0x1db/0x2d0 [ 15.339114] ? kasan_atomics_helper+0x697/0x5450 [ 15.339137] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.339161] ? kasan_atomics_helper+0x697/0x5450 [ 15.339184] kasan_report+0x141/0x180 [ 15.339207] ? kasan_atomics_helper+0x697/0x5450 [ 15.339235] kasan_check_range+0x10c/0x1c0 [ 15.339260] __kasan_check_write+0x18/0x20 [ 15.339281] kasan_atomics_helper+0x697/0x5450 [ 15.339305] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.339330] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.339421] ? kasan_atomics+0x152/0x310 [ 15.339452] kasan_atomics+0x1dc/0x310 [ 15.339475] ? __pfx_kasan_atomics+0x10/0x10 [ 15.339501] ? __pfx_read_tsc+0x10/0x10 [ 15.339523] ? ktime_get_ts64+0x86/0x230 [ 15.339548] kunit_try_run_case+0x1a5/0x480 [ 15.339573] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.339597] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.339623] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.339647] ? __kthread_parkme+0x82/0x180 [ 15.339670] ? preempt_count_sub+0x50/0x80 [ 15.339694] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.339719] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.339745] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.339771] kthread+0x337/0x6f0 [ 15.339791] ? trace_preempt_on+0x20/0xc0 [ 15.339815] ? __pfx_kthread+0x10/0x10 [ 15.339836] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.339859] ? calculate_sigpending+0x7b/0xa0 [ 15.339884] ? __pfx_kthread+0x10/0x10 [ 15.339907] ret_from_fork+0x116/0x1d0 [ 15.339927] ? __pfx_kthread+0x10/0x10 [ 15.339948] ret_from_fork_asm+0x1a/0x30 [ 15.339980] </TASK> [ 15.339991] [ 15.350279] Allocated by task 283: [ 15.350791] kasan_save_stack+0x45/0x70 [ 15.350981] kasan_save_track+0x18/0x40 [ 15.351171] kasan_save_alloc_info+0x3b/0x50 [ 15.351377] __kasan_kmalloc+0xb7/0xc0 [ 15.351817] __kmalloc_cache_noprof+0x189/0x420 [ 15.352017] kasan_atomics+0x95/0x310 [ 15.352211] kunit_try_run_case+0x1a5/0x480 [ 15.352449] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.353131] kthread+0x337/0x6f0 [ 15.353300] ret_from_fork+0x116/0x1d0 [ 15.353600] ret_from_fork_asm+0x1a/0x30 [ 15.353789] [ 15.353886] The buggy address belongs to the object at ffff8881039b8c80 [ 15.353886] which belongs to the cache kmalloc-64 of size 64 [ 15.354417] The buggy address is located 0 bytes to the right of [ 15.354417] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 15.355256] [ 15.355370] The buggy address belongs to the physical page: [ 15.355621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.356275] flags: 0x200000000000000(node=0|zone=2) [ 15.356658] page_type: f5(slab) [ 15.356822] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.357142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.357486] page dumped because: kasan: bad access detected [ 15.357769] [ 15.357873] Memory state around the buggy address: [ 15.358042] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.358377] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.358746] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.359018] ^ [ 15.359203] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.359585] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.359962] ================================================================== [ 15.496895] ================================================================== [ 15.497172] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 15.497593] Write of size 4 at addr ffff8881039b8cb0 by task kunit_try_catch/283 [ 15.497895] [ 15.497979] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.498020] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.498032] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.498052] Call Trace: [ 15.498066] <TASK> [ 15.498079] dump_stack_lvl+0x73/0xb0 [ 15.498109] print_report+0xd1/0x650 [ 15.498131] ? __virt_addr_valid+0x1db/0x2d0 [ 15.498156] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.498178] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.498203] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.498227] kasan_report+0x141/0x180 [ 15.498251] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.498277] kasan_check_range+0x10c/0x1c0 [ 15.498302] __kasan_check_write+0x18/0x20 [ 15.498323] kasan_atomics_helper+0xb6a/0x5450 [ 15.498423] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.498456] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.498483] ? kasan_atomics+0x152/0x310 [ 15.498510] kasan_atomics+0x1dc/0x310 [ 15.498533] ? __pfx_kasan_atomics+0x10/0x10 [ 15.498559] ? __pfx_read_tsc+0x10/0x10 [ 15.498581] ? ktime_get_ts64+0x86/0x230 [ 15.498605] kunit_try_run_case+0x1a5/0x480 [ 15.498629] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.498653] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.498678] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.498704] ? __kthread_parkme+0x82/0x180 [ 15.498725] ? preempt_count_sub+0x50/0x80 [ 15.498749] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.498775] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.498801] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.498826] kthread+0x337/0x6f0 [ 15.498847] ? trace_preempt_on+0x20/0xc0 [ 15.498871] ? __pfx_kthread+0x10/0x10 [ 15.498892] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.498915] ? calculate_sigpending+0x7b/0xa0 [ 15.498941] ? __pfx_kthread+0x10/0x10 [ 15.498962] ret_from_fork+0x116/0x1d0 [ 15.498982] ? __pfx_kthread+0x10/0x10 [ 15.499003] ret_from_fork_asm+0x1a/0x30 [ 15.499034] </TASK> [ 15.499045] [ 15.506961] Allocated by task 283: [ 15.507104] kasan_save_stack+0x45/0x70 [ 15.507311] kasan_save_track+0x18/0x40 [ 15.507537] kasan_save_alloc_info+0x3b/0x50 [ 15.507696] __kasan_kmalloc+0xb7/0xc0 [ 15.507885] __kmalloc_cache_noprof+0x189/0x420 [ 15.508114] kasan_atomics+0x95/0x310 [ 15.508311] kunit_try_run_case+0x1a5/0x480 [ 15.508700] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.508918] kthread+0x337/0x6f0 [ 15.509092] ret_from_fork+0x116/0x1d0 [ 15.509290] ret_from_fork_asm+0x1a/0x30 [ 15.509579] [ 15.509659] The buggy address belongs to the object at ffff8881039b8c80 [ 15.509659] which belongs to the cache kmalloc-64 of size 64 [ 15.510137] The buggy address is located 0 bytes to the right of [ 15.510137] allocated 48-byte region [ffff8881039b8c80, ffff8881039b8cb0) [ 15.510747] [ 15.510834] The buggy address belongs to the physical page: [ 15.511065] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.511461] flags: 0x200000000000000(node=0|zone=2) [ 15.511682] page_type: f5(slab) [ 15.511830] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.512140] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.512485] page dumped because: kasan: bad access detected [ 15.512662] [ 15.512734] Memory state around the buggy address: [ 15.512889] ffff8881039b8b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.513217] ffff8881039b8c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.513732] >ffff8881039b8c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.514057] ^ [ 15.514280] ffff8881039b8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.514707] ffff8881039b8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.514982] ==================================================================