Date
July 6, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 | |
x86 |
[ 19.846855] ================================================================== [ 19.846900] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 19.846949] Read of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.847015] [ 19.847045] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.847128] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.847155] Hardware name: linux,dummy-virt (DT) [ 19.847188] Call trace: [ 19.847220] show_stack+0x20/0x38 (C) [ 19.847268] dump_stack_lvl+0x8c/0xd0 [ 19.847352] print_report+0x118/0x608 [ 19.847401] kasan_report+0xdc/0x128 [ 19.848439] __asan_report_load8_noabort+0x20/0x30 [ 19.848508] kasan_atomics_helper+0x3f04/0x4858 [ 19.848566] kasan_atomics+0x198/0x2e0 [ 19.848847] kunit_try_run_case+0x170/0x3f0 [ 19.849014] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.849168] kthread+0x328/0x630 [ 19.849275] ret_from_fork+0x10/0x20 [ 19.849396] [ 19.849415] Allocated by task 266: [ 19.849443] kasan_save_stack+0x3c/0x68 [ 19.849486] kasan_save_track+0x20/0x40 [ 19.849523] kasan_save_alloc_info+0x40/0x58 [ 19.849565] __kasan_kmalloc+0xd4/0xd8 [ 19.849602] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.849648] kasan_atomics+0xb8/0x2e0 [ 19.849687] kunit_try_run_case+0x170/0x3f0 [ 19.849726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.849803] kthread+0x328/0x630 [ 19.849938] ret_from_fork+0x10/0x20 [ 19.849985] [ 19.850014] The buggy address belongs to the object at fff00000c77bfc80 [ 19.850014] which belongs to the cache kmalloc-64 of size 64 [ 19.850189] The buggy address is located 0 bytes to the right of [ 19.850189] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.850256] [ 19.850275] The buggy address belongs to the physical page: [ 19.850308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.850363] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.850419] page_type: f5(slab) [ 19.850613] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.850668] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.850711] page dumped because: kasan: bad access detected [ 19.850776] [ 19.850798] Memory state around the buggy address: [ 19.850833] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.850881] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.850930] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.850986] ^ [ 19.851019] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.851074] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.851226] ================================================================== [ 19.865358] ================================================================== [ 19.865409] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 19.865458] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.865732] [ 19.865937] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.866393] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.866825] Hardware name: linux,dummy-virt (DT) [ 19.866866] Call trace: [ 19.866889] show_stack+0x20/0x38 (C) [ 19.867149] dump_stack_lvl+0x8c/0xd0 [ 19.867336] print_report+0x118/0x608 [ 19.867385] kasan_report+0xdc/0x128 [ 19.867463] kasan_check_range+0x100/0x1a8 [ 19.867594] __kasan_check_write+0x20/0x30 [ 19.867662] kasan_atomics_helper+0x15b4/0x4858 [ 19.867711] kasan_atomics+0x198/0x2e0 [ 19.867757] kunit_try_run_case+0x170/0x3f0 [ 19.867805] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.868228] kthread+0x328/0x630 [ 19.868283] ret_from_fork+0x10/0x20 [ 19.868330] [ 19.868549] Allocated by task 266: [ 19.868586] kasan_save_stack+0x3c/0x68 [ 19.868654] kasan_save_track+0x20/0x40 [ 19.869006] kasan_save_alloc_info+0x40/0x58 [ 19.869320] __kasan_kmalloc+0xd4/0xd8 [ 19.869362] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.869403] kasan_atomics+0xb8/0x2e0 [ 19.869443] kunit_try_run_case+0x170/0x3f0 [ 19.869481] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.869527] kthread+0x328/0x630 [ 19.870406] ret_from_fork+0x10/0x20 [ 19.870459] [ 19.870575] The buggy address belongs to the object at fff00000c77bfc80 [ 19.870575] which belongs to the cache kmalloc-64 of size 64 [ 19.870694] The buggy address is located 0 bytes to the right of [ 19.870694] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.871230] [ 19.871951] The buggy address belongs to the physical page: [ 19.872283] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.872483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.873023] page_type: f5(slab) [ 19.873314] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.873381] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.873469] page dumped because: kasan: bad access detected [ 19.873591] [ 19.873789] Memory state around the buggy address: [ 19.873831] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.873878] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.874353] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.874628] ^ [ 19.874766] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.874816] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.875079] ================================================================== [ 19.819384] ================================================================== [ 19.819462] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 19.819553] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.819744] [ 19.819781] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.819965] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.820083] Hardware name: linux,dummy-virt (DT) [ 19.820118] Call trace: [ 19.820169] show_stack+0x20/0x38 (C) [ 19.820222] dump_stack_lvl+0x8c/0xd0 [ 19.820298] print_report+0x118/0x608 [ 19.820371] kasan_report+0xdc/0x128 [ 19.820423] kasan_check_range+0x100/0x1a8 [ 19.820473] __kasan_check_write+0x20/0x30 [ 19.820529] kasan_atomics_helper+0x10c0/0x4858 [ 19.820880] kasan_atomics+0x198/0x2e0 [ 19.820944] kunit_try_run_case+0x170/0x3f0 [ 19.821005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.821059] kthread+0x328/0x630 [ 19.821101] ret_from_fork+0x10/0x20 [ 19.821148] [ 19.821169] Allocated by task 266: [ 19.821197] kasan_save_stack+0x3c/0x68 [ 19.821242] kasan_save_track+0x20/0x40 [ 19.821280] kasan_save_alloc_info+0x40/0x58 [ 19.822296] __kasan_kmalloc+0xd4/0xd8 [ 19.822371] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.822415] kasan_atomics+0xb8/0x2e0 [ 19.822459] kunit_try_run_case+0x170/0x3f0 [ 19.822521] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.822567] kthread+0x328/0x630 [ 19.822682] ret_from_fork+0x10/0x20 [ 19.822720] [ 19.822743] The buggy address belongs to the object at fff00000c77bfc80 [ 19.822743] which belongs to the cache kmalloc-64 of size 64 [ 19.822810] The buggy address is located 0 bytes to the right of [ 19.822810] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.823128] [ 19.823161] The buggy address belongs to the physical page: [ 19.823195] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.823454] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.823567] page_type: f5(slab) [ 19.823605] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.823664] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.823755] page dumped because: kasan: bad access detected [ 19.823789] [ 19.823871] Memory state around the buggy address: [ 19.823997] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.824043] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.824088] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.824130] ^ [ 19.824162] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.824206] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.824247] ================================================================== [ 19.752598] ================================================================== [ 19.752653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 19.752703] Read of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.752755] [ 19.752787] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.752869] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.752898] Hardware name: linux,dummy-virt (DT) [ 19.752930] Call trace: [ 19.752953] show_stack+0x20/0x38 (C) [ 19.753016] dump_stack_lvl+0x8c/0xd0 [ 19.753079] print_report+0x118/0x608 [ 19.753128] kasan_report+0xdc/0x128 [ 19.753173] kasan_check_range+0x100/0x1a8 [ 19.753222] __kasan_check_read+0x20/0x30 [ 19.753267] kasan_atomics_helper+0xdd4/0x4858 [ 19.753314] kasan_atomics+0x198/0x2e0 [ 19.753360] kunit_try_run_case+0x170/0x3f0 [ 19.753406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.753459] kthread+0x328/0x630 [ 19.753510] ret_from_fork+0x10/0x20 [ 19.753559] [ 19.753588] Allocated by task 266: [ 19.753624] kasan_save_stack+0x3c/0x68 [ 19.753667] kasan_save_track+0x20/0x40 [ 19.753705] kasan_save_alloc_info+0x40/0x58 [ 19.753747] __kasan_kmalloc+0xd4/0xd8 [ 19.753785] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.753825] kasan_atomics+0xb8/0x2e0 [ 19.753870] kunit_try_run_case+0x170/0x3f0 [ 19.753910] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.753955] kthread+0x328/0x630 [ 19.754320] ret_from_fork+0x10/0x20 [ 19.754393] [ 19.754759] The buggy address belongs to the object at fff00000c77bfc80 [ 19.754759] which belongs to the cache kmalloc-64 of size 64 [ 19.754840] The buggy address is located 0 bytes to the right of [ 19.754840] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.754960] [ 19.755310] The buggy address belongs to the physical page: [ 19.755704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.756071] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.756388] page_type: f5(slab) [ 19.756596] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.756921] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.757114] page dumped because: kasan: bad access detected [ 19.757450] [ 19.757510] Memory state around the buggy address: [ 19.757659] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.757727] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.757935] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.758195] ^ [ 19.758436] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.759246] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.759393] ================================================================== [ 19.759804] ================================================================== [ 19.759854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 19.760229] Read of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.760497] [ 19.760685] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.760781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.760809] Hardware name: linux,dummy-virt (DT) [ 19.760843] Call trace: [ 19.760866] show_stack+0x20/0x38 (C) [ 19.761128] dump_stack_lvl+0x8c/0xd0 [ 19.761438] print_report+0x118/0x608 [ 19.761668] kasan_report+0xdc/0x128 [ 19.761913] __asan_report_load8_noabort+0x20/0x30 [ 19.762116] kasan_atomics_helper+0x3f58/0x4858 [ 19.762178] kasan_atomics+0x198/0x2e0 [ 19.762444] kunit_try_run_case+0x170/0x3f0 [ 19.762595] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.762838] kthread+0x328/0x630 [ 19.762893] ret_from_fork+0x10/0x20 [ 19.762946] [ 19.762966] Allocated by task 266: [ 19.763005] kasan_save_stack+0x3c/0x68 [ 19.763550] kasan_save_track+0x20/0x40 [ 19.763751] kasan_save_alloc_info+0x40/0x58 [ 19.764015] __kasan_kmalloc+0xd4/0xd8 [ 19.764323] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.764621] kasan_atomics+0xb8/0x2e0 [ 19.764812] kunit_try_run_case+0x170/0x3f0 [ 19.765041] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.765152] kthread+0x328/0x630 [ 19.765246] ret_from_fork+0x10/0x20 [ 19.765896] [ 19.765952] The buggy address belongs to the object at fff00000c77bfc80 [ 19.765952] which belongs to the cache kmalloc-64 of size 64 [ 19.766262] The buggy address is located 0 bytes to the right of [ 19.766262] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.766661] [ 19.766698] The buggy address belongs to the physical page: [ 19.766860] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.767094] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.767187] page_type: f5(slab) [ 19.767553] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.767631] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.767862] page dumped because: kasan: bad access detected [ 19.768040] [ 19.768256] Memory state around the buggy address: [ 19.768302] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.768543] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.768668] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.769064] ^ [ 19.769573] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.769986] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.770077] ================================================================== [ 19.722331] ================================================================== [ 19.722400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 19.722454] Read of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.722515] [ 19.722549] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.723239] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.723315] Hardware name: linux,dummy-virt (DT) [ 19.723378] Call trace: [ 19.723531] show_stack+0x20/0x38 (C) [ 19.723673] dump_stack_lvl+0x8c/0xd0 [ 19.723737] print_report+0x118/0x608 [ 19.724143] kasan_report+0xdc/0x128 [ 19.724223] __asan_report_load4_noabort+0x20/0x30 [ 19.724466] kasan_atomics_helper+0x3dd8/0x4858 [ 19.724672] kasan_atomics+0x198/0x2e0 [ 19.724839] kunit_try_run_case+0x170/0x3f0 [ 19.725140] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.725316] kthread+0x328/0x630 [ 19.725612] ret_from_fork+0x10/0x20 [ 19.726061] [ 19.726131] Allocated by task 266: [ 19.726208] kasan_save_stack+0x3c/0x68 [ 19.726278] kasan_save_track+0x20/0x40 [ 19.726318] kasan_save_alloc_info+0x40/0x58 [ 19.726910] __kasan_kmalloc+0xd4/0xd8 [ 19.727086] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.727240] kasan_atomics+0xb8/0x2e0 [ 19.727286] kunit_try_run_case+0x170/0x3f0 [ 19.727349] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.727715] kthread+0x328/0x630 [ 19.728105] ret_from_fork+0x10/0x20 [ 19.728176] [ 19.728382] The buggy address belongs to the object at fff00000c77bfc80 [ 19.728382] which belongs to the cache kmalloc-64 of size 64 [ 19.728486] The buggy address is located 0 bytes to the right of [ 19.728486] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.728743] [ 19.728836] The buggy address belongs to the physical page: [ 19.729213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.729280] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.729895] page_type: f5(slab) [ 19.730099] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.730334] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.730743] page dumped because: kasan: bad access detected [ 19.730811] [ 19.730949] Memory state around the buggy address: [ 19.731072] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.731327] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.731558] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.731625] ^ [ 19.731918] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.732045] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.732121] ================================================================== [ 19.923147] ================================================================== [ 19.923205] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 19.924462] Read of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.924534] [ 19.924571] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.924662] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.924690] Hardware name: linux,dummy-virt (DT) [ 19.925133] Call trace: [ 19.925362] show_stack+0x20/0x38 (C) [ 19.925420] dump_stack_lvl+0x8c/0xd0 [ 19.925468] print_report+0x118/0x608 [ 19.926048] kasan_report+0xdc/0x128 [ 19.926118] __asan_report_load8_noabort+0x20/0x30 [ 19.926325] kasan_atomics_helper+0x3e10/0x4858 [ 19.926453] kasan_atomics+0x198/0x2e0 [ 19.926602] kunit_try_run_case+0x170/0x3f0 [ 19.926944] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.927379] kthread+0x328/0x630 [ 19.927638] ret_from_fork+0x10/0x20 [ 19.927701] [ 19.927721] Allocated by task 266: [ 19.927758] kasan_save_stack+0x3c/0x68 [ 19.927894] kasan_save_track+0x20/0x40 [ 19.927986] kasan_save_alloc_info+0x40/0x58 [ 19.928046] __kasan_kmalloc+0xd4/0xd8 [ 19.928087] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.928528] kasan_atomics+0xb8/0x2e0 [ 19.928577] kunit_try_run_case+0x170/0x3f0 [ 19.928913] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.929259] kthread+0x328/0x630 [ 19.929458] ret_from_fork+0x10/0x20 [ 19.929498] [ 19.929765] The buggy address belongs to the object at fff00000c77bfc80 [ 19.929765] which belongs to the cache kmalloc-64 of size 64 [ 19.929834] The buggy address is located 0 bytes to the right of [ 19.929834] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.930120] [ 19.930147] The buggy address belongs to the physical page: [ 19.930183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.930387] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.930439] page_type: f5(slab) [ 19.930479] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.930813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.930871] page dumped because: kasan: bad access detected [ 19.930992] [ 19.931016] Memory state around the buggy address: [ 19.931179] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.931430] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.931751] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.931800] ^ [ 19.931836] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.932098] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.932293] ================================================================== [ 19.950232] ================================================================== [ 19.950287] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 19.950337] Read of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.950388] [ 19.950421] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.953099] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.953131] Hardware name: linux,dummy-virt (DT) [ 19.953164] Call trace: [ 19.953189] show_stack+0x20/0x38 (C) [ 19.953240] dump_stack_lvl+0x8c/0xd0 [ 19.953291] print_report+0x118/0x608 [ 19.953337] kasan_report+0xdc/0x128 [ 19.953384] __asan_report_load8_noabort+0x20/0x30 [ 19.953436] kasan_atomics_helper+0x3e20/0x4858 [ 19.953484] kasan_atomics+0x198/0x2e0 [ 19.953531] kunit_try_run_case+0x170/0x3f0 [ 19.953578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.953637] kthread+0x328/0x630 [ 19.953680] ret_from_fork+0x10/0x20 [ 19.953727] [ 19.953747] Allocated by task 266: [ 19.953777] kasan_save_stack+0x3c/0x68 [ 19.953818] kasan_save_track+0x20/0x40 [ 19.953857] kasan_save_alloc_info+0x40/0x58 [ 19.953920] __kasan_kmalloc+0xd4/0xd8 [ 19.953996] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.954039] kasan_atomics+0xb8/0x2e0 [ 19.954075] kunit_try_run_case+0x170/0x3f0 [ 19.954114] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.954157] kthread+0x328/0x630 [ 19.954193] ret_from_fork+0x10/0x20 [ 19.954239] [ 19.954268] The buggy address belongs to the object at fff00000c77bfc80 [ 19.954268] which belongs to the cache kmalloc-64 of size 64 [ 19.954336] The buggy address is located 0 bytes to the right of [ 19.954336] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.954414] [ 19.954451] The buggy address belongs to the physical page: [ 19.954491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.954545] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.954604] page_type: f5(slab) [ 19.954926] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.955214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.955375] page dumped because: kasan: bad access detected [ 19.955447] [ 19.955624] Memory state around the buggy address: [ 19.955824] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.955941] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.956074] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.956116] ^ [ 19.956150] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.956196] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.956236] ================================================================== [ 19.862241] ================================================================== [ 19.862287] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 19.862334] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.862384] [ 19.862413] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.862495] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.862521] Hardware name: linux,dummy-virt (DT) [ 19.862554] Call trace: [ 19.862575] show_stack+0x20/0x38 (C) [ 19.862634] dump_stack_lvl+0x8c/0xd0 [ 19.862681] print_report+0x118/0x608 [ 19.862727] kasan_report+0xdc/0x128 [ 19.862772] kasan_check_range+0x100/0x1a8 [ 19.862823] __kasan_check_write+0x20/0x30 [ 19.862868] kasan_atomics_helper+0x154c/0x4858 [ 19.862915] kasan_atomics+0x198/0x2e0 [ 19.862961] kunit_try_run_case+0x170/0x3f0 [ 19.863019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.863070] kthread+0x328/0x630 [ 19.863112] ret_from_fork+0x10/0x20 [ 19.863158] [ 19.863211] Allocated by task 266: [ 19.863245] kasan_save_stack+0x3c/0x68 [ 19.863286] kasan_save_track+0x20/0x40 [ 19.863325] kasan_save_alloc_info+0x40/0x58 [ 19.863367] __kasan_kmalloc+0xd4/0xd8 [ 19.863405] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.863493] kasan_atomics+0xb8/0x2e0 [ 19.863531] kunit_try_run_case+0x170/0x3f0 [ 19.863569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.863636] kthread+0x328/0x630 [ 19.863672] ret_from_fork+0x10/0x20 [ 19.863710] [ 19.863730] The buggy address belongs to the object at fff00000c77bfc80 [ 19.863730] which belongs to the cache kmalloc-64 of size 64 [ 19.863790] The buggy address is located 0 bytes to the right of [ 19.863790] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.863855] [ 19.863876] The buggy address belongs to the physical page: [ 19.863909] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.863961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.864021] page_type: f5(slab) [ 19.864057] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.864110] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.864152] page dumped because: kasan: bad access detected [ 19.864186] [ 19.864205] Memory state around the buggy address: [ 19.864238] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.864283] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.864329] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.864370] ^ [ 19.864484] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.864582] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.864728] ================================================================== [ 19.883414] ================================================================== [ 19.883522] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 19.883571] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.883623] [ 19.883654] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.883737] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.883766] Hardware name: linux,dummy-virt (DT) [ 19.883797] Call trace: [ 19.883823] show_stack+0x20/0x38 (C) [ 19.883869] dump_stack_lvl+0x8c/0xd0 [ 19.884203] print_report+0x118/0x608 [ 19.884282] kasan_report+0xdc/0x128 [ 19.884937] kasan_check_range+0x100/0x1a8 [ 19.885209] __kasan_check_write+0x20/0x30 [ 19.885258] kasan_atomics_helper+0x1644/0x4858 [ 19.886714] kasan_atomics+0x198/0x2e0 [ 19.887216] kunit_try_run_case+0x170/0x3f0 [ 19.887410] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.887484] kthread+0x328/0x630 [ 19.887843] ret_from_fork+0x10/0x20 [ 19.888098] [ 19.888137] Allocated by task 266: [ 19.888283] kasan_save_stack+0x3c/0x68 [ 19.888601] kasan_save_track+0x20/0x40 [ 19.888644] kasan_save_alloc_info+0x40/0x58 [ 19.888846] __kasan_kmalloc+0xd4/0xd8 [ 19.888887] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.889440] kasan_atomics+0xb8/0x2e0 [ 19.889522] kunit_try_run_case+0x170/0x3f0 [ 19.889736] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.889852] kthread+0x328/0x630 [ 19.890061] ret_from_fork+0x10/0x20 [ 19.890501] [ 19.890599] The buggy address belongs to the object at fff00000c77bfc80 [ 19.890599] which belongs to the cache kmalloc-64 of size 64 [ 19.890671] The buggy address is located 0 bytes to the right of [ 19.890671] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.890739] [ 19.890760] The buggy address belongs to the physical page: [ 19.890795] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.891373] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.891430] page_type: f5(slab) [ 19.891471] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.892257] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.892701] page dumped because: kasan: bad access detected [ 19.892941] [ 19.892963] Memory state around the buggy address: [ 19.893011] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.893060] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.893106] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.893829] ^ [ 19.894187] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.894237] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.894344] ================================================================== [ 19.827331] ================================================================== [ 19.827380] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 19.827492] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.827670] [ 19.827701] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.827791] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.828178] Hardware name: linux,dummy-virt (DT) [ 19.828251] Call trace: [ 19.828435] show_stack+0x20/0x38 (C) [ 19.828487] dump_stack_lvl+0x8c/0xd0 [ 19.828532] print_report+0x118/0x608 [ 19.828648] kasan_report+0xdc/0x128 [ 19.828718] kasan_check_range+0x100/0x1a8 [ 19.829106] __kasan_check_write+0x20/0x30 [ 19.829154] kasan_atomics_helper+0x1190/0x4858 [ 19.829201] kasan_atomics+0x198/0x2e0 [ 19.829328] kunit_try_run_case+0x170/0x3f0 [ 19.829538] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.829804] kthread+0x328/0x630 [ 19.829854] ret_from_fork+0x10/0x20 [ 19.829958] [ 19.829987] Allocated by task 266: [ 19.830017] kasan_save_stack+0x3c/0x68 [ 19.830057] kasan_save_track+0x20/0x40 [ 19.830097] kasan_save_alloc_info+0x40/0x58 [ 19.830138] __kasan_kmalloc+0xd4/0xd8 [ 19.830175] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.830216] kasan_atomics+0xb8/0x2e0 [ 19.830251] kunit_try_run_case+0x170/0x3f0 [ 19.830292] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.830335] kthread+0x328/0x630 [ 19.830368] ret_from_fork+0x10/0x20 [ 19.830405] [ 19.830425] The buggy address belongs to the object at fff00000c77bfc80 [ 19.830425] which belongs to the cache kmalloc-64 of size 64 [ 19.830498] The buggy address is located 0 bytes to the right of [ 19.830498] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.830756] [ 19.830778] The buggy address belongs to the physical page: [ 19.830812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.830890] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.830939] page_type: f5(slab) [ 19.830986] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.831039] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.831081] page dumped because: kasan: bad access detected [ 19.831115] [ 19.831135] Memory state around the buggy address: [ 19.831174] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.831219] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.831265] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.831364] ^ [ 19.831588] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.831639] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.831753] ================================================================== [ 19.734107] ================================================================== [ 19.734466] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 19.734849] Write of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.735010] [ 19.735209] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.735346] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.735387] Hardware name: linux,dummy-virt (DT) [ 19.735426] Call trace: [ 19.735451] show_stack+0x20/0x38 (C) [ 19.735510] dump_stack_lvl+0x8c/0xd0 [ 19.735744] print_report+0x118/0x608 [ 19.735962] kasan_report+0xdc/0x128 [ 19.736234] kasan_check_range+0x100/0x1a8 [ 19.736484] __kasan_check_write+0x20/0x30 [ 19.736637] kasan_atomics_helper+0xd3c/0x4858 [ 19.736898] kasan_atomics+0x198/0x2e0 [ 19.736956] kunit_try_run_case+0x170/0x3f0 [ 19.737020] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.737074] kthread+0x328/0x630 [ 19.737116] ret_from_fork+0x10/0x20 [ 19.737306] [ 19.737339] Allocated by task 266: [ 19.737395] kasan_save_stack+0x3c/0x68 [ 19.737443] kasan_save_track+0x20/0x40 [ 19.737484] kasan_save_alloc_info+0x40/0x58 [ 19.737528] __kasan_kmalloc+0xd4/0xd8 [ 19.737578] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.737646] kasan_atomics+0xb8/0x2e0 [ 19.737692] kunit_try_run_case+0x170/0x3f0 [ 19.737732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.737786] kthread+0x328/0x630 [ 19.737831] ret_from_fork+0x10/0x20 [ 19.737869] [ 19.737898] The buggy address belongs to the object at fff00000c77bfc80 [ 19.737898] which belongs to the cache kmalloc-64 of size 64 [ 19.737957] The buggy address is located 0 bytes to the right of [ 19.737957] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.738035] [ 19.738067] The buggy address belongs to the physical page: [ 19.738109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.738181] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.738231] page_type: f5(slab) [ 19.738300] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.738371] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.738425] page dumped because: kasan: bad access detected [ 19.738471] [ 19.738501] Memory state around the buggy address: [ 19.738534] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.738579] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.738883] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.739184] ^ [ 19.739230] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.739278] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.739689] ================================================================== [ 19.648160] ================================================================== [ 19.648364] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 19.648418] Write of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.648994] [ 19.649199] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.649421] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.649536] Hardware name: linux,dummy-virt (DT) [ 19.649717] Call trace: [ 19.649759] show_stack+0x20/0x38 (C) [ 19.649812] dump_stack_lvl+0x8c/0xd0 [ 19.650141] print_report+0x118/0x608 [ 19.650469] kasan_report+0xdc/0x128 [ 19.650539] kasan_check_range+0x100/0x1a8 [ 19.650591] __kasan_check_write+0x20/0x30 [ 19.650702] kasan_atomics_helper+0xa6c/0x4858 [ 19.650782] kasan_atomics+0x198/0x2e0 [ 19.650927] kunit_try_run_case+0x170/0x3f0 [ 19.650992] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.651341] kthread+0x328/0x630 [ 19.651509] ret_from_fork+0x10/0x20 [ 19.651598] [ 19.651812] Allocated by task 266: [ 19.651850] kasan_save_stack+0x3c/0x68 [ 19.651905] kasan_save_track+0x20/0x40 [ 19.651944] kasan_save_alloc_info+0x40/0x58 [ 19.651996] __kasan_kmalloc+0xd4/0xd8 [ 19.652034] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.652077] kasan_atomics+0xb8/0x2e0 [ 19.652114] kunit_try_run_case+0x170/0x3f0 [ 19.652155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.652200] kthread+0x328/0x630 [ 19.652235] ret_from_fork+0x10/0x20 [ 19.652274] [ 19.652294] The buggy address belongs to the object at fff00000c77bfc80 [ 19.652294] which belongs to the cache kmalloc-64 of size 64 [ 19.652354] The buggy address is located 0 bytes to the right of [ 19.652354] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.652421] [ 19.652441] The buggy address belongs to the physical page: [ 19.652474] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.652529] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.652578] page_type: f5(slab) [ 19.652617] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.652669] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.652711] page dumped because: kasan: bad access detected [ 19.652909] [ 19.652934] Memory state around the buggy address: [ 19.652971] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.653381] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.653541] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.653917] ^ [ 19.654096] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.654191] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.654233] ================================================================== [ 19.673254] ================================================================== [ 19.673578] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 19.673656] Write of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.673709] [ 19.673745] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.674328] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.674429] Hardware name: linux,dummy-virt (DT) [ 19.674490] Call trace: [ 19.674527] show_stack+0x20/0x38 (C) [ 19.674581] dump_stack_lvl+0x8c/0xd0 [ 19.674913] print_report+0x118/0x608 [ 19.674993] kasan_report+0xdc/0x128 [ 19.675448] kasan_check_range+0x100/0x1a8 [ 19.675610] __kasan_check_write+0x20/0x30 [ 19.675825] kasan_atomics_helper+0xb70/0x4858 [ 19.676061] kasan_atomics+0x198/0x2e0 [ 19.676183] kunit_try_run_case+0x170/0x3f0 [ 19.676270] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.676340] kthread+0x328/0x630 [ 19.677335] ret_from_fork+0x10/0x20 [ 19.677434] [ 19.677488] Allocated by task 266: [ 19.677639] kasan_save_stack+0x3c/0x68 [ 19.677851] kasan_save_track+0x20/0x40 [ 19.677994] kasan_save_alloc_info+0x40/0x58 [ 19.678086] __kasan_kmalloc+0xd4/0xd8 [ 19.678186] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.678252] kasan_atomics+0xb8/0x2e0 [ 19.678358] kunit_try_run_case+0x170/0x3f0 [ 19.678434] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.678628] kthread+0x328/0x630 [ 19.678824] ret_from_fork+0x10/0x20 [ 19.678894] [ 19.679161] The buggy address belongs to the object at fff00000c77bfc80 [ 19.679161] which belongs to the cache kmalloc-64 of size 64 [ 19.679246] The buggy address is located 0 bytes to the right of [ 19.679246] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.679446] [ 19.679474] The buggy address belongs to the physical page: [ 19.679508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.679720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.680035] page_type: f5(slab) [ 19.680462] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.680547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.680591] page dumped because: kasan: bad access detected [ 19.680778] [ 19.681304] Memory state around the buggy address: [ 19.681425] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.681543] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.681652] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.682106] ^ [ 19.682171] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.682236] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.682279] ================================================================== [ 19.639300] ================================================================== [ 19.639373] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 19.639444] Write of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.639514] [ 19.639547] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.639631] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.640358] Hardware name: linux,dummy-virt (DT) [ 19.640412] Call trace: [ 19.640528] show_stack+0x20/0x38 (C) [ 19.640634] dump_stack_lvl+0x8c/0xd0 [ 19.640687] print_report+0x118/0x608 [ 19.640733] kasan_report+0xdc/0x128 [ 19.640926] kasan_check_range+0x100/0x1a8 [ 19.641154] __kasan_check_write+0x20/0x30 [ 19.641224] kasan_atomics_helper+0xa04/0x4858 [ 19.641542] kasan_atomics+0x198/0x2e0 [ 19.641645] kunit_try_run_case+0x170/0x3f0 [ 19.641697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.642175] kthread+0x328/0x630 [ 19.642287] ret_from_fork+0x10/0x20 [ 19.642352] [ 19.642372] Allocated by task 266: [ 19.642403] kasan_save_stack+0x3c/0x68 [ 19.642450] kasan_save_track+0x20/0x40 [ 19.642900] kasan_save_alloc_info+0x40/0x58 [ 19.643159] __kasan_kmalloc+0xd4/0xd8 [ 19.643296] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.643410] kasan_atomics+0xb8/0x2e0 [ 19.643452] kunit_try_run_case+0x170/0x3f0 [ 19.643611] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.643829] kthread+0x328/0x630 [ 19.644048] ret_from_fork+0x10/0x20 [ 19.644107] [ 19.644397] The buggy address belongs to the object at fff00000c77bfc80 [ 19.644397] which belongs to the cache kmalloc-64 of size 64 [ 19.644523] The buggy address is located 0 bytes to the right of [ 19.644523] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.644593] [ 19.644636] The buggy address belongs to the physical page: [ 19.644679] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.644754] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.644812] page_type: f5(slab) [ 19.644866] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.644919] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.644971] page dumped because: kasan: bad access detected [ 19.645040] [ 19.645094] Memory state around the buggy address: [ 19.645156] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.645636] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.645716] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.646001] ^ [ 19.646044] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.646479] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.646762] ================================================================== [ 19.839131] ================================================================== [ 19.839186] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 19.839352] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.839474] [ 19.839504] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.839607] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.839636] Hardware name: linux,dummy-virt (DT) [ 19.839666] Call trace: [ 19.839691] show_stack+0x20/0x38 (C) [ 19.839738] dump_stack_lvl+0x8c/0xd0 [ 19.839785] print_report+0x118/0x608 [ 19.839830] kasan_report+0xdc/0x128 [ 19.839876] kasan_check_range+0x100/0x1a8 [ 19.839945] __kasan_check_write+0x20/0x30 [ 19.840056] kasan_atomics_helper+0x12d8/0x4858 [ 19.840195] kasan_atomics+0x198/0x2e0 [ 19.840267] kunit_try_run_case+0x170/0x3f0 [ 19.840321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.840549] kthread+0x328/0x630 [ 19.840700] ret_from_fork+0x10/0x20 [ 19.840747] [ 19.840767] Allocated by task 266: [ 19.840795] kasan_save_stack+0x3c/0x68 [ 19.840837] kasan_save_track+0x20/0x40 [ 19.840874] kasan_save_alloc_info+0x40/0x58 [ 19.840916] __kasan_kmalloc+0xd4/0xd8 [ 19.840954] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.841001] kasan_atomics+0xb8/0x2e0 [ 19.841039] kunit_try_run_case+0x170/0x3f0 [ 19.841085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.841304] kthread+0x328/0x630 [ 19.841485] ret_from_fork+0x10/0x20 [ 19.841562] [ 19.841582] The buggy address belongs to the object at fff00000c77bfc80 [ 19.841582] which belongs to the cache kmalloc-64 of size 64 [ 19.841818] The buggy address is located 0 bytes to the right of [ 19.841818] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.842666] [ 19.842692] The buggy address belongs to the physical page: [ 19.842725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.842779] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.842828] page_type: f5(slab) [ 19.842866] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.842919] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.842961] page dumped because: kasan: bad access detected [ 19.843005] [ 19.843025] Memory state around the buggy address: [ 19.843059] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.843111] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.843156] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.843198] ^ [ 19.843230] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.843273] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.843312] ================================================================== [ 19.683299] ================================================================== [ 19.683587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 19.683894] Read of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.683963] [ 19.684010] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.684093] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.684483] Hardware name: linux,dummy-virt (DT) [ 19.684537] Call trace: [ 19.684768] show_stack+0x20/0x38 (C) [ 19.684836] dump_stack_lvl+0x8c/0xd0 [ 19.685089] print_report+0x118/0x608 [ 19.685165] kasan_report+0xdc/0x128 [ 19.685417] __asan_report_load4_noabort+0x20/0x30 [ 19.685665] kasan_atomics_helper+0x3dbc/0x4858 [ 19.685819] kasan_atomics+0x198/0x2e0 [ 19.685872] kunit_try_run_case+0x170/0x3f0 [ 19.685956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.686027] kthread+0x328/0x630 [ 19.686071] ret_from_fork+0x10/0x20 [ 19.686326] [ 19.686631] Allocated by task 266: [ 19.686920] kasan_save_stack+0x3c/0x68 [ 19.687019] kasan_save_track+0x20/0x40 [ 19.687372] kasan_save_alloc_info+0x40/0x58 [ 19.687447] __kasan_kmalloc+0xd4/0xd8 [ 19.687606] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.687856] kasan_atomics+0xb8/0x2e0 [ 19.688038] kunit_try_run_case+0x170/0x3f0 [ 19.688259] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.688440] kthread+0x328/0x630 [ 19.688517] ret_from_fork+0x10/0x20 [ 19.688865] [ 19.689173] The buggy address belongs to the object at fff00000c77bfc80 [ 19.689173] which belongs to the cache kmalloc-64 of size 64 [ 19.689726] The buggy address is located 0 bytes to the right of [ 19.689726] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.689906] [ 19.689987] The buggy address belongs to the physical page: [ 19.690064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.690225] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.690297] page_type: f5(slab) [ 19.690346] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.690418] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.690463] page dumped because: kasan: bad access detected [ 19.690495] [ 19.690523] Memory state around the buggy address: [ 19.690558] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.690612] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.690998] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.691182] ^ [ 19.691225] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.691271] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.691313] ================================================================== [ 19.600758] ================================================================== [ 19.600813] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 19.600865] Write of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.600918] [ 19.600950] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.601431] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.601715] Hardware name: linux,dummy-virt (DT) [ 19.601803] Call trace: [ 19.603030] kasan_check_range+0x100/0x1a8 [ 19.603500] kasan_atomics+0x198/0x2e0 [ 19.603664] kunit_try_run_case+0x170/0x3f0 [ 19.603721] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.603777] kthread+0x328/0x630 [ 19.604323] [ 19.604752] kasan_save_stack+0x3c/0x68 [ 19.605219] kasan_save_alloc_info+0x40/0x58 [ 19.605859] kasan_atomics+0xb8/0x2e0 [ 19.606721] ret_from_fork+0x10/0x20 [ 19.607141] [ 19.607291] The buggy address belongs to the physical page: [ 19.607338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.607454] page_type: f5(slab) [ 19.607652] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.608021] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.608300] page dumped because: kasan: bad access detected [ 19.610579] [ 19.613585] __kasan_check_write+0x20/0x30 [ 19.616403] [ 19.617620] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.619337] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.620807] Call trace: [ 19.621912] kthread+0x328/0x630 [ 19.622759] ret_from_fork+0x10/0x20 [ 19.623311] [ 19.623380] The buggy address belongs to the physical page: [ 19.623473] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.623571] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.623633] page_type: f5(slab) [ 19.623673] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.623876] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.624149] page dumped because: kasan: bad access detected [ 19.624235] [ 19.624311] Memory state around the buggy address: [ 19.624435] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.624519] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.624592] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.625660] Read of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.626761] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.627238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.628126] [ 19.629317] dump_stack_lvl+0x8c/0xd0 [ 19.629518] print_report+0x118/0x608 [ 19.629639] kasan_report+0xdc/0x128 [ 19.629718] kasan_check_range+0x100/0x1a8 [ 19.630728] __kasan_check_write+0x20/0x30 [ 19.630796] kasan_atomics_helper+0x934/0x4858 [ 19.630847] kasan_atomics+0x198/0x2e0 [ 19.631076] kunit_try_run_case+0x170/0x3f0 [ 19.631161] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.631266] kthread+0x328/0x630 [ 19.631318] ret_from_fork+0x10/0x20 [ 19.631460] [ 19.631532] Allocated by task 266: [ 19.631612] kasan_save_stack+0x3c/0x68 [ 19.631722] kasan_save_track+0x20/0x40 [ 19.631763] kasan_save_alloc_info+0x40/0x58 [ 19.631814] __kasan_kmalloc+0xd4/0xd8 [ 19.631854] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.631893] kasan_atomics+0xb8/0x2e0 [ 19.632146] kunit_try_run_case+0x170/0x3f0 [ 19.632232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.632344] kthread+0x328/0x630 [ 19.632411] ret_from_fork+0x10/0x20 [ 19.632483] [ 19.632523] The buggy address belongs to the object at fff00000c77bfc80 [ 19.632523] which belongs to the cache kmalloc-64 of size 64 [ 19.632592] The buggy address is located 0 bytes to the right of [ 19.632592] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.632657] [ 19.632842] The buggy address belongs to the physical page: [ 19.632924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.633026] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.633074] page_type: f5(slab) [ 19.633131] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.633183] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.633225] page dumped because: kasan: bad access detected [ 19.633450] [ 19.633521] Memory state around the buggy address: [ 19.633610] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.633674] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.633727] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.634141] ^ [ 19.634206] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.634269] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.634332] ================================================================== [ 19.855562] ================================================================== [ 19.855600] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 19.855645] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.855694] [ 19.855724] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.855805] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.855831] Hardware name: linux,dummy-virt (DT) [ 19.855864] Call trace: [ 19.855886] show_stack+0x20/0x38 (C) [ 19.855933] dump_stack_lvl+0x8c/0xd0 [ 19.855990] print_report+0x118/0x608 [ 19.856038] kasan_report+0xdc/0x128 [ 19.856083] kasan_check_range+0x100/0x1a8 [ 19.856131] __kasan_check_write+0x20/0x30 [ 19.856176] kasan_atomics_helper+0x147c/0x4858 [ 19.856223] kasan_atomics+0x198/0x2e0 [ 19.856269] kunit_try_run_case+0x170/0x3f0 [ 19.856318] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.856370] kthread+0x328/0x630 [ 19.856412] ret_from_fork+0x10/0x20 [ 19.856458] [ 19.856477] Allocated by task 266: [ 19.856506] kasan_save_stack+0x3c/0x68 [ 19.856545] kasan_save_track+0x20/0x40 [ 19.856585] kasan_save_alloc_info+0x40/0x58 [ 19.856626] __kasan_kmalloc+0xd4/0xd8 [ 19.856663] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.856704] kasan_atomics+0xb8/0x2e0 [ 19.856741] kunit_try_run_case+0x170/0x3f0 [ 19.856779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.856824] kthread+0x328/0x630 [ 19.856858] ret_from_fork+0x10/0x20 [ 19.856895] [ 19.856914] The buggy address belongs to the object at fff00000c77bfc80 [ 19.856914] which belongs to the cache kmalloc-64 of size 64 [ 19.857349] The buggy address is located 0 bytes to the right of [ 19.857349] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.857424] [ 19.857446] The buggy address belongs to the physical page: [ 19.857478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.857531] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.857579] page_type: f5(slab) [ 19.857622] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.857675] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.857717] page dumped because: kasan: bad access detected [ 19.857751] [ 19.857770] Memory state around the buggy address: [ 19.857803] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.857848] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.857894] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.857935] ^ [ 19.857967] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.858023] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.858064] ================================================================== [ 19.801908] ================================================================== [ 19.801998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 19.802082] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.802135] [ 19.802168] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.802261] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.802293] Hardware name: linux,dummy-virt (DT) [ 19.802325] Call trace: [ 19.802348] show_stack+0x20/0x38 (C) [ 19.802394] dump_stack_lvl+0x8c/0xd0 [ 19.802442] print_report+0x118/0x608 [ 19.802488] kasan_report+0xdc/0x128 [ 19.802546] kasan_check_range+0x100/0x1a8 [ 19.802594] __kasan_check_write+0x20/0x30 [ 19.802674] kasan_atomics_helper+0xf88/0x4858 [ 19.802721] kasan_atomics+0x198/0x2e0 [ 19.802769] kunit_try_run_case+0x170/0x3f0 [ 19.803084] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.803153] kthread+0x328/0x630 [ 19.803221] ret_from_fork+0x10/0x20 [ 19.803322] [ 19.803398] Allocated by task 266: [ 19.803476] kasan_save_stack+0x3c/0x68 [ 19.803528] kasan_save_track+0x20/0x40 [ 19.803566] kasan_save_alloc_info+0x40/0x58 [ 19.803643] __kasan_kmalloc+0xd4/0xd8 [ 19.803844] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.803891] kasan_atomics+0xb8/0x2e0 [ 19.803928] kunit_try_run_case+0x170/0x3f0 [ 19.803967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.804025] kthread+0x328/0x630 [ 19.804211] ret_from_fork+0x10/0x20 [ 19.804307] [ 19.804427] The buggy address belongs to the object at fff00000c77bfc80 [ 19.804427] which belongs to the cache kmalloc-64 of size 64 [ 19.804553] The buggy address is located 0 bytes to the right of [ 19.804553] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.805033] [ 19.805093] The buggy address belongs to the physical page: [ 19.805153] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.805230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.805280] page_type: f5(slab) [ 19.805556] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.805736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.805854] page dumped because: kasan: bad access detected [ 19.805919] [ 19.806177] Memory state around the buggy address: [ 19.806314] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.806399] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.806446] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.806487] ^ [ 19.806552] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.806718] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.806884] ================================================================== [ 19.876026] ================================================================== [ 19.876076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 19.876242] Read of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.876293] [ 19.876324] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.876899] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.876931] Hardware name: linux,dummy-virt (DT) [ 19.876966] Call trace: [ 19.877000] show_stack+0x20/0x38 (C) [ 19.877052] dump_stack_lvl+0x8c/0xd0 [ 19.877098] print_report+0x118/0x608 [ 19.877146] kasan_report+0xdc/0x128 [ 19.877191] __asan_report_load8_noabort+0x20/0x30 [ 19.877244] kasan_atomics_helper+0x3db0/0x4858 [ 19.877999] kasan_atomics+0x198/0x2e0 [ 19.878075] kunit_try_run_case+0x170/0x3f0 [ 19.878188] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.878244] kthread+0x328/0x630 [ 19.878286] ret_from_fork+0x10/0x20 [ 19.878771] [ 19.878803] Allocated by task 266: [ 19.878863] kasan_save_stack+0x3c/0x68 [ 19.879153] kasan_save_track+0x20/0x40 [ 19.879194] kasan_save_alloc_info+0x40/0x58 [ 19.879236] __kasan_kmalloc+0xd4/0xd8 [ 19.879387] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.879437] kasan_atomics+0xb8/0x2e0 [ 19.879747] kunit_try_run_case+0x170/0x3f0 [ 19.879917] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.879961] kthread+0x328/0x630 [ 19.880510] ret_from_fork+0x10/0x20 [ 19.880791] [ 19.880822] The buggy address belongs to the object at fff00000c77bfc80 [ 19.880822] which belongs to the cache kmalloc-64 of size 64 [ 19.880902] The buggy address is located 0 bytes to the right of [ 19.880902] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.881001] [ 19.881262] The buggy address belongs to the physical page: [ 19.881322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.881379] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.881816] page_type: f5(slab) [ 19.881864] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.882024] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.882068] page dumped because: kasan: bad access detected [ 19.882354] [ 19.882389] Memory state around the buggy address: [ 19.882426] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.882515] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.882561] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.882603] ^ [ 19.882636] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.882681] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.883069] ================================================================== [ 19.775819] ================================================================== [ 19.775859] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 19.777073] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.777243] [ 19.777300] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.777456] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.777486] Hardware name: linux,dummy-virt (DT) [ 19.777519] Call trace: [ 19.777569] show_stack+0x20/0x38 (C) [ 19.777910] dump_stack_lvl+0x8c/0xd0 [ 19.778279] print_report+0x118/0x608 [ 19.778391] kasan_report+0xdc/0x128 [ 19.778526] __asan_report_store8_noabort+0x20/0x30 [ 19.778612] kasan_atomics_helper+0x3e5c/0x4858 [ 19.778800] kasan_atomics+0x198/0x2e0 [ 19.778858] kunit_try_run_case+0x170/0x3f0 [ 19.778906] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.779273] kthread+0x328/0x630 [ 19.779379] ret_from_fork+0x10/0x20 [ 19.779739] [ 19.779787] Allocated by task 266: [ 19.779966] kasan_save_stack+0x3c/0x68 [ 19.780094] kasan_save_track+0x20/0x40 [ 19.780181] kasan_save_alloc_info+0x40/0x58 [ 19.780227] __kasan_kmalloc+0xd4/0xd8 [ 19.780516] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.780800] kasan_atomics+0xb8/0x2e0 [ 19.781035] kunit_try_run_case+0x170/0x3f0 [ 19.781085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.781353] kthread+0x328/0x630 [ 19.781652] ret_from_fork+0x10/0x20 [ 19.781723] [ 19.781744] The buggy address belongs to the object at fff00000c77bfc80 [ 19.781744] which belongs to the cache kmalloc-64 of size 64 [ 19.782274] The buggy address is located 0 bytes to the right of [ 19.782274] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.782501] [ 19.782538] The buggy address belongs to the physical page: [ 19.782892] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.783181] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.783361] page_type: f5(slab) [ 19.783536] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.783605] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.783669] page dumped because: kasan: bad access detected [ 19.783708] [ 19.783729] Memory state around the buggy address: [ 19.783765] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.784288] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.784529] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.784576] ^ [ 19.784638] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.784877] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.785006] ================================================================== [ 19.812387] ================================================================== [ 19.812472] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 19.812551] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.812603] [ 19.812837] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.812933] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.812960] Hardware name: linux,dummy-virt (DT) [ 19.813122] Call trace: [ 19.813156] show_stack+0x20/0x38 (C) [ 19.813210] dump_stack_lvl+0x8c/0xd0 [ 19.813286] print_report+0x118/0x608 [ 19.813369] kasan_report+0xdc/0x128 [ 19.813441] kasan_check_range+0x100/0x1a8 [ 19.813491] __kasan_check_write+0x20/0x30 [ 19.813547] kasan_atomics_helper+0x1058/0x4858 [ 19.813854] kasan_atomics+0x198/0x2e0 [ 19.813919] kunit_try_run_case+0x170/0x3f0 [ 19.814027] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.814299] kthread+0x328/0x630 [ 19.814356] ret_from_fork+0x10/0x20 [ 19.814513] [ 19.814541] Allocated by task 266: [ 19.814578] kasan_save_stack+0x3c/0x68 [ 19.814656] kasan_save_track+0x20/0x40 [ 19.814694] kasan_save_alloc_info+0x40/0x58 [ 19.814749] __kasan_kmalloc+0xd4/0xd8 [ 19.814789] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.815072] kasan_atomics+0xb8/0x2e0 [ 19.815220] kunit_try_run_case+0x170/0x3f0 [ 19.815325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.815521] kthread+0x328/0x630 [ 19.815685] ret_from_fork+0x10/0x20 [ 19.815793] [ 19.815938] The buggy address belongs to the object at fff00000c77bfc80 [ 19.815938] which belongs to the cache kmalloc-64 of size 64 [ 19.816102] The buggy address is located 0 bytes to the right of [ 19.816102] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.816239] [ 19.816315] The buggy address belongs to the physical page: [ 19.816446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.816513] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.816562] page_type: f5(slab) [ 19.816937] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.817119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.817194] page dumped because: kasan: bad access detected [ 19.817261] [ 19.817452] Memory state around the buggy address: [ 19.817490] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.817691] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.818031] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.818138] ^ [ 19.818292] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.818508] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.818706] ================================================================== [ 19.824389] ================================================================== [ 19.824431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 19.824477] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.824527] [ 19.824558] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.824639] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.824666] Hardware name: linux,dummy-virt (DT) [ 19.824699] Call trace: [ 19.824721] show_stack+0x20/0x38 (C) [ 19.824769] dump_stack_lvl+0x8c/0xd0 [ 19.824814] print_report+0x118/0x608 [ 19.824861] kasan_report+0xdc/0x128 [ 19.824906] kasan_check_range+0x100/0x1a8 [ 19.825079] __kasan_check_write+0x20/0x30 [ 19.825136] kasan_atomics_helper+0x1128/0x4858 [ 19.825186] kasan_atomics+0x198/0x2e0 [ 19.825230] kunit_try_run_case+0x170/0x3f0 [ 19.825283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.825336] kthread+0x328/0x630 [ 19.825377] ret_from_fork+0x10/0x20 [ 19.825424] [ 19.825445] Allocated by task 266: [ 19.825474] kasan_save_stack+0x3c/0x68 [ 19.825515] kasan_save_track+0x20/0x40 [ 19.825553] kasan_save_alloc_info+0x40/0x58 [ 19.825606] __kasan_kmalloc+0xd4/0xd8 [ 19.825652] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.825691] kasan_atomics+0xb8/0x2e0 [ 19.825728] kunit_try_run_case+0x170/0x3f0 [ 19.825766] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.825824] kthread+0x328/0x630 [ 19.825857] ret_from_fork+0x10/0x20 [ 19.825926] [ 19.825946] The buggy address belongs to the object at fff00000c77bfc80 [ 19.825946] which belongs to the cache kmalloc-64 of size 64 [ 19.826018] The buggy address is located 0 bytes to the right of [ 19.826018] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.826085] [ 19.826106] The buggy address belongs to the physical page: [ 19.826138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.826405] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.826467] page_type: f5(slab) [ 19.826568] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.826735] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.826791] page dumped because: kasan: bad access detected [ 19.826825] [ 19.826845] Memory state around the buggy address: [ 19.826879] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.826923] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.826969] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.827020] ^ [ 19.827055] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.827097] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.827138] ================================================================== [ 19.843452] ================================================================== [ 19.843494] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 19.843539] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.843589] [ 19.843620] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.843699] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.843727] Hardware name: linux,dummy-virt (DT) [ 19.843758] Call trace: [ 19.843783] show_stack+0x20/0x38 (C) [ 19.843829] dump_stack_lvl+0x8c/0xd0 [ 19.843876] print_report+0x118/0x608 [ 19.843921] kasan_report+0xdc/0x128 [ 19.843969] kasan_check_range+0x100/0x1a8 [ 19.844103] __kasan_check_write+0x20/0x30 [ 19.844152] kasan_atomics_helper+0x1384/0x4858 [ 19.844201] kasan_atomics+0x198/0x2e0 [ 19.844246] kunit_try_run_case+0x170/0x3f0 [ 19.844294] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.844347] kthread+0x328/0x630 [ 19.844388] ret_from_fork+0x10/0x20 [ 19.844436] [ 19.844455] Allocated by task 266: [ 19.844509] kasan_save_stack+0x3c/0x68 [ 19.844553] kasan_save_track+0x20/0x40 [ 19.844591] kasan_save_alloc_info+0x40/0x58 [ 19.844633] __kasan_kmalloc+0xd4/0xd8 [ 19.844672] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.844724] kasan_atomics+0xb8/0x2e0 [ 19.844764] kunit_try_run_case+0x170/0x3f0 [ 19.844851] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.844934] kthread+0x328/0x630 [ 19.844969] ret_from_fork+0x10/0x20 [ 19.845017] [ 19.845306] The buggy address belongs to the object at fff00000c77bfc80 [ 19.845306] which belongs to the cache kmalloc-64 of size 64 [ 19.845368] The buggy address is located 0 bytes to the right of [ 19.845368] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.845440] [ 19.845507] The buggy address belongs to the physical page: [ 19.845675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.845747] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.845830] page_type: f5(slab) [ 19.845900] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.845953] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.846005] page dumped because: kasan: bad access detected [ 19.846085] [ 19.846174] Memory state around the buggy address: [ 19.846274] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.846344] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.846389] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.846432] ^ [ 19.846464] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.846510] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.846597] ================================================================== [ 19.654569] ================================================================== [ 19.654620] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 19.654669] Write of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.654721] [ 19.654751] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.654833] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.654860] Hardware name: linux,dummy-virt (DT) [ 19.654893] Call trace: [ 19.654915] show_stack+0x20/0x38 (C) [ 19.654961] dump_stack_lvl+0x8c/0xd0 [ 19.655025] print_report+0x118/0x608 [ 19.655071] kasan_report+0xdc/0x128 [ 19.655117] kasan_check_range+0x100/0x1a8 [ 19.655167] __kasan_check_write+0x20/0x30 [ 19.655212] kasan_atomics_helper+0xad4/0x4858 [ 19.655261] kasan_atomics+0x198/0x2e0 [ 19.655306] kunit_try_run_case+0x170/0x3f0 [ 19.655354] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.655408] kthread+0x328/0x630 [ 19.655448] ret_from_fork+0x10/0x20 [ 19.655496] [ 19.655536] Allocated by task 266: [ 19.655573] kasan_save_stack+0x3c/0x68 [ 19.655617] kasan_save_track+0x20/0x40 [ 19.655656] kasan_save_alloc_info+0x40/0x58 [ 19.655699] __kasan_kmalloc+0xd4/0xd8 [ 19.655737] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.655778] kasan_atomics+0xb8/0x2e0 [ 19.655816] kunit_try_run_case+0x170/0x3f0 [ 19.655864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.655909] kthread+0x328/0x630 [ 19.655944] ret_from_fork+0x10/0x20 [ 19.656221] [ 19.656516] The buggy address belongs to the object at fff00000c77bfc80 [ 19.656516] which belongs to the cache kmalloc-64 of size 64 [ 19.656819] The buggy address is located 0 bytes to the right of [ 19.656819] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.657712] [ 19.657758] The buggy address belongs to the physical page: [ 19.657818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.657896] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.657967] page_type: f5(slab) [ 19.658407] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.658498] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.658641] page dumped because: kasan: bad access detected [ 19.659072] [ 19.659098] Memory state around the buggy address: [ 19.659356] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.659729] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.660172] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.660237] ^ [ 19.660653] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.660720] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.660851] ================================================================== [ 19.957033] ================================================================== [ 19.957091] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 19.957191] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.957428] [ 19.957473] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.957568] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.957655] Hardware name: linux,dummy-virt (DT) [ 19.957709] Call trace: [ 19.957759] show_stack+0x20/0x38 (C) [ 19.957830] dump_stack_lvl+0x8c/0xd0 [ 19.958129] print_report+0x118/0x608 [ 19.958234] kasan_report+0xdc/0x128 [ 19.958300] kasan_check_range+0x100/0x1a8 [ 19.958376] __kasan_check_write+0x20/0x30 [ 19.958459] kasan_atomics_helper+0x17ec/0x4858 [ 19.958513] kasan_atomics+0x198/0x2e0 [ 19.958579] kunit_try_run_case+0x170/0x3f0 [ 19.958643] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.958697] kthread+0x328/0x630 [ 19.959048] ret_from_fork+0x10/0x20 [ 19.959166] [ 19.959209] Allocated by task 266: [ 19.959536] kasan_save_stack+0x3c/0x68 [ 19.959665] kasan_save_track+0x20/0x40 [ 19.959753] kasan_save_alloc_info+0x40/0x58 [ 19.959834] __kasan_kmalloc+0xd4/0xd8 [ 19.959923] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.960031] kasan_atomics+0xb8/0x2e0 [ 19.960147] kunit_try_run_case+0x170/0x3f0 [ 19.960234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.960307] kthread+0x328/0x630 [ 19.960343] ret_from_fork+0x10/0x20 [ 19.960380] [ 19.960411] The buggy address belongs to the object at fff00000c77bfc80 [ 19.960411] which belongs to the cache kmalloc-64 of size 64 [ 19.960472] The buggy address is located 0 bytes to the right of [ 19.960472] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.960783] [ 19.960844] The buggy address belongs to the physical page: [ 19.960899] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.961035] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.961139] page_type: f5(slab) [ 19.961413] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.961471] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.961757] page dumped because: kasan: bad access detected [ 19.961821] [ 19.961851] Memory state around the buggy address: [ 19.961899] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.961947] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.962001] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.962043] ^ [ 19.962077] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.962124] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.962163] ================================================================== [ 19.895295] ================================================================== [ 19.895349] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 19.896083] Read of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.896255] [ 19.896526] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.896613] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.896642] Hardware name: linux,dummy-virt (DT) [ 19.896675] Call trace: [ 19.896942] show_stack+0x20/0x38 (C) [ 19.897369] dump_stack_lvl+0x8c/0xd0 [ 19.897690] print_report+0x118/0x608 [ 19.897861] kasan_report+0xdc/0x128 [ 19.897911] __asan_report_load8_noabort+0x20/0x30 [ 19.897965] kasan_atomics_helper+0x3df4/0x4858 [ 19.898024] kasan_atomics+0x198/0x2e0 [ 19.898071] kunit_try_run_case+0x170/0x3f0 [ 19.898119] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.899145] kthread+0x328/0x630 [ 19.899265] ret_from_fork+0x10/0x20 [ 19.899413] [ 19.899479] Allocated by task 266: [ 19.899572] kasan_save_stack+0x3c/0x68 [ 19.899699] kasan_save_track+0x20/0x40 [ 19.899903] kasan_save_alloc_info+0x40/0x58 [ 19.900116] __kasan_kmalloc+0xd4/0xd8 [ 19.900334] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.900393] kasan_atomics+0xb8/0x2e0 [ 19.900715] kunit_try_run_case+0x170/0x3f0 [ 19.900937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.901148] kthread+0x328/0x630 [ 19.901413] ret_from_fork+0x10/0x20 [ 19.901535] [ 19.901759] The buggy address belongs to the object at fff00000c77bfc80 [ 19.901759] which belongs to the cache kmalloc-64 of size 64 [ 19.902208] The buggy address is located 0 bytes to the right of [ 19.902208] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.902284] [ 19.902306] The buggy address belongs to the physical page: [ 19.902343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.902857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.903239] page_type: f5(slab) [ 19.903292] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.903405] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.903849] page dumped because: kasan: bad access detected [ 19.904204] [ 19.904293] Memory state around the buggy address: [ 19.904333] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.904380] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.904427] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.904469] ^ [ 19.904505] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.905110] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.905755] ================================================================== [ 19.635488] ================================================================== [ 19.635548] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 19.635646] Write of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.635717] [ 19.635764] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.635849] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.635885] Hardware name: linux,dummy-virt (DT) [ 19.635917] Call trace: [ 19.636182] show_stack+0x20/0x38 (C) [ 19.636246] dump_stack_lvl+0x8c/0xd0 [ 19.636375] print_report+0x118/0x608 [ 19.636444] kasan_report+0xdc/0x128 [ 19.636492] kasan_check_range+0x100/0x1a8 [ 19.636541] __kasan_check_write+0x20/0x30 [ 19.636587] kasan_atomics_helper+0x99c/0x4858 [ 19.636637] kasan_atomics+0x198/0x2e0 [ 19.636691] kunit_try_run_case+0x170/0x3f0 [ 19.636739] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.636793] kthread+0x328/0x630 [ 19.636835] ret_from_fork+0x10/0x20 [ 19.636884] [ 19.636913] Allocated by task 266: [ 19.636945] kasan_save_stack+0x3c/0x68 [ 19.636996] kasan_save_track+0x20/0x40 [ 19.637034] kasan_save_alloc_info+0x40/0x58 [ 19.637114] __kasan_kmalloc+0xd4/0xd8 [ 19.637153] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.637512] kasan_atomics+0xb8/0x2e0 [ 19.637589] kunit_try_run_case+0x170/0x3f0 [ 19.637653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.637700] kthread+0x328/0x630 [ 19.637733] ret_from_fork+0x10/0x20 [ 19.637787] [ 19.637827] The buggy address belongs to the object at fff00000c77bfc80 [ 19.637827] which belongs to the cache kmalloc-64 of size 64 [ 19.637889] The buggy address is located 0 bytes to the right of [ 19.637889] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.638107] [ 19.638133] The buggy address belongs to the physical page: [ 19.638189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.638262] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.638342] page_type: f5(slab) [ 19.638385] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.638437] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.638481] page dumped because: kasan: bad access detected [ 19.638519] [ 19.638557] Memory state around the buggy address: [ 19.638591] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.638655] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.638729] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.638770] ^ [ 19.638805] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.638848] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.638900] ================================================================== [ 19.712860] ================================================================== [ 19.712914] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 19.712968] Write of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.713039] [ 19.713071] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.713154] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.713181] Hardware name: linux,dummy-virt (DT) [ 19.713213] Call trace: [ 19.713237] show_stack+0x20/0x38 (C) [ 19.713284] dump_stack_lvl+0x8c/0xd0 [ 19.713332] print_report+0x118/0x608 [ 19.713378] kasan_report+0xdc/0x128 [ 19.713424] kasan_check_range+0x100/0x1a8 [ 19.713472] __kasan_check_write+0x20/0x30 [ 19.713519] kasan_atomics_helper+0xca0/0x4858 [ 19.713569] kasan_atomics+0x198/0x2e0 [ 19.713613] kunit_try_run_case+0x170/0x3f0 [ 19.713666] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.714418] kthread+0x328/0x630 [ 19.714489] ret_from_fork+0x10/0x20 [ 19.714542] [ 19.714562] Allocated by task 266: [ 19.715287] kasan_save_stack+0x3c/0x68 [ 19.715393] kasan_save_track+0x20/0x40 [ 19.715685] kasan_save_alloc_info+0x40/0x58 [ 19.715794] __kasan_kmalloc+0xd4/0xd8 [ 19.715893] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.716254] kasan_atomics+0xb8/0x2e0 [ 19.716318] kunit_try_run_case+0x170/0x3f0 [ 19.716620] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.716919] kthread+0x328/0x630 [ 19.717045] ret_from_fork+0x10/0x20 [ 19.717091] [ 19.717121] The buggy address belongs to the object at fff00000c77bfc80 [ 19.717121] which belongs to the cache kmalloc-64 of size 64 [ 19.717519] The buggy address is located 0 bytes to the right of [ 19.717519] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.717876] [ 19.717920] The buggy address belongs to the physical page: [ 19.717964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.718149] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.718389] page_type: f5(slab) [ 19.718775] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.719022] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.719420] page dumped because: kasan: bad access detected [ 19.719602] [ 19.719649] Memory state around the buggy address: [ 19.719790] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.719840] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.720323] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.720373] ^ [ 19.720408] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.721016] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.721206] ================================================================== [ 19.771468] ================================================================== [ 19.771524] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 19.771577] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.772075] [ 19.772292] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.772419] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.772541] Hardware name: linux,dummy-virt (DT) [ 19.772579] Call trace: [ 19.772603] show_stack+0x20/0x38 (C) [ 19.772683] dump_stack_lvl+0x8c/0xd0 [ 19.772916] print_report+0x118/0x608 [ 19.773009] kasan_report+0xdc/0x128 [ 19.773284] kasan_check_range+0x100/0x1a8 [ 19.773367] __kasan_check_write+0x20/0x30 [ 19.773415] kasan_atomics_helper+0xe44/0x4858 [ 19.773465] kasan_atomics+0x198/0x2e0 [ 19.773509] kunit_try_run_case+0x170/0x3f0 [ 19.773696] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.773763] kthread+0x328/0x630 [ 19.773805] ret_from_fork+0x10/0x20 [ 19.773870] [ 19.773900] Allocated by task 266: [ 19.773932] kasan_save_stack+0x3c/0x68 [ 19.773993] kasan_save_track+0x20/0x40 [ 19.774035] kasan_save_alloc_info+0x40/0x58 [ 19.774083] __kasan_kmalloc+0xd4/0xd8 [ 19.774123] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.774167] kasan_atomics+0xb8/0x2e0 [ 19.774211] kunit_try_run_case+0x170/0x3f0 [ 19.774252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.774297] kthread+0x328/0x630 [ 19.774332] ret_from_fork+0x10/0x20 [ 19.774370] [ 19.774391] The buggy address belongs to the object at fff00000c77bfc80 [ 19.774391] which belongs to the cache kmalloc-64 of size 64 [ 19.774450] The buggy address is located 0 bytes to the right of [ 19.774450] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.774517] [ 19.774538] The buggy address belongs to the physical page: [ 19.774571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.775012] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.775251] page_type: f5(slab) [ 19.775297] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.775349] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.775392] page dumped because: kasan: bad access detected [ 19.775426] [ 19.775445] Memory state around the buggy address: [ 19.775479] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.775525] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.775568] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.775608] ^ [ 19.775643] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.775690] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.775728] ================================================================== [ 19.705758] ================================================================== [ 19.705885] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 19.705993] Read of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.706295] [ 19.706644] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.706748] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.706932] Hardware name: linux,dummy-virt (DT) [ 19.707010] Call trace: [ 19.707149] show_stack+0x20/0x38 (C) [ 19.707243] dump_stack_lvl+0x8c/0xd0 [ 19.707299] print_report+0x118/0x608 [ 19.707347] kasan_report+0xdc/0x128 [ 19.707393] __asan_report_load4_noabort+0x20/0x30 [ 19.707918] kasan_atomics_helper+0x3de4/0x4858 [ 19.708071] kasan_atomics+0x198/0x2e0 [ 19.708207] kunit_try_run_case+0x170/0x3f0 [ 19.708262] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.708337] kthread+0x328/0x630 [ 19.708418] ret_from_fork+0x10/0x20 [ 19.708482] [ 19.708519] Allocated by task 266: [ 19.708548] kasan_save_stack+0x3c/0x68 [ 19.708607] kasan_save_track+0x20/0x40 [ 19.708655] kasan_save_alloc_info+0x40/0x58 [ 19.708708] __kasan_kmalloc+0xd4/0xd8 [ 19.708746] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.708787] kasan_atomics+0xb8/0x2e0 [ 19.708834] kunit_try_run_case+0x170/0x3f0 [ 19.708874] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.708927] kthread+0x328/0x630 [ 19.708969] ret_from_fork+0x10/0x20 [ 19.709035] [ 19.709090] The buggy address belongs to the object at fff00000c77bfc80 [ 19.709090] which belongs to the cache kmalloc-64 of size 64 [ 19.709642] The buggy address is located 0 bytes to the right of [ 19.709642] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.709904] [ 19.710271] The buggy address belongs to the physical page: [ 19.710504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.711137] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.711316] page_type: f5(slab) [ 19.711434] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.711498] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.711698] page dumped because: kasan: bad access detected [ 19.711804] [ 19.711826] Memory state around the buggy address: [ 19.711972] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.712056] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.712126] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.712167] ^ [ 19.712211] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.712277] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.712319] ================================================================== [ 19.835586] ================================================================== [ 19.835634] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 19.835805] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.836016] [ 19.836127] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.836265] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.836400] Hardware name: linux,dummy-virt (DT) [ 19.836431] Call trace: [ 19.836455] show_stack+0x20/0x38 (C) [ 19.836527] dump_stack_lvl+0x8c/0xd0 [ 19.836576] print_report+0x118/0x608 [ 19.836621] kasan_report+0xdc/0x128 [ 19.836667] kasan_check_range+0x100/0x1a8 [ 19.836714] __kasan_check_write+0x20/0x30 [ 19.836760] kasan_atomics_helper+0x126c/0x4858 [ 19.836809] kasan_atomics+0x198/0x2e0 [ 19.836854] kunit_try_run_case+0x170/0x3f0 [ 19.836902] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.836970] kthread+0x328/0x630 [ 19.837134] ret_from_fork+0x10/0x20 [ 19.837211] [ 19.837231] Allocated by task 266: [ 19.837259] kasan_save_stack+0x3c/0x68 [ 19.837302] kasan_save_track+0x20/0x40 [ 19.837340] kasan_save_alloc_info+0x40/0x58 [ 19.837381] __kasan_kmalloc+0xd4/0xd8 [ 19.837429] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.837469] kasan_atomics+0xb8/0x2e0 [ 19.837506] kunit_try_run_case+0x170/0x3f0 [ 19.837546] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.837589] kthread+0x328/0x630 [ 19.837632] ret_from_fork+0x10/0x20 [ 19.837670] [ 19.837690] The buggy address belongs to the object at fff00000c77bfc80 [ 19.837690] which belongs to the cache kmalloc-64 of size 64 [ 19.837904] The buggy address is located 0 bytes to the right of [ 19.837904] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.837972] [ 19.838008] The buggy address belongs to the physical page: [ 19.838058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.838111] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.838158] page_type: f5(slab) [ 19.838196] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.838249] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.838291] page dumped because: kasan: bad access detected [ 19.838324] [ 19.838343] Memory state around the buggy address: [ 19.838377] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.838422] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.838544] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.838772] ^ [ 19.838813] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.838859] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.838898] ================================================================== [ 19.795456] ================================================================== [ 19.795670] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 19.795733] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.795786] [ 19.795820] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.796106] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.796170] Hardware name: linux,dummy-virt (DT) [ 19.796205] Call trace: [ 19.796231] show_stack+0x20/0x38 (C) [ 19.796283] dump_stack_lvl+0x8c/0xd0 [ 19.796350] print_report+0x118/0x608 [ 19.796415] kasan_report+0xdc/0x128 [ 19.796486] kasan_check_range+0x100/0x1a8 [ 19.796535] __kasan_check_write+0x20/0x30 [ 19.796581] kasan_atomics_helper+0xf20/0x4858 [ 19.796867] kasan_atomics+0x198/0x2e0 [ 19.796996] kunit_try_run_case+0x170/0x3f0 [ 19.797051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.797370] kthread+0x328/0x630 [ 19.797498] ret_from_fork+0x10/0x20 [ 19.797589] [ 19.797636] Allocated by task 266: [ 19.797694] kasan_save_stack+0x3c/0x68 [ 19.797757] kasan_save_track+0x20/0x40 [ 19.797827] kasan_save_alloc_info+0x40/0x58 [ 19.797885] __kasan_kmalloc+0xd4/0xd8 [ 19.797928] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.798004] kasan_atomics+0xb8/0x2e0 [ 19.798056] kunit_try_run_case+0x170/0x3f0 [ 19.798114] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.798161] kthread+0x328/0x630 [ 19.798197] ret_from_fork+0x10/0x20 [ 19.798513] [ 19.798547] The buggy address belongs to the object at fff00000c77bfc80 [ 19.798547] which belongs to the cache kmalloc-64 of size 64 [ 19.798688] The buggy address is located 0 bytes to the right of [ 19.798688] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.798776] [ 19.798874] The buggy address belongs to the physical page: [ 19.799052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.799249] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.799558] page_type: f5(slab) [ 19.799607] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.799774] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.799867] page dumped because: kasan: bad access detected [ 19.799972] [ 19.800043] Memory state around the buggy address: [ 19.800107] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.800292] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.800526] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.800643] ^ [ 19.800707] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.800750] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.800792] ================================================================== [ 19.832134] ================================================================== [ 19.832184] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 19.832230] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.832282] [ 19.832311] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.832392] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.832420] Hardware name: linux,dummy-virt (DT) [ 19.832450] Call trace: [ 19.832488] show_stack+0x20/0x38 (C) [ 19.832536] dump_stack_lvl+0x8c/0xd0 [ 19.832583] print_report+0x118/0x608 [ 19.832629] kasan_report+0xdc/0x128 [ 19.832714] kasan_check_range+0x100/0x1a8 [ 19.832804] __kasan_check_write+0x20/0x30 [ 19.833010] kasan_atomics_helper+0x11f8/0x4858 [ 19.833063] kasan_atomics+0x198/0x2e0 [ 19.833113] kunit_try_run_case+0x170/0x3f0 [ 19.833168] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.833227] kthread+0x328/0x630 [ 19.833277] ret_from_fork+0x10/0x20 [ 19.833481] [ 19.833580] Allocated by task 266: [ 19.833712] kasan_save_stack+0x3c/0x68 [ 19.833754] kasan_save_track+0x20/0x40 [ 19.833792] kasan_save_alloc_info+0x40/0x58 [ 19.833834] __kasan_kmalloc+0xd4/0xd8 [ 19.833872] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.833918] kasan_atomics+0xb8/0x2e0 [ 19.834103] kunit_try_run_case+0x170/0x3f0 [ 19.834305] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.834355] kthread+0x328/0x630 [ 19.834528] ret_from_fork+0x10/0x20 [ 19.834582] [ 19.834602] The buggy address belongs to the object at fff00000c77bfc80 [ 19.834602] which belongs to the cache kmalloc-64 of size 64 [ 19.834692] The buggy address is located 0 bytes to the right of [ 19.834692] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.834758] [ 19.834778] The buggy address belongs to the physical page: [ 19.834811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.834862] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.834910] page_type: f5(slab) [ 19.834948] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.835010] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.835052] page dumped because: kasan: bad access detected [ 19.835086] [ 19.835105] Memory state around the buggy address: [ 19.835139] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.835184] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.835229] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.835271] ^ [ 19.835303] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.835347] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.835386] ================================================================== [ 19.787452] ================================================================== [ 19.787509] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 19.787559] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.787610] [ 19.787642] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.787726] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.787753] Hardware name: linux,dummy-virt (DT) [ 19.787784] Call trace: [ 19.787807] show_stack+0x20/0x38 (C) [ 19.787855] dump_stack_lvl+0x8c/0xd0 [ 19.787902] print_report+0x118/0x608 [ 19.787949] kasan_report+0xdc/0x128 [ 19.788010] kasan_check_range+0x100/0x1a8 [ 19.788060] __kasan_check_write+0x20/0x30 [ 19.788105] kasan_atomics_helper+0xeb8/0x4858 [ 19.788154] kasan_atomics+0x198/0x2e0 [ 19.788198] kunit_try_run_case+0x170/0x3f0 [ 19.788247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.788300] kthread+0x328/0x630 [ 19.788341] ret_from_fork+0x10/0x20 [ 19.788387] [ 19.788408] Allocated by task 266: [ 19.788436] kasan_save_stack+0x3c/0x68 [ 19.788477] kasan_save_track+0x20/0x40 [ 19.788516] kasan_save_alloc_info+0x40/0x58 [ 19.788556] __kasan_kmalloc+0xd4/0xd8 [ 19.788596] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.788636] kasan_atomics+0xb8/0x2e0 [ 19.788672] kunit_try_run_case+0x170/0x3f0 [ 19.788712] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.788758] kthread+0x328/0x630 [ 19.788792] ret_from_fork+0x10/0x20 [ 19.788830] [ 19.788850] The buggy address belongs to the object at fff00000c77bfc80 [ 19.788850] which belongs to the cache kmalloc-64 of size 64 [ 19.788910] The buggy address is located 0 bytes to the right of [ 19.788910] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.791232] [ 19.791271] The buggy address belongs to the physical page: [ 19.791307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.791366] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.791416] page_type: f5(slab) [ 19.791456] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.791509] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.791555] page dumped because: kasan: bad access detected [ 19.791590] [ 19.791612] Memory state around the buggy address: [ 19.791647] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.791693] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.791738] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.791777] ^ [ 19.791811] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.791857] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.791898] ================================================================== [ 19.693006] ================================================================== [ 19.693582] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 19.693657] Write of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.693710] [ 19.694085] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.694183] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.694254] Hardware name: linux,dummy-virt (DT) [ 19.694290] Call trace: [ 19.694314] show_stack+0x20/0x38 (C) [ 19.694393] dump_stack_lvl+0x8c/0xd0 [ 19.694990] print_report+0x118/0x608 [ 19.695069] kasan_report+0xdc/0x128 [ 19.695134] kasan_check_range+0x100/0x1a8 [ 19.695232] __kasan_check_write+0x20/0x30 [ 19.695427] kasan_atomics_helper+0xc08/0x4858 [ 19.695788] kasan_atomics+0x198/0x2e0 [ 19.695870] kunit_try_run_case+0x170/0x3f0 [ 19.696042] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.696126] kthread+0x328/0x630 [ 19.696483] ret_from_fork+0x10/0x20 [ 19.696668] [ 19.696728] Allocated by task 266: [ 19.696838] kasan_save_stack+0x3c/0x68 [ 19.696913] kasan_save_track+0x20/0x40 [ 19.696953] kasan_save_alloc_info+0x40/0x58 [ 19.697307] __kasan_kmalloc+0xd4/0xd8 [ 19.697664] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.697945] kasan_atomics+0xb8/0x2e0 [ 19.698020] kunit_try_run_case+0x170/0x3f0 [ 19.698270] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.698477] kthread+0x328/0x630 [ 19.698604] ret_from_fork+0x10/0x20 [ 19.698894] [ 19.699036] The buggy address belongs to the object at fff00000c77bfc80 [ 19.699036] which belongs to the cache kmalloc-64 of size 64 [ 19.699246] The buggy address is located 0 bytes to the right of [ 19.699246] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.700169] [ 19.700242] The buggy address belongs to the physical page: [ 19.700759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.700993] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.701340] page_type: f5(slab) [ 19.701464] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.701725] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.701905] page dumped because: kasan: bad access detected [ 19.702158] [ 19.702391] Memory state around the buggy address: [ 19.702450] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.702498] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.703122] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.703180] ^ [ 19.703339] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.703399] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.703531] ================================================================== [ 19.741514] ================================================================== [ 19.741567] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 19.741780] Read of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.742241] [ 19.742298] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.742544] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.742581] Hardware name: linux,dummy-virt (DT) [ 19.742656] Call trace: [ 19.742922] show_stack+0x20/0x38 (C) [ 19.743175] dump_stack_lvl+0x8c/0xd0 [ 19.743299] print_report+0x118/0x608 [ 19.743396] kasan_report+0xdc/0x128 [ 19.743582] __asan_report_load4_noabort+0x20/0x30 [ 19.743861] kasan_atomics_helper+0x3e04/0x4858 [ 19.743987] kasan_atomics+0x198/0x2e0 [ 19.744093] kunit_try_run_case+0x170/0x3f0 [ 19.744434] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.744792] kthread+0x328/0x630 [ 19.745012] ret_from_fork+0x10/0x20 [ 19.745116] [ 19.745211] Allocated by task 266: [ 19.745281] kasan_save_stack+0x3c/0x68 [ 19.745405] kasan_save_track+0x20/0x40 [ 19.745473] kasan_save_alloc_info+0x40/0x58 [ 19.745517] __kasan_kmalloc+0xd4/0xd8 [ 19.745678] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.745914] kasan_atomics+0xb8/0x2e0 [ 19.746205] kunit_try_run_case+0x170/0x3f0 [ 19.746405] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.746729] kthread+0x328/0x630 [ 19.747016] ret_from_fork+0x10/0x20 [ 19.747154] [ 19.747274] The buggy address belongs to the object at fff00000c77bfc80 [ 19.747274] which belongs to the cache kmalloc-64 of size 64 [ 19.747515] The buggy address is located 0 bytes to the right of [ 19.747515] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.747990] [ 19.748127] The buggy address belongs to the physical page: [ 19.748263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.748345] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.748733] page_type: f5(slab) [ 19.749112] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.749191] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.749239] page dumped because: kasan: bad access detected [ 19.749509] [ 19.749636] Memory state around the buggy address: [ 19.749698] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.749931] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.750144] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.750389] ^ [ 19.750555] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.750607] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.750860] ================================================================== [ 19.807677] ================================================================== [ 19.807731] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 19.807783] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.807860] [ 19.807893] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.807990] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.808022] Hardware name: linux,dummy-virt (DT) [ 19.808058] Call trace: [ 19.808081] show_stack+0x20/0x38 (C) [ 19.808129] dump_stack_lvl+0x8c/0xd0 [ 19.808176] print_report+0x118/0x608 [ 19.808222] kasan_report+0xdc/0x128 [ 19.808268] kasan_check_range+0x100/0x1a8 [ 19.808315] __kasan_check_write+0x20/0x30 [ 19.808362] kasan_atomics_helper+0xff0/0x4858 [ 19.808409] kasan_atomics+0x198/0x2e0 [ 19.808454] kunit_try_run_case+0x170/0x3f0 [ 19.808500] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.808576] kthread+0x328/0x630 [ 19.808620] ret_from_fork+0x10/0x20 [ 19.808668] [ 19.808687] Allocated by task 266: [ 19.808717] kasan_save_stack+0x3c/0x68 [ 19.808758] kasan_save_track+0x20/0x40 [ 19.808923] kasan_save_alloc_info+0x40/0x58 [ 19.808997] __kasan_kmalloc+0xd4/0xd8 [ 19.809476] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.809541] kasan_atomics+0xb8/0x2e0 [ 19.809579] kunit_try_run_case+0x170/0x3f0 [ 19.809626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.809829] kthread+0x328/0x630 [ 19.809903] ret_from_fork+0x10/0x20 [ 19.809968] [ 19.810034] The buggy address belongs to the object at fff00000c77bfc80 [ 19.810034] which belongs to the cache kmalloc-64 of size 64 [ 19.810107] The buggy address is located 0 bytes to the right of [ 19.810107] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.810175] [ 19.810197] The buggy address belongs to the physical page: [ 19.810231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.810422] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.810478] page_type: f5(slab) [ 19.810542] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.810597] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.810685] page dumped because: kasan: bad access detected [ 19.810722] [ 19.810773] Memory state around the buggy address: [ 19.810811] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.811021] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.811174] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.811253] ^ [ 19.811321] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.811365] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.811542] ================================================================== [ 19.933658] ================================================================== [ 19.933713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 19.934322] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.934392] [ 19.934427] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.935048] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.935145] Hardware name: linux,dummy-virt (DT) [ 19.935177] Call trace: [ 19.935203] show_stack+0x20/0x38 (C) [ 19.935522] dump_stack_lvl+0x8c/0xd0 [ 19.935833] print_report+0x118/0x608 [ 19.936192] kasan_report+0xdc/0x128 [ 19.936598] kasan_check_range+0x100/0x1a8 [ 19.936791] __kasan_check_write+0x20/0x30 [ 19.936839] kasan_atomics_helper+0x175c/0x4858 [ 19.936888] kasan_atomics+0x198/0x2e0 [ 19.937819] kunit_try_run_case+0x170/0x3f0 [ 19.938036] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.938092] kthread+0x328/0x630 [ 19.938133] ret_from_fork+0x10/0x20 [ 19.938185] [ 19.938628] Allocated by task 266: [ 19.939325] kasan_save_stack+0x3c/0x68 [ 19.939779] kasan_save_track+0x20/0x40 [ 19.939930] kasan_save_alloc_info+0x40/0x58 [ 19.940369] __kasan_kmalloc+0xd4/0xd8 [ 19.940606] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.941291] kasan_atomics+0xb8/0x2e0 [ 19.941607] kunit_try_run_case+0x170/0x3f0 [ 19.942220] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.942797] kthread+0x328/0x630 [ 19.943228] ret_from_fork+0x10/0x20 [ 19.943270] [ 19.943292] The buggy address belongs to the object at fff00000c77bfc80 [ 19.943292] which belongs to the cache kmalloc-64 of size 64 [ 19.943357] The buggy address is located 0 bytes to the right of [ 19.943357] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.943424] [ 19.943445] The buggy address belongs to the physical page: [ 19.943482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.945058] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.945481] page_type: f5(slab) [ 19.945845] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.945952] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.946547] page dumped because: kasan: bad access detected [ 19.946931] [ 19.947144] Memory state around the buggy address: [ 19.947281] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.947776] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.948074] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.948399] ^ [ 19.948609] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.948657] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.948698] ================================================================== [ 19.662269] ================================================================== [ 19.662432] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 19.662528] Read of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.662601] [ 19.662811] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.663139] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.663352] Hardware name: linux,dummy-virt (DT) [ 19.663426] Call trace: [ 19.663593] show_stack+0x20/0x38 (C) [ 19.663652] dump_stack_lvl+0x8c/0xd0 [ 19.663953] print_report+0x118/0x608 [ 19.664281] kasan_report+0xdc/0x128 [ 19.664484] __asan_report_load4_noabort+0x20/0x30 [ 19.664580] kasan_atomics_helper+0x3dcc/0x4858 [ 19.664787] kasan_atomics+0x198/0x2e0 [ 19.665040] kunit_try_run_case+0x170/0x3f0 [ 19.665132] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.665400] kthread+0x328/0x630 [ 19.665580] ret_from_fork+0x10/0x20 [ 19.665708] [ 19.665812] Allocated by task 266: [ 19.665846] kasan_save_stack+0x3c/0x68 [ 19.666237] kasan_save_track+0x20/0x40 [ 19.666654] kasan_save_alloc_info+0x40/0x58 [ 19.666887] __kasan_kmalloc+0xd4/0xd8 [ 19.666936] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.666991] kasan_atomics+0xb8/0x2e0 [ 19.667291] kunit_try_run_case+0x170/0x3f0 [ 19.667409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.667769] kthread+0x328/0x630 [ 19.667815] ret_from_fork+0x10/0x20 [ 19.668123] [ 19.668364] The buggy address belongs to the object at fff00000c77bfc80 [ 19.668364] which belongs to the cache kmalloc-64 of size 64 [ 19.668554] The buggy address is located 0 bytes to the right of [ 19.668554] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.668841] [ 19.669030] The buggy address belongs to the physical page: [ 19.669097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.669296] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.669543] page_type: f5(slab) [ 19.669601] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.670018] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.670307] page dumped because: kasan: bad access detected [ 19.670387] [ 19.670407] Memory state around the buggy address: [ 19.670727] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.671086] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.671327] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.671553] ^ [ 19.671758] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.671828] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.671927] ================================================================== [ 19.909902] ================================================================== [ 19.910387] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 19.910457] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.910825] [ 19.910907] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.911179] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.911332] Hardware name: linux,dummy-virt (DT) [ 19.911554] Call trace: [ 19.911584] show_stack+0x20/0x38 (C) [ 19.911836] dump_stack_lvl+0x8c/0xd0 [ 19.911895] print_report+0x118/0x608 [ 19.912156] kasan_report+0xdc/0x128 [ 19.912662] kasan_check_range+0x100/0x1a8 [ 19.912889] __kasan_check_write+0x20/0x30 [ 19.913237] kasan_atomics_helper+0x16d0/0x4858 [ 19.913562] kasan_atomics+0x198/0x2e0 [ 19.913612] kunit_try_run_case+0x170/0x3f0 [ 19.913666] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.913718] kthread+0x328/0x630 [ 19.913761] ret_from_fork+0x10/0x20 [ 19.914615] [ 19.914817] Allocated by task 266: [ 19.914852] kasan_save_stack+0x3c/0x68 [ 19.914994] kasan_save_track+0x20/0x40 [ 19.915093] kasan_save_alloc_info+0x40/0x58 [ 19.915135] __kasan_kmalloc+0xd4/0xd8 [ 19.915633] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.915828] kasan_atomics+0xb8/0x2e0 [ 19.917052] kunit_try_run_case+0x170/0x3f0 [ 19.917376] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.917470] kthread+0x328/0x630 [ 19.917794] ret_from_fork+0x10/0x20 [ 19.918030] [ 19.918324] The buggy address belongs to the object at fff00000c77bfc80 [ 19.918324] which belongs to the cache kmalloc-64 of size 64 [ 19.918548] The buggy address is located 0 bytes to the right of [ 19.918548] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.918900] [ 19.918927] The buggy address belongs to the physical page: [ 19.919118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.919228] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.919289] page_type: f5(slab) [ 19.919328] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.919659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.920168] page dumped because: kasan: bad access detected [ 19.920214] [ 19.920235] Memory state around the buggy address: [ 19.920618] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.920967] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.921376] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.921564] ^ [ 19.921839] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.921887] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.922270] ================================================================== [ 19.851569] ================================================================== [ 19.851618] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 19.851714] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.851767] [ 19.851798] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.851879] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.851908] Hardware name: linux,dummy-virt (DT) [ 19.851938] Call trace: [ 19.851963] show_stack+0x20/0x38 (C) [ 19.852048] dump_stack_lvl+0x8c/0xd0 [ 19.852096] print_report+0x118/0x608 [ 19.852142] kasan_report+0xdc/0x128 [ 19.852188] kasan_check_range+0x100/0x1a8 [ 19.852236] __kasan_check_write+0x20/0x30 [ 19.852283] kasan_atomics_helper+0x1414/0x4858 [ 19.852333] kasan_atomics+0x198/0x2e0 [ 19.852443] kunit_try_run_case+0x170/0x3f0 [ 19.852499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.852723] kthread+0x328/0x630 [ 19.852782] ret_from_fork+0x10/0x20 [ 19.852830] [ 19.852855] Allocated by task 266: [ 19.853025] kasan_save_stack+0x3c/0x68 [ 19.853193] kasan_save_track+0x20/0x40 [ 19.853231] kasan_save_alloc_info+0x40/0x58 [ 19.853350] __kasan_kmalloc+0xd4/0xd8 [ 19.853396] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.853561] kasan_atomics+0xb8/0x2e0 [ 19.853599] kunit_try_run_case+0x170/0x3f0 [ 19.853643] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.853686] kthread+0x328/0x630 [ 19.853727] ret_from_fork+0x10/0x20 [ 19.853909] [ 19.854665] The buggy address belongs to the object at fff00000c77bfc80 [ 19.854665] which belongs to the cache kmalloc-64 of size 64 [ 19.854736] The buggy address is located 0 bytes to the right of [ 19.854736] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.854801] [ 19.854823] The buggy address belongs to the physical page: [ 19.854856] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.854909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.854960] page_type: f5(slab) [ 19.855011] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.855069] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.855110] page dumped because: kasan: bad access detected [ 19.855144] [ 19.855163] Memory state around the buggy address: [ 19.855196] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.855247] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.855293] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.855334] ^ [ 19.855366] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.855411] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.855451] ================================================================== [ 19.858446] ================================================================== [ 19.858565] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 19.858612] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266 [ 19.858662] [ 19.858692] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.858773] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.858800] Hardware name: linux,dummy-virt (DT) [ 19.858832] Call trace: [ 19.858855] show_stack+0x20/0x38 (C) [ 19.858902] dump_stack_lvl+0x8c/0xd0 [ 19.858956] print_report+0x118/0x608 [ 19.859195] kasan_report+0xdc/0x128 [ 19.859241] kasan_check_range+0x100/0x1a8 [ 19.859290] __kasan_check_write+0x20/0x30 [ 19.859336] kasan_atomics_helper+0x14e4/0x4858 [ 19.859392] kasan_atomics+0x198/0x2e0 [ 19.859438] kunit_try_run_case+0x170/0x3f0 [ 19.859486] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.859537] kthread+0x328/0x630 [ 19.859579] ret_from_fork+0x10/0x20 [ 19.859625] [ 19.859644] Allocated by task 266: [ 19.859716] kasan_save_stack+0x3c/0x68 [ 19.859928] kasan_save_track+0x20/0x40 [ 19.860601] kasan_save_alloc_info+0x40/0x58 [ 19.860768] __kasan_kmalloc+0xd4/0xd8 [ 19.860869] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.860910] kasan_atomics+0xb8/0x2e0 [ 19.861008] kunit_try_run_case+0x170/0x3f0 [ 19.861050] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.861095] kthread+0x328/0x630 [ 19.861130] ret_from_fork+0x10/0x20 [ 19.861168] [ 19.861199] The buggy address belongs to the object at fff00000c77bfc80 [ 19.861199] which belongs to the cache kmalloc-64 of size 64 [ 19.861266] The buggy address is located 0 bytes to the right of [ 19.861266] allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0) [ 19.861331] [ 19.861353] The buggy address belongs to the physical page: [ 19.861385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf [ 19.861437] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.861486] page_type: f5(slab) [ 19.861523] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.861575] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.861627] page dumped because: kasan: bad access detected [ 19.861661] [ 19.861680] Memory state around the buggy address: [ 19.861713] fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.861759] fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.861804] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.861846] ^ [ 19.861878] fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.861921] fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.861994] ==================================================================
[ 19.440256] ================================================================== [ 19.440413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 19.440486] Read of size 4 at addr fff00000c76cc430 by task kunit_try_catch/266 [ 19.440539] [ 19.440599] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.440764] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.440801] Hardware name: linux,dummy-virt (DT) [ 19.441123] Call trace: [ 19.441178] show_stack+0x20/0x38 (C) [ 19.441257] dump_stack_lvl+0x8c/0xd0 [ 19.441458] print_report+0x118/0x608 [ 19.441622] kasan_report+0xdc/0x128 [ 19.441702] __asan_report_load4_noabort+0x20/0x30 [ 19.441857] kasan_atomics_helper+0x3e04/0x4858 [ 19.441929] kasan_atomics+0x198/0x2e0 [ 19.441975] kunit_try_run_case+0x170/0x3f0 [ 19.442086] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.442170] kthread+0x328/0x630 [ 19.442534] ret_from_fork+0x10/0x20 [ 19.443083] [ 19.443136] Allocated by task 266: [ 19.443199] kasan_save_stack+0x3c/0x68 [ 19.443415] kasan_save_track+0x20/0x40 [ 19.443470] kasan_save_alloc_info+0x40/0x58 [ 19.443813] __kasan_kmalloc+0xd4/0xd8 [ 19.443948] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.444275] kasan_atomics+0xb8/0x2e0 [ 19.444412] kunit_try_run_case+0x170/0x3f0 [ 19.444458] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.444847] kthread+0x328/0x630 [ 19.444952] ret_from_fork+0x10/0x20 [ 19.445215] [ 19.445246] The buggy address belongs to the object at fff00000c76cc400 [ 19.445246] which belongs to the cache kmalloc-64 of size 64 [ 19.445580] The buggy address is located 0 bytes to the right of [ 19.445580] allocated 48-byte region [fff00000c76cc400, fff00000c76cc430) [ 19.445684] [ 19.445821] The buggy address belongs to the physical page: [ 19.445887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 19.445961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.446013] page_type: f5(slab) [ 19.446061] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.446111] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.446154] page dumped because: kasan: bad access detected [ 19.446193] [ 19.446222] Memory state around the buggy address: [ 19.446265] fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.446310] fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.446354] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.446394] ^ [ 19.446435] fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.446479] fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.446520] ================================================================== [ 19.591721] ================================================================== [ 19.591776] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 19.591827] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266 [ 19.591966] [ 19.592013] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.592158] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.592204] Hardware name: linux,dummy-virt (DT) [ 19.592239] Call trace: [ 19.592267] show_stack+0x20/0x38 (C) [ 19.592364] dump_stack_lvl+0x8c/0xd0 [ 19.592413] print_report+0x118/0x608 [ 19.592622] kasan_report+0xdc/0x128 [ 19.592729] kasan_check_range+0x100/0x1a8 [ 19.592820] __kasan_check_write+0x20/0x30 [ 19.592882] kasan_atomics_helper+0x147c/0x4858 [ 19.593107] kasan_atomics+0x198/0x2e0 [ 19.593503] kunit_try_run_case+0x170/0x3f0 [ 19.593586] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.593649] kthread+0x328/0x630 [ 19.593692] ret_from_fork+0x10/0x20 [ 19.593788] [ 19.593828] Allocated by task 266: [ 19.593862] kasan_save_stack+0x3c/0x68 [ 19.593984] kasan_save_track+0x20/0x40 [ 19.594050] kasan_save_alloc_info+0x40/0x58 [ 19.594101] __kasan_kmalloc+0xd4/0xd8 [ 19.594263] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.594314] kasan_atomics+0xb8/0x2e0 [ 19.594352] kunit_try_run_case+0x170/0x3f0 [ 19.594421] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.594523] kthread+0x328/0x630 [ 19.594694] ret_from_fork+0x10/0x20 [ 19.594768] [ 19.594935] The buggy address belongs to the object at fff00000c76cc400 [ 19.594935] which belongs to the cache kmalloc-64 of size 64 [ 19.595265] The buggy address is located 0 bytes to the right of [ 19.595265] allocated 48-byte region [fff00000c76cc400, fff00000c76cc430) [ 19.595417] [ 19.595481] The buggy address belongs to the physical page: [ 19.595547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 19.595812] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.595987] page_type: f5(slab) [ 19.596053] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.596108] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.596151] page dumped because: kasan: bad access detected [ 19.596305] [ 19.596328] Memory state around the buggy address: [ 19.596409] fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.596475] fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.596682] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.596730] ^ [ 19.596793] fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.596873] fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.596994] ================================================================== [ 19.361380] ================================================================== [ 19.361435] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 19.361487] Write of size 4 at addr fff00000c76cc430 by task kunit_try_catch/266 [ 19.361540] [ 19.361692] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.362485] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.362533] Hardware name: linux,dummy-virt (DT) [ 19.362573] Call trace: [ 19.362597] show_stack+0x20/0x38 (C) [ 19.362979] dump_stack_lvl+0x8c/0xd0 [ 19.364158] kunit_try_run_case+0x170/0x3f0 [ 19.365499] kasan_save_alloc_info+0x40/0x58 [ 19.365610] __kasan_kmalloc+0xd4/0xd8 [ 19.365692] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.365770] kasan_atomics+0xb8/0x2e0 [ 19.366225] kunit_try_run_case+0x170/0x3f0 [ 19.366281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.366352] kthread+0x328/0x630 [ 19.366751] ret_from_fork+0x10/0x20 [ 19.366933] [ 19.366982] The buggy address belongs to the object at fff00000c76cc400 [ 19.366982] which belongs to the cache kmalloc-64 of size 64 [ 19.368240] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.369501] ================================================================== [ 19.579299] ================================================================== [ 19.579351] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 19.579436] Read of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266 [ 19.579515] [ 19.579556] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.579650] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.579691] Hardware name: linux,dummy-virt (DT) [ 19.579725] Call trace: [ 19.579757] show_stack+0x20/0x38 (C) [ 19.579817] dump_stack_lvl+0x8c/0xd0 [ 19.579932] print_report+0x118/0x608 [ 19.579990] kasan_report+0xdc/0x128 [ 19.580244] __asan_report_load8_noabort+0x20/0x30 [ 19.580394] kasan_atomics_helper+0x3f04/0x4858 [ 19.580466] kasan_atomics+0x198/0x2e0 [ 19.580635] kunit_try_run_case+0x170/0x3f0 [ 19.580716] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.580831] kthread+0x328/0x630 [ 19.580878] ret_from_fork+0x10/0x20 [ 19.581058] [ 19.581124] Allocated by task 266: [ 19.581198] kasan_save_stack+0x3c/0x68 [ 19.581310] kasan_save_track+0x20/0x40 [ 19.581354] kasan_save_alloc_info+0x40/0x58 [ 19.581396] __kasan_kmalloc+0xd4/0xd8 [ 19.581434] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.581617] kasan_atomics+0xb8/0x2e0 [ 19.581727] kunit_try_run_case+0x170/0x3f0 [ 19.581848] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.581892] kthread+0x328/0x630 [ 19.581999] ret_from_fork+0x10/0x20 [ 19.582102] [ 19.582164] The buggy address belongs to the object at fff00000c76cc400 [ 19.582164] which belongs to the cache kmalloc-64 of size 64 [ 19.582321] The buggy address is located 0 bytes to the right of [ 19.582321] allocated 48-byte region [fff00000c76cc400, fff00000c76cc430) [ 19.582397] [ 19.582531] The buggy address belongs to the physical page: [ 19.582569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 19.582625] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.582674] page_type: f5(slab) [ 19.582788] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.582871] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.583371] page dumped because: kasan: bad access detected [ 19.583443] [ 19.583478] Memory state around the buggy address: [ 19.583669] fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.583776] fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.583843] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.583884] ^ [ 19.584198] fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.584312] fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.584411] ================================================================== [ 19.584994] ================================================================== [ 19.585074] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 19.585125] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266 [ 19.585227] [ 19.585261] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.585349] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.585378] Hardware name: linux,dummy-virt (DT) [ 19.585616] Call trace: [ 19.585654] show_stack+0x20/0x38 (C) [ 19.585783] dump_stack_lvl+0x8c/0xd0 [ 19.585847] print_report+0x118/0x608 [ 19.585902] kasan_report+0xdc/0x128 [ 19.586009] kasan_check_range+0x100/0x1a8 [ 19.586088] __kasan_check_write+0x20/0x30 [ 19.586136] kasan_atomics_helper+0x1414/0x4858 [ 19.586451] kasan_atomics+0x198/0x2e0 [ 19.586570] kunit_try_run_case+0x170/0x3f0 [ 19.586636] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.586749] kthread+0x328/0x630 [ 19.586818] ret_from_fork+0x10/0x20 [ 19.586997] [ 19.587134] Allocated by task 266: [ 19.587183] kasan_save_stack+0x3c/0x68 [ 19.587330] kasan_save_track+0x20/0x40 [ 19.587387] kasan_save_alloc_info+0x40/0x58 [ 19.587431] __kasan_kmalloc+0xd4/0xd8 [ 19.587618] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.587766] kasan_atomics+0xb8/0x2e0 [ 19.587822] kunit_try_run_case+0x170/0x3f0 [ 19.587992] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.588058] kthread+0x328/0x630 [ 19.588317] ret_from_fork+0x10/0x20 [ 19.588394] [ 19.588502] The buggy address belongs to the object at fff00000c76cc400 [ 19.588502] which belongs to the cache kmalloc-64 of size 64 [ 19.588585] The buggy address is located 0 bytes to the right of [ 19.588585] allocated 48-byte region [fff00000c76cc400, fff00000c76cc430) [ 19.588714] [ 19.588775] The buggy address belongs to the physical page: [ 19.588866] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 19.588933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.588981] page_type: f5(slab) [ 19.589173] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.589314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.589381] page dumped because: kasan: bad access detected [ 19.589725] [ 19.589803] Memory state around the buggy address: [ 19.589882] fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.590039] fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.590086] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.590127] ^ [ 19.590317] fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.590589] fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.590695] ================================================================== [ 19.637313] ================================================================== [ 19.637479] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 19.637552] Read of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266 [ 19.637606] [ 19.637645] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.637726] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.638030] Hardware name: linux,dummy-virt (DT) [ 19.638828] Call trace: [ 19.638877] show_stack+0x20/0x38 (C) [ 19.638958] dump_stack_lvl+0x8c/0xd0 [ 19.639009] print_report+0x118/0x608 [ 19.639056] kasan_report+0xdc/0x128 [ 19.639105] __asan_report_load8_noabort+0x20/0x30 [ 19.639156] kasan_atomics_helper+0x3df4/0x4858 [ 19.639206] kasan_atomics+0x198/0x2e0 [ 19.639254] kunit_try_run_case+0x170/0x3f0 [ 19.639302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.640004] kthread+0x328/0x630 [ 19.640076] ret_from_fork+0x10/0x20 [ 19.640191] [ 19.640262] Allocated by task 266: [ 19.640330] kasan_save_stack+0x3c/0x68 [ 19.640451] kasan_save_track+0x20/0x40 [ 19.640535] kasan_save_alloc_info+0x40/0x58 [ 19.640585] __kasan_kmalloc+0xd4/0xd8 [ 19.640789] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.641094] kasan_atomics+0xb8/0x2e0 [ 19.641247] kunit_try_run_case+0x170/0x3f0 [ 19.641380] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.641480] kthread+0x328/0x630 [ 19.641810] ret_from_fork+0x10/0x20 [ 19.641865] [ 19.642042] The buggy address belongs to the object at fff00000c76cc400 [ 19.642042] which belongs to the cache kmalloc-64 of size 64 [ 19.642156] The buggy address is located 0 bytes to the right of [ 19.642156] allocated 48-byte region [fff00000c76cc400, fff00000c76cc430) [ 19.642582] [ 19.642647] The buggy address belongs to the physical page: [ 19.642791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 19.642852] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.642904] page_type: f5(slab) [ 19.642953] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.643327] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.643712] page dumped because: kasan: bad access detected [ 19.643932] [ 19.644089] Memory state around the buggy address: [ 19.644220] fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.644284] fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.644356] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.644688] ^ [ 19.644744] fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.644923] fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.645158] ================================================================== [ 19.447067] ================================================================== [ 19.447136] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 19.447190] Read of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266 [ 19.447245] [ 19.447316] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.447399] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.447427] Hardware name: linux,dummy-virt (DT) [ 19.447471] Call trace: [ 19.447503] show_stack+0x20/0x38 (C) [ 19.447553] dump_stack_lvl+0x8c/0xd0 [ 19.447599] print_report+0x118/0x608 [ 19.447646] kasan_report+0xdc/0x128 [ 19.447700] kasan_check_range+0x100/0x1a8 [ 19.447749] __kasan_check_read+0x20/0x30 [ 19.447801] kasan_atomics_helper+0xdd4/0x4858 [ 19.447861] kasan_atomics+0x198/0x2e0 [ 19.447905] kunit_try_run_case+0x170/0x3f0 [ 19.447964] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.448543] kthread+0x328/0x630 [ 19.449052] ret_from_fork+0x10/0x20 [ 19.449143] [ 19.449183] Allocated by task 266: [ 19.449218] kasan_save_stack+0x3c/0x68 [ 19.449273] kasan_save_track+0x20/0x40 [ 19.449317] kasan_save_alloc_info+0x40/0x58 [ 19.449377] __kasan_kmalloc+0xd4/0xd8 [ 19.449427] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.449477] kasan_atomics+0xb8/0x2e0 [ 19.449752] kunit_try_run_case+0x170/0x3f0 [ 19.449832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.449931] kthread+0x328/0x630 [ 19.449983] ret_from_fork+0x10/0x20 [ 19.450290] [ 19.450627] The buggy address belongs to the object at fff00000c76cc400 [ 19.450627] which belongs to the cache kmalloc-64 of size 64 [ 19.450796] The buggy address is located 0 bytes to the right of [ 19.450796] allocated 48-byte region [fff00000c76cc400, fff00000c76cc430) [ 19.450887] [ 19.451187] The buggy address belongs to the physical page: [ 19.451247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 19.451623] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.451744] page_type: f5(slab) [ 19.451835] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.451894] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.452229] page dumped because: kasan: bad access detected [ 19.452338] [ 19.452577] Memory state around the buggy address: [ 19.452888] fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.452974] fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.453329] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.453426] ^ [ 19.453515] fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.453643] fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.453712] ================================================================== [ 19.571251] ================================================================== [ 19.571311] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 19.571411] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266 [ 19.571476] [ 19.571525] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.571668] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.571716] Hardware name: linux,dummy-virt (DT) [ 19.571764] Call trace: [ 19.571790] show_stack+0x20/0x38 (C) [ 19.571897] dump_stack_lvl+0x8c/0xd0 [ 19.571974] print_report+0x118/0x608 [ 19.572021] kasan_report+0xdc/0x128 [ 19.572068] kasan_check_range+0x100/0x1a8 [ 19.572115] __kasan_check_write+0x20/0x30 [ 19.572160] kasan_atomics_helper+0x12d8/0x4858 [ 19.572209] kasan_atomics+0x198/0x2e0 [ 19.572281] kunit_try_run_case+0x170/0x3f0 [ 19.572340] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.572394] kthread+0x328/0x630 [ 19.572441] ret_from_fork+0x10/0x20 [ 19.572491] [ 19.572519] Allocated by task 266: [ 19.572549] kasan_save_stack+0x3c/0x68 [ 19.572600] kasan_save_track+0x20/0x40 [ 19.572639] kasan_save_alloc_info+0x40/0x58 [ 19.572682] __kasan_kmalloc+0xd4/0xd8 [ 19.572719] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.572760] kasan_atomics+0xb8/0x2e0 [ 19.572797] kunit_try_run_case+0x170/0x3f0 [ 19.572837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.572881] kthread+0x328/0x630 [ 19.573311] ret_from_fork+0x10/0x20 [ 19.573618] [ 19.573674] The buggy address belongs to the object at fff00000c76cc400 [ 19.573674] which belongs to the cache kmalloc-64 of size 64 [ 19.573881] The buggy address is located 0 bytes to the right of [ 19.573881] allocated 48-byte region [fff00000c76cc400, fff00000c76cc430) [ 19.573964] [ 19.574033] The buggy address belongs to the physical page: [ 19.574086] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 19.574155] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.574212] page_type: f5(slab) [ 19.574257] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.574311] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.574530] page dumped because: kasan: bad access detected [ 19.574591] [ 19.574731] Memory state around the buggy address: [ 19.574897] fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.575059] fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.575128] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.575237] ^ [ 19.575301] fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.575374] fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.575417] ================================================================== [ 19.575702] ================================================================== [ 19.575752] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 19.575801] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266 [ 19.575852] [ 19.575882] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.575985] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.576014] Hardware name: linux,dummy-virt (DT) [ 19.576045] Call trace: [ 19.576070] show_stack+0x20/0x38 (C) [ 19.576135] dump_stack_lvl+0x8c/0xd0 [ 19.576185] print_report+0x118/0x608 [ 19.576230] kasan_report+0xdc/0x128 [ 19.576276] kasan_check_range+0x100/0x1a8 [ 19.576324] __kasan_check_write+0x20/0x30 [ 19.576378] kasan_atomics_helper+0x1384/0x4858 [ 19.576428] kasan_atomics+0x198/0x2e0 [ 19.576478] kunit_try_run_case+0x170/0x3f0 [ 19.576526] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.576587] kthread+0x328/0x630 [ 19.576634] ret_from_fork+0x10/0x20 [ 19.576683] [ 19.576703] Allocated by task 266: [ 19.576731] kasan_save_stack+0x3c/0x68 [ 19.576773] kasan_save_track+0x20/0x40 [ 19.576819] kasan_save_alloc_info+0x40/0x58 [ 19.576862] __kasan_kmalloc+0xd4/0xd8 [ 19.576899] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.576949] kasan_atomics+0xb8/0x2e0 [ 19.576988] kunit_try_run_case+0x170/0x3f0 [ 19.577027] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.577083] kthread+0x328/0x630 [ 19.577126] ret_from_fork+0x10/0x20 [ 19.577172] [ 19.577193] The buggy address belongs to the object at fff00000c76cc400 [ 19.577193] which belongs to the cache kmalloc-64 of size 64 [ 19.577253] The buggy address is located 0 bytes to the right of [ 19.577253] allocated 48-byte region [fff00000c76cc400, fff00000c76cc430) [ 19.577327] [ 19.577350] The buggy address belongs to the physical page: [ 19.577382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 19.577433] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.577488] page_type: f5(slab) [ 19.577527] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.577580] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.577631] page dumped because: kasan: bad access detected [ 19.577674] [ 19.577695] Memory state around the buggy address: [ 19.577729] fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.577774] fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.577827] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.577869] ^ [ 19.577901] fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.578090] fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.578131] ================================================================== [ 19.679479] ================================================================== [ 19.679547] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 19.679610] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266 [ 19.679671] [ 19.679714] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.679797] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.679824] Hardware name: linux,dummy-virt (DT) [ 19.679857] Call trace: [ 19.679879] show_stack+0x20/0x38 (C) [ 19.679940] dump_stack_lvl+0x8c/0xd0 [ 19.679990] print_report+0x118/0x608 [ 19.680037] kasan_report+0xdc/0x128 [ 19.680083] kasan_check_range+0x100/0x1a8 [ 19.680132] __kasan_check_write+0x20/0x30 [ 19.680176] kasan_atomics_helper+0x17ec/0x4858 [ 19.680237] kasan_atomics+0x198/0x2e0 [ 19.680283] kunit_try_run_case+0x170/0x3f0 [ 19.680329] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.680391] kthread+0x328/0x630 [ 19.680443] ret_from_fork+0x10/0x20 [ 19.680503] [ 19.680523] Allocated by task 266: [ 19.680559] kasan_save_stack+0x3c/0x68 [ 19.680600] kasan_save_track+0x20/0x40 [ 19.680640] kasan_save_alloc_info+0x40/0x58 [ 19.680688] __kasan_kmalloc+0xd4/0xd8 [ 19.680727] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.680768] kasan_atomics+0xb8/0x2e0 [ 19.680812] kunit_try_run_case+0x170/0x3f0 [ 19.680853] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.680896] kthread+0x328/0x630 [ 19.681500] ret_from_fork+0x10/0x20 [ 19.681553] [ 19.681992] The buggy address belongs to the object at fff00000c76cc400 [ 19.681992] which belongs to the cache kmalloc-64 of size 64 [ 19.682338] The buggy address is located 0 bytes to the right of [ 19.682338] allocated 48-byte region [fff00000c76cc400, fff00000c76cc430) [ 19.682793] [ 19.682843] The buggy address belongs to the physical page: [ 19.682934] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 19.682990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.683040] page_type: f5(slab) [ 19.683228] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.683507] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.683583] page dumped because: kasan: bad access detected [ 19.683765] [ 19.683960] Memory state around the buggy address: [ 19.684027] fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.684199] fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.684428] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.685387] ^ [ 19.685873] fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.685953] fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.686115] ================================================================== [ 19.488338] ================================================================== [ 19.488400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 19.488808] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266 [ 19.488969] [ 19.489053] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.489218] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.489267] Hardware name: linux,dummy-virt (DT) [ 19.489305] Call trace: [ 19.489339] show_stack+0x20/0x38 (C) [ 19.489397] dump_stack_lvl+0x8c/0xd0 [ 19.489597] print_report+0x118/0x608 [ 19.489658] kasan_report+0xdc/0x128 [ 19.489719] kasan_check_range+0x100/0x1a8 [ 19.490111] __kasan_check_write+0x20/0x30 [ 19.490228] kasan_atomics_helper+0xf20/0x4858 [ 19.490300] kasan_atomics+0x198/0x2e0 [ 19.490474] kunit_try_run_case+0x170/0x3f0 [ 19.490558] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.490761] kthread+0x328/0x630 [ 19.490939] ret_from_fork+0x10/0x20 [ 19.491037] [ 19.491134] Allocated by task 266: [ 19.491447] kasan_save_stack+0x3c/0x68 [ 19.491598] kasan_save_track+0x20/0x40 [ 19.491687] kasan_save_alloc_info+0x40/0x58 [ 19.491766] __kasan_kmalloc+0xd4/0xd8 [ 19.491947] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.492023] kasan_atomics+0xb8/0x2e0 [ 19.492305] kunit_try_run_case+0x170/0x3f0 [ 19.492445] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.492743] kthread+0x328/0x630 [ 19.492876] ret_from_fork+0x10/0x20 [ 19.492946] [ 19.492970] The buggy address belongs to the object at fff00000c76cc400 [ 19.492970] which belongs to the cache kmalloc-64 of size 64 [ 19.493055] The buggy address is located 0 bytes to the right of [ 19.493055] allocated 48-byte region [fff00000c76cc400, fff00000c76cc430) [ 19.493131] [ 19.493162] The buggy address belongs to the physical page: [ 19.493200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 19.493257] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.493313] page_type: f5(slab) [ 19.493353] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.493407] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.493449] page dumped because: kasan: bad access detected [ 19.493493] [ 19.493527] Memory state around the buggy address: [ 19.493563] fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.493609] fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.493662] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.493700] ^ [ 19.493735] fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.493788] fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.493829] ================================================================== [ 19.327077] ================================================================== [ 19.327342] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 19.327493] [ 19.328238] print_report+0x118/0x608 [ 19.332278] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.332564] kasan_atomics+0xb8/0x2e0 [ 19.332643] kunit_try_run_case+0x170/0x3f0 [ 19.333161] ret_from_fork+0x10/0x20 [ 19.333892] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 19.334502] page dumped because: kasan: bad access detected [ 19.337442] Write of size 4 at addr fff00000c76cc430 by task kunit_try_catch/266 [ 19.337767] dump_stack_lvl+0x8c/0xd0 [ 19.337815] print_report+0x118/0x608 [ 19.337862] kasan_report+0xdc/0x128 [ 19.337923] kasan_check_range+0x100/0x1a8 [ 19.337971] __kasan_check_write+0x20/0x30 [ 19.338521] kasan_atomics_helper+0x934/0x4858 [ 19.338585] kasan_atomics+0x198/0x2e0 [ 19.338661] kunit_try_run_case+0x170/0x3f0 [ 19.338757] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.339005] kthread+0x328/0x630 [ 19.339177] ret_from_fork+0x10/0x20 [ 19.339496] [ 19.339549] Allocated by task 266: [ 19.339661] kasan_save_stack+0x3c/0x68 [ 19.339757] kasan_save_track+0x20/0x40 [ 19.339887] kasan_save_alloc_info+0x40/0x58 [ 19.340017] __kasan_kmalloc+0xd4/0xd8 [ 19.340354] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.340432] kasan_atomics+0xb8/0x2e0 [ 19.340611] kunit_try_run_case+0x170/0x3f0 [ 19.340776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.340824] kthread+0x328/0x630 [ 19.341093] ret_from_fork+0x10/0x20 [ 19.341243] [ 19.341287] The buggy address belongs to the object at fff00000c76cc400 [ 19.341287] which belongs to the cache kmalloc-64 of size 64 [ 19.341653] The buggy address is located 0 bytes to the right of [ 19.341653] allocated 48-byte region [fff00000c76cc400, fff00000c76cc430) [ 19.341757] [ 19.342138] The buggy address belongs to the physical page: [ 19.342187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 19.342374] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.342555] page_type: f5(slab) [ 19.342664] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.342803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.342874] page dumped because: kasan: bad access detected [ 19.342986] [ 19.343012] Memory state around the buggy address: [ 19.343276] fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.343428] fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.343521] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.343637] ^ [ 19.343737] fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.344136] fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.344244] ================================================================== [ 19.514376] ================================================================== [ 19.514430] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 19.514746] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266 [ 19.514986] [ 19.515218] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.515322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.515351] Hardware name: linux,dummy-virt (DT) [ 19.515390] Call trace: [ 19.515414] show_stack+0x20/0x38 (C) [ 19.515476] dump_stack_lvl+0x8c/0xd0 [ 19.515544] print_report+0x118/0x608 [ 19.515602] kasan_report+0xdc/0x128 [ 19.515648] kasan_check_range+0x100/0x1a8 [ 19.515698] __kasan_check_write+0x20/0x30 [ 19.515754] kasan_atomics_helper+0x1058/0x4858 [ 19.515804] kasan_atomics+0x198/0x2e0 [ 19.515851] kunit_try_run_case+0x170/0x3f0 [ 19.515935] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.515990] kthread+0x328/0x630 [ 19.516040] ret_from_fork+0x10/0x20 [ 19.516103] [ 19.516133] Allocated by task 266: [ 19.516174] kasan_save_stack+0x3c/0x68 [ 19.516215] kasan_save_track+0x20/0x40 [ 19.516257] kasan_save_alloc_info+0x40/0x58 [ 19.516299] __kasan_kmalloc+0xd4/0xd8 [ 19.516339] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.516380] kasan_atomics+0xb8/0x2e0 [ 19.516417] kunit_try_run_case+0x170/0x3f0 [ 19.516458] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.516505] kthread+0x328/0x630 [ 19.516540] ret_from_fork+0x10/0x20 [ 19.516589] [ 19.516611] The buggy address belongs to the object at fff00000c76cc400 [ 19.516611] which belongs to the cache kmalloc-64 of size 64 [ 19.516672] The buggy address is located 0 bytes to the right of [ 19.516672] allocated 48-byte region [fff00000c76cc400, fff00000c76cc430) [ 19.516747] [ 19.516777] The buggy address belongs to the physical page: [ 19.516823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 19.516885] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.516965] page_type: f5(slab) [ 19.517931] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.518058] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.518132] page dumped because: kasan: bad access detected [ 19.518196] [ 19.518225] Memory state around the buggy address: [ 19.518262] fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.518541] fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.518595] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.518634] ^ [ 19.518678] fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.518721] fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.518761] ================================================================== [ 19.549710] ================================================================== [ 19.549984] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 19.550179] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266 [ 19.550363] [ 19.550448] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.550567] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.550755] Hardware name: linux,dummy-virt (DT) [ 19.550972] Call trace: [ 19.551313] show_stack+0x20/0x38 (C) [ 19.551677] dump_stack_lvl+0x8c/0xd0 [ 19.551754] print_report+0x118/0x608 [ 19.551927] kasan_report+0xdc/0x128 [ 19.552364] kasan_check_range+0x100/0x1a8 [ 19.552792] __kasan_check_write+0x20/0x30 [ 19.552947] kasan_atomics_helper+0x11f8/0x4858 [ 19.553033] kasan_atomics+0x198/0x2e0 [ 19.553154] kunit_try_run_case+0x170/0x3f0 [ 19.553360] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.553573] kthread+0x328/0x630 [ 19.553966] ret_from_fork+0x10/0x20 [ 19.554150] [ 19.554231] Allocated by task 266: [ 19.554447] kasan_save_stack+0x3c/0x68 [ 19.555202] kasan_save_track+0x20/0x40 [ 19.555251] kasan_save_alloc_info+0x40/0x58 [ 19.555321] __kasan_kmalloc+0xd4/0xd8 [ 19.555513] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.555558] kasan_atomics+0xb8/0x2e0 [ 19.555597] kunit_try_run_case+0x170/0x3f0 [ 19.556488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.557113] kthread+0x328/0x630 [ 19.557268] ret_from_fork+0x10/0x20 [ 19.558606] [ 19.558647] The buggy address belongs to the object at fff00000c76cc400 [ 19.558647] which belongs to the cache kmalloc-64 of size 64 [ 19.558712] The buggy address is located 0 bytes to the right of [ 19.558712] allocated 48-byte region [fff00000c76cc400, fff00000c76cc430) [ 19.558779] [ 19.558801] The buggy address belongs to the physical page: [ 19.558833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 19.558888] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.558948] page_type: f5(slab) [ 19.558988] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.559042] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.559086] page dumped because: kasan: bad access detected [ 19.559121] [ 19.559141] Memory state around the buggy address: [ 19.559175] fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.559221] fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.559265] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.559305] ^ [ 19.559340] fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.559383] fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.559421] ================================================================== [ 19.607348] ================================================================== [ 19.607410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 19.607461] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266 [ 19.607674] [ 19.607718] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.607972] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.608121] Hardware name: linux,dummy-virt (DT) [ 19.608212] Call trace: [ 19.608238] show_stack+0x20/0x38 (C) [ 19.608291] dump_stack_lvl+0x8c/0xd0 [ 19.608366] print_report+0x118/0x608 [ 19.608475] kasan_report+0xdc/0x128 [ 19.608527] kasan_check_range+0x100/0x1a8 [ 19.608577] __kasan_check_write+0x20/0x30 [ 19.608663] kasan_atomics_helper+0x154c/0x4858 [ 19.608714] kasan_atomics+0x198/0x2e0 [ 19.608759] kunit_try_run_case+0x170/0x3f0 [ 19.608805] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.608858] kthread+0x328/0x630 [ 19.608901] ret_from_fork+0x10/0x20 [ 19.608960] [ 19.609086] Allocated by task 266: [ 19.609133] kasan_save_stack+0x3c/0x68 [ 19.609179] kasan_save_track+0x20/0x40 [ 19.609481] kasan_save_alloc_info+0x40/0x58 [ 19.609731] __kasan_kmalloc+0xd4/0xd8 [ 19.609791] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.609987] kasan_atomics+0xb8/0x2e0 [ 19.610190] kunit_try_run_case+0x170/0x3f0 [ 19.610268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.610582] kthread+0x328/0x630 [ 19.610675] ret_from_fork+0x10/0x20 [ 19.610990] [ 19.611047] The buggy address belongs to the object at fff00000c76cc400 [ 19.611047] which belongs to the cache kmalloc-64 of size 64 [ 19.611142] The buggy address is located 0 bytes to the right of [ 19.611142] allocated 48-byte region [fff00000c76cc400, fff00000c76cc430) [ 19.611450] [ 19.611570] The buggy address belongs to the physical page: [ 19.611633] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 19.611690] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.611923] page_type: f5(slab) [ 19.612108] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.612193] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.612513] page dumped because: kasan: bad access detected [ 19.612587] [ 19.612891] Memory state around the buggy address: [ 19.612971] fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.613367] fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.613431] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.613473] ^ [ 19.613557] fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.613618] fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.613680] ================================================================== [ 19.480430] ================================================================== [ 19.480485] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 19.480546] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266 [ 19.480879] [ 19.481110] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.481202] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.481230] Hardware name: linux,dummy-virt (DT) [ 19.481263] Call trace: [ 19.481308] show_stack+0x20/0x38 (C) [ 19.481361] dump_stack_lvl+0x8c/0xd0 [ 19.481413] print_report+0x118/0x608 [ 19.481467] kasan_report+0xdc/0x128 [ 19.481513] kasan_check_range+0x100/0x1a8 [ 19.481562] __kasan_check_write+0x20/0x30 [ 19.481615] kasan_atomics_helper+0xeb8/0x4858 [ 19.481664] kasan_atomics+0x198/0x2e0 [ 19.481709] kunit_try_run_case+0x170/0x3f0 [ 19.481756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.481817] kthread+0x328/0x630 [ 19.481858] ret_from_fork+0x10/0x20 [ 19.481925] [ 19.482242] Allocated by task 266: [ 19.482327] kasan_save_stack+0x3c/0x68 [ 19.482599] kasan_save_track+0x20/0x40 [ 19.482683] kasan_save_alloc_info+0x40/0x58 [ 19.482800] __kasan_kmalloc+0xd4/0xd8 [ 19.482905] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.482979] kasan_atomics+0xb8/0x2e0 [ 19.483258] kunit_try_run_case+0x170/0x3f0 [ 19.483487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.483837] kthread+0x328/0x630 [ 19.483933] ret_from_fork+0x10/0x20 [ 19.483976] [ 19.483998] The buggy address belongs to the object at fff00000c76cc400 [ 19.483998] which belongs to the cache kmalloc-64 of size 64 [ 19.484343] The buggy address is located 0 bytes to the right of [ 19.484343] allocated 48-byte region [fff00000c76cc400, fff00000c76cc430) [ 19.484757] [ 19.484804] The buggy address belongs to the physical page: [ 19.484907] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 19.484979] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.485031] page_type: f5(slab) [ 19.485391] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.485744] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.485883] page dumped because: kasan: bad access detected [ 19.485954] [ 19.486004] Memory state around the buggy address: [ 19.486059] fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.486392] fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.486458] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.486802] ^ [ 19.487129] fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.487568] fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.487642] ================================================================== [ 19.532566] ================================================================== [ 19.532622] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 19.532676] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266 [ 19.533096] [ 19.533203] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.533370] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.533419] Hardware name: linux,dummy-virt (DT) [ 19.533453] Call trace: [ 19.533485] show_stack+0x20/0x38 (C) [ 19.533693] dump_stack_lvl+0x8c/0xd0 [ 19.533931] print_report+0x118/0x608 [ 19.534002] kasan_report+0xdc/0x128 [ 19.534252] kasan_check_range+0x100/0x1a8 [ 19.534513] __kasan_check_write+0x20/0x30 [ 19.534715] kasan_atomics_helper+0x1128/0x4858 [ 19.534941] kasan_atomics+0x198/0x2e0 [ 19.535093] kunit_try_run_case+0x170/0x3f0 [ 19.535155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.535216] kthread+0x328/0x630 [ 19.535269] ret_from_fork+0x10/0x20 [ 19.535331] [ 19.535364] Allocated by task 266: [ 19.535411] kasan_save_stack+0x3c/0x68 [ 19.535465] kasan_save_track+0x20/0x40 [ 19.535503] kasan_save_alloc_info+0x40/0x58 [ 19.535553] __kasan_kmalloc+0xd4/0xd8 [ 19.535602] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.535654] kasan_atomics+0xb8/0x2e0 [ 19.535693] kunit_try_run_case+0x170/0x3f0 [ 19.535732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.535789] kthread+0x328/0x630 [ 19.535832] ret_from_fork+0x10/0x20 [ 19.535869] [ 19.535889] The buggy address belongs to the object at fff00000c76cc400 [ 19.535889] which belongs to the cache kmalloc-64 of size 64 [ 19.535970] The buggy address is located 0 bytes to the right of [ 19.535970] allocated 48-byte region [fff00000c76cc400, fff00000c76cc430) [ 19.536038] [ 19.536065] The buggy address belongs to the physical page: [ 19.536108] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 19.536164] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.536213] page_type: f5(slab) [ 19.536257] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.536315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.536359] page dumped because: kasan: bad access detected [ 19.536399] [ 19.536434] Memory state around the buggy address: [ 19.536468] fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.536513] fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.536572] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.536613] ^ [ 19.536647] fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.536699] fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.536753] ================================================================== [ 19.630517] ================================================================== [ 19.630572] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 19.630624] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266 [ 19.630675] [ 19.630744] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.630831] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.630879] Hardware name: linux,dummy-virt (DT) [ 19.630926] Call trace: [ 19.630951] show_stack+0x20/0x38 (C) [ 19.631001] dump_stack_lvl+0x8c/0xd0 [ 19.631056] print_report+0x118/0x608 [ 19.631112] kasan_report+0xdc/0x128 [ 19.631163] kasan_check_range+0x100/0x1a8 [ 19.631215] __kasan_check_write+0x20/0x30 [ 19.631262] kasan_atomics_helper+0x1644/0x4858 [ 19.631310] kasan_atomics+0x198/0x2e0 [ 19.631369] kunit_try_run_case+0x170/0x3f0 [ 19.631426] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.631480] kthread+0x328/0x630 [ 19.631521] ret_from_fork+0x10/0x20 [ 19.631579] [ 19.631600] Allocated by task 266: [ 19.631629] kasan_save_stack+0x3c/0x68 [ 19.631672] kasan_save_track+0x20/0x40 [ 19.631710] kasan_save_alloc_info+0x40/0x58 [ 19.631753] __kasan_kmalloc+0xd4/0xd8 [ 19.631791] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.631837] kasan_atomics+0xb8/0x2e0 [ 19.631876] kunit_try_run_case+0x170/0x3f0 [ 19.632423] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.632560] kthread+0x328/0x630 [ 19.632609] ret_from_fork+0x10/0x20 [ 19.632649] [ 19.633111] The buggy address belongs to the object at fff00000c76cc400 [ 19.633111] which belongs to the cache kmalloc-64 of size 64 [ 19.633379] The buggy address is located 0 bytes to the right of [ 19.633379] allocated 48-byte region [fff00000c76cc400, fff00000c76cc430) [ 19.633460] [ 19.633484] The buggy address belongs to the physical page: [ 19.633515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 19.633569] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.633862] page_type: f5(slab) [ 19.634246] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.634322] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.634389] page dumped because: kasan: bad access detected [ 19.634573] [ 19.634598] Memory state around the buggy address: [ 19.634635] fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.634906] fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.635024] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.635115] ^ [ 19.635436] fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.635547] fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.635587] ================================================================== [ 19.661992] ================================================================== [ 19.662476] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 19.662547] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266 [ 19.662610] [ 19.663028] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.663148] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.663518] Hardware name: linux,dummy-virt (DT) [ 19.663689] Call trace: [ 19.663900] show_stack+0x20/0x38 (C) [ 19.664198] dump_stack_lvl+0x8c/0xd0 [ 19.664324] print_report+0x118/0x608 [ 19.664427] kasan_report+0xdc/0x128 [ 19.664577] kasan_check_range+0x100/0x1a8 [ 19.664631] __kasan_check_write+0x20/0x30 [ 19.664693] kasan_atomics_helper+0x175c/0x4858 [ 19.664984] kasan_atomics+0x198/0x2e0 [ 19.665395] kunit_try_run_case+0x170/0x3f0 [ 19.665584] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.665660] kthread+0x328/0x630 [ 19.665776] ret_from_fork+0x10/0x20 [ 19.665889] [ 19.666041] Allocated by task 266: [ 19.666231] kasan_save_stack+0x3c/0x68 [ 19.666324] kasan_save_track+0x20/0x40 [ 19.666659] kasan_save_alloc_info+0x40/0x58 [ 19.666769] __kasan_kmalloc+0xd4/0xd8 [ 19.666867] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.666991] kasan_atomics+0xb8/0x2e0 [ 19.667103] kunit_try_run_case+0x170/0x3f0 [ 19.667166] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.667355] kthread+0x328/0x630 [ 19.667396] ret_from_fork+0x10/0x20 [ 19.667800] [ 19.667851] The buggy address belongs to the object at fff00000c76cc400 [ 19.667851] which belongs to the cache kmalloc-64 of size 64 [ 19.668529] The buggy address is located 0 bytes to the right of [ 19.668529] allocated 48-byte region [fff00000c76cc400, fff00000c76cc430) [ 19.668640] [ 19.668759] The buggy address belongs to the physical page: [ 19.668973] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 19.669059] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.669366] page_type: f5(slab) [ 19.669439] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.669947] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.670123] page dumped because: kasan: bad access detected [ 19.670186] [ 19.670262] Memory state around the buggy address: [ 19.670327] fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.670392] fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.670542] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.670587] ^ [ 19.670623] fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.670845] fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.670952] ================================================================== [ 19.537855] ================================================================== [ 19.537928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 19.537981] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266 [ 19.538070] [ 19.538415] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.538519] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.538547] Hardware name: linux,dummy-virt (DT) [ 19.539003] Call trace: [ 19.539250] show_stack+0x20/0x38 (C) [ 19.539524] dump_stack_lvl+0x8c/0xd0 [ 19.539611] print_report+0x118/0x608 [ 19.539688] kasan_report+0xdc/0x128 [ 19.540126] kasan_check_range+0x100/0x1a8 [ 19.540577] __kasan_check_write+0x20/0x30 [ 19.540672] kasan_atomics_helper+0x1190/0x4858 [ 19.540812] kasan_atomics+0x198/0x2e0 [ 19.540926] kunit_try_run_case+0x170/0x3f0 [ 19.540978] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.541437] kthread+0x328/0x630 [ 19.541722] ret_from_fork+0x10/0x20 [ 19.541944] [ 19.542165] Allocated by task 266: [ 19.542219] kasan_save_stack+0x3c/0x68 [ 19.542265] kasan_save_track+0x20/0x40 [ 19.542314] kasan_save_alloc_info+0x40/0x58 [ 19.542758] __kasan_kmalloc+0xd4/0xd8 [ 19.542828] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.543018] kasan_atomics+0xb8/0x2e0 [ 19.543232] kunit_try_run_case+0x170/0x3f0 [ 19.543629] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.543709] kthread+0x328/0x630 [ 19.543889] ret_from_fork+0x10/0x20 [ 19.543974] [ 19.544196] The buggy address belongs to the object at fff00000c76cc400 [ 19.544196] which belongs to the cache kmalloc-64 of size 64 [ 19.544553] The buggy address is located 0 bytes to the right of [ 19.544553] allocated 48-byte region [fff00000c76cc400, fff00000c76cc430) [ 19.544638] [ 19.545434] The buggy address belongs to the physical page: [ 19.545484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 19.546018] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.546392] page_type: f5(slab) [ 19.546507] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.546680] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.546727] page dumped because: kasan: bad access detected [ 19.546782] [ 19.546809] Memory state around the buggy address: [ 19.546844] fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.547343] fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.547560] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.547626] ^ [ 19.547675] fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.547956] fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.548123] ================================================================== [ 19.657241] ================================================================== [ 19.657479] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 19.657677] Read of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266 [ 19.657748] [ 19.657783] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.657865] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.657892] Hardware name: linux,dummy-virt (DT) [ 19.657937] Call trace: [ 19.658249] show_stack+0x20/0x38 (C) [ 19.658352] dump_stack_lvl+0x8c/0xd0 [ 19.658433] print_report+0x118/0x608 [ 19.658858] kasan_report+0xdc/0x128 [ 19.658944] __asan_report_load8_noabort+0x20/0x30 [ 19.658998] kasan_atomics_helper+0x3e10/0x4858 [ 19.659049] kasan_atomics+0x198/0x2e0 [ 19.659095] kunit_try_run_case+0x170/0x3f0 [ 19.659145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.659200] kthread+0x328/0x630 [ 19.659246] ret_from_fork+0x10/0x20 [ 19.659301] [ 19.659345] Allocated by task 266: [ 19.659386] kasan_save_stack+0x3c/0x68 [ 19.659462] kasan_save_track+0x20/0x40 [ 19.659500] kasan_save_alloc_info+0x40/0x58 [ 19.659548] __kasan_kmalloc+0xd4/0xd8 [ 19.659594] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.659635] kasan_atomics+0xb8/0x2e0 [ 19.659673] kunit_try_run_case+0x170/0x3f0 [ 19.659720] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.659774] kthread+0x328/0x630 [ 19.659808] ret_from_fork+0x10/0x20 [ 19.659845] [ 19.659864] The buggy address belongs to the object at fff00000c76cc400 [ 19.659864] which belongs to the cache kmalloc-64 of size 64 [ 19.659935] The buggy address is located 0 bytes to the right of [ 19.659935] allocated 48-byte region [fff00000c76cc400, fff00000c76cc430) [ 19.660003] [ 19.660024] The buggy address belongs to the physical page: [ 19.660074] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 19.660128] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.660178] page_type: f5(slab) [ 19.660217] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.660276] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.660326] page dumped because: kasan: bad access detected [ 19.660369] [ 19.660397] Memory state around the buggy address: [ 19.660430] fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.660475] fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.660520] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.660578] ^ [ 19.660613] fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.660666] fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.660715] ================================================================== [ 19.472310] ================================================================== [ 19.472369] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 19.472429] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266 [ 19.472809] [ 19.472865] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.473042] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.473081] Hardware name: linux,dummy-virt (DT) [ 19.473128] Call trace: [ 19.473170] show_stack+0x20/0x38 (C) [ 19.473223] dump_stack_lvl+0x8c/0xd0 [ 19.473272] print_report+0x118/0x608 [ 19.473578] kasan_report+0xdc/0x128 [ 19.473692] __asan_report_store8_noabort+0x20/0x30 [ 19.473846] kasan_atomics_helper+0x3e5c/0x4858 [ 19.474080] kasan_atomics+0x198/0x2e0 [ 19.474196] kunit_try_run_case+0x170/0x3f0 [ 19.474264] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.474384] kthread+0x328/0x630 [ 19.474460] ret_from_fork+0x10/0x20 [ 19.474585] [ 19.474790] Allocated by task 266: [ 19.474873] kasan_save_stack+0x3c/0x68 [ 19.475041] kasan_save_track+0x20/0x40 [ 19.475108] kasan_save_alloc_info+0x40/0x58 [ 19.475446] __kasan_kmalloc+0xd4/0xd8 [ 19.475517] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.475653] kasan_atomics+0xb8/0x2e0 [ 19.475696] kunit_try_run_case+0x170/0x3f0 [ 19.475753] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.476097] kthread+0x328/0x630 [ 19.476182] ret_from_fork+0x10/0x20 [ 19.476244] [ 19.476558] The buggy address belongs to the object at fff00000c76cc400 [ 19.476558] which belongs to the cache kmalloc-64 of size 64 [ 19.476841] The buggy address is located 0 bytes to the right of [ 19.476841] allocated 48-byte region [fff00000c76cc400, fff00000c76cc430) [ 19.477011] [ 19.477318] The buggy address belongs to the physical page: [ 19.477370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 19.477451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.477503] page_type: f5(slab) [ 19.477543] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.477863] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.478134] page dumped because: kasan: bad access detected [ 19.478316] [ 19.478500] Memory state around the buggy address: [ 19.478645] fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.478708] fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.478885] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.478967] ^ [ 19.479013] fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.479338] fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.479413] ================================================================== [ 19.384100] ================================================================== [ 19.384173] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 19.384307] Write of size 4 at addr fff00000c76cc430 by task kunit_try_catch/266 [ 19.384517] [ 19.384597] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.387653] kasan_atomics+0xb8/0x2e0 [ 19.387798] kunit_try_run_case+0x170/0x3f0 [ 19.389547] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.390174] kthread+0x328/0x630 [ 19.390546] ret_from_fork+0x10/0x20 [ 19.390595] [ 19.390619] The buggy address belongs to the object at fff00000c76cc400 [ 19.390619] which belongs to the cache kmalloc-64 of size 64 [ 19.391966] Memory state around the buggy address: [ 19.392740] fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.395934] print_report+0x118/0x608 [ 19.396475] kasan_save_stack+0x3c/0x68 [ 19.396688] kasan_atomics+0xb8/0x2e0 [ 19.397870] [ 19.398122] page_type: f5(slab) [ 19.399084] [ 19.399605] ^ [ 19.399832] fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.401743] Hardware name: linux,dummy-virt (DT) [ 19.403135] kunit_try_run_case+0x170/0x3f0 [ 19.404887] kunit_try_run_case+0x170/0x3f0 [ 19.406100] [ 19.406268] page_type: f5(slab) [ 19.407203] fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.409997] show_stack+0x20/0x38 (C) [ 19.411593] kasan_save_track+0x20/0x40 [ 19.411981] kthread+0x328/0x630 [ 19.412274] [ 19.412398] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.412772] fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.417361] [ 19.417835] Call trace: [ 19.419136] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.421254] ret_from_fork+0x10/0x20 [ 19.421432] [ 19.421483] The buggy address belongs to the object at fff00000c76cc400 [ 19.421483] which belongs to the cache kmalloc-64 of size 64 [ 19.421649] The buggy address is located 0 bytes to the right of [ 19.421649] allocated 48-byte region [fff00000c76cc400, fff00000c76cc430) [ 19.421729] [ 19.421786] The buggy address belongs to the physical page: [ 19.422113] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 19.422368] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.422530] page_type: f5(slab) [ 19.422604] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.422956] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.423184] page dumped because: kasan: bad access detected [ 19.423339] [ 19.423426] Memory state around the buggy address: [ 19.423540] fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.423956] fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.424018] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.424091] ^ [ 19.424181] fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.424272] fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.424358] ================================================================== [ 19.620429] ================================================================== [ 19.620540] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 19.620592] Read of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266 [ 19.620659] [ 19.620759] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.620852] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.620890] Hardware name: linux,dummy-virt (DT) [ 19.621061] Call trace: [ 19.621121] show_stack+0x20/0x38 (C) [ 19.621303] dump_stack_lvl+0x8c/0xd0 [ 19.621365] print_report+0x118/0x608 [ 19.621539] kasan_report+0xdc/0x128 [ 19.621643] __asan_report_load8_noabort+0x20/0x30 [ 19.622000] kasan_atomics_helper+0x3db0/0x4858 [ 19.622202] kasan_atomics+0x198/0x2e0 [ 19.622285] kunit_try_run_case+0x170/0x3f0 [ 19.622617] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.622718] kthread+0x328/0x630 [ 19.622858] ret_from_fork+0x10/0x20 [ 19.622925] [ 19.622946] Allocated by task 266: [ 19.623180] kasan_save_stack+0x3c/0x68 [ 19.623383] kasan_save_track+0x20/0x40 [ 19.623469] kasan_save_alloc_info+0x40/0x58 [ 19.623537] __kasan_kmalloc+0xd4/0xd8 [ 19.624384] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.624481] kasan_atomics+0xb8/0x2e0 [ 19.624632] kunit_try_run_case+0x170/0x3f0 [ 19.624707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.624768] kthread+0x328/0x630 [ 19.624804] ret_from_fork+0x10/0x20 [ 19.624977] [ 19.625139] The buggy address belongs to the object at fff00000c76cc400 [ 19.625139] which belongs to the cache kmalloc-64 of size 64 [ 19.625966] The buggy address is located 0 bytes to the right of [ 19.625966] allocated 48-byte region [fff00000c76cc400, fff00000c76cc430) [ 19.626077] [ 19.626125] The buggy address belongs to the physical page: [ 19.626199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 19.626491] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.626731] page_type: f5(slab) [ 19.627105] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.627183] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.627503] page dumped because: kasan: bad access detected [ 19.627636] [ 19.627684] Memory state around the buggy address: [ 19.627722] fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.627959] fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.628157] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.628498] ^ [ 19.628576] fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.628750] fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.629014] ================================================================== [ 19.615121] ================================================================== [ 19.615243] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 19.615299] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266 [ 19.615350] [ 19.615383] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.615465] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.615493] Hardware name: linux,dummy-virt (DT) [ 19.615527] Call trace: [ 19.615800] show_stack+0x20/0x38 (C) [ 19.616080] dump_stack_lvl+0x8c/0xd0 [ 19.616294] print_report+0x118/0x608 [ 19.616350] kasan_report+0xdc/0x128 [ 19.616404] kasan_check_range+0x100/0x1a8 [ 19.616507] __kasan_check_write+0x20/0x30 [ 19.616574] kasan_atomics_helper+0x15b4/0x4858 [ 19.616624] kasan_atomics+0x198/0x2e0 [ 19.616697] kunit_try_run_case+0x170/0x3f0 [ 19.616743] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.616797] kthread+0x328/0x630 [ 19.616842] ret_from_fork+0x10/0x20 [ 19.616891] [ 19.616923] Allocated by task 266: [ 19.616966] kasan_save_stack+0x3c/0x68 [ 19.617009] kasan_save_track+0x20/0x40 [ 19.617059] kasan_save_alloc_info+0x40/0x58 [ 19.617109] __kasan_kmalloc+0xd4/0xd8 [ 19.617156] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.617198] kasan_atomics+0xb8/0x2e0 [ 19.617245] kunit_try_run_case+0x170/0x3f0 [ 19.617284] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.617329] kthread+0x328/0x630 [ 19.617369] ret_from_fork+0x10/0x20 [ 19.617405] [ 19.617427] The buggy address belongs to the object at fff00000c76cc400 [ 19.617427] which belongs to the cache kmalloc-64 of size 64 [ 19.617492] The buggy address is located 0 bytes to the right of [ 19.617492] allocated 48-byte region [fff00000c76cc400, fff00000c76cc430) [ 19.617559] [ 19.617582] The buggy address belongs to the physical page: [ 19.617614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 19.617675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.617724] page_type: f5(slab) [ 19.617764] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.617818] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.617884] page dumped because: kasan: bad access detected [ 19.617930] [ 19.617958] Memory state around the buggy address: [ 19.617993] fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.618572] fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.618636] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.618683] ^ [ 19.618717] fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.619422] fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.619531] ================================================================== [ 19.645955] ================================================================== [ 19.646418] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 19.646481] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266 [ 19.646696] [ 19.646766] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.647149] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.647238] Hardware name: linux,dummy-virt (DT) [ 19.647285] Call trace: [ 19.647330] show_stack+0x20/0x38 (C) [ 19.647432] dump_stack_lvl+0x8c/0xd0 [ 19.647509] print_report+0x118/0x608 [ 19.647633] kasan_report+0xdc/0x128 [ 19.647682] kasan_check_range+0x100/0x1a8 [ 19.647903] __kasan_check_write+0x20/0x30 [ 19.648450] kasan_atomics_helper+0x16d0/0x4858 [ 19.648613] kasan_atomics+0x198/0x2e0 [ 19.648699] kunit_try_run_case+0x170/0x3f0 [ 19.648836] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.648925] kthread+0x328/0x630 [ 19.648969] ret_from_fork+0x10/0x20 [ 19.649017] [ 19.649217] Allocated by task 266: [ 19.649408] kasan_save_stack+0x3c/0x68 [ 19.649765] kasan_save_track+0x20/0x40 [ 19.650781] kasan_save_alloc_info+0x40/0x58 [ 19.650997] __kasan_kmalloc+0xd4/0xd8 [ 19.651082] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.651144] kasan_atomics+0xb8/0x2e0 [ 19.651730] kunit_try_run_case+0x170/0x3f0 [ 19.651811] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.652559] kthread+0x328/0x630 [ 19.652894] ret_from_fork+0x10/0x20 [ 19.653196] [ 19.653255] The buggy address belongs to the object at fff00000c76cc400 [ 19.653255] which belongs to the cache kmalloc-64 of size 64 [ 19.653406] The buggy address is located 0 bytes to the right of [ 19.653406] allocated 48-byte region [fff00000c76cc400, fff00000c76cc430) [ 19.653522] [ 19.653737] The buggy address belongs to the physical page: [ 19.653930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 19.654262] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.654538] page_type: f5(slab) [ 19.654734] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.654815] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.655146] page dumped because: kasan: bad access detected [ 19.655194] [ 19.655360] Memory state around the buggy address: [ 19.655587] fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.655751] fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.655802] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.655843] ^ [ 19.656215] fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.656481] fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.656696] ================================================================== [ 19.425491] ================================================================== [ 19.425576] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 19.425630] Read of size 4 at addr fff00000c76cc430 by task kunit_try_catch/266 [ 19.425931] [ 19.425968] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.426351] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.426429] Hardware name: linux,dummy-virt (DT) [ 19.426480] Call trace: [ 19.426532] show_stack+0x20/0x38 (C) [ 19.426665] dump_stack_lvl+0x8c/0xd0 [ 19.426752] print_report+0x118/0x608 [ 19.426891] kasan_report+0xdc/0x128 [ 19.426970] __asan_report_load4_noabort+0x20/0x30 [ 19.427324] kasan_atomics_helper+0x3dd8/0x4858 [ 19.427615] kasan_atomics+0x198/0x2e0 [ 19.427739] kunit_try_run_case+0x170/0x3f0 [ 19.427883] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.427956] kthread+0x328/0x630 [ 19.428006] ret_from_fork+0x10/0x20 [ 19.428331] [ 19.428393] Allocated by task 266: [ 19.428727] kasan_save_stack+0x3c/0x68 [ 19.428953] kasan_save_track+0x20/0x40 [ 19.429176] kasan_save_alloc_info+0x40/0x58 [ 19.429318] __kasan_kmalloc+0xd4/0xd8 [ 19.429387] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.429799] kasan_atomics+0xb8/0x2e0 [ 19.429867] kunit_try_run_case+0x170/0x3f0 [ 19.430150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.430364] kthread+0x328/0x630 [ 19.430428] ret_from_fork+0x10/0x20 [ 19.430672] [ 19.430928] The buggy address belongs to the object at fff00000c76cc400 [ 19.430928] which belongs to the cache kmalloc-64 of size 64 [ 19.431268] The buggy address is located 0 bytes to the right of [ 19.431268] allocated 48-byte region [fff00000c76cc400, fff00000c76cc430) [ 19.431418] [ 19.431450] The buggy address belongs to the physical page: [ 19.431485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 19.431543] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.431664] page_type: f5(slab) [ 19.431714] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.431782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.431839] page dumped because: kasan: bad access detected [ 19.431870] [ 19.431900] Memory state around the buggy address: [ 19.431973] fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.432036] fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.432089] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.432129] ^ [ 19.432165] fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.432210] fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.432259] ================================================================== [ 19.495751] ================================================================== [ 19.495950] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 19.496014] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266 [ 19.496075] [ 19.496187] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.496289] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.496327] Hardware name: linux,dummy-virt (DT) [ 19.496963] Call trace: [ 19.497007] show_stack+0x20/0x38 (C) [ 19.497064] dump_stack_lvl+0x8c/0xd0 [ 19.497115] print_report+0x118/0x608 [ 19.497161] kasan_report+0xdc/0x128 [ 19.497208] kasan_check_range+0x100/0x1a8 [ 19.497256] __kasan_check_write+0x20/0x30 [ 19.497303] kasan_atomics_helper+0xf88/0x4858 [ 19.497352] kasan_atomics+0x198/0x2e0 [ 19.497396] kunit_try_run_case+0x170/0x3f0 [ 19.497443] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.497496] kthread+0x328/0x630 [ 19.497537] ret_from_fork+0x10/0x20 [ 19.497584] [ 19.497604] Allocated by task 266: [ 19.497635] kasan_save_stack+0x3c/0x68 [ 19.497676] kasan_save_track+0x20/0x40 [ 19.497716] kasan_save_alloc_info+0x40/0x58 [ 19.497757] __kasan_kmalloc+0xd4/0xd8 [ 19.497795] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.497836] kasan_atomics+0xb8/0x2e0 [ 19.497873] kunit_try_run_case+0x170/0x3f0 [ 19.497926] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.497972] kthread+0x328/0x630 [ 19.498985] ret_from_fork+0x10/0x20 [ 19.499257] [ 19.499331] The buggy address belongs to the object at fff00000c76cc400 [ 19.499331] which belongs to the cache kmalloc-64 of size 64 [ 19.499510] The buggy address is located 0 bytes to the right of [ 19.499510] allocated 48-byte region [fff00000c76cc400, fff00000c76cc430) [ 19.499582] [ 19.499925] The buggy address belongs to the physical page: [ 19.500394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 19.500612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.500834] page_type: f5(slab) [ 19.501254] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.501348] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.501680] page dumped because: kasan: bad access detected [ 19.501804] [ 19.501848] Memory state around the buggy address: [ 19.502205] fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.502415] fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.502867] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.503043] ^ [ 19.503223] fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.503402] fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.503446] ================================================================== [ 19.565471] ================================================================== [ 19.565532] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 19.565587] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266 [ 19.565638] [ 19.565670] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.565752] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.565781] Hardware name: linux,dummy-virt (DT) [ 19.565812] Call trace: [ 19.565838] show_stack+0x20/0x38 (C) [ 19.565887] dump_stack_lvl+0x8c/0xd0 [ 19.565950] print_report+0x118/0x608 [ 19.566004] kasan_report+0xdc/0x128 [ 19.566051] kasan_check_range+0x100/0x1a8 [ 19.566098] __kasan_check_write+0x20/0x30 [ 19.566144] kasan_atomics_helper+0x126c/0x4858 [ 19.566193] kasan_atomics+0x198/0x2e0 [ 19.566237] kunit_try_run_case+0x170/0x3f0 [ 19.566285] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.566338] kthread+0x328/0x630 [ 19.566379] ret_from_fork+0x10/0x20 [ 19.566427] [ 19.566447] Allocated by task 266: [ 19.566476] kasan_save_stack+0x3c/0x68 [ 19.566519] kasan_save_track+0x20/0x40 [ 19.566557] kasan_save_alloc_info+0x40/0x58 [ 19.566599] __kasan_kmalloc+0xd4/0xd8 [ 19.566636] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.566677] kasan_atomics+0xb8/0x2e0 [ 19.566716] kunit_try_run_case+0x170/0x3f0 [ 19.566757] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.566801] kthread+0x328/0x630 [ 19.566835] ret_from_fork+0x10/0x20 [ 19.566873] [ 19.566893] The buggy address belongs to the object at fff00000c76cc400 [ 19.566893] which belongs to the cache kmalloc-64 of size 64 [ 19.567801] The buggy address is located 0 bytes to the right of [ 19.567801] allocated 48-byte region [fff00000c76cc400, fff00000c76cc430) [ 19.568069] [ 19.568100] The buggy address belongs to the physical page: [ 19.568134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 19.568200] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.568250] page_type: f5(slab) [ 19.568464] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.568525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.568663] page dumped because: kasan: bad access detected [ 19.568799] [ 19.569080] Memory state around the buggy address: [ 19.569202] fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.569250] fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.569569] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.569635] ^ [ 19.569774] fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.569989] fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.570035] ================================================================== [ 19.276176] ================================================================== [ 19.279296] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 19.279404] [ 19.279520] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.279549] Hardware name: linux,dummy-virt (DT) [ 19.279848] __kasan_check_write+0x20/0x30 [ 19.280273] kthread+0x328/0x630 [ 19.282394] __kasan_kmalloc+0xd4/0xd8 [ 19.285465] [ 19.285977] [ 19.286000] The buggy address belongs to the physical page: [ 19.287978] page dumped because: kasan: bad access detected [ 19.291496] ^ [ 19.294382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 19.295183] kthread+0x328/0x630 [ 19.295722] [ 19.295865] [ 19.295885] The buggy address belongs to the physical page: [ 19.299538] page_type: f5(slab) [ 19.300225] page dumped because: kasan: bad access detected [ 19.303368] fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.303678] ================================================================== [ 19.464822] ================================================================== [ 19.464876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 19.464941] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266 [ 19.465281] [ 19.465379] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.465482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.465744] Hardware name: linux,dummy-virt (DT) [ 19.465801] Call trace: [ 19.465826] show_stack+0x20/0x38 (C) [ 19.466137] dump_stack_lvl+0x8c/0xd0 [ 19.466291] print_report+0x118/0x608 [ 19.466351] kasan_report+0xdc/0x128 [ 19.466414] kasan_check_range+0x100/0x1a8 [ 19.466481] __kasan_check_write+0x20/0x30 [ 19.466561] kasan_atomics_helper+0xe44/0x4858 [ 19.466785] kasan_atomics+0x198/0x2e0 [ 19.466993] kunit_try_run_case+0x170/0x3f0 [ 19.467075] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.467177] kthread+0x328/0x630 [ 19.467460] ret_from_fork+0x10/0x20 [ 19.467634] [ 19.467673] Allocated by task 266: [ 19.467731] kasan_save_stack+0x3c/0x68 [ 19.467879] kasan_save_track+0x20/0x40 [ 19.467943] kasan_save_alloc_info+0x40/0x58 [ 19.468327] __kasan_kmalloc+0xd4/0xd8 [ 19.468450] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.468537] kasan_atomics+0xb8/0x2e0 [ 19.468600] kunit_try_run_case+0x170/0x3f0 [ 19.468940] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.469139] kthread+0x328/0x630 [ 19.469218] ret_from_fork+0x10/0x20 [ 19.469264] [ 19.469288] The buggy address belongs to the object at fff00000c76cc400 [ 19.469288] which belongs to the cache kmalloc-64 of size 64 [ 19.469355] The buggy address is located 0 bytes to the right of [ 19.469355] allocated 48-byte region [fff00000c76cc400, fff00000c76cc430) [ 19.469422] [ 19.469455] The buggy address belongs to the physical page: [ 19.469488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 19.469544] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.469604] page_type: f5(slab) [ 19.469648] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.469701] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.469753] page dumped because: kasan: bad access detected [ 19.469815] [ 19.469850] Memory state around the buggy address: [ 19.469890] fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.469948] fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.470100] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.470654] ^ [ 19.470737] fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.470814] fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.470896] ================================================================== [ 19.597691] ================================================================== [ 19.597763] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 19.597827] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266 [ 19.598030] [ 19.598176] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.598280] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.598346] Hardware name: linux,dummy-virt (DT) [ 19.598391] Call trace: [ 19.598416] show_stack+0x20/0x38 (C) [ 19.598476] dump_stack_lvl+0x8c/0xd0 [ 19.598525] print_report+0x118/0x608 [ 19.598934] kasan_report+0xdc/0x128 [ 19.599059] kasan_check_range+0x100/0x1a8 [ 19.599282] __kasan_check_write+0x20/0x30 [ 19.599441] kasan_atomics_helper+0x14e4/0x4858 [ 19.599625] kasan_atomics+0x198/0x2e0 [ 19.599700] kunit_try_run_case+0x170/0x3f0 [ 19.599846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.599908] kthread+0x328/0x630 [ 19.599963] ret_from_fork+0x10/0x20 [ 19.600290] [ 19.600343] Allocated by task 266: [ 19.600516] kasan_save_stack+0x3c/0x68 [ 19.600736] kasan_save_track+0x20/0x40 [ 19.600886] kasan_save_alloc_info+0x40/0x58 [ 19.600985] __kasan_kmalloc+0xd4/0xd8 [ 19.601134] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.601199] kasan_atomics+0xb8/0x2e0 [ 19.601245] kunit_try_run_case+0x170/0x3f0 [ 19.601284] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.601602] kthread+0x328/0x630 [ 19.601660] ret_from_fork+0x10/0x20 [ 19.601837] [ 19.601898] The buggy address belongs to the object at fff00000c76cc400 [ 19.601898] which belongs to the cache kmalloc-64 of size 64 [ 19.601976] The buggy address is located 0 bytes to the right of [ 19.601976] allocated 48-byte region [fff00000c76cc400, fff00000c76cc430) [ 19.602042] [ 19.602066] The buggy address belongs to the physical page: [ 19.602098] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 19.602159] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.602243] page_type: f5(slab) [ 19.602292] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.602359] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.603708] page dumped because: kasan: bad access detected [ 19.603801] [ 19.603997] Memory state around the buggy address: [ 19.604282] fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.604894] fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.605009] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.605078] ^ [ 19.605270] fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.605436] fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.605552] ================================================================== [ 19.345226] ================================================================== [ 19.345335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 19.345610] Write of size 4 at addr fff00000c76cc430 by task kunit_try_catch/266 [ 19.345805] [ 19.345863] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.346088] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.346167] Hardware name: linux,dummy-virt (DT) [ 19.346278] Call trace: [ 19.346336] show_stack+0x20/0x38 (C) [ 19.346388] dump_stack_lvl+0x8c/0xd0 [ 19.346770] print_report+0x118/0x608 [ 19.347007] kasan_report+0xdc/0x128 [ 19.347063] kasan_check_range+0x100/0x1a8 [ 19.347133] __kasan_check_write+0x20/0x30 [ 19.347181] kasan_atomics_helper+0x99c/0x4858 [ 19.347446] ret_from_fork+0x10/0x20 [ 19.347496] [ 19.347773] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.348202] The buggy address is located 0 bytes to the right of [ 19.348202] allocated 48-byte region [fff00000c76cc400, fff00000c76cc430) [ 19.348753] fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.351653] Write of size 4 at addr fff00000c76cc430 by task kunit_try_catch/266 [ 19.355187] [ 19.355497] Allocated by task 266: [ 19.355586] kasan_save_stack+0x3c/0x68 [ 19.355741] kasan_save_track+0x20/0x40 [ 19.355849] kasan_save_alloc_info+0x40/0x58 [ 19.355984] __kasan_kmalloc+0xd4/0xd8 [ 19.356027] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.356603] kasan_atomics+0xb8/0x2e0 [ 19.356703] kunit_try_run_case+0x170/0x3f0 [ 19.356846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.356999] kthread+0x328/0x630 [ 19.357132] ret_from_fork+0x10/0x20 [ 19.357234] [ 19.357305] The buggy address belongs to the object at fff00000c76cc400 [ 19.357305] which belongs to the cache kmalloc-64 of size 64 [ 19.357459] The buggy address is located 0 bytes to the right of [ 19.357459] allocated 48-byte region [fff00000c76cc400, fff00000c76cc430) [ 19.357556] [ 19.357822] The buggy address belongs to the physical page: [ 19.357889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 19.358031] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.358138] page_type: f5(slab) [ 19.358467] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.358558] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.358677] page dumped because: kasan: bad access detected [ 19.358770] [ 19.358851] Memory state around the buggy address: [ 19.358888] fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.359155] fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.359246] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.359619] ^ [ 19.359757] fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.360047] fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.360116] ================================================================== [ 19.504957] ================================================================== [ 19.505223] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 19.505291] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266 [ 19.505344] [ 19.505376] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.505459] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.505631] Hardware name: linux,dummy-virt (DT) [ 19.505864] Call trace: [ 19.505903] show_stack+0x20/0x38 (C) [ 19.506215] dump_stack_lvl+0x8c/0xd0 [ 19.506369] print_report+0x118/0x608 [ 19.506533] kasan_report+0xdc/0x128 [ 19.506665] kasan_check_range+0x100/0x1a8 [ 19.506723] __kasan_check_write+0x20/0x30 [ 19.506770] kasan_atomics_helper+0xff0/0x4858 [ 19.507163] kasan_atomics+0x198/0x2e0 [ 19.507326] kunit_try_run_case+0x170/0x3f0 [ 19.507516] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.507671] kthread+0x328/0x630 [ 19.507826] ret_from_fork+0x10/0x20 [ 19.508005] [ 19.508028] Allocated by task 266: [ 19.508060] kasan_save_stack+0x3c/0x68 [ 19.508412] kasan_save_track+0x20/0x40 [ 19.508490] kasan_save_alloc_info+0x40/0x58 [ 19.508699] __kasan_kmalloc+0xd4/0xd8 [ 19.508933] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.509077] kasan_atomics+0xb8/0x2e0 [ 19.509195] kunit_try_run_case+0x170/0x3f0 [ 19.509295] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.509343] kthread+0x328/0x630 [ 19.509656] ret_from_fork+0x10/0x20 [ 19.509707] [ 19.509771] The buggy address belongs to the object at fff00000c76cc400 [ 19.509771] which belongs to the cache kmalloc-64 of size 64 [ 19.509833] The buggy address is located 0 bytes to the right of [ 19.509833] allocated 48-byte region [fff00000c76cc400, fff00000c76cc430) [ 19.509899] [ 19.509952] The buggy address belongs to the physical page: [ 19.510219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 19.510723] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.510787] page_type: f5(slab) [ 19.511256] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.511341] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.511654] page dumped because: kasan: bad access detected [ 19.511711] [ 19.511764] Memory state around the buggy address: [ 19.512118] fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.512564] fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.512752] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.512805] ^ [ 19.512841] fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.513130] fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.513305] ================================================================== [ 19.455127] ================================================================== [ 19.455180] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 19.455290] Read of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266 [ 19.455379] [ 19.455415] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.455509] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.455640] Hardware name: linux,dummy-virt (DT) [ 19.455779] Call trace: [ 19.455963] show_stack+0x20/0x38 (C) [ 19.456315] dump_stack_lvl+0x8c/0xd0 [ 19.456454] print_report+0x118/0x608 [ 19.456529] kasan_report+0xdc/0x128 [ 19.456585] __asan_report_load8_noabort+0x20/0x30 [ 19.456647] kasan_atomics_helper+0x3f58/0x4858 [ 19.456745] kasan_atomics+0x198/0x2e0 [ 19.456796] kunit_try_run_case+0x170/0x3f0 [ 19.456844] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.457164] kthread+0x328/0x630 [ 19.457229] ret_from_fork+0x10/0x20 [ 19.457629] [ 19.457663] Allocated by task 266: [ 19.457699] kasan_save_stack+0x3c/0x68 [ 19.458017] kasan_save_track+0x20/0x40 [ 19.458105] kasan_save_alloc_info+0x40/0x58 [ 19.458193] __kasan_kmalloc+0xd4/0xd8 [ 19.458383] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.458713] kasan_atomics+0xb8/0x2e0 [ 19.458770] kunit_try_run_case+0x170/0x3f0 [ 19.458810] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.458856] kthread+0x328/0x630 [ 19.459175] ret_from_fork+0x10/0x20 [ 19.460779] [ 19.460852] The buggy address belongs to the object at fff00000c76cc400 [ 19.460852] which belongs to the cache kmalloc-64 of size 64 [ 19.461203] The buggy address is located 0 bytes to the right of [ 19.461203] allocated 48-byte region [fff00000c76cc400, fff00000c76cc430) [ 19.461651] [ 19.461857] The buggy address belongs to the physical page: [ 19.461904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 19.461975] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.462027] page_type: f5(slab) [ 19.462071] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.462570] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.462752] page dumped because: kasan: bad access detected [ 19.462840] [ 19.462861] Memory state around the buggy address: [ 19.462902] fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.463119] fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.463312] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.463616] ^ [ 19.463697] fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.463805] fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.463875] ================================================================== [ 19.434233] ================================================================== [ 19.434286] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 19.434336] Write of size 4 at addr fff00000c76cc430 by task kunit_try_catch/266 [ 19.434386] [ 19.434417] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.434500] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.434527] Hardware name: linux,dummy-virt (DT) [ 19.434559] Call trace: [ 19.434582] show_stack+0x20/0x38 (C) [ 19.434628] dump_stack_lvl+0x8c/0xd0 [ 19.434676] print_report+0x118/0x608 [ 19.434721] kasan_report+0xdc/0x128 [ 19.434769] kasan_check_range+0x100/0x1a8 [ 19.434816] __kasan_check_write+0x20/0x30 [ 19.434860] kasan_atomics_helper+0xd3c/0x4858 [ 19.434922] kasan_atomics+0x198/0x2e0 [ 19.434969] kunit_try_run_case+0x170/0x3f0 [ 19.435018] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.435071] kthread+0x328/0x630 [ 19.435114] ret_from_fork+0x10/0x20 [ 19.435162] [ 19.435185] Allocated by task 266: [ 19.435214] kasan_save_stack+0x3c/0x68 [ 19.435267] kasan_save_track+0x20/0x40 [ 19.435311] kasan_save_alloc_info+0x40/0x58 [ 19.435440] __kasan_kmalloc+0xd4/0xd8 [ 19.435485] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.435548] kasan_atomics+0xb8/0x2e0 [ 19.435586] kunit_try_run_case+0x170/0x3f0 [ 19.435627] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.435692] kthread+0x328/0x630 [ 19.435726] ret_from_fork+0x10/0x20 [ 19.435765] [ 19.435788] The buggy address belongs to the object at fff00000c76cc400 [ 19.435788] which belongs to the cache kmalloc-64 of size 64 [ 19.436486] The buggy address is located 0 bytes to the right of [ 19.436486] allocated 48-byte region [fff00000c76cc400, fff00000c76cc430) [ 19.436679] [ 19.436704] The buggy address belongs to the physical page: [ 19.436996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 19.437176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.437477] page_type: f5(slab) [ 19.437772] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.437834] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.437887] page dumped because: kasan: bad access detected [ 19.437943] [ 19.437974] Memory state around the buggy address: [ 19.438055] fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.438394] fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.438510] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.438640] ^ [ 19.438701] fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.439003] fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.439078] ================================================================== [ 19.672485] ================================================================== [ 19.672653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 19.672714] Read of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266 [ 19.672851] [ 19.672905] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.673150] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.673297] Hardware name: linux,dummy-virt (DT) [ 19.673339] Call trace: [ 19.673371] show_stack+0x20/0x38 (C) [ 19.673585] dump_stack_lvl+0x8c/0xd0 [ 19.673803] print_report+0x118/0x608 [ 19.673940] kasan_report+0xdc/0x128 [ 19.673994] __asan_report_load8_noabort+0x20/0x30 [ 19.674142] kasan_atomics_helper+0x3e20/0x4858 [ 19.674216] kasan_atomics+0x198/0x2e0 [ 19.674401] kunit_try_run_case+0x170/0x3f0 [ 19.674656] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.674820] kthread+0x328/0x630 [ 19.675166] ret_from_fork+0x10/0x20 [ 19.675308] [ 19.675359] Allocated by task 266: [ 19.675541] kasan_save_stack+0x3c/0x68 [ 19.675787] kasan_save_track+0x20/0x40 [ 19.675858] kasan_save_alloc_info+0x40/0x58 [ 19.676205] __kasan_kmalloc+0xd4/0xd8 [ 19.676246] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.676287] kasan_atomics+0xb8/0x2e0 [ 19.676323] kunit_try_run_case+0x170/0x3f0 [ 19.676362] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.676406] kthread+0x328/0x630 [ 19.676442] ret_from_fork+0x10/0x20 [ 19.676479] [ 19.676500] The buggy address belongs to the object at fff00000c76cc400 [ 19.676500] which belongs to the cache kmalloc-64 of size 64 [ 19.676561] The buggy address is located 0 bytes to the right of [ 19.676561] allocated 48-byte region [fff00000c76cc400, fff00000c76cc430) [ 19.676674] [ 19.676722] The buggy address belongs to the physical page: [ 19.676779] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 19.676997] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.677066] page_type: f5(slab) [ 19.677219] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.677356] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.677414] page dumped because: kasan: bad access detected [ 19.677448] [ 19.677468] Memory state around the buggy address: [ 19.677765] fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.678192] fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.678266] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.678330] ^ [ 19.678366] fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.678773] fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.678862] ================================================================== [ 19.520094] ================================================================== [ 19.520159] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 19.520211] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266 [ 19.520758] [ 19.520811] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.520896] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.521225] Hardware name: linux,dummy-virt (DT) [ 19.521276] Call trace: [ 19.521356] show_stack+0x20/0x38 (C) [ 19.521498] dump_stack_lvl+0x8c/0xd0 [ 19.521546] print_report+0x118/0x608 [ 19.521594] kasan_report+0xdc/0x128 [ 19.521639] kasan_check_range+0x100/0x1a8 [ 19.522024] __kasan_check_write+0x20/0x30 [ 19.522094] kasan_atomics_helper+0x10c0/0x4858 [ 19.522146] kasan_atomics+0x198/0x2e0 [ 19.522193] kunit_try_run_case+0x170/0x3f0 [ 19.522532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.522863] kthread+0x328/0x630 [ 19.522927] ret_from_fork+0x10/0x20 [ 19.523130] [ 19.523205] Allocated by task 266: [ 19.523297] kasan_save_stack+0x3c/0x68 [ 19.523555] kasan_save_track+0x20/0x40 [ 19.523758] kasan_save_alloc_info+0x40/0x58 [ 19.523834] __kasan_kmalloc+0xd4/0xd8 [ 19.524037] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.524452] kasan_atomics+0xb8/0x2e0 [ 19.524524] kunit_try_run_case+0x170/0x3f0 [ 19.524704] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.525098] kthread+0x328/0x630 [ 19.525170] ret_from_fork+0x10/0x20 [ 19.525241] [ 19.525322] The buggy address belongs to the object at fff00000c76cc400 [ 19.525322] which belongs to the cache kmalloc-64 of size 64 [ 19.525635] The buggy address is located 0 bytes to the right of [ 19.525635] allocated 48-byte region [fff00000c76cc400, fff00000c76cc430) [ 19.525850] [ 19.525875] The buggy address belongs to the physical page: [ 19.526281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 19.526667] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.526794] page_type: f5(slab) [ 19.526839] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.526931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.526976] page dumped because: kasan: bad access detected [ 19.527433] [ 19.527518] Memory state around the buggy address: [ 19.527717] fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.528094] fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.528219] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.528585] ^ [ 19.528655] fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.529060] fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.529132] ==================================================================
[ 17.042392] ================================================================== [ 17.043016] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 17.043752] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 17.044281] [ 17.044426] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.044511] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.044539] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.044578] Call Trace: [ 17.044608] <TASK> [ 17.044653] dump_stack_lvl+0x73/0xb0 [ 17.044712] print_report+0xd1/0x650 [ 17.044756] ? __virt_addr_valid+0x1db/0x2d0 [ 17.044791] ? kasan_atomics_helper+0x12e6/0x5450 [ 17.044829] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.044872] ? kasan_atomics_helper+0x12e6/0x5450 [ 17.044908] kasan_report+0x141/0x180 [ 17.044993] ? kasan_atomics_helper+0x12e6/0x5450 [ 17.045055] kasan_check_range+0x10c/0x1c0 [ 17.045131] __kasan_check_write+0x18/0x20 [ 17.045174] kasan_atomics_helper+0x12e6/0x5450 [ 17.045240] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.045297] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.045345] ? trace_hardirqs_on+0x37/0xe0 [ 17.045389] ? kasan_atomics+0x152/0x310 [ 17.045448] kasan_atomics+0x1dc/0x310 [ 17.045493] ? __pfx_kasan_atomics+0x10/0x10 [ 17.045539] ? __pfx_kasan_atomics+0x10/0x10 [ 17.045589] kunit_try_run_case+0x1a5/0x480 [ 17.045638] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.045668] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.045698] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.045729] ? __kthread_parkme+0x82/0x180 [ 17.045755] ? preempt_count_sub+0x50/0x80 [ 17.045785] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.045813] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.045835] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.045857] kthread+0x337/0x6f0 [ 17.045877] ? trace_preempt_on+0x20/0xc0 [ 17.045899] ? __pfx_kthread+0x10/0x10 [ 17.045930] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.045951] ? calculate_sigpending+0x7b/0xa0 [ 17.045975] ? __pfx_kthread+0x10/0x10 [ 17.045996] ret_from_fork+0x116/0x1d0 [ 17.046015] ? __pfx_kthread+0x10/0x10 [ 17.046035] ret_from_fork_asm+0x1a/0x30 [ 17.046065] </TASK> [ 17.046079] [ 17.056393] Allocated by task 283: [ 17.056576] kasan_save_stack+0x45/0x70 [ 17.056867] kasan_save_track+0x18/0x40 [ 17.057168] kasan_save_alloc_info+0x3b/0x50 [ 17.057443] __kasan_kmalloc+0xb7/0xc0 [ 17.057736] __kmalloc_cache_noprof+0x189/0x420 [ 17.057935] kasan_atomics+0x95/0x310 [ 17.058102] kunit_try_run_case+0x1a5/0x480 [ 17.058281] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.058487] kthread+0x337/0x6f0 [ 17.058759] ret_from_fork+0x116/0x1d0 [ 17.059068] ret_from_fork_asm+0x1a/0x30 [ 17.059408] [ 17.059678] The buggy address belongs to the object at ffff888102ac4100 [ 17.059678] which belongs to the cache kmalloc-64 of size 64 [ 17.061358] The buggy address is located 0 bytes to the right of [ 17.061358] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 17.061810] [ 17.062499] The buggy address belongs to the physical page: [ 17.062834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 17.063110] flags: 0x200000000000000(node=0|zone=2) [ 17.063743] page_type: f5(slab) [ 17.064119] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.064820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.065127] page dumped because: kasan: bad access detected [ 17.065580] [ 17.065759] Memory state around the buggy address: [ 17.066039] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.066479] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.067382] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.067792] ^ [ 17.068289] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.068688] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.069077] ================================================================== [ 17.277736] ================================================================== [ 17.278475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 17.278748] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 17.279394] [ 17.279565] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.279678] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.279706] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.279740] Call Trace: [ 17.279774] <TASK> [ 17.279804] dump_stack_lvl+0x73/0xb0 [ 17.279871] print_report+0xd1/0x650 [ 17.279933] ? __virt_addr_valid+0x1db/0x2d0 [ 17.279972] ? kasan_atomics_helper+0x16e7/0x5450 [ 17.280007] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.280033] ? kasan_atomics_helper+0x16e7/0x5450 [ 17.280055] kasan_report+0x141/0x180 [ 17.280077] ? kasan_atomics_helper+0x16e7/0x5450 [ 17.280110] kasan_check_range+0x10c/0x1c0 [ 17.280148] __kasan_check_write+0x18/0x20 [ 17.280185] kasan_atomics_helper+0x16e7/0x5450 [ 17.280230] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.280277] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.280321] ? trace_hardirqs_on+0x37/0xe0 [ 17.280359] ? kasan_atomics+0x152/0x310 [ 17.280404] kasan_atomics+0x1dc/0x310 [ 17.280447] ? __pfx_kasan_atomics+0x10/0x10 [ 17.280493] ? __pfx_kasan_atomics+0x10/0x10 [ 17.280547] kunit_try_run_case+0x1a5/0x480 [ 17.280588] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.280611] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.280665] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.280687] ? __kthread_parkme+0x82/0x180 [ 17.280708] ? preempt_count_sub+0x50/0x80 [ 17.280732] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.280756] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.280778] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.280800] kthread+0x337/0x6f0 [ 17.280820] ? trace_preempt_on+0x20/0xc0 [ 17.280841] ? __pfx_kthread+0x10/0x10 [ 17.280862] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.280882] ? calculate_sigpending+0x7b/0xa0 [ 17.280905] ? __pfx_kthread+0x10/0x10 [ 17.280926] ret_from_fork+0x116/0x1d0 [ 17.280945] ? __pfx_kthread+0x10/0x10 [ 17.280965] ret_from_fork_asm+0x1a/0x30 [ 17.280995] </TASK> [ 17.281008] [ 17.289708] Allocated by task 283: [ 17.289963] kasan_save_stack+0x45/0x70 [ 17.290144] kasan_save_track+0x18/0x40 [ 17.290314] kasan_save_alloc_info+0x3b/0x50 [ 17.290493] __kasan_kmalloc+0xb7/0xc0 [ 17.290668] __kmalloc_cache_noprof+0x189/0x420 [ 17.291006] kasan_atomics+0x95/0x310 [ 17.291291] kunit_try_run_case+0x1a5/0x480 [ 17.291711] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.292091] kthread+0x337/0x6f0 [ 17.292405] ret_from_fork+0x116/0x1d0 [ 17.292667] ret_from_fork_asm+0x1a/0x30 [ 17.292857] [ 17.293017] The buggy address belongs to the object at ffff888102ac4100 [ 17.293017] which belongs to the cache kmalloc-64 of size 64 [ 17.293372] The buggy address is located 0 bytes to the right of [ 17.293372] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 17.293904] [ 17.294070] The buggy address belongs to the physical page: [ 17.294573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 17.295200] flags: 0x200000000000000(node=0|zone=2) [ 17.295463] page_type: f5(slab) [ 17.295633] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.295890] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.296131] page dumped because: kasan: bad access detected [ 17.296504] [ 17.296667] Memory state around the buggy address: [ 17.297126] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.297578] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.298053] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.298372] ^ [ 17.298632] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.298949] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.299506] ================================================================== [ 16.497858] ================================================================== [ 16.499028] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 16.499514] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 16.499822] [ 16.500029] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.500154] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.500183] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.500221] Call Trace: [ 16.500257] <TASK> [ 16.500290] dump_stack_lvl+0x73/0xb0 [ 16.500362] print_report+0xd1/0x650 [ 16.500403] ? __virt_addr_valid+0x1db/0x2d0 [ 16.500446] ? kasan_atomics_helper+0x7c7/0x5450 [ 16.500494] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.500557] ? kasan_atomics_helper+0x7c7/0x5450 [ 16.500603] kasan_report+0x141/0x180 [ 16.500664] ? kasan_atomics_helper+0x7c7/0x5450 [ 16.500712] kasan_check_range+0x10c/0x1c0 [ 16.500759] __kasan_check_write+0x18/0x20 [ 16.500800] kasan_atomics_helper+0x7c7/0x5450 [ 16.500842] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.500875] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.500901] ? trace_hardirqs_on+0x37/0xe0 [ 16.500925] ? kasan_atomics+0x152/0x310 [ 16.500951] kasan_atomics+0x1dc/0x310 [ 16.500975] ? __pfx_kasan_atomics+0x10/0x10 [ 16.500997] ? __pfx_kasan_atomics+0x10/0x10 [ 16.501024] kunit_try_run_case+0x1a5/0x480 [ 16.501047] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.501069] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.501092] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.501151] ? __kthread_parkme+0x82/0x180 [ 16.501171] ? preempt_count_sub+0x50/0x80 [ 16.501196] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.501219] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.501242] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.501263] kthread+0x337/0x6f0 [ 16.501283] ? trace_preempt_on+0x20/0xc0 [ 16.501304] ? __pfx_kthread+0x10/0x10 [ 16.501324] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.501345] ? calculate_sigpending+0x7b/0xa0 [ 16.501368] ? __pfx_kthread+0x10/0x10 [ 16.501389] ret_from_fork+0x116/0x1d0 [ 16.501407] ? __pfx_kthread+0x10/0x10 [ 16.501427] ret_from_fork_asm+0x1a/0x30 [ 16.501457] </TASK> [ 16.501470] [ 16.510740] Allocated by task 283: [ 16.510963] kasan_save_stack+0x45/0x70 [ 16.511206] kasan_save_track+0x18/0x40 [ 16.511481] kasan_save_alloc_info+0x3b/0x50 [ 16.511806] __kasan_kmalloc+0xb7/0xc0 [ 16.512079] __kmalloc_cache_noprof+0x189/0x420 [ 16.512380] kasan_atomics+0x95/0x310 [ 16.512554] kunit_try_run_case+0x1a5/0x480 [ 16.512850] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.513137] kthread+0x337/0x6f0 [ 16.513402] ret_from_fork+0x116/0x1d0 [ 16.513573] ret_from_fork_asm+0x1a/0x30 [ 16.513756] [ 16.513900] The buggy address belongs to the object at ffff888102ac4100 [ 16.513900] which belongs to the cache kmalloc-64 of size 64 [ 16.514703] The buggy address is located 0 bytes to the right of [ 16.514703] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 16.515217] [ 16.515329] The buggy address belongs to the physical page: [ 16.515701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 16.516227] flags: 0x200000000000000(node=0|zone=2) [ 16.516556] page_type: f5(slab) [ 16.516788] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.517257] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.517609] page dumped because: kasan: bad access detected [ 16.517837] [ 16.517996] Memory state around the buggy address: [ 16.518305] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.518545] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.518792] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.519024] ^ [ 16.519379] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.519871] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.520372] ================================================================== [ 17.092347] ================================================================== [ 17.092800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 17.093280] Read of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 17.093581] [ 17.093778] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.093858] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.093885] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.093925] Call Trace: [ 17.093955] <TASK> [ 17.093983] dump_stack_lvl+0x73/0xb0 [ 17.094035] print_report+0xd1/0x650 [ 17.094074] ? __virt_addr_valid+0x1db/0x2d0 [ 17.094148] ? kasan_atomics_helper+0x13b5/0x5450 [ 17.094186] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.094231] ? kasan_atomics_helper+0x13b5/0x5450 [ 17.094272] kasan_report+0x141/0x180 [ 17.094310] ? kasan_atomics_helper+0x13b5/0x5450 [ 17.094356] kasan_check_range+0x10c/0x1c0 [ 17.094400] __kasan_check_read+0x15/0x20 [ 17.094436] kasan_atomics_helper+0x13b5/0x5450 [ 17.094480] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.094523] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.094571] ? trace_hardirqs_on+0x37/0xe0 [ 17.094628] ? kasan_atomics+0x152/0x310 [ 17.094684] kasan_atomics+0x1dc/0x310 [ 17.094730] ? __pfx_kasan_atomics+0x10/0x10 [ 17.094778] ? __pfx_kasan_atomics+0x10/0x10 [ 17.094833] kunit_try_run_case+0x1a5/0x480 [ 17.094879] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.094923] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.094970] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.095015] ? __kthread_parkme+0x82/0x180 [ 17.095057] ? preempt_count_sub+0x50/0x80 [ 17.095125] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.095169] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.095210] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.095256] kthread+0x337/0x6f0 [ 17.095296] ? trace_preempt_on+0x20/0xc0 [ 17.095341] ? __pfx_kthread+0x10/0x10 [ 17.095386] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.095429] ? calculate_sigpending+0x7b/0xa0 [ 17.095477] ? __pfx_kthread+0x10/0x10 [ 17.095523] ret_from_fork+0x116/0x1d0 [ 17.095562] ? __pfx_kthread+0x10/0x10 [ 17.095605] ret_from_fork_asm+0x1a/0x30 [ 17.095683] </TASK> [ 17.095709] [ 17.104438] Allocated by task 283: [ 17.104677] kasan_save_stack+0x45/0x70 [ 17.104901] kasan_save_track+0x18/0x40 [ 17.105183] kasan_save_alloc_info+0x3b/0x50 [ 17.105425] __kasan_kmalloc+0xb7/0xc0 [ 17.105612] __kmalloc_cache_noprof+0x189/0x420 [ 17.105923] kasan_atomics+0x95/0x310 [ 17.106190] kunit_try_run_case+0x1a5/0x480 [ 17.106463] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.106675] kthread+0x337/0x6f0 [ 17.106930] ret_from_fork+0x116/0x1d0 [ 17.107185] ret_from_fork_asm+0x1a/0x30 [ 17.107388] [ 17.107541] The buggy address belongs to the object at ffff888102ac4100 [ 17.107541] which belongs to the cache kmalloc-64 of size 64 [ 17.108006] The buggy address is located 0 bytes to the right of [ 17.108006] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 17.108709] [ 17.108861] The buggy address belongs to the physical page: [ 17.109049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 17.109331] flags: 0x200000000000000(node=0|zone=2) [ 17.109531] page_type: f5(slab) [ 17.109699] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.109957] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.110223] page dumped because: kasan: bad access detected [ 17.110420] [ 17.110525] Memory state around the buggy address: [ 17.110793] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.111284] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.111768] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.112262] ^ [ 17.112542] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.113010] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.113507] ================================================================== [ 17.195082] ================================================================== [ 17.195439] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 17.196137] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 17.196473] [ 17.196696] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.196776] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.196801] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.196839] Call Trace: [ 17.196881] <TASK> [ 17.196910] dump_stack_lvl+0x73/0xb0 [ 17.196977] print_report+0xd1/0x650 [ 17.197033] ? __virt_addr_valid+0x1db/0x2d0 [ 17.197085] ? kasan_atomics_helper+0x151d/0x5450 [ 17.197126] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.197185] ? kasan_atomics_helper+0x151d/0x5450 [ 17.197237] kasan_report+0x141/0x180 [ 17.197291] ? kasan_atomics_helper+0x151d/0x5450 [ 17.197354] kasan_check_range+0x10c/0x1c0 [ 17.197411] __kasan_check_write+0x18/0x20 [ 17.197451] kasan_atomics_helper+0x151d/0x5450 [ 17.197506] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.197560] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.197629] ? trace_hardirqs_on+0x37/0xe0 [ 17.197672] ? kasan_atomics+0x152/0x310 [ 17.197725] kasan_atomics+0x1dc/0x310 [ 17.197789] ? __pfx_kasan_atomics+0x10/0x10 [ 17.197829] ? __pfx_kasan_atomics+0x10/0x10 [ 17.197880] kunit_try_run_case+0x1a5/0x480 [ 17.197935] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.197980] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.198028] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.198075] ? __kthread_parkme+0x82/0x180 [ 17.198114] ? preempt_count_sub+0x50/0x80 [ 17.198161] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.198208] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.198254] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.198299] kthread+0x337/0x6f0 [ 17.198339] ? trace_preempt_on+0x20/0xc0 [ 17.198387] ? __pfx_kthread+0x10/0x10 [ 17.198431] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.198473] ? calculate_sigpending+0x7b/0xa0 [ 17.198520] ? __pfx_kthread+0x10/0x10 [ 17.198564] ret_from_fork+0x116/0x1d0 [ 17.198604] ? __pfx_kthread+0x10/0x10 [ 17.198660] ret_from_fork_asm+0x1a/0x30 [ 17.198723] </TASK> [ 17.198751] [ 17.210390] Allocated by task 283: [ 17.210728] kasan_save_stack+0x45/0x70 [ 17.211040] kasan_save_track+0x18/0x40 [ 17.211409] kasan_save_alloc_info+0x3b/0x50 [ 17.211752] __kasan_kmalloc+0xb7/0xc0 [ 17.211936] __kmalloc_cache_noprof+0x189/0x420 [ 17.212195] kasan_atomics+0x95/0x310 [ 17.212365] kunit_try_run_case+0x1a5/0x480 [ 17.212547] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.212961] kthread+0x337/0x6f0 [ 17.213303] ret_from_fork+0x116/0x1d0 [ 17.213691] ret_from_fork_asm+0x1a/0x30 [ 17.214033] [ 17.214230] The buggy address belongs to the object at ffff888102ac4100 [ 17.214230] which belongs to the cache kmalloc-64 of size 64 [ 17.215015] The buggy address is located 0 bytes to the right of [ 17.215015] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 17.215594] [ 17.215782] The buggy address belongs to the physical page: [ 17.216193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 17.216653] flags: 0x200000000000000(node=0|zone=2) [ 17.216946] page_type: f5(slab) [ 17.217269] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.217647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.217980] page dumped because: kasan: bad access detected [ 17.218423] [ 17.218584] Memory state around the buggy address: [ 17.218896] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.219427] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.219777] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.220214] ^ [ 17.220576] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.220969] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.221440] ================================================================== [ 17.069989] ================================================================== [ 17.070539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 17.071166] Read of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 17.071706] [ 17.071902] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.071979] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.072006] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.072046] Call Trace: [ 17.072074] <TASK> [ 17.072138] dump_stack_lvl+0x73/0xb0 [ 17.072198] print_report+0xd1/0x650 [ 17.072240] ? __virt_addr_valid+0x1db/0x2d0 [ 17.072280] ? kasan_atomics_helper+0x49ce/0x5450 [ 17.072320] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.072360] ? kasan_atomics_helper+0x49ce/0x5450 [ 17.072404] kasan_report+0x141/0x180 [ 17.072448] ? kasan_atomics_helper+0x49ce/0x5450 [ 17.072501] __asan_report_load4_noabort+0x18/0x20 [ 17.072549] kasan_atomics_helper+0x49ce/0x5450 [ 17.072596] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.072655] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.072701] ? trace_hardirqs_on+0x37/0xe0 [ 17.072738] ? kasan_atomics+0x152/0x310 [ 17.072787] kasan_atomics+0x1dc/0x310 [ 17.072827] ? __pfx_kasan_atomics+0x10/0x10 [ 17.072865] ? __pfx_kasan_atomics+0x10/0x10 [ 17.072914] kunit_try_run_case+0x1a5/0x480 [ 17.072957] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.073000] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.073044] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.073081] ? __kthread_parkme+0x82/0x180 [ 17.073150] ? preempt_count_sub+0x50/0x80 [ 17.073194] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.073240] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.073288] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.073332] kthread+0x337/0x6f0 [ 17.073360] ? trace_preempt_on+0x20/0xc0 [ 17.073383] ? __pfx_kthread+0x10/0x10 [ 17.073403] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.073424] ? calculate_sigpending+0x7b/0xa0 [ 17.073448] ? __pfx_kthread+0x10/0x10 [ 17.073469] ret_from_fork+0x116/0x1d0 [ 17.073488] ? __pfx_kthread+0x10/0x10 [ 17.073508] ret_from_fork_asm+0x1a/0x30 [ 17.073539] </TASK> [ 17.073553] [ 17.081812] Allocated by task 283: [ 17.081997] kasan_save_stack+0x45/0x70 [ 17.082317] kasan_save_track+0x18/0x40 [ 17.082606] kasan_save_alloc_info+0x3b/0x50 [ 17.082934] __kasan_kmalloc+0xb7/0xc0 [ 17.083233] __kmalloc_cache_noprof+0x189/0x420 [ 17.083537] kasan_atomics+0x95/0x310 [ 17.083842] kunit_try_run_case+0x1a5/0x480 [ 17.084051] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.084424] kthread+0x337/0x6f0 [ 17.084696] ret_from_fork+0x116/0x1d0 [ 17.084881] ret_from_fork_asm+0x1a/0x30 [ 17.085175] [ 17.085334] The buggy address belongs to the object at ffff888102ac4100 [ 17.085334] which belongs to the cache kmalloc-64 of size 64 [ 17.085921] The buggy address is located 0 bytes to the right of [ 17.085921] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 17.086378] [ 17.086541] The buggy address belongs to the physical page: [ 17.086901] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 17.087195] flags: 0x200000000000000(node=0|zone=2) [ 17.087393] page_type: f5(slab) [ 17.087552] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.087919] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.088421] page dumped because: kasan: bad access detected [ 17.088816] [ 17.088978] Memory state around the buggy address: [ 17.089347] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.089820] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.090130] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.090475] ^ [ 17.090753] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.090994] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.091465] ================================================================== [ 16.521212] ================================================================== [ 16.521594] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 16.522131] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 16.522513] [ 16.522723] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.522802] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.522827] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.522866] Call Trace: [ 16.522895] <TASK> [ 16.522924] dump_stack_lvl+0x73/0xb0 [ 16.522980] print_report+0xd1/0x650 [ 16.523022] ? __virt_addr_valid+0x1db/0x2d0 [ 16.523059] ? kasan_atomics_helper+0x860/0x5450 [ 16.523131] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.523183] ? kasan_atomics_helper+0x860/0x5450 [ 16.523225] kasan_report+0x141/0x180 [ 16.523266] ? kasan_atomics_helper+0x860/0x5450 [ 16.523316] kasan_check_range+0x10c/0x1c0 [ 16.523363] __kasan_check_write+0x18/0x20 [ 16.523403] kasan_atomics_helper+0x860/0x5450 [ 16.523446] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.523489] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.523529] ? trace_hardirqs_on+0x37/0xe0 [ 16.523570] ? kasan_atomics+0x152/0x310 [ 16.523634] kasan_atomics+0x1dc/0x310 [ 16.523681] ? __pfx_kasan_atomics+0x10/0x10 [ 16.523726] ? __pfx_kasan_atomics+0x10/0x10 [ 16.523776] kunit_try_run_case+0x1a5/0x480 [ 16.523820] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.523860] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.523906] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.523952] ? __kthread_parkme+0x82/0x180 [ 16.523990] ? preempt_count_sub+0x50/0x80 [ 16.524034] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.524078] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.524154] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.524200] kthread+0x337/0x6f0 [ 16.524241] ? trace_preempt_on+0x20/0xc0 [ 16.524285] ? __pfx_kthread+0x10/0x10 [ 16.524322] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.524359] ? calculate_sigpending+0x7b/0xa0 [ 16.524400] ? __pfx_kthread+0x10/0x10 [ 16.524443] ret_from_fork+0x116/0x1d0 [ 16.524481] ? __pfx_kthread+0x10/0x10 [ 16.524523] ret_from_fork_asm+0x1a/0x30 [ 16.524582] </TASK> [ 16.524602] [ 16.533132] Allocated by task 283: [ 16.533315] kasan_save_stack+0x45/0x70 [ 16.533500] kasan_save_track+0x18/0x40 [ 16.533714] kasan_save_alloc_info+0x3b/0x50 [ 16.534046] __kasan_kmalloc+0xb7/0xc0 [ 16.534364] __kmalloc_cache_noprof+0x189/0x420 [ 16.534728] kasan_atomics+0x95/0x310 [ 16.535028] kunit_try_run_case+0x1a5/0x480 [ 16.535949] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.536397] kthread+0x337/0x6f0 [ 16.536658] ret_from_fork+0x116/0x1d0 [ 16.536932] ret_from_fork_asm+0x1a/0x30 [ 16.537198] [ 16.537311] The buggy address belongs to the object at ffff888102ac4100 [ 16.537311] which belongs to the cache kmalloc-64 of size 64 [ 16.537682] The buggy address is located 0 bytes to the right of [ 16.537682] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 16.538057] [ 16.538196] The buggy address belongs to the physical page: [ 16.538548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 16.539093] flags: 0x200000000000000(node=0|zone=2) [ 16.539484] page_type: f5(slab) [ 16.539746] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.540283] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.540784] page dumped because: kasan: bad access detected [ 16.541187] [ 16.541344] Memory state around the buggy address: [ 16.541675] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.542163] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.542450] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.542811] ^ [ 16.543095] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.543380] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.543827] ================================================================== [ 16.404735] ================================================================== [ 16.404907] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 16.405175] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 16.405609] [ 16.405856] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.405947] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.406002] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.406043] Call Trace: [ 16.406073] <TASK> [ 16.406103] dump_stack_lvl+0x73/0xb0 [ 16.406159] print_report+0xd1/0x650 [ 16.406204] ? __virt_addr_valid+0x1db/0x2d0 [ 16.406248] ? kasan_atomics_helper+0x5fe/0x5450 [ 16.406290] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.406344] ? kasan_atomics_helper+0x5fe/0x5450 [ 16.406385] kasan_report+0x141/0x180 [ 16.406459] ? kasan_atomics_helper+0x5fe/0x5450 [ 16.406514] kasan_check_range+0x10c/0x1c0 [ 16.406557] __kasan_check_write+0x18/0x20 [ 16.406594] kasan_atomics_helper+0x5fe/0x5450 [ 16.406653] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.406696] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.406881] ? trace_hardirqs_on+0x37/0xe0 [ 16.406924] ? kasan_atomics+0x152/0x310 [ 16.406974] kasan_atomics+0x1dc/0x310 [ 16.407017] ? __pfx_kasan_atomics+0x10/0x10 [ 16.407063] ? __pfx_kasan_atomics+0x10/0x10 [ 16.407111] kunit_try_run_case+0x1a5/0x480 [ 16.407174] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.407217] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.407260] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.407307] ? __kthread_parkme+0x82/0x180 [ 16.407350] ? preempt_count_sub+0x50/0x80 [ 16.407397] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.407441] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.407506] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.407635] kthread+0x337/0x6f0 [ 16.407676] ? trace_preempt_on+0x20/0xc0 [ 16.407719] ? __pfx_kthread+0x10/0x10 [ 16.407761] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.407804] ? calculate_sigpending+0x7b/0xa0 [ 16.407851] ? __pfx_kthread+0x10/0x10 [ 16.407889] ret_from_fork+0x116/0x1d0 [ 16.407924] ? __pfx_kthread+0x10/0x10 [ 16.407964] ret_from_fork_asm+0x1a/0x30 [ 16.408026] </TASK> [ 16.408053] [ 16.420405] Allocated by task 283: [ 16.420837] kasan_save_stack+0x45/0x70 [ 16.421159] kasan_save_track+0x18/0x40 [ 16.421327] kasan_save_alloc_info+0x3b/0x50 [ 16.421790] __kasan_kmalloc+0xb7/0xc0 [ 16.421991] __kmalloc_cache_noprof+0x189/0x420 [ 16.422344] kasan_atomics+0x95/0x310 [ 16.422677] kunit_try_run_case+0x1a5/0x480 [ 16.422882] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.423275] kthread+0x337/0x6f0 [ 16.423955] ret_from_fork+0x116/0x1d0 [ 16.424236] ret_from_fork_asm+0x1a/0x30 [ 16.424552] [ 16.424734] The buggy address belongs to the object at ffff888102ac4100 [ 16.424734] which belongs to the cache kmalloc-64 of size 64 [ 16.425223] The buggy address is located 0 bytes to the right of [ 16.425223] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 16.425963] [ 16.426164] The buggy address belongs to the physical page: [ 16.426375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 16.426983] flags: 0x200000000000000(node=0|zone=2) [ 16.427329] page_type: f5(slab) [ 16.428007] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.428362] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.429143] page dumped because: kasan: bad access detected [ 16.429539] [ 16.429985] Memory state around the buggy address: [ 16.430393] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.431007] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.431435] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.432171] ^ [ 16.432479] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.433022] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.433395] ================================================================== [ 16.434475] ================================================================== [ 16.435027] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 16.435372] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 16.436069] [ 16.436413] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.436507] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.436540] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.436574] Call Trace: [ 16.436600] <TASK> [ 16.436642] dump_stack_lvl+0x73/0xb0 [ 16.436693] print_report+0xd1/0x650 [ 16.436727] ? __virt_addr_valid+0x1db/0x2d0 [ 16.436763] ? kasan_atomics_helper+0x697/0x5450 [ 16.436795] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.436833] ? kasan_atomics_helper+0x697/0x5450 [ 16.436864] kasan_report+0x141/0x180 [ 16.436899] ? kasan_atomics_helper+0x697/0x5450 [ 16.436948] kasan_check_range+0x10c/0x1c0 [ 16.436989] __kasan_check_write+0x18/0x20 [ 16.437020] kasan_atomics_helper+0x697/0x5450 [ 16.437081] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.437109] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.437168] ? trace_hardirqs_on+0x37/0xe0 [ 16.437201] ? kasan_atomics+0x152/0x310 [ 16.437228] kasan_atomics+0x1dc/0x310 [ 16.437251] ? __pfx_kasan_atomics+0x10/0x10 [ 16.437274] ? __pfx_kasan_atomics+0x10/0x10 [ 16.437300] kunit_try_run_case+0x1a5/0x480 [ 16.437327] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.437349] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.437371] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.437393] ? __kthread_parkme+0x82/0x180 [ 16.437413] ? preempt_count_sub+0x50/0x80 [ 16.437435] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.437459] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.437481] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.437504] kthread+0x337/0x6f0 [ 16.437523] ? trace_preempt_on+0x20/0xc0 [ 16.437545] ? __pfx_kthread+0x10/0x10 [ 16.437564] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.437585] ? calculate_sigpending+0x7b/0xa0 [ 16.437607] ? __pfx_kthread+0x10/0x10 [ 16.437654] ret_from_fork+0x116/0x1d0 [ 16.437685] ? __pfx_kthread+0x10/0x10 [ 16.437723] ret_from_fork_asm+0x1a/0x30 [ 16.437777] </TASK> [ 16.437793] [ 16.451272] Allocated by task 283: [ 16.451458] kasan_save_stack+0x45/0x70 [ 16.451645] kasan_save_track+0x18/0x40 [ 16.452348] kasan_save_alloc_info+0x3b/0x50 [ 16.453132] __kasan_kmalloc+0xb7/0xc0 [ 16.453416] __kmalloc_cache_noprof+0x189/0x420 [ 16.453799] kasan_atomics+0x95/0x310 [ 16.454024] kunit_try_run_case+0x1a5/0x480 [ 16.454409] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.454963] kthread+0x337/0x6f0 [ 16.455262] ret_from_fork+0x116/0x1d0 [ 16.455451] ret_from_fork_asm+0x1a/0x30 [ 16.455816] [ 16.455990] The buggy address belongs to the object at ffff888102ac4100 [ 16.455990] which belongs to the cache kmalloc-64 of size 64 [ 16.456873] The buggy address is located 0 bytes to the right of [ 16.456873] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 16.457698] [ 16.457862] The buggy address belongs to the physical page: [ 16.458608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 16.458942] flags: 0x200000000000000(node=0|zone=2) [ 16.459281] page_type: f5(slab) [ 16.459465] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.460288] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.460781] page dumped because: kasan: bad access detected [ 16.461307] [ 16.461424] Memory state around the buggy address: [ 16.461591] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.462072] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.462520] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.462858] ^ [ 16.463035] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.463238] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.465191] ================================================================== [ 17.374059] ================================================================== [ 17.374633] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 17.375092] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 17.375644] [ 17.375873] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.375949] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.375970] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.376011] Call Trace: [ 17.376040] <TASK> [ 17.376094] dump_stack_lvl+0x73/0xb0 [ 17.376211] print_report+0xd1/0x650 [ 17.376288] ? __virt_addr_valid+0x1db/0x2d0 [ 17.376352] ? kasan_atomics_helper+0x194a/0x5450 [ 17.376403] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.376454] ? kasan_atomics_helper+0x194a/0x5450 [ 17.376496] kasan_report+0x141/0x180 [ 17.376544] ? kasan_atomics_helper+0x194a/0x5450 [ 17.376600] kasan_check_range+0x10c/0x1c0 [ 17.376661] __kasan_check_write+0x18/0x20 [ 17.376703] kasan_atomics_helper+0x194a/0x5450 [ 17.376750] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.376796] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.376844] ? trace_hardirqs_on+0x37/0xe0 [ 17.376888] ? kasan_atomics+0x152/0x310 [ 17.376943] kasan_atomics+0x1dc/0x310 [ 17.376990] ? __pfx_kasan_atomics+0x10/0x10 [ 17.377039] ? __pfx_kasan_atomics+0x10/0x10 [ 17.377084] kunit_try_run_case+0x1a5/0x480 [ 17.377157] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.377196] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.377276] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.377331] ? __kthread_parkme+0x82/0x180 [ 17.377374] ? preempt_count_sub+0x50/0x80 [ 17.377442] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.377491] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.377550] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.377588] kthread+0x337/0x6f0 [ 17.377640] ? trace_preempt_on+0x20/0xc0 [ 17.377685] ? __pfx_kthread+0x10/0x10 [ 17.377729] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.377771] ? calculate_sigpending+0x7b/0xa0 [ 17.377799] ? __pfx_kthread+0x10/0x10 [ 17.377821] ret_from_fork+0x116/0x1d0 [ 17.377841] ? __pfx_kthread+0x10/0x10 [ 17.377861] ret_from_fork_asm+0x1a/0x30 [ 17.377892] </TASK> [ 17.377905] [ 17.388883] Allocated by task 283: [ 17.389258] kasan_save_stack+0x45/0x70 [ 17.389442] kasan_save_track+0x18/0x40 [ 17.389791] kasan_save_alloc_info+0x3b/0x50 [ 17.390186] __kasan_kmalloc+0xb7/0xc0 [ 17.390357] __kmalloc_cache_noprof+0x189/0x420 [ 17.390698] kasan_atomics+0x95/0x310 [ 17.390949] kunit_try_run_case+0x1a5/0x480 [ 17.391245] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.391584] kthread+0x337/0x6f0 [ 17.391890] ret_from_fork+0x116/0x1d0 [ 17.392144] ret_from_fork_asm+0x1a/0x30 [ 17.392485] [ 17.392633] The buggy address belongs to the object at ffff888102ac4100 [ 17.392633] which belongs to the cache kmalloc-64 of size 64 [ 17.393230] The buggy address is located 0 bytes to the right of [ 17.393230] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 17.393748] [ 17.393943] The buggy address belongs to the physical page: [ 17.394324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 17.394741] flags: 0x200000000000000(node=0|zone=2) [ 17.394954] page_type: f5(slab) [ 17.395281] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.395734] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.396133] page dumped because: kasan: bad access detected [ 17.396450] [ 17.396611] Memory state around the buggy address: [ 17.396888] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.397234] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.397744] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.398047] ^ [ 17.398398] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.398783] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.399228] ================================================================== [ 17.694822] ================================================================== [ 17.695388] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 17.696418] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 17.696679] [ 17.696813] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.696895] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.696913] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.696936] Call Trace: [ 17.696954] <TASK> [ 17.696972] dump_stack_lvl+0x73/0xb0 [ 17.697008] print_report+0xd1/0x650 [ 17.697041] ? __virt_addr_valid+0x1db/0x2d0 [ 17.697076] ? kasan_atomics_helper+0x2006/0x5450 [ 17.697109] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.697566] ? kasan_atomics_helper+0x2006/0x5450 [ 17.697639] kasan_report+0x141/0x180 [ 17.697694] ? kasan_atomics_helper+0x2006/0x5450 [ 17.697737] kasan_check_range+0x10c/0x1c0 [ 17.697762] __kasan_check_write+0x18/0x20 [ 17.697781] kasan_atomics_helper+0x2006/0x5450 [ 17.697811] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.697835] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.697859] ? trace_hardirqs_on+0x37/0xe0 [ 17.697882] ? kasan_atomics+0x152/0x310 [ 17.697908] kasan_atomics+0x1dc/0x310 [ 17.697941] ? __pfx_kasan_atomics+0x10/0x10 [ 17.697964] ? __pfx_kasan_atomics+0x10/0x10 [ 17.698007] kunit_try_run_case+0x1a5/0x480 [ 17.698032] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.698054] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.698127] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.698168] ? __kthread_parkme+0x82/0x180 [ 17.698200] ? preempt_count_sub+0x50/0x80 [ 17.698228] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.698250] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.698273] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.698296] kthread+0x337/0x6f0 [ 17.698315] ? trace_preempt_on+0x20/0xc0 [ 17.698336] ? __pfx_kthread+0x10/0x10 [ 17.698357] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.698377] ? calculate_sigpending+0x7b/0xa0 [ 17.698400] ? __pfx_kthread+0x10/0x10 [ 17.698421] ret_from_fork+0x116/0x1d0 [ 17.698439] ? __pfx_kthread+0x10/0x10 [ 17.698459] ret_from_fork_asm+0x1a/0x30 [ 17.698489] </TASK> [ 17.698502] [ 17.708971] Allocated by task 283: [ 17.709177] kasan_save_stack+0x45/0x70 [ 17.709364] kasan_save_track+0x18/0x40 [ 17.709529] kasan_save_alloc_info+0x3b/0x50 [ 17.709847] __kasan_kmalloc+0xb7/0xc0 [ 17.710180] __kmalloc_cache_noprof+0x189/0x420 [ 17.710523] kasan_atomics+0x95/0x310 [ 17.710705] kunit_try_run_case+0x1a5/0x480 [ 17.711016] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.711386] kthread+0x337/0x6f0 [ 17.711546] ret_from_fork+0x116/0x1d0 [ 17.711723] ret_from_fork_asm+0x1a/0x30 [ 17.712038] [ 17.712239] The buggy address belongs to the object at ffff888102ac4100 [ 17.712239] which belongs to the cache kmalloc-64 of size 64 [ 17.712913] The buggy address is located 0 bytes to the right of [ 17.712913] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 17.713322] [ 17.713434] The buggy address belongs to the physical page: [ 17.713787] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 17.714380] flags: 0x200000000000000(node=0|zone=2) [ 17.714757] page_type: f5(slab) [ 17.715024] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.715543] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.715836] page dumped because: kasan: bad access detected [ 17.716136] [ 17.716290] Memory state around the buggy address: [ 17.716664] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.717033] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.717478] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.717867] ^ [ 17.718198] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.718536] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.719017] ================================================================== [ 16.279879] ================================================================== [ 16.280266] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 16.280841] Read of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 16.281211] [ 16.281418] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.281904] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.281961] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.282006] Call Trace: [ 16.282042] <TASK> [ 16.282075] dump_stack_lvl+0x73/0xb0 [ 16.282140] print_report+0xd1/0x650 [ 16.282185] ? __virt_addr_valid+0x1db/0x2d0 [ 16.282222] ? kasan_atomics_helper+0x4b54/0x5450 [ 16.282258] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.282332] ? kasan_atomics_helper+0x4b54/0x5450 [ 16.282374] kasan_report+0x141/0x180 [ 16.282415] ? kasan_atomics_helper+0x4b54/0x5450 [ 16.282490] __asan_report_load4_noabort+0x18/0x20 [ 16.282704] kasan_atomics_helper+0x4b54/0x5450 [ 16.282749] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.282792] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.282834] ? trace_hardirqs_on+0x37/0xe0 [ 16.282858] ? kasan_atomics+0x152/0x310 [ 16.282886] kasan_atomics+0x1dc/0x310 [ 16.282908] ? __pfx_kasan_atomics+0x10/0x10 [ 16.282931] ? __pfx_kasan_atomics+0x10/0x10 [ 16.282957] kunit_try_run_case+0x1a5/0x480 [ 16.282981] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.283002] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.283026] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.283047] ? __kthread_parkme+0x82/0x180 [ 16.283068] ? preempt_count_sub+0x50/0x80 [ 16.283092] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.283115] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.283138] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.283159] kthread+0x337/0x6f0 [ 16.283179] ? trace_preempt_on+0x20/0xc0 [ 16.283201] ? __pfx_kthread+0x10/0x10 [ 16.283232] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.283260] ? calculate_sigpending+0x7b/0xa0 [ 16.283287] ? __pfx_kthread+0x10/0x10 [ 16.283308] ret_from_fork+0x116/0x1d0 [ 16.283327] ? __pfx_kthread+0x10/0x10 [ 16.283346] ret_from_fork_asm+0x1a/0x30 [ 16.283376] </TASK> [ 16.283389] [ 16.294687] Allocated by task 283: [ 16.294868] kasan_save_stack+0x45/0x70 [ 16.295169] kasan_save_track+0x18/0x40 [ 16.295482] kasan_save_alloc_info+0x3b/0x50 [ 16.295991] __kasan_kmalloc+0xb7/0xc0 [ 16.296321] __kmalloc_cache_noprof+0x189/0x420 [ 16.296817] kasan_atomics+0x95/0x310 [ 16.297181] kunit_try_run_case+0x1a5/0x480 [ 16.297895] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.298388] kthread+0x337/0x6f0 [ 16.298636] ret_from_fork+0x116/0x1d0 [ 16.298874] ret_from_fork_asm+0x1a/0x30 [ 16.299296] [ 16.299471] The buggy address belongs to the object at ffff888102ac4100 [ 16.299471] which belongs to the cache kmalloc-64 of size 64 [ 16.300283] The buggy address is located 0 bytes to the right of [ 16.300283] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 16.301056] [ 16.301274] The buggy address belongs to the physical page: [ 16.302026] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 16.302717] flags: 0x200000000000000(node=0|zone=2) [ 16.303043] page_type: f5(slab) [ 16.303366] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.303955] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.304347] page dumped because: kasan: bad access detected [ 16.304780] [ 16.304943] Memory state around the buggy address: [ 16.305263] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.305674] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.306089] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.307090] ^ [ 16.307392] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.307994] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.308640] ================================================================== [ 16.852897] ================================================================== [ 16.853479] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 16.854005] Read of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 16.854513] [ 16.854731] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.854816] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.854840] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.854879] Call Trace: [ 16.854926] <TASK> [ 16.854956] dump_stack_lvl+0x73/0xb0 [ 16.855010] print_report+0xd1/0x650 [ 16.855055] ? __virt_addr_valid+0x1db/0x2d0 [ 16.855143] ? kasan_atomics_helper+0x4a36/0x5450 [ 16.855190] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.855238] ? kasan_atomics_helper+0x4a36/0x5450 [ 16.855282] kasan_report+0x141/0x180 [ 16.855326] ? kasan_atomics_helper+0x4a36/0x5450 [ 16.855393] __asan_report_load4_noabort+0x18/0x20 [ 16.855442] kasan_atomics_helper+0x4a36/0x5450 [ 16.855486] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.855544] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.855593] ? trace_hardirqs_on+0x37/0xe0 [ 16.855649] ? kasan_atomics+0x152/0x310 [ 16.855718] kasan_atomics+0x1dc/0x310 [ 16.855763] ? __pfx_kasan_atomics+0x10/0x10 [ 16.855807] ? __pfx_kasan_atomics+0x10/0x10 [ 16.855856] kunit_try_run_case+0x1a5/0x480 [ 16.855916] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.855961] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.856017] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.856069] ? __kthread_parkme+0x82/0x180 [ 16.856136] ? preempt_count_sub+0x50/0x80 [ 16.856188] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.856235] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.856283] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.856330] kthread+0x337/0x6f0 [ 16.856372] ? trace_preempt_on+0x20/0xc0 [ 16.856418] ? __pfx_kthread+0x10/0x10 [ 16.856460] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.856499] ? calculate_sigpending+0x7b/0xa0 [ 16.856536] ? __pfx_kthread+0x10/0x10 [ 16.856571] ret_from_fork+0x116/0x1d0 [ 16.856606] ? __pfx_kthread+0x10/0x10 [ 16.856659] ret_from_fork_asm+0x1a/0x30 [ 16.856737] </TASK> [ 16.856763] [ 16.866422] Allocated by task 283: [ 16.866604] kasan_save_stack+0x45/0x70 [ 16.866921] kasan_save_track+0x18/0x40 [ 16.867254] kasan_save_alloc_info+0x3b/0x50 [ 16.867518] __kasan_kmalloc+0xb7/0xc0 [ 16.867774] __kmalloc_cache_noprof+0x189/0x420 [ 16.867981] kasan_atomics+0x95/0x310 [ 16.868311] kunit_try_run_case+0x1a5/0x480 [ 16.868567] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.868912] kthread+0x337/0x6f0 [ 16.869122] ret_from_fork+0x116/0x1d0 [ 16.869418] ret_from_fork_asm+0x1a/0x30 [ 16.869656] [ 16.869820] The buggy address belongs to the object at ffff888102ac4100 [ 16.869820] which belongs to the cache kmalloc-64 of size 64 [ 16.870447] The buggy address is located 0 bytes to the right of [ 16.870447] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 16.871017] [ 16.871194] The buggy address belongs to the physical page: [ 16.871429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 16.871747] flags: 0x200000000000000(node=0|zone=2) [ 16.871968] page_type: f5(slab) [ 16.872272] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.872821] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.873359] page dumped because: kasan: bad access detected [ 16.873750] [ 16.873924] Memory state around the buggy address: [ 16.874298] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.874778] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.875298] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.875791] ^ [ 16.876167] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.876539] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.876863] ================================================================== [ 17.866036] ================================================================== [ 17.866729] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 17.867428] Read of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 17.867946] [ 17.868117] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.868197] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.868225] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.868265] Call Trace: [ 17.868296] <TASK> [ 17.868326] dump_stack_lvl+0x73/0xb0 [ 17.868387] print_report+0xd1/0x650 [ 17.868434] ? __virt_addr_valid+0x1db/0x2d0 [ 17.868479] ? kasan_atomics_helper+0x5115/0x5450 [ 17.868523] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.868577] ? kasan_atomics_helper+0x5115/0x5450 [ 17.868635] kasan_report+0x141/0x180 [ 17.868684] ? kasan_atomics_helper+0x5115/0x5450 [ 17.868740] __asan_report_load8_noabort+0x18/0x20 [ 17.868790] kasan_atomics_helper+0x5115/0x5450 [ 17.868837] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.868883] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.868931] ? trace_hardirqs_on+0x37/0xe0 [ 17.868974] ? kasan_atomics+0x152/0x310 [ 17.869031] kasan_atomics+0x1dc/0x310 [ 17.869080] ? __pfx_kasan_atomics+0x10/0x10 [ 17.869129] ? __pfx_kasan_atomics+0x10/0x10 [ 17.869174] kunit_try_run_case+0x1a5/0x480 [ 17.869218] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.869257] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.869301] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.869344] ? __kthread_parkme+0x82/0x180 [ 17.869378] ? preempt_count_sub+0x50/0x80 [ 17.869421] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.869464] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.869504] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.869540] kthread+0x337/0x6f0 [ 17.869575] ? trace_preempt_on+0x20/0xc0 [ 17.869632] ? __pfx_kthread+0x10/0x10 [ 17.869675] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.869718] ? calculate_sigpending+0x7b/0xa0 [ 17.869764] ? __pfx_kthread+0x10/0x10 [ 17.869809] ret_from_fork+0x116/0x1d0 [ 17.869850] ? __pfx_kthread+0x10/0x10 [ 17.869892] ret_from_fork_asm+0x1a/0x30 [ 17.869961] </TASK> [ 17.869987] [ 17.878268] Allocated by task 283: [ 17.878564] kasan_save_stack+0x45/0x70 [ 17.878872] kasan_save_track+0x18/0x40 [ 17.879182] kasan_save_alloc_info+0x3b/0x50 [ 17.879505] __kasan_kmalloc+0xb7/0xc0 [ 17.879803] __kmalloc_cache_noprof+0x189/0x420 [ 17.880147] kasan_atomics+0x95/0x310 [ 17.880414] kunit_try_run_case+0x1a5/0x480 [ 17.880745] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.881104] kthread+0x337/0x6f0 [ 17.881324] ret_from_fork+0x116/0x1d0 [ 17.881488] ret_from_fork_asm+0x1a/0x30 [ 17.882943] [ 17.883145] The buggy address belongs to the object at ffff888102ac4100 [ 17.883145] which belongs to the cache kmalloc-64 of size 64 [ 17.883928] The buggy address is located 0 bytes to the right of [ 17.883928] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 17.886833] [ 17.887025] The buggy address belongs to the physical page: [ 17.887522] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 17.887804] flags: 0x200000000000000(node=0|zone=2) [ 17.888005] page_type: f5(slab) [ 17.889372] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.889945] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.890876] page dumped because: kasan: bad access detected [ 17.891533] [ 17.891801] Memory state around the buggy address: [ 17.892391] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.892664] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.893138] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.893576] ^ [ 17.893810] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.894142] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.894497] ================================================================== [ 17.503817] ================================================================== [ 17.504025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 17.505343] Read of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 17.506044] [ 17.506835] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.506957] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.506987] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.507026] Call Trace: [ 17.507057] <TASK> [ 17.507083] dump_stack_lvl+0x73/0xb0 [ 17.507152] print_report+0xd1/0x650 [ 17.507176] ? __virt_addr_valid+0x1db/0x2d0 [ 17.507199] ? kasan_atomics_helper+0x4f30/0x5450 [ 17.507219] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.507244] ? kasan_atomics_helper+0x4f30/0x5450 [ 17.507266] kasan_report+0x141/0x180 [ 17.507287] ? kasan_atomics_helper+0x4f30/0x5450 [ 17.507313] __asan_report_load8_noabort+0x18/0x20 [ 17.507336] kasan_atomics_helper+0x4f30/0x5450 [ 17.507358] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.507380] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.507403] ? trace_hardirqs_on+0x37/0xe0 [ 17.507424] ? kasan_atomics+0x152/0x310 [ 17.507451] kasan_atomics+0x1dc/0x310 [ 17.507473] ? __pfx_kasan_atomics+0x10/0x10 [ 17.507495] ? __pfx_kasan_atomics+0x10/0x10 [ 17.507521] kunit_try_run_case+0x1a5/0x480 [ 17.507544] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.507566] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.507589] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.507611] ? __kthread_parkme+0x82/0x180 [ 17.507649] ? preempt_count_sub+0x50/0x80 [ 17.507672] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.507696] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.507718] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.507741] kthread+0x337/0x6f0 [ 17.507760] ? trace_preempt_on+0x20/0xc0 [ 17.507782] ? __pfx_kthread+0x10/0x10 [ 17.507802] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.507823] ? calculate_sigpending+0x7b/0xa0 [ 17.507846] ? __pfx_kthread+0x10/0x10 [ 17.507867] ret_from_fork+0x116/0x1d0 [ 17.507885] ? __pfx_kthread+0x10/0x10 [ 17.507905] ret_from_fork_asm+0x1a/0x30 [ 17.507935] </TASK> [ 17.507948] [ 17.519158] Allocated by task 283: [ 17.519435] kasan_save_stack+0x45/0x70 [ 17.519850] kasan_save_track+0x18/0x40 [ 17.520171] kasan_save_alloc_info+0x3b/0x50 [ 17.520570] __kasan_kmalloc+0xb7/0xc0 [ 17.520916] __kmalloc_cache_noprof+0x189/0x420 [ 17.521267] kasan_atomics+0x95/0x310 [ 17.521583] kunit_try_run_case+0x1a5/0x480 [ 17.521944] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.522220] kthread+0x337/0x6f0 [ 17.522483] ret_from_fork+0x116/0x1d0 [ 17.522732] ret_from_fork_asm+0x1a/0x30 [ 17.523064] [ 17.523296] The buggy address belongs to the object at ffff888102ac4100 [ 17.523296] which belongs to the cache kmalloc-64 of size 64 [ 17.524285] The buggy address is located 0 bytes to the right of [ 17.524285] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 17.525694] [ 17.525945] The buggy address belongs to the physical page: [ 17.527027] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 17.528055] flags: 0x200000000000000(node=0|zone=2) [ 17.528653] page_type: f5(slab) [ 17.528818] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.529052] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.530803] page dumped because: kasan: bad access detected [ 17.531021] [ 17.531130] Memory state around the buggy address: [ 17.531291] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.531504] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.531858] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.532260] ^ [ 17.532534] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.534052] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.534686] ================================================================== [ 17.248164] ================================================================== [ 17.248555] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 17.249086] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 17.249515] [ 17.249682] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.249772] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.249801] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.249843] Call Trace: [ 17.249875] <TASK> [ 17.249906] dump_stack_lvl+0x73/0xb0 [ 17.249973] print_report+0xd1/0x650 [ 17.250019] ? __virt_addr_valid+0x1db/0x2d0 [ 17.250064] ? kasan_atomics_helper+0x164f/0x5450 [ 17.250137] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.250193] ? kasan_atomics_helper+0x164f/0x5450 [ 17.250230] kasan_report+0x141/0x180 [ 17.250270] ? kasan_atomics_helper+0x164f/0x5450 [ 17.250317] kasan_check_range+0x10c/0x1c0 [ 17.250360] __kasan_check_write+0x18/0x20 [ 17.250400] kasan_atomics_helper+0x164f/0x5450 [ 17.250443] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.250486] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.250530] ? trace_hardirqs_on+0x37/0xe0 [ 17.250575] ? kasan_atomics+0x152/0x310 [ 17.250641] kasan_atomics+0x1dc/0x310 [ 17.250687] ? __pfx_kasan_atomics+0x10/0x10 [ 17.250734] ? __pfx_kasan_atomics+0x10/0x10 [ 17.250789] kunit_try_run_case+0x1a5/0x480 [ 17.250838] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.250879] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.250913] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.250944] ? __kthread_parkme+0x82/0x180 [ 17.250970] ? preempt_count_sub+0x50/0x80 [ 17.251001] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.251031] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.251055] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.251078] kthread+0x337/0x6f0 [ 17.251105] ? trace_preempt_on+0x20/0xc0 [ 17.251152] ? __pfx_kthread+0x10/0x10 [ 17.251173] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.251194] ? calculate_sigpending+0x7b/0xa0 [ 17.251218] ? __pfx_kthread+0x10/0x10 [ 17.251239] ret_from_fork+0x116/0x1d0 [ 17.251258] ? __pfx_kthread+0x10/0x10 [ 17.251278] ret_from_fork_asm+0x1a/0x30 [ 17.251309] </TASK> [ 17.251322] [ 17.261844] Allocated by task 283: [ 17.262086] kasan_save_stack+0x45/0x70 [ 17.263041] kasan_save_track+0x18/0x40 [ 17.263357] kasan_save_alloc_info+0x3b/0x50 [ 17.264805] __kasan_kmalloc+0xb7/0xc0 [ 17.265139] __kmalloc_cache_noprof+0x189/0x420 [ 17.265468] kasan_atomics+0x95/0x310 [ 17.265733] kunit_try_run_case+0x1a5/0x480 [ 17.266041] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.266380] kthread+0x337/0x6f0 [ 17.267258] ret_from_fork+0x116/0x1d0 [ 17.267784] ret_from_fork_asm+0x1a/0x30 [ 17.268878] [ 17.269667] The buggy address belongs to the object at ffff888102ac4100 [ 17.269667] which belongs to the cache kmalloc-64 of size 64 [ 17.270439] The buggy address is located 0 bytes to the right of [ 17.270439] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 17.271246] [ 17.271358] The buggy address belongs to the physical page: [ 17.271554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 17.271857] flags: 0x200000000000000(node=0|zone=2) [ 17.272045] page_type: f5(slab) [ 17.272272] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.272723] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.272970] page dumped because: kasan: bad access detected [ 17.273217] [ 17.273305] Memory state around the buggy address: [ 17.273471] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.273770] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.274328] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.274850] ^ [ 17.275226] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.275566] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.275944] ================================================================== [ 17.668057] ================================================================== [ 17.668357] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 17.668991] Read of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 17.669517] [ 17.669697] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.669759] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.669776] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.669799] Call Trace: [ 17.669816] <TASK> [ 17.669834] dump_stack_lvl+0x73/0xb0 [ 17.669867] print_report+0xd1/0x650 [ 17.669889] ? __virt_addr_valid+0x1db/0x2d0 [ 17.669919] ? kasan_atomics_helper+0x4f71/0x5450 [ 17.669944] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.669969] ? kasan_atomics_helper+0x4f71/0x5450 [ 17.669991] kasan_report+0x141/0x180 [ 17.670013] ? kasan_atomics_helper+0x4f71/0x5450 [ 17.670038] __asan_report_load8_noabort+0x18/0x20 [ 17.670062] kasan_atomics_helper+0x4f71/0x5450 [ 17.670084] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.670111] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.670148] ? trace_hardirqs_on+0x37/0xe0 [ 17.670186] ? kasan_atomics+0x152/0x310 [ 17.670232] kasan_atomics+0x1dc/0x310 [ 17.670275] ? __pfx_kasan_atomics+0x10/0x10 [ 17.670322] ? __pfx_kasan_atomics+0x10/0x10 [ 17.670378] kunit_try_run_case+0x1a5/0x480 [ 17.670426] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.670469] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.670512] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.670555] ? __kthread_parkme+0x82/0x180 [ 17.670597] ? preempt_count_sub+0x50/0x80 [ 17.670659] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.670707] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.670755] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.670794] kthread+0x337/0x6f0 [ 17.670845] ? trace_preempt_on+0x20/0xc0 [ 17.670885] ? __pfx_kthread+0x10/0x10 [ 17.670928] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.670969] ? calculate_sigpending+0x7b/0xa0 [ 17.671017] ? __pfx_kthread+0x10/0x10 [ 17.671064] ret_from_fork+0x116/0x1d0 [ 17.671101] ? __pfx_kthread+0x10/0x10 [ 17.671142] ret_from_fork_asm+0x1a/0x30 [ 17.671205] </TASK> [ 17.671231] [ 17.682410] Allocated by task 283: [ 17.682758] kasan_save_stack+0x45/0x70 [ 17.683113] kasan_save_track+0x18/0x40 [ 17.683479] kasan_save_alloc_info+0x3b/0x50 [ 17.683843] __kasan_kmalloc+0xb7/0xc0 [ 17.684079] __kmalloc_cache_noprof+0x189/0x420 [ 17.684269] kasan_atomics+0x95/0x310 [ 17.684568] kunit_try_run_case+0x1a5/0x480 [ 17.684890] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.685096] kthread+0x337/0x6f0 [ 17.685520] ret_from_fork+0x116/0x1d0 [ 17.685851] ret_from_fork_asm+0x1a/0x30 [ 17.686167] [ 17.686385] The buggy address belongs to the object at ffff888102ac4100 [ 17.686385] which belongs to the cache kmalloc-64 of size 64 [ 17.687112] The buggy address is located 0 bytes to the right of [ 17.687112] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 17.687723] [ 17.687929] The buggy address belongs to the physical page: [ 17.688359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 17.688817] flags: 0x200000000000000(node=0|zone=2) [ 17.689267] page_type: f5(slab) [ 17.689500] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.689768] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.690389] page dumped because: kasan: bad access detected [ 17.690659] [ 17.690763] Memory state around the buggy address: [ 17.690974] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.691681] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.692054] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.692641] ^ [ 17.692973] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.693378] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.693802] ================================================================== [ 17.842057] ================================================================== [ 17.842710] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 17.843257] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 17.843752] [ 17.843930] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.844011] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.844038] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.844079] Call Trace: [ 17.844107] <TASK> [ 17.845190] dump_stack_lvl+0x73/0xb0 [ 17.845262] print_report+0xd1/0x650 [ 17.845302] ? __virt_addr_valid+0x1db/0x2d0 [ 17.845344] ? kasan_atomics_helper+0x224c/0x5450 [ 17.845384] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.845427] ? kasan_atomics_helper+0x224c/0x5450 [ 17.845469] kasan_report+0x141/0x180 [ 17.845510] ? kasan_atomics_helper+0x224c/0x5450 [ 17.845562] kasan_check_range+0x10c/0x1c0 [ 17.845606] __kasan_check_write+0x18/0x20 [ 17.845660] kasan_atomics_helper+0x224c/0x5450 [ 17.845701] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.845738] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.845784] ? trace_hardirqs_on+0x37/0xe0 [ 17.845826] ? kasan_atomics+0x152/0x310 [ 17.845881] kasan_atomics+0x1dc/0x310 [ 17.845940] ? __pfx_kasan_atomics+0x10/0x10 [ 17.845989] ? __pfx_kasan_atomics+0x10/0x10 [ 17.846045] kunit_try_run_case+0x1a5/0x480 [ 17.846094] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.846133] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.846173] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.846215] ? __kthread_parkme+0x82/0x180 [ 17.846257] ? preempt_count_sub+0x50/0x80 [ 17.846308] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.846355] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.846402] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.846444] kthread+0x337/0x6f0 [ 17.846477] ? trace_preempt_on+0x20/0xc0 [ 17.846519] ? __pfx_kthread+0x10/0x10 [ 17.846556] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.846592] ? calculate_sigpending+0x7b/0xa0 [ 17.846644] ? __pfx_kthread+0x10/0x10 [ 17.846684] ret_from_fork+0x116/0x1d0 [ 17.846722] ? __pfx_kthread+0x10/0x10 [ 17.846758] ret_from_fork_asm+0x1a/0x30 [ 17.846817] </TASK> [ 17.846839] [ 17.856443] Allocated by task 283: [ 17.856736] kasan_save_stack+0x45/0x70 [ 17.857001] kasan_save_track+0x18/0x40 [ 17.857321] kasan_save_alloc_info+0x3b/0x50 [ 17.857507] __kasan_kmalloc+0xb7/0xc0 [ 17.857687] __kmalloc_cache_noprof+0x189/0x420 [ 17.857878] kasan_atomics+0x95/0x310 [ 17.858056] kunit_try_run_case+0x1a5/0x480 [ 17.858365] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.858831] kthread+0x337/0x6f0 [ 17.859100] ret_from_fork+0x116/0x1d0 [ 17.859381] ret_from_fork_asm+0x1a/0x30 [ 17.859611] [ 17.859784] The buggy address belongs to the object at ffff888102ac4100 [ 17.859784] which belongs to the cache kmalloc-64 of size 64 [ 17.860180] The buggy address is located 0 bytes to the right of [ 17.860180] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 17.860843] [ 17.860957] The buggy address belongs to the physical page: [ 17.861180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 17.861710] flags: 0x200000000000000(node=0|zone=2) [ 17.862014] page_type: f5(slab) [ 17.862293] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.862683] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.862966] page dumped because: kasan: bad access detected [ 17.863255] [ 17.863412] Memory state around the buggy address: [ 17.863758] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.864246] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.864559] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.864805] ^ [ 17.864990] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.865222] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.865454] ================================================================== [ 16.904852] ================================================================== [ 16.905264] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 16.905759] Read of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 16.906140] [ 16.906310] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.906413] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.906441] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.906475] Call Trace: [ 16.906505] <TASK> [ 16.906536] dump_stack_lvl+0x73/0xb0 [ 16.906592] print_report+0xd1/0x650 [ 16.906645] ? __virt_addr_valid+0x1db/0x2d0 [ 16.906686] ? kasan_atomics_helper+0x4a1c/0x5450 [ 16.906722] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.906769] ? kasan_atomics_helper+0x4a1c/0x5450 [ 16.906811] kasan_report+0x141/0x180 [ 16.906848] ? kasan_atomics_helper+0x4a1c/0x5450 [ 16.906931] __asan_report_load4_noabort+0x18/0x20 [ 16.906979] kasan_atomics_helper+0x4a1c/0x5450 [ 16.907028] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.907075] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.907109] ? trace_hardirqs_on+0x37/0xe0 [ 16.907154] ? kasan_atomics+0x152/0x310 [ 16.907182] kasan_atomics+0x1dc/0x310 [ 16.907206] ? __pfx_kasan_atomics+0x10/0x10 [ 16.907229] ? __pfx_kasan_atomics+0x10/0x10 [ 16.907255] kunit_try_run_case+0x1a5/0x480 [ 16.907278] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.907300] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.907323] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.907345] ? __kthread_parkme+0x82/0x180 [ 16.907364] ? preempt_count_sub+0x50/0x80 [ 16.907387] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.907410] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.907432] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.907455] kthread+0x337/0x6f0 [ 16.907474] ? trace_preempt_on+0x20/0xc0 [ 16.907495] ? __pfx_kthread+0x10/0x10 [ 16.907516] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.907536] ? calculate_sigpending+0x7b/0xa0 [ 16.907559] ? __pfx_kthread+0x10/0x10 [ 16.907580] ret_from_fork+0x116/0x1d0 [ 16.907599] ? __pfx_kthread+0x10/0x10 [ 16.907636] ret_from_fork_asm+0x1a/0x30 [ 16.907668] </TASK> [ 16.907681] [ 16.919479] Allocated by task 283: [ 16.919655] kasan_save_stack+0x45/0x70 [ 16.919951] kasan_save_track+0x18/0x40 [ 16.920636] kasan_save_alloc_info+0x3b/0x50 [ 16.920850] __kasan_kmalloc+0xb7/0xc0 [ 16.920995] __kmalloc_cache_noprof+0x189/0x420 [ 16.921628] kasan_atomics+0x95/0x310 [ 16.921797] kunit_try_run_case+0x1a5/0x480 [ 16.922071] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.922650] kthread+0x337/0x6f0 [ 16.922867] ret_from_fork+0x116/0x1d0 [ 16.923018] ret_from_fork_asm+0x1a/0x30 [ 16.923653] [ 16.923771] The buggy address belongs to the object at ffff888102ac4100 [ 16.923771] which belongs to the cache kmalloc-64 of size 64 [ 16.924098] The buggy address is located 0 bytes to the right of [ 16.924098] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 16.924994] [ 16.925301] The buggy address belongs to the physical page: [ 16.925523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 16.925843] flags: 0x200000000000000(node=0|zone=2) [ 16.926086] page_type: f5(slab) [ 16.926702] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.927059] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.927667] page dumped because: kasan: bad access detected [ 16.927847] [ 16.927970] Memory state around the buggy address: [ 16.928298] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.928662] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.929192] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.929457] ^ [ 16.929900] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.930471] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.930797] ================================================================== [ 17.563464] ================================================================== [ 17.563882] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 17.564403] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 17.564848] [ 17.564987] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.565073] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.565129] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.565175] Call Trace: [ 17.565206] <TASK> [ 17.565240] dump_stack_lvl+0x73/0xb0 [ 17.565300] print_report+0xd1/0x650 [ 17.565347] ? __virt_addr_valid+0x1db/0x2d0 [ 17.565390] ? kasan_atomics_helper+0x1d7a/0x5450 [ 17.565424] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.565501] ? kasan_atomics_helper+0x1d7a/0x5450 [ 17.565556] kasan_report+0x141/0x180 [ 17.565625] ? kasan_atomics_helper+0x1d7a/0x5450 [ 17.565681] kasan_check_range+0x10c/0x1c0 [ 17.565737] __kasan_check_write+0x18/0x20 [ 17.565785] kasan_atomics_helper+0x1d7a/0x5450 [ 17.565835] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.565889] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.565946] ? trace_hardirqs_on+0x37/0xe0 [ 17.565990] ? kasan_atomics+0x152/0x310 [ 17.566047] kasan_atomics+0x1dc/0x310 [ 17.566093] ? __pfx_kasan_atomics+0x10/0x10 [ 17.566170] ? __pfx_kasan_atomics+0x10/0x10 [ 17.566210] kunit_try_run_case+0x1a5/0x480 [ 17.566236] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.566258] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.566281] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.566303] ? __kthread_parkme+0x82/0x180 [ 17.566323] ? preempt_count_sub+0x50/0x80 [ 17.566346] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.566368] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.566390] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.566413] kthread+0x337/0x6f0 [ 17.566432] ? trace_preempt_on+0x20/0xc0 [ 17.566454] ? __pfx_kthread+0x10/0x10 [ 17.566474] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.566494] ? calculate_sigpending+0x7b/0xa0 [ 17.566517] ? __pfx_kthread+0x10/0x10 [ 17.566537] ret_from_fork+0x116/0x1d0 [ 17.566556] ? __pfx_kthread+0x10/0x10 [ 17.566576] ret_from_fork_asm+0x1a/0x30 [ 17.566605] </TASK> [ 17.566634] [ 17.576771] Allocated by task 283: [ 17.577078] kasan_save_stack+0x45/0x70 [ 17.577352] kasan_save_track+0x18/0x40 [ 17.577528] kasan_save_alloc_info+0x3b/0x50 [ 17.577717] __kasan_kmalloc+0xb7/0xc0 [ 17.577881] __kmalloc_cache_noprof+0x189/0x420 [ 17.578297] kasan_atomics+0x95/0x310 [ 17.578647] kunit_try_run_case+0x1a5/0x480 [ 17.578990] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.579401] kthread+0x337/0x6f0 [ 17.579729] ret_from_fork+0x116/0x1d0 [ 17.580051] ret_from_fork_asm+0x1a/0x30 [ 17.580434] [ 17.580632] The buggy address belongs to the object at ffff888102ac4100 [ 17.580632] which belongs to the cache kmalloc-64 of size 64 [ 17.581044] The buggy address is located 0 bytes to the right of [ 17.581044] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 17.581447] [ 17.581551] The buggy address belongs to the physical page: [ 17.582035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 17.582635] flags: 0x200000000000000(node=0|zone=2) [ 17.582999] page_type: f5(slab) [ 17.583339] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.583911] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.584498] page dumped because: kasan: bad access detected [ 17.584716] [ 17.584821] Memory state around the buggy address: [ 17.585010] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.585496] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.586038] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.586588] ^ [ 17.586986] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.587530] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.588308] ================================================================== [ 17.114247] ================================================================== [ 17.115445] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 17.115955] Read of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 17.116336] [ 17.116505] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.116583] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.116607] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.116655] Call Trace: [ 17.116684] <TASK> [ 17.116714] dump_stack_lvl+0x73/0xb0 [ 17.116763] print_report+0xd1/0x650 [ 17.116806] ? __virt_addr_valid+0x1db/0x2d0 [ 17.116845] ? kasan_atomics_helper+0x4eae/0x5450 [ 17.116879] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.116914] ? kasan_atomics_helper+0x4eae/0x5450 [ 17.116937] kasan_report+0x141/0x180 [ 17.116959] ? kasan_atomics_helper+0x4eae/0x5450 [ 17.116985] __asan_report_load8_noabort+0x18/0x20 [ 17.117008] kasan_atomics_helper+0x4eae/0x5450 [ 17.117036] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.117075] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.117111] ? trace_hardirqs_on+0x37/0xe0 [ 17.117152] ? kasan_atomics+0x152/0x310 [ 17.117203] kasan_atomics+0x1dc/0x310 [ 17.117245] ? __pfx_kasan_atomics+0x10/0x10 [ 17.117290] ? __pfx_kasan_atomics+0x10/0x10 [ 17.117340] kunit_try_run_case+0x1a5/0x480 [ 17.117386] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.117427] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.117471] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.117514] ? __kthread_parkme+0x82/0x180 [ 17.117555] ? preempt_count_sub+0x50/0x80 [ 17.117604] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.118675] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.118736] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.118787] kthread+0x337/0x6f0 [ 17.118833] ? trace_preempt_on+0x20/0xc0 [ 17.118883] ? __pfx_kthread+0x10/0x10 [ 17.118929] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.118972] ? calculate_sigpending+0x7b/0xa0 [ 17.119020] ? __pfx_kthread+0x10/0x10 [ 17.119066] ret_from_fork+0x116/0x1d0 [ 17.119106] ? __pfx_kthread+0x10/0x10 [ 17.119152] ret_from_fork_asm+0x1a/0x30 [ 17.119218] </TASK> [ 17.119244] [ 17.130440] Allocated by task 283: [ 17.130687] kasan_save_stack+0x45/0x70 [ 17.131024] kasan_save_track+0x18/0x40 [ 17.131341] kasan_save_alloc_info+0x3b/0x50 [ 17.131604] __kasan_kmalloc+0xb7/0xc0 [ 17.132655] __kmalloc_cache_noprof+0x189/0x420 [ 17.133044] kasan_atomics+0x95/0x310 [ 17.133280] kunit_try_run_case+0x1a5/0x480 [ 17.133468] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.133866] kthread+0x337/0x6f0 [ 17.134129] ret_from_fork+0x116/0x1d0 [ 17.134680] ret_from_fork_asm+0x1a/0x30 [ 17.134902] [ 17.135013] The buggy address belongs to the object at ffff888102ac4100 [ 17.135013] which belongs to the cache kmalloc-64 of size 64 [ 17.136238] The buggy address is located 0 bytes to the right of [ 17.136238] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 17.136805] [ 17.136965] The buggy address belongs to the physical page: [ 17.137396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 17.138062] flags: 0x200000000000000(node=0|zone=2) [ 17.138439] page_type: f5(slab) [ 17.138585] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.139001] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.139773] page dumped because: kasan: bad access detected [ 17.139992] [ 17.140080] Memory state around the buggy address: [ 17.140331] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.140944] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.141512] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.141814] ^ [ 17.142146] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.143110] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.143407] ================================================================== [ 16.250640] ================================================================== [ 16.251375] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 16.252276] Read of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 16.253079] [ 16.253453] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.253516] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.253577] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.253632] Call Trace: [ 16.253666] <TASK> [ 16.253931] dump_stack_lvl+0x73/0xb0 [ 16.254021] print_report+0xd1/0x650 [ 16.254062] ? __virt_addr_valid+0x1db/0x2d0 [ 16.254091] ? kasan_atomics_helper+0x3df/0x5450 [ 16.254133] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.254160] ? kasan_atomics_helper+0x3df/0x5450 [ 16.254181] kasan_report+0x141/0x180 [ 16.254203] ? kasan_atomics_helper+0x3df/0x5450 [ 16.254228] kasan_check_range+0x10c/0x1c0 [ 16.254251] __kasan_check_read+0x15/0x20 [ 16.254271] kasan_atomics_helper+0x3df/0x5450 [ 16.254293] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.254314] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.254338] ? trace_hardirqs_on+0x37/0xe0 [ 16.254360] ? kasan_atomics+0x152/0x310 [ 16.254387] kasan_atomics+0x1dc/0x310 [ 16.254409] ? __pfx_kasan_atomics+0x10/0x10 [ 16.254432] ? __pfx_kasan_atomics+0x10/0x10 [ 16.254458] kunit_try_run_case+0x1a5/0x480 [ 16.254482] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.254507] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.254550] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.254583] ? __kthread_parkme+0x82/0x180 [ 16.254631] ? preempt_count_sub+0x50/0x80 [ 16.254668] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.254699] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.254722] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.254746] kthread+0x337/0x6f0 [ 16.254767] ? trace_preempt_on+0x20/0xc0 [ 16.254788] ? __pfx_kthread+0x10/0x10 [ 16.254809] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.254829] ? calculate_sigpending+0x7b/0xa0 [ 16.254852] ? __pfx_kthread+0x10/0x10 [ 16.254873] ret_from_fork+0x116/0x1d0 [ 16.254892] ? __pfx_kthread+0x10/0x10 [ 16.254914] ret_from_fork_asm+0x1a/0x30 [ 16.254944] </TASK> [ 16.254958] [ 16.266860] Allocated by task 283: [ 16.267057] kasan_save_stack+0x45/0x70 [ 16.267256] kasan_save_track+0x18/0x40 [ 16.267528] kasan_save_alloc_info+0x3b/0x50 [ 16.267906] __kasan_kmalloc+0xb7/0xc0 [ 16.268094] __kmalloc_cache_noprof+0x189/0x420 [ 16.268320] kasan_atomics+0x95/0x310 [ 16.268489] kunit_try_run_case+0x1a5/0x480 [ 16.268923] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.269335] kthread+0x337/0x6f0 [ 16.270028] ret_from_fork+0x116/0x1d0 [ 16.270375] ret_from_fork_asm+0x1a/0x30 [ 16.270827] [ 16.270986] The buggy address belongs to the object at ffff888102ac4100 [ 16.270986] which belongs to the cache kmalloc-64 of size 64 [ 16.271856] The buggy address is located 0 bytes to the right of [ 16.271856] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 16.272289] [ 16.272485] The buggy address belongs to the physical page: [ 16.272983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 16.273933] flags: 0x200000000000000(node=0|zone=2) [ 16.274344] page_type: f5(slab) [ 16.274634] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.274895] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.275385] page dumped because: kasan: bad access detected [ 16.275632] [ 16.275798] Memory state around the buggy address: [ 16.276089] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.276455] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.276971] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.277434] ^ [ 16.278133] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.278656] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.279093] ================================================================== [ 16.545461] ================================================================== [ 16.546375] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 16.546713] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 16.546966] [ 16.547128] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.547214] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.547242] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.547282] Call Trace: [ 16.547308] <TASK> [ 16.547334] dump_stack_lvl+0x73/0xb0 [ 16.547391] print_report+0xd1/0x650 [ 16.547437] ? __virt_addr_valid+0x1db/0x2d0 [ 16.547481] ? kasan_atomics_helper+0x8f9/0x5450 [ 16.547526] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.547576] ? kasan_atomics_helper+0x8f9/0x5450 [ 16.547635] kasan_report+0x141/0x180 [ 16.547684] ? kasan_atomics_helper+0x8f9/0x5450 [ 16.547741] kasan_check_range+0x10c/0x1c0 [ 16.547791] __kasan_check_write+0x18/0x20 [ 16.547829] kasan_atomics_helper+0x8f9/0x5450 [ 16.547875] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.547920] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.547961] ? trace_hardirqs_on+0x37/0xe0 [ 16.547997] ? kasan_atomics+0x152/0x310 [ 16.548045] kasan_atomics+0x1dc/0x310 [ 16.548085] ? __pfx_kasan_atomics+0x10/0x10 [ 16.548154] ? __pfx_kasan_atomics+0x10/0x10 [ 16.548205] kunit_try_run_case+0x1a5/0x480 [ 16.548250] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.548291] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.548333] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.548374] ? __kthread_parkme+0x82/0x180 [ 16.548413] ? preempt_count_sub+0x50/0x80 [ 16.548462] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.548509] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.548552] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.548595] kthread+0x337/0x6f0 [ 16.548649] ? trace_preempt_on+0x20/0xc0 [ 16.548695] ? __pfx_kthread+0x10/0x10 [ 16.548737] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.548773] ? calculate_sigpending+0x7b/0xa0 [ 16.548899] ? __pfx_kthread+0x10/0x10 [ 16.548952] ret_from_fork+0x116/0x1d0 [ 16.548993] ? __pfx_kthread+0x10/0x10 [ 16.549308] ret_from_fork_asm+0x1a/0x30 [ 16.549423] </TASK> [ 16.549493] [ 16.559453] Allocated by task 283: [ 16.559657] kasan_save_stack+0x45/0x70 [ 16.559988] kasan_save_track+0x18/0x40 [ 16.560318] kasan_save_alloc_info+0x3b/0x50 [ 16.560800] __kasan_kmalloc+0xb7/0xc0 [ 16.561203] __kmalloc_cache_noprof+0x189/0x420 [ 16.561577] kasan_atomics+0x95/0x310 [ 16.561889] kunit_try_run_case+0x1a5/0x480 [ 16.562331] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.562602] kthread+0x337/0x6f0 [ 16.562954] ret_from_fork+0x116/0x1d0 [ 16.563343] ret_from_fork_asm+0x1a/0x30 [ 16.563724] [ 16.563920] The buggy address belongs to the object at ffff888102ac4100 [ 16.563920] which belongs to the cache kmalloc-64 of size 64 [ 16.564649] The buggy address is located 0 bytes to the right of [ 16.564649] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 16.565306] [ 16.565480] The buggy address belongs to the physical page: [ 16.565732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 16.566266] flags: 0x200000000000000(node=0|zone=2) [ 16.566626] page_type: f5(slab) [ 16.566923] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.567370] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.567790] page dumped because: kasan: bad access detected [ 16.568139] [ 16.568310] Memory state around the buggy address: [ 16.568564] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.569038] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.569394] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.569787] ^ [ 16.570213] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.570557] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.570985] ================================================================== [ 16.958951] ================================================================== [ 16.959512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 16.960505] Read of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 16.960871] [ 16.960998] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.961057] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.961074] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.961101] Call Trace: [ 16.961517] <TASK> [ 16.961571] dump_stack_lvl+0x73/0xb0 [ 16.961659] print_report+0xd1/0x650 [ 16.961697] ? __virt_addr_valid+0x1db/0x2d0 [ 16.961721] ? kasan_atomics_helper+0x4a02/0x5450 [ 16.961742] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.961767] ? kasan_atomics_helper+0x4a02/0x5450 [ 16.961788] kasan_report+0x141/0x180 [ 16.961810] ? kasan_atomics_helper+0x4a02/0x5450 [ 16.961835] __asan_report_load4_noabort+0x18/0x20 [ 16.961858] kasan_atomics_helper+0x4a02/0x5450 [ 16.961879] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.961901] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.961936] ? trace_hardirqs_on+0x37/0xe0 [ 16.961959] ? kasan_atomics+0x152/0x310 [ 16.961986] kasan_atomics+0x1dc/0x310 [ 16.962009] ? __pfx_kasan_atomics+0x10/0x10 [ 16.962033] ? __pfx_kasan_atomics+0x10/0x10 [ 16.962059] kunit_try_run_case+0x1a5/0x480 [ 16.962082] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.962109] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.962143] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.962165] ? __kthread_parkme+0x82/0x180 [ 16.962185] ? preempt_count_sub+0x50/0x80 [ 16.962208] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.962231] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.962254] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.962276] kthread+0x337/0x6f0 [ 16.962296] ? trace_preempt_on+0x20/0xc0 [ 16.962344] ? __pfx_kthread+0x10/0x10 [ 16.962367] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.962387] ? calculate_sigpending+0x7b/0xa0 [ 16.962411] ? __pfx_kthread+0x10/0x10 [ 16.962432] ret_from_fork+0x116/0x1d0 [ 16.962452] ? __pfx_kthread+0x10/0x10 [ 16.962473] ret_from_fork_asm+0x1a/0x30 [ 16.962502] </TASK> [ 16.962515] [ 16.973825] Allocated by task 283: [ 16.974025] kasan_save_stack+0x45/0x70 [ 16.974744] kasan_save_track+0x18/0x40 [ 16.975009] kasan_save_alloc_info+0x3b/0x50 [ 16.975446] __kasan_kmalloc+0xb7/0xc0 [ 16.975628] __kmalloc_cache_noprof+0x189/0x420 [ 16.975932] kasan_atomics+0x95/0x310 [ 16.976199] kunit_try_run_case+0x1a5/0x480 [ 16.976412] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.976689] kthread+0x337/0x6f0 [ 16.976895] ret_from_fork+0x116/0x1d0 [ 16.977474] ret_from_fork_asm+0x1a/0x30 [ 16.977762] [ 16.977861] The buggy address belongs to the object at ffff888102ac4100 [ 16.977861] which belongs to the cache kmalloc-64 of size 64 [ 16.978766] The buggy address is located 0 bytes to the right of [ 16.978766] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 16.979604] [ 16.979734] The buggy address belongs to the physical page: [ 16.980042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 16.980338] flags: 0x200000000000000(node=0|zone=2) [ 16.980732] page_type: f5(slab) [ 16.980923] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.981496] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.981856] page dumped because: kasan: bad access detected [ 16.982275] [ 16.982564] Memory state around the buggy address: [ 16.982819] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.983441] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.983812] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.984097] ^ [ 16.984644] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.985308] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.985636] ================================================================== [ 17.820238] ================================================================== [ 17.820512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 17.820942] Read of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 17.821356] [ 17.821532] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.821605] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.821639] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.821667] Call Trace: [ 17.821689] <TASK> [ 17.821711] dump_stack_lvl+0x73/0xb0 [ 17.821756] print_report+0xd1/0x650 [ 17.821788] ? __virt_addr_valid+0x1db/0x2d0 [ 17.821819] ? kasan_atomics_helper+0x4fa5/0x5450 [ 17.821847] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.821881] ? kasan_atomics_helper+0x4fa5/0x5450 [ 17.821919] kasan_report+0x141/0x180 [ 17.821953] ? kasan_atomics_helper+0x4fa5/0x5450 [ 17.821991] __asan_report_load8_noabort+0x18/0x20 [ 17.822025] kasan_atomics_helper+0x4fa5/0x5450 [ 17.822171] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.822210] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.822250] ? trace_hardirqs_on+0x37/0xe0 [ 17.822284] ? kasan_atomics+0x152/0x310 [ 17.822361] kasan_atomics+0x1dc/0x310 [ 17.822406] ? __pfx_kasan_atomics+0x10/0x10 [ 17.822448] ? __pfx_kasan_atomics+0x10/0x10 [ 17.822494] kunit_try_run_case+0x1a5/0x480 [ 17.822542] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.822587] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.822647] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.822695] ? __kthread_parkme+0x82/0x180 [ 17.822733] ? preempt_count_sub+0x50/0x80 [ 17.822780] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.822822] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.822861] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.822904] kthread+0x337/0x6f0 [ 17.822940] ? trace_preempt_on+0x20/0xc0 [ 17.822985] ? __pfx_kthread+0x10/0x10 [ 17.823023] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.823064] ? calculate_sigpending+0x7b/0xa0 [ 17.823104] ? __pfx_kthread+0x10/0x10 [ 17.823156] ret_from_fork+0x116/0x1d0 [ 17.823192] ? __pfx_kthread+0x10/0x10 [ 17.823233] ret_from_fork_asm+0x1a/0x30 [ 17.823289] </TASK> [ 17.823313] [ 17.831632] Allocated by task 283: [ 17.832012] kasan_save_stack+0x45/0x70 [ 17.832414] kasan_save_track+0x18/0x40 [ 17.832730] kasan_save_alloc_info+0x3b/0x50 [ 17.832924] __kasan_kmalloc+0xb7/0xc0 [ 17.833090] __kmalloc_cache_noprof+0x189/0x420 [ 17.833409] kasan_atomics+0x95/0x310 [ 17.833661] kunit_try_run_case+0x1a5/0x480 [ 17.833976] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.834306] kthread+0x337/0x6f0 [ 17.834555] ret_from_fork+0x116/0x1d0 [ 17.834730] ret_from_fork_asm+0x1a/0x30 [ 17.834963] [ 17.835077] The buggy address belongs to the object at ffff888102ac4100 [ 17.835077] which belongs to the cache kmalloc-64 of size 64 [ 17.835746] The buggy address is located 0 bytes to the right of [ 17.835746] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 17.836374] [ 17.836506] The buggy address belongs to the physical page: [ 17.836825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 17.837091] flags: 0x200000000000000(node=0|zone=2) [ 17.837451] page_type: f5(slab) [ 17.837705] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.838168] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.838472] page dumped because: kasan: bad access detected [ 17.838730] [ 17.838837] Memory state around the buggy address: [ 17.839023] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.839598] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.840064] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.840489] ^ [ 17.840757] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.841075] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.841354] ================================================================== [ 17.588968] ================================================================== [ 17.589504] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 17.589962] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 17.590206] [ 17.590332] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.590411] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.590439] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.590480] Call Trace: [ 17.590510] <TASK> [ 17.590538] dump_stack_lvl+0x73/0xb0 [ 17.590590] print_report+0xd1/0x650 [ 17.590649] ? __virt_addr_valid+0x1db/0x2d0 [ 17.590691] ? kasan_atomics_helper+0x1e12/0x5450 [ 17.590733] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.590783] ? kasan_atomics_helper+0x1e12/0x5450 [ 17.590825] kasan_report+0x141/0x180 [ 17.590860] ? kasan_atomics_helper+0x1e12/0x5450 [ 17.590901] kasan_check_range+0x10c/0x1c0 [ 17.590945] __kasan_check_write+0x18/0x20 [ 17.590979] kasan_atomics_helper+0x1e12/0x5450 [ 17.591022] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.591068] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.591138] ? trace_hardirqs_on+0x37/0xe0 [ 17.591178] ? kasan_atomics+0x152/0x310 [ 17.591278] kasan_atomics+0x1dc/0x310 [ 17.591346] ? __pfx_kasan_atomics+0x10/0x10 [ 17.591400] ? __pfx_kasan_atomics+0x10/0x10 [ 17.591451] kunit_try_run_case+0x1a5/0x480 [ 17.591514] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.591560] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.591605] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.591669] ? __kthread_parkme+0x82/0x180 [ 17.591713] ? preempt_count_sub+0x50/0x80 [ 17.591761] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.591807] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.591854] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.591901] kthread+0x337/0x6f0 [ 17.591941] ? trace_preempt_on+0x20/0xc0 [ 17.591967] ? __pfx_kthread+0x10/0x10 [ 17.591987] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.592008] ? calculate_sigpending+0x7b/0xa0 [ 17.592032] ? __pfx_kthread+0x10/0x10 [ 17.592052] ret_from_fork+0x116/0x1d0 [ 17.592071] ? __pfx_kthread+0x10/0x10 [ 17.592090] ret_from_fork_asm+0x1a/0x30 [ 17.592138] </TASK> [ 17.592151] [ 17.601744] Allocated by task 283: [ 17.601985] kasan_save_stack+0x45/0x70 [ 17.602203] kasan_save_track+0x18/0x40 [ 17.602449] kasan_save_alloc_info+0x3b/0x50 [ 17.602991] __kasan_kmalloc+0xb7/0xc0 [ 17.603300] __kmalloc_cache_noprof+0x189/0x420 [ 17.603769] kasan_atomics+0x95/0x310 [ 17.604141] kunit_try_run_case+0x1a5/0x480 [ 17.604540] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.604953] kthread+0x337/0x6f0 [ 17.605279] ret_from_fork+0x116/0x1d0 [ 17.605502] ret_from_fork_asm+0x1a/0x30 [ 17.605864] [ 17.606006] The buggy address belongs to the object at ffff888102ac4100 [ 17.606006] which belongs to the cache kmalloc-64 of size 64 [ 17.606546] The buggy address is located 0 bytes to the right of [ 17.606546] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 17.606973] [ 17.607098] The buggy address belongs to the physical page: [ 17.607317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 17.607900] flags: 0x200000000000000(node=0|zone=2) [ 17.608310] page_type: f5(slab) [ 17.608572] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.609082] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.609639] page dumped because: kasan: bad access detected [ 17.610070] [ 17.610282] Memory state around the buggy address: [ 17.610587] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.611052] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.611320] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.611550] ^ [ 17.611746] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.612195] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.612901] ================================================================== [ 17.720336] ================================================================== [ 17.721718] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 17.722037] Read of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 17.722573] [ 17.722781] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.722908] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.722938] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.722978] Call Trace: [ 17.723010] <TASK> [ 17.723042] dump_stack_lvl+0x73/0xb0 [ 17.723144] print_report+0xd1/0x650 [ 17.723202] ? __virt_addr_valid+0x1db/0x2d0 [ 17.723259] ? kasan_atomics_helper+0x4f98/0x5450 [ 17.723298] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.723344] ? kasan_atomics_helper+0x4f98/0x5450 [ 17.723412] kasan_report+0x141/0x180 [ 17.723456] ? kasan_atomics_helper+0x4f98/0x5450 [ 17.723524] __asan_report_load8_noabort+0x18/0x20 [ 17.723589] kasan_atomics_helper+0x4f98/0x5450 [ 17.723655] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.723701] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.723734] ? trace_hardirqs_on+0x37/0xe0 [ 17.723757] ? kasan_atomics+0x152/0x310 [ 17.723785] kasan_atomics+0x1dc/0x310 [ 17.723808] ? __pfx_kasan_atomics+0x10/0x10 [ 17.723831] ? __pfx_kasan_atomics+0x10/0x10 [ 17.723863] kunit_try_run_case+0x1a5/0x480 [ 17.723899] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.723922] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.723945] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.723968] ? __kthread_parkme+0x82/0x180 [ 17.723988] ? preempt_count_sub+0x50/0x80 [ 17.724012] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.724035] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.724058] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.724080] kthread+0x337/0x6f0 [ 17.724111] ? trace_preempt_on+0x20/0xc0 [ 17.724140] ? __pfx_kthread+0x10/0x10 [ 17.724160] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.724181] ? calculate_sigpending+0x7b/0xa0 [ 17.724204] ? __pfx_kthread+0x10/0x10 [ 17.724225] ret_from_fork+0x116/0x1d0 [ 17.724243] ? __pfx_kthread+0x10/0x10 [ 17.724263] ret_from_fork_asm+0x1a/0x30 [ 17.724293] </TASK> [ 17.724306] [ 17.733213] Allocated by task 283: [ 17.733391] kasan_save_stack+0x45/0x70 [ 17.733771] kasan_save_track+0x18/0x40 [ 17.734076] kasan_save_alloc_info+0x3b/0x50 [ 17.734448] __kasan_kmalloc+0xb7/0xc0 [ 17.734757] __kmalloc_cache_noprof+0x189/0x420 [ 17.735146] kasan_atomics+0x95/0x310 [ 17.735449] kunit_try_run_case+0x1a5/0x480 [ 17.735799] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.736066] kthread+0x337/0x6f0 [ 17.736329] ret_from_fork+0x116/0x1d0 [ 17.736497] ret_from_fork_asm+0x1a/0x30 [ 17.736769] [ 17.736938] The buggy address belongs to the object at ffff888102ac4100 [ 17.736938] which belongs to the cache kmalloc-64 of size 64 [ 17.737584] The buggy address is located 0 bytes to the right of [ 17.737584] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 17.738214] [ 17.738329] The buggy address belongs to the physical page: [ 17.738532] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 17.739049] flags: 0x200000000000000(node=0|zone=2) [ 17.739442] page_type: f5(slab) [ 17.739742] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.740281] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.740686] page dumped because: kasan: bad access detected [ 17.740891] [ 17.740994] Memory state around the buggy address: [ 17.741306] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.741801] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.742223] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.742651] ^ [ 17.742846] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.743300] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.743828] ================================================================== [ 17.613954] ================================================================== [ 17.614341] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 17.615340] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 17.616005] [ 17.616227] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.616431] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.616458] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.616502] Call Trace: [ 17.616532] <TASK> [ 17.616564] dump_stack_lvl+0x73/0xb0 [ 17.616638] print_report+0xd1/0x650 [ 17.616678] ? __virt_addr_valid+0x1db/0x2d0 [ 17.616719] ? kasan_atomics_helper+0x1eaa/0x5450 [ 17.617200] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.617334] ? kasan_atomics_helper+0x1eaa/0x5450 [ 17.617383] kasan_report+0x141/0x180 [ 17.617430] ? kasan_atomics_helper+0x1eaa/0x5450 [ 17.617482] kasan_check_range+0x10c/0x1c0 [ 17.617548] __kasan_check_write+0x18/0x20 [ 17.617604] kasan_atomics_helper+0x1eaa/0x5450 [ 17.617660] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.617700] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.617745] ? trace_hardirqs_on+0x37/0xe0 [ 17.617814] ? kasan_atomics+0x152/0x310 [ 17.617882] kasan_atomics+0x1dc/0x310 [ 17.617933] ? __pfx_kasan_atomics+0x10/0x10 [ 17.618001] ? __pfx_kasan_atomics+0x10/0x10 [ 17.618065] kunit_try_run_case+0x1a5/0x480 [ 17.618111] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.618149] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.618192] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.618259] ? __kthread_parkme+0x82/0x180 [ 17.618311] ? preempt_count_sub+0x50/0x80 [ 17.618360] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.618406] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.618474] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.618533] kthread+0x337/0x6f0 [ 17.618567] ? trace_preempt_on+0x20/0xc0 [ 17.618598] ? __pfx_kthread+0x10/0x10 [ 17.618641] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.618670] ? calculate_sigpending+0x7b/0xa0 [ 17.618699] ? __pfx_kthread+0x10/0x10 [ 17.618727] ret_from_fork+0x116/0x1d0 [ 17.618750] ? __pfx_kthread+0x10/0x10 [ 17.618775] ret_from_fork_asm+0x1a/0x30 [ 17.618804] </TASK> [ 17.618818] [ 17.628917] Allocated by task 283: [ 17.629173] kasan_save_stack+0x45/0x70 [ 17.629520] kasan_save_track+0x18/0x40 [ 17.629805] kasan_save_alloc_info+0x3b/0x50 [ 17.630082] __kasan_kmalloc+0xb7/0xc0 [ 17.630461] __kmalloc_cache_noprof+0x189/0x420 [ 17.630850] kasan_atomics+0x95/0x310 [ 17.631104] kunit_try_run_case+0x1a5/0x480 [ 17.631596] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.631878] kthread+0x337/0x6f0 [ 17.632156] ret_from_fork+0x116/0x1d0 [ 17.632334] ret_from_fork_asm+0x1a/0x30 [ 17.632680] [ 17.632845] The buggy address belongs to the object at ffff888102ac4100 [ 17.632845] which belongs to the cache kmalloc-64 of size 64 [ 17.633562] The buggy address is located 0 bytes to the right of [ 17.633562] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 17.634313] [ 17.634518] The buggy address belongs to the physical page: [ 17.634916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 17.635284] flags: 0x200000000000000(node=0|zone=2) [ 17.635485] page_type: f5(slab) [ 17.635683] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.636202] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.636911] page dumped because: kasan: bad access detected [ 17.637368] [ 17.637535] Memory state around the buggy address: [ 17.637926] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.638168] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.638535] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.639176] ^ [ 17.639586] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.639948] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.640179] ================================================================== [ 16.828899] ================================================================== [ 16.829354] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 16.829820] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 16.830295] [ 16.830474] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.830573] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.830602] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.830654] Call Trace: [ 16.830685] <TASK> [ 16.830715] dump_stack_lvl+0x73/0xb0 [ 16.830772] print_report+0xd1/0x650 [ 16.830832] ? __virt_addr_valid+0x1db/0x2d0 [ 16.830876] ? kasan_atomics_helper+0xfa9/0x5450 [ 16.830916] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.830956] ? kasan_atomics_helper+0xfa9/0x5450 [ 16.830984] kasan_report+0x141/0x180 [ 16.831023] ? kasan_atomics_helper+0xfa9/0x5450 [ 16.831065] kasan_check_range+0x10c/0x1c0 [ 16.831136] __kasan_check_write+0x18/0x20 [ 16.831196] kasan_atomics_helper+0xfa9/0x5450 [ 16.831239] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.831282] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.831328] ? trace_hardirqs_on+0x37/0xe0 [ 16.831382] ? kasan_atomics+0x152/0x310 [ 16.831444] kasan_atomics+0x1dc/0x310 [ 16.831499] ? __pfx_kasan_atomics+0x10/0x10 [ 16.831545] ? __pfx_kasan_atomics+0x10/0x10 [ 16.831598] kunit_try_run_case+0x1a5/0x480 [ 16.831672] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.831725] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.831766] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.831809] ? __kthread_parkme+0x82/0x180 [ 16.831846] ? preempt_count_sub+0x50/0x80 [ 16.831891] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.831937] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.831984] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.832032] kthread+0x337/0x6f0 [ 16.832072] ? trace_preempt_on+0x20/0xc0 [ 16.832153] ? __pfx_kthread+0x10/0x10 [ 16.832198] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.832237] ? calculate_sigpending+0x7b/0xa0 [ 16.832262] ? __pfx_kthread+0x10/0x10 [ 16.832284] ret_from_fork+0x116/0x1d0 [ 16.832303] ? __pfx_kthread+0x10/0x10 [ 16.832353] ret_from_fork_asm+0x1a/0x30 [ 16.832386] </TASK> [ 16.832399] [ 16.841447] Allocated by task 283: [ 16.841677] kasan_save_stack+0x45/0x70 [ 16.841993] kasan_save_track+0x18/0x40 [ 16.842369] kasan_save_alloc_info+0x3b/0x50 [ 16.842731] __kasan_kmalloc+0xb7/0xc0 [ 16.843030] __kmalloc_cache_noprof+0x189/0x420 [ 16.843403] kasan_atomics+0x95/0x310 [ 16.843581] kunit_try_run_case+0x1a5/0x480 [ 16.843914] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.844242] kthread+0x337/0x6f0 [ 16.844425] ret_from_fork+0x116/0x1d0 [ 16.844633] ret_from_fork_asm+0x1a/0x30 [ 16.844843] [ 16.844961] The buggy address belongs to the object at ffff888102ac4100 [ 16.844961] which belongs to the cache kmalloc-64 of size 64 [ 16.845410] The buggy address is located 0 bytes to the right of [ 16.845410] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 16.846231] [ 16.846403] The buggy address belongs to the physical page: [ 16.846799] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 16.847345] flags: 0x200000000000000(node=0|zone=2) [ 16.847712] page_type: f5(slab) [ 16.847971] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.848507] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.849015] page dumped because: kasan: bad access detected [ 16.849241] [ 16.849409] Memory state around the buggy address: [ 16.849770] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.850218] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.850508] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.850765] ^ [ 16.850949] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.851394] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.851856] ================================================================== [ 17.172017] ================================================================== [ 17.172377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 17.172652] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 17.173208] [ 17.173417] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.173497] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.173521] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.173557] Call Trace: [ 17.173584] <TASK> [ 17.173651] dump_stack_lvl+0x73/0xb0 [ 17.173716] print_report+0xd1/0x650 [ 17.173753] ? __virt_addr_valid+0x1db/0x2d0 [ 17.173792] ? kasan_atomics_helper+0x50d4/0x5450 [ 17.173831] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.173879] ? kasan_atomics_helper+0x50d4/0x5450 [ 17.173931] kasan_report+0x141/0x180 [ 17.173976] ? kasan_atomics_helper+0x50d4/0x5450 [ 17.174023] __asan_report_store8_noabort+0x1b/0x30 [ 17.174068] kasan_atomics_helper+0x50d4/0x5450 [ 17.174159] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.174205] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.174252] ? trace_hardirqs_on+0x37/0xe0 [ 17.174294] ? kasan_atomics+0x152/0x310 [ 17.174360] kasan_atomics+0x1dc/0x310 [ 17.174405] ? __pfx_kasan_atomics+0x10/0x10 [ 17.174450] ? __pfx_kasan_atomics+0x10/0x10 [ 17.174498] kunit_try_run_case+0x1a5/0x480 [ 17.174531] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.174553] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.174576] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.174599] ? __kthread_parkme+0x82/0x180 [ 17.174635] ? preempt_count_sub+0x50/0x80 [ 17.174663] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.174687] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.174709] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.174732] kthread+0x337/0x6f0 [ 17.174752] ? trace_preempt_on+0x20/0xc0 [ 17.174774] ? __pfx_kthread+0x10/0x10 [ 17.174795] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.174816] ? calculate_sigpending+0x7b/0xa0 [ 17.174838] ? __pfx_kthread+0x10/0x10 [ 17.174859] ret_from_fork+0x116/0x1d0 [ 17.174877] ? __pfx_kthread+0x10/0x10 [ 17.174898] ret_from_fork_asm+0x1a/0x30 [ 17.174927] </TASK> [ 17.174940] [ 17.184119] Allocated by task 283: [ 17.184431] kasan_save_stack+0x45/0x70 [ 17.184704] kasan_save_track+0x18/0x40 [ 17.184901] kasan_save_alloc_info+0x3b/0x50 [ 17.185106] __kasan_kmalloc+0xb7/0xc0 [ 17.185292] __kmalloc_cache_noprof+0x189/0x420 [ 17.185511] kasan_atomics+0x95/0x310 [ 17.185793] kunit_try_run_case+0x1a5/0x480 [ 17.186124] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.186594] kthread+0x337/0x6f0 [ 17.186873] ret_from_fork+0x116/0x1d0 [ 17.187166] ret_from_fork_asm+0x1a/0x30 [ 17.187407] [ 17.187518] The buggy address belongs to the object at ffff888102ac4100 [ 17.187518] which belongs to the cache kmalloc-64 of size 64 [ 17.188206] The buggy address is located 0 bytes to the right of [ 17.188206] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 17.188839] [ 17.189022] The buggy address belongs to the physical page: [ 17.189502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 17.189898] flags: 0x200000000000000(node=0|zone=2) [ 17.190162] page_type: f5(slab) [ 17.190428] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.190730] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.191212] page dumped because: kasan: bad access detected [ 17.191440] [ 17.191594] Memory state around the buggy address: [ 17.191892] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.192496] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.192758] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.193252] ^ [ 17.193510] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.193883] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.194351] ================================================================== [ 17.641263] ================================================================== [ 17.641799] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 17.642146] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 17.642385] [ 17.642514] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.642600] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.642863] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.642930] Call Trace: [ 17.642965] <TASK> [ 17.642997] dump_stack_lvl+0x73/0xb0 [ 17.643063] print_report+0xd1/0x650 [ 17.643110] ? __virt_addr_valid+0x1db/0x2d0 [ 17.643165] ? kasan_atomics_helper+0x1f43/0x5450 [ 17.643209] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.643263] ? kasan_atomics_helper+0x1f43/0x5450 [ 17.643310] kasan_report+0x141/0x180 [ 17.643355] ? kasan_atomics_helper+0x1f43/0x5450 [ 17.643411] kasan_check_range+0x10c/0x1c0 [ 17.643460] __kasan_check_write+0x18/0x20 [ 17.643502] kasan_atomics_helper+0x1f43/0x5450 [ 17.643550] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.643598] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.643664] ? trace_hardirqs_on+0x37/0xe0 [ 17.643711] ? kasan_atomics+0x152/0x310 [ 17.643767] kasan_atomics+0x1dc/0x310 [ 17.643817] ? __pfx_kasan_atomics+0x10/0x10 [ 17.643865] ? __pfx_kasan_atomics+0x10/0x10 [ 17.643920] kunit_try_run_case+0x1a5/0x480 [ 17.643966] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.644012] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.644058] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.644104] ? __kthread_parkme+0x82/0x180 [ 17.644147] ? preempt_count_sub+0x50/0x80 [ 17.644190] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.644231] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.644305] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.644346] kthread+0x337/0x6f0 [ 17.644403] ? trace_preempt_on+0x20/0xc0 [ 17.644447] ? __pfx_kthread+0x10/0x10 [ 17.644485] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.644519] ? calculate_sigpending+0x7b/0xa0 [ 17.644557] ? __pfx_kthread+0x10/0x10 [ 17.644598] ret_from_fork+0x116/0x1d0 [ 17.644674] ? __pfx_kthread+0x10/0x10 [ 17.644716] ret_from_fork_asm+0x1a/0x30 [ 17.644792] </TASK> [ 17.644819] [ 17.655537] Allocated by task 283: [ 17.655847] kasan_save_stack+0x45/0x70 [ 17.656045] kasan_save_track+0x18/0x40 [ 17.656209] kasan_save_alloc_info+0x3b/0x50 [ 17.656392] __kasan_kmalloc+0xb7/0xc0 [ 17.656711] __kmalloc_cache_noprof+0x189/0x420 [ 17.657071] kasan_atomics+0x95/0x310 [ 17.657417] kunit_try_run_case+0x1a5/0x480 [ 17.657742] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.658145] kthread+0x337/0x6f0 [ 17.658345] ret_from_fork+0x116/0x1d0 [ 17.658515] ret_from_fork_asm+0x1a/0x30 [ 17.658710] [ 17.658894] The buggy address belongs to the object at ffff888102ac4100 [ 17.658894] which belongs to the cache kmalloc-64 of size 64 [ 17.659893] The buggy address is located 0 bytes to the right of [ 17.659893] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 17.660895] [ 17.661071] The buggy address belongs to the physical page: [ 17.661520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 17.662033] flags: 0x200000000000000(node=0|zone=2) [ 17.662237] page_type: f5(slab) [ 17.662389] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.662654] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.663189] page dumped because: kasan: bad access detected [ 17.663627] [ 17.663840] Memory state around the buggy address: [ 17.664232] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.664836] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.665079] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.665313] ^ [ 17.665530] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.666118] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.666606] ================================================================== [ 17.346391] ================================================================== [ 17.347008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 17.347388] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 17.347739] [ 17.347902] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.347986] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.348014] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.348054] Call Trace: [ 17.348085] <TASK> [ 17.348113] dump_stack_lvl+0x73/0xb0 [ 17.348164] print_report+0xd1/0x650 [ 17.348206] ? __virt_addr_valid+0x1db/0x2d0 [ 17.348246] ? kasan_atomics_helper+0x18b1/0x5450 [ 17.348279] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.348325] ? kasan_atomics_helper+0x18b1/0x5450 [ 17.348364] kasan_report+0x141/0x180 [ 17.348405] ? kasan_atomics_helper+0x18b1/0x5450 [ 17.348459] kasan_check_range+0x10c/0x1c0 [ 17.348508] __kasan_check_write+0x18/0x20 [ 17.348547] kasan_atomics_helper+0x18b1/0x5450 [ 17.348595] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.348653] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.348704] ? trace_hardirqs_on+0x37/0xe0 [ 17.348751] ? kasan_atomics+0x152/0x310 [ 17.348805] kasan_atomics+0x1dc/0x310 [ 17.348850] ? __pfx_kasan_atomics+0x10/0x10 [ 17.348897] ? __pfx_kasan_atomics+0x10/0x10 [ 17.348953] kunit_try_run_case+0x1a5/0x480 [ 17.349000] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.349045] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.349094] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.349138] ? __kthread_parkme+0x82/0x180 [ 17.349180] ? preempt_count_sub+0x50/0x80 [ 17.349230] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.349278] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.349324] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.349371] kthread+0x337/0x6f0 [ 17.349413] ? trace_preempt_on+0x20/0xc0 [ 17.349461] ? __pfx_kthread+0x10/0x10 [ 17.349504] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.349548] ? calculate_sigpending+0x7b/0xa0 [ 17.349594] ? __pfx_kthread+0x10/0x10 [ 17.349648] ret_from_fork+0x116/0x1d0 [ 17.349683] ? __pfx_kthread+0x10/0x10 [ 17.349728] ret_from_fork_asm+0x1a/0x30 [ 17.349786] </TASK> [ 17.349812] [ 17.362429] Allocated by task 283: [ 17.362753] kasan_save_stack+0x45/0x70 [ 17.363068] kasan_save_track+0x18/0x40 [ 17.363418] kasan_save_alloc_info+0x3b/0x50 [ 17.363695] __kasan_kmalloc+0xb7/0xc0 [ 17.363870] __kmalloc_cache_noprof+0x189/0x420 [ 17.364058] kasan_atomics+0x95/0x310 [ 17.364288] kunit_try_run_case+0x1a5/0x480 [ 17.364666] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.365057] kthread+0x337/0x6f0 [ 17.365388] ret_from_fork+0x116/0x1d0 [ 17.365696] ret_from_fork_asm+0x1a/0x30 [ 17.365998] [ 17.366234] The buggy address belongs to the object at ffff888102ac4100 [ 17.366234] which belongs to the cache kmalloc-64 of size 64 [ 17.366778] The buggy address is located 0 bytes to the right of [ 17.366778] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 17.367192] [ 17.367304] The buggy address belongs to the physical page: [ 17.367520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 17.368086] flags: 0x200000000000000(node=0|zone=2) [ 17.368506] page_type: f5(slab) [ 17.368806] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.369380] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.369971] page dumped because: kasan: bad access detected [ 17.370388] [ 17.370565] Memory state around the buggy address: [ 17.370783] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.371028] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.371439] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.371982] ^ [ 17.372480] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.372980] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.373417] ================================================================== [ 17.479690] ================================================================== [ 17.480306] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 17.480652] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 17.481153] [ 17.481308] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.481376] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.481399] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.481440] Call Trace: [ 17.481470] <TASK> [ 17.481503] dump_stack_lvl+0x73/0xb0 [ 17.481556] print_report+0xd1/0x650 [ 17.481599] ? __virt_addr_valid+0x1db/0x2d0 [ 17.481711] ? kasan_atomics_helper+0x1c18/0x5450 [ 17.481750] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.481791] ? kasan_atomics_helper+0x1c18/0x5450 [ 17.481831] kasan_report+0x141/0x180 [ 17.481875] ? kasan_atomics_helper+0x1c18/0x5450 [ 17.481936] kasan_check_range+0x10c/0x1c0 [ 17.481987] __kasan_check_write+0x18/0x20 [ 17.482029] kasan_atomics_helper+0x1c18/0x5450 [ 17.482072] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.482145] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.482197] ? trace_hardirqs_on+0x37/0xe0 [ 17.482241] ? kasan_atomics+0x152/0x310 [ 17.482298] kasan_atomics+0x1dc/0x310 [ 17.482339] ? __pfx_kasan_atomics+0x10/0x10 [ 17.482383] ? __pfx_kasan_atomics+0x10/0x10 [ 17.482438] kunit_try_run_case+0x1a5/0x480 [ 17.482484] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.482522] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.482547] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.482569] ? __kthread_parkme+0x82/0x180 [ 17.482589] ? preempt_count_sub+0x50/0x80 [ 17.482611] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.482652] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.482676] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.482697] kthread+0x337/0x6f0 [ 17.482716] ? trace_preempt_on+0x20/0xc0 [ 17.482738] ? __pfx_kthread+0x10/0x10 [ 17.482759] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.482779] ? calculate_sigpending+0x7b/0xa0 [ 17.482803] ? __pfx_kthread+0x10/0x10 [ 17.482825] ret_from_fork+0x116/0x1d0 [ 17.482844] ? __pfx_kthread+0x10/0x10 [ 17.482864] ret_from_fork_asm+0x1a/0x30 [ 17.482895] </TASK> [ 17.482907] [ 17.491431] Allocated by task 283: [ 17.491758] kasan_save_stack+0x45/0x70 [ 17.491977] kasan_save_track+0x18/0x40 [ 17.492290] kasan_save_alloc_info+0x3b/0x50 [ 17.492528] __kasan_kmalloc+0xb7/0xc0 [ 17.492790] __kmalloc_cache_noprof+0x189/0x420 [ 17.493137] kasan_atomics+0x95/0x310 [ 17.493370] kunit_try_run_case+0x1a5/0x480 [ 17.493701] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.493929] kthread+0x337/0x6f0 [ 17.494181] ret_from_fork+0x116/0x1d0 [ 17.494585] ret_from_fork_asm+0x1a/0x30 [ 17.494807] [ 17.494907] The buggy address belongs to the object at ffff888102ac4100 [ 17.494907] which belongs to the cache kmalloc-64 of size 64 [ 17.495256] The buggy address is located 0 bytes to the right of [ 17.495256] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 17.495633] [ 17.495741] The buggy address belongs to the physical page: [ 17.495936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 17.496594] flags: 0x200000000000000(node=0|zone=2) [ 17.496985] page_type: f5(slab) [ 17.497248] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.497962] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.498572] page dumped because: kasan: bad access detected [ 17.498842] [ 17.498947] Memory state around the buggy address: [ 17.499130] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.499679] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.500501] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.501091] ^ [ 17.501737] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.502217] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.502604] ================================================================== [ 16.153508] ================================================================== [ 16.154054] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 16.154518] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 16.154925] [ 16.155490] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.155832] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.155862] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.155892] Call Trace: [ 16.155910] <TASK> [ 16.155929] dump_stack_lvl+0x73/0xb0 [ 16.155962] print_report+0xd1/0x650 [ 16.155983] ? __virt_addr_valid+0x1db/0x2d0 [ 16.156004] ? kasan_atomics_helper+0x4ba2/0x5450 [ 16.156024] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.156048] ? kasan_atomics_helper+0x4ba2/0x5450 [ 16.156067] kasan_report+0x141/0x180 [ 16.156087] ? kasan_atomics_helper+0x4ba2/0x5450 [ 16.156119] __asan_report_store4_noabort+0x1b/0x30 [ 16.156153] kasan_atomics_helper+0x4ba2/0x5450 [ 16.156185] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.156214] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.156248] ? trace_hardirqs_on+0x37/0xe0 [ 16.156280] ? kasan_atomics+0x152/0x310 [ 16.156313] kasan_atomics+0x1dc/0x310 [ 16.156334] ? __pfx_kasan_atomics+0x10/0x10 [ 16.156356] ? __pfx_kasan_atomics+0x10/0x10 [ 16.156381] kunit_try_run_case+0x1a5/0x480 [ 16.156403] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.156424] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.156452] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.156484] ? __kthread_parkme+0x82/0x180 [ 16.156515] ? preempt_count_sub+0x50/0x80 [ 16.156556] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.156594] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.156678] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.156729] kthread+0x337/0x6f0 [ 16.156763] ? trace_preempt_on+0x20/0xc0 [ 16.156797] ? __pfx_kthread+0x10/0x10 [ 16.156828] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.156857] ? calculate_sigpending+0x7b/0xa0 [ 16.156891] ? __pfx_kthread+0x10/0x10 [ 16.156923] ret_from_fork+0x116/0x1d0 [ 16.156951] ? __pfx_kthread+0x10/0x10 [ 16.156981] ret_from_fork_asm+0x1a/0x30 [ 16.157031] </TASK> [ 16.157051] [ 16.168679] Allocated by task 283: [ 16.168972] kasan_save_stack+0x45/0x70 [ 16.169323] kasan_save_track+0x18/0x40 [ 16.169779] kasan_save_alloc_info+0x3b/0x50 [ 16.170058] __kasan_kmalloc+0xb7/0xc0 [ 16.170383] __kmalloc_cache_noprof+0x189/0x420 [ 16.170774] kasan_atomics+0x95/0x310 [ 16.171133] kunit_try_run_case+0x1a5/0x480 [ 16.171399] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.172078] kthread+0x337/0x6f0 [ 16.172365] ret_from_fork+0x116/0x1d0 [ 16.172648] ret_from_fork_asm+0x1a/0x30 [ 16.172957] [ 16.173085] The buggy address belongs to the object at ffff888102ac4100 [ 16.173085] which belongs to the cache kmalloc-64 of size 64 [ 16.174032] The buggy address is located 0 bytes to the right of [ 16.174032] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 16.174818] [ 16.175012] The buggy address belongs to the physical page: [ 16.175426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 16.176261] flags: 0x200000000000000(node=0|zone=2) [ 16.176559] page_type: f5(slab) [ 16.177024] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.177777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.178059] page dumped because: kasan: bad access detected [ 16.178488] [ 16.178773] Memory state around the buggy address: [ 16.179043] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.179482] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.179938] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.180394] ^ [ 16.180632] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.180946] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.181217] ================================================================== [ 16.121054] ================================================================== [ 16.121982] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 16.122502] Read of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 16.123061] [ 16.123348] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.123430] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.123454] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.123520] Call Trace: [ 16.123560] <TASK> [ 16.123589] dump_stack_lvl+0x73/0xb0 [ 16.123807] print_report+0xd1/0x650 [ 16.124129] ? __virt_addr_valid+0x1db/0x2d0 [ 16.124171] ? kasan_atomics_helper+0x4bbc/0x5450 [ 16.124241] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.124283] ? kasan_atomics_helper+0x4bbc/0x5450 [ 16.124334] kasan_report+0x141/0x180 [ 16.124379] ? kasan_atomics_helper+0x4bbc/0x5450 [ 16.124426] __asan_report_load4_noabort+0x18/0x20 [ 16.124493] kasan_atomics_helper+0x4bbc/0x5450 [ 16.124535] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.124591] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.124646] ? trace_hardirqs_on+0x37/0xe0 [ 16.124682] ? kasan_atomics+0x152/0x310 [ 16.124721] kasan_atomics+0x1dc/0x310 [ 16.124754] ? __pfx_kasan_atomics+0x10/0x10 [ 16.124789] ? __pfx_kasan_atomics+0x10/0x10 [ 16.124816] kunit_try_run_case+0x1a5/0x480 [ 16.124839] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.124859] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.124882] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.124903] ? __kthread_parkme+0x82/0x180 [ 16.124922] ? preempt_count_sub+0x50/0x80 [ 16.124944] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.124966] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.124987] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.125009] kthread+0x337/0x6f0 [ 16.125028] ? trace_preempt_on+0x20/0xc0 [ 16.125048] ? __pfx_kthread+0x10/0x10 [ 16.125067] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.125086] ? calculate_sigpending+0x7b/0xa0 [ 16.125113] ? __pfx_kthread+0x10/0x10 [ 16.125139] ret_from_fork+0x116/0x1d0 [ 16.125157] ? __pfx_kthread+0x10/0x10 [ 16.125175] ret_from_fork_asm+0x1a/0x30 [ 16.125204] </TASK> [ 16.125215] [ 16.137738] Allocated by task 283: [ 16.138257] kasan_save_stack+0x45/0x70 [ 16.138986] kasan_save_track+0x18/0x40 [ 16.139307] kasan_save_alloc_info+0x3b/0x50 [ 16.139692] __kasan_kmalloc+0xb7/0xc0 [ 16.140079] __kmalloc_cache_noprof+0x189/0x420 [ 16.140482] kasan_atomics+0x95/0x310 [ 16.140992] kunit_try_run_case+0x1a5/0x480 [ 16.141329] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.141758] kthread+0x337/0x6f0 [ 16.142178] ret_from_fork+0x116/0x1d0 [ 16.142418] ret_from_fork_asm+0x1a/0x30 [ 16.142690] [ 16.143342] The buggy address belongs to the object at ffff888102ac4100 [ 16.143342] which belongs to the cache kmalloc-64 of size 64 [ 16.144295] The buggy address is located 0 bytes to the right of [ 16.144295] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 16.145113] [ 16.145310] The buggy address belongs to the physical page: [ 16.145802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 16.146085] flags: 0x200000000000000(node=0|zone=2) [ 16.146359] page_type: f5(slab) [ 16.147004] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.147525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.147785] page dumped because: kasan: bad access detected [ 16.148408] [ 16.148743] Memory state around the buggy address: [ 16.149792] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.150101] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.150655] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.151351] ^ [ 16.151526] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.152129] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.152786] ================================================================== [ 17.016979] ================================================================== [ 17.017446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 17.017905] Read of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 17.018472] [ 17.018744] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.018853] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.018881] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.018921] Call Trace: [ 17.018949] <TASK> [ 17.018980] dump_stack_lvl+0x73/0xb0 [ 17.019041] print_report+0xd1/0x650 [ 17.019087] ? __virt_addr_valid+0x1db/0x2d0 [ 17.019144] ? kasan_atomics_helper+0x49e8/0x5450 [ 17.019780] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.019884] ? kasan_atomics_helper+0x49e8/0x5450 [ 17.019928] kasan_report+0x141/0x180 [ 17.019974] ? kasan_atomics_helper+0x49e8/0x5450 [ 17.020022] __asan_report_load4_noabort+0x18/0x20 [ 17.020068] kasan_atomics_helper+0x49e8/0x5450 [ 17.020146] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.020189] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.020225] ? trace_hardirqs_on+0x37/0xe0 [ 17.020256] ? kasan_atomics+0x152/0x310 [ 17.020290] kasan_atomics+0x1dc/0x310 [ 17.020319] ? __pfx_kasan_atomics+0x10/0x10 [ 17.020348] ? __pfx_kasan_atomics+0x10/0x10 [ 17.020383] kunit_try_run_case+0x1a5/0x480 [ 17.020412] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.020439] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.020468] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.020496] ? __kthread_parkme+0x82/0x180 [ 17.020522] ? preempt_count_sub+0x50/0x80 [ 17.020553] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.020581] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.020610] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.020655] kthread+0x337/0x6f0 [ 17.020680] ? trace_preempt_on+0x20/0xc0 [ 17.020701] ? __pfx_kthread+0x10/0x10 [ 17.020721] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.020741] ? calculate_sigpending+0x7b/0xa0 [ 17.020764] ? __pfx_kthread+0x10/0x10 [ 17.020784] ret_from_fork+0x116/0x1d0 [ 17.020802] ? __pfx_kthread+0x10/0x10 [ 17.020822] ret_from_fork_asm+0x1a/0x30 [ 17.020853] </TASK> [ 17.020866] [ 17.029847] Allocated by task 283: [ 17.030032] kasan_save_stack+0x45/0x70 [ 17.030247] kasan_save_track+0x18/0x40 [ 17.030569] kasan_save_alloc_info+0x3b/0x50 [ 17.030919] __kasan_kmalloc+0xb7/0xc0 [ 17.031256] __kmalloc_cache_noprof+0x189/0x420 [ 17.031603] kasan_atomics+0x95/0x310 [ 17.031907] kunit_try_run_case+0x1a5/0x480 [ 17.032181] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.032451] kthread+0x337/0x6f0 [ 17.032652] ret_from_fork+0x116/0x1d0 [ 17.032820] ret_from_fork_asm+0x1a/0x30 [ 17.032996] [ 17.033112] The buggy address belongs to the object at ffff888102ac4100 [ 17.033112] which belongs to the cache kmalloc-64 of size 64 [ 17.033467] The buggy address is located 0 bytes to the right of [ 17.033467] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 17.034426] [ 17.034802] The buggy address belongs to the physical page: [ 17.035255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 17.035880] flags: 0x200000000000000(node=0|zone=2) [ 17.036333] page_type: f5(slab) [ 17.036571] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.036983] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.037267] page dumped because: kasan: bad access detected [ 17.037465] [ 17.037570] Memory state around the buggy address: [ 17.037923] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.038424] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.038996] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.039500] ^ [ 17.039930] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.040388] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.040840] ================================================================== [ 17.145089] ================================================================== [ 17.145391] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 17.145604] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 17.146310] [ 17.146498] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.146584] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.146610] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.146666] Call Trace: [ 17.146692] <TASK> [ 17.146717] dump_stack_lvl+0x73/0xb0 [ 17.146773] print_report+0xd1/0x650 [ 17.146840] ? __virt_addr_valid+0x1db/0x2d0 [ 17.146895] ? kasan_atomics_helper+0x1467/0x5450 [ 17.146934] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.146984] ? kasan_atomics_helper+0x1467/0x5450 [ 17.147038] kasan_report+0x141/0x180 [ 17.147090] ? kasan_atomics_helper+0x1467/0x5450 [ 17.147162] kasan_check_range+0x10c/0x1c0 [ 17.147207] __kasan_check_write+0x18/0x20 [ 17.147244] kasan_atomics_helper+0x1467/0x5450 [ 17.147290] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.147334] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.147385] ? trace_hardirqs_on+0x37/0xe0 [ 17.147429] ? kasan_atomics+0x152/0x310 [ 17.147484] kasan_atomics+0x1dc/0x310 [ 17.147527] ? __pfx_kasan_atomics+0x10/0x10 [ 17.147563] ? __pfx_kasan_atomics+0x10/0x10 [ 17.147591] kunit_try_run_case+0x1a5/0x480 [ 17.147633] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.147658] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.147682] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.147704] ? __kthread_parkme+0x82/0x180 [ 17.147724] ? preempt_count_sub+0x50/0x80 [ 17.147747] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.147770] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.147794] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.147816] kthread+0x337/0x6f0 [ 17.147835] ? trace_preempt_on+0x20/0xc0 [ 17.147857] ? __pfx_kthread+0x10/0x10 [ 17.147878] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.147898] ? calculate_sigpending+0x7b/0xa0 [ 17.147921] ? __pfx_kthread+0x10/0x10 [ 17.147942] ret_from_fork+0x116/0x1d0 [ 17.147961] ? __pfx_kthread+0x10/0x10 [ 17.147981] ret_from_fork_asm+0x1a/0x30 [ 17.148010] </TASK> [ 17.148022] [ 17.158823] Allocated by task 283: [ 17.159008] kasan_save_stack+0x45/0x70 [ 17.159335] kasan_save_track+0x18/0x40 [ 17.159634] kasan_save_alloc_info+0x3b/0x50 [ 17.160034] __kasan_kmalloc+0xb7/0xc0 [ 17.160384] __kmalloc_cache_noprof+0x189/0x420 [ 17.160594] kasan_atomics+0x95/0x310 [ 17.160782] kunit_try_run_case+0x1a5/0x480 [ 17.160972] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.161633] kthread+0x337/0x6f0 [ 17.161906] ret_from_fork+0x116/0x1d0 [ 17.162086] ret_from_fork_asm+0x1a/0x30 [ 17.162675] [ 17.162886] The buggy address belongs to the object at ffff888102ac4100 [ 17.162886] which belongs to the cache kmalloc-64 of size 64 [ 17.163586] The buggy address is located 0 bytes to the right of [ 17.163586] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 17.164525] [ 17.164718] The buggy address belongs to the physical page: [ 17.165118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 17.165583] flags: 0x200000000000000(node=0|zone=2) [ 17.165903] page_type: f5(slab) [ 17.166232] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.166762] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.167425] page dumped because: kasan: bad access detected [ 17.167738] [ 17.167887] Memory state around the buggy address: [ 17.168469] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.168777] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.169053] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.170075] ^ [ 17.170352] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.170802] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.171138] ================================================================== [ 16.753337] ================================================================== [ 16.753779] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 16.754046] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 16.755130] [ 16.755367] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.755460] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.755487] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.755529] Call Trace: [ 16.755563] <TASK> [ 16.755595] dump_stack_lvl+0x73/0xb0 [ 16.755656] print_report+0xd1/0x650 [ 16.755688] ? __virt_addr_valid+0x1db/0x2d0 [ 16.755717] ? kasan_atomics_helper+0xde0/0x5450 [ 16.755742] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.755767] ? kasan_atomics_helper+0xde0/0x5450 [ 16.755788] kasan_report+0x141/0x180 [ 16.755810] ? kasan_atomics_helper+0xde0/0x5450 [ 16.755834] kasan_check_range+0x10c/0x1c0 [ 16.755857] __kasan_check_write+0x18/0x20 [ 16.755876] kasan_atomics_helper+0xde0/0x5450 [ 16.755898] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.755919] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.755942] ? trace_hardirqs_on+0x37/0xe0 [ 16.755964] ? kasan_atomics+0x152/0x310 [ 16.755990] kasan_atomics+0x1dc/0x310 [ 16.756012] ? __pfx_kasan_atomics+0x10/0x10 [ 16.756035] ? __pfx_kasan_atomics+0x10/0x10 [ 16.756061] kunit_try_run_case+0x1a5/0x480 [ 16.756084] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.756110] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.756147] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.756186] ? __kthread_parkme+0x82/0x180 [ 16.756216] ? preempt_count_sub+0x50/0x80 [ 16.756253] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.756293] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.756334] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.756372] kthread+0x337/0x6f0 [ 16.756403] ? trace_preempt_on+0x20/0xc0 [ 16.756440] ? __pfx_kthread+0x10/0x10 [ 16.756478] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.756517] ? calculate_sigpending+0x7b/0xa0 [ 16.756560] ? __pfx_kthread+0x10/0x10 [ 16.756599] ret_from_fork+0x116/0x1d0 [ 16.756650] ? __pfx_kthread+0x10/0x10 [ 16.756689] ret_from_fork_asm+0x1a/0x30 [ 16.756745] </TASK> [ 16.756770] [ 16.767037] Allocated by task 283: [ 16.767342] kasan_save_stack+0x45/0x70 [ 16.767675] kasan_save_track+0x18/0x40 [ 16.767973] kasan_save_alloc_info+0x3b/0x50 [ 16.768268] __kasan_kmalloc+0xb7/0xc0 [ 16.768560] __kmalloc_cache_noprof+0x189/0x420 [ 16.768930] kasan_atomics+0x95/0x310 [ 16.769232] kunit_try_run_case+0x1a5/0x480 [ 16.769513] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.769797] kthread+0x337/0x6f0 [ 16.769960] ret_from_fork+0x116/0x1d0 [ 16.770161] ret_from_fork_asm+0x1a/0x30 [ 16.770336] [ 16.770447] The buggy address belongs to the object at ffff888102ac4100 [ 16.770447] which belongs to the cache kmalloc-64 of size 64 [ 16.771046] The buggy address is located 0 bytes to the right of [ 16.771046] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 16.771882] [ 16.772033] The buggy address belongs to the physical page: [ 16.772257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 16.772798] flags: 0x200000000000000(node=0|zone=2) [ 16.773152] page_type: f5(slab) [ 16.773368] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.773635] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.773885] page dumped because: kasan: bad access detected [ 16.774088] [ 16.774235] Memory state around the buggy address: [ 16.774527] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.775007] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.775498] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.775959] ^ [ 16.776311] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.776789] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.777152] ================================================================== [ 16.597835] ================================================================== [ 16.598172] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 16.598696] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 16.599027] [ 16.599194] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.599278] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.599306] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.599347] Call Trace: [ 16.599375] <TASK> [ 16.599402] dump_stack_lvl+0x73/0xb0 [ 16.599454] print_report+0xd1/0x650 [ 16.599496] ? __virt_addr_valid+0x1db/0x2d0 [ 16.599544] ? kasan_atomics_helper+0xa2b/0x5450 [ 16.599584] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.599659] ? kasan_atomics_helper+0xa2b/0x5450 [ 16.599701] kasan_report+0x141/0x180 [ 16.599744] ? kasan_atomics_helper+0xa2b/0x5450 [ 16.599798] kasan_check_range+0x10c/0x1c0 [ 16.599850] __kasan_check_write+0x18/0x20 [ 16.599889] kasan_atomics_helper+0xa2b/0x5450 [ 16.599945] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.599990] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.600039] ? trace_hardirqs_on+0x37/0xe0 [ 16.600083] ? kasan_atomics+0x152/0x310 [ 16.600170] kasan_atomics+0x1dc/0x310 [ 16.600214] ? __pfx_kasan_atomics+0x10/0x10 [ 16.600252] ? __pfx_kasan_atomics+0x10/0x10 [ 16.600287] kunit_try_run_case+0x1a5/0x480 [ 16.600318] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.600339] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.600363] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.600386] ? __kthread_parkme+0x82/0x180 [ 16.600406] ? preempt_count_sub+0x50/0x80 [ 16.600429] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.600452] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.600474] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.600496] kthread+0x337/0x6f0 [ 16.600515] ? trace_preempt_on+0x20/0xc0 [ 16.600537] ? __pfx_kthread+0x10/0x10 [ 16.600558] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.600578] ? calculate_sigpending+0x7b/0xa0 [ 16.600601] ? __pfx_kthread+0x10/0x10 [ 16.600642] ret_from_fork+0x116/0x1d0 [ 16.600663] ? __pfx_kthread+0x10/0x10 [ 16.600684] ret_from_fork_asm+0x1a/0x30 [ 16.600714] </TASK> [ 16.600728] [ 16.609871] Allocated by task 283: [ 16.610191] kasan_save_stack+0x45/0x70 [ 16.610389] kasan_save_track+0x18/0x40 [ 16.610551] kasan_save_alloc_info+0x3b/0x50 [ 16.610900] __kasan_kmalloc+0xb7/0xc0 [ 16.611232] __kmalloc_cache_noprof+0x189/0x420 [ 16.611581] kasan_atomics+0x95/0x310 [ 16.611884] kunit_try_run_case+0x1a5/0x480 [ 16.612221] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.612652] kthread+0x337/0x6f0 [ 16.612829] ret_from_fork+0x116/0x1d0 [ 16.612975] ret_from_fork_asm+0x1a/0x30 [ 16.613326] [ 16.613468] The buggy address belongs to the object at ffff888102ac4100 [ 16.613468] which belongs to the cache kmalloc-64 of size 64 [ 16.614133] The buggy address is located 0 bytes to the right of [ 16.614133] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 16.614746] [ 16.614934] The buggy address belongs to the physical page: [ 16.615235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 16.615627] flags: 0x200000000000000(node=0|zone=2) [ 16.616015] page_type: f5(slab) [ 16.616315] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.616625] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.617170] page dumped because: kasan: bad access detected [ 16.617455] [ 16.617639] Memory state around the buggy address: [ 16.617924] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.618384] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.618721] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.619084] ^ [ 16.619303] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.619542] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.620000] ================================================================== [ 17.400183] ================================================================== [ 17.400732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 17.401054] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 17.401537] [ 17.401686] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.401777] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.401803] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.401842] Call Trace: [ 17.401871] <TASK> [ 17.401904] dump_stack_lvl+0x73/0xb0 [ 17.401969] print_report+0xd1/0x650 [ 17.402009] ? __virt_addr_valid+0x1db/0x2d0 [ 17.402041] ? kasan_atomics_helper+0x19e3/0x5450 [ 17.402072] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.402142] ? kasan_atomics_helper+0x19e3/0x5450 [ 17.402189] kasan_report+0x141/0x180 [ 17.402232] ? kasan_atomics_helper+0x19e3/0x5450 [ 17.402289] kasan_check_range+0x10c/0x1c0 [ 17.402325] __kasan_check_write+0x18/0x20 [ 17.402353] kasan_atomics_helper+0x19e3/0x5450 [ 17.402385] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.402417] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.402450] ? trace_hardirqs_on+0x37/0xe0 [ 17.402485] ? kasan_atomics+0x152/0x310 [ 17.402554] kasan_atomics+0x1dc/0x310 [ 17.402601] ? __pfx_kasan_atomics+0x10/0x10 [ 17.402661] ? __pfx_kasan_atomics+0x10/0x10 [ 17.402716] kunit_try_run_case+0x1a5/0x480 [ 17.402766] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.402811] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.402856] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.402901] ? __kthread_parkme+0x82/0x180 [ 17.402944] ? preempt_count_sub+0x50/0x80 [ 17.402986] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.403024] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.403063] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.403128] kthread+0x337/0x6f0 [ 17.403176] ? trace_preempt_on+0x20/0xc0 [ 17.403220] ? __pfx_kthread+0x10/0x10 [ 17.403280] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.403319] ? calculate_sigpending+0x7b/0xa0 [ 17.403376] ? __pfx_kthread+0x10/0x10 [ 17.403418] ret_from_fork+0x116/0x1d0 [ 17.403451] ? __pfx_kthread+0x10/0x10 [ 17.403491] ret_from_fork_asm+0x1a/0x30 [ 17.403554] </TASK> [ 17.403580] [ 17.413036] Allocated by task 283: [ 17.413303] kasan_save_stack+0x45/0x70 [ 17.413641] kasan_save_track+0x18/0x40 [ 17.413928] kasan_save_alloc_info+0x3b/0x50 [ 17.414285] __kasan_kmalloc+0xb7/0xc0 [ 17.414596] __kmalloc_cache_noprof+0x189/0x420 [ 17.414852] kasan_atomics+0x95/0x310 [ 17.415027] kunit_try_run_case+0x1a5/0x480 [ 17.415374] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.415779] kthread+0x337/0x6f0 [ 17.416047] ret_from_fork+0x116/0x1d0 [ 17.416319] ret_from_fork_asm+0x1a/0x30 [ 17.416497] [ 17.416604] The buggy address belongs to the object at ffff888102ac4100 [ 17.416604] which belongs to the cache kmalloc-64 of size 64 [ 17.417430] The buggy address is located 0 bytes to the right of [ 17.417430] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 17.417941] [ 17.418167] The buggy address belongs to the physical page: [ 17.418546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 17.418825] flags: 0x200000000000000(node=0|zone=2) [ 17.419020] page_type: f5(slab) [ 17.419212] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.419465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.420058] page dumped because: kasan: bad access detected [ 17.420552] [ 17.420754] Memory state around the buggy address: [ 17.421131] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.421607] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.422157] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.422606] ^ [ 17.422910] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.423417] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.423841] ================================================================== [ 16.571836] ================================================================== [ 16.572447] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 16.573021] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 16.573330] [ 16.573520] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.573635] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.573664] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.573704] Call Trace: [ 16.573733] <TASK> [ 16.573765] dump_stack_lvl+0x73/0xb0 [ 16.573824] print_report+0xd1/0x650 [ 16.573865] ? __virt_addr_valid+0x1db/0x2d0 [ 16.573906] ? kasan_atomics_helper+0x992/0x5450 [ 16.573952] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.574015] ? kasan_atomics_helper+0x992/0x5450 [ 16.574058] kasan_report+0x141/0x180 [ 16.574130] ? kasan_atomics_helper+0x992/0x5450 [ 16.574179] kasan_check_range+0x10c/0x1c0 [ 16.574225] __kasan_check_write+0x18/0x20 [ 16.574280] kasan_atomics_helper+0x992/0x5450 [ 16.574323] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.574364] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.574406] ? trace_hardirqs_on+0x37/0xe0 [ 16.574450] ? kasan_atomics+0x152/0x310 [ 16.574517] kasan_atomics+0x1dc/0x310 [ 16.574560] ? __pfx_kasan_atomics+0x10/0x10 [ 16.574601] ? __pfx_kasan_atomics+0x10/0x10 [ 16.574664] kunit_try_run_case+0x1a5/0x480 [ 16.574701] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.574723] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.574747] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.574769] ? __kthread_parkme+0x82/0x180 [ 16.574789] ? preempt_count_sub+0x50/0x80 [ 16.574812] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.574835] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.574857] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.574880] kthread+0x337/0x6f0 [ 16.574899] ? trace_preempt_on+0x20/0xc0 [ 16.574922] ? __pfx_kthread+0x10/0x10 [ 16.574942] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.574962] ? calculate_sigpending+0x7b/0xa0 [ 16.574985] ? __pfx_kthread+0x10/0x10 [ 16.575006] ret_from_fork+0x116/0x1d0 [ 16.575025] ? __pfx_kthread+0x10/0x10 [ 16.575044] ret_from_fork_asm+0x1a/0x30 [ 16.575075] </TASK> [ 16.575088] [ 16.585544] Allocated by task 283: [ 16.585795] kasan_save_stack+0x45/0x70 [ 16.586195] kasan_save_track+0x18/0x40 [ 16.586374] kasan_save_alloc_info+0x3b/0x50 [ 16.586560] __kasan_kmalloc+0xb7/0xc0 [ 16.586905] __kmalloc_cache_noprof+0x189/0x420 [ 16.587282] kasan_atomics+0x95/0x310 [ 16.587671] kunit_try_run_case+0x1a5/0x480 [ 16.588011] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.588386] kthread+0x337/0x6f0 [ 16.588658] ret_from_fork+0x116/0x1d0 [ 16.589007] ret_from_fork_asm+0x1a/0x30 [ 16.589328] [ 16.589516] The buggy address belongs to the object at ffff888102ac4100 [ 16.589516] which belongs to the cache kmalloc-64 of size 64 [ 16.590155] The buggy address is located 0 bytes to the right of [ 16.590155] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 16.590781] [ 16.590952] The buggy address belongs to the physical page: [ 16.591338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 16.591787] flags: 0x200000000000000(node=0|zone=2) [ 16.592134] page_type: f5(slab) [ 16.592421] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.592727] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.593300] page dumped because: kasan: bad access detected [ 16.593643] [ 16.593752] Memory state around the buggy address: [ 16.593948] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.594473] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.594978] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.595413] ^ [ 16.595690] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.596162] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.596560] ================================================================== [ 17.452141] ================================================================== [ 17.452695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 17.453524] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 17.453844] [ 17.454046] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.454164] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.454192] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.454227] Call Trace: [ 17.454257] <TASK> [ 17.454284] dump_stack_lvl+0x73/0xb0 [ 17.454355] print_report+0xd1/0x650 [ 17.454414] ? __virt_addr_valid+0x1db/0x2d0 [ 17.454453] ? kasan_atomics_helper+0x1b22/0x5450 [ 17.454493] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.454540] ? kasan_atomics_helper+0x1b22/0x5450 [ 17.454585] kasan_report+0x141/0x180 [ 17.454647] ? kasan_atomics_helper+0x1b22/0x5450 [ 17.454700] kasan_check_range+0x10c/0x1c0 [ 17.454746] __kasan_check_write+0x18/0x20 [ 17.454790] kasan_atomics_helper+0x1b22/0x5450 [ 17.454837] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.454894] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.454929] ? trace_hardirqs_on+0x37/0xe0 [ 17.454953] ? kasan_atomics+0x152/0x310 [ 17.454980] kasan_atomics+0x1dc/0x310 [ 17.455003] ? __pfx_kasan_atomics+0x10/0x10 [ 17.455026] ? __pfx_kasan_atomics+0x10/0x10 [ 17.455058] kunit_try_run_case+0x1a5/0x480 [ 17.455105] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.455152] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.455177] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.455199] ? __kthread_parkme+0x82/0x180 [ 17.455219] ? preempt_count_sub+0x50/0x80 [ 17.455243] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.455266] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.455288] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.455311] kthread+0x337/0x6f0 [ 17.455330] ? trace_preempt_on+0x20/0xc0 [ 17.455352] ? __pfx_kthread+0x10/0x10 [ 17.455373] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.455394] ? calculate_sigpending+0x7b/0xa0 [ 17.455417] ? __pfx_kthread+0x10/0x10 [ 17.455438] ret_from_fork+0x116/0x1d0 [ 17.455456] ? __pfx_kthread+0x10/0x10 [ 17.455476] ret_from_fork_asm+0x1a/0x30 [ 17.455505] </TASK> [ 17.455519] [ 17.468060] Allocated by task 283: [ 17.468653] kasan_save_stack+0x45/0x70 [ 17.468907] kasan_save_track+0x18/0x40 [ 17.469055] kasan_save_alloc_info+0x3b/0x50 [ 17.469389] __kasan_kmalloc+0xb7/0xc0 [ 17.469584] __kmalloc_cache_noprof+0x189/0x420 [ 17.469805] kasan_atomics+0x95/0x310 [ 17.470006] kunit_try_run_case+0x1a5/0x480 [ 17.470206] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.470439] kthread+0x337/0x6f0 [ 17.470780] ret_from_fork+0x116/0x1d0 [ 17.470956] ret_from_fork_asm+0x1a/0x30 [ 17.471159] [ 17.471270] The buggy address belongs to the object at ffff888102ac4100 [ 17.471270] which belongs to the cache kmalloc-64 of size 64 [ 17.471936] The buggy address is located 0 bytes to the right of [ 17.471936] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 17.472870] [ 17.473066] The buggy address belongs to the physical page: [ 17.473378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 17.473731] flags: 0x200000000000000(node=0|zone=2) [ 17.473944] page_type: f5(slab) [ 17.474132] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.474586] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.475175] page dumped because: kasan: bad access detected [ 17.475565] [ 17.475733] Memory state around the buggy address: [ 17.476158] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.476658] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.476937] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.477445] ^ [ 17.477850] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.478264] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.478660] ================================================================== [ 16.620884] ================================================================== [ 16.621391] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 16.621900] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 16.622242] [ 16.622464] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.622545] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.622573] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.622828] Call Trace: [ 16.622879] <TASK> [ 16.622927] dump_stack_lvl+0x73/0xb0 [ 16.622999] print_report+0xd1/0x650 [ 16.623059] ? __virt_addr_valid+0x1db/0x2d0 [ 16.623094] ? kasan_atomics_helper+0xac7/0x5450 [ 16.623150] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.623176] ? kasan_atomics_helper+0xac7/0x5450 [ 16.623197] kasan_report+0x141/0x180 [ 16.623220] ? kasan_atomics_helper+0xac7/0x5450 [ 16.623264] kasan_check_range+0x10c/0x1c0 [ 16.623303] __kasan_check_write+0x18/0x20 [ 16.623334] kasan_atomics_helper+0xac7/0x5450 [ 16.623375] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.623416] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.623467] ? trace_hardirqs_on+0x37/0xe0 [ 16.623511] ? kasan_atomics+0x152/0x310 [ 16.623577] kasan_atomics+0x1dc/0x310 [ 16.623635] ? __pfx_kasan_atomics+0x10/0x10 [ 16.623678] ? __pfx_kasan_atomics+0x10/0x10 [ 16.623740] kunit_try_run_case+0x1a5/0x480 [ 16.623802] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.623844] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.623895] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.623941] ? __kthread_parkme+0x82/0x180 [ 16.623994] ? preempt_count_sub+0x50/0x80 [ 16.624040] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.624085] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.624128] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.624173] kthread+0x337/0x6f0 [ 16.624215] ? trace_preempt_on+0x20/0xc0 [ 16.624260] ? __pfx_kthread+0x10/0x10 [ 16.624303] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.624345] ? calculate_sigpending+0x7b/0xa0 [ 16.624394] ? __pfx_kthread+0x10/0x10 [ 16.624437] ret_from_fork+0x116/0x1d0 [ 16.624475] ? __pfx_kthread+0x10/0x10 [ 16.624514] ret_from_fork_asm+0x1a/0x30 [ 16.624578] </TASK> [ 16.624626] [ 16.636036] Allocated by task 283: [ 16.636597] kasan_save_stack+0x45/0x70 [ 16.637007] kasan_save_track+0x18/0x40 [ 16.637357] kasan_save_alloc_info+0x3b/0x50 [ 16.637712] __kasan_kmalloc+0xb7/0xc0 [ 16.637969] __kmalloc_cache_noprof+0x189/0x420 [ 16.638360] kasan_atomics+0x95/0x310 [ 16.638534] kunit_try_run_case+0x1a5/0x480 [ 16.638863] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.639080] kthread+0x337/0x6f0 [ 16.639348] ret_from_fork+0x116/0x1d0 [ 16.639570] ret_from_fork_asm+0x1a/0x30 [ 16.639897] [ 16.640023] The buggy address belongs to the object at ffff888102ac4100 [ 16.640023] which belongs to the cache kmalloc-64 of size 64 [ 16.640641] The buggy address is located 0 bytes to the right of [ 16.640641] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 16.641344] [ 16.641477] The buggy address belongs to the physical page: [ 16.641820] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 16.642387] flags: 0x200000000000000(node=0|zone=2) [ 16.642699] page_type: f5(slab) [ 16.642860] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.643357] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.643749] page dumped because: kasan: bad access detected [ 16.644056] [ 16.644243] Memory state around the buggy address: [ 16.644583] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.644944] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.645423] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.645806] ^ [ 16.646085] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.646362] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.646628] ================================================================== [ 16.372231] ================================================================== [ 16.372548] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 16.372945] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 16.373709] [ 16.373926] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.374017] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.374046] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.374085] Call Trace: [ 16.374115] <TASK> [ 16.374144] dump_stack_lvl+0x73/0xb0 [ 16.374198] print_report+0xd1/0x650 [ 16.374237] ? __virt_addr_valid+0x1db/0x2d0 [ 16.374278] ? kasan_atomics_helper+0x565/0x5450 [ 16.374318] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.374369] ? kasan_atomics_helper+0x565/0x5450 [ 16.374406] kasan_report+0x141/0x180 [ 16.374453] ? kasan_atomics_helper+0x565/0x5450 [ 16.374502] kasan_check_range+0x10c/0x1c0 [ 16.374965] __kasan_check_write+0x18/0x20 [ 16.375016] kasan_atomics_helper+0x565/0x5450 [ 16.375063] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.375109] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.375154] ? trace_hardirqs_on+0x37/0xe0 [ 16.375199] ? kasan_atomics+0x152/0x310 [ 16.375253] kasan_atomics+0x1dc/0x310 [ 16.375279] ? __pfx_kasan_atomics+0x10/0x10 [ 16.375302] ? __pfx_kasan_atomics+0x10/0x10 [ 16.375329] kunit_try_run_case+0x1a5/0x480 [ 16.375352] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.375375] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.375398] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.375420] ? __kthread_parkme+0x82/0x180 [ 16.375440] ? preempt_count_sub+0x50/0x80 [ 16.375464] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.375486] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.375541] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.375586] kthread+0x337/0x6f0 [ 16.375635] ? trace_preempt_on+0x20/0xc0 [ 16.375662] ? __pfx_kthread+0x10/0x10 [ 16.375683] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.375705] ? calculate_sigpending+0x7b/0xa0 [ 16.375728] ? __pfx_kthread+0x10/0x10 [ 16.375749] ret_from_fork+0x116/0x1d0 [ 16.375767] ? __pfx_kthread+0x10/0x10 [ 16.375787] ret_from_fork_asm+0x1a/0x30 [ 16.375816] </TASK> [ 16.375830] [ 16.389391] Allocated by task 283: [ 16.389856] kasan_save_stack+0x45/0x70 [ 16.390243] kasan_save_track+0x18/0x40 [ 16.390755] kasan_save_alloc_info+0x3b/0x50 [ 16.391067] __kasan_kmalloc+0xb7/0xc0 [ 16.391257] __kmalloc_cache_noprof+0x189/0x420 [ 16.391910] kasan_atomics+0x95/0x310 [ 16.392468] kunit_try_run_case+0x1a5/0x480 [ 16.392956] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.393185] kthread+0x337/0x6f0 [ 16.393538] ret_from_fork+0x116/0x1d0 [ 16.394026] ret_from_fork_asm+0x1a/0x30 [ 16.394225] [ 16.394325] The buggy address belongs to the object at ffff888102ac4100 [ 16.394325] which belongs to the cache kmalloc-64 of size 64 [ 16.395419] The buggy address is located 0 bytes to the right of [ 16.395419] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 16.396709] [ 16.396857] The buggy address belongs to the physical page: [ 16.397303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 16.397957] flags: 0x200000000000000(node=0|zone=2) [ 16.398528] page_type: f5(slab) [ 16.398940] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.399301] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.399945] page dumped because: kasan: bad access detected [ 16.400676] [ 16.400866] Memory state around the buggy address: [ 16.401091] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.401389] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.401787] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.402160] ^ [ 16.402563] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.403326] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.404045] ================================================================== [ 16.182353] ================================================================== [ 16.182837] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 16.183137] Read of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 16.183453] [ 16.183817] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.183903] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.183926] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.183962] Call Trace: [ 16.183991] <TASK> [ 16.184022] dump_stack_lvl+0x73/0xb0 [ 16.184077] print_report+0xd1/0x650 [ 16.184151] ? __virt_addr_valid+0x1db/0x2d0 [ 16.184195] ? kasan_atomics_helper+0x4b88/0x5450 [ 16.184235] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.184300] ? kasan_atomics_helper+0x4b88/0x5450 [ 16.184337] kasan_report+0x141/0x180 [ 16.184373] ? kasan_atomics_helper+0x4b88/0x5450 [ 16.184418] __asan_report_load4_noabort+0x18/0x20 [ 16.184461] kasan_atomics_helper+0x4b88/0x5450 [ 16.184659] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.184714] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.184763] ? trace_hardirqs_on+0x37/0xe0 [ 16.184793] ? kasan_atomics+0x152/0x310 [ 16.184821] kasan_atomics+0x1dc/0x310 [ 16.184843] ? __pfx_kasan_atomics+0x10/0x10 [ 16.184866] ? __pfx_kasan_atomics+0x10/0x10 [ 16.184891] kunit_try_run_case+0x1a5/0x480 [ 16.184914] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.184934] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.184956] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.184977] ? __kthread_parkme+0x82/0x180 [ 16.184997] ? preempt_count_sub+0x50/0x80 [ 16.185020] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.185041] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.185063] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.185083] kthread+0x337/0x6f0 [ 16.185102] ? trace_preempt_on+0x20/0xc0 [ 16.185122] ? __pfx_kthread+0x10/0x10 [ 16.185142] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.185161] ? calculate_sigpending+0x7b/0xa0 [ 16.185183] ? __pfx_kthread+0x10/0x10 [ 16.185203] ret_from_fork+0x116/0x1d0 [ 16.185230] ? __pfx_kthread+0x10/0x10 [ 16.185258] ret_from_fork_asm+0x1a/0x30 [ 16.185287] </TASK> [ 16.185299] [ 16.198046] Allocated by task 283: [ 16.198501] kasan_save_stack+0x45/0x70 [ 16.199435] kasan_save_track+0x18/0x40 [ 16.199809] kasan_save_alloc_info+0x3b/0x50 [ 16.200116] __kasan_kmalloc+0xb7/0xc0 [ 16.200376] __kmalloc_cache_noprof+0x189/0x420 [ 16.200572] kasan_atomics+0x95/0x310 [ 16.200724] kunit_try_run_case+0x1a5/0x480 [ 16.200870] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.201092] kthread+0x337/0x6f0 [ 16.201271] ret_from_fork+0x116/0x1d0 [ 16.201462] ret_from_fork_asm+0x1a/0x30 [ 16.203424] [ 16.203541] The buggy address belongs to the object at ffff888102ac4100 [ 16.203541] which belongs to the cache kmalloc-64 of size 64 [ 16.203893] The buggy address is located 0 bytes to the right of [ 16.203893] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 16.207431] [ 16.207560] The buggy address belongs to the physical page: [ 16.207756] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 16.207980] flags: 0x200000000000000(node=0|zone=2) [ 16.208153] page_type: f5(slab) [ 16.209542] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.209852] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.211451] page dumped because: kasan: bad access detected [ 16.212346] [ 16.212808] Memory state around the buggy address: [ 16.213045] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.213423] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.214101] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.214697] ^ [ 16.215051] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.215577] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.216387] ================================================================== [ 17.793376] ================================================================== [ 17.796846] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 17.797130] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 17.797361] [ 17.797476] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.797552] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.797575] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.797646] Call Trace: [ 17.797676] <TASK> [ 17.797706] dump_stack_lvl+0x73/0xb0 [ 17.797748] print_report+0xd1/0x650 [ 17.797805] ? __virt_addr_valid+0x1db/0x2d0 [ 17.797845] ? kasan_atomics_helper+0x218a/0x5450 [ 17.797881] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.797936] ? kasan_atomics_helper+0x218a/0x5450 [ 17.797978] kasan_report+0x141/0x180 [ 17.798021] ? kasan_atomics_helper+0x218a/0x5450 [ 17.798075] kasan_check_range+0x10c/0x1c0 [ 17.798128] __kasan_check_write+0x18/0x20 [ 17.798162] kasan_atomics_helper+0x218a/0x5450 [ 17.798200] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.798234] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.798275] ? trace_hardirqs_on+0x37/0xe0 [ 17.798314] ? kasan_atomics+0x152/0x310 [ 17.798360] kasan_atomics+0x1dc/0x310 [ 17.798394] ? __pfx_kasan_atomics+0x10/0x10 [ 17.798431] ? __pfx_kasan_atomics+0x10/0x10 [ 17.798475] kunit_try_run_case+0x1a5/0x480 [ 17.798512] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.798547] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.798587] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.798656] ? __kthread_parkme+0x82/0x180 [ 17.798693] ? preempt_count_sub+0x50/0x80 [ 17.798739] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.798779] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.798818] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.798855] kthread+0x337/0x6f0 [ 17.798888] ? trace_preempt_on+0x20/0xc0 [ 17.799749] ? __pfx_kthread+0x10/0x10 [ 17.799796] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.799836] ? calculate_sigpending+0x7b/0xa0 [ 17.799884] ? __pfx_kthread+0x10/0x10 [ 17.799922] ret_from_fork+0x116/0x1d0 [ 17.799960] ? __pfx_kthread+0x10/0x10 [ 17.800003] ret_from_fork_asm+0x1a/0x30 [ 17.800066] </TASK> [ 17.800090] [ 17.809633] Allocated by task 283: [ 17.809883] kasan_save_stack+0x45/0x70 [ 17.810227] kasan_save_track+0x18/0x40 [ 17.810493] kasan_save_alloc_info+0x3b/0x50 [ 17.810826] __kasan_kmalloc+0xb7/0xc0 [ 17.811111] __kmalloc_cache_noprof+0x189/0x420 [ 17.811311] kasan_atomics+0x95/0x310 [ 17.811506] kunit_try_run_case+0x1a5/0x480 [ 17.811815] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.812209] kthread+0x337/0x6f0 [ 17.812469] ret_from_fork+0x116/0x1d0 [ 17.812699] ret_from_fork_asm+0x1a/0x30 [ 17.812899] [ 17.813024] The buggy address belongs to the object at ffff888102ac4100 [ 17.813024] which belongs to the cache kmalloc-64 of size 64 [ 17.813678] The buggy address is located 0 bytes to the right of [ 17.813678] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 17.814194] [ 17.814303] The buggy address belongs to the physical page: [ 17.814491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 17.814764] flags: 0x200000000000000(node=0|zone=2) [ 17.814961] page_type: f5(slab) [ 17.815119] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.815370] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.815612] page dumped because: kasan: bad access detected [ 17.816014] [ 17.816152] Memory state around the buggy address: [ 17.816497] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.816995] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.817568] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.818055] ^ [ 17.818475] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.818967] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.819550] ================================================================== [ 16.466774] ================================================================== [ 16.467734] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 16.468400] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 16.468648] [ 16.468776] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.468854] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.468877] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.468913] Call Trace: [ 16.468939] <TASK> [ 16.468968] dump_stack_lvl+0x73/0xb0 [ 16.469021] print_report+0xd1/0x650 [ 16.469054] ? __virt_addr_valid+0x1db/0x2d0 [ 16.469089] ? kasan_atomics_helper+0x72f/0x5450 [ 16.469126] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.469170] ? kasan_atomics_helper+0x72f/0x5450 [ 16.469207] kasan_report+0x141/0x180 [ 16.469250] ? kasan_atomics_helper+0x72f/0x5450 [ 16.469304] kasan_check_range+0x10c/0x1c0 [ 16.469351] __kasan_check_write+0x18/0x20 [ 16.469387] kasan_atomics_helper+0x72f/0x5450 [ 16.469430] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.469471] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.469509] ? trace_hardirqs_on+0x37/0xe0 [ 16.469546] ? kasan_atomics+0x152/0x310 [ 16.469588] kasan_atomics+0x1dc/0x310 [ 16.469652] ? __pfx_kasan_atomics+0x10/0x10 [ 16.469692] ? __pfx_kasan_atomics+0x10/0x10 [ 16.469735] kunit_try_run_case+0x1a5/0x480 [ 16.469771] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.469804] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.469846] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.469883] ? __kthread_parkme+0x82/0x180 [ 16.469924] ? preempt_count_sub+0x50/0x80 [ 16.469970] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.470010] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.470048] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.470087] kthread+0x337/0x6f0 [ 16.470121] ? trace_preempt_on+0x20/0xc0 [ 16.470159] ? __pfx_kthread+0x10/0x10 [ 16.470195] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.470232] ? calculate_sigpending+0x7b/0xa0 [ 16.470272] ? __pfx_kthread+0x10/0x10 [ 16.470306] ret_from_fork+0x116/0x1d0 [ 16.470339] ? __pfx_kthread+0x10/0x10 [ 16.470374] ret_from_fork_asm+0x1a/0x30 [ 16.470429] </TASK> [ 16.470450] [ 16.486350] Allocated by task 283: [ 16.486594] kasan_save_stack+0x45/0x70 [ 16.486799] kasan_save_track+0x18/0x40 [ 16.487478] kasan_save_alloc_info+0x3b/0x50 [ 16.487931] __kasan_kmalloc+0xb7/0xc0 [ 16.488137] __kmalloc_cache_noprof+0x189/0x420 [ 16.488297] kasan_atomics+0x95/0x310 [ 16.488996] kunit_try_run_case+0x1a5/0x480 [ 16.489495] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.489717] kthread+0x337/0x6f0 [ 16.489861] ret_from_fork+0x116/0x1d0 [ 16.490011] ret_from_fork_asm+0x1a/0x30 [ 16.490170] [ 16.490263] The buggy address belongs to the object at ffff888102ac4100 [ 16.490263] which belongs to the cache kmalloc-64 of size 64 [ 16.490582] The buggy address is located 0 bytes to the right of [ 16.490582] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 16.490927] [ 16.491026] The buggy address belongs to the physical page: [ 16.491201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 16.491445] flags: 0x200000000000000(node=0|zone=2) [ 16.492465] page_type: f5(slab) [ 16.492665] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.492924] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.493211] page dumped because: kasan: bad access detected [ 16.493410] [ 16.493512] Memory state around the buggy address: [ 16.493689] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.494106] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.494532] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.495121] ^ [ 16.495987] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.496649] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.496961] ================================================================== [ 17.300345] ================================================================== [ 17.300784] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 17.301090] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 17.301551] [ 17.301720] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.301797] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.301824] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.301865] Call Trace: [ 17.301900] <TASK> [ 17.301941] dump_stack_lvl+0x73/0xb0 [ 17.301998] print_report+0xd1/0x650 [ 17.302044] ? __virt_addr_valid+0x1db/0x2d0 [ 17.302088] ? kasan_atomics_helper+0x177f/0x5450 [ 17.302132] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.302182] ? kasan_atomics_helper+0x177f/0x5450 [ 17.302228] kasan_report+0x141/0x180 [ 17.302275] ? kasan_atomics_helper+0x177f/0x5450 [ 17.302358] kasan_check_range+0x10c/0x1c0 [ 17.302411] __kasan_check_write+0x18/0x20 [ 17.302455] kasan_atomics_helper+0x177f/0x5450 [ 17.302502] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.302548] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.302597] ? trace_hardirqs_on+0x37/0xe0 [ 17.303383] ? kasan_atomics+0x152/0x310 [ 17.303440] kasan_atomics+0x1dc/0x310 [ 17.303487] ? __pfx_kasan_atomics+0x10/0x10 [ 17.303529] ? __pfx_kasan_atomics+0x10/0x10 [ 17.303583] kunit_try_run_case+0x1a5/0x480 [ 17.303646] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.303692] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.303741] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.303787] ? __kthread_parkme+0x82/0x180 [ 17.303829] ? preempt_count_sub+0x50/0x80 [ 17.303879] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.303928] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.303977] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.304025] kthread+0x337/0x6f0 [ 17.304066] ? trace_preempt_on+0x20/0xc0 [ 17.304116] ? __pfx_kthread+0x10/0x10 [ 17.304150] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.304183] ? calculate_sigpending+0x7b/0xa0 [ 17.304225] ? __pfx_kthread+0x10/0x10 [ 17.304266] ret_from_fork+0x116/0x1d0 [ 17.304305] ? __pfx_kthread+0x10/0x10 [ 17.304345] ret_from_fork_asm+0x1a/0x30 [ 17.304409] </TASK> [ 17.304436] [ 17.313415] Allocated by task 283: [ 17.313596] kasan_save_stack+0x45/0x70 [ 17.313795] kasan_save_track+0x18/0x40 [ 17.313972] kasan_save_alloc_info+0x3b/0x50 [ 17.314166] __kasan_kmalloc+0xb7/0xc0 [ 17.314451] __kmalloc_cache_noprof+0x189/0x420 [ 17.314802] kasan_atomics+0x95/0x310 [ 17.315155] kunit_try_run_case+0x1a5/0x480 [ 17.315459] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.315815] kthread+0x337/0x6f0 [ 17.316068] ret_from_fork+0x116/0x1d0 [ 17.316287] ret_from_fork_asm+0x1a/0x30 [ 17.316463] [ 17.316572] The buggy address belongs to the object at ffff888102ac4100 [ 17.316572] which belongs to the cache kmalloc-64 of size 64 [ 17.316950] The buggy address is located 0 bytes to the right of [ 17.316950] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 17.317344] [ 17.317496] The buggy address belongs to the physical page: [ 17.317838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 17.318434] flags: 0x200000000000000(node=0|zone=2) [ 17.318780] page_type: f5(slab) [ 17.319042] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.319688] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.320160] page dumped because: kasan: bad access detected [ 17.320517] [ 17.320689] Memory state around the buggy address: [ 17.320919] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.321338] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.321579] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.321825] ^ [ 17.322016] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.322251] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.322511] ================================================================== [ 16.217412] ================================================================== [ 16.218185] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 16.218594] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 16.219111] [ 16.219307] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.219395] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.219418] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.219453] Call Trace: [ 16.219482] <TASK> [ 16.219514] dump_stack_lvl+0x73/0xb0 [ 16.219591] print_report+0xd1/0x650 [ 16.219656] ? __virt_addr_valid+0x1db/0x2d0 [ 16.219697] ? kasan_atomics_helper+0x4b6e/0x5450 [ 16.219737] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.219768] ? kasan_atomics_helper+0x4b6e/0x5450 [ 16.219788] kasan_report+0x141/0x180 [ 16.219809] ? kasan_atomics_helper+0x4b6e/0x5450 [ 16.219834] __asan_report_store4_noabort+0x1b/0x30 [ 16.219857] kasan_atomics_helper+0x4b6e/0x5450 [ 16.219878] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.219907] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.219942] ? trace_hardirqs_on+0x37/0xe0 [ 16.219981] ? kasan_atomics+0x152/0x310 [ 16.220029] kasan_atomics+0x1dc/0x310 [ 16.220070] ? __pfx_kasan_atomics+0x10/0x10 [ 16.220111] ? __pfx_kasan_atomics+0x10/0x10 [ 16.220534] kunit_try_run_case+0x1a5/0x480 [ 16.220633] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.220662] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.220686] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.220708] ? __kthread_parkme+0x82/0x180 [ 16.220728] ? preempt_count_sub+0x50/0x80 [ 16.220751] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.220773] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.220794] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.220815] kthread+0x337/0x6f0 [ 16.220833] ? trace_preempt_on+0x20/0xc0 [ 16.220855] ? __pfx_kthread+0x10/0x10 [ 16.220874] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.220894] ? calculate_sigpending+0x7b/0xa0 [ 16.220916] ? __pfx_kthread+0x10/0x10 [ 16.220936] ret_from_fork+0x116/0x1d0 [ 16.220953] ? __pfx_kthread+0x10/0x10 [ 16.220971] ret_from_fork_asm+0x1a/0x30 [ 16.221000] </TASK> [ 16.221012] [ 16.234954] Allocated by task 283: [ 16.235431] kasan_save_stack+0x45/0x70 [ 16.235839] kasan_save_track+0x18/0x40 [ 16.236075] kasan_save_alloc_info+0x3b/0x50 [ 16.236661] __kasan_kmalloc+0xb7/0xc0 [ 16.236862] __kmalloc_cache_noprof+0x189/0x420 [ 16.237016] kasan_atomics+0x95/0x310 [ 16.237934] kunit_try_run_case+0x1a5/0x480 [ 16.238168] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.238327] kthread+0x337/0x6f0 [ 16.238902] ret_from_fork+0x116/0x1d0 [ 16.239058] ret_from_fork_asm+0x1a/0x30 [ 16.239520] [ 16.240067] The buggy address belongs to the object at ffff888102ac4100 [ 16.240067] which belongs to the cache kmalloc-64 of size 64 [ 16.240804] The buggy address is located 0 bytes to the right of [ 16.240804] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 16.241849] [ 16.242270] The buggy address belongs to the physical page: [ 16.242560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 16.243111] flags: 0x200000000000000(node=0|zone=2) [ 16.243516] page_type: f5(slab) [ 16.243959] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.244450] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.245014] page dumped because: kasan: bad access detected [ 16.245436] [ 16.245799] Memory state around the buggy address: [ 16.246408] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.247047] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.247285] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.248017] ^ [ 16.248320] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.248907] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.249449] ================================================================== [ 16.803793] ================================================================== [ 16.804235] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 16.804528] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 16.804871] [ 16.805086] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.805224] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.805251] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.805308] Call Trace: [ 16.805340] <TASK> [ 16.805385] dump_stack_lvl+0x73/0xb0 [ 16.805461] print_report+0xd1/0x650 [ 16.805516] ? __virt_addr_valid+0x1db/0x2d0 [ 16.805556] ? kasan_atomics_helper+0xf10/0x5450 [ 16.805595] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.805661] ? kasan_atomics_helper+0xf10/0x5450 [ 16.805706] kasan_report+0x141/0x180 [ 16.805752] ? kasan_atomics_helper+0xf10/0x5450 [ 16.805807] kasan_check_range+0x10c/0x1c0 [ 16.805854] __kasan_check_write+0x18/0x20 [ 16.805894] kasan_atomics_helper+0xf10/0x5450 [ 16.805947] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.805992] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.806041] ? trace_hardirqs_on+0x37/0xe0 [ 16.806086] ? kasan_atomics+0x152/0x310 [ 16.806174] kasan_atomics+0x1dc/0x310 [ 16.806216] ? __pfx_kasan_atomics+0x10/0x10 [ 16.806257] ? __pfx_kasan_atomics+0x10/0x10 [ 16.806306] kunit_try_run_case+0x1a5/0x480 [ 16.806393] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.806433] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.806477] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.806519] ? __kthread_parkme+0x82/0x180 [ 16.806587] ? preempt_count_sub+0x50/0x80 [ 16.806649] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.806694] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.806729] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.806752] kthread+0x337/0x6f0 [ 16.806773] ? trace_preempt_on+0x20/0xc0 [ 16.806795] ? __pfx_kthread+0x10/0x10 [ 16.806815] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.806837] ? calculate_sigpending+0x7b/0xa0 [ 16.806860] ? __pfx_kthread+0x10/0x10 [ 16.806881] ret_from_fork+0x116/0x1d0 [ 16.806899] ? __pfx_kthread+0x10/0x10 [ 16.806920] ret_from_fork_asm+0x1a/0x30 [ 16.806950] </TASK> [ 16.806963] [ 16.817420] Allocated by task 283: [ 16.817991] kasan_save_stack+0x45/0x70 [ 16.818388] kasan_save_track+0x18/0x40 [ 16.818632] kasan_save_alloc_info+0x3b/0x50 [ 16.818823] __kasan_kmalloc+0xb7/0xc0 [ 16.819119] __kmalloc_cache_noprof+0x189/0x420 [ 16.819403] kasan_atomics+0x95/0x310 [ 16.819582] kunit_try_run_case+0x1a5/0x480 [ 16.819780] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.820181] kthread+0x337/0x6f0 [ 16.820447] ret_from_fork+0x116/0x1d0 [ 16.820746] ret_from_fork_asm+0x1a/0x30 [ 16.821056] [ 16.821232] The buggy address belongs to the object at ffff888102ac4100 [ 16.821232] which belongs to the cache kmalloc-64 of size 64 [ 16.821766] The buggy address is located 0 bytes to the right of [ 16.821766] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 16.822242] [ 16.822381] The buggy address belongs to the physical page: [ 16.822743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 16.823296] flags: 0x200000000000000(node=0|zone=2) [ 16.823694] page_type: f5(slab) [ 16.823912] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.824286] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.824800] page dumped because: kasan: bad access detected [ 16.825027] [ 16.825200] Memory state around the buggy address: [ 16.825555] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.825941] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.826313] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.826778] ^ [ 16.827030] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.827499] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.827815] ================================================================== [ 17.770404] ================================================================== [ 17.771035] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 17.771409] Read of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 17.771774] [ 17.771912] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.771995] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.772022] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.772063] Call Trace: [ 17.772090] <TASK> [ 17.772148] dump_stack_lvl+0x73/0xb0 [ 17.772207] print_report+0xd1/0x650 [ 17.772247] ? __virt_addr_valid+0x1db/0x2d0 [ 17.772303] ? kasan_atomics_helper+0x4fb2/0x5450 [ 17.772392] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.772446] ? kasan_atomics_helper+0x4fb2/0x5450 [ 17.772493] kasan_report+0x141/0x180 [ 17.772540] ? kasan_atomics_helper+0x4fb2/0x5450 [ 17.772596] __asan_report_load8_noabort+0x18/0x20 [ 17.772657] kasan_atomics_helper+0x4fb2/0x5450 [ 17.772696] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.772736] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.772777] ? trace_hardirqs_on+0x37/0xe0 [ 17.772826] ? kasan_atomics+0x152/0x310 [ 17.772886] kasan_atomics+0x1dc/0x310 [ 17.772933] ? __pfx_kasan_atomics+0x10/0x10 [ 17.772976] ? __pfx_kasan_atomics+0x10/0x10 [ 17.773026] kunit_try_run_case+0x1a5/0x480 [ 17.773074] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.773128] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.773184] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.773209] ? __kthread_parkme+0x82/0x180 [ 17.773229] ? preempt_count_sub+0x50/0x80 [ 17.773253] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.773276] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.773306] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.773344] kthread+0x337/0x6f0 [ 17.773382] ? trace_preempt_on+0x20/0xc0 [ 17.773422] ? __pfx_kthread+0x10/0x10 [ 17.773455] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.773493] ? calculate_sigpending+0x7b/0xa0 [ 17.773535] ? __pfx_kthread+0x10/0x10 [ 17.773577] ret_from_fork+0x116/0x1d0 [ 17.773611] ? __pfx_kthread+0x10/0x10 [ 17.773665] ret_from_fork_asm+0x1a/0x30 [ 17.773725] </TASK> [ 17.773750] [ 17.782225] Allocated by task 283: [ 17.782445] kasan_save_stack+0x45/0x70 [ 17.782648] kasan_save_track+0x18/0x40 [ 17.782815] kasan_save_alloc_info+0x3b/0x50 [ 17.783108] __kasan_kmalloc+0xb7/0xc0 [ 17.783385] __kmalloc_cache_noprof+0x189/0x420 [ 17.783716] kasan_atomics+0x95/0x310 [ 17.784008] kunit_try_run_case+0x1a5/0x480 [ 17.784396] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.784601] kthread+0x337/0x6f0 [ 17.784774] ret_from_fork+0x116/0x1d0 [ 17.784937] ret_from_fork_asm+0x1a/0x30 [ 17.785107] [ 17.785215] The buggy address belongs to the object at ffff888102ac4100 [ 17.785215] which belongs to the cache kmalloc-64 of size 64 [ 17.786004] The buggy address is located 0 bytes to the right of [ 17.786004] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 17.786720] [ 17.786813] The buggy address belongs to the physical page: [ 17.786974] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 17.787357] flags: 0x200000000000000(node=0|zone=2) [ 17.787657] page_type: f5(slab) [ 17.787818] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.788073] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.790687] page dumped because: kasan: bad access detected [ 17.791081] [ 17.791182] Memory state around the buggy address: [ 17.791370] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.791605] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.791847] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.792062] ^ [ 17.792230] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.792481] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.792781] ================================================================== [ 16.931313] ================================================================== [ 16.932379] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 16.932814] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 16.933304] [ 16.934096] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.934177] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.934191] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.934213] Call Trace: [ 16.934230] <TASK> [ 16.934247] dump_stack_lvl+0x73/0xb0 [ 16.934281] print_report+0xd1/0x650 [ 16.934303] ? __virt_addr_valid+0x1db/0x2d0 [ 16.934325] ? kasan_atomics_helper+0x1148/0x5450 [ 16.934346] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.934371] ? kasan_atomics_helper+0x1148/0x5450 [ 16.934392] kasan_report+0x141/0x180 [ 16.934414] ? kasan_atomics_helper+0x1148/0x5450 [ 16.934439] kasan_check_range+0x10c/0x1c0 [ 16.934461] __kasan_check_write+0x18/0x20 [ 16.934481] kasan_atomics_helper+0x1148/0x5450 [ 16.934502] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.934524] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.934547] ? trace_hardirqs_on+0x37/0xe0 [ 16.934569] ? kasan_atomics+0x152/0x310 [ 16.934595] kasan_atomics+0x1dc/0x310 [ 16.934634] ? __pfx_kasan_atomics+0x10/0x10 [ 16.934659] ? __pfx_kasan_atomics+0x10/0x10 [ 16.934686] kunit_try_run_case+0x1a5/0x480 [ 16.934710] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.934731] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.934753] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.934775] ? __kthread_parkme+0x82/0x180 [ 16.934795] ? preempt_count_sub+0x50/0x80 [ 16.934818] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.934841] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.934862] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.934885] kthread+0x337/0x6f0 [ 16.934904] ? trace_preempt_on+0x20/0xc0 [ 16.934926] ? __pfx_kthread+0x10/0x10 [ 16.934946] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.934967] ? calculate_sigpending+0x7b/0xa0 [ 16.934990] ? __pfx_kthread+0x10/0x10 [ 16.935010] ret_from_fork+0x116/0x1d0 [ 16.935029] ? __pfx_kthread+0x10/0x10 [ 16.935049] ret_from_fork_asm+0x1a/0x30 [ 16.935079] </TASK> [ 16.935092] [ 16.946084] Allocated by task 283: [ 16.946304] kasan_save_stack+0x45/0x70 [ 16.946517] kasan_save_track+0x18/0x40 [ 16.946712] kasan_save_alloc_info+0x3b/0x50 [ 16.946902] __kasan_kmalloc+0xb7/0xc0 [ 16.947073] __kmalloc_cache_noprof+0x189/0x420 [ 16.948105] kasan_atomics+0x95/0x310 [ 16.948307] kunit_try_run_case+0x1a5/0x480 [ 16.948523] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.948756] kthread+0x337/0x6f0 [ 16.948918] ret_from_fork+0x116/0x1d0 [ 16.949091] ret_from_fork_asm+0x1a/0x30 [ 16.949286] [ 16.949387] The buggy address belongs to the object at ffff888102ac4100 [ 16.949387] which belongs to the cache kmalloc-64 of size 64 [ 16.949859] The buggy address is located 0 bytes to the right of [ 16.949859] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 16.951275] [ 16.951405] The buggy address belongs to the physical page: [ 16.952001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 16.952528] flags: 0x200000000000000(node=0|zone=2) [ 16.952909] page_type: f5(slab) [ 16.953114] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.953712] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.954034] page dumped because: kasan: bad access detected [ 16.954659] [ 16.954900] Memory state around the buggy address: [ 16.955154] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.955662] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.956106] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.956380] ^ [ 16.956768] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.957157] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.957806] ================================================================== [ 17.744729] ================================================================== [ 17.745157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 17.745436] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 17.745806] [ 17.745989] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.746072] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.746125] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.746170] Call Trace: [ 17.746220] <TASK> [ 17.746252] dump_stack_lvl+0x73/0xb0 [ 17.746306] print_report+0xd1/0x650 [ 17.746344] ? __virt_addr_valid+0x1db/0x2d0 [ 17.746381] ? kasan_atomics_helper+0x20c8/0x5450 [ 17.746419] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.746467] ? kasan_atomics_helper+0x20c8/0x5450 [ 17.746531] kasan_report+0x141/0x180 [ 17.746570] ? kasan_atomics_helper+0x20c8/0x5450 [ 17.746631] kasan_check_range+0x10c/0x1c0 [ 17.746678] __kasan_check_write+0x18/0x20 [ 17.746736] kasan_atomics_helper+0x20c8/0x5450 [ 17.746781] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.746824] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.746874] ? trace_hardirqs_on+0x37/0xe0 [ 17.746920] ? kasan_atomics+0x152/0x310 [ 17.746977] kasan_atomics+0x1dc/0x310 [ 17.747024] ? __pfx_kasan_atomics+0x10/0x10 [ 17.747071] ? __pfx_kasan_atomics+0x10/0x10 [ 17.747159] kunit_try_run_case+0x1a5/0x480 [ 17.747212] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.747259] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.747306] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.747345] ? __kthread_parkme+0x82/0x180 [ 17.747383] ? preempt_count_sub+0x50/0x80 [ 17.747427] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.747496] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.747539] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.747591] kthread+0x337/0x6f0 [ 17.747645] ? trace_preempt_on+0x20/0xc0 [ 17.747706] ? __pfx_kthread+0x10/0x10 [ 17.747745] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.747783] ? calculate_sigpending+0x7b/0xa0 [ 17.747826] ? __pfx_kthread+0x10/0x10 [ 17.747867] ret_from_fork+0x116/0x1d0 [ 17.747919] ? __pfx_kthread+0x10/0x10 [ 17.747961] ret_from_fork_asm+0x1a/0x30 [ 17.748018] </TASK> [ 17.748043] [ 17.758225] Allocated by task 283: [ 17.758402] kasan_save_stack+0x45/0x70 [ 17.758593] kasan_save_track+0x18/0x40 [ 17.758774] kasan_save_alloc_info+0x3b/0x50 [ 17.759159] __kasan_kmalloc+0xb7/0xc0 [ 17.759565] __kmalloc_cache_noprof+0x189/0x420 [ 17.759994] kasan_atomics+0x95/0x310 [ 17.760363] kunit_try_run_case+0x1a5/0x480 [ 17.760719] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.761187] kthread+0x337/0x6f0 [ 17.761629] ret_from_fork+0x116/0x1d0 [ 17.761983] ret_from_fork_asm+0x1a/0x30 [ 17.762363] [ 17.762552] The buggy address belongs to the object at ffff888102ac4100 [ 17.762552] which belongs to the cache kmalloc-64 of size 64 [ 17.763345] The buggy address is located 0 bytes to the right of [ 17.763345] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 17.764140] [ 17.764331] The buggy address belongs to the physical page: [ 17.764659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 17.765015] flags: 0x200000000000000(node=0|zone=2) [ 17.765268] page_type: f5(slab) [ 17.765521] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.765893] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.766453] page dumped because: kasan: bad access detected [ 17.766982] [ 17.767091] Memory state around the buggy address: [ 17.767463] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.767929] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.768456] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.768758] ^ [ 17.769163] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.769512] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.769783] ================================================================== [ 16.778236] ================================================================== [ 16.778806] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 16.779993] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 16.780494] [ 16.780691] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.780774] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.780797] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.780834] Call Trace: [ 16.780864] <TASK> [ 16.780894] dump_stack_lvl+0x73/0xb0 [ 16.780953] print_report+0xd1/0x650 [ 16.780997] ? __virt_addr_valid+0x1db/0x2d0 [ 16.781041] ? kasan_atomics_helper+0xe78/0x5450 [ 16.781080] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.781166] ? kasan_atomics_helper+0xe78/0x5450 [ 16.781212] kasan_report+0x141/0x180 [ 16.781251] ? kasan_atomics_helper+0xe78/0x5450 [ 16.781295] kasan_check_range+0x10c/0x1c0 [ 16.781337] __kasan_check_write+0x18/0x20 [ 16.781376] kasan_atomics_helper+0xe78/0x5450 [ 16.781420] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.781465] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.781513] ? trace_hardirqs_on+0x37/0xe0 [ 16.781558] ? kasan_atomics+0x152/0x310 [ 16.781625] kasan_atomics+0x1dc/0x310 [ 16.781674] ? __pfx_kasan_atomics+0x10/0x10 [ 16.781724] ? __pfx_kasan_atomics+0x10/0x10 [ 16.781777] kunit_try_run_case+0x1a5/0x480 [ 16.781818] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.781841] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.781865] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.781888] ? __kthread_parkme+0x82/0x180 [ 16.781908] ? preempt_count_sub+0x50/0x80 [ 16.781943] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.781967] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.781989] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.782011] kthread+0x337/0x6f0 [ 16.782031] ? trace_preempt_on+0x20/0xc0 [ 16.782053] ? __pfx_kthread+0x10/0x10 [ 16.782073] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.782094] ? calculate_sigpending+0x7b/0xa0 [ 16.782142] ? __pfx_kthread+0x10/0x10 [ 16.782164] ret_from_fork+0x116/0x1d0 [ 16.782183] ? __pfx_kthread+0x10/0x10 [ 16.782203] ret_from_fork_asm+0x1a/0x30 [ 16.782233] </TASK> [ 16.782248] [ 16.791725] Allocated by task 283: [ 16.792014] kasan_save_stack+0x45/0x70 [ 16.792416] kasan_save_track+0x18/0x40 [ 16.792726] kasan_save_alloc_info+0x3b/0x50 [ 16.793026] __kasan_kmalloc+0xb7/0xc0 [ 16.793353] __kmalloc_cache_noprof+0x189/0x420 [ 16.793591] kasan_atomics+0x95/0x310 [ 16.793779] kunit_try_run_case+0x1a5/0x480 [ 16.793966] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.794166] kthread+0x337/0x6f0 [ 16.794322] ret_from_fork+0x116/0x1d0 [ 16.794485] ret_from_fork_asm+0x1a/0x30 [ 16.794684] [ 16.794850] The buggy address belongs to the object at ffff888102ac4100 [ 16.794850] which belongs to the cache kmalloc-64 of size 64 [ 16.795671] The buggy address is located 0 bytes to the right of [ 16.795671] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 16.797258] [ 16.797388] The buggy address belongs to the physical page: [ 16.797714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 16.798094] flags: 0x200000000000000(node=0|zone=2) [ 16.798368] page_type: f5(slab) [ 16.798527] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.799487] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.800075] page dumped because: kasan: bad access detected [ 16.800484] [ 16.800656] Memory state around the buggy address: [ 16.800968] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.801435] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.801759] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.802033] ^ [ 16.802391] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.802678] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.803103] ================================================================== [ 17.536483] ================================================================== [ 17.536955] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 17.537419] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 17.537835] [ 17.537930] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.537979] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.537992] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.538015] Call Trace: [ 17.538032] <TASK> [ 17.538049] dump_stack_lvl+0x73/0xb0 [ 17.538081] print_report+0xd1/0x650 [ 17.538145] ? __virt_addr_valid+0x1db/0x2d0 [ 17.538192] ? kasan_atomics_helper+0x1ce1/0x5450 [ 17.538231] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.538396] ? kasan_atomics_helper+0x1ce1/0x5450 [ 17.538450] kasan_report+0x141/0x180 [ 17.538494] ? kasan_atomics_helper+0x1ce1/0x5450 [ 17.538559] kasan_check_range+0x10c/0x1c0 [ 17.538598] __kasan_check_write+0x18/0x20 [ 17.538660] kasan_atomics_helper+0x1ce1/0x5450 [ 17.538698] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.538736] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.538781] ? trace_hardirqs_on+0x37/0xe0 [ 17.538824] ? kasan_atomics+0x152/0x310 [ 17.538877] kasan_atomics+0x1dc/0x310 [ 17.538916] ? __pfx_kasan_atomics+0x10/0x10 [ 17.538950] ? __pfx_kasan_atomics+0x10/0x10 [ 17.538999] kunit_try_run_case+0x1a5/0x480 [ 17.539047] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.539089] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.539130] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.539182] ? __kthread_parkme+0x82/0x180 [ 17.539202] ? preempt_count_sub+0x50/0x80 [ 17.539227] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.539250] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.539272] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.539295] kthread+0x337/0x6f0 [ 17.539315] ? trace_preempt_on+0x20/0xc0 [ 17.539336] ? __pfx_kthread+0x10/0x10 [ 17.539357] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.539377] ? calculate_sigpending+0x7b/0xa0 [ 17.539401] ? __pfx_kthread+0x10/0x10 [ 17.539422] ret_from_fork+0x116/0x1d0 [ 17.539440] ? __pfx_kthread+0x10/0x10 [ 17.539460] ret_from_fork_asm+0x1a/0x30 [ 17.539490] </TASK> [ 17.539503] [ 17.550558] Allocated by task 283: [ 17.550719] kasan_save_stack+0x45/0x70 [ 17.550905] kasan_save_track+0x18/0x40 [ 17.551076] kasan_save_alloc_info+0x3b/0x50 [ 17.551301] __kasan_kmalloc+0xb7/0xc0 [ 17.551598] __kmalloc_cache_noprof+0x189/0x420 [ 17.551945] kasan_atomics+0x95/0x310 [ 17.552231] kunit_try_run_case+0x1a5/0x480 [ 17.553153] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.553397] kthread+0x337/0x6f0 [ 17.553665] ret_from_fork+0x116/0x1d0 [ 17.553873] ret_from_fork_asm+0x1a/0x30 [ 17.554043] [ 17.554696] The buggy address belongs to the object at ffff888102ac4100 [ 17.554696] which belongs to the cache kmalloc-64 of size 64 [ 17.555381] The buggy address is located 0 bytes to the right of [ 17.555381] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 17.556258] [ 17.556362] The buggy address belongs to the physical page: [ 17.556836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 17.557555] flags: 0x200000000000000(node=0|zone=2) [ 17.557822] page_type: f5(slab) [ 17.557968] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.558564] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.558874] page dumped because: kasan: bad access detected [ 17.559130] [ 17.559573] Memory state around the buggy address: [ 17.559975] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.560405] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.560830] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.561426] ^ [ 17.561686] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.562316] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.562692] ================================================================== [ 16.341114] ================================================================== [ 16.341750] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 16.342000] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 16.342272] [ 16.342530] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.342641] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.342664] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.342703] Call Trace: [ 16.342730] <TASK> [ 16.342759] dump_stack_lvl+0x73/0xb0 [ 16.342820] print_report+0xd1/0x650 [ 16.342864] ? __virt_addr_valid+0x1db/0x2d0 [ 16.342902] ? kasan_atomics_helper+0x4b3a/0x5450 [ 16.342940] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.342985] ? kasan_atomics_helper+0x4b3a/0x5450 [ 16.343310] kasan_report+0x141/0x180 [ 16.343354] ? kasan_atomics_helper+0x4b3a/0x5450 [ 16.343403] __asan_report_store4_noabort+0x1b/0x30 [ 16.343453] kasan_atomics_helper+0x4b3a/0x5450 [ 16.343500] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.343544] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.343588] ? trace_hardirqs_on+0x37/0xe0 [ 16.343651] ? kasan_atomics+0x152/0x310 [ 16.343705] kasan_atomics+0x1dc/0x310 [ 16.343743] ? __pfx_kasan_atomics+0x10/0x10 [ 16.343781] ? __pfx_kasan_atomics+0x10/0x10 [ 16.343822] kunit_try_run_case+0x1a5/0x480 [ 16.343862] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.343886] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.343910] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.343933] ? __kthread_parkme+0x82/0x180 [ 16.343953] ? preempt_count_sub+0x50/0x80 [ 16.343977] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.344000] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.344022] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.344045] kthread+0x337/0x6f0 [ 16.344066] ? trace_preempt_on+0x20/0xc0 [ 16.344087] ? __pfx_kthread+0x10/0x10 [ 16.344114] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.344138] ? calculate_sigpending+0x7b/0xa0 [ 16.344161] ? __pfx_kthread+0x10/0x10 [ 16.344183] ret_from_fork+0x116/0x1d0 [ 16.344201] ? __pfx_kthread+0x10/0x10 [ 16.344222] ret_from_fork_asm+0x1a/0x30 [ 16.344251] </TASK> [ 16.344264] [ 16.355923] Allocated by task 283: [ 16.356178] kasan_save_stack+0x45/0x70 [ 16.356460] kasan_save_track+0x18/0x40 [ 16.357567] kasan_save_alloc_info+0x3b/0x50 [ 16.357755] __kasan_kmalloc+0xb7/0xc0 [ 16.358588] __kmalloc_cache_noprof+0x189/0x420 [ 16.358888] kasan_atomics+0x95/0x310 [ 16.359044] kunit_try_run_case+0x1a5/0x480 [ 16.359787] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.360004] kthread+0x337/0x6f0 [ 16.360144] ret_from_fork+0x116/0x1d0 [ 16.360655] ret_from_fork_asm+0x1a/0x30 [ 16.361018] [ 16.361226] The buggy address belongs to the object at ffff888102ac4100 [ 16.361226] which belongs to the cache kmalloc-64 of size 64 [ 16.362007] The buggy address is located 0 bytes to the right of [ 16.362007] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 16.363572] [ 16.363770] The buggy address belongs to the physical page: [ 16.364349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 16.364811] flags: 0x200000000000000(node=0|zone=2) [ 16.365142] page_type: f5(slab) [ 16.365725] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.365977] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.366664] page dumped because: kasan: bad access detected [ 16.367394] [ 16.367569] Memory state around the buggy address: [ 16.368071] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.368446] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.369543] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.369848] ^ [ 16.370051] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.370838] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.371204] ================================================================== [ 17.323481] ================================================================== [ 17.324050] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 17.324568] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 17.325069] [ 17.325294] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.325380] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.325407] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.325447] Call Trace: [ 17.325477] <TASK> [ 17.325509] dump_stack_lvl+0x73/0xb0 [ 17.325567] print_report+0xd1/0x650 [ 17.325612] ? __virt_addr_valid+0x1db/0x2d0 [ 17.325674] ? kasan_atomics_helper+0x1818/0x5450 [ 17.325717] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.325769] ? kasan_atomics_helper+0x1818/0x5450 [ 17.325814] kasan_report+0x141/0x180 [ 17.325860] ? kasan_atomics_helper+0x1818/0x5450 [ 17.325922] kasan_check_range+0x10c/0x1c0 [ 17.325971] __kasan_check_write+0x18/0x20 [ 17.326013] kasan_atomics_helper+0x1818/0x5450 [ 17.326059] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.326105] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.326149] ? trace_hardirqs_on+0x37/0xe0 [ 17.326184] ? kasan_atomics+0x152/0x310 [ 17.326230] kasan_atomics+0x1dc/0x310 [ 17.326272] ? __pfx_kasan_atomics+0x10/0x10 [ 17.326313] ? __pfx_kasan_atomics+0x10/0x10 [ 17.326367] kunit_try_run_case+0x1a5/0x480 [ 17.326417] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.326463] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.326511] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.326556] ? __kthread_parkme+0x82/0x180 [ 17.326599] ? preempt_count_sub+0x50/0x80 [ 17.326664] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.326705] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.326742] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.326783] kthread+0x337/0x6f0 [ 17.326817] ? trace_preempt_on+0x20/0xc0 [ 17.326857] ? __pfx_kthread+0x10/0x10 [ 17.326890] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.326927] ? calculate_sigpending+0x7b/0xa0 [ 17.326970] ? __pfx_kthread+0x10/0x10 [ 17.327011] ret_from_fork+0x116/0x1d0 [ 17.327050] ? __pfx_kthread+0x10/0x10 [ 17.327088] ret_from_fork_asm+0x1a/0x30 [ 17.327161] </TASK> [ 17.327187] [ 17.335573] Allocated by task 283: [ 17.335758] kasan_save_stack+0x45/0x70 [ 17.335947] kasan_save_track+0x18/0x40 [ 17.336113] kasan_save_alloc_info+0x3b/0x50 [ 17.336434] __kasan_kmalloc+0xb7/0xc0 [ 17.336747] __kmalloc_cache_noprof+0x189/0x420 [ 17.337091] kasan_atomics+0x95/0x310 [ 17.337386] kunit_try_run_case+0x1a5/0x480 [ 17.337696] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.338085] kthread+0x337/0x6f0 [ 17.338351] ret_from_fork+0x116/0x1d0 [ 17.338642] ret_from_fork_asm+0x1a/0x30 [ 17.338820] [ 17.338930] The buggy address belongs to the object at ffff888102ac4100 [ 17.338930] which belongs to the cache kmalloc-64 of size 64 [ 17.339684] The buggy address is located 0 bytes to the right of [ 17.339684] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 17.340446] [ 17.340605] The buggy address belongs to the physical page: [ 17.340848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 17.341114] flags: 0x200000000000000(node=0|zone=2) [ 17.341489] page_type: f5(slab) [ 17.341765] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.342308] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.342580] page dumped because: kasan: bad access detected [ 17.342796] [ 17.342901] Memory state around the buggy address: [ 17.343088] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.343585] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.344065] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.344547] ^ [ 17.344895] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.345225] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.345521] ================================================================== [ 17.222041] ================================================================== [ 17.222672] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 17.223271] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 17.223705] [ 17.223911] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.223996] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.224021] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.224056] Call Trace: [ 17.224086] <TASK> [ 17.224177] dump_stack_lvl+0x73/0xb0 [ 17.224239] print_report+0xd1/0x650 [ 17.224277] ? __virt_addr_valid+0x1db/0x2d0 [ 17.224316] ? kasan_atomics_helper+0x15b6/0x5450 [ 17.224349] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.224392] ? kasan_atomics_helper+0x15b6/0x5450 [ 17.224432] kasan_report+0x141/0x180 [ 17.224473] ? kasan_atomics_helper+0x15b6/0x5450 [ 17.224526] kasan_check_range+0x10c/0x1c0 [ 17.224573] __kasan_check_write+0x18/0x20 [ 17.224627] kasan_atomics_helper+0x15b6/0x5450 [ 17.224672] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.224715] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.224761] ? trace_hardirqs_on+0x37/0xe0 [ 17.224805] ? kasan_atomics+0x152/0x310 [ 17.224859] kasan_atomics+0x1dc/0x310 [ 17.224901] ? __pfx_kasan_atomics+0x10/0x10 [ 17.224966] ? __pfx_kasan_atomics+0x10/0x10 [ 17.225014] kunit_try_run_case+0x1a5/0x480 [ 17.225058] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.225132] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.225183] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.225231] ? __kthread_parkme+0x82/0x180 [ 17.225272] ? preempt_count_sub+0x50/0x80 [ 17.225322] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.225370] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.225416] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.225455] kthread+0x337/0x6f0 [ 17.225477] ? trace_preempt_on+0x20/0xc0 [ 17.225499] ? __pfx_kthread+0x10/0x10 [ 17.225520] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.225542] ? calculate_sigpending+0x7b/0xa0 [ 17.225565] ? __pfx_kthread+0x10/0x10 [ 17.225587] ret_from_fork+0x116/0x1d0 [ 17.225606] ? __pfx_kthread+0x10/0x10 [ 17.225644] ret_from_fork_asm+0x1a/0x30 [ 17.225674] </TASK> [ 17.225687] [ 17.235403] Allocated by task 283: [ 17.235742] kasan_save_stack+0x45/0x70 [ 17.236143] kasan_save_track+0x18/0x40 [ 17.236495] kasan_save_alloc_info+0x3b/0x50 [ 17.236878] __kasan_kmalloc+0xb7/0xc0 [ 17.237220] __kmalloc_cache_noprof+0x189/0x420 [ 17.237522] kasan_atomics+0x95/0x310 [ 17.237822] kunit_try_run_case+0x1a5/0x480 [ 17.238172] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.238533] kthread+0x337/0x6f0 [ 17.238841] ret_from_fork+0x116/0x1d0 [ 17.239140] ret_from_fork_asm+0x1a/0x30 [ 17.239410] [ 17.239624] The buggy address belongs to the object at ffff888102ac4100 [ 17.239624] which belongs to the cache kmalloc-64 of size 64 [ 17.240293] The buggy address is located 0 bytes to the right of [ 17.240293] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 17.240922] [ 17.241094] The buggy address belongs to the physical page: [ 17.241573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 17.241989] flags: 0x200000000000000(node=0|zone=2) [ 17.242448] page_type: f5(slab) [ 17.242747] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.243257] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.243640] page dumped because: kasan: bad access detected [ 17.244027] [ 17.244244] Memory state around the buggy address: [ 17.244588] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.245037] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.245489] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.245933] ^ [ 17.246307] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.246731] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.247022] ================================================================== [ 16.674025] ================================================================== [ 16.674511] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 16.675110] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 16.675664] [ 16.675883] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.675976] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.676004] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.676058] Call Trace: [ 16.676084] <TASK> [ 16.676112] dump_stack_lvl+0x73/0xb0 [ 16.676170] print_report+0xd1/0x650 [ 16.676210] ? __virt_addr_valid+0x1db/0x2d0 [ 16.676252] ? kasan_atomics_helper+0xc70/0x5450 [ 16.676293] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.676367] ? kasan_atomics_helper+0xc70/0x5450 [ 16.676411] kasan_report+0x141/0x180 [ 16.676463] ? kasan_atomics_helper+0xc70/0x5450 [ 16.676520] kasan_check_range+0x10c/0x1c0 [ 16.676570] __kasan_check_write+0x18/0x20 [ 16.676604] kasan_atomics_helper+0xc70/0x5450 [ 16.676652] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.676676] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.676699] ? trace_hardirqs_on+0x37/0xe0 [ 16.676722] ? kasan_atomics+0x152/0x310 [ 16.676749] kasan_atomics+0x1dc/0x310 [ 16.676771] ? __pfx_kasan_atomics+0x10/0x10 [ 16.676794] ? __pfx_kasan_atomics+0x10/0x10 [ 16.676820] kunit_try_run_case+0x1a5/0x480 [ 16.676844] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.676865] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.676887] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.676909] ? __kthread_parkme+0x82/0x180 [ 16.676929] ? preempt_count_sub+0x50/0x80 [ 16.676952] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.676975] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.676996] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.677018] kthread+0x337/0x6f0 [ 16.677038] ? trace_preempt_on+0x20/0xc0 [ 16.677059] ? __pfx_kthread+0x10/0x10 [ 16.677079] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.677109] ? calculate_sigpending+0x7b/0xa0 [ 16.677147] ? __pfx_kthread+0x10/0x10 [ 16.677167] ret_from_fork+0x116/0x1d0 [ 16.677186] ? __pfx_kthread+0x10/0x10 [ 16.677205] ret_from_fork_asm+0x1a/0x30 [ 16.677235] </TASK> [ 16.677247] [ 16.687428] Allocated by task 283: [ 16.687666] kasan_save_stack+0x45/0x70 [ 16.687986] kasan_save_track+0x18/0x40 [ 16.688303] kasan_save_alloc_info+0x3b/0x50 [ 16.688567] __kasan_kmalloc+0xb7/0xc0 [ 16.688751] __kmalloc_cache_noprof+0x189/0x420 [ 16.688943] kasan_atomics+0x95/0x310 [ 16.689109] kunit_try_run_case+0x1a5/0x480 [ 16.689366] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.689750] kthread+0x337/0x6f0 [ 16.690055] ret_from_fork+0x116/0x1d0 [ 16.690396] ret_from_fork_asm+0x1a/0x30 [ 16.690892] [ 16.691246] The buggy address belongs to the object at ffff888102ac4100 [ 16.691246] which belongs to the cache kmalloc-64 of size 64 [ 16.692130] The buggy address is located 0 bytes to the right of [ 16.692130] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 16.692737] [ 16.692885] The buggy address belongs to the physical page: [ 16.693210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 16.693850] flags: 0x200000000000000(node=0|zone=2) [ 16.694090] page_type: f5(slab) [ 16.694362] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.694777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.695230] page dumped because: kasan: bad access detected [ 16.695413] [ 16.695569] Memory state around the buggy address: [ 16.695864] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.696300] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.696758] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.697756] ^ [ 16.698063] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.698519] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.699010] ================================================================== [ 16.309286] ================================================================== [ 16.310173] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 16.310591] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 16.311277] [ 16.311492] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.311737] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.311766] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.311808] Call Trace: [ 16.311839] <TASK> [ 16.311870] dump_stack_lvl+0x73/0xb0 [ 16.311922] print_report+0xd1/0x650 [ 16.311960] ? __virt_addr_valid+0x1db/0x2d0 [ 16.312001] ? kasan_atomics_helper+0x4a0/0x5450 [ 16.312063] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.312139] ? kasan_atomics_helper+0x4a0/0x5450 [ 16.312183] kasan_report+0x141/0x180 [ 16.312241] ? kasan_atomics_helper+0x4a0/0x5450 [ 16.312289] kasan_check_range+0x10c/0x1c0 [ 16.312367] __kasan_check_write+0x18/0x20 [ 16.312406] kasan_atomics_helper+0x4a0/0x5450 [ 16.312448] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.312471] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.312495] ? trace_hardirqs_on+0x37/0xe0 [ 16.312556] ? kasan_atomics+0x152/0x310 [ 16.312594] kasan_atomics+0x1dc/0x310 [ 16.312645] ? __pfx_kasan_atomics+0x10/0x10 [ 16.312677] ? __pfx_kasan_atomics+0x10/0x10 [ 16.312703] kunit_try_run_case+0x1a5/0x480 [ 16.312727] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.312748] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.312772] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.312794] ? __kthread_parkme+0x82/0x180 [ 16.312814] ? preempt_count_sub+0x50/0x80 [ 16.312837] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.312860] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.312882] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.312904] kthread+0x337/0x6f0 [ 16.312924] ? trace_preempt_on+0x20/0xc0 [ 16.312946] ? __pfx_kthread+0x10/0x10 [ 16.312967] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.312986] ? calculate_sigpending+0x7b/0xa0 [ 16.313009] ? __pfx_kthread+0x10/0x10 [ 16.313030] ret_from_fork+0x116/0x1d0 [ 16.313048] ? __pfx_kthread+0x10/0x10 [ 16.313067] ret_from_fork_asm+0x1a/0x30 [ 16.313098] </TASK> [ 16.313115] [ 16.326476] Allocated by task 283: [ 16.327013] kasan_save_stack+0x45/0x70 [ 16.327343] kasan_save_track+0x18/0x40 [ 16.327510] kasan_save_alloc_info+0x3b/0x50 [ 16.327864] __kasan_kmalloc+0xb7/0xc0 [ 16.328065] __kmalloc_cache_noprof+0x189/0x420 [ 16.328654] kasan_atomics+0x95/0x310 [ 16.328873] kunit_try_run_case+0x1a5/0x480 [ 16.329217] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.329451] kthread+0x337/0x6f0 [ 16.329963] ret_from_fork+0x116/0x1d0 [ 16.330212] ret_from_fork_asm+0x1a/0x30 [ 16.330500] [ 16.330681] The buggy address belongs to the object at ffff888102ac4100 [ 16.330681] which belongs to the cache kmalloc-64 of size 64 [ 16.331634] The buggy address is located 0 bytes to the right of [ 16.331634] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 16.332548] [ 16.332701] The buggy address belongs to the physical page: [ 16.333028] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 16.333863] flags: 0x200000000000000(node=0|zone=2) [ 16.334083] page_type: f5(slab) [ 16.334350] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.335048] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.335461] page dumped because: kasan: bad access detected [ 16.335713] [ 16.335873] Memory state around the buggy address: [ 16.336189] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.336467] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.337393] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.337908] ^ [ 16.338561] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.338928] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.339688] ================================================================== [ 16.724031] ================================================================== [ 16.724791] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 16.725096] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 16.725440] [ 16.725640] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.725729] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.725756] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.725798] Call Trace: [ 16.725830] <TASK> [ 16.725862] dump_stack_lvl+0x73/0xb0 [ 16.725919] print_report+0xd1/0x650 [ 16.725960] ? __virt_addr_valid+0x1db/0x2d0 [ 16.726000] ? kasan_atomics_helper+0xd47/0x5450 [ 16.726037] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.726079] ? kasan_atomics_helper+0xd47/0x5450 [ 16.726152] kasan_report+0x141/0x180 [ 16.726198] ? kasan_atomics_helper+0xd47/0x5450 [ 16.726251] kasan_check_range+0x10c/0x1c0 [ 16.726294] __kasan_check_write+0x18/0x20 [ 16.726329] kasan_atomics_helper+0xd47/0x5450 [ 16.726372] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.726415] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.726461] ? trace_hardirqs_on+0x37/0xe0 [ 16.726502] ? kasan_atomics+0x152/0x310 [ 16.726552] kasan_atomics+0x1dc/0x310 [ 16.726596] ? __pfx_kasan_atomics+0x10/0x10 [ 16.726655] ? __pfx_kasan_atomics+0x10/0x10 [ 16.726689] kunit_try_run_case+0x1a5/0x480 [ 16.726714] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.726737] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.726760] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.726781] ? __kthread_parkme+0x82/0x180 [ 16.726801] ? preempt_count_sub+0x50/0x80 [ 16.726837] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.726879] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.726923] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.726963] kthread+0x337/0x6f0 [ 16.726996] ? trace_preempt_on+0x20/0xc0 [ 16.727038] ? __pfx_kthread+0x10/0x10 [ 16.727085] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.727158] ? calculate_sigpending+0x7b/0xa0 [ 16.727200] ? __pfx_kthread+0x10/0x10 [ 16.727237] ret_from_fork+0x116/0x1d0 [ 16.727273] ? __pfx_kthread+0x10/0x10 [ 16.727313] ret_from_fork_asm+0x1a/0x30 [ 16.727375] </TASK> [ 16.727399] [ 16.742527] Allocated by task 283: [ 16.742837] kasan_save_stack+0x45/0x70 [ 16.743060] kasan_save_track+0x18/0x40 [ 16.743314] kasan_save_alloc_info+0x3b/0x50 [ 16.743500] __kasan_kmalloc+0xb7/0xc0 [ 16.743722] __kmalloc_cache_noprof+0x189/0x420 [ 16.744022] kasan_atomics+0x95/0x310 [ 16.744320] kunit_try_run_case+0x1a5/0x480 [ 16.744658] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.745016] kthread+0x337/0x6f0 [ 16.745275] ret_from_fork+0x116/0x1d0 [ 16.745508] ret_from_fork_asm+0x1a/0x30 [ 16.745694] [ 16.745807] The buggy address belongs to the object at ffff888102ac4100 [ 16.745807] which belongs to the cache kmalloc-64 of size 64 [ 16.746231] The buggy address is located 0 bytes to the right of [ 16.746231] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 16.747035] [ 16.747216] The buggy address belongs to the physical page: [ 16.747606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 16.748052] flags: 0x200000000000000(node=0|zone=2) [ 16.748381] page_type: f5(slab) [ 16.748646] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.748972] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.749309] page dumped because: kasan: bad access detected [ 16.749645] [ 16.749801] Memory state around the buggy address: [ 16.750179] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.750468] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.750812] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.751289] ^ [ 16.751523] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.751982] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.752280] ================================================================== [ 17.424704] ================================================================== [ 17.425310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 17.425760] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 17.426188] [ 17.426429] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.426539] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.426581] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.426638] Call Trace: [ 17.426668] <TASK> [ 17.426719] dump_stack_lvl+0x73/0xb0 [ 17.426795] print_report+0xd1/0x650 [ 17.426839] ? __virt_addr_valid+0x1db/0x2d0 [ 17.426911] ? kasan_atomics_helper+0x1a7f/0x5450 [ 17.426956] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.427008] ? kasan_atomics_helper+0x1a7f/0x5450 [ 17.427052] kasan_report+0x141/0x180 [ 17.427095] ? kasan_atomics_helper+0x1a7f/0x5450 [ 17.427201] kasan_check_range+0x10c/0x1c0 [ 17.427263] __kasan_check_write+0x18/0x20 [ 17.427304] kasan_atomics_helper+0x1a7f/0x5450 [ 17.427363] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.427419] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.427468] ? trace_hardirqs_on+0x37/0xe0 [ 17.427513] ? kasan_atomics+0x152/0x310 [ 17.427569] kasan_atomics+0x1dc/0x310 [ 17.427627] ? __pfx_kasan_atomics+0x10/0x10 [ 17.427677] ? __pfx_kasan_atomics+0x10/0x10 [ 17.427733] kunit_try_run_case+0x1a5/0x480 [ 17.427782] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.427823] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.427862] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.427899] ? __kthread_parkme+0x82/0x180 [ 17.427933] ? preempt_count_sub+0x50/0x80 [ 17.427976] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.428052] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.428152] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.428214] kthread+0x337/0x6f0 [ 17.428259] ? trace_preempt_on+0x20/0xc0 [ 17.428304] ? __pfx_kthread+0x10/0x10 [ 17.428345] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.428410] ? calculate_sigpending+0x7b/0xa0 [ 17.428479] ? __pfx_kthread+0x10/0x10 [ 17.428522] ret_from_fork+0x116/0x1d0 [ 17.428560] ? __pfx_kthread+0x10/0x10 [ 17.428611] ret_from_fork_asm+0x1a/0x30 [ 17.428693] </TASK> [ 17.428725] [ 17.439676] Allocated by task 283: [ 17.440019] kasan_save_stack+0x45/0x70 [ 17.440242] kasan_save_track+0x18/0x40 [ 17.440414] kasan_save_alloc_info+0x3b/0x50 [ 17.440599] __kasan_kmalloc+0xb7/0xc0 [ 17.440987] __kmalloc_cache_noprof+0x189/0x420 [ 17.441533] kasan_atomics+0x95/0x310 [ 17.441848] kunit_try_run_case+0x1a5/0x480 [ 17.442266] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.442755] kthread+0x337/0x6f0 [ 17.443035] ret_from_fork+0x116/0x1d0 [ 17.443364] ret_from_fork_asm+0x1a/0x30 [ 17.443631] [ 17.443744] The buggy address belongs to the object at ffff888102ac4100 [ 17.443744] which belongs to the cache kmalloc-64 of size 64 [ 17.444589] The buggy address is located 0 bytes to the right of [ 17.444589] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 17.445253] [ 17.445367] The buggy address belongs to the physical page: [ 17.445711] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 17.446421] flags: 0x200000000000000(node=0|zone=2) [ 17.446835] page_type: f5(slab) [ 17.447008] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.447358] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.447901] page dumped because: kasan: bad access detected [ 17.448357] [ 17.448481] Memory state around the buggy address: [ 17.448683] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.449324] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.449736] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.450230] ^ [ 17.450449] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.450981] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.451492] ================================================================== [ 16.986523] ================================================================== [ 16.987461] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 16.988025] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 16.988461] [ 16.988823] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.988885] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.988903] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.988937] Call Trace: [ 16.988968] <TASK> [ 16.988994] dump_stack_lvl+0x73/0xb0 [ 16.989042] print_report+0xd1/0x650 [ 16.989073] ? __virt_addr_valid+0x1db/0x2d0 [ 16.989107] ? kasan_atomics_helper+0x1217/0x5450 [ 16.989144] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.989183] ? kasan_atomics_helper+0x1217/0x5450 [ 16.989215] kasan_report+0x141/0x180 [ 16.989248] ? kasan_atomics_helper+0x1217/0x5450 [ 16.989293] kasan_check_range+0x10c/0x1c0 [ 16.989333] __kasan_check_write+0x18/0x20 [ 16.989367] kasan_atomics_helper+0x1217/0x5450 [ 16.989400] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.989432] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.989749] ? trace_hardirqs_on+0x37/0xe0 [ 16.989791] ? kasan_atomics+0x152/0x310 [ 16.989834] kasan_atomics+0x1dc/0x310 [ 16.989868] ? __pfx_kasan_atomics+0x10/0x10 [ 16.989903] ? __pfx_kasan_atomics+0x10/0x10 [ 16.989959] kunit_try_run_case+0x1a5/0x480 [ 16.989997] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.990034] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.990073] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.990110] ? __kthread_parkme+0x82/0x180 [ 16.990703] ? preempt_count_sub+0x50/0x80 [ 16.990751] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.990787] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.990824] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.990859] kthread+0x337/0x6f0 [ 16.990887] ? trace_preempt_on+0x20/0xc0 [ 16.990921] ? __pfx_kthread+0x10/0x10 [ 16.990954] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.990990] ? calculate_sigpending+0x7b/0xa0 [ 16.991029] ? __pfx_kthread+0x10/0x10 [ 16.991065] ret_from_fork+0x116/0x1d0 [ 16.991098] ? __pfx_kthread+0x10/0x10 [ 16.991141] ret_from_fork_asm+0x1a/0x30 [ 16.991193] </TASK> [ 16.991211] [ 17.003417] Allocated by task 283: [ 17.003721] kasan_save_stack+0x45/0x70 [ 17.004430] kasan_save_track+0x18/0x40 [ 17.005381] kasan_save_alloc_info+0x3b/0x50 [ 17.006162] __kasan_kmalloc+0xb7/0xc0 [ 17.006667] __kmalloc_cache_noprof+0x189/0x420 [ 17.006913] kasan_atomics+0x95/0x310 [ 17.007168] kunit_try_run_case+0x1a5/0x480 [ 17.007503] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.007911] kthread+0x337/0x6f0 [ 17.008265] ret_from_fork+0x116/0x1d0 [ 17.008630] ret_from_fork_asm+0x1a/0x30 [ 17.008805] [ 17.008904] The buggy address belongs to the object at ffff888102ac4100 [ 17.008904] which belongs to the cache kmalloc-64 of size 64 [ 17.009612] The buggy address is located 0 bytes to the right of [ 17.009612] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 17.010272] [ 17.010462] The buggy address belongs to the physical page: [ 17.010735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 17.011245] flags: 0x200000000000000(node=0|zone=2) [ 17.011648] page_type: f5(slab) [ 17.011812] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.012261] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.012608] page dumped because: kasan: bad access detected [ 17.012921] [ 17.013125] Memory state around the buggy address: [ 17.013469] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.013859] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.014286] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.014769] ^ [ 17.015067] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.015435] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.015842] ================================================================== [ 16.699781] ================================================================== [ 16.700559] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 16.701089] Read of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 16.701393] [ 16.701523] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.701604] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.701645] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.701684] Call Trace: [ 16.701714] <TASK> [ 16.701741] dump_stack_lvl+0x73/0xb0 [ 16.701794] print_report+0xd1/0x650 [ 16.701835] ? __virt_addr_valid+0x1db/0x2d0 [ 16.701877] ? kasan_atomics_helper+0x4a84/0x5450 [ 16.701926] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.701972] ? kasan_atomics_helper+0x4a84/0x5450 [ 16.702011] kasan_report+0x141/0x180 [ 16.702053] ? kasan_atomics_helper+0x4a84/0x5450 [ 16.702111] __asan_report_load4_noabort+0x18/0x20 [ 16.702157] kasan_atomics_helper+0x4a84/0x5450 [ 16.702200] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.702239] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.702278] ? trace_hardirqs_on+0x37/0xe0 [ 16.702319] ? kasan_atomics+0x152/0x310 [ 16.702366] kasan_atomics+0x1dc/0x310 [ 16.702407] ? __pfx_kasan_atomics+0x10/0x10 [ 16.702449] ? __pfx_kasan_atomics+0x10/0x10 [ 16.702500] kunit_try_run_case+0x1a5/0x480 [ 16.702560] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.702586] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.702612] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.702651] ? __kthread_parkme+0x82/0x180 [ 16.702672] ? preempt_count_sub+0x50/0x80 [ 16.702695] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.702718] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.702742] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.702764] kthread+0x337/0x6f0 [ 16.702783] ? trace_preempt_on+0x20/0xc0 [ 16.702806] ? __pfx_kthread+0x10/0x10 [ 16.702826] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.702846] ? calculate_sigpending+0x7b/0xa0 [ 16.702870] ? __pfx_kthread+0x10/0x10 [ 16.702891] ret_from_fork+0x116/0x1d0 [ 16.702909] ? __pfx_kthread+0x10/0x10 [ 16.702929] ret_from_fork_asm+0x1a/0x30 [ 16.702959] </TASK> [ 16.702972] [ 16.712636] Allocated by task 283: [ 16.712923] kasan_save_stack+0x45/0x70 [ 16.713110] kasan_save_track+0x18/0x40 [ 16.713408] kasan_save_alloc_info+0x3b/0x50 [ 16.713756] __kasan_kmalloc+0xb7/0xc0 [ 16.714012] __kmalloc_cache_noprof+0x189/0x420 [ 16.714191] kasan_atomics+0x95/0x310 [ 16.714459] kunit_try_run_case+0x1a5/0x480 [ 16.715101] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.715518] kthread+0x337/0x6f0 [ 16.715740] ret_from_fork+0x116/0x1d0 [ 16.715906] ret_from_fork_asm+0x1a/0x30 [ 16.716272] [ 16.716839] The buggy address belongs to the object at ffff888102ac4100 [ 16.716839] which belongs to the cache kmalloc-64 of size 64 [ 16.717543] The buggy address is located 0 bytes to the right of [ 16.717543] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 16.718320] [ 16.718451] The buggy address belongs to the physical page: [ 16.718773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 16.719087] flags: 0x200000000000000(node=0|zone=2) [ 16.719482] page_type: f5(slab) [ 16.719764] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.720210] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.720429] page dumped because: kasan: bad access detected [ 16.720736] [ 16.720894] Memory state around the buggy address: [ 16.721153] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.721466] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.721819] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.722056] ^ [ 16.722411] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.722718] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.723204] ================================================================== [ 16.877835] ================================================================== [ 16.878437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 16.878779] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 16.879034] [ 16.879189] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.879284] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.879310] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.879349] Call Trace: [ 16.879378] <TASK> [ 16.879407] dump_stack_lvl+0x73/0xb0 [ 16.879458] print_report+0xd1/0x650 [ 16.879493] ? __virt_addr_valid+0x1db/0x2d0 [ 16.879527] ? kasan_atomics_helper+0x1079/0x5450 [ 16.879566] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.879643] ? kasan_atomics_helper+0x1079/0x5450 [ 16.879685] kasan_report+0x141/0x180 [ 16.879725] ? kasan_atomics_helper+0x1079/0x5450 [ 16.879776] kasan_check_range+0x10c/0x1c0 [ 16.879823] __kasan_check_write+0x18/0x20 [ 16.879861] kasan_atomics_helper+0x1079/0x5450 [ 16.879921] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.879966] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.880011] ? trace_hardirqs_on+0x37/0xe0 [ 16.880053] ? kasan_atomics+0x152/0x310 [ 16.880151] kasan_atomics+0x1dc/0x310 [ 16.880197] ? __pfx_kasan_atomics+0x10/0x10 [ 16.880256] ? __pfx_kasan_atomics+0x10/0x10 [ 16.880312] kunit_try_run_case+0x1a5/0x480 [ 16.880359] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.880399] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.880443] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.880490] ? __kthread_parkme+0x82/0x180 [ 16.880545] ? preempt_count_sub+0x50/0x80 [ 16.880594] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.880653] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.880715] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.880759] kthread+0x337/0x6f0 [ 16.880800] ? trace_preempt_on+0x20/0xc0 [ 16.880841] ? __pfx_kthread+0x10/0x10 [ 16.880882] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.880923] ? calculate_sigpending+0x7b/0xa0 [ 16.880954] ? __pfx_kthread+0x10/0x10 [ 16.880992] ret_from_fork+0x116/0x1d0 [ 16.881024] ? __pfx_kthread+0x10/0x10 [ 16.881056] ret_from_fork_asm+0x1a/0x30 [ 16.881142] </TASK> [ 16.881189] [ 16.892663] Allocated by task 283: [ 16.892924] kasan_save_stack+0x45/0x70 [ 16.893323] kasan_save_track+0x18/0x40 [ 16.893669] kasan_save_alloc_info+0x3b/0x50 [ 16.894049] __kasan_kmalloc+0xb7/0xc0 [ 16.894427] __kmalloc_cache_noprof+0x189/0x420 [ 16.894779] kasan_atomics+0x95/0x310 [ 16.894939] kunit_try_run_case+0x1a5/0x480 [ 16.895233] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.895586] kthread+0x337/0x6f0 [ 16.895780] ret_from_fork+0x116/0x1d0 [ 16.895926] ret_from_fork_asm+0x1a/0x30 [ 16.896229] [ 16.896380] The buggy address belongs to the object at ffff888102ac4100 [ 16.896380] which belongs to the cache kmalloc-64 of size 64 [ 16.896919] The buggy address is located 0 bytes to the right of [ 16.896919] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 16.897322] [ 16.897426] The buggy address belongs to the physical page: [ 16.897825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 16.898405] flags: 0x200000000000000(node=0|zone=2) [ 16.898789] page_type: f5(slab) [ 16.899066] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.899601] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.899942] page dumped because: kasan: bad access detected [ 16.900360] [ 16.900484] Memory state around the buggy address: [ 16.900820] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.901062] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.901345] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.901833] ^ [ 16.902220] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.902649] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.902900] ================================================================== [ 16.647635] ================================================================== [ 16.648205] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 16.648492] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283 [ 16.649005] [ 16.649180] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.649265] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.649309] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.649347] Call Trace: [ 16.649375] <TASK> [ 16.649401] dump_stack_lvl+0x73/0xb0 [ 16.649454] print_report+0xd1/0x650 [ 16.649498] ? __virt_addr_valid+0x1db/0x2d0 [ 16.649538] ? kasan_atomics_helper+0xb6a/0x5450 [ 16.649580] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.649642] ? kasan_atomics_helper+0xb6a/0x5450 [ 16.649672] kasan_report+0x141/0x180 [ 16.649702] ? kasan_atomics_helper+0xb6a/0x5450 [ 16.649734] kasan_check_range+0x10c/0x1c0 [ 16.649763] __kasan_check_write+0x18/0x20 [ 16.649788] kasan_atomics_helper+0xb6a/0x5450 [ 16.649826] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.649862] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.649905] ? trace_hardirqs_on+0x37/0xe0 [ 16.649956] ? kasan_atomics+0x152/0x310 [ 16.650007] kasan_atomics+0x1dc/0x310 [ 16.650052] ? __pfx_kasan_atomics+0x10/0x10 [ 16.650097] ? __pfx_kasan_atomics+0x10/0x10 [ 16.650143] kunit_try_run_case+0x1a5/0x480 [ 16.650190] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.650234] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.650277] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.650321] ? __kthread_parkme+0x82/0x180 [ 16.650362] ? preempt_count_sub+0x50/0x80 [ 16.650409] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.650456] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.650494] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.650531] kthread+0x337/0x6f0 [ 16.650563] ? trace_preempt_on+0x20/0xc0 [ 16.650601] ? __pfx_kthread+0x10/0x10 [ 16.650656] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.650697] ? calculate_sigpending+0x7b/0xa0 [ 16.650741] ? __pfx_kthread+0x10/0x10 [ 16.650786] ret_from_fork+0x116/0x1d0 [ 16.650825] ? __pfx_kthread+0x10/0x10 [ 16.650866] ret_from_fork_asm+0x1a/0x30 [ 16.650929] </TASK> [ 16.650956] [ 16.660603] Allocated by task 283: [ 16.660795] kasan_save_stack+0x45/0x70 [ 16.661110] kasan_save_track+0x18/0x40 [ 16.662490] kasan_save_alloc_info+0x3b/0x50 [ 16.662862] __kasan_kmalloc+0xb7/0xc0 [ 16.663078] __kmalloc_cache_noprof+0x189/0x420 [ 16.663433] kasan_atomics+0x95/0x310 [ 16.663752] kunit_try_run_case+0x1a5/0x480 [ 16.663968] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.664224] kthread+0x337/0x6f0 [ 16.664403] ret_from_fork+0x116/0x1d0 [ 16.664550] ret_from_fork_asm+0x1a/0x30 [ 16.664933] [ 16.665073] The buggy address belongs to the object at ffff888102ac4100 [ 16.665073] which belongs to the cache kmalloc-64 of size 64 [ 16.665465] The buggy address is located 0 bytes to the right of [ 16.665465] allocated 48-byte region [ffff888102ac4100, ffff888102ac4130) [ 16.666368] [ 16.666591] The buggy address belongs to the physical page: [ 16.667033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4 [ 16.667458] flags: 0x200000000000000(node=0|zone=2) [ 16.667673] page_type: f5(slab) [ 16.667831] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.668456] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.669001] page dumped because: kasan: bad access detected [ 16.669428] [ 16.669589] Memory state around the buggy address: [ 16.669879] ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.670311] ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.670715] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.671010] ^ [ 16.671235] ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.671782] ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.672327] ==================================================================
[ 16.924258] ================================================================== [ 16.924996] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 16.925852] Read of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 16.926558] [ 16.926750] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.926813] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.926828] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.926850] Call Trace: [ 16.926867] <TASK> [ 16.926884] dump_stack_lvl+0x73/0xb0 [ 16.926924] print_report+0xd1/0x650 [ 16.926949] ? __virt_addr_valid+0x1db/0x2d0 [ 16.926974] ? kasan_atomics_helper+0x49e8/0x5450 [ 16.927008] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.927036] ? kasan_atomics_helper+0x49e8/0x5450 [ 16.927070] kasan_report+0x141/0x180 [ 16.927093] ? kasan_atomics_helper+0x49e8/0x5450 [ 16.927123] __asan_report_load4_noabort+0x18/0x20 [ 16.927149] kasan_atomics_helper+0x49e8/0x5450 [ 16.927173] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.927197] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.927223] ? kasan_atomics+0x152/0x310 [ 16.927252] kasan_atomics+0x1dc/0x310 [ 16.927277] ? __pfx_kasan_atomics+0x10/0x10 [ 16.927303] ? __pfx_read_tsc+0x10/0x10 [ 16.927326] ? ktime_get_ts64+0x86/0x230 [ 16.927351] kunit_try_run_case+0x1a5/0x480 [ 16.927376] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.927400] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.927425] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.927450] ? __kthread_parkme+0x82/0x180 [ 16.927472] ? preempt_count_sub+0x50/0x80 [ 16.927497] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.927522] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.927547] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.927572] kthread+0x337/0x6f0 [ 16.927593] ? trace_preempt_on+0x20/0xc0 [ 16.927618] ? __pfx_kthread+0x10/0x10 [ 16.927640] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.927663] ? calculate_sigpending+0x7b/0xa0 [ 16.927687] ? __pfx_kthread+0x10/0x10 [ 16.927711] ret_from_fork+0x116/0x1d0 [ 16.927741] ? __pfx_kthread+0x10/0x10 [ 16.927765] ret_from_fork_asm+0x1a/0x30 [ 16.927799] </TASK> [ 16.927812] [ 16.941395] Allocated by task 282: [ 16.941713] kasan_save_stack+0x45/0x70 [ 16.942029] kasan_save_track+0x18/0x40 [ 16.942384] kasan_save_alloc_info+0x3b/0x50 [ 16.942549] __kasan_kmalloc+0xb7/0xc0 [ 16.942693] __kmalloc_cache_noprof+0x189/0x420 [ 16.943190] kasan_atomics+0x95/0x310 [ 16.943572] kunit_try_run_case+0x1a5/0x480 [ 16.944029] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.944556] kthread+0x337/0x6f0 [ 16.944935] ret_from_fork+0x116/0x1d0 [ 16.945318] ret_from_fork_asm+0x1a/0x30 [ 16.945470] [ 16.945557] The buggy address belongs to the object at ffff8881031d0c00 [ 16.945557] which belongs to the cache kmalloc-64 of size 64 [ 16.946150] The buggy address is located 0 bytes to the right of [ 16.946150] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 16.946763] [ 16.946858] The buggy address belongs to the physical page: [ 16.947400] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 16.947658] flags: 0x200000000000000(node=0|zone=2) [ 16.947867] page_type: f5(slab) [ 16.948238] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.948781] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.949024] page dumped because: kasan: bad access detected [ 16.949215] [ 16.949290] Memory state around the buggy address: [ 16.949454] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.949687] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.950337] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.951024] ^ [ 16.951465] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.952199] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.952850] ================================================================== [ 17.068375] ================================================================== [ 17.068733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 17.069091] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 17.069432] [ 17.069557] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.069602] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.069628] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.069650] Call Trace: [ 17.069666] <TASK> [ 17.069681] dump_stack_lvl+0x73/0xb0 [ 17.069710] print_report+0xd1/0x650 [ 17.069734] ? __virt_addr_valid+0x1db/0x2d0 [ 17.069767] ? kasan_atomics_helper+0x1467/0x5450 [ 17.069790] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.069817] ? kasan_atomics_helper+0x1467/0x5450 [ 17.069852] kasan_report+0x141/0x180 [ 17.069876] ? kasan_atomics_helper+0x1467/0x5450 [ 17.069903] kasan_check_range+0x10c/0x1c0 [ 17.069927] __kasan_check_write+0x18/0x20 [ 17.069948] kasan_atomics_helper+0x1467/0x5450 [ 17.069971] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.069994] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.070019] ? kasan_atomics+0x152/0x310 [ 17.070056] kasan_atomics+0x1dc/0x310 [ 17.070080] ? __pfx_kasan_atomics+0x10/0x10 [ 17.070114] ? __pfx_read_tsc+0x10/0x10 [ 17.070136] ? ktime_get_ts64+0x86/0x230 [ 17.070162] kunit_try_run_case+0x1a5/0x480 [ 17.070197] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.070220] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.070243] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.070268] ? __kthread_parkme+0x82/0x180 [ 17.070288] ? preempt_count_sub+0x50/0x80 [ 17.070313] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.070338] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.070361] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.070385] kthread+0x337/0x6f0 [ 17.070405] ? trace_preempt_on+0x20/0xc0 [ 17.070430] ? __pfx_kthread+0x10/0x10 [ 17.070451] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.070473] ? calculate_sigpending+0x7b/0xa0 [ 17.070507] ? __pfx_kthread+0x10/0x10 [ 17.070530] ret_from_fork+0x116/0x1d0 [ 17.070549] ? __pfx_kthread+0x10/0x10 [ 17.070581] ret_from_fork_asm+0x1a/0x30 [ 17.070613] </TASK> [ 17.070625] [ 17.078872] Allocated by task 282: [ 17.079121] kasan_save_stack+0x45/0x70 [ 17.079347] kasan_save_track+0x18/0x40 [ 17.079553] kasan_save_alloc_info+0x3b/0x50 [ 17.079828] __kasan_kmalloc+0xb7/0xc0 [ 17.080028] __kmalloc_cache_noprof+0x189/0x420 [ 17.080257] kasan_atomics+0x95/0x310 [ 17.080406] kunit_try_run_case+0x1a5/0x480 [ 17.080593] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.081034] kthread+0x337/0x6f0 [ 17.081194] ret_from_fork+0x116/0x1d0 [ 17.081416] ret_from_fork_asm+0x1a/0x30 [ 17.081630] [ 17.081740] The buggy address belongs to the object at ffff8881031d0c00 [ 17.081740] which belongs to the cache kmalloc-64 of size 64 [ 17.082288] The buggy address is located 0 bytes to the right of [ 17.082288] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 17.082880] [ 17.082999] The buggy address belongs to the physical page: [ 17.083257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 17.083584] flags: 0x200000000000000(node=0|zone=2) [ 17.083761] page_type: f5(slab) [ 17.083892] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.088293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.089056] page dumped because: kasan: bad access detected [ 17.089867] [ 17.090045] Memory state around the buggy address: [ 17.090801] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.091447] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.091688] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.092861] ^ [ 17.093327] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.093694] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.094292] ================================================================== [ 17.607524] ================================================================== [ 17.607771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 17.608014] Read of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 17.610460] [ 17.610960] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.611016] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.611031] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.611074] Call Trace: [ 17.611093] <TASK> [ 17.611113] dump_stack_lvl+0x73/0xb0 [ 17.611149] print_report+0xd1/0x650 [ 17.611172] ? __virt_addr_valid+0x1db/0x2d0 [ 17.611197] ? kasan_atomics_helper+0x4f71/0x5450 [ 17.611220] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.611247] ? kasan_atomics_helper+0x4f71/0x5450 [ 17.611270] kasan_report+0x141/0x180 [ 17.611294] ? kasan_atomics_helper+0x4f71/0x5450 [ 17.611322] __asan_report_load8_noabort+0x18/0x20 [ 17.611347] kasan_atomics_helper+0x4f71/0x5450 [ 17.611371] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.611394] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.611421] ? kasan_atomics+0x152/0x310 [ 17.611449] kasan_atomics+0x1dc/0x310 [ 17.611473] ? __pfx_kasan_atomics+0x10/0x10 [ 17.611499] ? __pfx_read_tsc+0x10/0x10 [ 17.611521] ? ktime_get_ts64+0x86/0x230 [ 17.611547] kunit_try_run_case+0x1a5/0x480 [ 17.611572] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.611595] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.611619] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.611643] ? __kthread_parkme+0x82/0x180 [ 17.611664] ? preempt_count_sub+0x50/0x80 [ 17.611689] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.612018] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.612070] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.612096] kthread+0x337/0x6f0 [ 17.612119] ? trace_preempt_on+0x20/0xc0 [ 17.612145] ? __pfx_kthread+0x10/0x10 [ 17.612167] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.612190] ? calculate_sigpending+0x7b/0xa0 [ 17.612216] ? __pfx_kthread+0x10/0x10 [ 17.612240] ret_from_fork+0x116/0x1d0 [ 17.612259] ? __pfx_kthread+0x10/0x10 [ 17.612281] ret_from_fork_asm+0x1a/0x30 [ 17.612314] </TASK> [ 17.612327] [ 17.624434] Allocated by task 282: [ 17.624652] kasan_save_stack+0x45/0x70 [ 17.624823] kasan_save_track+0x18/0x40 [ 17.625236] kasan_save_alloc_info+0x3b/0x50 [ 17.625464] __kasan_kmalloc+0xb7/0xc0 [ 17.625774] __kmalloc_cache_noprof+0x189/0x420 [ 17.626127] kasan_atomics+0x95/0x310 [ 17.626393] kunit_try_run_case+0x1a5/0x480 [ 17.626628] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.627022] kthread+0x337/0x6f0 [ 17.627339] ret_from_fork+0x116/0x1d0 [ 17.627851] ret_from_fork_asm+0x1a/0x30 [ 17.628106] [ 17.628373] The buggy address belongs to the object at ffff8881031d0c00 [ 17.628373] which belongs to the cache kmalloc-64 of size 64 [ 17.629309] The buggy address is located 0 bytes to the right of [ 17.629309] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 17.629697] [ 17.629903] The buggy address belongs to the physical page: [ 17.630611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 17.631471] flags: 0x200000000000000(node=0|zone=2) [ 17.632123] page_type: f5(slab) [ 17.632450] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.632831] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.633634] page dumped because: kasan: bad access detected [ 17.633946] [ 17.634197] Memory state around the buggy address: [ 17.634530] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.634945] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.635679] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.636340] ^ [ 17.636510] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.636751] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.637641] ================================================================== [ 16.652651] ================================================================== [ 16.653042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 16.653936] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 16.654673] [ 16.654919] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.654977] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.654991] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.655014] Call Trace: [ 16.655030] <TASK> [ 16.655067] dump_stack_lvl+0x73/0xb0 [ 16.655096] print_report+0xd1/0x650 [ 16.655121] ? __virt_addr_valid+0x1db/0x2d0 [ 16.655145] ? kasan_atomics_helper+0xd47/0x5450 [ 16.655167] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.655194] ? kasan_atomics_helper+0xd47/0x5450 [ 16.655216] kasan_report+0x141/0x180 [ 16.655239] ? kasan_atomics_helper+0xd47/0x5450 [ 16.655277] kasan_check_range+0x10c/0x1c0 [ 16.655302] __kasan_check_write+0x18/0x20 [ 16.655333] kasan_atomics_helper+0xd47/0x5450 [ 16.655357] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.655381] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.655406] ? kasan_atomics+0x152/0x310 [ 16.655435] kasan_atomics+0x1dc/0x310 [ 16.655468] ? __pfx_kasan_atomics+0x10/0x10 [ 16.655494] ? __pfx_read_tsc+0x10/0x10 [ 16.655516] ? ktime_get_ts64+0x86/0x230 [ 16.655554] kunit_try_run_case+0x1a5/0x480 [ 16.655580] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.655602] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.655627] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.655650] ? __kthread_parkme+0x82/0x180 [ 16.655672] ? preempt_count_sub+0x50/0x80 [ 16.655696] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.655721] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.655755] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.655779] kthread+0x337/0x6f0 [ 16.655800] ? trace_preempt_on+0x20/0xc0 [ 16.655825] ? __pfx_kthread+0x10/0x10 [ 16.655847] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.655869] ? calculate_sigpending+0x7b/0xa0 [ 16.655894] ? __pfx_kthread+0x10/0x10 [ 16.655917] ret_from_fork+0x116/0x1d0 [ 16.655936] ? __pfx_kthread+0x10/0x10 [ 16.655957] ret_from_fork_asm+0x1a/0x30 [ 16.655991] </TASK> [ 16.656004] [ 16.669512] Allocated by task 282: [ 16.669941] kasan_save_stack+0x45/0x70 [ 16.670245] kasan_save_track+0x18/0x40 [ 16.670388] kasan_save_alloc_info+0x3b/0x50 [ 16.670542] __kasan_kmalloc+0xb7/0xc0 [ 16.670680] __kmalloc_cache_noprof+0x189/0x420 [ 16.671035] kasan_atomics+0x95/0x310 [ 16.671403] kunit_try_run_case+0x1a5/0x480 [ 16.671848] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.672443] kthread+0x337/0x6f0 [ 16.672768] ret_from_fork+0x116/0x1d0 [ 16.673207] ret_from_fork_asm+0x1a/0x30 [ 16.673672] [ 16.673894] The buggy address belongs to the object at ffff8881031d0c00 [ 16.673894] which belongs to the cache kmalloc-64 of size 64 [ 16.674535] The buggy address is located 0 bytes to the right of [ 16.674535] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 16.675219] [ 16.675361] The buggy address belongs to the physical page: [ 16.675725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 16.676411] flags: 0x200000000000000(node=0|zone=2) [ 16.676590] page_type: f5(slab) [ 16.676720] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.677479] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.678278] page dumped because: kasan: bad access detected [ 16.678832] [ 16.678961] Memory state around the buggy address: [ 16.679146] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.679382] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.679617] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.680108] ^ [ 16.680673] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.681609] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.682303] ================================================================== [ 16.421253] ================================================================== [ 16.422218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 16.422927] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 16.423489] [ 16.423706] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.423753] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.423767] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.423790] Call Trace: [ 16.423807] <TASK> [ 16.423825] dump_stack_lvl+0x73/0xb0 [ 16.423854] print_report+0xd1/0x650 [ 16.423879] ? __virt_addr_valid+0x1db/0x2d0 [ 16.423904] ? kasan_atomics_helper+0x860/0x5450 [ 16.423926] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.423954] ? kasan_atomics_helper+0x860/0x5450 [ 16.423978] kasan_report+0x141/0x180 [ 16.424001] ? kasan_atomics_helper+0x860/0x5450 [ 16.424030] kasan_check_range+0x10c/0x1c0 [ 16.424068] __kasan_check_write+0x18/0x20 [ 16.424090] kasan_atomics_helper+0x860/0x5450 [ 16.424113] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.424138] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.424164] ? kasan_atomics+0x152/0x310 [ 16.424193] kasan_atomics+0x1dc/0x310 [ 16.424218] ? __pfx_kasan_atomics+0x10/0x10 [ 16.424245] ? __pfx_read_tsc+0x10/0x10 [ 16.424268] ? ktime_get_ts64+0x86/0x230 [ 16.424295] kunit_try_run_case+0x1a5/0x480 [ 16.424321] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.424345] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.424370] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.424395] ? __kthread_parkme+0x82/0x180 [ 16.424416] ? preempt_count_sub+0x50/0x80 [ 16.424442] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.424467] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.424492] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.424517] kthread+0x337/0x6f0 [ 16.424538] ? trace_preempt_on+0x20/0xc0 [ 16.424563] ? __pfx_kthread+0x10/0x10 [ 16.424586] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.424609] ? calculate_sigpending+0x7b/0xa0 [ 16.424634] ? __pfx_kthread+0x10/0x10 [ 16.424658] ret_from_fork+0x116/0x1d0 [ 16.424678] ? __pfx_kthread+0x10/0x10 [ 16.424701] ret_from_fork_asm+0x1a/0x30 [ 16.424770] </TASK> [ 16.424785] [ 16.433216] Allocated by task 282: [ 16.433455] kasan_save_stack+0x45/0x70 [ 16.433709] kasan_save_track+0x18/0x40 [ 16.433930] kasan_save_alloc_info+0x3b/0x50 [ 16.434211] __kasan_kmalloc+0xb7/0xc0 [ 16.434420] __kmalloc_cache_noprof+0x189/0x420 [ 16.434660] kasan_atomics+0x95/0x310 [ 16.434876] kunit_try_run_case+0x1a5/0x480 [ 16.435133] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.435436] kthread+0x337/0x6f0 [ 16.435862] ret_from_fork+0x116/0x1d0 [ 16.436114] ret_from_fork_asm+0x1a/0x30 [ 16.436330] [ 16.436434] The buggy address belongs to the object at ffff8881031d0c00 [ 16.436434] which belongs to the cache kmalloc-64 of size 64 [ 16.437104] The buggy address is located 0 bytes to the right of [ 16.437104] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 16.437499] [ 16.437613] The buggy address belongs to the physical page: [ 16.438150] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 16.438586] flags: 0x200000000000000(node=0|zone=2) [ 16.438860] page_type: f5(slab) [ 16.439045] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.439429] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.439841] page dumped because: kasan: bad access detected [ 16.440027] [ 16.440116] Memory state around the buggy address: [ 16.440344] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.440760] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.441145] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.441506] ^ [ 16.441778] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.442140] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.442444] ================================================================== [ 16.748906] ================================================================== [ 16.749206] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 16.749580] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 16.749948] [ 16.750100] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.750143] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.750156] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.750179] Call Trace: [ 16.750193] <TASK> [ 16.750208] dump_stack_lvl+0x73/0xb0 [ 16.750248] print_report+0xd1/0x650 [ 16.750272] ? __virt_addr_valid+0x1db/0x2d0 [ 16.750295] ? kasan_atomics_helper+0xfa9/0x5450 [ 16.750329] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.750357] ? kasan_atomics_helper+0xfa9/0x5450 [ 16.750379] kasan_report+0x141/0x180 [ 16.750412] ? kasan_atomics_helper+0xfa9/0x5450 [ 16.750440] kasan_check_range+0x10c/0x1c0 [ 16.750465] __kasan_check_write+0x18/0x20 [ 16.750496] kasan_atomics_helper+0xfa9/0x5450 [ 16.750520] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.750545] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.750581] ? kasan_atomics+0x152/0x310 [ 16.750609] kasan_atomics+0x1dc/0x310 [ 16.750645] ? __pfx_kasan_atomics+0x10/0x10 [ 16.750671] ? __pfx_read_tsc+0x10/0x10 [ 16.750693] ? ktime_get_ts64+0x86/0x230 [ 16.750739] kunit_try_run_case+0x1a5/0x480 [ 16.750774] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.750797] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.750832] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.750857] ? __kthread_parkme+0x82/0x180 [ 16.750878] ? preempt_count_sub+0x50/0x80 [ 16.750903] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.750938] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.750962] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.750996] kthread+0x337/0x6f0 [ 16.751017] ? trace_preempt_on+0x20/0xc0 [ 16.751041] ? __pfx_kthread+0x10/0x10 [ 16.751087] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.751109] ? calculate_sigpending+0x7b/0xa0 [ 16.751133] ? __pfx_kthread+0x10/0x10 [ 16.751168] ret_from_fork+0x116/0x1d0 [ 16.751188] ? __pfx_kthread+0x10/0x10 [ 16.751210] ret_from_fork_asm+0x1a/0x30 [ 16.751255] </TASK> [ 16.751267] [ 16.759056] Allocated by task 282: [ 16.759200] kasan_save_stack+0x45/0x70 [ 16.759348] kasan_save_track+0x18/0x40 [ 16.759553] kasan_save_alloc_info+0x3b/0x50 [ 16.759808] __kasan_kmalloc+0xb7/0xc0 [ 16.760003] __kmalloc_cache_noprof+0x189/0x420 [ 16.760245] kasan_atomics+0x95/0x310 [ 16.760440] kunit_try_run_case+0x1a5/0x480 [ 16.760654] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.760927] kthread+0x337/0x6f0 [ 16.761072] ret_from_fork+0x116/0x1d0 [ 16.761213] ret_from_fork_asm+0x1a/0x30 [ 16.761361] [ 16.761438] The buggy address belongs to the object at ffff8881031d0c00 [ 16.761438] which belongs to the cache kmalloc-64 of size 64 [ 16.761966] The buggy address is located 0 bytes to the right of [ 16.761966] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 16.762596] [ 16.762735] The buggy address belongs to the physical page: [ 16.763003] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 16.763397] flags: 0x200000000000000(node=0|zone=2) [ 16.763667] page_type: f5(slab) [ 16.763872] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.764230] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.764529] page dumped because: kasan: bad access detected [ 16.764830] [ 16.764911] Memory state around the buggy address: [ 16.765154] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.765461] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.765816] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.766108] ^ [ 16.766367] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.766667] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.767009] ================================================================== [ 16.621826] ================================================================== [ 16.622089] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 16.622333] Read of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 16.622567] [ 16.622656] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.622700] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.622717] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.622753] Call Trace: [ 16.622768] <TASK> [ 16.622785] dump_stack_lvl+0x73/0xb0 [ 16.622812] print_report+0xd1/0x650 [ 16.622836] ? __virt_addr_valid+0x1db/0x2d0 [ 16.622873] ? kasan_atomics_helper+0x4a84/0x5450 [ 16.622895] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.622923] ? kasan_atomics_helper+0x4a84/0x5450 [ 16.622959] kasan_report+0x141/0x180 [ 16.622982] ? kasan_atomics_helper+0x4a84/0x5450 [ 16.623011] __asan_report_load4_noabort+0x18/0x20 [ 16.623037] kasan_atomics_helper+0x4a84/0x5450 [ 16.623069] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.623092] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.623120] ? kasan_atomics+0x152/0x310 [ 16.623148] kasan_atomics+0x1dc/0x310 [ 16.623172] ? __pfx_kasan_atomics+0x10/0x10 [ 16.623208] ? __pfx_read_tsc+0x10/0x10 [ 16.623231] ? ktime_get_ts64+0x86/0x230 [ 16.623256] kunit_try_run_case+0x1a5/0x480 [ 16.623296] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.623319] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.623343] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.623367] ? __kthread_parkme+0x82/0x180 [ 16.623389] ? preempt_count_sub+0x50/0x80 [ 16.623415] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.623439] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.623464] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.623489] kthread+0x337/0x6f0 [ 16.623509] ? trace_preempt_on+0x20/0xc0 [ 16.623534] ? __pfx_kthread+0x10/0x10 [ 16.623557] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.623579] ? calculate_sigpending+0x7b/0xa0 [ 16.623615] ? __pfx_kthread+0x10/0x10 [ 16.623638] ret_from_fork+0x116/0x1d0 [ 16.623658] ? __pfx_kthread+0x10/0x10 [ 16.623692] ret_from_fork_asm+0x1a/0x30 [ 16.623725] </TASK> [ 16.623737] [ 16.638160] Allocated by task 282: [ 16.638526] kasan_save_stack+0x45/0x70 [ 16.638940] kasan_save_track+0x18/0x40 [ 16.639350] kasan_save_alloc_info+0x3b/0x50 [ 16.639801] __kasan_kmalloc+0xb7/0xc0 [ 16.640223] __kmalloc_cache_noprof+0x189/0x420 [ 16.640674] kasan_atomics+0x95/0x310 [ 16.641133] kunit_try_run_case+0x1a5/0x480 [ 16.641569] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.641996] kthread+0x337/0x6f0 [ 16.642252] ret_from_fork+0x116/0x1d0 [ 16.642562] ret_from_fork_asm+0x1a/0x30 [ 16.642717] [ 16.642924] The buggy address belongs to the object at ffff8881031d0c00 [ 16.642924] which belongs to the cache kmalloc-64 of size 64 [ 16.644014] The buggy address is located 0 bytes to the right of [ 16.644014] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 16.644426] [ 16.644507] The buggy address belongs to the physical page: [ 16.644697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 16.645484] flags: 0x200000000000000(node=0|zone=2) [ 16.646026] page_type: f5(slab) [ 16.646367] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.647159] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.647861] page dumped because: kasan: bad access detected [ 16.648393] [ 16.648579] Memory state around the buggy address: [ 16.649209] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.649510] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.649772] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.650443] ^ [ 16.650986] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.651658] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.652103] ================================================================== [ 16.953815] ================================================================== [ 16.954485] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 16.955418] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 16.956197] [ 16.956300] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.956345] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.956359] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.956395] Call Trace: [ 16.956410] <TASK> [ 16.956427] dump_stack_lvl+0x73/0xb0 [ 16.956466] print_report+0xd1/0x650 [ 16.956491] ? __virt_addr_valid+0x1db/0x2d0 [ 16.956515] ? kasan_atomics_helper+0x12e6/0x5450 [ 16.956537] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.956574] ? kasan_atomics_helper+0x12e6/0x5450 [ 16.956597] kasan_report+0x141/0x180 [ 16.956621] ? kasan_atomics_helper+0x12e6/0x5450 [ 16.956661] kasan_check_range+0x10c/0x1c0 [ 16.956686] __kasan_check_write+0x18/0x20 [ 16.956706] kasan_atomics_helper+0x12e6/0x5450 [ 16.956741] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.956764] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.956790] ? kasan_atomics+0x152/0x310 [ 16.956818] kasan_atomics+0x1dc/0x310 [ 16.956842] ? __pfx_kasan_atomics+0x10/0x10 [ 16.956868] ? __pfx_read_tsc+0x10/0x10 [ 16.956889] ? ktime_get_ts64+0x86/0x230 [ 16.956914] kunit_try_run_case+0x1a5/0x480 [ 16.956939] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.956961] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.956985] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.957010] ? __kthread_parkme+0x82/0x180 [ 16.957030] ? preempt_count_sub+0x50/0x80 [ 16.957067] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.957092] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.957117] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.957141] kthread+0x337/0x6f0 [ 16.957161] ? trace_preempt_on+0x20/0xc0 [ 16.957185] ? __pfx_kthread+0x10/0x10 [ 16.957207] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.957228] ? calculate_sigpending+0x7b/0xa0 [ 16.957253] ? __pfx_kthread+0x10/0x10 [ 16.957275] ret_from_fork+0x116/0x1d0 [ 16.957294] ? __pfx_kthread+0x10/0x10 [ 16.957315] ret_from_fork_asm+0x1a/0x30 [ 16.957349] </TASK> [ 16.957361] [ 16.970410] Allocated by task 282: [ 16.970551] kasan_save_stack+0x45/0x70 [ 16.970699] kasan_save_track+0x18/0x40 [ 16.971073] kasan_save_alloc_info+0x3b/0x50 [ 16.971463] __kasan_kmalloc+0xb7/0xc0 [ 16.971918] __kmalloc_cache_noprof+0x189/0x420 [ 16.972414] kasan_atomics+0x95/0x310 [ 16.972810] kunit_try_run_case+0x1a5/0x480 [ 16.973278] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.973836] kthread+0x337/0x6f0 [ 16.974155] ret_from_fork+0x116/0x1d0 [ 16.974534] ret_from_fork_asm+0x1a/0x30 [ 16.974760] [ 16.974950] The buggy address belongs to the object at ffff8881031d0c00 [ 16.974950] which belongs to the cache kmalloc-64 of size 64 [ 16.975545] The buggy address is located 0 bytes to the right of [ 16.975545] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 16.976097] [ 16.976283] The buggy address belongs to the physical page: [ 16.976621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 16.977013] flags: 0x200000000000000(node=0|zone=2) [ 16.977399] page_type: f5(slab) [ 16.977533] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.978174] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.979132] page dumped because: kasan: bad access detected [ 16.979599] [ 16.979676] Memory state around the buggy address: [ 16.980114] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.980656] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.980950] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.981471] ^ [ 16.981644] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.982008] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.982507] ================================================================== [ 16.710398] ================================================================== [ 16.710751] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 16.711129] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 16.711504] [ 16.711627] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.711671] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.711685] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.711717] Call Trace: [ 16.711733] <TASK> [ 16.711749] dump_stack_lvl+0x73/0xb0 [ 16.711784] print_report+0xd1/0x650 [ 16.711807] ? __virt_addr_valid+0x1db/0x2d0 [ 16.711830] ? kasan_atomics_helper+0xe78/0x5450 [ 16.711851] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.711878] ? kasan_atomics_helper+0xe78/0x5450 [ 16.711901] kasan_report+0x141/0x180 [ 16.711924] ? kasan_atomics_helper+0xe78/0x5450 [ 16.711950] kasan_check_range+0x10c/0x1c0 [ 16.711975] __kasan_check_write+0x18/0x20 [ 16.711994] kasan_atomics_helper+0xe78/0x5450 [ 16.712018] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.712041] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.712076] ? kasan_atomics+0x152/0x310 [ 16.712104] kasan_atomics+0x1dc/0x310 [ 16.712128] ? __pfx_kasan_atomics+0x10/0x10 [ 16.712153] ? __pfx_read_tsc+0x10/0x10 [ 16.712174] ? ktime_get_ts64+0x86/0x230 [ 16.712200] kunit_try_run_case+0x1a5/0x480 [ 16.712224] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.712247] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.712272] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.712295] ? __kthread_parkme+0x82/0x180 [ 16.712316] ? preempt_count_sub+0x50/0x80 [ 16.712341] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.712365] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.712389] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.712412] kthread+0x337/0x6f0 [ 16.712433] ? trace_preempt_on+0x20/0xc0 [ 16.712457] ? __pfx_kthread+0x10/0x10 [ 16.712479] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.712500] ? calculate_sigpending+0x7b/0xa0 [ 16.712526] ? __pfx_kthread+0x10/0x10 [ 16.712548] ret_from_fork+0x116/0x1d0 [ 16.712568] ? __pfx_kthread+0x10/0x10 [ 16.712590] ret_from_fork_asm+0x1a/0x30 [ 16.712623] </TASK> [ 16.712636] [ 16.720295] Allocated by task 282: [ 16.720542] kasan_save_stack+0x45/0x70 [ 16.720828] kasan_save_track+0x18/0x40 [ 16.721070] kasan_save_alloc_info+0x3b/0x50 [ 16.721273] __kasan_kmalloc+0xb7/0xc0 [ 16.721415] __kmalloc_cache_noprof+0x189/0x420 [ 16.721648] kasan_atomics+0x95/0x310 [ 16.721891] kunit_try_run_case+0x1a5/0x480 [ 16.722120] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.722384] kthread+0x337/0x6f0 [ 16.722558] ret_from_fork+0x116/0x1d0 [ 16.722780] ret_from_fork_asm+0x1a/0x30 [ 16.722989] [ 16.723091] The buggy address belongs to the object at ffff8881031d0c00 [ 16.723091] which belongs to the cache kmalloc-64 of size 64 [ 16.723594] The buggy address is located 0 bytes to the right of [ 16.723594] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 16.724193] [ 16.724313] The buggy address belongs to the physical page: [ 16.724575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 16.724942] flags: 0x200000000000000(node=0|zone=2) [ 16.725128] page_type: f5(slab) [ 16.725260] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.725505] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.725907] page dumped because: kasan: bad access detected [ 16.726185] [ 16.726285] Memory state around the buggy address: [ 16.726527] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.726906] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.727275] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.727576] ^ [ 16.727796] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.728032] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.728274] ================================================================== [ 17.209958] ================================================================== [ 17.210617] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 17.211180] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 17.211420] [ 17.211511] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.211557] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.211570] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.211593] Call Trace: [ 17.211608] <TASK> [ 17.211625] dump_stack_lvl+0x73/0xb0 [ 17.211652] print_report+0xd1/0x650 [ 17.211676] ? __virt_addr_valid+0x1db/0x2d0 [ 17.211700] ? kasan_atomics_helper+0x16e7/0x5450 [ 17.211722] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.211749] ? kasan_atomics_helper+0x16e7/0x5450 [ 17.211771] kasan_report+0x141/0x180 [ 17.211795] ? kasan_atomics_helper+0x16e7/0x5450 [ 17.211822] kasan_check_range+0x10c/0x1c0 [ 17.211846] __kasan_check_write+0x18/0x20 [ 17.211866] kasan_atomics_helper+0x16e7/0x5450 [ 17.211889] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.211912] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.211937] ? kasan_atomics+0x152/0x310 [ 17.211965] kasan_atomics+0x1dc/0x310 [ 17.211987] ? __pfx_kasan_atomics+0x10/0x10 [ 17.212013] ? __pfx_read_tsc+0x10/0x10 [ 17.212034] ? ktime_get_ts64+0x86/0x230 [ 17.212072] kunit_try_run_case+0x1a5/0x480 [ 17.212096] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.212118] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.212141] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.212165] ? __kthread_parkme+0x82/0x180 [ 17.212185] ? preempt_count_sub+0x50/0x80 [ 17.212210] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.212235] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.212259] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.212282] kthread+0x337/0x6f0 [ 17.212304] ? trace_preempt_on+0x20/0xc0 [ 17.212327] ? __pfx_kthread+0x10/0x10 [ 17.212348] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.212370] ? calculate_sigpending+0x7b/0xa0 [ 17.212394] ? __pfx_kthread+0x10/0x10 [ 17.212416] ret_from_fork+0x116/0x1d0 [ 17.212435] ? __pfx_kthread+0x10/0x10 [ 17.212457] ret_from_fork_asm+0x1a/0x30 [ 17.212489] </TASK> [ 17.212501] [ 17.222574] Allocated by task 282: [ 17.222784] kasan_save_stack+0x45/0x70 [ 17.222984] kasan_save_track+0x18/0x40 [ 17.223181] kasan_save_alloc_info+0x3b/0x50 [ 17.223391] __kasan_kmalloc+0xb7/0xc0 [ 17.223576] __kmalloc_cache_noprof+0x189/0x420 [ 17.224208] kasan_atomics+0x95/0x310 [ 17.224459] kunit_try_run_case+0x1a5/0x480 [ 17.224779] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.225223] kthread+0x337/0x6f0 [ 17.225499] ret_from_fork+0x116/0x1d0 [ 17.225899] ret_from_fork_asm+0x1a/0x30 [ 17.226227] [ 17.226473] The buggy address belongs to the object at ffff8881031d0c00 [ 17.226473] which belongs to the cache kmalloc-64 of size 64 [ 17.227287] The buggy address is located 0 bytes to the right of [ 17.227287] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 17.228174] [ 17.228281] The buggy address belongs to the physical page: [ 17.228532] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 17.229353] flags: 0x200000000000000(node=0|zone=2) [ 17.229672] page_type: f5(slab) [ 17.229988] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.230584] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.230847] page dumped because: kasan: bad access detected [ 17.231036] [ 17.231126] Memory state around the buggy address: [ 17.231346] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.231700] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.231987] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.233023] ^ [ 17.233669] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.234472] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.235279] ================================================================== [ 17.094880] ================================================================== [ 17.095798] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 17.096390] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 17.096687] [ 17.097188] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.097244] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.097267] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.097291] Call Trace: [ 17.097309] <TASK> [ 17.097329] dump_stack_lvl+0x73/0xb0 [ 17.097363] print_report+0xd1/0x650 [ 17.097387] ? __virt_addr_valid+0x1db/0x2d0 [ 17.097410] ? kasan_atomics_helper+0x50d4/0x5450 [ 17.097433] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.097459] ? kasan_atomics_helper+0x50d4/0x5450 [ 17.097482] kasan_report+0x141/0x180 [ 17.097506] ? kasan_atomics_helper+0x50d4/0x5450 [ 17.097539] __asan_report_store8_noabort+0x1b/0x30 [ 17.097565] kasan_atomics_helper+0x50d4/0x5450 [ 17.097589] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.097612] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.097638] ? kasan_atomics+0x152/0x310 [ 17.097667] kasan_atomics+0x1dc/0x310 [ 17.097691] ? __pfx_kasan_atomics+0x10/0x10 [ 17.097717] ? __pfx_read_tsc+0x10/0x10 [ 17.097945] ? ktime_get_ts64+0x86/0x230 [ 17.097977] kunit_try_run_case+0x1a5/0x480 [ 17.098004] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.098027] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.098075] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.098101] ? __kthread_parkme+0x82/0x180 [ 17.098122] ? preempt_count_sub+0x50/0x80 [ 17.098147] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.098173] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.098197] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.098222] kthread+0x337/0x6f0 [ 17.098243] ? trace_preempt_on+0x20/0xc0 [ 17.098269] ? __pfx_kthread+0x10/0x10 [ 17.098292] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.098314] ? calculate_sigpending+0x7b/0xa0 [ 17.098339] ? __pfx_kthread+0x10/0x10 [ 17.098363] ret_from_fork+0x116/0x1d0 [ 17.098383] ? __pfx_kthread+0x10/0x10 [ 17.098405] ret_from_fork_asm+0x1a/0x30 [ 17.098439] </TASK> [ 17.098452] [ 17.109854] Allocated by task 282: [ 17.110283] kasan_save_stack+0x45/0x70 [ 17.110550] kasan_save_track+0x18/0x40 [ 17.110851] kasan_save_alloc_info+0x3b/0x50 [ 17.111232] __kasan_kmalloc+0xb7/0xc0 [ 17.111433] __kmalloc_cache_noprof+0x189/0x420 [ 17.111642] kasan_atomics+0x95/0x310 [ 17.112167] kunit_try_run_case+0x1a5/0x480 [ 17.112442] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.112904] kthread+0x337/0x6f0 [ 17.113190] ret_from_fork+0x116/0x1d0 [ 17.113351] ret_from_fork_asm+0x1a/0x30 [ 17.113496] [ 17.113583] The buggy address belongs to the object at ffff8881031d0c00 [ 17.113583] which belongs to the cache kmalloc-64 of size 64 [ 17.113967] The buggy address is located 0 bytes to the right of [ 17.113967] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 17.114990] [ 17.115093] The buggy address belongs to the physical page: [ 17.115282] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 17.115538] flags: 0x200000000000000(node=0|zone=2) [ 17.115742] page_type: f5(slab) [ 17.116417] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.117149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.117840] page dumped because: kasan: bad access detected [ 17.118347] [ 17.118510] Memory state around the buggy address: [ 17.119018] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.119673] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.120324] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.120545] ^ [ 17.120706] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.121358] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.122038] ================================================================== [ 16.893999] ================================================================== [ 16.894739] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 16.895528] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 16.896839] [ 16.897031] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.897089] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.897103] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.897126] Call Trace: [ 16.897143] <TASK> [ 16.897159] dump_stack_lvl+0x73/0xb0 [ 16.897188] print_report+0xd1/0x650 [ 16.897213] ? __virt_addr_valid+0x1db/0x2d0 [ 16.897237] ? kasan_atomics_helper+0x1217/0x5450 [ 16.897259] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.897287] ? kasan_atomics_helper+0x1217/0x5450 [ 16.897311] kasan_report+0x141/0x180 [ 16.897336] ? kasan_atomics_helper+0x1217/0x5450 [ 16.897364] kasan_check_range+0x10c/0x1c0 [ 16.897391] __kasan_check_write+0x18/0x20 [ 16.897411] kasan_atomics_helper+0x1217/0x5450 [ 16.897437] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.897460] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.897487] ? kasan_atomics+0x152/0x310 [ 16.897517] kasan_atomics+0x1dc/0x310 [ 16.897546] ? __pfx_kasan_atomics+0x10/0x10 [ 16.897572] ? __pfx_read_tsc+0x10/0x10 [ 16.897595] ? ktime_get_ts64+0x86/0x230 [ 16.897622] kunit_try_run_case+0x1a5/0x480 [ 16.897648] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.897672] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.897697] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.897722] ? __kthread_parkme+0x82/0x180 [ 16.897745] ? preempt_count_sub+0x50/0x80 [ 16.897771] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.897797] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.897822] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.897847] kthread+0x337/0x6f0 [ 16.897868] ? trace_preempt_on+0x20/0xc0 [ 16.897894] ? __pfx_kthread+0x10/0x10 [ 16.897916] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.897939] ? calculate_sigpending+0x7b/0xa0 [ 16.897963] ? __pfx_kthread+0x10/0x10 [ 16.897988] ret_from_fork+0x116/0x1d0 [ 16.898007] ? __pfx_kthread+0x10/0x10 [ 16.898030] ret_from_fork_asm+0x1a/0x30 [ 16.898073] </TASK> [ 16.898086] [ 16.910440] Allocated by task 282: [ 16.910811] kasan_save_stack+0x45/0x70 [ 16.911206] kasan_save_track+0x18/0x40 [ 16.911591] kasan_save_alloc_info+0x3b/0x50 [ 16.912022] __kasan_kmalloc+0xb7/0xc0 [ 16.912405] __kmalloc_cache_noprof+0x189/0x420 [ 16.912874] kasan_atomics+0x95/0x310 [ 16.913378] kunit_try_run_case+0x1a5/0x480 [ 16.913806] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.914324] kthread+0x337/0x6f0 [ 16.914609] ret_from_fork+0x116/0x1d0 [ 16.914772] ret_from_fork_asm+0x1a/0x30 [ 16.915138] [ 16.915324] The buggy address belongs to the object at ffff8881031d0c00 [ 16.915324] which belongs to the cache kmalloc-64 of size 64 [ 16.916008] The buggy address is located 0 bytes to the right of [ 16.916008] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 16.917086] [ 16.917165] The buggy address belongs to the physical page: [ 16.917348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 16.917605] flags: 0x200000000000000(node=0|zone=2) [ 16.917872] page_type: f5(slab) [ 16.918215] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.918996] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.919677] page dumped because: kasan: bad access detected [ 16.920269] [ 16.920430] Memory state around the buggy address: [ 16.920939] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.921583] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.922124] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.922347] ^ [ 16.922506] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.922738] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.923380] ================================================================== [ 16.232483] ================================================================== [ 16.232749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 16.233151] Read of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 16.233514] [ 16.233638] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.233686] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.233700] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.233724] Call Trace: [ 16.233740] <TASK> [ 16.233757] dump_stack_lvl+0x73/0xb0 [ 16.233786] print_report+0xd1/0x650 [ 16.233810] ? __virt_addr_valid+0x1db/0x2d0 [ 16.233835] ? kasan_atomics_helper+0x4b54/0x5450 [ 16.233859] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.233887] ? kasan_atomics_helper+0x4b54/0x5450 [ 16.233912] kasan_report+0x141/0x180 [ 16.233937] ? kasan_atomics_helper+0x4b54/0x5450 [ 16.233995] __asan_report_load4_noabort+0x18/0x20 [ 16.234024] kasan_atomics_helper+0x4b54/0x5450 [ 16.234061] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.234086] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.234133] ? kasan_atomics+0x152/0x310 [ 16.234164] kasan_atomics+0x1dc/0x310 [ 16.234207] ? __pfx_kasan_atomics+0x10/0x10 [ 16.234249] ? __pfx_read_tsc+0x10/0x10 [ 16.234287] ? ktime_get_ts64+0x86/0x230 [ 16.234329] kunit_try_run_case+0x1a5/0x480 [ 16.234371] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.234425] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.234451] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.234491] ? __kthread_parkme+0x82/0x180 [ 16.234513] ? preempt_count_sub+0x50/0x80 [ 16.234540] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.234566] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.234591] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.234617] kthread+0x337/0x6f0 [ 16.234639] ? trace_preempt_on+0x20/0xc0 [ 16.234664] ? __pfx_kthread+0x10/0x10 [ 16.234687] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.234710] ? calculate_sigpending+0x7b/0xa0 [ 16.234736] ? __pfx_kthread+0x10/0x10 [ 16.234760] ret_from_fork+0x116/0x1d0 [ 16.234780] ? __pfx_kthread+0x10/0x10 [ 16.234803] ret_from_fork_asm+0x1a/0x30 [ 16.234838] </TASK> [ 16.234851] [ 16.243213] Allocated by task 282: [ 16.243509] kasan_save_stack+0x45/0x70 [ 16.243720] kasan_save_track+0x18/0x40 [ 16.243939] kasan_save_alloc_info+0x3b/0x50 [ 16.244282] __kasan_kmalloc+0xb7/0xc0 [ 16.244488] __kmalloc_cache_noprof+0x189/0x420 [ 16.244726] kasan_atomics+0x95/0x310 [ 16.244932] kunit_try_run_case+0x1a5/0x480 [ 16.245169] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.245436] kthread+0x337/0x6f0 [ 16.245593] ret_from_fork+0x116/0x1d0 [ 16.245739] ret_from_fork_asm+0x1a/0x30 [ 16.245923] [ 16.246094] The buggy address belongs to the object at ffff8881031d0c00 [ 16.246094] which belongs to the cache kmalloc-64 of size 64 [ 16.246615] The buggy address is located 0 bytes to the right of [ 16.246615] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 16.247214] [ 16.247321] The buggy address belongs to the physical page: [ 16.247585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 16.247961] flags: 0x200000000000000(node=0|zone=2) [ 16.248209] page_type: f5(slab) [ 16.248420] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.248832] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.249193] page dumped because: kasan: bad access detected [ 16.249465] [ 16.249567] Memory state around the buggy address: [ 16.249798] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.250131] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.250507] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.250723] ^ [ 16.250964] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.251304] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.251623] ================================================================== [ 16.826929] ================================================================== [ 16.829036] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 16.829426] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 16.830598] [ 16.830854] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.830925] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.830939] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.830963] Call Trace: [ 16.830979] <TASK> [ 16.831006] dump_stack_lvl+0x73/0xb0 [ 16.831038] print_report+0xd1/0x650 [ 16.831083] ? __virt_addr_valid+0x1db/0x2d0 [ 16.831108] ? kasan_atomics_helper+0x1148/0x5450 [ 16.831131] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.831159] ? kasan_atomics_helper+0x1148/0x5450 [ 16.831183] kasan_report+0x141/0x180 [ 16.831207] ? kasan_atomics_helper+0x1148/0x5450 [ 16.831237] kasan_check_range+0x10c/0x1c0 [ 16.831263] __kasan_check_write+0x18/0x20 [ 16.831285] kasan_atomics_helper+0x1148/0x5450 [ 16.831310] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.831333] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.831360] ? kasan_atomics+0x152/0x310 [ 16.831389] kasan_atomics+0x1dc/0x310 [ 16.831414] ? __pfx_kasan_atomics+0x10/0x10 [ 16.831440] ? __pfx_read_tsc+0x10/0x10 [ 16.831463] ? ktime_get_ts64+0x86/0x230 [ 16.831490] kunit_try_run_case+0x1a5/0x480 [ 16.831516] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.831540] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.831565] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.831589] ? __kthread_parkme+0x82/0x180 [ 16.831611] ? preempt_count_sub+0x50/0x80 [ 16.831636] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.831662] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.831687] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.833285] kthread+0x337/0x6f0 [ 16.833326] ? trace_preempt_on+0x20/0xc0 [ 16.833354] ? __pfx_kthread+0x10/0x10 [ 16.833380] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.833403] ? calculate_sigpending+0x7b/0xa0 [ 16.833427] ? __pfx_kthread+0x10/0x10 [ 16.833451] ret_from_fork+0x116/0x1d0 [ 16.833471] ? __pfx_kthread+0x10/0x10 [ 16.833493] ret_from_fork_asm+0x1a/0x30 [ 16.833534] </TASK> [ 16.833547] [ 16.848439] Allocated by task 282: [ 16.848800] kasan_save_stack+0x45/0x70 [ 16.849213] kasan_save_track+0x18/0x40 [ 16.849615] kasan_save_alloc_info+0x3b/0x50 [ 16.850124] __kasan_kmalloc+0xb7/0xc0 [ 16.850498] __kmalloc_cache_noprof+0x189/0x420 [ 16.850949] kasan_atomics+0x95/0x310 [ 16.851330] kunit_try_run_case+0x1a5/0x480 [ 16.851745] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.852253] kthread+0x337/0x6f0 [ 16.852588] ret_from_fork+0x116/0x1d0 [ 16.853000] ret_from_fork_asm+0x1a/0x30 [ 16.853414] [ 16.853504] The buggy address belongs to the object at ffff8881031d0c00 [ 16.853504] which belongs to the cache kmalloc-64 of size 64 [ 16.854565] The buggy address is located 0 bytes to the right of [ 16.854565] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 16.855252] [ 16.855334] The buggy address belongs to the physical page: [ 16.855517] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 16.855858] flags: 0x200000000000000(node=0|zone=2) [ 16.856338] page_type: f5(slab) [ 16.856674] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.857385] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.858159] page dumped because: kasan: bad access detected [ 16.858659] [ 16.858846] Memory state around the buggy address: [ 16.859354] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.860162] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.860624] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.861018] ^ [ 16.861481] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.862220] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.862795] ================================================================== [ 16.212882] ================================================================== [ 16.213327] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 16.213734] Read of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 16.214394] [ 16.214568] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.214635] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.214649] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.214671] Call Trace: [ 16.214687] <TASK> [ 16.214702] dump_stack_lvl+0x73/0xb0 [ 16.214731] print_report+0xd1/0x650 [ 16.214755] ? __virt_addr_valid+0x1db/0x2d0 [ 16.214778] ? kasan_atomics_helper+0x3df/0x5450 [ 16.214799] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.214827] ? kasan_atomics_helper+0x3df/0x5450 [ 16.214849] kasan_report+0x141/0x180 [ 16.214873] ? kasan_atomics_helper+0x3df/0x5450 [ 16.214900] kasan_check_range+0x10c/0x1c0 [ 16.214925] __kasan_check_read+0x15/0x20 [ 16.214966] kasan_atomics_helper+0x3df/0x5450 [ 16.214990] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.215014] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.215068] ? kasan_atomics+0x152/0x310 [ 16.215097] kasan_atomics+0x1dc/0x310 [ 16.215121] ? __pfx_kasan_atomics+0x10/0x10 [ 16.215164] ? __pfx_read_tsc+0x10/0x10 [ 16.215185] ? ktime_get_ts64+0x86/0x230 [ 16.215212] kunit_try_run_case+0x1a5/0x480 [ 16.215237] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.215259] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.215284] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.215308] ? __kthread_parkme+0x82/0x180 [ 16.215329] ? preempt_count_sub+0x50/0x80 [ 16.215354] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.215379] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.215403] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.215427] kthread+0x337/0x6f0 [ 16.215448] ? trace_preempt_on+0x20/0xc0 [ 16.215472] ? __pfx_kthread+0x10/0x10 [ 16.215494] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.215516] ? calculate_sigpending+0x7b/0xa0 [ 16.215541] ? __pfx_kthread+0x10/0x10 [ 16.215564] ret_from_fork+0x116/0x1d0 [ 16.215583] ? __pfx_kthread+0x10/0x10 [ 16.215604] ret_from_fork_asm+0x1a/0x30 [ 16.215638] </TASK> [ 16.215650] [ 16.223883] Allocated by task 282: [ 16.224061] kasan_save_stack+0x45/0x70 [ 16.224290] kasan_save_track+0x18/0x40 [ 16.224508] kasan_save_alloc_info+0x3b/0x50 [ 16.224749] __kasan_kmalloc+0xb7/0xc0 [ 16.224937] __kmalloc_cache_noprof+0x189/0x420 [ 16.225180] kasan_atomics+0x95/0x310 [ 16.225376] kunit_try_run_case+0x1a5/0x480 [ 16.225600] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.225855] kthread+0x337/0x6f0 [ 16.225985] ret_from_fork+0x116/0x1d0 [ 16.226136] ret_from_fork_asm+0x1a/0x30 [ 16.226295] [ 16.226398] The buggy address belongs to the object at ffff8881031d0c00 [ 16.226398] which belongs to the cache kmalloc-64 of size 64 [ 16.227038] The buggy address is located 0 bytes to the right of [ 16.227038] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 16.227615] [ 16.227751] The buggy address belongs to the physical page: [ 16.227960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 16.228223] flags: 0x200000000000000(node=0|zone=2) [ 16.228396] page_type: f5(slab) [ 16.228524] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.228879] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.229240] page dumped because: kasan: bad access detected [ 16.229504] [ 16.229630] Memory state around the buggy address: [ 16.230041] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.230293] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.230521] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.230770] ^ [ 16.231015] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.231425] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.231864] ================================================================== [ 16.125574] ================================================================== [ 16.126554] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 16.127943] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 16.128439] [ 16.128538] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.128584] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.128596] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.128617] Call Trace: [ 16.128629] <TASK> [ 16.128644] dump_stack_lvl+0x73/0xb0 [ 16.128676] print_report+0xd1/0x650 [ 16.128698] ? __virt_addr_valid+0x1db/0x2d0 [ 16.129267] ? kasan_atomics_helper+0x4ba2/0x5450 [ 16.129293] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.129321] ? kasan_atomics_helper+0x4ba2/0x5450 [ 16.129344] kasan_report+0x141/0x180 [ 16.129367] ? kasan_atomics_helper+0x4ba2/0x5450 [ 16.129394] __asan_report_store4_noabort+0x1b/0x30 [ 16.129419] kasan_atomics_helper+0x4ba2/0x5450 [ 16.129443] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.129466] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.129495] ? kasan_atomics+0x152/0x310 [ 16.129531] kasan_atomics+0x1dc/0x310 [ 16.129554] ? __pfx_kasan_atomics+0x10/0x10 [ 16.129579] ? __pfx_read_tsc+0x10/0x10 [ 16.129600] ? ktime_get_ts64+0x86/0x230 [ 16.129626] kunit_try_run_case+0x1a5/0x480 [ 16.129650] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.129672] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.129698] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.129720] ? __kthread_parkme+0x82/0x180 [ 16.129742] ? preempt_count_sub+0x50/0x80 [ 16.129765] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.129790] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.129813] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.129837] kthread+0x337/0x6f0 [ 16.129858] ? trace_preempt_on+0x20/0xc0 [ 16.129880] ? __pfx_kthread+0x10/0x10 [ 16.129901] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.129923] ? calculate_sigpending+0x7b/0xa0 [ 16.129947] ? __pfx_kthread+0x10/0x10 [ 16.129969] ret_from_fork+0x116/0x1d0 [ 16.129988] ? __pfx_kthread+0x10/0x10 [ 16.130010] ret_from_fork_asm+0x1a/0x30 [ 16.130043] </TASK> [ 16.130066] [ 16.147059] Allocated by task 282: [ 16.147362] kasan_save_stack+0x45/0x70 [ 16.147649] kasan_save_track+0x18/0x40 [ 16.148164] kasan_save_alloc_info+0x3b/0x50 [ 16.148617] __kasan_kmalloc+0xb7/0xc0 [ 16.148957] __kmalloc_cache_noprof+0x189/0x420 [ 16.149372] kasan_atomics+0x95/0x310 [ 16.149513] kunit_try_run_case+0x1a5/0x480 [ 16.149669] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.150235] kthread+0x337/0x6f0 [ 16.150602] ret_from_fork+0x116/0x1d0 [ 16.151014] ret_from_fork_asm+0x1a/0x30 [ 16.151458] [ 16.151643] The buggy address belongs to the object at ffff8881031d0c00 [ 16.151643] which belongs to the cache kmalloc-64 of size 64 [ 16.152594] The buggy address is located 0 bytes to the right of [ 16.152594] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 16.153699] [ 16.153809] The buggy address belongs to the physical page: [ 16.154309] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 16.154984] flags: 0x200000000000000(node=0|zone=2) [ 16.155499] page_type: f5(slab) [ 16.155668] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.156331] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.157087] page dumped because: kasan: bad access detected [ 16.157654] [ 16.157762] Memory state around the buggy address: [ 16.158121] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.158347] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.158569] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.158814] ^ [ 16.159030] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.159682] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.160366] ================================================================== [ 17.717994] ================================================================== [ 17.718264] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 17.718622] Read of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 17.719159] [ 17.719276] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.719321] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.719333] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.719356] Call Trace: [ 17.719372] <TASK> [ 17.719388] dump_stack_lvl+0x73/0xb0 [ 17.719417] print_report+0xd1/0x650 [ 17.719440] ? __virt_addr_valid+0x1db/0x2d0 [ 17.719462] ? kasan_atomics_helper+0x4fb2/0x5450 [ 17.719485] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.719512] ? kasan_atomics_helper+0x4fb2/0x5450 [ 17.719535] kasan_report+0x141/0x180 [ 17.719558] ? kasan_atomics_helper+0x4fb2/0x5450 [ 17.719585] __asan_report_load8_noabort+0x18/0x20 [ 17.719610] kasan_atomics_helper+0x4fb2/0x5450 [ 17.719633] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.719656] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.719682] ? kasan_atomics+0x152/0x310 [ 17.719710] kasan_atomics+0x1dc/0x310 [ 17.719733] ? __pfx_kasan_atomics+0x10/0x10 [ 17.719758] ? __pfx_read_tsc+0x10/0x10 [ 17.719805] ? ktime_get_ts64+0x86/0x230 [ 17.719831] kunit_try_run_case+0x1a5/0x480 [ 17.719856] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.719879] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.719916] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.719940] ? __kthread_parkme+0x82/0x180 [ 17.719961] ? preempt_count_sub+0x50/0x80 [ 17.719985] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.720010] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.720033] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.720068] kthread+0x337/0x6f0 [ 17.720089] ? trace_preempt_on+0x20/0xc0 [ 17.720113] ? __pfx_kthread+0x10/0x10 [ 17.720135] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.720156] ? calculate_sigpending+0x7b/0xa0 [ 17.720180] ? __pfx_kthread+0x10/0x10 [ 17.720203] ret_from_fork+0x116/0x1d0 [ 17.720221] ? __pfx_kthread+0x10/0x10 [ 17.720243] ret_from_fork_asm+0x1a/0x30 [ 17.720275] </TASK> [ 17.720288] [ 17.728118] Allocated by task 282: [ 17.728313] kasan_save_stack+0x45/0x70 [ 17.728520] kasan_save_track+0x18/0x40 [ 17.728709] kasan_save_alloc_info+0x3b/0x50 [ 17.728935] __kasan_kmalloc+0xb7/0xc0 [ 17.729087] __kmalloc_cache_noprof+0x189/0x420 [ 17.729291] kasan_atomics+0x95/0x310 [ 17.729487] kunit_try_run_case+0x1a5/0x480 [ 17.729722] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.729930] kthread+0x337/0x6f0 [ 17.730076] ret_from_fork+0x116/0x1d0 [ 17.730218] ret_from_fork_asm+0x1a/0x30 [ 17.730399] [ 17.730502] The buggy address belongs to the object at ffff8881031d0c00 [ 17.730502] which belongs to the cache kmalloc-64 of size 64 [ 17.731106] The buggy address is located 0 bytes to the right of [ 17.731106] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 17.731918] [ 17.732000] The buggy address belongs to the physical page: [ 17.732264] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 17.732648] flags: 0x200000000000000(node=0|zone=2) [ 17.732906] page_type: f5(slab) [ 17.733033] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.733400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.733737] page dumped because: kasan: bad access detected [ 17.733919] [ 17.733993] Memory state around the buggy address: [ 17.734361] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.734734] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.735139] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.735361] ^ [ 17.735755] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.736119] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.736438] ================================================================== [ 17.793960] ================================================================== [ 17.794623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 17.795390] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 17.796446] [ 17.796637] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.796683] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.796697] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.796720] Call Trace: [ 17.796736] <TASK> [ 17.796754] dump_stack_lvl+0x73/0xb0 [ 17.796781] print_report+0xd1/0x650 [ 17.796806] ? __virt_addr_valid+0x1db/0x2d0 [ 17.796830] ? kasan_atomics_helper+0x224c/0x5450 [ 17.796851] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.796880] ? kasan_atomics_helper+0x224c/0x5450 [ 17.796914] kasan_report+0x141/0x180 [ 17.796937] ? kasan_atomics_helper+0x224c/0x5450 [ 17.796967] kasan_check_range+0x10c/0x1c0 [ 17.796993] __kasan_check_write+0x18/0x20 [ 17.797014] kasan_atomics_helper+0x224c/0x5450 [ 17.797038] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.797074] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.797101] ? kasan_atomics+0x152/0x310 [ 17.797130] kasan_atomics+0x1dc/0x310 [ 17.797155] ? __pfx_kasan_atomics+0x10/0x10 [ 17.797181] ? __pfx_read_tsc+0x10/0x10 [ 17.797204] ? ktime_get_ts64+0x86/0x230 [ 17.797231] kunit_try_run_case+0x1a5/0x480 [ 17.797256] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.797279] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.797305] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.797330] ? __kthread_parkme+0x82/0x180 [ 17.797351] ? preempt_count_sub+0x50/0x80 [ 17.797378] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.797404] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.797428] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.797452] kthread+0x337/0x6f0 [ 17.797474] ? trace_preempt_on+0x20/0xc0 [ 17.797498] ? __pfx_kthread+0x10/0x10 [ 17.797525] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.797548] ? calculate_sigpending+0x7b/0xa0 [ 17.797572] ? __pfx_kthread+0x10/0x10 [ 17.797596] ret_from_fork+0x116/0x1d0 [ 17.797616] ? __pfx_kthread+0x10/0x10 [ 17.797639] ret_from_fork_asm+0x1a/0x30 [ 17.797673] </TASK> [ 17.797690] [ 17.806018] Allocated by task 282: [ 17.806203] kasan_save_stack+0x45/0x70 [ 17.806395] kasan_save_track+0x18/0x40 [ 17.806541] kasan_save_alloc_info+0x3b/0x50 [ 17.806811] __kasan_kmalloc+0xb7/0xc0 [ 17.807016] __kmalloc_cache_noprof+0x189/0x420 [ 17.807207] kasan_atomics+0x95/0x310 [ 17.807414] kunit_try_run_case+0x1a5/0x480 [ 17.807626] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.807895] kthread+0x337/0x6f0 [ 17.808045] ret_from_fork+0x116/0x1d0 [ 17.808266] ret_from_fork_asm+0x1a/0x30 [ 17.808470] [ 17.808549] The buggy address belongs to the object at ffff8881031d0c00 [ 17.808549] which belongs to the cache kmalloc-64 of size 64 [ 17.809178] The buggy address is located 0 bytes to the right of [ 17.809178] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 17.809660] [ 17.809754] The buggy address belongs to the physical page: [ 17.810027] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 17.810399] flags: 0x200000000000000(node=0|zone=2) [ 17.810607] page_type: f5(slab) [ 17.810740] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.811534] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.811850] page dumped because: kasan: bad access detected [ 17.812036] [ 17.812122] Memory state around the buggy address: [ 17.812289] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.812680] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.813135] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.813414] ^ [ 17.813580] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.813809] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.814038] ================================================================== [ 16.399010] ================================================================== [ 16.399284] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 16.399630] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 16.400349] [ 16.400566] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.400664] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.400679] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.400702] Call Trace: [ 16.400718] <TASK> [ 16.400734] dump_stack_lvl+0x73/0xb0 [ 16.400764] print_report+0xd1/0x650 [ 16.400788] ? __virt_addr_valid+0x1db/0x2d0 [ 16.400812] ? kasan_atomics_helper+0x7c7/0x5450 [ 16.400835] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.400862] ? kasan_atomics_helper+0x7c7/0x5450 [ 16.400885] kasan_report+0x141/0x180 [ 16.400908] ? kasan_atomics_helper+0x7c7/0x5450 [ 16.400937] kasan_check_range+0x10c/0x1c0 [ 16.400962] __kasan_check_write+0x18/0x20 [ 16.400982] kasan_atomics_helper+0x7c7/0x5450 [ 16.401007] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.401030] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.401070] ? kasan_atomics+0x152/0x310 [ 16.401100] kasan_atomics+0x1dc/0x310 [ 16.401135] ? __pfx_kasan_atomics+0x10/0x10 [ 16.401161] ? __pfx_read_tsc+0x10/0x10 [ 16.401183] ? ktime_get_ts64+0x86/0x230 [ 16.401210] kunit_try_run_case+0x1a5/0x480 [ 16.401274] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.401324] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.401349] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.401374] ? __kthread_parkme+0x82/0x180 [ 16.401395] ? preempt_count_sub+0x50/0x80 [ 16.401421] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.401446] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.401471] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.401496] kthread+0x337/0x6f0 [ 16.401517] ? trace_preempt_on+0x20/0xc0 [ 16.401551] ? __pfx_kthread+0x10/0x10 [ 16.401574] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.401597] ? calculate_sigpending+0x7b/0xa0 [ 16.401622] ? __pfx_kthread+0x10/0x10 [ 16.401646] ret_from_fork+0x116/0x1d0 [ 16.401666] ? __pfx_kthread+0x10/0x10 [ 16.401687] ret_from_fork_asm+0x1a/0x30 [ 16.401722] </TASK> [ 16.401741] [ 16.410159] Allocated by task 282: [ 16.410368] kasan_save_stack+0x45/0x70 [ 16.410591] kasan_save_track+0x18/0x40 [ 16.410844] kasan_save_alloc_info+0x3b/0x50 [ 16.411113] __kasan_kmalloc+0xb7/0xc0 [ 16.411331] __kmalloc_cache_noprof+0x189/0x420 [ 16.411572] kasan_atomics+0x95/0x310 [ 16.411729] kunit_try_run_case+0x1a5/0x480 [ 16.411976] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.412302] kthread+0x337/0x6f0 [ 16.412433] ret_from_fork+0x116/0x1d0 [ 16.412571] ret_from_fork_asm+0x1a/0x30 [ 16.412769] [ 16.412870] The buggy address belongs to the object at ffff8881031d0c00 [ 16.412870] which belongs to the cache kmalloc-64 of size 64 [ 16.413520] The buggy address is located 0 bytes to the right of [ 16.413520] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 16.414125] [ 16.414202] The buggy address belongs to the physical page: [ 16.414430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 16.414967] flags: 0x200000000000000(node=0|zone=2) [ 16.415236] page_type: f5(slab) [ 16.415424] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.415820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.416286] page dumped because: kasan: bad access detected [ 16.416473] [ 16.416549] Memory state around the buggy address: [ 16.416711] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.416936] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.417317] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.418129] ^ [ 16.418738] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.419496] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.420326] ================================================================== [ 17.403221] ================================================================== [ 17.404158] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 17.404691] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 17.405583] [ 17.405688] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.405748] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.405763] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.405786] Call Trace: [ 17.405803] <TASK> [ 17.405843] dump_stack_lvl+0x73/0xb0 [ 17.405874] print_report+0xd1/0x650 [ 17.405899] ? __virt_addr_valid+0x1db/0x2d0 [ 17.405923] ? kasan_atomics_helper+0x1c18/0x5450 [ 17.405946] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.405975] ? kasan_atomics_helper+0x1c18/0x5450 [ 17.405999] kasan_report+0x141/0x180 [ 17.406022] ? kasan_atomics_helper+0x1c18/0x5450 [ 17.406063] kasan_check_range+0x10c/0x1c0 [ 17.406089] __kasan_check_write+0x18/0x20 [ 17.406110] kasan_atomics_helper+0x1c18/0x5450 [ 17.406135] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.406159] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.406186] ? kasan_atomics+0x152/0x310 [ 17.406215] kasan_atomics+0x1dc/0x310 [ 17.406240] ? __pfx_kasan_atomics+0x10/0x10 [ 17.406267] ? __pfx_read_tsc+0x10/0x10 [ 17.406289] ? ktime_get_ts64+0x86/0x230 [ 17.406316] kunit_try_run_case+0x1a5/0x480 [ 17.406341] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.406366] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.406390] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.406415] ? __kthread_parkme+0x82/0x180 [ 17.406437] ? preempt_count_sub+0x50/0x80 [ 17.406462] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.406488] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.406513] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.406537] kthread+0x337/0x6f0 [ 17.406559] ? trace_preempt_on+0x20/0xc0 [ 17.406584] ? __pfx_kthread+0x10/0x10 [ 17.406606] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.406629] ? calculate_sigpending+0x7b/0xa0 [ 17.406655] ? __pfx_kthread+0x10/0x10 [ 17.406679] ret_from_fork+0x116/0x1d0 [ 17.406699] ? __pfx_kthread+0x10/0x10 [ 17.406721] ret_from_fork_asm+0x1a/0x30 [ 17.406905] </TASK> [ 17.406919] [ 17.421037] Allocated by task 282: [ 17.421517] kasan_save_stack+0x45/0x70 [ 17.422024] kasan_save_track+0x18/0x40 [ 17.422496] kasan_save_alloc_info+0x3b/0x50 [ 17.423016] __kasan_kmalloc+0xb7/0xc0 [ 17.423481] __kmalloc_cache_noprof+0x189/0x420 [ 17.424030] kasan_atomics+0x95/0x310 [ 17.424494] kunit_try_run_case+0x1a5/0x480 [ 17.425030] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.425318] kthread+0x337/0x6f0 [ 17.425444] ret_from_fork+0x116/0x1d0 [ 17.425581] ret_from_fork_asm+0x1a/0x30 [ 17.425721] [ 17.425797] The buggy address belongs to the object at ffff8881031d0c00 [ 17.425797] which belongs to the cache kmalloc-64 of size 64 [ 17.426166] The buggy address is located 0 bytes to the right of [ 17.426166] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 17.426534] [ 17.426610] The buggy address belongs to the physical page: [ 17.426968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 17.428207] flags: 0x200000000000000(node=0|zone=2) [ 17.428774] page_type: f5(slab) [ 17.429190] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.430002] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.430776] page dumped because: kasan: bad access detected [ 17.431398] [ 17.431566] Memory state around the buggy address: [ 17.432198] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.433179] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.433913] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.434492] ^ [ 17.434659] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.435370] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.436168] ================================================================== [ 17.498576] ================================================================== [ 17.498886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 17.499645] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 17.500171] [ 17.500359] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.500429] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.500443] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.500467] Call Trace: [ 17.500482] <TASK> [ 17.500500] dump_stack_lvl+0x73/0xb0 [ 17.500529] print_report+0xd1/0x650 [ 17.500553] ? __virt_addr_valid+0x1db/0x2d0 [ 17.500577] ? kasan_atomics_helper+0x1d7a/0x5450 [ 17.500619] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.500647] ? kasan_atomics_helper+0x1d7a/0x5450 [ 17.500671] kasan_report+0x141/0x180 [ 17.500695] ? kasan_atomics_helper+0x1d7a/0x5450 [ 17.500724] kasan_check_range+0x10c/0x1c0 [ 17.500750] __kasan_check_write+0x18/0x20 [ 17.500772] kasan_atomics_helper+0x1d7a/0x5450 [ 17.500796] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.500820] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.500846] ? kasan_atomics+0x152/0x310 [ 17.500876] kasan_atomics+0x1dc/0x310 [ 17.500901] ? __pfx_kasan_atomics+0x10/0x10 [ 17.500927] ? __pfx_read_tsc+0x10/0x10 [ 17.500950] ? ktime_get_ts64+0x86/0x230 [ 17.500977] kunit_try_run_case+0x1a5/0x480 [ 17.501002] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.501027] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.501062] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.501088] ? __kthread_parkme+0x82/0x180 [ 17.501109] ? preempt_count_sub+0x50/0x80 [ 17.501135] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.501161] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.501185] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.501210] kthread+0x337/0x6f0 [ 17.501231] ? trace_preempt_on+0x20/0xc0 [ 17.501256] ? __pfx_kthread+0x10/0x10 [ 17.501279] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.501302] ? calculate_sigpending+0x7b/0xa0 [ 17.501327] ? __pfx_kthread+0x10/0x10 [ 17.501351] ret_from_fork+0x116/0x1d0 [ 17.501370] ? __pfx_kthread+0x10/0x10 [ 17.501392] ret_from_fork_asm+0x1a/0x30 [ 17.501425] </TASK> [ 17.501438] [ 17.513184] Allocated by task 282: [ 17.513388] kasan_save_stack+0x45/0x70 [ 17.513795] kasan_save_track+0x18/0x40 [ 17.514191] kasan_save_alloc_info+0x3b/0x50 [ 17.514398] __kasan_kmalloc+0xb7/0xc0 [ 17.514536] __kmalloc_cache_noprof+0x189/0x420 [ 17.514694] kasan_atomics+0x95/0x310 [ 17.515103] kunit_try_run_case+0x1a5/0x480 [ 17.515520] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.516186] kthread+0x337/0x6f0 [ 17.516592] ret_from_fork+0x116/0x1d0 [ 17.517011] ret_from_fork_asm+0x1a/0x30 [ 17.517399] [ 17.517475] The buggy address belongs to the object at ffff8881031d0c00 [ 17.517475] which belongs to the cache kmalloc-64 of size 64 [ 17.518083] The buggy address is located 0 bytes to the right of [ 17.518083] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 17.519264] [ 17.519449] The buggy address belongs to the physical page: [ 17.519914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 17.520175] flags: 0x200000000000000(node=0|zone=2) [ 17.520347] page_type: f5(slab) [ 17.520475] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.520710] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.521466] page dumped because: kasan: bad access detected [ 17.522109] [ 17.522309] Memory state around the buggy address: [ 17.522769] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.523422] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.524247] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.524827] ^ [ 17.524985] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.525214] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.525428] ================================================================== [ 17.763891] ================================================================== [ 17.764839] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 17.765579] Read of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 17.766390] [ 17.766500] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.766566] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.766583] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.766605] Call Trace: [ 17.766621] <TASK> [ 17.766640] dump_stack_lvl+0x73/0xb0 [ 17.766671] print_report+0xd1/0x650 [ 17.766729] ? __virt_addr_valid+0x1db/0x2d0 [ 17.766771] ? kasan_atomics_helper+0x4fa5/0x5450 [ 17.766792] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.766820] ? kasan_atomics_helper+0x4fa5/0x5450 [ 17.766842] kasan_report+0x141/0x180 [ 17.766865] ? kasan_atomics_helper+0x4fa5/0x5450 [ 17.766894] __asan_report_load8_noabort+0x18/0x20 [ 17.766920] kasan_atomics_helper+0x4fa5/0x5450 [ 17.766967] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.766990] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.767016] ? kasan_atomics+0x152/0x310 [ 17.767075] kasan_atomics+0x1dc/0x310 [ 17.767098] ? __pfx_kasan_atomics+0x10/0x10 [ 17.767124] ? __pfx_read_tsc+0x10/0x10 [ 17.767146] ? ktime_get_ts64+0x86/0x230 [ 17.767172] kunit_try_run_case+0x1a5/0x480 [ 17.767197] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.767220] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.767245] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.767269] ? __kthread_parkme+0x82/0x180 [ 17.767290] ? preempt_count_sub+0x50/0x80 [ 17.767314] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.767340] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.767363] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.767387] kthread+0x337/0x6f0 [ 17.767408] ? trace_preempt_on+0x20/0xc0 [ 17.767432] ? __pfx_kthread+0x10/0x10 [ 17.767454] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.767476] ? calculate_sigpending+0x7b/0xa0 [ 17.767500] ? __pfx_kthread+0x10/0x10 [ 17.767523] ret_from_fork+0x116/0x1d0 [ 17.767543] ? __pfx_kthread+0x10/0x10 [ 17.767565] ret_from_fork_asm+0x1a/0x30 [ 17.767597] </TASK> [ 17.767610] [ 17.780439] Allocated by task 282: [ 17.780776] kasan_save_stack+0x45/0x70 [ 17.781212] kasan_save_track+0x18/0x40 [ 17.781582] kasan_save_alloc_info+0x3b/0x50 [ 17.782020] __kasan_kmalloc+0xb7/0xc0 [ 17.782269] __kmalloc_cache_noprof+0x189/0x420 [ 17.782432] kasan_atomics+0x95/0x310 [ 17.782572] kunit_try_run_case+0x1a5/0x480 [ 17.782723] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.783211] kthread+0x337/0x6f0 [ 17.783513] ret_from_fork+0x116/0x1d0 [ 17.783864] ret_from_fork_asm+0x1a/0x30 [ 17.784229] [ 17.784394] The buggy address belongs to the object at ffff8881031d0c00 [ 17.784394] which belongs to the cache kmalloc-64 of size 64 [ 17.785480] The buggy address is located 0 bytes to the right of [ 17.785480] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 17.786308] [ 17.786388] The buggy address belongs to the physical page: [ 17.786571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 17.786984] flags: 0x200000000000000(node=0|zone=2) [ 17.787431] page_type: f5(slab) [ 17.787782] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.788684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.789375] page dumped because: kasan: bad access detected [ 17.789947] [ 17.790122] Memory state around the buggy address: [ 17.790549] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.791107] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.791340] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.791570] ^ [ 17.791748] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.792376] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.793067] ================================================================== [ 16.160888] ================================================================== [ 16.161683] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 16.162383] Read of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 16.163110] [ 16.163340] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.163384] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.163396] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.163416] Call Trace: [ 16.163427] <TASK> [ 16.163442] dump_stack_lvl+0x73/0xb0 [ 16.163469] print_report+0xd1/0x650 [ 16.163490] ? __virt_addr_valid+0x1db/0x2d0 [ 16.163513] ? kasan_atomics_helper+0x4b88/0x5450 [ 16.163556] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.163582] ? kasan_atomics_helper+0x4b88/0x5450 [ 16.163603] kasan_report+0x141/0x180 [ 16.163624] ? kasan_atomics_helper+0x4b88/0x5450 [ 16.163650] __asan_report_load4_noabort+0x18/0x20 [ 16.163675] kasan_atomics_helper+0x4b88/0x5450 [ 16.163696] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.163719] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.163743] ? kasan_atomics+0x152/0x310 [ 16.163769] kasan_atomics+0x1dc/0x310 [ 16.163791] ? __pfx_kasan_atomics+0x10/0x10 [ 16.163815] ? __pfx_read_tsc+0x10/0x10 [ 16.163834] ? ktime_get_ts64+0x86/0x230 [ 16.163860] kunit_try_run_case+0x1a5/0x480 [ 16.163882] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.163903] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.163927] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.163950] ? __kthread_parkme+0x82/0x180 [ 16.163977] ? preempt_count_sub+0x50/0x80 [ 16.164001] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.164024] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.164057] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.164080] kthread+0x337/0x6f0 [ 16.164099] ? trace_preempt_on+0x20/0xc0 [ 16.164122] ? __pfx_kthread+0x10/0x10 [ 16.164142] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.164162] ? calculate_sigpending+0x7b/0xa0 [ 16.164185] ? __pfx_kthread+0x10/0x10 [ 16.164206] ret_from_fork+0x116/0x1d0 [ 16.164225] ? __pfx_kthread+0x10/0x10 [ 16.164245] ret_from_fork_asm+0x1a/0x30 [ 16.164276] </TASK> [ 16.164288] [ 16.176271] Allocated by task 282: [ 16.176670] kasan_save_stack+0x45/0x70 [ 16.177177] kasan_save_track+0x18/0x40 [ 16.177658] kasan_save_alloc_info+0x3b/0x50 [ 16.177979] __kasan_kmalloc+0xb7/0xc0 [ 16.178406] __kmalloc_cache_noprof+0x189/0x420 [ 16.178807] kasan_atomics+0x95/0x310 [ 16.179078] kunit_try_run_case+0x1a5/0x480 [ 16.179570] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.180130] kthread+0x337/0x6f0 [ 16.180265] ret_from_fork+0x116/0x1d0 [ 16.180452] ret_from_fork_asm+0x1a/0x30 [ 16.180612] [ 16.180703] The buggy address belongs to the object at ffff8881031d0c00 [ 16.180703] which belongs to the cache kmalloc-64 of size 64 [ 16.182106] The buggy address is located 0 bytes to the right of [ 16.182106] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 16.182978] [ 16.183082] The buggy address belongs to the physical page: [ 16.183693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 16.184241] flags: 0x200000000000000(node=0|zone=2) [ 16.184825] page_type: f5(slab) [ 16.185243] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.185612] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.185991] page dumped because: kasan: bad access detected [ 16.186474] [ 16.186556] Memory state around the buggy address: [ 16.186727] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.186971] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.187696] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.188547] ^ [ 16.189062] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.189830] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.190729] ================================================================== [ 17.289817] ================================================================== [ 17.290087] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 17.290333] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 17.290674] [ 17.290792] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.290836] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.290849] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.290871] Call Trace: [ 17.290915] <TASK> [ 17.290931] dump_stack_lvl+0x73/0xb0 [ 17.290958] print_report+0xd1/0x650 [ 17.290982] ? __virt_addr_valid+0x1db/0x2d0 [ 17.291005] ? kasan_atomics_helper+0x18b1/0x5450 [ 17.291028] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.291067] ? kasan_atomics_helper+0x18b1/0x5450 [ 17.291091] kasan_report+0x141/0x180 [ 17.291114] ? kasan_atomics_helper+0x18b1/0x5450 [ 17.291143] kasan_check_range+0x10c/0x1c0 [ 17.291169] __kasan_check_write+0x18/0x20 [ 17.291190] kasan_atomics_helper+0x18b1/0x5450 [ 17.291214] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.291237] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.291264] ? kasan_atomics+0x152/0x310 [ 17.291293] kasan_atomics+0x1dc/0x310 [ 17.291316] ? __pfx_kasan_atomics+0x10/0x10 [ 17.291342] ? __pfx_read_tsc+0x10/0x10 [ 17.291364] ? ktime_get_ts64+0x86/0x230 [ 17.291390] kunit_try_run_case+0x1a5/0x480 [ 17.291415] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.291440] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.291464] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.291488] ? __kthread_parkme+0x82/0x180 [ 17.291509] ? preempt_count_sub+0x50/0x80 [ 17.291534] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.291559] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.291582] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.291607] kthread+0x337/0x6f0 [ 17.291628] ? trace_preempt_on+0x20/0xc0 [ 17.291652] ? __pfx_kthread+0x10/0x10 [ 17.291674] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.291696] ? calculate_sigpending+0x7b/0xa0 [ 17.291721] ? __pfx_kthread+0x10/0x10 [ 17.291744] ret_from_fork+0x116/0x1d0 [ 17.291763] ? __pfx_kthread+0x10/0x10 [ 17.291785] ret_from_fork_asm+0x1a/0x30 [ 17.291818] </TASK> [ 17.291830] [ 17.299829] Allocated by task 282: [ 17.300028] kasan_save_stack+0x45/0x70 [ 17.300252] kasan_save_track+0x18/0x40 [ 17.300461] kasan_save_alloc_info+0x3b/0x50 [ 17.300699] __kasan_kmalloc+0xb7/0xc0 [ 17.300911] __kmalloc_cache_noprof+0x189/0x420 [ 17.301121] kasan_atomics+0x95/0x310 [ 17.301282] kunit_try_run_case+0x1a5/0x480 [ 17.301508] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.301769] kthread+0x337/0x6f0 [ 17.301936] ret_from_fork+0x116/0x1d0 [ 17.302089] ret_from_fork_asm+0x1a/0x30 [ 17.302238] [ 17.302315] The buggy address belongs to the object at ffff8881031d0c00 [ 17.302315] which belongs to the cache kmalloc-64 of size 64 [ 17.302693] The buggy address is located 0 bytes to the right of [ 17.302693] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 17.303447] [ 17.303548] The buggy address belongs to the physical page: [ 17.303810] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 17.304180] flags: 0x200000000000000(node=0|zone=2) [ 17.304358] page_type: f5(slab) [ 17.304487] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.304733] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.305197] page dumped because: kasan: bad access detected [ 17.305464] [ 17.305569] Memory state around the buggy address: [ 17.305897] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.306245] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.306590] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.306892] ^ [ 17.307130] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.307362] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.307664] ================================================================== [ 16.335143] ================================================================== [ 16.335397] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 16.335641] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 16.336403] [ 16.336707] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.336782] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.336823] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.336847] Call Trace: [ 16.336862] <TASK> [ 16.336880] dump_stack_lvl+0x73/0xb0 [ 16.336911] print_report+0xd1/0x650 [ 16.336936] ? __virt_addr_valid+0x1db/0x2d0 [ 16.336960] ? kasan_atomics_helper+0x5fe/0x5450 [ 16.336985] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.337014] ? kasan_atomics_helper+0x5fe/0x5450 [ 16.337038] kasan_report+0x141/0x180 [ 16.337073] ? kasan_atomics_helper+0x5fe/0x5450 [ 16.337102] kasan_check_range+0x10c/0x1c0 [ 16.337128] __kasan_check_write+0x18/0x20 [ 16.337149] kasan_atomics_helper+0x5fe/0x5450 [ 16.337208] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.337235] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.337262] ? kasan_atomics+0x152/0x310 [ 16.337293] kasan_atomics+0x1dc/0x310 [ 16.337317] ? __pfx_kasan_atomics+0x10/0x10 [ 16.337344] ? __pfx_read_tsc+0x10/0x10 [ 16.337369] ? ktime_get_ts64+0x86/0x230 [ 16.337398] kunit_try_run_case+0x1a5/0x480 [ 16.337425] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.337449] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.337475] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.337501] ? __kthread_parkme+0x82/0x180 [ 16.337529] ? preempt_count_sub+0x50/0x80 [ 16.337558] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.337585] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.337610] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.337636] kthread+0x337/0x6f0 [ 16.337658] ? trace_preempt_on+0x20/0xc0 [ 16.337685] ? __pfx_kthread+0x10/0x10 [ 16.337709] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.337732] ? calculate_sigpending+0x7b/0xa0 [ 16.337759] ? __pfx_kthread+0x10/0x10 [ 16.337782] ret_from_fork+0x116/0x1d0 [ 16.337803] ? __pfx_kthread+0x10/0x10 [ 16.337827] ret_from_fork_asm+0x1a/0x30 [ 16.337861] </TASK> [ 16.337876] [ 16.348605] Allocated by task 282: [ 16.348816] kasan_save_stack+0x45/0x70 [ 16.349064] kasan_save_track+0x18/0x40 [ 16.349241] kasan_save_alloc_info+0x3b/0x50 [ 16.349489] __kasan_kmalloc+0xb7/0xc0 [ 16.349688] __kmalloc_cache_noprof+0x189/0x420 [ 16.349924] kasan_atomics+0x95/0x310 [ 16.350160] kunit_try_run_case+0x1a5/0x480 [ 16.350383] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.350656] kthread+0x337/0x6f0 [ 16.350898] ret_from_fork+0x116/0x1d0 [ 16.351144] ret_from_fork_asm+0x1a/0x30 [ 16.351290] [ 16.351365] The buggy address belongs to the object at ffff8881031d0c00 [ 16.351365] which belongs to the cache kmalloc-64 of size 64 [ 16.351895] The buggy address is located 0 bytes to the right of [ 16.351895] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 16.352516] [ 16.352611] The buggy address belongs to the physical page: [ 16.352941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 16.353302] flags: 0x200000000000000(node=0|zone=2) [ 16.353501] page_type: f5(slab) [ 16.353652] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.354198] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.354552] page dumped because: kasan: bad access detected [ 16.354801] [ 16.354901] Memory state around the buggy address: [ 16.355146] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.355636] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.356030] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.356359] ^ [ 16.356595] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.356927] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.357167] ================================================================== [ 16.982971] ================================================================== [ 16.983700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 16.984504] Read of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 16.985281] [ 16.985375] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.985422] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.985436] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.985458] Call Trace: [ 16.985474] <TASK> [ 16.985491] dump_stack_lvl+0x73/0xb0 [ 16.985520] print_report+0xd1/0x650 [ 16.985548] ? __virt_addr_valid+0x1db/0x2d0 [ 16.985572] ? kasan_atomics_helper+0x49ce/0x5450 [ 16.985595] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.985623] ? kasan_atomics_helper+0x49ce/0x5450 [ 16.985646] kasan_report+0x141/0x180 [ 16.985670] ? kasan_atomics_helper+0x49ce/0x5450 [ 16.985698] __asan_report_load4_noabort+0x18/0x20 [ 16.985736] kasan_atomics_helper+0x49ce/0x5450 [ 16.985760] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.985784] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.985810] ? kasan_atomics+0x152/0x310 [ 16.985840] kasan_atomics+0x1dc/0x310 [ 16.985864] ? __pfx_kasan_atomics+0x10/0x10 [ 16.985904] ? __pfx_read_tsc+0x10/0x10 [ 16.985927] ? ktime_get_ts64+0x86/0x230 [ 16.985954] kunit_try_run_case+0x1a5/0x480 [ 16.985991] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.986015] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.986039] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.986074] ? __kthread_parkme+0x82/0x180 [ 16.986097] ? preempt_count_sub+0x50/0x80 [ 16.986122] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.986148] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.986172] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.986198] kthread+0x337/0x6f0 [ 16.986219] ? trace_preempt_on+0x20/0xc0 [ 16.986245] ? __pfx_kthread+0x10/0x10 [ 16.986268] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.986290] ? calculate_sigpending+0x7b/0xa0 [ 16.986315] ? __pfx_kthread+0x10/0x10 [ 16.986338] ret_from_fork+0x116/0x1d0 [ 16.986358] ? __pfx_kthread+0x10/0x10 [ 16.986381] ret_from_fork_asm+0x1a/0x30 [ 16.986415] </TASK> [ 16.986427] [ 17.001070] Allocated by task 282: [ 17.001434] kasan_save_stack+0x45/0x70 [ 17.001835] kasan_save_track+0x18/0x40 [ 17.002032] kasan_save_alloc_info+0x3b/0x50 [ 17.002448] __kasan_kmalloc+0xb7/0xc0 [ 17.002589] __kmalloc_cache_noprof+0x189/0x420 [ 17.002772] kasan_atomics+0x95/0x310 [ 17.003066] kunit_try_run_case+0x1a5/0x480 [ 17.003230] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.003412] kthread+0x337/0x6f0 [ 17.003540] ret_from_fork+0x116/0x1d0 [ 17.003677] ret_from_fork_asm+0x1a/0x30 [ 17.003926] [ 17.004079] The buggy address belongs to the object at ffff8881031d0c00 [ 17.004079] which belongs to the cache kmalloc-64 of size 64 [ 17.005290] The buggy address is located 0 bytes to the right of [ 17.005290] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 17.006535] [ 17.006719] The buggy address belongs to the physical page: [ 17.007284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 17.007667] flags: 0x200000000000000(node=0|zone=2) [ 17.007991] page_type: f5(slab) [ 17.008324] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.009079] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.009716] page dumped because: kasan: bad access detected [ 17.010209] [ 17.010344] Memory state around the buggy address: [ 17.010750] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.010995] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.011636] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.012180] ^ [ 17.012519] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.012975] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.013484] ================================================================== [ 17.236540] ================================================================== [ 17.237742] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 17.238356] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 17.239493] [ 17.239754] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.239808] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.239823] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.239846] Call Trace: [ 17.239864] <TASK> [ 17.239880] dump_stack_lvl+0x73/0xb0 [ 17.239911] print_report+0xd1/0x650 [ 17.239935] ? __virt_addr_valid+0x1db/0x2d0 [ 17.239959] ? kasan_atomics_helper+0x177f/0x5450 [ 17.239982] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.240010] ? kasan_atomics_helper+0x177f/0x5450 [ 17.240034] kasan_report+0x141/0x180 [ 17.240068] ? kasan_atomics_helper+0x177f/0x5450 [ 17.240097] kasan_check_range+0x10c/0x1c0 [ 17.240123] __kasan_check_write+0x18/0x20 [ 17.240143] kasan_atomics_helper+0x177f/0x5450 [ 17.240168] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.240192] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.240218] ? kasan_atomics+0x152/0x310 [ 17.240247] kasan_atomics+0x1dc/0x310 [ 17.240272] ? __pfx_kasan_atomics+0x10/0x10 [ 17.240297] ? __pfx_read_tsc+0x10/0x10 [ 17.240319] ? ktime_get_ts64+0x86/0x230 [ 17.240345] kunit_try_run_case+0x1a5/0x480 [ 17.240371] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.240396] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.240420] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.240444] ? __kthread_parkme+0x82/0x180 [ 17.240466] ? preempt_count_sub+0x50/0x80 [ 17.240491] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.240517] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.240543] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.240567] kthread+0x337/0x6f0 [ 17.240588] ? trace_preempt_on+0x20/0xc0 [ 17.240613] ? __pfx_kthread+0x10/0x10 [ 17.240635] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.240658] ? calculate_sigpending+0x7b/0xa0 [ 17.240682] ? __pfx_kthread+0x10/0x10 [ 17.240706] ret_from_fork+0x116/0x1d0 [ 17.240892] ? __pfx_kthread+0x10/0x10 [ 17.240918] ret_from_fork_asm+0x1a/0x30 [ 17.240952] </TASK> [ 17.240966] [ 17.256509] Allocated by task 282: [ 17.256833] kasan_save_stack+0x45/0x70 [ 17.257179] kasan_save_track+0x18/0x40 [ 17.257325] kasan_save_alloc_info+0x3b/0x50 [ 17.257482] __kasan_kmalloc+0xb7/0xc0 [ 17.257627] __kmalloc_cache_noprof+0x189/0x420 [ 17.257971] kasan_atomics+0x95/0x310 [ 17.258356] kunit_try_run_case+0x1a5/0x480 [ 17.258807] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.259329] kthread+0x337/0x6f0 [ 17.259676] ret_from_fork+0x116/0x1d0 [ 17.260088] ret_from_fork_asm+0x1a/0x30 [ 17.260484] [ 17.260578] The buggy address belongs to the object at ffff8881031d0c00 [ 17.260578] which belongs to the cache kmalloc-64 of size 64 [ 17.261567] The buggy address is located 0 bytes to the right of [ 17.261567] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 17.262467] [ 17.262547] The buggy address belongs to the physical page: [ 17.262764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 17.263514] flags: 0x200000000000000(node=0|zone=2) [ 17.264014] page_type: f5(slab) [ 17.264191] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.264432] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.264674] page dumped because: kasan: bad access detected [ 17.265241] [ 17.265404] Memory state around the buggy address: [ 17.265901] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.266517] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.266986] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.267834] ^ [ 17.268425] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.268955] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.269715] ================================================================== [ 17.376085] ================================================================== [ 17.376355] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 17.376712] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 17.377759] [ 17.377880] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.378080] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.378098] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.378121] Call Trace: [ 17.378137] <TASK> [ 17.378155] dump_stack_lvl+0x73/0xb0 [ 17.378186] print_report+0xd1/0x650 [ 17.378209] ? __virt_addr_valid+0x1db/0x2d0 [ 17.378233] ? kasan_atomics_helper+0x1b22/0x5450 [ 17.378258] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.378287] ? kasan_atomics_helper+0x1b22/0x5450 [ 17.378309] kasan_report+0x141/0x180 [ 17.378333] ? kasan_atomics_helper+0x1b22/0x5450 [ 17.378361] kasan_check_range+0x10c/0x1c0 [ 17.378386] __kasan_check_write+0x18/0x20 [ 17.378407] kasan_atomics_helper+0x1b22/0x5450 [ 17.378431] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.378454] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.378481] ? kasan_atomics+0x152/0x310 [ 17.378510] kasan_atomics+0x1dc/0x310 [ 17.378533] ? __pfx_kasan_atomics+0x10/0x10 [ 17.378559] ? __pfx_read_tsc+0x10/0x10 [ 17.378581] ? ktime_get_ts64+0x86/0x230 [ 17.378607] kunit_try_run_case+0x1a5/0x480 [ 17.378632] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.378655] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.378679] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.378702] ? __kthread_parkme+0x82/0x180 [ 17.378734] ? preempt_count_sub+0x50/0x80 [ 17.378760] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.378785] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.378808] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.378832] kthread+0x337/0x6f0 [ 17.378852] ? trace_preempt_on+0x20/0xc0 [ 17.378875] ? __pfx_kthread+0x10/0x10 [ 17.378897] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.378919] ? calculate_sigpending+0x7b/0xa0 [ 17.378944] ? __pfx_kthread+0x10/0x10 [ 17.378966] ret_from_fork+0x116/0x1d0 [ 17.379000] ? __pfx_kthread+0x10/0x10 [ 17.379022] ret_from_fork_asm+0x1a/0x30 [ 17.379064] </TASK> [ 17.379077] [ 17.389777] Allocated by task 282: [ 17.390268] kasan_save_stack+0x45/0x70 [ 17.390452] kasan_save_track+0x18/0x40 [ 17.390852] kasan_save_alloc_info+0x3b/0x50 [ 17.391210] __kasan_kmalloc+0xb7/0xc0 [ 17.391520] __kmalloc_cache_noprof+0x189/0x420 [ 17.391832] kasan_atomics+0x95/0x310 [ 17.392006] kunit_try_run_case+0x1a5/0x480 [ 17.392382] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.392650] kthread+0x337/0x6f0 [ 17.392990] ret_from_fork+0x116/0x1d0 [ 17.393200] ret_from_fork_asm+0x1a/0x30 [ 17.393557] [ 17.393754] The buggy address belongs to the object at ffff8881031d0c00 [ 17.393754] which belongs to the cache kmalloc-64 of size 64 [ 17.394420] The buggy address is located 0 bytes to the right of [ 17.394420] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 17.395186] [ 17.395418] The buggy address belongs to the physical page: [ 17.395675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 17.396174] flags: 0x200000000000000(node=0|zone=2) [ 17.396560] page_type: f5(slab) [ 17.396847] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.397308] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.397771] page dumped because: kasan: bad access detected [ 17.397967] [ 17.398060] Memory state around the buggy address: [ 17.398235] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.398472] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.398704] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.399663] ^ [ 17.400281] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.401038] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.401806] ================================================================== [ 17.436932] ================================================================== [ 17.437905] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 17.438555] Read of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 17.439222] [ 17.439432] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.439481] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.439495] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.439518] Call Trace: [ 17.439535] <TASK> [ 17.439553] dump_stack_lvl+0x73/0xb0 [ 17.439603] print_report+0xd1/0x650 [ 17.439629] ? __virt_addr_valid+0x1db/0x2d0 [ 17.439655] ? kasan_atomics_helper+0x4f30/0x5450 [ 17.439677] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.439705] ? kasan_atomics_helper+0x4f30/0x5450 [ 17.439739] kasan_report+0x141/0x180 [ 17.439763] ? kasan_atomics_helper+0x4f30/0x5450 [ 17.439792] __asan_report_load8_noabort+0x18/0x20 [ 17.439818] kasan_atomics_helper+0x4f30/0x5450 [ 17.439842] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.439866] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.439893] ? kasan_atomics+0x152/0x310 [ 17.439923] kasan_atomics+0x1dc/0x310 [ 17.439947] ? __pfx_kasan_atomics+0x10/0x10 [ 17.439974] ? __pfx_read_tsc+0x10/0x10 [ 17.439997] ? ktime_get_ts64+0x86/0x230 [ 17.440025] kunit_try_run_case+0x1a5/0x480 [ 17.440063] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.440088] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.440115] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.440140] ? __kthread_parkme+0x82/0x180 [ 17.440162] ? preempt_count_sub+0x50/0x80 [ 17.440188] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.440213] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.440237] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.440262] kthread+0x337/0x6f0 [ 17.440284] ? trace_preempt_on+0x20/0xc0 [ 17.440308] ? __pfx_kthread+0x10/0x10 [ 17.440330] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.440352] ? calculate_sigpending+0x7b/0xa0 [ 17.440377] ? __pfx_kthread+0x10/0x10 [ 17.440400] ret_from_fork+0x116/0x1d0 [ 17.440420] ? __pfx_kthread+0x10/0x10 [ 17.440442] ret_from_fork_asm+0x1a/0x30 [ 17.440476] </TASK> [ 17.440489] [ 17.452426] Allocated by task 282: [ 17.452758] kasan_save_stack+0x45/0x70 [ 17.453227] kasan_save_track+0x18/0x40 [ 17.453628] kasan_save_alloc_info+0x3b/0x50 [ 17.454112] __kasan_kmalloc+0xb7/0xc0 [ 17.454477] __kmalloc_cache_noprof+0x189/0x420 [ 17.454977] kasan_atomics+0x95/0x310 [ 17.455360] kunit_try_run_case+0x1a5/0x480 [ 17.455783] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.456240] kthread+0x337/0x6f0 [ 17.456375] ret_from_fork+0x116/0x1d0 [ 17.456519] ret_from_fork_asm+0x1a/0x30 [ 17.456668] [ 17.456763] The buggy address belongs to the object at ffff8881031d0c00 [ 17.456763] which belongs to the cache kmalloc-64 of size 64 [ 17.457945] The buggy address is located 0 bytes to the right of [ 17.457945] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 17.459213] [ 17.459383] The buggy address belongs to the physical page: [ 17.459811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 17.460082] flags: 0x200000000000000(node=0|zone=2) [ 17.460257] page_type: f5(slab) [ 17.460384] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.460631] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.461070] page dumped because: kasan: bad access detected [ 17.461575] [ 17.461741] Memory state around the buggy address: [ 17.462256] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.463020] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.463695] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.464346] ^ [ 17.464824] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.465467] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.466241] ================================================================== [ 17.326399] ================================================================== [ 17.326817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 17.327141] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 17.327422] [ 17.327510] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.327553] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.327566] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.327588] Call Trace: [ 17.327602] <TASK> [ 17.327617] dump_stack_lvl+0x73/0xb0 [ 17.327643] print_report+0xd1/0x650 [ 17.327666] ? __virt_addr_valid+0x1db/0x2d0 [ 17.327688] ? kasan_atomics_helper+0x19e3/0x5450 [ 17.327710] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.327748] ? kasan_atomics_helper+0x19e3/0x5450 [ 17.327771] kasan_report+0x141/0x180 [ 17.327794] ? kasan_atomics_helper+0x19e3/0x5450 [ 17.327822] kasan_check_range+0x10c/0x1c0 [ 17.327847] __kasan_check_write+0x18/0x20 [ 17.327867] kasan_atomics_helper+0x19e3/0x5450 [ 17.327890] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.327914] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.327940] ? kasan_atomics+0x152/0x310 [ 17.327969] kasan_atomics+0x1dc/0x310 [ 17.327994] ? __pfx_kasan_atomics+0x10/0x10 [ 17.328019] ? __pfx_read_tsc+0x10/0x10 [ 17.328041] ? ktime_get_ts64+0x86/0x230 [ 17.328080] kunit_try_run_case+0x1a5/0x480 [ 17.328105] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.328128] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.328152] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.328176] ? __kthread_parkme+0x82/0x180 [ 17.328197] ? preempt_count_sub+0x50/0x80 [ 17.328222] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.328245] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.328269] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.328293] kthread+0x337/0x6f0 [ 17.328314] ? trace_preempt_on+0x20/0xc0 [ 17.328338] ? __pfx_kthread+0x10/0x10 [ 17.328359] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.328382] ? calculate_sigpending+0x7b/0xa0 [ 17.328406] ? __pfx_kthread+0x10/0x10 [ 17.328429] ret_from_fork+0x116/0x1d0 [ 17.328448] ? __pfx_kthread+0x10/0x10 [ 17.328470] ret_from_fork_asm+0x1a/0x30 [ 17.328502] </TASK> [ 17.328514] [ 17.336701] Allocated by task 282: [ 17.336899] kasan_save_stack+0x45/0x70 [ 17.337125] kasan_save_track+0x18/0x40 [ 17.337325] kasan_save_alloc_info+0x3b/0x50 [ 17.337534] __kasan_kmalloc+0xb7/0xc0 [ 17.337747] __kmalloc_cache_noprof+0x189/0x420 [ 17.337938] kasan_atomics+0x95/0x310 [ 17.338093] kunit_try_run_case+0x1a5/0x480 [ 17.338251] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.338438] kthread+0x337/0x6f0 [ 17.338569] ret_from_fork+0x116/0x1d0 [ 17.338748] ret_from_fork_asm+0x1a/0x30 [ 17.338970] [ 17.339083] The buggy address belongs to the object at ffff8881031d0c00 [ 17.339083] which belongs to the cache kmalloc-64 of size 64 [ 17.339653] The buggy address is located 0 bytes to the right of [ 17.339653] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 17.340685] [ 17.340841] The buggy address belongs to the physical page: [ 17.341035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 17.341304] flags: 0x200000000000000(node=0|zone=2) [ 17.341479] page_type: f5(slab) [ 17.341613] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.342011] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.342378] page dumped because: kasan: bad access detected [ 17.342650] [ 17.342754] Memory state around the buggy address: [ 17.342961] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.343214] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.343453] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.343686] ^ [ 17.343854] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.344319] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.344676] ================================================================== [ 16.530315] ================================================================== [ 16.531258] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 16.532073] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 16.532674] [ 16.532956] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.533034] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.533068] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.533092] Call Trace: [ 16.533111] <TASK> [ 16.533129] dump_stack_lvl+0x73/0xb0 [ 16.533161] print_report+0xd1/0x650 [ 16.533185] ? __virt_addr_valid+0x1db/0x2d0 [ 16.533210] ? kasan_atomics_helper+0xac7/0x5450 [ 16.533232] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.533262] ? kasan_atomics_helper+0xac7/0x5450 [ 16.533285] kasan_report+0x141/0x180 [ 16.533310] ? kasan_atomics_helper+0xac7/0x5450 [ 16.533338] kasan_check_range+0x10c/0x1c0 [ 16.533364] __kasan_check_write+0x18/0x20 [ 16.533386] kasan_atomics_helper+0xac7/0x5450 [ 16.533411] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.533435] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.533463] ? kasan_atomics+0x152/0x310 [ 16.533492] kasan_atomics+0x1dc/0x310 [ 16.533517] ? __pfx_kasan_atomics+0x10/0x10 [ 16.533548] ? __pfx_read_tsc+0x10/0x10 [ 16.533571] ? ktime_get_ts64+0x86/0x230 [ 16.533597] kunit_try_run_case+0x1a5/0x480 [ 16.533623] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.533647] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.533673] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.533698] ? __kthread_parkme+0x82/0x180 [ 16.533728] ? preempt_count_sub+0x50/0x80 [ 16.533754] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.533780] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.533804] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.533829] kthread+0x337/0x6f0 [ 16.533850] ? trace_preempt_on+0x20/0xc0 [ 16.533874] ? __pfx_kthread+0x10/0x10 [ 16.533898] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.533920] ? calculate_sigpending+0x7b/0xa0 [ 16.533946] ? __pfx_kthread+0x10/0x10 [ 16.533969] ret_from_fork+0x116/0x1d0 [ 16.533989] ? __pfx_kthread+0x10/0x10 [ 16.534012] ret_from_fork_asm+0x1a/0x30 [ 16.534046] </TASK> [ 16.534067] [ 16.547040] Allocated by task 282: [ 16.547417] kasan_save_stack+0x45/0x70 [ 16.547815] kasan_save_track+0x18/0x40 [ 16.548209] kasan_save_alloc_info+0x3b/0x50 [ 16.548514] __kasan_kmalloc+0xb7/0xc0 [ 16.548655] __kmalloc_cache_noprof+0x189/0x420 [ 16.549032] kasan_atomics+0x95/0x310 [ 16.549408] kunit_try_run_case+0x1a5/0x480 [ 16.549867] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.550433] kthread+0x337/0x6f0 [ 16.550563] ret_from_fork+0x116/0x1d0 [ 16.550701] ret_from_fork_asm+0x1a/0x30 [ 16.551115] [ 16.551289] The buggy address belongs to the object at ffff8881031d0c00 [ 16.551289] which belongs to the cache kmalloc-64 of size 64 [ 16.552425] The buggy address is located 0 bytes to the right of [ 16.552425] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 16.553239] [ 16.553318] The buggy address belongs to the physical page: [ 16.553501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 16.553776] flags: 0x200000000000000(node=0|zone=2) [ 16.553950] page_type: f5(slab) [ 16.554087] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.554327] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.554563] page dumped because: kasan: bad access detected [ 16.554765] [ 16.554936] Memory state around the buggy address: [ 16.555380] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.556113] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.557262] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.557871] ^ [ 16.558297] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.558826] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.559956] ================================================================== [ 16.805559] ================================================================== [ 16.806234] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 16.806613] Read of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 16.806860] [ 16.806950] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.806993] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.807007] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.807029] Call Trace: [ 16.807045] <TASK> [ 16.807075] dump_stack_lvl+0x73/0xb0 [ 16.807127] print_report+0xd1/0x650 [ 16.807152] ? __virt_addr_valid+0x1db/0x2d0 [ 16.807176] ? kasan_atomics_helper+0x4a1c/0x5450 [ 16.807211] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.807239] ? kasan_atomics_helper+0x4a1c/0x5450 [ 16.807262] kasan_report+0x141/0x180 [ 16.807286] ? kasan_atomics_helper+0x4a1c/0x5450 [ 16.807315] __asan_report_load4_noabort+0x18/0x20 [ 16.807342] kasan_atomics_helper+0x4a1c/0x5450 [ 16.807367] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.807391] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.807417] ? kasan_atomics+0x152/0x310 [ 16.807446] kasan_atomics+0x1dc/0x310 [ 16.807470] ? __pfx_kasan_atomics+0x10/0x10 [ 16.807495] ? __pfx_read_tsc+0x10/0x10 [ 16.807517] ? ktime_get_ts64+0x86/0x230 [ 16.807553] kunit_try_run_case+0x1a5/0x480 [ 16.807578] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.807611] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.807636] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.807660] ? __kthread_parkme+0x82/0x180 [ 16.807681] ? preempt_count_sub+0x50/0x80 [ 16.807707] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.807749] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.807773] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.807797] kthread+0x337/0x6f0 [ 16.807817] ? trace_preempt_on+0x20/0xc0 [ 16.807842] ? __pfx_kthread+0x10/0x10 [ 16.807864] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.807886] ? calculate_sigpending+0x7b/0xa0 [ 16.807911] ? __pfx_kthread+0x10/0x10 [ 16.807933] ret_from_fork+0x116/0x1d0 [ 16.807953] ? __pfx_kthread+0x10/0x10 [ 16.807974] ret_from_fork_asm+0x1a/0x30 [ 16.808007] </TASK> [ 16.808019] [ 16.816874] Allocated by task 282: [ 16.817021] kasan_save_stack+0x45/0x70 [ 16.817365] kasan_save_track+0x18/0x40 [ 16.817583] kasan_save_alloc_info+0x3b/0x50 [ 16.817860] __kasan_kmalloc+0xb7/0xc0 [ 16.818020] __kmalloc_cache_noprof+0x189/0x420 [ 16.818205] kasan_atomics+0x95/0x310 [ 16.818349] kunit_try_run_case+0x1a5/0x480 [ 16.818502] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.818685] kthread+0x337/0x6f0 [ 16.818836] ret_from_fork+0x116/0x1d0 [ 16.818976] ret_from_fork_asm+0x1a/0x30 [ 16.819135] [ 16.819214] The buggy address belongs to the object at ffff8881031d0c00 [ 16.819214] which belongs to the cache kmalloc-64 of size 64 [ 16.820485] The buggy address is located 0 bytes to the right of [ 16.820485] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 16.820901] [ 16.820997] The buggy address belongs to the physical page: [ 16.821258] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 16.821802] flags: 0x200000000000000(node=0|zone=2) [ 16.822011] page_type: f5(slab) [ 16.822200] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.822582] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.822959] page dumped because: kasan: bad access detected [ 16.823240] [ 16.823318] Memory state around the buggy address: [ 16.823533] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.823913] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.824268] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.824625] ^ [ 16.824897] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.825272] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.825616] ================================================================== [ 16.094822] ================================================================== [ 16.095708] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 16.096318] Read of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 16.096665] [ 16.097011] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.097073] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.097086] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.097339] Call Trace: [ 16.097359] <TASK> [ 16.097376] dump_stack_lvl+0x73/0xb0 [ 16.097406] print_report+0xd1/0x650 [ 16.097430] ? __virt_addr_valid+0x1db/0x2d0 [ 16.097452] ? kasan_atomics_helper+0x4bbc/0x5450 [ 16.097473] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.097499] ? kasan_atomics_helper+0x4bbc/0x5450 [ 16.097520] kasan_report+0x141/0x180 [ 16.097548] ? kasan_atomics_helper+0x4bbc/0x5450 [ 16.097574] __asan_report_load4_noabort+0x18/0x20 [ 16.097597] kasan_atomics_helper+0x4bbc/0x5450 [ 16.097619] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.097641] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.097665] ? kasan_atomics+0x152/0x310 [ 16.097692] kasan_atomics+0x1dc/0x310 [ 16.097735] ? __pfx_kasan_atomics+0x10/0x10 [ 16.097759] ? __pfx_read_tsc+0x10/0x10 [ 16.097797] ? ktime_get_ts64+0x86/0x230 [ 16.097820] kunit_try_run_case+0x1a5/0x480 [ 16.097845] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.097865] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.097889] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.097911] ? __kthread_parkme+0x82/0x180 [ 16.097930] ? preempt_count_sub+0x50/0x80 [ 16.097953] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.097976] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.097998] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.098021] kthread+0x337/0x6f0 [ 16.098039] ? trace_preempt_on+0x20/0xc0 [ 16.098072] ? __pfx_kthread+0x10/0x10 [ 16.098092] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.098113] ? calculate_sigpending+0x7b/0xa0 [ 16.098136] ? __pfx_kthread+0x10/0x10 [ 16.098157] ret_from_fork+0x116/0x1d0 [ 16.098174] ? __pfx_kthread+0x10/0x10 [ 16.098194] ret_from_fork_asm+0x1a/0x30 [ 16.098225] </TASK> [ 16.098237] [ 16.111176] Allocated by task 282: [ 16.111355] kasan_save_stack+0x45/0x70 [ 16.111571] kasan_save_track+0x18/0x40 [ 16.112086] kasan_save_alloc_info+0x3b/0x50 [ 16.112306] __kasan_kmalloc+0xb7/0xc0 [ 16.112579] __kmalloc_cache_noprof+0x189/0x420 [ 16.112990] kasan_atomics+0x95/0x310 [ 16.113385] kunit_try_run_case+0x1a5/0x480 [ 16.113598] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.114275] kthread+0x337/0x6f0 [ 16.114468] ret_from_fork+0x116/0x1d0 [ 16.114622] ret_from_fork_asm+0x1a/0x30 [ 16.115113] [ 16.115244] The buggy address belongs to the object at ffff8881031d0c00 [ 16.115244] which belongs to the cache kmalloc-64 of size 64 [ 16.116089] The buggy address is located 0 bytes to the right of [ 16.116089] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 16.116744] [ 16.117060] The buggy address belongs to the physical page: [ 16.117312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 16.117698] flags: 0x200000000000000(node=0|zone=2) [ 16.118490] page_type: f5(slab) [ 16.118663] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.119347] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.119884] page dumped because: kasan: bad access detected [ 16.120230] [ 16.120348] Memory state around the buggy address: [ 16.120623] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.121177] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.121507] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.122118] ^ [ 16.122602] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.123214] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.124070] ================================================================== [ 16.357963] ================================================================== [ 16.358373] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 16.358738] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 16.359083] [ 16.359240] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.359288] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.359302] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.359323] Call Trace: [ 16.359340] <TASK> [ 16.359389] dump_stack_lvl+0x73/0xb0 [ 16.359420] print_report+0xd1/0x650 [ 16.359443] ? __virt_addr_valid+0x1db/0x2d0 [ 16.359466] ? kasan_atomics_helper+0x697/0x5450 [ 16.359488] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.359515] ? kasan_atomics_helper+0x697/0x5450 [ 16.359571] kasan_report+0x141/0x180 [ 16.359597] ? kasan_atomics_helper+0x697/0x5450 [ 16.359624] kasan_check_range+0x10c/0x1c0 [ 16.359650] __kasan_check_write+0x18/0x20 [ 16.359671] kasan_atomics_helper+0x697/0x5450 [ 16.359694] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.359717] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.359744] ? kasan_atomics+0x152/0x310 [ 16.359772] kasan_atomics+0x1dc/0x310 [ 16.359796] ? __pfx_kasan_atomics+0x10/0x10 [ 16.359821] ? __pfx_read_tsc+0x10/0x10 [ 16.359842] ? ktime_get_ts64+0x86/0x230 [ 16.359901] kunit_try_run_case+0x1a5/0x480 [ 16.359926] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.359949] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.359973] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.359997] ? __kthread_parkme+0x82/0x180 [ 16.360018] ? preempt_count_sub+0x50/0x80 [ 16.360080] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.360104] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.360130] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.360153] kthread+0x337/0x6f0 [ 16.360174] ? trace_preempt_on+0x20/0xc0 [ 16.360198] ? __pfx_kthread+0x10/0x10 [ 16.360220] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.360243] ? calculate_sigpending+0x7b/0xa0 [ 16.360267] ? __pfx_kthread+0x10/0x10 [ 16.360290] ret_from_fork+0x116/0x1d0 [ 16.360310] ? __pfx_kthread+0x10/0x10 [ 16.360331] ret_from_fork_asm+0x1a/0x30 [ 16.360363] </TASK> [ 16.360376] [ 16.368555] Allocated by task 282: [ 16.368701] kasan_save_stack+0x45/0x70 [ 16.368946] kasan_save_track+0x18/0x40 [ 16.369162] kasan_save_alloc_info+0x3b/0x50 [ 16.369470] __kasan_kmalloc+0xb7/0xc0 [ 16.369684] __kmalloc_cache_noprof+0x189/0x420 [ 16.369950] kasan_atomics+0x95/0x310 [ 16.370183] kunit_try_run_case+0x1a5/0x480 [ 16.370357] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.370601] kthread+0x337/0x6f0 [ 16.370825] ret_from_fork+0x116/0x1d0 [ 16.370962] ret_from_fork_asm+0x1a/0x30 [ 16.371206] [ 16.371310] The buggy address belongs to the object at ffff8881031d0c00 [ 16.371310] which belongs to the cache kmalloc-64 of size 64 [ 16.371914] The buggy address is located 0 bytes to the right of [ 16.371914] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 16.372496] [ 16.372588] The buggy address belongs to the physical page: [ 16.372857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 16.373202] flags: 0x200000000000000(node=0|zone=2) [ 16.373381] page_type: f5(slab) [ 16.373597] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.374149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.374488] page dumped because: kasan: bad access detected [ 16.374773] [ 16.374862] Memory state around the buggy address: [ 16.375123] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.375467] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.375822] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.376216] ^ [ 16.376484] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.376811] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.377211] ================================================================== [ 17.525863] ================================================================== [ 17.526114] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 17.526345] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 17.526572] [ 17.526659] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.526705] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.526736] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.526758] Call Trace: [ 17.526775] <TASK> [ 17.526792] dump_stack_lvl+0x73/0xb0 [ 17.526820] print_report+0xd1/0x650 [ 17.526843] ? __virt_addr_valid+0x1db/0x2d0 [ 17.526866] ? kasan_atomics_helper+0x1e12/0x5450 [ 17.526888] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.526915] ? kasan_atomics_helper+0x1e12/0x5450 [ 17.526938] kasan_report+0x141/0x180 [ 17.526961] ? kasan_atomics_helper+0x1e12/0x5450 [ 17.526990] kasan_check_range+0x10c/0x1c0 [ 17.527015] __kasan_check_write+0x18/0x20 [ 17.527036] kasan_atomics_helper+0x1e12/0x5450 [ 17.527074] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.527098] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.527178] ? kasan_atomics+0x152/0x310 [ 17.527214] kasan_atomics+0x1dc/0x310 [ 17.527249] ? __pfx_kasan_atomics+0x10/0x10 [ 17.527276] ? __pfx_read_tsc+0x10/0x10 [ 17.527297] ? ktime_get_ts64+0x86/0x230 [ 17.527323] kunit_try_run_case+0x1a5/0x480 [ 17.527349] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.527373] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.527398] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.527422] ? __kthread_parkme+0x82/0x180 [ 17.527443] ? preempt_count_sub+0x50/0x80 [ 17.527469] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.527493] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.527517] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.527541] kthread+0x337/0x6f0 [ 17.527561] ? trace_preempt_on+0x20/0xc0 [ 17.527585] ? __pfx_kthread+0x10/0x10 [ 17.527607] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.527628] ? calculate_sigpending+0x7b/0xa0 [ 17.527653] ? __pfx_kthread+0x10/0x10 [ 17.527676] ret_from_fork+0x116/0x1d0 [ 17.527695] ? __pfx_kthread+0x10/0x10 [ 17.527724] ret_from_fork_asm+0x1a/0x30 [ 17.527757] </TASK> [ 17.527769] [ 17.538696] Allocated by task 282: [ 17.539152] kasan_save_stack+0x45/0x70 [ 17.539537] kasan_save_track+0x18/0x40 [ 17.539966] kasan_save_alloc_info+0x3b/0x50 [ 17.540388] __kasan_kmalloc+0xb7/0xc0 [ 17.540808] __kmalloc_cache_noprof+0x189/0x420 [ 17.541254] kasan_atomics+0x95/0x310 [ 17.541619] kunit_try_run_case+0x1a5/0x480 [ 17.541946] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.542379] kthread+0x337/0x6f0 [ 17.542516] ret_from_fork+0x116/0x1d0 [ 17.542660] ret_from_fork_asm+0x1a/0x30 [ 17.543072] [ 17.543267] The buggy address belongs to the object at ffff8881031d0c00 [ 17.543267] which belongs to the cache kmalloc-64 of size 64 [ 17.544421] The buggy address is located 0 bytes to the right of [ 17.544421] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 17.545027] [ 17.545121] The buggy address belongs to the physical page: [ 17.545312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 17.545585] flags: 0x200000000000000(node=0|zone=2) [ 17.545916] page_type: f5(slab) [ 17.546318] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.547070] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.547794] page dumped because: kasan: bad access detected [ 17.548326] [ 17.548512] Memory state around the buggy address: [ 17.548996] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.549701] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.550406] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.550944] ^ [ 17.551193] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.551430] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.551661] ================================================================== [ 17.736946] ================================================================== [ 17.737280] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 17.737627] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 17.737981] [ 17.738110] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.738155] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.738168] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.738191] Call Trace: [ 17.738228] <TASK> [ 17.738244] dump_stack_lvl+0x73/0xb0 [ 17.738272] print_report+0xd1/0x650 [ 17.738294] ? __virt_addr_valid+0x1db/0x2d0 [ 17.738318] ? kasan_atomics_helper+0x218a/0x5450 [ 17.738339] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.738366] ? kasan_atomics_helper+0x218a/0x5450 [ 17.738389] kasan_report+0x141/0x180 [ 17.738411] ? kasan_atomics_helper+0x218a/0x5450 [ 17.738439] kasan_check_range+0x10c/0x1c0 [ 17.738464] __kasan_check_write+0x18/0x20 [ 17.738485] kasan_atomics_helper+0x218a/0x5450 [ 17.738509] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.738532] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.738558] ? kasan_atomics+0x152/0x310 [ 17.738586] kasan_atomics+0x1dc/0x310 [ 17.738610] ? __pfx_kasan_atomics+0x10/0x10 [ 17.738636] ? __pfx_read_tsc+0x10/0x10 [ 17.738657] ? ktime_get_ts64+0x86/0x230 [ 17.738683] kunit_try_run_case+0x1a5/0x480 [ 17.738707] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.738744] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.738790] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.738814] ? __kthread_parkme+0x82/0x180 [ 17.738836] ? preempt_count_sub+0x50/0x80 [ 17.738860] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.738886] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.738909] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.738934] kthread+0x337/0x6f0 [ 17.738955] ? trace_preempt_on+0x20/0xc0 [ 17.738979] ? __pfx_kthread+0x10/0x10 [ 17.739001] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.739024] ? calculate_sigpending+0x7b/0xa0 [ 17.739061] ? __pfx_kthread+0x10/0x10 [ 17.739084] ret_from_fork+0x116/0x1d0 [ 17.739104] ? __pfx_kthread+0x10/0x10 [ 17.739126] ret_from_fork_asm+0x1a/0x30 [ 17.739158] </TASK> [ 17.739171] [ 17.747303] Allocated by task 282: [ 17.747443] kasan_save_stack+0x45/0x70 [ 17.747593] kasan_save_track+0x18/0x40 [ 17.748110] kasan_save_alloc_info+0x3b/0x50 [ 17.748536] __kasan_kmalloc+0xb7/0xc0 [ 17.749578] __kmalloc_cache_noprof+0x189/0x420 [ 17.750246] kasan_atomics+0x95/0x310 [ 17.750843] kunit_try_run_case+0x1a5/0x480 [ 17.751408] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.751614] kthread+0x337/0x6f0 [ 17.751980] ret_from_fork+0x116/0x1d0 [ 17.752483] ret_from_fork_asm+0x1a/0x30 [ 17.753126] [ 17.753317] The buggy address belongs to the object at ffff8881031d0c00 [ 17.753317] which belongs to the cache kmalloc-64 of size 64 [ 17.754282] The buggy address is located 0 bytes to the right of [ 17.754282] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 17.754695] [ 17.755101] The buggy address belongs to the physical page: [ 17.755931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 17.756313] flags: 0x200000000000000(node=0|zone=2) [ 17.756500] page_type: f5(slab) [ 17.756631] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.756891] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.757734] page dumped because: kasan: bad access detected [ 17.758372] [ 17.758650] Memory state around the buggy address: [ 17.759240] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.760084] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.760858] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.761487] ^ [ 17.761671] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.762495] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.763175] ================================================================== [ 16.500259] ================================================================== [ 16.500935] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 16.501629] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 16.502381] [ 16.502600] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.502646] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.502659] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.502708] Call Trace: [ 16.502742] <TASK> [ 16.502759] dump_stack_lvl+0x73/0xb0 [ 16.502801] print_report+0xd1/0x650 [ 16.502824] ? __virt_addr_valid+0x1db/0x2d0 [ 16.502848] ? kasan_atomics_helper+0xa2b/0x5450 [ 16.502881] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.502908] ? kasan_atomics_helper+0xa2b/0x5450 [ 16.502930] kasan_report+0x141/0x180 [ 16.502953] ? kasan_atomics_helper+0xa2b/0x5450 [ 16.502981] kasan_check_range+0x10c/0x1c0 [ 16.503006] __kasan_check_write+0x18/0x20 [ 16.503026] kasan_atomics_helper+0xa2b/0x5450 [ 16.503058] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.503081] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.503106] ? kasan_atomics+0x152/0x310 [ 16.503133] kasan_atomics+0x1dc/0x310 [ 16.503157] ? __pfx_kasan_atomics+0x10/0x10 [ 16.503182] ? __pfx_read_tsc+0x10/0x10 [ 16.503203] ? ktime_get_ts64+0x86/0x230 [ 16.503229] kunit_try_run_case+0x1a5/0x480 [ 16.503253] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.503276] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.503299] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.503323] ? __kthread_parkme+0x82/0x180 [ 16.503343] ? preempt_count_sub+0x50/0x80 [ 16.503368] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.503393] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.503416] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.503440] kthread+0x337/0x6f0 [ 16.503460] ? trace_preempt_on+0x20/0xc0 [ 16.503485] ? __pfx_kthread+0x10/0x10 [ 16.503506] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.503528] ? calculate_sigpending+0x7b/0xa0 [ 16.503552] ? __pfx_kthread+0x10/0x10 [ 16.503574] ret_from_fork+0x116/0x1d0 [ 16.503594] ? __pfx_kthread+0x10/0x10 [ 16.503615] ret_from_fork_asm+0x1a/0x30 [ 16.503647] </TASK> [ 16.503659] [ 16.516807] Allocated by task 282: [ 16.517076] kasan_save_stack+0x45/0x70 [ 16.517433] kasan_save_track+0x18/0x40 [ 16.517579] kasan_save_alloc_info+0x3b/0x50 [ 16.517785] __kasan_kmalloc+0xb7/0xc0 [ 16.518211] __kmalloc_cache_noprof+0x189/0x420 [ 16.518656] kasan_atomics+0x95/0x310 [ 16.519067] kunit_try_run_case+0x1a5/0x480 [ 16.519370] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.519552] kthread+0x337/0x6f0 [ 16.519677] ret_from_fork+0x116/0x1d0 [ 16.520100] ret_from_fork_asm+0x1a/0x30 [ 16.520499] [ 16.520658] The buggy address belongs to the object at ffff8881031d0c00 [ 16.520658] which belongs to the cache kmalloc-64 of size 64 [ 16.521650] The buggy address is located 0 bytes to the right of [ 16.521650] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 16.522625] [ 16.522709] The buggy address belongs to the physical page: [ 16.523302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 16.523675] flags: 0x200000000000000(node=0|zone=2) [ 16.524187] page_type: f5(slab) [ 16.524529] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.525086] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.525332] page dumped because: kasan: bad access detected [ 16.525516] [ 16.525596] Memory state around the buggy address: [ 16.525894] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.526568] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.527261] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.527946] ^ [ 16.528438] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.529073] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.529512] ================================================================== [ 17.123259] ================================================================== [ 17.123605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 17.124458] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 17.125304] [ 17.125526] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.125573] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.125587] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.125609] Call Trace: [ 17.125624] <TASK> [ 17.125660] dump_stack_lvl+0x73/0xb0 [ 17.125690] print_report+0xd1/0x650 [ 17.125734] ? __virt_addr_valid+0x1db/0x2d0 [ 17.125757] ? kasan_atomics_helper+0x151d/0x5450 [ 17.125779] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.125806] ? kasan_atomics_helper+0x151d/0x5450 [ 17.125828] kasan_report+0x141/0x180 [ 17.125851] ? kasan_atomics_helper+0x151d/0x5450 [ 17.125879] kasan_check_range+0x10c/0x1c0 [ 17.125904] __kasan_check_write+0x18/0x20 [ 17.125923] kasan_atomics_helper+0x151d/0x5450 [ 17.125946] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.125969] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.125995] ? kasan_atomics+0x152/0x310 [ 17.126022] kasan_atomics+0x1dc/0x310 [ 17.126056] ? __pfx_kasan_atomics+0x10/0x10 [ 17.126081] ? __pfx_read_tsc+0x10/0x10 [ 17.126103] ? ktime_get_ts64+0x86/0x230 [ 17.126129] kunit_try_run_case+0x1a5/0x480 [ 17.126154] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.126177] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.126201] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.126226] ? __kthread_parkme+0x82/0x180 [ 17.126246] ? preempt_count_sub+0x50/0x80 [ 17.126271] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.126296] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.126320] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.126344] kthread+0x337/0x6f0 [ 17.126364] ? trace_preempt_on+0x20/0xc0 [ 17.126388] ? __pfx_kthread+0x10/0x10 [ 17.126410] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.126432] ? calculate_sigpending+0x7b/0xa0 [ 17.126459] ? __pfx_kthread+0x10/0x10 [ 17.126481] ret_from_fork+0x116/0x1d0 [ 17.126500] ? __pfx_kthread+0x10/0x10 [ 17.126521] ret_from_fork_asm+0x1a/0x30 [ 17.126555] </TASK> [ 17.126567] [ 17.138679] Allocated by task 282: [ 17.139069] kasan_save_stack+0x45/0x70 [ 17.139475] kasan_save_track+0x18/0x40 [ 17.139887] kasan_save_alloc_info+0x3b/0x50 [ 17.140319] __kasan_kmalloc+0xb7/0xc0 [ 17.140697] __kmalloc_cache_noprof+0x189/0x420 [ 17.141182] kasan_atomics+0x95/0x310 [ 17.141564] kunit_try_run_case+0x1a5/0x480 [ 17.142010] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.142464] kthread+0x337/0x6f0 [ 17.142599] ret_from_fork+0x116/0x1d0 [ 17.142820] ret_from_fork_asm+0x1a/0x30 [ 17.143236] [ 17.143440] The buggy address belongs to the object at ffff8881031d0c00 [ 17.143440] which belongs to the cache kmalloc-64 of size 64 [ 17.144451] The buggy address is located 0 bytes to the right of [ 17.144451] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 17.145204] [ 17.145379] The buggy address belongs to the physical page: [ 17.145942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 17.146548] flags: 0x200000000000000(node=0|zone=2) [ 17.146780] page_type: f5(slab) [ 17.147123] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.147856] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.148230] page dumped because: kasan: bad access detected [ 17.148418] [ 17.148496] Memory state around the buggy address: [ 17.148671] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.149372] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.150080] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.150767] ^ [ 17.151238] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.151935] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.152272] ================================================================== [ 16.191810] ================================================================== [ 16.192620] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 16.193489] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 16.194402] [ 16.194601] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.194677] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.194691] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.194713] Call Trace: [ 16.194727] <TASK> [ 16.194746] dump_stack_lvl+0x73/0xb0 [ 16.194775] print_report+0xd1/0x650 [ 16.194799] ? __virt_addr_valid+0x1db/0x2d0 [ 16.194821] ? kasan_atomics_helper+0x4b6e/0x5450 [ 16.194844] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.194872] ? kasan_atomics_helper+0x4b6e/0x5450 [ 16.194894] kasan_report+0x141/0x180 [ 16.194918] ? kasan_atomics_helper+0x4b6e/0x5450 [ 16.194946] __asan_report_store4_noabort+0x1b/0x30 [ 16.194972] kasan_atomics_helper+0x4b6e/0x5450 [ 16.194997] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.195020] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.195046] ? kasan_atomics+0x152/0x310 [ 16.195090] kasan_atomics+0x1dc/0x310 [ 16.195113] ? __pfx_kasan_atomics+0x10/0x10 [ 16.195139] ? __pfx_read_tsc+0x10/0x10 [ 16.195187] ? ktime_get_ts64+0x86/0x230 [ 16.195212] kunit_try_run_case+0x1a5/0x480 [ 16.195238] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.195262] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.195287] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.195312] ? __kthread_parkme+0x82/0x180 [ 16.195335] ? preempt_count_sub+0x50/0x80 [ 16.195361] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.195386] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.195410] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.195435] kthread+0x337/0x6f0 [ 16.195456] ? trace_preempt_on+0x20/0xc0 [ 16.195481] ? __pfx_kthread+0x10/0x10 [ 16.195503] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.195525] ? calculate_sigpending+0x7b/0xa0 [ 16.195551] ? __pfx_kthread+0x10/0x10 [ 16.195574] ret_from_fork+0x116/0x1d0 [ 16.195593] ? __pfx_kthread+0x10/0x10 [ 16.195615] ret_from_fork_asm+0x1a/0x30 [ 16.195649] </TASK> [ 16.195662] [ 16.203619] Allocated by task 282: [ 16.203915] kasan_save_stack+0x45/0x70 [ 16.204149] kasan_save_track+0x18/0x40 [ 16.204369] kasan_save_alloc_info+0x3b/0x50 [ 16.204561] __kasan_kmalloc+0xb7/0xc0 [ 16.204754] __kmalloc_cache_noprof+0x189/0x420 [ 16.205093] kasan_atomics+0x95/0x310 [ 16.205294] kunit_try_run_case+0x1a5/0x480 [ 16.205562] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.205827] kthread+0x337/0x6f0 [ 16.206000] ret_from_fork+0x116/0x1d0 [ 16.206213] ret_from_fork_asm+0x1a/0x30 [ 16.206413] [ 16.206492] The buggy address belongs to the object at ffff8881031d0c00 [ 16.206492] which belongs to the cache kmalloc-64 of size 64 [ 16.207067] The buggy address is located 0 bytes to the right of [ 16.207067] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 16.207716] [ 16.207796] The buggy address belongs to the physical page: [ 16.207972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 16.208469] flags: 0x200000000000000(node=0|zone=2) [ 16.208727] page_type: f5(slab) [ 16.209023] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.209419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.209713] page dumped because: kasan: bad access detected [ 16.209942] [ 16.210044] Memory state around the buggy address: [ 16.210297] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.210619] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.211125] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.211475] ^ [ 16.211703] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.212097] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.212424] ================================================================== [ 17.014102] ================================================================== [ 17.014949] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 17.015690] Read of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 17.016431] [ 17.016565] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.016609] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.016623] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.016645] Call Trace: [ 17.016674] <TASK> [ 17.016692] dump_stack_lvl+0x73/0xb0 [ 17.016720] print_report+0xd1/0x650 [ 17.016764] ? __virt_addr_valid+0x1db/0x2d0 [ 17.016788] ? kasan_atomics_helper+0x13b5/0x5450 [ 17.016810] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.016837] ? kasan_atomics_helper+0x13b5/0x5450 [ 17.016860] kasan_report+0x141/0x180 [ 17.016883] ? kasan_atomics_helper+0x13b5/0x5450 [ 17.016920] kasan_check_range+0x10c/0x1c0 [ 17.016945] __kasan_check_read+0x15/0x20 [ 17.016966] kasan_atomics_helper+0x13b5/0x5450 [ 17.017004] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.017031] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.017065] ? kasan_atomics+0x152/0x310 [ 17.017093] kasan_atomics+0x1dc/0x310 [ 17.017118] ? __pfx_kasan_atomics+0x10/0x10 [ 17.017143] ? __pfx_read_tsc+0x10/0x10 [ 17.017166] ? ktime_get_ts64+0x86/0x230 [ 17.017192] kunit_try_run_case+0x1a5/0x480 [ 17.017218] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.017241] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.017265] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.017290] ? __kthread_parkme+0x82/0x180 [ 17.017311] ? preempt_count_sub+0x50/0x80 [ 17.017336] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.017361] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.017384] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.017408] kthread+0x337/0x6f0 [ 17.017429] ? trace_preempt_on+0x20/0xc0 [ 17.017453] ? __pfx_kthread+0x10/0x10 [ 17.017475] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.017496] ? calculate_sigpending+0x7b/0xa0 [ 17.017520] ? __pfx_kthread+0x10/0x10 [ 17.017546] ret_from_fork+0x116/0x1d0 [ 17.017566] ? __pfx_kthread+0x10/0x10 [ 17.017587] ret_from_fork_asm+0x1a/0x30 [ 17.017619] </TASK> [ 17.017632] [ 17.029738] Allocated by task 282: [ 17.030131] kasan_save_stack+0x45/0x70 [ 17.030532] kasan_save_track+0x18/0x40 [ 17.030953] kasan_save_alloc_info+0x3b/0x50 [ 17.031394] __kasan_kmalloc+0xb7/0xc0 [ 17.031785] __kmalloc_cache_noprof+0x189/0x420 [ 17.032244] kasan_atomics+0x95/0x310 [ 17.032630] kunit_try_run_case+0x1a5/0x480 [ 17.033170] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.033632] kthread+0x337/0x6f0 [ 17.033798] ret_from_fork+0x116/0x1d0 [ 17.034122] ret_from_fork_asm+0x1a/0x30 [ 17.034449] [ 17.034529] The buggy address belongs to the object at ffff8881031d0c00 [ 17.034529] which belongs to the cache kmalloc-64 of size 64 [ 17.035145] The buggy address is located 0 bytes to the right of [ 17.035145] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 17.035762] [ 17.035962] The buggy address belongs to the physical page: [ 17.036508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 17.037320] flags: 0x200000000000000(node=0|zone=2) [ 17.037616] page_type: f5(slab) [ 17.037999] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.038482] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.038742] page dumped because: kasan: bad access detected [ 17.039278] [ 17.039446] Memory state around the buggy address: [ 17.039957] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.040631] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.041043] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.041290] ^ [ 17.041463] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.041706] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.042371] ================================================================== [ 16.276484] ================================================================== [ 16.277561] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 16.278097] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 16.278618] [ 16.278737] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.278784] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.278799] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.278822] Call Trace: [ 16.278840] <TASK> [ 16.278858] dump_stack_lvl+0x73/0xb0 [ 16.278888] print_report+0xd1/0x650 [ 16.278912] ? __virt_addr_valid+0x1db/0x2d0 [ 16.278936] ? kasan_atomics_helper+0x4b3a/0x5450 [ 16.278959] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.278986] ? kasan_atomics_helper+0x4b3a/0x5450 [ 16.279011] kasan_report+0x141/0x180 [ 16.279035] ? kasan_atomics_helper+0x4b3a/0x5450 [ 16.279076] __asan_report_store4_noabort+0x1b/0x30 [ 16.279102] kasan_atomics_helper+0x4b3a/0x5450 [ 16.279127] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.279151] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.279177] ? kasan_atomics+0x152/0x310 [ 16.279206] kasan_atomics+0x1dc/0x310 [ 16.279232] ? __pfx_kasan_atomics+0x10/0x10 [ 16.279258] ? __pfx_read_tsc+0x10/0x10 [ 16.279281] ? ktime_get_ts64+0x86/0x230 [ 16.279307] kunit_try_run_case+0x1a5/0x480 [ 16.279333] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.279356] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.279381] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.279406] ? __kthread_parkme+0x82/0x180 [ 16.279428] ? preempt_count_sub+0x50/0x80 [ 16.279454] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.279479] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.279503] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.279528] kthread+0x337/0x6f0 [ 16.279549] ? trace_preempt_on+0x20/0xc0 [ 16.279574] ? __pfx_kthread+0x10/0x10 [ 16.279596] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.279618] ? calculate_sigpending+0x7b/0xa0 [ 16.279644] ? __pfx_kthread+0x10/0x10 [ 16.279668] ret_from_fork+0x116/0x1d0 [ 16.279687] ? __pfx_kthread+0x10/0x10 [ 16.279710] ret_from_fork_asm+0x1a/0x30 [ 16.279743] </TASK> [ 16.279756] [ 16.291417] Allocated by task 282: [ 16.291605] kasan_save_stack+0x45/0x70 [ 16.292097] kasan_save_track+0x18/0x40 [ 16.292754] kasan_save_alloc_info+0x3b/0x50 [ 16.292932] __kasan_kmalloc+0xb7/0xc0 [ 16.293118] __kmalloc_cache_noprof+0x189/0x420 [ 16.293502] kasan_atomics+0x95/0x310 [ 16.293658] kunit_try_run_case+0x1a5/0x480 [ 16.294029] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.294574] kthread+0x337/0x6f0 [ 16.294955] ret_from_fork+0x116/0x1d0 [ 16.295201] ret_from_fork_asm+0x1a/0x30 [ 16.295354] [ 16.295435] The buggy address belongs to the object at ffff8881031d0c00 [ 16.295435] which belongs to the cache kmalloc-64 of size 64 [ 16.295820] The buggy address is located 0 bytes to the right of [ 16.295820] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 16.296224] [ 16.296303] The buggy address belongs to the physical page: [ 16.296488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 16.296743] flags: 0x200000000000000(node=0|zone=2) [ 16.296917] page_type: f5(slab) [ 16.297046] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.297725] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.298377] page dumped because: kasan: bad access detected [ 16.298918] [ 16.299585] Memory state around the buggy address: [ 16.300639] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.301865] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.302825] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.303545] ^ [ 16.303729] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.303951] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.304219] ================================================================== [ 17.270258] ================================================================== [ 17.270549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 17.271267] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 17.272072] [ 17.272252] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.272298] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.272312] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.272335] Call Trace: [ 17.272352] <TASK> [ 17.272371] dump_stack_lvl+0x73/0xb0 [ 17.272400] print_report+0xd1/0x650 [ 17.272436] ? __virt_addr_valid+0x1db/0x2d0 [ 17.272460] ? kasan_atomics_helper+0x1818/0x5450 [ 17.272482] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.272508] ? kasan_atomics_helper+0x1818/0x5450 [ 17.272531] kasan_report+0x141/0x180 [ 17.272554] ? kasan_atomics_helper+0x1818/0x5450 [ 17.272583] kasan_check_range+0x10c/0x1c0 [ 17.272607] __kasan_check_write+0x18/0x20 [ 17.272627] kasan_atomics_helper+0x1818/0x5450 [ 17.272651] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.272674] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.272700] ? kasan_atomics+0x152/0x310 [ 17.272728] kasan_atomics+0x1dc/0x310 [ 17.272763] ? __pfx_kasan_atomics+0x10/0x10 [ 17.272788] ? __pfx_read_tsc+0x10/0x10 [ 17.272810] ? ktime_get_ts64+0x86/0x230 [ 17.272836] kunit_try_run_case+0x1a5/0x480 [ 17.272860] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.272882] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.272907] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.272930] ? __kthread_parkme+0x82/0x180 [ 17.272952] ? preempt_count_sub+0x50/0x80 [ 17.272976] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.273000] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.273023] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.273057] kthread+0x337/0x6f0 [ 17.273078] ? trace_preempt_on+0x20/0xc0 [ 17.273100] ? __pfx_kthread+0x10/0x10 [ 17.273122] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.273143] ? calculate_sigpending+0x7b/0xa0 [ 17.273167] ? __pfx_kthread+0x10/0x10 [ 17.273191] ret_from_fork+0x116/0x1d0 [ 17.273209] ? __pfx_kthread+0x10/0x10 [ 17.273230] ret_from_fork_asm+0x1a/0x30 [ 17.273262] </TASK> [ 17.273276] [ 17.281223] Allocated by task 282: [ 17.281416] kasan_save_stack+0x45/0x70 [ 17.281634] kasan_save_track+0x18/0x40 [ 17.281854] kasan_save_alloc_info+0x3b/0x50 [ 17.282098] __kasan_kmalloc+0xb7/0xc0 [ 17.282295] __kmalloc_cache_noprof+0x189/0x420 [ 17.282478] kasan_atomics+0x95/0x310 [ 17.282622] kunit_try_run_case+0x1a5/0x480 [ 17.282790] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.283090] kthread+0x337/0x6f0 [ 17.283268] ret_from_fork+0x116/0x1d0 [ 17.283521] ret_from_fork_asm+0x1a/0x30 [ 17.283714] [ 17.283820] The buggy address belongs to the object at ffff8881031d0c00 [ 17.283820] which belongs to the cache kmalloc-64 of size 64 [ 17.284362] The buggy address is located 0 bytes to the right of [ 17.284362] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 17.284912] [ 17.285019] The buggy address belongs to the physical page: [ 17.285306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 17.285638] flags: 0x200000000000000(node=0|zone=2) [ 17.285884] page_type: f5(slab) [ 17.286060] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.286403] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.286657] page dumped because: kasan: bad access detected [ 17.286903] [ 17.287010] Memory state around the buggy address: [ 17.287276] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.287615] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.288111] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.288404] ^ [ 17.288592] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.288982] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.289308] ================================================================== [ 16.863310] ================================================================== [ 16.863565] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 16.863980] Read of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 16.864662] [ 16.864857] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.864903] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.864917] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.864940] Call Trace: [ 16.864959] <TASK> [ 16.864977] dump_stack_lvl+0x73/0xb0 [ 16.865015] print_report+0xd1/0x650 [ 16.865039] ? __virt_addr_valid+0x1db/0x2d0 [ 16.865080] ? kasan_atomics_helper+0x4a02/0x5450 [ 16.865103] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.865130] ? kasan_atomics_helper+0x4a02/0x5450 [ 16.865152] kasan_report+0x141/0x180 [ 16.865176] ? kasan_atomics_helper+0x4a02/0x5450 [ 16.865204] __asan_report_load4_noabort+0x18/0x20 [ 16.865228] kasan_atomics_helper+0x4a02/0x5450 [ 16.865252] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.865275] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.865300] ? kasan_atomics+0x152/0x310 [ 16.865328] kasan_atomics+0x1dc/0x310 [ 16.865364] ? __pfx_kasan_atomics+0x10/0x10 [ 16.865390] ? __pfx_read_tsc+0x10/0x10 [ 16.865412] ? ktime_get_ts64+0x86/0x230 [ 16.865437] kunit_try_run_case+0x1a5/0x480 [ 16.865462] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.865486] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.865510] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.865540] ? __kthread_parkme+0x82/0x180 [ 16.865561] ? preempt_count_sub+0x50/0x80 [ 16.865586] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.865610] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.865633] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.865657] kthread+0x337/0x6f0 [ 16.865677] ? trace_preempt_on+0x20/0xc0 [ 16.865702] ? __pfx_kthread+0x10/0x10 [ 16.865724] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.865745] ? calculate_sigpending+0x7b/0xa0 [ 16.865770] ? __pfx_kthread+0x10/0x10 [ 16.865792] ret_from_fork+0x116/0x1d0 [ 16.865811] ? __pfx_kthread+0x10/0x10 [ 16.865832] ret_from_fork_asm+0x1a/0x30 [ 16.865864] </TASK> [ 16.865877] [ 16.880194] Allocated by task 282: [ 16.880547] kasan_save_stack+0x45/0x70 [ 16.880971] kasan_save_track+0x18/0x40 [ 16.881248] kasan_save_alloc_info+0x3b/0x50 [ 16.881590] __kasan_kmalloc+0xb7/0xc0 [ 16.881741] __kmalloc_cache_noprof+0x189/0x420 [ 16.882198] kasan_atomics+0x95/0x310 [ 16.882572] kunit_try_run_case+0x1a5/0x480 [ 16.883072] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.883261] kthread+0x337/0x6f0 [ 16.883392] ret_from_fork+0x116/0x1d0 [ 16.883533] ret_from_fork_asm+0x1a/0x30 [ 16.883683] [ 16.883820] The buggy address belongs to the object at ffff8881031d0c00 [ 16.883820] which belongs to the cache kmalloc-64 of size 64 [ 16.884965] The buggy address is located 0 bytes to the right of [ 16.884965] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 16.886221] [ 16.886401] The buggy address belongs to the physical page: [ 16.887010] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 16.887889] flags: 0x200000000000000(node=0|zone=2) [ 16.888289] page_type: f5(slab) [ 16.888422] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.888672] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.889338] page dumped because: kasan: bad access detected [ 16.889921] [ 16.890127] Memory state around the buggy address: [ 16.890588] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.891325] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.892057] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.892291] ^ [ 16.892461] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.892692] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.893003] ================================================================== [ 16.377640] ================================================================== [ 16.377890] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 16.378334] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 16.378634] [ 16.378724] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.378770] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.378783] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.378806] Call Trace: [ 16.378821] <TASK> [ 16.378838] dump_stack_lvl+0x73/0xb0 [ 16.378866] print_report+0xd1/0x650 [ 16.378890] ? __virt_addr_valid+0x1db/0x2d0 [ 16.378913] ? kasan_atomics_helper+0x72f/0x5450 [ 16.378936] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.378963] ? kasan_atomics_helper+0x72f/0x5450 [ 16.378986] kasan_report+0x141/0x180 [ 16.379010] ? kasan_atomics_helper+0x72f/0x5450 [ 16.379040] kasan_check_range+0x10c/0x1c0 [ 16.379077] __kasan_check_write+0x18/0x20 [ 16.379098] kasan_atomics_helper+0x72f/0x5450 [ 16.379122] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.379147] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.379174] ? kasan_atomics+0x152/0x310 [ 16.379202] kasan_atomics+0x1dc/0x310 [ 16.379227] ? __pfx_kasan_atomics+0x10/0x10 [ 16.379269] ? __pfx_read_tsc+0x10/0x10 [ 16.379333] ? ktime_get_ts64+0x86/0x230 [ 16.379387] kunit_try_run_case+0x1a5/0x480 [ 16.379414] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.379486] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.379511] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.379536] ? __kthread_parkme+0x82/0x180 [ 16.379608] ? preempt_count_sub+0x50/0x80 [ 16.379659] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.379686] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.379710] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.379736] kthread+0x337/0x6f0 [ 16.379756] ? trace_preempt_on+0x20/0xc0 [ 16.379782] ? __pfx_kthread+0x10/0x10 [ 16.379805] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.379828] ? calculate_sigpending+0x7b/0xa0 [ 16.379853] ? __pfx_kthread+0x10/0x10 [ 16.379877] ret_from_fork+0x116/0x1d0 [ 16.379897] ? __pfx_kthread+0x10/0x10 [ 16.379919] ret_from_fork_asm+0x1a/0x30 [ 16.379954] </TASK> [ 16.379968] [ 16.388755] Allocated by task 282: [ 16.388898] kasan_save_stack+0x45/0x70 [ 16.389135] kasan_save_track+0x18/0x40 [ 16.389378] kasan_save_alloc_info+0x3b/0x50 [ 16.389642] __kasan_kmalloc+0xb7/0xc0 [ 16.389845] __kmalloc_cache_noprof+0x189/0x420 [ 16.390362] kasan_atomics+0x95/0x310 [ 16.390664] kunit_try_run_case+0x1a5/0x480 [ 16.391103] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.391410] kthread+0x337/0x6f0 [ 16.391614] ret_from_fork+0x116/0x1d0 [ 16.391836] ret_from_fork_asm+0x1a/0x30 [ 16.392106] [ 16.392209] The buggy address belongs to the object at ffff8881031d0c00 [ 16.392209] which belongs to the cache kmalloc-64 of size 64 [ 16.392666] The buggy address is located 0 bytes to the right of [ 16.392666] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 16.393202] [ 16.393306] The buggy address belongs to the physical page: [ 16.393631] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 16.393932] flags: 0x200000000000000(node=0|zone=2) [ 16.394117] page_type: f5(slab) [ 16.394251] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.394598] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.395151] page dumped because: kasan: bad access detected [ 16.395492] [ 16.395593] Memory state around the buggy address: [ 16.395997] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.396349] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.396721] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.397038] ^ [ 16.397213] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.397556] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.397947] ================================================================== [ 17.152975] ================================================================== [ 17.153661] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 17.154373] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 17.155114] [ 17.155319] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.155366] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.155380] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.155402] Call Trace: [ 17.155418] <TASK> [ 17.155435] dump_stack_lvl+0x73/0xb0 [ 17.155462] print_report+0xd1/0x650 [ 17.155486] ? __virt_addr_valid+0x1db/0x2d0 [ 17.155510] ? kasan_atomics_helper+0x15b6/0x5450 [ 17.155531] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.155558] ? kasan_atomics_helper+0x15b6/0x5450 [ 17.155580] kasan_report+0x141/0x180 [ 17.155623] ? kasan_atomics_helper+0x15b6/0x5450 [ 17.155651] kasan_check_range+0x10c/0x1c0 [ 17.155675] __kasan_check_write+0x18/0x20 [ 17.155696] kasan_atomics_helper+0x15b6/0x5450 [ 17.155741] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.155764] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.155791] ? kasan_atomics+0x152/0x310 [ 17.155819] kasan_atomics+0x1dc/0x310 [ 17.155843] ? __pfx_kasan_atomics+0x10/0x10 [ 17.155868] ? __pfx_read_tsc+0x10/0x10 [ 17.155890] ? ktime_get_ts64+0x86/0x230 [ 17.155916] kunit_try_run_case+0x1a5/0x480 [ 17.155942] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.155964] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.155988] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.156013] ? __kthread_parkme+0x82/0x180 [ 17.156034] ? preempt_count_sub+0x50/0x80 [ 17.156069] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.156095] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.156120] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.156144] kthread+0x337/0x6f0 [ 17.156165] ? trace_preempt_on+0x20/0xc0 [ 17.156190] ? __pfx_kthread+0x10/0x10 [ 17.156212] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.156234] ? calculate_sigpending+0x7b/0xa0 [ 17.156258] ? __pfx_kthread+0x10/0x10 [ 17.156282] ret_from_fork+0x116/0x1d0 [ 17.156302] ? __pfx_kthread+0x10/0x10 [ 17.156325] ret_from_fork_asm+0x1a/0x30 [ 17.156357] </TASK> [ 17.156371] [ 17.168701] Allocated by task 282: [ 17.169055] kasan_save_stack+0x45/0x70 [ 17.169423] kasan_save_track+0x18/0x40 [ 17.169808] kasan_save_alloc_info+0x3b/0x50 [ 17.170213] __kasan_kmalloc+0xb7/0xc0 [ 17.170554] __kmalloc_cache_noprof+0x189/0x420 [ 17.170738] kasan_atomics+0x95/0x310 [ 17.171104] kunit_try_run_case+0x1a5/0x480 [ 17.171487] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.171784] kthread+0x337/0x6f0 [ 17.171913] ret_from_fork+0x116/0x1d0 [ 17.172058] ret_from_fork_asm+0x1a/0x30 [ 17.172421] [ 17.172585] The buggy address belongs to the object at ffff8881031d0c00 [ 17.172585] which belongs to the cache kmalloc-64 of size 64 [ 17.173649] The buggy address is located 0 bytes to the right of [ 17.173649] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 17.174330] [ 17.174407] The buggy address belongs to the physical page: [ 17.174588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 17.175008] flags: 0x200000000000000(node=0|zone=2) [ 17.175452] page_type: f5(slab) [ 17.175773] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.176724] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.177508] page dumped because: kasan: bad access detected [ 17.178011] [ 17.178184] Memory state around the buggy address: [ 17.178619] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.178909] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.179148] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.179374] ^ [ 17.179541] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.179786] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.180063] ================================================================== [ 17.043404] ================================================================== [ 17.044118] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 17.044852] Read of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 17.045587] [ 17.045817] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.045865] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.045879] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.045902] Call Trace: [ 17.045918] <TASK> [ 17.045934] dump_stack_lvl+0x73/0xb0 [ 17.045962] print_report+0xd1/0x650 [ 17.045986] ? __virt_addr_valid+0x1db/0x2d0 [ 17.046010] ? kasan_atomics_helper+0x4eae/0x5450 [ 17.046032] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.046072] ? kasan_atomics_helper+0x4eae/0x5450 [ 17.046096] kasan_report+0x141/0x180 [ 17.046120] ? kasan_atomics_helper+0x4eae/0x5450 [ 17.046149] __asan_report_load8_noabort+0x18/0x20 [ 17.046175] kasan_atomics_helper+0x4eae/0x5450 [ 17.046200] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.046225] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.046252] ? kasan_atomics+0x152/0x310 [ 17.046282] kasan_atomics+0x1dc/0x310 [ 17.046307] ? __pfx_kasan_atomics+0x10/0x10 [ 17.046334] ? __pfx_read_tsc+0x10/0x10 [ 17.046357] ? ktime_get_ts64+0x86/0x230 [ 17.046384] kunit_try_run_case+0x1a5/0x480 [ 17.046409] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.046432] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.046456] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.046482] ? __kthread_parkme+0x82/0x180 [ 17.046503] ? preempt_count_sub+0x50/0x80 [ 17.046529] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.046554] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.046579] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.046604] kthread+0x337/0x6f0 [ 17.046625] ? trace_preempt_on+0x20/0xc0 [ 17.046650] ? __pfx_kthread+0x10/0x10 [ 17.046673] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.046696] ? calculate_sigpending+0x7b/0xa0 [ 17.046721] ? __pfx_kthread+0x10/0x10 [ 17.046757] ret_from_fork+0x116/0x1d0 [ 17.046778] ? __pfx_kthread+0x10/0x10 [ 17.046799] ret_from_fork_asm+0x1a/0x30 [ 17.046846] </TASK> [ 17.046858] [ 17.059747] Allocated by task 282: [ 17.060067] kasan_save_stack+0x45/0x70 [ 17.060277] kasan_save_track+0x18/0x40 [ 17.060432] kasan_save_alloc_info+0x3b/0x50 [ 17.060650] __kasan_kmalloc+0xb7/0xc0 [ 17.060842] __kmalloc_cache_noprof+0x189/0x420 [ 17.061072] kasan_atomics+0x95/0x310 [ 17.061215] kunit_try_run_case+0x1a5/0x480 [ 17.061431] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.061724] kthread+0x337/0x6f0 [ 17.061925] ret_from_fork+0x116/0x1d0 [ 17.062126] ret_from_fork_asm+0x1a/0x30 [ 17.062320] [ 17.062421] The buggy address belongs to the object at ffff8881031d0c00 [ 17.062421] which belongs to the cache kmalloc-64 of size 64 [ 17.062949] The buggy address is located 0 bytes to the right of [ 17.062949] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 17.063547] [ 17.063642] The buggy address belongs to the physical page: [ 17.063927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 17.064333] flags: 0x200000000000000(node=0|zone=2) [ 17.064629] page_type: f5(slab) [ 17.064803] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.065202] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.065496] page dumped because: kasan: bad access detected [ 17.065753] [ 17.065851] Memory state around the buggy address: [ 17.066084] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.066312] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.066581] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.066955] ^ [ 17.067168] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.067491] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.067858] ================================================================== [ 17.552830] ================================================================== [ 17.553586] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 17.554331] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 17.555058] [ 17.555264] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.555312] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.555325] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.555349] Call Trace: [ 17.555364] <TASK> [ 17.555380] dump_stack_lvl+0x73/0xb0 [ 17.555431] print_report+0xd1/0x650 [ 17.555455] ? __virt_addr_valid+0x1db/0x2d0 [ 17.555478] ? kasan_atomics_helper+0x1eaa/0x5450 [ 17.555501] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.555530] ? kasan_atomics_helper+0x1eaa/0x5450 [ 17.555553] kasan_report+0x141/0x180 [ 17.555578] ? kasan_atomics_helper+0x1eaa/0x5450 [ 17.555607] kasan_check_range+0x10c/0x1c0 [ 17.555632] __kasan_check_write+0x18/0x20 [ 17.555653] kasan_atomics_helper+0x1eaa/0x5450 [ 17.555678] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.555702] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.555750] ? kasan_atomics+0x152/0x310 [ 17.555779] kasan_atomics+0x1dc/0x310 [ 17.555804] ? __pfx_kasan_atomics+0x10/0x10 [ 17.555830] ? __pfx_read_tsc+0x10/0x10 [ 17.555852] ? ktime_get_ts64+0x86/0x230 [ 17.555878] kunit_try_run_case+0x1a5/0x480 [ 17.555904] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.555928] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.555953] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.555980] ? __kthread_parkme+0x82/0x180 [ 17.556005] ? preempt_count_sub+0x50/0x80 [ 17.556032] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.556071] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.556097] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.556122] kthread+0x337/0x6f0 [ 17.556144] ? trace_preempt_on+0x20/0xc0 [ 17.556171] ? __pfx_kthread+0x10/0x10 [ 17.556197] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.556220] ? calculate_sigpending+0x7b/0xa0 [ 17.556246] ? __pfx_kthread+0x10/0x10 [ 17.556270] ret_from_fork+0x116/0x1d0 [ 17.556291] ? __pfx_kthread+0x10/0x10 [ 17.556318] ret_from_fork_asm+0x1a/0x30 [ 17.556353] </TASK> [ 17.556365] [ 17.567406] Allocated by task 282: [ 17.567617] kasan_save_stack+0x45/0x70 [ 17.567822] kasan_save_track+0x18/0x40 [ 17.568031] kasan_save_alloc_info+0x3b/0x50 [ 17.568286] __kasan_kmalloc+0xb7/0xc0 [ 17.568508] __kmalloc_cache_noprof+0x189/0x420 [ 17.568735] kasan_atomics+0x95/0x310 [ 17.568946] kunit_try_run_case+0x1a5/0x480 [ 17.569171] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.569418] kthread+0x337/0x6f0 [ 17.569548] ret_from_fork+0x116/0x1d0 [ 17.569721] ret_from_fork_asm+0x1a/0x30 [ 17.569923] [ 17.570056] The buggy address belongs to the object at ffff8881031d0c00 [ 17.570056] which belongs to the cache kmalloc-64 of size 64 [ 17.570595] The buggy address is located 0 bytes to the right of [ 17.570595] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 17.571170] [ 17.571275] The buggy address belongs to the physical page: [ 17.571535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 17.571965] flags: 0x200000000000000(node=0|zone=2) [ 17.572214] page_type: f5(slab) [ 17.572392] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.572720] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.573162] page dumped because: kasan: bad access detected [ 17.573421] [ 17.573526] Memory state around the buggy address: [ 17.573739] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.573965] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.574549] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.575027] ^ [ 17.575280] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.575569] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.575942] ================================================================== [ 16.305034] ================================================================== [ 16.305959] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 16.307353] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 16.308328] [ 16.308642] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.308693] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.308708] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.308731] Call Trace: [ 16.308748] <TASK> [ 16.308789] dump_stack_lvl+0x73/0xb0 [ 16.308822] print_report+0xd1/0x650 [ 16.308846] ? __virt_addr_valid+0x1db/0x2d0 [ 16.308870] ? kasan_atomics_helper+0x565/0x5450 [ 16.308892] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.308920] ? kasan_atomics_helper+0x565/0x5450 [ 16.308943] kasan_report+0x141/0x180 [ 16.308966] ? kasan_atomics_helper+0x565/0x5450 [ 16.308994] kasan_check_range+0x10c/0x1c0 [ 16.309020] __kasan_check_write+0x18/0x20 [ 16.309040] kasan_atomics_helper+0x565/0x5450 [ 16.309079] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.309103] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.309130] ? kasan_atomics+0x152/0x310 [ 16.309159] kasan_atomics+0x1dc/0x310 [ 16.309183] ? __pfx_kasan_atomics+0x10/0x10 [ 16.309209] ? __pfx_read_tsc+0x10/0x10 [ 16.309231] ? ktime_get_ts64+0x86/0x230 [ 16.309258] kunit_try_run_case+0x1a5/0x480 [ 16.309283] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.309307] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.309333] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.309357] ? __kthread_parkme+0x82/0x180 [ 16.309379] ? preempt_count_sub+0x50/0x80 [ 16.309405] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.309430] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.309454] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.309478] kthread+0x337/0x6f0 [ 16.309501] ? trace_preempt_on+0x20/0xc0 [ 16.309531] ? __pfx_kthread+0x10/0x10 [ 16.309554] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.309578] ? calculate_sigpending+0x7b/0xa0 [ 16.309603] ? __pfx_kthread+0x10/0x10 [ 16.309628] ret_from_fork+0x116/0x1d0 [ 16.309647] ? __pfx_kthread+0x10/0x10 [ 16.309669] ret_from_fork_asm+0x1a/0x30 [ 16.309702] </TASK> [ 16.309715] [ 16.322234] Allocated by task 282: [ 16.322374] kasan_save_stack+0x45/0x70 [ 16.322520] kasan_save_track+0x18/0x40 [ 16.322658] kasan_save_alloc_info+0x3b/0x50 [ 16.322932] __kasan_kmalloc+0xb7/0xc0 [ 16.323334] __kmalloc_cache_noprof+0x189/0x420 [ 16.323499] kasan_atomics+0x95/0x310 [ 16.323674] kunit_try_run_case+0x1a5/0x480 [ 16.324185] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.324551] kthread+0x337/0x6f0 [ 16.324682] ret_from_fork+0x116/0x1d0 [ 16.324911] ret_from_fork_asm+0x1a/0x30 [ 16.325309] [ 16.325390] The buggy address belongs to the object at ffff8881031d0c00 [ 16.325390] which belongs to the cache kmalloc-64 of size 64 [ 16.325792] The buggy address is located 0 bytes to the right of [ 16.325792] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 16.326314] [ 16.326396] The buggy address belongs to the physical page: [ 16.326578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 16.327133] flags: 0x200000000000000(node=0|zone=2) [ 16.327663] page_type: f5(slab) [ 16.328074] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.328796] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.329670] page dumped because: kasan: bad access detected [ 16.330407] [ 16.330610] Memory state around the buggy address: [ 16.331143] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.331393] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.331621] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.332184] ^ [ 16.332671] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.333467] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.334308] ================================================================== [ 16.470450] ================================================================== [ 16.471025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 16.471468] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 16.472263] [ 16.472514] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.472562] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.472576] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.472598] Call Trace: [ 16.472615] <TASK> [ 16.472632] dump_stack_lvl+0x73/0xb0 [ 16.472689] print_report+0xd1/0x650 [ 16.472740] ? __virt_addr_valid+0x1db/0x2d0 [ 16.472764] ? kasan_atomics_helper+0x992/0x5450 [ 16.472815] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.472841] ? kasan_atomics_helper+0x992/0x5450 [ 16.472875] kasan_report+0x141/0x180 [ 16.472899] ? kasan_atomics_helper+0x992/0x5450 [ 16.472927] kasan_check_range+0x10c/0x1c0 [ 16.472951] __kasan_check_write+0x18/0x20 [ 16.472999] kasan_atomics_helper+0x992/0x5450 [ 16.473023] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.473046] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.473089] ? kasan_atomics+0x152/0x310 [ 16.473117] kasan_atomics+0x1dc/0x310 [ 16.473141] ? __pfx_kasan_atomics+0x10/0x10 [ 16.473167] ? __pfx_read_tsc+0x10/0x10 [ 16.473189] ? ktime_get_ts64+0x86/0x230 [ 16.473215] kunit_try_run_case+0x1a5/0x480 [ 16.473242] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.473265] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.473290] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.473314] ? __kthread_parkme+0x82/0x180 [ 16.473336] ? preempt_count_sub+0x50/0x80 [ 16.473363] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.473388] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.473412] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.473437] kthread+0x337/0x6f0 [ 16.473458] ? trace_preempt_on+0x20/0xc0 [ 16.473482] ? __pfx_kthread+0x10/0x10 [ 16.473505] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.473533] ? calculate_sigpending+0x7b/0xa0 [ 16.473557] ? __pfx_kthread+0x10/0x10 [ 16.473581] ret_from_fork+0x116/0x1d0 [ 16.473601] ? __pfx_kthread+0x10/0x10 [ 16.473622] ret_from_fork_asm+0x1a/0x30 [ 16.473655] </TASK> [ 16.473668] [ 16.486934] Allocated by task 282: [ 16.487293] kasan_save_stack+0x45/0x70 [ 16.487698] kasan_save_track+0x18/0x40 [ 16.488122] kasan_save_alloc_info+0x3b/0x50 [ 16.488477] __kasan_kmalloc+0xb7/0xc0 [ 16.488625] __kmalloc_cache_noprof+0x189/0x420 [ 16.489032] kasan_atomics+0x95/0x310 [ 16.489442] kunit_try_run_case+0x1a5/0x480 [ 16.489898] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.490323] kthread+0x337/0x6f0 [ 16.490459] ret_from_fork+0x116/0x1d0 [ 16.490602] ret_from_fork_asm+0x1a/0x30 [ 16.490858] [ 16.491085] The buggy address belongs to the object at ffff8881031d0c00 [ 16.491085] which belongs to the cache kmalloc-64 of size 64 [ 16.492273] The buggy address is located 0 bytes to the right of [ 16.492273] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 16.493229] [ 16.493316] The buggy address belongs to the physical page: [ 16.493506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 16.493944] flags: 0x200000000000000(node=0|zone=2) [ 16.494444] page_type: f5(slab) [ 16.494834] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.495555] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.496289] page dumped because: kasan: bad access detected [ 16.496841] [ 16.496926] Memory state around the buggy address: [ 16.497105] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.497338] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.497571] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.497807] ^ [ 16.497972] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.498626] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.499307] ================================================================== [ 16.592532] ================================================================== [ 16.592939] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 16.593642] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 16.594495] [ 16.594750] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.594800] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.594826] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.594849] Call Trace: [ 16.594867] <TASK> [ 16.594898] dump_stack_lvl+0x73/0xb0 [ 16.594929] print_report+0xd1/0x650 [ 16.594953] ? __virt_addr_valid+0x1db/0x2d0 [ 16.594979] ? kasan_atomics_helper+0xc70/0x5450 [ 16.595003] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.595030] ? kasan_atomics_helper+0xc70/0x5450 [ 16.595065] kasan_report+0x141/0x180 [ 16.595089] ? kasan_atomics_helper+0xc70/0x5450 [ 16.595116] kasan_check_range+0x10c/0x1c0 [ 16.595142] __kasan_check_write+0x18/0x20 [ 16.595163] kasan_atomics_helper+0xc70/0x5450 [ 16.595187] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.595211] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.595248] ? kasan_atomics+0x152/0x310 [ 16.595278] kasan_atomics+0x1dc/0x310 [ 16.595314] ? __pfx_kasan_atomics+0x10/0x10 [ 16.595340] ? __pfx_read_tsc+0x10/0x10 [ 16.595364] ? ktime_get_ts64+0x86/0x230 [ 16.595390] kunit_try_run_case+0x1a5/0x480 [ 16.595427] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.595451] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.595488] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.595513] ? __kthread_parkme+0x82/0x180 [ 16.595534] ? preempt_count_sub+0x50/0x80 [ 16.595560] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.595585] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.595610] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.595635] kthread+0x337/0x6f0 [ 16.595656] ? trace_preempt_on+0x20/0xc0 [ 16.595682] ? __pfx_kthread+0x10/0x10 [ 16.595704] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.595727] ? calculate_sigpending+0x7b/0xa0 [ 16.595753] ? __pfx_kthread+0x10/0x10 [ 16.595776] ret_from_fork+0x116/0x1d0 [ 16.595796] ? __pfx_kthread+0x10/0x10 [ 16.595818] ret_from_fork_asm+0x1a/0x30 [ 16.595853] </TASK> [ 16.595867] [ 16.609498] Allocated by task 282: [ 16.609865] kasan_save_stack+0x45/0x70 [ 16.610184] kasan_save_track+0x18/0x40 [ 16.610429] kasan_save_alloc_info+0x3b/0x50 [ 16.610586] __kasan_kmalloc+0xb7/0xc0 [ 16.610724] __kmalloc_cache_noprof+0x189/0x420 [ 16.610888] kasan_atomics+0x95/0x310 [ 16.611026] kunit_try_run_case+0x1a5/0x480 [ 16.611437] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.611967] kthread+0x337/0x6f0 [ 16.612296] ret_from_fork+0x116/0x1d0 [ 16.612667] ret_from_fork_asm+0x1a/0x30 [ 16.613070] [ 16.613210] The buggy address belongs to the object at ffff8881031d0c00 [ 16.613210] which belongs to the cache kmalloc-64 of size 64 [ 16.613741] The buggy address is located 0 bytes to the right of [ 16.613741] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 16.614422] [ 16.614500] The buggy address belongs to the physical page: [ 16.614678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 16.615343] flags: 0x200000000000000(node=0|zone=2) [ 16.615825] page_type: f5(slab) [ 16.616154] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.616904] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.617355] page dumped because: kasan: bad access detected [ 16.617539] [ 16.617614] Memory state around the buggy address: [ 16.617857] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.618478] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.619193] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.619862] ^ [ 16.620312] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.620758] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.621341] ================================================================== [ 17.665098] ================================================================== [ 17.665819] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 17.666188] Read of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 17.666786] [ 17.666941] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.667133] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.667149] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.667172] Call Trace: [ 17.667188] <TASK> [ 17.667205] dump_stack_lvl+0x73/0xb0 [ 17.667235] print_report+0xd1/0x650 [ 17.667258] ? __virt_addr_valid+0x1db/0x2d0 [ 17.667282] ? kasan_atomics_helper+0x4f98/0x5450 [ 17.667304] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.667331] ? kasan_atomics_helper+0x4f98/0x5450 [ 17.667355] kasan_report+0x141/0x180 [ 17.667377] ? kasan_atomics_helper+0x4f98/0x5450 [ 17.667406] __asan_report_load8_noabort+0x18/0x20 [ 17.667431] kasan_atomics_helper+0x4f98/0x5450 [ 17.667456] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.667479] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.667505] ? kasan_atomics+0x152/0x310 [ 17.667533] kasan_atomics+0x1dc/0x310 [ 17.667557] ? __pfx_kasan_atomics+0x10/0x10 [ 17.667583] ? __pfx_read_tsc+0x10/0x10 [ 17.667605] ? ktime_get_ts64+0x86/0x230 [ 17.667632] kunit_try_run_case+0x1a5/0x480 [ 17.667658] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.667681] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.667706] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.667740] ? __kthread_parkme+0x82/0x180 [ 17.667762] ? preempt_count_sub+0x50/0x80 [ 17.667786] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.667812] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.667837] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.667862] kthread+0x337/0x6f0 [ 17.667882] ? trace_preempt_on+0x20/0xc0 [ 17.667906] ? __pfx_kthread+0x10/0x10 [ 17.667929] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.667951] ? calculate_sigpending+0x7b/0xa0 [ 17.667976] ? __pfx_kthread+0x10/0x10 [ 17.668000] ret_from_fork+0x116/0x1d0 [ 17.668020] ? __pfx_kthread+0x10/0x10 [ 17.668043] ret_from_fork_asm+0x1a/0x30 [ 17.668089] </TASK> [ 17.668102] [ 17.678845] Allocated by task 282: [ 17.679289] kasan_save_stack+0x45/0x70 [ 17.679491] kasan_save_track+0x18/0x40 [ 17.679669] kasan_save_alloc_info+0x3b/0x50 [ 17.679879] __kasan_kmalloc+0xb7/0xc0 [ 17.680251] __kmalloc_cache_noprof+0x189/0x420 [ 17.680625] kasan_atomics+0x95/0x310 [ 17.680910] kunit_try_run_case+0x1a5/0x480 [ 17.681239] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.681591] kthread+0x337/0x6f0 [ 17.681925] ret_from_fork+0x116/0x1d0 [ 17.682226] ret_from_fork_asm+0x1a/0x30 [ 17.682547] [ 17.682748] The buggy address belongs to the object at ffff8881031d0c00 [ 17.682748] which belongs to the cache kmalloc-64 of size 64 [ 17.683239] The buggy address is located 0 bytes to the right of [ 17.683239] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 17.683717] [ 17.683891] The buggy address belongs to the physical page: [ 17.684506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 17.685118] flags: 0x200000000000000(node=0|zone=2) [ 17.685465] page_type: f5(slab) [ 17.685747] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.686209] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.686642] page dumped because: kasan: bad access detected [ 17.687025] [ 17.687334] Memory state around the buggy address: [ 17.687578] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.688066] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.688508] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.689025] ^ [ 17.689274] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.689593] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.690150] ================================================================== [ 17.576484] ================================================================== [ 17.577182] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 17.578079] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 17.578447] [ 17.578554] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.578599] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.578612] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.578634] Call Trace: [ 17.578650] <TASK> [ 17.578665] dump_stack_lvl+0x73/0xb0 [ 17.578692] print_report+0xd1/0x650 [ 17.578716] ? __virt_addr_valid+0x1db/0x2d0 [ 17.578769] ? kasan_atomics_helper+0x1f43/0x5450 [ 17.578792] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.578819] ? kasan_atomics_helper+0x1f43/0x5450 [ 17.578842] kasan_report+0x141/0x180 [ 17.578865] ? kasan_atomics_helper+0x1f43/0x5450 [ 17.578893] kasan_check_range+0x10c/0x1c0 [ 17.578918] __kasan_check_write+0x18/0x20 [ 17.578939] kasan_atomics_helper+0x1f43/0x5450 [ 17.578963] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.578986] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.579012] ? kasan_atomics+0x152/0x310 [ 17.579040] kasan_atomics+0x1dc/0x310 [ 17.579076] ? __pfx_kasan_atomics+0x10/0x10 [ 17.579102] ? __pfx_read_tsc+0x10/0x10 [ 17.579143] ? ktime_get_ts64+0x86/0x230 [ 17.579170] kunit_try_run_case+0x1a5/0x480 [ 17.579212] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.579235] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.579260] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.579302] ? __kthread_parkme+0x82/0x180 [ 17.579324] ? preempt_count_sub+0x50/0x80 [ 17.579349] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.579374] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.579398] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.579422] kthread+0x337/0x6f0 [ 17.579462] ? trace_preempt_on+0x20/0xc0 [ 17.579486] ? __pfx_kthread+0x10/0x10 [ 17.579508] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.579531] ? calculate_sigpending+0x7b/0xa0 [ 17.579555] ? __pfx_kthread+0x10/0x10 [ 17.579578] ret_from_fork+0x116/0x1d0 [ 17.579597] ? __pfx_kthread+0x10/0x10 [ 17.579619] ret_from_fork_asm+0x1a/0x30 [ 17.579669] </TASK> [ 17.579682] [ 17.593518] Allocated by task 282: [ 17.593918] kasan_save_stack+0x45/0x70 [ 17.594295] kasan_save_track+0x18/0x40 [ 17.594445] kasan_save_alloc_info+0x3b/0x50 [ 17.594607] __kasan_kmalloc+0xb7/0xc0 [ 17.594782] __kmalloc_cache_noprof+0x189/0x420 [ 17.594954] kasan_atomics+0x95/0x310 [ 17.595111] kunit_try_run_case+0x1a5/0x480 [ 17.595269] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.595455] kthread+0x337/0x6f0 [ 17.595586] ret_from_fork+0x116/0x1d0 [ 17.595750] ret_from_fork_asm+0x1a/0x30 [ 17.596128] [ 17.596303] The buggy address belongs to the object at ffff8881031d0c00 [ 17.596303] which belongs to the cache kmalloc-64 of size 64 [ 17.597543] The buggy address is located 0 bytes to the right of [ 17.597543] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 17.598940] [ 17.599137] The buggy address belongs to the physical page: [ 17.599658] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 17.600457] flags: 0x200000000000000(node=0|zone=2) [ 17.600962] page_type: f5(slab) [ 17.601289] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.602034] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.602322] page dumped because: kasan: bad access detected [ 17.602510] [ 17.602587] Memory state around the buggy address: [ 17.602782] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.603432] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.604148] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.604837] ^ [ 17.606253] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.606853] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.607102] ================================================================== [ 16.443286] ================================================================== [ 16.443746] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 16.444122] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 16.444407] [ 16.444571] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.444658] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.444674] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.444698] Call Trace: [ 16.444714] <TASK> [ 16.444741] dump_stack_lvl+0x73/0xb0 [ 16.444772] print_report+0xd1/0x650 [ 16.444796] ? __virt_addr_valid+0x1db/0x2d0 [ 16.444857] ? kasan_atomics_helper+0x8f9/0x5450 [ 16.444881] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.444909] ? kasan_atomics_helper+0x8f9/0x5450 [ 16.444932] kasan_report+0x141/0x180 [ 16.444988] ? kasan_atomics_helper+0x8f9/0x5450 [ 16.445018] kasan_check_range+0x10c/0x1c0 [ 16.445043] __kasan_check_write+0x18/0x20 [ 16.445076] kasan_atomics_helper+0x8f9/0x5450 [ 16.445102] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.445125] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.445152] ? kasan_atomics+0x152/0x310 [ 16.445182] kasan_atomics+0x1dc/0x310 [ 16.445207] ? __pfx_kasan_atomics+0x10/0x10 [ 16.445234] ? __pfx_read_tsc+0x10/0x10 [ 16.445257] ? ktime_get_ts64+0x86/0x230 [ 16.445283] kunit_try_run_case+0x1a5/0x480 [ 16.445308] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.445333] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.445358] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.445384] ? __kthread_parkme+0x82/0x180 [ 16.445406] ? preempt_count_sub+0x50/0x80 [ 16.445432] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.445458] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.445482] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.445509] kthread+0x337/0x6f0 [ 16.445533] ? trace_preempt_on+0x20/0xc0 [ 16.445581] ? __pfx_kthread+0x10/0x10 [ 16.445604] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.445627] ? calculate_sigpending+0x7b/0xa0 [ 16.445652] ? __pfx_kthread+0x10/0x10 [ 16.445676] ret_from_fork+0x116/0x1d0 [ 16.445697] ? __pfx_kthread+0x10/0x10 [ 16.445720] ret_from_fork_asm+0x1a/0x30 [ 16.445755] </TASK> [ 16.445769] [ 16.455609] Allocated by task 282: [ 16.456065] kasan_save_stack+0x45/0x70 [ 16.456473] kasan_save_track+0x18/0x40 [ 16.456894] kasan_save_alloc_info+0x3b/0x50 [ 16.457327] __kasan_kmalloc+0xb7/0xc0 [ 16.457739] __kmalloc_cache_noprof+0x189/0x420 [ 16.458200] kasan_atomics+0x95/0x310 [ 16.458576] kunit_try_run_case+0x1a5/0x480 [ 16.459010] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.459535] kthread+0x337/0x6f0 [ 16.459904] ret_from_fork+0x116/0x1d0 [ 16.460287] ret_from_fork_asm+0x1a/0x30 [ 16.460588] [ 16.460668] The buggy address belongs to the object at ffff8881031d0c00 [ 16.460668] which belongs to the cache kmalloc-64 of size 64 [ 16.461652] The buggy address is located 0 bytes to the right of [ 16.461652] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 16.462748] [ 16.462897] The buggy address belongs to the physical page: [ 16.463318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 16.463693] flags: 0x200000000000000(node=0|zone=2) [ 16.464199] page_type: f5(slab) [ 16.464532] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.464964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.465222] page dumped because: kasan: bad access detected [ 16.465409] [ 16.465484] Memory state around the buggy address: [ 16.465652] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.466330] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.467001] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.467666] ^ [ 16.468172] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.468856] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.469500] ================================================================== [ 16.786159] ================================================================== [ 16.786654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 16.787076] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 16.787459] [ 16.787580] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.787628] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.787642] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.787666] Call Trace: [ 16.787680] <TASK> [ 16.787697] dump_stack_lvl+0x73/0xb0 [ 16.787749] print_report+0xd1/0x650 [ 16.787774] ? __virt_addr_valid+0x1db/0x2d0 [ 16.787810] ? kasan_atomics_helper+0x1079/0x5450 [ 16.787833] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.787861] ? kasan_atomics_helper+0x1079/0x5450 [ 16.787897] kasan_report+0x141/0x180 [ 16.787921] ? kasan_atomics_helper+0x1079/0x5450 [ 16.787951] kasan_check_range+0x10c/0x1c0 [ 16.787977] __kasan_check_write+0x18/0x20 [ 16.787999] kasan_atomics_helper+0x1079/0x5450 [ 16.788024] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.788057] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.788084] ? kasan_atomics+0x152/0x310 [ 16.788114] kasan_atomics+0x1dc/0x310 [ 16.788139] ? __pfx_kasan_atomics+0x10/0x10 [ 16.788166] ? __pfx_read_tsc+0x10/0x10 [ 16.788188] ? ktime_get_ts64+0x86/0x230 [ 16.788225] kunit_try_run_case+0x1a5/0x480 [ 16.788251] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.788275] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.788312] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.788337] ? __kthread_parkme+0x82/0x180 [ 16.788359] ? preempt_count_sub+0x50/0x80 [ 16.788384] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.788418] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.788443] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.788479] kthread+0x337/0x6f0 [ 16.788501] ? trace_preempt_on+0x20/0xc0 [ 16.788526] ? __pfx_kthread+0x10/0x10 [ 16.788549] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.788582] ? calculate_sigpending+0x7b/0xa0 [ 16.788607] ? __pfx_kthread+0x10/0x10 [ 16.788631] ret_from_fork+0x116/0x1d0 [ 16.788661] ? __pfx_kthread+0x10/0x10 [ 16.788684] ret_from_fork_asm+0x1a/0x30 [ 16.788745] </TASK> [ 16.788758] [ 16.797155] Allocated by task 282: [ 16.797356] kasan_save_stack+0x45/0x70 [ 16.797557] kasan_save_track+0x18/0x40 [ 16.797761] kasan_save_alloc_info+0x3b/0x50 [ 16.797990] __kasan_kmalloc+0xb7/0xc0 [ 16.798219] __kmalloc_cache_noprof+0x189/0x420 [ 16.798442] kasan_atomics+0x95/0x310 [ 16.798672] kunit_try_run_case+0x1a5/0x480 [ 16.798848] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.799035] kthread+0x337/0x6f0 [ 16.799224] ret_from_fork+0x116/0x1d0 [ 16.799434] ret_from_fork_asm+0x1a/0x30 [ 16.799656] [ 16.799785] The buggy address belongs to the object at ffff8881031d0c00 [ 16.799785] which belongs to the cache kmalloc-64 of size 64 [ 16.800261] The buggy address is located 0 bytes to the right of [ 16.800261] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 16.800876] [ 16.800987] The buggy address belongs to the physical page: [ 16.801291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 16.801651] flags: 0x200000000000000(node=0|zone=2) [ 16.801921] page_type: f5(slab) [ 16.802116] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.802423] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.802664] page dumped because: kasan: bad access detected [ 16.802872] [ 16.802949] Memory state around the buggy address: [ 16.803211] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.803547] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.803921] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.804266] ^ [ 16.804500] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.804809] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.805035] ================================================================== [ 16.767659] ================================================================== [ 16.767995] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 16.768361] Read of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 16.768718] [ 16.768852] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.768898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.768912] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.768934] Call Trace: [ 16.768951] <TASK> [ 16.768967] dump_stack_lvl+0x73/0xb0 [ 16.768995] print_report+0xd1/0x650 [ 16.769019] ? __virt_addr_valid+0x1db/0x2d0 [ 16.769043] ? kasan_atomics_helper+0x4a36/0x5450 [ 16.769074] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.769101] ? kasan_atomics_helper+0x4a36/0x5450 [ 16.769123] kasan_report+0x141/0x180 [ 16.769146] ? kasan_atomics_helper+0x4a36/0x5450 [ 16.769174] __asan_report_load4_noabort+0x18/0x20 [ 16.769199] kasan_atomics_helper+0x4a36/0x5450 [ 16.769222] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.769245] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.769271] ? kasan_atomics+0x152/0x310 [ 16.769299] kasan_atomics+0x1dc/0x310 [ 16.769323] ? __pfx_kasan_atomics+0x10/0x10 [ 16.769348] ? __pfx_read_tsc+0x10/0x10 [ 16.769370] ? ktime_get_ts64+0x86/0x230 [ 16.769395] kunit_try_run_case+0x1a5/0x480 [ 16.769420] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.769443] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.769467] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.769491] ? __kthread_parkme+0x82/0x180 [ 16.769511] ? preempt_count_sub+0x50/0x80 [ 16.769542] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.769567] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.769600] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.769625] kthread+0x337/0x6f0 [ 16.769646] ? trace_preempt_on+0x20/0xc0 [ 16.769681] ? __pfx_kthread+0x10/0x10 [ 16.769703] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.769750] ? calculate_sigpending+0x7b/0xa0 [ 16.769775] ? __pfx_kthread+0x10/0x10 [ 16.769798] ret_from_fork+0x116/0x1d0 [ 16.769817] ? __pfx_kthread+0x10/0x10 [ 16.769839] ret_from_fork_asm+0x1a/0x30 [ 16.769872] </TASK> [ 16.769885] [ 16.777375] Allocated by task 282: [ 16.777565] kasan_save_stack+0x45/0x70 [ 16.777751] kasan_save_track+0x18/0x40 [ 16.777979] kasan_save_alloc_info+0x3b/0x50 [ 16.778212] __kasan_kmalloc+0xb7/0xc0 [ 16.778406] __kmalloc_cache_noprof+0x189/0x420 [ 16.778637] kasan_atomics+0x95/0x310 [ 16.778867] kunit_try_run_case+0x1a5/0x480 [ 16.779082] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.779352] kthread+0x337/0x6f0 [ 16.779528] ret_from_fork+0x116/0x1d0 [ 16.779763] ret_from_fork_asm+0x1a/0x30 [ 16.779979] [ 16.780091] The buggy address belongs to the object at ffff8881031d0c00 [ 16.780091] which belongs to the cache kmalloc-64 of size 64 [ 16.780646] The buggy address is located 0 bytes to the right of [ 16.780646] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 16.781264] [ 16.781362] The buggy address belongs to the physical page: [ 16.781658] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 16.782014] flags: 0x200000000000000(node=0|zone=2) [ 16.782311] page_type: f5(slab) [ 16.782474] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.782819] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.783078] page dumped because: kasan: bad access detected [ 16.783265] [ 16.783344] Memory state around the buggy address: [ 16.783529] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.783942] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.784352] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.784794] ^ [ 16.785061] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.785361] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.785599] ================================================================== [ 17.814805] ================================================================== [ 17.815193] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 17.815547] Read of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 17.816141] [ 17.816260] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.816304] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.816317] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.816339] Call Trace: [ 17.816354] <TASK> [ 17.816370] dump_stack_lvl+0x73/0xb0 [ 17.816399] print_report+0xd1/0x650 [ 17.816421] ? __virt_addr_valid+0x1db/0x2d0 [ 17.816443] ? kasan_atomics_helper+0x5115/0x5450 [ 17.816465] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.816492] ? kasan_atomics_helper+0x5115/0x5450 [ 17.816514] kasan_report+0x141/0x180 [ 17.816538] ? kasan_atomics_helper+0x5115/0x5450 [ 17.816566] __asan_report_load8_noabort+0x18/0x20 [ 17.816591] kasan_atomics_helper+0x5115/0x5450 [ 17.816615] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.816638] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.816664] ? kasan_atomics+0x152/0x310 [ 17.816692] kasan_atomics+0x1dc/0x310 [ 17.816715] ? __pfx_kasan_atomics+0x10/0x10 [ 17.816754] ? __pfx_read_tsc+0x10/0x10 [ 17.816777] ? ktime_get_ts64+0x86/0x230 [ 17.816803] kunit_try_run_case+0x1a5/0x480 [ 17.816827] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.816850] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.816874] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.816898] ? __kthread_parkme+0x82/0x180 [ 17.816919] ? preempt_count_sub+0x50/0x80 [ 17.816943] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.816969] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.816992] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.817016] kthread+0x337/0x6f0 [ 17.817037] ? trace_preempt_on+0x20/0xc0 [ 17.817072] ? __pfx_kthread+0x10/0x10 [ 17.817094] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.817117] ? calculate_sigpending+0x7b/0xa0 [ 17.817141] ? __pfx_kthread+0x10/0x10 [ 17.817164] ret_from_fork+0x116/0x1d0 [ 17.817183] ? __pfx_kthread+0x10/0x10 [ 17.817204] ret_from_fork_asm+0x1a/0x30 [ 17.817237] </TASK> [ 17.817250] [ 17.824812] Allocated by task 282: [ 17.825002] kasan_save_stack+0x45/0x70 [ 17.825222] kasan_save_track+0x18/0x40 [ 17.825387] kasan_save_alloc_info+0x3b/0x50 [ 17.825566] __kasan_kmalloc+0xb7/0xc0 [ 17.825881] __kmalloc_cache_noprof+0x189/0x420 [ 17.826131] kasan_atomics+0x95/0x310 [ 17.826318] kunit_try_run_case+0x1a5/0x480 [ 17.826503] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.826760] kthread+0x337/0x6f0 [ 17.826925] ret_from_fork+0x116/0x1d0 [ 17.827104] ret_from_fork_asm+0x1a/0x30 [ 17.827292] [ 17.827372] The buggy address belongs to the object at ffff8881031d0c00 [ 17.827372] which belongs to the cache kmalloc-64 of size 64 [ 17.827931] The buggy address is located 0 bytes to the right of [ 17.827931] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 17.828334] [ 17.828412] The buggy address belongs to the physical page: [ 17.828596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 17.828914] flags: 0x200000000000000(node=0|zone=2) [ 17.829243] page_type: f5(slab) [ 17.829420] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.829825] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.830076] page dumped because: kasan: bad access detected [ 17.830258] [ 17.830332] Memory state around the buggy address: [ 17.830497] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.830932] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.831290] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.831626] ^ [ 17.832010] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.832367] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.832593] ================================================================== [ 17.638874] ================================================================== [ 17.639894] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 17.640164] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 17.640405] [ 17.640498] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.640543] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.640558] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.640581] Call Trace: [ 17.640599] <TASK> [ 17.640615] dump_stack_lvl+0x73/0xb0 [ 17.640643] print_report+0xd1/0x650 [ 17.640667] ? __virt_addr_valid+0x1db/0x2d0 [ 17.640689] ? kasan_atomics_helper+0x2006/0x5450 [ 17.640712] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.640740] ? kasan_atomics_helper+0x2006/0x5450 [ 17.640764] kasan_report+0x141/0x180 [ 17.640787] ? kasan_atomics_helper+0x2006/0x5450 [ 17.640815] kasan_check_range+0x10c/0x1c0 [ 17.640840] __kasan_check_write+0x18/0x20 [ 17.640860] kasan_atomics_helper+0x2006/0x5450 [ 17.640884] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.640907] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.640934] ? kasan_atomics+0x152/0x310 [ 17.640963] kasan_atomics+0x1dc/0x310 [ 17.640987] ? __pfx_kasan_atomics+0x10/0x10 [ 17.641013] ? __pfx_read_tsc+0x10/0x10 [ 17.641035] ? ktime_get_ts64+0x86/0x230 [ 17.641072] kunit_try_run_case+0x1a5/0x480 [ 17.641098] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.641121] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.641145] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.641170] ? __kthread_parkme+0x82/0x180 [ 17.641191] ? preempt_count_sub+0x50/0x80 [ 17.641216] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.641241] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.641265] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.641290] kthread+0x337/0x6f0 [ 17.641311] ? trace_preempt_on+0x20/0xc0 [ 17.641336] ? __pfx_kthread+0x10/0x10 [ 17.641358] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.641381] ? calculate_sigpending+0x7b/0xa0 [ 17.641405] ? __pfx_kthread+0x10/0x10 [ 17.641429] ret_from_fork+0x116/0x1d0 [ 17.641449] ? __pfx_kthread+0x10/0x10 [ 17.641471] ret_from_fork_asm+0x1a/0x30 [ 17.641505] </TASK> [ 17.641517] [ 17.653161] Allocated by task 282: [ 17.653393] kasan_save_stack+0x45/0x70 [ 17.653921] kasan_save_track+0x18/0x40 [ 17.654157] kasan_save_alloc_info+0x3b/0x50 [ 17.654389] __kasan_kmalloc+0xb7/0xc0 [ 17.654797] __kmalloc_cache_noprof+0x189/0x420 [ 17.655147] kasan_atomics+0x95/0x310 [ 17.655379] kunit_try_run_case+0x1a5/0x480 [ 17.655737] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.656082] kthread+0x337/0x6f0 [ 17.656421] ret_from_fork+0x116/0x1d0 [ 17.656735] ret_from_fork_asm+0x1a/0x30 [ 17.656965] [ 17.657239] The buggy address belongs to the object at ffff8881031d0c00 [ 17.657239] which belongs to the cache kmalloc-64 of size 64 [ 17.657760] The buggy address is located 0 bytes to the right of [ 17.657760] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 17.658352] [ 17.658519] The buggy address belongs to the physical page: [ 17.659166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 17.659570] flags: 0x200000000000000(node=0|zone=2) [ 17.659919] page_type: f5(slab) [ 17.660139] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.660615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.661121] page dumped because: kasan: bad access detected [ 17.661427] [ 17.661544] Memory state around the buggy address: [ 17.661847] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.662362] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.662694] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.663156] ^ [ 17.663464] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.663925] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.664243] ================================================================== [ 17.345337] ================================================================== [ 17.345728] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 17.346013] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 17.348097] [ 17.348300] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.348350] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.348366] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.348391] Call Trace: [ 17.348408] <TASK> [ 17.348426] dump_stack_lvl+0x73/0xb0 [ 17.348459] print_report+0xd1/0x650 [ 17.348483] ? __virt_addr_valid+0x1db/0x2d0 [ 17.348507] ? kasan_atomics_helper+0x1a7f/0x5450 [ 17.348530] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.348560] ? kasan_atomics_helper+0x1a7f/0x5450 [ 17.348585] kasan_report+0x141/0x180 [ 17.348609] ? kasan_atomics_helper+0x1a7f/0x5450 [ 17.348637] kasan_check_range+0x10c/0x1c0 [ 17.348663] __kasan_check_write+0x18/0x20 [ 17.348684] kasan_atomics_helper+0x1a7f/0x5450 [ 17.348710] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.350753] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.350800] ? kasan_atomics+0x152/0x310 [ 17.350833] kasan_atomics+0x1dc/0x310 [ 17.350861] ? __pfx_kasan_atomics+0x10/0x10 [ 17.350888] ? __pfx_read_tsc+0x10/0x10 [ 17.350911] ? ktime_get_ts64+0x86/0x230 [ 17.350939] kunit_try_run_case+0x1a5/0x480 [ 17.350965] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.350989] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.351015] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.351040] ? __kthread_parkme+0x82/0x180 [ 17.351089] ? preempt_count_sub+0x50/0x80 [ 17.351117] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.351142] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.351166] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.351190] kthread+0x337/0x6f0 [ 17.351211] ? trace_preempt_on+0x20/0xc0 [ 17.351237] ? __pfx_kthread+0x10/0x10 [ 17.351260] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.351283] ? calculate_sigpending+0x7b/0xa0 [ 17.351308] ? __pfx_kthread+0x10/0x10 [ 17.351331] ret_from_fork+0x116/0x1d0 [ 17.351352] ? __pfx_kthread+0x10/0x10 [ 17.351374] ret_from_fork_asm+0x1a/0x30 [ 17.351407] </TASK> [ 17.351421] [ 17.364561] Allocated by task 282: [ 17.364890] kasan_save_stack+0x45/0x70 [ 17.365143] kasan_save_track+0x18/0x40 [ 17.365316] kasan_save_alloc_info+0x3b/0x50 [ 17.365549] __kasan_kmalloc+0xb7/0xc0 [ 17.365728] __kmalloc_cache_noprof+0x189/0x420 [ 17.366285] kasan_atomics+0x95/0x310 [ 17.366607] kunit_try_run_case+0x1a5/0x480 [ 17.366855] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.367199] kthread+0x337/0x6f0 [ 17.367477] ret_from_fork+0x116/0x1d0 [ 17.367637] ret_from_fork_asm+0x1a/0x30 [ 17.368035] [ 17.368148] The buggy address belongs to the object at ffff8881031d0c00 [ 17.368148] which belongs to the cache kmalloc-64 of size 64 [ 17.368971] The buggy address is located 0 bytes to the right of [ 17.368971] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 17.369493] [ 17.369754] The buggy address belongs to the physical page: [ 17.370117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 17.370526] flags: 0x200000000000000(node=0|zone=2) [ 17.370843] page_type: f5(slab) [ 17.371030] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.371372] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.371698] page dumped because: kasan: bad access detected [ 17.372214] [ 17.372461] Memory state around the buggy address: [ 17.372687] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.373233] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.373651] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.374166] ^ [ 17.374503] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.374981] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.375398] ================================================================== [ 16.560497] ================================================================== [ 16.560836] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 16.562373] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 16.563002] [ 16.563205] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.563253] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.563266] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.563289] Call Trace: [ 16.563306] <TASK> [ 16.563322] dump_stack_lvl+0x73/0xb0 [ 16.564099] print_report+0xd1/0x650 [ 16.564134] ? __virt_addr_valid+0x1db/0x2d0 [ 16.564171] ? kasan_atomics_helper+0xb6a/0x5450 [ 16.564194] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.564220] ? kasan_atomics_helper+0xb6a/0x5450 [ 16.564245] kasan_report+0x141/0x180 [ 16.564269] ? kasan_atomics_helper+0xb6a/0x5450 [ 16.564298] kasan_check_range+0x10c/0x1c0 [ 16.564323] __kasan_check_write+0x18/0x20 [ 16.564344] kasan_atomics_helper+0xb6a/0x5450 [ 16.564368] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.564391] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.564418] ? kasan_atomics+0x152/0x310 [ 16.564835] kasan_atomics+0x1dc/0x310 [ 16.564863] ? __pfx_kasan_atomics+0x10/0x10 [ 16.564904] ? __pfx_read_tsc+0x10/0x10 [ 16.564927] ? ktime_get_ts64+0x86/0x230 [ 16.564955] kunit_try_run_case+0x1a5/0x480 [ 16.564980] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.565003] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.565028] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.565062] ? __kthread_parkme+0x82/0x180 [ 16.565084] ? preempt_count_sub+0x50/0x80 [ 16.565109] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.565134] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.565157] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.565181] kthread+0x337/0x6f0 [ 16.565201] ? trace_preempt_on+0x20/0xc0 [ 16.565226] ? __pfx_kthread+0x10/0x10 [ 16.565248] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.565270] ? calculate_sigpending+0x7b/0xa0 [ 16.565295] ? __pfx_kthread+0x10/0x10 [ 16.565317] ret_from_fork+0x116/0x1d0 [ 16.565336] ? __pfx_kthread+0x10/0x10 [ 16.565358] ret_from_fork_asm+0x1a/0x30 [ 16.565391] </TASK> [ 16.565403] [ 16.578787] Allocated by task 282: [ 16.579086] kasan_save_stack+0x45/0x70 [ 16.579365] kasan_save_track+0x18/0x40 [ 16.579686] kasan_save_alloc_info+0x3b/0x50 [ 16.580169] __kasan_kmalloc+0xb7/0xc0 [ 16.580459] __kmalloc_cache_noprof+0x189/0x420 [ 16.580841] kasan_atomics+0x95/0x310 [ 16.581153] kunit_try_run_case+0x1a5/0x480 [ 16.581314] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.581499] kthread+0x337/0x6f0 [ 16.581633] ret_from_fork+0x116/0x1d0 [ 16.581857] ret_from_fork_asm+0x1a/0x30 [ 16.582268] [ 16.582446] The buggy address belongs to the object at ffff8881031d0c00 [ 16.582446] which belongs to the cache kmalloc-64 of size 64 [ 16.583675] The buggy address is located 0 bytes to the right of [ 16.583675] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 16.584989] [ 16.585193] The buggy address belongs to the physical page: [ 16.585558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 16.585986] flags: 0x200000000000000(node=0|zone=2) [ 16.586471] page_type: f5(slab) [ 16.586833] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.587658] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.588265] page dumped because: kasan: bad access detected [ 16.588673] [ 16.588769] Memory state around the buggy address: [ 16.589163] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.589563] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.589938] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.590615] ^ [ 16.591159] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.591761] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.591995] ================================================================== [ 17.308422] ================================================================== [ 17.308822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 17.309093] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 17.309458] [ 17.309579] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.309623] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.309636] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.309657] Call Trace: [ 17.309672] <TASK> [ 17.309686] dump_stack_lvl+0x73/0xb0 [ 17.309714] print_report+0xd1/0x650 [ 17.309745] ? __virt_addr_valid+0x1db/0x2d0 [ 17.309769] ? kasan_atomics_helper+0x194a/0x5450 [ 17.309791] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.309817] ? kasan_atomics_helper+0x194a/0x5450 [ 17.309841] kasan_report+0x141/0x180 [ 17.309864] ? kasan_atomics_helper+0x194a/0x5450 [ 17.309891] kasan_check_range+0x10c/0x1c0 [ 17.309916] __kasan_check_write+0x18/0x20 [ 17.309937] kasan_atomics_helper+0x194a/0x5450 [ 17.309961] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.309984] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.310009] ? kasan_atomics+0x152/0x310 [ 17.310037] kasan_atomics+0x1dc/0x310 [ 17.310072] ? __pfx_kasan_atomics+0x10/0x10 [ 17.310097] ? __pfx_read_tsc+0x10/0x10 [ 17.310120] ? ktime_get_ts64+0x86/0x230 [ 17.310146] kunit_try_run_case+0x1a5/0x480 [ 17.310170] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.310193] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.310217] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.310241] ? __kthread_parkme+0x82/0x180 [ 17.310261] ? preempt_count_sub+0x50/0x80 [ 17.310286] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.310309] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.310332] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.310356] kthread+0x337/0x6f0 [ 17.310377] ? trace_preempt_on+0x20/0xc0 [ 17.310401] ? __pfx_kthread+0x10/0x10 [ 17.310425] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.310449] ? calculate_sigpending+0x7b/0xa0 [ 17.310473] ? __pfx_kthread+0x10/0x10 [ 17.310495] ret_from_fork+0x116/0x1d0 [ 17.310514] ? __pfx_kthread+0x10/0x10 [ 17.310536] ret_from_fork_asm+0x1a/0x30 [ 17.310569] </TASK> [ 17.310581] [ 17.318305] Allocated by task 282: [ 17.318468] kasan_save_stack+0x45/0x70 [ 17.318643] kasan_save_track+0x18/0x40 [ 17.318882] kasan_save_alloc_info+0x3b/0x50 [ 17.319102] __kasan_kmalloc+0xb7/0xc0 [ 17.319285] __kmalloc_cache_noprof+0x189/0x420 [ 17.319504] kasan_atomics+0x95/0x310 [ 17.319693] kunit_try_run_case+0x1a5/0x480 [ 17.319942] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.320165] kthread+0x337/0x6f0 [ 17.320324] ret_from_fork+0x116/0x1d0 [ 17.320520] ret_from_fork_asm+0x1a/0x30 [ 17.320710] [ 17.320818] The buggy address belongs to the object at ffff8881031d0c00 [ 17.320818] which belongs to the cache kmalloc-64 of size 64 [ 17.321193] The buggy address is located 0 bytes to the right of [ 17.321193] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 17.321591] [ 17.321666] The buggy address belongs to the physical page: [ 17.321911] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 17.322288] flags: 0x200000000000000(node=0|zone=2) [ 17.322534] page_type: f5(slab) [ 17.322739] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.323098] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.323443] page dumped because: kasan: bad access detected [ 17.323698] [ 17.323809] Memory state around the buggy address: [ 17.324036] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.324342] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.324564] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.324925] ^ [ 17.325198] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.325532] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.325902] ================================================================== [ 17.467969] ================================================================== [ 17.468806] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 17.469667] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 17.470181] [ 17.470293] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.470339] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.470376] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.470400] Call Trace: [ 17.470416] <TASK> [ 17.470433] dump_stack_lvl+0x73/0xb0 [ 17.470465] print_report+0xd1/0x650 [ 17.470488] ? __virt_addr_valid+0x1db/0x2d0 [ 17.470511] ? kasan_atomics_helper+0x1ce1/0x5450 [ 17.470533] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.470636] ? kasan_atomics_helper+0x1ce1/0x5450 [ 17.470660] kasan_report+0x141/0x180 [ 17.470683] ? kasan_atomics_helper+0x1ce1/0x5450 [ 17.470711] kasan_check_range+0x10c/0x1c0 [ 17.470737] __kasan_check_write+0x18/0x20 [ 17.470757] kasan_atomics_helper+0x1ce1/0x5450 [ 17.470781] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.470804] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.470830] ? kasan_atomics+0x152/0x310 [ 17.470859] kasan_atomics+0x1dc/0x310 [ 17.470882] ? __pfx_kasan_atomics+0x10/0x10 [ 17.470907] ? __pfx_read_tsc+0x10/0x10 [ 17.470929] ? ktime_get_ts64+0x86/0x230 [ 17.470955] kunit_try_run_case+0x1a5/0x480 [ 17.470981] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.471004] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.471028] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.471065] ? __kthread_parkme+0x82/0x180 [ 17.471087] ? preempt_count_sub+0x50/0x80 [ 17.471112] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.471136] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.471160] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.471184] kthread+0x337/0x6f0 [ 17.471204] ? trace_preempt_on+0x20/0xc0 [ 17.471229] ? __pfx_kthread+0x10/0x10 [ 17.471251] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.471272] ? calculate_sigpending+0x7b/0xa0 [ 17.471296] ? __pfx_kthread+0x10/0x10 [ 17.471318] ret_from_fork+0x116/0x1d0 [ 17.471337] ? __pfx_kthread+0x10/0x10 [ 17.471358] ret_from_fork_asm+0x1a/0x30 [ 17.471391] </TASK> [ 17.471403] [ 17.483511] Allocated by task 282: [ 17.483655] kasan_save_stack+0x45/0x70 [ 17.483849] kasan_save_track+0x18/0x40 [ 17.484213] kasan_save_alloc_info+0x3b/0x50 [ 17.484620] __kasan_kmalloc+0xb7/0xc0 [ 17.485004] __kmalloc_cache_noprof+0x189/0x420 [ 17.485465] kasan_atomics+0x95/0x310 [ 17.485851] kunit_try_run_case+0x1a5/0x480 [ 17.486270] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.486774] kthread+0x337/0x6f0 [ 17.487173] ret_from_fork+0x116/0x1d0 [ 17.487555] ret_from_fork_asm+0x1a/0x30 [ 17.488010] [ 17.488217] The buggy address belongs to the object at ffff8881031d0c00 [ 17.488217] which belongs to the cache kmalloc-64 of size 64 [ 17.489563] The buggy address is located 0 bytes to the right of [ 17.489563] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 17.490416] [ 17.490609] The buggy address belongs to the physical page: [ 17.491129] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 17.491561] flags: 0x200000000000000(node=0|zone=2) [ 17.491756] page_type: f5(slab) [ 17.492118] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.492878] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.493542] page dumped because: kasan: bad access detected [ 17.493746] [ 17.493947] Memory state around the buggy address: [ 17.494425] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.495072] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.495456] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.495684] ^ [ 17.496031] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.496719] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.497514] ================================================================== [ 16.252126] ================================================================== [ 16.252544] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 16.252909] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 16.253271] [ 16.253366] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.253411] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.253424] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.253446] Call Trace: [ 16.253462] <TASK> [ 16.253478] dump_stack_lvl+0x73/0xb0 [ 16.253508] print_report+0xd1/0x650 [ 16.253558] ? __virt_addr_valid+0x1db/0x2d0 [ 16.253583] ? kasan_atomics_helper+0x4a0/0x5450 [ 16.253605] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.253650] ? kasan_atomics_helper+0x4a0/0x5450 [ 16.253675] kasan_report+0x141/0x180 [ 16.253700] ? kasan_atomics_helper+0x4a0/0x5450 [ 16.253728] kasan_check_range+0x10c/0x1c0 [ 16.253753] __kasan_check_write+0x18/0x20 [ 16.253773] kasan_atomics_helper+0x4a0/0x5450 [ 16.253815] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.253839] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.253866] ? kasan_atomics+0x152/0x310 [ 16.253894] kasan_atomics+0x1dc/0x310 [ 16.253918] ? __pfx_kasan_atomics+0x10/0x10 [ 16.253944] ? __pfx_read_tsc+0x10/0x10 [ 16.253986] ? ktime_get_ts64+0x86/0x230 [ 16.254015] kunit_try_run_case+0x1a5/0x480 [ 16.254041] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.254073] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.254098] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.254122] ? __kthread_parkme+0x82/0x180 [ 16.254144] ? preempt_count_sub+0x50/0x80 [ 16.254169] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.254194] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.254218] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.254242] kthread+0x337/0x6f0 [ 16.254263] ? trace_preempt_on+0x20/0xc0 [ 16.254286] ? __pfx_kthread+0x10/0x10 [ 16.254327] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.254350] ? calculate_sigpending+0x7b/0xa0 [ 16.254374] ? __pfx_kthread+0x10/0x10 [ 16.254398] ret_from_fork+0x116/0x1d0 [ 16.254417] ? __pfx_kthread+0x10/0x10 [ 16.254439] ret_from_fork_asm+0x1a/0x30 [ 16.254490] </TASK> [ 16.254504] [ 16.262765] Allocated by task 282: [ 16.262942] kasan_save_stack+0x45/0x70 [ 16.263167] kasan_save_track+0x18/0x40 [ 16.263417] kasan_save_alloc_info+0x3b/0x50 [ 16.263681] __kasan_kmalloc+0xb7/0xc0 [ 16.263997] __kmalloc_cache_noprof+0x189/0x420 [ 16.264226] kasan_atomics+0x95/0x310 [ 16.264492] kunit_try_run_case+0x1a5/0x480 [ 16.264936] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.265173] kthread+0x337/0x6f0 [ 16.265326] ret_from_fork+0x116/0x1d0 [ 16.265463] ret_from_fork_asm+0x1a/0x30 [ 16.265609] [ 16.265684] The buggy address belongs to the object at ffff8881031d0c00 [ 16.265684] which belongs to the cache kmalloc-64 of size 64 [ 16.266765] The buggy address is located 0 bytes to the right of [ 16.266765] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 16.268582] [ 16.268675] The buggy address belongs to the physical page: [ 16.269279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 16.269952] flags: 0x200000000000000(node=0|zone=2) [ 16.270412] page_type: f5(slab) [ 16.270736] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.271087] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.271406] page dumped because: kasan: bad access detected [ 16.271650] [ 16.271981] Memory state around the buggy address: [ 16.272517] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.273160] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.273612] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.274112] ^ [ 16.274478] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.275020] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.275497] ================================================================== [ 16.728829] ================================================================== [ 16.729426] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 16.729836] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 16.730319] [ 16.730441] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.730486] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.730500] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.730524] Call Trace: [ 16.730540] <TASK> [ 16.730556] dump_stack_lvl+0x73/0xb0 [ 16.730584] print_report+0xd1/0x650 [ 16.730608] ? __virt_addr_valid+0x1db/0x2d0 [ 16.730631] ? kasan_atomics_helper+0xf10/0x5450 [ 16.730654] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.730682] ? kasan_atomics_helper+0xf10/0x5450 [ 16.730705] kasan_report+0x141/0x180 [ 16.730754] ? kasan_atomics_helper+0xf10/0x5450 [ 16.730806] kasan_check_range+0x10c/0x1c0 [ 16.730833] __kasan_check_write+0x18/0x20 [ 16.730854] kasan_atomics_helper+0xf10/0x5450 [ 16.730879] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.730902] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.730950] ? kasan_atomics+0x152/0x310 [ 16.730982] kasan_atomics+0x1dc/0x310 [ 16.731006] ? __pfx_kasan_atomics+0x10/0x10 [ 16.731033] ? __pfx_read_tsc+0x10/0x10 [ 16.731066] ? ktime_get_ts64+0x86/0x230 [ 16.731094] kunit_try_run_case+0x1a5/0x480 [ 16.731119] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.731158] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.731183] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.731221] ? __kthread_parkme+0x82/0x180 [ 16.731242] ? preempt_count_sub+0x50/0x80 [ 16.731268] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.731305] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.731330] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.731371] kthread+0x337/0x6f0 [ 16.731393] ? trace_preempt_on+0x20/0xc0 [ 16.731420] ? __pfx_kthread+0x10/0x10 [ 16.731442] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.731465] ? calculate_sigpending+0x7b/0xa0 [ 16.731490] ? __pfx_kthread+0x10/0x10 [ 16.731514] ret_from_fork+0x116/0x1d0 [ 16.731534] ? __pfx_kthread+0x10/0x10 [ 16.731556] ret_from_fork_asm+0x1a/0x30 [ 16.731590] </TASK> [ 16.731603] [ 16.740040] Allocated by task 282: [ 16.740251] kasan_save_stack+0x45/0x70 [ 16.740464] kasan_save_track+0x18/0x40 [ 16.740656] kasan_save_alloc_info+0x3b/0x50 [ 16.740928] __kasan_kmalloc+0xb7/0xc0 [ 16.741124] __kmalloc_cache_noprof+0x189/0x420 [ 16.741361] kasan_atomics+0x95/0x310 [ 16.741597] kunit_try_run_case+0x1a5/0x480 [ 16.741813] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.742083] kthread+0x337/0x6f0 [ 16.742261] ret_from_fork+0x116/0x1d0 [ 16.742486] ret_from_fork_asm+0x1a/0x30 [ 16.742690] [ 16.742829] The buggy address belongs to the object at ffff8881031d0c00 [ 16.742829] which belongs to the cache kmalloc-64 of size 64 [ 16.743377] The buggy address is located 0 bytes to the right of [ 16.743377] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 16.743977] [ 16.744084] The buggy address belongs to the physical page: [ 16.744378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 16.744777] flags: 0x200000000000000(node=0|zone=2) [ 16.745038] page_type: f5(slab) [ 16.745247] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.745500] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.745781] page dumped because: kasan: bad access detected [ 16.745970] [ 16.746057] Memory state around the buggy address: [ 16.746299] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.746774] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.747185] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.747573] ^ [ 16.747840] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.748114] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.748347] ================================================================== [ 17.691879] ================================================================== [ 17.692251] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 17.692611] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 17.692949] [ 17.693661] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.693713] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.693727] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.693751] Call Trace: [ 17.693769] <TASK> [ 17.693787] dump_stack_lvl+0x73/0xb0 [ 17.693923] print_report+0xd1/0x650 [ 17.693953] ? __virt_addr_valid+0x1db/0x2d0 [ 17.693979] ? kasan_atomics_helper+0x20c8/0x5450 [ 17.694003] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.694031] ? kasan_atomics_helper+0x20c8/0x5450 [ 17.694068] kasan_report+0x141/0x180 [ 17.694092] ? kasan_atomics_helper+0x20c8/0x5450 [ 17.694121] kasan_check_range+0x10c/0x1c0 [ 17.694147] __kasan_check_write+0x18/0x20 [ 17.694168] kasan_atomics_helper+0x20c8/0x5450 [ 17.694192] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.694216] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.694243] ? kasan_atomics+0x152/0x310 [ 17.694272] kasan_atomics+0x1dc/0x310 [ 17.694297] ? __pfx_kasan_atomics+0x10/0x10 [ 17.694324] ? __pfx_read_tsc+0x10/0x10 [ 17.694347] ? ktime_get_ts64+0x86/0x230 [ 17.694373] kunit_try_run_case+0x1a5/0x480 [ 17.694399] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.694423] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.694450] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.694476] ? __kthread_parkme+0x82/0x180 [ 17.694497] ? preempt_count_sub+0x50/0x80 [ 17.694524] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.694549] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.694574] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.694599] kthread+0x337/0x6f0 [ 17.694620] ? trace_preempt_on+0x20/0xc0 [ 17.694645] ? __pfx_kthread+0x10/0x10 [ 17.694668] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.694690] ? calculate_sigpending+0x7b/0xa0 [ 17.694716] ? __pfx_kthread+0x10/0x10 [ 17.694750] ret_from_fork+0x116/0x1d0 [ 17.694770] ? __pfx_kthread+0x10/0x10 [ 17.694793] ret_from_fork_asm+0x1a/0x30 [ 17.694827] </TASK> [ 17.694840] [ 17.706258] Allocated by task 282: [ 17.706585] kasan_save_stack+0x45/0x70 [ 17.706953] kasan_save_track+0x18/0x40 [ 17.707295] kasan_save_alloc_info+0x3b/0x50 [ 17.707535] __kasan_kmalloc+0xb7/0xc0 [ 17.707734] __kmalloc_cache_noprof+0x189/0x420 [ 17.708184] kasan_atomics+0x95/0x310 [ 17.708475] kunit_try_run_case+0x1a5/0x480 [ 17.708833] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.709194] kthread+0x337/0x6f0 [ 17.709480] ret_from_fork+0x116/0x1d0 [ 17.709642] ret_from_fork_asm+0x1a/0x30 [ 17.710105] [ 17.710212] The buggy address belongs to the object at ffff8881031d0c00 [ 17.710212] which belongs to the cache kmalloc-64 of size 64 [ 17.711009] The buggy address is located 0 bytes to the right of [ 17.711009] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 17.711627] [ 17.711715] The buggy address belongs to the physical page: [ 17.712218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 17.712737] flags: 0x200000000000000(node=0|zone=2) [ 17.713078] page_type: f5(slab) [ 17.713266] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.713765] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.714113] page dumped because: kasan: bad access detected [ 17.714382] [ 17.714475] Memory state around the buggy address: [ 17.714702] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.715284] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.715684] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.716167] ^ [ 17.716484] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.716950] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.717337] ================================================================== [ 16.683223] ================================================================== [ 16.683919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 16.684769] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 16.685171] [ 16.685332] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.685384] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.685398] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.685432] Call Trace: [ 16.685449] <TASK> [ 16.685467] dump_stack_lvl+0x73/0xb0 [ 16.685509] print_report+0xd1/0x650 [ 16.685538] ? __virt_addr_valid+0x1db/0x2d0 [ 16.685562] ? kasan_atomics_helper+0xde0/0x5450 [ 16.685585] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.685612] ? kasan_atomics_helper+0xde0/0x5450 [ 16.685636] kasan_report+0x141/0x180 [ 16.685671] ? kasan_atomics_helper+0xde0/0x5450 [ 16.685700] kasan_check_range+0x10c/0x1c0 [ 16.685726] __kasan_check_write+0x18/0x20 [ 16.685759] kasan_atomics_helper+0xde0/0x5450 [ 16.685784] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.685807] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.685834] ? kasan_atomics+0x152/0x310 [ 16.685864] kasan_atomics+0x1dc/0x310 [ 16.685889] ? __pfx_kasan_atomics+0x10/0x10 [ 16.685915] ? __pfx_read_tsc+0x10/0x10 [ 16.685939] ? ktime_get_ts64+0x86/0x230 [ 16.685965] kunit_try_run_case+0x1a5/0x480 [ 16.685990] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.686014] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.686040] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.686075] ? __kthread_parkme+0x82/0x180 [ 16.686096] ? preempt_count_sub+0x50/0x80 [ 16.686123] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.686148] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.686173] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.686198] kthread+0x337/0x6f0 [ 16.686219] ? trace_preempt_on+0x20/0xc0 [ 16.686244] ? __pfx_kthread+0x10/0x10 [ 16.686267] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.686290] ? calculate_sigpending+0x7b/0xa0 [ 16.686316] ? __pfx_kthread+0x10/0x10 [ 16.686339] ret_from_fork+0x116/0x1d0 [ 16.686359] ? __pfx_kthread+0x10/0x10 [ 16.686381] ret_from_fork_asm+0x1a/0x30 [ 16.686415] </TASK> [ 16.686429] [ 16.698625] Allocated by task 282: [ 16.698791] kasan_save_stack+0x45/0x70 [ 16.699164] kasan_save_track+0x18/0x40 [ 16.699541] kasan_save_alloc_info+0x3b/0x50 [ 16.699996] __kasan_kmalloc+0xb7/0xc0 [ 16.700380] __kmalloc_cache_noprof+0x189/0x420 [ 16.700853] kasan_atomics+0x95/0x310 [ 16.701246] kunit_try_run_case+0x1a5/0x480 [ 16.701681] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.702275] kthread+0x337/0x6f0 [ 16.702689] ret_from_fork+0x116/0x1d0 [ 16.703180] ret_from_fork_asm+0x1a/0x30 [ 16.703655] [ 16.703827] The buggy address belongs to the object at ffff8881031d0c00 [ 16.703827] which belongs to the cache kmalloc-64 of size 64 [ 16.704933] The buggy address is located 0 bytes to the right of [ 16.704933] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 16.705439] [ 16.705550] The buggy address belongs to the physical page: [ 16.705776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 16.706187] flags: 0x200000000000000(node=0|zone=2) [ 16.706433] page_type: f5(slab) [ 16.706596] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.706910] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.707260] page dumped because: kasan: bad access detected [ 16.707542] [ 16.707631] Memory state around the buggy address: [ 16.707928] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.708196] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.708558] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.708931] ^ [ 16.709160] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.709480] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.709741] ================================================================== [ 17.180601] ================================================================== [ 17.180945] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 17.181286] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282 [ 17.181613] [ 17.181718] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.181771] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.181785] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.181807] Call Trace: [ 17.181824] <TASK> [ 17.181842] dump_stack_lvl+0x73/0xb0 [ 17.181870] print_report+0xd1/0x650 [ 17.181893] ? __virt_addr_valid+0x1db/0x2d0 [ 17.181916] ? kasan_atomics_helper+0x164f/0x5450 [ 17.181939] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.181965] ? kasan_atomics_helper+0x164f/0x5450 [ 17.181988] kasan_report+0x141/0x180 [ 17.182011] ? kasan_atomics_helper+0x164f/0x5450 [ 17.182039] kasan_check_range+0x10c/0x1c0 [ 17.182077] __kasan_check_write+0x18/0x20 [ 17.182098] kasan_atomics_helper+0x164f/0x5450 [ 17.182122] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 17.182146] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.182172] ? kasan_atomics+0x152/0x310 [ 17.182200] kasan_atomics+0x1dc/0x310 [ 17.182224] ? __pfx_kasan_atomics+0x10/0x10 [ 17.182249] ? __pfx_read_tsc+0x10/0x10 [ 17.182272] ? ktime_get_ts64+0x86/0x230 [ 17.182297] kunit_try_run_case+0x1a5/0x480 [ 17.182323] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.182346] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.182370] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.182394] ? __kthread_parkme+0x82/0x180 [ 17.182416] ? preempt_count_sub+0x50/0x80 [ 17.182442] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.182467] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.182492] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.182515] kthread+0x337/0x6f0 [ 17.182535] ? trace_preempt_on+0x20/0xc0 [ 17.182560] ? __pfx_kthread+0x10/0x10 [ 17.182582] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.182604] ? calculate_sigpending+0x7b/0xa0 [ 17.182630] ? __pfx_kthread+0x10/0x10 [ 17.182654] ret_from_fork+0x116/0x1d0 [ 17.182674] ? __pfx_kthread+0x10/0x10 [ 17.182696] ret_from_fork_asm+0x1a/0x30 [ 17.182730] </TASK> [ 17.182742] [ 17.195687] Allocated by task 282: [ 17.196067] kasan_save_stack+0x45/0x70 [ 17.196448] kasan_save_track+0x18/0x40 [ 17.196868] kasan_save_alloc_info+0x3b/0x50 [ 17.197129] __kasan_kmalloc+0xb7/0xc0 [ 17.197276] __kmalloc_cache_noprof+0x189/0x420 [ 17.197445] kasan_atomics+0x95/0x310 [ 17.197595] kunit_try_run_case+0x1a5/0x480 [ 17.197792] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.198290] kthread+0x337/0x6f0 [ 17.198619] ret_from_fork+0x116/0x1d0 [ 17.199032] ret_from_fork_asm+0x1a/0x30 [ 17.199440] [ 17.199610] The buggy address belongs to the object at ffff8881031d0c00 [ 17.199610] which belongs to the cache kmalloc-64 of size 64 [ 17.200975] The buggy address is located 0 bytes to the right of [ 17.200975] allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30) [ 17.202167] [ 17.202251] The buggy address belongs to the physical page: [ 17.202438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0 [ 17.202697] flags: 0x200000000000000(node=0|zone=2) [ 17.203290] page_type: f5(slab) [ 17.203598] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 17.204404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.205141] page dumped because: kasan: bad access detected [ 17.205656] [ 17.205821] Memory state around the buggy address: [ 17.206175] ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.206406] ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.206634] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.207144] ^ [ 17.207590] ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.208296] ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.208927] ==================================================================
[ 56.916940] ================================================================== [ 56.924180] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 56.931485] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 56.938887] [ 56.940417] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 56.940425] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 56.940428] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 56.940432] Call Trace: [ 56.940433] <TASK> [ 56.940435] dump_stack_lvl+0x73/0xb0 [ 56.940440] print_report+0xd1/0x650 [ 56.940444] ? __virt_addr_valid+0x1db/0x2d0 [ 56.940448] ? kasan_atomics_helper+0xac7/0x5450 [ 56.940452] ? kasan_complete_mode_report_info+0x2a/0x200 [ 56.940457] ? kasan_atomics_helper+0xac7/0x5450 [ 56.940461] kasan_report+0x141/0x180 [ 56.940466] ? kasan_atomics_helper+0xac7/0x5450 [ 56.940470] kasan_check_range+0x10c/0x1c0 [ 56.940475] __kasan_check_write+0x18/0x20 [ 56.940479] kasan_atomics_helper+0xac7/0x5450 [ 56.940483] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 56.940487] ? __kmalloc_cache_noprof+0x189/0x420 [ 56.940492] ? kasan_atomics+0x152/0x310 [ 56.940497] kasan_atomics+0x1dc/0x310 [ 56.940501] ? __pfx_kasan_atomics+0x10/0x10 [ 56.940506] ? ktime_get_ts64+0x83/0x230 [ 56.940511] kunit_try_run_case+0x1a2/0x480 [ 56.940515] ? __pfx_kunit_try_run_case+0x10/0x10 [ 56.940520] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 56.940524] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 56.940528] ? __kthread_parkme+0x82/0x180 [ 56.940532] ? preempt_count_sub+0x50/0x80 [ 56.940537] ? __pfx_kunit_try_run_case+0x10/0x10 [ 56.940541] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 56.940545] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 56.940550] kthread+0x334/0x6f0 [ 56.940553] ? trace_preempt_on+0x20/0xc0 [ 56.940558] ? __pfx_kthread+0x10/0x10 [ 56.940562] ? _raw_spin_unlock_irq+0x47/0x80 [ 56.940566] ? calculate_sigpending+0x7b/0xa0 [ 56.940570] ? __pfx_kthread+0x10/0x10 [ 56.940574] ret_from_fork+0x113/0x1d0 [ 56.940578] ? __pfx_kthread+0x10/0x10 [ 56.940582] ret_from_fork_asm+0x1a/0x30 [ 56.940588] </TASK> [ 56.940589] [ 57.123288] Allocated by task 306: [ 57.126692] kasan_save_stack+0x45/0x70 [ 57.130531] kasan_save_track+0x18/0x40 [ 57.134413] kasan_save_alloc_info+0x3b/0x50 [ 57.138686] __kasan_kmalloc+0xb7/0xc0 [ 57.142439] __kmalloc_cache_noprof+0x189/0x420 [ 57.146972] kasan_atomics+0x95/0x310 [ 57.150637] kunit_try_run_case+0x1a2/0x480 [ 57.154824] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 57.160223] kthread+0x334/0x6f0 [ 57.163457] ret_from_fork+0x113/0x1d0 [ 57.167208] ret_from_fork_asm+0x1a/0x30 [ 57.171135] [ 57.172635] The buggy address belongs to the object at ffff8881066eaf00 [ 57.172635] which belongs to the cache kmalloc-64 of size 64 [ 57.184975] The buggy address is located 0 bytes to the right of [ 57.184975] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 57.197837] [ 57.199361] The buggy address belongs to the physical page: [ 57.204978] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 57.212986] flags: 0x200000000000000(node=0|zone=2) [ 57.217865] page_type: f5(slab) [ 57.221011] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 57.228751] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.236490] page dumped because: kasan: bad access detected [ 57.242061] [ 57.243562] Memory state around the buggy address: [ 57.248376] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.255627] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 57.262854] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.270082] ^ [ 57.274875] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.282094] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 57.289312] ================================================================== [ 62.219675] ================================================================== [ 62.226925] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 62.234318] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 62.241744] [ 62.243243] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 62.243251] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 62.243254] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 62.243257] Call Trace: [ 62.243259] <TASK> [ 62.243261] dump_stack_lvl+0x73/0xb0 [ 62.243265] print_report+0xd1/0x650 [ 62.243269] ? __virt_addr_valid+0x1db/0x2d0 [ 62.243273] ? kasan_atomics_helper+0x1217/0x5450 [ 62.243277] ? kasan_complete_mode_report_info+0x2a/0x200 [ 62.243283] ? kasan_atomics_helper+0x1217/0x5450 [ 62.243287] kasan_report+0x141/0x180 [ 62.243291] ? kasan_atomics_helper+0x1217/0x5450 [ 62.243296] kasan_check_range+0x10c/0x1c0 [ 62.243300] __kasan_check_write+0x18/0x20 [ 62.243304] kasan_atomics_helper+0x1217/0x5450 [ 62.243308] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 62.243312] ? __kmalloc_cache_noprof+0x189/0x420 [ 62.243317] ? kasan_atomics+0x152/0x310 [ 62.243322] kasan_atomics+0x1dc/0x310 [ 62.243346] ? __pfx_kasan_atomics+0x10/0x10 [ 62.243352] ? ktime_get_ts64+0x83/0x230 [ 62.243356] kunit_try_run_case+0x1a2/0x480 [ 62.243361] ? __pfx_kunit_try_run_case+0x10/0x10 [ 62.243379] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 62.243383] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 62.243388] ? __kthread_parkme+0x82/0x180 [ 62.243392] ? preempt_count_sub+0x50/0x80 [ 62.243396] ? __pfx_kunit_try_run_case+0x10/0x10 [ 62.243413] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 62.243418] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 62.243422] kthread+0x334/0x6f0 [ 62.243426] ? trace_preempt_on+0x20/0xc0 [ 62.243430] ? __pfx_kthread+0x10/0x10 [ 62.243434] ? _raw_spin_unlock_irq+0x47/0x80 [ 62.243438] ? calculate_sigpending+0x7b/0xa0 [ 62.243443] ? __pfx_kthread+0x10/0x10 [ 62.243447] ret_from_fork+0x113/0x1d0 [ 62.243450] ? __pfx_kthread+0x10/0x10 [ 62.243454] ret_from_fork_asm+0x1a/0x30 [ 62.243460] </TASK> [ 62.243462] [ 62.426775] Allocated by task 306: [ 62.430183] kasan_save_stack+0x45/0x70 [ 62.434022] kasan_save_track+0x18/0x40 [ 62.437861] kasan_save_alloc_info+0x3b/0x50 [ 62.442133] __kasan_kmalloc+0xb7/0xc0 [ 62.445885] __kmalloc_cache_noprof+0x189/0x420 [ 62.450421] kasan_atomics+0x95/0x310 [ 62.454094] kunit_try_run_case+0x1a2/0x480 [ 62.458278] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 62.463680] kthread+0x334/0x6f0 [ 62.466911] ret_from_fork+0x113/0x1d0 [ 62.470663] ret_from_fork_asm+0x1a/0x30 [ 62.474589] [ 62.476089] The buggy address belongs to the object at ffff8881066eaf00 [ 62.476089] which belongs to the cache kmalloc-64 of size 64 [ 62.488433] The buggy address is located 0 bytes to the right of [ 62.488433] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 62.501302] [ 62.502800] The buggy address belongs to the physical page: [ 62.508394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 62.516417] flags: 0x200000000000000(node=0|zone=2) [ 62.521305] page_type: f5(slab) [ 62.524449] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 62.532188] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.539927] page dumped because: kasan: bad access detected [ 62.545500] [ 62.547001] Memory state around the buggy address: [ 62.551793] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.559013] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 62.566233] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.573458] ^ [ 62.578252] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.585470] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.592691] ================================================================== [ 54.259925] ================================================================== [ 54.267172] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 54.274478] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 54.281872] [ 54.283395] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 54.283415] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 54.283418] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 54.283422] Call Trace: [ 54.283424] <TASK> [ 54.283425] dump_stack_lvl+0x73/0xb0 [ 54.283430] print_report+0xd1/0x650 [ 54.283434] ? __virt_addr_valid+0x1db/0x2d0 [ 54.283439] ? kasan_atomics_helper+0x697/0x5450 [ 54.283442] ? kasan_complete_mode_report_info+0x2a/0x200 [ 54.283448] ? kasan_atomics_helper+0x697/0x5450 [ 54.283452] kasan_report+0x141/0x180 [ 54.283456] ? kasan_atomics_helper+0x697/0x5450 [ 54.283461] kasan_check_range+0x10c/0x1c0 [ 54.283466] __kasan_check_write+0x18/0x20 [ 54.283469] kasan_atomics_helper+0x697/0x5450 [ 54.283473] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 54.283477] ? __kmalloc_cache_noprof+0x189/0x420 [ 54.283482] ? kasan_atomics+0x152/0x310 [ 54.283488] kasan_atomics+0x1dc/0x310 [ 54.283492] ? __pfx_kasan_atomics+0x10/0x10 [ 54.283497] ? ktime_get_ts64+0x83/0x230 [ 54.283501] kunit_try_run_case+0x1a2/0x480 [ 54.283506] ? __pfx_kunit_try_run_case+0x10/0x10 [ 54.283510] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 54.283515] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 54.283519] ? __kthread_parkme+0x82/0x180 [ 54.283523] ? preempt_count_sub+0x50/0x80 [ 54.283528] ? __pfx_kunit_try_run_case+0x10/0x10 [ 54.283532] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 54.283537] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 54.283541] kthread+0x334/0x6f0 [ 54.283545] ? trace_preempt_on+0x20/0xc0 [ 54.283549] ? __pfx_kthread+0x10/0x10 [ 54.283553] ? _raw_spin_unlock_irq+0x47/0x80 [ 54.283557] ? calculate_sigpending+0x7b/0xa0 [ 54.283562] ? __pfx_kthread+0x10/0x10 [ 54.283566] ret_from_fork+0x113/0x1d0 [ 54.283569] ? __pfx_kthread+0x10/0x10 [ 54.283573] ret_from_fork_asm+0x1a/0x30 [ 54.283579] </TASK> [ 54.283581] [ 54.466281] Allocated by task 306: [ 54.469687] kasan_save_stack+0x45/0x70 [ 54.473525] kasan_save_track+0x18/0x40 [ 54.477364] kasan_save_alloc_info+0x3b/0x50 [ 54.481682] __kasan_kmalloc+0xb7/0xc0 [ 54.485432] __kmalloc_cache_noprof+0x189/0x420 [ 54.489966] kasan_atomics+0x95/0x310 [ 54.493632] kunit_try_run_case+0x1a2/0x480 [ 54.497819] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 54.503217] kthread+0x334/0x6f0 [ 54.506450] ret_from_fork+0x113/0x1d0 [ 54.510202] ret_from_fork_asm+0x1a/0x30 [ 54.514129] [ 54.515629] The buggy address belongs to the object at ffff8881066eaf00 [ 54.515629] which belongs to the cache kmalloc-64 of size 64 [ 54.527969] The buggy address is located 0 bytes to the right of [ 54.527969] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 54.540831] [ 54.542348] The buggy address belongs to the physical page: [ 54.547927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 54.555928] flags: 0x200000000000000(node=0|zone=2) [ 54.560807] page_type: f5(slab) [ 54.563953] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 54.571694] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.579441] page dumped because: kasan: bad access detected [ 54.585012] [ 54.586512] Memory state around the buggy address: [ 54.591307] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.598533] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 54.605754] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.612981] ^ [ 54.617774] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.624992] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 54.632213] ================================================================== [ 55.398520] ================================================================== [ 55.405760] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 55.413067] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 55.420466] [ 55.421966] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 55.421974] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 55.421977] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 55.421981] Call Trace: [ 55.421983] <TASK> [ 55.421984] dump_stack_lvl+0x73/0xb0 [ 55.421989] print_report+0xd1/0x650 [ 55.421993] ? __virt_addr_valid+0x1db/0x2d0 [ 55.421997] ? kasan_atomics_helper+0x860/0x5450 [ 55.422001] ? kasan_complete_mode_report_info+0x2a/0x200 [ 55.422006] ? kasan_atomics_helper+0x860/0x5450 [ 55.422010] kasan_report+0x141/0x180 [ 55.422015] ? kasan_atomics_helper+0x860/0x5450 [ 55.422019] kasan_check_range+0x10c/0x1c0 [ 55.422024] __kasan_check_write+0x18/0x20 [ 55.422028] kasan_atomics_helper+0x860/0x5450 [ 55.422032] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 55.422036] ? __kmalloc_cache_noprof+0x189/0x420 [ 55.422041] ? kasan_atomics+0x152/0x310 [ 55.422046] kasan_atomics+0x1dc/0x310 [ 55.422051] ? __pfx_kasan_atomics+0x10/0x10 [ 55.422055] ? ktime_get_ts64+0x83/0x230 [ 55.422060] kunit_try_run_case+0x1a2/0x480 [ 55.422065] ? __pfx_kunit_try_run_case+0x10/0x10 [ 55.422069] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 55.422073] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 55.422078] ? __kthread_parkme+0x82/0x180 [ 55.422082] ? preempt_count_sub+0x50/0x80 [ 55.422086] ? __pfx_kunit_try_run_case+0x10/0x10 [ 55.422091] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 55.422095] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 55.422100] kthread+0x334/0x6f0 [ 55.422103] ? trace_preempt_on+0x20/0xc0 [ 55.422108] ? __pfx_kthread+0x10/0x10 [ 55.422112] ? _raw_spin_unlock_irq+0x47/0x80 [ 55.422115] ? calculate_sigpending+0x7b/0xa0 [ 55.422120] ? __pfx_kthread+0x10/0x10 [ 55.422124] ret_from_fork+0x113/0x1d0 [ 55.422128] ? __pfx_kthread+0x10/0x10 [ 55.422132] ret_from_fork_asm+0x1a/0x30 [ 55.422138] </TASK> [ 55.422140] [ 55.605068] Allocated by task 306: [ 55.608474] kasan_save_stack+0x45/0x70 [ 55.612310] kasan_save_track+0x18/0x40 [ 55.616151] kasan_save_alloc_info+0x3b/0x50 [ 55.620432] __kasan_kmalloc+0xb7/0xc0 [ 55.624184] __kmalloc_cache_noprof+0x189/0x420 [ 55.628716] kasan_atomics+0x95/0x310 [ 55.632415] kunit_try_run_case+0x1a2/0x480 [ 55.636604] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 55.642004] kthread+0x334/0x6f0 [ 55.645235] ret_from_fork+0x113/0x1d0 [ 55.648989] ret_from_fork_asm+0x1a/0x30 [ 55.652915] [ 55.654424] The buggy address belongs to the object at ffff8881066eaf00 [ 55.654424] which belongs to the cache kmalloc-64 of size 64 [ 55.666764] The buggy address is located 0 bytes to the right of [ 55.666764] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 55.679625] [ 55.681126] The buggy address belongs to the physical page: [ 55.686696] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 55.694697] flags: 0x200000000000000(node=0|zone=2) [ 55.699575] page_type: f5(slab) [ 55.702723] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 55.710471] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.718218] page dumped because: kasan: bad access detected [ 55.723789] [ 55.725290] Memory state around the buggy address: [ 55.730084] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.737312] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 55.744538] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.751759] ^ [ 55.756550] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.763769] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 55.770988] ================================================================== [ 61.463200] ================================================================== [ 61.470442] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 61.477841] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 61.485233] [ 61.486735] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 61.486743] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 61.486746] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 61.486749] Call Trace: [ 61.486751] <TASK> [ 61.486753] dump_stack_lvl+0x73/0xb0 [ 61.486757] print_report+0xd1/0x650 [ 61.486761] ? __virt_addr_valid+0x1db/0x2d0 [ 61.486766] ? kasan_atomics_helper+0x1148/0x5450 [ 61.486770] ? kasan_complete_mode_report_info+0x2a/0x200 [ 61.486775] ? kasan_atomics_helper+0x1148/0x5450 [ 61.486779] kasan_report+0x141/0x180 [ 61.486783] ? kasan_atomics_helper+0x1148/0x5450 [ 61.486788] kasan_check_range+0x10c/0x1c0 [ 61.486793] __kasan_check_write+0x18/0x20 [ 61.486796] kasan_atomics_helper+0x1148/0x5450 [ 61.486800] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 61.486804] ? __kmalloc_cache_noprof+0x189/0x420 [ 61.486809] ? kasan_atomics+0x152/0x310 [ 61.486815] kasan_atomics+0x1dc/0x310 [ 61.486819] ? __pfx_kasan_atomics+0x10/0x10 [ 61.486824] ? ktime_get_ts64+0x83/0x230 [ 61.486828] kunit_try_run_case+0x1a2/0x480 [ 61.486833] ? __pfx_kunit_try_run_case+0x10/0x10 [ 61.486837] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 61.486842] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 61.486846] ? __kthread_parkme+0x82/0x180 [ 61.486850] ? preempt_count_sub+0x50/0x80 [ 61.486854] ? __pfx_kunit_try_run_case+0x10/0x10 [ 61.486859] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 61.486863] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 61.486868] kthread+0x334/0x6f0 [ 61.486871] ? trace_preempt_on+0x20/0xc0 [ 61.486876] ? __pfx_kthread+0x10/0x10 [ 61.486880] ? _raw_spin_unlock_irq+0x47/0x80 [ 61.486884] ? calculate_sigpending+0x7b/0xa0 [ 61.486888] ? __pfx_kthread+0x10/0x10 [ 61.486892] ret_from_fork+0x113/0x1d0 [ 61.486896] ? __pfx_kthread+0x10/0x10 [ 61.486900] ret_from_fork_asm+0x1a/0x30 [ 61.486906] </TASK> [ 61.486908] [ 61.670033] Allocated by task 306: [ 61.673440] kasan_save_stack+0x45/0x70 [ 61.677277] kasan_save_track+0x18/0x40 [ 61.681116] kasan_save_alloc_info+0x3b/0x50 [ 61.685426] __kasan_kmalloc+0xb7/0xc0 [ 61.689185] __kmalloc_cache_noprof+0x189/0x420 [ 61.693719] kasan_atomics+0x95/0x310 [ 61.697427] kunit_try_run_case+0x1a2/0x480 [ 61.701614] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 61.707012] kthread+0x334/0x6f0 [ 61.710247] ret_from_fork+0x113/0x1d0 [ 61.713998] ret_from_fork_asm+0x1a/0x30 [ 61.717925] [ 61.719427] The buggy address belongs to the object at ffff8881066eaf00 [ 61.719427] which belongs to the cache kmalloc-64 of size 64 [ 61.731766] The buggy address is located 0 bytes to the right of [ 61.731766] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 61.744626] [ 61.746126] The buggy address belongs to the physical page: [ 61.751700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 61.759706] flags: 0x200000000000000(node=0|zone=2) [ 61.764584] page_type: f5(slab) [ 61.767733] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 61.775472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.783220] page dumped because: kasan: bad access detected [ 61.788791] [ 61.790292] Memory state around the buggy address: [ 61.795084] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.802303] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 61.809522] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.816742] ^ [ 61.821533] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.828754] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 61.835972] ================================================================== [ 74.396209] ================================================================== [ 74.403449] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 74.410841] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 74.418242] [ 74.419743] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 74.419751] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 74.419754] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 74.419757] Call Trace: [ 74.419759] <TASK> [ 74.419761] dump_stack_lvl+0x73/0xb0 [ 74.419765] print_report+0xd1/0x650 [ 74.419769] ? __virt_addr_valid+0x1db/0x2d0 [ 74.419774] ? kasan_atomics_helper+0x218a/0x5450 [ 74.419777] ? kasan_complete_mode_report_info+0x2a/0x200 [ 74.419783] ? kasan_atomics_helper+0x218a/0x5450 [ 74.419787] kasan_report+0x141/0x180 [ 74.419791] ? kasan_atomics_helper+0x218a/0x5450 [ 74.419796] kasan_check_range+0x10c/0x1c0 [ 74.419801] __kasan_check_write+0x18/0x20 [ 74.419804] kasan_atomics_helper+0x218a/0x5450 [ 74.419809] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 74.419813] ? __kmalloc_cache_noprof+0x189/0x420 [ 74.419818] ? kasan_atomics+0x152/0x310 [ 74.419823] kasan_atomics+0x1dc/0x310 [ 74.419827] ? __pfx_kasan_atomics+0x10/0x10 [ 74.419832] ? ktime_get_ts64+0x83/0x230 [ 74.419837] kunit_try_run_case+0x1a2/0x480 [ 74.419841] ? __pfx_kunit_try_run_case+0x10/0x10 [ 74.419846] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 74.419850] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 74.419855] ? __kthread_parkme+0x82/0x180 [ 74.419858] ? preempt_count_sub+0x50/0x80 [ 74.419863] ? __pfx_kunit_try_run_case+0x10/0x10 [ 74.419867] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 74.419872] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 74.419876] kthread+0x334/0x6f0 [ 74.419880] ? trace_preempt_on+0x20/0xc0 [ 74.419884] ? __pfx_kthread+0x10/0x10 [ 74.419888] ? _raw_spin_unlock_irq+0x47/0x80 [ 74.419892] ? calculate_sigpending+0x7b/0xa0 [ 74.419896] ? __pfx_kthread+0x10/0x10 [ 74.419901] ret_from_fork+0x113/0x1d0 [ 74.419904] ? __pfx_kthread+0x10/0x10 [ 74.419908] ret_from_fork_asm+0x1a/0x30 [ 74.419914] </TASK> [ 74.419916] [ 74.603059] Allocated by task 306: [ 74.606465] kasan_save_stack+0x45/0x70 [ 74.610303] kasan_save_track+0x18/0x40 [ 74.614142] kasan_save_alloc_info+0x3b/0x50 [ 74.618418] __kasan_kmalloc+0xb7/0xc0 [ 74.622178] __kmalloc_cache_noprof+0x189/0x420 [ 74.626718] kasan_atomics+0x95/0x310 [ 74.630416] kunit_try_run_case+0x1a2/0x480 [ 74.634604] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 74.640004] kthread+0x334/0x6f0 [ 74.643236] ret_from_fork+0x113/0x1d0 [ 74.646989] ret_from_fork_asm+0x1a/0x30 [ 74.650915] [ 74.652421] The buggy address belongs to the object at ffff8881066eaf00 [ 74.652421] which belongs to the cache kmalloc-64 of size 64 [ 74.664756] The buggy address is located 0 bytes to the right of [ 74.664756] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 74.677617] [ 74.679117] The buggy address belongs to the physical page: [ 74.684689] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 74.692689] flags: 0x200000000000000(node=0|zone=2) [ 74.697569] page_type: f5(slab) [ 74.700713] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 74.708453] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 74.716194] page dumped because: kasan: bad access detected [ 74.721765] [ 74.723263] Memory state around the buggy address: [ 74.728058] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.735287] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 74.742513] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.749732] ^ [ 74.754524] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.761745] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.768962] ================================================================== [ 53.124206] ================================================================== [ 53.131446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 53.138840] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 53.146239] [ 53.147740] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 53.147748] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 53.147751] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 53.147755] Call Trace: [ 53.147756] <TASK> [ 53.147758] dump_stack_lvl+0x73/0xb0 [ 53.147763] print_report+0xd1/0x650 [ 53.147767] ? __virt_addr_valid+0x1db/0x2d0 [ 53.147771] ? kasan_atomics_helper+0x4b3a/0x5450 [ 53.147775] ? kasan_complete_mode_report_info+0x2a/0x200 [ 53.147781] ? kasan_atomics_helper+0x4b3a/0x5450 [ 53.147785] kasan_report+0x141/0x180 [ 53.147789] ? kasan_atomics_helper+0x4b3a/0x5450 [ 53.147794] __asan_report_store4_noabort+0x1b/0x30 [ 53.147799] kasan_atomics_helper+0x4b3a/0x5450 [ 53.147803] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 53.147807] ? __kmalloc_cache_noprof+0x189/0x420 [ 53.147813] ? kasan_atomics+0x152/0x310 [ 53.147818] kasan_atomics+0x1dc/0x310 [ 53.147822] ? __pfx_kasan_atomics+0x10/0x10 [ 53.147827] ? ktime_get_ts64+0x83/0x230 [ 53.147832] kunit_try_run_case+0x1a2/0x480 [ 53.147836] ? __pfx_kunit_try_run_case+0x10/0x10 [ 53.147841] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 53.147845] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 53.147849] ? __kthread_parkme+0x82/0x180 [ 53.147853] ? preempt_count_sub+0x50/0x80 [ 53.147858] ? __pfx_kunit_try_run_case+0x10/0x10 [ 53.147862] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 53.147866] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 53.147871] kthread+0x334/0x6f0 [ 53.147875] ? trace_preempt_on+0x20/0xc0 [ 53.147879] ? __pfx_kthread+0x10/0x10 [ 53.147883] ? _raw_spin_unlock_irq+0x47/0x80 [ 53.147887] ? calculate_sigpending+0x7b/0xa0 [ 53.147891] ? __pfx_kthread+0x10/0x10 [ 53.147896] ret_from_fork+0x113/0x1d0 [ 53.147899] ? __pfx_kthread+0x10/0x10 [ 53.147903] ret_from_fork_asm+0x1a/0x30 [ 53.147909] </TASK> [ 53.147911] [ 53.327764] Allocated by task 306: [ 53.331169] kasan_save_stack+0x45/0x70 [ 53.335008] kasan_save_track+0x18/0x40 [ 53.338847] kasan_save_alloc_info+0x3b/0x50 [ 53.343121] __kasan_kmalloc+0xb7/0xc0 [ 53.346883] __kmalloc_cache_noprof+0x189/0x420 [ 53.351428] kasan_atomics+0x95/0x310 [ 53.355096] kunit_try_run_case+0x1a2/0x480 [ 53.359282] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 53.364684] kthread+0x334/0x6f0 [ 53.367925] ret_from_fork+0x113/0x1d0 [ 53.371677] ret_from_fork_asm+0x1a/0x30 [ 53.375602] [ 53.377103] The buggy address belongs to the object at ffff8881066eaf00 [ 53.377103] which belongs to the cache kmalloc-64 of size 64 [ 53.389443] The buggy address is located 0 bytes to the right of [ 53.389443] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 53.402305] [ 53.403805] The buggy address belongs to the physical page: [ 53.409422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 53.417427] flags: 0x200000000000000(node=0|zone=2) [ 53.422309] page_type: f5(slab) [ 53.425453] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 53.433195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.440940] page dumped because: kasan: bad access detected [ 53.446511] [ 53.448011] Memory state around the buggy address: [ 53.452806] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.460033] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 53.467253] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.474470] ^ [ 53.479264] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.486485] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 53.493710] ================================================================== [ 52.367913] ================================================================== [ 52.375155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 52.382555] Read of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 52.389869] [ 52.391393] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 52.391414] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 52.391417] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 52.391420] Call Trace: [ 52.391422] <TASK> [ 52.391424] dump_stack_lvl+0x73/0xb0 [ 52.391428] print_report+0xd1/0x650 [ 52.391432] ? __virt_addr_valid+0x1db/0x2d0 [ 52.391437] ? kasan_atomics_helper+0x4b54/0x5450 [ 52.391441] ? kasan_complete_mode_report_info+0x2a/0x200 [ 52.391446] ? kasan_atomics_helper+0x4b54/0x5450 [ 52.391450] kasan_report+0x141/0x180 [ 52.391454] ? kasan_atomics_helper+0x4b54/0x5450 [ 52.391459] __asan_report_load4_noabort+0x18/0x20 [ 52.391464] kasan_atomics_helper+0x4b54/0x5450 [ 52.391468] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 52.391472] ? __kmalloc_cache_noprof+0x189/0x420 [ 52.391477] ? kasan_atomics+0x152/0x310 [ 52.391482] kasan_atomics+0x1dc/0x310 [ 52.391487] ? __pfx_kasan_atomics+0x10/0x10 [ 52.391492] ? ktime_get_ts64+0x83/0x230 [ 52.391496] kunit_try_run_case+0x1a2/0x480 [ 52.391501] ? __pfx_kunit_try_run_case+0x10/0x10 [ 52.391505] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 52.391510] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 52.391514] ? __kthread_parkme+0x82/0x180 [ 52.391518] ? preempt_count_sub+0x50/0x80 [ 52.391522] ? __pfx_kunit_try_run_case+0x10/0x10 [ 52.391527] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 52.391531] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 52.391536] kthread+0x334/0x6f0 [ 52.391539] ? trace_preempt_on+0x20/0xc0 [ 52.391544] ? __pfx_kthread+0x10/0x10 [ 52.391547] ? _raw_spin_unlock_irq+0x47/0x80 [ 52.391551] ? calculate_sigpending+0x7b/0xa0 [ 52.391556] ? __pfx_kthread+0x10/0x10 [ 52.391560] ret_from_fork+0x113/0x1d0 [ 52.391564] ? __pfx_kthread+0x10/0x10 [ 52.391568] ret_from_fork_asm+0x1a/0x30 [ 52.391574] </TASK> [ 52.391575] [ 52.571279] Allocated by task 306: [ 52.574686] kasan_save_stack+0x45/0x70 [ 52.578533] kasan_save_track+0x18/0x40 [ 52.582413] kasan_save_alloc_info+0x3b/0x50 [ 52.586687] __kasan_kmalloc+0xb7/0xc0 [ 52.590441] __kmalloc_cache_noprof+0x189/0x420 [ 52.594983] kasan_atomics+0x95/0x310 [ 52.598657] kunit_try_run_case+0x1a2/0x480 [ 52.602844] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 52.608241] kthread+0x334/0x6f0 [ 52.611475] ret_from_fork+0x113/0x1d0 [ 52.615228] ret_from_fork_asm+0x1a/0x30 [ 52.619161] [ 52.620660] The buggy address belongs to the object at ffff8881066eaf00 [ 52.620660] which belongs to the cache kmalloc-64 of size 64 [ 52.633003] The buggy address is located 0 bytes to the right of [ 52.633003] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 52.645863] [ 52.647362] The buggy address belongs to the physical page: [ 52.652954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 52.660960] flags: 0x200000000000000(node=0|zone=2) [ 52.665840] page_type: f5(slab) [ 52.668989] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 52.676734] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.684473] page dumped because: kasan: bad access detected [ 52.690047] [ 52.691546] Memory state around the buggy address: [ 52.696364] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.703629] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 52.710855] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.718075] ^ [ 52.722868] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.730096] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 52.737313] ================================================================== [ 67.906181] ================================================================== [ 67.913427] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 67.920820] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 67.928214] [ 67.929713] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 67.929721] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 67.929724] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 67.929727] Call Trace: [ 67.929729] <TASK> [ 67.929731] dump_stack_lvl+0x73/0xb0 [ 67.929735] print_report+0xd1/0x650 [ 67.929739] ? __virt_addr_valid+0x1db/0x2d0 [ 67.929743] ? kasan_atomics_helper+0x194a/0x5450 [ 67.929747] ? kasan_complete_mode_report_info+0x2a/0x200 [ 67.929753] ? kasan_atomics_helper+0x194a/0x5450 [ 67.929757] kasan_report+0x141/0x180 [ 67.929761] ? kasan_atomics_helper+0x194a/0x5450 [ 67.929766] kasan_check_range+0x10c/0x1c0 [ 67.929770] __kasan_check_write+0x18/0x20 [ 67.929774] kasan_atomics_helper+0x194a/0x5450 [ 67.929778] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 67.929782] ? __kmalloc_cache_noprof+0x189/0x420 [ 67.929787] ? kasan_atomics+0x152/0x310 [ 67.929792] kasan_atomics+0x1dc/0x310 [ 67.929797] ? __pfx_kasan_atomics+0x10/0x10 [ 67.929802] ? ktime_get_ts64+0x83/0x230 [ 67.929806] kunit_try_run_case+0x1a2/0x480 [ 67.929811] ? __pfx_kunit_try_run_case+0x10/0x10 [ 67.929815] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 67.929820] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 67.929824] ? __kthread_parkme+0x82/0x180 [ 67.929828] ? preempt_count_sub+0x50/0x80 [ 67.929832] ? __pfx_kunit_try_run_case+0x10/0x10 [ 67.929837] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 67.929841] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 67.929845] kthread+0x334/0x6f0 [ 67.929849] ? trace_preempt_on+0x20/0xc0 [ 67.929853] ? __pfx_kthread+0x10/0x10 [ 67.929857] ? _raw_spin_unlock_irq+0x47/0x80 [ 67.929861] ? calculate_sigpending+0x7b/0xa0 [ 67.929866] ? __pfx_kthread+0x10/0x10 [ 67.929870] ret_from_fork+0x113/0x1d0 [ 67.929874] ? __pfx_kthread+0x10/0x10 [ 67.929878] ret_from_fork_asm+0x1a/0x30 [ 67.929883] </TASK> [ 67.929885] [ 68.113071] Allocated by task 306: [ 68.116479] kasan_save_stack+0x45/0x70 [ 68.120318] kasan_save_track+0x18/0x40 [ 68.124190] kasan_save_alloc_info+0x3b/0x50 [ 68.128463] __kasan_kmalloc+0xb7/0xc0 [ 68.132218] __kmalloc_cache_noprof+0x189/0x420 [ 68.136756] kasan_atomics+0x95/0x310 [ 68.140424] kunit_try_run_case+0x1a2/0x480 [ 68.144610] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 68.150018] kthread+0x334/0x6f0 [ 68.153252] ret_from_fork+0x113/0x1d0 [ 68.157002] ret_from_fork_asm+0x1a/0x30 [ 68.160929] [ 68.162428] The buggy address belongs to the object at ffff8881066eaf00 [ 68.162428] which belongs to the cache kmalloc-64 of size 64 [ 68.174769] The buggy address is located 0 bytes to the right of [ 68.174769] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 68.187632] [ 68.189130] The buggy address belongs to the physical page: [ 68.194703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 68.202710] flags: 0x200000000000000(node=0|zone=2) [ 68.207591] page_type: f5(slab) [ 68.210739] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 68.218485] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.226232] page dumped because: kasan: bad access detected [ 68.231805] [ 68.233303] Memory state around the buggy address: [ 68.238098] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.245345] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 68.252571] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 68.259797] ^ [ 68.264592] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.271819] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 68.279037] ================================================================== [ 69.426325] ================================================================== [ 69.433571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 69.440965] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 69.448379] [ 69.449910] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 69.449917] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 69.449920] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 69.449924] Call Trace: [ 69.449925] <TASK> [ 69.449927] dump_stack_lvl+0x73/0xb0 [ 69.449932] print_report+0xd1/0x650 [ 69.449936] ? __virt_addr_valid+0x1db/0x2d0 [ 69.449940] ? kasan_atomics_helper+0x1c18/0x5450 [ 69.449944] ? kasan_complete_mode_report_info+0x2a/0x200 [ 69.449949] ? kasan_atomics_helper+0x1c18/0x5450 [ 69.449953] kasan_report+0x141/0x180 [ 69.449957] ? kasan_atomics_helper+0x1c18/0x5450 [ 69.449962] kasan_check_range+0x10c/0x1c0 [ 69.449967] __kasan_check_write+0x18/0x20 [ 69.449970] kasan_atomics_helper+0x1c18/0x5450 [ 69.449974] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 69.449979] ? __kmalloc_cache_noprof+0x189/0x420 [ 69.449984] ? kasan_atomics+0x152/0x310 [ 69.449989] kasan_atomics+0x1dc/0x310 [ 69.449993] ? __pfx_kasan_atomics+0x10/0x10 [ 69.449998] ? ktime_get_ts64+0x83/0x230 [ 69.450002] kunit_try_run_case+0x1a2/0x480 [ 69.450007] ? __pfx_kunit_try_run_case+0x10/0x10 [ 69.450011] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 69.450016] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 69.450020] ? __kthread_parkme+0x82/0x180 [ 69.450024] ? preempt_count_sub+0x50/0x80 [ 69.450028] ? __pfx_kunit_try_run_case+0x10/0x10 [ 69.450033] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 69.450037] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 69.450042] kthread+0x334/0x6f0 [ 69.450045] ? trace_preempt_on+0x20/0xc0 [ 69.450050] ? __pfx_kthread+0x10/0x10 [ 69.450054] ? _raw_spin_unlock_irq+0x47/0x80 [ 69.450058] ? calculate_sigpending+0x7b/0xa0 [ 69.450062] ? __pfx_kthread+0x10/0x10 [ 69.450066] ret_from_fork+0x113/0x1d0 [ 69.450070] ? __pfx_kthread+0x10/0x10 [ 69.450074] ret_from_fork_asm+0x1a/0x30 [ 69.450080] </TASK> [ 69.450082] [ 69.633154] Allocated by task 306: [ 69.636562] kasan_save_stack+0x45/0x70 [ 69.640420] kasan_save_track+0x18/0x40 [ 69.644265] kasan_save_alloc_info+0x3b/0x50 [ 69.648538] __kasan_kmalloc+0xb7/0xc0 [ 69.652290] __kmalloc_cache_noprof+0x189/0x420 [ 69.656824] kasan_atomics+0x95/0x310 [ 69.660489] kunit_try_run_case+0x1a2/0x480 [ 69.664675] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 69.670076] kthread+0x334/0x6f0 [ 69.673316] ret_from_fork+0x113/0x1d0 [ 69.677104] ret_from_fork_asm+0x1a/0x30 [ 69.681038] [ 69.682538] The buggy address belongs to the object at ffff8881066eaf00 [ 69.682538] which belongs to the cache kmalloc-64 of size 64 [ 69.694880] The buggy address is located 0 bytes to the right of [ 69.694880] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 69.707741] [ 69.709239] The buggy address belongs to the physical page: [ 69.714813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 69.722821] flags: 0x200000000000000(node=0|zone=2) [ 69.727698] page_type: f5(slab) [ 69.730847] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 69.738596] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 69.746368] page dumped because: kasan: bad access detected [ 69.751983] [ 69.753481] Memory state around the buggy address: [ 69.758275] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.765493] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 69.772714] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.779932] ^ [ 69.784725] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.791945] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 69.799165] ================================================================== [ 51.612021] ================================================================== [ 51.619267] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 51.626659] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 51.634053] [ 51.635552] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 51.635561] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 51.635563] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 51.635567] Call Trace: [ 51.635569] <TASK> [ 51.635571] dump_stack_lvl+0x73/0xb0 [ 51.635575] print_report+0xd1/0x650 [ 51.635579] ? __virt_addr_valid+0x1db/0x2d0 [ 51.635583] ? kasan_atomics_helper+0x4b6e/0x5450 [ 51.635587] ? kasan_complete_mode_report_info+0x2a/0x200 [ 51.635593] ? kasan_atomics_helper+0x4b6e/0x5450 [ 51.635597] kasan_report+0x141/0x180 [ 51.635601] ? kasan_atomics_helper+0x4b6e/0x5450 [ 51.635606] __asan_report_store4_noabort+0x1b/0x30 [ 51.635611] kasan_atomics_helper+0x4b6e/0x5450 [ 51.635615] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 51.635619] ? __kmalloc_cache_noprof+0x189/0x420 [ 51.635624] ? kasan_atomics+0x152/0x310 [ 51.635629] kasan_atomics+0x1dc/0x310 [ 51.635634] ? __pfx_kasan_atomics+0x10/0x10 [ 51.635639] ? ktime_get_ts64+0x83/0x230 [ 51.635643] kunit_try_run_case+0x1a2/0x480 [ 51.635648] ? __pfx_kunit_try_run_case+0x10/0x10 [ 51.635652] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 51.635656] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 51.635661] ? __kthread_parkme+0x82/0x180 [ 51.635665] ? preempt_count_sub+0x50/0x80 [ 51.635669] ? __pfx_kunit_try_run_case+0x10/0x10 [ 51.635674] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 51.635678] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 51.635682] kthread+0x334/0x6f0 [ 51.635686] ? trace_preempt_on+0x20/0xc0 [ 51.635690] ? __pfx_kthread+0x10/0x10 [ 51.635694] ? _raw_spin_unlock_irq+0x47/0x80 [ 51.635698] ? calculate_sigpending+0x7b/0xa0 [ 51.635703] ? __pfx_kthread+0x10/0x10 [ 51.635707] ret_from_fork+0x113/0x1d0 [ 51.635711] ? __pfx_kthread+0x10/0x10 [ 51.635715] ret_from_fork_asm+0x1a/0x30 [ 51.635720] </TASK> [ 51.635722] [ 51.815376] Allocated by task 306: [ 51.818789] kasan_save_stack+0x45/0x70 [ 51.822628] kasan_save_track+0x18/0x40 [ 51.826468] kasan_save_alloc_info+0x3b/0x50 [ 51.830742] __kasan_kmalloc+0xb7/0xc0 [ 51.834493] __kmalloc_cache_noprof+0x189/0x420 [ 51.839026] kasan_atomics+0x95/0x310 [ 51.842693] kunit_try_run_case+0x1a2/0x480 [ 51.846887] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 51.852288] kthread+0x334/0x6f0 [ 51.855520] ret_from_fork+0x113/0x1d0 [ 51.859273] ret_from_fork_asm+0x1a/0x30 [ 51.863197] [ 51.864698] The buggy address belongs to the object at ffff8881066eaf00 [ 51.864698] which belongs to the cache kmalloc-64 of size 64 [ 51.877039] The buggy address is located 0 bytes to the right of [ 51.877039] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 51.889899] [ 51.891423] The buggy address belongs to the physical page: [ 51.896998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 51.905007] flags: 0x200000000000000(node=0|zone=2) [ 51.909884] page_type: f5(slab) [ 51.913032] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 51.920781] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.928526] page dumped because: kasan: bad access detected [ 51.934100] [ 51.935601] Memory state around the buggy address: [ 51.940417] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.947637] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 51.954856] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.962077] ^ [ 51.966869] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.974087] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 51.981307] ================================================================== [ 68.286280] ================================================================== [ 68.293512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 68.300902] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 68.308295] [ 68.309798] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 68.309805] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 68.309808] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 68.309812] Call Trace: [ 68.309813] <TASK> [ 68.309815] dump_stack_lvl+0x73/0xb0 [ 68.309820] print_report+0xd1/0x650 [ 68.309824] ? __virt_addr_valid+0x1db/0x2d0 [ 68.309828] ? kasan_atomics_helper+0x19e3/0x5450 [ 68.309832] ? kasan_complete_mode_report_info+0x2a/0x200 [ 68.309837] ? kasan_atomics_helper+0x19e3/0x5450 [ 68.309841] kasan_report+0x141/0x180 [ 68.309845] ? kasan_atomics_helper+0x19e3/0x5450 [ 68.309850] kasan_check_range+0x10c/0x1c0 [ 68.309855] __kasan_check_write+0x18/0x20 [ 68.309858] kasan_atomics_helper+0x19e3/0x5450 [ 68.309862] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 68.309866] ? __kmalloc_cache_noprof+0x189/0x420 [ 68.309871] ? kasan_atomics+0x152/0x310 [ 68.309876] kasan_atomics+0x1dc/0x310 [ 68.309881] ? __pfx_kasan_atomics+0x10/0x10 [ 68.309886] ? ktime_get_ts64+0x83/0x230 [ 68.309890] kunit_try_run_case+0x1a2/0x480 [ 68.309895] ? __pfx_kunit_try_run_case+0x10/0x10 [ 68.309899] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 68.309904] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 68.309908] ? __kthread_parkme+0x82/0x180 [ 68.309912] ? preempt_count_sub+0x50/0x80 [ 68.309916] ? __pfx_kunit_try_run_case+0x10/0x10 [ 68.309921] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 68.309925] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 68.309930] kthread+0x334/0x6f0 [ 68.309934] ? trace_preempt_on+0x20/0xc0 [ 68.309938] ? __pfx_kthread+0x10/0x10 [ 68.309942] ? _raw_spin_unlock_irq+0x47/0x80 [ 68.309946] ? calculate_sigpending+0x7b/0xa0 [ 68.309950] ? __pfx_kthread+0x10/0x10 [ 68.309955] ret_from_fork+0x113/0x1d0 [ 68.309958] ? __pfx_kthread+0x10/0x10 [ 68.309962] ret_from_fork_asm+0x1a/0x30 [ 68.309968] </TASK> [ 68.309970] [ 68.493078] Allocated by task 306: [ 68.496483] kasan_save_stack+0x45/0x70 [ 68.500323] kasan_save_track+0x18/0x40 [ 68.504213] kasan_save_alloc_info+0x3b/0x50 [ 68.508485] __kasan_kmalloc+0xb7/0xc0 [ 68.512239] __kmalloc_cache_noprof+0x189/0x420 [ 68.516773] kasan_atomics+0x95/0x310 [ 68.520446] kunit_try_run_case+0x1a2/0x480 [ 68.524632] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 68.530031] kthread+0x334/0x6f0 [ 68.533266] ret_from_fork+0x113/0x1d0 [ 68.537019] ret_from_fork_asm+0x1a/0x30 [ 68.540954] [ 68.542453] The buggy address belongs to the object at ffff8881066eaf00 [ 68.542453] which belongs to the cache kmalloc-64 of size 64 [ 68.554793] The buggy address is located 0 bytes to the right of [ 68.554793] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 68.567654] [ 68.569155] The buggy address belongs to the physical page: [ 68.574725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 68.582725] flags: 0x200000000000000(node=0|zone=2) [ 68.587605] page_type: f5(slab) [ 68.590753] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 68.598498] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.606237] page dumped because: kasan: bad access detected [ 68.611810] [ 68.613310] Memory state around the buggy address: [ 68.618103] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.625321] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 68.632567] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 68.639786] ^ [ 68.644579] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.651799] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 68.659016] ================================================================== [ 64.489430] ================================================================== [ 64.496670] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 64.504063] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 64.511457] [ 64.512956] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 64.512964] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 64.512966] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 64.512970] Call Trace: [ 64.512971] <TASK> [ 64.512973] dump_stack_lvl+0x73/0xb0 [ 64.512978] print_report+0xd1/0x650 [ 64.512982] ? __virt_addr_valid+0x1db/0x2d0 [ 64.512986] ? kasan_atomics_helper+0x1467/0x5450 [ 64.512990] ? kasan_complete_mode_report_info+0x2a/0x200 [ 64.512995] ? kasan_atomics_helper+0x1467/0x5450 [ 64.512999] kasan_report+0x141/0x180 [ 64.513004] ? kasan_atomics_helper+0x1467/0x5450 [ 64.513009] kasan_check_range+0x10c/0x1c0 [ 64.513013] __kasan_check_write+0x18/0x20 [ 64.513017] kasan_atomics_helper+0x1467/0x5450 [ 64.513021] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 64.513025] ? __kmalloc_cache_noprof+0x189/0x420 [ 64.513030] ? kasan_atomics+0x152/0x310 [ 64.513035] kasan_atomics+0x1dc/0x310 [ 64.513040] ? __pfx_kasan_atomics+0x10/0x10 [ 64.513045] ? ktime_get_ts64+0x83/0x230 [ 64.513049] kunit_try_run_case+0x1a2/0x480 [ 64.513054] ? __pfx_kunit_try_run_case+0x10/0x10 [ 64.513058] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 64.513063] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 64.513067] ? __kthread_parkme+0x82/0x180 [ 64.513071] ? preempt_count_sub+0x50/0x80 [ 64.513075] ? __pfx_kunit_try_run_case+0x10/0x10 [ 64.513080] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 64.513084] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 64.513089] kthread+0x334/0x6f0 [ 64.513092] ? trace_preempt_on+0x20/0xc0 [ 64.513097] ? __pfx_kthread+0x10/0x10 [ 64.513101] ? _raw_spin_unlock_irq+0x47/0x80 [ 64.513104] ? calculate_sigpending+0x7b/0xa0 [ 64.513109] ? __pfx_kthread+0x10/0x10 [ 64.513113] ret_from_fork+0x113/0x1d0 [ 64.513117] ? __pfx_kthread+0x10/0x10 [ 64.513121] ret_from_fork_asm+0x1a/0x30 [ 64.513127] </TASK> [ 64.513129] [ 64.696149] Allocated by task 306: [ 64.699556] kasan_save_stack+0x45/0x70 [ 64.703394] kasan_save_track+0x18/0x40 [ 64.707253] kasan_save_alloc_info+0x3b/0x50 [ 64.711533] __kasan_kmalloc+0xb7/0xc0 [ 64.715288] __kmalloc_cache_noprof+0x189/0x420 [ 64.719829] kasan_atomics+0x95/0x310 [ 64.723501] kunit_try_run_case+0x1a2/0x480 [ 64.727687] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 64.733089] kthread+0x334/0x6f0 [ 64.736348] ret_from_fork+0x113/0x1d0 [ 64.740161] ret_from_fork_asm+0x1a/0x30 [ 64.744093] [ 64.745594] The buggy address belongs to the object at ffff8881066eaf00 [ 64.745594] which belongs to the cache kmalloc-64 of size 64 [ 64.757935] The buggy address is located 0 bytes to the right of [ 64.757935] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 64.770796] [ 64.772294] The buggy address belongs to the physical page: [ 64.777868] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 64.785867] flags: 0x200000000000000(node=0|zone=2) [ 64.790747] page_type: f5(slab) [ 64.793893] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 64.801643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.809422] page dumped because: kasan: bad access detected [ 64.814997] [ 64.816494] Memory state around the buggy address: [ 64.821287] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.828508] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 64.835727] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.842946] ^ [ 64.847739] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.854959] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.862184] ================================================================== [ 57.676189] ================================================================== [ 57.683430] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 57.690743] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 57.698134] [ 57.699635] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 57.699643] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 57.699646] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 57.699649] Call Trace: [ 57.699651] <TASK> [ 57.699653] dump_stack_lvl+0x73/0xb0 [ 57.699657] print_report+0xd1/0x650 [ 57.699662] ? __virt_addr_valid+0x1db/0x2d0 [ 57.699666] ? kasan_atomics_helper+0xc70/0x5450 [ 57.699669] ? kasan_complete_mode_report_info+0x2a/0x200 [ 57.699675] ? kasan_atomics_helper+0xc70/0x5450 [ 57.699679] kasan_report+0x141/0x180 [ 57.699683] ? kasan_atomics_helper+0xc70/0x5450 [ 57.699688] kasan_check_range+0x10c/0x1c0 [ 57.699693] __kasan_check_write+0x18/0x20 [ 57.699696] kasan_atomics_helper+0xc70/0x5450 [ 57.699700] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 57.699704] ? __kmalloc_cache_noprof+0x189/0x420 [ 57.699709] ? kasan_atomics+0x152/0x310 [ 57.699715] kasan_atomics+0x1dc/0x310 [ 57.699719] ? __pfx_kasan_atomics+0x10/0x10 [ 57.699724] ? ktime_get_ts64+0x83/0x230 [ 57.699728] kunit_try_run_case+0x1a2/0x480 [ 57.699733] ? __pfx_kunit_try_run_case+0x10/0x10 [ 57.699737] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 57.699742] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 57.699746] ? __kthread_parkme+0x82/0x180 [ 57.699750] ? preempt_count_sub+0x50/0x80 [ 57.699754] ? __pfx_kunit_try_run_case+0x10/0x10 [ 57.699759] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 57.699763] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 57.699768] kthread+0x334/0x6f0 [ 57.699772] ? trace_preempt_on+0x20/0xc0 [ 57.699776] ? __pfx_kthread+0x10/0x10 [ 57.699780] ? _raw_spin_unlock_irq+0x47/0x80 [ 57.699784] ? calculate_sigpending+0x7b/0xa0 [ 57.699788] ? __pfx_kthread+0x10/0x10 [ 57.699793] ret_from_fork+0x113/0x1d0 [ 57.699796] ? __pfx_kthread+0x10/0x10 [ 57.699800] ret_from_fork_asm+0x1a/0x30 [ 57.699806] </TASK> [ 57.699808] [ 57.882526] Allocated by task 306: [ 57.885932] kasan_save_stack+0x45/0x70 [ 57.889772] kasan_save_track+0x18/0x40 [ 57.893610] kasan_save_alloc_info+0x3b/0x50 [ 57.897885] __kasan_kmalloc+0xb7/0xc0 [ 57.901643] __kmalloc_cache_noprof+0x189/0x420 [ 57.906178] kasan_atomics+0x95/0x310 [ 57.909850] kunit_try_run_case+0x1a2/0x480 [ 57.914037] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 57.919438] kthread+0x334/0x6f0 [ 57.922670] ret_from_fork+0x113/0x1d0 [ 57.926422] ret_from_fork_asm+0x1a/0x30 [ 57.930376] [ 57.931908] The buggy address belongs to the object at ffff8881066eaf00 [ 57.931908] which belongs to the cache kmalloc-64 of size 64 [ 57.944249] The buggy address is located 0 bytes to the right of [ 57.944249] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 57.957110] [ 57.958611] The buggy address belongs to the physical page: [ 57.964182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 57.972183] flags: 0x200000000000000(node=0|zone=2) [ 57.977062] page_type: f5(slab) [ 57.980207] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 57.987949] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.995696] page dumped because: kasan: bad access detected [ 58.001267] [ 58.002768] Memory state around the buggy address: [ 58.007560] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.014778] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 58.021999] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.029217] ^ [ 58.034010] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.041229] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 58.048448] ================================================================== [ 54.639445] ================================================================== [ 54.646684] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 54.653992] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 54.661422] [ 54.662919] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 54.662927] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 54.662930] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 54.662933] Call Trace: [ 54.662935] <TASK> [ 54.662937] dump_stack_lvl+0x73/0xb0 [ 54.662942] print_report+0xd1/0x650 [ 54.662946] ? __virt_addr_valid+0x1db/0x2d0 [ 54.662950] ? kasan_atomics_helper+0x72f/0x5450 [ 54.662954] ? kasan_complete_mode_report_info+0x2a/0x200 [ 54.662959] ? kasan_atomics_helper+0x72f/0x5450 [ 54.662963] kasan_report+0x141/0x180 [ 54.662967] ? kasan_atomics_helper+0x72f/0x5450 [ 54.662972] kasan_check_range+0x10c/0x1c0 [ 54.662977] __kasan_check_write+0x18/0x20 [ 54.662980] kasan_atomics_helper+0x72f/0x5450 [ 54.662984] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 54.662989] ? __kmalloc_cache_noprof+0x189/0x420 [ 54.662994] ? kasan_atomics+0x152/0x310 [ 54.662999] kasan_atomics+0x1dc/0x310 [ 54.663003] ? __pfx_kasan_atomics+0x10/0x10 [ 54.663008] ? ktime_get_ts64+0x83/0x230 [ 54.663013] kunit_try_run_case+0x1a2/0x480 [ 54.663017] ? __pfx_kunit_try_run_case+0x10/0x10 [ 54.663022] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 54.663026] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 54.663031] ? __kthread_parkme+0x82/0x180 [ 54.663035] ? preempt_count_sub+0x50/0x80 [ 54.663039] ? __pfx_kunit_try_run_case+0x10/0x10 [ 54.663044] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 54.663048] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 54.663052] kthread+0x334/0x6f0 [ 54.663056] ? trace_preempt_on+0x20/0xc0 [ 54.663060] ? __pfx_kthread+0x10/0x10 [ 54.663064] ? _raw_spin_unlock_irq+0x47/0x80 [ 54.663068] ? calculate_sigpending+0x7b/0xa0 [ 54.663073] ? __pfx_kthread+0x10/0x10 [ 54.663077] ret_from_fork+0x113/0x1d0 [ 54.663081] ? __pfx_kthread+0x10/0x10 [ 54.663085] ret_from_fork_asm+0x1a/0x30 [ 54.663090] </TASK> [ 54.663092] [ 54.845782] Allocated by task 306: [ 54.849190] kasan_save_stack+0x45/0x70 [ 54.853030] kasan_save_track+0x18/0x40 [ 54.856876] kasan_save_alloc_info+0x3b/0x50 [ 54.861151] __kasan_kmalloc+0xb7/0xc0 [ 54.864901] __kmalloc_cache_noprof+0x189/0x420 [ 54.869434] kasan_atomics+0x95/0x310 [ 54.873100] kunit_try_run_case+0x1a2/0x480 [ 54.877286] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 54.882687] kthread+0x334/0x6f0 [ 54.885928] ret_from_fork+0x113/0x1d0 [ 54.889679] ret_from_fork_asm+0x1a/0x30 [ 54.893607] [ 54.895105] The buggy address belongs to the object at ffff8881066eaf00 [ 54.895105] which belongs to the cache kmalloc-64 of size 64 [ 54.907448] The buggy address is located 0 bytes to the right of [ 54.907448] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 54.920316] [ 54.921842] The buggy address belongs to the physical page: [ 54.927430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 54.935432] flags: 0x200000000000000(node=0|zone=2) [ 54.940311] page_type: f5(slab) [ 54.943456] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 54.951198] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.958943] page dumped because: kasan: bad access detected [ 54.964516] [ 54.966014] Memory state around the buggy address: [ 54.970807] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.978026] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 54.985247] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.992467] ^ [ 54.997258] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.004480] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 55.011707] ================================================================== [ 58.811698] ================================================================== [ 58.818937] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 58.826245] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 58.833645] [ 58.835144] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 58.835152] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 58.835155] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 58.835158] Call Trace: [ 58.835160] <TASK> [ 58.835162] dump_stack_lvl+0x73/0xb0 [ 58.835167] print_report+0xd1/0x650 [ 58.835171] ? __virt_addr_valid+0x1db/0x2d0 [ 58.835175] ? kasan_atomics_helper+0xde0/0x5450 [ 58.835179] ? kasan_complete_mode_report_info+0x2a/0x200 [ 58.835184] ? kasan_atomics_helper+0xde0/0x5450 [ 58.835188] kasan_report+0x141/0x180 [ 58.835192] ? kasan_atomics_helper+0xde0/0x5450 [ 58.835197] kasan_check_range+0x10c/0x1c0 [ 58.835202] __kasan_check_write+0x18/0x20 [ 58.835205] kasan_atomics_helper+0xde0/0x5450 [ 58.835209] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 58.835213] ? __kmalloc_cache_noprof+0x189/0x420 [ 58.835218] ? kasan_atomics+0x152/0x310 [ 58.835224] kasan_atomics+0x1dc/0x310 [ 58.835228] ? __pfx_kasan_atomics+0x10/0x10 [ 58.835233] ? ktime_get_ts64+0x83/0x230 [ 58.835237] kunit_try_run_case+0x1a2/0x480 [ 58.835242] ? __pfx_kunit_try_run_case+0x10/0x10 [ 58.835246] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 58.835251] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 58.835255] ? __kthread_parkme+0x82/0x180 [ 58.835259] ? preempt_count_sub+0x50/0x80 [ 58.835263] ? __pfx_kunit_try_run_case+0x10/0x10 [ 58.835268] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 58.835272] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 58.835276] kthread+0x334/0x6f0 [ 58.835280] ? trace_preempt_on+0x20/0xc0 [ 58.835284] ? __pfx_kthread+0x10/0x10 [ 58.835288] ? _raw_spin_unlock_irq+0x47/0x80 [ 58.835292] ? calculate_sigpending+0x7b/0xa0 [ 58.835297] ? __pfx_kthread+0x10/0x10 [ 58.835301] ret_from_fork+0x113/0x1d0 [ 58.835304] ? __pfx_kthread+0x10/0x10 [ 58.835308] ret_from_fork_asm+0x1a/0x30 [ 58.835314] </TASK> [ 58.835316] [ 59.018096] Allocated by task 306: [ 59.021504] kasan_save_stack+0x45/0x70 [ 59.025365] kasan_save_track+0x18/0x40 [ 59.029251] kasan_save_alloc_info+0x3b/0x50 [ 59.033522] __kasan_kmalloc+0xb7/0xc0 [ 59.037276] __kmalloc_cache_noprof+0x189/0x420 [ 59.041808] kasan_atomics+0x95/0x310 [ 59.045475] kunit_try_run_case+0x1a2/0x480 [ 59.049661] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 59.055060] kthread+0x334/0x6f0 [ 59.058291] ret_from_fork+0x113/0x1d0 [ 59.062046] ret_from_fork_asm+0x1a/0x30 [ 59.065972] [ 59.067471] The buggy address belongs to the object at ffff8881066eaf00 [ 59.067471] which belongs to the cache kmalloc-64 of size 64 [ 59.079812] The buggy address is located 0 bytes to the right of [ 59.079812] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 59.092673] [ 59.094173] The buggy address belongs to the physical page: [ 59.099744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 59.107744] flags: 0x200000000000000(node=0|zone=2) [ 59.112624] page_type: f5(slab) [ 59.115772] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 59.123517] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.131258] page dumped because: kasan: bad access detected [ 59.136828] [ 59.138348] Memory state around the buggy address: [ 59.143193] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.150420] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 59.157646] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.164866] ^ [ 59.169659] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.176880] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 59.184107] ================================================================== [ 69.046385] ================================================================== [ 69.053652] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 69.061045] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 69.068438] [ 69.069937] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 69.069944] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 69.069947] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 69.069951] Call Trace: [ 69.069952] <TASK> [ 69.069954] dump_stack_lvl+0x73/0xb0 [ 69.069959] print_report+0xd1/0x650 [ 69.069963] ? __virt_addr_valid+0x1db/0x2d0 [ 69.069967] ? kasan_atomics_helper+0x1b22/0x5450 [ 69.069971] ? kasan_complete_mode_report_info+0x2a/0x200 [ 69.069976] ? kasan_atomics_helper+0x1b22/0x5450 [ 69.069980] kasan_report+0x141/0x180 [ 69.069984] ? kasan_atomics_helper+0x1b22/0x5450 [ 69.069989] kasan_check_range+0x10c/0x1c0 [ 69.069994] __kasan_check_write+0x18/0x20 [ 69.069997] kasan_atomics_helper+0x1b22/0x5450 [ 69.070001] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 69.070005] ? __kmalloc_cache_noprof+0x189/0x420 [ 69.070010] ? kasan_atomics+0x152/0x310 [ 69.070015] kasan_atomics+0x1dc/0x310 [ 69.070020] ? __pfx_kasan_atomics+0x10/0x10 [ 69.070025] ? ktime_get_ts64+0x83/0x230 [ 69.070029] kunit_try_run_case+0x1a2/0x480 [ 69.070034] ? __pfx_kunit_try_run_case+0x10/0x10 [ 69.070038] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 69.070043] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 69.070047] ? __kthread_parkme+0x82/0x180 [ 69.070051] ? preempt_count_sub+0x50/0x80 [ 69.070055] ? __pfx_kunit_try_run_case+0x10/0x10 [ 69.070060] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 69.070064] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 69.070069] kthread+0x334/0x6f0 [ 69.070072] ? trace_preempt_on+0x20/0xc0 [ 69.070077] ? __pfx_kthread+0x10/0x10 [ 69.070081] ? _raw_spin_unlock_irq+0x47/0x80 [ 69.070085] ? calculate_sigpending+0x7b/0xa0 [ 69.070089] ? __pfx_kthread+0x10/0x10 [ 69.070093] ret_from_fork+0x113/0x1d0 [ 69.070097] ? __pfx_kthread+0x10/0x10 [ 69.070101] ret_from_fork_asm+0x1a/0x30 [ 69.070107] </TASK> [ 69.070109] [ 69.253108] Allocated by task 306: [ 69.256512] kasan_save_stack+0x45/0x70 [ 69.260376] kasan_save_track+0x18/0x40 [ 69.264253] kasan_save_alloc_info+0x3b/0x50 [ 69.268534] __kasan_kmalloc+0xb7/0xc0 [ 69.272286] __kmalloc_cache_noprof+0x189/0x420 [ 69.276826] kasan_atomics+0x95/0x310 [ 69.280493] kunit_try_run_case+0x1a2/0x480 [ 69.284677] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 69.290077] kthread+0x334/0x6f0 [ 69.293310] ret_from_fork+0x113/0x1d0 [ 69.297063] ret_from_fork_asm+0x1a/0x30 [ 69.300988] [ 69.302489] The buggy address belongs to the object at ffff8881066eaf00 [ 69.302489] which belongs to the cache kmalloc-64 of size 64 [ 69.314829] The buggy address is located 0 bytes to the right of [ 69.314829] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 69.327691] [ 69.329190] The buggy address belongs to the physical page: [ 69.334764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 69.342762] flags: 0x200000000000000(node=0|zone=2) [ 69.347642] page_type: f5(slab) [ 69.350788] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 69.358528] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 69.366274] page dumped because: kasan: bad access detected [ 69.371848] [ 69.373376] Memory state around the buggy address: [ 69.378202] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.385429] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 69.392646] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.399866] ^ [ 69.404659] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.411880] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 69.419098] ================================================================== [ 72.125911] ================================================================== [ 72.133155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 72.140549] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 72.147949] [ 72.149452] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 72.149460] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 72.149463] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 72.149467] Call Trace: [ 72.149469] <TASK> [ 72.149471] dump_stack_lvl+0x73/0xb0 [ 72.149475] print_report+0xd1/0x650 [ 72.149479] ? __virt_addr_valid+0x1db/0x2d0 [ 72.149483] ? kasan_atomics_helper+0x1f43/0x5450 [ 72.149487] ? kasan_complete_mode_report_info+0x2a/0x200 [ 72.149493] ? kasan_atomics_helper+0x1f43/0x5450 [ 72.149497] kasan_report+0x141/0x180 [ 72.149501] ? kasan_atomics_helper+0x1f43/0x5450 [ 72.149506] kasan_check_range+0x10c/0x1c0 [ 72.149510] __kasan_check_write+0x18/0x20 [ 72.149514] kasan_atomics_helper+0x1f43/0x5450 [ 72.149518] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 72.149522] ? __kmalloc_cache_noprof+0x189/0x420 [ 72.149527] ? kasan_atomics+0x152/0x310 [ 72.149532] kasan_atomics+0x1dc/0x310 [ 72.149537] ? __pfx_kasan_atomics+0x10/0x10 [ 72.149542] ? ktime_get_ts64+0x83/0x230 [ 72.149546] kunit_try_run_case+0x1a2/0x480 [ 72.149551] ? __pfx_kunit_try_run_case+0x10/0x10 [ 72.149555] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 72.149560] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 72.149564] ? __kthread_parkme+0x82/0x180 [ 72.149568] ? preempt_count_sub+0x50/0x80 [ 72.149572] ? __pfx_kunit_try_run_case+0x10/0x10 [ 72.149577] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 72.149581] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 72.149586] kthread+0x334/0x6f0 [ 72.149589] ? trace_preempt_on+0x20/0xc0 [ 72.149594] ? __pfx_kthread+0x10/0x10 [ 72.149597] ? _raw_spin_unlock_irq+0x47/0x80 [ 72.149601] ? calculate_sigpending+0x7b/0xa0 [ 72.149606] ? __pfx_kthread+0x10/0x10 [ 72.149610] ret_from_fork+0x113/0x1d0 [ 72.149614] ? __pfx_kthread+0x10/0x10 [ 72.149617] ret_from_fork_asm+0x1a/0x30 [ 72.149623] </TASK> [ 72.149625] [ 72.332767] Allocated by task 306: [ 72.336171] kasan_save_stack+0x45/0x70 [ 72.340012] kasan_save_track+0x18/0x40 [ 72.343849] kasan_save_alloc_info+0x3b/0x50 [ 72.348123] __kasan_kmalloc+0xb7/0xc0 [ 72.351875] __kmalloc_cache_noprof+0x189/0x420 [ 72.356422] kasan_atomics+0x95/0x310 [ 72.360093] kunit_try_run_case+0x1a2/0x480 [ 72.364286] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 72.369685] kthread+0x334/0x6f0 [ 72.372918] ret_from_fork+0x113/0x1d0 [ 72.376670] ret_from_fork_asm+0x1a/0x30 [ 72.380596] [ 72.382097] The buggy address belongs to the object at ffff8881066eaf00 [ 72.382097] which belongs to the cache kmalloc-64 of size 64 [ 72.394439] The buggy address is located 0 bytes to the right of [ 72.394439] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 72.407309] [ 72.408806] The buggy address belongs to the physical page: [ 72.414422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 72.422423] flags: 0x200000000000000(node=0|zone=2) [ 72.427303] page_type: f5(slab) [ 72.430447] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 72.438188] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 72.445936] page dumped because: kasan: bad access detected [ 72.451507] [ 72.453007] Memory state around the buggy address: [ 72.457800] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.465018] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 72.472237] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.479458] ^ [ 72.484252] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.491480] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 72.498719] ================================================================== [ 73.262980] ================================================================== [ 73.270226] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 73.277618] Read of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 73.284925] [ 73.286425] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 73.286433] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 73.286436] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 73.286440] Call Trace: [ 73.286442] <TASK> [ 73.286443] dump_stack_lvl+0x73/0xb0 [ 73.286448] print_report+0xd1/0x650 [ 73.286452] ? __virt_addr_valid+0x1db/0x2d0 [ 73.286456] ? kasan_atomics_helper+0x4f98/0x5450 [ 73.286460] ? kasan_complete_mode_report_info+0x2a/0x200 [ 73.286466] ? kasan_atomics_helper+0x4f98/0x5450 [ 73.286470] kasan_report+0x141/0x180 [ 73.286474] ? kasan_atomics_helper+0x4f98/0x5450 [ 73.286479] __asan_report_load8_noabort+0x18/0x20 [ 73.286484] kasan_atomics_helper+0x4f98/0x5450 [ 73.286488] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 73.286492] ? __kmalloc_cache_noprof+0x189/0x420 [ 73.286497] ? kasan_atomics+0x152/0x310 [ 73.286502] kasan_atomics+0x1dc/0x310 [ 73.286507] ? __pfx_kasan_atomics+0x10/0x10 [ 73.286511] ? ktime_get_ts64+0x83/0x230 [ 73.286516] kunit_try_run_case+0x1a2/0x480 [ 73.286521] ? __pfx_kunit_try_run_case+0x10/0x10 [ 73.286525] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 73.286529] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 73.286534] ? __kthread_parkme+0x82/0x180 [ 73.286538] ? preempt_count_sub+0x50/0x80 [ 73.286542] ? __pfx_kunit_try_run_case+0x10/0x10 [ 73.286547] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 73.286551] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 73.286555] kthread+0x334/0x6f0 [ 73.286559] ? trace_preempt_on+0x20/0xc0 [ 73.286563] ? __pfx_kthread+0x10/0x10 [ 73.286567] ? _raw_spin_unlock_irq+0x47/0x80 [ 73.286571] ? calculate_sigpending+0x7b/0xa0 [ 73.286576] ? __pfx_kthread+0x10/0x10 [ 73.286580] ret_from_fork+0x113/0x1d0 [ 73.286583] ? __pfx_kthread+0x10/0x10 [ 73.286587] ret_from_fork_asm+0x1a/0x30 [ 73.286593] </TASK> [ 73.286595] [ 73.466266] Allocated by task 306: [ 73.469672] kasan_save_stack+0x45/0x70 [ 73.473511] kasan_save_track+0x18/0x40 [ 73.477376] kasan_save_alloc_info+0x3b/0x50 [ 73.481674] __kasan_kmalloc+0xb7/0xc0 [ 73.485427] __kmalloc_cache_noprof+0x189/0x420 [ 73.489969] kasan_atomics+0x95/0x310 [ 73.493633] kunit_try_run_case+0x1a2/0x480 [ 73.497821] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 73.503219] kthread+0x334/0x6f0 [ 73.506454] ret_from_fork+0x113/0x1d0 [ 73.510204] ret_from_fork_asm+0x1a/0x30 [ 73.514132] [ 73.515632] The buggy address belongs to the object at ffff8881066eaf00 [ 73.515632] which belongs to the cache kmalloc-64 of size 64 [ 73.527972] The buggy address is located 0 bytes to the right of [ 73.527972] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 73.540841] [ 73.542378] The buggy address belongs to the physical page: [ 73.547983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 73.555990] flags: 0x200000000000000(node=0|zone=2) [ 73.560870] page_type: f5(slab) [ 73.564018] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 73.571766] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.579512] page dumped because: kasan: bad access detected [ 73.585085] [ 73.586585] Memory state around the buggy address: [ 73.591400] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.598639] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 73.605859] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.613078] ^ [ 73.617872] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.625101] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 73.632348] ================================================================== [ 61.086682] ================================================================== [ 61.093927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 61.101319] Read of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 61.108661] [ 61.110162] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 61.110169] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 61.110172] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 61.110176] Call Trace: [ 61.110178] <TASK> [ 61.110179] dump_stack_lvl+0x73/0xb0 [ 61.110184] print_report+0xd1/0x650 [ 61.110188] ? __virt_addr_valid+0x1db/0x2d0 [ 61.110192] ? kasan_atomics_helper+0x4a1c/0x5450 [ 61.110196] ? kasan_complete_mode_report_info+0x2a/0x200 [ 61.110201] ? kasan_atomics_helper+0x4a1c/0x5450 [ 61.110205] kasan_report+0x141/0x180 [ 61.110210] ? kasan_atomics_helper+0x4a1c/0x5450 [ 61.110215] __asan_report_load4_noabort+0x18/0x20 [ 61.110219] kasan_atomics_helper+0x4a1c/0x5450 [ 61.110224] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 61.110228] ? __kmalloc_cache_noprof+0x189/0x420 [ 61.110233] ? kasan_atomics+0x152/0x310 [ 61.110238] kasan_atomics+0x1dc/0x310 [ 61.110242] ? __pfx_kasan_atomics+0x10/0x10 [ 61.110247] ? ktime_get_ts64+0x83/0x230 [ 61.110252] kunit_try_run_case+0x1a2/0x480 [ 61.110256] ? __pfx_kunit_try_run_case+0x10/0x10 [ 61.110261] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 61.110265] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 61.110269] ? __kthread_parkme+0x82/0x180 [ 61.110273] ? preempt_count_sub+0x50/0x80 [ 61.110278] ? __pfx_kunit_try_run_case+0x10/0x10 [ 61.110282] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 61.110287] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 61.110291] kthread+0x334/0x6f0 [ 61.110295] ? trace_preempt_on+0x20/0xc0 [ 61.110299] ? __pfx_kthread+0x10/0x10 [ 61.110303] ? _raw_spin_unlock_irq+0x47/0x80 [ 61.110307] ? calculate_sigpending+0x7b/0xa0 [ 61.110312] ? __pfx_kthread+0x10/0x10 [ 61.110316] ret_from_fork+0x113/0x1d0 [ 61.110319] ? __pfx_kthread+0x10/0x10 [ 61.110323] ret_from_fork_asm+0x1a/0x30 [ 61.110349] </TASK> [ 61.110351] [ 61.290080] Allocated by task 306: [ 61.293485] kasan_save_stack+0x45/0x70 [ 61.297325] kasan_save_track+0x18/0x40 [ 61.301189] kasan_save_alloc_info+0x3b/0x50 [ 61.305463] __kasan_kmalloc+0xb7/0xc0 [ 61.309214] __kmalloc_cache_noprof+0x189/0x420 [ 61.313749] kasan_atomics+0x95/0x310 [ 61.317428] kunit_try_run_case+0x1a2/0x480 [ 61.321617] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 61.327017] kthread+0x334/0x6f0 [ 61.330248] ret_from_fork+0x113/0x1d0 [ 61.334001] ret_from_fork_asm+0x1a/0x30 [ 61.337926] [ 61.339429] The buggy address belongs to the object at ffff8881066eaf00 [ 61.339429] which belongs to the cache kmalloc-64 of size 64 [ 61.351768] The buggy address is located 0 bytes to the right of [ 61.351768] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 61.364630] [ 61.366130] The buggy address belongs to the physical page: [ 61.371701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 61.379702] flags: 0x200000000000000(node=0|zone=2) [ 61.384587] page_type: f5(slab) [ 61.387736] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 61.395484] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.403222] page dumped because: kasan: bad access detected [ 61.408795] [ 61.410294] Memory state around the buggy address: [ 61.415088] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.422305] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 61.429527] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.436744] ^ [ 61.441538] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.448757] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 61.455976] ================================================================== [ 61.843200] ================================================================== [ 61.850446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 61.857838] Read of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 61.865144] [ 61.866646] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 61.866654] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 61.866657] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 61.866660] Call Trace: [ 61.866662] <TASK> [ 61.866664] dump_stack_lvl+0x73/0xb0 [ 61.866668] print_report+0xd1/0x650 [ 61.866672] ? __virt_addr_valid+0x1db/0x2d0 [ 61.866676] ? kasan_atomics_helper+0x4a02/0x5450 [ 61.866680] ? kasan_complete_mode_report_info+0x2a/0x200 [ 61.866685] ? kasan_atomics_helper+0x4a02/0x5450 [ 61.866689] kasan_report+0x141/0x180 [ 61.866694] ? kasan_atomics_helper+0x4a02/0x5450 [ 61.866699] __asan_report_load4_noabort+0x18/0x20 [ 61.866703] kasan_atomics_helper+0x4a02/0x5450 [ 61.866708] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 61.866712] ? __kmalloc_cache_noprof+0x189/0x420 [ 61.866717] ? kasan_atomics+0x152/0x310 [ 61.866722] kasan_atomics+0x1dc/0x310 [ 61.866726] ? __pfx_kasan_atomics+0x10/0x10 [ 61.866731] ? ktime_get_ts64+0x83/0x230 [ 61.866735] kunit_try_run_case+0x1a2/0x480 [ 61.866740] ? __pfx_kunit_try_run_case+0x10/0x10 [ 61.866745] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 61.866749] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 61.866753] ? __kthread_parkme+0x82/0x180 [ 61.866757] ? preempt_count_sub+0x50/0x80 [ 61.866762] ? __pfx_kunit_try_run_case+0x10/0x10 [ 61.866766] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 61.866770] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 61.866775] kthread+0x334/0x6f0 [ 61.866779] ? trace_preempt_on+0x20/0xc0 [ 61.866783] ? __pfx_kthread+0x10/0x10 [ 61.866787] ? _raw_spin_unlock_irq+0x47/0x80 [ 61.866791] ? calculate_sigpending+0x7b/0xa0 [ 61.866795] ? __pfx_kthread+0x10/0x10 [ 61.866800] ret_from_fork+0x113/0x1d0 [ 61.866803] ? __pfx_kthread+0x10/0x10 [ 61.866807] ret_from_fork_asm+0x1a/0x30 [ 61.866813] </TASK> [ 61.866815] [ 62.046485] Allocated by task 306: [ 62.049890] kasan_save_stack+0x45/0x70 [ 62.053729] kasan_save_track+0x18/0x40 [ 62.057568] kasan_save_alloc_info+0x3b/0x50 [ 62.061843] __kasan_kmalloc+0xb7/0xc0 [ 62.065595] __kmalloc_cache_noprof+0x189/0x420 [ 62.070138] kasan_atomics+0x95/0x310 [ 62.073812] kunit_try_run_case+0x1a2/0x480 [ 62.077996] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 62.083395] kthread+0x334/0x6f0 [ 62.086647] ret_from_fork+0x113/0x1d0 [ 62.090418] ret_from_fork_asm+0x1a/0x30 [ 62.094364] [ 62.095909] The buggy address belongs to the object at ffff8881066eaf00 [ 62.095909] which belongs to the cache kmalloc-64 of size 64 [ 62.108245] The buggy address is located 0 bytes to the right of [ 62.108245] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 62.121114] [ 62.122612] The buggy address belongs to the physical page: [ 62.128187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 62.136193] flags: 0x200000000000000(node=0|zone=2) [ 62.141072] page_type: f5(slab) [ 62.144219] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 62.151957] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.159698] page dumped because: kasan: bad access detected [ 62.165271] [ 62.166770] Memory state around the buggy address: [ 62.171562] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.178781] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 62.186000] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.193220] ^ [ 62.198014] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.205232] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.212451] ================================================================== [ 50.474233] ================================================================== [ 50.489124] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 50.496522] Read of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 50.503830] [ 50.505348] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 50.505358] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 50.505361] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 50.505365] Call Trace: [ 50.505367] <TASK> [ 50.505369] dump_stack_lvl+0x73/0xb0 [ 50.505386] print_report+0xd1/0x650 [ 50.505390] ? __virt_addr_valid+0x1db/0x2d0 [ 50.505407] ? kasan_atomics_helper+0x4bbc/0x5450 [ 50.505411] ? kasan_complete_mode_report_info+0x2a/0x200 [ 50.505416] ? kasan_atomics_helper+0x4bbc/0x5450 [ 50.505420] kasan_report+0x141/0x180 [ 50.505424] ? kasan_atomics_helper+0x4bbc/0x5450 [ 50.505429] __asan_report_load4_noabort+0x18/0x20 [ 50.505434] kasan_atomics_helper+0x4bbc/0x5450 [ 50.505437] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 50.505441] ? __kmalloc_cache_noprof+0x189/0x420 [ 50.505446] ? kasan_atomics+0x152/0x310 [ 50.505451] kasan_atomics+0x1dc/0x310 [ 50.505455] ? __pfx_kasan_atomics+0x10/0x10 [ 50.505460] ? ktime_get_ts64+0x83/0x230 [ 50.505464] kunit_try_run_case+0x1a2/0x480 [ 50.505469] ? __pfx_kunit_try_run_case+0x10/0x10 [ 50.505473] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 50.505477] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 50.505481] ? __kthread_parkme+0x82/0x180 [ 50.505485] ? preempt_count_sub+0x50/0x80 [ 50.505489] ? __pfx_kunit_try_run_case+0x10/0x10 [ 50.505493] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 50.505497] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 50.505502] kthread+0x334/0x6f0 [ 50.505505] ? trace_preempt_on+0x20/0xc0 [ 50.505509] ? __pfx_kthread+0x10/0x10 [ 50.505513] ? _raw_spin_unlock_irq+0x47/0x80 [ 50.505517] ? calculate_sigpending+0x7b/0xa0 [ 50.505521] ? __pfx_kthread+0x10/0x10 [ 50.505525] ret_from_fork+0x113/0x1d0 [ 50.505528] ? __pfx_kthread+0x10/0x10 [ 50.505532] ret_from_fork_asm+0x1a/0x30 [ 50.505538] </TASK> [ 50.505540] [ 50.685309] Allocated by task 306: [ 50.688715] kasan_save_stack+0x45/0x70 [ 50.692552] kasan_save_track+0x18/0x40 [ 50.696415] kasan_save_alloc_info+0x3b/0x50 [ 50.700691] __kasan_kmalloc+0xb7/0xc0 [ 50.704444] __kmalloc_cache_noprof+0x189/0x420 [ 50.708978] kasan_atomics+0x95/0x310 [ 50.712651] kunit_try_run_case+0x1a2/0x480 [ 50.716838] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 50.722245] kthread+0x334/0x6f0 [ 50.725477] ret_from_fork+0x113/0x1d0 [ 50.729229] ret_from_fork_asm+0x1a/0x30 [ 50.733156] [ 50.734654] The buggy address belongs to the object at ffff8881066eaf00 [ 50.734654] which belongs to the cache kmalloc-64 of size 64 [ 50.746988] The buggy address is located 0 bytes to the right of [ 50.746988] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 50.759851] [ 50.761363] The buggy address belongs to the physical page: [ 50.766965] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 50.774965] flags: 0x200000000000000(node=0|zone=2) [ 50.779843] page_type: f5(slab) [ 50.782990] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 50.790731] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.798476] page dumped because: kasan: bad access detected [ 50.804050] [ 50.805549] Memory state around the buggy address: [ 50.810377] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.817632] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 50.824860] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.832078] ^ [ 50.836870] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.844088] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 50.851308] ================================================================== [ 59.950519] ================================================================== [ 59.957757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 59.965065] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 59.972467] [ 59.973966] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 59.973973] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 59.973976] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 59.973979] Call Trace: [ 59.973981] <TASK> [ 59.973983] dump_stack_lvl+0x73/0xb0 [ 59.973988] print_report+0xd1/0x650 [ 59.973992] ? __virt_addr_valid+0x1db/0x2d0 [ 59.973996] ? kasan_atomics_helper+0xfa9/0x5450 [ 59.973999] ? kasan_complete_mode_report_info+0x2a/0x200 [ 59.974005] ? kasan_atomics_helper+0xfa9/0x5450 [ 59.974009] kasan_report+0x141/0x180 [ 59.974013] ? kasan_atomics_helper+0xfa9/0x5450 [ 59.974018] kasan_check_range+0x10c/0x1c0 [ 59.974023] __kasan_check_write+0x18/0x20 [ 59.974027] kasan_atomics_helper+0xfa9/0x5450 [ 59.974031] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 59.974035] ? __kmalloc_cache_noprof+0x189/0x420 [ 59.974040] ? kasan_atomics+0x152/0x310 [ 59.974045] kasan_atomics+0x1dc/0x310 [ 59.974049] ? __pfx_kasan_atomics+0x10/0x10 [ 59.974054] ? ktime_get_ts64+0x83/0x230 [ 59.974059] kunit_try_run_case+0x1a2/0x480 [ 59.974063] ? __pfx_kunit_try_run_case+0x10/0x10 [ 59.974068] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 59.974072] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 59.974077] ? __kthread_parkme+0x82/0x180 [ 59.974080] ? preempt_count_sub+0x50/0x80 [ 59.974085] ? __pfx_kunit_try_run_case+0x10/0x10 [ 59.974090] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 59.974094] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 59.974099] kthread+0x334/0x6f0 [ 59.974102] ? trace_preempt_on+0x20/0xc0 [ 59.974106] ? __pfx_kthread+0x10/0x10 [ 59.974111] ? _raw_spin_unlock_irq+0x47/0x80 [ 59.974114] ? calculate_sigpending+0x7b/0xa0 [ 59.974119] ? __pfx_kthread+0x10/0x10 [ 59.974123] ret_from_fork+0x113/0x1d0 [ 59.974127] ? __pfx_kthread+0x10/0x10 [ 59.974131] ret_from_fork_asm+0x1a/0x30 [ 59.974137] </TASK> [ 59.974138] [ 60.156858] Allocated by task 306: [ 60.160264] kasan_save_stack+0x45/0x70 [ 60.164101] kasan_save_track+0x18/0x40 [ 60.167941] kasan_save_alloc_info+0x3b/0x50 [ 60.172216] __kasan_kmalloc+0xb7/0xc0 [ 60.175976] __kmalloc_cache_noprof+0x189/0x420 [ 60.180517] kasan_atomics+0x95/0x310 [ 60.184182] kunit_try_run_case+0x1a2/0x480 [ 60.188404] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 60.193811] kthread+0x334/0x6f0 [ 60.197044] ret_from_fork+0x113/0x1d0 [ 60.200797] ret_from_fork_asm+0x1a/0x30 [ 60.204722] [ 60.206221] The buggy address belongs to the object at ffff8881066eaf00 [ 60.206221] which belongs to the cache kmalloc-64 of size 64 [ 60.218563] The buggy address is located 0 bytes to the right of [ 60.218563] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 60.231428] [ 60.232925] The buggy address belongs to the physical page: [ 60.238496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 60.246495] flags: 0x200000000000000(node=0|zone=2) [ 60.251394] page_type: f5(slab) [ 60.254565] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 60.262306] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.270051] page dumped because: kasan: bad access detected [ 60.275623] [ 60.277123] Memory state around the buggy address: [ 60.281917] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.289145] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 60.296376] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.303627] ^ [ 60.308427] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.315646] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 60.322866] ================================================================== [ 67.146265] ================================================================== [ 67.153512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 67.160905] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 67.168306] [ 67.169807] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 67.169815] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 67.169818] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 67.169821] Call Trace: [ 67.169823] <TASK> [ 67.169825] dump_stack_lvl+0x73/0xb0 [ 67.169829] print_report+0xd1/0x650 [ 67.169834] ? __virt_addr_valid+0x1db/0x2d0 [ 67.169838] ? kasan_atomics_helper+0x1818/0x5450 [ 67.169842] ? kasan_complete_mode_report_info+0x2a/0x200 [ 67.169847] ? kasan_atomics_helper+0x1818/0x5450 [ 67.169851] kasan_report+0x141/0x180 [ 67.169855] ? kasan_atomics_helper+0x1818/0x5450 [ 67.169860] kasan_check_range+0x10c/0x1c0 [ 67.169865] __kasan_check_write+0x18/0x20 [ 67.169868] kasan_atomics_helper+0x1818/0x5450 [ 67.169873] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 67.169877] ? __kmalloc_cache_noprof+0x189/0x420 [ 67.169882] ? kasan_atomics+0x152/0x310 [ 67.169887] kasan_atomics+0x1dc/0x310 [ 67.169891] ? __pfx_kasan_atomics+0x10/0x10 [ 67.169896] ? ktime_get_ts64+0x83/0x230 [ 67.169901] kunit_try_run_case+0x1a2/0x480 [ 67.169905] ? __pfx_kunit_try_run_case+0x10/0x10 [ 67.169910] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 67.169914] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 67.169919] ? __kthread_parkme+0x82/0x180 [ 67.169922] ? preempt_count_sub+0x50/0x80 [ 67.169927] ? __pfx_kunit_try_run_case+0x10/0x10 [ 67.169931] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 67.169936] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 67.169940] kthread+0x334/0x6f0 [ 67.169944] ? trace_preempt_on+0x20/0xc0 [ 67.169948] ? __pfx_kthread+0x10/0x10 [ 67.169952] ? _raw_spin_unlock_irq+0x47/0x80 [ 67.169956] ? calculate_sigpending+0x7b/0xa0 [ 67.169961] ? __pfx_kthread+0x10/0x10 [ 67.169965] ret_from_fork+0x113/0x1d0 [ 67.169968] ? __pfx_kthread+0x10/0x10 [ 67.169972] ret_from_fork_asm+0x1a/0x30 [ 67.169978] </TASK> [ 67.169980] [ 67.353060] Allocated by task 306: [ 67.356466] kasan_save_stack+0x45/0x70 [ 67.360307] kasan_save_track+0x18/0x40 [ 67.364156] kasan_save_alloc_info+0x3b/0x50 [ 67.368436] __kasan_kmalloc+0xb7/0xc0 [ 67.372188] __kmalloc_cache_noprof+0x189/0x420 [ 67.376722] kasan_atomics+0x95/0x310 [ 67.380419] kunit_try_run_case+0x1a2/0x480 [ 67.384606] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 67.390008] kthread+0x334/0x6f0 [ 67.393239] ret_from_fork+0x113/0x1d0 [ 67.396992] ret_from_fork_asm+0x1a/0x30 [ 67.400918] [ 67.402421] The buggy address belongs to the object at ffff8881066eaf00 [ 67.402421] which belongs to the cache kmalloc-64 of size 64 [ 67.414757] The buggy address is located 0 bytes to the right of [ 67.414757] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 67.427621] [ 67.429119] The buggy address belongs to the physical page: [ 67.434691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 67.442691] flags: 0x200000000000000(node=0|zone=2) [ 67.447570] page_type: f5(slab) [ 67.450718] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 67.458465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.466204] page dumped because: kasan: bad access detected [ 67.471777] [ 67.473276] Memory state around the buggy address: [ 67.478070] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.485298] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 67.492526] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 67.499751] ^ [ 67.504545] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.511764] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 67.518983] ================================================================== [ 65.246254] ================================================================== [ 65.253501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 65.260894] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 65.268295] [ 65.269795] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 65.269803] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 65.269806] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 65.269809] Call Trace: [ 65.269811] <TASK> [ 65.269813] dump_stack_lvl+0x73/0xb0 [ 65.269818] print_report+0xd1/0x650 [ 65.269822] ? __virt_addr_valid+0x1db/0x2d0 [ 65.269826] ? kasan_atomics_helper+0x151d/0x5450 [ 65.269830] ? kasan_complete_mode_report_info+0x2a/0x200 [ 65.269835] ? kasan_atomics_helper+0x151d/0x5450 [ 65.269839] kasan_report+0x141/0x180 [ 65.269843] ? kasan_atomics_helper+0x151d/0x5450 [ 65.269848] kasan_check_range+0x10c/0x1c0 [ 65.269853] __kasan_check_write+0x18/0x20 [ 65.269856] kasan_atomics_helper+0x151d/0x5450 [ 65.269861] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 65.269865] ? __kmalloc_cache_noprof+0x189/0x420 [ 65.269870] ? kasan_atomics+0x152/0x310 [ 65.269875] kasan_atomics+0x1dc/0x310 [ 65.269879] ? __pfx_kasan_atomics+0x10/0x10 [ 65.269884] ? ktime_get_ts64+0x83/0x230 [ 65.269889] kunit_try_run_case+0x1a2/0x480 [ 65.269893] ? __pfx_kunit_try_run_case+0x10/0x10 [ 65.269898] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 65.269902] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 65.269907] ? __kthread_parkme+0x82/0x180 [ 65.269910] ? preempt_count_sub+0x50/0x80 [ 65.269915] ? __pfx_kunit_try_run_case+0x10/0x10 [ 65.269919] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 65.269923] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 65.269928] kthread+0x334/0x6f0 [ 65.269932] ? trace_preempt_on+0x20/0xc0 [ 65.269936] ? __pfx_kthread+0x10/0x10 [ 65.269940] ? _raw_spin_unlock_irq+0x47/0x80 [ 65.269944] ? calculate_sigpending+0x7b/0xa0 [ 65.269948] ? __pfx_kthread+0x10/0x10 [ 65.269952] ret_from_fork+0x113/0x1d0 [ 65.269956] ? __pfx_kthread+0x10/0x10 [ 65.269960] ret_from_fork_asm+0x1a/0x30 [ 65.269966] </TASK> [ 65.269967] [ 65.453042] Allocated by task 306: [ 65.456448] kasan_save_stack+0x45/0x70 [ 65.460287] kasan_save_track+0x18/0x40 [ 65.464127] kasan_save_alloc_info+0x3b/0x50 [ 65.468422] __kasan_kmalloc+0xb7/0xc0 [ 65.472176] __kmalloc_cache_noprof+0x189/0x420 [ 65.476709] kasan_atomics+0x95/0x310 [ 65.480415] kunit_try_run_case+0x1a2/0x480 [ 65.484604] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 65.490005] kthread+0x334/0x6f0 [ 65.493237] ret_from_fork+0x113/0x1d0 [ 65.496990] ret_from_fork_asm+0x1a/0x30 [ 65.500916] [ 65.502419] The buggy address belongs to the object at ffff8881066eaf00 [ 65.502419] which belongs to the cache kmalloc-64 of size 64 [ 65.514757] The buggy address is located 0 bytes to the right of [ 65.514757] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 65.527618] [ 65.529116] The buggy address belongs to the physical page: [ 65.534691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 65.542698] flags: 0x200000000000000(node=0|zone=2) [ 65.547577] page_type: f5(slab) [ 65.550724] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 65.558470] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.566210] page dumped because: kasan: bad access detected [ 65.571783] [ 65.573282] Memory state around the buggy address: [ 65.578076] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.585302] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 65.592523] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.599742] ^ [ 65.604534] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.611753] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.618973] ================================================================== [ 71.322980] ================================================================== [ 71.330218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 71.337613] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 71.345005] [ 71.346505] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 71.346513] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 71.346515] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 71.346519] Call Trace: [ 71.346521] <TASK> [ 71.346522] dump_stack_lvl+0x73/0xb0 [ 71.346527] print_report+0xd1/0x650 [ 71.346531] ? __virt_addr_valid+0x1db/0x2d0 [ 71.346535] ? kasan_atomics_helper+0x1eaa/0x5450 [ 71.346539] ? kasan_complete_mode_report_info+0x2a/0x200 [ 71.346544] ? kasan_atomics_helper+0x1eaa/0x5450 [ 71.346548] kasan_report+0x141/0x180 [ 71.346552] ? kasan_atomics_helper+0x1eaa/0x5450 [ 71.346557] kasan_check_range+0x10c/0x1c0 [ 71.346562] __kasan_check_write+0x18/0x20 [ 71.346565] kasan_atomics_helper+0x1eaa/0x5450 [ 71.346570] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 71.346574] ? __kmalloc_cache_noprof+0x189/0x420 [ 71.346579] ? kasan_atomics+0x152/0x310 [ 71.346584] kasan_atomics+0x1dc/0x310 [ 71.346588] ? __pfx_kasan_atomics+0x10/0x10 [ 71.346593] ? ktime_get_ts64+0x83/0x230 [ 71.346597] kunit_try_run_case+0x1a2/0x480 [ 71.346602] ? __pfx_kunit_try_run_case+0x10/0x10 [ 71.346607] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 71.346611] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 71.346615] ? __kthread_parkme+0x82/0x180 [ 71.346619] ? preempt_count_sub+0x50/0x80 [ 71.346623] ? __pfx_kunit_try_run_case+0x10/0x10 [ 71.346628] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 71.346632] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 71.346637] kthread+0x334/0x6f0 [ 71.346640] ? trace_preempt_on+0x20/0xc0 [ 71.346645] ? __pfx_kthread+0x10/0x10 [ 71.346648] ? _raw_spin_unlock_irq+0x47/0x80 [ 71.346652] ? calculate_sigpending+0x7b/0xa0 [ 71.346657] ? __pfx_kthread+0x10/0x10 [ 71.346661] ret_from_fork+0x113/0x1d0 [ 71.346665] ? __pfx_kthread+0x10/0x10 [ 71.346669] ret_from_fork_asm+0x1a/0x30 [ 71.346675] </TASK> [ 71.346676] [ 71.485352] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 71.491252] Allocated by task 306: [ 71.494484] rcu: \t3-....: (56 ticks this GP) idle=2e54/1/0x4000000000000000 softirq=321/321 fqs=5250 [ 71.498489] kasan_save_stack+0x45/0x70 [ 71.502232] rcu: \t(detected by 2, t=21018 jiffies, g=-327, q=19 ncpus=4) [ 71.506583] kasan_save_track+0x18/0x40 [ 71.510934] Sending NMI from CPU 2 to CPUs 3: [ 71.510941] NMI backtrace for cpu 3 [ 71.510944] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 71.510952] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 71.510955] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 71.510959] RIP: 0010:io_serial_out+0x6c/0xa0 [ 71.510964] Code: b6 8b c1 00 00 00 48 8d 7b 08 48 ba 00 00 00 00 00 fc ff df d3 e6 48 89 f9 48 c1 e9 03 80 3c 11 00 75 24 66 03 73 08 89 f2 ee <48> 8b 5d f8 c9 c3 cc cc cc cc 89 45 f0 89 75 f4 e8 2f 1f 05 ff 8b [ 71.510972] RSP: 0000:ffff888106c5f510 EFLAGS: 00000006 [ 71.510977] RAX: 0000000000000000 RBX: ffffffffaaaa07c0 RCX: 1ffffffff55540f9 [ 71.510982] RDX: 00000000000003f9 RSI: 00000000000003f9 RDI: ffffffffaaaa07c8 [ 71.510986] RBP: ffff888106c5f520 R08: 0000000000000001 R09: ffffffffaa9fc480 [ 71.510990] R10: 0000000000000003 R11: 0000000000000001 R12: 0000000000000000 [ 71.510993] R13: ffffffffaaaa0a20 R14: ffffffffa9bd8ec0 R15: ffffffffaaaa07c0 [ 71.510997] FS: 0000000000000000(0000) GS:ffff888474df4000(0000) knlGS:0000000000000000 [ 71.511002] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 71.511006] CR2: 0000000000000000 CR3: 00000003a84bc001 CR4: 00000000003726f0 [ 71.511010] DR0: ffffffffaaa50440 DR1: ffffffffaaa50441 DR2: ffffffffaaa50443 [ 71.511013] DR3: ffffffffaaa50445 DR6: 00000000ffff0ff0 DR7: 0000000000000400 [ 71.511017] Call Trace: [ 71.511019] <TASK> [ 71.511021] serial8250_clear_IER+0x8c/0xb0 [ 71.511026] serial8250_console_write+0x1bd/0x1810 [ 71.511032] ? __pfx_serial8250_console_write+0x10/0x10 [ 71.511038] ? __kasan_check_write+0x18/0x20 [ 71.511042] ? _raw_spin_lock+0x8b/0xe0 [ 71.511046] ? __pfx__raw_spin_lock+0x10/0x10 [ 71.511050] univ8250_console_write+0x57/0x80 [ 71.511055] ? _raw_spin_unlock+0x41/0x70 [ 71.511059] console_flush_all+0x57b/0xc00 [ 71.511064] ? __pfx_console_flush_all+0x10/0x10 [ 71.511068] ? __pfx_vprintk_store+0x10/0x10 [ 71.511073] ? __kasan_check_read+0x15/0x20 [ 71.511077] console_unlock+0xf2/0x1f0 [ 71.511080] ? __pfx_console_unlock+0x10/0x10 [ 71.511084] ? __kasan_check_write+0x18/0x20 [ 71.511088] ? _raw_spin_lock+0x8b/0xe0 [ 71.511093] vprintk_emit+0x1e9/0x480 [ 71.511097] ? __pfx_vprintk_emit+0x10/0x10 [ 71.511101] ? vprintk_emit+0x169/0x480 [ 71.511105] vprintk_default+0x21/0x30 [ 71.511109] vprintk+0x12/0x20 [ 71.511112] _printk+0xc3/0xf0 [ 71.511117] ? __pfx__printk+0x10/0x10 [ 71.511121] ? vprintk+0x12/0x20 [ 71.511125] ? _printk+0xc3/0xf0 [ 71.511129] ? __pfx__printk+0x10/0x10 [ 71.511133] ? kasan_save_track+0x18/0x40 [ 71.511137] stack_trace_print+0x5d/0x90 [ 71.511142] stack_depot_print+0x48/0x50 [ 71.511147] print_report+0x61a/0x650 [ 71.511151] ? __virt_addr_valid+0x1db/0x2d0 [ 71.511156] ? kasan_atomics_helper+0x1eaa/0x5450 [ 71.511160] ? kasan_complete_mode_report_info+0x2a/0x200 [ 71.511165] ? kasan_atomics_helper+0x1eaa/0x5450 [ 71.511169] kasan_report+0x141/0x180 [ 71.511173] ? kasan_atomics_helper+0x1eaa/0x5450 [ 71.511178] kasan_check_range+0x10c/0x1c0 [ 71.511183] __kasan_check_write+0x18/0x20 [ 71.511186] kasan_atomics_helper+0x1eaa/0x5450 [ 71.511191] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 71.511195] ? __kmalloc_cache_noprof+0x189/0x420 [ 71.511200] ? kasan_atomics+0x152/0x310 [ 71.511205] kasan_atomics+0x1dc/0x310 [ 71.511209] ? __pfx_kasan_atomics+0x10/0x10 [ 71.511214] ? ktime_get_ts64+0x83/0x230 [ 71.511219] kunit_try_run_case+0x1a2/0x480 [ 71.511223] ? __pfx_kunit_try_run_case+0x10/0x10 [ 71.511228] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 71.511232] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 71.511237] ? __kthread_parkme+0x82/0x180 [ 71.511240] ? preempt_count_sub+0x50/0x80 [ 71.511245] ? __pfx_kunit_try_run_case+0x10/0x10 [ 71.511250] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 71.511254] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 71.511258] kthread+0x334/0x6f0 [ 71.511262] ? trace_preempt_on+0x20/0xc0 [ 71.511267] ? __pfx_kthread+0x10/0x10 [ 71.511271] ? _raw_spin_unlock_irq+0x47/0x80 [ 71.511274] ? calculate_sigpending+0x7b/0xa0 [ 71.511279] ? __pfx_kthread+0x10/0x10 [ 71.511283] ret_from_fork+0x113/0x1d0 [ 71.511287] ? __pfx_kthread+0x10/0x10 [ 71.511291] ret_from_fork_asm+0x1a/0x30 [ 71.511297] </TASK> [ 71.963843] kasan_save_alloc_info+0x3b/0x50 [ 71.968126] __kasan_kmalloc+0xb7/0xc0 [ 71.971879] __kmalloc_cache_noprof+0x189/0x420 [ 71.976420] kasan_atomics+0x95/0x310 [ 71.980087] kunit_try_run_case+0x1a2/0x480 [ 71.984280] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 71.989680] kthread+0x334/0x6f0 [ 71.992912] ret_from_fork+0x113/0x1d0 [ 71.996666] ret_from_fork_asm+0x1a/0x30 [ 72.000602] [ 72.002099] The buggy address belongs to the object at ffff8881066eaf00 [ 72.002099] which belongs to the cache kmalloc-64 of size 64 [ 72.014442] The buggy address is located 0 bytes to the right of [ 72.014442] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 72.027311] [ 72.028811] The buggy address belongs to the physical page: [ 72.034415] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 72.042417] flags: 0x200000000000000(node=0|zone=2) [ 72.047295] page_type: f5(slab) [ 72.050444] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 72.058191] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 72.065929] page dumped because: kasan: bad access detected [ 72.071500] [ 72.073002] Memory state around the buggy address: [ 72.077793] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.085013] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 72.092232] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.099453] ^ [ 72.104245] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.111464] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 72.118683] ================================================================== [ 58.432204] ================================================================== [ 58.439460] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 58.446767] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 58.454169] [ 58.455669] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 58.455677] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 58.455680] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 58.455683] Call Trace: [ 58.455685] <TASK> [ 58.455687] dump_stack_lvl+0x73/0xb0 [ 58.455691] print_report+0xd1/0x650 [ 58.455695] ? __virt_addr_valid+0x1db/0x2d0 [ 58.455700] ? kasan_atomics_helper+0xd47/0x5450 [ 58.455704] ? kasan_complete_mode_report_info+0x2a/0x200 [ 58.455709] ? kasan_atomics_helper+0xd47/0x5450 [ 58.455713] kasan_report+0x141/0x180 [ 58.455717] ? kasan_atomics_helper+0xd47/0x5450 [ 58.455722] kasan_check_range+0x10c/0x1c0 [ 58.455727] __kasan_check_write+0x18/0x20 [ 58.455730] kasan_atomics_helper+0xd47/0x5450 [ 58.455734] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 58.455739] ? __kmalloc_cache_noprof+0x189/0x420 [ 58.455744] ? kasan_atomics+0x152/0x310 [ 58.455749] kasan_atomics+0x1dc/0x310 [ 58.455753] ? __pfx_kasan_atomics+0x10/0x10 [ 58.455758] ? ktime_get_ts64+0x83/0x230 [ 58.455762] kunit_try_run_case+0x1a2/0x480 [ 58.455767] ? __pfx_kunit_try_run_case+0x10/0x10 [ 58.455772] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 58.455776] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 58.455780] ? __kthread_parkme+0x82/0x180 [ 58.455784] ? preempt_count_sub+0x50/0x80 [ 58.455789] ? __pfx_kunit_try_run_case+0x10/0x10 [ 58.455793] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 58.455798] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 58.455802] kthread+0x334/0x6f0 [ 58.455806] ? trace_preempt_on+0x20/0xc0 [ 58.455810] ? __pfx_kthread+0x10/0x10 [ 58.455814] ? _raw_spin_unlock_irq+0x47/0x80 [ 58.455818] ? calculate_sigpending+0x7b/0xa0 [ 58.455823] ? __pfx_kthread+0x10/0x10 [ 58.455827] ret_from_fork+0x113/0x1d0 [ 58.455830] ? __pfx_kthread+0x10/0x10 [ 58.455834] ret_from_fork_asm+0x1a/0x30 [ 58.455840] </TASK> [ 58.455842] [ 58.638445] Allocated by task 306: [ 58.641853] kasan_save_stack+0x45/0x70 [ 58.645693] kasan_save_track+0x18/0x40 [ 58.649530] kasan_save_alloc_info+0x3b/0x50 [ 58.653803] __kasan_kmalloc+0xb7/0xc0 [ 58.657556] __kmalloc_cache_noprof+0x189/0x420 [ 58.662088] kasan_atomics+0x95/0x310 [ 58.665754] kunit_try_run_case+0x1a2/0x480 [ 58.669940] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 58.675362] kthread+0x334/0x6f0 [ 58.678616] ret_from_fork+0x113/0x1d0 [ 58.682416] ret_from_fork_asm+0x1a/0x30 [ 58.686361] [ 58.687907] The buggy address belongs to the object at ffff8881066eaf00 [ 58.687907] which belongs to the cache kmalloc-64 of size 64 [ 58.700247] The buggy address is located 0 bytes to the right of [ 58.700247] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 58.713111] [ 58.714609] The buggy address belongs to the physical page: [ 58.720183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 58.728188] flags: 0x200000000000000(node=0|zone=2) [ 58.733070] page_type: f5(slab) [ 58.736216] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 58.743964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.751709] page dumped because: kasan: bad access detected [ 58.757285] [ 58.758781] Memory state around the buggy address: [ 58.763575] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.770797] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 58.778023] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.785241] ^ [ 58.790035] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.797254] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 58.804475] ================================================================== [ 64.869435] ================================================================== [ 64.876686] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 64.884086] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 64.891479] [ 64.892981] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 64.892989] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 64.892992] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 64.892995] Call Trace: [ 64.892997] <TASK> [ 64.892998] dump_stack_lvl+0x73/0xb0 [ 64.893003] print_report+0xd1/0x650 [ 64.893007] ? __virt_addr_valid+0x1db/0x2d0 [ 64.893011] ? kasan_atomics_helper+0x50d4/0x5450 [ 64.893015] ? kasan_complete_mode_report_info+0x2a/0x200 [ 64.893021] ? kasan_atomics_helper+0x50d4/0x5450 [ 64.893024] kasan_report+0x141/0x180 [ 64.893029] ? kasan_atomics_helper+0x50d4/0x5450 [ 64.893034] __asan_report_store8_noabort+0x1b/0x30 [ 64.893039] kasan_atomics_helper+0x50d4/0x5450 [ 64.893043] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 64.893047] ? __kmalloc_cache_noprof+0x189/0x420 [ 64.893052] ? kasan_atomics+0x152/0x310 [ 64.893057] kasan_atomics+0x1dc/0x310 [ 64.893062] ? __pfx_kasan_atomics+0x10/0x10 [ 64.893066] ? ktime_get_ts64+0x83/0x230 [ 64.893071] kunit_try_run_case+0x1a2/0x480 [ 64.893075] ? __pfx_kunit_try_run_case+0x10/0x10 [ 64.893080] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 64.893084] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 64.893089] ? __kthread_parkme+0x82/0x180 [ 64.893093] ? preempt_count_sub+0x50/0x80 [ 64.893097] ? __pfx_kunit_try_run_case+0x10/0x10 [ 64.893102] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 64.893106] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 64.893110] kthread+0x334/0x6f0 [ 64.893114] ? trace_preempt_on+0x20/0xc0 [ 64.893118] ? __pfx_kthread+0x10/0x10 [ 64.893122] ? _raw_spin_unlock_irq+0x47/0x80 [ 64.893126] ? calculate_sigpending+0x7b/0xa0 [ 64.893131] ? __pfx_kthread+0x10/0x10 [ 64.893135] ret_from_fork+0x113/0x1d0 [ 64.893139] ? __pfx_kthread+0x10/0x10 [ 64.893143] ret_from_fork_asm+0x1a/0x30 [ 64.893149] </TASK> [ 64.893150] [ 65.072925] Allocated by task 306: [ 65.076360] kasan_save_stack+0x45/0x70 [ 65.080247] kasan_save_track+0x18/0x40 [ 65.084086] kasan_save_alloc_info+0x3b/0x50 [ 65.088361] __kasan_kmalloc+0xb7/0xc0 [ 65.092154] __kmalloc_cache_noprof+0x189/0x420 [ 65.096688] kasan_atomics+0x95/0x310 [ 65.100361] kunit_try_run_case+0x1a2/0x480 [ 65.104590] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 65.109991] kthread+0x334/0x6f0 [ 65.113232] ret_from_fork+0x113/0x1d0 [ 65.116985] ret_from_fork_asm+0x1a/0x30 [ 65.120919] [ 65.122425] The buggy address belongs to the object at ffff8881066eaf00 [ 65.122425] which belongs to the cache kmalloc-64 of size 64 [ 65.134760] The buggy address is located 0 bytes to the right of [ 65.134760] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 65.147620] [ 65.149120] The buggy address belongs to the physical page: [ 65.154694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 65.162702] flags: 0x200000000000000(node=0|zone=2) [ 65.167590] page_type: f5(slab) [ 65.170737] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 65.178482] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.186221] page dumped because: kasan: bad access detected [ 65.191794] [ 65.193295] Memory state around the buggy address: [ 65.198088] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.205315] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 65.212569] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.219788] ^ [ 65.224581] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.231801] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.239027] ================================================================== [ 53.500938] ================================================================== [ 53.508186] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 53.515500] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 53.522901] [ 53.524419] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 53.524427] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 53.524430] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 53.524433] Call Trace: [ 53.524435] <TASK> [ 53.524437] dump_stack_lvl+0x73/0xb0 [ 53.524441] print_report+0xd1/0x650 [ 53.524445] ? __virt_addr_valid+0x1db/0x2d0 [ 53.524449] ? kasan_atomics_helper+0x565/0x5450 [ 53.524453] ? kasan_complete_mode_report_info+0x2a/0x200 [ 53.524459] ? kasan_atomics_helper+0x565/0x5450 [ 53.524463] kasan_report+0x141/0x180 [ 53.524467] ? kasan_atomics_helper+0x565/0x5450 [ 53.524472] kasan_check_range+0x10c/0x1c0 [ 53.524477] __kasan_check_write+0x18/0x20 [ 53.524480] kasan_atomics_helper+0x565/0x5450 [ 53.524484] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 53.524489] ? __kmalloc_cache_noprof+0x189/0x420 [ 53.524494] ? kasan_atomics+0x152/0x310 [ 53.524499] kasan_atomics+0x1dc/0x310 [ 53.524503] ? __pfx_kasan_atomics+0x10/0x10 [ 53.524508] ? ktime_get_ts64+0x83/0x230 [ 53.524513] kunit_try_run_case+0x1a2/0x480 [ 53.524517] ? __pfx_kunit_try_run_case+0x10/0x10 [ 53.524522] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 53.524526] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 53.524531] ? __kthread_parkme+0x82/0x180 [ 53.524535] ? preempt_count_sub+0x50/0x80 [ 53.524539] ? __pfx_kunit_try_run_case+0x10/0x10 [ 53.524544] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 53.524548] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 53.524553] kthread+0x334/0x6f0 [ 53.524556] ? trace_preempt_on+0x20/0xc0 [ 53.524561] ? __pfx_kthread+0x10/0x10 [ 53.524565] ? _raw_spin_unlock_irq+0x47/0x80 [ 53.524569] ? calculate_sigpending+0x7b/0xa0 [ 53.524573] ? __pfx_kthread+0x10/0x10 [ 53.524578] ret_from_fork+0x113/0x1d0 [ 53.524581] ? __pfx_kthread+0x10/0x10 [ 53.524585] ret_from_fork_asm+0x1a/0x30 [ 53.524591] </TASK> [ 53.524593] [ 53.707299] Allocated by task 306: [ 53.710707] kasan_save_stack+0x45/0x70 [ 53.714545] kasan_save_track+0x18/0x40 [ 53.718424] kasan_save_alloc_info+0x3b/0x50 [ 53.722701] __kasan_kmalloc+0xb7/0xc0 [ 53.726452] __kmalloc_cache_noprof+0x189/0x420 [ 53.730986] kasan_atomics+0x95/0x310 [ 53.734652] kunit_try_run_case+0x1a2/0x480 [ 53.738839] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 53.744247] kthread+0x334/0x6f0 [ 53.747478] ret_from_fork+0x113/0x1d0 [ 53.751231] ret_from_fork_asm+0x1a/0x30 [ 53.755157] [ 53.756657] The buggy address belongs to the object at ffff8881066eaf00 [ 53.756657] which belongs to the cache kmalloc-64 of size 64 [ 53.768997] The buggy address is located 0 bytes to the right of [ 53.768997] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 53.781860] [ 53.783375] The buggy address belongs to the physical page: [ 53.788956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 53.796957] flags: 0x200000000000000(node=0|zone=2) [ 53.801837] page_type: f5(slab) [ 53.804982] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 53.812721] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.820462] page dumped because: kasan: bad access detected [ 53.826034] [ 53.827533] Memory state around the buggy address: [ 53.832346] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.839580] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 53.846797] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.854019] ^ [ 53.858812] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.866037] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 53.873257] ================================================================== [ 72.882688] ================================================================== [ 72.889934] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 72.897349] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 72.904797] [ 72.906298] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 72.906306] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 72.906309] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 72.906313] Call Trace: [ 72.906315] <TASK> [ 72.906317] dump_stack_lvl+0x73/0xb0 [ 72.906321] print_report+0xd1/0x650 [ 72.906325] ? __virt_addr_valid+0x1db/0x2d0 [ 72.906349] ? kasan_atomics_helper+0x2006/0x5450 [ 72.906353] ? kasan_complete_mode_report_info+0x2a/0x200 [ 72.906359] ? kasan_atomics_helper+0x2006/0x5450 [ 72.906376] kasan_report+0x141/0x180 [ 72.906381] ? kasan_atomics_helper+0x2006/0x5450 [ 72.906398] kasan_check_range+0x10c/0x1c0 [ 72.906402] __kasan_check_write+0x18/0x20 [ 72.906406] kasan_atomics_helper+0x2006/0x5450 [ 72.906410] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 72.906414] ? __kmalloc_cache_noprof+0x189/0x420 [ 72.906419] ? kasan_atomics+0x152/0x310 [ 72.906424] kasan_atomics+0x1dc/0x310 [ 72.906429] ? __pfx_kasan_atomics+0x10/0x10 [ 72.906434] ? ktime_get_ts64+0x83/0x230 [ 72.906438] kunit_try_run_case+0x1a2/0x480 [ 72.906443] ? __pfx_kunit_try_run_case+0x10/0x10 [ 72.906447] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 72.906452] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 72.906456] ? __kthread_parkme+0x82/0x180 [ 72.906460] ? preempt_count_sub+0x50/0x80 [ 72.906464] ? __pfx_kunit_try_run_case+0x10/0x10 [ 72.906469] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 72.906473] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 72.906478] kthread+0x334/0x6f0 [ 72.906481] ? trace_preempt_on+0x20/0xc0 [ 72.906486] ? __pfx_kthread+0x10/0x10 [ 72.906490] ? _raw_spin_unlock_irq+0x47/0x80 [ 72.906493] ? calculate_sigpending+0x7b/0xa0 [ 72.906498] ? __pfx_kthread+0x10/0x10 [ 72.906502] ret_from_fork+0x113/0x1d0 [ 72.906506] ? __pfx_kthread+0x10/0x10 [ 72.906510] ret_from_fork_asm+0x1a/0x30 [ 72.906515] </TASK> [ 72.906517] [ 73.089761] Allocated by task 306: [ 73.093166] kasan_save_stack+0x45/0x70 [ 73.097008] kasan_save_track+0x18/0x40 [ 73.100845] kasan_save_alloc_info+0x3b/0x50 [ 73.105118] __kasan_kmalloc+0xb7/0xc0 [ 73.108871] __kmalloc_cache_noprof+0x189/0x420 [ 73.113421] kasan_atomics+0x95/0x310 [ 73.117088] kunit_try_run_case+0x1a2/0x480 [ 73.121283] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 73.126682] kthread+0x334/0x6f0 [ 73.129915] ret_from_fork+0x113/0x1d0 [ 73.133665] ret_from_fork_asm+0x1a/0x30 [ 73.137594] [ 73.139092] The buggy address belongs to the object at ffff8881066eaf00 [ 73.139092] which belongs to the cache kmalloc-64 of size 64 [ 73.151434] The buggy address is located 0 bytes to the right of [ 73.151434] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 73.164296] [ 73.165794] The buggy address belongs to the physical page: [ 73.171365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 73.179428] flags: 0x200000000000000(node=0|zone=2) [ 73.184314] page_type: f5(slab) [ 73.187497] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 73.195243] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.202982] page dumped because: kasan: bad access detected [ 73.208553] [ 73.210054] Memory state around the buggy address: [ 73.214848] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.222067] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 73.229287] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.236512] ^ [ 73.241306] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.248526] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 73.255752] ================================================================== [ 75.152701] ================================================================== [ 75.159941] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 75.167362] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 75.174778] [ 75.176279] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 75.176287] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 75.176290] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 75.176293] Call Trace: [ 75.176295] <TASK> [ 75.176297] dump_stack_lvl+0x73/0xb0 [ 75.176301] print_report+0xd1/0x650 [ 75.176305] ? __virt_addr_valid+0x1db/0x2d0 [ 75.176309] ? kasan_atomics_helper+0x224c/0x5450 [ 75.176313] ? kasan_complete_mode_report_info+0x2a/0x200 [ 75.176319] ? kasan_atomics_helper+0x224c/0x5450 [ 75.176323] kasan_report+0x141/0x180 [ 75.176347] ? kasan_atomics_helper+0x224c/0x5450 [ 75.176352] kasan_check_range+0x10c/0x1c0 [ 75.176357] __kasan_check_write+0x18/0x20 [ 75.176361] kasan_atomics_helper+0x224c/0x5450 [ 75.176378] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 75.176382] ? __kmalloc_cache_noprof+0x189/0x420 [ 75.176400] ? kasan_atomics+0x152/0x310 [ 75.176405] kasan_atomics+0x1dc/0x310 [ 75.176409] ? __pfx_kasan_atomics+0x10/0x10 [ 75.176414] ? ktime_get_ts64+0x83/0x230 [ 75.176419] kunit_try_run_case+0x1a2/0x480 [ 75.176423] ? __pfx_kunit_try_run_case+0x10/0x10 [ 75.176428] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 75.176432] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 75.176437] ? __kthread_parkme+0x82/0x180 [ 75.176441] ? preempt_count_sub+0x50/0x80 [ 75.176445] ? __pfx_kunit_try_run_case+0x10/0x10 [ 75.176450] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 75.176454] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 75.176458] kthread+0x334/0x6f0 [ 75.176462] ? trace_preempt_on+0x20/0xc0 [ 75.176466] ? __pfx_kthread+0x10/0x10 [ 75.176470] ? _raw_spin_unlock_irq+0x47/0x80 [ 75.176474] ? calculate_sigpending+0x7b/0xa0 [ 75.176479] ? __pfx_kthread+0x10/0x10 [ 75.176483] ret_from_fork+0x113/0x1d0 [ 75.176486] ? __pfx_kthread+0x10/0x10 [ 75.176490] ret_from_fork_asm+0x1a/0x30 [ 75.176496] </TASK> [ 75.176498] [ 75.359613] Allocated by task 306: [ 75.363018] kasan_save_stack+0x45/0x70 [ 75.366857] kasan_save_track+0x18/0x40 [ 75.370698] kasan_save_alloc_info+0x3b/0x50 [ 75.374977] __kasan_kmalloc+0xb7/0xc0 [ 75.378729] __kmalloc_cache_noprof+0x189/0x420 [ 75.383264] kasan_atomics+0x95/0x310 [ 75.386928] kunit_try_run_case+0x1a2/0x480 [ 75.391115] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 75.396514] kthread+0x334/0x6f0 [ 75.399747] ret_from_fork+0x113/0x1d0 [ 75.403501] ret_from_fork_asm+0x1a/0x30 [ 75.407435] [ 75.408934] The buggy address belongs to the object at ffff8881066eaf00 [ 75.408934] which belongs to the cache kmalloc-64 of size 64 [ 75.421273] The buggy address is located 0 bytes to the right of [ 75.421273] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 75.434137] [ 75.435636] The buggy address belongs to the physical page: [ 75.441209] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 75.449217] flags: 0x200000000000000(node=0|zone=2) [ 75.454096] page_type: f5(slab) [ 75.457243] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 75.464989] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.472730] page dumped because: kasan: bad access detected [ 75.478302] [ 75.479801] Memory state around the buggy address: [ 75.484592] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.491813] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 75.499031] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.506252] ^ [ 75.511043] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.518263] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.525481] ================================================================== [ 75.532707] ================================================================== [ 75.539947] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 75.547362] Read of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 75.554715] [ 75.556215] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 75.556223] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 75.556225] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 75.556229] Call Trace: [ 75.556231] <TASK> [ 75.556232] dump_stack_lvl+0x73/0xb0 [ 75.556237] print_report+0xd1/0x650 [ 75.556241] ? __virt_addr_valid+0x1db/0x2d0 [ 75.556245] ? kasan_atomics_helper+0x5115/0x5450 [ 75.556249] ? kasan_complete_mode_report_info+0x2a/0x200 [ 75.556254] ? kasan_atomics_helper+0x5115/0x5450 [ 75.556258] kasan_report+0x141/0x180 [ 75.556263] ? kasan_atomics_helper+0x5115/0x5450 [ 75.556268] __asan_report_load8_noabort+0x18/0x20 [ 75.556273] kasan_atomics_helper+0x5115/0x5450 [ 75.556277] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 75.556281] ? __kmalloc_cache_noprof+0x189/0x420 [ 75.556286] ? kasan_atomics+0x152/0x310 [ 75.556291] kasan_atomics+0x1dc/0x310 [ 75.556296] ? __pfx_kasan_atomics+0x10/0x10 [ 75.556300] ? ktime_get_ts64+0x83/0x230 [ 75.556305] kunit_try_run_case+0x1a2/0x480 [ 75.556310] ? __pfx_kunit_try_run_case+0x10/0x10 [ 75.556314] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 75.556319] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 75.556323] ? __kthread_parkme+0x82/0x180 [ 75.556327] ? preempt_count_sub+0x50/0x80 [ 75.556351] ? __pfx_kunit_try_run_case+0x10/0x10 [ 75.556356] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 75.556360] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 75.556377] kthread+0x334/0x6f0 [ 75.556381] ? trace_preempt_on+0x20/0xc0 [ 75.556386] ? __pfx_kthread+0x10/0x10 [ 75.556402] ? _raw_spin_unlock_irq+0x47/0x80 [ 75.556406] ? calculate_sigpending+0x7b/0xa0 [ 75.556411] ? __pfx_kthread+0x10/0x10 [ 75.556415] ret_from_fork+0x113/0x1d0 [ 75.556418] ? __pfx_kthread+0x10/0x10 [ 75.556422] ret_from_fork_asm+0x1a/0x30 [ 75.556428] </TASK> [ 75.556430] [ 75.736090] Allocated by task 306: [ 75.739495] kasan_save_stack+0x45/0x70 [ 75.743364] kasan_save_track+0x18/0x40 [ 75.747226] kasan_save_alloc_info+0x3b/0x50 [ 75.751497] __kasan_kmalloc+0xb7/0xc0 [ 75.755252] __kmalloc_cache_noprof+0x189/0x420 [ 75.759794] kasan_atomics+0x95/0x310 [ 75.763469] kunit_try_run_case+0x1a2/0x480 [ 75.767661] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 75.773061] kthread+0x334/0x6f0 [ 75.776293] ret_from_fork+0x113/0x1d0 [ 75.780048] ret_from_fork_asm+0x1a/0x30 [ 75.783981] [ 75.785480] The buggy address belongs to the object at ffff8881066eaf00 [ 75.785480] which belongs to the cache kmalloc-64 of size 64 [ 75.797813] The buggy address is located 0 bytes to the right of [ 75.797813] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 75.810676] [ 75.812175] The buggy address belongs to the physical page: [ 75.817747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 75.825746] flags: 0x200000000000000(node=0|zone=2) [ 75.830626] page_type: f5(slab) [ 75.833774] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 75.841521] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.849268] page dumped because: kasan: bad access detected [ 75.854841] [ 75.856364] Memory state around the buggy address: [ 75.861201] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.868420] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 75.875640] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.882859] ^ [ 75.887653] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.894872] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.902092] ================================================================== [ 59.191352] ================================================================== [ 59.198605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 59.205912] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 59.213311] [ 59.214814] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 59.214822] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 59.214825] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 59.214828] Call Trace: [ 59.214830] <TASK> [ 59.214832] dump_stack_lvl+0x73/0xb0 [ 59.214837] print_report+0xd1/0x650 [ 59.214841] ? __virt_addr_valid+0x1db/0x2d0 [ 59.214845] ? kasan_atomics_helper+0xe78/0x5450 [ 59.214849] ? kasan_complete_mode_report_info+0x2a/0x200 [ 59.214854] ? kasan_atomics_helper+0xe78/0x5450 [ 59.214858] kasan_report+0x141/0x180 [ 59.214863] ? kasan_atomics_helper+0xe78/0x5450 [ 59.214867] kasan_check_range+0x10c/0x1c0 [ 59.214872] __kasan_check_write+0x18/0x20 [ 59.214876] kasan_atomics_helper+0xe78/0x5450 [ 59.214880] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 59.214884] ? __kmalloc_cache_noprof+0x189/0x420 [ 59.214889] ? kasan_atomics+0x152/0x310 [ 59.214894] kasan_atomics+0x1dc/0x310 [ 59.214899] ? __pfx_kasan_atomics+0x10/0x10 [ 59.214904] ? ktime_get_ts64+0x83/0x230 [ 59.214908] kunit_try_run_case+0x1a2/0x480 [ 59.214913] ? __pfx_kunit_try_run_case+0x10/0x10 [ 59.214917] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 59.214921] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 59.214926] ? __kthread_parkme+0x82/0x180 [ 59.214930] ? preempt_count_sub+0x50/0x80 [ 59.214934] ? __pfx_kunit_try_run_case+0x10/0x10 [ 59.214939] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 59.214943] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 59.214947] kthread+0x334/0x6f0 [ 59.214951] ? trace_preempt_on+0x20/0xc0 [ 59.214955] ? __pfx_kthread+0x10/0x10 [ 59.214959] ? _raw_spin_unlock_irq+0x47/0x80 [ 59.214963] ? calculate_sigpending+0x7b/0xa0 [ 59.214968] ? __pfx_kthread+0x10/0x10 [ 59.214972] ret_from_fork+0x113/0x1d0 [ 59.214975] ? __pfx_kthread+0x10/0x10 [ 59.214979] ret_from_fork_asm+0x1a/0x30 [ 59.214985] </TASK> [ 59.214987] [ 59.397774] Allocated by task 306: [ 59.401180] kasan_save_stack+0x45/0x70 [ 59.405017] kasan_save_track+0x18/0x40 [ 59.408859] kasan_save_alloc_info+0x3b/0x50 [ 59.413139] __kasan_kmalloc+0xb7/0xc0 [ 59.416892] __kmalloc_cache_noprof+0x189/0x420 [ 59.421431] kasan_atomics+0x95/0x310 [ 59.425100] kunit_try_run_case+0x1a2/0x480 [ 59.429293] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 59.434694] kthread+0x334/0x6f0 [ 59.437934] ret_from_fork+0x113/0x1d0 [ 59.441686] ret_from_fork_asm+0x1a/0x30 [ 59.445612] [ 59.447112] The buggy address belongs to the object at ffff8881066eaf00 [ 59.447112] which belongs to the cache kmalloc-64 of size 64 [ 59.459455] The buggy address is located 0 bytes to the right of [ 59.459455] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 59.472315] [ 59.473849] The buggy address belongs to the physical page: [ 59.479432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 59.487437] flags: 0x200000000000000(node=0|zone=2) [ 59.492318] page_type: f5(slab) [ 59.495499] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 59.503238] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.510978] page dumped because: kasan: bad access detected [ 59.516549] [ 59.518050] Memory state around the buggy address: [ 59.522843] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.530068] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 59.537290] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.544516] ^ [ 59.549310] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.556530] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 59.563756] ================================================================== [ 63.732930] ================================================================== [ 63.740170] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 63.747563] Read of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 63.754878] [ 63.756417] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 63.756425] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 63.756428] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 63.756431] Call Trace: [ 63.756433] <TASK> [ 63.756435] dump_stack_lvl+0x73/0xb0 [ 63.756439] print_report+0xd1/0x650 [ 63.756443] ? __virt_addr_valid+0x1db/0x2d0 [ 63.756447] ? kasan_atomics_helper+0x13b5/0x5450 [ 63.756451] ? kasan_complete_mode_report_info+0x2a/0x200 [ 63.756456] ? kasan_atomics_helper+0x13b5/0x5450 [ 63.756460] kasan_report+0x141/0x180 [ 63.756465] ? kasan_atomics_helper+0x13b5/0x5450 [ 63.756470] kasan_check_range+0x10c/0x1c0 [ 63.756474] __kasan_check_read+0x15/0x20 [ 63.756478] kasan_atomics_helper+0x13b5/0x5450 [ 63.756482] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 63.756486] ? __kmalloc_cache_noprof+0x189/0x420 [ 63.756491] ? kasan_atomics+0x152/0x310 [ 63.756496] kasan_atomics+0x1dc/0x310 [ 63.756500] ? __pfx_kasan_atomics+0x10/0x10 [ 63.756505] ? ktime_get_ts64+0x83/0x230 [ 63.756510] kunit_try_run_case+0x1a2/0x480 [ 63.756514] ? __pfx_kunit_try_run_case+0x10/0x10 [ 63.756519] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 63.756523] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 63.756528] ? __kthread_parkme+0x82/0x180 [ 63.756531] ? preempt_count_sub+0x50/0x80 [ 63.756536] ? __pfx_kunit_try_run_case+0x10/0x10 [ 63.756540] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 63.756545] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 63.756549] kthread+0x334/0x6f0 [ 63.756553] ? trace_preempt_on+0x20/0xc0 [ 63.756557] ? __pfx_kthread+0x10/0x10 [ 63.756561] ? _raw_spin_unlock_irq+0x47/0x80 [ 63.756565] ? calculate_sigpending+0x7b/0xa0 [ 63.756570] ? __pfx_kthread+0x10/0x10 [ 63.756574] ret_from_fork+0x113/0x1d0 [ 63.756577] ? __pfx_kthread+0x10/0x10 [ 63.756581] ret_from_fork_asm+0x1a/0x30 [ 63.756587] </TASK> [ 63.756589] [ 63.939598] Allocated by task 306: [ 63.943002] kasan_save_stack+0x45/0x70 [ 63.946843] kasan_save_track+0x18/0x40 [ 63.950682] kasan_save_alloc_info+0x3b/0x50 [ 63.954964] __kasan_kmalloc+0xb7/0xc0 [ 63.958716] __kmalloc_cache_noprof+0x189/0x420 [ 63.963249] kasan_atomics+0x95/0x310 [ 63.966915] kunit_try_run_case+0x1a2/0x480 [ 63.971109] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 63.976508] kthread+0x334/0x6f0 [ 63.979740] ret_from_fork+0x113/0x1d0 [ 63.983495] ret_from_fork_asm+0x1a/0x30 [ 63.987431] [ 63.988936] The buggy address belongs to the object at ffff8881066eaf00 [ 63.988936] which belongs to the cache kmalloc-64 of size 64 [ 64.001270] The buggy address is located 0 bytes to the right of [ 64.001270] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 64.014137] [ 64.015639] The buggy address belongs to the physical page: [ 64.021211] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 64.029220] flags: 0x200000000000000(node=0|zone=2) [ 64.034106] page_type: f5(slab) [ 64.037255] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 64.045002] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.052748] page dumped because: kasan: bad access detected [ 64.058323] [ 64.059854] Memory state around the buggy address: [ 64.064649] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.071869] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 64.079095] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.086313] ^ [ 64.091143] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.098365] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.105632] ================================================================== [ 51.988532] ================================================================== [ 51.995771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 52.003078] Read of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 52.010417] [ 52.011919] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 52.011927] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 52.011930] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 52.011934] Call Trace: [ 52.011935] <TASK> [ 52.011937] dump_stack_lvl+0x73/0xb0 [ 52.011942] print_report+0xd1/0x650 [ 52.011946] ? __virt_addr_valid+0x1db/0x2d0 [ 52.011950] ? kasan_atomics_helper+0x3df/0x5450 [ 52.011954] ? kasan_complete_mode_report_info+0x2a/0x200 [ 52.011959] ? kasan_atomics_helper+0x3df/0x5450 [ 52.011963] kasan_report+0x141/0x180 [ 52.011967] ? kasan_atomics_helper+0x3df/0x5450 [ 52.011972] kasan_check_range+0x10c/0x1c0 [ 52.011977] __kasan_check_read+0x15/0x20 [ 52.011980] kasan_atomics_helper+0x3df/0x5450 [ 52.011985] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 52.011989] ? __kmalloc_cache_noprof+0x189/0x420 [ 52.011994] ? kasan_atomics+0x152/0x310 [ 52.011999] kasan_atomics+0x1dc/0x310 [ 52.012003] ? __pfx_kasan_atomics+0x10/0x10 [ 52.012008] ? ktime_get_ts64+0x83/0x230 [ 52.012013] kunit_try_run_case+0x1a2/0x480 [ 52.012017] ? __pfx_kunit_try_run_case+0x10/0x10 [ 52.012022] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 52.012026] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 52.012030] ? __kthread_parkme+0x82/0x180 [ 52.012034] ? preempt_count_sub+0x50/0x80 [ 52.012038] ? __pfx_kunit_try_run_case+0x10/0x10 [ 52.012043] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 52.012048] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 52.012052] kthread+0x334/0x6f0 [ 52.012056] ? trace_preempt_on+0x20/0xc0 [ 52.012060] ? __pfx_kthread+0x10/0x10 [ 52.012064] ? _raw_spin_unlock_irq+0x47/0x80 [ 52.012068] ? calculate_sigpending+0x7b/0xa0 [ 52.012072] ? __pfx_kthread+0x10/0x10 [ 52.012076] ret_from_fork+0x113/0x1d0 [ 52.012080] ? __pfx_kthread+0x10/0x10 [ 52.012084] ret_from_fork_asm+0x1a/0x30 [ 52.012090] </TASK> [ 52.012092] [ 52.194775] Allocated by task 306: [ 52.198180] kasan_save_stack+0x45/0x70 [ 52.202019] kasan_save_track+0x18/0x40 [ 52.205859] kasan_save_alloc_info+0x3b/0x50 [ 52.210133] __kasan_kmalloc+0xb7/0xc0 [ 52.213883] __kmalloc_cache_noprof+0x189/0x420 [ 52.218419] kasan_atomics+0x95/0x310 [ 52.222092] kunit_try_run_case+0x1a2/0x480 [ 52.226278] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 52.231676] kthread+0x334/0x6f0 [ 52.234909] ret_from_fork+0x113/0x1d0 [ 52.238661] ret_from_fork_asm+0x1a/0x30 [ 52.242589] [ 52.244089] The buggy address belongs to the object at ffff8881066eaf00 [ 52.244089] which belongs to the cache kmalloc-64 of size 64 [ 52.256428] The buggy address is located 0 bytes to the right of [ 52.256428] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 52.269291] [ 52.270788] The buggy address belongs to the physical page: [ 52.276376] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 52.284418] flags: 0x200000000000000(node=0|zone=2) [ 52.289302] page_type: f5(slab) [ 52.292450] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 52.300196] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.307933] page dumped because: kasan: bad access detected [ 52.313508] [ 52.315008] Memory state around the buggy address: [ 52.319800] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.327018] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 52.334238] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.341457] ^ [ 52.346249] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.353469] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 52.360689] ================================================================== [ 62.599915] ================================================================== [ 62.607155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 62.614546] Read of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 62.621855] [ 62.623376] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 62.623384] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 62.623387] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 62.623391] Call Trace: [ 62.623393] <TASK> [ 62.623395] dump_stack_lvl+0x73/0xb0 [ 62.623412] print_report+0xd1/0x650 [ 62.623416] ? __virt_addr_valid+0x1db/0x2d0 [ 62.623420] ? kasan_atomics_helper+0x49e8/0x5450 [ 62.623424] ? kasan_complete_mode_report_info+0x2a/0x200 [ 62.623429] ? kasan_atomics_helper+0x49e8/0x5450 [ 62.623433] kasan_report+0x141/0x180 [ 62.623437] ? kasan_atomics_helper+0x49e8/0x5450 [ 62.623442] __asan_report_load4_noabort+0x18/0x20 [ 62.623447] kasan_atomics_helper+0x49e8/0x5450 [ 62.623451] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 62.623455] ? __kmalloc_cache_noprof+0x189/0x420 [ 62.623460] ? kasan_atomics+0x152/0x310 [ 62.623465] kasan_atomics+0x1dc/0x310 [ 62.623469] ? __pfx_kasan_atomics+0x10/0x10 [ 62.623474] ? ktime_get_ts64+0x83/0x230 [ 62.623479] kunit_try_run_case+0x1a2/0x480 [ 62.623483] ? __pfx_kunit_try_run_case+0x10/0x10 [ 62.623488] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 62.623492] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 62.623497] ? __kthread_parkme+0x82/0x180 [ 62.623500] ? preempt_count_sub+0x50/0x80 [ 62.623505] ? __pfx_kunit_try_run_case+0x10/0x10 [ 62.623509] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 62.623514] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 62.623518] kthread+0x334/0x6f0 [ 62.623522] ? trace_preempt_on+0x20/0xc0 [ 62.623526] ? __pfx_kthread+0x10/0x10 [ 62.623530] ? _raw_spin_unlock_irq+0x47/0x80 [ 62.623534] ? calculate_sigpending+0x7b/0xa0 [ 62.623539] ? __pfx_kthread+0x10/0x10 [ 62.623543] ret_from_fork+0x113/0x1d0 [ 62.623547] ? __pfx_kthread+0x10/0x10 [ 62.623551] ret_from_fork_asm+0x1a/0x30 [ 62.623557] </TASK> [ 62.623558] [ 62.803263] Allocated by task 306: [ 62.806669] kasan_save_stack+0x45/0x70 [ 62.810507] kasan_save_track+0x18/0x40 [ 62.814362] kasan_save_alloc_info+0x3b/0x50 [ 62.818682] __kasan_kmalloc+0xb7/0xc0 [ 62.822434] __kmalloc_cache_noprof+0x189/0x420 [ 62.826966] kasan_atomics+0x95/0x310 [ 62.830632] kunit_try_run_case+0x1a2/0x480 [ 62.834819] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 62.840217] kthread+0x334/0x6f0 [ 62.843449] ret_from_fork+0x113/0x1d0 [ 62.847203] ret_from_fork_asm+0x1a/0x30 [ 62.851129] [ 62.852630] The buggy address belongs to the object at ffff8881066eaf00 [ 62.852630] which belongs to the cache kmalloc-64 of size 64 [ 62.864969] The buggy address is located 0 bytes to the right of [ 62.864969] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 62.877831] [ 62.879361] The buggy address belongs to the physical page: [ 62.884957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 62.892963] flags: 0x200000000000000(node=0|zone=2) [ 62.897844] page_type: f5(slab) [ 62.900988] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 62.908728] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.916469] page dumped because: kasan: bad access detected [ 62.922041] [ 62.923538] Memory state around the buggy address: [ 62.928363] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.935631] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 62.942847] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.950069] ^ [ 62.954860] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.962080] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.969307] ================================================================== [ 74.776191] ================================================================== [ 74.783437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 74.790837] Read of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 74.798145] [ 74.799645] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 74.799653] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 74.799656] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 74.799659] Call Trace: [ 74.799661] <TASK> [ 74.799663] dump_stack_lvl+0x73/0xb0 [ 74.799667] print_report+0xd1/0x650 [ 74.799671] ? __virt_addr_valid+0x1db/0x2d0 [ 74.799675] ? kasan_atomics_helper+0x4fa5/0x5450 [ 74.799679] ? kasan_complete_mode_report_info+0x2a/0x200 [ 74.799685] ? kasan_atomics_helper+0x4fa5/0x5450 [ 74.799689] kasan_report+0x141/0x180 [ 74.799693] ? kasan_atomics_helper+0x4fa5/0x5450 [ 74.799698] __asan_report_load8_noabort+0x18/0x20 [ 74.799703] kasan_atomics_helper+0x4fa5/0x5450 [ 74.799707] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 74.799712] ? __kmalloc_cache_noprof+0x189/0x420 [ 74.799717] ? kasan_atomics+0x152/0x310 [ 74.799722] kasan_atomics+0x1dc/0x310 [ 74.799726] ? __pfx_kasan_atomics+0x10/0x10 [ 74.799731] ? ktime_get_ts64+0x83/0x230 [ 74.799735] kunit_try_run_case+0x1a2/0x480 [ 74.799740] ? __pfx_kunit_try_run_case+0x10/0x10 [ 74.799745] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 74.799749] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 74.799754] ? __kthread_parkme+0x82/0x180 [ 74.799757] ? preempt_count_sub+0x50/0x80 [ 74.799762] ? __pfx_kunit_try_run_case+0x10/0x10 [ 74.799766] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 74.799771] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 74.799775] kthread+0x334/0x6f0 [ 74.799779] ? trace_preempt_on+0x20/0xc0 [ 74.799783] ? __pfx_kthread+0x10/0x10 [ 74.799787] ? _raw_spin_unlock_irq+0x47/0x80 [ 74.799791] ? calculate_sigpending+0x7b/0xa0 [ 74.799795] ? __pfx_kthread+0x10/0x10 [ 74.799800] ret_from_fork+0x113/0x1d0 [ 74.799803] ? __pfx_kthread+0x10/0x10 [ 74.799807] ret_from_fork_asm+0x1a/0x30 [ 74.799813] </TASK> [ 74.799815] [ 74.979469] Allocated by task 306: [ 74.982875] kasan_save_stack+0x45/0x70 [ 74.986721] kasan_save_track+0x18/0x40 [ 74.990559] kasan_save_alloc_info+0x3b/0x50 [ 74.994835] __kasan_kmalloc+0xb7/0xc0 [ 74.998586] __kmalloc_cache_noprof+0x189/0x420 [ 75.003118] kasan_atomics+0x95/0x310 [ 75.006786] kunit_try_run_case+0x1a2/0x480 [ 75.010980] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 75.016413] kthread+0x334/0x6f0 [ 75.019646] ret_from_fork+0x113/0x1d0 [ 75.023414] ret_from_fork_asm+0x1a/0x30 [ 75.027363] [ 75.028909] The buggy address belongs to the object at ffff8881066eaf00 [ 75.028909] which belongs to the cache kmalloc-64 of size 64 [ 75.041242] The buggy address is located 0 bytes to the right of [ 75.041242] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 75.054104] [ 75.055604] The buggy address belongs to the physical page: [ 75.061176] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 75.069184] flags: 0x200000000000000(node=0|zone=2) [ 75.074065] page_type: f5(slab) [ 75.077212] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 75.084959] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.092706] page dumped because: kasan: bad access detected [ 75.098279] [ 75.099778] Memory state around the buggy address: [ 75.104571] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.111790] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 75.119017] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.126236] ^ [ 75.131028] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.138250] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.145477] ================================================================== [ 60.330093] ================================================================== [ 60.337365] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 60.344810] Read of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 60.352117] [ 60.353617] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 60.353625] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 60.353628] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 60.353631] Call Trace: [ 60.353633] <TASK> [ 60.353635] dump_stack_lvl+0x73/0xb0 [ 60.353639] print_report+0xd1/0x650 [ 60.353643] ? __virt_addr_valid+0x1db/0x2d0 [ 60.353647] ? kasan_atomics_helper+0x4a36/0x5450 [ 60.353651] ? kasan_complete_mode_report_info+0x2a/0x200 [ 60.353657] ? kasan_atomics_helper+0x4a36/0x5450 [ 60.353661] kasan_report+0x141/0x180 [ 60.353665] ? kasan_atomics_helper+0x4a36/0x5450 [ 60.353670] __asan_report_load4_noabort+0x18/0x20 [ 60.353675] kasan_atomics_helper+0x4a36/0x5450 [ 60.353679] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 60.353683] ? __kmalloc_cache_noprof+0x189/0x420 [ 60.353688] ? kasan_atomics+0x152/0x310 [ 60.353693] kasan_atomics+0x1dc/0x310 [ 60.353697] ? __pfx_kasan_atomics+0x10/0x10 [ 60.353702] ? ktime_get_ts64+0x83/0x230 [ 60.353707] kunit_try_run_case+0x1a2/0x480 [ 60.353711] ? __pfx_kunit_try_run_case+0x10/0x10 [ 60.353716] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 60.353720] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 60.353725] ? __kthread_parkme+0x82/0x180 [ 60.353729] ? preempt_count_sub+0x50/0x80 [ 60.353733] ? __pfx_kunit_try_run_case+0x10/0x10 [ 60.353738] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 60.353742] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 60.353746] kthread+0x334/0x6f0 [ 60.353750] ? trace_preempt_on+0x20/0xc0 [ 60.353754] ? __pfx_kthread+0x10/0x10 [ 60.353758] ? _raw_spin_unlock_irq+0x47/0x80 [ 60.353762] ? calculate_sigpending+0x7b/0xa0 [ 60.353767] ? __pfx_kthread+0x10/0x10 [ 60.353771] ret_from_fork+0x113/0x1d0 [ 60.353775] ? __pfx_kthread+0x10/0x10 [ 60.353779] ret_from_fork_asm+0x1a/0x30 [ 60.353785] </TASK> [ 60.353786] [ 60.533428] Allocated by task 306: [ 60.536835] kasan_save_stack+0x45/0x70 [ 60.540675] kasan_save_track+0x18/0x40 [ 60.544516] kasan_save_alloc_info+0x3b/0x50 [ 60.548797] __kasan_kmalloc+0xb7/0xc0 [ 60.552549] __kmalloc_cache_noprof+0x189/0x420 [ 60.557092] kasan_atomics+0x95/0x310 [ 60.560764] kunit_try_run_case+0x1a2/0x480 [ 60.564950] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 60.570363] kthread+0x334/0x6f0 [ 60.573618] ret_from_fork+0x113/0x1d0 [ 60.577371] ret_from_fork_asm+0x1a/0x30 [ 60.581363] [ 60.582884] The buggy address belongs to the object at ffff8881066eaf00 [ 60.582884] which belongs to the cache kmalloc-64 of size 64 [ 60.595224] The buggy address is located 0 bytes to the right of [ 60.595224] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 60.608086] [ 60.609583] The buggy address belongs to the physical page: [ 60.615157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 60.623164] flags: 0x200000000000000(node=0|zone=2) [ 60.628046] page_type: f5(slab) [ 60.631192] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 60.638939] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.646687] page dumped because: kasan: bad access detected [ 60.652258] [ 60.653757] Memory state around the buggy address: [ 60.658550] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.665770] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 60.672991] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.680217] ^ [ 60.685011] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.692237] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 60.699457] ================================================================== [ 70.182972] ================================================================== [ 70.190211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 70.197605] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 70.204996] [ 70.206498] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 70.206506] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 70.206509] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 70.206512] Call Trace: [ 70.206514] <TASK> [ 70.206516] dump_stack_lvl+0x73/0xb0 [ 70.206520] print_report+0xd1/0x650 [ 70.206524] ? __virt_addr_valid+0x1db/0x2d0 [ 70.206528] ? kasan_atomics_helper+0x1ce1/0x5450 [ 70.206532] ? kasan_complete_mode_report_info+0x2a/0x200 [ 70.206538] ? kasan_atomics_helper+0x1ce1/0x5450 [ 70.206542] kasan_report+0x141/0x180 [ 70.206546] ? kasan_atomics_helper+0x1ce1/0x5450 [ 70.206551] kasan_check_range+0x10c/0x1c0 [ 70.206555] __kasan_check_write+0x18/0x20 [ 70.206559] kasan_atomics_helper+0x1ce1/0x5450 [ 70.206563] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 70.206567] ? __kmalloc_cache_noprof+0x189/0x420 [ 70.206572] ? kasan_atomics+0x152/0x310 [ 70.206577] kasan_atomics+0x1dc/0x310 [ 70.206582] ? __pfx_kasan_atomics+0x10/0x10 [ 70.206587] ? ktime_get_ts64+0x83/0x230 [ 70.206591] kunit_try_run_case+0x1a2/0x480 [ 70.206596] ? __pfx_kunit_try_run_case+0x10/0x10 [ 70.206600] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 70.206604] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 70.206609] ? __kthread_parkme+0x82/0x180 [ 70.206612] ? preempt_count_sub+0x50/0x80 [ 70.206617] ? __pfx_kunit_try_run_case+0x10/0x10 [ 70.206621] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 70.206626] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 70.206630] kthread+0x334/0x6f0 [ 70.206634] ? trace_preempt_on+0x20/0xc0 [ 70.206638] ? __pfx_kthread+0x10/0x10 [ 70.206642] ? _raw_spin_unlock_irq+0x47/0x80 [ 70.206646] ? calculate_sigpending+0x7b/0xa0 [ 70.206651] ? __pfx_kthread+0x10/0x10 [ 70.206655] ret_from_fork+0x113/0x1d0 [ 70.206659] ? __pfx_kthread+0x10/0x10 [ 70.206662] ret_from_fork_asm+0x1a/0x30 [ 70.206668] </TASK> [ 70.206670] [ 70.389794] Allocated by task 306: [ 70.393200] kasan_save_stack+0x45/0x70 [ 70.397040] kasan_save_track+0x18/0x40 [ 70.400880] kasan_save_alloc_info+0x3b/0x50 [ 70.405153] __kasan_kmalloc+0xb7/0xc0 [ 70.408906] __kmalloc_cache_noprof+0x189/0x420 [ 70.413446] kasan_atomics+0x95/0x310 [ 70.417111] kunit_try_run_case+0x1a2/0x480 [ 70.421298] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 70.426698] kthread+0x334/0x6f0 [ 70.429930] ret_from_fork+0x113/0x1d0 [ 70.433682] ret_from_fork_asm+0x1a/0x30 [ 70.437609] [ 70.439109] The buggy address belongs to the object at ffff8881066eaf00 [ 70.439109] which belongs to the cache kmalloc-64 of size 64 [ 70.451451] The buggy address is located 0 bytes to the right of [ 70.451451] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 70.464319] [ 70.465852] The buggy address belongs to the physical page: [ 70.471432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 70.479435] flags: 0x200000000000000(node=0|zone=2) [ 70.484314] page_type: f5(slab) [ 70.487496] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 70.495242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.502981] page dumped because: kasan: bad access detected [ 70.508552] [ 70.510052] Memory state around the buggy address: [ 70.514847] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.522075] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 70.529303] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.536531] ^ [ 70.541323] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.548594] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 70.555812] ================================================================== [ 50.858588] ================================================================== [ 50.865818] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 50.873219] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 50.880618] [ 50.882120] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 50.882129] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 50.882131] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 50.882135] Call Trace: [ 50.882136] <TASK> [ 50.882138] dump_stack_lvl+0x73/0xb0 [ 50.882143] print_report+0xd1/0x650 [ 50.882147] ? __virt_addr_valid+0x1db/0x2d0 [ 50.882151] ? kasan_atomics_helper+0x4ba2/0x5450 [ 50.882155] ? kasan_complete_mode_report_info+0x2a/0x200 [ 50.882160] ? kasan_atomics_helper+0x4ba2/0x5450 [ 50.882164] kasan_report+0x141/0x180 [ 50.882169] ? kasan_atomics_helper+0x4ba2/0x5450 [ 50.882173] __asan_report_store4_noabort+0x1b/0x30 [ 50.882179] kasan_atomics_helper+0x4ba2/0x5450 [ 50.882183] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 50.882187] ? __kmalloc_cache_noprof+0x189/0x420 [ 50.882192] ? kasan_atomics+0x152/0x310 [ 50.882197] kasan_atomics+0x1dc/0x310 [ 50.882201] ? __pfx_kasan_atomics+0x10/0x10 [ 50.882206] ? ktime_get_ts64+0x83/0x230 [ 50.882211] kunit_try_run_case+0x1a2/0x480 [ 50.882215] ? __pfx_kunit_try_run_case+0x10/0x10 [ 50.882220] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 50.882224] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 50.882229] ? __kthread_parkme+0x82/0x180 [ 50.882233] ? preempt_count_sub+0x50/0x80 [ 50.882237] ? __pfx_kunit_try_run_case+0x10/0x10 [ 50.882242] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 50.882246] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 50.882250] kthread+0x334/0x6f0 [ 50.882254] ? trace_preempt_on+0x20/0xc0 [ 50.882258] ? __pfx_kthread+0x10/0x10 [ 50.882262] ? _raw_spin_unlock_irq+0x47/0x80 [ 50.882266] ? calculate_sigpending+0x7b/0xa0 [ 50.882271] ? __pfx_kthread+0x10/0x10 [ 50.882275] ret_from_fork+0x113/0x1d0 [ 50.882279] ? __pfx_kthread+0x10/0x10 [ 50.882283] ret_from_fork_asm+0x1a/0x30 [ 50.882289] </TASK> [ 50.882291] [ 51.062089] Allocated by task 306: [ 51.065494] kasan_save_stack+0x45/0x70 [ 51.069363] kasan_save_track+0x18/0x40 [ 51.073245] kasan_save_alloc_info+0x3b/0x50 [ 51.077524] __kasan_kmalloc+0xb7/0xc0 [ 51.081278] __kmalloc_cache_noprof+0x189/0x420 [ 51.085811] kasan_atomics+0x95/0x310 [ 51.089485] kunit_try_run_case+0x1a2/0x480 [ 51.093671] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 51.099071] kthread+0x334/0x6f0 [ 51.102302] ret_from_fork+0x113/0x1d0 [ 51.106056] ret_from_fork_asm+0x1a/0x30 [ 51.109981] [ 51.111480] The buggy address belongs to the object at ffff8881066eaf00 [ 51.111480] which belongs to the cache kmalloc-64 of size 64 [ 51.123824] The buggy address is located 0 bytes to the right of [ 51.123824] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 51.136694] [ 51.138193] The buggy address belongs to the physical page: [ 51.143763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 51.151762] flags: 0x200000000000000(node=0|zone=2) [ 51.156643] page_type: f5(slab) [ 51.159789] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 51.167529] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.175267] page dumped because: kasan: bad access detected [ 51.180839] [ 51.182362] Memory state around the buggy address: [ 51.187201] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.194420] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 51.201641] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.208859] ^ [ 51.213651] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.220872] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 51.228090] ================================================================== [ 55.018931] ================================================================== [ 55.026170] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 55.033476] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 55.040870] [ 55.042382] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 55.042403] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 55.042406] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 55.042410] Call Trace: [ 55.042411] <TASK> [ 55.042413] dump_stack_lvl+0x73/0xb0 [ 55.042418] print_report+0xd1/0x650 [ 55.042422] ? __virt_addr_valid+0x1db/0x2d0 [ 55.042426] ? kasan_atomics_helper+0x7c7/0x5450 [ 55.042430] ? kasan_complete_mode_report_info+0x2a/0x200 [ 55.042435] ? kasan_atomics_helper+0x7c7/0x5450 [ 55.042439] kasan_report+0x141/0x180 [ 55.042443] ? kasan_atomics_helper+0x7c7/0x5450 [ 55.042448] kasan_check_range+0x10c/0x1c0 [ 55.042453] __kasan_check_write+0x18/0x20 [ 55.042456] kasan_atomics_helper+0x7c7/0x5450 [ 55.042461] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 55.042465] ? __kmalloc_cache_noprof+0x189/0x420 [ 55.042470] ? kasan_atomics+0x152/0x310 [ 55.042475] kasan_atomics+0x1dc/0x310 [ 55.042479] ? __pfx_kasan_atomics+0x10/0x10 [ 55.042484] ? ktime_get_ts64+0x83/0x230 [ 55.042489] kunit_try_run_case+0x1a2/0x480 [ 55.042493] ? __pfx_kunit_try_run_case+0x10/0x10 [ 55.042498] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 55.042502] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 55.042507] ? __kthread_parkme+0x82/0x180 [ 55.042511] ? preempt_count_sub+0x50/0x80 [ 55.042515] ? __pfx_kunit_try_run_case+0x10/0x10 [ 55.042520] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 55.042524] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 55.042528] kthread+0x334/0x6f0 [ 55.042532] ? trace_preempt_on+0x20/0xc0 [ 55.042536] ? __pfx_kthread+0x10/0x10 [ 55.042540] ? _raw_spin_unlock_irq+0x47/0x80 [ 55.042544] ? calculate_sigpending+0x7b/0xa0 [ 55.042549] ? __pfx_kthread+0x10/0x10 [ 55.042553] ret_from_fork+0x113/0x1d0 [ 55.042557] ? __pfx_kthread+0x10/0x10 [ 55.042561] ret_from_fork_asm+0x1a/0x30 [ 55.042567] </TASK> [ 55.042569] [ 55.225251] Allocated by task 306: [ 55.228657] kasan_save_stack+0x45/0x70 [ 55.232496] kasan_save_track+0x18/0x40 [ 55.236376] kasan_save_alloc_info+0x3b/0x50 [ 55.240677] __kasan_kmalloc+0xb7/0xc0 [ 55.244431] __kmalloc_cache_noprof+0x189/0x420 [ 55.248964] kasan_atomics+0x95/0x310 [ 55.252637] kunit_try_run_case+0x1a2/0x480 [ 55.256823] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 55.262225] kthread+0x334/0x6f0 [ 55.265465] ret_from_fork+0x113/0x1d0 [ 55.269216] ret_from_fork_asm+0x1a/0x30 [ 55.273142] [ 55.274643] The buggy address belongs to the object at ffff8881066eaf00 [ 55.274643] which belongs to the cache kmalloc-64 of size 64 [ 55.286984] The buggy address is located 0 bytes to the right of [ 55.286984] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 55.299846] [ 55.301364] The buggy address belongs to the physical page: [ 55.306986] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 55.314985] flags: 0x200000000000000(node=0|zone=2) [ 55.319864] page_type: f5(slab) [ 55.323011] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 55.330752] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.338499] page dumped because: kasan: bad access detected [ 55.344072] [ 55.345571] Memory state around the buggy address: [ 55.350365] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.357626] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 55.364844] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.372065] ^ [ 55.376857] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.384076] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 55.391296] ================================================================== [ 73.639578] ================================================================== [ 73.646816] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 73.654210] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 73.661602] [ 73.663102] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 73.663110] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 73.663113] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 73.663116] Call Trace: [ 73.663118] <TASK> [ 73.663120] dump_stack_lvl+0x73/0xb0 [ 73.663125] print_report+0xd1/0x650 [ 73.663129] ? __virt_addr_valid+0x1db/0x2d0 [ 73.663133] ? kasan_atomics_helper+0x20c8/0x5450 [ 73.663137] ? kasan_complete_mode_report_info+0x2a/0x200 [ 73.663142] ? kasan_atomics_helper+0x20c8/0x5450 [ 73.663146] kasan_report+0x141/0x180 [ 73.663151] ? kasan_atomics_helper+0x20c8/0x5450 [ 73.663155] kasan_check_range+0x10c/0x1c0 [ 73.663160] __kasan_check_write+0x18/0x20 [ 73.663164] kasan_atomics_helper+0x20c8/0x5450 [ 73.663168] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 73.663172] ? __kmalloc_cache_noprof+0x189/0x420 [ 73.663177] ? kasan_atomics+0x152/0x310 [ 73.663182] kasan_atomics+0x1dc/0x310 [ 73.663187] ? __pfx_kasan_atomics+0x10/0x10 [ 73.663192] ? ktime_get_ts64+0x83/0x230 [ 73.663196] kunit_try_run_case+0x1a2/0x480 [ 73.663201] ? __pfx_kunit_try_run_case+0x10/0x10 [ 73.663205] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 73.663209] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 73.663214] ? __kthread_parkme+0x82/0x180 [ 73.663218] ? preempt_count_sub+0x50/0x80 [ 73.663222] ? __pfx_kunit_try_run_case+0x10/0x10 [ 73.663226] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 73.663231] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 73.663235] kthread+0x334/0x6f0 [ 73.663239] ? trace_preempt_on+0x20/0xc0 [ 73.663243] ? __pfx_kthread+0x10/0x10 [ 73.663247] ? _raw_spin_unlock_irq+0x47/0x80 [ 73.663251] ? calculate_sigpending+0x7b/0xa0 [ 73.663256] ? __pfx_kthread+0x10/0x10 [ 73.663260] ret_from_fork+0x113/0x1d0 [ 73.663263] ? __pfx_kthread+0x10/0x10 [ 73.663267] ret_from_fork_asm+0x1a/0x30 [ 73.663273] </TASK> [ 73.663275] [ 73.846454] Allocated by task 306: [ 73.849860] kasan_save_stack+0x45/0x70 [ 73.853697] kasan_save_track+0x18/0x40 [ 73.857537] kasan_save_alloc_info+0x3b/0x50 [ 73.861811] __kasan_kmalloc+0xb7/0xc0 [ 73.865563] __kmalloc_cache_noprof+0x189/0x420 [ 73.870105] kasan_atomics+0x95/0x310 [ 73.873770] kunit_try_run_case+0x1a2/0x480 [ 73.877957] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 73.883365] kthread+0x334/0x6f0 [ 73.886648] ret_from_fork+0x113/0x1d0 [ 73.890419] ret_from_fork_asm+0x1a/0x30 [ 73.894363] [ 73.895906] The buggy address belongs to the object at ffff8881066eaf00 [ 73.895906] which belongs to the cache kmalloc-64 of size 64 [ 73.908246] The buggy address is located 0 bytes to the right of [ 73.908246] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 73.921107] [ 73.922606] The buggy address belongs to the physical page: [ 73.928179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 73.936179] flags: 0x200000000000000(node=0|zone=2) [ 73.941059] page_type: f5(slab) [ 73.944204] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 73.951943] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.959684] page dumped because: kasan: bad access detected [ 73.965257] [ 73.966754] Memory state around the buggy address: [ 73.971548] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.978767] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 73.985985] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.993205] ^ [ 73.997999] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.005227] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.012444] ================================================================== [ 53.880499] ================================================================== [ 53.887748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 53.895056] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 53.902455] [ 53.903957] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 53.903965] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 53.903968] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 53.903971] Call Trace: [ 53.903973] <TASK> [ 53.903975] dump_stack_lvl+0x73/0xb0 [ 53.903979] print_report+0xd1/0x650 [ 53.903983] ? __virt_addr_valid+0x1db/0x2d0 [ 53.903988] ? kasan_atomics_helper+0x5fe/0x5450 [ 53.903991] ? kasan_complete_mode_report_info+0x2a/0x200 [ 53.903997] ? kasan_atomics_helper+0x5fe/0x5450 [ 53.904001] kasan_report+0x141/0x180 [ 53.904005] ? kasan_atomics_helper+0x5fe/0x5450 [ 53.904010] kasan_check_range+0x10c/0x1c0 [ 53.904015] __kasan_check_write+0x18/0x20 [ 53.904018] kasan_atomics_helper+0x5fe/0x5450 [ 53.904022] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 53.904026] ? __kmalloc_cache_noprof+0x189/0x420 [ 53.904031] ? kasan_atomics+0x152/0x310 [ 53.904037] kasan_atomics+0x1dc/0x310 [ 53.904041] ? __pfx_kasan_atomics+0x10/0x10 [ 53.904046] ? ktime_get_ts64+0x83/0x230 [ 53.904050] kunit_try_run_case+0x1a2/0x480 [ 53.904055] ? __pfx_kunit_try_run_case+0x10/0x10 [ 53.904060] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 53.904064] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 53.904069] ? __kthread_parkme+0x82/0x180 [ 53.904072] ? preempt_count_sub+0x50/0x80 [ 53.904077] ? __pfx_kunit_try_run_case+0x10/0x10 [ 53.904082] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 53.904086] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 53.904090] kthread+0x334/0x6f0 [ 53.904094] ? trace_preempt_on+0x20/0xc0 [ 53.904098] ? __pfx_kthread+0x10/0x10 [ 53.904102] ? _raw_spin_unlock_irq+0x47/0x80 [ 53.904106] ? calculate_sigpending+0x7b/0xa0 [ 53.904111] ? __pfx_kthread+0x10/0x10 [ 53.904115] ret_from_fork+0x113/0x1d0 [ 53.904119] ? __pfx_kthread+0x10/0x10 [ 53.904123] ret_from_fork_asm+0x1a/0x30 [ 53.904129] </TASK> [ 53.904130] [ 54.086776] Allocated by task 306: [ 54.090185] kasan_save_stack+0x45/0x70 [ 54.094022] kasan_save_track+0x18/0x40 [ 54.097862] kasan_save_alloc_info+0x3b/0x50 [ 54.102144] __kasan_kmalloc+0xb7/0xc0 [ 54.105896] __kmalloc_cache_noprof+0x189/0x420 [ 54.110428] kasan_atomics+0x95/0x310 [ 54.114094] kunit_try_run_case+0x1a2/0x480 [ 54.118281] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 54.123681] kthread+0x334/0x6f0 [ 54.126920] ret_from_fork+0x113/0x1d0 [ 54.130673] ret_from_fork_asm+0x1a/0x30 [ 54.134600] [ 54.136100] The buggy address belongs to the object at ffff8881066eaf00 [ 54.136100] which belongs to the cache kmalloc-64 of size 64 [ 54.148440] The buggy address is located 0 bytes to the right of [ 54.148440] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 54.161302] [ 54.162801] The buggy address belongs to the physical page: [ 54.168416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 54.176417] flags: 0x200000000000000(node=0|zone=2) [ 54.181295] page_type: f5(slab) [ 54.184444] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 54.192191] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.199937] page dumped because: kasan: bad access detected [ 54.205509] [ 54.207010] Memory state around the buggy address: [ 54.211802] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.219020] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 54.226242] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.233469] ^ [ 54.238262] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.245481] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 54.252700] ================================================================== [ 67.526210] ================================================================== [ 67.533457] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 67.540848] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 67.548243] [ 67.549742] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 67.549750] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 67.549752] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 67.549756] Call Trace: [ 67.549757] <TASK> [ 67.549759] dump_stack_lvl+0x73/0xb0 [ 67.549764] print_report+0xd1/0x650 [ 67.549768] ? __virt_addr_valid+0x1db/0x2d0 [ 67.549772] ? kasan_atomics_helper+0x18b1/0x5450 [ 67.549776] ? kasan_complete_mode_report_info+0x2a/0x200 [ 67.549781] ? kasan_atomics_helper+0x18b1/0x5450 [ 67.549785] kasan_report+0x141/0x180 [ 67.549789] ? kasan_atomics_helper+0x18b1/0x5450 [ 67.549794] kasan_check_range+0x10c/0x1c0 [ 67.549799] __kasan_check_write+0x18/0x20 [ 67.549802] kasan_atomics_helper+0x18b1/0x5450 [ 67.549807] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 67.549811] ? __kmalloc_cache_noprof+0x189/0x420 [ 67.549816] ? kasan_atomics+0x152/0x310 [ 67.549821] kasan_atomics+0x1dc/0x310 [ 67.549825] ? __pfx_kasan_atomics+0x10/0x10 [ 67.549830] ? ktime_get_ts64+0x83/0x230 [ 67.549835] kunit_try_run_case+0x1a2/0x480 [ 67.549839] ? __pfx_kunit_try_run_case+0x10/0x10 [ 67.549844] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 67.549848] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 67.549853] ? __kthread_parkme+0x82/0x180 [ 67.549856] ? preempt_count_sub+0x50/0x80 [ 67.549861] ? __pfx_kunit_try_run_case+0x10/0x10 [ 67.549865] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 67.549870] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 67.549874] kthread+0x334/0x6f0 [ 67.549878] ? trace_preempt_on+0x20/0xc0 [ 67.549882] ? __pfx_kthread+0x10/0x10 [ 67.549886] ? _raw_spin_unlock_irq+0x47/0x80 [ 67.549890] ? calculate_sigpending+0x7b/0xa0 [ 67.549895] ? __pfx_kthread+0x10/0x10 [ 67.549899] ret_from_fork+0x113/0x1d0 [ 67.549902] ? __pfx_kthread+0x10/0x10 [ 67.549906] ret_from_fork_asm+0x1a/0x30 [ 67.549912] </TASK> [ 67.549914] [ 67.733067] Allocated by task 306: [ 67.736473] kasan_save_stack+0x45/0x70 [ 67.740312] kasan_save_track+0x18/0x40 [ 67.744150] kasan_save_alloc_info+0x3b/0x50 [ 67.748422] __kasan_kmalloc+0xb7/0xc0 [ 67.752175] __kmalloc_cache_noprof+0x189/0x420 [ 67.756710] kasan_atomics+0x95/0x310 [ 67.760416] kunit_try_run_case+0x1a2/0x480 [ 67.764604] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 67.770003] kthread+0x334/0x6f0 [ 67.773235] ret_from_fork+0x113/0x1d0 [ 67.776989] ret_from_fork_asm+0x1a/0x30 [ 67.780915] [ 67.782420] The buggy address belongs to the object at ffff8881066eaf00 [ 67.782420] which belongs to the cache kmalloc-64 of size 64 [ 67.794756] The buggy address is located 0 bytes to the right of [ 67.794756] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 67.807618] [ 67.809116] The buggy address belongs to the physical page: [ 67.814688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 67.822688] flags: 0x200000000000000(node=0|zone=2) [ 67.827568] page_type: f5(slab) [ 67.830714] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 67.838453] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.846192] page dumped because: kasan: bad access detected [ 67.851764] [ 67.853264] Memory state around the buggy address: [ 67.858058] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.865285] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 67.872503] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 67.879723] ^ [ 67.884516] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.891734] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 67.898955] ================================================================== [ 72.505949] ================================================================== [ 72.513187] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 72.520581] Read of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 72.527896] [ 72.529423] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 72.529431] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 72.529434] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 72.529437] Call Trace: [ 72.529439] <TASK> [ 72.529441] dump_stack_lvl+0x73/0xb0 [ 72.529445] print_report+0xd1/0x650 [ 72.529450] ? __virt_addr_valid+0x1db/0x2d0 [ 72.529454] ? kasan_atomics_helper+0x4f71/0x5450 [ 72.529458] ? kasan_complete_mode_report_info+0x2a/0x200 [ 72.529463] ? kasan_atomics_helper+0x4f71/0x5450 [ 72.529467] kasan_report+0x141/0x180 [ 72.529471] ? kasan_atomics_helper+0x4f71/0x5450 [ 72.529476] __asan_report_load8_noabort+0x18/0x20 [ 72.529481] kasan_atomics_helper+0x4f71/0x5450 [ 72.529485] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 72.529489] ? __kmalloc_cache_noprof+0x189/0x420 [ 72.529494] ? kasan_atomics+0x152/0x310 [ 72.529499] kasan_atomics+0x1dc/0x310 [ 72.529504] ? __pfx_kasan_atomics+0x10/0x10 [ 72.529509] ? ktime_get_ts64+0x83/0x230 [ 72.529513] kunit_try_run_case+0x1a2/0x480 [ 72.529518] ? __pfx_kunit_try_run_case+0x10/0x10 [ 72.529522] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 72.529527] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 72.529531] ? __kthread_parkme+0x82/0x180 [ 72.529535] ? preempt_count_sub+0x50/0x80 [ 72.529539] ? __pfx_kunit_try_run_case+0x10/0x10 [ 72.529544] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 72.529548] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 72.529552] kthread+0x334/0x6f0 [ 72.529556] ? trace_preempt_on+0x20/0xc0 [ 72.529560] ? __pfx_kthread+0x10/0x10 [ 72.529564] ? _raw_spin_unlock_irq+0x47/0x80 [ 72.529568] ? calculate_sigpending+0x7b/0xa0 [ 72.529573] ? __pfx_kthread+0x10/0x10 [ 72.529577] ret_from_fork+0x113/0x1d0 [ 72.529580] ? __pfx_kthread+0x10/0x10 [ 72.529584] ret_from_fork_asm+0x1a/0x30 [ 72.529590] </TASK> [ 72.529592] [ 72.709350] Allocated by task 306: [ 72.712808] kasan_save_stack+0x45/0x70 [ 72.716645] kasan_save_track+0x18/0x40 [ 72.720486] kasan_save_alloc_info+0x3b/0x50 [ 72.724766] __kasan_kmalloc+0xb7/0xc0 [ 72.728518] __kmalloc_cache_noprof+0x189/0x420 [ 72.733051] kasan_atomics+0x95/0x310 [ 72.736718] kunit_try_run_case+0x1a2/0x480 [ 72.740912] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 72.746312] kthread+0x334/0x6f0 [ 72.749577] ret_from_fork+0x113/0x1d0 [ 72.753362] ret_from_fork_asm+0x1a/0x30 [ 72.757364] [ 72.758896] The buggy address belongs to the object at ffff8881066eaf00 [ 72.758896] which belongs to the cache kmalloc-64 of size 64 [ 72.771238] The buggy address is located 0 bytes to the right of [ 72.771238] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 72.784106] [ 72.785606] The buggy address belongs to the physical page: [ 72.791177] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 72.799177] flags: 0x200000000000000(node=0|zone=2) [ 72.804057] page_type: f5(slab) [ 72.807206] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 72.814953] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 72.822701] page dumped because: kasan: bad access detected [ 72.828270] [ 72.829771] Memory state around the buggy address: [ 72.834563] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.841785] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 72.849011] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.856230] ^ [ 72.861023] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.868241] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 72.875461] ================================================================== [ 51.235319] ================================================================== [ 51.242582] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 51.249982] Read of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 51.257289] [ 51.258788] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 51.258796] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 51.258799] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 51.258802] Call Trace: [ 51.258804] <TASK> [ 51.258806] dump_stack_lvl+0x73/0xb0 [ 51.258811] print_report+0xd1/0x650 [ 51.258815] ? __virt_addr_valid+0x1db/0x2d0 [ 51.258819] ? kasan_atomics_helper+0x4b88/0x5450 [ 51.258823] ? kasan_complete_mode_report_info+0x2a/0x200 [ 51.258828] ? kasan_atomics_helper+0x4b88/0x5450 [ 51.258833] kasan_report+0x141/0x180 [ 51.258837] ? kasan_atomics_helper+0x4b88/0x5450 [ 51.258842] __asan_report_load4_noabort+0x18/0x20 [ 51.258847] kasan_atomics_helper+0x4b88/0x5450 [ 51.258851] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 51.258855] ? __kmalloc_cache_noprof+0x189/0x420 [ 51.258860] ? kasan_atomics+0x152/0x310 [ 51.258865] kasan_atomics+0x1dc/0x310 [ 51.258870] ? __pfx_kasan_atomics+0x10/0x10 [ 51.258874] ? ktime_get_ts64+0x83/0x230 [ 51.258879] kunit_try_run_case+0x1a2/0x480 [ 51.258884] ? __pfx_kunit_try_run_case+0x10/0x10 [ 51.258888] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 51.258892] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 51.258897] ? __kthread_parkme+0x82/0x180 [ 51.258901] ? preempt_count_sub+0x50/0x80 [ 51.258905] ? __pfx_kunit_try_run_case+0x10/0x10 [ 51.258910] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 51.258914] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 51.258918] kthread+0x334/0x6f0 [ 51.258922] ? trace_preempt_on+0x20/0xc0 [ 51.258926] ? __pfx_kthread+0x10/0x10 [ 51.258930] ? _raw_spin_unlock_irq+0x47/0x80 [ 51.258934] ? calculate_sigpending+0x7b/0xa0 [ 51.258939] ? __pfx_kthread+0x10/0x10 [ 51.258943] ret_from_fork+0x113/0x1d0 [ 51.258947] ? __pfx_kthread+0x10/0x10 [ 51.258951] ret_from_fork_asm+0x1a/0x30 [ 51.258956] </TASK> [ 51.258958] [ 51.438767] Allocated by task 306: [ 51.442174] kasan_save_stack+0x45/0x70 [ 51.446013] kasan_save_track+0x18/0x40 [ 51.449853] kasan_save_alloc_info+0x3b/0x50 [ 51.454132] __kasan_kmalloc+0xb7/0xc0 [ 51.457887] __kmalloc_cache_noprof+0x189/0x420 [ 51.462428] kasan_atomics+0x95/0x310 [ 51.466103] kunit_try_run_case+0x1a2/0x480 [ 51.470287] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 51.475687] kthread+0x334/0x6f0 [ 51.478921] ret_from_fork+0x113/0x1d0 [ 51.482671] ret_from_fork_asm+0x1a/0x30 [ 51.486598] [ 51.488098] The buggy address belongs to the object at ffff8881066eaf00 [ 51.488098] which belongs to the cache kmalloc-64 of size 64 [ 51.500439] The buggy address is located 0 bytes to the right of [ 51.500439] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 51.513309] [ 51.514808] The buggy address belongs to the physical page: [ 51.520421] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 51.528425] flags: 0x200000000000000(node=0|zone=2) [ 51.533312] page_type: f5(slab) [ 51.536494] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 51.544241] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.551987] page dumped because: kasan: bad access detected [ 51.557561] [ 51.559061] Memory state around the buggy address: [ 51.563853] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.571072] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 51.578293] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.585519] ^ [ 51.590313] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.597568] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 51.604793] ================================================================== [ 66.386200] ================================================================== [ 66.393441] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 66.400841] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 66.408243] [ 66.409743] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 66.409751] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 66.409754] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 66.409758] Call Trace: [ 66.409759] <TASK> [ 66.409761] dump_stack_lvl+0x73/0xb0 [ 66.409766] print_report+0xd1/0x650 [ 66.409770] ? __virt_addr_valid+0x1db/0x2d0 [ 66.409774] ? kasan_atomics_helper+0x16e7/0x5450 [ 66.409778] ? kasan_complete_mode_report_info+0x2a/0x200 [ 66.409783] ? kasan_atomics_helper+0x16e7/0x5450 [ 66.409787] kasan_report+0x141/0x180 [ 66.409792] ? kasan_atomics_helper+0x16e7/0x5450 [ 66.409796] kasan_check_range+0x10c/0x1c0 [ 66.409801] __kasan_check_write+0x18/0x20 [ 66.409805] kasan_atomics_helper+0x16e7/0x5450 [ 66.409809] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 66.409813] ? __kmalloc_cache_noprof+0x189/0x420 [ 66.409818] ? kasan_atomics+0x152/0x310 [ 66.409823] kasan_atomics+0x1dc/0x310 [ 66.409827] ? __pfx_kasan_atomics+0x10/0x10 [ 66.409832] ? ktime_get_ts64+0x83/0x230 [ 66.409837] kunit_try_run_case+0x1a2/0x480 [ 66.409842] ? __pfx_kunit_try_run_case+0x10/0x10 [ 66.409846] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 66.409850] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 66.409855] ? __kthread_parkme+0x82/0x180 [ 66.409859] ? preempt_count_sub+0x50/0x80 [ 66.409863] ? __pfx_kunit_try_run_case+0x10/0x10 [ 66.409868] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 66.409872] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 66.409877] kthread+0x334/0x6f0 [ 66.409880] ? trace_preempt_on+0x20/0xc0 [ 66.409885] ? __pfx_kthread+0x10/0x10 [ 66.409889] ? _raw_spin_unlock_irq+0x47/0x80 [ 66.409893] ? calculate_sigpending+0x7b/0xa0 [ 66.409897] ? __pfx_kthread+0x10/0x10 [ 66.409902] ret_from_fork+0x113/0x1d0 [ 66.409905] ? __pfx_kthread+0x10/0x10 [ 66.409909] ret_from_fork_asm+0x1a/0x30 [ 66.409915] </TASK> [ 66.409917] [ 66.593041] Allocated by task 306: [ 66.596447] kasan_save_stack+0x45/0x70 [ 66.600286] kasan_save_track+0x18/0x40 [ 66.604125] kasan_save_alloc_info+0x3b/0x50 [ 66.608421] __kasan_kmalloc+0xb7/0xc0 [ 66.612177] __kmalloc_cache_noprof+0x189/0x420 [ 66.616718] kasan_atomics+0x95/0x310 [ 66.620418] kunit_try_run_case+0x1a2/0x480 [ 66.624604] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 66.630005] kthread+0x334/0x6f0 [ 66.633236] ret_from_fork+0x113/0x1d0 [ 66.636991] ret_from_fork_asm+0x1a/0x30 [ 66.640924] [ 66.642423] The buggy address belongs to the object at ffff8881066eaf00 [ 66.642423] which belongs to the cache kmalloc-64 of size 64 [ 66.654764] The buggy address is located 0 bytes to the right of [ 66.654764] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 66.667627] [ 66.669125] The buggy address belongs to the physical page: [ 66.674699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 66.682707] flags: 0x200000000000000(node=0|zone=2) [ 66.687594] page_type: f5(slab) [ 66.690741] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 66.698490] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.706237] page dumped because: kasan: bad access detected [ 66.711809] [ 66.713306] Memory state around the buggy address: [ 66.718101] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.725321] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 66.732574] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 66.739792] ^ [ 66.744586] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.751806] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.759023] ================================================================== [ 68.666243] ================================================================== [ 68.673481] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 68.680876] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 68.688275] [ 68.689776] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 68.689784] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 68.689786] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 68.689790] Call Trace: [ 68.689792] <TASK> [ 68.689793] dump_stack_lvl+0x73/0xb0 [ 68.689798] print_report+0xd1/0x650 [ 68.689802] ? __virt_addr_valid+0x1db/0x2d0 [ 68.689806] ? kasan_atomics_helper+0x1a7f/0x5450 [ 68.689810] ? kasan_complete_mode_report_info+0x2a/0x200 [ 68.689815] ? kasan_atomics_helper+0x1a7f/0x5450 [ 68.689819] kasan_report+0x141/0x180 [ 68.689824] ? kasan_atomics_helper+0x1a7f/0x5450 [ 68.689829] kasan_check_range+0x10c/0x1c0 [ 68.689833] __kasan_check_write+0x18/0x20 [ 68.689837] kasan_atomics_helper+0x1a7f/0x5450 [ 68.689841] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 68.689845] ? __kmalloc_cache_noprof+0x189/0x420 [ 68.689850] ? kasan_atomics+0x152/0x310 [ 68.689855] kasan_atomics+0x1dc/0x310 [ 68.689859] ? __pfx_kasan_atomics+0x10/0x10 [ 68.689864] ? ktime_get_ts64+0x83/0x230 [ 68.689869] kunit_try_run_case+0x1a2/0x480 [ 68.689873] ? __pfx_kunit_try_run_case+0x10/0x10 [ 68.689878] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 68.689882] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 68.689887] ? __kthread_parkme+0x82/0x180 [ 68.689891] ? preempt_count_sub+0x50/0x80 [ 68.689895] ? __pfx_kunit_try_run_case+0x10/0x10 [ 68.689899] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 68.689904] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 68.689908] kthread+0x334/0x6f0 [ 68.689912] ? trace_preempt_on+0x20/0xc0 [ 68.689916] ? __pfx_kthread+0x10/0x10 [ 68.689920] ? _raw_spin_unlock_irq+0x47/0x80 [ 68.689924] ? calculate_sigpending+0x7b/0xa0 [ 68.689929] ? __pfx_kthread+0x10/0x10 [ 68.689933] ret_from_fork+0x113/0x1d0 [ 68.689936] ? __pfx_kthread+0x10/0x10 [ 68.689940] ret_from_fork_asm+0x1a/0x30 [ 68.689946] </TASK> [ 68.689948] [ 68.873100] Allocated by task 306: [ 68.876508] kasan_save_stack+0x45/0x70 [ 68.880377] kasan_save_track+0x18/0x40 [ 68.884246] kasan_save_alloc_info+0x3b/0x50 [ 68.888527] __kasan_kmalloc+0xb7/0xc0 [ 68.892279] __kmalloc_cache_noprof+0x189/0x420 [ 68.896812] kasan_atomics+0x95/0x310 [ 68.900479] kunit_try_run_case+0x1a2/0x480 [ 68.904674] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 68.910080] kthread+0x334/0x6f0 [ 68.913313] ret_from_fork+0x113/0x1d0 [ 68.917102] ret_from_fork_asm+0x1a/0x30 [ 68.921034] [ 68.922536] The buggy address belongs to the object at ffff8881066eaf00 [ 68.922536] which belongs to the cache kmalloc-64 of size 64 [ 68.934877] The buggy address is located 0 bytes to the right of [ 68.934877] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 68.947737] [ 68.949237] The buggy address belongs to the physical page: [ 68.954808] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 68.962808] flags: 0x200000000000000(node=0|zone=2) [ 68.967687] page_type: f5(slab) [ 68.970836] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 68.978582] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.986323] page dumped because: kasan: bad access detected [ 68.991945] [ 68.993445] Memory state around the buggy address: [ 68.998238] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.005457] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 69.012678] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.019896] ^ [ 69.024690] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.031915] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 69.039135] ================================================================== [ 60.706682] ================================================================== [ 60.713922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 60.721316] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 60.728741] [ 60.730241] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 60.730249] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 60.730251] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 60.730255] Call Trace: [ 60.730257] <TASK> [ 60.730258] dump_stack_lvl+0x73/0xb0 [ 60.730263] print_report+0xd1/0x650 [ 60.730267] ? __virt_addr_valid+0x1db/0x2d0 [ 60.730271] ? kasan_atomics_helper+0x1079/0x5450 [ 60.730275] ? kasan_complete_mode_report_info+0x2a/0x200 [ 60.730281] ? kasan_atomics_helper+0x1079/0x5450 [ 60.730285] kasan_report+0x141/0x180 [ 60.730289] ? kasan_atomics_helper+0x1079/0x5450 [ 60.730294] kasan_check_range+0x10c/0x1c0 [ 60.730298] __kasan_check_write+0x18/0x20 [ 60.730302] kasan_atomics_helper+0x1079/0x5450 [ 60.730306] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 60.730310] ? __kmalloc_cache_noprof+0x189/0x420 [ 60.730315] ? kasan_atomics+0x152/0x310 [ 60.730321] kasan_atomics+0x1dc/0x310 [ 60.730325] ? __pfx_kasan_atomics+0x10/0x10 [ 60.730350] ? ktime_get_ts64+0x83/0x230 [ 60.730354] kunit_try_run_case+0x1a2/0x480 [ 60.730359] ? __pfx_kunit_try_run_case+0x10/0x10 [ 60.730364] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 60.730381] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 60.730386] ? __kthread_parkme+0x82/0x180 [ 60.730402] ? preempt_count_sub+0x50/0x80 [ 60.730407] ? __pfx_kunit_try_run_case+0x10/0x10 [ 60.730411] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 60.730416] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 60.730420] kthread+0x334/0x6f0 [ 60.730424] ? trace_preempt_on+0x20/0xc0 [ 60.730428] ? __pfx_kthread+0x10/0x10 [ 60.730432] ? _raw_spin_unlock_irq+0x47/0x80 [ 60.730436] ? calculate_sigpending+0x7b/0xa0 [ 60.730441] ? __pfx_kthread+0x10/0x10 [ 60.730445] ret_from_fork+0x113/0x1d0 [ 60.730448] ? __pfx_kthread+0x10/0x10 [ 60.730452] ret_from_fork_asm+0x1a/0x30 [ 60.730458] </TASK> [ 60.730460] [ 60.913505] Allocated by task 306: [ 60.916910] kasan_save_stack+0x45/0x70 [ 60.920751] kasan_save_track+0x18/0x40 [ 60.924591] kasan_save_alloc_info+0x3b/0x50 [ 60.928870] __kasan_kmalloc+0xb7/0xc0 [ 60.932625] __kmalloc_cache_noprof+0x189/0x420 [ 60.937166] kasan_atomics+0x95/0x310 [ 60.940840] kunit_try_run_case+0x1a2/0x480 [ 60.945025] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 60.950426] kthread+0x334/0x6f0 [ 60.953658] ret_from_fork+0x113/0x1d0 [ 60.957425] ret_from_fork_asm+0x1a/0x30 [ 60.961363] [ 60.962905] The buggy address belongs to the object at ffff8881066eaf00 [ 60.962905] which belongs to the cache kmalloc-64 of size 64 [ 60.975246] The buggy address is located 0 bytes to the right of [ 60.975246] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 60.988108] [ 60.989608] The buggy address belongs to the physical page: [ 60.995180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 61.003179] flags: 0x200000000000000(node=0|zone=2) [ 61.008060] page_type: f5(slab) [ 61.011204] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 61.018944] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.026684] page dumped because: kasan: bad access detected [ 61.032255] [ 61.033755] Memory state around the buggy address: [ 61.038550] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.045777] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 61.053004] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.060224] ^ [ 61.065014] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.072236] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 61.079454] ================================================================== [ 70.942940] ================================================================== [ 70.950179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 70.957572] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 70.964974] [ 70.966474] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 70.966482] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 70.966485] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 70.966488] Call Trace: [ 70.966490] <TASK> [ 70.966492] dump_stack_lvl+0x73/0xb0 [ 70.966496] print_report+0xd1/0x650 [ 70.966500] ? __virt_addr_valid+0x1db/0x2d0 [ 70.966504] ? kasan_atomics_helper+0x1e12/0x5450 [ 70.966508] ? kasan_complete_mode_report_info+0x2a/0x200 [ 70.966514] ? kasan_atomics_helper+0x1e12/0x5450 [ 70.966518] kasan_report+0x141/0x180 [ 70.966522] ? kasan_atomics_helper+0x1e12/0x5450 [ 70.966527] kasan_check_range+0x10c/0x1c0 [ 70.966531] __kasan_check_write+0x18/0x20 [ 70.966535] kasan_atomics_helper+0x1e12/0x5450 [ 70.966539] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 70.966543] ? __kmalloc_cache_noprof+0x189/0x420 [ 70.966548] ? kasan_atomics+0x152/0x310 [ 70.966553] kasan_atomics+0x1dc/0x310 [ 70.966558] ? __pfx_kasan_atomics+0x10/0x10 [ 70.966563] ? ktime_get_ts64+0x83/0x230 [ 70.966567] kunit_try_run_case+0x1a2/0x480 [ 70.966572] ? __pfx_kunit_try_run_case+0x10/0x10 [ 70.966576] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 70.966581] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 70.966585] ? __kthread_parkme+0x82/0x180 [ 70.966589] ? preempt_count_sub+0x50/0x80 [ 70.966593] ? __pfx_kunit_try_run_case+0x10/0x10 [ 70.966598] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 70.966602] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 70.966606] kthread+0x334/0x6f0 [ 70.966610] ? trace_preempt_on+0x20/0xc0 [ 70.966614] ? __pfx_kthread+0x10/0x10 [ 70.966618] ? _raw_spin_unlock_irq+0x47/0x80 [ 70.966622] ? calculate_sigpending+0x7b/0xa0 [ 70.966627] ? __pfx_kthread+0x10/0x10 [ 70.966631] ret_from_fork+0x113/0x1d0 [ 70.966634] ? __pfx_kthread+0x10/0x10 [ 70.966638] ret_from_fork_asm+0x1a/0x30 [ 70.966644] </TASK> [ 70.966646] [ 71.149763] Allocated by task 306: [ 71.153168] kasan_save_stack+0x45/0x70 [ 71.157007] kasan_save_track+0x18/0x40 [ 71.160848] kasan_save_alloc_info+0x3b/0x50 [ 71.165129] __kasan_kmalloc+0xb7/0xc0 [ 71.168880] __kmalloc_cache_noprof+0x189/0x420 [ 71.173421] kasan_atomics+0x95/0x310 [ 71.177089] kunit_try_run_case+0x1a2/0x480 [ 71.181284] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 71.186681] kthread+0x334/0x6f0 [ 71.189916] ret_from_fork+0x113/0x1d0 [ 71.193669] ret_from_fork_asm+0x1a/0x30 [ 71.197602] [ 71.199101] The buggy address belongs to the object at ffff8881066eaf00 [ 71.199101] which belongs to the cache kmalloc-64 of size 64 [ 71.211436] The buggy address is located 0 bytes to the right of [ 71.211436] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 71.224297] [ 71.225796] The buggy address belongs to the physical page: [ 71.231379] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 71.239431] flags: 0x200000000000000(node=0|zone=2) [ 71.244317] page_type: f5(slab) [ 71.247496] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 71.255237] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 71.262984] page dumped because: kasan: bad access detected [ 71.268558] [ 71.270056] Memory state around the buggy address: [ 71.274847] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.282067] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 71.289289] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 71.296514] ^ [ 71.301309] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.308536] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 71.315753] ================================================================== [ 63.356478] ================================================================== [ 63.363717] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 63.371109] Read of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 63.378423] [ 63.379924] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 63.379932] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 63.379935] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 63.379938] Call Trace: [ 63.379940] <TASK> [ 63.379942] dump_stack_lvl+0x73/0xb0 [ 63.379946] print_report+0xd1/0x650 [ 63.379950] ? __virt_addr_valid+0x1db/0x2d0 [ 63.379955] ? kasan_atomics_helper+0x49ce/0x5450 [ 63.379958] ? kasan_complete_mode_report_info+0x2a/0x200 [ 63.379964] ? kasan_atomics_helper+0x49ce/0x5450 [ 63.379968] kasan_report+0x141/0x180 [ 63.379972] ? kasan_atomics_helper+0x49ce/0x5450 [ 63.379977] __asan_report_load4_noabort+0x18/0x20 [ 63.379982] kasan_atomics_helper+0x49ce/0x5450 [ 63.379986] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 63.379990] ? __kmalloc_cache_noprof+0x189/0x420 [ 63.379995] ? kasan_atomics+0x152/0x310 [ 63.380000] kasan_atomics+0x1dc/0x310 [ 63.380005] ? __pfx_kasan_atomics+0x10/0x10 [ 63.380010] ? ktime_get_ts64+0x83/0x230 [ 63.380014] kunit_try_run_case+0x1a2/0x480 [ 63.380019] ? __pfx_kunit_try_run_case+0x10/0x10 [ 63.380023] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 63.380027] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 63.380032] ? __kthread_parkme+0x82/0x180 [ 63.380036] ? preempt_count_sub+0x50/0x80 [ 63.380040] ? __pfx_kunit_try_run_case+0x10/0x10 [ 63.380045] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 63.380049] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 63.380053] kthread+0x334/0x6f0 [ 63.380057] ? trace_preempt_on+0x20/0xc0 [ 63.380061] ? __pfx_kthread+0x10/0x10 [ 63.380065] ? _raw_spin_unlock_irq+0x47/0x80 [ 63.380069] ? calculate_sigpending+0x7b/0xa0 [ 63.380074] ? __pfx_kthread+0x10/0x10 [ 63.380078] ret_from_fork+0x113/0x1d0 [ 63.380081] ? __pfx_kthread+0x10/0x10 [ 63.380085] ret_from_fork_asm+0x1a/0x30 [ 63.380091] </TASK> [ 63.380093] [ 63.559772] Allocated by task 306: [ 63.563178] kasan_save_stack+0x45/0x70 [ 63.567018] kasan_save_track+0x18/0x40 [ 63.570857] kasan_save_alloc_info+0x3b/0x50 [ 63.575129] __kasan_kmalloc+0xb7/0xc0 [ 63.578883] __kmalloc_cache_noprof+0x189/0x420 [ 63.583428] kasan_atomics+0x95/0x310 [ 63.587099] kunit_try_run_case+0x1a2/0x480 [ 63.591286] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 63.596692] kthread+0x334/0x6f0 [ 63.599925] ret_from_fork+0x113/0x1d0 [ 63.603678] ret_from_fork_asm+0x1a/0x30 [ 63.607605] [ 63.609104] The buggy address belongs to the object at ffff8881066eaf00 [ 63.609104] which belongs to the cache kmalloc-64 of size 64 [ 63.621447] The buggy address is located 0 bytes to the right of [ 63.621447] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 63.634315] [ 63.635848] The buggy address belongs to the physical page: [ 63.641426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 63.649429] flags: 0x200000000000000(node=0|zone=2) [ 63.654310] page_type: f5(slab) [ 63.657456] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 63.665195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.672935] page dumped because: kasan: bad access detected [ 63.678508] [ 63.680007] Memory state around the buggy address: [ 63.684800] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.692027] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 63.699246] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.706465] ^ [ 63.711259] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.718485] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.725706] ================================================================== [ 74.019671] ================================================================== [ 74.026908] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 74.034301] Read of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 74.041610] [ 74.043108] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 74.043115] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 74.043118] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 74.043122] Call Trace: [ 74.043124] <TASK> [ 74.043126] dump_stack_lvl+0x73/0xb0 [ 74.043130] print_report+0xd1/0x650 [ 74.043134] ? __virt_addr_valid+0x1db/0x2d0 [ 74.043138] ? kasan_atomics_helper+0x4fb2/0x5450 [ 74.043142] ? kasan_complete_mode_report_info+0x2a/0x200 [ 74.043148] ? kasan_atomics_helper+0x4fb2/0x5450 [ 74.043152] kasan_report+0x141/0x180 [ 74.043156] ? kasan_atomics_helper+0x4fb2/0x5450 [ 74.043161] __asan_report_load8_noabort+0x18/0x20 [ 74.043166] kasan_atomics_helper+0x4fb2/0x5450 [ 74.043170] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 74.043174] ? __kmalloc_cache_noprof+0x189/0x420 [ 74.043179] ? kasan_atomics+0x152/0x310 [ 74.043184] kasan_atomics+0x1dc/0x310 [ 74.043189] ? __pfx_kasan_atomics+0x10/0x10 [ 74.043194] ? ktime_get_ts64+0x83/0x230 [ 74.043198] kunit_try_run_case+0x1a2/0x480 [ 74.043203] ? __pfx_kunit_try_run_case+0x10/0x10 [ 74.043207] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 74.043212] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 74.043216] ? __kthread_parkme+0x82/0x180 [ 74.043220] ? preempt_count_sub+0x50/0x80 [ 74.043224] ? __pfx_kunit_try_run_case+0x10/0x10 [ 74.043229] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 74.043233] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 74.043237] kthread+0x334/0x6f0 [ 74.043241] ? trace_preempt_on+0x20/0xc0 [ 74.043245] ? __pfx_kthread+0x10/0x10 [ 74.043249] ? _raw_spin_unlock_irq+0x47/0x80 [ 74.043253] ? calculate_sigpending+0x7b/0xa0 [ 74.043258] ? __pfx_kthread+0x10/0x10 [ 74.043262] ret_from_fork+0x113/0x1d0 [ 74.043265] ? __pfx_kthread+0x10/0x10 [ 74.043269] ret_from_fork_asm+0x1a/0x30 [ 74.043275] </TASK> [ 74.043277] [ 74.222982] Allocated by task 306: [ 74.226416] kasan_save_stack+0x45/0x70 [ 74.230263] kasan_save_track+0x18/0x40 [ 74.234104] kasan_save_alloc_info+0x3b/0x50 [ 74.238416] __kasan_kmalloc+0xb7/0xc0 [ 74.242171] __kmalloc_cache_noprof+0x189/0x420 [ 74.246705] kasan_atomics+0x95/0x310 [ 74.250403] kunit_try_run_case+0x1a2/0x480 [ 74.254598] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 74.259997] kthread+0x334/0x6f0 [ 74.263232] ret_from_fork+0x113/0x1d0 [ 74.266984] ret_from_fork_asm+0x1a/0x30 [ 74.270910] [ 74.272421] The buggy address belongs to the object at ffff8881066eaf00 [ 74.272421] which belongs to the cache kmalloc-64 of size 64 [ 74.284758] The buggy address is located 0 bytes to the right of [ 74.284758] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 74.297620] [ 74.299120] The buggy address belongs to the physical page: [ 74.304694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 74.312701] flags: 0x200000000000000(node=0|zone=2) [ 74.317590] page_type: f5(slab) [ 74.320734] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 74.328475] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 74.336214] page dumped because: kasan: bad access detected [ 74.341786] [ 74.343285] Memory state around the buggy address: [ 74.348077] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.355297] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 74.362518] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.369744] ^ [ 74.374537] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.381758] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.388983] ================================================================== [ 59.570983] ================================================================== [ 59.578229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 59.585536] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 59.592938] [ 59.594436] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 59.594444] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 59.594447] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 59.594450] Call Trace: [ 59.594452] <TASK> [ 59.594454] dump_stack_lvl+0x73/0xb0 [ 59.594458] print_report+0xd1/0x650 [ 59.594462] ? __virt_addr_valid+0x1db/0x2d0 [ 59.594466] ? kasan_atomics_helper+0xf10/0x5450 [ 59.594470] ? kasan_complete_mode_report_info+0x2a/0x200 [ 59.594476] ? kasan_atomics_helper+0xf10/0x5450 [ 59.594480] kasan_report+0x141/0x180 [ 59.594484] ? kasan_atomics_helper+0xf10/0x5450 [ 59.594489] kasan_check_range+0x10c/0x1c0 [ 59.594493] __kasan_check_write+0x18/0x20 [ 59.594497] kasan_atomics_helper+0xf10/0x5450 [ 59.594501] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 59.594505] ? __kmalloc_cache_noprof+0x189/0x420 [ 59.594510] ? kasan_atomics+0x152/0x310 [ 59.594515] kasan_atomics+0x1dc/0x310 [ 59.594520] ? __pfx_kasan_atomics+0x10/0x10 [ 59.594525] ? ktime_get_ts64+0x83/0x230 [ 59.594529] kunit_try_run_case+0x1a2/0x480 [ 59.594534] ? __pfx_kunit_try_run_case+0x10/0x10 [ 59.594538] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 59.594543] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 59.594547] ? __kthread_parkme+0x82/0x180 [ 59.594551] ? preempt_count_sub+0x50/0x80 [ 59.594555] ? __pfx_kunit_try_run_case+0x10/0x10 [ 59.594560] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 59.594564] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 59.594569] kthread+0x334/0x6f0 [ 59.594572] ? trace_preempt_on+0x20/0xc0 [ 59.594577] ? __pfx_kthread+0x10/0x10 [ 59.594581] ? _raw_spin_unlock_irq+0x47/0x80 [ 59.594585] ? calculate_sigpending+0x7b/0xa0 [ 59.594589] ? __pfx_kthread+0x10/0x10 [ 59.594594] ret_from_fork+0x113/0x1d0 [ 59.594597] ? __pfx_kthread+0x10/0x10 [ 59.594601] ret_from_fork_asm+0x1a/0x30 [ 59.594607] </TASK> [ 59.594609] [ 59.777260] Allocated by task 306: [ 59.780664] kasan_save_stack+0x45/0x70 [ 59.784503] kasan_save_track+0x18/0x40 [ 59.788362] kasan_save_alloc_info+0x3b/0x50 [ 59.792685] __kasan_kmalloc+0xb7/0xc0 [ 59.796437] __kmalloc_cache_noprof+0x189/0x420 [ 59.800970] kasan_atomics+0x95/0x310 [ 59.804637] kunit_try_run_case+0x1a2/0x480 [ 59.808833] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 59.814240] kthread+0x334/0x6f0 [ 59.817481] ret_from_fork+0x113/0x1d0 [ 59.821234] ret_from_fork_asm+0x1a/0x30 [ 59.825160] [ 59.826657] The buggy address belongs to the object at ffff8881066eaf00 [ 59.826657] which belongs to the cache kmalloc-64 of size 64 [ 59.838993] The buggy address is located 0 bytes to the right of [ 59.838993] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 59.851852] [ 59.853361] The buggy address belongs to the physical page: [ 59.858985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 59.866994] flags: 0x200000000000000(node=0|zone=2) [ 59.871873] page_type: f5(slab) [ 59.875018] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 59.882757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.890496] page dumped because: kasan: bad access detected [ 59.896068] [ 59.897567] Memory state around the buggy address: [ 59.902363] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.909625] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 59.916844] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.924063] ^ [ 59.928856] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.936074] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 59.943294] ================================================================== [ 55.778231] ================================================================== [ 55.785463] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 55.792770] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 55.800168] [ 55.801669] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 55.801677] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 55.801680] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 55.801683] Call Trace: [ 55.801685] <TASK> [ 55.801687] dump_stack_lvl+0x73/0xb0 [ 55.801691] print_report+0xd1/0x650 [ 55.801695] ? __virt_addr_valid+0x1db/0x2d0 [ 55.801700] ? kasan_atomics_helper+0x8f9/0x5450 [ 55.801703] ? kasan_complete_mode_report_info+0x2a/0x200 [ 55.801709] ? kasan_atomics_helper+0x8f9/0x5450 [ 55.801713] kasan_report+0x141/0x180 [ 55.801717] ? kasan_atomics_helper+0x8f9/0x5450 [ 55.801722] kasan_check_range+0x10c/0x1c0 [ 55.801727] __kasan_check_write+0x18/0x20 [ 55.801730] kasan_atomics_helper+0x8f9/0x5450 [ 55.801734] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 55.801739] ? __kmalloc_cache_noprof+0x189/0x420 [ 55.801744] ? kasan_atomics+0x152/0x310 [ 55.801749] kasan_atomics+0x1dc/0x310 [ 55.801753] ? __pfx_kasan_atomics+0x10/0x10 [ 55.801758] ? ktime_get_ts64+0x83/0x230 [ 55.801762] kunit_try_run_case+0x1a2/0x480 [ 55.801767] ? __pfx_kunit_try_run_case+0x10/0x10 [ 55.801772] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 55.801776] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 55.801780] ? __kthread_parkme+0x82/0x180 [ 55.801784] ? preempt_count_sub+0x50/0x80 [ 55.801788] ? __pfx_kunit_try_run_case+0x10/0x10 [ 55.801793] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 55.801798] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 55.801802] kthread+0x334/0x6f0 [ 55.801806] ? trace_preempt_on+0x20/0xc0 [ 55.801810] ? __pfx_kthread+0x10/0x10 [ 55.801814] ? _raw_spin_unlock_irq+0x47/0x80 [ 55.801818] ? calculate_sigpending+0x7b/0xa0 [ 55.801823] ? __pfx_kthread+0x10/0x10 [ 55.801827] ret_from_fork+0x113/0x1d0 [ 55.801830] ? __pfx_kthread+0x10/0x10 [ 55.801834] ret_from_fork_asm+0x1a/0x30 [ 55.801840] </TASK> [ 55.801842] [ 55.984481] Allocated by task 306: [ 55.987888] kasan_save_stack+0x45/0x70 [ 55.991728] kasan_save_track+0x18/0x40 [ 55.995566] kasan_save_alloc_info+0x3b/0x50 [ 55.999841] __kasan_kmalloc+0xb7/0xc0 [ 56.003592] __kmalloc_cache_noprof+0x189/0x420 [ 56.008124] kasan_atomics+0x95/0x310 [ 56.011791] kunit_try_run_case+0x1a2/0x480 [ 56.015977] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 56.021420] kthread+0x334/0x6f0 [ 56.024654] ret_from_fork+0x113/0x1d0 [ 56.028417] ret_from_fork_asm+0x1a/0x30 [ 56.032365] [ 56.033908] The buggy address belongs to the object at ffff8881066eaf00 [ 56.033908] which belongs to the cache kmalloc-64 of size 64 [ 56.046251] The buggy address is located 0 bytes to the right of [ 56.046251] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 56.059112] [ 56.060610] The buggy address belongs to the physical page: [ 56.066184] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 56.074191] flags: 0x200000000000000(node=0|zone=2) [ 56.079072] page_type: f5(slab) [ 56.082217] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 56.089966] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.097711] page dumped because: kasan: bad access detected [ 56.103283] [ 56.104784] Memory state around the buggy address: [ 56.109576] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.116796] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 56.124017] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.131233] ^ [ 56.136029] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.143246] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 56.150464] ================================================================== [ 66.006221] ================================================================== [ 66.013460] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 66.020854] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 66.028253] [ 66.029754] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 66.029762] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 66.029765] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 66.029769] Call Trace: [ 66.029770] <TASK> [ 66.029772] dump_stack_lvl+0x73/0xb0 [ 66.029777] print_report+0xd1/0x650 [ 66.029781] ? __virt_addr_valid+0x1db/0x2d0 [ 66.029785] ? kasan_atomics_helper+0x164f/0x5450 [ 66.029789] ? kasan_complete_mode_report_info+0x2a/0x200 [ 66.029794] ? kasan_atomics_helper+0x164f/0x5450 [ 66.029798] kasan_report+0x141/0x180 [ 66.029802] ? kasan_atomics_helper+0x164f/0x5450 [ 66.029807] kasan_check_range+0x10c/0x1c0 [ 66.029812] __kasan_check_write+0x18/0x20 [ 66.029816] kasan_atomics_helper+0x164f/0x5450 [ 66.029820] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 66.029824] ? __kmalloc_cache_noprof+0x189/0x420 [ 66.029829] ? kasan_atomics+0x152/0x310 [ 66.029834] kasan_atomics+0x1dc/0x310 [ 66.029839] ? __pfx_kasan_atomics+0x10/0x10 [ 66.029844] ? ktime_get_ts64+0x83/0x230 [ 66.029848] kunit_try_run_case+0x1a2/0x480 [ 66.029853] ? __pfx_kunit_try_run_case+0x10/0x10 [ 66.029857] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 66.029862] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 66.029866] ? __kthread_parkme+0x82/0x180 [ 66.029870] ? preempt_count_sub+0x50/0x80 [ 66.029874] ? __pfx_kunit_try_run_case+0x10/0x10 [ 66.029879] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 66.029884] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 66.029888] kthread+0x334/0x6f0 [ 66.029892] ? trace_preempt_on+0x20/0xc0 [ 66.029896] ? __pfx_kthread+0x10/0x10 [ 66.029900] ? _raw_spin_unlock_irq+0x47/0x80 [ 66.029904] ? calculate_sigpending+0x7b/0xa0 [ 66.029909] ? __pfx_kthread+0x10/0x10 [ 66.029913] ret_from_fork+0x113/0x1d0 [ 66.029916] ? __pfx_kthread+0x10/0x10 [ 66.029920] ret_from_fork_asm+0x1a/0x30 [ 66.029926] </TASK> [ 66.029928] [ 66.213060] Allocated by task 306: [ 66.216467] kasan_save_stack+0x45/0x70 [ 66.220308] kasan_save_track+0x18/0x40 [ 66.224147] kasan_save_alloc_info+0x3b/0x50 [ 66.228428] __kasan_kmalloc+0xb7/0xc0 [ 66.232180] __kmalloc_cache_noprof+0x189/0x420 [ 66.236714] kasan_atomics+0x95/0x310 [ 66.240415] kunit_try_run_case+0x1a2/0x480 [ 66.244607] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 66.250008] kthread+0x334/0x6f0 [ 66.253249] ret_from_fork+0x113/0x1d0 [ 66.257000] ret_from_fork_asm+0x1a/0x30 [ 66.260928] [ 66.262426] The buggy address belongs to the object at ffff8881066eaf00 [ 66.262426] which belongs to the cache kmalloc-64 of size 64 [ 66.274768] The buggy address is located 0 bytes to the right of [ 66.274768] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 66.287630] [ 66.289127] The buggy address belongs to the physical page: [ 66.294702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 66.302708] flags: 0x200000000000000(node=0|zone=2) [ 66.307589] page_type: f5(slab) [ 66.310736] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 66.318482] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.326221] page dumped because: kasan: bad access detected [ 66.331793] [ 66.333292] Memory state around the buggy address: [ 66.338086] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.345306] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 66.352525] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 66.359745] ^ [ 66.364538] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.371757] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.378975] ================================================================== [ 52.744576] ================================================================== [ 52.751822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 52.759129] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 52.766528] [ 52.768029] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 52.768037] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 52.768040] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 52.768043] Call Trace: [ 52.768045] <TASK> [ 52.768047] dump_stack_lvl+0x73/0xb0 [ 52.768052] print_report+0xd1/0x650 [ 52.768056] ? __virt_addr_valid+0x1db/0x2d0 [ 52.768060] ? kasan_atomics_helper+0x4a0/0x5450 [ 52.768064] ? kasan_complete_mode_report_info+0x2a/0x200 [ 52.768069] ? kasan_atomics_helper+0x4a0/0x5450 [ 52.768073] kasan_report+0x141/0x180 [ 52.768078] ? kasan_atomics_helper+0x4a0/0x5450 [ 52.768082] kasan_check_range+0x10c/0x1c0 [ 52.768087] __kasan_check_write+0x18/0x20 [ 52.768091] kasan_atomics_helper+0x4a0/0x5450 [ 52.768095] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 52.768099] ? __kmalloc_cache_noprof+0x189/0x420 [ 52.768104] ? kasan_atomics+0x152/0x310 [ 52.768109] kasan_atomics+0x1dc/0x310 [ 52.768114] ? __pfx_kasan_atomics+0x10/0x10 [ 52.768118] ? ktime_get_ts64+0x83/0x230 [ 52.768123] kunit_try_run_case+0x1a2/0x480 [ 52.768128] ? __pfx_kunit_try_run_case+0x10/0x10 [ 52.768132] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 52.768136] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 52.768141] ? __kthread_parkme+0x82/0x180 [ 52.768145] ? preempt_count_sub+0x50/0x80 [ 52.768149] ? __pfx_kunit_try_run_case+0x10/0x10 [ 52.768153] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 52.768158] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 52.768162] kthread+0x334/0x6f0 [ 52.768166] ? trace_preempt_on+0x20/0xc0 [ 52.768170] ? __pfx_kthread+0x10/0x10 [ 52.768174] ? _raw_spin_unlock_irq+0x47/0x80 [ 52.768178] ? calculate_sigpending+0x7b/0xa0 [ 52.768183] ? __pfx_kthread+0x10/0x10 [ 52.768187] ret_from_fork+0x113/0x1d0 [ 52.768191] ? __pfx_kthread+0x10/0x10 [ 52.768195] ret_from_fork_asm+0x1a/0x30 [ 52.768200] </TASK> [ 52.768202] [ 52.950989] Allocated by task 306: [ 52.954418] kasan_save_stack+0x45/0x70 [ 52.958261] kasan_save_track+0x18/0x40 [ 52.962102] kasan_save_alloc_info+0x3b/0x50 [ 52.966418] __kasan_kmalloc+0xb7/0xc0 [ 52.970169] __kmalloc_cache_noprof+0x189/0x420 [ 52.974709] kasan_atomics+0x95/0x310 [ 52.978418] kunit_try_run_case+0x1a2/0x480 [ 52.982606] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 52.988006] kthread+0x334/0x6f0 [ 52.991238] ret_from_fork+0x113/0x1d0 [ 52.994990] ret_from_fork_asm+0x1a/0x30 [ 52.998917] [ 53.000416] The buggy address belongs to the object at ffff8881066eaf00 [ 53.000416] which belongs to the cache kmalloc-64 of size 64 [ 53.012757] The buggy address is located 0 bytes to the right of [ 53.012757] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 53.025620] [ 53.027117] The buggy address belongs to the physical page: [ 53.032692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 53.040698] flags: 0x200000000000000(node=0|zone=2) [ 53.045577] page_type: f5(slab) [ 53.048726] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 53.056472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.064210] page dumped because: kasan: bad access detected [ 53.069784] [ 53.071283] Memory state around the buggy address: [ 53.076075] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.083294] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 53.090515] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.097741] ^ [ 53.102536] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.109763] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 53.116981] ================================================================== [ 66.766248] ================================================================== [ 66.773487] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 66.780883] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 66.788282] [ 66.789782] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 66.789790] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 66.789793] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 66.789796] Call Trace: [ 66.789798] <TASK> [ 66.789800] dump_stack_lvl+0x73/0xb0 [ 66.789805] print_report+0xd1/0x650 [ 66.789809] ? __virt_addr_valid+0x1db/0x2d0 [ 66.789813] ? kasan_atomics_helper+0x177f/0x5450 [ 66.789817] ? kasan_complete_mode_report_info+0x2a/0x200 [ 66.789822] ? kasan_atomics_helper+0x177f/0x5450 [ 66.789826] kasan_report+0x141/0x180 [ 66.789830] ? kasan_atomics_helper+0x177f/0x5450 [ 66.789835] kasan_check_range+0x10c/0x1c0 [ 66.789840] __kasan_check_write+0x18/0x20 [ 66.789844] kasan_atomics_helper+0x177f/0x5450 [ 66.789848] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 66.789852] ? __kmalloc_cache_noprof+0x189/0x420 [ 66.789857] ? kasan_atomics+0x152/0x310 [ 66.789862] kasan_atomics+0x1dc/0x310 [ 66.789866] ? __pfx_kasan_atomics+0x10/0x10 [ 66.789871] ? ktime_get_ts64+0x83/0x230 [ 66.789876] kunit_try_run_case+0x1a2/0x480 [ 66.789880] ? __pfx_kunit_try_run_case+0x10/0x10 [ 66.789885] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 66.789889] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 66.789894] ? __kthread_parkme+0x82/0x180 [ 66.789897] ? preempt_count_sub+0x50/0x80 [ 66.789902] ? __pfx_kunit_try_run_case+0x10/0x10 [ 66.789906] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 66.789911] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 66.789915] kthread+0x334/0x6f0 [ 66.789919] ? trace_preempt_on+0x20/0xc0 [ 66.789923] ? __pfx_kthread+0x10/0x10 [ 66.789927] ? _raw_spin_unlock_irq+0x47/0x80 [ 66.789931] ? calculate_sigpending+0x7b/0xa0 [ 66.789936] ? __pfx_kthread+0x10/0x10 [ 66.789940] ret_from_fork+0x113/0x1d0 [ 66.789944] ? __pfx_kthread+0x10/0x10 [ 66.789948] ret_from_fork_asm+0x1a/0x30 [ 66.789954] </TASK> [ 66.789955] [ 66.973038] Allocated by task 306: [ 66.976443] kasan_save_stack+0x45/0x70 [ 66.980282] kasan_save_track+0x18/0x40 [ 66.984123] kasan_save_alloc_info+0x3b/0x50 [ 66.988424] __kasan_kmalloc+0xb7/0xc0 [ 66.992183] __kmalloc_cache_noprof+0x189/0x420 [ 66.996723] kasan_atomics+0x95/0x310 [ 67.000418] kunit_try_run_case+0x1a2/0x480 [ 67.004611] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 67.010020] kthread+0x334/0x6f0 [ 67.013261] ret_from_fork+0x113/0x1d0 [ 67.017012] ret_from_fork_asm+0x1a/0x30 [ 67.020939] [ 67.022438] The buggy address belongs to the object at ffff8881066eaf00 [ 67.022438] which belongs to the cache kmalloc-64 of size 64 [ 67.034778] The buggy address is located 0 bytes to the right of [ 67.034778] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 67.047641] [ 67.049141] The buggy address belongs to the physical page: [ 67.054713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 67.062712] flags: 0x200000000000000(node=0|zone=2) [ 67.067592] page_type: f5(slab) [ 67.070739] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 67.078486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.086233] page dumped because: kasan: bad access detected [ 67.091806] [ 67.093303] Memory state around the buggy address: [ 67.098099] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.105325] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 67.112570] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 67.119791] ^ [ 67.124584] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.131812] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 67.139037] ================================================================== [ 70.563039] ================================================================== [ 70.570288] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 70.577689] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 70.585089] [ 70.586590] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 70.586598] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 70.586600] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 70.586604] Call Trace: [ 70.586605] <TASK> [ 70.586607] dump_stack_lvl+0x73/0xb0 [ 70.586612] print_report+0xd1/0x650 [ 70.586616] ? __virt_addr_valid+0x1db/0x2d0 [ 70.586620] ? kasan_atomics_helper+0x1d7a/0x5450 [ 70.586624] ? kasan_complete_mode_report_info+0x2a/0x200 [ 70.586629] ? kasan_atomics_helper+0x1d7a/0x5450 [ 70.586633] kasan_report+0x141/0x180 [ 70.586637] ? kasan_atomics_helper+0x1d7a/0x5450 [ 70.586642] kasan_check_range+0x10c/0x1c0 [ 70.586647] __kasan_check_write+0x18/0x20 [ 70.586650] kasan_atomics_helper+0x1d7a/0x5450 [ 70.586654] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 70.586659] ? __kmalloc_cache_noprof+0x189/0x420 [ 70.586664] ? kasan_atomics+0x152/0x310 [ 70.586669] kasan_atomics+0x1dc/0x310 [ 70.586673] ? __pfx_kasan_atomics+0x10/0x10 [ 70.586678] ? ktime_get_ts64+0x83/0x230 [ 70.586682] kunit_try_run_case+0x1a2/0x480 [ 70.586687] ? __pfx_kunit_try_run_case+0x10/0x10 [ 70.586691] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 70.586696] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 70.586700] ? __kthread_parkme+0x82/0x180 [ 70.586704] ? preempt_count_sub+0x50/0x80 [ 70.586708] ? __pfx_kunit_try_run_case+0x10/0x10 [ 70.586713] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 70.586717] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 70.586722] kthread+0x334/0x6f0 [ 70.586725] ? trace_preempt_on+0x20/0xc0 [ 70.586729] ? __pfx_kthread+0x10/0x10 [ 70.586733] ? _raw_spin_unlock_irq+0x47/0x80 [ 70.586737] ? calculate_sigpending+0x7b/0xa0 [ 70.586742] ? __pfx_kthread+0x10/0x10 [ 70.586746] ret_from_fork+0x113/0x1d0 [ 70.586750] ? __pfx_kthread+0x10/0x10 [ 70.586754] ret_from_fork_asm+0x1a/0x30 [ 70.586760] </TASK> [ 70.586761] [ 70.769764] Allocated by task 306: [ 70.773172] kasan_save_stack+0x45/0x70 [ 70.777011] kasan_save_track+0x18/0x40 [ 70.780852] kasan_save_alloc_info+0x3b/0x50 [ 70.785133] __kasan_kmalloc+0xb7/0xc0 [ 70.788885] __kmalloc_cache_noprof+0x189/0x420 [ 70.793425] kasan_atomics+0x95/0x310 [ 70.797091] kunit_try_run_case+0x1a2/0x480 [ 70.801279] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 70.806686] kthread+0x334/0x6f0 [ 70.809920] ret_from_fork+0x113/0x1d0 [ 70.813672] ret_from_fork_asm+0x1a/0x30 [ 70.817597] [ 70.819096] The buggy address belongs to the object at ffff8881066eaf00 [ 70.819096] which belongs to the cache kmalloc-64 of size 64 [ 70.831437] The buggy address is located 0 bytes to the right of [ 70.831437] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 70.844299] [ 70.845798] The buggy address belongs to the physical page: [ 70.851393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 70.859430] flags: 0x200000000000000(node=0|zone=2) [ 70.864309] page_type: f5(slab) [ 70.867458] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 70.875204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.882944] page dumped because: kasan: bad access detected [ 70.888517] [ 70.890014] Memory state around the buggy address: [ 70.894808] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.902028] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 70.909247] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.916467] ^ [ 70.921259] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.928480] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 70.935707] ================================================================== [ 56.537332] ================================================================== [ 56.544590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 56.551896] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 56.559287] [ 56.560790] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 56.560798] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 56.560800] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 56.560804] Call Trace: [ 56.560805] <TASK> [ 56.560807] dump_stack_lvl+0x73/0xb0 [ 56.560812] print_report+0xd1/0x650 [ 56.560816] ? __virt_addr_valid+0x1db/0x2d0 [ 56.560820] ? kasan_atomics_helper+0xa2b/0x5450 [ 56.560824] ? kasan_complete_mode_report_info+0x2a/0x200 [ 56.560829] ? kasan_atomics_helper+0xa2b/0x5450 [ 56.560833] kasan_report+0x141/0x180 [ 56.560838] ? kasan_atomics_helper+0xa2b/0x5450 [ 56.560843] kasan_check_range+0x10c/0x1c0 [ 56.560847] __kasan_check_write+0x18/0x20 [ 56.560851] kasan_atomics_helper+0xa2b/0x5450 [ 56.560855] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 56.560859] ? __kmalloc_cache_noprof+0x189/0x420 [ 56.560864] ? kasan_atomics+0x152/0x310 [ 56.560870] kasan_atomics+0x1dc/0x310 [ 56.560874] ? __pfx_kasan_atomics+0x10/0x10 [ 56.560879] ? ktime_get_ts64+0x83/0x230 [ 56.560883] kunit_try_run_case+0x1a2/0x480 [ 56.560888] ? __pfx_kunit_try_run_case+0x10/0x10 [ 56.560892] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 56.560897] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 56.560901] ? __kthread_parkme+0x82/0x180 [ 56.560905] ? preempt_count_sub+0x50/0x80 [ 56.560910] ? __pfx_kunit_try_run_case+0x10/0x10 [ 56.560914] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 56.560919] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 56.560923] kthread+0x334/0x6f0 [ 56.560927] ? trace_preempt_on+0x20/0xc0 [ 56.560931] ? __pfx_kthread+0x10/0x10 [ 56.560935] ? _raw_spin_unlock_irq+0x47/0x80 [ 56.560939] ? calculate_sigpending+0x7b/0xa0 [ 56.560944] ? __pfx_kthread+0x10/0x10 [ 56.560948] ret_from_fork+0x113/0x1d0 [ 56.560951] ? __pfx_kthread+0x10/0x10 [ 56.560955] ret_from_fork_asm+0x1a/0x30 [ 56.560961] </TASK> [ 56.560963] [ 56.743773] Allocated by task 306: [ 56.747180] kasan_save_stack+0x45/0x70 [ 56.751020] kasan_save_track+0x18/0x40 [ 56.754861] kasan_save_alloc_info+0x3b/0x50 [ 56.759141] __kasan_kmalloc+0xb7/0xc0 [ 56.762893] __kmalloc_cache_noprof+0x189/0x420 [ 56.767428] kasan_atomics+0x95/0x310 [ 56.771099] kunit_try_run_case+0x1a2/0x480 [ 56.775288] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 56.780694] kthread+0x334/0x6f0 [ 56.783928] ret_from_fork+0x113/0x1d0 [ 56.787679] ret_from_fork_asm+0x1a/0x30 [ 56.791604] [ 56.793105] The buggy address belongs to the object at ffff8881066eaf00 [ 56.793105] which belongs to the cache kmalloc-64 of size 64 [ 56.805445] The buggy address is located 0 bytes to the right of [ 56.805445] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 56.818309] [ 56.819806] The buggy address belongs to the physical page: [ 56.825422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 56.833427] flags: 0x200000000000000(node=0|zone=2) [ 56.838309] page_type: f5(slab) [ 56.841458] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 56.849204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.856943] page dumped because: kasan: bad access detected [ 56.862515] [ 56.864016] Memory state around the buggy address: [ 56.868809] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.876026] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 56.883248] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.890475] ^ [ 56.895267] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.902488] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 56.909714] ================================================================== [ 69.806432] ================================================================== [ 69.813673] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 69.821073] Read of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 69.828423] [ 69.829922] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 69.829930] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 69.829932] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 69.829936] Call Trace: [ 69.829937] <TASK> [ 69.829939] dump_stack_lvl+0x73/0xb0 [ 69.829944] print_report+0xd1/0x650 [ 69.829948] ? __virt_addr_valid+0x1db/0x2d0 [ 69.829952] ? kasan_atomics_helper+0x4f30/0x5450 [ 69.829956] ? kasan_complete_mode_report_info+0x2a/0x200 [ 69.829962] ? kasan_atomics_helper+0x4f30/0x5450 [ 69.829966] kasan_report+0x141/0x180 [ 69.829970] ? kasan_atomics_helper+0x4f30/0x5450 [ 69.829975] __asan_report_load8_noabort+0x18/0x20 [ 69.829980] kasan_atomics_helper+0x4f30/0x5450 [ 69.829984] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 69.829988] ? __kmalloc_cache_noprof+0x189/0x420 [ 69.829993] ? kasan_atomics+0x152/0x310 [ 69.829998] kasan_atomics+0x1dc/0x310 [ 69.830002] ? __pfx_kasan_atomics+0x10/0x10 [ 69.830007] ? ktime_get_ts64+0x83/0x230 [ 69.830012] kunit_try_run_case+0x1a2/0x480 [ 69.830016] ? __pfx_kunit_try_run_case+0x10/0x10 [ 69.830021] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 69.830025] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 69.830030] ? __kthread_parkme+0x82/0x180 [ 69.830033] ? preempt_count_sub+0x50/0x80 [ 69.830038] ? __pfx_kunit_try_run_case+0x10/0x10 [ 69.830042] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 69.830047] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 69.830051] kthread+0x334/0x6f0 [ 69.830055] ? trace_preempt_on+0x20/0xc0 [ 69.830059] ? __pfx_kthread+0x10/0x10 [ 69.830063] ? _raw_spin_unlock_irq+0x47/0x80 [ 69.830067] ? calculate_sigpending+0x7b/0xa0 [ 69.830072] ? __pfx_kthread+0x10/0x10 [ 69.830076] ret_from_fork+0x113/0x1d0 [ 69.830079] ? __pfx_kthread+0x10/0x10 [ 69.830083] ret_from_fork_asm+0x1a/0x30 [ 69.830089] </TASK> [ 69.830091] [ 70.009790] Allocated by task 306: [ 70.013195] kasan_save_stack+0x45/0x70 [ 70.017034] kasan_save_track+0x18/0x40 [ 70.020873] kasan_save_alloc_info+0x3b/0x50 [ 70.025147] __kasan_kmalloc+0xb7/0xc0 [ 70.028900] __kmalloc_cache_noprof+0x189/0x420 [ 70.033442] kasan_atomics+0x95/0x310 [ 70.037114] kunit_try_run_case+0x1a2/0x480 [ 70.041302] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 70.046709] kthread+0x334/0x6f0 [ 70.049941] ret_from_fork+0x113/0x1d0 [ 70.053694] ret_from_fork_asm+0x1a/0x30 [ 70.057622] [ 70.059119] The buggy address belongs to the object at ffff8881066eaf00 [ 70.059119] which belongs to the cache kmalloc-64 of size 64 [ 70.071461] The buggy address is located 0 bytes to the right of [ 70.071461] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 70.084324] [ 70.085848] The buggy address belongs to the physical page: [ 70.091430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 70.099438] flags: 0x200000000000000(node=0|zone=2) [ 70.104317] page_type: f5(slab) [ 70.107497] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 70.115236] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.122977] page dumped because: kasan: bad access detected [ 70.128549] [ 70.130048] Memory state around the buggy address: [ 70.134842] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.142069] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 70.149297] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.156515] ^ [ 70.161307] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.168527] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 70.175745] ================================================================== [ 62.976533] ================================================================== [ 62.983772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 62.991165] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 62.998558] [ 63.000059] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 63.000067] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 63.000070] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 63.000073] Call Trace: [ 63.000075] <TASK> [ 63.000077] dump_stack_lvl+0x73/0xb0 [ 63.000081] print_report+0xd1/0x650 [ 63.000085] ? __virt_addr_valid+0x1db/0x2d0 [ 63.000089] ? kasan_atomics_helper+0x12e6/0x5450 [ 63.000093] ? kasan_complete_mode_report_info+0x2a/0x200 [ 63.000098] ? kasan_atomics_helper+0x12e6/0x5450 [ 63.000102] kasan_report+0x141/0x180 [ 63.000107] ? kasan_atomics_helper+0x12e6/0x5450 [ 63.000111] kasan_check_range+0x10c/0x1c0 [ 63.000116] __kasan_check_write+0x18/0x20 [ 63.000120] kasan_atomics_helper+0x12e6/0x5450 [ 63.000124] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 63.000128] ? __kmalloc_cache_noprof+0x189/0x420 [ 63.000133] ? kasan_atomics+0x152/0x310 [ 63.000138] kasan_atomics+0x1dc/0x310 [ 63.000142] ? __pfx_kasan_atomics+0x10/0x10 [ 63.000147] ? ktime_get_ts64+0x83/0x230 [ 63.000152] kunit_try_run_case+0x1a2/0x480 [ 63.000156] ? __pfx_kunit_try_run_case+0x10/0x10 [ 63.000161] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 63.000165] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 63.000170] ? __kthread_parkme+0x82/0x180 [ 63.000173] ? preempt_count_sub+0x50/0x80 [ 63.000178] ? __pfx_kunit_try_run_case+0x10/0x10 [ 63.000183] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 63.000187] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 63.000191] kthread+0x334/0x6f0 [ 63.000195] ? trace_preempt_on+0x20/0xc0 [ 63.000199] ? __pfx_kthread+0x10/0x10 [ 63.000203] ? _raw_spin_unlock_irq+0x47/0x80 [ 63.000207] ? calculate_sigpending+0x7b/0xa0 [ 63.000212] ? __pfx_kthread+0x10/0x10 [ 63.000216] ret_from_fork+0x113/0x1d0 [ 63.000219] ? __pfx_kthread+0x10/0x10 [ 63.000223] ret_from_fork_asm+0x1a/0x30 [ 63.000229] </TASK> [ 63.000231] [ 63.183287] Allocated by task 306: [ 63.186692] kasan_save_stack+0x45/0x70 [ 63.190533] kasan_save_track+0x18/0x40 [ 63.194415] kasan_save_alloc_info+0x3b/0x50 [ 63.198686] __kasan_kmalloc+0xb7/0xc0 [ 63.202439] __kmalloc_cache_noprof+0x189/0x420 [ 63.206971] kasan_atomics+0x95/0x310 [ 63.210638] kunit_try_run_case+0x1a2/0x480 [ 63.214825] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 63.220223] kthread+0x334/0x6f0 [ 63.223457] ret_from_fork+0x113/0x1d0 [ 63.227209] ret_from_fork_asm+0x1a/0x30 [ 63.231135] [ 63.232633] The buggy address belongs to the object at ffff8881066eaf00 [ 63.232633] which belongs to the cache kmalloc-64 of size 64 [ 63.244966] The buggy address is located 0 bytes to the right of [ 63.244966] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 63.257829] [ 63.259346] The buggy address belongs to the physical page: [ 63.264927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 63.272934] flags: 0x200000000000000(node=0|zone=2) [ 63.277813] page_type: f5(slab) [ 63.280960] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 63.288700] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.296448] page dumped because: kasan: bad access detected [ 63.302021] [ 63.303517] Memory state around the buggy address: [ 63.308311] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.315565] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 63.322784] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.330003] ^ [ 63.334798] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.342024] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.349245] ================================================================== [ 58.055675] ================================================================== [ 58.062921] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 58.070315] Read of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 58.077655] [ 58.079157] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 58.079165] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 58.079167] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 58.079171] Call Trace: [ 58.079173] <TASK> [ 58.079175] dump_stack_lvl+0x73/0xb0 [ 58.079179] print_report+0xd1/0x650 [ 58.079183] ? __virt_addr_valid+0x1db/0x2d0 [ 58.079187] ? kasan_atomics_helper+0x4a84/0x5450 [ 58.079191] ? kasan_complete_mode_report_info+0x2a/0x200 [ 58.079197] ? kasan_atomics_helper+0x4a84/0x5450 [ 58.079201] kasan_report+0x141/0x180 [ 58.079205] ? kasan_atomics_helper+0x4a84/0x5450 [ 58.079210] __asan_report_load4_noabort+0x18/0x20 [ 58.079215] kasan_atomics_helper+0x4a84/0x5450 [ 58.079219] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 58.079223] ? __kmalloc_cache_noprof+0x189/0x420 [ 58.079228] ? kasan_atomics+0x152/0x310 [ 58.079233] kasan_atomics+0x1dc/0x310 [ 58.079238] ? __pfx_kasan_atomics+0x10/0x10 [ 58.079242] ? ktime_get_ts64+0x83/0x230 [ 58.079247] kunit_try_run_case+0x1a2/0x480 [ 58.079252] ? __pfx_kunit_try_run_case+0x10/0x10 [ 58.079256] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 58.079261] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 58.079265] ? __kthread_parkme+0x82/0x180 [ 58.079269] ? preempt_count_sub+0x50/0x80 [ 58.079273] ? __pfx_kunit_try_run_case+0x10/0x10 [ 58.079278] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 58.079282] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 58.079286] kthread+0x334/0x6f0 [ 58.079290] ? trace_preempt_on+0x20/0xc0 [ 58.079294] ? __pfx_kthread+0x10/0x10 [ 58.079298] ? _raw_spin_unlock_irq+0x47/0x80 [ 58.079302] ? calculate_sigpending+0x7b/0xa0 [ 58.079307] ? __pfx_kthread+0x10/0x10 [ 58.079311] ret_from_fork+0x113/0x1d0 [ 58.079315] ? __pfx_kthread+0x10/0x10 [ 58.079319] ret_from_fork_asm+0x1a/0x30 [ 58.079325] </TASK> [ 58.079346] [ 58.259047] Allocated by task 306: [ 58.262453] kasan_save_stack+0x45/0x70 [ 58.266294] kasan_save_track+0x18/0x40 [ 58.270132] kasan_save_alloc_info+0x3b/0x50 [ 58.274422] __kasan_kmalloc+0xb7/0xc0 [ 58.278173] __kmalloc_cache_noprof+0x189/0x420 [ 58.282709] kasan_atomics+0x95/0x310 [ 58.286416] kunit_try_run_case+0x1a2/0x480 [ 58.290603] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 58.296003] kthread+0x334/0x6f0 [ 58.299235] ret_from_fork+0x113/0x1d0 [ 58.302988] ret_from_fork_asm+0x1a/0x30 [ 58.306921] [ 58.308427] The buggy address belongs to the object at ffff8881066eaf00 [ 58.308427] which belongs to the cache kmalloc-64 of size 64 [ 58.320762] The buggy address is located 0 bytes to the right of [ 58.320762] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 58.333624] [ 58.335124] The buggy address belongs to the physical page: [ 58.340697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 58.348703] flags: 0x200000000000000(node=0|zone=2) [ 58.353583] page_type: f5(slab) [ 58.356730] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 58.364477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.372216] page dumped because: kasan: bad access detected [ 58.377787] [ 58.379290] Memory state around the buggy address: [ 58.384083] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.391310] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 58.398529] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.405747] ^ [ 58.410540] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.417759] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 58.424977] ================================================================== [ 65.626199] ================================================================== [ 65.633445] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 65.640840] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 65.648239] [ 65.649740] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 65.649748] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 65.649751] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 65.649754] Call Trace: [ 65.649756] <TASK> [ 65.649758] dump_stack_lvl+0x73/0xb0 [ 65.649763] print_report+0xd1/0x650 [ 65.649767] ? __virt_addr_valid+0x1db/0x2d0 [ 65.649771] ? kasan_atomics_helper+0x15b6/0x5450 [ 65.649775] ? kasan_complete_mode_report_info+0x2a/0x200 [ 65.649780] ? kasan_atomics_helper+0x15b6/0x5450 [ 65.649784] kasan_report+0x141/0x180 [ 65.649788] ? kasan_atomics_helper+0x15b6/0x5450 [ 65.649793] kasan_check_range+0x10c/0x1c0 [ 65.649798] __kasan_check_write+0x18/0x20 [ 65.649802] kasan_atomics_helper+0x15b6/0x5450 [ 65.649806] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 65.649810] ? __kmalloc_cache_noprof+0x189/0x420 [ 65.649815] ? kasan_atomics+0x152/0x310 [ 65.649820] kasan_atomics+0x1dc/0x310 [ 65.649825] ? __pfx_kasan_atomics+0x10/0x10 [ 65.649829] ? ktime_get_ts64+0x83/0x230 [ 65.649834] kunit_try_run_case+0x1a2/0x480 [ 65.649839] ? __pfx_kunit_try_run_case+0x10/0x10 [ 65.649843] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 65.649847] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 65.649852] ? __kthread_parkme+0x82/0x180 [ 65.649855] ? preempt_count_sub+0x50/0x80 [ 65.649860] ? __pfx_kunit_try_run_case+0x10/0x10 [ 65.649865] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 65.649869] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 65.649873] kthread+0x334/0x6f0 [ 65.649877] ? trace_preempt_on+0x20/0xc0 [ 65.649881] ? __pfx_kthread+0x10/0x10 [ 65.649885] ? _raw_spin_unlock_irq+0x47/0x80 [ 65.649889] ? calculate_sigpending+0x7b/0xa0 [ 65.649894] ? __pfx_kthread+0x10/0x10 [ 65.649898] ret_from_fork+0x113/0x1d0 [ 65.649901] ? __pfx_kthread+0x10/0x10 [ 65.649905] ret_from_fork_asm+0x1a/0x30 [ 65.649911] </TASK> [ 65.649913] [ 65.833065] Allocated by task 306: [ 65.836469] kasan_save_stack+0x45/0x70 [ 65.840309] kasan_save_track+0x18/0x40 [ 65.844148] kasan_save_alloc_info+0x3b/0x50 [ 65.848423] __kasan_kmalloc+0xb7/0xc0 [ 65.852173] __kmalloc_cache_noprof+0x189/0x420 [ 65.856706] kasan_atomics+0x95/0x310 [ 65.860418] kunit_try_run_case+0x1a2/0x480 [ 65.864610] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 65.870010] kthread+0x334/0x6f0 [ 65.873242] ret_from_fork+0x113/0x1d0 [ 65.876995] ret_from_fork_asm+0x1a/0x30 [ 65.880920] [ 65.882421] The buggy address belongs to the object at ffff8881066eaf00 [ 65.882421] which belongs to the cache kmalloc-64 of size 64 [ 65.894762] The buggy address is located 0 bytes to the right of [ 65.894762] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 65.907623] [ 65.909121] The buggy address belongs to the physical page: [ 65.914697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 65.922703] flags: 0x200000000000000(node=0|zone=2) [ 65.927583] page_type: f5(slab) [ 65.930730] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 65.938478] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.946226] page dumped because: kasan: bad access detected [ 65.951797] [ 65.953297] Memory state around the buggy address: [ 65.958089] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.965310] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 65.972527] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.979747] ^ [ 65.984542] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.991769] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.998996] ================================================================== [ 57.296573] ================================================================== [ 57.303822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 57.311134] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 57.318529] [ 57.320029] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 57.320037] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 57.320040] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 57.320044] Call Trace: [ 57.320046] <TASK> [ 57.320047] dump_stack_lvl+0x73/0xb0 [ 57.320052] print_report+0xd1/0x650 [ 57.320056] ? __virt_addr_valid+0x1db/0x2d0 [ 57.320060] ? kasan_atomics_helper+0xb6a/0x5450 [ 57.320064] ? kasan_complete_mode_report_info+0x2a/0x200 [ 57.320070] ? kasan_atomics_helper+0xb6a/0x5450 [ 57.320074] kasan_report+0x141/0x180 [ 57.320078] ? kasan_atomics_helper+0xb6a/0x5450 [ 57.320083] kasan_check_range+0x10c/0x1c0 [ 57.320087] __kasan_check_write+0x18/0x20 [ 57.320091] kasan_atomics_helper+0xb6a/0x5450 [ 57.320095] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 57.320099] ? __kmalloc_cache_noprof+0x189/0x420 [ 57.320104] ? kasan_atomics+0x152/0x310 [ 57.320109] kasan_atomics+0x1dc/0x310 [ 57.320114] ? __pfx_kasan_atomics+0x10/0x10 [ 57.320119] ? ktime_get_ts64+0x83/0x230 [ 57.320123] kunit_try_run_case+0x1a2/0x480 [ 57.320128] ? __pfx_kunit_try_run_case+0x10/0x10 [ 57.320132] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 57.320137] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 57.320141] ? __kthread_parkme+0x82/0x180 [ 57.320145] ? preempt_count_sub+0x50/0x80 [ 57.320149] ? __pfx_kunit_try_run_case+0x10/0x10 [ 57.320153] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 57.320158] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 57.320162] kthread+0x334/0x6f0 [ 57.320166] ? trace_preempt_on+0x20/0xc0 [ 57.320170] ? __pfx_kthread+0x10/0x10 [ 57.320174] ? _raw_spin_unlock_irq+0x47/0x80 [ 57.320178] ? calculate_sigpending+0x7b/0xa0 [ 57.320183] ? __pfx_kthread+0x10/0x10 [ 57.320187] ret_from_fork+0x113/0x1d0 [ 57.320190] ? __pfx_kthread+0x10/0x10 [ 57.320194] ret_from_fork_asm+0x1a/0x30 [ 57.320200] </TASK> [ 57.320202] [ 57.502955] Allocated by task 306: [ 57.506376] kasan_save_stack+0x45/0x70 [ 57.510244] kasan_save_track+0x18/0x40 [ 57.514080] kasan_save_alloc_info+0x3b/0x50 [ 57.518361] __kasan_kmalloc+0xb7/0xc0 [ 57.522157] __kmalloc_cache_noprof+0x189/0x420 [ 57.526690] kasan_atomics+0x95/0x310 [ 57.530361] kunit_try_run_case+0x1a2/0x480 [ 57.534595] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 57.539995] kthread+0x334/0x6f0 [ 57.543227] ret_from_fork+0x113/0x1d0 [ 57.546981] ret_from_fork_asm+0x1a/0x30 [ 57.550905] [ 57.552420] The buggy address belongs to the object at ffff8881066eaf00 [ 57.552420] which belongs to the cache kmalloc-64 of size 64 [ 57.564755] The buggy address is located 0 bytes to the right of [ 57.564755] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 57.577616] [ 57.579117] The buggy address belongs to the physical page: [ 57.584688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 57.592688] flags: 0x200000000000000(node=0|zone=2) [ 57.597569] page_type: f5(slab) [ 57.600713] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 57.608454] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.616190] page dumped because: kasan: bad access detected [ 57.621765] [ 57.623263] Memory state around the buggy address: [ 57.628056] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.635278] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 57.642504] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.649724] ^ [ 57.654517] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.661744] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 57.668963] ================================================================== [ 56.157694] ================================================================== [ 56.164938] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 56.172246] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 56.179647] [ 56.181146] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 56.181154] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 56.181156] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 56.181160] Call Trace: [ 56.181162] <TASK> [ 56.181163] dump_stack_lvl+0x73/0xb0 [ 56.181168] print_report+0xd1/0x650 [ 56.181172] ? __virt_addr_valid+0x1db/0x2d0 [ 56.181176] ? kasan_atomics_helper+0x992/0x5450 [ 56.181180] ? kasan_complete_mode_report_info+0x2a/0x200 [ 56.181186] ? kasan_atomics_helper+0x992/0x5450 [ 56.181190] kasan_report+0x141/0x180 [ 56.181194] ? kasan_atomics_helper+0x992/0x5450 [ 56.181199] kasan_check_range+0x10c/0x1c0 [ 56.181203] __kasan_check_write+0x18/0x20 [ 56.181207] kasan_atomics_helper+0x992/0x5450 [ 56.181211] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 56.181215] ? __kmalloc_cache_noprof+0x189/0x420 [ 56.181220] ? kasan_atomics+0x152/0x310 [ 56.181225] kasan_atomics+0x1dc/0x310 [ 56.181230] ? __pfx_kasan_atomics+0x10/0x10 [ 56.181235] ? ktime_get_ts64+0x83/0x230 [ 56.181239] kunit_try_run_case+0x1a2/0x480 [ 56.181244] ? __pfx_kunit_try_run_case+0x10/0x10 [ 56.181248] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 56.181253] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 56.181257] ? __kthread_parkme+0x82/0x180 [ 56.181261] ? preempt_count_sub+0x50/0x80 [ 56.181265] ? __pfx_kunit_try_run_case+0x10/0x10 [ 56.181270] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 56.181274] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 56.181279] kthread+0x334/0x6f0 [ 56.181282] ? trace_preempt_on+0x20/0xc0 [ 56.181286] ? __pfx_kthread+0x10/0x10 [ 56.181290] ? _raw_spin_unlock_irq+0x47/0x80 [ 56.181294] ? calculate_sigpending+0x7b/0xa0 [ 56.181299] ? __pfx_kthread+0x10/0x10 [ 56.181303] ret_from_fork+0x113/0x1d0 [ 56.181307] ? __pfx_kthread+0x10/0x10 [ 56.181311] ret_from_fork_asm+0x1a/0x30 [ 56.181316] </TASK> [ 56.181318] [ 56.364088] Allocated by task 306: [ 56.367494] kasan_save_stack+0x45/0x70 [ 56.371367] kasan_save_track+0x18/0x40 [ 56.375233] kasan_save_alloc_info+0x3b/0x50 [ 56.379507] __kasan_kmalloc+0xb7/0xc0 [ 56.383259] __kmalloc_cache_noprof+0x189/0x420 [ 56.387792] kasan_atomics+0x95/0x310 [ 56.391460] kunit_try_run_case+0x1a2/0x480 [ 56.395652] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 56.401053] kthread+0x334/0x6f0 [ 56.404286] ret_from_fork+0x113/0x1d0 [ 56.408038] ret_from_fork_asm+0x1a/0x30 [ 56.411963] [ 56.413463] The buggy address belongs to the object at ffff8881066eaf00 [ 56.413463] which belongs to the cache kmalloc-64 of size 64 [ 56.425804] The buggy address is located 0 bytes to the right of [ 56.425804] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 56.438667] [ 56.440166] The buggy address belongs to the physical page: [ 56.445738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 56.453746] flags: 0x200000000000000(node=0|zone=2) [ 56.458624] page_type: f5(slab) [ 56.461772] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 56.469513] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.477258] page dumped because: kasan: bad access detected [ 56.482831] [ 56.484362] Memory state around the buggy address: [ 56.489184] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.496419] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 56.503639] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.510858] ^ [ 56.515652] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.522872] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 56.530089] ================================================================== [ 64.112856] ================================================================== [ 64.120097] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 64.127491] Read of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 64.134803] [ 64.136306] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 64.136314] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 64.136317] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 64.136320] Call Trace: [ 64.136322] <TASK> [ 64.136324] dump_stack_lvl+0x73/0xb0 [ 64.136348] print_report+0xd1/0x650 [ 64.136352] ? __virt_addr_valid+0x1db/0x2d0 [ 64.136357] ? kasan_atomics_helper+0x4eae/0x5450 [ 64.136361] ? kasan_complete_mode_report_info+0x2a/0x200 [ 64.136367] ? kasan_atomics_helper+0x4eae/0x5450 [ 64.136383] kasan_report+0x141/0x180 [ 64.136388] ? kasan_atomics_helper+0x4eae/0x5450 [ 64.136405] __asan_report_load8_noabort+0x18/0x20 [ 64.136410] kasan_atomics_helper+0x4eae/0x5450 [ 64.136414] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 64.136419] ? __kmalloc_cache_noprof+0x189/0x420 [ 64.136423] ? kasan_atomics+0x152/0x310 [ 64.136429] kasan_atomics+0x1dc/0x310 [ 64.136433] ? __pfx_kasan_atomics+0x10/0x10 [ 64.136438] ? ktime_get_ts64+0x83/0x230 [ 64.136442] kunit_try_run_case+0x1a2/0x480 [ 64.136447] ? __pfx_kunit_try_run_case+0x10/0x10 [ 64.136451] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 64.136456] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 64.136460] ? __kthread_parkme+0x82/0x180 [ 64.136464] ? preempt_count_sub+0x50/0x80 [ 64.136468] ? __pfx_kunit_try_run_case+0x10/0x10 [ 64.136473] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 64.136477] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 64.136482] kthread+0x334/0x6f0 [ 64.136485] ? trace_preempt_on+0x20/0xc0 [ 64.136490] ? __pfx_kthread+0x10/0x10 [ 64.136494] ? _raw_spin_unlock_irq+0x47/0x80 [ 64.136498] ? calculate_sigpending+0x7b/0xa0 [ 64.136502] ? __pfx_kthread+0x10/0x10 [ 64.136506] ret_from_fork+0x113/0x1d0 [ 64.136510] ? __pfx_kthread+0x10/0x10 [ 64.136514] ret_from_fork_asm+0x1a/0x30 [ 64.136520] </TASK> [ 64.136521] [ 64.316214] Allocated by task 306: [ 64.319621] kasan_save_stack+0x45/0x70 [ 64.323468] kasan_save_track+0x18/0x40 [ 64.327306] kasan_save_alloc_info+0x3b/0x50 [ 64.331581] __kasan_kmalloc+0xb7/0xc0 [ 64.335361] __kmalloc_cache_noprof+0x189/0x420 [ 64.339918] kasan_atomics+0x95/0x310 [ 64.343591] kunit_try_run_case+0x1a2/0x480 [ 64.347777] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 64.353178] kthread+0x334/0x6f0 [ 64.356419] ret_from_fork+0x113/0x1d0 [ 64.360171] ret_from_fork_asm+0x1a/0x30 [ 64.364097] [ 64.365597] The buggy address belongs to the object at ffff8881066eaf00 [ 64.365597] which belongs to the cache kmalloc-64 of size 64 [ 64.377938] The buggy address is located 0 bytes to the right of [ 64.377938] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 64.390800] [ 64.392300] The buggy address belongs to the physical page: [ 64.397871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 64.405870] flags: 0x200000000000000(node=0|zone=2) [ 64.410749] page_type: f5(slab) [ 64.413895] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 64.421635] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.429410] page dumped because: kasan: bad access detected [ 64.434990] [ 64.436489] Memory state around the buggy address: [ 64.441282] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.448502] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 64.455722] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.462941] ^ [ 64.467731] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.474953] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.482171] ==================================================================