Date
July 19, 2025, 11:11 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.334883] ================================================================== [ 18.335224] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 18.335288] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266 [ 18.335340] [ 18.335550] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.335645] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.335674] Hardware name: linux,dummy-virt (DT) [ 18.335708] Call trace: [ 18.335733] show_stack+0x20/0x38 (C) [ 18.336356] dump_stack_lvl+0x8c/0xd0 [ 18.336475] print_report+0x118/0x5d0 [ 18.336544] kasan_report+0xdc/0x128 [ 18.336906] kasan_check_range+0x100/0x1a8 [ 18.337033] __kasan_check_write+0x20/0x30 [ 18.337293] kasan_atomics_helper+0x17ec/0x4858 [ 18.337490] kasan_atomics+0x198/0x2e0 [ 18.337575] kunit_try_run_case+0x170/0x3f0 [ 18.337628] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.337784] kthread+0x328/0x630 [ 18.337874] ret_from_fork+0x10/0x20 [ 18.338273] [ 18.338331] Allocated by task 266: [ 18.338585] kasan_save_stack+0x3c/0x68 [ 18.338804] kasan_save_track+0x20/0x40 [ 18.338887] kasan_save_alloc_info+0x40/0x58 [ 18.339018] __kasan_kmalloc+0xd4/0xd8 [ 18.339126] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.339269] kasan_atomics+0xb8/0x2e0 [ 18.339309] kunit_try_run_case+0x170/0x3f0 [ 18.339405] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.339761] kthread+0x328/0x630 [ 18.340038] ret_from_fork+0x10/0x20 [ 18.340131] [ 18.340303] The buggy address belongs to the object at fff00000c63b4480 [ 18.340303] which belongs to the cache kmalloc-64 of size 64 [ 18.340391] The buggy address is located 0 bytes to the right of [ 18.340391] allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0) [ 18.340853] [ 18.340941] The buggy address belongs to the physical page: [ 18.340996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4 [ 18.341271] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.341420] page_type: f5(slab) [ 18.341602] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.341860] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.342078] page dumped because: kasan: bad access detected [ 18.342247] [ 18.342293] Memory state around the buggy address: [ 18.342331] fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.342780] fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.343156] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.343226] ^ [ 18.343276] fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.343525] fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.343714] ================================================================== [ 17.994306] ================================================================== [ 17.994379] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 17.994706] Write of size 4 at addr fff00000c63b44b0 by task kunit_try_catch/266 [ 17.994777] [ 17.994812] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.994995] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.995052] Hardware name: linux,dummy-virt (DT) [ 17.995228] Call trace: [ 17.995262] show_stack+0x20/0x38 (C) [ 17.995475] dump_stack_lvl+0x8c/0xd0 [ 17.995692] print_report+0x118/0x5d0 [ 17.995929] kasan_report+0xdc/0x128 [ 17.996016] kasan_check_range+0x100/0x1a8 [ 17.996070] __kasan_check_write+0x20/0x30 [ 17.996136] kasan_atomics_helper+0xad4/0x4858 [ 17.996559] kasan_atomics+0x198/0x2e0 [ 17.996716] kunit_try_run_case+0x170/0x3f0 [ 17.996801] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.996908] kthread+0x328/0x630 [ 17.996975] ret_from_fork+0x10/0x20 [ 17.997052] [ 17.997092] Allocated by task 266: [ 17.997124] kasan_save_stack+0x3c/0x68 [ 17.997168] kasan_save_track+0x20/0x40 [ 17.997597] kasan_save_alloc_info+0x40/0x58 [ 17.997712] __kasan_kmalloc+0xd4/0xd8 [ 17.997790] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.997932] kasan_atomics+0xb8/0x2e0 [ 17.998010] kunit_try_run_case+0x170/0x3f0 [ 17.998052] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.998312] kthread+0x328/0x630 [ 17.998706] ret_from_fork+0x10/0x20 [ 17.998896] [ 17.998953] The buggy address belongs to the object at fff00000c63b4480 [ 17.998953] which belongs to the cache kmalloc-64 of size 64 [ 17.999053] The buggy address is located 0 bytes to the right of [ 17.999053] allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0) [ 17.999193] [ 17.999244] The buggy address belongs to the physical page: [ 17.999347] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4 [ 17.999444] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.999512] page_type: f5(slab) [ 17.999794] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.000037] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.000184] page dumped because: kasan: bad access detected [ 18.000277] [ 18.000336] Memory state around the buggy address: [ 18.000471] fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.000549] fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.000767] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.000943] ^ [ 18.000985] fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.003103] [ 18.003393] Call trace: [ 18.003581] dump_stack_lvl+0x8c/0xd0 [ 18.004703] kthread+0x328/0x630 [ 18.005251] kasan_save_track+0x20/0x40 [ 18.005311] kasan_save_alloc_info+0x40/0x58 [ 18.005395] __kasan_kmalloc+0xd4/0xd8 [ 18.005915] kasan_atomics+0xb8/0x2e0 [ 18.006895] The buggy address is located 0 bytes to the right of [ 18.006895] allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0) [ 18.007517] page dumped because: kasan: bad access detected [ 18.007770] ^ [ 18.007806] fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.008571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 18.009319] show_stack+0x20/0x38 (C) [ 18.012007] ret_from_fork+0x10/0x20 [ 18.013101] kasan_save_alloc_info+0x40/0x58 [ 18.013240] __kasan_kmalloc+0xd4/0xd8 [ 18.013450] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.013572] kasan_atomics+0xb8/0x2e0 [ 18.014347] [ 18.014844] [ 18.015255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4 [ 18.016101] page dumped because: kasan: bad access detected [ 18.016778] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.018500] Read of size 4 at addr fff00000c63b44b0 by task kunit_try_catch/266 [ 18.020443] kasan_atomics+0x198/0x2e0 [ 18.022061] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.022288] kasan_atomics+0xb8/0x2e0 [ 18.022337] kunit_try_run_case+0x170/0x3f0 [ 18.022550] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.023082] [ 18.023507] [ 18.023984] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.024678] page dumped because: kasan: bad access detected [ 18.025165] fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.027160] ================================================================== [ 18.292862] ================================================================== [ 18.292960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 18.293155] Read of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266 [ 18.293223] [ 18.293255] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.293337] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.293366] Hardware name: linux,dummy-virt (DT) [ 18.293543] Call trace: [ 18.293598] show_stack+0x20/0x38 (C) [ 18.293714] dump_stack_lvl+0x8c/0xd0 [ 18.293882] print_report+0x118/0x5d0 [ 18.293973] kasan_report+0xdc/0x128 [ 18.294262] __asan_report_load8_noabort+0x20/0x30 [ 18.294324] kasan_atomics_helper+0x3df4/0x4858 [ 18.294453] kasan_atomics+0x198/0x2e0 [ 18.294805] kunit_try_run_case+0x170/0x3f0 [ 18.294953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.295252] kthread+0x328/0x630 [ 18.295393] ret_from_fork+0x10/0x20 [ 18.295613] [ 18.295720] Allocated by task 266: [ 18.295825] kasan_save_stack+0x3c/0x68 [ 18.295869] kasan_save_track+0x20/0x40 [ 18.295910] kasan_save_alloc_info+0x40/0x58 [ 18.295968] __kasan_kmalloc+0xd4/0xd8 [ 18.296363] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.296434] kasan_atomics+0xb8/0x2e0 [ 18.296472] kunit_try_run_case+0x170/0x3f0 [ 18.296513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.296570] kthread+0x328/0x630 [ 18.296604] ret_from_fork+0x10/0x20 [ 18.296652] [ 18.296945] The buggy address belongs to the object at fff00000c63b4480 [ 18.296945] which belongs to the cache kmalloc-64 of size 64 [ 18.297022] The buggy address is located 0 bytes to the right of [ 18.297022] allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0) [ 18.297355] [ 18.297459] The buggy address belongs to the physical page: [ 18.297613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4 [ 18.297845] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.297902] page_type: f5(slab) [ 18.297943] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.297997] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.298209] page dumped because: kasan: bad access detected [ 18.298437] [ 18.298773] Memory state around the buggy address: [ 18.299096] fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.299314] fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.299380] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.299422] ^ [ 18.299965] fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.300139] fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.300681] ================================================================== [ 18.301474] ================================================================== [ 18.301528] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 18.301592] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266 [ 18.301644] [ 18.301677] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.302339] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.302453] Hardware name: linux,dummy-virt (DT) [ 18.302666] Call trace: [ 18.302714] show_stack+0x20/0x38 (C) [ 18.302771] dump_stack_lvl+0x8c/0xd0 [ 18.302830] print_report+0x118/0x5d0 [ 18.303060] kasan_report+0xdc/0x128 [ 18.303434] kasan_check_range+0x100/0x1a8 [ 18.303721] __kasan_check_write+0x20/0x30 [ 18.303816] kasan_atomics_helper+0x16d0/0x4858 [ 18.303980] kasan_atomics+0x198/0x2e0 [ 18.304061] kunit_try_run_case+0x170/0x3f0 [ 18.304313] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.304815] kthread+0x328/0x630 [ 18.305072] ret_from_fork+0x10/0x20 [ 18.305255] [ 18.305323] Allocated by task 266: [ 18.305356] kasan_save_stack+0x3c/0x68 [ 18.305595] kasan_save_track+0x20/0x40 [ 18.305806] kasan_save_alloc_info+0x40/0x58 [ 18.305900] __kasan_kmalloc+0xd4/0xd8 [ 18.306126] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.306209] kasan_atomics+0xb8/0x2e0 [ 18.306395] kunit_try_run_case+0x170/0x3f0 [ 18.306474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.306687] kthread+0x328/0x630 [ 18.306730] ret_from_fork+0x10/0x20 [ 18.306909] [ 18.307207] The buggy address belongs to the object at fff00000c63b4480 [ 18.307207] which belongs to the cache kmalloc-64 of size 64 [ 18.307391] The buggy address is located 0 bytes to the right of [ 18.307391] allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0) [ 18.307639] [ 18.307878] The buggy address belongs to the physical page: [ 18.307922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4 [ 18.308056] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.308142] page_type: f5(slab) [ 18.308183] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.308246] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.308301] page dumped because: kasan: bad access detected [ 18.308344] [ 18.308374] Memory state around the buggy address: [ 18.308423] fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.308469] fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.308515] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.308566] ^ [ 18.308613] fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.308655] fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.308704] ================================================================== [ 17.824388] ================================================================== [ 17.825989] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 17.827134] Call trace: [ 17.828146] ret_from_fork+0x10/0x20 [ 17.828653] ret_from_fork+0x10/0x20 [ 17.828861] [ 17.828927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4 [ 17.829147] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.829415] ^ [ 17.831929] ================================================================== [ 18.142480] ================================================================== [ 18.142556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 18.142608] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266 [ 18.143053] [ 18.143105] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.143279] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.143325] Hardware name: linux,dummy-virt (DT) [ 18.143361] Call trace: [ 18.143385] show_stack+0x20/0x38 (C) [ 18.143438] dump_stack_lvl+0x8c/0xd0 [ 18.143803] print_report+0x118/0x5d0 [ 18.143872] kasan_report+0xdc/0x128 [ 18.143920] kasan_check_range+0x100/0x1a8 [ 18.143970] __kasan_check_write+0x20/0x30 [ 18.144017] kasan_atomics_helper+0xff0/0x4858 [ 18.144066] kasan_atomics+0x198/0x2e0 [ 18.144114] kunit_try_run_case+0x170/0x3f0 [ 18.144161] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.144214] kthread+0x328/0x630 [ 18.144258] ret_from_fork+0x10/0x20 [ 18.144367] [ 18.144390] Allocated by task 266: [ 18.144445] kasan_save_stack+0x3c/0x68 [ 18.144502] kasan_save_track+0x20/0x40 [ 18.144553] kasan_save_alloc_info+0x40/0x58 [ 18.144606] __kasan_kmalloc+0xd4/0xd8 [ 18.144645] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.144687] kasan_atomics+0xb8/0x2e0 [ 18.144724] kunit_try_run_case+0x170/0x3f0 [ 18.144764] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.144810] kthread+0x328/0x630 [ 18.144854] ret_from_fork+0x10/0x20 [ 18.144908] [ 18.144939] The buggy address belongs to the object at fff00000c63b4480 [ 18.144939] which belongs to the cache kmalloc-64 of size 64 [ 18.145002] The buggy address is located 0 bytes to the right of [ 18.145002] allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0) [ 18.145067] [ 18.145090] The buggy address belongs to the physical page: [ 18.145122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4 [ 18.145174] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.145232] page_type: f5(slab) [ 18.145274] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.145327] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.145371] page dumped because: kasan: bad access detected [ 18.145413] [ 18.145434] Memory state around the buggy address: [ 18.145476] fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.145522] fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.146585] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.146955] ^ [ 18.147003] fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.147155] fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.147542] ================================================================== [ 18.159861] ================================================================== [ 18.159924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 18.159999] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266 [ 18.160361] [ 18.160769] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.160966] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.161033] Hardware name: linux,dummy-virt (DT) [ 18.161069] Call trace: [ 18.161096] show_stack+0x20/0x38 (C) [ 18.161356] dump_stack_lvl+0x8c/0xd0 [ 18.161732] print_report+0x118/0x5d0 [ 18.161940] kasan_report+0xdc/0x128 [ 18.162149] kasan_check_range+0x100/0x1a8 [ 18.162277] __kasan_check_write+0x20/0x30 [ 18.162367] kasan_atomics_helper+0x10c0/0x4858 [ 18.162426] kasan_atomics+0x198/0x2e0 [ 18.162473] kunit_try_run_case+0x170/0x3f0 [ 18.162939] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.163366] kthread+0x328/0x630 [ 18.163440] ret_from_fork+0x10/0x20 [ 18.163643] [ 18.163713] Allocated by task 266: [ 18.163745] kasan_save_stack+0x3c/0x68 [ 18.163985] kasan_save_track+0x20/0x40 [ 18.164222] kasan_save_alloc_info+0x40/0x58 [ 18.164307] __kasan_kmalloc+0xd4/0xd8 [ 18.164654] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.164810] kasan_atomics+0xb8/0x2e0 [ 18.165120] kunit_try_run_case+0x170/0x3f0 [ 18.165345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.165734] kthread+0x328/0x630 [ 18.165906] ret_from_fork+0x10/0x20 [ 18.166111] [ 18.166141] The buggy address belongs to the object at fff00000c63b4480 [ 18.166141] which belongs to the cache kmalloc-64 of size 64 [ 18.166238] The buggy address is located 0 bytes to the right of [ 18.166238] allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0) [ 18.166551] [ 18.166700] The buggy address belongs to the physical page: [ 18.166944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4 [ 18.167006] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.167249] page_type: f5(slab) [ 18.167312] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.167368] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.167412] page dumped because: kasan: bad access detected [ 18.167447] [ 18.167818] Memory state around the buggy address: [ 18.168009] fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.168563] fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.168945] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.168994] ^ [ 18.169031] fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.169784] fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.169856] ================================================================== [ 18.231177] ================================================================== [ 18.231231] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 18.231283] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266 [ 18.231336] [ 18.231855] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.232124] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.232300] Hardware name: linux,dummy-virt (DT) [ 18.232345] Call trace: [ 18.232372] show_stack+0x20/0x38 (C) [ 18.232659] dump_stack_lvl+0x8c/0xd0 [ 18.232739] print_report+0x118/0x5d0 [ 18.232858] kasan_report+0xdc/0x128 [ 18.232912] kasan_check_range+0x100/0x1a8 [ 18.232969] __kasan_check_write+0x20/0x30 [ 18.233024] kasan_atomics_helper+0x1414/0x4858 [ 18.233074] kasan_atomics+0x198/0x2e0 [ 18.233586] kunit_try_run_case+0x170/0x3f0 [ 18.233664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.233852] kthread+0x328/0x630 [ 18.233952] ret_from_fork+0x10/0x20 [ 18.234004] [ 18.234053] Allocated by task 266: [ 18.234390] kasan_save_stack+0x3c/0x68 [ 18.234739] kasan_save_track+0x20/0x40 [ 18.234924] kasan_save_alloc_info+0x40/0x58 [ 18.235020] __kasan_kmalloc+0xd4/0xd8 [ 18.235109] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.235238] kasan_atomics+0xb8/0x2e0 [ 18.235307] kunit_try_run_case+0x170/0x3f0 [ 18.235742] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.236066] kthread+0x328/0x630 [ 18.236490] ret_from_fork+0x10/0x20 [ 18.236816] [ 18.236847] The buggy address belongs to the object at fff00000c63b4480 [ 18.236847] which belongs to the cache kmalloc-64 of size 64 [ 18.236944] The buggy address is located 0 bytes to the right of [ 18.236944] allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0) [ 18.237152] [ 18.237230] The buggy address belongs to the physical page: [ 18.237490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4 [ 18.237935] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.238027] page_type: f5(slab) [ 18.238327] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.238394] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.238897] page dumped because: kasan: bad access detected [ 18.239397] [ 18.239590] Memory state around the buggy address: [ 18.239816] fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.240048] fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.240434] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.240649] ^ [ 18.240719] fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.241110] fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.241592] ================================================================== [ 18.067498] ================================================================== [ 18.067602] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 18.067696] Read of size 4 at addr fff00000c63b44b0 by task kunit_try_catch/266 [ 18.067949] [ 18.068067] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.068155] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.068193] Hardware name: linux,dummy-virt (DT) [ 18.068226] Call trace: [ 18.068314] show_stack+0x20/0x38 (C) [ 18.068389] dump_stack_lvl+0x8c/0xd0 [ 18.068454] print_report+0x118/0x5d0 [ 18.068699] kasan_report+0xdc/0x128 [ 18.068753] __asan_report_load4_noabort+0x20/0x30 [ 18.068918] kasan_atomics_helper+0x3e04/0x4858 [ 18.069012] kasan_atomics+0x198/0x2e0 [ 18.069059] kunit_try_run_case+0x170/0x3f0 [ 18.069108] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.069164] kthread+0x328/0x630 [ 18.069219] ret_from_fork+0x10/0x20 [ 18.069269] [ 18.069289] Allocated by task 266: [ 18.069320] kasan_save_stack+0x3c/0x68 [ 18.069363] kasan_save_track+0x20/0x40 [ 18.069403] kasan_save_alloc_info+0x40/0x58 [ 18.069449] __kasan_kmalloc+0xd4/0xd8 [ 18.069498] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.069707] kasan_atomics+0xb8/0x2e0 [ 18.069929] kunit_try_run_case+0x170/0x3f0 [ 18.070263] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.070353] kthread+0x328/0x630 [ 18.070396] ret_from_fork+0x10/0x20 [ 18.070583] [ 18.070686] The buggy address belongs to the object at fff00000c63b4480 [ 18.070686] which belongs to the cache kmalloc-64 of size 64 [ 18.070858] The buggy address is located 0 bytes to the right of [ 18.070858] allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0) [ 18.071085] [ 18.071175] The buggy address belongs to the physical page: [ 18.071269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4 [ 18.071406] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.071466] page_type: f5(slab) [ 18.071505] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.072161] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.072313] page dumped because: kasan: bad access detected [ 18.072433] [ 18.072554] Memory state around the buggy address: [ 18.072661] fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.072747] fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.073050] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.073235] ^ [ 18.073410] fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.073482] fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.073525] ================================================================== [ 18.223630] ================================================================== [ 18.223693] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 18.223746] Read of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266 [ 18.223799] [ 18.223875] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.223962] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.223992] Hardware name: linux,dummy-virt (DT) [ 18.224163] Call trace: [ 18.224448] show_stack+0x20/0x38 (C) [ 18.224523] dump_stack_lvl+0x8c/0xd0 [ 18.224921] print_report+0x118/0x5d0 [ 18.225344] kasan_report+0xdc/0x128 [ 18.225563] __asan_report_load8_noabort+0x20/0x30 [ 18.225644] kasan_atomics_helper+0x3f04/0x4858 [ 18.225761] kasan_atomics+0x198/0x2e0 [ 18.225814] kunit_try_run_case+0x170/0x3f0 [ 18.225866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.225927] kthread+0x328/0x630 [ 18.226230] ret_from_fork+0x10/0x20 [ 18.226809] [ 18.226873] Allocated by task 266: [ 18.226988] kasan_save_stack+0x3c/0x68 [ 18.227084] kasan_save_track+0x20/0x40 [ 18.227321] kasan_save_alloc_info+0x40/0x58 [ 18.227382] __kasan_kmalloc+0xd4/0xd8 [ 18.227617] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.227671] kasan_atomics+0xb8/0x2e0 [ 18.227721] kunit_try_run_case+0x170/0x3f0 [ 18.227761] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.227826] kthread+0x328/0x630 [ 18.227869] ret_from_fork+0x10/0x20 [ 18.227907] [ 18.227929] The buggy address belongs to the object at fff00000c63b4480 [ 18.227929] which belongs to the cache kmalloc-64 of size 64 [ 18.228000] The buggy address is located 0 bytes to the right of [ 18.228000] allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0) [ 18.228077] [ 18.228114] The buggy address belongs to the physical page: [ 18.228170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4 [ 18.228235] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.228284] page_type: f5(slab) [ 18.228331] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.228386] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.228429] page dumped because: kasan: bad access detected [ 18.228473] [ 18.228494] Memory state around the buggy address: [ 18.228539] fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.228893] fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.228965] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.229298] ^ [ 18.229373] fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.229705] fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.229799] ================================================================== [ 18.132334] ================================================================== [ 18.132431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 18.132494] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266 [ 18.132606] [ 18.132649] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.132963] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.133009] Hardware name: linux,dummy-virt (DT) [ 18.133048] Call trace: [ 18.133074] show_stack+0x20/0x38 (C) [ 18.133125] dump_stack_lvl+0x8c/0xd0 [ 18.133174] print_report+0x118/0x5d0 [ 18.133221] kasan_report+0xdc/0x128 [ 18.133269] kasan_check_range+0x100/0x1a8 [ 18.133317] __kasan_check_write+0x20/0x30 [ 18.133479] kasan_atomics_helper+0xf88/0x4858 [ 18.133558] kasan_atomics+0x198/0x2e0 [ 18.133608] kunit_try_run_case+0x170/0x3f0 [ 18.133657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.134233] kthread+0x328/0x630 [ 18.134345] ret_from_fork+0x10/0x20 [ 18.134464] [ 18.134485] Allocated by task 266: [ 18.134518] kasan_save_stack+0x3c/0x68 [ 18.134573] kasan_save_track+0x20/0x40 [ 18.134614] kasan_save_alloc_info+0x40/0x58 [ 18.135263] __kasan_kmalloc+0xd4/0xd8 [ 18.135476] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.135745] kasan_atomics+0xb8/0x2e0 [ 18.135906] kunit_try_run_case+0x170/0x3f0 [ 18.136394] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.136872] kthread+0x328/0x630 [ 18.136942] ret_from_fork+0x10/0x20 [ 18.137146] [ 18.137255] The buggy address belongs to the object at fff00000c63b4480 [ 18.137255] which belongs to the cache kmalloc-64 of size 64 [ 18.137489] The buggy address is located 0 bytes to the right of [ 18.137489] allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0) [ 18.137902] [ 18.137929] The buggy address belongs to the physical page: [ 18.137964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4 [ 18.138152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.138544] page_type: f5(slab) [ 18.138769] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.138990] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.139421] page dumped because: kasan: bad access detected [ 18.139469] [ 18.139821] Memory state around the buggy address: [ 18.140015] fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.140381] fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.140844] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.141018] ^ [ 18.141161] fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.141591] fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.141662] ================================================================== [ 18.170687] ================================================================== [ 18.170781] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 18.170966] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266 [ 18.171028] [ 18.171064] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.171153] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.171307] Hardware name: linux,dummy-virt (DT) [ 18.171637] Call trace: [ 18.171762] show_stack+0x20/0x38 (C) [ 18.171823] dump_stack_lvl+0x8c/0xd0 [ 18.171945] print_report+0x118/0x5d0 [ 18.172000] kasan_report+0xdc/0x128 [ 18.172075] kasan_check_range+0x100/0x1a8 [ 18.172202] __kasan_check_write+0x20/0x30 [ 18.172256] kasan_atomics_helper+0x1128/0x4858 [ 18.172313] kasan_atomics+0x198/0x2e0 [ 18.172366] kunit_try_run_case+0x170/0x3f0 [ 18.172798] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.172877] kthread+0x328/0x630 [ 18.172923] ret_from_fork+0x10/0x20 [ 18.172971] [ 18.172994] Allocated by task 266: [ 18.173153] kasan_save_stack+0x3c/0x68 [ 18.173221] kasan_save_track+0x20/0x40 [ 18.173262] kasan_save_alloc_info+0x40/0x58 [ 18.173313] __kasan_kmalloc+0xd4/0xd8 [ 18.173351] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.173392] kasan_atomics+0xb8/0x2e0 [ 18.173431] kunit_try_run_case+0x170/0x3f0 [ 18.173478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.173525] kthread+0x328/0x630 [ 18.173994] ret_from_fork+0x10/0x20 [ 18.174036] [ 18.174059] The buggy address belongs to the object at fff00000c63b4480 [ 18.174059] which belongs to the cache kmalloc-64 of size 64 [ 18.174602] The buggy address is located 0 bytes to the right of [ 18.174602] allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0) [ 18.174838] [ 18.174910] The buggy address belongs to the physical page: [ 18.174945] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4 [ 18.175351] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.175563] page_type: f5(slab) [ 18.175639] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.175848] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.176195] page dumped because: kasan: bad access detected [ 18.176264] [ 18.176670] Memory state around the buggy address: [ 18.176738] fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.177020] fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.177205] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.177300] ^ [ 18.177596] fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.177655] fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.177697] ================================================================== [ 17.797273] ================================================================== [ 17.798272] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 17.799017] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.799551] print_report+0x118/0x5d0 [ 17.800013] kasan_atomics+0x198/0x2e0 [ 17.801776] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.803134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4 [ 17.803625] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.803814] ================================================================== [ 18.112698] ================================================================== [ 18.113332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 18.113404] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266 [ 18.113456] [ 18.113499] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.113860] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.113912] Hardware name: linux,dummy-virt (DT) [ 18.114378] Call trace: [ 18.114424] show_stack+0x20/0x38 (C) [ 18.114578] dump_stack_lvl+0x8c/0xd0 [ 18.114684] print_report+0x118/0x5d0 [ 18.114736] kasan_report+0xdc/0x128 [ 18.115068] kasan_check_range+0x100/0x1a8 [ 18.115409] __kasan_check_write+0x20/0x30 [ 18.115602] kasan_atomics_helper+0xeb8/0x4858 [ 18.115717] kasan_atomics+0x198/0x2e0 [ 18.115840] kunit_try_run_case+0x170/0x3f0 [ 18.115936] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.116051] kthread+0x328/0x630 [ 18.116407] ret_from_fork+0x10/0x20 [ 18.116805] [ 18.116947] Allocated by task 266: [ 18.117113] kasan_save_stack+0x3c/0x68 [ 18.117357] kasan_save_track+0x20/0x40 [ 18.117574] kasan_save_alloc_info+0x40/0x58 [ 18.117735] __kasan_kmalloc+0xd4/0xd8 [ 18.117828] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.117879] kasan_atomics+0xb8/0x2e0 [ 18.117918] kunit_try_run_case+0x170/0x3f0 [ 18.117958] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.118628] kthread+0x328/0x630 [ 18.118679] ret_from_fork+0x10/0x20 [ 18.118720] [ 18.118766] The buggy address belongs to the object at fff00000c63b4480 [ 18.118766] which belongs to the cache kmalloc-64 of size 64 [ 18.118840] The buggy address is located 0 bytes to the right of [ 18.118840] allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0) [ 18.118916] [ 18.118940] The buggy address belongs to the physical page: [ 18.118982] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4 [ 18.119040] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.119091] page_type: f5(slab) [ 18.119146] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.119217] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.119260] page dumped because: kasan: bad access detected [ 18.119295] [ 18.119331] Memory state around the buggy address: [ 18.119373] fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.119423] fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.119476] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.119517] ^ [ 18.119564] fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.119608] fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.119658] ================================================================== [ 18.287364] ================================================================== [ 18.287438] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 18.287670] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266 [ 18.287781] [ 18.287827] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.288107] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.288149] Hardware name: linux,dummy-virt (DT) [ 18.288219] Call trace: [ 18.288600] show_stack+0x20/0x38 (C) [ 18.288718] dump_stack_lvl+0x8c/0xd0 [ 18.288770] print_report+0x118/0x5d0 [ 18.288984] kasan_report+0xdc/0x128 [ 18.289224] kasan_check_range+0x100/0x1a8 [ 18.289278] __kasan_check_write+0x20/0x30 [ 18.289353] kasan_atomics_helper+0x1644/0x4858 [ 18.289545] kasan_atomics+0x198/0x2e0 [ 18.289611] kunit_try_run_case+0x170/0x3f0 [ 18.289662] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.289832] kthread+0x328/0x630 [ 18.289983] ret_from_fork+0x10/0x20 [ 18.290107] [ 18.290262] Allocated by task 266: [ 18.290358] kasan_save_stack+0x3c/0x68 [ 18.290519] kasan_save_track+0x20/0x40 [ 18.290571] kasan_save_alloc_info+0x40/0x58 [ 18.290648] __kasan_kmalloc+0xd4/0xd8 [ 18.290687] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.290728] kasan_atomics+0xb8/0x2e0 [ 18.290766] kunit_try_run_case+0x170/0x3f0 [ 18.290806] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.290849] kthread+0x328/0x630 [ 18.290885] ret_from_fork+0x10/0x20 [ 18.291091] [ 18.291141] The buggy address belongs to the object at fff00000c63b4480 [ 18.291141] which belongs to the cache kmalloc-64 of size 64 [ 18.291263] The buggy address is located 0 bytes to the right of [ 18.291263] allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0) [ 18.291377] [ 18.291401] The buggy address belongs to the physical page: [ 18.291435] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4 [ 18.291489] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.291743] page_type: f5(slab) [ 18.291881] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.291989] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.292057] page dumped because: kasan: bad access detected [ 18.292104] [ 18.292124] Memory state around the buggy address: [ 18.292159] fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.292205] fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.292492] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.292548] ^ [ 18.292597] fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.292654] fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.292703] ================================================================== [ 18.178868] ================================================================== [ 18.178929] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 18.178994] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266 [ 18.179093] [ 18.179156] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.179426] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.179462] Hardware name: linux,dummy-virt (DT) [ 18.179506] Call trace: [ 18.179635] show_stack+0x20/0x38 (C) [ 18.179698] dump_stack_lvl+0x8c/0xd0 [ 18.179986] print_report+0x118/0x5d0 [ 18.180056] kasan_report+0xdc/0x128 [ 18.180224] kasan_check_range+0x100/0x1a8 [ 18.180476] __kasan_check_write+0x20/0x30 [ 18.180557] kasan_atomics_helper+0x1190/0x4858 [ 18.180804] kasan_atomics+0x198/0x2e0 [ 18.180875] kunit_try_run_case+0x170/0x3f0 [ 18.181270] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.181565] kthread+0x328/0x630 [ 18.181754] ret_from_fork+0x10/0x20 [ 18.181871] [ 18.181923] Allocated by task 266: [ 18.182007] kasan_save_stack+0x3c/0x68 [ 18.182087] kasan_save_track+0x20/0x40 [ 18.182228] kasan_save_alloc_info+0x40/0x58 [ 18.182291] __kasan_kmalloc+0xd4/0xd8 [ 18.182331] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.182378] kasan_atomics+0xb8/0x2e0 [ 18.182420] kunit_try_run_case+0x170/0x3f0 [ 18.183153] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.183379] kthread+0x328/0x630 [ 18.183499] ret_from_fork+0x10/0x20 [ 18.183648] [ 18.183707] The buggy address belongs to the object at fff00000c63b4480 [ 18.183707] which belongs to the cache kmalloc-64 of size 64 [ 18.183836] The buggy address is located 0 bytes to the right of [ 18.183836] allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0) [ 18.183970] [ 18.184063] The buggy address belongs to the physical page: [ 18.184128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4 [ 18.184182] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.184237] page_type: f5(slab) [ 18.184313] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.184369] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.184413] page dumped because: kasan: bad access detected [ 18.184456] [ 18.184476] Memory state around the buggy address: [ 18.184525] fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.184581] fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.184626] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.184666] ^ [ 18.184714] fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.184759] fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.184798] ================================================================== [ 18.203658] ================================================================== [ 18.203708] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 18.203757] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266 [ 18.203809] [ 18.203862] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.203945] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.203975] Hardware name: linux,dummy-virt (DT) [ 18.204008] Call trace: [ 18.204043] show_stack+0x20/0x38 (C) [ 18.204094] dump_stack_lvl+0x8c/0xd0 [ 18.204142] print_report+0x118/0x5d0 [ 18.204191] kasan_report+0xdc/0x128 [ 18.204238] kasan_check_range+0x100/0x1a8 [ 18.204293] __kasan_check_write+0x20/0x30 [ 18.204341] kasan_atomics_helper+0x12d8/0x4858 [ 18.204391] kasan_atomics+0x198/0x2e0 [ 18.204445] kunit_try_run_case+0x170/0x3f0 [ 18.204496] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.205381] kthread+0x328/0x630 [ 18.205458] ret_from_fork+0x10/0x20 [ 18.205523] [ 18.205563] Allocated by task 266: [ 18.205603] kasan_save_stack+0x3c/0x68 [ 18.205648] kasan_save_track+0x20/0x40 [ 18.206011] kasan_save_alloc_info+0x40/0x58 [ 18.206159] __kasan_kmalloc+0xd4/0xd8 [ 18.206385] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.206448] kasan_atomics+0xb8/0x2e0 [ 18.206488] kunit_try_run_case+0x170/0x3f0 [ 18.206538] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.206583] kthread+0x328/0x630 [ 18.207212] ret_from_fork+0x10/0x20 [ 18.207411] [ 18.207543] The buggy address belongs to the object at fff00000c63b4480 [ 18.207543] which belongs to the cache kmalloc-64 of size 64 [ 18.208037] The buggy address is located 0 bytes to the right of [ 18.208037] allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0) [ 18.208443] [ 18.208496] The buggy address belongs to the physical page: [ 18.208564] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4 [ 18.208805] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.208865] page_type: f5(slab) [ 18.209439] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.209512] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.210159] page dumped because: kasan: bad access detected [ 18.210461] [ 18.210502] Memory state around the buggy address: [ 18.210563] fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.210612] fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.210657] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.211089] ^ [ 18.211446] fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.211496] fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.211688] ================================================================== [ 18.212813] ================================================================== [ 18.213019] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 18.213223] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266 [ 18.213307] [ 18.213342] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.213846] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.214115] Hardware name: linux,dummy-virt (DT) [ 18.214198] Call trace: [ 18.214279] show_stack+0x20/0x38 (C) [ 18.214414] dump_stack_lvl+0x8c/0xd0 [ 18.214468] print_report+0x118/0x5d0 [ 18.214518] kasan_report+0xdc/0x128 [ 18.214580] kasan_check_range+0x100/0x1a8 [ 18.214944] __kasan_check_write+0x20/0x30 [ 18.215198] kasan_atomics_helper+0x1384/0x4858 [ 18.215418] kasan_atomics+0x198/0x2e0 [ 18.215594] kunit_try_run_case+0x170/0x3f0 [ 18.215716] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.215774] kthread+0x328/0x630 [ 18.216032] ret_from_fork+0x10/0x20 [ 18.216431] [ 18.216494] Allocated by task 266: [ 18.216698] kasan_save_stack+0x3c/0x68 [ 18.216805] kasan_save_track+0x20/0x40 [ 18.216964] kasan_save_alloc_info+0x40/0x58 [ 18.217010] __kasan_kmalloc+0xd4/0xd8 [ 18.217210] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.217273] kasan_atomics+0xb8/0x2e0 [ 18.217483] kunit_try_run_case+0x170/0x3f0 [ 18.217844] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.218020] kthread+0x328/0x630 [ 18.218107] ret_from_fork+0x10/0x20 [ 18.218227] [ 18.218251] The buggy address belongs to the object at fff00000c63b4480 [ 18.218251] which belongs to the cache kmalloc-64 of size 64 [ 18.218327] The buggy address is located 0 bytes to the right of [ 18.218327] allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0) [ 18.218542] [ 18.218941] The buggy address belongs to the physical page: [ 18.219178] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4 [ 18.219303] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.219364] page_type: f5(slab) [ 18.219757] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.219849] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.220180] page dumped because: kasan: bad access detected [ 18.220225] [ 18.220593] Memory state around the buggy address: [ 18.220881] fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.221119] fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.221386] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.221565] ^ [ 18.221759] fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.222016] fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.222434] ================================================================== [ 17.966859] ================================================================== [ 17.966959] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 17.967494] Write of size 4 at addr fff00000c63b44b0 by task kunit_try_catch/266 [ 17.967660] [ 17.967696] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.968156] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.968213] Hardware name: linux,dummy-virt (DT) [ 17.968302] Call trace: [ 17.968331] show_stack+0x20/0x38 (C) [ 17.968384] dump_stack_lvl+0x8c/0xd0 [ 17.968431] print_report+0x118/0x5d0 [ 17.968637] kasan_report+0xdc/0x128 [ 17.968753] kasan_check_range+0x100/0x1a8 [ 17.968916] __kasan_check_write+0x20/0x30 [ 17.969231] kasan_atomics_helper+0x99c/0x4858 [ 17.969309] kasan_atomics+0x198/0x2e0 [ 17.969360] kunit_try_run_case+0x170/0x3f0 [ 17.969729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.970019] kthread+0x328/0x630 [ 17.970165] ret_from_fork+0x10/0x20 [ 17.970218] [ 17.970268] Allocated by task 266: [ 17.970300] kasan_save_stack+0x3c/0x68 [ 17.970460] kasan_save_track+0x20/0x40 [ 17.970679] kasan_save_alloc_info+0x40/0x58 [ 17.970833] __kasan_kmalloc+0xd4/0xd8 [ 17.970921] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.971080] kasan_atomics+0xb8/0x2e0 [ 17.971169] kunit_try_run_case+0x170/0x3f0 [ 17.971228] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.971631] kthread+0x328/0x630 [ 17.971833] ret_from_fork+0x10/0x20 [ 17.971920] [ 17.972038] The buggy address belongs to the object at fff00000c63b4480 [ 17.972038] which belongs to the cache kmalloc-64 of size 64 [ 17.972129] The buggy address is located 0 bytes to the right of [ 17.972129] allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0) [ 17.972229] [ 17.972383] The buggy address belongs to the physical page: [ 17.972485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4 [ 17.972650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.972729] page_type: f5(slab) [ 17.972770] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.972829] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.972884] page dumped because: kasan: bad access detected [ 17.972933] [ 17.972954] Memory state around the buggy address: [ 17.973009] fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.973055] fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.973109] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.973150] ^ [ 17.973186] fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.973240] fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.975294] Write of size 4 at addr fff00000c63b44b0 by task kunit_try_catch/266 [ 17.978138] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.978244] kthread+0x328/0x630 [ 17.978408] ret_from_fork+0x10/0x20 [ 17.978582] [ 17.978660] Allocated by task 266: [ 17.978799] kasan_save_stack+0x3c/0x68 [ 17.978970] kasan_save_track+0x20/0x40 [ 17.979059] kasan_save_alloc_info+0x40/0x58 [ 17.979247] __kasan_kmalloc+0xd4/0xd8 [ 17.979580] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.979701] kasan_atomics+0xb8/0x2e0 [ 17.979750] kunit_try_run_case+0x170/0x3f0 [ 17.980068] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.980192] kthread+0x328/0x630 [ 17.980269] ret_from_fork+0x10/0x20 [ 17.980461] [ 17.980635] The buggy address belongs to the object at fff00000c63b4480 [ 17.980635] which belongs to the cache kmalloc-64 of size 64 [ 17.980742] The buggy address is located 0 bytes to the right of [ 17.980742] allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0) [ 17.981015] [ 17.981157] The buggy address belongs to the physical page: [ 17.981381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4 [ 17.981598] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.981790] page_type: f5(slab) [ 17.982073] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.982133] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.982337] page dumped because: kasan: bad access detected [ 17.982582] [ 17.982642] Memory state around the buggy address: [ 17.982699] fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.983106] fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.983240] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.983312] ^ [ 17.983351] fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.983541] fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.983754] ================================================================== [ 18.310151] ================================================================== [ 18.310240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 18.310295] Read of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266 [ 18.310346] [ 18.310378] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.310898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.311130] Hardware name: linux,dummy-virt (DT) [ 18.311194] Call trace: [ 18.311234] show_stack+0x20/0x38 (C) [ 18.311479] dump_stack_lvl+0x8c/0xd0 [ 18.311642] print_report+0x118/0x5d0 [ 18.311715] kasan_report+0xdc/0x128 [ 18.311763] __asan_report_load8_noabort+0x20/0x30 [ 18.311832] kasan_atomics_helper+0x3e10/0x4858 [ 18.312073] kasan_atomics+0x198/0x2e0 [ 18.312404] kunit_try_run_case+0x170/0x3f0 [ 18.312604] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.312674] kthread+0x328/0x630 [ 18.312719] ret_from_fork+0x10/0x20 [ 18.312901] [ 18.312937] Allocated by task 266: [ 18.312970] kasan_save_stack+0x3c/0x68 [ 18.313016] kasan_save_track+0x20/0x40 [ 18.313376] kasan_save_alloc_info+0x40/0x58 [ 18.313647] __kasan_kmalloc+0xd4/0xd8 [ 18.313899] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.313983] kasan_atomics+0xb8/0x2e0 [ 18.314095] kunit_try_run_case+0x170/0x3f0 [ 18.314183] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.314231] kthread+0x328/0x630 [ 18.314274] ret_from_fork+0x10/0x20 [ 18.314501] [ 18.314739] The buggy address belongs to the object at fff00000c63b4480 [ 18.314739] which belongs to the cache kmalloc-64 of size 64 [ 18.314840] The buggy address is located 0 bytes to the right of [ 18.314840] allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0) [ 18.315260] [ 18.315935] The buggy address belongs to the physical page: [ 18.316007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4 [ 18.316097] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.316149] page_type: f5(slab) [ 18.316441] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.316817] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.316968] page dumped because: kasan: bad access detected [ 18.317078] [ 18.317137] Memory state around the buggy address: [ 18.317173] fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.317423] fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.317521] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.317743] ^ [ 18.317929] fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.317984] fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.318025] ================================================================== [ 18.101236] ================================================================== [ 18.101312] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 18.101366] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266 [ 18.101739] [ 18.101803] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.101895] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.102341] Hardware name: linux,dummy-virt (DT) [ 18.102749] Call trace: [ 18.102839] show_stack+0x20/0x38 (C) [ 18.102988] dump_stack_lvl+0x8c/0xd0 [ 18.103074] print_report+0x118/0x5d0 [ 18.103177] kasan_report+0xdc/0x128 [ 18.103464] __asan_report_store8_noabort+0x20/0x30 [ 18.103796] kasan_atomics_helper+0x3e5c/0x4858 [ 18.104058] kasan_atomics+0x198/0x2e0 [ 18.104175] kunit_try_run_case+0x170/0x3f0 [ 18.104393] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.104465] kthread+0x328/0x630 [ 18.104756] ret_from_fork+0x10/0x20 [ 18.105752] [ 18.105802] Allocated by task 266: [ 18.105862] kasan_save_stack+0x3c/0x68 [ 18.105925] kasan_save_track+0x20/0x40 [ 18.105965] kasan_save_alloc_info+0x40/0x58 [ 18.106009] __kasan_kmalloc+0xd4/0xd8 [ 18.106048] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.106291] kasan_atomics+0xb8/0x2e0 [ 18.106750] kunit_try_run_case+0x170/0x3f0 [ 18.107161] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.107326] kthread+0x328/0x630 [ 18.107528] ret_from_fork+0x10/0x20 [ 18.107909] [ 18.108007] The buggy address belongs to the object at fff00000c63b4480 [ 18.108007] which belongs to the cache kmalloc-64 of size 64 [ 18.108228] The buggy address is located 0 bytes to the right of [ 18.108228] allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0) [ 18.108422] [ 18.108445] The buggy address belongs to the physical page: [ 18.108878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4 [ 18.109297] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.109764] page_type: f5(slab) [ 18.110006] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.110094] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.110331] page dumped because: kasan: bad access detected [ 18.110415] [ 18.110673] Memory state around the buggy address: [ 18.110803] fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.111086] fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.111132] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.111214] ^ [ 18.111251] fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.111459] fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.111524] ================================================================== [ 18.242626] ================================================================== [ 18.242686] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 18.242740] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266 [ 18.242984] [ 18.243475] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.243589] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.243621] Hardware name: linux,dummy-virt (DT) [ 18.243656] Call trace: [ 18.243682] show_stack+0x20/0x38 (C) [ 18.243736] dump_stack_lvl+0x8c/0xd0 [ 18.243782] print_report+0x118/0x5d0 [ 18.243831] kasan_report+0xdc/0x128 [ 18.243899] kasan_check_range+0x100/0x1a8 [ 18.243950] __kasan_check_write+0x20/0x30 [ 18.244002] kasan_atomics_helper+0x147c/0x4858 [ 18.244053] kasan_atomics+0x198/0x2e0 [ 18.244111] kunit_try_run_case+0x170/0x3f0 [ 18.244159] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.244213] kthread+0x328/0x630 [ 18.244258] ret_from_fork+0x10/0x20 [ 18.244307] [ 18.244337] Allocated by task 266: [ 18.244375] kasan_save_stack+0x3c/0x68 [ 18.244418] kasan_save_track+0x20/0x40 [ 18.244460] kasan_save_alloc_info+0x40/0x58 [ 18.244514] __kasan_kmalloc+0xd4/0xd8 [ 18.244953] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.245247] kasan_atomics+0xb8/0x2e0 [ 18.245300] kunit_try_run_case+0x170/0x3f0 [ 18.245492] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.245619] kthread+0x328/0x630 [ 18.245979] ret_from_fork+0x10/0x20 [ 18.246114] [ 18.246159] The buggy address belongs to the object at fff00000c63b4480 [ 18.246159] which belongs to the cache kmalloc-64 of size 64 [ 18.246228] The buggy address is located 0 bytes to the right of [ 18.246228] allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0) [ 18.246521] [ 18.246628] The buggy address belongs to the physical page: [ 18.246892] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4 [ 18.247167] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.247475] page_type: f5(slab) [ 18.247683] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.247954] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.248004] page dumped because: kasan: bad access detected [ 18.248345] [ 18.248523] Memory state around the buggy address: [ 18.248828] fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.249084] fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.249459] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.249642] ^ [ 18.249683] fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.249730] fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.250209] ================================================================== [ 18.052526] ================================================================== [ 18.052625] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 18.052747] Read of size 4 at addr fff00000c63b44b0 by task kunit_try_catch/266 [ 18.052802] [ 18.052832] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.053074] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.053351] Hardware name: linux,dummy-virt (DT) [ 18.053414] Call trace: [ 18.053573] show_stack+0x20/0x38 (C) [ 18.053636] dump_stack_lvl+0x8c/0xd0 [ 18.053735] print_report+0x118/0x5d0 [ 18.053974] kasan_report+0xdc/0x128 [ 18.054060] __asan_report_load4_noabort+0x20/0x30 [ 18.054125] kasan_atomics_helper+0x3dd8/0x4858 [ 18.054176] kasan_atomics+0x198/0x2e0 [ 18.054224] kunit_try_run_case+0x170/0x3f0 [ 18.054275] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.054629] kthread+0x328/0x630 [ 18.055151] ret_from_fork+0x10/0x20 [ 18.055259] [ 18.055615] Allocated by task 266: [ 18.055700] kasan_save_stack+0x3c/0x68 [ 18.055816] kasan_save_track+0x20/0x40 [ 18.055888] kasan_save_alloc_info+0x40/0x58 [ 18.055938] __kasan_kmalloc+0xd4/0xd8 [ 18.055999] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.056040] kasan_atomics+0xb8/0x2e0 [ 18.056079] kunit_try_run_case+0x170/0x3f0 [ 18.056125] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.056179] kthread+0x328/0x630 [ 18.056225] ret_from_fork+0x10/0x20 [ 18.056273] [ 18.056304] The buggy address belongs to the object at fff00000c63b4480 [ 18.056304] which belongs to the cache kmalloc-64 of size 64 [ 18.056372] The buggy address is located 0 bytes to the right of [ 18.056372] allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0) [ 18.056437] [ 18.056459] The buggy address belongs to the physical page: [ 18.056502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4 [ 18.056892] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.056997] page_type: f5(slab) [ 18.057061] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.057492] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.057620] page dumped because: kasan: bad access detected [ 18.057848] [ 18.057946] Memory state around the buggy address: [ 18.057984] fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.058293] fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.058487] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.058627] ^ [ 18.058886] fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.059099] fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.059195] ================================================================== [ 18.324851] ================================================================== [ 18.324904] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 18.324956] Read of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266 [ 18.325258] [ 18.325323] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.325418] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.325448] Hardware name: linux,dummy-virt (DT) [ 18.325863] Call trace: [ 18.326111] show_stack+0x20/0x38 (C) [ 18.326200] dump_stack_lvl+0x8c/0xd0 [ 18.326389] print_report+0x118/0x5d0 [ 18.326496] kasan_report+0xdc/0x128 [ 18.326705] __asan_report_load8_noabort+0x20/0x30 [ 18.326763] kasan_atomics_helper+0x3e20/0x4858 [ 18.326822] kasan_atomics+0x198/0x2e0 [ 18.327078] kunit_try_run_case+0x170/0x3f0 [ 18.327462] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.327775] kthread+0x328/0x630 [ 18.327934] ret_from_fork+0x10/0x20 [ 18.328023] [ 18.328051] Allocated by task 266: [ 18.328104] kasan_save_stack+0x3c/0x68 [ 18.328480] kasan_save_track+0x20/0x40 [ 18.328775] kasan_save_alloc_info+0x40/0x58 [ 18.328996] __kasan_kmalloc+0xd4/0xd8 [ 18.329094] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.329175] kasan_atomics+0xb8/0x2e0 [ 18.329403] kunit_try_run_case+0x170/0x3f0 [ 18.329609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.329695] kthread+0x328/0x630 [ 18.330107] ret_from_fork+0x10/0x20 [ 18.330271] [ 18.330333] The buggy address belongs to the object at fff00000c63b4480 [ 18.330333] which belongs to the cache kmalloc-64 of size 64 [ 18.330483] The buggy address is located 0 bytes to the right of [ 18.330483] allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0) [ 18.330566] [ 18.330588] The buggy address belongs to the physical page: [ 18.330802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4 [ 18.330921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.331541] page_type: f5(slab) [ 18.331629] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.331702] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.332044] page dumped because: kasan: bad access detected [ 18.332100] [ 18.332502] Memory state around the buggy address: [ 18.332578] fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.332627] fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.332893] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.333025] ^ [ 18.333303] fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.333528] fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.333589] ================================================================== [ 18.251139] ================================================================== [ 18.251398] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 18.251480] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266 [ 18.251550] [ 18.251709] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.251804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.252020] Hardware name: linux,dummy-virt (DT) [ 18.252253] Call trace: [ 18.252296] show_stack+0x20/0x38 (C) [ 18.252546] dump_stack_lvl+0x8c/0xd0 [ 18.252600] print_report+0x118/0x5d0 [ 18.252676] kasan_report+0xdc/0x128 [ 18.252773] kasan_check_range+0x100/0x1a8 [ 18.252851] __kasan_check_write+0x20/0x30 [ 18.252929] kasan_atomics_helper+0x14e4/0x4858 [ 18.252982] kasan_atomics+0x198/0x2e0 [ 18.253029] kunit_try_run_case+0x170/0x3f0 [ 18.253316] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.253395] kthread+0x328/0x630 [ 18.253449] ret_from_fork+0x10/0x20 [ 18.253865] [ 18.253968] Allocated by task 266: [ 18.254045] kasan_save_stack+0x3c/0x68 [ 18.254146] kasan_save_track+0x20/0x40 [ 18.254313] kasan_save_alloc_info+0x40/0x58 [ 18.254365] __kasan_kmalloc+0xd4/0xd8 [ 18.254581] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.254760] kasan_atomics+0xb8/0x2e0 [ 18.254839] kunit_try_run_case+0x170/0x3f0 [ 18.255179] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.255288] kthread+0x328/0x630 [ 18.255386] ret_from_fork+0x10/0x20 [ 18.255502] [ 18.255561] The buggy address belongs to the object at fff00000c63b4480 [ 18.255561] which belongs to the cache kmalloc-64 of size 64 [ 18.255627] The buggy address is located 0 bytes to the right of [ 18.255627] allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0) [ 18.256294] [ 18.256446] The buggy address belongs to the physical page: [ 18.256484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4 [ 18.256764] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.257141] page_type: f5(slab) [ 18.257193] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.257365] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.257761] page dumped because: kasan: bad access detected [ 18.258128] [ 18.258183] Memory state around the buggy address: [ 18.258222] fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.258271] fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.258317] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.258359] ^ [ 18.258394] fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.259083] fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.259203] ================================================================== [ 17.984798] ================================================================== [ 17.984860] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 17.984914] Write of size 4 at addr fff00000c63b44b0 by task kunit_try_catch/266 [ 17.984968] [ 17.985362] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.985466] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.985496] Hardware name: linux,dummy-virt (DT) [ 17.985540] Call trace: [ 17.985565] show_stack+0x20/0x38 (C) [ 17.985650] dump_stack_lvl+0x8c/0xd0 [ 17.985703] print_report+0x118/0x5d0 [ 17.986233] kasan_report+0xdc/0x128 [ 17.986302] kasan_check_range+0x100/0x1a8 [ 17.986525] __kasan_check_write+0x20/0x30 [ 17.986971] kasan_atomics_helper+0xa6c/0x4858 [ 17.987335] kasan_atomics+0x198/0x2e0 [ 17.987645] kunit_try_run_case+0x170/0x3f0 [ 17.987850] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.987944] kthread+0x328/0x630 [ 17.988022] ret_from_fork+0x10/0x20 [ 17.988564] [ 17.988590] Allocated by task 266: [ 17.988929] kasan_save_stack+0x3c/0x68 [ 17.989065] kasan_save_track+0x20/0x40 [ 17.989280] kasan_save_alloc_info+0x40/0x58 [ 17.989463] __kasan_kmalloc+0xd4/0xd8 [ 17.989905] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.990104] kasan_atomics+0xb8/0x2e0 [ 17.990176] kunit_try_run_case+0x170/0x3f0 [ 17.990371] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.990632] kthread+0x328/0x630 [ 17.990792] ret_from_fork+0x10/0x20 [ 17.991016] [ 17.991183] The buggy address belongs to the object at fff00000c63b4480 [ 17.991183] which belongs to the cache kmalloc-64 of size 64 [ 17.991360] The buggy address is located 0 bytes to the right of [ 17.991360] allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0) [ 17.991545] [ 17.991583] The buggy address belongs to the physical page: [ 17.991659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4 [ 17.991717] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.991766] page_type: f5(slab) [ 17.991808] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.991861] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.991903] page dumped because: kasan: bad access detected [ 17.991936] [ 17.991977] Memory state around the buggy address: [ 17.992012] fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.992056] fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.992100] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.992140] ^ [ 17.992186] fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.992232] fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.992271] ================================================================== [ 18.195763] ================================================================== [ 18.195831] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 18.195884] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266 [ 18.195938] [ 18.195974] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.196056] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.196508] Hardware name: linux,dummy-virt (DT) [ 18.196571] Call trace: [ 18.196600] show_stack+0x20/0x38 (C) [ 18.196934] dump_stack_lvl+0x8c/0xd0 [ 18.197393] print_report+0x118/0x5d0 [ 18.197590] kasan_report+0xdc/0x128 [ 18.197666] kasan_check_range+0x100/0x1a8 [ 18.197728] __kasan_check_write+0x20/0x30 [ 18.197873] kasan_atomics_helper+0x126c/0x4858 [ 18.197989] kasan_atomics+0x198/0x2e0 [ 18.198097] kunit_try_run_case+0x170/0x3f0 [ 18.198148] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.198209] kthread+0x328/0x630 [ 18.198511] ret_from_fork+0x10/0x20 [ 18.199139] [ 18.199229] Allocated by task 266: [ 18.199317] kasan_save_stack+0x3c/0x68 [ 18.199460] kasan_save_track+0x20/0x40 [ 18.199512] kasan_save_alloc_info+0x40/0x58 [ 18.199722] __kasan_kmalloc+0xd4/0xd8 [ 18.199937] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.200009] kasan_atomics+0xb8/0x2e0 [ 18.200214] kunit_try_run_case+0x170/0x3f0 [ 18.200425] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.200735] kthread+0x328/0x630 [ 18.200944] ret_from_fork+0x10/0x20 [ 18.201015] [ 18.201166] The buggy address belongs to the object at fff00000c63b4480 [ 18.201166] which belongs to the cache kmalloc-64 of size 64 [ 18.201593] The buggy address is located 0 bytes to the right of [ 18.201593] allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0) [ 18.201917] [ 18.202256] The buggy address belongs to the physical page: [ 18.202436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4 [ 18.202696] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.202846] page_type: f5(slab) [ 18.202892] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.202977] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.203041] page dumped because: kasan: bad access detected [ 18.203076] [ 18.203097] Memory state around the buggy address: [ 18.203143] fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.203199] fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.203246] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.203305] ^ [ 18.203342] fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.203386] fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.203425] ================================================================== [ 18.080934] ================================================================== [ 18.081179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 18.081262] Read of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266 [ 18.081324] [ 18.081357] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.081738] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.081843] Hardware name: linux,dummy-virt (DT) [ 18.082094] Call trace: [ 18.082224] show_stack+0x20/0x38 (C) [ 18.082400] dump_stack_lvl+0x8c/0xd0 [ 18.082505] print_report+0x118/0x5d0 [ 18.082597] kasan_report+0xdc/0x128 [ 18.083022] __asan_report_load8_noabort+0x20/0x30 [ 18.083318] kasan_atomics_helper+0x3f58/0x4858 [ 18.083643] kasan_atomics+0x198/0x2e0 [ 18.083769] kunit_try_run_case+0x170/0x3f0 [ 18.083894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.083974] kthread+0x328/0x630 [ 18.084187] ret_from_fork+0x10/0x20 [ 18.084491] [ 18.084545] Allocated by task 266: [ 18.084781] kasan_save_stack+0x3c/0x68 [ 18.084939] kasan_save_track+0x20/0x40 [ 18.085438] kasan_save_alloc_info+0x40/0x58 [ 18.085856] __kasan_kmalloc+0xd4/0xd8 [ 18.086056] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.086126] kasan_atomics+0xb8/0x2e0 [ 18.086205] kunit_try_run_case+0x170/0x3f0 [ 18.086615] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.086952] kthread+0x328/0x630 [ 18.087114] ret_from_fork+0x10/0x20 [ 18.087188] [ 18.087435] The buggy address belongs to the object at fff00000c63b4480 [ 18.087435] which belongs to the cache kmalloc-64 of size 64 [ 18.087746] The buggy address is located 0 bytes to the right of [ 18.087746] allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0) [ 18.087836] [ 18.087859] The buggy address belongs to the physical page: [ 18.088090] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4 [ 18.088315] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.088639] page_type: f5(slab) [ 18.088696] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.089045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.089263] page dumped because: kasan: bad access detected [ 18.089378] [ 18.089686] Memory state around the buggy address: [ 18.089893] fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.089958] fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.090037] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.090078] ^ [ 18.090327] fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.090831] fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.090993] ================================================================== [ 18.278438] ================================================================== [ 18.278486] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 18.278560] Read of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266 [ 18.279299] [ 18.279353] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.279448] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.279484] Hardware name: linux,dummy-virt (DT) [ 18.279518] Call trace: [ 18.279563] show_stack+0x20/0x38 (C) [ 18.279798] dump_stack_lvl+0x8c/0xd0 [ 18.279881] print_report+0x118/0x5d0 [ 18.279933] kasan_report+0xdc/0x128 [ 18.279986] __asan_report_load8_noabort+0x20/0x30 [ 18.280040] kasan_atomics_helper+0x3db0/0x4858 [ 18.280275] kasan_atomics+0x198/0x2e0 [ 18.280564] kunit_try_run_case+0x170/0x3f0 [ 18.280634] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.280690] kthread+0x328/0x630 [ 18.281111] ret_from_fork+0x10/0x20 [ 18.281189] [ 18.281376] Allocated by task 266: [ 18.281505] kasan_save_stack+0x3c/0x68 [ 18.281616] kasan_save_track+0x20/0x40 [ 18.281675] kasan_save_alloc_info+0x40/0x58 [ 18.281741] __kasan_kmalloc+0xd4/0xd8 [ 18.281963] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.282186] kasan_atomics+0xb8/0x2e0 [ 18.282268] kunit_try_run_case+0x170/0x3f0 [ 18.282646] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.282822] kthread+0x328/0x630 [ 18.282940] ret_from_fork+0x10/0x20 [ 18.283079] [ 18.283160] The buggy address belongs to the object at fff00000c63b4480 [ 18.283160] which belongs to the cache kmalloc-64 of size 64 [ 18.283248] The buggy address is located 0 bytes to the right of [ 18.283248] allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0) [ 18.283583] [ 18.283809] The buggy address belongs to the physical page: [ 18.284068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4 [ 18.284170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.284333] page_type: f5(slab) [ 18.284992] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.285124] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.285191] page dumped because: kasan: bad access detected [ 18.285226] [ 18.285246] Memory state around the buggy address: [ 18.285444] fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.285499] fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.285639] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.285709] ^ [ 18.286213] fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.286384] fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.286562] ================================================================== [ 17.947642] ================================================================== [ 17.947756] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 17.947980] Read of size 4 at addr fff00000c63b44b0 by task kunit_try_catch/266 [ 17.948353] [ 17.948417] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.948754] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.948830] Hardware name: linux,dummy-virt (DT) [ 17.948868] Call trace: [ 17.949040] show_stack+0x20/0x38 (C) [ 17.949108] dump_stack_lvl+0x8c/0xd0 [ 17.949568] print_report+0x118/0x5d0 [ 17.949828] kasan_report+0xdc/0x128 [ 17.950015] __asan_report_load4_noabort+0x20/0x30 [ 17.950175] kasan_atomics_helper+0x42d8/0x4858 [ 17.950229] kasan_atomics+0x198/0x2e0 [ 17.950277] kunit_try_run_case+0x170/0x3f0 [ 17.950517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.950788] kthread+0x328/0x630 [ 17.950942] ret_from_fork+0x10/0x20 [ 17.951078] [ 17.951101] Allocated by task 266: [ 17.951275] kasan_save_stack+0x3c/0x68 [ 17.951578] kasan_save_track+0x20/0x40 [ 17.951651] kasan_save_alloc_info+0x40/0x58 [ 17.951857] __kasan_kmalloc+0xd4/0xd8 [ 17.952193] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.952366] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.952588] The buggy address is located 0 bytes to the right of [ 17.952588] allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0) [ 17.952855] page_type: f5(slab) [ 17.953161] fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.953351] fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.957439] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.957727] Hardware name: linux,dummy-virt (DT) [ 17.957784] Call trace: [ 17.957885] show_stack+0x20/0x38 (C) [ 17.957957] dump_stack_lvl+0x8c/0xd0 [ 17.958013] print_report+0x118/0x5d0 [ 17.958062] kasan_report+0xdc/0x128 [ 17.958109] kasan_check_range+0x100/0x1a8 [ 17.958159] __kasan_check_write+0x20/0x30 [ 17.958421] kasan_atomics_helper+0x934/0x4858 [ 17.959222] kasan_atomics+0x198/0x2e0 [ 17.959467] kunit_try_run_case+0x170/0x3f0 [ 17.959679] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.959944] kthread+0x328/0x630 [ 17.960024] ret_from_fork+0x10/0x20 [ 17.960177] [ 17.960247] Allocated by task 266: [ 17.960484] kasan_save_stack+0x3c/0x68 [ 17.960578] kasan_save_track+0x20/0x40 [ 17.960758] kasan_save_alloc_info+0x40/0x58 [ 17.960829] __kasan_kmalloc+0xd4/0xd8 [ 17.960868] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.961082] kasan_atomics+0xb8/0x2e0 [ 17.961330] kunit_try_run_case+0x170/0x3f0 [ 17.961394] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.961603] kthread+0x328/0x630 [ 17.961961] ret_from_fork+0x10/0x20 [ 17.962169] [ 17.962246] The buggy address belongs to the object at fff00000c63b4480 [ 17.962246] which belongs to the cache kmalloc-64 of size 64 [ 17.962487] The buggy address is located 0 bytes to the right of [ 17.962487] allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0) [ 17.962572] [ 17.962725] The buggy address belongs to the physical page: [ 17.963156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4 [ 17.963255] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.963387] page_type: f5(slab) [ 17.963475] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.963861] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.963944] page dumped because: kasan: bad access detected [ 17.964101] [ 17.964169] Memory state around the buggy address: [ 17.964315] fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.964442] fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.964731] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.964975] ^ [ 17.965100] fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.965244] fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.965310] ================================================================== [ 18.074832] ================================================================== [ 18.074939] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 18.075136] Read of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266 [ 18.075230] [ 18.075275] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.075607] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.075787] Hardware name: linux,dummy-virt (DT) [ 18.075848] Call trace: [ 18.075961] show_stack+0x20/0x38 (C) [ 18.076091] dump_stack_lvl+0x8c/0xd0 [ 18.076186] print_report+0x118/0x5d0 [ 18.076253] kasan_report+0xdc/0x128 [ 18.076335] kasan_check_range+0x100/0x1a8 [ 18.076391] __kasan_check_read+0x20/0x30 [ 18.076437] kasan_atomics_helper+0xdd4/0x4858 [ 18.076489] kasan_atomics+0x198/0x2e0 [ 18.076555] kunit_try_run_case+0x170/0x3f0 [ 18.076603] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.076659] kthread+0x328/0x630 [ 18.076704] ret_from_fork+0x10/0x20 [ 18.076755] [ 18.076776] Allocated by task 266: [ 18.076806] kasan_save_stack+0x3c/0x68 [ 18.076852] kasan_save_track+0x20/0x40 [ 18.076892] kasan_save_alloc_info+0x40/0x58 [ 18.076934] __kasan_kmalloc+0xd4/0xd8 [ 18.076973] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.077016] kasan_atomics+0xb8/0x2e0 [ 18.077054] kunit_try_run_case+0x170/0x3f0 [ 18.077094] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.077139] kthread+0x328/0x630 [ 18.077174] ret_from_fork+0x10/0x20 [ 18.077211] [ 18.077233] The buggy address belongs to the object at fff00000c63b4480 [ 18.077233] which belongs to the cache kmalloc-64 of size 64 [ 18.077293] The buggy address is located 0 bytes to the right of [ 18.077293] allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0) [ 18.077358] [ 18.077381] The buggy address belongs to the physical page: [ 18.077414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4 [ 18.077477] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.077527] page_type: f5(slab) [ 18.077577] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.078134] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.078566] page dumped because: kasan: bad access detected [ 18.078677] [ 18.078801] Memory state around the buggy address: [ 18.078888] fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.079097] fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.079171] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.079412] ^ [ 18.079522] fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.079802] fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.079848] ================================================================== [ 18.060277] ================================================================== [ 18.060474] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 18.060570] Write of size 4 at addr fff00000c63b44b0 by task kunit_try_catch/266 [ 18.060630] [ 18.060696] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.060784] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.060812] Hardware name: linux,dummy-virt (DT) [ 18.061007] Call trace: [ 18.061142] show_stack+0x20/0x38 (C) [ 18.061220] dump_stack_lvl+0x8c/0xd0 [ 18.061311] print_report+0x118/0x5d0 [ 18.061362] kasan_report+0xdc/0x128 [ 18.061430] kasan_check_range+0x100/0x1a8 [ 18.061646] __kasan_check_write+0x20/0x30 [ 18.061737] kasan_atomics_helper+0xd3c/0x4858 [ 18.061848] kasan_atomics+0x198/0x2e0 [ 18.061943] kunit_try_run_case+0x170/0x3f0 [ 18.062115] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.062286] kthread+0x328/0x630 [ 18.062355] ret_from_fork+0x10/0x20 [ 18.062628] [ 18.062818] Allocated by task 266: [ 18.062939] kasan_save_stack+0x3c/0x68 [ 18.063028] kasan_save_track+0x20/0x40 [ 18.063438] kasan_save_alloc_info+0x40/0x58 [ 18.063489] __kasan_kmalloc+0xd4/0xd8 [ 18.063548] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.063589] kasan_atomics+0xb8/0x2e0 [ 18.063627] kunit_try_run_case+0x170/0x3f0 [ 18.063668] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.063714] kthread+0x328/0x630 [ 18.064098] ret_from_fork+0x10/0x20 [ 18.064165] [ 18.064190] The buggy address belongs to the object at fff00000c63b4480 [ 18.064190] which belongs to the cache kmalloc-64 of size 64 [ 18.064469] The buggy address is located 0 bytes to the right of [ 18.064469] allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0) [ 18.064757] [ 18.064818] The buggy address belongs to the physical page: [ 18.064994] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4 [ 18.065107] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.065158] page_type: f5(slab) [ 18.065198] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.065487] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.065699] page dumped because: kasan: bad access detected [ 18.065902] [ 18.065976] Memory state around the buggy address: [ 18.066118] fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.066257] fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.066396] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.066732] ^ [ 18.066843] fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.066902] fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.066942] ================================================================== [ 18.259991] ================================================================== [ 18.260111] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 18.260163] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266 [ 18.260216] [ 18.260249] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.260331] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.260360] Hardware name: linux,dummy-virt (DT) [ 18.260393] Call trace: [ 18.260416] show_stack+0x20/0x38 (C) [ 18.260596] dump_stack_lvl+0x8c/0xd0 [ 18.260659] print_report+0x118/0x5d0 [ 18.260712] kasan_report+0xdc/0x128 [ 18.260763] kasan_check_range+0x100/0x1a8 [ 18.260814] __kasan_check_write+0x20/0x30 [ 18.260859] kasan_atomics_helper+0x154c/0x4858 [ 18.260931] kasan_atomics+0x198/0x2e0 [ 18.260994] kunit_try_run_case+0x170/0x3f0 [ 18.261049] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.261111] kthread+0x328/0x630 [ 18.261165] ret_from_fork+0x10/0x20 [ 18.261213] [ 18.261234] Allocated by task 266: [ 18.261265] kasan_save_stack+0x3c/0x68 [ 18.261306] kasan_save_track+0x20/0x40 [ 18.261347] kasan_save_alloc_info+0x40/0x58 [ 18.261388] __kasan_kmalloc+0xd4/0xd8 [ 18.261427] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.261469] kasan_atomics+0xb8/0x2e0 [ 18.261506] kunit_try_run_case+0x170/0x3f0 [ 18.262334] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.262397] kthread+0x328/0x630 [ 18.262445] ret_from_fork+0x10/0x20 [ 18.262483] [ 18.262739] The buggy address belongs to the object at fff00000c63b4480 [ 18.262739] which belongs to the cache kmalloc-64 of size 64 [ 18.263464] The buggy address is located 0 bytes to the right of [ 18.263464] allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0) [ 18.263582] [ 18.263904] The buggy address belongs to the physical page: [ 18.263992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4 [ 18.264072] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.264742] page_type: f5(slab) [ 18.264816] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.265319] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.265374] page dumped because: kasan: bad access detected [ 18.265647] [ 18.265940] Memory state around the buggy address: [ 18.266260] fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.266658] fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.266862] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.267154] ^ [ 18.267201] fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.267615] fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.267960] ================================================================== [ 18.091621] ================================================================== [ 18.091673] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 18.091726] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266 [ 18.092053] [ 18.092309] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.092406] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.092859] Hardware name: linux,dummy-virt (DT) [ 18.092982] Call trace: [ 18.093016] show_stack+0x20/0x38 (C) [ 18.093069] dump_stack_lvl+0x8c/0xd0 [ 18.093165] print_report+0x118/0x5d0 [ 18.093216] kasan_report+0xdc/0x128 [ 18.093265] kasan_check_range+0x100/0x1a8 [ 18.093378] __kasan_check_write+0x20/0x30 [ 18.093437] kasan_atomics_helper+0xe44/0x4858 [ 18.093486] kasan_atomics+0x198/0x2e0 [ 18.093554] kunit_try_run_case+0x170/0x3f0 [ 18.093604] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.093665] kthread+0x328/0x630 [ 18.093987] ret_from_fork+0x10/0x20 [ 18.094588] [ 18.094900] Allocated by task 266: [ 18.094970] kasan_save_stack+0x3c/0x68 [ 18.095291] kasan_save_track+0x20/0x40 [ 18.095575] kasan_save_alloc_info+0x40/0x58 [ 18.095790] __kasan_kmalloc+0xd4/0xd8 [ 18.096587] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.096908] kasan_atomics+0xb8/0x2e0 [ 18.097065] kunit_try_run_case+0x170/0x3f0 [ 18.097271] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.097558] kthread+0x328/0x630 [ 18.097837] ret_from_fork+0x10/0x20 [ 18.098025] [ 18.098087] The buggy address belongs to the object at fff00000c63b4480 [ 18.098087] which belongs to the cache kmalloc-64 of size 64 [ 18.098202] The buggy address is located 0 bytes to the right of [ 18.098202] allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0) [ 18.098269] [ 18.098755] The buggy address belongs to the physical page: [ 18.098836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4 [ 18.099135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.099526] page_type: f5(slab) [ 18.099607] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.099816] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.099891] page dumped because: kasan: bad access detected [ 18.099926] [ 18.100068] Memory state around the buggy address: [ 18.100108] fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.100156] fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.100201] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.100241] ^ [ 18.100279] fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.100344] fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.100402] ================================================================== [ 18.120765] ================================================================== [ 18.121163] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 18.121234] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266 [ 18.121288] [ 18.121322] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.121404] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.121829] Hardware name: linux,dummy-virt (DT) [ 18.121884] Call trace: [ 18.121939] show_stack+0x20/0x38 (C) [ 18.122296] dump_stack_lvl+0x8c/0xd0 [ 18.122451] print_report+0x118/0x5d0 [ 18.122547] kasan_report+0xdc/0x128 [ 18.122874] kasan_check_range+0x100/0x1a8 [ 18.123025] __kasan_check_write+0x20/0x30 [ 18.123137] kasan_atomics_helper+0xf20/0x4858 [ 18.123215] kasan_atomics+0x198/0x2e0 [ 18.123347] kunit_try_run_case+0x170/0x3f0 [ 18.123398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.123828] kthread+0x328/0x630 [ 18.123904] ret_from_fork+0x10/0x20 [ 18.124383] [ 18.124441] Allocated by task 266: [ 18.124504] kasan_save_stack+0x3c/0x68 [ 18.124612] kasan_save_track+0x20/0x40 [ 18.124653] kasan_save_alloc_info+0x40/0x58 [ 18.125012] __kasan_kmalloc+0xd4/0xd8 [ 18.125242] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.125366] kasan_atomics+0xb8/0x2e0 [ 18.125703] kunit_try_run_case+0x170/0x3f0 [ 18.126133] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.126324] kthread+0x328/0x630 [ 18.126370] ret_from_fork+0x10/0x20 [ 18.126423] [ 18.126447] The buggy address belongs to the object at fff00000c63b4480 [ 18.126447] which belongs to the cache kmalloc-64 of size 64 [ 18.126728] The buggy address is located 0 bytes to the right of [ 18.126728] allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0) [ 18.127328] [ 18.127390] The buggy address belongs to the physical page: [ 18.127523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4 [ 18.127595] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.127831] page_type: f5(slab) [ 18.127965] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.128307] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.128450] page dumped because: kasan: bad access detected [ 18.128769] [ 18.129171] Memory state around the buggy address: [ 18.129248] fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.129305] fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.129478] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.129719] ^ [ 18.129912] fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.130416] fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.130488] ================================================================== [ 18.148202] ================================================================== [ 18.148443] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 18.148661] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266 [ 18.148897] [ 18.149180] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.149283] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.149340] Hardware name: linux,dummy-virt (DT) [ 18.149668] Call trace: [ 18.149898] show_stack+0x20/0x38 (C) [ 18.149967] dump_stack_lvl+0x8c/0xd0 [ 18.150015] print_report+0x118/0x5d0 [ 18.150271] kasan_report+0xdc/0x128 [ 18.150493] kasan_check_range+0x100/0x1a8 [ 18.150856] __kasan_check_write+0x20/0x30 [ 18.151082] kasan_atomics_helper+0x1058/0x4858 [ 18.151177] kasan_atomics+0x198/0x2e0 [ 18.151308] kunit_try_run_case+0x170/0x3f0 [ 18.151504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.151914] kthread+0x328/0x630 [ 18.152155] ret_from_fork+0x10/0x20 [ 18.152302] [ 18.152378] Allocated by task 266: [ 18.152455] kasan_save_stack+0x3c/0x68 [ 18.152501] kasan_save_track+0x20/0x40 [ 18.152740] kasan_save_alloc_info+0x40/0x58 [ 18.153345] __kasan_kmalloc+0xd4/0xd8 [ 18.153543] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.153617] kasan_atomics+0xb8/0x2e0 [ 18.153759] kunit_try_run_case+0x170/0x3f0 [ 18.153802] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.153848] kthread+0x328/0x630 [ 18.153912] ret_from_fork+0x10/0x20 [ 18.154254] [ 18.154548] The buggy address belongs to the object at fff00000c63b4480 [ 18.154548] which belongs to the cache kmalloc-64 of size 64 [ 18.154901] The buggy address is located 0 bytes to the right of [ 18.154901] allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0) [ 18.155306] [ 18.155397] The buggy address belongs to the physical page: [ 18.155516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4 [ 18.155907] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.155992] page_type: f5(slab) [ 18.156053] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.156338] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.156979] page dumped because: kasan: bad access detected [ 18.157228] [ 18.157387] Memory state around the buggy address: [ 18.157464] fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.157747] fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.157933] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.158159] ^ [ 18.158236] fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.158283] fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.158589] ================================================================== [ 18.185080] ================================================================== [ 18.185130] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 18.185179] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266 [ 18.185230] [ 18.185270] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.185353] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.185382] Hardware name: linux,dummy-virt (DT) [ 18.185413] Call trace: [ 18.185438] show_stack+0x20/0x38 (C) [ 18.185487] dump_stack_lvl+0x8c/0xd0 [ 18.185988] print_report+0x118/0x5d0 [ 18.186443] kasan_report+0xdc/0x128 [ 18.186554] kasan_check_range+0x100/0x1a8 [ 18.186643] __kasan_check_write+0x20/0x30 [ 18.186740] kasan_atomics_helper+0x11f8/0x4858 [ 18.186965] kasan_atomics+0x198/0x2e0 [ 18.187024] kunit_try_run_case+0x170/0x3f0 [ 18.187257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.187618] kthread+0x328/0x630 [ 18.187933] ret_from_fork+0x10/0x20 [ 18.188151] [ 18.188347] Allocated by task 266: [ 18.188570] kasan_save_stack+0x3c/0x68 [ 18.188652] kasan_save_track+0x20/0x40 [ 18.189041] kasan_save_alloc_info+0x40/0x58 [ 18.189124] __kasan_kmalloc+0xd4/0xd8 [ 18.189212] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.189354] kasan_atomics+0xb8/0x2e0 [ 18.189453] kunit_try_run_case+0x170/0x3f0 [ 18.189756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.190120] kthread+0x328/0x630 [ 18.190818] ret_from_fork+0x10/0x20 [ 18.191150] [ 18.191209] The buggy address belongs to the object at fff00000c63b4480 [ 18.191209] which belongs to the cache kmalloc-64 of size 64 [ 18.191346] The buggy address is located 0 bytes to the right of [ 18.191346] allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0) [ 18.191604] [ 18.192146] The buggy address belongs to the physical page: [ 18.192303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4 [ 18.192482] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.192674] page_type: f5(slab) [ 18.193041] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.193222] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.193351] page dumped because: kasan: bad access detected [ 18.193390] [ 18.193411] Memory state around the buggy address: [ 18.193682] fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.194133] fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.194290] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.194336] ^ [ 18.194374] fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.194425] fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.194598] ================================================================== [ 18.319186] ================================================================== [ 18.319415] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 18.319476] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266 [ 18.319735] [ 18.319879] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.319973] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.320022] Hardware name: linux,dummy-virt (DT) [ 18.320064] Call trace: [ 18.320098] show_stack+0x20/0x38 (C) [ 18.320152] dump_stack_lvl+0x8c/0xd0 [ 18.320209] print_report+0x118/0x5d0 [ 18.320267] kasan_report+0xdc/0x128 [ 18.320321] kasan_check_range+0x100/0x1a8 [ 18.320370] __kasan_check_write+0x20/0x30 [ 18.320416] kasan_atomics_helper+0x175c/0x4858 [ 18.320474] kasan_atomics+0x198/0x2e0 [ 18.320520] kunit_try_run_case+0x170/0x3f0 [ 18.320580] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.320634] kthread+0x328/0x630 [ 18.320676] ret_from_fork+0x10/0x20 [ 18.320734] [ 18.320755] Allocated by task 266: [ 18.320783] kasan_save_stack+0x3c/0x68 [ 18.320826] kasan_save_track+0x20/0x40 [ 18.320864] kasan_save_alloc_info+0x40/0x58 [ 18.320906] __kasan_kmalloc+0xd4/0xd8 [ 18.320944] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.320985] kasan_atomics+0xb8/0x2e0 [ 18.321023] kunit_try_run_case+0x170/0x3f0 [ 18.321063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.321110] kthread+0x328/0x630 [ 18.321144] ret_from_fork+0x10/0x20 [ 18.321180] [ 18.321201] The buggy address belongs to the object at fff00000c63b4480 [ 18.321201] which belongs to the cache kmalloc-64 of size 64 [ 18.321266] The buggy address is located 0 bytes to the right of [ 18.321266] allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0) [ 18.321334] [ 18.321356] The buggy address belongs to the physical page: [ 18.321389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4 [ 18.321441] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.321491] page_type: f5(slab) [ 18.321540] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.321615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.321660] page dumped because: kasan: bad access detected [ 18.321694] [ 18.321714] Memory state around the buggy address: [ 18.322588] fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.322660] fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.322731] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.322804] ^ [ 18.322843] fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.323863] fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.323963] ================================================================== [ 18.269476] ================================================================== [ 18.269996] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 18.270072] Write of size 8 at addr fff00000c63b44b0 by task kunit_try_catch/266 [ 18.270290] [ 18.270350] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.270448] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.270479] Hardware name: linux,dummy-virt (DT) [ 18.271129] Call trace: [ 18.271401] show_stack+0x20/0x38 (C) [ 18.271578] dump_stack_lvl+0x8c/0xd0 [ 18.271654] print_report+0x118/0x5d0 [ 18.271824] kasan_report+0xdc/0x128 [ 18.271876] kasan_check_range+0x100/0x1a8 [ 18.271953] __kasan_check_write+0x20/0x30 [ 18.272185] kasan_atomics_helper+0x15b4/0x4858 [ 18.272508] kasan_atomics+0x198/0x2e0 [ 18.272925] kunit_try_run_case+0x170/0x3f0 [ 18.273023] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.273449] kthread+0x328/0x630 [ 18.273739] ret_from_fork+0x10/0x20 [ 18.273997] [ 18.274069] Allocated by task 266: [ 18.274247] kasan_save_stack+0x3c/0x68 [ 18.274302] kasan_save_track+0x20/0x40 [ 18.274344] kasan_save_alloc_info+0x40/0x58 [ 18.274407] __kasan_kmalloc+0xd4/0xd8 [ 18.274455] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.274702] kasan_atomics+0xb8/0x2e0 [ 18.274996] kunit_try_run_case+0x170/0x3f0 [ 18.275202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.275599] kthread+0x328/0x630 [ 18.275717] ret_from_fork+0x10/0x20 [ 18.276164] [ 18.276471] The buggy address belongs to the object at fff00000c63b4480 [ 18.276471] which belongs to the cache kmalloc-64 of size 64 [ 18.276600] The buggy address is located 0 bytes to the right of [ 18.276600] allocated 48-byte region [fff00000c63b4480, fff00000c63b44b0) [ 18.276956] [ 18.277159] The buggy address belongs to the physical page: [ 18.277519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b4 [ 18.277603] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.277677] page_type: f5(slab) [ 18.277727] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.277791] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.277834] page dumped because: kasan: bad access detected [ 18.277878] [ 18.277907] Memory state around the buggy address: [ 18.277953] fff00000c63b4380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.278000] fff00000c63b4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.278055] >fff00000c63b4480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.278096] ^ [ 18.278140] fff00000c63b4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.278199] fff00000c63b4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.278238] ==================================================================
[ 15.776304] ================================================================== [ 15.776654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 15.776956] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.777287] [ 15.777402] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.777448] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.777460] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.777482] Call Trace: [ 15.777512] <TASK> [ 15.777530] dump_stack_lvl+0x73/0xb0 [ 15.777558] print_report+0xd1/0x610 [ 15.777582] ? __virt_addr_valid+0x1db/0x2d0 [ 15.777605] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.777627] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.777650] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.777672] kasan_report+0x141/0x180 [ 15.777695] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.777723] kasan_check_range+0x10c/0x1c0 [ 15.777747] __kasan_check_write+0x18/0x20 [ 15.777767] kasan_atomics_helper+0x1f43/0x5450 [ 15.777791] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.777814] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.777840] ? kasan_atomics+0x152/0x310 [ 15.777866] kasan_atomics+0x1dc/0x310 [ 15.777889] ? __pfx_kasan_atomics+0x10/0x10 [ 15.777912] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.777940] ? __pfx_read_tsc+0x10/0x10 [ 15.777961] ? ktime_get_ts64+0x86/0x230 [ 15.777988] kunit_try_run_case+0x1a5/0x480 [ 15.778013] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.778036] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.778060] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.778084] ? __kthread_parkme+0x82/0x180 [ 15.778106] ? preempt_count_sub+0x50/0x80 [ 15.778131] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.778155] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.778191] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.778222] kthread+0x337/0x6f0 [ 15.778242] ? trace_preempt_on+0x20/0xc0 [ 15.778268] ? __pfx_kthread+0x10/0x10 [ 15.778289] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.778312] ? calculate_sigpending+0x7b/0xa0 [ 15.778337] ? __pfx_kthread+0x10/0x10 [ 15.778359] ret_from_fork+0x116/0x1d0 [ 15.778379] ? __pfx_kthread+0x10/0x10 [ 15.778399] ret_from_fork_asm+0x1a/0x30 [ 15.778430] </TASK> [ 15.778441] [ 15.786144] Allocated by task 283: [ 15.786290] kasan_save_stack+0x45/0x70 [ 15.786492] kasan_save_track+0x18/0x40 [ 15.786663] kasan_save_alloc_info+0x3b/0x50 [ 15.786855] __kasan_kmalloc+0xb7/0xc0 [ 15.787035] __kmalloc_cache_noprof+0x189/0x420 [ 15.787294] kasan_atomics+0x95/0x310 [ 15.787474] kunit_try_run_case+0x1a5/0x480 [ 15.787667] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.787884] kthread+0x337/0x6f0 [ 15.788039] ret_from_fork+0x116/0x1d0 [ 15.788261] ret_from_fork_asm+0x1a/0x30 [ 15.788430] [ 15.788535] The buggy address belongs to the object at ffff8881039f9d00 [ 15.788535] which belongs to the cache kmalloc-64 of size 64 [ 15.788994] The buggy address is located 0 bytes to the right of [ 15.788994] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.789467] [ 15.789557] The buggy address belongs to the physical page: [ 15.789734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.789990] flags: 0x200000000000000(node=0|zone=2) [ 15.790176] page_type: f5(slab) [ 15.790360] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.790708] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.791046] page dumped because: kasan: bad access detected [ 15.791440] [ 15.791544] Memory state around the buggy address: [ 15.791771] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.792087] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.792644] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.792862] ^ [ 15.793020] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.793512] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.793835] ================================================================== [ 14.847039] ================================================================== [ 14.847813] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 14.848596] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 14.849278] [ 14.849526] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.849588] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.849601] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.849624] Call Trace: [ 14.849638] <TASK> [ 14.849657] dump_stack_lvl+0x73/0xb0 [ 14.849688] print_report+0xd1/0x610 [ 14.849711] ? __virt_addr_valid+0x1db/0x2d0 [ 14.849735] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.849757] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.849780] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.849803] kasan_report+0x141/0x180 [ 14.849826] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.849852] kasan_check_range+0x10c/0x1c0 [ 14.849877] __kasan_check_write+0x18/0x20 [ 14.849897] kasan_atomics_helper+0xa2b/0x5450 [ 14.849920] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.849943] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.849970] ? kasan_atomics+0x152/0x310 [ 14.849997] kasan_atomics+0x1dc/0x310 [ 14.850020] ? __pfx_kasan_atomics+0x10/0x10 [ 14.850043] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.850071] ? __pfx_read_tsc+0x10/0x10 [ 14.850093] ? ktime_get_ts64+0x86/0x230 [ 14.850119] kunit_try_run_case+0x1a5/0x480 [ 14.850145] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.850181] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.850212] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.850236] ? __kthread_parkme+0x82/0x180 [ 14.850258] ? preempt_count_sub+0x50/0x80 [ 14.850283] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.850308] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.850333] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.850359] kthread+0x337/0x6f0 [ 14.850378] ? trace_preempt_on+0x20/0xc0 [ 14.850404] ? __pfx_kthread+0x10/0x10 [ 14.850425] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.850447] ? calculate_sigpending+0x7b/0xa0 [ 14.850474] ? __pfx_kthread+0x10/0x10 [ 14.850506] ret_from_fork+0x116/0x1d0 [ 14.850527] ? __pfx_kthread+0x10/0x10 [ 14.850549] ret_from_fork_asm+0x1a/0x30 [ 14.850580] </TASK> [ 14.850592] [ 14.861198] Allocated by task 283: [ 14.861327] kasan_save_stack+0x45/0x70 [ 14.861469] kasan_save_track+0x18/0x40 [ 14.861613] kasan_save_alloc_info+0x3b/0x50 [ 14.861820] __kasan_kmalloc+0xb7/0xc0 [ 14.862010] __kmalloc_cache_noprof+0x189/0x420 [ 14.862254] kasan_atomics+0x95/0x310 [ 14.862593] kunit_try_run_case+0x1a5/0x480 [ 14.862806] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.863028] kthread+0x337/0x6f0 [ 14.863149] ret_from_fork+0x116/0x1d0 [ 14.863283] ret_from_fork_asm+0x1a/0x30 [ 14.863420] [ 14.863491] The buggy address belongs to the object at ffff8881039f9d00 [ 14.863491] which belongs to the cache kmalloc-64 of size 64 [ 14.863850] The buggy address is located 0 bytes to the right of [ 14.863850] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 14.864203] [ 14.864276] The buggy address belongs to the physical page: [ 14.864446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 14.864749] flags: 0x200000000000000(node=0|zone=2) [ 14.864955] page_type: f5(slab) [ 14.865087] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.865683] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.865988] page dumped because: kasan: bad access detected [ 14.866269] [ 14.866384] Memory state around the buggy address: [ 14.867286] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.867630] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.867892] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.868100] ^ [ 14.868251] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.868601] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.868942] ================================================================== [ 15.478811] ================================================================== [ 15.479373] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 15.479706] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.480005] [ 15.480116] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.480164] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.480176] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.480199] Call Trace: [ 15.480218] <TASK> [ 15.480236] dump_stack_lvl+0x73/0xb0 [ 15.480264] print_report+0xd1/0x610 [ 15.480287] ? __virt_addr_valid+0x1db/0x2d0 [ 15.480312] ? kasan_atomics_helper+0x1818/0x5450 [ 15.480334] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.480358] ? kasan_atomics_helper+0x1818/0x5450 [ 15.480381] kasan_report+0x141/0x180 [ 15.480403] ? kasan_atomics_helper+0x1818/0x5450 [ 15.480431] kasan_check_range+0x10c/0x1c0 [ 15.480455] __kasan_check_write+0x18/0x20 [ 15.480476] kasan_atomics_helper+0x1818/0x5450 [ 15.480508] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.480532] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.480558] ? kasan_atomics+0x152/0x310 [ 15.480585] kasan_atomics+0x1dc/0x310 [ 15.480608] ? __pfx_kasan_atomics+0x10/0x10 [ 15.480631] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.480659] ? __pfx_read_tsc+0x10/0x10 [ 15.480681] ? ktime_get_ts64+0x86/0x230 [ 15.480706] kunit_try_run_case+0x1a5/0x480 [ 15.480732] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.480756] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.480782] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.480807] ? __kthread_parkme+0x82/0x180 [ 15.480828] ? preempt_count_sub+0x50/0x80 [ 15.480854] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.480878] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.480904] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.480928] kthread+0x337/0x6f0 [ 15.480949] ? trace_preempt_on+0x20/0xc0 [ 15.480973] ? __pfx_kthread+0x10/0x10 [ 15.480994] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.481017] ? calculate_sigpending+0x7b/0xa0 [ 15.481042] ? __pfx_kthread+0x10/0x10 [ 15.481063] ret_from_fork+0x116/0x1d0 [ 15.481083] ? __pfx_kthread+0x10/0x10 [ 15.481104] ret_from_fork_asm+0x1a/0x30 [ 15.481135] </TASK> [ 15.481146] [ 15.488519] Allocated by task 283: [ 15.488699] kasan_save_stack+0x45/0x70 [ 15.488903] kasan_save_track+0x18/0x40 [ 15.489095] kasan_save_alloc_info+0x3b/0x50 [ 15.489296] __kasan_kmalloc+0xb7/0xc0 [ 15.489461] __kmalloc_cache_noprof+0x189/0x420 [ 15.489670] kasan_atomics+0x95/0x310 [ 15.489806] kunit_try_run_case+0x1a5/0x480 [ 15.489954] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.490152] kthread+0x337/0x6f0 [ 15.490335] ret_from_fork+0x116/0x1d0 [ 15.490536] ret_from_fork_asm+0x1a/0x30 [ 15.490736] [ 15.490832] The buggy address belongs to the object at ffff8881039f9d00 [ 15.490832] which belongs to the cache kmalloc-64 of size 64 [ 15.491466] The buggy address is located 0 bytes to the right of [ 15.491466] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.491958] [ 15.492032] The buggy address belongs to the physical page: [ 15.492345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.492694] flags: 0x200000000000000(node=0|zone=2) [ 15.492903] page_type: f5(slab) [ 15.493081] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.493363] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.493647] page dumped because: kasan: bad access detected [ 15.493897] [ 15.493996] Memory state around the buggy address: [ 15.494273] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.494507] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.494817] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.495131] ^ [ 15.495360] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.495630] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.495897] ================================================================== [ 15.609695] ================================================================== [ 15.610228] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 15.610779] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.611414] [ 15.611559] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.611607] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.611620] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.611643] Call Trace: [ 15.611662] <TASK> [ 15.611679] dump_stack_lvl+0x73/0xb0 [ 15.611711] print_report+0xd1/0x610 [ 15.611734] ? __virt_addr_valid+0x1db/0x2d0 [ 15.611758] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.611780] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.611804] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.611826] kasan_report+0x141/0x180 [ 15.611849] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.611875] kasan_check_range+0x10c/0x1c0 [ 15.611900] __kasan_check_write+0x18/0x20 [ 15.611920] kasan_atomics_helper+0x1b22/0x5450 [ 15.611944] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.611966] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.611992] ? kasan_atomics+0x152/0x310 [ 15.612021] kasan_atomics+0x1dc/0x310 [ 15.612044] ? __pfx_kasan_atomics+0x10/0x10 [ 15.612067] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.612095] ? __pfx_read_tsc+0x10/0x10 [ 15.612116] ? ktime_get_ts64+0x86/0x230 [ 15.612142] kunit_try_run_case+0x1a5/0x480 [ 15.612338] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.612366] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.612390] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.612415] ? __kthread_parkme+0x82/0x180 [ 15.612437] ? preempt_count_sub+0x50/0x80 [ 15.612505] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.612533] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.612559] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.612584] kthread+0x337/0x6f0 [ 15.612605] ? trace_preempt_on+0x20/0xc0 [ 15.612630] ? __pfx_kthread+0x10/0x10 [ 15.612651] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.612675] ? calculate_sigpending+0x7b/0xa0 [ 15.612700] ? __pfx_kthread+0x10/0x10 [ 15.612722] ret_from_fork+0x116/0x1d0 [ 15.612741] ? __pfx_kthread+0x10/0x10 [ 15.612762] ret_from_fork_asm+0x1a/0x30 [ 15.612794] </TASK> [ 15.612806] [ 15.624939] Allocated by task 283: [ 15.625130] kasan_save_stack+0x45/0x70 [ 15.625494] kasan_save_track+0x18/0x40 [ 15.625693] kasan_save_alloc_info+0x3b/0x50 [ 15.625876] __kasan_kmalloc+0xb7/0xc0 [ 15.626050] __kmalloc_cache_noprof+0x189/0x420 [ 15.626631] kasan_atomics+0x95/0x310 [ 15.626937] kunit_try_run_case+0x1a5/0x480 [ 15.627388] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.627820] kthread+0x337/0x6f0 [ 15.628058] ret_from_fork+0x116/0x1d0 [ 15.628362] ret_from_fork_asm+0x1a/0x30 [ 15.628572] [ 15.628666] The buggy address belongs to the object at ffff8881039f9d00 [ 15.628666] which belongs to the cache kmalloc-64 of size 64 [ 15.629136] The buggy address is located 0 bytes to the right of [ 15.629136] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.630090] [ 15.630223] The buggy address belongs to the physical page: [ 15.630679] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.631273] flags: 0x200000000000000(node=0|zone=2) [ 15.631637] page_type: f5(slab) [ 15.631927] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.632537] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.632960] page dumped because: kasan: bad access detected [ 15.633469] [ 15.633584] Memory state around the buggy address: [ 15.633802] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.634085] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.634787] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.635432] ^ [ 15.635908] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.636368] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.636650] ================================================================== [ 15.036307] ================================================================== [ 15.036622] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 15.036969] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.037370] [ 15.037520] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.037567] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.037579] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.037602] Call Trace: [ 15.037631] <TASK> [ 15.037649] dump_stack_lvl+0x73/0xb0 [ 15.037678] print_report+0xd1/0x610 [ 15.037713] ? __virt_addr_valid+0x1db/0x2d0 [ 15.037737] ? kasan_atomics_helper+0xf10/0x5450 [ 15.037759] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.037783] ? kasan_atomics_helper+0xf10/0x5450 [ 15.037806] kasan_report+0x141/0x180 [ 15.037828] ? kasan_atomics_helper+0xf10/0x5450 [ 15.037855] kasan_check_range+0x10c/0x1c0 [ 15.037879] __kasan_check_write+0x18/0x20 [ 15.037898] kasan_atomics_helper+0xf10/0x5450 [ 15.037922] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.037945] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.037971] ? kasan_atomics+0x152/0x310 [ 15.037998] kasan_atomics+0x1dc/0x310 [ 15.038021] ? __pfx_kasan_atomics+0x10/0x10 [ 15.038044] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.038071] ? __pfx_read_tsc+0x10/0x10 [ 15.038093] ? ktime_get_ts64+0x86/0x230 [ 15.038120] kunit_try_run_case+0x1a5/0x480 [ 15.038165] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.038189] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.038217] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.038241] ? __kthread_parkme+0x82/0x180 [ 15.038262] ? preempt_count_sub+0x50/0x80 [ 15.038295] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.038320] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.038344] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.038383] kthread+0x337/0x6f0 [ 15.038403] ? trace_preempt_on+0x20/0xc0 [ 15.038427] ? __pfx_kthread+0x10/0x10 [ 15.038459] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.038481] ? calculate_sigpending+0x7b/0xa0 [ 15.038515] ? __pfx_kthread+0x10/0x10 [ 15.038537] ret_from_fork+0x116/0x1d0 [ 15.038557] ? __pfx_kthread+0x10/0x10 [ 15.038578] ret_from_fork_asm+0x1a/0x30 [ 15.038609] </TASK> [ 15.038620] [ 15.046389] Allocated by task 283: [ 15.046578] kasan_save_stack+0x45/0x70 [ 15.046796] kasan_save_track+0x18/0x40 [ 15.046971] kasan_save_alloc_info+0x3b/0x50 [ 15.047196] __kasan_kmalloc+0xb7/0xc0 [ 15.047390] __kmalloc_cache_noprof+0x189/0x420 [ 15.047614] kasan_atomics+0x95/0x310 [ 15.047823] kunit_try_run_case+0x1a5/0x480 [ 15.048009] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.048299] kthread+0x337/0x6f0 [ 15.048444] ret_from_fork+0x116/0x1d0 [ 15.048671] ret_from_fork_asm+0x1a/0x30 [ 15.048873] [ 15.048964] The buggy address belongs to the object at ffff8881039f9d00 [ 15.048964] which belongs to the cache kmalloc-64 of size 64 [ 15.049463] The buggy address is located 0 bytes to the right of [ 15.049463] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.049989] [ 15.050067] The buggy address belongs to the physical page: [ 15.050391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.050773] flags: 0x200000000000000(node=0|zone=2) [ 15.050996] page_type: f5(slab) [ 15.051211] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.051821] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.052524] page dumped because: kasan: bad access detected [ 15.052713] [ 15.052787] Memory state around the buggy address: [ 15.052947] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.054057] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.054856] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.055493] ^ [ 15.055933] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.056584] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.057210] ================================================================== [ 15.524565] ================================================================== [ 15.525474] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 15.526634] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.527426] [ 15.527744] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.527798] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.527812] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.527835] Call Trace: [ 15.527856] <TASK> [ 15.527876] dump_stack_lvl+0x73/0xb0 [ 15.527908] print_report+0xd1/0x610 [ 15.527931] ? __virt_addr_valid+0x1db/0x2d0 [ 15.527956] ? kasan_atomics_helper+0x194a/0x5450 [ 15.527978] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.528002] ? kasan_atomics_helper+0x194a/0x5450 [ 15.528024] kasan_report+0x141/0x180 [ 15.528047] ? kasan_atomics_helper+0x194a/0x5450 [ 15.528074] kasan_check_range+0x10c/0x1c0 [ 15.528099] __kasan_check_write+0x18/0x20 [ 15.528119] kasan_atomics_helper+0x194a/0x5450 [ 15.528143] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.528276] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.528306] ? kasan_atomics+0x152/0x310 [ 15.528334] kasan_atomics+0x1dc/0x310 [ 15.528358] ? __pfx_kasan_atomics+0x10/0x10 [ 15.528381] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.528441] ? __pfx_read_tsc+0x10/0x10 [ 15.528465] ? ktime_get_ts64+0x86/0x230 [ 15.528491] kunit_try_run_case+0x1a5/0x480 [ 15.528525] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.528548] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.528572] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.528597] ? __kthread_parkme+0x82/0x180 [ 15.528619] ? preempt_count_sub+0x50/0x80 [ 15.528644] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.528669] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.528694] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.528719] kthread+0x337/0x6f0 [ 15.528739] ? trace_preempt_on+0x20/0xc0 [ 15.528763] ? __pfx_kthread+0x10/0x10 [ 15.528785] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.528807] ? calculate_sigpending+0x7b/0xa0 [ 15.528833] ? __pfx_kthread+0x10/0x10 [ 15.528855] ret_from_fork+0x116/0x1d0 [ 15.528875] ? __pfx_kthread+0x10/0x10 [ 15.528896] ret_from_fork_asm+0x1a/0x30 [ 15.528928] </TASK> [ 15.528939] [ 15.541549] Allocated by task 283: [ 15.541853] kasan_save_stack+0x45/0x70 [ 15.542046] kasan_save_track+0x18/0x40 [ 15.542528] kasan_save_alloc_info+0x3b/0x50 [ 15.542792] __kasan_kmalloc+0xb7/0xc0 [ 15.543087] __kmalloc_cache_noprof+0x189/0x420 [ 15.543453] kasan_atomics+0x95/0x310 [ 15.543639] kunit_try_run_case+0x1a5/0x480 [ 15.543831] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.544047] kthread+0x337/0x6f0 [ 15.544535] ret_from_fork+0x116/0x1d0 [ 15.544781] ret_from_fork_asm+0x1a/0x30 [ 15.545088] [ 15.545339] The buggy address belongs to the object at ffff8881039f9d00 [ 15.545339] which belongs to the cache kmalloc-64 of size 64 [ 15.546107] The buggy address is located 0 bytes to the right of [ 15.546107] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.546764] [ 15.546863] The buggy address belongs to the physical page: [ 15.547093] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.547857] flags: 0x200000000000000(node=0|zone=2) [ 15.548515] page_type: f5(slab) [ 15.548744] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.549402] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.549918] page dumped because: kasan: bad access detected [ 15.550427] [ 15.550550] Memory state around the buggy address: [ 15.550773] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.551036] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.551611] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.552103] ^ [ 15.552469] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.552784] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.553063] ================================================================== [ 15.950641] ================================================================== [ 15.951078] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 15.951304] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.951527] [ 15.951611] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.951671] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.951695] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.951717] Call Trace: [ 15.951736] <TASK> [ 15.951753] dump_stack_lvl+0x73/0xb0 [ 15.951797] print_report+0xd1/0x610 [ 15.951820] ? __virt_addr_valid+0x1db/0x2d0 [ 15.951843] ? kasan_atomics_helper+0x224c/0x5450 [ 15.951865] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.951888] ? kasan_atomics_helper+0x224c/0x5450 [ 15.951911] kasan_report+0x141/0x180 [ 15.951933] ? kasan_atomics_helper+0x224c/0x5450 [ 15.951960] kasan_check_range+0x10c/0x1c0 [ 15.951984] __kasan_check_write+0x18/0x20 [ 15.952003] kasan_atomics_helper+0x224c/0x5450 [ 15.952027] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.952050] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.952075] ? kasan_atomics+0x152/0x310 [ 15.952102] kasan_atomics+0x1dc/0x310 [ 15.952125] ? __pfx_kasan_atomics+0x10/0x10 [ 15.952147] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.952174] ? __pfx_read_tsc+0x10/0x10 [ 15.952195] ? ktime_get_ts64+0x86/0x230 [ 15.952220] kunit_try_run_case+0x1a5/0x480 [ 15.952244] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.952268] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.952291] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.952315] ? __kthread_parkme+0x82/0x180 [ 15.952336] ? preempt_count_sub+0x50/0x80 [ 15.952362] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.952387] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.952411] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.952436] kthread+0x337/0x6f0 [ 15.952456] ? trace_preempt_on+0x20/0xc0 [ 15.952480] ? __pfx_kthread+0x10/0x10 [ 15.952511] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.952534] ? calculate_sigpending+0x7b/0xa0 [ 15.952559] ? __pfx_kthread+0x10/0x10 [ 15.952580] ret_from_fork+0x116/0x1d0 [ 15.952599] ? __pfx_kthread+0x10/0x10 [ 15.952620] ret_from_fork_asm+0x1a/0x30 [ 15.952652] </TASK> [ 15.952663] [ 15.960581] Allocated by task 283: [ 15.960719] kasan_save_stack+0x45/0x70 [ 15.960938] kasan_save_track+0x18/0x40 [ 15.961134] kasan_save_alloc_info+0x3b/0x50 [ 15.961309] __kasan_kmalloc+0xb7/0xc0 [ 15.961458] __kmalloc_cache_noprof+0x189/0x420 [ 15.961697] kasan_atomics+0x95/0x310 [ 15.961879] kunit_try_run_case+0x1a5/0x480 [ 15.962089] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.962350] kthread+0x337/0x6f0 [ 15.962527] ret_from_fork+0x116/0x1d0 [ 15.962715] ret_from_fork_asm+0x1a/0x30 [ 15.962894] [ 15.962993] The buggy address belongs to the object at ffff8881039f9d00 [ 15.962993] which belongs to the cache kmalloc-64 of size 64 [ 15.963538] The buggy address is located 0 bytes to the right of [ 15.963538] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.964034] [ 15.964132] The buggy address belongs to the physical page: [ 15.964368] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.964626] flags: 0x200000000000000(node=0|zone=2) [ 15.964796] page_type: f5(slab) [ 15.964920] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.965155] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.965897] page dumped because: kasan: bad access detected [ 15.966144] [ 15.966276] Memory state around the buggy address: [ 15.966735] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.967316] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.967537] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.967750] ^ [ 15.967904] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.968118] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.968459] ================================================================== [ 15.887369] ================================================================== [ 15.887649] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 15.887913] Read of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.888672] [ 15.888852] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.888911] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.888924] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.888946] Call Trace: [ 15.888978] <TASK> [ 15.888997] dump_stack_lvl+0x73/0xb0 [ 15.889028] print_report+0xd1/0x610 [ 15.889060] ? __virt_addr_valid+0x1db/0x2d0 [ 15.889084] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.889105] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.889139] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.889162] kasan_report+0x141/0x180 [ 15.889195] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.889222] __asan_report_load8_noabort+0x18/0x20 [ 15.889247] kasan_atomics_helper+0x4fb2/0x5450 [ 15.889270] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.889293] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.889318] ? kasan_atomics+0x152/0x310 [ 15.889346] kasan_atomics+0x1dc/0x310 [ 15.889368] ? __pfx_kasan_atomics+0x10/0x10 [ 15.889391] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.889418] ? __pfx_read_tsc+0x10/0x10 [ 15.889439] ? ktime_get_ts64+0x86/0x230 [ 15.889465] kunit_try_run_case+0x1a5/0x480 [ 15.889490] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.889523] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.889555] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.889580] ? __kthread_parkme+0x82/0x180 [ 15.889600] ? preempt_count_sub+0x50/0x80 [ 15.889635] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.889660] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.889685] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.889711] kthread+0x337/0x6f0 [ 15.889732] ? trace_preempt_on+0x20/0xc0 [ 15.889759] ? __pfx_kthread+0x10/0x10 [ 15.889782] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.889804] ? calculate_sigpending+0x7b/0xa0 [ 15.889830] ? __pfx_kthread+0x10/0x10 [ 15.889851] ret_from_fork+0x116/0x1d0 [ 15.889871] ? __pfx_kthread+0x10/0x10 [ 15.889891] ret_from_fork_asm+0x1a/0x30 [ 15.889923] </TASK> [ 15.889934] [ 15.902977] Allocated by task 283: [ 15.903410] kasan_save_stack+0x45/0x70 [ 15.903818] kasan_save_track+0x18/0x40 [ 15.904216] kasan_save_alloc_info+0x3b/0x50 [ 15.904629] __kasan_kmalloc+0xb7/0xc0 [ 15.904985] __kmalloc_cache_noprof+0x189/0x420 [ 15.905388] kasan_atomics+0x95/0x310 [ 15.905560] kunit_try_run_case+0x1a5/0x480 [ 15.905709] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.905884] kthread+0x337/0x6f0 [ 15.906005] ret_from_fork+0x116/0x1d0 [ 15.906139] ret_from_fork_asm+0x1a/0x30 [ 15.906597] [ 15.906776] The buggy address belongs to the object at ffff8881039f9d00 [ 15.906776] which belongs to the cache kmalloc-64 of size 64 [ 15.907860] The buggy address is located 0 bytes to the right of [ 15.907860] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.908973] [ 15.909176] The buggy address belongs to the physical page: [ 15.909685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.910373] flags: 0x200000000000000(node=0|zone=2) [ 15.910559] page_type: f5(slab) [ 15.910685] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.910917] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.911146] page dumped because: kasan: bad access detected [ 15.911322] [ 15.911391] Memory state around the buggy address: [ 15.911669] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.912024] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.912388] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.912617] ^ [ 15.912840] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.913185] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.913642] ================================================================== [ 14.999334] ================================================================== [ 14.999908] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 15.000283] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.000634] [ 15.000748] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.000796] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.000819] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.000842] Call Trace: [ 15.000862] <TASK> [ 15.000880] dump_stack_lvl+0x73/0xb0 [ 15.000910] print_report+0xd1/0x610 [ 15.000943] ? __virt_addr_valid+0x1db/0x2d0 [ 15.000968] ? kasan_atomics_helper+0xde0/0x5450 [ 15.000990] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.001027] ? kasan_atomics_helper+0xde0/0x5450 [ 15.001050] kasan_report+0x141/0x180 [ 15.001073] ? kasan_atomics_helper+0xde0/0x5450 [ 15.001106] kasan_check_range+0x10c/0x1c0 [ 15.001131] __kasan_check_write+0x18/0x20 [ 15.001175] kasan_atomics_helper+0xde0/0x5450 [ 15.001199] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.001223] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.001249] ? kasan_atomics+0x152/0x310 [ 15.001277] kasan_atomics+0x1dc/0x310 [ 15.001301] ? __pfx_kasan_atomics+0x10/0x10 [ 15.001323] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.001351] ? __pfx_read_tsc+0x10/0x10 [ 15.001373] ? ktime_get_ts64+0x86/0x230 [ 15.001399] kunit_try_run_case+0x1a5/0x480 [ 15.001424] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.001448] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.001472] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.001504] ? __kthread_parkme+0x82/0x180 [ 15.001536] ? preempt_count_sub+0x50/0x80 [ 15.001561] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.001586] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.001621] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.001647] kthread+0x337/0x6f0 [ 15.001666] ? trace_preempt_on+0x20/0xc0 [ 15.001690] ? __pfx_kthread+0x10/0x10 [ 15.001711] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.001733] ? calculate_sigpending+0x7b/0xa0 [ 15.001759] ? __pfx_kthread+0x10/0x10 [ 15.001781] ret_from_fork+0x116/0x1d0 [ 15.001800] ? __pfx_kthread+0x10/0x10 [ 15.001821] ret_from_fork_asm+0x1a/0x30 [ 15.001853] </TASK> [ 15.001865] [ 15.009785] Allocated by task 283: [ 15.009971] kasan_save_stack+0x45/0x70 [ 15.010173] kasan_save_track+0x18/0x40 [ 15.010384] kasan_save_alloc_info+0x3b/0x50 [ 15.010581] __kasan_kmalloc+0xb7/0xc0 [ 15.010785] __kmalloc_cache_noprof+0x189/0x420 [ 15.010988] kasan_atomics+0x95/0x310 [ 15.011222] kunit_try_run_case+0x1a5/0x480 [ 15.011371] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.011597] kthread+0x337/0x6f0 [ 15.011775] ret_from_fork+0x116/0x1d0 [ 15.011961] ret_from_fork_asm+0x1a/0x30 [ 15.012179] [ 15.012276] The buggy address belongs to the object at ffff8881039f9d00 [ 15.012276] which belongs to the cache kmalloc-64 of size 64 [ 15.012788] The buggy address is located 0 bytes to the right of [ 15.012788] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.013215] [ 15.013289] The buggy address belongs to the physical page: [ 15.013464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.013827] flags: 0x200000000000000(node=0|zone=2) [ 15.014062] page_type: f5(slab) [ 15.014276] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.014625] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.014894] page dumped because: kasan: bad access detected [ 15.015071] [ 15.015161] Memory state around the buggy address: [ 15.015423] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.015754] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.016095] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.016436] ^ [ 15.016660] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.016980] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.017313] ================================================================== [ 14.646841] ================================================================== [ 14.647370] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 14.647808] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 14.648242] [ 14.648349] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.648396] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.648409] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.648431] Call Trace: [ 14.648451] <TASK> [ 14.648489] dump_stack_lvl+0x73/0xb0 [ 14.648535] print_report+0xd1/0x610 [ 14.648558] ? __virt_addr_valid+0x1db/0x2d0 [ 14.648583] ? kasan_atomics_helper+0x565/0x5450 [ 14.648604] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.648628] ? kasan_atomics_helper+0x565/0x5450 [ 14.648669] kasan_report+0x141/0x180 [ 14.648691] ? kasan_atomics_helper+0x565/0x5450 [ 14.648718] kasan_check_range+0x10c/0x1c0 [ 14.648742] __kasan_check_write+0x18/0x20 [ 14.648763] kasan_atomics_helper+0x565/0x5450 [ 14.648787] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.648826] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.648853] ? kasan_atomics+0x152/0x310 [ 14.648880] kasan_atomics+0x1dc/0x310 [ 14.648903] ? __pfx_kasan_atomics+0x10/0x10 [ 14.648925] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.648953] ? __pfx_read_tsc+0x10/0x10 [ 14.648975] ? ktime_get_ts64+0x86/0x230 [ 14.649001] kunit_try_run_case+0x1a5/0x480 [ 14.649026] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.649061] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.649085] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.649109] ? __kthread_parkme+0x82/0x180 [ 14.649131] ? preempt_count_sub+0x50/0x80 [ 14.649246] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.649273] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.649299] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.649345] kthread+0x337/0x6f0 [ 14.649366] ? trace_preempt_on+0x20/0xc0 [ 14.649405] ? __pfx_kthread+0x10/0x10 [ 14.649439] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.649462] ? calculate_sigpending+0x7b/0xa0 [ 14.649511] ? __pfx_kthread+0x10/0x10 [ 14.649547] ret_from_fork+0x116/0x1d0 [ 14.649580] ? __pfx_kthread+0x10/0x10 [ 14.649602] ret_from_fork_asm+0x1a/0x30 [ 14.649661] </TASK> [ 14.649672] [ 14.659306] Allocated by task 283: [ 14.659520] kasan_save_stack+0x45/0x70 [ 14.659735] kasan_save_track+0x18/0x40 [ 14.659953] kasan_save_alloc_info+0x3b/0x50 [ 14.660238] __kasan_kmalloc+0xb7/0xc0 [ 14.660387] __kmalloc_cache_noprof+0x189/0x420 [ 14.660564] kasan_atomics+0x95/0x310 [ 14.660782] kunit_try_run_case+0x1a5/0x480 [ 14.661003] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.661489] kthread+0x337/0x6f0 [ 14.661692] ret_from_fork+0x116/0x1d0 [ 14.661883] ret_from_fork_asm+0x1a/0x30 [ 14.662052] [ 14.662150] The buggy address belongs to the object at ffff8881039f9d00 [ 14.662150] which belongs to the cache kmalloc-64 of size 64 [ 14.662683] The buggy address is located 0 bytes to the right of [ 14.662683] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 14.663275] [ 14.663370] The buggy address belongs to the physical page: [ 14.663935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 14.664348] flags: 0x200000000000000(node=0|zone=2) [ 14.664605] page_type: f5(slab) [ 14.664763] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.665116] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.665454] page dumped because: kasan: bad access detected [ 14.665786] [ 14.665883] Memory state around the buggy address: [ 14.666634] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.666944] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.667827] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.668304] ^ [ 14.668758] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.669354] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.669766] ================================================================== [ 15.739143] ================================================================== [ 15.739715] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 15.740375] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.740704] [ 15.740851] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.740898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.740910] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.740932] Call Trace: [ 15.740950] <TASK> [ 15.740967] dump_stack_lvl+0x73/0xb0 [ 15.740995] print_report+0xd1/0x610 [ 15.741018] ? __virt_addr_valid+0x1db/0x2d0 [ 15.741042] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.741063] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.741087] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.741109] kasan_report+0x141/0x180 [ 15.741132] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.741159] kasan_check_range+0x10c/0x1c0 [ 15.741184] __kasan_check_write+0x18/0x20 [ 15.741204] kasan_atomics_helper+0x1e12/0x5450 [ 15.741227] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.741250] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.741276] ? kasan_atomics+0x152/0x310 [ 15.741303] kasan_atomics+0x1dc/0x310 [ 15.741326] ? __pfx_kasan_atomics+0x10/0x10 [ 15.741348] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.741375] ? __pfx_read_tsc+0x10/0x10 [ 15.741397] ? ktime_get_ts64+0x86/0x230 [ 15.741422] kunit_try_run_case+0x1a5/0x480 [ 15.741447] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.741471] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.741494] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.741531] ? __kthread_parkme+0x82/0x180 [ 15.741552] ? preempt_count_sub+0x50/0x80 [ 15.741577] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.741602] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.741627] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.741652] kthread+0x337/0x6f0 [ 15.741672] ? trace_preempt_on+0x20/0xc0 [ 15.741697] ? __pfx_kthread+0x10/0x10 [ 15.741717] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.741740] ? calculate_sigpending+0x7b/0xa0 [ 15.741765] ? __pfx_kthread+0x10/0x10 [ 15.741787] ret_from_fork+0x116/0x1d0 [ 15.741807] ? __pfx_kthread+0x10/0x10 [ 15.741827] ret_from_fork_asm+0x1a/0x30 [ 15.741858] </TASK> [ 15.741869] [ 15.749871] Allocated by task 283: [ 15.750069] kasan_save_stack+0x45/0x70 [ 15.750310] kasan_save_track+0x18/0x40 [ 15.750456] kasan_save_alloc_info+0x3b/0x50 [ 15.750619] __kasan_kmalloc+0xb7/0xc0 [ 15.750768] __kmalloc_cache_noprof+0x189/0x420 [ 15.750940] kasan_atomics+0x95/0x310 [ 15.751082] kunit_try_run_case+0x1a5/0x480 [ 15.751406] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.751729] kthread+0x337/0x6f0 [ 15.752002] ret_from_fork+0x116/0x1d0 [ 15.752412] ret_from_fork_asm+0x1a/0x30 [ 15.752852] [ 15.752950] The buggy address belongs to the object at ffff8881039f9d00 [ 15.752950] which belongs to the cache kmalloc-64 of size 64 [ 15.753394] The buggy address is located 0 bytes to the right of [ 15.753394] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.753769] [ 15.753842] The buggy address belongs to the physical page: [ 15.754016] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.754270] flags: 0x200000000000000(node=0|zone=2) [ 15.754438] page_type: f5(slab) [ 15.754575] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.754989] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.755460] page dumped because: kasan: bad access detected [ 15.755896] [ 15.755989] Memory state around the buggy address: [ 15.756210] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.756530] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.756789] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.757004] ^ [ 15.757158] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.757372] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.757593] ================================================================== [ 15.309919] ================================================================== [ 15.310275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 15.310779] Read of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.311016] [ 15.311131] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.311199] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.311212] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.311235] Call Trace: [ 15.311254] <TASK> [ 15.311274] dump_stack_lvl+0x73/0xb0 [ 15.311303] print_report+0xd1/0x610 [ 15.311325] ? __virt_addr_valid+0x1db/0x2d0 [ 15.311349] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.311371] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.311411] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.311434] kasan_report+0x141/0x180 [ 15.311456] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.311483] __asan_report_load8_noabort+0x18/0x20 [ 15.311518] kasan_atomics_helper+0x4eae/0x5450 [ 15.311567] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.311591] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.311618] ? kasan_atomics+0x152/0x310 [ 15.311645] kasan_atomics+0x1dc/0x310 [ 15.311668] ? __pfx_kasan_atomics+0x10/0x10 [ 15.311691] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.311719] ? __pfx_read_tsc+0x10/0x10 [ 15.311741] ? ktime_get_ts64+0x86/0x230 [ 15.311767] kunit_try_run_case+0x1a5/0x480 [ 15.311794] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.311817] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.311840] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.311865] ? __kthread_parkme+0x82/0x180 [ 15.311887] ? preempt_count_sub+0x50/0x80 [ 15.311913] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.311937] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.311964] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.311989] kthread+0x337/0x6f0 [ 15.312008] ? trace_preempt_on+0x20/0xc0 [ 15.312039] ? __pfx_kthread+0x10/0x10 [ 15.312059] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.312081] ? calculate_sigpending+0x7b/0xa0 [ 15.312106] ? __pfx_kthread+0x10/0x10 [ 15.312128] ret_from_fork+0x116/0x1d0 [ 15.312147] ? __pfx_kthread+0x10/0x10 [ 15.312168] ret_from_fork_asm+0x1a/0x30 [ 15.312200] </TASK> [ 15.312211] [ 15.319621] Allocated by task 283: [ 15.319750] kasan_save_stack+0x45/0x70 [ 15.319897] kasan_save_track+0x18/0x40 [ 15.320035] kasan_save_alloc_info+0x3b/0x50 [ 15.320226] __kasan_kmalloc+0xb7/0xc0 [ 15.320416] __kmalloc_cache_noprof+0x189/0x420 [ 15.320644] kasan_atomics+0x95/0x310 [ 15.320831] kunit_try_run_case+0x1a5/0x480 [ 15.321039] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.321315] kthread+0x337/0x6f0 [ 15.321483] ret_from_fork+0x116/0x1d0 [ 15.321636] ret_from_fork_asm+0x1a/0x30 [ 15.321837] [ 15.321934] The buggy address belongs to the object at ffff8881039f9d00 [ 15.321934] which belongs to the cache kmalloc-64 of size 64 [ 15.322425] The buggy address is located 0 bytes to the right of [ 15.322425] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.322891] [ 15.322965] The buggy address belongs to the physical page: [ 15.323141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.323477] flags: 0x200000000000000(node=0|zone=2) [ 15.323729] page_type: f5(slab) [ 15.323907] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.324284] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.324647] page dumped because: kasan: bad access detected [ 15.324874] [ 15.324969] Memory state around the buggy address: [ 15.325131] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.325372] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.325601] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.325816] ^ [ 15.325972] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.326330] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.326655] ================================================================== [ 15.344915] ================================================================== [ 15.345310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 15.345605] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.345899] [ 15.346053] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.346098] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.346110] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.346132] Call Trace: [ 15.346171] <TASK> [ 15.346188] dump_stack_lvl+0x73/0xb0 [ 15.346222] print_report+0xd1/0x610 [ 15.346244] ? __virt_addr_valid+0x1db/0x2d0 [ 15.346268] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.346290] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.346314] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.346336] kasan_report+0x141/0x180 [ 15.346358] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.346385] __asan_report_store8_noabort+0x1b/0x30 [ 15.346421] kasan_atomics_helper+0x50d4/0x5450 [ 15.346444] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.346467] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.346493] ? kasan_atomics+0x152/0x310 [ 15.346529] kasan_atomics+0x1dc/0x310 [ 15.346553] ? __pfx_kasan_atomics+0x10/0x10 [ 15.346575] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.346603] ? __pfx_read_tsc+0x10/0x10 [ 15.346624] ? ktime_get_ts64+0x86/0x230 [ 15.346649] kunit_try_run_case+0x1a5/0x480 [ 15.346675] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.346698] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.346721] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.346746] ? __kthread_parkme+0x82/0x180 [ 15.346767] ? preempt_count_sub+0x50/0x80 [ 15.346791] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.346815] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.346840] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.346864] kthread+0x337/0x6f0 [ 15.346884] ? trace_preempt_on+0x20/0xc0 [ 15.346908] ? __pfx_kthread+0x10/0x10 [ 15.346929] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.346950] ? calculate_sigpending+0x7b/0xa0 [ 15.346976] ? __pfx_kthread+0x10/0x10 [ 15.346998] ret_from_fork+0x116/0x1d0 [ 15.347018] ? __pfx_kthread+0x10/0x10 [ 15.347039] ret_from_fork_asm+0x1a/0x30 [ 15.347070] </TASK> [ 15.347081] [ 15.354454] Allocated by task 283: [ 15.354644] kasan_save_stack+0x45/0x70 [ 15.354823] kasan_save_track+0x18/0x40 [ 15.354984] kasan_save_alloc_info+0x3b/0x50 [ 15.355136] __kasan_kmalloc+0xb7/0xc0 [ 15.355289] __kmalloc_cache_noprof+0x189/0x420 [ 15.355447] kasan_atomics+0x95/0x310 [ 15.355593] kunit_try_run_case+0x1a5/0x480 [ 15.355743] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.355920] kthread+0x337/0x6f0 [ 15.356040] ret_from_fork+0x116/0x1d0 [ 15.356193] ret_from_fork_asm+0x1a/0x30 [ 15.356336] [ 15.356409] The buggy address belongs to the object at ffff8881039f9d00 [ 15.356409] which belongs to the cache kmalloc-64 of size 64 [ 15.356929] The buggy address is located 0 bytes to the right of [ 15.356929] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.357508] [ 15.357605] The buggy address belongs to the physical page: [ 15.357854] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.358238] flags: 0x200000000000000(node=0|zone=2) [ 15.358474] page_type: f5(slab) [ 15.358650] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.358913] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.359162] page dumped because: kasan: bad access detected [ 15.359337] [ 15.359407] Memory state around the buggy address: [ 15.359606] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.359926] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.360267] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.360590] ^ [ 15.360813] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.361133] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.361450] ================================================================== [ 15.664993] ================================================================== [ 15.665558] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 15.665869] Read of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.666459] [ 15.666848] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.667010] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.667029] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.667052] Call Trace: [ 15.667074] <TASK> [ 15.667094] dump_stack_lvl+0x73/0xb0 [ 15.667161] print_report+0xd1/0x610 [ 15.667186] ? __virt_addr_valid+0x1db/0x2d0 [ 15.667210] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.667232] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.667256] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.667279] kasan_report+0x141/0x180 [ 15.667301] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.667330] __asan_report_load8_noabort+0x18/0x20 [ 15.667356] kasan_atomics_helper+0x4f30/0x5450 [ 15.667381] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.667405] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.667434] ? kasan_atomics+0x152/0x310 [ 15.667461] kasan_atomics+0x1dc/0x310 [ 15.667485] ? __pfx_kasan_atomics+0x10/0x10 [ 15.667518] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.667546] ? __pfx_read_tsc+0x10/0x10 [ 15.667569] ? ktime_get_ts64+0x86/0x230 [ 15.667594] kunit_try_run_case+0x1a5/0x480 [ 15.667620] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.667643] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.667667] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.667691] ? __kthread_parkme+0x82/0x180 [ 15.667712] ? preempt_count_sub+0x50/0x80 [ 15.667737] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.667762] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.667787] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.667811] kthread+0x337/0x6f0 [ 15.667831] ? trace_preempt_on+0x20/0xc0 [ 15.667855] ? __pfx_kthread+0x10/0x10 [ 15.667876] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.667898] ? calculate_sigpending+0x7b/0xa0 [ 15.667924] ? __pfx_kthread+0x10/0x10 [ 15.667946] ret_from_fork+0x116/0x1d0 [ 15.667966] ? __pfx_kthread+0x10/0x10 [ 15.667986] ret_from_fork_asm+0x1a/0x30 [ 15.668018] </TASK> [ 15.668030] [ 15.679345] Allocated by task 283: [ 15.679730] kasan_save_stack+0x45/0x70 [ 15.680050] kasan_save_track+0x18/0x40 [ 15.680489] kasan_save_alloc_info+0x3b/0x50 [ 15.680754] __kasan_kmalloc+0xb7/0xc0 [ 15.681042] __kmalloc_cache_noprof+0x189/0x420 [ 15.681550] kasan_atomics+0x95/0x310 [ 15.681780] kunit_try_run_case+0x1a5/0x480 [ 15.681974] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.682440] kthread+0x337/0x6f0 [ 15.682688] ret_from_fork+0x116/0x1d0 [ 15.682987] ret_from_fork_asm+0x1a/0x30 [ 15.683308] [ 15.683400] The buggy address belongs to the object at ffff8881039f9d00 [ 15.683400] which belongs to the cache kmalloc-64 of size 64 [ 15.684066] The buggy address is located 0 bytes to the right of [ 15.684066] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.685225] [ 15.685462] The buggy address belongs to the physical page: [ 15.685885] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.686592] flags: 0x200000000000000(node=0|zone=2) [ 15.686899] page_type: f5(slab) [ 15.687339] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.687689] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.687989] page dumped because: kasan: bad access detected [ 15.688518] [ 15.688603] Memory state around the buggy address: [ 15.689004] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.689532] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.690011] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.690485] ^ [ 15.690715] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.690985] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.691702] ================================================================== [ 15.362114] ================================================================== [ 15.362516] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 15.362824] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.363163] [ 15.363263] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.363308] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.363321] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.363343] Call Trace: [ 15.363361] <TASK> [ 15.363378] dump_stack_lvl+0x73/0xb0 [ 15.363408] print_report+0xd1/0x610 [ 15.363431] ? __virt_addr_valid+0x1db/0x2d0 [ 15.363454] ? kasan_atomics_helper+0x151d/0x5450 [ 15.363476] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.363509] ? kasan_atomics_helper+0x151d/0x5450 [ 15.363533] kasan_report+0x141/0x180 [ 15.363555] ? kasan_atomics_helper+0x151d/0x5450 [ 15.363582] kasan_check_range+0x10c/0x1c0 [ 15.363606] __kasan_check_write+0x18/0x20 [ 15.363626] kasan_atomics_helper+0x151d/0x5450 [ 15.363649] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.363673] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.363699] ? kasan_atomics+0x152/0x310 [ 15.363726] kasan_atomics+0x1dc/0x310 [ 15.363749] ? __pfx_kasan_atomics+0x10/0x10 [ 15.363771] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.363799] ? __pfx_read_tsc+0x10/0x10 [ 15.363821] ? ktime_get_ts64+0x86/0x230 [ 15.363847] kunit_try_run_case+0x1a5/0x480 [ 15.363873] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.363895] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.363918] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.363942] ? __kthread_parkme+0x82/0x180 [ 15.363963] ? preempt_count_sub+0x50/0x80 [ 15.363987] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.364011] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.364036] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.364061] kthread+0x337/0x6f0 [ 15.364080] ? trace_preempt_on+0x20/0xc0 [ 15.364104] ? __pfx_kthread+0x10/0x10 [ 15.364125] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.364167] ? calculate_sigpending+0x7b/0xa0 [ 15.364193] ? __pfx_kthread+0x10/0x10 [ 15.364214] ret_from_fork+0x116/0x1d0 [ 15.364235] ? __pfx_kthread+0x10/0x10 [ 15.364256] ret_from_fork_asm+0x1a/0x30 [ 15.364287] </TASK> [ 15.364297] [ 15.371759] Allocated by task 283: [ 15.371916] kasan_save_stack+0x45/0x70 [ 15.372061] kasan_save_track+0x18/0x40 [ 15.372224] kasan_save_alloc_info+0x3b/0x50 [ 15.372377] __kasan_kmalloc+0xb7/0xc0 [ 15.373523] __kmalloc_cache_noprof+0x189/0x420 [ 15.373773] kasan_atomics+0x95/0x310 [ 15.373967] kunit_try_run_case+0x1a5/0x480 [ 15.374222] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.374479] kthread+0x337/0x6f0 [ 15.374660] ret_from_fork+0x116/0x1d0 [ 15.374850] ret_from_fork_asm+0x1a/0x30 [ 15.375052] [ 15.375151] The buggy address belongs to the object at ffff8881039f9d00 [ 15.375151] which belongs to the cache kmalloc-64 of size 64 [ 15.375698] The buggy address is located 0 bytes to the right of [ 15.375698] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.376073] [ 15.376143] The buggy address belongs to the physical page: [ 15.376311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.377991] flags: 0x200000000000000(node=0|zone=2) [ 15.378957] page_type: f5(slab) [ 15.379506] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.380367] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.381255] page dumped because: kasan: bad access detected [ 15.381786] [ 15.382144] Memory state around the buggy address: [ 15.382811] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.383690] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.384379] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.384615] ^ [ 15.384774] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.384990] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.385703] ================================================================== [ 15.264730] ================================================================== [ 15.265096] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 15.265446] Read of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.265719] [ 15.265827] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.265871] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.265883] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.265905] Call Trace: [ 15.265922] <TASK> [ 15.265939] dump_stack_lvl+0x73/0xb0 [ 15.265967] print_report+0xd1/0x610 [ 15.265989] ? __virt_addr_valid+0x1db/0x2d0 [ 15.266011] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.266034] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.266058] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.266080] kasan_report+0x141/0x180 [ 15.266103] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.266129] __asan_report_load4_noabort+0x18/0x20 [ 15.266175] kasan_atomics_helper+0x49ce/0x5450 [ 15.266204] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.266227] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.266252] ? kasan_atomics+0x152/0x310 [ 15.266278] kasan_atomics+0x1dc/0x310 [ 15.266301] ? __pfx_kasan_atomics+0x10/0x10 [ 15.266324] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.266351] ? __pfx_read_tsc+0x10/0x10 [ 15.266372] ? ktime_get_ts64+0x86/0x230 [ 15.266398] kunit_try_run_case+0x1a5/0x480 [ 15.266423] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.266446] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.266469] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.266494] ? __kthread_parkme+0x82/0x180 [ 15.266523] ? preempt_count_sub+0x50/0x80 [ 15.266548] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.266572] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.266597] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.266622] kthread+0x337/0x6f0 [ 15.266641] ? trace_preempt_on+0x20/0xc0 [ 15.266665] ? __pfx_kthread+0x10/0x10 [ 15.266686] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.266708] ? calculate_sigpending+0x7b/0xa0 [ 15.266734] ? __pfx_kthread+0x10/0x10 [ 15.266757] ret_from_fork+0x116/0x1d0 [ 15.266779] ? __pfx_kthread+0x10/0x10 [ 15.266802] ret_from_fork_asm+0x1a/0x30 [ 15.266835] </TASK> [ 15.266846] [ 15.274010] Allocated by task 283: [ 15.274220] kasan_save_stack+0x45/0x70 [ 15.274420] kasan_save_track+0x18/0x40 [ 15.274621] kasan_save_alloc_info+0x3b/0x50 [ 15.274818] __kasan_kmalloc+0xb7/0xc0 [ 15.274953] __kmalloc_cache_noprof+0x189/0x420 [ 15.275170] kasan_atomics+0x95/0x310 [ 15.275359] kunit_try_run_case+0x1a5/0x480 [ 15.275579] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.275816] kthread+0x337/0x6f0 [ 15.275964] ret_from_fork+0x116/0x1d0 [ 15.276129] ret_from_fork_asm+0x1a/0x30 [ 15.276328] [ 15.276402] The buggy address belongs to the object at ffff8881039f9d00 [ 15.276402] which belongs to the cache kmalloc-64 of size 64 [ 15.276765] The buggy address is located 0 bytes to the right of [ 15.276765] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.277135] [ 15.277229] The buggy address belongs to the physical page: [ 15.277405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.277749] flags: 0x200000000000000(node=0|zone=2) [ 15.277985] page_type: f5(slab) [ 15.278162] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.278522] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.278855] page dumped because: kasan: bad access detected [ 15.279101] [ 15.279193] Memory state around the buggy address: [ 15.279412] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.280914] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.281286] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.281539] ^ [ 15.281698] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.281917] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.282587] ================================================================== [ 15.693030] ================================================================== [ 15.693441] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 15.693896] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.694378] [ 15.694738] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.694794] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.694809] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.694831] Call Trace: [ 15.694852] <TASK> [ 15.694903] dump_stack_lvl+0x73/0xb0 [ 15.694937] print_report+0xd1/0x610 [ 15.694959] ? __virt_addr_valid+0x1db/0x2d0 [ 15.694985] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.695008] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.695031] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.695054] kasan_report+0x141/0x180 [ 15.695077] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.695104] kasan_check_range+0x10c/0x1c0 [ 15.695127] __kasan_check_write+0x18/0x20 [ 15.695147] kasan_atomics_helper+0x1ce1/0x5450 [ 15.695182] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.695205] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.695232] ? kasan_atomics+0x152/0x310 [ 15.695260] kasan_atomics+0x1dc/0x310 [ 15.695283] ? __pfx_kasan_atomics+0x10/0x10 [ 15.695305] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.695333] ? __pfx_read_tsc+0x10/0x10 [ 15.695355] ? ktime_get_ts64+0x86/0x230 [ 15.695381] kunit_try_run_case+0x1a5/0x480 [ 15.695406] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.695429] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.695453] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.695478] ? __kthread_parkme+0x82/0x180 [ 15.695510] ? preempt_count_sub+0x50/0x80 [ 15.695535] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.695559] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.695583] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.695608] kthread+0x337/0x6f0 [ 15.695628] ? trace_preempt_on+0x20/0xc0 [ 15.695653] ? __pfx_kthread+0x10/0x10 [ 15.695674] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.695696] ? calculate_sigpending+0x7b/0xa0 [ 15.695721] ? __pfx_kthread+0x10/0x10 [ 15.695743] ret_from_fork+0x116/0x1d0 [ 15.695763] ? __pfx_kthread+0x10/0x10 [ 15.695783] ret_from_fork_asm+0x1a/0x30 [ 15.695816] </TASK> [ 15.695828] [ 15.707408] Allocated by task 283: [ 15.707714] kasan_save_stack+0x45/0x70 [ 15.708101] kasan_save_track+0x18/0x40 [ 15.708299] kasan_save_alloc_info+0x3b/0x50 [ 15.708477] __kasan_kmalloc+0xb7/0xc0 [ 15.708657] __kmalloc_cache_noprof+0x189/0x420 [ 15.708842] kasan_atomics+0x95/0x310 [ 15.709011] kunit_try_run_case+0x1a5/0x480 [ 15.709627] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.709940] kthread+0x337/0x6f0 [ 15.710324] ret_from_fork+0x116/0x1d0 [ 15.710654] ret_from_fork_asm+0x1a/0x30 [ 15.711078] [ 15.711199] The buggy address belongs to the object at ffff8881039f9d00 [ 15.711199] which belongs to the cache kmalloc-64 of size 64 [ 15.711826] The buggy address is located 0 bytes to the right of [ 15.711826] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.712733] [ 15.712822] The buggy address belongs to the physical page: [ 15.713282] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.713879] flags: 0x200000000000000(node=0|zone=2) [ 15.714244] page_type: f5(slab) [ 15.714623] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.715077] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.715734] page dumped because: kasan: bad access detected [ 15.716170] [ 15.716439] Memory state around the buggy address: [ 15.716704] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.717006] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.717720] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.718158] ^ [ 15.718642] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.719083] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.719411] ================================================================== [ 15.914422] ================================================================== [ 15.914730] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 15.915132] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.915490] [ 15.915650] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.915721] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.915733] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.915756] Call Trace: [ 15.915785] <TASK> [ 15.915803] dump_stack_lvl+0x73/0xb0 [ 15.915833] print_report+0xd1/0x610 [ 15.915855] ? __virt_addr_valid+0x1db/0x2d0 [ 15.915879] ? kasan_atomics_helper+0x218a/0x5450 [ 15.915901] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.915924] ? kasan_atomics_helper+0x218a/0x5450 [ 15.915946] kasan_report+0x141/0x180 [ 15.915969] ? kasan_atomics_helper+0x218a/0x5450 [ 15.915996] kasan_check_range+0x10c/0x1c0 [ 15.916020] __kasan_check_write+0x18/0x20 [ 15.916040] kasan_atomics_helper+0x218a/0x5450 [ 15.916063] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.916086] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.916113] ? kasan_atomics+0x152/0x310 [ 15.916139] kasan_atomics+0x1dc/0x310 [ 15.916164] ? __pfx_kasan_atomics+0x10/0x10 [ 15.916190] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.916218] ? __pfx_read_tsc+0x10/0x10 [ 15.916240] ? ktime_get_ts64+0x86/0x230 [ 15.916265] kunit_try_run_case+0x1a5/0x480 [ 15.916292] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.916330] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.916353] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.916377] ? __kthread_parkme+0x82/0x180 [ 15.916399] ? preempt_count_sub+0x50/0x80 [ 15.916425] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.916450] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.916475] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.916510] kthread+0x337/0x6f0 [ 15.916530] ? trace_preempt_on+0x20/0xc0 [ 15.916554] ? __pfx_kthread+0x10/0x10 [ 15.916576] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.916599] ? calculate_sigpending+0x7b/0xa0 [ 15.916625] ? __pfx_kthread+0x10/0x10 [ 15.916647] ret_from_fork+0x116/0x1d0 [ 15.916667] ? __pfx_kthread+0x10/0x10 [ 15.916689] ret_from_fork_asm+0x1a/0x30 [ 15.916720] </TASK> [ 15.916732] [ 15.924560] Allocated by task 283: [ 15.924733] kasan_save_stack+0x45/0x70 [ 15.924934] kasan_save_track+0x18/0x40 [ 15.925119] kasan_save_alloc_info+0x3b/0x50 [ 15.925365] __kasan_kmalloc+0xb7/0xc0 [ 15.925560] __kmalloc_cache_noprof+0x189/0x420 [ 15.925756] kasan_atomics+0x95/0x310 [ 15.925962] kunit_try_run_case+0x1a5/0x480 [ 15.926146] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.926408] kthread+0x337/0x6f0 [ 15.926589] ret_from_fork+0x116/0x1d0 [ 15.926736] ret_from_fork_asm+0x1a/0x30 [ 15.926922] [ 15.927029] The buggy address belongs to the object at ffff8881039f9d00 [ 15.927029] which belongs to the cache kmalloc-64 of size 64 [ 15.927494] The buggy address is located 0 bytes to the right of [ 15.927494] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.928162] [ 15.928303] The buggy address belongs to the physical page: [ 15.928560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.928907] flags: 0x200000000000000(node=0|zone=2) [ 15.929153] page_type: f5(slab) [ 15.929311] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.929646] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.929941] page dumped because: kasan: bad access detected [ 15.930205] [ 15.930312] Memory state around the buggy address: [ 15.930534] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.930806] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.931049] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.931252] ^ [ 15.931402] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.931618] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.931821] ================================================================== [ 15.087536] ================================================================== [ 15.088748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 15.089449] Read of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.090090] [ 15.090276] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.090325] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.090358] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.090382] Call Trace: [ 15.090402] <TASK> [ 15.090431] dump_stack_lvl+0x73/0xb0 [ 15.090462] print_report+0xd1/0x610 [ 15.090485] ? __virt_addr_valid+0x1db/0x2d0 [ 15.090517] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.090539] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.090563] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.090585] kasan_report+0x141/0x180 [ 15.090608] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.090635] __asan_report_load4_noabort+0x18/0x20 [ 15.090660] kasan_atomics_helper+0x4a36/0x5450 [ 15.090684] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.090707] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.090733] ? kasan_atomics+0x152/0x310 [ 15.090760] kasan_atomics+0x1dc/0x310 [ 15.090784] ? __pfx_kasan_atomics+0x10/0x10 [ 15.090806] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.090834] ? __pfx_read_tsc+0x10/0x10 [ 15.090856] ? ktime_get_ts64+0x86/0x230 [ 15.090882] kunit_try_run_case+0x1a5/0x480 [ 15.090908] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.090931] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.090955] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.090979] ? __kthread_parkme+0x82/0x180 [ 15.091000] ? preempt_count_sub+0x50/0x80 [ 15.091026] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.091051] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.091075] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.091101] kthread+0x337/0x6f0 [ 15.091121] ? trace_preempt_on+0x20/0xc0 [ 15.091165] ? __pfx_kthread+0x10/0x10 [ 15.091187] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.091210] ? calculate_sigpending+0x7b/0xa0 [ 15.091235] ? __pfx_kthread+0x10/0x10 [ 15.091257] ret_from_fork+0x116/0x1d0 [ 15.091277] ? __pfx_kthread+0x10/0x10 [ 15.091297] ret_from_fork_asm+0x1a/0x30 [ 15.091330] </TASK> [ 15.091341] [ 15.102980] Allocated by task 283: [ 15.103343] kasan_save_stack+0x45/0x70 [ 15.103736] kasan_save_track+0x18/0x40 [ 15.104099] kasan_save_alloc_info+0x3b/0x50 [ 15.104526] __kasan_kmalloc+0xb7/0xc0 [ 15.104884] __kmalloc_cache_noprof+0x189/0x420 [ 15.105322] kasan_atomics+0x95/0x310 [ 15.105679] kunit_try_run_case+0x1a5/0x480 [ 15.106067] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.106581] kthread+0x337/0x6f0 [ 15.106903] ret_from_fork+0x116/0x1d0 [ 15.107278] ret_from_fork_asm+0x1a/0x30 [ 15.107616] [ 15.107690] The buggy address belongs to the object at ffff8881039f9d00 [ 15.107690] which belongs to the cache kmalloc-64 of size 64 [ 15.108050] The buggy address is located 0 bytes to the right of [ 15.108050] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.109052] [ 15.109251] The buggy address belongs to the physical page: [ 15.109755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.110472] flags: 0x200000000000000(node=0|zone=2) [ 15.110927] page_type: f5(slab) [ 15.111264] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.111606] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.111838] page dumped because: kasan: bad access detected [ 15.112013] [ 15.112083] Memory state around the buggy address: [ 15.112444] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.113072] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.113713] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.114351] ^ [ 15.114784] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.115423] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.116015] ================================================================== [ 14.473148] ================================================================== [ 14.473418] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 14.473754] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 14.474031] [ 14.474457] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.474522] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.474533] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.474555] Call Trace: [ 14.474572] <TASK> [ 14.474589] dump_stack_lvl+0x73/0xb0 [ 14.474618] print_report+0xd1/0x610 [ 14.474639] ? __virt_addr_valid+0x1db/0x2d0 [ 14.474662] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.474683] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.474705] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.474728] kasan_report+0x141/0x180 [ 14.474749] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.474775] __asan_report_store4_noabort+0x1b/0x30 [ 14.474799] kasan_atomics_helper+0x4ba2/0x5450 [ 14.474822] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.474843] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.474868] ? kasan_atomics+0x152/0x310 [ 14.474894] kasan_atomics+0x1dc/0x310 [ 14.474916] ? __pfx_kasan_atomics+0x10/0x10 [ 14.474937] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.474963] ? __pfx_read_tsc+0x10/0x10 [ 14.474983] ? ktime_get_ts64+0x86/0x230 [ 14.475008] kunit_try_run_case+0x1a5/0x480 [ 14.475032] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.475054] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.475077] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.475100] ? __kthread_parkme+0x82/0x180 [ 14.475121] ? preempt_count_sub+0x50/0x80 [ 14.475144] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.475168] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.475192] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.475215] kthread+0x337/0x6f0 [ 14.475234] ? trace_preempt_on+0x20/0xc0 [ 14.475257] ? __pfx_kthread+0x10/0x10 [ 14.475276] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.475297] ? calculate_sigpending+0x7b/0xa0 [ 14.475321] ? __pfx_kthread+0x10/0x10 [ 14.475342] ret_from_fork+0x116/0x1d0 [ 14.475361] ? __pfx_kthread+0x10/0x10 [ 14.475380] ret_from_fork_asm+0x1a/0x30 [ 14.475411] </TASK> [ 14.475421] [ 14.484851] Allocated by task 283: [ 14.485042] kasan_save_stack+0x45/0x70 [ 14.485391] kasan_save_track+0x18/0x40 [ 14.485549] kasan_save_alloc_info+0x3b/0x50 [ 14.485701] __kasan_kmalloc+0xb7/0xc0 [ 14.485880] __kmalloc_cache_noprof+0x189/0x420 [ 14.486174] kasan_atomics+0x95/0x310 [ 14.486423] kunit_try_run_case+0x1a5/0x480 [ 14.486702] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.487187] kthread+0x337/0x6f0 [ 14.487405] ret_from_fork+0x116/0x1d0 [ 14.487629] ret_from_fork_asm+0x1a/0x30 [ 14.487796] [ 14.487912] The buggy address belongs to the object at ffff8881039f9d00 [ 14.487912] which belongs to the cache kmalloc-64 of size 64 [ 14.488517] The buggy address is located 0 bytes to the right of [ 14.488517] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 14.488908] [ 14.488980] The buggy address belongs to the physical page: [ 14.489154] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 14.489679] flags: 0x200000000000000(node=0|zone=2) [ 14.489918] page_type: f5(slab) [ 14.490091] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.490762] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.490999] page dumped because: kasan: bad access detected [ 14.491253] [ 14.491346] Memory state around the buggy address: [ 14.491587] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.492100] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.492722] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.492952] ^ [ 14.493110] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.494012] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.494331] ================================================================== [ 14.597940] ================================================================== [ 14.598536] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 14.599090] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 14.599320] [ 14.599425] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.599526] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.599542] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.599565] Call Trace: [ 14.599657] <TASK> [ 14.599677] dump_stack_lvl+0x73/0xb0 [ 14.599710] print_report+0xd1/0x610 [ 14.599753] ? __virt_addr_valid+0x1db/0x2d0 [ 14.599777] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.599812] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.599850] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.599886] kasan_report+0x141/0x180 [ 14.599908] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.599935] kasan_check_range+0x10c/0x1c0 [ 14.599960] __kasan_check_write+0x18/0x20 [ 14.599979] kasan_atomics_helper+0x4a0/0x5450 [ 14.600004] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.600027] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.600096] ? kasan_atomics+0x152/0x310 [ 14.600123] kasan_atomics+0x1dc/0x310 [ 14.600147] ? __pfx_kasan_atomics+0x10/0x10 [ 14.600178] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.600206] ? __pfx_read_tsc+0x10/0x10 [ 14.600228] ? ktime_get_ts64+0x86/0x230 [ 14.600254] kunit_try_run_case+0x1a5/0x480 [ 14.600278] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.600302] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.600325] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.600350] ? __kthread_parkme+0x82/0x180 [ 14.600371] ? preempt_count_sub+0x50/0x80 [ 14.600396] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.600421] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.600446] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.600471] kthread+0x337/0x6f0 [ 14.600527] ? trace_preempt_on+0x20/0xc0 [ 14.600551] ? __pfx_kthread+0x10/0x10 [ 14.600573] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.600595] ? calculate_sigpending+0x7b/0xa0 [ 14.600638] ? __pfx_kthread+0x10/0x10 [ 14.600660] ret_from_fork+0x116/0x1d0 [ 14.600680] ? __pfx_kthread+0x10/0x10 [ 14.600719] ret_from_fork_asm+0x1a/0x30 [ 14.600752] </TASK> [ 14.600762] [ 14.610665] Allocated by task 283: [ 14.610867] kasan_save_stack+0x45/0x70 [ 14.611147] kasan_save_track+0x18/0x40 [ 14.611341] kasan_save_alloc_info+0x3b/0x50 [ 14.611565] __kasan_kmalloc+0xb7/0xc0 [ 14.611757] __kmalloc_cache_noprof+0x189/0x420 [ 14.611918] kasan_atomics+0x95/0x310 [ 14.612130] kunit_try_run_case+0x1a5/0x480 [ 14.612582] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.612825] kthread+0x337/0x6f0 [ 14.612945] ret_from_fork+0x116/0x1d0 [ 14.613240] ret_from_fork_asm+0x1a/0x30 [ 14.613535] [ 14.613672] The buggy address belongs to the object at ffff8881039f9d00 [ 14.613672] which belongs to the cache kmalloc-64 of size 64 [ 14.614358] The buggy address is located 0 bytes to the right of [ 14.614358] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 14.614909] [ 14.614991] The buggy address belongs to the physical page: [ 14.615174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 14.615428] flags: 0x200000000000000(node=0|zone=2) [ 14.615650] page_type: f5(slab) [ 14.615994] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.616849] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.617367] page dumped because: kasan: bad access detected [ 14.617792] [ 14.617897] Memory state around the buggy address: [ 14.618690] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.619003] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.619311] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.620337] ^ [ 14.620565] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.620841] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.621487] ================================================================== [ 15.932321] ================================================================== [ 15.932671] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 15.932997] Read of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.933310] [ 15.933415] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.933458] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.933471] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.933493] Call Trace: [ 15.933520] <TASK> [ 15.933538] dump_stack_lvl+0x73/0xb0 [ 15.933566] print_report+0xd1/0x610 [ 15.933588] ? __virt_addr_valid+0x1db/0x2d0 [ 15.933610] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.933631] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.933654] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.933676] kasan_report+0x141/0x180 [ 15.933698] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.933724] __asan_report_load8_noabort+0x18/0x20 [ 15.933748] kasan_atomics_helper+0x4fa5/0x5450 [ 15.933770] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.933793] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.933817] ? kasan_atomics+0x152/0x310 [ 15.933843] kasan_atomics+0x1dc/0x310 [ 15.933865] ? __pfx_kasan_atomics+0x10/0x10 [ 15.933886] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.933913] ? __pfx_read_tsc+0x10/0x10 [ 15.933934] ? ktime_get_ts64+0x86/0x230 [ 15.933959] kunit_try_run_case+0x1a5/0x480 [ 15.933983] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.934027] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.934051] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.934075] ? __kthread_parkme+0x82/0x180 [ 15.934096] ? preempt_count_sub+0x50/0x80 [ 15.934121] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.934146] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.934171] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.934214] kthread+0x337/0x6f0 [ 15.934234] ? trace_preempt_on+0x20/0xc0 [ 15.934258] ? __pfx_kthread+0x10/0x10 [ 15.934279] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.934302] ? calculate_sigpending+0x7b/0xa0 [ 15.934327] ? __pfx_kthread+0x10/0x10 [ 15.934349] ret_from_fork+0x116/0x1d0 [ 15.934368] ? __pfx_kthread+0x10/0x10 [ 15.934389] ret_from_fork_asm+0x1a/0x30 [ 15.934421] </TASK> [ 15.934431] [ 15.942129] Allocated by task 283: [ 15.942329] kasan_save_stack+0x45/0x70 [ 15.942494] kasan_save_track+0x18/0x40 [ 15.942668] kasan_save_alloc_info+0x3b/0x50 [ 15.942886] __kasan_kmalloc+0xb7/0xc0 [ 15.943061] __kmalloc_cache_noprof+0x189/0x420 [ 15.943271] kasan_atomics+0x95/0x310 [ 15.943449] kunit_try_run_case+0x1a5/0x480 [ 15.943672] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.943893] kthread+0x337/0x6f0 [ 15.944075] ret_from_fork+0x116/0x1d0 [ 15.944315] ret_from_fork_asm+0x1a/0x30 [ 15.944496] [ 15.944617] The buggy address belongs to the object at ffff8881039f9d00 [ 15.944617] which belongs to the cache kmalloc-64 of size 64 [ 15.945085] The buggy address is located 0 bytes to the right of [ 15.945085] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.945759] [ 15.945860] The buggy address belongs to the physical page: [ 15.946103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.946535] flags: 0x200000000000000(node=0|zone=2) [ 15.946726] page_type: f5(slab) [ 15.946912] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.947138] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.947358] page dumped because: kasan: bad access detected [ 15.947547] [ 15.947638] Memory state around the buggy address: [ 15.948024] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.948482] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.948797] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.949131] ^ [ 15.949549] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.949844] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.950051] ================================================================== [ 14.451459] ================================================================== [ 14.452187] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 14.452554] Read of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 14.452839] [ 14.452952] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.453001] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.453012] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.453035] Call Trace: [ 14.453126] <TASK> [ 14.453150] dump_stack_lvl+0x73/0xb0 [ 14.453185] print_report+0xd1/0x610 [ 14.453209] ? __virt_addr_valid+0x1db/0x2d0 [ 14.453233] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.453254] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.453276] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.453297] kasan_report+0x141/0x180 [ 14.453319] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.453345] __asan_report_load4_noabort+0x18/0x20 [ 14.453369] kasan_atomics_helper+0x4bbc/0x5450 [ 14.453391] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.453414] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.453438] ? kasan_atomics+0x152/0x310 [ 14.453464] kasan_atomics+0x1dc/0x310 [ 14.453486] ? __pfx_kasan_atomics+0x10/0x10 [ 14.453520] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.453547] ? __pfx_read_tsc+0x10/0x10 [ 14.453568] ? ktime_get_ts64+0x86/0x230 [ 14.453594] kunit_try_run_case+0x1a5/0x480 [ 14.453621] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.453644] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.453667] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.453690] ? __kthread_parkme+0x82/0x180 [ 14.453711] ? preempt_count_sub+0x50/0x80 [ 14.453736] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.453759] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.453782] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.453806] kthread+0x337/0x6f0 [ 14.453825] ? trace_preempt_on+0x20/0xc0 [ 14.453849] ? __pfx_kthread+0x10/0x10 [ 14.453869] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.453889] ? calculate_sigpending+0x7b/0xa0 [ 14.453915] ? __pfx_kthread+0x10/0x10 [ 14.453936] ret_from_fork+0x116/0x1d0 [ 14.453954] ? __pfx_kthread+0x10/0x10 [ 14.453974] ret_from_fork_asm+0x1a/0x30 [ 14.454006] </TASK> [ 14.454016] [ 14.463941] Allocated by task 283: [ 14.464290] kasan_save_stack+0x45/0x70 [ 14.464596] kasan_save_track+0x18/0x40 [ 14.464774] kasan_save_alloc_info+0x3b/0x50 [ 14.464924] __kasan_kmalloc+0xb7/0xc0 [ 14.465056] __kmalloc_cache_noprof+0x189/0x420 [ 14.465211] kasan_atomics+0x95/0x310 [ 14.465398] kunit_try_run_case+0x1a5/0x480 [ 14.465740] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.465966] kthread+0x337/0x6f0 [ 14.466086] ret_from_fork+0x116/0x1d0 [ 14.466224] ret_from_fork_asm+0x1a/0x30 [ 14.466370] [ 14.466467] The buggy address belongs to the object at ffff8881039f9d00 [ 14.466467] which belongs to the cache kmalloc-64 of size 64 [ 14.467016] The buggy address is located 0 bytes to the right of [ 14.467016] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 14.467711] [ 14.467792] The buggy address belongs to the physical page: [ 14.468003] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 14.468306] flags: 0x200000000000000(node=0|zone=2) [ 14.468581] page_type: f5(slab) [ 14.468751] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.469011] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.469635] page dumped because: kasan: bad access detected [ 14.469920] [ 14.470018] Memory state around the buggy address: [ 14.470355] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.470719] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.470996] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.471630] ^ [ 14.471973] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.472405] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.472636] ================================================================== [ 14.624723] ================================================================== [ 14.625476] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 14.625858] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 14.626308] [ 14.626431] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.626479] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.626557] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.626581] Call Trace: [ 14.626602] <TASK> [ 14.626622] dump_stack_lvl+0x73/0xb0 [ 14.626653] print_report+0xd1/0x610 [ 14.626676] ? __virt_addr_valid+0x1db/0x2d0 [ 14.626701] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.626724] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.626747] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.626770] kasan_report+0x141/0x180 [ 14.626815] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.626843] __asan_report_store4_noabort+0x1b/0x30 [ 14.626870] kasan_atomics_helper+0x4b3a/0x5450 [ 14.626894] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.626917] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.626944] ? kasan_atomics+0x152/0x310 [ 14.626971] kasan_atomics+0x1dc/0x310 [ 14.627011] ? __pfx_kasan_atomics+0x10/0x10 [ 14.627034] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.627139] ? __pfx_read_tsc+0x10/0x10 [ 14.627172] ? ktime_get_ts64+0x86/0x230 [ 14.627198] kunit_try_run_case+0x1a5/0x480 [ 14.627225] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.627247] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.627294] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.627319] ? __kthread_parkme+0x82/0x180 [ 14.627340] ? preempt_count_sub+0x50/0x80 [ 14.627381] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.627407] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.627431] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.627457] kthread+0x337/0x6f0 [ 14.627477] ? trace_preempt_on+0x20/0xc0 [ 14.627514] ? __pfx_kthread+0x10/0x10 [ 14.627534] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.627557] ? calculate_sigpending+0x7b/0xa0 [ 14.627584] ? __pfx_kthread+0x10/0x10 [ 14.627606] ret_from_fork+0x116/0x1d0 [ 14.627625] ? __pfx_kthread+0x10/0x10 [ 14.627646] ret_from_fork_asm+0x1a/0x30 [ 14.627679] </TASK> [ 14.627690] [ 14.637246] Allocated by task 283: [ 14.637476] kasan_save_stack+0x45/0x70 [ 14.637708] kasan_save_track+0x18/0x40 [ 14.637929] kasan_save_alloc_info+0x3b/0x50 [ 14.638249] __kasan_kmalloc+0xb7/0xc0 [ 14.638402] __kmalloc_cache_noprof+0x189/0x420 [ 14.638573] kasan_atomics+0x95/0x310 [ 14.638765] kunit_try_run_case+0x1a5/0x480 [ 14.638963] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.639323] kthread+0x337/0x6f0 [ 14.639509] ret_from_fork+0x116/0x1d0 [ 14.639704] ret_from_fork_asm+0x1a/0x30 [ 14.639864] [ 14.639961] The buggy address belongs to the object at ffff8881039f9d00 [ 14.639961] which belongs to the cache kmalloc-64 of size 64 [ 14.640900] The buggy address is located 0 bytes to the right of [ 14.640900] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 14.641547] [ 14.641674] The buggy address belongs to the physical page: [ 14.641920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 14.642345] flags: 0x200000000000000(node=0|zone=2) [ 14.642635] page_type: f5(slab) [ 14.642803] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.643134] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.643521] page dumped because: kasan: bad access detected [ 14.643778] [ 14.643892] Memory state around the buggy address: [ 14.644130] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.644444] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.644781] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.645091] ^ [ 14.645243] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.645452] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.645895] ================================================================== [ 15.167299] ================================================================== [ 15.167665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 15.167925] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.168332] [ 15.168484] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.168541] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.168554] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.168576] Call Trace: [ 15.168596] <TASK> [ 15.168614] dump_stack_lvl+0x73/0xb0 [ 15.168645] print_report+0xd1/0x610 [ 15.168668] ? __virt_addr_valid+0x1db/0x2d0 [ 15.168692] ? kasan_atomics_helper+0x1148/0x5450 [ 15.168715] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.168738] ? kasan_atomics_helper+0x1148/0x5450 [ 15.168761] kasan_report+0x141/0x180 [ 15.168784] ? kasan_atomics_helper+0x1148/0x5450 [ 15.168815] kasan_check_range+0x10c/0x1c0 [ 15.168840] __kasan_check_write+0x18/0x20 [ 15.168860] kasan_atomics_helper+0x1148/0x5450 [ 15.168883] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.168907] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.168933] ? kasan_atomics+0x152/0x310 [ 15.168961] kasan_atomics+0x1dc/0x310 [ 15.168984] ? __pfx_kasan_atomics+0x10/0x10 [ 15.169007] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.169035] ? __pfx_read_tsc+0x10/0x10 [ 15.169057] ? ktime_get_ts64+0x86/0x230 [ 15.169083] kunit_try_run_case+0x1a5/0x480 [ 15.169109] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.169132] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.169156] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.169180] ? __kthread_parkme+0x82/0x180 [ 15.169212] ? preempt_count_sub+0x50/0x80 [ 15.169238] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.169263] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.169288] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.169313] kthread+0x337/0x6f0 [ 15.169333] ? trace_preempt_on+0x20/0xc0 [ 15.169356] ? __pfx_kthread+0x10/0x10 [ 15.169377] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.169399] ? calculate_sigpending+0x7b/0xa0 [ 15.169425] ? __pfx_kthread+0x10/0x10 [ 15.169446] ret_from_fork+0x116/0x1d0 [ 15.169466] ? __pfx_kthread+0x10/0x10 [ 15.169486] ret_from_fork_asm+0x1a/0x30 [ 15.169528] </TASK> [ 15.169539] [ 15.177145] Allocated by task 283: [ 15.177320] kasan_save_stack+0x45/0x70 [ 15.177529] kasan_save_track+0x18/0x40 [ 15.177669] kasan_save_alloc_info+0x3b/0x50 [ 15.177819] __kasan_kmalloc+0xb7/0xc0 [ 15.177953] __kmalloc_cache_noprof+0x189/0x420 [ 15.178163] kasan_atomics+0x95/0x310 [ 15.178357] kunit_try_run_case+0x1a5/0x480 [ 15.178577] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.178835] kthread+0x337/0x6f0 [ 15.179001] ret_from_fork+0x116/0x1d0 [ 15.179188] ret_from_fork_asm+0x1a/0x30 [ 15.179358] [ 15.179452] The buggy address belongs to the object at ffff8881039f9d00 [ 15.179452] which belongs to the cache kmalloc-64 of size 64 [ 15.179921] The buggy address is located 0 bytes to the right of [ 15.179921] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.180468] [ 15.180569] The buggy address belongs to the physical page: [ 15.180805] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.181115] flags: 0x200000000000000(node=0|zone=2) [ 15.181317] page_type: f5(slab) [ 15.181441] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.181685] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.181916] page dumped because: kasan: bad access detected [ 15.182090] [ 15.182160] Memory state around the buggy address: [ 15.182380] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.182853] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.183193] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.183514] ^ [ 15.183732] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.184048] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.184370] ================================================================== [ 15.223746] ================================================================== [ 15.224223] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 15.224700] Read of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.225302] [ 15.225617] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.225671] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.225683] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.225706] Call Trace: [ 15.225725] <TASK> [ 15.225774] dump_stack_lvl+0x73/0xb0 [ 15.225806] print_report+0xd1/0x610 [ 15.225829] ? __virt_addr_valid+0x1db/0x2d0 [ 15.225853] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.225874] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.225898] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.225921] kasan_report+0x141/0x180 [ 15.225944] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.225971] __asan_report_load4_noabort+0x18/0x20 [ 15.225996] kasan_atomics_helper+0x49e8/0x5450 [ 15.226019] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.226042] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.226067] ? kasan_atomics+0x152/0x310 [ 15.226094] kasan_atomics+0x1dc/0x310 [ 15.226118] ? __pfx_kasan_atomics+0x10/0x10 [ 15.226140] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.226191] ? __pfx_read_tsc+0x10/0x10 [ 15.226219] ? ktime_get_ts64+0x86/0x230 [ 15.226244] kunit_try_run_case+0x1a5/0x480 [ 15.226269] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.226292] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.226316] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.226340] ? __kthread_parkme+0x82/0x180 [ 15.226362] ? preempt_count_sub+0x50/0x80 [ 15.226388] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.226412] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.226437] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.226462] kthread+0x337/0x6f0 [ 15.226482] ? trace_preempt_on+0x20/0xc0 [ 15.226515] ? __pfx_kthread+0x10/0x10 [ 15.226536] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.226558] ? calculate_sigpending+0x7b/0xa0 [ 15.226583] ? __pfx_kthread+0x10/0x10 [ 15.226605] ret_from_fork+0x116/0x1d0 [ 15.226625] ? __pfx_kthread+0x10/0x10 [ 15.226645] ret_from_fork_asm+0x1a/0x30 [ 15.226676] </TASK> [ 15.226688] [ 15.237836] Allocated by task 283: [ 15.238283] kasan_save_stack+0x45/0x70 [ 15.238569] kasan_save_track+0x18/0x40 [ 15.238868] kasan_save_alloc_info+0x3b/0x50 [ 15.239286] __kasan_kmalloc+0xb7/0xc0 [ 15.239476] __kmalloc_cache_noprof+0x189/0x420 [ 15.239694] kasan_atomics+0x95/0x310 [ 15.239869] kunit_try_run_case+0x1a5/0x480 [ 15.240059] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.240688] kthread+0x337/0x6f0 [ 15.240986] ret_from_fork+0x116/0x1d0 [ 15.241307] ret_from_fork_asm+0x1a/0x30 [ 15.241700] [ 15.241968] The buggy address belongs to the object at ffff8881039f9d00 [ 15.241968] which belongs to the cache kmalloc-64 of size 64 [ 15.242475] The buggy address is located 0 bytes to the right of [ 15.242475] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.242939] [ 15.243040] The buggy address belongs to the physical page: [ 15.243284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.243639] flags: 0x200000000000000(node=0|zone=2) [ 15.243835] page_type: f5(slab) [ 15.244007] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.244363] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.244688] page dumped because: kasan: bad access detected [ 15.244901] [ 15.244995] Memory state around the buggy address: [ 15.245224] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.245535] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.245802] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.246082] ^ [ 15.246303] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.246529] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.246837] ================================================================== [ 15.283936] ================================================================== [ 15.284446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 15.284799] Read of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.285075] [ 15.285392] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.285445] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.285458] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.285743] Call Trace: [ 15.285765] <TASK> [ 15.285783] dump_stack_lvl+0x73/0xb0 [ 15.285815] print_report+0xd1/0x610 [ 15.285839] ? __virt_addr_valid+0x1db/0x2d0 [ 15.285902] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.285925] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.285950] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.285974] kasan_report+0x141/0x180 [ 15.285996] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.286023] kasan_check_range+0x10c/0x1c0 [ 15.286049] __kasan_check_read+0x15/0x20 [ 15.286068] kasan_atomics_helper+0x13b5/0x5450 [ 15.286093] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.286116] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.286169] ? kasan_atomics+0x152/0x310 [ 15.286205] kasan_atomics+0x1dc/0x310 [ 15.286229] ? __pfx_kasan_atomics+0x10/0x10 [ 15.286252] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.286280] ? __pfx_read_tsc+0x10/0x10 [ 15.286301] ? ktime_get_ts64+0x86/0x230 [ 15.286327] kunit_try_run_case+0x1a5/0x480 [ 15.286352] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.286375] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.286399] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.286424] ? __kthread_parkme+0x82/0x180 [ 15.286446] ? preempt_count_sub+0x50/0x80 [ 15.286471] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.286505] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.286530] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.286555] kthread+0x337/0x6f0 [ 15.286575] ? trace_preempt_on+0x20/0xc0 [ 15.286600] ? __pfx_kthread+0x10/0x10 [ 15.286621] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.286643] ? calculate_sigpending+0x7b/0xa0 [ 15.286668] ? __pfx_kthread+0x10/0x10 [ 15.286690] ret_from_fork+0x116/0x1d0 [ 15.286711] ? __pfx_kthread+0x10/0x10 [ 15.286732] ret_from_fork_asm+0x1a/0x30 [ 15.286764] </TASK> [ 15.286775] [ 15.298312] Allocated by task 283: [ 15.298689] kasan_save_stack+0x45/0x70 [ 15.298887] kasan_save_track+0x18/0x40 [ 15.299064] kasan_save_alloc_info+0x3b/0x50 [ 15.299471] __kasan_kmalloc+0xb7/0xc0 [ 15.299839] __kmalloc_cache_noprof+0x189/0x420 [ 15.300196] kasan_atomics+0x95/0x310 [ 15.300388] kunit_try_run_case+0x1a5/0x480 [ 15.300777] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.301272] kthread+0x337/0x6f0 [ 15.301449] ret_from_fork+0x116/0x1d0 [ 15.301635] ret_from_fork_asm+0x1a/0x30 [ 15.301808] [ 15.301901] The buggy address belongs to the object at ffff8881039f9d00 [ 15.301901] which belongs to the cache kmalloc-64 of size 64 [ 15.302890] The buggy address is located 0 bytes to the right of [ 15.302890] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.303654] [ 15.303762] The buggy address belongs to the physical page: [ 15.303992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.304591] flags: 0x200000000000000(node=0|zone=2) [ 15.304942] page_type: f5(slab) [ 15.305269] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.305728] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.306252] page dumped because: kasan: bad access detected [ 15.306627] [ 15.306729] Memory state around the buggy address: [ 15.306941] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.307486] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.308131] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.308446] ^ [ 15.308662] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.308949] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.309245] ================================================================== [ 14.909700] ================================================================== [ 14.909997] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 14.910598] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 14.910953] [ 14.912006] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.912073] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.912087] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.912110] Call Trace: [ 14.912132] <TASK> [ 14.912677] dump_stack_lvl+0x73/0xb0 [ 14.912726] print_report+0xd1/0x610 [ 14.912752] ? __virt_addr_valid+0x1db/0x2d0 [ 14.912776] ? kasan_atomics_helper+0xc70/0x5450 [ 14.912815] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.912841] ? kasan_atomics_helper+0xc70/0x5450 [ 14.912863] kasan_report+0x141/0x180 [ 14.912887] ? kasan_atomics_helper+0xc70/0x5450 [ 14.912913] kasan_check_range+0x10c/0x1c0 [ 14.912938] __kasan_check_write+0x18/0x20 [ 14.912957] kasan_atomics_helper+0xc70/0x5450 [ 14.912981] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.913004] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.913030] ? kasan_atomics+0x152/0x310 [ 14.913057] kasan_atomics+0x1dc/0x310 [ 14.913080] ? __pfx_kasan_atomics+0x10/0x10 [ 14.913102] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.913130] ? __pfx_read_tsc+0x10/0x10 [ 14.914067] ? ktime_get_ts64+0x86/0x230 [ 14.914100] kunit_try_run_case+0x1a5/0x480 [ 14.914129] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.914162] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.914186] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.914219] ? __kthread_parkme+0x82/0x180 [ 14.914241] ? preempt_count_sub+0x50/0x80 [ 14.914266] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.914291] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.914316] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.914341] kthread+0x337/0x6f0 [ 14.914361] ? trace_preempt_on+0x20/0xc0 [ 14.914386] ? __pfx_kthread+0x10/0x10 [ 14.914406] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.914428] ? calculate_sigpending+0x7b/0xa0 [ 14.914454] ? __pfx_kthread+0x10/0x10 [ 14.914476] ret_from_fork+0x116/0x1d0 [ 14.914504] ? __pfx_kthread+0x10/0x10 [ 14.914525] ret_from_fork_asm+0x1a/0x30 [ 14.914558] </TASK> [ 14.914570] [ 14.928346] Allocated by task 283: [ 14.928729] kasan_save_stack+0x45/0x70 [ 14.928888] kasan_save_track+0x18/0x40 [ 14.929022] kasan_save_alloc_info+0x3b/0x50 [ 14.929192] __kasan_kmalloc+0xb7/0xc0 [ 14.929793] __kmalloc_cache_noprof+0x189/0x420 [ 14.930334] kasan_atomics+0x95/0x310 [ 14.930786] kunit_try_run_case+0x1a5/0x480 [ 14.931311] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.931901] kthread+0x337/0x6f0 [ 14.932051] ret_from_fork+0x116/0x1d0 [ 14.932671] ret_from_fork_asm+0x1a/0x30 [ 14.932996] [ 14.933076] The buggy address belongs to the object at ffff8881039f9d00 [ 14.933076] which belongs to the cache kmalloc-64 of size 64 [ 14.933953] The buggy address is located 0 bytes to the right of [ 14.933953] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 14.935378] [ 14.935535] The buggy address belongs to the physical page: [ 14.936057] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 14.936572] flags: 0x200000000000000(node=0|zone=2) [ 14.936750] page_type: f5(slab) [ 14.936877] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.937107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.937944] page dumped because: kasan: bad access detected [ 14.938492] [ 14.938663] Memory state around the buggy address: [ 14.939325] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.940064] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.940908] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.941385] ^ [ 14.941914] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.942133] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.942911] ================================================================== [ 15.758035] ================================================================== [ 15.758608] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 15.758954] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.759430] [ 15.759549] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.759595] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.759607] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.759630] Call Trace: [ 15.759648] <TASK> [ 15.759665] dump_stack_lvl+0x73/0xb0 [ 15.759693] print_report+0xd1/0x610 [ 15.759717] ? __virt_addr_valid+0x1db/0x2d0 [ 15.759740] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.759761] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.759785] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.759808] kasan_report+0x141/0x180 [ 15.759831] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.759858] kasan_check_range+0x10c/0x1c0 [ 15.759882] __kasan_check_write+0x18/0x20 [ 15.759901] kasan_atomics_helper+0x1eaa/0x5450 [ 15.759925] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.759948] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.759973] ? kasan_atomics+0x152/0x310 [ 15.760001] kasan_atomics+0x1dc/0x310 [ 15.760023] ? __pfx_kasan_atomics+0x10/0x10 [ 15.760045] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.760073] ? __pfx_read_tsc+0x10/0x10 [ 15.760095] ? ktime_get_ts64+0x86/0x230 [ 15.760120] kunit_try_run_case+0x1a5/0x480 [ 15.760145] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.760179] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.760203] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.760227] ? __kthread_parkme+0x82/0x180 [ 15.760249] ? preempt_count_sub+0x50/0x80 [ 15.760274] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.760299] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.760324] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.760348] kthread+0x337/0x6f0 [ 15.760368] ? trace_preempt_on+0x20/0xc0 [ 15.760393] ? __pfx_kthread+0x10/0x10 [ 15.760414] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.760436] ? calculate_sigpending+0x7b/0xa0 [ 15.760461] ? __pfx_kthread+0x10/0x10 [ 15.760482] ret_from_fork+0x116/0x1d0 [ 15.760512] ? __pfx_kthread+0x10/0x10 [ 15.760533] ret_from_fork_asm+0x1a/0x30 [ 15.760565] </TASK> [ 15.760576] [ 15.768139] Allocated by task 283: [ 15.768330] kasan_save_stack+0x45/0x70 [ 15.768539] kasan_save_track+0x18/0x40 [ 15.768728] kasan_save_alloc_info+0x3b/0x50 [ 15.768942] __kasan_kmalloc+0xb7/0xc0 [ 15.769127] __kmalloc_cache_noprof+0x189/0x420 [ 15.769355] kasan_atomics+0x95/0x310 [ 15.769554] kunit_try_run_case+0x1a5/0x480 [ 15.769764] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.769961] kthread+0x337/0x6f0 [ 15.770085] ret_from_fork+0x116/0x1d0 [ 15.770390] ret_from_fork_asm+0x1a/0x30 [ 15.770602] [ 15.770706] The buggy address belongs to the object at ffff8881039f9d00 [ 15.770706] which belongs to the cache kmalloc-64 of size 64 [ 15.771193] The buggy address is located 0 bytes to the right of [ 15.771193] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.771620] [ 15.771703] The buggy address belongs to the physical page: [ 15.771961] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.772390] flags: 0x200000000000000(node=0|zone=2) [ 15.772615] page_type: f5(slab) [ 15.772764] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.773071] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.773442] page dumped because: kasan: bad access detected [ 15.773673] [ 15.773761] Memory state around the buggy address: [ 15.773964] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.774314] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.774587] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.774878] ^ [ 15.775077] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.775396] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.775700] ================================================================== [ 15.581946] ================================================================== [ 15.582653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 15.582973] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.583634] [ 15.583746] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.584020] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.584036] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.584059] Call Trace: [ 15.584078] <TASK> [ 15.584098] dump_stack_lvl+0x73/0xb0 [ 15.584181] print_report+0xd1/0x610 [ 15.584205] ? __virt_addr_valid+0x1db/0x2d0 [ 15.584229] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.584251] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.584274] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.584297] kasan_report+0x141/0x180 [ 15.584320] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.584347] kasan_check_range+0x10c/0x1c0 [ 15.584372] __kasan_check_write+0x18/0x20 [ 15.584391] kasan_atomics_helper+0x1a7f/0x5450 [ 15.584414] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.584438] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.584464] ? kasan_atomics+0x152/0x310 [ 15.584491] kasan_atomics+0x1dc/0x310 [ 15.584525] ? __pfx_kasan_atomics+0x10/0x10 [ 15.584547] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.584575] ? __pfx_read_tsc+0x10/0x10 [ 15.584597] ? ktime_get_ts64+0x86/0x230 [ 15.584622] kunit_try_run_case+0x1a5/0x480 [ 15.584647] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.584671] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.584695] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.584720] ? __kthread_parkme+0x82/0x180 [ 15.584741] ? preempt_count_sub+0x50/0x80 [ 15.584766] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.584791] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.584816] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.584841] kthread+0x337/0x6f0 [ 15.584861] ? trace_preempt_on+0x20/0xc0 [ 15.584885] ? __pfx_kthread+0x10/0x10 [ 15.584906] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.584929] ? calculate_sigpending+0x7b/0xa0 [ 15.584955] ? __pfx_kthread+0x10/0x10 [ 15.584976] ret_from_fork+0x116/0x1d0 [ 15.584996] ? __pfx_kthread+0x10/0x10 [ 15.585016] ret_from_fork_asm+0x1a/0x30 [ 15.585048] </TASK> [ 15.585059] [ 15.596753] Allocated by task 283: [ 15.597038] kasan_save_stack+0x45/0x70 [ 15.597488] kasan_save_track+0x18/0x40 [ 15.597718] kasan_save_alloc_info+0x3b/0x50 [ 15.598051] __kasan_kmalloc+0xb7/0xc0 [ 15.598366] __kmalloc_cache_noprof+0x189/0x420 [ 15.598598] kasan_atomics+0x95/0x310 [ 15.598771] kunit_try_run_case+0x1a5/0x480 [ 15.598951] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.599474] kthread+0x337/0x6f0 [ 15.599684] ret_from_fork+0x116/0x1d0 [ 15.599988] ret_from_fork_asm+0x1a/0x30 [ 15.600435] [ 15.600564] The buggy address belongs to the object at ffff8881039f9d00 [ 15.600564] which belongs to the cache kmalloc-64 of size 64 [ 15.601338] The buggy address is located 0 bytes to the right of [ 15.601338] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.602036] [ 15.602137] The buggy address belongs to the physical page: [ 15.602551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.602890] flags: 0x200000000000000(node=0|zone=2) [ 15.603114] page_type: f5(slab) [ 15.603634] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.604072] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.604631] page dumped because: kasan: bad access detected [ 15.605012] [ 15.605105] Memory state around the buggy address: [ 15.605775] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.606227] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.606734] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.607295] ^ [ 15.607520] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.607808] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.608091] ================================================================== [ 14.750009] ================================================================== [ 14.750355] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 14.750713] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 14.751223] [ 14.751620] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.751672] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.751685] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.751708] Call Trace: [ 14.751727] <TASK> [ 14.751746] dump_stack_lvl+0x73/0xb0 [ 14.751776] print_report+0xd1/0x610 [ 14.751799] ? __virt_addr_valid+0x1db/0x2d0 [ 14.751823] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.751845] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.751868] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.751891] kasan_report+0x141/0x180 [ 14.751913] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.751967] kasan_check_range+0x10c/0x1c0 [ 14.751991] __kasan_check_write+0x18/0x20 [ 14.752011] kasan_atomics_helper+0x7c7/0x5450 [ 14.752034] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.752102] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.752130] ? kasan_atomics+0x152/0x310 [ 14.752209] kasan_atomics+0x1dc/0x310 [ 14.752235] ? __pfx_kasan_atomics+0x10/0x10 [ 14.752257] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.752285] ? __pfx_read_tsc+0x10/0x10 [ 14.752308] ? ktime_get_ts64+0x86/0x230 [ 14.752334] kunit_try_run_case+0x1a5/0x480 [ 14.752377] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.752400] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.752424] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.752448] ? __kthread_parkme+0x82/0x180 [ 14.752470] ? preempt_count_sub+0x50/0x80 [ 14.752506] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.752531] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.752555] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.752580] kthread+0x337/0x6f0 [ 14.752601] ? trace_preempt_on+0x20/0xc0 [ 14.752625] ? __pfx_kthread+0x10/0x10 [ 14.752646] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.752668] ? calculate_sigpending+0x7b/0xa0 [ 14.752712] ? __pfx_kthread+0x10/0x10 [ 14.752734] ret_from_fork+0x116/0x1d0 [ 14.752754] ? __pfx_kthread+0x10/0x10 [ 14.752774] ret_from_fork_asm+0x1a/0x30 [ 14.752806] </TASK> [ 14.752817] [ 14.762355] Allocated by task 283: [ 14.762555] kasan_save_stack+0x45/0x70 [ 14.762752] kasan_save_track+0x18/0x40 [ 14.762943] kasan_save_alloc_info+0x3b/0x50 [ 14.763274] __kasan_kmalloc+0xb7/0xc0 [ 14.763616] __kmalloc_cache_noprof+0x189/0x420 [ 14.763840] kasan_atomics+0x95/0x310 [ 14.764048] kunit_try_run_case+0x1a5/0x480 [ 14.764316] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.764595] kthread+0x337/0x6f0 [ 14.764743] ret_from_fork+0x116/0x1d0 [ 14.764930] ret_from_fork_asm+0x1a/0x30 [ 14.765239] [ 14.765367] The buggy address belongs to the object at ffff8881039f9d00 [ 14.765367] which belongs to the cache kmalloc-64 of size 64 [ 14.765873] The buggy address is located 0 bytes to the right of [ 14.765873] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 14.766380] [ 14.766552] The buggy address belongs to the physical page: [ 14.766833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 14.767208] flags: 0x200000000000000(node=0|zone=2) [ 14.767549] page_type: f5(slab) [ 14.767840] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.768284] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.768640] page dumped because: kasan: bad access detected [ 14.768867] [ 14.768937] Memory state around the buggy address: [ 14.769156] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.769485] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.769805] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.770097] ^ [ 14.770254] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.770587] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.770936] ================================================================== [ 15.184807] ================================================================== [ 15.185277] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 15.185642] Read of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.186031] [ 15.186145] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.186207] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.186220] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.186242] Call Trace: [ 15.186261] <TASK> [ 15.186277] dump_stack_lvl+0x73/0xb0 [ 15.186306] print_report+0xd1/0x610 [ 15.186329] ? __virt_addr_valid+0x1db/0x2d0 [ 15.186351] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.186374] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.186397] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.186419] kasan_report+0x141/0x180 [ 15.186442] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.186469] __asan_report_load4_noabort+0x18/0x20 [ 15.186494] kasan_atomics_helper+0x4a02/0x5450 [ 15.186530] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.186553] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.186579] ? kasan_atomics+0x152/0x310 [ 15.186606] kasan_atomics+0x1dc/0x310 [ 15.186629] ? __pfx_kasan_atomics+0x10/0x10 [ 15.186652] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.186679] ? __pfx_read_tsc+0x10/0x10 [ 15.186700] ? ktime_get_ts64+0x86/0x230 [ 15.186726] kunit_try_run_case+0x1a5/0x480 [ 15.186751] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.186774] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.186798] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.186822] ? __kthread_parkme+0x82/0x180 [ 15.186843] ? preempt_count_sub+0x50/0x80 [ 15.186868] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.186893] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.186918] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.186943] kthread+0x337/0x6f0 [ 15.186962] ? trace_preempt_on+0x20/0xc0 [ 15.186987] ? __pfx_kthread+0x10/0x10 [ 15.187008] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.187031] ? calculate_sigpending+0x7b/0xa0 [ 15.187056] ? __pfx_kthread+0x10/0x10 [ 15.187078] ret_from_fork+0x116/0x1d0 [ 15.187098] ? __pfx_kthread+0x10/0x10 [ 15.187120] ret_from_fork_asm+0x1a/0x30 [ 15.187151] </TASK> [ 15.187161] [ 15.194706] Allocated by task 283: [ 15.194875] kasan_save_stack+0x45/0x70 [ 15.195019] kasan_save_track+0x18/0x40 [ 15.195155] kasan_save_alloc_info+0x3b/0x50 [ 15.195306] __kasan_kmalloc+0xb7/0xc0 [ 15.195440] __kmalloc_cache_noprof+0x189/0x420 [ 15.195657] kasan_atomics+0x95/0x310 [ 15.195843] kunit_try_run_case+0x1a5/0x480 [ 15.196068] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.196447] kthread+0x337/0x6f0 [ 15.196580] ret_from_fork+0x116/0x1d0 [ 15.196714] ret_from_fork_asm+0x1a/0x30 [ 15.196886] [ 15.196981] The buggy address belongs to the object at ffff8881039f9d00 [ 15.196981] which belongs to the cache kmalloc-64 of size 64 [ 15.197611] The buggy address is located 0 bytes to the right of [ 15.197611] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.198105] [ 15.198224] The buggy address belongs to the physical page: [ 15.198400] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.198760] flags: 0x200000000000000(node=0|zone=2) [ 15.198999] page_type: f5(slab) [ 15.199174] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.199474] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.199728] page dumped because: kasan: bad access detected [ 15.199903] [ 15.199973] Memory state around the buggy address: [ 15.200129] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.200444] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.200766] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.201089] ^ [ 15.201458] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.201793] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.202071] ================================================================== [ 14.889872] ================================================================== [ 14.890563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 14.890937] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 14.891348] [ 14.891438] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.891484] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.891509] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.891532] Call Trace: [ 14.891546] <TASK> [ 14.891563] dump_stack_lvl+0x73/0xb0 [ 14.891613] print_report+0xd1/0x610 [ 14.891635] ? __virt_addr_valid+0x1db/0x2d0 [ 14.891673] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.891707] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.891732] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.891767] kasan_report+0x141/0x180 [ 14.891802] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.891830] kasan_check_range+0x10c/0x1c0 [ 14.891853] __kasan_check_write+0x18/0x20 [ 14.891872] kasan_atomics_helper+0xb6a/0x5450 [ 14.891896] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.891919] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.891945] ? kasan_atomics+0x152/0x310 [ 14.891972] kasan_atomics+0x1dc/0x310 [ 14.891996] ? __pfx_kasan_atomics+0x10/0x10 [ 14.892018] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.892046] ? __pfx_read_tsc+0x10/0x10 [ 14.892069] ? ktime_get_ts64+0x86/0x230 [ 14.892094] kunit_try_run_case+0x1a5/0x480 [ 14.892120] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.892143] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.892175] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.892199] ? __kthread_parkme+0x82/0x180 [ 14.892220] ? preempt_count_sub+0x50/0x80 [ 14.892245] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.892270] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.892294] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.892337] kthread+0x337/0x6f0 [ 14.892357] ? trace_preempt_on+0x20/0xc0 [ 14.892396] ? __pfx_kthread+0x10/0x10 [ 14.892417] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.892452] ? calculate_sigpending+0x7b/0xa0 [ 14.892491] ? __pfx_kthread+0x10/0x10 [ 14.892524] ret_from_fork+0x116/0x1d0 [ 14.892544] ? __pfx_kthread+0x10/0x10 [ 14.892565] ret_from_fork_asm+0x1a/0x30 [ 14.892610] </TASK> [ 14.892622] [ 14.900581] Allocated by task 283: [ 14.900770] kasan_save_stack+0x45/0x70 [ 14.901009] kasan_save_track+0x18/0x40 [ 14.901235] kasan_save_alloc_info+0x3b/0x50 [ 14.901456] __kasan_kmalloc+0xb7/0xc0 [ 14.901666] __kmalloc_cache_noprof+0x189/0x420 [ 14.901884] kasan_atomics+0x95/0x310 [ 14.902072] kunit_try_run_case+0x1a5/0x480 [ 14.902270] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.902607] kthread+0x337/0x6f0 [ 14.902797] ret_from_fork+0x116/0x1d0 [ 14.902984] ret_from_fork_asm+0x1a/0x30 [ 14.903201] [ 14.903288] The buggy address belongs to the object at ffff8881039f9d00 [ 14.903288] which belongs to the cache kmalloc-64 of size 64 [ 14.903741] The buggy address is located 0 bytes to the right of [ 14.903741] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 14.904312] [ 14.904394] The buggy address belongs to the physical page: [ 14.904662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 14.904999] flags: 0x200000000000000(node=0|zone=2) [ 14.905255] page_type: f5(slab) [ 14.905442] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.905905] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.906268] page dumped because: kasan: bad access detected [ 14.906487] [ 14.906596] Memory state around the buggy address: [ 14.906838] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.907175] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.907560] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.907869] ^ [ 14.908084] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.908392] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.908730] ================================================================== [ 15.412297] ================================================================== [ 15.412980] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 15.413707] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.414101] [ 15.414255] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.414305] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.414319] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.414343] Call Trace: [ 15.414364] <TASK> [ 15.414381] dump_stack_lvl+0x73/0xb0 [ 15.414413] print_report+0xd1/0x610 [ 15.414437] ? __virt_addr_valid+0x1db/0x2d0 [ 15.414487] ? kasan_atomics_helper+0x164f/0x5450 [ 15.414520] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.414544] ? kasan_atomics_helper+0x164f/0x5450 [ 15.414567] kasan_report+0x141/0x180 [ 15.414591] ? kasan_atomics_helper+0x164f/0x5450 [ 15.414619] kasan_check_range+0x10c/0x1c0 [ 15.414643] __kasan_check_write+0x18/0x20 [ 15.414663] kasan_atomics_helper+0x164f/0x5450 [ 15.414686] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.414730] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.414756] ? kasan_atomics+0x152/0x310 [ 15.414784] kasan_atomics+0x1dc/0x310 [ 15.414807] ? __pfx_kasan_atomics+0x10/0x10 [ 15.414830] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.414858] ? __pfx_read_tsc+0x10/0x10 [ 15.414879] ? ktime_get_ts64+0x86/0x230 [ 15.414924] kunit_try_run_case+0x1a5/0x480 [ 15.414950] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.414972] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.414996] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.415021] ? __kthread_parkme+0x82/0x180 [ 15.415048] ? preempt_count_sub+0x50/0x80 [ 15.415074] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.415102] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.415130] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.415156] kthread+0x337/0x6f0 [ 15.415179] ? trace_preempt_on+0x20/0xc0 [ 15.415204] ? __pfx_kthread+0x10/0x10 [ 15.415225] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.415281] ? calculate_sigpending+0x7b/0xa0 [ 15.415309] ? __pfx_kthread+0x10/0x10 [ 15.415332] ret_from_fork+0x116/0x1d0 [ 15.415355] ? __pfx_kthread+0x10/0x10 [ 15.415376] ret_from_fork_asm+0x1a/0x30 [ 15.415407] </TASK> [ 15.415418] [ 15.430079] Allocated by task 283: [ 15.430567] kasan_save_stack+0x45/0x70 [ 15.431015] kasan_save_track+0x18/0x40 [ 15.431192] kasan_save_alloc_info+0x3b/0x50 [ 15.431718] __kasan_kmalloc+0xb7/0xc0 [ 15.432178] __kmalloc_cache_noprof+0x189/0x420 [ 15.432397] kasan_atomics+0x95/0x310 [ 15.432889] kunit_try_run_case+0x1a5/0x480 [ 15.433128] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.433341] kthread+0x337/0x6f0 [ 15.433626] ret_from_fork+0x116/0x1d0 [ 15.433979] ret_from_fork_asm+0x1a/0x30 [ 15.434215] [ 15.434382] The buggy address belongs to the object at ffff8881039f9d00 [ 15.434382] which belongs to the cache kmalloc-64 of size 64 [ 15.435058] The buggy address is located 0 bytes to the right of [ 15.435058] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.435763] [ 15.435947] The buggy address belongs to the physical page: [ 15.436302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.436568] flags: 0x200000000000000(node=0|zone=2) [ 15.436741] page_type: f5(slab) [ 15.436869] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.437104] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.437400] page dumped because: kasan: bad access detected [ 15.438034] [ 15.438131] Memory state around the buggy address: [ 15.438379] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.438881] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.439095] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.439687] ^ [ 15.440134] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.440952] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.441550] ================================================================== [ 15.442272] ================================================================== [ 15.442733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 15.443279] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.443761] [ 15.443876] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.443924] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.443937] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.443960] Call Trace: [ 15.443980] <TASK> [ 15.443999] dump_stack_lvl+0x73/0xb0 [ 15.444029] print_report+0xd1/0x610 [ 15.444053] ? __virt_addr_valid+0x1db/0x2d0 [ 15.444077] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.444099] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.444123] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.444146] kasan_report+0x141/0x180 [ 15.444169] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.444195] kasan_check_range+0x10c/0x1c0 [ 15.444220] __kasan_check_write+0x18/0x20 [ 15.444240] kasan_atomics_helper+0x16e7/0x5450 [ 15.444264] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.444287] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.444314] ? kasan_atomics+0x152/0x310 [ 15.444342] kasan_atomics+0x1dc/0x310 [ 15.444365] ? __pfx_kasan_atomics+0x10/0x10 [ 15.444387] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.444415] ? __pfx_read_tsc+0x10/0x10 [ 15.444437] ? ktime_get_ts64+0x86/0x230 [ 15.444462] kunit_try_run_case+0x1a5/0x480 [ 15.444488] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.444522] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.444546] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.444571] ? __kthread_parkme+0x82/0x180 [ 15.444592] ? preempt_count_sub+0x50/0x80 [ 15.444617] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.444641] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.444665] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.444691] kthread+0x337/0x6f0 [ 15.444711] ? trace_preempt_on+0x20/0xc0 [ 15.444735] ? __pfx_kthread+0x10/0x10 [ 15.444756] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.444778] ? calculate_sigpending+0x7b/0xa0 [ 15.444803] ? __pfx_kthread+0x10/0x10 [ 15.444825] ret_from_fork+0x116/0x1d0 [ 15.444844] ? __pfx_kthread+0x10/0x10 [ 15.444865] ret_from_fork_asm+0x1a/0x30 [ 15.444896] </TASK> [ 15.444908] [ 15.452566] Allocated by task 283: [ 15.452700] kasan_save_stack+0x45/0x70 [ 15.453003] kasan_save_track+0x18/0x40 [ 15.453220] kasan_save_alloc_info+0x3b/0x50 [ 15.453439] __kasan_kmalloc+0xb7/0xc0 [ 15.453647] __kmalloc_cache_noprof+0x189/0x420 [ 15.453878] kasan_atomics+0x95/0x310 [ 15.454052] kunit_try_run_case+0x1a5/0x480 [ 15.454208] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.454386] kthread+0x337/0x6f0 [ 15.454519] ret_from_fork+0x116/0x1d0 [ 15.454654] ret_from_fork_asm+0x1a/0x30 [ 15.454846] [ 15.454941] The buggy address belongs to the object at ffff8881039f9d00 [ 15.454941] which belongs to the cache kmalloc-64 of size 64 [ 15.455550] The buggy address is located 0 bytes to the right of [ 15.455550] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.455970] [ 15.456047] The buggy address belongs to the physical page: [ 15.456377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.456748] flags: 0x200000000000000(node=0|zone=2) [ 15.456997] page_type: f5(slab) [ 15.457169] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.457519] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.457835] page dumped because: kasan: bad access detected [ 15.458039] [ 15.458134] Memory state around the buggy address: [ 15.458409] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.458679] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.458970] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.459299] ^ [ 15.459495] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.459789] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.460073] ================================================================== [ 14.816267] ================================================================== [ 14.817023] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 14.817740] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 14.818386] [ 14.818552] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.818621] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.818634] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.818657] Call Trace: [ 14.818672] <TASK> [ 14.818689] dump_stack_lvl+0x73/0xb0 [ 14.818739] print_report+0xd1/0x610 [ 14.818761] ? __virt_addr_valid+0x1db/0x2d0 [ 14.818785] ? kasan_atomics_helper+0x992/0x5450 [ 14.818806] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.818830] ? kasan_atomics_helper+0x992/0x5450 [ 14.818853] kasan_report+0x141/0x180 [ 14.818876] ? kasan_atomics_helper+0x992/0x5450 [ 14.818903] kasan_check_range+0x10c/0x1c0 [ 14.818927] __kasan_check_write+0x18/0x20 [ 14.818947] kasan_atomics_helper+0x992/0x5450 [ 14.818971] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.818994] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.819021] ? kasan_atomics+0x152/0x310 [ 14.819061] kasan_atomics+0x1dc/0x310 [ 14.819085] ? __pfx_kasan_atomics+0x10/0x10 [ 14.819107] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.819135] ? __pfx_read_tsc+0x10/0x10 [ 14.819157] ? ktime_get_ts64+0x86/0x230 [ 14.819209] kunit_try_run_case+0x1a5/0x480 [ 14.819235] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.819259] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.819283] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.819308] ? __kthread_parkme+0x82/0x180 [ 14.819330] ? preempt_count_sub+0x50/0x80 [ 14.819371] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.819396] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.819434] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.819459] kthread+0x337/0x6f0 [ 14.819493] ? trace_preempt_on+0x20/0xc0 [ 14.819529] ? __pfx_kthread+0x10/0x10 [ 14.819550] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.819587] ? calculate_sigpending+0x7b/0xa0 [ 14.819613] ? __pfx_kthread+0x10/0x10 [ 14.819648] ret_from_fork+0x116/0x1d0 [ 14.819668] ? __pfx_kthread+0x10/0x10 [ 14.819689] ret_from_fork_asm+0x1a/0x30 [ 14.819721] </TASK> [ 14.819733] [ 14.833309] Allocated by task 283: [ 14.833631] kasan_save_stack+0x45/0x70 [ 14.834025] kasan_save_track+0x18/0x40 [ 14.834431] kasan_save_alloc_info+0x3b/0x50 [ 14.834853] __kasan_kmalloc+0xb7/0xc0 [ 14.835033] __kmalloc_cache_noprof+0x189/0x420 [ 14.835214] kasan_atomics+0x95/0x310 [ 14.835618] kunit_try_run_case+0x1a5/0x480 [ 14.836010] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.836617] kthread+0x337/0x6f0 [ 14.836932] ret_from_fork+0x116/0x1d0 [ 14.837308] ret_from_fork_asm+0x1a/0x30 [ 14.837454] [ 14.837538] The buggy address belongs to the object at ffff8881039f9d00 [ 14.837538] which belongs to the cache kmalloc-64 of size 64 [ 14.837900] The buggy address is located 0 bytes to the right of [ 14.837900] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 14.838552] [ 14.838767] The buggy address belongs to the physical page: [ 14.839249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 14.840160] flags: 0x200000000000000(node=0|zone=2) [ 14.840745] page_type: f5(slab) [ 14.841058] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.841730] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.842425] page dumped because: kasan: bad access detected [ 14.842927] [ 14.843083] Memory state around the buggy address: [ 14.843551] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.844177] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.844529] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.844748] ^ [ 14.844905] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.845125] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.845794] ================================================================== [ 15.143245] ================================================================== [ 15.143969] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 15.144859] Read of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.145423] [ 15.145676] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.145728] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.145848] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.145872] Call Trace: [ 15.145894] <TASK> [ 15.145914] dump_stack_lvl+0x73/0xb0 [ 15.145947] print_report+0xd1/0x610 [ 15.145971] ? __virt_addr_valid+0x1db/0x2d0 [ 15.146038] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.146061] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.146085] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.146107] kasan_report+0x141/0x180 [ 15.146130] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.146158] __asan_report_load4_noabort+0x18/0x20 [ 15.146184] kasan_atomics_helper+0x4a1c/0x5450 [ 15.146215] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.146238] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.146265] ? kasan_atomics+0x152/0x310 [ 15.146291] kasan_atomics+0x1dc/0x310 [ 15.146314] ? __pfx_kasan_atomics+0x10/0x10 [ 15.146337] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.146365] ? __pfx_read_tsc+0x10/0x10 [ 15.146386] ? ktime_get_ts64+0x86/0x230 [ 15.146412] kunit_try_run_case+0x1a5/0x480 [ 15.146438] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.146461] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.146484] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.146520] ? __kthread_parkme+0x82/0x180 [ 15.146542] ? preempt_count_sub+0x50/0x80 [ 15.146567] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.146591] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.146616] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.146640] kthread+0x337/0x6f0 [ 15.146661] ? trace_preempt_on+0x20/0xc0 [ 15.146685] ? __pfx_kthread+0x10/0x10 [ 15.146706] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.146729] ? calculate_sigpending+0x7b/0xa0 [ 15.146754] ? __pfx_kthread+0x10/0x10 [ 15.146775] ret_from_fork+0x116/0x1d0 [ 15.146795] ? __pfx_kthread+0x10/0x10 [ 15.146815] ret_from_fork_asm+0x1a/0x30 [ 15.146847] </TASK> [ 15.146859] [ 15.158460] Allocated by task 283: [ 15.158781] kasan_save_stack+0x45/0x70 [ 15.158979] kasan_save_track+0x18/0x40 [ 15.159364] kasan_save_alloc_info+0x3b/0x50 [ 15.159634] __kasan_kmalloc+0xb7/0xc0 [ 15.159930] __kmalloc_cache_noprof+0x189/0x420 [ 15.160160] kasan_atomics+0x95/0x310 [ 15.160337] kunit_try_run_case+0x1a5/0x480 [ 15.160535] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.160767] kthread+0x337/0x6f0 [ 15.160919] ret_from_fork+0x116/0x1d0 [ 15.161086] ret_from_fork_asm+0x1a/0x30 [ 15.161402] [ 15.161511] The buggy address belongs to the object at ffff8881039f9d00 [ 15.161511] which belongs to the cache kmalloc-64 of size 64 [ 15.161877] The buggy address is located 0 bytes to the right of [ 15.161877] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.162379] [ 15.162557] The buggy address belongs to the physical page: [ 15.162771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.163097] flags: 0x200000000000000(node=0|zone=2) [ 15.163269] page_type: f5(slab) [ 15.163398] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.163949] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.164271] page dumped because: kasan: bad access detected [ 15.164448] [ 15.164526] Memory state around the buggy address: [ 15.164822] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.165136] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.165552] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.165766] ^ [ 15.165989] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.166386] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.166665] ================================================================== [ 14.670478] ================================================================== [ 14.670818] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 14.671584] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 14.672438] [ 14.672573] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.672624] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.672637] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.672660] Call Trace: [ 14.672682] <TASK> [ 14.672702] dump_stack_lvl+0x73/0xb0 [ 14.672735] print_report+0xd1/0x610 [ 14.672759] ? __virt_addr_valid+0x1db/0x2d0 [ 14.672783] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.672804] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.672828] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.672850] kasan_report+0x141/0x180 [ 14.672873] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.672901] kasan_check_range+0x10c/0x1c0 [ 14.672925] __kasan_check_write+0x18/0x20 [ 14.672945] kasan_atomics_helper+0x5fe/0x5450 [ 14.672968] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.672991] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.673018] ? kasan_atomics+0x152/0x310 [ 14.673105] kasan_atomics+0x1dc/0x310 [ 14.673130] ? __pfx_kasan_atomics+0x10/0x10 [ 14.673154] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.673205] ? __pfx_read_tsc+0x10/0x10 [ 14.673229] ? ktime_get_ts64+0x86/0x230 [ 14.673256] kunit_try_run_case+0x1a5/0x480 [ 14.673296] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.673319] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.673356] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.673380] ? __kthread_parkme+0x82/0x180 [ 14.673416] ? preempt_count_sub+0x50/0x80 [ 14.673441] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.673479] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.673575] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.673601] kthread+0x337/0x6f0 [ 14.673622] ? trace_preempt_on+0x20/0xc0 [ 14.673647] ? __pfx_kthread+0x10/0x10 [ 14.673667] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.673689] ? calculate_sigpending+0x7b/0xa0 [ 14.673714] ? __pfx_kthread+0x10/0x10 [ 14.673736] ret_from_fork+0x116/0x1d0 [ 14.673755] ? __pfx_kthread+0x10/0x10 [ 14.673777] ret_from_fork_asm+0x1a/0x30 [ 14.673809] </TASK> [ 14.673821] [ 14.683292] Allocated by task 283: [ 14.683669] kasan_save_stack+0x45/0x70 [ 14.684082] kasan_save_track+0x18/0x40 [ 14.684359] kasan_save_alloc_info+0x3b/0x50 [ 14.684600] __kasan_kmalloc+0xb7/0xc0 [ 14.684791] __kmalloc_cache_noprof+0x189/0x420 [ 14.684950] kasan_atomics+0x95/0x310 [ 14.685110] kunit_try_run_case+0x1a5/0x480 [ 14.685355] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.685805] kthread+0x337/0x6f0 [ 14.685985] ret_from_fork+0x116/0x1d0 [ 14.686382] ret_from_fork_asm+0x1a/0x30 [ 14.686633] [ 14.686711] The buggy address belongs to the object at ffff8881039f9d00 [ 14.686711] which belongs to the cache kmalloc-64 of size 64 [ 14.687086] The buggy address is located 0 bytes to the right of [ 14.687086] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 14.687745] [ 14.687997] The buggy address belongs to the physical page: [ 14.688414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 14.688738] flags: 0x200000000000000(node=0|zone=2) [ 14.688978] page_type: f5(slab) [ 14.689155] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.689389] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.689738] page dumped because: kasan: bad access detected [ 14.690006] [ 14.690081] Memory state around the buggy address: [ 14.690252] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.690901] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.691425] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.691764] ^ [ 14.691995] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.692224] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.692443] ================================================================== [ 15.720039] ================================================================== [ 15.721002] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 15.721691] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.722111] [ 15.722656] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.722710] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.722723] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.722746] Call Trace: [ 15.722776] <TASK> [ 15.722795] dump_stack_lvl+0x73/0xb0 [ 15.722827] print_report+0xd1/0x610 [ 15.722851] ? __virt_addr_valid+0x1db/0x2d0 [ 15.722876] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.722898] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.722922] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.722944] kasan_report+0x141/0x180 [ 15.722966] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.722994] kasan_check_range+0x10c/0x1c0 [ 15.723018] __kasan_check_write+0x18/0x20 [ 15.723038] kasan_atomics_helper+0x1d7a/0x5450 [ 15.723062] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.723085] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.723110] ? kasan_atomics+0x152/0x310 [ 15.723137] kasan_atomics+0x1dc/0x310 [ 15.723160] ? __pfx_kasan_atomics+0x10/0x10 [ 15.723183] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.723211] ? __pfx_read_tsc+0x10/0x10 [ 15.723233] ? ktime_get_ts64+0x86/0x230 [ 15.723259] kunit_try_run_case+0x1a5/0x480 [ 15.723285] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.723308] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.723331] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.723356] ? __kthread_parkme+0x82/0x180 [ 15.723377] ? preempt_count_sub+0x50/0x80 [ 15.723402] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.723426] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.723452] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.723477] kthread+0x337/0x6f0 [ 15.723506] ? trace_preempt_on+0x20/0xc0 [ 15.723531] ? __pfx_kthread+0x10/0x10 [ 15.723552] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.723575] ? calculate_sigpending+0x7b/0xa0 [ 15.723601] ? __pfx_kthread+0x10/0x10 [ 15.723622] ret_from_fork+0x116/0x1d0 [ 15.723643] ? __pfx_kthread+0x10/0x10 [ 15.723664] ret_from_fork_asm+0x1a/0x30 [ 15.723697] </TASK> [ 15.723708] [ 15.731370] Allocated by task 283: [ 15.731562] kasan_save_stack+0x45/0x70 [ 15.731725] kasan_save_track+0x18/0x40 [ 15.731917] kasan_save_alloc_info+0x3b/0x50 [ 15.732109] __kasan_kmalloc+0xb7/0xc0 [ 15.732384] __kmalloc_cache_noprof+0x189/0x420 [ 15.732595] kasan_atomics+0x95/0x310 [ 15.732781] kunit_try_run_case+0x1a5/0x480 [ 15.732973] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.733152] kthread+0x337/0x6f0 [ 15.733389] ret_from_fork+0x116/0x1d0 [ 15.733562] ret_from_fork_asm+0x1a/0x30 [ 15.733728] [ 15.733828] The buggy address belongs to the object at ffff8881039f9d00 [ 15.733828] which belongs to the cache kmalloc-64 of size 64 [ 15.734314] The buggy address is located 0 bytes to the right of [ 15.734314] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.734814] [ 15.734911] The buggy address belongs to the physical page: [ 15.735145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.735407] flags: 0x200000000000000(node=0|zone=2) [ 15.735587] page_type: f5(slab) [ 15.735715] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.735951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.736191] page dumped because: kasan: bad access detected [ 15.736439] [ 15.736596] Memory state around the buggy address: [ 15.736817] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.737131] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.737443] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.737762] ^ [ 15.738086] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.738306] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.738527] ================================================================== [ 15.460685] ================================================================== [ 15.461219] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 15.461579] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.461895] [ 15.461981] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.462027] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.462040] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.462063] Call Trace: [ 15.462082] <TASK> [ 15.462099] dump_stack_lvl+0x73/0xb0 [ 15.462129] print_report+0xd1/0x610 [ 15.462151] ? __virt_addr_valid+0x1db/0x2d0 [ 15.462184] ? kasan_atomics_helper+0x177f/0x5450 [ 15.462212] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.462236] ? kasan_atomics_helper+0x177f/0x5450 [ 15.462260] kasan_report+0x141/0x180 [ 15.462283] ? kasan_atomics_helper+0x177f/0x5450 [ 15.462310] kasan_check_range+0x10c/0x1c0 [ 15.462335] __kasan_check_write+0x18/0x20 [ 15.462355] kasan_atomics_helper+0x177f/0x5450 [ 15.462379] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.462402] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.462428] ? kasan_atomics+0x152/0x310 [ 15.462456] kasan_atomics+0x1dc/0x310 [ 15.462479] ? __pfx_kasan_atomics+0x10/0x10 [ 15.462512] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.462540] ? __pfx_read_tsc+0x10/0x10 [ 15.462562] ? ktime_get_ts64+0x86/0x230 [ 15.462587] kunit_try_run_case+0x1a5/0x480 [ 15.462613] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.462636] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.462660] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.462684] ? __kthread_parkme+0x82/0x180 [ 15.462707] ? preempt_count_sub+0x50/0x80 [ 15.462732] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.462757] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.462781] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.462807] kthread+0x337/0x6f0 [ 15.462827] ? trace_preempt_on+0x20/0xc0 [ 15.462852] ? __pfx_kthread+0x10/0x10 [ 15.462872] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.462894] ? calculate_sigpending+0x7b/0xa0 [ 15.462919] ? __pfx_kthread+0x10/0x10 [ 15.462941] ret_from_fork+0x116/0x1d0 [ 15.462961] ? __pfx_kthread+0x10/0x10 [ 15.462982] ret_from_fork_asm+0x1a/0x30 [ 15.463014] </TASK> [ 15.463025] [ 15.470980] Allocated by task 283: [ 15.471141] kasan_save_stack+0x45/0x70 [ 15.471315] kasan_save_track+0x18/0x40 [ 15.471523] kasan_save_alloc_info+0x3b/0x50 [ 15.471710] __kasan_kmalloc+0xb7/0xc0 [ 15.471896] __kmalloc_cache_noprof+0x189/0x420 [ 15.472086] kasan_atomics+0x95/0x310 [ 15.472256] kunit_try_run_case+0x1a5/0x480 [ 15.472446] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.472656] kthread+0x337/0x6f0 [ 15.472811] ret_from_fork+0x116/0x1d0 [ 15.472999] ret_from_fork_asm+0x1a/0x30 [ 15.473191] [ 15.473282] The buggy address belongs to the object at ffff8881039f9d00 [ 15.473282] which belongs to the cache kmalloc-64 of size 64 [ 15.473660] The buggy address is located 0 bytes to the right of [ 15.473660] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.474030] [ 15.474103] The buggy address belongs to the physical page: [ 15.474288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.474544] flags: 0x200000000000000(node=0|zone=2) [ 15.474715] page_type: f5(slab) [ 15.474839] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.475140] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.475801] page dumped because: kasan: bad access detected [ 15.476053] [ 15.476146] Memory state around the buggy address: [ 15.476628] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.476911] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.477132] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.477454] ^ [ 15.477683] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.477952] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.478181] ================================================================== [ 15.859430] ================================================================== [ 15.859779] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 15.860122] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.860414] [ 15.860525] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.860571] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.860583] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.860606] Call Trace: [ 15.860624] <TASK> [ 15.860642] dump_stack_lvl+0x73/0xb0 [ 15.860671] print_report+0xd1/0x610 [ 15.860693] ? __virt_addr_valid+0x1db/0x2d0 [ 15.860717] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.860740] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.860763] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.860786] kasan_report+0x141/0x180 [ 15.860808] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.861551] kasan_check_range+0x10c/0x1c0 [ 15.861588] __kasan_check_write+0x18/0x20 [ 15.861608] kasan_atomics_helper+0x20c8/0x5450 [ 15.861632] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.861655] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.861680] ? kasan_atomics+0x152/0x310 [ 15.861708] kasan_atomics+0x1dc/0x310 [ 15.861730] ? __pfx_kasan_atomics+0x10/0x10 [ 15.861753] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.861781] ? __pfx_read_tsc+0x10/0x10 [ 15.861803] ? ktime_get_ts64+0x86/0x230 [ 15.861828] kunit_try_run_case+0x1a5/0x480 [ 15.861854] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.861878] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.861902] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.861927] ? __kthread_parkme+0x82/0x180 [ 15.861948] ? preempt_count_sub+0x50/0x80 [ 15.861974] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.861998] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.862023] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.862048] kthread+0x337/0x6f0 [ 15.862067] ? trace_preempt_on+0x20/0xc0 [ 15.862091] ? __pfx_kthread+0x10/0x10 [ 15.862112] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.862134] ? calculate_sigpending+0x7b/0xa0 [ 15.862160] ? __pfx_kthread+0x10/0x10 [ 15.862255] ret_from_fork+0x116/0x1d0 [ 15.862278] ? __pfx_kthread+0x10/0x10 [ 15.862299] ret_from_fork_asm+0x1a/0x30 [ 15.862331] </TASK> [ 15.862343] [ 15.875969] Allocated by task 283: [ 15.876209] kasan_save_stack+0x45/0x70 [ 15.876598] kasan_save_track+0x18/0x40 [ 15.876904] kasan_save_alloc_info+0x3b/0x50 [ 15.877209] __kasan_kmalloc+0xb7/0xc0 [ 15.877347] __kmalloc_cache_noprof+0x189/0x420 [ 15.877519] kasan_atomics+0x95/0x310 [ 15.877656] kunit_try_run_case+0x1a5/0x480 [ 15.877805] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.877980] kthread+0x337/0x6f0 [ 15.878101] ret_from_fork+0x116/0x1d0 [ 15.878257] ret_from_fork_asm+0x1a/0x30 [ 15.878397] [ 15.878470] The buggy address belongs to the object at ffff8881039f9d00 [ 15.878470] which belongs to the cache kmalloc-64 of size 64 [ 15.878946] The buggy address is located 0 bytes to the right of [ 15.878946] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.879975] [ 15.880134] The buggy address belongs to the physical page: [ 15.880762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.881608] flags: 0x200000000000000(node=0|zone=2) [ 15.882173] page_type: f5(slab) [ 15.882489] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.882948] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.883192] page dumped because: kasan: bad access detected [ 15.883576] [ 15.883740] Memory state around the buggy address: [ 15.884121] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.884394] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.885009] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.885244] ^ [ 15.885685] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.886165] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.886425] ================================================================== [ 14.771713] ================================================================== [ 14.772360] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 14.772703] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 14.773115] [ 14.773234] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.773305] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.773318] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.773355] Call Trace: [ 14.773375] <TASK> [ 14.773405] dump_stack_lvl+0x73/0xb0 [ 14.773449] print_report+0xd1/0x610 [ 14.773485] ? __virt_addr_valid+0x1db/0x2d0 [ 14.773535] ? kasan_atomics_helper+0x860/0x5450 [ 14.773557] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.773594] ? kasan_atomics_helper+0x860/0x5450 [ 14.773630] kasan_report+0x141/0x180 [ 14.773666] ? kasan_atomics_helper+0x860/0x5450 [ 14.773706] kasan_check_range+0x10c/0x1c0 [ 14.773731] __kasan_check_write+0x18/0x20 [ 14.773751] kasan_atomics_helper+0x860/0x5450 [ 14.773775] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.773798] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.773824] ? kasan_atomics+0x152/0x310 [ 14.773852] kasan_atomics+0x1dc/0x310 [ 14.773874] ? __pfx_kasan_atomics+0x10/0x10 [ 14.773897] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.773925] ? __pfx_read_tsc+0x10/0x10 [ 14.773947] ? ktime_get_ts64+0x86/0x230 [ 14.773972] kunit_try_run_case+0x1a5/0x480 [ 14.773997] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.774020] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.774044] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.774067] ? __kthread_parkme+0x82/0x180 [ 14.774089] ? preempt_count_sub+0x50/0x80 [ 14.774114] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.774138] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.774163] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.774188] kthread+0x337/0x6f0 [ 14.774212] ? trace_preempt_on+0x20/0xc0 [ 14.774236] ? __pfx_kthread+0x10/0x10 [ 14.774257] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.774278] ? calculate_sigpending+0x7b/0xa0 [ 14.774304] ? __pfx_kthread+0x10/0x10 [ 14.774325] ret_from_fork+0x116/0x1d0 [ 14.774365] ? __pfx_kthread+0x10/0x10 [ 14.774385] ret_from_fork_asm+0x1a/0x30 [ 14.774418] </TASK> [ 14.774429] [ 14.783614] Allocated by task 283: [ 14.783805] kasan_save_stack+0x45/0x70 [ 14.784012] kasan_save_track+0x18/0x40 [ 14.784201] kasan_save_alloc_info+0x3b/0x50 [ 14.784593] __kasan_kmalloc+0xb7/0xc0 [ 14.784747] __kmalloc_cache_noprof+0x189/0x420 [ 14.784906] kasan_atomics+0x95/0x310 [ 14.785100] kunit_try_run_case+0x1a5/0x480 [ 14.785677] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.785948] kthread+0x337/0x6f0 [ 14.786339] ret_from_fork+0x116/0x1d0 [ 14.786564] ret_from_fork_asm+0x1a/0x30 [ 14.786749] [ 14.786850] The buggy address belongs to the object at ffff8881039f9d00 [ 14.786850] which belongs to the cache kmalloc-64 of size 64 [ 14.787465] The buggy address is located 0 bytes to the right of [ 14.787465] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 14.787987] [ 14.788102] The buggy address belongs to the physical page: [ 14.788451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 14.788829] flags: 0x200000000000000(node=0|zone=2) [ 14.789057] page_type: f5(slab) [ 14.789434] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.789795] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.790158] page dumped because: kasan: bad access detected [ 14.790394] [ 14.790490] Memory state around the buggy address: [ 14.790689] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.790907] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.791125] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.791748] ^ [ 14.792004] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.792483] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.792738] ================================================================== [ 14.978265] ================================================================== [ 14.978553] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 14.979187] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 14.979540] [ 14.980277] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.980331] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.980345] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.980369] Call Trace: [ 14.980391] <TASK> [ 14.980445] dump_stack_lvl+0x73/0xb0 [ 14.980479] print_report+0xd1/0x610 [ 14.980522] ? __virt_addr_valid+0x1db/0x2d0 [ 14.980549] ? kasan_atomics_helper+0xd47/0x5450 [ 14.980572] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.980624] ? kasan_atomics_helper+0xd47/0x5450 [ 14.980647] kasan_report+0x141/0x180 [ 14.980681] ? kasan_atomics_helper+0xd47/0x5450 [ 14.980708] kasan_check_range+0x10c/0x1c0 [ 14.980733] __kasan_check_write+0x18/0x20 [ 14.980784] kasan_atomics_helper+0xd47/0x5450 [ 14.980808] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.980831] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.980868] ? kasan_atomics+0x152/0x310 [ 14.980896] kasan_atomics+0x1dc/0x310 [ 14.980918] ? __pfx_kasan_atomics+0x10/0x10 [ 14.980941] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.980968] ? __pfx_read_tsc+0x10/0x10 [ 14.980990] ? ktime_get_ts64+0x86/0x230 [ 14.981016] kunit_try_run_case+0x1a5/0x480 [ 14.981042] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.981065] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.981089] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.981112] ? __kthread_parkme+0x82/0x180 [ 14.981134] ? preempt_count_sub+0x50/0x80 [ 14.981180] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.981205] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.981241] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.981266] kthread+0x337/0x6f0 [ 14.981286] ? trace_preempt_on+0x20/0xc0 [ 14.981322] ? __pfx_kthread+0x10/0x10 [ 14.981343] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.981365] ? calculate_sigpending+0x7b/0xa0 [ 14.981402] ? __pfx_kthread+0x10/0x10 [ 14.981423] ret_from_fork+0x116/0x1d0 [ 14.981443] ? __pfx_kthread+0x10/0x10 [ 14.981473] ret_from_fork_asm+0x1a/0x30 [ 14.981522] </TASK> [ 14.981534] [ 14.990163] Allocated by task 283: [ 14.990356] kasan_save_stack+0x45/0x70 [ 14.990594] kasan_save_track+0x18/0x40 [ 14.990827] kasan_save_alloc_info+0x3b/0x50 [ 14.991024] __kasan_kmalloc+0xb7/0xc0 [ 14.991252] __kmalloc_cache_noprof+0x189/0x420 [ 14.991516] kasan_atomics+0x95/0x310 [ 14.991743] kunit_try_run_case+0x1a5/0x480 [ 14.991947] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.992250] kthread+0x337/0x6f0 [ 14.992447] ret_from_fork+0x116/0x1d0 [ 14.992673] ret_from_fork_asm+0x1a/0x30 [ 14.992908] [ 14.992984] The buggy address belongs to the object at ffff8881039f9d00 [ 14.992984] which belongs to the cache kmalloc-64 of size 64 [ 14.993576] The buggy address is located 0 bytes to the right of [ 14.993576] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 14.993956] [ 14.994037] The buggy address belongs to the physical page: [ 14.994329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 14.994763] flags: 0x200000000000000(node=0|zone=2) [ 14.995009] page_type: f5(slab) [ 14.995251] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.995646] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.996011] page dumped because: kasan: bad access detected [ 14.996351] [ 14.996427] Memory state around the buggy address: [ 14.996598] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.996820] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.997039] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.997439] ^ [ 14.997756] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.998212] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.998617] ================================================================== [ 15.058419] ================================================================== [ 15.058960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 15.059491] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.060173] [ 15.060303] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.060363] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.060376] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.060400] Call Trace: [ 15.060430] <TASK> [ 15.060449] dump_stack_lvl+0x73/0xb0 [ 15.060479] print_report+0xd1/0x610 [ 15.060510] ? __virt_addr_valid+0x1db/0x2d0 [ 15.060543] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.060565] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.060589] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.060622] kasan_report+0x141/0x180 [ 15.060645] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.060672] kasan_check_range+0x10c/0x1c0 [ 15.060696] __kasan_check_write+0x18/0x20 [ 15.060716] kasan_atomics_helper+0xfa9/0x5450 [ 15.060740] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.060763] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.060790] ? kasan_atomics+0x152/0x310 [ 15.060818] kasan_atomics+0x1dc/0x310 [ 15.060841] ? __pfx_kasan_atomics+0x10/0x10 [ 15.060864] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.060891] ? __pfx_read_tsc+0x10/0x10 [ 15.060913] ? ktime_get_ts64+0x86/0x230 [ 15.060938] kunit_try_run_case+0x1a5/0x480 [ 15.060964] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.060987] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.061011] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.061036] ? __kthread_parkme+0x82/0x180 [ 15.061057] ? preempt_count_sub+0x50/0x80 [ 15.061083] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.061107] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.061132] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.061176] kthread+0x337/0x6f0 [ 15.061197] ? trace_preempt_on+0x20/0xc0 [ 15.061220] ? __pfx_kthread+0x10/0x10 [ 15.061241] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.061264] ? calculate_sigpending+0x7b/0xa0 [ 15.061289] ? __pfx_kthread+0x10/0x10 [ 15.061312] ret_from_fork+0x116/0x1d0 [ 15.061333] ? __pfx_kthread+0x10/0x10 [ 15.061355] ret_from_fork_asm+0x1a/0x30 [ 15.061387] </TASK> [ 15.061398] [ 15.074626] Allocated by task 283: [ 15.074900] kasan_save_stack+0x45/0x70 [ 15.075312] kasan_save_track+0x18/0x40 [ 15.075466] kasan_save_alloc_info+0x3b/0x50 [ 15.075965] __kasan_kmalloc+0xb7/0xc0 [ 15.076173] __kmalloc_cache_noprof+0x189/0x420 [ 15.076620] kasan_atomics+0x95/0x310 [ 15.076762] kunit_try_run_case+0x1a5/0x480 [ 15.076999] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.077536] kthread+0x337/0x6f0 [ 15.077858] ret_from_fork+0x116/0x1d0 [ 15.078169] ret_from_fork_asm+0x1a/0x30 [ 15.078504] [ 15.078672] The buggy address belongs to the object at ffff8881039f9d00 [ 15.078672] which belongs to the cache kmalloc-64 of size 64 [ 15.079457] The buggy address is located 0 bytes to the right of [ 15.079457] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.080110] [ 15.080305] The buggy address belongs to the physical page: [ 15.080806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.081529] flags: 0x200000000000000(node=0|zone=2) [ 15.081873] page_type: f5(slab) [ 15.082067] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.082754] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.082987] page dumped because: kasan: bad access detected [ 15.083191] [ 15.083366] Memory state around the buggy address: [ 15.083818] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.084450] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.085081] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.085650] ^ [ 15.085810] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.086027] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.086472] ================================================================== [ 15.969186] ================================================================== [ 15.969961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 15.970337] Read of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.970572] [ 15.970660] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.970705] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.970718] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.970740] Call Trace: [ 15.970759] <TASK> [ 15.970777] dump_stack_lvl+0x73/0xb0 [ 15.970806] print_report+0xd1/0x610 [ 15.970827] ? __virt_addr_valid+0x1db/0x2d0 [ 15.970851] ? kasan_atomics_helper+0x5115/0x5450 [ 15.970873] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.970897] ? kasan_atomics_helper+0x5115/0x5450 [ 15.970919] kasan_report+0x141/0x180 [ 15.970942] ? kasan_atomics_helper+0x5115/0x5450 [ 15.970969] __asan_report_load8_noabort+0x18/0x20 [ 15.970993] kasan_atomics_helper+0x5115/0x5450 [ 15.971037] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.971061] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.971086] ? kasan_atomics+0x152/0x310 [ 15.971113] kasan_atomics+0x1dc/0x310 [ 15.971137] ? __pfx_kasan_atomics+0x10/0x10 [ 15.971160] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.971187] ? __pfx_read_tsc+0x10/0x10 [ 15.971209] ? ktime_get_ts64+0x86/0x230 [ 15.971234] kunit_try_run_case+0x1a5/0x480 [ 15.971258] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.971282] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.971305] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.971329] ? __kthread_parkme+0x82/0x180 [ 15.971351] ? preempt_count_sub+0x50/0x80 [ 15.971388] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.971423] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.971459] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.971484] kthread+0x337/0x6f0 [ 15.971513] ? trace_preempt_on+0x20/0xc0 [ 15.971537] ? __pfx_kthread+0x10/0x10 [ 15.971558] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.971581] ? calculate_sigpending+0x7b/0xa0 [ 15.971606] ? __pfx_kthread+0x10/0x10 [ 15.971636] ret_from_fork+0x116/0x1d0 [ 15.971666] ? __pfx_kthread+0x10/0x10 [ 15.971687] ret_from_fork_asm+0x1a/0x30 [ 15.971729] </TASK> [ 15.971740] [ 15.979179] Allocated by task 283: [ 15.979329] kasan_save_stack+0x45/0x70 [ 15.979531] kasan_save_track+0x18/0x40 [ 15.979709] kasan_save_alloc_info+0x3b/0x50 [ 15.979906] __kasan_kmalloc+0xb7/0xc0 [ 15.980081] __kmalloc_cache_noprof+0x189/0x420 [ 15.980364] kasan_atomics+0x95/0x310 [ 15.980564] kunit_try_run_case+0x1a5/0x480 [ 15.980738] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.980991] kthread+0x337/0x6f0 [ 15.981157] ret_from_fork+0x116/0x1d0 [ 15.981382] ret_from_fork_asm+0x1a/0x30 [ 15.981601] [ 15.981711] The buggy address belongs to the object at ffff8881039f9d00 [ 15.981711] which belongs to the cache kmalloc-64 of size 64 [ 15.982226] The buggy address is located 0 bytes to the right of [ 15.982226] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.982790] [ 15.982883] The buggy address belongs to the physical page: [ 15.983120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.983490] flags: 0x200000000000000(node=0|zone=2) [ 15.983760] page_type: f5(slab) [ 15.983887] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.984125] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.984876] page dumped because: kasan: bad access detected [ 15.985118] [ 15.985236] Memory state around the buggy address: [ 15.985435] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.985663] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.986002] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.986416] ^ [ 15.986665] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.987422] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.987722] ================================================================== [ 15.202773] ================================================================== [ 15.203124] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 15.203461] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.203962] [ 15.204052] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.204097] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.204109] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.204132] Call Trace: [ 15.204149] <TASK> [ 15.204165] dump_stack_lvl+0x73/0xb0 [ 15.204193] print_report+0xd1/0x610 [ 15.204215] ? __virt_addr_valid+0x1db/0x2d0 [ 15.204239] ? kasan_atomics_helper+0x1217/0x5450 [ 15.204260] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.204282] ? kasan_atomics_helper+0x1217/0x5450 [ 15.204304] kasan_report+0x141/0x180 [ 15.204326] ? kasan_atomics_helper+0x1217/0x5450 [ 15.204352] kasan_check_range+0x10c/0x1c0 [ 15.204375] __kasan_check_write+0x18/0x20 [ 15.204395] kasan_atomics_helper+0x1217/0x5450 [ 15.204418] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.204441] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.204465] ? kasan_atomics+0x152/0x310 [ 15.204492] kasan_atomics+0x1dc/0x310 [ 15.204525] ? __pfx_kasan_atomics+0x10/0x10 [ 15.204547] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.204587] ? __pfx_read_tsc+0x10/0x10 [ 15.204609] ? ktime_get_ts64+0x86/0x230 [ 15.204634] kunit_try_run_case+0x1a5/0x480 [ 15.204660] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.204683] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.204706] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.204730] ? __kthread_parkme+0x82/0x180 [ 15.204751] ? preempt_count_sub+0x50/0x80 [ 15.204775] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.204800] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.204825] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.204850] kthread+0x337/0x6f0 [ 15.204870] ? trace_preempt_on+0x20/0xc0 [ 15.204894] ? __pfx_kthread+0x10/0x10 [ 15.204915] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.204937] ? calculate_sigpending+0x7b/0xa0 [ 15.204962] ? __pfx_kthread+0x10/0x10 [ 15.204984] ret_from_fork+0x116/0x1d0 [ 15.205003] ? __pfx_kthread+0x10/0x10 [ 15.205024] ret_from_fork_asm+0x1a/0x30 [ 15.205056] </TASK> [ 15.205068] [ 15.213064] Allocated by task 283: [ 15.213306] kasan_save_stack+0x45/0x70 [ 15.213485] kasan_save_track+0x18/0x40 [ 15.213663] kasan_save_alloc_info+0x3b/0x50 [ 15.213813] __kasan_kmalloc+0xb7/0xc0 [ 15.213947] __kmalloc_cache_noprof+0x189/0x420 [ 15.214106] kasan_atomics+0x95/0x310 [ 15.214247] kunit_try_run_case+0x1a5/0x480 [ 15.214396] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.214582] kthread+0x337/0x6f0 [ 15.214705] ret_from_fork+0x116/0x1d0 [ 15.214839] ret_from_fork_asm+0x1a/0x30 [ 15.214980] [ 15.215053] The buggy address belongs to the object at ffff8881039f9d00 [ 15.215053] which belongs to the cache kmalloc-64 of size 64 [ 15.215410] The buggy address is located 0 bytes to the right of [ 15.215410] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.215968] [ 15.216065] The buggy address belongs to the physical page: [ 15.216318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.216694] flags: 0x200000000000000(node=0|zone=2) [ 15.216929] page_type: f5(slab) [ 15.217099] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.217434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.219033] page dumped because: kasan: bad access detected [ 15.219333] [ 15.219430] Memory state around the buggy address: [ 15.219662] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.219977] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.220663] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.220988] ^ [ 15.221439] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.222127] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.222493] ================================================================== [ 15.637364] ================================================================== [ 15.638120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 15.638612] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.639332] [ 15.639619] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.639674] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.639688] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.639710] Call Trace: [ 15.639730] <TASK> [ 15.639749] dump_stack_lvl+0x73/0xb0 [ 15.639822] print_report+0xd1/0x610 [ 15.639845] ? __virt_addr_valid+0x1db/0x2d0 [ 15.639869] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.639891] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.639915] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.639938] kasan_report+0x141/0x180 [ 15.639961] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.639987] kasan_check_range+0x10c/0x1c0 [ 15.640012] __kasan_check_write+0x18/0x20 [ 15.640032] kasan_atomics_helper+0x1c18/0x5450 [ 15.640056] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.640079] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.640106] ? kasan_atomics+0x152/0x310 [ 15.640132] kasan_atomics+0x1dc/0x310 [ 15.640155] ? __pfx_kasan_atomics+0x10/0x10 [ 15.640187] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.640214] ? __pfx_read_tsc+0x10/0x10 [ 15.640236] ? ktime_get_ts64+0x86/0x230 [ 15.640261] kunit_try_run_case+0x1a5/0x480 [ 15.640286] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.640309] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.640333] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.640357] ? __kthread_parkme+0x82/0x180 [ 15.640378] ? preempt_count_sub+0x50/0x80 [ 15.640404] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.640428] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.640452] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.640477] kthread+0x337/0x6f0 [ 15.640509] ? trace_preempt_on+0x20/0xc0 [ 15.640533] ? __pfx_kthread+0x10/0x10 [ 15.640555] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.640577] ? calculate_sigpending+0x7b/0xa0 [ 15.640602] ? __pfx_kthread+0x10/0x10 [ 15.640623] ret_from_fork+0x116/0x1d0 [ 15.640643] ? __pfx_kthread+0x10/0x10 [ 15.640664] ret_from_fork_asm+0x1a/0x30 [ 15.640696] </TASK> [ 15.640706] [ 15.652234] Allocated by task 283: [ 15.652535] kasan_save_stack+0x45/0x70 [ 15.652933] kasan_save_track+0x18/0x40 [ 15.653127] kasan_save_alloc_info+0x3b/0x50 [ 15.653491] __kasan_kmalloc+0xb7/0xc0 [ 15.653682] __kmalloc_cache_noprof+0x189/0x420 [ 15.653885] kasan_atomics+0x95/0x310 [ 15.654054] kunit_try_run_case+0x1a5/0x480 [ 15.654647] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.654924] kthread+0x337/0x6f0 [ 15.655209] ret_from_fork+0x116/0x1d0 [ 15.655600] ret_from_fork_asm+0x1a/0x30 [ 15.655914] [ 15.656143] The buggy address belongs to the object at ffff8881039f9d00 [ 15.656143] which belongs to the cache kmalloc-64 of size 64 [ 15.656650] The buggy address is located 0 bytes to the right of [ 15.656650] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.657127] [ 15.657618] The buggy address belongs to the physical page: [ 15.657922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.658520] flags: 0x200000000000000(node=0|zone=2) [ 15.658888] page_type: f5(slab) [ 15.659355] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.659805] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.660097] page dumped because: kasan: bad access detected [ 15.660735] [ 15.660822] Memory state around the buggy address: [ 15.661267] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.661695] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.662135] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.662587] ^ [ 15.662790] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.663059] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.663638] ================================================================== [ 14.870139] ================================================================== [ 14.870508] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 14.870750] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 14.870969] [ 14.871059] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.871106] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.871118] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.871141] Call Trace: [ 14.871160] <TASK> [ 14.871179] dump_stack_lvl+0x73/0xb0 [ 14.871207] print_report+0xd1/0x610 [ 14.871230] ? __virt_addr_valid+0x1db/0x2d0 [ 14.871253] ? kasan_atomics_helper+0xac7/0x5450 [ 14.871273] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.871295] ? kasan_atomics_helper+0xac7/0x5450 [ 14.871316] kasan_report+0x141/0x180 [ 14.871338] ? kasan_atomics_helper+0xac7/0x5450 [ 14.871363] kasan_check_range+0x10c/0x1c0 [ 14.871386] __kasan_check_write+0x18/0x20 [ 14.871405] kasan_atomics_helper+0xac7/0x5450 [ 14.871427] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.871450] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.871475] ? kasan_atomics+0x152/0x310 [ 14.871872] kasan_atomics+0x1dc/0x310 [ 14.871927] ? __pfx_kasan_atomics+0x10/0x10 [ 14.871951] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.871980] ? __pfx_read_tsc+0x10/0x10 [ 14.872002] ? ktime_get_ts64+0x86/0x230 [ 14.872027] kunit_try_run_case+0x1a5/0x480 [ 14.872053] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.872076] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.872099] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.872124] ? __kthread_parkme+0x82/0x180 [ 14.872145] ? preempt_count_sub+0x50/0x80 [ 14.872179] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.872204] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.872244] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.872270] kthread+0x337/0x6f0 [ 14.872289] ? trace_preempt_on+0x20/0xc0 [ 14.872327] ? __pfx_kthread+0x10/0x10 [ 14.872348] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.872370] ? calculate_sigpending+0x7b/0xa0 [ 14.872396] ? __pfx_kthread+0x10/0x10 [ 14.872418] ret_from_fork+0x116/0x1d0 [ 14.872437] ? __pfx_kthread+0x10/0x10 [ 14.872458] ret_from_fork_asm+0x1a/0x30 [ 14.872489] </TASK> [ 14.872513] [ 14.880940] Allocated by task 283: [ 14.881123] kasan_save_stack+0x45/0x70 [ 14.881348] kasan_save_track+0x18/0x40 [ 14.881730] kasan_save_alloc_info+0x3b/0x50 [ 14.881952] __kasan_kmalloc+0xb7/0xc0 [ 14.882111] __kmalloc_cache_noprof+0x189/0x420 [ 14.882410] kasan_atomics+0x95/0x310 [ 14.882575] kunit_try_run_case+0x1a5/0x480 [ 14.882719] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.882890] kthread+0x337/0x6f0 [ 14.883009] ret_from_fork+0x116/0x1d0 [ 14.883142] ret_from_fork_asm+0x1a/0x30 [ 14.883346] [ 14.883466] The buggy address belongs to the object at ffff8881039f9d00 [ 14.883466] which belongs to the cache kmalloc-64 of size 64 [ 14.884006] The buggy address is located 0 bytes to the right of [ 14.884006] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 14.884612] [ 14.884727] The buggy address belongs to the physical page: [ 14.884991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 14.885388] flags: 0x200000000000000(node=0|zone=2) [ 14.885680] page_type: f5(slab) [ 14.885861] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.886220] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.886558] page dumped because: kasan: bad access detected [ 14.886803] [ 14.886894] Memory state around the buggy address: [ 14.887111] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.887806] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.888099] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.888409] ^ [ 14.888571] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.888782] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.888990] ================================================================== [ 15.387871] ================================================================== [ 15.388635] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 15.389361] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.390110] [ 15.390373] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.390425] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.390438] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.390462] Call Trace: [ 15.390483] <TASK> [ 15.390512] dump_stack_lvl+0x73/0xb0 [ 15.390545] print_report+0xd1/0x610 [ 15.390570] ? __virt_addr_valid+0x1db/0x2d0 [ 15.390595] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.390617] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.390641] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.390664] kasan_report+0x141/0x180 [ 15.390686] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.390715] kasan_check_range+0x10c/0x1c0 [ 15.390740] __kasan_check_write+0x18/0x20 [ 15.390761] kasan_atomics_helper+0x15b6/0x5450 [ 15.390785] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.390808] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.390833] ? kasan_atomics+0x152/0x310 [ 15.390861] kasan_atomics+0x1dc/0x310 [ 15.390884] ? __pfx_kasan_atomics+0x10/0x10 [ 15.390906] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.390933] ? __pfx_read_tsc+0x10/0x10 [ 15.390955] ? ktime_get_ts64+0x86/0x230 [ 15.390981] kunit_try_run_case+0x1a5/0x480 [ 15.391006] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.391029] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.391052] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.391077] ? __kthread_parkme+0x82/0x180 [ 15.391098] ? preempt_count_sub+0x50/0x80 [ 15.391124] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.391149] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.391207] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.391231] kthread+0x337/0x6f0 [ 15.391251] ? trace_preempt_on+0x20/0xc0 [ 15.391285] ? __pfx_kthread+0x10/0x10 [ 15.391307] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.391330] ? calculate_sigpending+0x7b/0xa0 [ 15.391355] ? __pfx_kthread+0x10/0x10 [ 15.391377] ret_from_fork+0x116/0x1d0 [ 15.391397] ? __pfx_kthread+0x10/0x10 [ 15.391418] ret_from_fork_asm+0x1a/0x30 [ 15.391450] </TASK> [ 15.391462] [ 15.401281] Allocated by task 283: [ 15.401450] kasan_save_stack+0x45/0x70 [ 15.401695] kasan_save_track+0x18/0x40 [ 15.401898] kasan_save_alloc_info+0x3b/0x50 [ 15.402102] __kasan_kmalloc+0xb7/0xc0 [ 15.402475] __kmalloc_cache_noprof+0x189/0x420 [ 15.402663] kasan_atomics+0x95/0x310 [ 15.402893] kunit_try_run_case+0x1a5/0x480 [ 15.403106] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.403487] kthread+0x337/0x6f0 [ 15.403709] ret_from_fork+0x116/0x1d0 [ 15.403892] ret_from_fork_asm+0x1a/0x30 [ 15.404117] [ 15.404245] The buggy address belongs to the object at ffff8881039f9d00 [ 15.404245] which belongs to the cache kmalloc-64 of size 64 [ 15.404795] The buggy address is located 0 bytes to the right of [ 15.404795] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.405352] [ 15.405507] The buggy address belongs to the physical page: [ 15.405738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.406156] flags: 0x200000000000000(node=0|zone=2) [ 15.406403] page_type: f5(slab) [ 15.406583] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.406855] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.407235] page dumped because: kasan: bad access detected [ 15.407440] [ 15.407519] Memory state around the buggy address: [ 15.407677] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.407891] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.408107] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.408583] ^ [ 15.408809] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.409131] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.410964] ================================================================== [ 15.496492] ================================================================== [ 15.496794] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 15.497172] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.497453] [ 15.497551] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.497596] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.497608] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.497630] Call Trace: [ 15.497647] <TASK> [ 15.497662] dump_stack_lvl+0x73/0xb0 [ 15.497691] print_report+0xd1/0x610 [ 15.497714] ? __virt_addr_valid+0x1db/0x2d0 [ 15.497737] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.497761] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.497784] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.497807] kasan_report+0x141/0x180 [ 15.497830] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.497857] kasan_check_range+0x10c/0x1c0 [ 15.497881] __kasan_check_write+0x18/0x20 [ 15.497901] kasan_atomics_helper+0x18b1/0x5450 [ 15.497925] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.497948] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.497974] ? kasan_atomics+0x152/0x310 [ 15.498001] kasan_atomics+0x1dc/0x310 [ 15.498025] ? __pfx_kasan_atomics+0x10/0x10 [ 15.498047] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.498075] ? __pfx_read_tsc+0x10/0x10 [ 15.498096] ? ktime_get_ts64+0x86/0x230 [ 15.498122] kunit_try_run_case+0x1a5/0x480 [ 15.498147] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.498182] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.498212] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.498237] ? __kthread_parkme+0x82/0x180 [ 15.498258] ? preempt_count_sub+0x50/0x80 [ 15.498283] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.498308] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.498333] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.498358] kthread+0x337/0x6f0 [ 15.498378] ? trace_preempt_on+0x20/0xc0 [ 15.498401] ? __pfx_kthread+0x10/0x10 [ 15.498422] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.498445] ? calculate_sigpending+0x7b/0xa0 [ 15.498470] ? __pfx_kthread+0x10/0x10 [ 15.498493] ret_from_fork+0x116/0x1d0 [ 15.498521] ? __pfx_kthread+0x10/0x10 [ 15.498542] ret_from_fork_asm+0x1a/0x30 [ 15.498573] </TASK> [ 15.498583] [ 15.510717] Allocated by task 283: [ 15.511103] kasan_save_stack+0x45/0x70 [ 15.511406] kasan_save_track+0x18/0x40 [ 15.511558] kasan_save_alloc_info+0x3b/0x50 [ 15.511705] __kasan_kmalloc+0xb7/0xc0 [ 15.511835] __kmalloc_cache_noprof+0x189/0x420 [ 15.511989] kasan_atomics+0x95/0x310 [ 15.512120] kunit_try_run_case+0x1a5/0x480 [ 15.512702] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.513238] kthread+0x337/0x6f0 [ 15.513593] ret_from_fork+0x116/0x1d0 [ 15.513989] ret_from_fork_asm+0x1a/0x30 [ 15.514423] [ 15.514652] The buggy address belongs to the object at ffff8881039f9d00 [ 15.514652] which belongs to the cache kmalloc-64 of size 64 [ 15.515776] The buggy address is located 0 bytes to the right of [ 15.515776] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.516729] [ 15.516807] The buggy address belongs to the physical page: [ 15.516976] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.517462] flags: 0x200000000000000(node=0|zone=2) [ 15.517953] page_type: f5(slab) [ 15.518324] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.519038] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.519755] page dumped because: kasan: bad access detected [ 15.520031] [ 15.520105] Memory state around the buggy address: [ 15.520596] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.521256] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.521643] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.522136] ^ [ 15.522640] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.522865] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.523073] ================================================================== [ 14.693307] ================================================================== [ 14.693615] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 14.693945] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 14.694378] [ 14.694468] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.694523] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.694536] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.694560] Call Trace: [ 14.694578] <TASK> [ 14.694733] dump_stack_lvl+0x73/0xb0 [ 14.694775] print_report+0xd1/0x610 [ 14.694800] ? __virt_addr_valid+0x1db/0x2d0 [ 14.694824] ? kasan_atomics_helper+0x697/0x5450 [ 14.694846] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.694869] ? kasan_atomics_helper+0x697/0x5450 [ 14.694891] kasan_report+0x141/0x180 [ 14.694914] ? kasan_atomics_helper+0x697/0x5450 [ 14.694941] kasan_check_range+0x10c/0x1c0 [ 14.694965] __kasan_check_write+0x18/0x20 [ 14.694985] kasan_atomics_helper+0x697/0x5450 [ 14.695008] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.695032] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.695138] ? kasan_atomics+0x152/0x310 [ 14.695166] kasan_atomics+0x1dc/0x310 [ 14.695189] ? __pfx_kasan_atomics+0x10/0x10 [ 14.695212] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.695240] ? __pfx_read_tsc+0x10/0x10 [ 14.695261] ? ktime_get_ts64+0x86/0x230 [ 14.695287] kunit_try_run_case+0x1a5/0x480 [ 14.695312] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.695551] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.695585] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.695610] ? __kthread_parkme+0x82/0x180 [ 14.695633] ? preempt_count_sub+0x50/0x80 [ 14.695658] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.695727] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.695752] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.695777] kthread+0x337/0x6f0 [ 14.695797] ? trace_preempt_on+0x20/0xc0 [ 14.695822] ? __pfx_kthread+0x10/0x10 [ 14.695843] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.695865] ? calculate_sigpending+0x7b/0xa0 [ 14.695891] ? __pfx_kthread+0x10/0x10 [ 14.695912] ret_from_fork+0x116/0x1d0 [ 14.695933] ? __pfx_kthread+0x10/0x10 [ 14.695954] ret_from_fork_asm+0x1a/0x30 [ 14.695985] </TASK> [ 14.695996] [ 14.708701] Allocated by task 283: [ 14.708883] kasan_save_stack+0x45/0x70 [ 14.709614] kasan_save_track+0x18/0x40 [ 14.709809] kasan_save_alloc_info+0x3b/0x50 [ 14.709993] __kasan_kmalloc+0xb7/0xc0 [ 14.710432] __kmalloc_cache_noprof+0x189/0x420 [ 14.710669] kasan_atomics+0x95/0x310 [ 14.710844] kunit_try_run_case+0x1a5/0x480 [ 14.711036] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.712040] kthread+0x337/0x6f0 [ 14.712619] ret_from_fork+0x116/0x1d0 [ 14.712829] ret_from_fork_asm+0x1a/0x30 [ 14.713019] [ 14.713115] The buggy address belongs to the object at ffff8881039f9d00 [ 14.713115] which belongs to the cache kmalloc-64 of size 64 [ 14.713639] The buggy address is located 0 bytes to the right of [ 14.713639] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 14.714143] [ 14.714892] The buggy address belongs to the physical page: [ 14.715742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 14.716652] flags: 0x200000000000000(node=0|zone=2) [ 14.716905] page_type: f5(slab) [ 14.717382] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.717725] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.718028] page dumped because: kasan: bad access detected [ 14.718664] [ 14.718771] Memory state around the buggy address: [ 14.718977] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.719604] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.719908] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.720660] ^ [ 14.720847] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.721178] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.721910] ================================================================== [ 15.817999] ================================================================== [ 15.818572] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 15.818953] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.819559] [ 15.819744] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.819796] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.819916] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.819942] Call Trace: [ 15.820016] <TASK> [ 15.820037] dump_stack_lvl+0x73/0xb0 [ 15.820069] print_report+0xd1/0x610 [ 15.820092] ? __virt_addr_valid+0x1db/0x2d0 [ 15.820117] ? kasan_atomics_helper+0x2006/0x5450 [ 15.820139] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.820171] ? kasan_atomics_helper+0x2006/0x5450 [ 15.820194] kasan_report+0x141/0x180 [ 15.820216] ? kasan_atomics_helper+0x2006/0x5450 [ 15.820244] kasan_check_range+0x10c/0x1c0 [ 15.820268] __kasan_check_write+0x18/0x20 [ 15.820288] kasan_atomics_helper+0x2006/0x5450 [ 15.820311] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.820333] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.820359] ? kasan_atomics+0x152/0x310 [ 15.820388] kasan_atomics+0x1dc/0x310 [ 15.820411] ? __pfx_kasan_atomics+0x10/0x10 [ 15.820433] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.820461] ? __pfx_read_tsc+0x10/0x10 [ 15.820482] ? ktime_get_ts64+0x86/0x230 [ 15.820521] kunit_try_run_case+0x1a5/0x480 [ 15.820548] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.820570] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.820595] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.820620] ? __kthread_parkme+0x82/0x180 [ 15.820641] ? preempt_count_sub+0x50/0x80 [ 15.820666] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.820691] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.820716] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.820741] kthread+0x337/0x6f0 [ 15.820761] ? trace_preempt_on+0x20/0xc0 [ 15.820785] ? __pfx_kthread+0x10/0x10 [ 15.820806] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.820829] ? calculate_sigpending+0x7b/0xa0 [ 15.820854] ? __pfx_kthread+0x10/0x10 [ 15.820876] ret_from_fork+0x116/0x1d0 [ 15.820896] ? __pfx_kthread+0x10/0x10 [ 15.820917] ret_from_fork_asm+0x1a/0x30 [ 15.820949] </TASK> [ 15.820960] [ 15.830820] Allocated by task 283: [ 15.831079] kasan_save_stack+0x45/0x70 [ 15.831519] kasan_save_track+0x18/0x40 [ 15.831807] kasan_save_alloc_info+0x3b/0x50 [ 15.832066] __kasan_kmalloc+0xb7/0xc0 [ 15.832299] __kmalloc_cache_noprof+0x189/0x420 [ 15.832608] kasan_atomics+0x95/0x310 [ 15.832792] kunit_try_run_case+0x1a5/0x480 [ 15.832989] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.833414] kthread+0x337/0x6f0 [ 15.833600] ret_from_fork+0x116/0x1d0 [ 15.833916] ret_from_fork_asm+0x1a/0x30 [ 15.834086] [ 15.834282] The buggy address belongs to the object at ffff8881039f9d00 [ 15.834282] which belongs to the cache kmalloc-64 of size 64 [ 15.834887] The buggy address is located 0 bytes to the right of [ 15.834887] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.835583] [ 15.835689] The buggy address belongs to the physical page: [ 15.835922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.836297] flags: 0x200000000000000(node=0|zone=2) [ 15.836817] page_type: f5(slab) [ 15.836966] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.837407] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.837847] page dumped because: kasan: bad access detected [ 15.838152] [ 15.838235] Memory state around the buggy address: [ 15.838455] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.838953] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.839310] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.839686] ^ [ 15.840005] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.840433] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.840708] ================================================================== [ 14.520800] ================================================================== [ 14.521379] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 14.521723] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 14.522028] [ 14.522140] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.522190] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.522207] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.522231] Call Trace: [ 14.522245] <TASK> [ 14.522263] dump_stack_lvl+0x73/0xb0 [ 14.522292] print_report+0xd1/0x610 [ 14.522317] ? __virt_addr_valid+0x1db/0x2d0 [ 14.522342] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.522365] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.522389] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.522411] kasan_report+0x141/0x180 [ 14.522434] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.522462] __asan_report_store4_noabort+0x1b/0x30 [ 14.522488] kasan_atomics_helper+0x4b6e/0x5450 [ 14.522522] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.522546] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.522573] ? kasan_atomics+0x152/0x310 [ 14.522600] kasan_atomics+0x1dc/0x310 [ 14.522623] ? __pfx_kasan_atomics+0x10/0x10 [ 14.522646] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.522673] ? __pfx_read_tsc+0x10/0x10 [ 14.522695] ? ktime_get_ts64+0x86/0x230 [ 14.522720] kunit_try_run_case+0x1a5/0x480 [ 14.522746] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.522770] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.522793] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.522818] ? __kthread_parkme+0x82/0x180 [ 14.522839] ? preempt_count_sub+0x50/0x80 [ 14.522971] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.523003] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.523028] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.523054] kthread+0x337/0x6f0 [ 14.523075] ? trace_preempt_on+0x20/0xc0 [ 14.523099] ? __pfx_kthread+0x10/0x10 [ 14.523120] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.523143] ? calculate_sigpending+0x7b/0xa0 [ 14.523168] ? __pfx_kthread+0x10/0x10 [ 14.523191] ret_from_fork+0x116/0x1d0 [ 14.523211] ? __pfx_kthread+0x10/0x10 [ 14.523232] ret_from_fork_asm+0x1a/0x30 [ 14.523318] </TASK> [ 14.523331] [ 14.533453] Allocated by task 283: [ 14.533787] kasan_save_stack+0x45/0x70 [ 14.533978] kasan_save_track+0x18/0x40 [ 14.534559] kasan_save_alloc_info+0x3b/0x50 [ 14.534772] __kasan_kmalloc+0xb7/0xc0 [ 14.535071] __kmalloc_cache_noprof+0x189/0x420 [ 14.535631] kasan_atomics+0x95/0x310 [ 14.535834] kunit_try_run_case+0x1a5/0x480 [ 14.536041] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.536729] kthread+0x337/0x6f0 [ 14.536904] ret_from_fork+0x116/0x1d0 [ 14.537057] ret_from_fork_asm+0x1a/0x30 [ 14.537545] [ 14.537827] The buggy address belongs to the object at ffff8881039f9d00 [ 14.537827] which belongs to the cache kmalloc-64 of size 64 [ 14.538631] The buggy address is located 0 bytes to the right of [ 14.538631] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 14.539309] [ 14.539537] The buggy address belongs to the physical page: [ 14.539878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 14.540442] flags: 0x200000000000000(node=0|zone=2) [ 14.540957] page_type: f5(slab) [ 14.541312] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.541772] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.542343] page dumped because: kasan: bad access detected [ 14.542610] [ 14.542685] Memory state around the buggy address: [ 14.543268] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.543611] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.544016] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.544596] ^ [ 14.544934] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.545391] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.545833] ================================================================== [ 14.722921] ================================================================== [ 14.723710] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 14.723959] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 14.724718] [ 14.724930] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.724979] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.724992] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.725014] Call Trace: [ 14.725034] <TASK> [ 14.725052] dump_stack_lvl+0x73/0xb0 [ 14.725083] print_report+0xd1/0x610 [ 14.725106] ? __virt_addr_valid+0x1db/0x2d0 [ 14.725129] ? kasan_atomics_helper+0x72f/0x5450 [ 14.725151] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.725244] ? kasan_atomics_helper+0x72f/0x5450 [ 14.725268] kasan_report+0x141/0x180 [ 14.725291] ? kasan_atomics_helper+0x72f/0x5450 [ 14.725318] kasan_check_range+0x10c/0x1c0 [ 14.725342] __kasan_check_write+0x18/0x20 [ 14.725362] kasan_atomics_helper+0x72f/0x5450 [ 14.725385] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.725408] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.725434] ? kasan_atomics+0x152/0x310 [ 14.725461] kasan_atomics+0x1dc/0x310 [ 14.725483] ? __pfx_kasan_atomics+0x10/0x10 [ 14.725520] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.725547] ? __pfx_read_tsc+0x10/0x10 [ 14.725569] ? ktime_get_ts64+0x86/0x230 [ 14.725594] kunit_try_run_case+0x1a5/0x480 [ 14.725620] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.725642] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.725666] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.725690] ? __kthread_parkme+0x82/0x180 [ 14.725711] ? preempt_count_sub+0x50/0x80 [ 14.725736] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.725761] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.725785] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.725812] kthread+0x337/0x6f0 [ 14.725832] ? trace_preempt_on+0x20/0xc0 [ 14.725856] ? __pfx_kthread+0x10/0x10 [ 14.725876] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.725898] ? calculate_sigpending+0x7b/0xa0 [ 14.725923] ? __pfx_kthread+0x10/0x10 [ 14.725945] ret_from_fork+0x116/0x1d0 [ 14.725964] ? __pfx_kthread+0x10/0x10 [ 14.725985] ret_from_fork_asm+0x1a/0x30 [ 14.726016] </TASK> [ 14.726027] [ 14.739381] Allocated by task 283: [ 14.739593] kasan_save_stack+0x45/0x70 [ 14.739795] kasan_save_track+0x18/0x40 [ 14.739974] kasan_save_alloc_info+0x3b/0x50 [ 14.740434] __kasan_kmalloc+0xb7/0xc0 [ 14.740624] __kmalloc_cache_noprof+0x189/0x420 [ 14.740865] kasan_atomics+0x95/0x310 [ 14.741043] kunit_try_run_case+0x1a5/0x480 [ 14.741554] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.741828] kthread+0x337/0x6f0 [ 14.742001] ret_from_fork+0x116/0x1d0 [ 14.742324] ret_from_fork_asm+0x1a/0x30 [ 14.742553] [ 14.742655] The buggy address belongs to the object at ffff8881039f9d00 [ 14.742655] which belongs to the cache kmalloc-64 of size 64 [ 14.743301] The buggy address is located 0 bytes to the right of [ 14.743301] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 14.744124] [ 14.744262] The buggy address belongs to the physical page: [ 14.744742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 14.745103] flags: 0x200000000000000(node=0|zone=2) [ 14.745609] page_type: f5(slab) [ 14.745805] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.746094] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.746494] page dumped because: kasan: bad access detected [ 14.746898] [ 14.746998] Memory state around the buggy address: [ 14.747439] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.747773] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.748057] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.748411] ^ [ 14.748650] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.748884] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.749161] ================================================================== [ 15.841540] ================================================================== [ 15.841894] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 15.842548] Read of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.842888] [ 15.843006] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.843054] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.843067] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.843090] Call Trace: [ 15.843110] <TASK> [ 15.843128] dump_stack_lvl+0x73/0xb0 [ 15.843158] print_report+0xd1/0x610 [ 15.843195] ? __virt_addr_valid+0x1db/0x2d0 [ 15.843220] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.843242] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.843266] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.843288] kasan_report+0x141/0x180 [ 15.843310] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.843337] __asan_report_load8_noabort+0x18/0x20 [ 15.843362] kasan_atomics_helper+0x4f98/0x5450 [ 15.843385] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.843408] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.843434] ? kasan_atomics+0x152/0x310 [ 15.843462] kasan_atomics+0x1dc/0x310 [ 15.843485] ? __pfx_kasan_atomics+0x10/0x10 [ 15.843517] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.843545] ? __pfx_read_tsc+0x10/0x10 [ 15.843567] ? ktime_get_ts64+0x86/0x230 [ 15.843594] kunit_try_run_case+0x1a5/0x480 [ 15.843622] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.843645] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.843668] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.843692] ? __kthread_parkme+0x82/0x180 [ 15.843714] ? preempt_count_sub+0x50/0x80 [ 15.843739] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.843764] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.843788] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.843813] kthread+0x337/0x6f0 [ 15.843832] ? trace_preempt_on+0x20/0xc0 [ 15.843856] ? __pfx_kthread+0x10/0x10 [ 15.843877] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.843899] ? calculate_sigpending+0x7b/0xa0 [ 15.843924] ? __pfx_kthread+0x10/0x10 [ 15.843946] ret_from_fork+0x116/0x1d0 [ 15.843966] ? __pfx_kthread+0x10/0x10 [ 15.843986] ret_from_fork_asm+0x1a/0x30 [ 15.844018] </TASK> [ 15.844029] [ 15.851168] Allocated by task 283: [ 15.851297] kasan_save_stack+0x45/0x70 [ 15.851439] kasan_save_track+0x18/0x40 [ 15.851611] kasan_save_alloc_info+0x3b/0x50 [ 15.851814] __kasan_kmalloc+0xb7/0xc0 [ 15.851996] __kmalloc_cache_noprof+0x189/0x420 [ 15.852212] kasan_atomics+0x95/0x310 [ 15.852392] kunit_try_run_case+0x1a5/0x480 [ 15.852602] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.852832] kthread+0x337/0x6f0 [ 15.852951] ret_from_fork+0x116/0x1d0 [ 15.853080] ret_from_fork_asm+0x1a/0x30 [ 15.853381] [ 15.853478] The buggy address belongs to the object at ffff8881039f9d00 [ 15.853478] which belongs to the cache kmalloc-64 of size 64 [ 15.853998] The buggy address is located 0 bytes to the right of [ 15.853998] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.854426] [ 15.854507] The buggy address belongs to the physical page: [ 15.854682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.854926] flags: 0x200000000000000(node=0|zone=2) [ 15.855110] page_type: f5(slab) [ 15.855335] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.855678] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.856002] page dumped because: kasan: bad access detected [ 15.856358] [ 15.856515] Memory state around the buggy address: [ 15.856779] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.857115] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.857566] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.857774] ^ [ 15.857949] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.858381] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.858702] ================================================================== [ 14.944102] ================================================================== [ 14.944374] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 14.944965] Read of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 14.946056] [ 14.946297] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.946350] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.946362] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.946561] Call Trace: [ 14.946587] <TASK> [ 14.946607] dump_stack_lvl+0x73/0xb0 [ 14.946641] print_report+0xd1/0x610 [ 14.946665] ? __virt_addr_valid+0x1db/0x2d0 [ 14.946689] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.946710] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.946733] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.946756] kasan_report+0x141/0x180 [ 14.946778] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.946806] __asan_report_load4_noabort+0x18/0x20 [ 14.946831] kasan_atomics_helper+0x4a84/0x5450 [ 14.946854] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.946877] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.946903] ? kasan_atomics+0x152/0x310 [ 14.946930] kasan_atomics+0x1dc/0x310 [ 14.946954] ? __pfx_kasan_atomics+0x10/0x10 [ 14.946976] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.947004] ? __pfx_read_tsc+0x10/0x10 [ 14.947026] ? ktime_get_ts64+0x86/0x230 [ 14.947051] kunit_try_run_case+0x1a5/0x480 [ 14.947077] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.947100] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.947124] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.947148] ? __kthread_parkme+0x82/0x180 [ 14.947187] ? preempt_count_sub+0x50/0x80 [ 14.947212] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.947237] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.947262] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.947287] kthread+0x337/0x6f0 [ 14.947307] ? trace_preempt_on+0x20/0xc0 [ 14.947331] ? __pfx_kthread+0x10/0x10 [ 14.947352] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.947375] ? calculate_sigpending+0x7b/0xa0 [ 14.947400] ? __pfx_kthread+0x10/0x10 [ 14.947422] ret_from_fork+0x116/0x1d0 [ 14.947442] ? __pfx_kthread+0x10/0x10 [ 14.947463] ret_from_fork_asm+0x1a/0x30 [ 14.947494] </TASK> [ 14.947517] [ 14.960261] Allocated by task 283: [ 14.960456] kasan_save_stack+0x45/0x70 [ 14.960676] kasan_save_track+0x18/0x40 [ 14.960845] kasan_save_alloc_info+0x3b/0x50 [ 14.961031] __kasan_kmalloc+0xb7/0xc0 [ 14.961196] __kmalloc_cache_noprof+0x189/0x420 [ 14.961386] kasan_atomics+0x95/0x310 [ 14.962267] kunit_try_run_case+0x1a5/0x480 [ 14.962925] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.963686] kthread+0x337/0x6f0 [ 14.964194] ret_from_fork+0x116/0x1d0 [ 14.964743] ret_from_fork_asm+0x1a/0x30 [ 14.965316] [ 14.965675] The buggy address belongs to the object at ffff8881039f9d00 [ 14.965675] which belongs to the cache kmalloc-64 of size 64 [ 14.966536] The buggy address is located 0 bytes to the right of [ 14.966536] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 14.966918] [ 14.966998] The buggy address belongs to the physical page: [ 14.967671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 14.968857] flags: 0x200000000000000(node=0|zone=2) [ 14.969490] page_type: f5(slab) [ 14.970226] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.971097] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.971804] page dumped because: kasan: bad access detected [ 14.971990] [ 14.972064] Memory state around the buggy address: [ 14.972789] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.973786] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.974680] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.974917] ^ [ 14.975079] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.976203] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.977061] ================================================================== [ 15.794387] ================================================================== [ 15.794767] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 15.795073] Read of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.795418] [ 15.795528] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.795574] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.795587] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.795609] Call Trace: [ 15.795629] <TASK> [ 15.795646] dump_stack_lvl+0x73/0xb0 [ 15.795675] print_report+0xd1/0x610 [ 15.795697] ? __virt_addr_valid+0x1db/0x2d0 [ 15.795721] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.795743] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.795767] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.795789] kasan_report+0x141/0x180 [ 15.795812] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.795839] __asan_report_load8_noabort+0x18/0x20 [ 15.795863] kasan_atomics_helper+0x4f71/0x5450 [ 15.795888] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.795911] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.795937] ? kasan_atomics+0x152/0x310 [ 15.795964] kasan_atomics+0x1dc/0x310 [ 15.795987] ? __pfx_kasan_atomics+0x10/0x10 [ 15.796010] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.796037] ? __pfx_read_tsc+0x10/0x10 [ 15.796059] ? ktime_get_ts64+0x86/0x230 [ 15.796085] kunit_try_run_case+0x1a5/0x480 [ 15.796110] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.796133] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.796157] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.796193] ? __kthread_parkme+0x82/0x180 [ 15.796215] ? preempt_count_sub+0x50/0x80 [ 15.796240] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.796264] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.796291] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.796316] kthread+0x337/0x6f0 [ 15.796336] ? trace_preempt_on+0x20/0xc0 [ 15.796360] ? __pfx_kthread+0x10/0x10 [ 15.796381] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.796404] ? calculate_sigpending+0x7b/0xa0 [ 15.796430] ? __pfx_kthread+0x10/0x10 [ 15.796451] ret_from_fork+0x116/0x1d0 [ 15.796471] ? __pfx_kthread+0x10/0x10 [ 15.796492] ret_from_fork_asm+0x1a/0x30 [ 15.796533] </TASK> [ 15.796543] [ 15.804116] Allocated by task 283: [ 15.804437] kasan_save_stack+0x45/0x70 [ 15.804652] kasan_save_track+0x18/0x40 [ 15.804969] kasan_save_alloc_info+0x3b/0x50 [ 15.805195] __kasan_kmalloc+0xb7/0xc0 [ 15.805339] __kmalloc_cache_noprof+0x189/0x420 [ 15.805506] kasan_atomics+0x95/0x310 [ 15.805642] kunit_try_run_case+0x1a5/0x480 [ 15.805849] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.806115] kthread+0x337/0x6f0 [ 15.806395] ret_from_fork+0x116/0x1d0 [ 15.806716] ret_from_fork_asm+0x1a/0x30 [ 15.807083] [ 15.807160] The buggy address belongs to the object at ffff8881039f9d00 [ 15.807160] which belongs to the cache kmalloc-64 of size 64 [ 15.808807] The buggy address is located 0 bytes to the right of [ 15.808807] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.809469] [ 15.809592] The buggy address belongs to the physical page: [ 15.809820] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.810075] flags: 0x200000000000000(node=0|zone=2) [ 15.810256] page_type: f5(slab) [ 15.810405] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.810756] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.811100] page dumped because: kasan: bad access detected [ 15.811367] [ 15.812548] Memory state around the buggy address: [ 15.813924] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.815078] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.815415] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.815718] ^ [ 15.815917] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.816586] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.817347] ================================================================== [ 14.575648] ================================================================== [ 14.575908] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 14.577099] Read of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 14.577450] [ 14.577587] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.577806] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.577822] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.577844] Call Trace: [ 14.577866] <TASK> [ 14.577885] dump_stack_lvl+0x73/0xb0 [ 14.577917] print_report+0xd1/0x610 [ 14.577940] ? __virt_addr_valid+0x1db/0x2d0 [ 14.577964] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.577986] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.578010] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.578032] kasan_report+0x141/0x180 [ 14.578158] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.578187] __asan_report_load4_noabort+0x18/0x20 [ 14.578218] kasan_atomics_helper+0x4b54/0x5450 [ 14.578242] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.578265] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.578292] ? kasan_atomics+0x152/0x310 [ 14.578320] kasan_atomics+0x1dc/0x310 [ 14.578344] ? __pfx_kasan_atomics+0x10/0x10 [ 14.578367] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.578395] ? __pfx_read_tsc+0x10/0x10 [ 14.578418] ? ktime_get_ts64+0x86/0x230 [ 14.578444] kunit_try_run_case+0x1a5/0x480 [ 14.578470] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.578494] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.578532] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.578557] ? __kthread_parkme+0x82/0x180 [ 14.578579] ? preempt_count_sub+0x50/0x80 [ 14.578605] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.578630] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.578655] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.578680] kthread+0x337/0x6f0 [ 14.578700] ? trace_preempt_on+0x20/0xc0 [ 14.578725] ? __pfx_kthread+0x10/0x10 [ 14.578746] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.578769] ? calculate_sigpending+0x7b/0xa0 [ 14.578795] ? __pfx_kthread+0x10/0x10 [ 14.578817] ret_from_fork+0x116/0x1d0 [ 14.578837] ? __pfx_kthread+0x10/0x10 [ 14.578858] ret_from_fork_asm+0x1a/0x30 [ 14.578890] </TASK> [ 14.578901] [ 14.588390] Allocated by task 283: [ 14.588612] kasan_save_stack+0x45/0x70 [ 14.588911] kasan_save_track+0x18/0x40 [ 14.589196] kasan_save_alloc_info+0x3b/0x50 [ 14.589409] __kasan_kmalloc+0xb7/0xc0 [ 14.589608] __kmalloc_cache_noprof+0x189/0x420 [ 14.589832] kasan_atomics+0x95/0x310 [ 14.590023] kunit_try_run_case+0x1a5/0x480 [ 14.590449] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.590728] kthread+0x337/0x6f0 [ 14.590859] ret_from_fork+0x116/0x1d0 [ 14.590995] ret_from_fork_asm+0x1a/0x30 [ 14.591465] [ 14.591584] The buggy address belongs to the object at ffff8881039f9d00 [ 14.591584] which belongs to the cache kmalloc-64 of size 64 [ 14.592204] The buggy address is located 0 bytes to the right of [ 14.592204] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 14.592686] [ 14.592807] The buggy address belongs to the physical page: [ 14.593133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 14.593448] flags: 0x200000000000000(node=0|zone=2) [ 14.593697] page_type: f5(slab) [ 14.593893] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.594311] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.594804] page dumped because: kasan: bad access detected [ 14.595143] [ 14.595251] Memory state around the buggy address: [ 14.595481] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.595849] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.596132] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.596434] ^ [ 14.596706] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.597053] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.597412] ================================================================== [ 15.327249] ================================================================== [ 15.327744] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 15.328291] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.328606] [ 15.328700] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.328745] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.328757] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.328779] Call Trace: [ 15.328796] <TASK> [ 15.328811] dump_stack_lvl+0x73/0xb0 [ 15.328839] print_report+0xd1/0x610 [ 15.328863] ? __virt_addr_valid+0x1db/0x2d0 [ 15.328887] ? kasan_atomics_helper+0x1467/0x5450 [ 15.328909] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.328934] ? kasan_atomics_helper+0x1467/0x5450 [ 15.328959] kasan_report+0x141/0x180 [ 15.328985] ? kasan_atomics_helper+0x1467/0x5450 [ 15.329015] kasan_check_range+0x10c/0x1c0 [ 15.329039] __kasan_check_write+0x18/0x20 [ 15.329059] kasan_atomics_helper+0x1467/0x5450 [ 15.329082] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.329105] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.329132] ? kasan_atomics+0x152/0x310 [ 15.329181] kasan_atomics+0x1dc/0x310 [ 15.329205] ? __pfx_kasan_atomics+0x10/0x10 [ 15.329227] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.329255] ? __pfx_read_tsc+0x10/0x10 [ 15.329276] ? ktime_get_ts64+0x86/0x230 [ 15.329302] kunit_try_run_case+0x1a5/0x480 [ 15.329328] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.329351] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.329375] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.329401] ? __kthread_parkme+0x82/0x180 [ 15.329423] ? preempt_count_sub+0x50/0x80 [ 15.329447] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.329474] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.329507] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.329534] kthread+0x337/0x6f0 [ 15.329554] ? trace_preempt_on+0x20/0xc0 [ 15.329578] ? __pfx_kthread+0x10/0x10 [ 15.329599] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.329622] ? calculate_sigpending+0x7b/0xa0 [ 15.329647] ? __pfx_kthread+0x10/0x10 [ 15.329668] ret_from_fork+0x116/0x1d0 [ 15.329688] ? __pfx_kthread+0x10/0x10 [ 15.329709] ret_from_fork_asm+0x1a/0x30 [ 15.329740] </TASK> [ 15.329752] [ 15.337246] Allocated by task 283: [ 15.337443] kasan_save_stack+0x45/0x70 [ 15.337636] kasan_save_track+0x18/0x40 [ 15.337773] kasan_save_alloc_info+0x3b/0x50 [ 15.337983] __kasan_kmalloc+0xb7/0xc0 [ 15.338205] __kmalloc_cache_noprof+0x189/0x420 [ 15.338403] kasan_atomics+0x95/0x310 [ 15.338548] kunit_try_run_case+0x1a5/0x480 [ 15.338697] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.338874] kthread+0x337/0x6f0 [ 15.338997] ret_from_fork+0x116/0x1d0 [ 15.339131] ret_from_fork_asm+0x1a/0x30 [ 15.339291] [ 15.339364] The buggy address belongs to the object at ffff8881039f9d00 [ 15.339364] which belongs to the cache kmalloc-64 of size 64 [ 15.339846] The buggy address is located 0 bytes to the right of [ 15.339846] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.340408] [ 15.340513] The buggy address belongs to the physical page: [ 15.340766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.341123] flags: 0x200000000000000(node=0|zone=2) [ 15.341377] page_type: f5(slab) [ 15.341558] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.341866] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.342097] page dumped because: kasan: bad access detected [ 15.342299] [ 15.342370] Memory state around the buggy address: [ 15.342571] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.342884] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.343229] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.343548] ^ [ 15.343772] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.344085] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.344385] ================================================================== [ 14.495294] ================================================================== [ 14.495580] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 14.495926] Read of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 14.496488] [ 14.496597] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.496644] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.496654] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.496676] Call Trace: [ 14.496688] <TASK> [ 14.496706] dump_stack_lvl+0x73/0xb0 [ 14.496738] print_report+0xd1/0x610 [ 14.496759] ? __virt_addr_valid+0x1db/0x2d0 [ 14.496782] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.496803] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.496826] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.496847] kasan_report+0x141/0x180 [ 14.496869] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.496895] __asan_report_load4_noabort+0x18/0x20 [ 14.496959] kasan_atomics_helper+0x4b88/0x5450 [ 14.496982] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.497004] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.497030] ? kasan_atomics+0x152/0x310 [ 14.497056] kasan_atomics+0x1dc/0x310 [ 14.497327] ? __pfx_kasan_atomics+0x10/0x10 [ 14.497353] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.497400] ? __pfx_read_tsc+0x10/0x10 [ 14.497423] ? ktime_get_ts64+0x86/0x230 [ 14.497448] kunit_try_run_case+0x1a5/0x480 [ 14.497474] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.497512] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.497536] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.497561] ? __kthread_parkme+0x82/0x180 [ 14.497582] ? preempt_count_sub+0x50/0x80 [ 14.497608] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.497657] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.497682] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.497708] kthread+0x337/0x6f0 [ 14.497730] ? trace_preempt_on+0x20/0xc0 [ 14.497754] ? __pfx_kthread+0x10/0x10 [ 14.497776] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.497816] ? calculate_sigpending+0x7b/0xa0 [ 14.497842] ? __pfx_kthread+0x10/0x10 [ 14.497864] ret_from_fork+0x116/0x1d0 [ 14.497885] ? __pfx_kthread+0x10/0x10 [ 14.497907] ret_from_fork_asm+0x1a/0x30 [ 14.497939] </TASK> [ 14.497951] [ 14.507101] Allocated by task 283: [ 14.507348] kasan_save_stack+0x45/0x70 [ 14.507509] kasan_save_track+0x18/0x40 [ 14.507647] kasan_save_alloc_info+0x3b/0x50 [ 14.507796] __kasan_kmalloc+0xb7/0xc0 [ 14.508155] __kmalloc_cache_noprof+0x189/0x420 [ 14.508536] kasan_atomics+0x95/0x310 [ 14.508945] kunit_try_run_case+0x1a5/0x480 [ 14.509466] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.509799] kthread+0x337/0x6f0 [ 14.509975] ret_from_fork+0x116/0x1d0 [ 14.510147] ret_from_fork_asm+0x1a/0x30 [ 14.510487] [ 14.510592] The buggy address belongs to the object at ffff8881039f9d00 [ 14.510592] which belongs to the cache kmalloc-64 of size 64 [ 14.510952] The buggy address is located 0 bytes to the right of [ 14.510952] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 14.512230] [ 14.512329] The buggy address belongs to the physical page: [ 14.512563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 14.512878] flags: 0x200000000000000(node=0|zone=2) [ 14.513812] page_type: f5(slab) [ 14.513995] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.514728] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.515033] page dumped because: kasan: bad access detected [ 14.515657] [ 14.515911] Memory state around the buggy address: [ 14.516578] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.516897] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.517356] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.517662] ^ [ 14.517871] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.518717] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.519444] ================================================================== [ 15.017936] ================================================================== [ 15.018519] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 15.018890] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.019205] [ 15.019293] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.019339] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.019351] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.019373] Call Trace: [ 15.019392] <TASK> [ 15.019409] dump_stack_lvl+0x73/0xb0 [ 15.019447] print_report+0xd1/0x610 [ 15.019469] ? __virt_addr_valid+0x1db/0x2d0 [ 15.019492] ? kasan_atomics_helper+0xe78/0x5450 [ 15.019531] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.019555] ? kasan_atomics_helper+0xe78/0x5450 [ 15.019577] kasan_report+0x141/0x180 [ 15.019600] ? kasan_atomics_helper+0xe78/0x5450 [ 15.019626] kasan_check_range+0x10c/0x1c0 [ 15.019650] __kasan_check_write+0x18/0x20 [ 15.019670] kasan_atomics_helper+0xe78/0x5450 [ 15.019694] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.019717] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.019744] ? kasan_atomics+0x152/0x310 [ 15.019771] kasan_atomics+0x1dc/0x310 [ 15.019795] ? __pfx_kasan_atomics+0x10/0x10 [ 15.019817] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.019844] ? __pfx_read_tsc+0x10/0x10 [ 15.019866] ? ktime_get_ts64+0x86/0x230 [ 15.019891] kunit_try_run_case+0x1a5/0x480 [ 15.019916] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.019939] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.019963] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.019987] ? __kthread_parkme+0x82/0x180 [ 15.020008] ? preempt_count_sub+0x50/0x80 [ 15.020033] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.020058] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.020082] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.020106] kthread+0x337/0x6f0 [ 15.020126] ? trace_preempt_on+0x20/0xc0 [ 15.020168] ? __pfx_kthread+0x10/0x10 [ 15.020190] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.020212] ? calculate_sigpending+0x7b/0xa0 [ 15.020237] ? __pfx_kthread+0x10/0x10 [ 15.020259] ret_from_fork+0x116/0x1d0 [ 15.020280] ? __pfx_kthread+0x10/0x10 [ 15.020301] ret_from_fork_asm+0x1a/0x30 [ 15.020332] </TASK> [ 15.020343] [ 15.027849] Allocated by task 283: [ 15.027979] kasan_save_stack+0x45/0x70 [ 15.028213] kasan_save_track+0x18/0x40 [ 15.028431] kasan_save_alloc_info+0x3b/0x50 [ 15.028655] __kasan_kmalloc+0xb7/0xc0 [ 15.028847] __kmalloc_cache_noprof+0x189/0x420 [ 15.029089] kasan_atomics+0x95/0x310 [ 15.029309] kunit_try_run_case+0x1a5/0x480 [ 15.029550] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.029807] kthread+0x337/0x6f0 [ 15.029996] ret_from_fork+0x116/0x1d0 [ 15.030215] ret_from_fork_asm+0x1a/0x30 [ 15.030446] [ 15.030551] The buggy address belongs to the object at ffff8881039f9d00 [ 15.030551] which belongs to the cache kmalloc-64 of size 64 [ 15.031014] The buggy address is located 0 bytes to the right of [ 15.031014] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.031546] [ 15.031644] The buggy address belongs to the physical page: [ 15.031886] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.032276] flags: 0x200000000000000(node=0|zone=2) [ 15.032458] page_type: f5(slab) [ 15.032594] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.032828] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.033056] page dumped because: kasan: bad access detected [ 15.033255] [ 15.033325] Memory state around the buggy address: [ 15.033579] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.033903] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.034251] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.034587] ^ [ 15.034809] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.035132] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.035457] ================================================================== [ 15.554602] ================================================================== [ 15.554987] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 15.555665] Write of size 8 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.555982] [ 15.556084] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.556130] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.556143] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.556165] Call Trace: [ 15.556184] <TASK> [ 15.556202] dump_stack_lvl+0x73/0xb0 [ 15.556232] print_report+0xd1/0x610 [ 15.556254] ? __virt_addr_valid+0x1db/0x2d0 [ 15.556277] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.556300] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.556323] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.556346] kasan_report+0x141/0x180 [ 15.556369] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.556397] kasan_check_range+0x10c/0x1c0 [ 15.556421] __kasan_check_write+0x18/0x20 [ 15.556441] kasan_atomics_helper+0x19e3/0x5450 [ 15.556465] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.556488] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.556524] ? kasan_atomics+0x152/0x310 [ 15.556551] kasan_atomics+0x1dc/0x310 [ 15.556575] ? __pfx_kasan_atomics+0x10/0x10 [ 15.556597] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.556624] ? __pfx_read_tsc+0x10/0x10 [ 15.556645] ? ktime_get_ts64+0x86/0x230 [ 15.556670] kunit_try_run_case+0x1a5/0x480 [ 15.556695] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.556719] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.556744] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.556769] ? __kthread_parkme+0x82/0x180 [ 15.556790] ? preempt_count_sub+0x50/0x80 [ 15.556815] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.556841] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.556865] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.556891] kthread+0x337/0x6f0 [ 15.556911] ? trace_preempt_on+0x20/0xc0 [ 15.556936] ? __pfx_kthread+0x10/0x10 [ 15.556957] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.556979] ? calculate_sigpending+0x7b/0xa0 [ 15.557004] ? __pfx_kthread+0x10/0x10 [ 15.557026] ret_from_fork+0x116/0x1d0 [ 15.557045] ? __pfx_kthread+0x10/0x10 [ 15.557066] ret_from_fork_asm+0x1a/0x30 [ 15.557098] </TASK> [ 15.557110] [ 15.568894] Allocated by task 283: [ 15.569072] kasan_save_stack+0x45/0x70 [ 15.569778] kasan_save_track+0x18/0x40 [ 15.570026] kasan_save_alloc_info+0x3b/0x50 [ 15.570368] __kasan_kmalloc+0xb7/0xc0 [ 15.570749] __kmalloc_cache_noprof+0x189/0x420 [ 15.571087] kasan_atomics+0x95/0x310 [ 15.571410] kunit_try_run_case+0x1a5/0x480 [ 15.571623] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.571844] kthread+0x337/0x6f0 [ 15.571997] ret_from_fork+0x116/0x1d0 [ 15.572167] ret_from_fork_asm+0x1a/0x30 [ 15.572345] [ 15.572434] The buggy address belongs to the object at ffff8881039f9d00 [ 15.572434] which belongs to the cache kmalloc-64 of size 64 [ 15.573440] The buggy address is located 0 bytes to the right of [ 15.573440] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.574186] [ 15.574430] The buggy address belongs to the physical page: [ 15.574902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.575465] flags: 0x200000000000000(node=0|zone=2) [ 15.575828] page_type: f5(slab) [ 15.576008] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.576716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.577140] page dumped because: kasan: bad access detected [ 15.577484] [ 15.577725] Memory state around the buggy address: [ 15.578078] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.578725] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.579246] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.579695] ^ [ 15.579905] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.580461] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.580917] ================================================================== [ 14.793132] ================================================================== [ 14.793636] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 14.794005] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 14.794680] [ 14.795040] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.795091] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.795104] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.795127] Call Trace: [ 14.795237] <TASK> [ 14.795259] dump_stack_lvl+0x73/0xb0 [ 14.795292] print_report+0xd1/0x610 [ 14.795315] ? __virt_addr_valid+0x1db/0x2d0 [ 14.795359] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.795382] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.795419] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.795455] kasan_report+0x141/0x180 [ 14.795491] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.795545] kasan_check_range+0x10c/0x1c0 [ 14.795584] __kasan_check_write+0x18/0x20 [ 14.795604] kasan_atomics_helper+0x8f9/0x5450 [ 14.795641] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.795678] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.795718] ? kasan_atomics+0x152/0x310 [ 14.795758] kasan_atomics+0x1dc/0x310 [ 14.795782] ? __pfx_kasan_atomics+0x10/0x10 [ 14.795804] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.795831] ? __pfx_read_tsc+0x10/0x10 [ 14.795852] ? ktime_get_ts64+0x86/0x230 [ 14.795877] kunit_try_run_case+0x1a5/0x480 [ 14.795903] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.795926] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.795950] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.795976] ? __kthread_parkme+0x82/0x180 [ 14.795998] ? preempt_count_sub+0x50/0x80 [ 14.796023] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.796047] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.796072] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.796097] kthread+0x337/0x6f0 [ 14.796117] ? trace_preempt_on+0x20/0xc0 [ 14.796141] ? __pfx_kthread+0x10/0x10 [ 14.796162] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.796184] ? calculate_sigpending+0x7b/0xa0 [ 14.796209] ? __pfx_kthread+0x10/0x10 [ 14.796230] ret_from_fork+0x116/0x1d0 [ 14.796250] ? __pfx_kthread+0x10/0x10 [ 14.796271] ret_from_fork_asm+0x1a/0x30 [ 14.796303] </TASK> [ 14.796314] [ 14.805661] Allocated by task 283: [ 14.805859] kasan_save_stack+0x45/0x70 [ 14.806090] kasan_save_track+0x18/0x40 [ 14.806392] kasan_save_alloc_info+0x3b/0x50 [ 14.806646] __kasan_kmalloc+0xb7/0xc0 [ 14.806858] __kmalloc_cache_noprof+0x189/0x420 [ 14.807262] kasan_atomics+0x95/0x310 [ 14.807635] kunit_try_run_case+0x1a5/0x480 [ 14.807783] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.808040] kthread+0x337/0x6f0 [ 14.808353] ret_from_fork+0x116/0x1d0 [ 14.808539] ret_from_fork_asm+0x1a/0x30 [ 14.808742] [ 14.808841] The buggy address belongs to the object at ffff8881039f9d00 [ 14.808841] which belongs to the cache kmalloc-64 of size 64 [ 14.809445] The buggy address is located 0 bytes to the right of [ 14.809445] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 14.809990] [ 14.810220] The buggy address belongs to the physical page: [ 14.810446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 14.810828] flags: 0x200000000000000(node=0|zone=2) [ 14.811213] page_type: f5(slab) [ 14.811409] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.811748] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.812083] page dumped because: kasan: bad access detected [ 14.812353] [ 14.812464] Memory state around the buggy address: [ 14.812694] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.813192] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.813521] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.813828] ^ [ 14.814045] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.814464] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.814690] ================================================================== [ 15.116797] ================================================================== [ 15.117526] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 15.118161] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.118562] [ 15.118762] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.118810] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.118823] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.118846] Call Trace: [ 15.118866] <TASK> [ 15.118885] dump_stack_lvl+0x73/0xb0 [ 15.118914] print_report+0xd1/0x610 [ 15.118938] ? __virt_addr_valid+0x1db/0x2d0 [ 15.118963] ? kasan_atomics_helper+0x1079/0x5450 [ 15.118985] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.119009] ? kasan_atomics_helper+0x1079/0x5450 [ 15.119031] kasan_report+0x141/0x180 [ 15.119054] ? kasan_atomics_helper+0x1079/0x5450 [ 15.119081] kasan_check_range+0x10c/0x1c0 [ 15.119105] __kasan_check_write+0x18/0x20 [ 15.119126] kasan_atomics_helper+0x1079/0x5450 [ 15.119156] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.119179] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.119205] ? kasan_atomics+0x152/0x310 [ 15.119233] kasan_atomics+0x1dc/0x310 [ 15.119256] ? __pfx_kasan_atomics+0x10/0x10 [ 15.119278] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.119306] ? __pfx_read_tsc+0x10/0x10 [ 15.119328] ? ktime_get_ts64+0x86/0x230 [ 15.119353] kunit_try_run_case+0x1a5/0x480 [ 15.119379] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.119402] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.119426] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.119451] ? __kthread_parkme+0x82/0x180 [ 15.119472] ? preempt_count_sub+0x50/0x80 [ 15.119506] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.119530] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.119570] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.119595] kthread+0x337/0x6f0 [ 15.119615] ? trace_preempt_on+0x20/0xc0 [ 15.119639] ? __pfx_kthread+0x10/0x10 [ 15.119660] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.119682] ? calculate_sigpending+0x7b/0xa0 [ 15.119708] ? __pfx_kthread+0x10/0x10 [ 15.119730] ret_from_fork+0x116/0x1d0 [ 15.119750] ? __pfx_kthread+0x10/0x10 [ 15.119771] ret_from_fork_asm+0x1a/0x30 [ 15.119803] </TASK> [ 15.119814] [ 15.130940] Allocated by task 283: [ 15.131374] kasan_save_stack+0x45/0x70 [ 15.131592] kasan_save_track+0x18/0x40 [ 15.131764] kasan_save_alloc_info+0x3b/0x50 [ 15.131948] __kasan_kmalloc+0xb7/0xc0 [ 15.132118] __kmalloc_cache_noprof+0x189/0x420 [ 15.132818] kasan_atomics+0x95/0x310 [ 15.133062] kunit_try_run_case+0x1a5/0x480 [ 15.133542] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.133854] kthread+0x337/0x6f0 [ 15.134259] ret_from_fork+0x116/0x1d0 [ 15.134493] ret_from_fork_asm+0x1a/0x30 [ 15.134820] [ 15.134930] The buggy address belongs to the object at ffff8881039f9d00 [ 15.134930] which belongs to the cache kmalloc-64 of size 64 [ 15.135656] The buggy address is located 0 bytes to the right of [ 15.135656] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.136155] [ 15.136250] The buggy address belongs to the physical page: [ 15.136477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.136806] flags: 0x200000000000000(node=0|zone=2) [ 15.137016] page_type: f5(slab) [ 15.137166] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.137447] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.138403] page dumped because: kasan: bad access detected [ 15.138911] [ 15.139147] Memory state around the buggy address: [ 15.139646] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.140080] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.140587] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.141078] ^ [ 15.141418] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.141872] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.142142] ================================================================== [ 14.546662] ================================================================== [ 14.546988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 14.548010] Read of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 14.548516] [ 14.548864] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.548917] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.548929] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.548952] Call Trace: [ 14.548972] <TASK> [ 14.548990] dump_stack_lvl+0x73/0xb0 [ 14.549022] print_report+0xd1/0x610 [ 14.549045] ? __virt_addr_valid+0x1db/0x2d0 [ 14.549251] ? kasan_atomics_helper+0x3df/0x5450 [ 14.549273] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.549298] ? kasan_atomics_helper+0x3df/0x5450 [ 14.549321] kasan_report+0x141/0x180 [ 14.549343] ? kasan_atomics_helper+0x3df/0x5450 [ 14.549371] kasan_check_range+0x10c/0x1c0 [ 14.549396] __kasan_check_read+0x15/0x20 [ 14.549416] kasan_atomics_helper+0x3df/0x5450 [ 14.549439] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.549462] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.549488] ? kasan_atomics+0x152/0x310 [ 14.549530] kasan_atomics+0x1dc/0x310 [ 14.549554] ? __pfx_kasan_atomics+0x10/0x10 [ 14.549577] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.549604] ? __pfx_read_tsc+0x10/0x10 [ 14.549626] ? ktime_get_ts64+0x86/0x230 [ 14.549651] kunit_try_run_case+0x1a5/0x480 [ 14.549676] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.549700] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.549724] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.549748] ? __kthread_parkme+0x82/0x180 [ 14.549770] ? preempt_count_sub+0x50/0x80 [ 14.549795] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.549820] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.549844] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.549869] kthread+0x337/0x6f0 [ 14.549889] ? trace_preempt_on+0x20/0xc0 [ 14.549913] ? __pfx_kthread+0x10/0x10 [ 14.549934] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.549956] ? calculate_sigpending+0x7b/0xa0 [ 14.549983] ? __pfx_kthread+0x10/0x10 [ 14.550005] ret_from_fork+0x116/0x1d0 [ 14.550025] ? __pfx_kthread+0x10/0x10 [ 14.550115] ret_from_fork_asm+0x1a/0x30 [ 14.550151] </TASK> [ 14.550163] [ 14.562848] Allocated by task 283: [ 14.563051] kasan_save_stack+0x45/0x70 [ 14.563600] kasan_save_track+0x18/0x40 [ 14.563895] kasan_save_alloc_info+0x3b/0x50 [ 14.564277] __kasan_kmalloc+0xb7/0xc0 [ 14.564755] __kmalloc_cache_noprof+0x189/0x420 [ 14.564965] kasan_atomics+0x95/0x310 [ 14.565122] kunit_try_run_case+0x1a5/0x480 [ 14.565645] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.565897] kthread+0x337/0x6f0 [ 14.566266] ret_from_fork+0x116/0x1d0 [ 14.566558] ret_from_fork_asm+0x1a/0x30 [ 14.566758] [ 14.566850] The buggy address belongs to the object at ffff8881039f9d00 [ 14.566850] which belongs to the cache kmalloc-64 of size 64 [ 14.567752] The buggy address is located 0 bytes to the right of [ 14.567752] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 14.568626] [ 14.568918] The buggy address belongs to the physical page: [ 14.569394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 14.569889] flags: 0x200000000000000(node=0|zone=2) [ 14.570332] page_type: f5(slab) [ 14.570519] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.570951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.571404] page dumped because: kasan: bad access detected [ 14.571729] [ 14.571831] Memory state around the buggy address: [ 14.572421] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.572765] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.573313] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.573808] ^ [ 14.574139] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.574672] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.575168] ================================================================== [ 15.247596] ================================================================== [ 15.247914] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 15.248286] Write of size 4 at addr ffff8881039f9d30 by task kunit_try_catch/283 [ 15.248601] [ 15.248718] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.248764] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.248776] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.248798] Call Trace: [ 15.248818] <TASK> [ 15.248836] dump_stack_lvl+0x73/0xb0 [ 15.248864] print_report+0xd1/0x610 [ 15.248887] ? __virt_addr_valid+0x1db/0x2d0 [ 15.248911] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.248933] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.248956] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.248978] kasan_report+0x141/0x180 [ 15.249001] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.249029] kasan_check_range+0x10c/0x1c0 [ 15.249053] __kasan_check_write+0x18/0x20 [ 15.249072] kasan_atomics_helper+0x12e6/0x5450 [ 15.249095] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.249118] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.249165] ? kasan_atomics+0x152/0x310 [ 15.249193] kasan_atomics+0x1dc/0x310 [ 15.249216] ? __pfx_kasan_atomics+0x10/0x10 [ 15.249239] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.249266] ? __pfx_read_tsc+0x10/0x10 [ 15.249288] ? ktime_get_ts64+0x86/0x230 [ 15.249313] kunit_try_run_case+0x1a5/0x480 [ 15.249339] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.249362] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.249386] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.249411] ? __kthread_parkme+0x82/0x180 [ 15.249432] ? preempt_count_sub+0x50/0x80 [ 15.249457] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.249481] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.249515] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.249539] kthread+0x337/0x6f0 [ 15.249559] ? trace_preempt_on+0x20/0xc0 [ 15.249584] ? __pfx_kthread+0x10/0x10 [ 15.249606] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.249628] ? calculate_sigpending+0x7b/0xa0 [ 15.249653] ? __pfx_kthread+0x10/0x10 [ 15.249675] ret_from_fork+0x116/0x1d0 [ 15.249695] ? __pfx_kthread+0x10/0x10 [ 15.249716] ret_from_fork_asm+0x1a/0x30 [ 15.249747] </TASK> [ 15.249758] [ 15.256955] Allocated by task 283: [ 15.257133] kasan_save_stack+0x45/0x70 [ 15.257350] kasan_save_track+0x18/0x40 [ 15.257551] kasan_save_alloc_info+0x3b/0x50 [ 15.257764] __kasan_kmalloc+0xb7/0xc0 [ 15.257948] __kmalloc_cache_noprof+0x189/0x420 [ 15.258190] kasan_atomics+0x95/0x310 [ 15.258383] kunit_try_run_case+0x1a5/0x480 [ 15.258596] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.258811] kthread+0x337/0x6f0 [ 15.258932] ret_from_fork+0x116/0x1d0 [ 15.259104] ret_from_fork_asm+0x1a/0x30 [ 15.259321] [ 15.259418] The buggy address belongs to the object at ffff8881039f9d00 [ 15.259418] which belongs to the cache kmalloc-64 of size 64 [ 15.259928] The buggy address is located 0 bytes to the right of [ 15.259928] allocated 48-byte region [ffff8881039f9d00, ffff8881039f9d30) [ 15.260411] [ 15.260514] The buggy address belongs to the physical page: [ 15.260698] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f9 [ 15.260948] flags: 0x200000000000000(node=0|zone=2) [ 15.261116] page_type: f5(slab) [ 15.261265] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.261534] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.261867] page dumped because: kasan: bad access detected [ 15.262115] [ 15.262240] Memory state around the buggy address: [ 15.262460] ffff8881039f9c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.262781] ffff8881039f9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.263094] >ffff8881039f9d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.263426] ^ [ 15.263589] ffff8881039f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.263807] ffff8881039f9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.264120] ==================================================================