Date
July 19, 2025, 11:12 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.877550] ================================================================== [ 17.877613] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 17.877711] Read of size 8 at addr fff00000c7915530 by task kunit_try_catch/265 [ 17.877766] [ 17.877797] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.878049] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.878092] Hardware name: linux,dummy-virt (DT) [ 17.878198] Call trace: [ 17.878247] show_stack+0x20/0x38 (C) [ 17.878299] dump_stack_lvl+0x8c/0xd0 [ 17.878348] print_report+0x118/0x5d0 [ 17.878395] kasan_report+0xdc/0x128 [ 17.878449] kasan_check_range+0x100/0x1a8 [ 17.878499] __kasan_check_read+0x20/0x30 [ 17.878544] kasan_atomics_helper+0xdd4/0x4858 [ 17.878595] kasan_atomics+0x198/0x2e0 [ 17.878649] kunit_try_run_case+0x170/0x3f0 [ 17.878708] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.878761] kthread+0x328/0x630 [ 17.878805] ret_from_fork+0x10/0x20 [ 17.878861] [ 17.878891] Allocated by task 265: [ 17.878922] kasan_save_stack+0x3c/0x68 [ 17.878964] kasan_save_track+0x20/0x40 [ 17.879019] kasan_save_alloc_info+0x40/0x58 [ 17.879069] __kasan_kmalloc+0xd4/0xd8 [ 17.879123] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.879165] kasan_atomics+0xb8/0x2e0 [ 17.879203] kunit_try_run_case+0x170/0x3f0 [ 17.879243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.879288] kthread+0x328/0x630 [ 17.879323] ret_from_fork+0x10/0x20 [ 17.879361] [ 17.879381] The buggy address belongs to the object at fff00000c7915500 [ 17.879381] which belongs to the cache kmalloc-64 of size 64 [ 17.879442] The buggy address is located 0 bytes to the right of [ 17.879442] allocated 48-byte region [fff00000c7915500, fff00000c7915530) [ 17.879507] [ 17.879537] The buggy address belongs to the physical page: [ 17.879580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915 [ 17.879641] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.879702] page_type: f5(slab) [ 17.879740] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.879792] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.879841] page dumped because: kasan: bad access detected [ 17.879916] [ 17.879939] Memory state around the buggy address: [ 17.879970] fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.880014] fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.880057] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.880397] ^ [ 17.880455] fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.880503] fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.880545] ================================================================== [ 17.901761] ================================================================== [ 17.901810] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 17.901860] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265 [ 17.902229] [ 17.902269] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.902406] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.902440] Hardware name: linux,dummy-virt (DT) [ 17.902751] Call trace: [ 17.902788] show_stack+0x20/0x38 (C) [ 17.902882] dump_stack_lvl+0x8c/0xd0 [ 17.902969] print_report+0x118/0x5d0 [ 17.903132] kasan_report+0xdc/0x128 [ 17.903237] kasan_check_range+0x100/0x1a8 [ 17.903288] __kasan_check_write+0x20/0x30 [ 17.903353] kasan_atomics_helper+0xf20/0x4858 [ 17.903404] kasan_atomics+0x198/0x2e0 [ 17.903449] kunit_try_run_case+0x170/0x3f0 [ 17.903498] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.903552] kthread+0x328/0x630 [ 17.903595] ret_from_fork+0x10/0x20 [ 17.903642] [ 17.903664] Allocated by task 265: [ 17.903705] kasan_save_stack+0x3c/0x68 [ 17.903747] kasan_save_track+0x20/0x40 [ 17.903786] kasan_save_alloc_info+0x40/0x58 [ 17.903828] __kasan_kmalloc+0xd4/0xd8 [ 17.903896] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.903936] kasan_atomics+0xb8/0x2e0 [ 17.903973] kunit_try_run_case+0x170/0x3f0 [ 17.904013] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.904059] kthread+0x328/0x630 [ 17.904368] ret_from_fork+0x10/0x20 [ 17.904470] [ 17.904492] The buggy address belongs to the object at fff00000c7915500 [ 17.904492] which belongs to the cache kmalloc-64 of size 64 [ 17.904552] The buggy address is located 0 bytes to the right of [ 17.904552] allocated 48-byte region [fff00000c7915500, fff00000c7915530) [ 17.904672] [ 17.904836] The buggy address belongs to the physical page: [ 17.904906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915 [ 17.905091] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.905203] page_type: f5(slab) [ 17.905243] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.905296] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.905394] page dumped because: kasan: bad access detected [ 17.905451] [ 17.905471] Memory state around the buggy address: [ 17.905505] fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.905552] fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.905597] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.905683] ^ [ 17.905730] fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.905872] fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.905915] ================================================================== [ 17.948286] ================================================================== [ 17.948464] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 17.948614] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265 [ 17.948797] [ 17.948839] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.948926] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.948963] Hardware name: linux,dummy-virt (DT) [ 17.948996] Call trace: [ 17.949195] show_stack+0x20/0x38 (C) [ 17.949255] dump_stack_lvl+0x8c/0xd0 [ 17.949302] print_report+0x118/0x5d0 [ 17.949351] kasan_report+0xdc/0x128 [ 17.949524] kasan_check_range+0x100/0x1a8 [ 17.949641] __kasan_check_write+0x20/0x30 [ 17.950036] kasan_atomics_helper+0x126c/0x4858 [ 17.950136] kasan_atomics+0x198/0x2e0 [ 17.950226] kunit_try_run_case+0x170/0x3f0 [ 17.950278] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.950372] kthread+0x328/0x630 [ 17.950475] ret_from_fork+0x10/0x20 [ 17.950804] [ 17.950836] Allocated by task 265: [ 17.951123] kasan_save_stack+0x3c/0x68 [ 17.951239] kasan_save_track+0x20/0x40 [ 17.951284] kasan_save_alloc_info+0x40/0x58 [ 17.951332] __kasan_kmalloc+0xd4/0xd8 [ 17.951459] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.951505] kasan_atomics+0xb8/0x2e0 [ 17.951561] kunit_try_run_case+0x170/0x3f0 [ 17.951684] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.951754] kthread+0x328/0x630 [ 17.951789] ret_from_fork+0x10/0x20 [ 17.951834] [ 17.952189] The buggy address belongs to the object at fff00000c7915500 [ 17.952189] which belongs to the cache kmalloc-64 of size 64 [ 17.952485] The buggy address is located 0 bytes to the right of [ 17.952485] allocated 48-byte region [fff00000c7915500, fff00000c7915530) [ 17.952676] [ 17.952714] The buggy address belongs to the physical page: [ 17.952748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915 [ 17.952810] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.953557] page_type: f5(slab) [ 17.953857] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.954095] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.954511] page dumped because: kasan: bad access detected [ 17.954681] [ 17.954891] Memory state around the buggy address: [ 17.955109] fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.955266] fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.955411] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.955474] ^ [ 17.955808] fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.955917] fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.956156] ================================================================== [ 17.991382] ================================================================== [ 17.991592] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 17.991653] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265 [ 17.991792] [ 17.991826] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.992132] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.992209] Hardware name: linux,dummy-virt (DT) [ 17.992267] Call trace: [ 17.992317] show_stack+0x20/0x38 (C) [ 17.992427] dump_stack_lvl+0x8c/0xd0 [ 17.992514] print_report+0x118/0x5d0 [ 17.992661] kasan_report+0xdc/0x128 [ 17.992746] kasan_check_range+0x100/0x1a8 [ 17.992802] __kasan_check_write+0x20/0x30 [ 17.993175] kasan_atomics_helper+0x15b4/0x4858 [ 17.993294] kasan_atomics+0x198/0x2e0 [ 17.993568] kunit_try_run_case+0x170/0x3f0 [ 17.993752] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.993877] kthread+0x328/0x630 [ 17.993983] ret_from_fork+0x10/0x20 [ 17.994067] [ 17.994107] Allocated by task 265: [ 17.994139] kasan_save_stack+0x3c/0x68 [ 17.994185] kasan_save_track+0x20/0x40 [ 17.994223] kasan_save_alloc_info+0x40/0x58 [ 17.994265] __kasan_kmalloc+0xd4/0xd8 [ 17.994314] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.994355] kasan_atomics+0xb8/0x2e0 [ 17.994393] kunit_try_run_case+0x170/0x3f0 [ 17.994433] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.994476] kthread+0x328/0x630 [ 17.994526] ret_from_fork+0x10/0x20 [ 17.994564] [ 17.994595] The buggy address belongs to the object at fff00000c7915500 [ 17.994595] which belongs to the cache kmalloc-64 of size 64 [ 17.994655] The buggy address is located 0 bytes to the right of [ 17.994655] allocated 48-byte region [fff00000c7915500, fff00000c7915530) [ 17.994890] [ 17.994916] The buggy address belongs to the physical page: [ 17.995187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915 [ 17.995352] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.995445] page_type: f5(slab) [ 17.995659] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.995867] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.996008] page dumped because: kasan: bad access detected [ 17.996084] [ 17.996105] Memory state around the buggy address: [ 17.996146] fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.996192] fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.996238] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.996459] ^ [ 17.996504] fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.996703] fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.996775] ================================================================== [ 17.931419] ================================================================== [ 17.931470] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 17.931518] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265 [ 17.931568] [ 17.931637] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.931824] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.931938] Hardware name: linux,dummy-virt (DT) [ 17.932131] Call trace: [ 17.932214] show_stack+0x20/0x38 (C) [ 17.932573] dump_stack_lvl+0x8c/0xd0 [ 17.932631] print_report+0x118/0x5d0 [ 17.932678] kasan_report+0xdc/0x128 [ 17.932816] kasan_check_range+0x100/0x1a8 [ 17.933031] __kasan_check_write+0x20/0x30 [ 17.933100] kasan_atomics_helper+0x1190/0x4858 [ 17.933150] kasan_atomics+0x198/0x2e0 [ 17.933219] kunit_try_run_case+0x170/0x3f0 [ 17.933268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.933640] kthread+0x328/0x630 [ 17.933773] ret_from_fork+0x10/0x20 [ 17.934005] [ 17.934054] Allocated by task 265: [ 17.934142] kasan_save_stack+0x3c/0x68 [ 17.934218] kasan_save_track+0x20/0x40 [ 17.934603] kasan_save_alloc_info+0x40/0x58 [ 17.934774] __kasan_kmalloc+0xd4/0xd8 [ 17.934976] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.935094] kasan_atomics+0xb8/0x2e0 [ 17.935196] kunit_try_run_case+0x170/0x3f0 [ 17.935236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.935577] kthread+0x328/0x630 [ 17.935737] ret_from_fork+0x10/0x20 [ 17.936155] [ 17.936240] The buggy address belongs to the object at fff00000c7915500 [ 17.936240] which belongs to the cache kmalloc-64 of size 64 [ 17.936332] The buggy address is located 0 bytes to the right of [ 17.936332] allocated 48-byte region [fff00000c7915500, fff00000c7915530) [ 17.936398] [ 17.936437] The buggy address belongs to the physical page: [ 17.936470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915 [ 17.936922] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.937133] page_type: f5(slab) [ 17.937238] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.937336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.937726] page dumped because: kasan: bad access detected [ 17.937825] [ 17.937894] Memory state around the buggy address: [ 17.938090] fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.938136] fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.938192] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.938289] ^ [ 17.938364] fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.938833] fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.938939] ================================================================== [ 17.985038] ================================================================== [ 17.985466] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 17.985658] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265 [ 17.985742] [ 17.985850] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.985943] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.986024] Hardware name: linux,dummy-virt (DT) [ 17.986059] Call trace: [ 17.986086] show_stack+0x20/0x38 (C) [ 17.986136] dump_stack_lvl+0x8c/0xd0 [ 17.986191] print_report+0x118/0x5d0 [ 17.986508] kasan_report+0xdc/0x128 [ 17.986679] kasan_check_range+0x100/0x1a8 [ 17.986746] __kasan_check_write+0x20/0x30 [ 17.986800] kasan_atomics_helper+0x154c/0x4858 [ 17.987023] kasan_atomics+0x198/0x2e0 [ 17.987164] kunit_try_run_case+0x170/0x3f0 [ 17.987268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.987440] kthread+0x328/0x630 [ 17.987535] ret_from_fork+0x10/0x20 [ 17.987618] [ 17.987649] Allocated by task 265: [ 17.987751] kasan_save_stack+0x3c/0x68 [ 17.987817] kasan_save_track+0x20/0x40 [ 17.988030] kasan_save_alloc_info+0x40/0x58 [ 17.988217] __kasan_kmalloc+0xd4/0xd8 [ 17.988297] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.988560] kasan_atomics+0xb8/0x2e0 [ 17.988634] kunit_try_run_case+0x170/0x3f0 [ 17.988715] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.988833] kthread+0x328/0x630 [ 17.988980] ret_from_fork+0x10/0x20 [ 17.989099] [ 17.989234] The buggy address belongs to the object at fff00000c7915500 [ 17.989234] which belongs to the cache kmalloc-64 of size 64 [ 17.989334] The buggy address is located 0 bytes to the right of [ 17.989334] allocated 48-byte region [fff00000c7915500, fff00000c7915530) [ 17.989400] [ 17.989421] The buggy address belongs to the physical page: [ 17.989454] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915 [ 17.989832] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.989929] page_type: f5(slab) [ 17.990206] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.990296] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.990419] page dumped because: kasan: bad access detected [ 17.990482] [ 17.990503] Memory state around the buggy address: [ 17.990679] fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.990750] fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.990851] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.990899] ^ [ 17.990949] fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.991007] fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.991054] ================================================================== [ 17.927483] ================================================================== [ 17.927532] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 17.927580] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265 [ 17.927660] [ 17.927705] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.927787] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.927863] Hardware name: linux,dummy-virt (DT) [ 17.927899] Call trace: [ 17.927924] show_stack+0x20/0x38 (C) [ 17.927972] dump_stack_lvl+0x8c/0xd0 [ 17.928020] print_report+0x118/0x5d0 [ 17.928231] kasan_report+0xdc/0x128 [ 17.928282] kasan_check_range+0x100/0x1a8 [ 17.928356] __kasan_check_write+0x20/0x30 [ 17.928618] kasan_atomics_helper+0x1128/0x4858 [ 17.928772] kasan_atomics+0x198/0x2e0 [ 17.928933] kunit_try_run_case+0x170/0x3f0 [ 17.929226] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.929430] kthread+0x328/0x630 [ 17.929488] ret_from_fork+0x10/0x20 [ 17.929555] [ 17.929586] Allocated by task 265: [ 17.929624] kasan_save_stack+0x3c/0x68 [ 17.929667] kasan_save_track+0x20/0x40 [ 17.929727] kasan_save_alloc_info+0x40/0x58 [ 17.929779] __kasan_kmalloc+0xd4/0xd8 [ 17.929817] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.929867] kasan_atomics+0xb8/0x2e0 [ 17.929904] kunit_try_run_case+0x170/0x3f0 [ 17.929958] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.930024] kthread+0x328/0x630 [ 17.930069] ret_from_fork+0x10/0x20 [ 17.930105] [ 17.930141] The buggy address belongs to the object at fff00000c7915500 [ 17.930141] which belongs to the cache kmalloc-64 of size 64 [ 17.930215] The buggy address is located 0 bytes to the right of [ 17.930215] allocated 48-byte region [fff00000c7915500, fff00000c7915530) [ 17.930281] [ 17.930303] The buggy address belongs to the physical page: [ 17.930336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915 [ 17.930388] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.930445] page_type: f5(slab) [ 17.930494] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.930546] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.930589] page dumped because: kasan: bad access detected [ 17.930635] [ 17.930664] Memory state around the buggy address: [ 17.930709] fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.930753] fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.930798] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.930839] ^ [ 17.930874] fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.930919] fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.930959] ================================================================== [ 17.865932] ================================================================== [ 17.865990] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 17.866145] Write of size 4 at addr fff00000c7915530 by task kunit_try_catch/265 [ 17.866198] [ 17.866278] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.866363] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.866486] Hardware name: linux,dummy-virt (DT) [ 17.866535] Call trace: [ 17.866560] show_stack+0x20/0x38 (C) [ 17.866673] dump_stack_lvl+0x8c/0xd0 [ 17.866733] print_report+0x118/0x5d0 [ 17.866781] kasan_report+0xdc/0x128 [ 17.866849] kasan_check_range+0x100/0x1a8 [ 17.866900] __kasan_check_write+0x20/0x30 [ 17.866945] kasan_atomics_helper+0xd3c/0x4858 [ 17.867033] kasan_atomics+0x198/0x2e0 [ 17.867080] kunit_try_run_case+0x170/0x3f0 [ 17.867129] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.867182] kthread+0x328/0x630 [ 17.867333] ret_from_fork+0x10/0x20 [ 17.867448] [ 17.867470] Allocated by task 265: [ 17.867530] kasan_save_stack+0x3c/0x68 [ 17.867572] kasan_save_track+0x20/0x40 [ 17.867659] kasan_save_alloc_info+0x40/0x58 [ 17.867723] __kasan_kmalloc+0xd4/0xd8 [ 17.867799] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.867904] kasan_atomics+0xb8/0x2e0 [ 17.867944] kunit_try_run_case+0x170/0x3f0 [ 17.867998] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.868044] kthread+0x328/0x630 [ 17.868510] ret_from_fork+0x10/0x20 [ 17.868718] [ 17.868799] The buggy address belongs to the object at fff00000c7915500 [ 17.868799] which belongs to the cache kmalloc-64 of size 64 [ 17.868920] The buggy address is located 0 bytes to the right of [ 17.868920] allocated 48-byte region [fff00000c7915500, fff00000c7915530) [ 17.869238] [ 17.869302] The buggy address belongs to the physical page: [ 17.869380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915 [ 17.869567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.869667] page_type: f5(slab) [ 17.869734] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.869787] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.869831] page dumped because: kasan: bad access detected [ 17.870090] [ 17.870357] Memory state around the buggy address: [ 17.870425] fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.870524] fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.870610] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.870897] ^ [ 17.870970] fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.871068] fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.871300] ================================================================== [ 17.939811] ================================================================== [ 17.940036] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 17.940246] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265 [ 17.940364] [ 17.940449] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.940917] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.941030] Hardware name: linux,dummy-virt (DT) [ 17.941119] Call trace: [ 17.941297] show_stack+0x20/0x38 (C) [ 17.941353] dump_stack_lvl+0x8c/0xd0 [ 17.941423] print_report+0x118/0x5d0 [ 17.941473] kasan_report+0xdc/0x128 [ 17.941843] kasan_check_range+0x100/0x1a8 [ 17.942105] __kasan_check_write+0x20/0x30 [ 17.942173] kasan_atomics_helper+0x11f8/0x4858 [ 17.942498] kasan_atomics+0x198/0x2e0 [ 17.942723] kunit_try_run_case+0x170/0x3f0 [ 17.942838] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.943063] kthread+0x328/0x630 [ 17.943164] ret_from_fork+0x10/0x20 [ 17.943288] [ 17.943310] Allocated by task 265: [ 17.943341] kasan_save_stack+0x3c/0x68 [ 17.943394] kasan_save_track+0x20/0x40 [ 17.943434] kasan_save_alloc_info+0x40/0x58 [ 17.943476] __kasan_kmalloc+0xd4/0xd8 [ 17.943513] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.943564] kasan_atomics+0xb8/0x2e0 [ 17.943600] kunit_try_run_case+0x170/0x3f0 [ 17.943643] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.943889] kthread+0x328/0x630 [ 17.943949] ret_from_fork+0x10/0x20 [ 17.943999] [ 17.944021] The buggy address belongs to the object at fff00000c7915500 [ 17.944021] which belongs to the cache kmalloc-64 of size 64 [ 17.944385] The buggy address is located 0 bytes to the right of [ 17.944385] allocated 48-byte region [fff00000c7915500, fff00000c7915530) [ 17.944734] [ 17.944974] The buggy address belongs to the physical page: [ 17.945046] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915 [ 17.945104] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.945839] page_type: f5(slab) [ 17.946242] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.946302] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.946381] page dumped because: kasan: bad access detected [ 17.946427] [ 17.946448] Memory state around the buggy address: [ 17.946484] fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.946530] fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.946594] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.946653] ^ [ 17.946845] fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.946951] fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.947003] ================================================================== [ 17.956573] ================================================================== [ 17.956625] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 17.956673] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265 [ 17.956740] [ 17.956770] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.956853] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.956881] Hardware name: linux,dummy-virt (DT) [ 17.956913] Call trace: [ 17.956937] show_stack+0x20/0x38 (C) [ 17.956987] dump_stack_lvl+0x8c/0xd0 [ 17.957033] print_report+0x118/0x5d0 [ 17.957081] kasan_report+0xdc/0x128 [ 17.957127] kasan_check_range+0x100/0x1a8 [ 17.957177] __kasan_check_write+0x20/0x30 [ 17.957223] kasan_atomics_helper+0x12d8/0x4858 [ 17.957271] kasan_atomics+0x198/0x2e0 [ 17.957318] kunit_try_run_case+0x170/0x3f0 [ 17.957366] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.957419] kthread+0x328/0x630 [ 17.957462] ret_from_fork+0x10/0x20 [ 17.957510] [ 17.957530] Allocated by task 265: [ 17.957560] kasan_save_stack+0x3c/0x68 [ 17.957601] kasan_save_track+0x20/0x40 [ 17.957645] kasan_save_alloc_info+0x40/0x58 [ 17.957695] __kasan_kmalloc+0xd4/0xd8 [ 17.957733] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.957774] kasan_atomics+0xb8/0x2e0 [ 17.957810] kunit_try_run_case+0x170/0x3f0 [ 17.957852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.957896] kthread+0x328/0x630 [ 17.957930] ret_from_fork+0x10/0x20 [ 17.957968] [ 17.957989] The buggy address belongs to the object at fff00000c7915500 [ 17.957989] which belongs to the cache kmalloc-64 of size 64 [ 17.958048] The buggy address is located 0 bytes to the right of [ 17.958048] allocated 48-byte region [fff00000c7915500, fff00000c7915530) [ 17.958113] [ 17.958134] The buggy address belongs to the physical page: [ 17.958166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915 [ 17.958218] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.958268] page_type: f5(slab) [ 17.958306] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.958363] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.958408] page dumped because: kasan: bad access detected [ 17.958443] [ 17.958464] Memory state around the buggy address: [ 17.958499] fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.958544] fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.958590] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.958630] ^ [ 17.958666] fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.958749] fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.958819] ================================================================== [ 17.803596] ================================================================== [ 17.803806] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 17.803980] Write of size 4 at addr fff00000c7915530 by task kunit_try_catch/265 [ 17.804281] [ 17.804403] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.804586] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.804628] Hardware name: linux,dummy-virt (DT) [ 17.804663] Call trace: [ 17.804698] show_stack+0x20/0x38 (C) [ 17.804775] dump_stack_lvl+0x8c/0xd0 [ 17.804823] print_report+0x118/0x5d0 [ 17.804871] kasan_report+0xdc/0x128 [ 17.804918] kasan_check_range+0x100/0x1a8 [ 17.805195] __kasan_check_write+0x20/0x30 [ 17.805303] kasan_atomics_helper+0x99c/0x4858 [ 17.805364] kasan_atomics+0x198/0x2e0 [ 17.805417] kunit_try_run_case+0x170/0x3f0 [ 17.805474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.805529] kthread+0x328/0x630 [ 17.805572] ret_from_fork+0x10/0x20 [ 17.805625] [ 17.805646] Allocated by task 265: [ 17.805678] kasan_save_stack+0x3c/0x68 [ 17.805732] kasan_save_track+0x20/0x40 [ 17.805786] kasan_save_alloc_info+0x40/0x58 [ 17.805828] __kasan_kmalloc+0xd4/0xd8 [ 17.805876] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.805915] kasan_atomics+0xb8/0x2e0 [ 17.805954] kunit_try_run_case+0x170/0x3f0 [ 17.806007] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.806053] kthread+0x328/0x630 [ 17.806086] ret_from_fork+0x10/0x20 [ 17.806124] [ 17.806153] The buggy address belongs to the object at fff00000c7915500 [ 17.806153] which belongs to the cache kmalloc-64 of size 64 [ 17.806220] The buggy address is located 0 bytes to the right of [ 17.806220] allocated 48-byte region [fff00000c7915500, fff00000c7915530) [ 17.806284] [ 17.806310] The buggy address belongs to the physical page: [ 17.806348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915 [ 17.806401] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.806460] page_type: f5(slab) [ 17.806509] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.806576] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.806627] page dumped because: kasan: bad access detected [ 17.806661] [ 17.806708] Memory state around the buggy address: [ 17.806741] fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.807915] ================================================================== [ 17.917231] ================================================================== [ 17.917281] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 17.917330] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265 [ 17.917381] [ 17.917449] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.917534] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.917563] Hardware name: linux,dummy-virt (DT) [ 17.917597] Call trace: [ 17.917624] show_stack+0x20/0x38 (C) [ 17.917674] dump_stack_lvl+0x8c/0xd0 [ 17.917733] print_report+0x118/0x5d0 [ 17.917870] kasan_report+0xdc/0x128 [ 17.917945] kasan_check_range+0x100/0x1a8 [ 17.918007] __kasan_check_write+0x20/0x30 [ 17.918053] kasan_atomics_helper+0x1058/0x4858 [ 17.918104] kasan_atomics+0x198/0x2e0 [ 17.918151] kunit_try_run_case+0x170/0x3f0 [ 17.918214] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.918269] kthread+0x328/0x630 [ 17.918313] ret_from_fork+0x10/0x20 [ 17.918361] [ 17.918389] Allocated by task 265: [ 17.918428] kasan_save_stack+0x3c/0x68 [ 17.918470] kasan_save_track+0x20/0x40 [ 17.918510] kasan_save_alloc_info+0x40/0x58 [ 17.918551] __kasan_kmalloc+0xd4/0xd8 [ 17.918598] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.918643] kasan_atomics+0xb8/0x2e0 [ 17.918684] kunit_try_run_case+0x170/0x3f0 [ 17.918734] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.918777] kthread+0x328/0x630 [ 17.918813] ret_from_fork+0x10/0x20 [ 17.918850] [ 17.918871] The buggy address belongs to the object at fff00000c7915500 [ 17.918871] which belongs to the cache kmalloc-64 of size 64 [ 17.919424] The buggy address is located 0 bytes to the right of [ 17.919424] allocated 48-byte region [fff00000c7915500, fff00000c7915530) [ 17.919649] [ 17.919728] The buggy address belongs to the physical page: [ 17.919762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915 [ 17.919816] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.919922] page_type: f5(slab) [ 17.920009] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.920074] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.920117] page dumped because: kasan: bad access detected [ 17.920215] [ 17.920264] Memory state around the buggy address: [ 17.920346] fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.920476] fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.920575] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.920647] ^ [ 17.920682] fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.920750] fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.920789] ================================================================== [ 17.793572] ================================================================== [ 17.793625] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 17.793683] Read of size 4 at addr fff00000c7915530 by task kunit_try_catch/265 [ 17.793746] [ 17.793785] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.793867] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.793897] Hardware name: linux,dummy-virt (DT) [ 17.794267] kasan_atomics+0x198/0x2e0 [ 17.794608] kasan_save_track+0x20/0x40 [ 17.794777] kasan_atomics+0xb8/0x2e0 [ 17.795045] The buggy address is located 0 bytes to the right of [ 17.795045] allocated 48-byte region [fff00000c7915500, fff00000c7915530) [ 17.796349] fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.798031] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.798121] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.798168] Hardware name: linux,dummy-virt (DT) [ 17.798253] Call trace: [ 17.798278] show_stack+0x20/0x38 (C) [ 17.798325] dump_stack_lvl+0x8c/0xd0 [ 17.798373] print_report+0x118/0x5d0 [ 17.798421] kasan_report+0xdc/0x128 [ 17.798469] kasan_check_range+0x100/0x1a8 [ 17.798519] __kasan_check_write+0x20/0x30 [ 17.798907] kasan_atomics_helper+0x934/0x4858 [ 17.798985] kasan_atomics+0x198/0x2e0 [ 17.799034] kunit_try_run_case+0x170/0x3f0 [ 17.799102] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.799174] kthread+0x328/0x630 [ 17.799314] ret_from_fork+0x10/0x20 [ 17.799437] [ 17.799463] Allocated by task 265: [ 17.799556] kasan_save_stack+0x3c/0x68 [ 17.799621] kasan_save_track+0x20/0x40 [ 17.799662] kasan_save_alloc_info+0x40/0x58 [ 17.799714] __kasan_kmalloc+0xd4/0xd8 [ 17.799782] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.799824] kasan_atomics+0xb8/0x2e0 [ 17.799867] kunit_try_run_case+0x170/0x3f0 [ 17.799925] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.800010] kthread+0x328/0x630 [ 17.800108] ret_from_fork+0x10/0x20 [ 17.800262] [ 17.800346] The buggy address belongs to the object at fff00000c7915500 [ 17.800346] which belongs to the cache kmalloc-64 of size 64 [ 17.800404] The buggy address is located 0 bytes to the right of [ 17.800404] allocated 48-byte region [fff00000c7915500, fff00000c7915530) [ 17.800483] [ 17.800506] The buggy address belongs to the physical page: [ 17.800707] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915 [ 17.800925] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.801054] page_type: f5(slab) [ 17.801135] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.801410] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.801525] page dumped because: kasan: bad access detected [ 17.801620] [ 17.801720] Memory state around the buggy address: [ 17.801796] fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.801915] fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.802000] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.802103] ^ [ 17.802139] fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.802186] fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.802429] ================================================================== [ 17.890783] ================================================================== [ 17.890878] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 17.891011] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265 [ 17.891062] [ 17.891142] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.891251] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.891561] Hardware name: linux,dummy-virt (DT) [ 17.891605] Call trace: [ 17.891630] show_stack+0x20/0x38 (C) [ 17.891681] dump_stack_lvl+0x8c/0xd0 [ 17.891745] print_report+0x118/0x5d0 [ 17.892059] kasan_report+0xdc/0x128 [ 17.892155] __asan_report_store8_noabort+0x20/0x30 [ 17.892323] kasan_atomics_helper+0x3e5c/0x4858 [ 17.892695] kasan_atomics+0x198/0x2e0 [ 17.892797] kunit_try_run_case+0x170/0x3f0 [ 17.892973] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.893099] kthread+0x328/0x630 [ 17.893195] ret_from_fork+0x10/0x20 [ 17.893412] [ 17.893481] Allocated by task 265: [ 17.893574] kasan_save_stack+0x3c/0x68 [ 17.893624] kasan_save_track+0x20/0x40 [ 17.893665] kasan_save_alloc_info+0x40/0x58 [ 17.893742] __kasan_kmalloc+0xd4/0xd8 [ 17.893779] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.893820] kasan_atomics+0xb8/0x2e0 [ 17.893858] kunit_try_run_case+0x170/0x3f0 [ 17.893897] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.893942] kthread+0x328/0x630 [ 17.893977] ret_from_fork+0x10/0x20 [ 17.894195] [ 17.894265] The buggy address belongs to the object at fff00000c7915500 [ 17.894265] which belongs to the cache kmalloc-64 of size 64 [ 17.894443] The buggy address is located 0 bytes to the right of [ 17.894443] allocated 48-byte region [fff00000c7915500, fff00000c7915530) [ 17.894994] [ 17.895036] The buggy address belongs to the physical page: [ 17.895120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915 [ 17.895177] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.895252] page_type: f5(slab) [ 17.895338] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.895397] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.895440] page dumped because: kasan: bad access detected [ 17.895475] [ 17.895504] Memory state around the buggy address: [ 17.895537] fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.895583] fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.895629] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.895669] ^ [ 17.895715] fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.895761] fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.895811] ================================================================== [ 18.042449] ================================================================== [ 18.042626] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 18.042705] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265 [ 18.042921] [ 18.042965] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.043087] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.043119] Hardware name: linux,dummy-virt (DT) [ 18.043150] Call trace: [ 18.043176] show_stack+0x20/0x38 (C) [ 18.043226] dump_stack_lvl+0x8c/0xd0 [ 18.043307] print_report+0x118/0x5d0 [ 18.043374] kasan_report+0xdc/0x128 [ 18.043424] kasan_check_range+0x100/0x1a8 [ 18.043494] __kasan_check_write+0x20/0x30 [ 18.043541] kasan_atomics_helper+0x17ec/0x4858 [ 18.043591] kasan_atomics+0x198/0x2e0 [ 18.043637] kunit_try_run_case+0x170/0x3f0 [ 18.043697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.043751] kthread+0x328/0x630 [ 18.043793] ret_from_fork+0x10/0x20 [ 18.043981] [ 18.044009] Allocated by task 265: [ 18.044262] kasan_save_stack+0x3c/0x68 [ 18.044404] kasan_save_track+0x20/0x40 [ 18.044493] kasan_save_alloc_info+0x40/0x58 [ 18.044700] __kasan_kmalloc+0xd4/0xd8 [ 18.044891] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.044987] kasan_atomics+0xb8/0x2e0 [ 18.045130] kunit_try_run_case+0x170/0x3f0 [ 18.045226] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.045488] kthread+0x328/0x630 [ 18.045647] ret_from_fork+0x10/0x20 [ 18.045810] [ 18.045865] The buggy address belongs to the object at fff00000c7915500 [ 18.045865] which belongs to the cache kmalloc-64 of size 64 [ 18.045962] The buggy address is located 0 bytes to the right of [ 18.045962] allocated 48-byte region [fff00000c7915500, fff00000c7915530) [ 18.046031] [ 18.046053] The buggy address belongs to the physical page: [ 18.046104] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915 [ 18.046172] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.046232] page_type: f5(slab) [ 18.046279] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.046340] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.046393] page dumped because: kasan: bad access detected [ 18.046444] [ 18.046464] Memory state around the buggy address: [ 18.046499] fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.046553] fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.046598] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.046640] ^ [ 18.046677] fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.047148] fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.047363] ================================================================== [ 17.815054] ================================================================== [ 17.815116] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 17.815168] Write of size 4 at addr fff00000c7915530 by task kunit_try_catch/265 [ 17.815476] [ 17.815518] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.815630] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.815729] Hardware name: linux,dummy-virt (DT) [ 17.815763] Call trace: [ 17.815789] show_stack+0x20/0x38 (C) [ 17.815867] dump_stack_lvl+0x8c/0xd0 [ 17.815919] print_report+0x118/0x5d0 [ 17.815967] kasan_report+0xdc/0x128 [ 17.816199] kasan_check_range+0x100/0x1a8 [ 17.816351] __kasan_check_write+0x20/0x30 [ 17.816427] kasan_atomics_helper+0xa6c/0x4858 [ 17.816477] kasan_atomics+0x198/0x2e0 [ 17.816536] kunit_try_run_case+0x170/0x3f0 [ 17.816586] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.817127] kthread+0x328/0x630 [ 17.817223] ret_from_fork+0x10/0x20 [ 17.817560] [ 17.817613] Allocated by task 265: [ 17.817751] kasan_save_stack+0x3c/0x68 [ 17.817849] kasan_save_track+0x20/0x40 [ 17.817929] kasan_save_alloc_info+0x40/0x58 [ 17.817973] __kasan_kmalloc+0xd4/0xd8 [ 17.818161] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.818374] kasan_atomics+0xb8/0x2e0 [ 17.818432] kunit_try_run_case+0x170/0x3f0 [ 17.818475] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.818520] kthread+0x328/0x630 [ 17.818554] ret_from_fork+0x10/0x20 [ 17.818607] [ 17.818630] The buggy address belongs to the object at fff00000c7915500 [ 17.818630] which belongs to the cache kmalloc-64 of size 64 [ 17.818700] The buggy address is located 0 bytes to the right of [ 17.818700] allocated 48-byte region [fff00000c7915500, fff00000c7915530) [ 17.818764] [ 17.818795] The buggy address belongs to the physical page: [ 17.818838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915 [ 17.818890] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.818949] page_type: f5(slab) [ 17.819003] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.819057] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.819108] page dumped because: kasan: bad access detected [ 17.819153] [ 17.819184] Memory state around the buggy address: [ 17.819228] fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.819282] fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.819327] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.819375] ^ [ 17.819411] fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.819471] fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.819889] [ 17.820955] __kasan_check_write+0x20/0x30 [ 17.821852] [ 17.821873] Allocated by task 265: [ 17.821903] kasan_save_stack+0x3c/0x68 [ 17.821946] kasan_save_track+0x20/0x40 [ 17.821986] kasan_save_alloc_info+0x40/0x58 [ 17.822028] __kasan_kmalloc+0xd4/0xd8 [ 17.822279] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.822380] kasan_atomics+0xb8/0x2e0 [ 17.822420] kunit_try_run_case+0x170/0x3f0 [ 17.822503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.822590] kthread+0x328/0x630 [ 17.822625] ret_from_fork+0x10/0x20 [ 17.822665] [ 17.822697] The buggy address belongs to the object at fff00000c7915500 [ 17.822697] which belongs to the cache kmalloc-64 of size 64 [ 17.822955] The buggy address is located 0 bytes to the right of [ 17.822955] allocated 48-byte region [fff00000c7915500, fff00000c7915530) [ 17.823163] [ 17.823213] The buggy address belongs to the physical page: [ 17.823248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915 [ 17.823303] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.823352] page_type: f5(slab) [ 17.823503] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.823932] page dumped because: kasan: bad access detected [ 17.824459] fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.825698] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.826117] kasan_atomics_helper+0x3dcc/0x4858 [ 17.827186] kasan_save_stack+0x3c/0x68 [ 17.827341] kasan_save_track+0x20/0x40 [ 17.827435] kasan_save_alloc_info+0x40/0x58 [ 17.827572] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.828912] [ 17.829137] page_type: f5(slab) [ 17.829761] fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.831806] ================================================================== [ 17.860869] ================================================================== [ 17.860920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 17.860971] Read of size 4 at addr fff00000c7915530 by task kunit_try_catch/265 [ 17.861022] [ 17.861064] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.861156] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.861187] Hardware name: linux,dummy-virt (DT) [ 17.861221] Call trace: [ 17.861244] show_stack+0x20/0x38 (C) [ 17.861294] dump_stack_lvl+0x8c/0xd0 [ 17.861341] print_report+0x118/0x5d0 [ 17.861389] kasan_report+0xdc/0x128 [ 17.861436] __asan_report_load4_noabort+0x20/0x30 [ 17.861489] kasan_atomics_helper+0x3dd8/0x4858 [ 17.861539] kasan_atomics+0x198/0x2e0 [ 17.861593] kunit_try_run_case+0x170/0x3f0 [ 17.861651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.861717] kthread+0x328/0x630 [ 17.861763] ret_from_fork+0x10/0x20 [ 17.861812] [ 17.861832] Allocated by task 265: [ 17.861861] kasan_save_stack+0x3c/0x68 [ 17.861949] kasan_save_track+0x20/0x40 [ 17.861989] kasan_save_alloc_info+0x40/0x58 [ 17.862030] __kasan_kmalloc+0xd4/0xd8 [ 17.862069] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.862400] kasan_atomics+0xb8/0x2e0 [ 17.862618] kunit_try_run_case+0x170/0x3f0 [ 17.862743] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.862847] kthread+0x328/0x630 [ 17.862882] ret_from_fork+0x10/0x20 [ 17.862950] [ 17.862988] The buggy address belongs to the object at fff00000c7915500 [ 17.862988] which belongs to the cache kmalloc-64 of size 64 [ 17.863076] The buggy address is located 0 bytes to the right of [ 17.863076] allocated 48-byte region [fff00000c7915500, fff00000c7915530) [ 17.863171] [ 17.863319] The buggy address belongs to the physical page: [ 17.863355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915 [ 17.863409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.863524] page_type: f5(slab) [ 17.863592] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.863646] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.863700] page dumped because: kasan: bad access detected [ 17.863732] [ 17.863752] Memory state around the buggy address: [ 17.863970] fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.864155] fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.864389] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.864872] ^ [ 17.864958] fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.865075] fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.865175] ================================================================== [ 18.008293] ================================================================== [ 18.008605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 18.008982] Read of size 8 at addr fff00000c7915530 by task kunit_try_catch/265 [ 18.009072] [ 18.009118] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.009354] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.009396] Hardware name: linux,dummy-virt (DT) [ 18.009431] Call trace: [ 18.009454] show_stack+0x20/0x38 (C) [ 18.009508] dump_stack_lvl+0x8c/0xd0 [ 18.009555] print_report+0x118/0x5d0 [ 18.009678] kasan_report+0xdc/0x128 [ 18.009764] __asan_report_load8_noabort+0x20/0x30 [ 18.010008] kasan_atomics_helper+0x3df4/0x4858 [ 18.010106] kasan_atomics+0x198/0x2e0 [ 18.010397] kunit_try_run_case+0x170/0x3f0 [ 18.010459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.010522] kthread+0x328/0x630 [ 18.010565] ret_from_fork+0x10/0x20 [ 18.010830] [ 18.010867] Allocated by task 265: [ 18.010904] kasan_save_stack+0x3c/0x68 [ 18.011023] kasan_save_track+0x20/0x40 [ 18.011081] kasan_save_alloc_info+0x40/0x58 [ 18.011125] __kasan_kmalloc+0xd4/0xd8 [ 18.011202] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.011369] kasan_atomics+0xb8/0x2e0 [ 18.011518] kunit_try_run_case+0x170/0x3f0 [ 18.011581] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.011636] kthread+0x328/0x630 [ 18.011945] ret_from_fork+0x10/0x20 [ 18.012110] [ 18.012185] The buggy address belongs to the object at fff00000c7915500 [ 18.012185] which belongs to the cache kmalloc-64 of size 64 [ 18.012364] The buggy address is located 0 bytes to the right of [ 18.012364] allocated 48-byte region [fff00000c7915500, fff00000c7915530) [ 18.012544] [ 18.012634] The buggy address belongs to the physical page: [ 18.012704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915 [ 18.013057] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.013243] page_type: f5(slab) [ 18.013307] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.013722] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.013820] page dumped because: kasan: bad access detected [ 18.013882] [ 18.013903] Memory state around the buggy address: [ 18.014146] fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.014316] fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.014414] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.014813] ^ [ 18.014886] fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.014997] fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.015040] ================================================================== [ 17.886024] ================================================================== [ 17.886126] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 17.886177] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265 [ 17.886245] [ 17.886276] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.886378] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.886773] Hardware name: linux,dummy-virt (DT) [ 17.886848] Call trace: [ 17.886875] show_stack+0x20/0x38 (C) [ 17.886985] dump_stack_lvl+0x8c/0xd0 [ 17.887063] print_report+0x118/0x5d0 [ 17.887130] kasan_report+0xdc/0x128 [ 17.887177] kasan_check_range+0x100/0x1a8 [ 17.887253] __kasan_check_write+0x20/0x30 [ 17.887318] kasan_atomics_helper+0xe44/0x4858 [ 17.887369] kasan_atomics+0x198/0x2e0 [ 17.887414] kunit_try_run_case+0x170/0x3f0 [ 17.887463] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.887517] kthread+0x328/0x630 [ 17.887559] ret_from_fork+0x10/0x20 [ 17.887606] [ 17.887628] Allocated by task 265: [ 17.887657] kasan_save_stack+0x3c/0x68 [ 17.888122] kasan_save_track+0x20/0x40 [ 17.888213] kasan_save_alloc_info+0x40/0x58 [ 17.888306] __kasan_kmalloc+0xd4/0xd8 [ 17.888738] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.888835] kasan_atomics+0xb8/0x2e0 [ 17.889020] kunit_try_run_case+0x170/0x3f0 [ 17.889127] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.889232] kthread+0x328/0x630 [ 17.889392] ret_from_fork+0x10/0x20 [ 17.889468] [ 17.889493] The buggy address belongs to the object at fff00000c7915500 [ 17.889493] which belongs to the cache kmalloc-64 of size 64 [ 17.889553] The buggy address is located 0 bytes to the right of [ 17.889553] allocated 48-byte region [fff00000c7915500, fff00000c7915530) [ 17.889621] [ 17.889643] The buggy address belongs to the physical page: [ 17.890006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915 [ 17.890067] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.890118] page_type: f5(slab) [ 17.890156] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.890208] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.890252] page dumped because: kasan: bad access detected [ 17.890286] [ 17.890307] Memory state around the buggy address: [ 17.890341] fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.890386] fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.890430] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.890468] ^ [ 17.890504] fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.890549] fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.890589] ================================================================== [ 17.921585] ================================================================== [ 17.921645] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 17.921979] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265 [ 17.922108] [ 17.922142] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.922224] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.922378] Hardware name: linux,dummy-virt (DT) [ 17.922457] Call trace: [ 17.922483] show_stack+0x20/0x38 (C) [ 17.922535] dump_stack_lvl+0x8c/0xd0 [ 17.922630] print_report+0x118/0x5d0 [ 17.922797] kasan_report+0xdc/0x128 [ 17.922853] kasan_check_range+0x100/0x1a8 [ 17.922903] __kasan_check_write+0x20/0x30 [ 17.922948] kasan_atomics_helper+0x10c0/0x4858 [ 17.923054] kasan_atomics+0x198/0x2e0 [ 17.923377] kunit_try_run_case+0x170/0x3f0 [ 17.923577] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.923638] kthread+0x328/0x630 [ 17.923693] ret_from_fork+0x10/0x20 [ 17.923896] [ 17.924010] Allocated by task 265: [ 17.924390] kasan_save_stack+0x3c/0x68 [ 17.924437] kasan_save_track+0x20/0x40 [ 17.924477] kasan_save_alloc_info+0x40/0x58 [ 17.924536] __kasan_kmalloc+0xd4/0xd8 [ 17.924643] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.925069] kasan_atomics+0xb8/0x2e0 [ 17.925165] kunit_try_run_case+0x170/0x3f0 [ 17.925274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.925758] kthread+0x328/0x630 [ 17.925965] ret_from_fork+0x10/0x20 [ 17.926084] [ 17.926130] The buggy address belongs to the object at fff00000c7915500 [ 17.926130] which belongs to the cache kmalloc-64 of size 64 [ 17.926194] The buggy address is located 0 bytes to the right of [ 17.926194] allocated 48-byte region [fff00000c7915500, fff00000c7915530) [ 17.926271] [ 17.926341] The buggy address belongs to the physical page: [ 17.926411] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915 [ 17.926464] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.926536] page_type: f5(slab) [ 17.926577] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.926629] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.926673] page dumped because: kasan: bad access detected [ 17.926717] [ 17.926737] Memory state around the buggy address: [ 17.926772] fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.926817] fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.926864] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.927020] ^ [ 17.927065] fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.927140] fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.927218] ================================================================== [ 17.964164] ================================================================== [ 17.964214] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 17.964265] Read of size 8 at addr fff00000c7915530 by task kunit_try_catch/265 [ 17.964317] [ 17.964380] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.964492] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.964539] Hardware name: linux,dummy-virt (DT) [ 17.964590] Call trace: [ 17.964617] show_stack+0x20/0x38 (C) [ 17.964683] dump_stack_lvl+0x8c/0xd0 [ 17.964806] print_report+0x118/0x5d0 [ 17.964896] kasan_report+0xdc/0x128 [ 17.965018] __asan_report_load8_noabort+0x20/0x30 [ 17.965080] kasan_atomics_helper+0x3f04/0x4858 [ 17.965294] kasan_atomics+0x198/0x2e0 [ 17.965356] kunit_try_run_case+0x170/0x3f0 [ 17.965443] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.965527] kthread+0x328/0x630 [ 17.965622] ret_from_fork+0x10/0x20 [ 17.965677] [ 17.965756] Allocated by task 265: [ 17.965788] kasan_save_stack+0x3c/0x68 [ 17.965845] kasan_save_track+0x20/0x40 [ 17.965887] kasan_save_alloc_info+0x40/0x58 [ 17.965929] __kasan_kmalloc+0xd4/0xd8 [ 17.965966] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.966024] kasan_atomics+0xb8/0x2e0 [ 17.966166] kunit_try_run_case+0x170/0x3f0 [ 17.966325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.966380] kthread+0x328/0x630 [ 17.966414] ret_from_fork+0x10/0x20 [ 17.966508] [ 17.966530] The buggy address belongs to the object at fff00000c7915500 [ 17.966530] which belongs to the cache kmalloc-64 of size 64 [ 17.966590] The buggy address is located 0 bytes to the right of [ 17.966590] allocated 48-byte region [fff00000c7915500, fff00000c7915530) [ 17.966656] [ 17.966677] The buggy address belongs to the physical page: [ 17.966722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915 [ 17.966895] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.966958] page_type: f5(slab) [ 17.967086] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.967175] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.967219] page dumped because: kasan: bad access detected [ 17.967254] [ 17.967274] Memory state around the buggy address: [ 17.967308] fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.967354] fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.967400] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.967458] ^ [ 17.967514] fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.967567] fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.967608] ================================================================== [ 17.997242] ================================================================== [ 17.997293] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 17.997342] Read of size 8 at addr fff00000c7915530 by task kunit_try_catch/265 [ 17.997638] [ 17.997750] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.997860] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.997909] Hardware name: linux,dummy-virt (DT) [ 17.998056] Call trace: [ 17.998163] show_stack+0x20/0x38 (C) [ 17.998242] dump_stack_lvl+0x8c/0xd0 [ 17.998304] print_report+0x118/0x5d0 [ 17.998387] kasan_report+0xdc/0x128 [ 17.998440] __asan_report_load8_noabort+0x20/0x30 [ 17.998494] kasan_atomics_helper+0x3db0/0x4858 [ 17.998678] kasan_atomics+0x198/0x2e0 [ 17.998890] kunit_try_run_case+0x170/0x3f0 [ 17.998953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.999015] kthread+0x328/0x630 [ 17.999060] ret_from_fork+0x10/0x20 [ 17.999265] [ 17.999302] Allocated by task 265: [ 17.999336] kasan_save_stack+0x3c/0x68 [ 17.999468] kasan_save_track+0x20/0x40 [ 17.999534] kasan_save_alloc_info+0x40/0x58 [ 17.999577] __kasan_kmalloc+0xd4/0xd8 [ 17.999623] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.999664] kasan_atomics+0xb8/0x2e0 [ 17.999711] kunit_try_run_case+0x170/0x3f0 [ 17.999752] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.999796] kthread+0x328/0x630 [ 18.000074] ret_from_fork+0x10/0x20 [ 18.000294] [ 18.000396] The buggy address belongs to the object at fff00000c7915500 [ 18.000396] which belongs to the cache kmalloc-64 of size 64 [ 18.000468] The buggy address is located 0 bytes to the right of [ 18.000468] allocated 48-byte region [fff00000c7915500, fff00000c7915530) [ 18.000553] [ 18.000858] The buggy address belongs to the physical page: [ 18.001043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915 [ 18.001126] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.001357] page_type: f5(slab) [ 18.001406] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.001497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.001543] page dumped because: kasan: bad access detected [ 18.001577] [ 18.001597] Memory state around the buggy address: [ 18.001824] fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.001924] fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.002035] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.002086] ^ [ 18.002134] fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.002193] fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.002241] ================================================================== [ 17.896056] ================================================================== [ 17.896340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 17.896422] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265 [ 17.896669] [ 17.896715] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.896800] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.896829] Hardware name: linux,dummy-virt (DT) [ 17.896860] Call trace: [ 17.896885] show_stack+0x20/0x38 (C) [ 17.896933] dump_stack_lvl+0x8c/0xd0 [ 17.897063] print_report+0x118/0x5d0 [ 17.897296] kasan_report+0xdc/0x128 [ 17.897362] kasan_check_range+0x100/0x1a8 [ 17.897414] __kasan_check_write+0x20/0x30 [ 17.897463] kasan_atomics_helper+0xeb8/0x4858 [ 17.897533] kasan_atomics+0x198/0x2e0 [ 17.897598] kunit_try_run_case+0x170/0x3f0 [ 17.897921] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.898133] kthread+0x328/0x630 [ 17.898178] ret_from_fork+0x10/0x20 [ 17.898250] [ 17.898308] Allocated by task 265: [ 17.898409] kasan_save_stack+0x3c/0x68 [ 17.898452] kasan_save_track+0x20/0x40 [ 17.898530] kasan_save_alloc_info+0x40/0x58 [ 17.898593] __kasan_kmalloc+0xd4/0xd8 [ 17.898649] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.898794] kasan_atomics+0xb8/0x2e0 [ 17.898839] kunit_try_run_case+0x170/0x3f0 [ 17.898880] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.898925] kthread+0x328/0x630 [ 17.898971] ret_from_fork+0x10/0x20 [ 17.899028] [ 17.899318] The buggy address belongs to the object at fff00000c7915500 [ 17.899318] which belongs to the cache kmalloc-64 of size 64 [ 17.899388] The buggy address is located 0 bytes to the right of [ 17.899388] allocated 48-byte region [fff00000c7915500, fff00000c7915530) [ 17.899505] [ 17.899575] The buggy address belongs to the physical page: [ 17.899609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915 [ 17.899994] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.900110] page_type: f5(slab) [ 17.900180] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.900233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.900294] page dumped because: kasan: bad access detected [ 17.900329] [ 17.900350] Memory state around the buggy address: [ 17.900800] fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.900882] fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.900965] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.901259] ^ [ 17.901391] fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.901440] fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.901501] ================================================================== [ 18.034405] ================================================================== [ 18.034455] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 18.034506] Read of size 8 at addr fff00000c7915530 by task kunit_try_catch/265 [ 18.034746] [ 18.034793] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.034888] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.035077] Hardware name: linux,dummy-virt (DT) [ 18.035224] Call trace: [ 18.035252] show_stack+0x20/0x38 (C) [ 18.035341] dump_stack_lvl+0x8c/0xd0 [ 18.035428] print_report+0x118/0x5d0 [ 18.035495] kasan_report+0xdc/0x128 [ 18.035606] __asan_report_load8_noabort+0x20/0x30 [ 18.035664] kasan_atomics_helper+0x3e20/0x4858 [ 18.036017] kasan_atomics+0x198/0x2e0 [ 18.036111] kunit_try_run_case+0x170/0x3f0 [ 18.036478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.036644] kthread+0x328/0x630 [ 18.036721] ret_from_fork+0x10/0x20 [ 18.036877] [ 18.036984] Allocated by task 265: [ 18.037063] kasan_save_stack+0x3c/0x68 [ 18.037114] kasan_save_track+0x20/0x40 [ 18.037419] kasan_save_alloc_info+0x40/0x58 [ 18.037569] __kasan_kmalloc+0xd4/0xd8 [ 18.037677] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.037994] kasan_atomics+0xb8/0x2e0 [ 18.038108] kunit_try_run_case+0x170/0x3f0 [ 18.038207] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.038363] kthread+0x328/0x630 [ 18.038432] ret_from_fork+0x10/0x20 [ 18.038555] [ 18.038627] The buggy address belongs to the object at fff00000c7915500 [ 18.038627] which belongs to the cache kmalloc-64 of size 64 [ 18.039242] The buggy address is located 0 bytes to the right of [ 18.039242] allocated 48-byte region [fff00000c7915500, fff00000c7915530) [ 18.039482] [ 18.039697] The buggy address belongs to the physical page: [ 18.039790] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915 [ 18.039875] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.040103] page_type: f5(slab) [ 18.040156] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.040319] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.040649] page dumped because: kasan: bad access detected [ 18.040736] [ 18.040758] Memory state around the buggy address: [ 18.040805] fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.040859] fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.041175] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.041335] ^ [ 18.041426] fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.041636] fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.041787] ================================================================== [ 18.028584] ================================================================== [ 18.028644] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 18.028744] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265 [ 18.028798] [ 18.028847] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.028996] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.029055] Hardware name: linux,dummy-virt (DT) [ 18.029090] Call trace: [ 18.029131] show_stack+0x20/0x38 (C) [ 18.029218] dump_stack_lvl+0x8c/0xd0 [ 18.029264] print_report+0x118/0x5d0 [ 18.029340] kasan_report+0xdc/0x128 [ 18.029387] kasan_check_range+0x100/0x1a8 [ 18.029673] __kasan_check_write+0x20/0x30 [ 18.029757] kasan_atomics_helper+0x175c/0x4858 [ 18.030032] kasan_atomics+0x198/0x2e0 [ 18.030100] kunit_try_run_case+0x170/0x3f0 [ 18.030188] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.030286] kthread+0x328/0x630 [ 18.030397] ret_from_fork+0x10/0x20 [ 18.030450] [ 18.030490] Allocated by task 265: [ 18.030525] kasan_save_stack+0x3c/0x68 [ 18.030574] kasan_save_track+0x20/0x40 [ 18.030716] kasan_save_alloc_info+0x40/0x58 [ 18.030765] __kasan_kmalloc+0xd4/0xd8 [ 18.030803] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.030869] kasan_atomics+0xb8/0x2e0 [ 18.030907] kunit_try_run_case+0x170/0x3f0 [ 18.031137] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.031200] kthread+0x328/0x630 [ 18.031238] ret_from_fork+0x10/0x20 [ 18.031282] [ 18.031543] The buggy address belongs to the object at fff00000c7915500 [ 18.031543] which belongs to the cache kmalloc-64 of size 64 [ 18.031636] The buggy address is located 0 bytes to the right of [ 18.031636] allocated 48-byte region [fff00000c7915500, fff00000c7915530) [ 18.031715] [ 18.031841] The buggy address belongs to the physical page: [ 18.031918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915 [ 18.032188] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.032241] page_type: f5(slab) [ 18.032282] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.032334] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.032664] page dumped because: kasan: bad access detected [ 18.032791] [ 18.032918] Memory state around the buggy address: [ 18.033047] fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.033309] fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.033422] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.033473] ^ [ 18.033708] fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.033880] fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.033966] ================================================================== [ 17.967750] ================================================================== [ 17.967975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 17.968030] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265 [ 17.968081] [ 17.968129] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.968429] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.968505] Hardware name: linux,dummy-virt (DT) [ 17.968547] Call trace: [ 17.968621] show_stack+0x20/0x38 (C) [ 17.968760] dump_stack_lvl+0x8c/0xd0 [ 17.968822] print_report+0x118/0x5d0 [ 17.968880] kasan_report+0xdc/0x128 [ 17.968963] kasan_check_range+0x100/0x1a8 [ 17.969028] __kasan_check_write+0x20/0x30 [ 17.969075] kasan_atomics_helper+0x1414/0x4858 [ 17.969124] kasan_atomics+0x198/0x2e0 [ 17.969203] kunit_try_run_case+0x170/0x3f0 [ 17.969279] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.969334] kthread+0x328/0x630 [ 17.969378] ret_from_fork+0x10/0x20 [ 17.969549] [ 17.969655] Allocated by task 265: [ 17.969741] kasan_save_stack+0x3c/0x68 [ 17.969807] kasan_save_track+0x20/0x40 [ 17.969893] kasan_save_alloc_info+0x40/0x58 [ 17.970167] __kasan_kmalloc+0xd4/0xd8 [ 17.970252] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.970313] kasan_atomics+0xb8/0x2e0 [ 17.970402] kunit_try_run_case+0x170/0x3f0 [ 17.970524] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.970580] kthread+0x328/0x630 [ 17.970614] ret_from_fork+0x10/0x20 [ 17.970652] [ 17.970734] The buggy address belongs to the object at fff00000c7915500 [ 17.970734] which belongs to the cache kmalloc-64 of size 64 [ 17.970880] The buggy address is located 0 bytes to the right of [ 17.970880] allocated 48-byte region [fff00000c7915500, fff00000c7915530) [ 17.970965] [ 17.970987] The buggy address belongs to the physical page: [ 17.971019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915 [ 17.971071] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.971295] page_type: f5(slab) [ 17.971400] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.971453] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.971506] page dumped because: kasan: bad access detected [ 17.971550] [ 17.971579] Memory state around the buggy address: [ 17.971613] fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.971659] fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.971724] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.971767] ^ [ 17.971800] fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.971876] fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.971915] ================================================================== [ 17.880889] ================================================================== [ 17.880989] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 17.881041] Read of size 8 at addr fff00000c7915530 by task kunit_try_catch/265 [ 17.881106] [ 17.881137] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.881238] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.881275] Hardware name: linux,dummy-virt (DT) [ 17.881334] Call trace: [ 17.881451] show_stack+0x20/0x38 (C) [ 17.881502] dump_stack_lvl+0x8c/0xd0 [ 17.881578] print_report+0x118/0x5d0 [ 17.881964] kasan_report+0xdc/0x128 [ 17.882035] __asan_report_load8_noabort+0x20/0x30 [ 17.882139] kasan_atomics_helper+0x3f58/0x4858 [ 17.882235] kasan_atomics+0x198/0x2e0 [ 17.882290] kunit_try_run_case+0x170/0x3f0 [ 17.882356] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.882418] kthread+0x328/0x630 [ 17.882462] ret_from_fork+0x10/0x20 [ 17.882598] [ 17.882638] Allocated by task 265: [ 17.882724] kasan_save_stack+0x3c/0x68 [ 17.882770] kasan_save_track+0x20/0x40 [ 17.882808] kasan_save_alloc_info+0x40/0x58 [ 17.882849] __kasan_kmalloc+0xd4/0xd8 [ 17.883048] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.883175] kasan_atomics+0xb8/0x2e0 [ 17.883291] kunit_try_run_case+0x170/0x3f0 [ 17.883348] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.883445] kthread+0x328/0x630 [ 17.883479] ret_from_fork+0x10/0x20 [ 17.883535] [ 17.883575] The buggy address belongs to the object at fff00000c7915500 [ 17.883575] which belongs to the cache kmalloc-64 of size 64 [ 17.883635] The buggy address is located 0 bytes to the right of [ 17.883635] allocated 48-byte region [fff00000c7915500, fff00000c7915530) [ 17.883890] [ 17.883919] The buggy address belongs to the physical page: [ 17.884046] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915 [ 17.884227] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.884280] page_type: f5(slab) [ 17.884343] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.884397] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.884440] page dumped because: kasan: bad access detected [ 17.884507] [ 17.884528] Memory state around the buggy address: [ 17.884562] fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.884607] fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.884864] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.884964] ^ [ 17.885035] fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.885102] fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.885424] ================================================================== [ 18.022615] ================================================================== [ 18.022664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 18.022952] Read of size 8 at addr fff00000c7915530 by task kunit_try_catch/265 [ 18.023221] [ 18.023277] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.023508] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.023552] Hardware name: linux,dummy-virt (DT) [ 18.023585] Call trace: [ 18.023673] show_stack+0x20/0x38 (C) [ 18.023744] dump_stack_lvl+0x8c/0xd0 [ 18.024050] print_report+0x118/0x5d0 [ 18.024134] kasan_report+0xdc/0x128 [ 18.024263] __asan_report_load8_noabort+0x20/0x30 [ 18.024459] kasan_atomics_helper+0x3e10/0x4858 [ 18.024563] kasan_atomics+0x198/0x2e0 [ 18.024679] kunit_try_run_case+0x170/0x3f0 [ 18.024914] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.024981] kthread+0x328/0x630 [ 18.025180] ret_from_fork+0x10/0x20 [ 18.025279] [ 18.025325] Allocated by task 265: [ 18.025366] kasan_save_stack+0x3c/0x68 [ 18.025416] kasan_save_track+0x20/0x40 [ 18.025457] kasan_save_alloc_info+0x40/0x58 [ 18.025499] __kasan_kmalloc+0xd4/0xd8 [ 18.025536] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.025578] kasan_atomics+0xb8/0x2e0 [ 18.025621] kunit_try_run_case+0x170/0x3f0 [ 18.025670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.025731] kthread+0x328/0x630 [ 18.025767] ret_from_fork+0x10/0x20 [ 18.025804] [ 18.025825] The buggy address belongs to the object at fff00000c7915500 [ 18.025825] which belongs to the cache kmalloc-64 of size 64 [ 18.025893] The buggy address is located 0 bytes to the right of [ 18.025893] allocated 48-byte region [fff00000c7915500, fff00000c7915530) [ 18.025968] [ 18.025999] The buggy address belongs to the physical page: [ 18.026033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915 [ 18.026096] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.026145] page_type: f5(slab) [ 18.026193] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.026254] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.026299] page dumped because: kasan: bad access detected [ 18.026333] [ 18.026361] Memory state around the buggy address: [ 18.026405] fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.026458] fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.026526] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.026573] ^ [ 18.026609] fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.026654] fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.027171] ================================================================== [ 17.906190] ================================================================== [ 17.906268] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 17.906355] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265 [ 17.906407] [ 17.906526] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.906628] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.906682] Hardware name: linux,dummy-virt (DT) [ 17.906747] Call trace: [ 17.906777] show_stack+0x20/0x38 (C) [ 17.907125] dump_stack_lvl+0x8c/0xd0 [ 17.907269] print_report+0x118/0x5d0 [ 17.907324] kasan_report+0xdc/0x128 [ 17.907489] kasan_check_range+0x100/0x1a8 [ 17.907546] __kasan_check_write+0x20/0x30 [ 17.907599] kasan_atomics_helper+0xf88/0x4858 [ 17.907650] kasan_atomics+0x198/0x2e0 [ 17.907956] kunit_try_run_case+0x170/0x3f0 [ 17.908012] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.908238] kthread+0x328/0x630 [ 17.908324] ret_from_fork+0x10/0x20 [ 17.908391] [ 17.908412] Allocated by task 265: [ 17.908443] kasan_save_stack+0x3c/0x68 [ 17.908484] kasan_save_track+0x20/0x40 [ 17.908665] kasan_save_alloc_info+0x40/0x58 [ 17.908735] __kasan_kmalloc+0xd4/0xd8 [ 17.908790] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.908841] kasan_atomics+0xb8/0x2e0 [ 17.908878] kunit_try_run_case+0x170/0x3f0 [ 17.908917] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.908964] kthread+0x328/0x630 [ 17.908999] ret_from_fork+0x10/0x20 [ 17.909038] [ 17.909081] The buggy address belongs to the object at fff00000c7915500 [ 17.909081] which belongs to the cache kmalloc-64 of size 64 [ 17.909143] The buggy address is located 0 bytes to the right of [ 17.909143] allocated 48-byte region [fff00000c7915500, fff00000c7915530) [ 17.909207] [ 17.909230] The buggy address belongs to the physical page: [ 17.909304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915 [ 17.909356] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.909554] page_type: f5(slab) [ 17.909627] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.909847] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.909955] page dumped because: kasan: bad access detected [ 17.910059] [ 17.910107] Memory state around the buggy address: [ 17.910498] fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.910571] fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.910617] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.910877] ^ [ 17.911099] fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.911191] fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.911530] ================================================================== [ 17.977333] ================================================================== [ 17.977419] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 17.977547] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265 [ 17.977619] [ 17.977706] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.977847] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.977906] Hardware name: linux,dummy-virt (DT) [ 17.978037] Call trace: [ 17.978067] show_stack+0x20/0x38 (C) [ 17.978116] dump_stack_lvl+0x8c/0xd0 [ 17.978415] print_report+0x118/0x5d0 [ 17.978491] kasan_report+0xdc/0x128 [ 17.978542] kasan_check_range+0x100/0x1a8 [ 17.978773] __kasan_check_write+0x20/0x30 [ 17.978841] kasan_atomics_helper+0x14e4/0x4858 [ 17.978993] kasan_atomics+0x198/0x2e0 [ 17.979046] kunit_try_run_case+0x170/0x3f0 [ 17.979112] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.979197] kthread+0x328/0x630 [ 17.979242] ret_from_fork+0x10/0x20 [ 17.979413] [ 17.979441] Allocated by task 265: [ 17.979471] kasan_save_stack+0x3c/0x68 [ 17.979515] kasan_save_track+0x20/0x40 [ 17.979868] kasan_save_alloc_info+0x40/0x58 [ 17.980204] __kasan_kmalloc+0xd4/0xd8 [ 17.980281] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.980434] kasan_atomics+0xb8/0x2e0 [ 17.980869] kunit_try_run_case+0x170/0x3f0 [ 17.980955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.981176] kthread+0x328/0x630 [ 17.981225] ret_from_fork+0x10/0x20 [ 17.981273] [ 17.981295] The buggy address belongs to the object at fff00000c7915500 [ 17.981295] which belongs to the cache kmalloc-64 of size 64 [ 17.981442] The buggy address is located 0 bytes to the right of [ 17.981442] allocated 48-byte region [fff00000c7915500, fff00000c7915530) [ 17.981579] [ 17.981680] The buggy address belongs to the physical page: [ 17.981976] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915 [ 17.982050] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.982111] page_type: f5(slab) [ 17.982369] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.982574] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.982900] page dumped because: kasan: bad access detected [ 17.983053] [ 17.983076] Memory state around the buggy address: [ 17.983112] fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.983388] fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.983459] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.983577] ^ [ 17.983776] fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.984042] fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.984087] ================================================================== [ 17.912296] ================================================================== [ 17.912372] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 17.912442] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265 [ 17.912519] [ 17.912957] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.913190] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.913228] Hardware name: linux,dummy-virt (DT) [ 17.913307] Call trace: [ 17.913444] show_stack+0x20/0x38 (C) [ 17.913495] dump_stack_lvl+0x8c/0xd0 [ 17.913544] print_report+0x118/0x5d0 [ 17.913591] kasan_report+0xdc/0x128 [ 17.913647] kasan_check_range+0x100/0x1a8 [ 17.913707] __kasan_check_write+0x20/0x30 [ 17.913755] kasan_atomics_helper+0xff0/0x4858 [ 17.913827] kasan_atomics+0x198/0x2e0 [ 17.913875] kunit_try_run_case+0x170/0x3f0 [ 17.913923] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.913977] kthread+0x328/0x630 [ 17.914060] ret_from_fork+0x10/0x20 [ 17.914112] [ 17.914132] Allocated by task 265: [ 17.914239] kasan_save_stack+0x3c/0x68 [ 17.914374] kasan_save_track+0x20/0x40 [ 17.914415] kasan_save_alloc_info+0x40/0x58 [ 17.914520] __kasan_kmalloc+0xd4/0xd8 [ 17.914587] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.914631] kasan_atomics+0xb8/0x2e0 [ 17.914844] kunit_try_run_case+0x170/0x3f0 [ 17.915094] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.915159] kthread+0x328/0x630 [ 17.915195] ret_from_fork+0x10/0x20 [ 17.915347] [ 17.915396] The buggy address belongs to the object at fff00000c7915500 [ 17.915396] which belongs to the cache kmalloc-64 of size 64 [ 17.915458] The buggy address is located 0 bytes to the right of [ 17.915458] allocated 48-byte region [fff00000c7915500, fff00000c7915530) [ 17.915599] [ 17.915660] The buggy address belongs to the physical page: [ 17.915705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915 [ 17.915758] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.915807] page_type: f5(slab) [ 17.915873] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.915928] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.915971] page dumped because: kasan: bad access detected [ 17.916004] [ 17.916047] Memory state around the buggy address: [ 17.916203] fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.916253] fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.916332] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.916528] ^ [ 17.916592] fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.916669] fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.916722] ================================================================== [ 18.002814] ================================================================== [ 18.002897] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 18.003012] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265 [ 18.003154] [ 18.003213] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.003369] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.003418] Hardware name: linux,dummy-virt (DT) [ 18.003453] Call trace: [ 18.003477] show_stack+0x20/0x38 (C) [ 18.003660] dump_stack_lvl+0x8c/0xd0 [ 18.003849] print_report+0x118/0x5d0 [ 18.003911] kasan_report+0xdc/0x128 [ 18.003966] kasan_check_range+0x100/0x1a8 [ 18.004215] __kasan_check_write+0x20/0x30 [ 18.004338] kasan_atomics_helper+0x1644/0x4858 [ 18.004423] kasan_atomics+0x198/0x2e0 [ 18.004578] kunit_try_run_case+0x170/0x3f0 [ 18.004801] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.004897] kthread+0x328/0x630 [ 18.005215] ret_from_fork+0x10/0x20 [ 18.005299] [ 18.005347] Allocated by task 265: [ 18.005445] kasan_save_stack+0x3c/0x68 [ 18.005625] kasan_save_track+0x20/0x40 [ 18.005701] kasan_save_alloc_info+0x40/0x58 [ 18.005745] __kasan_kmalloc+0xd4/0xd8 [ 18.006096] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.006205] kasan_atomics+0xb8/0x2e0 [ 18.006408] kunit_try_run_case+0x170/0x3f0 [ 18.006594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.006714] kthread+0x328/0x630 [ 18.006761] ret_from_fork+0x10/0x20 [ 18.006809] [ 18.006831] The buggy address belongs to the object at fff00000c7915500 [ 18.006831] which belongs to the cache kmalloc-64 of size 64 [ 18.006893] The buggy address is located 0 bytes to the right of [ 18.006893] allocated 48-byte region [fff00000c7915500, fff00000c7915530) [ 18.006968] [ 18.006999] The buggy address belongs to the physical page: [ 18.007032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915 [ 18.007099] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.007165] page_type: f5(slab) [ 18.007212] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.007267] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.007320] page dumped because: kasan: bad access detected [ 18.007355] [ 18.007375] Memory state around the buggy address: [ 18.007410] fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.007469] fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.007514] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.007555] ^ [ 18.007600] fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.007652] fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.007711] ================================================================== [ 17.972153] ================================================================== [ 17.972220] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 17.972270] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265 [ 17.972322] [ 17.972351] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.972459] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.972507] Hardware name: linux,dummy-virt (DT) [ 17.972585] Call trace: [ 17.972652] show_stack+0x20/0x38 (C) [ 17.972741] dump_stack_lvl+0x8c/0xd0 [ 17.972826] print_report+0x118/0x5d0 [ 17.973154] kasan_report+0xdc/0x128 [ 17.973219] kasan_check_range+0x100/0x1a8 [ 17.973268] __kasan_check_write+0x20/0x30 [ 17.973315] kasan_atomics_helper+0x147c/0x4858 [ 17.973365] kasan_atomics+0x198/0x2e0 [ 17.973410] kunit_try_run_case+0x170/0x3f0 [ 17.973459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.973512] kthread+0x328/0x630 [ 17.973554] ret_from_fork+0x10/0x20 [ 17.973603] [ 17.973762] Allocated by task 265: [ 17.973891] kasan_save_stack+0x3c/0x68 [ 17.973957] kasan_save_track+0x20/0x40 [ 17.974036] kasan_save_alloc_info+0x40/0x58 [ 17.974345] __kasan_kmalloc+0xd4/0xd8 [ 17.974426] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.974477] kasan_atomics+0xb8/0x2e0 [ 17.974641] kunit_try_run_case+0x170/0x3f0 [ 17.974725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.974863] kthread+0x328/0x630 [ 17.974919] ret_from_fork+0x10/0x20 [ 17.974975] [ 17.974998] The buggy address belongs to the object at fff00000c7915500 [ 17.974998] which belongs to the cache kmalloc-64 of size 64 [ 17.975059] The buggy address is located 0 bytes to the right of [ 17.975059] allocated 48-byte region [fff00000c7915500, fff00000c7915530) [ 17.975125] [ 17.975401] The buggy address belongs to the physical page: [ 17.975468] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915 [ 17.975734] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.975872] page_type: f5(slab) [ 17.975940] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.975994] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.976088] page dumped because: kasan: bad access detected [ 17.976136] [ 17.976176] Memory state around the buggy address: [ 17.976220] fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.976268] fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.976329] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.976371] ^ [ 17.976415] fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.976465] fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.976514] ================================================================== [ 17.959207] ================================================================== [ 17.959286] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 17.959351] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265 [ 17.959431] [ 17.959478] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.959584] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.959657] Hardware name: linux,dummy-virt (DT) [ 17.959722] Call trace: [ 17.959747] show_stack+0x20/0x38 (C) [ 17.959797] dump_stack_lvl+0x8c/0xd0 [ 17.959871] print_report+0x118/0x5d0 [ 17.959921] kasan_report+0xdc/0x128 [ 17.959967] kasan_check_range+0x100/0x1a8 [ 17.960017] __kasan_check_write+0x20/0x30 [ 17.960064] kasan_atomics_helper+0x1384/0x4858 [ 17.960295] kasan_atomics+0x198/0x2e0 [ 17.960408] kunit_try_run_case+0x170/0x3f0 [ 17.960894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.960999] kthread+0x328/0x630 [ 17.961086] ret_from_fork+0x10/0x20 [ 17.961224] [ 17.961351] Allocated by task 265: [ 17.961430] kasan_save_stack+0x3c/0x68 [ 17.961501] kasan_save_track+0x20/0x40 [ 17.961550] kasan_save_alloc_info+0x40/0x58 [ 17.961593] __kasan_kmalloc+0xd4/0xd8 [ 17.961636] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.961712] kasan_atomics+0xb8/0x2e0 [ 17.961749] kunit_try_run_case+0x170/0x3f0 [ 17.961902] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.961954] kthread+0x328/0x630 [ 17.961988] ret_from_fork+0x10/0x20 [ 17.962151] [ 17.962227] The buggy address belongs to the object at fff00000c7915500 [ 17.962227] which belongs to the cache kmalloc-64 of size 64 [ 17.962327] The buggy address is located 0 bytes to the right of [ 17.962327] allocated 48-byte region [fff00000c7915500, fff00000c7915530) [ 17.962622] [ 17.962741] The buggy address belongs to the physical page: [ 17.962858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915 [ 17.962967] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.963082] page_type: f5(slab) [ 17.963123] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.963188] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.963388] page dumped because: kasan: bad access detected [ 17.963543] [ 17.963570] Memory state around the buggy address: [ 17.963628] fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.963674] fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.963740] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.963801] ^ [ 17.963881] fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.963926] fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.963965] ================================================================== [ 17.872288] ================================================================== [ 17.872341] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 17.872423] Read of size 4 at addr fff00000c7915530 by task kunit_try_catch/265 [ 17.872475] [ 17.872564] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.872646] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.872674] Hardware name: linux,dummy-virt (DT) [ 17.872722] Call trace: [ 17.872748] show_stack+0x20/0x38 (C) [ 17.872796] dump_stack_lvl+0x8c/0xd0 [ 17.873001] print_report+0x118/0x5d0 [ 17.873224] kasan_report+0xdc/0x128 [ 17.873400] __asan_report_load4_noabort+0x20/0x30 [ 17.873472] kasan_atomics_helper+0x3e04/0x4858 [ 17.873525] kasan_atomics+0x198/0x2e0 [ 17.873589] kunit_try_run_case+0x170/0x3f0 [ 17.874059] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.874165] kthread+0x328/0x630 [ 17.874210] ret_from_fork+0x10/0x20 [ 17.874268] [ 17.874317] Allocated by task 265: [ 17.874385] kasan_save_stack+0x3c/0x68 [ 17.874430] kasan_save_track+0x20/0x40 [ 17.874474] kasan_save_alloc_info+0x40/0x58 [ 17.874516] __kasan_kmalloc+0xd4/0xd8 [ 17.874582] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.874722] kasan_atomics+0xb8/0x2e0 [ 17.874781] kunit_try_run_case+0x170/0x3f0 [ 17.874823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.874867] kthread+0x328/0x630 [ 17.874902] ret_from_fork+0x10/0x20 [ 17.875091] [ 17.875199] The buggy address belongs to the object at fff00000c7915500 [ 17.875199] which belongs to the cache kmalloc-64 of size 64 [ 17.875265] The buggy address is located 0 bytes to the right of [ 17.875265] allocated 48-byte region [fff00000c7915500, fff00000c7915530) [ 17.875395] [ 17.875486] The buggy address belongs to the physical page: [ 17.875520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915 [ 17.875583] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.875654] page_type: f5(slab) [ 17.875739] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.875896] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.876253] page dumped because: kasan: bad access detected [ 17.876298] [ 17.876319] Memory state around the buggy address: [ 17.876354] fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.876400] fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.876479] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 17.876623] ^ [ 17.876664] fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.876722] fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.876793] ================================================================== [ 18.016393] ================================================================== [ 18.016446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 18.016569] Write of size 8 at addr fff00000c7915530 by task kunit_try_catch/265 [ 18.016650] [ 18.016680] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.016940] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.017080] Hardware name: linux,dummy-virt (DT) [ 18.017317] Call trace: [ 18.017541] show_stack+0x20/0x38 (C) [ 18.017700] dump_stack_lvl+0x8c/0xd0 [ 18.017757] print_report+0x118/0x5d0 [ 18.017821] kasan_report+0xdc/0x128 [ 18.017875] kasan_check_range+0x100/0x1a8 [ 18.017928] __kasan_check_write+0x20/0x30 [ 18.018203] kasan_atomics_helper+0x16d0/0x4858 [ 18.018397] kasan_atomics+0x198/0x2e0 [ 18.018452] kunit_try_run_case+0x170/0x3f0 [ 18.018517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.018643] kthread+0x328/0x630 [ 18.018823] ret_from_fork+0x10/0x20 [ 18.018897] [ 18.018936] Allocated by task 265: [ 18.019195] kasan_save_stack+0x3c/0x68 [ 18.019272] kasan_save_track+0x20/0x40 [ 18.019343] kasan_save_alloc_info+0x40/0x58 [ 18.019431] __kasan_kmalloc+0xd4/0xd8 [ 18.019626] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.019681] kasan_atomics+0xb8/0x2e0 [ 18.019733] kunit_try_run_case+0x170/0x3f0 [ 18.019869] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.019936] kthread+0x328/0x630 [ 18.019979] ret_from_fork+0x10/0x20 [ 18.020069] [ 18.020148] The buggy address belongs to the object at fff00000c7915500 [ 18.020148] which belongs to the cache kmalloc-64 of size 64 [ 18.020365] The buggy address is located 0 bytes to the right of [ 18.020365] allocated 48-byte region [fff00000c7915500, fff00000c7915530) [ 18.020592] [ 18.020828] The buggy address belongs to the physical page: [ 18.021152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107915 [ 18.021214] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.021266] page_type: f5(slab) [ 18.021349] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.021437] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.021536] page dumped because: kasan: bad access detected [ 18.021660] [ 18.021713] Memory state around the buggy address: [ 18.021749] fff00000c7915400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.022025] fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.022132] >fff00000c7915500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.022189] ^ [ 18.022227] fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.022273] fff00000c7915600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.022320] ==================================================================
[ 14.949720] ================================================================== [ 14.950102] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 14.950826] Read of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 14.951533] [ 14.951788] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.951838] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.951967] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.951994] Call Trace: [ 14.952021] <TASK> [ 14.952037] dump_stack_lvl+0x73/0xb0 [ 14.952068] print_report+0xd1/0x610 [ 14.952090] ? __virt_addr_valid+0x1db/0x2d0 [ 14.952147] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.952168] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.952190] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.952212] kasan_report+0x141/0x180 [ 14.952234] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.952261] __asan_report_load4_noabort+0x18/0x20 [ 14.952285] kasan_atomics_helper+0x4a36/0x5450 [ 14.952308] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.952331] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.952392] ? kasan_atomics+0x152/0x310 [ 14.952432] kasan_atomics+0x1dc/0x310 [ 14.952455] ? __pfx_kasan_atomics+0x10/0x10 [ 14.952479] ? __pfx_read_tsc+0x10/0x10 [ 14.952501] ? ktime_get_ts64+0x86/0x230 [ 14.952525] kunit_try_run_case+0x1a5/0x480 [ 14.952549] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.952571] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.952594] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.952617] ? __kthread_parkme+0x82/0x180 [ 14.952638] ? preempt_count_sub+0x50/0x80 [ 14.952661] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.952685] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.952708] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.952732] kthread+0x337/0x6f0 [ 14.952751] ? trace_preempt_on+0x20/0xc0 [ 14.952774] ? __pfx_kthread+0x10/0x10 [ 14.952795] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.952816] ? calculate_sigpending+0x7b/0xa0 [ 14.952841] ? __pfx_kthread+0x10/0x10 [ 14.952863] ret_from_fork+0x116/0x1d0 [ 14.952881] ? __pfx_kthread+0x10/0x10 [ 14.952902] ret_from_fork_asm+0x1a/0x30 [ 14.952933] </TASK> [ 14.952945] [ 14.961262] Allocated by task 283: [ 14.961499] kasan_save_stack+0x45/0x70 [ 14.961724] kasan_save_track+0x18/0x40 [ 14.961883] kasan_save_alloc_info+0x3b/0x50 [ 14.962123] __kasan_kmalloc+0xb7/0xc0 [ 14.962312] __kmalloc_cache_noprof+0x189/0x420 [ 14.962590] kasan_atomics+0x95/0x310 [ 14.962767] kunit_try_run_case+0x1a5/0x480 [ 14.962983] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.963279] kthread+0x337/0x6f0 [ 14.963472] ret_from_fork+0x116/0x1d0 [ 14.963693] ret_from_fork_asm+0x1a/0x30 [ 14.963898] [ 14.963972] The buggy address belongs to the object at ffff8881039b8880 [ 14.963972] which belongs to the cache kmalloc-64 of size 64 [ 14.964651] The buggy address is located 0 bytes to the right of [ 14.964651] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 14.965153] [ 14.965226] The buggy address belongs to the physical page: [ 14.965405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 14.965671] flags: 0x200000000000000(node=0|zone=2) [ 14.965905] page_type: f5(slab) [ 14.966082] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.966421] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.966758] page dumped because: kasan: bad access detected [ 14.966973] [ 14.967071] Memory state around the buggy address: [ 14.967248] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 14.967636] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.967962] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.968247] ^ [ 14.968477] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.968801] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.969125] ================================================================== [ 15.469265] ================================================================== [ 15.469816] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 15.470738] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 15.471069] [ 15.471154] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.471196] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.471209] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.471232] Call Trace: [ 15.471246] <TASK> [ 15.471261] dump_stack_lvl+0x73/0xb0 [ 15.471288] print_report+0xd1/0x610 [ 15.471310] ? __virt_addr_valid+0x1db/0x2d0 [ 15.471332] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.471353] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.471532] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.471559] kasan_report+0x141/0x180 [ 15.471581] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.471608] kasan_check_range+0x10c/0x1c0 [ 15.471634] __kasan_check_write+0x18/0x20 [ 15.471653] kasan_atomics_helper+0x19e3/0x5450 [ 15.471676] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.471697] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.471722] ? kasan_atomics+0x152/0x310 [ 15.471748] kasan_atomics+0x1dc/0x310 [ 15.471770] ? __pfx_kasan_atomics+0x10/0x10 [ 15.471795] ? __pfx_read_tsc+0x10/0x10 [ 15.471815] ? ktime_get_ts64+0x86/0x230 [ 15.471839] kunit_try_run_case+0x1a5/0x480 [ 15.471863] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.471885] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.471909] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.471933] ? __kthread_parkme+0x82/0x180 [ 15.471953] ? preempt_count_sub+0x50/0x80 [ 15.471976] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.472000] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.472036] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.472060] kthread+0x337/0x6f0 [ 15.472079] ? trace_preempt_on+0x20/0xc0 [ 15.472101] ? __pfx_kthread+0x10/0x10 [ 15.472122] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.472143] ? calculate_sigpending+0x7b/0xa0 [ 15.472167] ? __pfx_kthread+0x10/0x10 [ 15.472188] ret_from_fork+0x116/0x1d0 [ 15.472206] ? __pfx_kthread+0x10/0x10 [ 15.472227] ret_from_fork_asm+0x1a/0x30 [ 15.472257] </TASK> [ 15.472268] [ 15.485849] Allocated by task 283: [ 15.486051] kasan_save_stack+0x45/0x70 [ 15.486265] kasan_save_track+0x18/0x40 [ 15.486840] kasan_save_alloc_info+0x3b/0x50 [ 15.487047] __kasan_kmalloc+0xb7/0xc0 [ 15.487575] __kmalloc_cache_noprof+0x189/0x420 [ 15.487809] kasan_atomics+0x95/0x310 [ 15.488127] kunit_try_run_case+0x1a5/0x480 [ 15.488310] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.488985] kthread+0x337/0x6f0 [ 15.489281] ret_from_fork+0x116/0x1d0 [ 15.489815] ret_from_fork_asm+0x1a/0x30 [ 15.490040] [ 15.490132] The buggy address belongs to the object at ffff8881039b8880 [ 15.490132] which belongs to the cache kmalloc-64 of size 64 [ 15.491188] The buggy address is located 0 bytes to the right of [ 15.491188] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 15.492158] [ 15.492260] The buggy address belongs to the physical page: [ 15.492663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.493247] flags: 0x200000000000000(node=0|zone=2) [ 15.493784] page_type: f5(slab) [ 15.493938] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.494634] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.494955] page dumped because: kasan: bad access detected [ 15.495331] [ 15.495635] Memory state around the buggy address: [ 15.495847] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.496188] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.496798] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.497197] ^ [ 15.497462] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.498129] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.498639] ================================================================== [ 14.393639] ================================================================== [ 14.394244] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 14.394590] Read of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 14.394906] [ 14.395000] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.395542] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.395554] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.395677] Call Trace: [ 14.395706] <TASK> [ 14.395722] dump_stack_lvl+0x73/0xb0 [ 14.395752] print_report+0xd1/0x610 [ 14.395773] ? __virt_addr_valid+0x1db/0x2d0 [ 14.395794] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.395814] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.395836] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.395856] kasan_report+0x141/0x180 [ 14.395877] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.395902] __asan_report_load4_noabort+0x18/0x20 [ 14.395926] kasan_atomics_helper+0x4bbc/0x5450 [ 14.395947] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.395969] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.395993] ? kasan_atomics+0x152/0x310 [ 14.396029] kasan_atomics+0x1dc/0x310 [ 14.396050] ? __pfx_kasan_atomics+0x10/0x10 [ 14.396073] ? __pfx_read_tsc+0x10/0x10 [ 14.396092] ? ktime_get_ts64+0x86/0x230 [ 14.396115] kunit_try_run_case+0x1a5/0x480 [ 14.396139] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.396161] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.396183] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.396205] ? __kthread_parkme+0x82/0x180 [ 14.396223] ? preempt_count_sub+0x50/0x80 [ 14.396245] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.396269] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.396290] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.396313] kthread+0x337/0x6f0 [ 14.396330] ? trace_preempt_on+0x20/0xc0 [ 14.396390] ? __pfx_kthread+0x10/0x10 [ 14.396427] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.396447] ? calculate_sigpending+0x7b/0xa0 [ 14.396471] ? __pfx_kthread+0x10/0x10 [ 14.396491] ret_from_fork+0x116/0x1d0 [ 14.396509] ? __pfx_kthread+0x10/0x10 [ 14.396528] ret_from_fork_asm+0x1a/0x30 [ 14.396558] </TASK> [ 14.396568] [ 14.410779] Allocated by task 283: [ 14.410954] kasan_save_stack+0x45/0x70 [ 14.411113] kasan_save_track+0x18/0x40 [ 14.411250] kasan_save_alloc_info+0x3b/0x50 [ 14.411405] __kasan_kmalloc+0xb7/0xc0 [ 14.411536] __kmalloc_cache_noprof+0x189/0x420 [ 14.411689] kasan_atomics+0x95/0x310 [ 14.411819] kunit_try_run_case+0x1a5/0x480 [ 14.411963] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.413203] kthread+0x337/0x6f0 [ 14.413711] ret_from_fork+0x116/0x1d0 [ 14.414217] ret_from_fork_asm+0x1a/0x30 [ 14.414800] [ 14.415091] The buggy address belongs to the object at ffff8881039b8880 [ 14.415091] which belongs to the cache kmalloc-64 of size 64 [ 14.416474] The buggy address is located 0 bytes to the right of [ 14.416474] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 14.418107] [ 14.418417] The buggy address belongs to the physical page: [ 14.418960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 14.419629] flags: 0x200000000000000(node=0|zone=2) [ 14.419813] page_type: f5(slab) [ 14.419935] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.420180] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.420406] page dumped because: kasan: bad access detected [ 14.420577] [ 14.420646] Memory state around the buggy address: [ 14.420800] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 14.421076] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.422424] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.423153] ^ [ 14.423778] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.424527] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.425296] ================================================================== [ 14.426320] ================================================================== [ 14.427129] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 14.427879] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 14.428758] [ 14.428989] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.429044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.429056] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.429076] Call Trace: [ 14.429091] <TASK> [ 14.429139] dump_stack_lvl+0x73/0xb0 [ 14.429167] print_report+0xd1/0x610 [ 14.429187] ? __virt_addr_valid+0x1db/0x2d0 [ 14.429209] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.429230] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.429253] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.429275] kasan_report+0x141/0x180 [ 14.429295] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.429320] __asan_report_store4_noabort+0x1b/0x30 [ 14.429344] kasan_atomics_helper+0x4ba2/0x5450 [ 14.429365] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.429407] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.429431] ? kasan_atomics+0x152/0x310 [ 14.429456] kasan_atomics+0x1dc/0x310 [ 14.429477] ? __pfx_kasan_atomics+0x10/0x10 [ 14.429500] ? __pfx_read_tsc+0x10/0x10 [ 14.429521] ? ktime_get_ts64+0x86/0x230 [ 14.429544] kunit_try_run_case+0x1a5/0x480 [ 14.429568] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.429589] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.429612] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.429634] ? __kthread_parkme+0x82/0x180 [ 14.429653] ? preempt_count_sub+0x50/0x80 [ 14.429676] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.429699] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.429721] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.429744] kthread+0x337/0x6f0 [ 14.429762] ? trace_preempt_on+0x20/0xc0 [ 14.429784] ? __pfx_kthread+0x10/0x10 [ 14.429804] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.429824] ? calculate_sigpending+0x7b/0xa0 [ 14.429863] ? __pfx_kthread+0x10/0x10 [ 14.429884] ret_from_fork+0x116/0x1d0 [ 14.429919] ? __pfx_kthread+0x10/0x10 [ 14.429939] ret_from_fork_asm+0x1a/0x30 [ 14.429969] </TASK> [ 14.429978] [ 14.437476] Allocated by task 283: [ 14.437604] kasan_save_stack+0x45/0x70 [ 14.437860] kasan_save_track+0x18/0x40 [ 14.438066] kasan_save_alloc_info+0x3b/0x50 [ 14.438288] __kasan_kmalloc+0xb7/0xc0 [ 14.438524] __kmalloc_cache_noprof+0x189/0x420 [ 14.438792] kasan_atomics+0x95/0x310 [ 14.438985] kunit_try_run_case+0x1a5/0x480 [ 14.439207] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.439459] kthread+0x337/0x6f0 [ 14.439672] ret_from_fork+0x116/0x1d0 [ 14.439875] ret_from_fork_asm+0x1a/0x30 [ 14.440110] [ 14.440187] The buggy address belongs to the object at ffff8881039b8880 [ 14.440187] which belongs to the cache kmalloc-64 of size 64 [ 14.440923] The buggy address is located 0 bytes to the right of [ 14.440923] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 14.441466] [ 14.441594] The buggy address belongs to the physical page: [ 14.441889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 14.442265] flags: 0x200000000000000(node=0|zone=2) [ 14.442589] page_type: f5(slab) [ 14.442777] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.443123] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.443499] page dumped because: kasan: bad access detected [ 14.443798] [ 14.443902] Memory state around the buggy address: [ 14.444084] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 14.444293] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.444509] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.444713] ^ [ 14.444859] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.445169] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.445470] ================================================================== [ 15.042263] ================================================================== [ 15.042652] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 15.043365] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 15.043676] [ 15.043759] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.043801] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.043813] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.043837] Call Trace: [ 15.043850] <TASK> [ 15.043865] dump_stack_lvl+0x73/0xb0 [ 15.043892] print_report+0xd1/0x610 [ 15.043915] ? __virt_addr_valid+0x1db/0x2d0 [ 15.043937] ? kasan_atomics_helper+0x1217/0x5450 [ 15.043958] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.043980] ? kasan_atomics_helper+0x1217/0x5450 [ 15.044002] kasan_report+0x141/0x180 [ 15.044038] ? kasan_atomics_helper+0x1217/0x5450 [ 15.044093] kasan_check_range+0x10c/0x1c0 [ 15.044132] __kasan_check_write+0x18/0x20 [ 15.044152] kasan_atomics_helper+0x1217/0x5450 [ 15.044174] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.044198] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.044222] ? kasan_atomics+0x152/0x310 [ 15.044248] kasan_atomics+0x1dc/0x310 [ 15.044271] ? __pfx_kasan_atomics+0x10/0x10 [ 15.044294] ? __pfx_read_tsc+0x10/0x10 [ 15.044315] ? ktime_get_ts64+0x86/0x230 [ 15.044338] kunit_try_run_case+0x1a5/0x480 [ 15.044396] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.044419] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.044441] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.044466] ? __kthread_parkme+0x82/0x180 [ 15.044508] ? preempt_count_sub+0x50/0x80 [ 15.044531] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.044556] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.044579] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.044602] kthread+0x337/0x6f0 [ 15.044622] ? trace_preempt_on+0x20/0xc0 [ 15.044644] ? __pfx_kthread+0x10/0x10 [ 15.044665] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.044687] ? calculate_sigpending+0x7b/0xa0 [ 15.044710] ? __pfx_kthread+0x10/0x10 [ 15.044731] ret_from_fork+0x116/0x1d0 [ 15.044749] ? __pfx_kthread+0x10/0x10 [ 15.044770] ret_from_fork_asm+0x1a/0x30 [ 15.044801] </TASK> [ 15.044812] [ 15.052132] Allocated by task 283: [ 15.052261] kasan_save_stack+0x45/0x70 [ 15.052475] kasan_save_track+0x18/0x40 [ 15.052733] kasan_save_alloc_info+0x3b/0x50 [ 15.052938] __kasan_kmalloc+0xb7/0xc0 [ 15.053145] __kmalloc_cache_noprof+0x189/0x420 [ 15.053446] kasan_atomics+0x95/0x310 [ 15.053683] kunit_try_run_case+0x1a5/0x480 [ 15.053862] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.054242] kthread+0x337/0x6f0 [ 15.054374] ret_from_fork+0x116/0x1d0 [ 15.054506] ret_from_fork_asm+0x1a/0x30 [ 15.054845] [ 15.054940] The buggy address belongs to the object at ffff8881039b8880 [ 15.054940] which belongs to the cache kmalloc-64 of size 64 [ 15.055467] The buggy address is located 0 bytes to the right of [ 15.055467] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 15.055947] [ 15.056090] The buggy address belongs to the physical page: [ 15.056337] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.056642] flags: 0x200000000000000(node=0|zone=2) [ 15.056805] page_type: f5(slab) [ 15.056927] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.057178] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.057453] page dumped because: kasan: bad access detected [ 15.057627] [ 15.057696] Memory state around the buggy address: [ 15.057849] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.058102] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.058445] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.058986] ^ [ 15.059482] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.059823] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.060147] ================================================================== [ 14.803681] ================================================================== [ 14.804059] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 14.804510] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 14.804851] [ 14.804958] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.805016] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.805029] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.805051] Call Trace: [ 14.805065] <TASK> [ 14.805081] dump_stack_lvl+0x73/0xb0 [ 14.805108] print_report+0xd1/0x610 [ 14.805131] ? __virt_addr_valid+0x1db/0x2d0 [ 14.805154] ? kasan_atomics_helper+0xc70/0x5450 [ 14.805175] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.805198] ? kasan_atomics_helper+0xc70/0x5450 [ 14.805219] kasan_report+0x141/0x180 [ 14.805241] ? kasan_atomics_helper+0xc70/0x5450 [ 14.805267] kasan_check_range+0x10c/0x1c0 [ 14.805290] __kasan_check_write+0x18/0x20 [ 14.805309] kasan_atomics_helper+0xc70/0x5450 [ 14.805332] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.805567] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.805600] ? kasan_atomics+0x152/0x310 [ 14.805626] kasan_atomics+0x1dc/0x310 [ 14.805649] ? __pfx_kasan_atomics+0x10/0x10 [ 14.805674] ? __pfx_read_tsc+0x10/0x10 [ 14.805694] ? ktime_get_ts64+0x86/0x230 [ 14.805719] kunit_try_run_case+0x1a5/0x480 [ 14.805743] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.805765] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.805789] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.805813] ? __kthread_parkme+0x82/0x180 [ 14.805833] ? preempt_count_sub+0x50/0x80 [ 14.805856] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.805881] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.805904] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.805928] kthread+0x337/0x6f0 [ 14.805947] ? trace_preempt_on+0x20/0xc0 [ 14.805970] ? __pfx_kthread+0x10/0x10 [ 14.805990] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.806025] ? calculate_sigpending+0x7b/0xa0 [ 14.806050] ? __pfx_kthread+0x10/0x10 [ 14.806071] ret_from_fork+0x116/0x1d0 [ 14.806089] ? __pfx_kthread+0x10/0x10 [ 14.806110] ret_from_fork_asm+0x1a/0x30 [ 14.806140] </TASK> [ 14.806151] [ 14.817140] Allocated by task 283: [ 14.817272] kasan_save_stack+0x45/0x70 [ 14.817419] kasan_save_track+0x18/0x40 [ 14.817555] kasan_save_alloc_info+0x3b/0x50 [ 14.817704] __kasan_kmalloc+0xb7/0xc0 [ 14.817837] __kmalloc_cache_noprof+0x189/0x420 [ 14.817993] kasan_atomics+0x95/0x310 [ 14.818210] kunit_try_run_case+0x1a5/0x480 [ 14.818633] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.818888] kthread+0x337/0x6f0 [ 14.819312] ret_from_fork+0x116/0x1d0 [ 14.819761] ret_from_fork_asm+0x1a/0x30 [ 14.819964] [ 14.820055] The buggy address belongs to the object at ffff8881039b8880 [ 14.820055] which belongs to the cache kmalloc-64 of size 64 [ 14.820411] The buggy address is located 0 bytes to the right of [ 14.820411] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 14.820829] [ 14.820927] The buggy address belongs to the physical page: [ 14.821204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 14.821829] flags: 0x200000000000000(node=0|zone=2) [ 14.822088] page_type: f5(slab) [ 14.822264] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.823051] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.823367] page dumped because: kasan: bad access detected [ 14.823604] [ 14.823677] Memory state around the buggy address: [ 14.823899] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 14.824239] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.824557] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.824859] ^ [ 14.825200] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.825560] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.825936] ================================================================== [ 15.838641] ================================================================== [ 15.838963] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 15.839487] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 15.839740] [ 15.839844] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.839886] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.839897] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.839918] Call Trace: [ 15.839931] <TASK> [ 15.839945] dump_stack_lvl+0x73/0xb0 [ 15.839972] print_report+0xd1/0x610 [ 15.839995] ? __virt_addr_valid+0x1db/0x2d0 [ 15.840027] ? kasan_atomics_helper+0x224c/0x5450 [ 15.840048] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.840070] ? kasan_atomics_helper+0x224c/0x5450 [ 15.840091] kasan_report+0x141/0x180 [ 15.840113] ? kasan_atomics_helper+0x224c/0x5450 [ 15.840140] kasan_check_range+0x10c/0x1c0 [ 15.840163] __kasan_check_write+0x18/0x20 [ 15.840182] kasan_atomics_helper+0x224c/0x5450 [ 15.840205] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.840227] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.840251] ? kasan_atomics+0x152/0x310 [ 15.840277] kasan_atomics+0x1dc/0x310 [ 15.840300] ? __pfx_kasan_atomics+0x10/0x10 [ 15.840324] ? __pfx_read_tsc+0x10/0x10 [ 15.840344] ? ktime_get_ts64+0x86/0x230 [ 15.840368] kunit_try_run_case+0x1a5/0x480 [ 15.840412] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.840435] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.840459] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.840482] ? __kthread_parkme+0x82/0x180 [ 15.840502] ? preempt_count_sub+0x50/0x80 [ 15.840525] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.840549] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.840572] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.840596] kthread+0x337/0x6f0 [ 15.840615] ? trace_preempt_on+0x20/0xc0 [ 15.840658] ? __pfx_kthread+0x10/0x10 [ 15.840679] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.840700] ? calculate_sigpending+0x7b/0xa0 [ 15.840723] ? __pfx_kthread+0x10/0x10 [ 15.840744] ret_from_fork+0x116/0x1d0 [ 15.840763] ? __pfx_kthread+0x10/0x10 [ 15.840783] ret_from_fork_asm+0x1a/0x30 [ 15.840814] </TASK> [ 15.840824] [ 15.850123] Allocated by task 283: [ 15.850295] kasan_save_stack+0x45/0x70 [ 15.851142] kasan_save_track+0x18/0x40 [ 15.851595] kasan_save_alloc_info+0x3b/0x50 [ 15.851824] __kasan_kmalloc+0xb7/0xc0 [ 15.852015] __kmalloc_cache_noprof+0x189/0x420 [ 15.852226] kasan_atomics+0x95/0x310 [ 15.852726] kunit_try_run_case+0x1a5/0x480 [ 15.853027] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.853270] kthread+0x337/0x6f0 [ 15.853724] ret_from_fork+0x116/0x1d0 [ 15.853987] ret_from_fork_asm+0x1a/0x30 [ 15.854351] [ 15.854458] The buggy address belongs to the object at ffff8881039b8880 [ 15.854458] which belongs to the cache kmalloc-64 of size 64 [ 15.854935] The buggy address is located 0 bytes to the right of [ 15.854935] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 15.855846] [ 15.855941] The buggy address belongs to the physical page: [ 15.856364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.856699] flags: 0x200000000000000(node=0|zone=2) [ 15.856922] page_type: f5(slab) [ 15.857103] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.857754] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.858271] page dumped because: kasan: bad access detected [ 15.858858] [ 15.858964] Memory state around the buggy address: [ 15.859216] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.859457] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.859680] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.859895] ^ [ 15.860543] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.861176] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.861835] ================================================================== [ 15.233962] ================================================================== [ 15.234260] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 15.235158] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 15.235635] [ 15.235735] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.235777] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.235790] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.235811] Call Trace: [ 15.235825] <TASK> [ 15.235840] dump_stack_lvl+0x73/0xb0 [ 15.235868] print_report+0xd1/0x610 [ 15.235892] ? __virt_addr_valid+0x1db/0x2d0 [ 15.235915] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.235936] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.235959] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.235980] kasan_report+0x141/0x180 [ 15.236003] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.236202] __asan_report_store8_noabort+0x1b/0x30 [ 15.236228] kasan_atomics_helper+0x50d4/0x5450 [ 15.236251] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.236273] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.236298] ? kasan_atomics+0x152/0x310 [ 15.236324] kasan_atomics+0x1dc/0x310 [ 15.236347] ? __pfx_kasan_atomics+0x10/0x10 [ 15.236373] ? __pfx_read_tsc+0x10/0x10 [ 15.236394] ? ktime_get_ts64+0x86/0x230 [ 15.236434] kunit_try_run_case+0x1a5/0x480 [ 15.236458] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.236481] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.236505] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.236528] ? __kthread_parkme+0x82/0x180 [ 15.236548] ? preempt_count_sub+0x50/0x80 [ 15.236571] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.236595] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.236618] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.236642] kthread+0x337/0x6f0 [ 15.236661] ? trace_preempt_on+0x20/0xc0 [ 15.236684] ? __pfx_kthread+0x10/0x10 [ 15.236706] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.236727] ? calculate_sigpending+0x7b/0xa0 [ 15.236752] ? __pfx_kthread+0x10/0x10 [ 15.236773] ret_from_fork+0x116/0x1d0 [ 15.236791] ? __pfx_kthread+0x10/0x10 [ 15.236812] ret_from_fork_asm+0x1a/0x30 [ 15.236842] </TASK> [ 15.236853] [ 15.248462] Allocated by task 283: [ 15.248887] kasan_save_stack+0x45/0x70 [ 15.249098] kasan_save_track+0x18/0x40 [ 15.249554] kasan_save_alloc_info+0x3b/0x50 [ 15.249912] __kasan_kmalloc+0xb7/0xc0 [ 15.250157] __kmalloc_cache_noprof+0x189/0x420 [ 15.250365] kasan_atomics+0x95/0x310 [ 15.250788] kunit_try_run_case+0x1a5/0x480 [ 15.251096] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.251467] kthread+0x337/0x6f0 [ 15.251845] ret_from_fork+0x116/0x1d0 [ 15.252143] ret_from_fork_asm+0x1a/0x30 [ 15.252298] [ 15.252394] The buggy address belongs to the object at ffff8881039b8880 [ 15.252394] which belongs to the cache kmalloc-64 of size 64 [ 15.253354] The buggy address is located 0 bytes to the right of [ 15.253354] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 15.254173] [ 15.254320] The buggy address belongs to the physical page: [ 15.254646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.255476] flags: 0x200000000000000(node=0|zone=2) [ 15.255929] page_type: f5(slab) [ 15.256137] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.256876] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.257313] page dumped because: kasan: bad access detected [ 15.257768] [ 15.258017] Memory state around the buggy address: [ 15.258734] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.259058] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.259566] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.259885] ^ [ 15.260183] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.260672] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.261161] ================================================================== [ 15.005762] ================================================================== [ 15.006121] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 15.006488] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 15.006758] [ 15.006840] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.006880] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.006891] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.006912] Call Trace: [ 15.006925] <TASK> [ 15.006939] dump_stack_lvl+0x73/0xb0 [ 15.006964] print_report+0xd1/0x610 [ 15.006986] ? __virt_addr_valid+0x1db/0x2d0 [ 15.007021] ? kasan_atomics_helper+0x1148/0x5450 [ 15.007043] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.007066] ? kasan_atomics_helper+0x1148/0x5450 [ 15.007087] kasan_report+0x141/0x180 [ 15.007110] ? kasan_atomics_helper+0x1148/0x5450 [ 15.007136] kasan_check_range+0x10c/0x1c0 [ 15.007160] __kasan_check_write+0x18/0x20 [ 15.007180] kasan_atomics_helper+0x1148/0x5450 [ 15.007203] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.007225] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.007249] ? kasan_atomics+0x152/0x310 [ 15.007275] kasan_atomics+0x1dc/0x310 [ 15.007298] ? __pfx_kasan_atomics+0x10/0x10 [ 15.007321] ? __pfx_read_tsc+0x10/0x10 [ 15.007342] ? ktime_get_ts64+0x86/0x230 [ 15.007366] kunit_try_run_case+0x1a5/0x480 [ 15.007412] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.007435] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.007458] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.007481] ? __kthread_parkme+0x82/0x180 [ 15.007501] ? preempt_count_sub+0x50/0x80 [ 15.007525] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.007549] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.007572] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.007594] kthread+0x337/0x6f0 [ 15.007614] ? trace_preempt_on+0x20/0xc0 [ 15.007637] ? __pfx_kthread+0x10/0x10 [ 15.007657] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.007679] ? calculate_sigpending+0x7b/0xa0 [ 15.007702] ? __pfx_kthread+0x10/0x10 [ 15.007723] ret_from_fork+0x116/0x1d0 [ 15.007742] ? __pfx_kthread+0x10/0x10 [ 15.007763] ret_from_fork_asm+0x1a/0x30 [ 15.007794] </TASK> [ 15.007804] [ 15.015844] Allocated by task 283: [ 15.015974] kasan_save_stack+0x45/0x70 [ 15.016216] kasan_save_track+0x18/0x40 [ 15.016552] kasan_save_alloc_info+0x3b/0x50 [ 15.016762] __kasan_kmalloc+0xb7/0xc0 [ 15.016936] __kmalloc_cache_noprof+0x189/0x420 [ 15.017131] kasan_atomics+0x95/0x310 [ 15.017267] kunit_try_run_case+0x1a5/0x480 [ 15.017460] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.017745] kthread+0x337/0x6f0 [ 15.017915] ret_from_fork+0x116/0x1d0 [ 15.018118] ret_from_fork_asm+0x1a/0x30 [ 15.018321] [ 15.018424] The buggy address belongs to the object at ffff8881039b8880 [ 15.018424] which belongs to the cache kmalloc-64 of size 64 [ 15.018914] The buggy address is located 0 bytes to the right of [ 15.018914] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 15.019434] [ 15.019523] The buggy address belongs to the physical page: [ 15.019738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.019977] flags: 0x200000000000000(node=0|zone=2) [ 15.020219] page_type: f5(slab) [ 15.020409] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.020761] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.021194] page dumped because: kasan: bad access detected [ 15.021430] [ 15.021566] Memory state around the buggy address: [ 15.021814] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.022059] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.022352] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.022675] ^ [ 15.022879] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.023108] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.023532] ================================================================== [ 14.910139] ================================================================== [ 14.910501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 14.910731] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 14.910955] [ 14.911054] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.911094] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.911106] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.911128] Call Trace: [ 14.911141] <TASK> [ 14.911155] dump_stack_lvl+0x73/0xb0 [ 14.911180] print_report+0xd1/0x610 [ 14.911201] ? __virt_addr_valid+0x1db/0x2d0 [ 14.911224] ? kasan_atomics_helper+0xf10/0x5450 [ 14.911245] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.911267] ? kasan_atomics_helper+0xf10/0x5450 [ 14.911288] kasan_report+0x141/0x180 [ 14.911311] ? kasan_atomics_helper+0xf10/0x5450 [ 14.911337] kasan_check_range+0x10c/0x1c0 [ 14.911441] __kasan_check_write+0x18/0x20 [ 14.911461] kasan_atomics_helper+0xf10/0x5450 [ 14.911484] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.911506] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.911531] ? kasan_atomics+0x152/0x310 [ 14.911557] kasan_atomics+0x1dc/0x310 [ 14.911580] ? __pfx_kasan_atomics+0x10/0x10 [ 14.911604] ? __pfx_read_tsc+0x10/0x10 [ 14.911625] ? ktime_get_ts64+0x86/0x230 [ 14.911650] kunit_try_run_case+0x1a5/0x480 [ 14.911674] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.911697] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.911720] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.911744] ? __kthread_parkme+0x82/0x180 [ 14.911764] ? preempt_count_sub+0x50/0x80 [ 14.911788] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.911812] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.911835] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.911859] kthread+0x337/0x6f0 [ 14.911879] ? trace_preempt_on+0x20/0xc0 [ 14.911901] ? __pfx_kthread+0x10/0x10 [ 14.911922] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.911943] ? calculate_sigpending+0x7b/0xa0 [ 14.911967] ? __pfx_kthread+0x10/0x10 [ 14.911988] ret_from_fork+0x116/0x1d0 [ 14.912018] ? __pfx_kthread+0x10/0x10 [ 14.912039] ret_from_fork_asm+0x1a/0x30 [ 14.912069] </TASK> [ 14.912079] [ 14.920524] Allocated by task 283: [ 14.920716] kasan_save_stack+0x45/0x70 [ 14.920918] kasan_save_track+0x18/0x40 [ 14.921115] kasan_save_alloc_info+0x3b/0x50 [ 14.921330] __kasan_kmalloc+0xb7/0xc0 [ 14.921558] __kmalloc_cache_noprof+0x189/0x420 [ 14.921769] kasan_atomics+0x95/0x310 [ 14.921959] kunit_try_run_case+0x1a5/0x480 [ 14.922135] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.922337] kthread+0x337/0x6f0 [ 14.922593] ret_from_fork+0x116/0x1d0 [ 14.922765] ret_from_fork_asm+0x1a/0x30 [ 14.922958] [ 14.923054] The buggy address belongs to the object at ffff8881039b8880 [ 14.923054] which belongs to the cache kmalloc-64 of size 64 [ 14.923609] The buggy address is located 0 bytes to the right of [ 14.923609] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 14.924105] [ 14.924200] The buggy address belongs to the physical page: [ 14.924629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 14.924958] flags: 0x200000000000000(node=0|zone=2) [ 14.925197] page_type: f5(slab) [ 14.925343] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.925713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.926062] page dumped because: kasan: bad access detected [ 14.926290] [ 14.926463] Memory state around the buggy address: [ 14.926655] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 14.926950] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.927235] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.927577] ^ [ 14.927814] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.928116] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.928557] ================================================================== [ 15.390495] ================================================================== [ 15.390797] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 15.391124] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 15.391873] [ 15.391998] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.392070] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.392083] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.392104] Call Trace: [ 15.392116] <TASK> [ 15.392146] dump_stack_lvl+0x73/0xb0 [ 15.392174] print_report+0xd1/0x610 [ 15.392196] ? __virt_addr_valid+0x1db/0x2d0 [ 15.392219] ? kasan_atomics_helper+0x1818/0x5450 [ 15.392240] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.392262] ? kasan_atomics_helper+0x1818/0x5450 [ 15.392284] kasan_report+0x141/0x180 [ 15.392306] ? kasan_atomics_helper+0x1818/0x5450 [ 15.392332] kasan_check_range+0x10c/0x1c0 [ 15.392355] __kasan_check_write+0x18/0x20 [ 15.392374] kasan_atomics_helper+0x1818/0x5450 [ 15.392396] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.392419] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.392481] ? kasan_atomics+0x152/0x310 [ 15.392509] kasan_atomics+0x1dc/0x310 [ 15.392531] ? __pfx_kasan_atomics+0x10/0x10 [ 15.392555] ? __pfx_read_tsc+0x10/0x10 [ 15.392575] ? ktime_get_ts64+0x86/0x230 [ 15.392598] kunit_try_run_case+0x1a5/0x480 [ 15.392623] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.392645] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.392668] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.392691] ? __kthread_parkme+0x82/0x180 [ 15.392778] ? preempt_count_sub+0x50/0x80 [ 15.392804] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.392828] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.392852] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.392875] kthread+0x337/0x6f0 [ 15.392894] ? trace_preempt_on+0x20/0xc0 [ 15.392918] ? __pfx_kthread+0x10/0x10 [ 15.392940] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.392962] ? calculate_sigpending+0x7b/0xa0 [ 15.392993] ? __pfx_kthread+0x10/0x10 [ 15.393026] ret_from_fork+0x116/0x1d0 [ 15.393045] ? __pfx_kthread+0x10/0x10 [ 15.393065] ret_from_fork_asm+0x1a/0x30 [ 15.393096] </TASK> [ 15.393106] [ 15.402024] Allocated by task 283: [ 15.402206] kasan_save_stack+0x45/0x70 [ 15.402560] kasan_save_track+0x18/0x40 [ 15.402793] kasan_save_alloc_info+0x3b/0x50 [ 15.402966] __kasan_kmalloc+0xb7/0xc0 [ 15.403188] __kmalloc_cache_noprof+0x189/0x420 [ 15.403483] kasan_atomics+0x95/0x310 [ 15.403672] kunit_try_run_case+0x1a5/0x480 [ 15.403934] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.404206] kthread+0x337/0x6f0 [ 15.404454] ret_from_fork+0x116/0x1d0 [ 15.404639] ret_from_fork_asm+0x1a/0x30 [ 15.404841] [ 15.404934] The buggy address belongs to the object at ffff8881039b8880 [ 15.404934] which belongs to the cache kmalloc-64 of size 64 [ 15.405492] The buggy address is located 0 bytes to the right of [ 15.405492] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 15.405957] [ 15.406065] The buggy address belongs to the physical page: [ 15.406313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.406661] flags: 0x200000000000000(node=0|zone=2) [ 15.406963] page_type: f5(slab) [ 15.407315] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.407561] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.408352] page dumped because: kasan: bad access detected [ 15.408693] [ 15.408808] Memory state around the buggy address: [ 15.409081] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.409593] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.410225] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.411437] ^ [ 15.411636] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.411986] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.412327] ================================================================== [ 14.784684] ================================================================== [ 14.784917] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 14.785169] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 14.785631] [ 14.785725] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.785766] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.785779] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.785800] Call Trace: [ 14.785815] <TASK> [ 14.785829] dump_stack_lvl+0x73/0xb0 [ 14.785858] print_report+0xd1/0x610 [ 14.785880] ? __virt_addr_valid+0x1db/0x2d0 [ 14.785902] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.785923] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.785945] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.785966] kasan_report+0x141/0x180 [ 14.785988] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.786029] kasan_check_range+0x10c/0x1c0 [ 14.786052] __kasan_check_write+0x18/0x20 [ 14.786072] kasan_atomics_helper+0xb6a/0x5450 [ 14.786096] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.786118] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.786143] ? kasan_atomics+0x152/0x310 [ 14.786170] kasan_atomics+0x1dc/0x310 [ 14.786193] ? __pfx_kasan_atomics+0x10/0x10 [ 14.786217] ? __pfx_read_tsc+0x10/0x10 [ 14.786238] ? ktime_get_ts64+0x86/0x230 [ 14.786262] kunit_try_run_case+0x1a5/0x480 [ 14.786285] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.786308] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.786331] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.786446] ? __kthread_parkme+0x82/0x180 [ 14.786469] ? preempt_count_sub+0x50/0x80 [ 14.786494] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.786518] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.786541] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.786565] kthread+0x337/0x6f0 [ 14.786584] ? trace_preempt_on+0x20/0xc0 [ 14.786607] ? __pfx_kthread+0x10/0x10 [ 14.786627] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.786650] ? calculate_sigpending+0x7b/0xa0 [ 14.786674] ? __pfx_kthread+0x10/0x10 [ 14.786696] ret_from_fork+0x116/0x1d0 [ 14.786714] ? __pfx_kthread+0x10/0x10 [ 14.786735] ret_from_fork_asm+0x1a/0x30 [ 14.786766] </TASK> [ 14.786777] [ 14.794864] Allocated by task 283: [ 14.794997] kasan_save_stack+0x45/0x70 [ 14.795192] kasan_save_track+0x18/0x40 [ 14.795329] kasan_save_alloc_info+0x3b/0x50 [ 14.795602] __kasan_kmalloc+0xb7/0xc0 [ 14.795792] __kmalloc_cache_noprof+0x189/0x420 [ 14.796021] kasan_atomics+0x95/0x310 [ 14.796206] kunit_try_run_case+0x1a5/0x480 [ 14.796487] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.796745] kthread+0x337/0x6f0 [ 14.796913] ret_from_fork+0x116/0x1d0 [ 14.797125] ret_from_fork_asm+0x1a/0x30 [ 14.797324] [ 14.797607] The buggy address belongs to the object at ffff8881039b8880 [ 14.797607] which belongs to the cache kmalloc-64 of size 64 [ 14.798158] The buggy address is located 0 bytes to the right of [ 14.798158] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 14.798699] [ 14.798777] The buggy address belongs to the physical page: [ 14.798948] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 14.799318] flags: 0x200000000000000(node=0|zone=2) [ 14.799655] page_type: f5(slab) [ 14.799832] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.800188] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.800564] page dumped because: kasan: bad access detected [ 14.800812] [ 14.800890] Memory state around the buggy address: [ 14.801108] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 14.801626] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.801934] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.802239] ^ [ 14.802534] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.802760] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.802974] ================================================================== [ 15.560783] ================================================================== [ 15.561113] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 15.561592] Read of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 15.561907] [ 15.561992] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.562043] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.562055] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.562077] Call Trace: [ 15.562091] <TASK> [ 15.562104] dump_stack_lvl+0x73/0xb0 [ 15.562130] print_report+0xd1/0x610 [ 15.562152] ? __virt_addr_valid+0x1db/0x2d0 [ 15.562174] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.562196] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.562218] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.562240] kasan_report+0x141/0x180 [ 15.562262] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.562311] __asan_report_load8_noabort+0x18/0x20 [ 15.562337] kasan_atomics_helper+0x4f30/0x5450 [ 15.562359] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.562381] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.562405] ? kasan_atomics+0x152/0x310 [ 15.562432] kasan_atomics+0x1dc/0x310 [ 15.562454] ? __pfx_kasan_atomics+0x10/0x10 [ 15.562477] ? __pfx_read_tsc+0x10/0x10 [ 15.562498] ? ktime_get_ts64+0x86/0x230 [ 15.562521] kunit_try_run_case+0x1a5/0x480 [ 15.562547] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.562569] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.562592] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.562615] ? __kthread_parkme+0x82/0x180 [ 15.562635] ? preempt_count_sub+0x50/0x80 [ 15.562659] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.562682] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.562897] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.562923] kthread+0x337/0x6f0 [ 15.562943] ? trace_preempt_on+0x20/0xc0 [ 15.562967] ? __pfx_kthread+0x10/0x10 [ 15.562988] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.563021] ? calculate_sigpending+0x7b/0xa0 [ 15.563044] ? __pfx_kthread+0x10/0x10 [ 15.563066] ret_from_fork+0x116/0x1d0 [ 15.563085] ? __pfx_kthread+0x10/0x10 [ 15.563105] ret_from_fork_asm+0x1a/0x30 [ 15.563136] </TASK> [ 15.563147] [ 15.571939] Allocated by task 283: [ 15.572121] kasan_save_stack+0x45/0x70 [ 15.572317] kasan_save_track+0x18/0x40 [ 15.572614] kasan_save_alloc_info+0x3b/0x50 [ 15.572820] __kasan_kmalloc+0xb7/0xc0 [ 15.573023] __kmalloc_cache_noprof+0x189/0x420 [ 15.573241] kasan_atomics+0x95/0x310 [ 15.573539] kunit_try_run_case+0x1a5/0x480 [ 15.573717] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.573888] kthread+0x337/0x6f0 [ 15.574017] ret_from_fork+0x116/0x1d0 [ 15.574203] ret_from_fork_asm+0x1a/0x30 [ 15.574526] [ 15.574630] The buggy address belongs to the object at ffff8881039b8880 [ 15.574630] which belongs to the cache kmalloc-64 of size 64 [ 15.575230] The buggy address is located 0 bytes to the right of [ 15.575230] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 15.575974] [ 15.576092] The buggy address belongs to the physical page: [ 15.576299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.576837] flags: 0x200000000000000(node=0|zone=2) [ 15.577026] page_type: f5(slab) [ 15.577272] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.577811] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.578056] page dumped because: kasan: bad access detected [ 15.578228] [ 15.578297] Memory state around the buggy address: [ 15.578638] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.579306] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.579959] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.580280] ^ [ 15.580613] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.580835] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.581071] ================================================================== [ 15.702574] ================================================================== [ 15.702908] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 15.703251] Read of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 15.703661] [ 15.703772] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.703815] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.703828] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.703848] Call Trace: [ 15.703862] <TASK> [ 15.703875] dump_stack_lvl+0x73/0xb0 [ 15.703903] print_report+0xd1/0x610 [ 15.703925] ? __virt_addr_valid+0x1db/0x2d0 [ 15.703948] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.703969] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.703991] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.704024] kasan_report+0x141/0x180 [ 15.704046] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.704073] __asan_report_load8_noabort+0x18/0x20 [ 15.704097] kasan_atomics_helper+0x4f71/0x5450 [ 15.704120] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.704144] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.704170] ? kasan_atomics+0x152/0x310 [ 15.704197] kasan_atomics+0x1dc/0x310 [ 15.704220] ? __pfx_kasan_atomics+0x10/0x10 [ 15.704244] ? __pfx_read_tsc+0x10/0x10 [ 15.704264] ? ktime_get_ts64+0x86/0x230 [ 15.704288] kunit_try_run_case+0x1a5/0x480 [ 15.704312] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.704334] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.704436] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.704461] ? __kthread_parkme+0x82/0x180 [ 15.704482] ? preempt_count_sub+0x50/0x80 [ 15.704505] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.704530] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.704554] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.704577] kthread+0x337/0x6f0 [ 15.704597] ? trace_preempt_on+0x20/0xc0 [ 15.704620] ? __pfx_kthread+0x10/0x10 [ 15.704641] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.704663] ? calculate_sigpending+0x7b/0xa0 [ 15.704686] ? __pfx_kthread+0x10/0x10 [ 15.704708] ret_from_fork+0x116/0x1d0 [ 15.704727] ? __pfx_kthread+0x10/0x10 [ 15.704747] ret_from_fork_asm+0x1a/0x30 [ 15.704778] </TASK> [ 15.704788] [ 15.712817] Allocated by task 283: [ 15.712994] kasan_save_stack+0x45/0x70 [ 15.713156] kasan_save_track+0x18/0x40 [ 15.713526] kasan_save_alloc_info+0x3b/0x50 [ 15.713750] __kasan_kmalloc+0xb7/0xc0 [ 15.713944] __kmalloc_cache_noprof+0x189/0x420 [ 15.714150] kasan_atomics+0x95/0x310 [ 15.714329] kunit_try_run_case+0x1a5/0x480 [ 15.714601] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.714857] kthread+0x337/0x6f0 [ 15.714986] ret_from_fork+0x116/0x1d0 [ 15.715131] ret_from_fork_asm+0x1a/0x30 [ 15.715270] [ 15.715342] The buggy address belongs to the object at ffff8881039b8880 [ 15.715342] which belongs to the cache kmalloc-64 of size 64 [ 15.715772] The buggy address is located 0 bytes to the right of [ 15.715772] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 15.716226] [ 15.716323] The buggy address belongs to the physical page: [ 15.716651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.717018] flags: 0x200000000000000(node=0|zone=2) [ 15.717250] page_type: f5(slab) [ 15.717619] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.717964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.718316] page dumped because: kasan: bad access detected [ 15.718650] [ 15.718748] Memory state around the buggy address: [ 15.718973] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.719307] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.719657] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.719936] ^ [ 15.720154] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.720519] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.720782] ================================================================== [ 14.473631] ================================================================== [ 14.474388] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 14.475227] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 14.476031] [ 14.476200] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.476241] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.476252] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.476275] Call Trace: [ 14.476289] <TASK> [ 14.476304] dump_stack_lvl+0x73/0xb0 [ 14.476342] print_report+0xd1/0x610 [ 14.476364] ? __virt_addr_valid+0x1db/0x2d0 [ 14.476386] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.476419] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.476442] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.476463] kasan_report+0x141/0x180 [ 14.476486] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.476512] __asan_report_store4_noabort+0x1b/0x30 [ 14.476555] kasan_atomics_helper+0x4b6e/0x5450 [ 14.476595] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.476617] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.476642] ? kasan_atomics+0x152/0x310 [ 14.476668] kasan_atomics+0x1dc/0x310 [ 14.476691] ? __pfx_kasan_atomics+0x10/0x10 [ 14.476715] ? __pfx_read_tsc+0x10/0x10 [ 14.476735] ? ktime_get_ts64+0x86/0x230 [ 14.476759] kunit_try_run_case+0x1a5/0x480 [ 14.476782] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.476805] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.476827] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.476851] ? __kthread_parkme+0x82/0x180 [ 14.476871] ? preempt_count_sub+0x50/0x80 [ 14.476894] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.476918] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.476941] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.476965] kthread+0x337/0x6f0 [ 14.476989] ? trace_preempt_on+0x20/0xc0 [ 14.477021] ? __pfx_kthread+0x10/0x10 [ 14.477043] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.477065] ? calculate_sigpending+0x7b/0xa0 [ 14.477089] ? __pfx_kthread+0x10/0x10 [ 14.477110] ret_from_fork+0x116/0x1d0 [ 14.477129] ? __pfx_kthread+0x10/0x10 [ 14.477150] ret_from_fork_asm+0x1a/0x30 [ 14.477180] </TASK> [ 14.477190] [ 14.492080] Allocated by task 283: [ 14.492435] kasan_save_stack+0x45/0x70 [ 14.492752] kasan_save_track+0x18/0x40 [ 14.492891] kasan_save_alloc_info+0x3b/0x50 [ 14.493060] __kasan_kmalloc+0xb7/0xc0 [ 14.493193] __kmalloc_cache_noprof+0x189/0x420 [ 14.493347] kasan_atomics+0x95/0x310 [ 14.493541] kunit_try_run_case+0x1a5/0x480 [ 14.493957] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.494483] kthread+0x337/0x6f0 [ 14.494736] ret_from_fork+0x116/0x1d0 [ 14.494869] ret_from_fork_asm+0x1a/0x30 [ 14.495017] [ 14.495087] The buggy address belongs to the object at ffff8881039b8880 [ 14.495087] which belongs to the cache kmalloc-64 of size 64 [ 14.495512] The buggy address is located 0 bytes to the right of [ 14.495512] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 14.496843] [ 14.497030] The buggy address belongs to the physical page: [ 14.497533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 14.498000] flags: 0x200000000000000(node=0|zone=2) [ 14.498461] page_type: f5(slab) [ 14.498781] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.499333] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.500037] page dumped because: kasan: bad access detected [ 14.500499] [ 14.500711] Memory state around the buggy address: [ 14.501090] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 14.501627] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.502276] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.502985] ^ [ 14.503487] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.504183] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.504761] ================================================================== [ 14.595366] ================================================================== [ 14.595727] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 14.595954] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 14.596192] [ 14.596274] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.596315] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.596327] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.596347] Call Trace: [ 14.596360] <TASK> [ 14.596374] dump_stack_lvl+0x73/0xb0 [ 14.596399] print_report+0xd1/0x610 [ 14.596421] ? __virt_addr_valid+0x1db/0x2d0 [ 14.596443] ? kasan_atomics_helper+0x565/0x5450 [ 14.596463] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.596485] ? kasan_atomics_helper+0x565/0x5450 [ 14.596506] kasan_report+0x141/0x180 [ 14.596529] ? kasan_atomics_helper+0x565/0x5450 [ 14.596554] kasan_check_range+0x10c/0x1c0 [ 14.596577] __kasan_check_write+0x18/0x20 [ 14.596598] kasan_atomics_helper+0x565/0x5450 [ 14.596620] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.596642] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.596666] ? kasan_atomics+0x152/0x310 [ 14.596691] kasan_atomics+0x1dc/0x310 [ 14.596714] ? __pfx_kasan_atomics+0x10/0x10 [ 14.596738] ? __pfx_read_tsc+0x10/0x10 [ 14.596759] ? ktime_get_ts64+0x86/0x230 [ 14.596782] kunit_try_run_case+0x1a5/0x480 [ 14.596806] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.596828] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.596851] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.596924] ? __kthread_parkme+0x82/0x180 [ 14.596944] ? preempt_count_sub+0x50/0x80 [ 14.596973] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.596997] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.597030] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.597054] kthread+0x337/0x6f0 [ 14.597073] ? trace_preempt_on+0x20/0xc0 [ 14.597095] ? __pfx_kthread+0x10/0x10 [ 14.597115] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.597137] ? calculate_sigpending+0x7b/0xa0 [ 14.597159] ? __pfx_kthread+0x10/0x10 [ 14.597181] ret_from_fork+0x116/0x1d0 [ 14.597198] ? __pfx_kthread+0x10/0x10 [ 14.597219] ret_from_fork_asm+0x1a/0x30 [ 14.597249] </TASK> [ 14.597259] [ 14.606193] Allocated by task 283: [ 14.606322] kasan_save_stack+0x45/0x70 [ 14.606648] kasan_save_track+0x18/0x40 [ 14.606974] kasan_save_alloc_info+0x3b/0x50 [ 14.607198] __kasan_kmalloc+0xb7/0xc0 [ 14.607392] __kmalloc_cache_noprof+0x189/0x420 [ 14.607614] kasan_atomics+0x95/0x310 [ 14.607774] kunit_try_run_case+0x1a5/0x480 [ 14.607921] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.608104] kthread+0x337/0x6f0 [ 14.608226] ret_from_fork+0x116/0x1d0 [ 14.608358] ret_from_fork_asm+0x1a/0x30 [ 14.608652] [ 14.608768] The buggy address belongs to the object at ffff8881039b8880 [ 14.608768] which belongs to the cache kmalloc-64 of size 64 [ 14.609320] The buggy address is located 0 bytes to the right of [ 14.609320] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 14.610248] [ 14.610319] The buggy address belongs to the physical page: [ 14.610489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 14.610727] flags: 0x200000000000000(node=0|zone=2) [ 14.610887] page_type: f5(slab) [ 14.611012] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.611240] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.611464] page dumped because: kasan: bad access detected [ 14.611634] [ 14.611702] Memory state around the buggy address: [ 14.612024] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 14.612716] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.613438] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.613770] ^ [ 14.613994] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.614318] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.614625] ================================================================== [ 15.767807] ================================================================== [ 15.768133] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 15.768389] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 15.768812] [ 15.768919] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.768962] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.768980] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.769002] Call Trace: [ 15.769026] <TASK> [ 15.769041] dump_stack_lvl+0x73/0xb0 [ 15.769068] print_report+0xd1/0x610 [ 15.769089] ? __virt_addr_valid+0x1db/0x2d0 [ 15.769111] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.769132] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.769154] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.769176] kasan_report+0x141/0x180 [ 15.769197] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.769224] kasan_check_range+0x10c/0x1c0 [ 15.769248] __kasan_check_write+0x18/0x20 [ 15.769267] kasan_atomics_helper+0x20c8/0x5450 [ 15.769290] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.769312] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.769336] ? kasan_atomics+0x152/0x310 [ 15.769362] kasan_atomics+0x1dc/0x310 [ 15.769384] ? __pfx_kasan_atomics+0x10/0x10 [ 15.769434] ? __pfx_read_tsc+0x10/0x10 [ 15.769456] ? ktime_get_ts64+0x86/0x230 [ 15.769481] kunit_try_run_case+0x1a5/0x480 [ 15.769505] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.769527] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.769550] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.769573] ? __kthread_parkme+0x82/0x180 [ 15.769593] ? preempt_count_sub+0x50/0x80 [ 15.769616] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.769640] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.769664] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.769690] kthread+0x337/0x6f0 [ 15.769709] ? trace_preempt_on+0x20/0xc0 [ 15.769731] ? __pfx_kthread+0x10/0x10 [ 15.769752] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.769773] ? calculate_sigpending+0x7b/0xa0 [ 15.769796] ? __pfx_kthread+0x10/0x10 [ 15.769818] ret_from_fork+0x116/0x1d0 [ 15.769836] ? __pfx_kthread+0x10/0x10 [ 15.769857] ret_from_fork_asm+0x1a/0x30 [ 15.769888] </TASK> [ 15.769898] [ 15.777635] Allocated by task 283: [ 15.778023] kasan_save_stack+0x45/0x70 [ 15.778225] kasan_save_track+0x18/0x40 [ 15.778413] kasan_save_alloc_info+0x3b/0x50 [ 15.778626] __kasan_kmalloc+0xb7/0xc0 [ 15.778978] __kmalloc_cache_noprof+0x189/0x420 [ 15.779144] kasan_atomics+0x95/0x310 [ 15.779277] kunit_try_run_case+0x1a5/0x480 [ 15.779504] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.779761] kthread+0x337/0x6f0 [ 15.779949] ret_from_fork+0x116/0x1d0 [ 15.780150] ret_from_fork_asm+0x1a/0x30 [ 15.780363] [ 15.780503] The buggy address belongs to the object at ffff8881039b8880 [ 15.780503] which belongs to the cache kmalloc-64 of size 64 [ 15.780939] The buggy address is located 0 bytes to the right of [ 15.780939] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 15.781499] [ 15.781615] The buggy address belongs to the physical page: [ 15.781842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.782157] flags: 0x200000000000000(node=0|zone=2) [ 15.782426] page_type: f5(slab) [ 15.782592] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.782900] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.783167] page dumped because: kasan: bad access detected [ 15.783338] [ 15.783408] Memory state around the buggy address: [ 15.783561] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.783779] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.784502] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.784817] ^ [ 15.785053] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.785367] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.785662] ================================================================== [ 14.969589] ================================================================== [ 14.970031] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 14.970368] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 14.970671] [ 14.970754] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.970794] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.970806] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.970826] Call Trace: [ 14.970839] <TASK> [ 14.970854] dump_stack_lvl+0x73/0xb0 [ 14.970880] print_report+0xd1/0x610 [ 14.970903] ? __virt_addr_valid+0x1db/0x2d0 [ 14.970925] ? kasan_atomics_helper+0x1079/0x5450 [ 14.970946] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.970968] ? kasan_atomics_helper+0x1079/0x5450 [ 14.970990] kasan_report+0x141/0x180 [ 14.971022] ? kasan_atomics_helper+0x1079/0x5450 [ 14.971048] kasan_check_range+0x10c/0x1c0 [ 14.971072] __kasan_check_write+0x18/0x20 [ 14.971091] kasan_atomics_helper+0x1079/0x5450 [ 14.971113] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.971136] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.971160] ? kasan_atomics+0x152/0x310 [ 14.971186] kasan_atomics+0x1dc/0x310 [ 14.971208] ? __pfx_kasan_atomics+0x10/0x10 [ 14.971232] ? __pfx_read_tsc+0x10/0x10 [ 14.971252] ? ktime_get_ts64+0x86/0x230 [ 14.971276] kunit_try_run_case+0x1a5/0x480 [ 14.971300] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.971323] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.971345] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.971368] ? __kthread_parkme+0x82/0x180 [ 14.971411] ? preempt_count_sub+0x50/0x80 [ 14.971436] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.971461] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.971485] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.971509] kthread+0x337/0x6f0 [ 14.971529] ? trace_preempt_on+0x20/0xc0 [ 14.971552] ? __pfx_kthread+0x10/0x10 [ 14.971572] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.971595] ? calculate_sigpending+0x7b/0xa0 [ 14.971619] ? __pfx_kthread+0x10/0x10 [ 14.971640] ret_from_fork+0x116/0x1d0 [ 14.971659] ? __pfx_kthread+0x10/0x10 [ 14.971698] ret_from_fork_asm+0x1a/0x30 [ 14.971729] </TASK> [ 14.971739] [ 14.979230] Allocated by task 283: [ 14.979416] kasan_save_stack+0x45/0x70 [ 14.979718] kasan_save_track+0x18/0x40 [ 14.979913] kasan_save_alloc_info+0x3b/0x50 [ 14.980142] __kasan_kmalloc+0xb7/0xc0 [ 14.980336] __kmalloc_cache_noprof+0x189/0x420 [ 14.980559] kasan_atomics+0x95/0x310 [ 14.980740] kunit_try_run_case+0x1a5/0x480 [ 14.980886] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.981242] kthread+0x337/0x6f0 [ 14.981573] ret_from_fork+0x116/0x1d0 [ 14.981761] ret_from_fork_asm+0x1a/0x30 [ 14.981907] [ 14.982003] The buggy address belongs to the object at ffff8881039b8880 [ 14.982003] which belongs to the cache kmalloc-64 of size 64 [ 14.982415] The buggy address is located 0 bytes to the right of [ 14.982415] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 14.983377] [ 14.983468] The buggy address belongs to the physical page: [ 14.983727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 14.984056] flags: 0x200000000000000(node=0|zone=2) [ 14.984275] page_type: f5(slab) [ 14.984438] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.984690] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.984957] page dumped because: kasan: bad access detected [ 14.985487] [ 14.985585] Memory state around the buggy address: [ 14.985757] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 14.986057] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.986334] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.986621] ^ [ 14.986819] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.987174] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.987482] ================================================================== [ 14.848068] ================================================================== [ 14.848593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 14.848892] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 14.849315] [ 14.849437] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.849509] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.849522] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.849544] Call Trace: [ 14.849557] <TASK> [ 14.849570] dump_stack_lvl+0x73/0xb0 [ 14.849612] print_report+0xd1/0x610 [ 14.849647] ? __virt_addr_valid+0x1db/0x2d0 [ 14.849669] ? kasan_atomics_helper+0xd47/0x5450 [ 14.849690] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.849713] ? kasan_atomics_helper+0xd47/0x5450 [ 14.849738] kasan_report+0x141/0x180 [ 14.849760] ? kasan_atomics_helper+0xd47/0x5450 [ 14.849787] kasan_check_range+0x10c/0x1c0 [ 14.849811] __kasan_check_write+0x18/0x20 [ 14.849830] kasan_atomics_helper+0xd47/0x5450 [ 14.849853] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.849876] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.849900] ? kasan_atomics+0x152/0x310 [ 14.849942] kasan_atomics+0x1dc/0x310 [ 14.849965] ? __pfx_kasan_atomics+0x10/0x10 [ 14.849989] ? __pfx_read_tsc+0x10/0x10 [ 14.850020] ? ktime_get_ts64+0x86/0x230 [ 14.850045] kunit_try_run_case+0x1a5/0x480 [ 14.850068] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.850091] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.850114] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.850138] ? __kthread_parkme+0x82/0x180 [ 14.850158] ? preempt_count_sub+0x50/0x80 [ 14.850181] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.850207] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.850231] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.850255] kthread+0x337/0x6f0 [ 14.850274] ? trace_preempt_on+0x20/0xc0 [ 14.850312] ? __pfx_kthread+0x10/0x10 [ 14.850334] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.850356] ? calculate_sigpending+0x7b/0xa0 [ 14.850379] ? __pfx_kthread+0x10/0x10 [ 14.850401] ret_from_fork+0x116/0x1d0 [ 14.850420] ? __pfx_kthread+0x10/0x10 [ 14.850440] ret_from_fork_asm+0x1a/0x30 [ 14.850470] </TASK> [ 14.850481] [ 14.863025] Allocated by task 283: [ 14.863364] kasan_save_stack+0x45/0x70 [ 14.863801] kasan_save_track+0x18/0x40 [ 14.864247] kasan_save_alloc_info+0x3b/0x50 [ 14.864566] __kasan_kmalloc+0xb7/0xc0 [ 14.864892] __kmalloc_cache_noprof+0x189/0x420 [ 14.865350] kasan_atomics+0x95/0x310 [ 14.865544] kunit_try_run_case+0x1a5/0x480 [ 14.865694] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.865955] kthread+0x337/0x6f0 [ 14.866109] ret_from_fork+0x116/0x1d0 [ 14.866284] ret_from_fork_asm+0x1a/0x30 [ 14.866491] [ 14.866565] The buggy address belongs to the object at ffff8881039b8880 [ 14.866565] which belongs to the cache kmalloc-64 of size 64 [ 14.867016] The buggy address is located 0 bytes to the right of [ 14.867016] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 14.867655] [ 14.867738] The buggy address belongs to the physical page: [ 14.867990] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 14.868357] flags: 0x200000000000000(node=0|zone=2) [ 14.868708] page_type: f5(slab) [ 14.868839] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.869171] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.869400] page dumped because: kasan: bad access detected [ 14.869769] [ 14.869862] Memory state around the buggy address: [ 14.870064] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 14.870461] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.870778] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.871016] ^ [ 14.871173] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.871454] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.871776] ================================================================== [ 15.178106] ================================================================== [ 15.179025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 15.180191] Read of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 15.180962] [ 15.181070] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.181116] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.181129] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.181150] Call Trace: [ 15.181166] <TASK> [ 15.181180] dump_stack_lvl+0x73/0xb0 [ 15.181209] print_report+0xd1/0x610 [ 15.181232] ? __virt_addr_valid+0x1db/0x2d0 [ 15.181253] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.181273] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.181295] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.181316] kasan_report+0x141/0x180 [ 15.181338] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.181378] __asan_report_load8_noabort+0x18/0x20 [ 15.181413] kasan_atomics_helper+0x4eae/0x5450 [ 15.181435] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.181456] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.181481] ? kasan_atomics+0x152/0x310 [ 15.181506] kasan_atomics+0x1dc/0x310 [ 15.181528] ? __pfx_kasan_atomics+0x10/0x10 [ 15.181552] ? __pfx_read_tsc+0x10/0x10 [ 15.181573] ? ktime_get_ts64+0x86/0x230 [ 15.181596] kunit_try_run_case+0x1a5/0x480 [ 15.181619] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.181651] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.181807] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.181836] ? __kthread_parkme+0x82/0x180 [ 15.181856] ? preempt_count_sub+0x50/0x80 [ 15.181880] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.181904] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.181928] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.181952] kthread+0x337/0x6f0 [ 15.181971] ? trace_preempt_on+0x20/0xc0 [ 15.181995] ? __pfx_kthread+0x10/0x10 [ 15.182029] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.182050] ? calculate_sigpending+0x7b/0xa0 [ 15.182074] ? __pfx_kthread+0x10/0x10 [ 15.182095] ret_from_fork+0x116/0x1d0 [ 15.182113] ? __pfx_kthread+0x10/0x10 [ 15.182134] ret_from_fork_asm+0x1a/0x30 [ 15.182164] </TASK> [ 15.182176] [ 15.194931] Allocated by task 283: [ 15.195092] kasan_save_stack+0x45/0x70 [ 15.195442] kasan_save_track+0x18/0x40 [ 15.195773] kasan_save_alloc_info+0x3b/0x50 [ 15.196205] __kasan_kmalloc+0xb7/0xc0 [ 15.196366] __kmalloc_cache_noprof+0x189/0x420 [ 15.196799] kasan_atomics+0x95/0x310 [ 15.197077] kunit_try_run_case+0x1a5/0x480 [ 15.197347] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.197698] kthread+0x337/0x6f0 [ 15.197878] ret_from_fork+0x116/0x1d0 [ 15.198194] ret_from_fork_asm+0x1a/0x30 [ 15.198543] [ 15.198655] The buggy address belongs to the object at ffff8881039b8880 [ 15.198655] which belongs to the cache kmalloc-64 of size 64 [ 15.199264] The buggy address is located 0 bytes to the right of [ 15.199264] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 15.200041] [ 15.200145] The buggy address belongs to the physical page: [ 15.200319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.200694] flags: 0x200000000000000(node=0|zone=2) [ 15.201262] page_type: f5(slab) [ 15.201669] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.201993] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.202316] page dumped because: kasan: bad access detected [ 15.202821] [ 15.203090] Memory state around the buggy address: [ 15.203322] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.203990] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.204288] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.204976] ^ [ 15.205209] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.205723] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.206173] ================================================================== [ 15.804500] ================================================================== [ 15.804786] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 15.805141] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 15.805515] [ 15.805611] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.805651] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.805663] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.805684] Call Trace: [ 15.805696] <TASK> [ 15.805710] dump_stack_lvl+0x73/0xb0 [ 15.805736] print_report+0xd1/0x610 [ 15.805759] ? __virt_addr_valid+0x1db/0x2d0 [ 15.805781] ? kasan_atomics_helper+0x218a/0x5450 [ 15.805801] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.805847] ? kasan_atomics_helper+0x218a/0x5450 [ 15.805869] kasan_report+0x141/0x180 [ 15.805890] ? kasan_atomics_helper+0x218a/0x5450 [ 15.805917] kasan_check_range+0x10c/0x1c0 [ 15.805941] __kasan_check_write+0x18/0x20 [ 15.805961] kasan_atomics_helper+0x218a/0x5450 [ 15.806001] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.806033] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.806057] ? kasan_atomics+0x152/0x310 [ 15.806083] kasan_atomics+0x1dc/0x310 [ 15.806105] ? __pfx_kasan_atomics+0x10/0x10 [ 15.806130] ? __pfx_read_tsc+0x10/0x10 [ 15.806151] ? ktime_get_ts64+0x86/0x230 [ 15.806175] kunit_try_run_case+0x1a5/0x480 [ 15.806199] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.806221] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.806243] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.806267] ? __kthread_parkme+0x82/0x180 [ 15.806307] ? preempt_count_sub+0x50/0x80 [ 15.806330] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.806354] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.806396] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.806420] kthread+0x337/0x6f0 [ 15.806440] ? trace_preempt_on+0x20/0xc0 [ 15.806462] ? __pfx_kthread+0x10/0x10 [ 15.806483] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.806504] ? calculate_sigpending+0x7b/0xa0 [ 15.806527] ? __pfx_kthread+0x10/0x10 [ 15.806549] ret_from_fork+0x116/0x1d0 [ 15.806567] ? __pfx_kthread+0x10/0x10 [ 15.806587] ret_from_fork_asm+0x1a/0x30 [ 15.806618] </TASK> [ 15.806628] [ 15.813844] Allocated by task 283: [ 15.814023] kasan_save_stack+0x45/0x70 [ 15.814218] kasan_save_track+0x18/0x40 [ 15.814350] kasan_save_alloc_info+0x3b/0x50 [ 15.814513] __kasan_kmalloc+0xb7/0xc0 [ 15.814642] __kmalloc_cache_noprof+0x189/0x420 [ 15.814792] kasan_atomics+0x95/0x310 [ 15.814919] kunit_try_run_case+0x1a5/0x480 [ 15.815097] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.815341] kthread+0x337/0x6f0 [ 15.815552] ret_from_fork+0x116/0x1d0 [ 15.815739] ret_from_fork_asm+0x1a/0x30 [ 15.815937] [ 15.816040] The buggy address belongs to the object at ffff8881039b8880 [ 15.816040] which belongs to the cache kmalloc-64 of size 64 [ 15.816583] The buggy address is located 0 bytes to the right of [ 15.816583] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 15.817040] [ 15.817114] The buggy address belongs to the physical page: [ 15.817366] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.817756] flags: 0x200000000000000(node=0|zone=2) [ 15.817997] page_type: f5(slab) [ 15.818158] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.818485] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.818788] page dumped because: kasan: bad access detected [ 15.819064] [ 15.819137] Memory state around the buggy address: [ 15.819292] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.819529] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.819747] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.820091] ^ [ 15.820306] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.820641] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.820947] ================================================================== [ 15.090116] ================================================================== [ 15.091346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 15.091631] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 15.091859] [ 15.091944] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.091988] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.092000] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.092040] Call Trace: [ 15.092053] <TASK> [ 15.092068] dump_stack_lvl+0x73/0xb0 [ 15.092095] print_report+0xd1/0x610 [ 15.092117] ? __virt_addr_valid+0x1db/0x2d0 [ 15.092139] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.092161] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.092183] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.092204] kasan_report+0x141/0x180 [ 15.092226] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.092252] kasan_check_range+0x10c/0x1c0 [ 15.092275] __kasan_check_write+0x18/0x20 [ 15.092295] kasan_atomics_helper+0x12e6/0x5450 [ 15.092317] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.092340] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.092364] ? kasan_atomics+0x152/0x310 [ 15.092390] kasan_atomics+0x1dc/0x310 [ 15.092413] ? __pfx_kasan_atomics+0x10/0x10 [ 15.092437] ? __pfx_read_tsc+0x10/0x10 [ 15.092459] ? ktime_get_ts64+0x86/0x230 [ 15.092483] kunit_try_run_case+0x1a5/0x480 [ 15.092507] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.092529] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.092552] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.092576] ? __kthread_parkme+0x82/0x180 [ 15.092595] ? preempt_count_sub+0x50/0x80 [ 15.092619] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.092642] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.092676] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.092700] kthread+0x337/0x6f0 [ 15.092719] ? trace_preempt_on+0x20/0xc0 [ 15.092754] ? __pfx_kthread+0x10/0x10 [ 15.092775] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.092797] ? calculate_sigpending+0x7b/0xa0 [ 15.092820] ? __pfx_kthread+0x10/0x10 [ 15.092841] ret_from_fork+0x116/0x1d0 [ 15.092859] ? __pfx_kthread+0x10/0x10 [ 15.092880] ret_from_fork_asm+0x1a/0x30 [ 15.092910] </TASK> [ 15.092921] [ 15.108244] Allocated by task 283: [ 15.108588] kasan_save_stack+0x45/0x70 [ 15.109061] kasan_save_track+0x18/0x40 [ 15.109418] kasan_save_alloc_info+0x3b/0x50 [ 15.109872] __kasan_kmalloc+0xb7/0xc0 [ 15.110247] __kmalloc_cache_noprof+0x189/0x420 [ 15.110789] kasan_atomics+0x95/0x310 [ 15.111263] kunit_try_run_case+0x1a5/0x480 [ 15.111643] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.112200] kthread+0x337/0x6f0 [ 15.112322] ret_from_fork+0x116/0x1d0 [ 15.112687] ret_from_fork_asm+0x1a/0x30 [ 15.113061] [ 15.113143] The buggy address belongs to the object at ffff8881039b8880 [ 15.113143] which belongs to the cache kmalloc-64 of size 64 [ 15.113922] The buggy address is located 0 bytes to the right of [ 15.113922] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 15.114306] [ 15.114381] The buggy address belongs to the physical page: [ 15.114571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.115089] flags: 0x200000000000000(node=0|zone=2) [ 15.115523] page_type: f5(slab) [ 15.115806] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.116647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.117121] page dumped because: kasan: bad access detected [ 15.117300] [ 15.117370] Memory state around the buggy address: [ 15.117818] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.118515] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.119276] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.119911] ^ [ 15.120490] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.121221] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.121798] ================================================================== [ 15.413203] ================================================================== [ 15.413547] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 15.414305] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 15.415048] [ 15.415349] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.415394] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.415500] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.415525] Call Trace: [ 15.415538] <TASK> [ 15.415552] dump_stack_lvl+0x73/0xb0 [ 15.415581] print_report+0xd1/0x610 [ 15.415603] ? __virt_addr_valid+0x1db/0x2d0 [ 15.415626] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.415647] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.415669] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.415690] kasan_report+0x141/0x180 [ 15.415712] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.415739] kasan_check_range+0x10c/0x1c0 [ 15.415762] __kasan_check_write+0x18/0x20 [ 15.415782] kasan_atomics_helper+0x18b1/0x5450 [ 15.415804] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.415826] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.415850] ? kasan_atomics+0x152/0x310 [ 15.415876] kasan_atomics+0x1dc/0x310 [ 15.415899] ? __pfx_kasan_atomics+0x10/0x10 [ 15.415923] ? __pfx_read_tsc+0x10/0x10 [ 15.415944] ? ktime_get_ts64+0x86/0x230 [ 15.415969] kunit_try_run_case+0x1a5/0x480 [ 15.415992] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.416027] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.416051] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.416073] ? __kthread_parkme+0x82/0x180 [ 15.416093] ? preempt_count_sub+0x50/0x80 [ 15.416116] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.416140] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.416164] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.416188] kthread+0x337/0x6f0 [ 15.416207] ? trace_preempt_on+0x20/0xc0 [ 15.416230] ? __pfx_kthread+0x10/0x10 [ 15.416251] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.416272] ? calculate_sigpending+0x7b/0xa0 [ 15.416295] ? __pfx_kthread+0x10/0x10 [ 15.416318] ret_from_fork+0x116/0x1d0 [ 15.416336] ? __pfx_kthread+0x10/0x10 [ 15.416357] ret_from_fork_asm+0x1a/0x30 [ 15.416466] </TASK> [ 15.416476] [ 15.428756] Allocated by task 283: [ 15.429191] kasan_save_stack+0x45/0x70 [ 15.429525] kasan_save_track+0x18/0x40 [ 15.429736] kasan_save_alloc_info+0x3b/0x50 [ 15.430092] __kasan_kmalloc+0xb7/0xc0 [ 15.430367] __kmalloc_cache_noprof+0x189/0x420 [ 15.430686] kasan_atomics+0x95/0x310 [ 15.431079] kunit_try_run_case+0x1a5/0x480 [ 15.431553] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.431809] kthread+0x337/0x6f0 [ 15.432179] ret_from_fork+0x116/0x1d0 [ 15.432491] ret_from_fork_asm+0x1a/0x30 [ 15.432870] [ 15.432996] The buggy address belongs to the object at ffff8881039b8880 [ 15.432996] which belongs to the cache kmalloc-64 of size 64 [ 15.433897] The buggy address is located 0 bytes to the right of [ 15.433897] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 15.434719] [ 15.434917] The buggy address belongs to the physical page: [ 15.435183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.435731] flags: 0x200000000000000(node=0|zone=2) [ 15.436245] page_type: f5(slab) [ 15.436510] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.436836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.437182] page dumped because: kasan: bad access detected [ 15.437778] [ 15.437887] Memory state around the buggy address: [ 15.438093] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.438822] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.439236] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.439930] ^ [ 15.440199] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.440720] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.441229] ================================================================== [ 15.499273] ================================================================== [ 15.499789] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 15.500255] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 15.500983] [ 15.501105] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.501150] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.501163] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.501185] Call Trace: [ 15.501200] <TASK> [ 15.501215] dump_stack_lvl+0x73/0xb0 [ 15.501244] print_report+0xd1/0x610 [ 15.501266] ? __virt_addr_valid+0x1db/0x2d0 [ 15.501288] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.501309] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.501332] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.501354] kasan_report+0x141/0x180 [ 15.501377] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.501593] kasan_check_range+0x10c/0x1c0 [ 15.501624] __kasan_check_write+0x18/0x20 [ 15.501644] kasan_atomics_helper+0x1a7f/0x5450 [ 15.501667] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.501690] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.501714] ? kasan_atomics+0x152/0x310 [ 15.501740] kasan_atomics+0x1dc/0x310 [ 15.501762] ? __pfx_kasan_atomics+0x10/0x10 [ 15.501786] ? __pfx_read_tsc+0x10/0x10 [ 15.501808] ? ktime_get_ts64+0x86/0x230 [ 15.501832] kunit_try_run_case+0x1a5/0x480 [ 15.501858] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.501880] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.501903] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.501927] ? __kthread_parkme+0x82/0x180 [ 15.501948] ? preempt_count_sub+0x50/0x80 [ 15.501972] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.501996] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.502035] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.502058] kthread+0x337/0x6f0 [ 15.502078] ? trace_preempt_on+0x20/0xc0 [ 15.502100] ? __pfx_kthread+0x10/0x10 [ 15.502121] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.502143] ? calculate_sigpending+0x7b/0xa0 [ 15.502166] ? __pfx_kthread+0x10/0x10 [ 15.502188] ret_from_fork+0x116/0x1d0 [ 15.502206] ? __pfx_kthread+0x10/0x10 [ 15.502227] ret_from_fork_asm+0x1a/0x30 [ 15.502258] </TASK> [ 15.502269] [ 15.510571] Allocated by task 283: [ 15.510699] kasan_save_stack+0x45/0x70 [ 15.510842] kasan_save_track+0x18/0x40 [ 15.511322] kasan_save_alloc_info+0x3b/0x50 [ 15.511639] __kasan_kmalloc+0xb7/0xc0 [ 15.511906] __kmalloc_cache_noprof+0x189/0x420 [ 15.512146] kasan_atomics+0x95/0x310 [ 15.512334] kunit_try_run_case+0x1a5/0x480 [ 15.512634] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.512873] kthread+0x337/0x6f0 [ 15.513055] ret_from_fork+0x116/0x1d0 [ 15.513243] ret_from_fork_asm+0x1a/0x30 [ 15.513544] [ 15.513664] The buggy address belongs to the object at ffff8881039b8880 [ 15.513664] which belongs to the cache kmalloc-64 of size 64 [ 15.514145] The buggy address is located 0 bytes to the right of [ 15.514145] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 15.514886] [ 15.515094] The buggy address belongs to the physical page: [ 15.515286] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.515686] flags: 0x200000000000000(node=0|zone=2) [ 15.516108] page_type: f5(slab) [ 15.516237] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.516781] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.517125] page dumped because: kasan: bad access detected [ 15.517347] [ 15.517417] Memory state around the buggy address: [ 15.517572] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.517787] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.518238] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.518604] ^ [ 15.519058] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.519453] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.519727] ================================================================== [ 14.928891] ================================================================== [ 14.929143] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 14.929489] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 14.929821] [ 14.929927] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.929969] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.929982] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.930014] Call Trace: [ 14.930027] <TASK> [ 14.930039] dump_stack_lvl+0x73/0xb0 [ 14.930065] print_report+0xd1/0x610 [ 14.930087] ? __virt_addr_valid+0x1db/0x2d0 [ 14.930109] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.930130] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.930153] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.930174] kasan_report+0x141/0x180 [ 14.930196] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.930222] kasan_check_range+0x10c/0x1c0 [ 14.930246] __kasan_check_write+0x18/0x20 [ 14.930265] kasan_atomics_helper+0xfa9/0x5450 [ 14.930288] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.930310] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.930334] ? kasan_atomics+0x152/0x310 [ 14.930367] kasan_atomics+0x1dc/0x310 [ 14.930389] ? __pfx_kasan_atomics+0x10/0x10 [ 14.930413] ? __pfx_read_tsc+0x10/0x10 [ 14.930435] ? ktime_get_ts64+0x86/0x230 [ 14.930458] kunit_try_run_case+0x1a5/0x480 [ 14.930482] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.930504] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.930527] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.930550] ? __kthread_parkme+0x82/0x180 [ 14.930570] ? preempt_count_sub+0x50/0x80 [ 14.930594] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.930618] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.930641] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.930665] kthread+0x337/0x6f0 [ 14.930684] ? trace_preempt_on+0x20/0xc0 [ 14.930706] ? __pfx_kthread+0x10/0x10 [ 14.930726] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.930748] ? calculate_sigpending+0x7b/0xa0 [ 14.930771] ? __pfx_kthread+0x10/0x10 [ 14.930792] ret_from_fork+0x116/0x1d0 [ 14.930812] ? __pfx_kthread+0x10/0x10 [ 14.930833] ret_from_fork_asm+0x1a/0x30 [ 14.930863] </TASK> [ 14.930874] [ 14.938987] Allocated by task 283: [ 14.939166] kasan_save_stack+0x45/0x70 [ 14.939342] kasan_save_track+0x18/0x40 [ 14.939616] kasan_save_alloc_info+0x3b/0x50 [ 14.939806] __kasan_kmalloc+0xb7/0xc0 [ 14.939984] __kmalloc_cache_noprof+0x189/0x420 [ 14.940196] kasan_atomics+0x95/0x310 [ 14.940657] kunit_try_run_case+0x1a5/0x480 [ 14.940873] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.941134] kthread+0x337/0x6f0 [ 14.941306] ret_from_fork+0x116/0x1d0 [ 14.941564] ret_from_fork_asm+0x1a/0x30 [ 14.941729] [ 14.941828] The buggy address belongs to the object at ffff8881039b8880 [ 14.941828] which belongs to the cache kmalloc-64 of size 64 [ 14.942243] The buggy address is located 0 bytes to the right of [ 14.942243] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 14.942705] [ 14.942781] The buggy address belongs to the physical page: [ 14.942956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 14.943212] flags: 0x200000000000000(node=0|zone=2) [ 14.943499] page_type: f5(slab) [ 14.943672] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.944019] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.944540] page dumped because: kasan: bad access detected [ 14.944808] [ 14.944902] Memory state around the buggy address: [ 14.945169] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 14.945535] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.945854] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.946175] ^ [ 14.946408] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.946724] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.947664] ================================================================== [ 15.367910] ================================================================== [ 15.368292] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 15.368839] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 15.369231] [ 15.369341] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.369449] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.369498] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.369521] Call Trace: [ 15.369537] <TASK> [ 15.369551] dump_stack_lvl+0x73/0xb0 [ 15.369580] print_report+0xd1/0x610 [ 15.369602] ? __virt_addr_valid+0x1db/0x2d0 [ 15.369624] ? kasan_atomics_helper+0x177f/0x5450 [ 15.369645] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.369695] ? kasan_atomics_helper+0x177f/0x5450 [ 15.369736] kasan_report+0x141/0x180 [ 15.369758] ? kasan_atomics_helper+0x177f/0x5450 [ 15.369784] kasan_check_range+0x10c/0x1c0 [ 15.369807] __kasan_check_write+0x18/0x20 [ 15.369827] kasan_atomics_helper+0x177f/0x5450 [ 15.369849] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.369870] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.369895] ? kasan_atomics+0x152/0x310 [ 15.369921] kasan_atomics+0x1dc/0x310 [ 15.369943] ? __pfx_kasan_atomics+0x10/0x10 [ 15.369967] ? __pfx_read_tsc+0x10/0x10 [ 15.369987] ? ktime_get_ts64+0x86/0x230 [ 15.370022] kunit_try_run_case+0x1a5/0x480 [ 15.370046] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.370068] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.370091] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.370115] ? __kthread_parkme+0x82/0x180 [ 15.370135] ? preempt_count_sub+0x50/0x80 [ 15.370158] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.370182] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.370205] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.370229] kthread+0x337/0x6f0 [ 15.370248] ? trace_preempt_on+0x20/0xc0 [ 15.370270] ? __pfx_kthread+0x10/0x10 [ 15.370291] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.370312] ? calculate_sigpending+0x7b/0xa0 [ 15.370336] ? __pfx_kthread+0x10/0x10 [ 15.370358] ret_from_fork+0x116/0x1d0 [ 15.370483] ? __pfx_kthread+0x10/0x10 [ 15.370506] ret_from_fork_asm+0x1a/0x30 [ 15.370537] </TASK> [ 15.370547] [ 15.379753] Allocated by task 283: [ 15.379935] kasan_save_stack+0x45/0x70 [ 15.380171] kasan_save_track+0x18/0x40 [ 15.380407] kasan_save_alloc_info+0x3b/0x50 [ 15.380652] __kasan_kmalloc+0xb7/0xc0 [ 15.380787] __kmalloc_cache_noprof+0x189/0x420 [ 15.380939] kasan_atomics+0x95/0x310 [ 15.381090] kunit_try_run_case+0x1a5/0x480 [ 15.381300] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.381940] kthread+0x337/0x6f0 [ 15.382198] ret_from_fork+0x116/0x1d0 [ 15.382636] ret_from_fork_asm+0x1a/0x30 [ 15.382896] [ 15.383086] The buggy address belongs to the object at ffff8881039b8880 [ 15.383086] which belongs to the cache kmalloc-64 of size 64 [ 15.383589] The buggy address is located 0 bytes to the right of [ 15.383589] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 15.383937] [ 15.384018] The buggy address belongs to the physical page: [ 15.384305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.384761] flags: 0x200000000000000(node=0|zone=2) [ 15.385064] page_type: f5(slab) [ 15.385273] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.385716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.385942] page dumped because: kasan: bad access detected [ 15.386185] [ 15.386277] Memory state around the buggy address: [ 15.386721] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.387063] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.387503] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.387800] ^ [ 15.387953] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.388325] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.388928] ================================================================== [ 15.441879] ================================================================== [ 15.442324] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 15.442920] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 15.443293] [ 15.443670] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.443738] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.443765] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.443786] Call Trace: [ 15.443814] <TASK> [ 15.443828] dump_stack_lvl+0x73/0xb0 [ 15.443870] print_report+0xd1/0x610 [ 15.443893] ? __virt_addr_valid+0x1db/0x2d0 [ 15.443928] ? kasan_atomics_helper+0x194a/0x5450 [ 15.443969] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.444279] ? kasan_atomics_helper+0x194a/0x5450 [ 15.444307] kasan_report+0x141/0x180 [ 15.444330] ? kasan_atomics_helper+0x194a/0x5450 [ 15.444356] kasan_check_range+0x10c/0x1c0 [ 15.444397] __kasan_check_write+0x18/0x20 [ 15.444418] kasan_atomics_helper+0x194a/0x5450 [ 15.444447] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.444470] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.444494] ? kasan_atomics+0x152/0x310 [ 15.444521] kasan_atomics+0x1dc/0x310 [ 15.444543] ? __pfx_kasan_atomics+0x10/0x10 [ 15.444567] ? __pfx_read_tsc+0x10/0x10 [ 15.444587] ? ktime_get_ts64+0x86/0x230 [ 15.444611] kunit_try_run_case+0x1a5/0x480 [ 15.444634] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.444657] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.444681] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.444703] ? __kthread_parkme+0x82/0x180 [ 15.444724] ? preempt_count_sub+0x50/0x80 [ 15.444747] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.444771] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.444794] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.444817] kthread+0x337/0x6f0 [ 15.444837] ? trace_preempt_on+0x20/0xc0 [ 15.444860] ? __pfx_kthread+0x10/0x10 [ 15.444881] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.444902] ? calculate_sigpending+0x7b/0xa0 [ 15.444926] ? __pfx_kthread+0x10/0x10 [ 15.444948] ret_from_fork+0x116/0x1d0 [ 15.444966] ? __pfx_kthread+0x10/0x10 [ 15.444992] ret_from_fork_asm+0x1a/0x30 [ 15.445035] </TASK> [ 15.445046] [ 15.456856] Allocated by task 283: [ 15.457068] kasan_save_stack+0x45/0x70 [ 15.457274] kasan_save_track+0x18/0x40 [ 15.458016] kasan_save_alloc_info+0x3b/0x50 [ 15.458245] __kasan_kmalloc+0xb7/0xc0 [ 15.458660] __kmalloc_cache_noprof+0x189/0x420 [ 15.458968] kasan_atomics+0x95/0x310 [ 15.459272] kunit_try_run_case+0x1a5/0x480 [ 15.459508] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.459872] kthread+0x337/0x6f0 [ 15.460223] ret_from_fork+0x116/0x1d0 [ 15.460546] ret_from_fork_asm+0x1a/0x30 [ 15.460923] [ 15.461001] The buggy address belongs to the object at ffff8881039b8880 [ 15.461001] which belongs to the cache kmalloc-64 of size 64 [ 15.461580] The buggy address is located 0 bytes to the right of [ 15.461580] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 15.462652] [ 15.462773] The buggy address belongs to the physical page: [ 15.463177] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.463708] flags: 0x200000000000000(node=0|zone=2) [ 15.464122] page_type: f5(slab) [ 15.464448] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.464785] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.465135] page dumped because: kasan: bad access detected [ 15.465611] [ 15.465726] Memory state around the buggy address: [ 15.466228] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.466600] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.466975] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.467300] ^ [ 15.467703] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.468128] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.468615] ================================================================== [ 14.446041] ================================================================== [ 14.446432] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 14.446777] Read of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 14.447211] [ 14.447320] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.447408] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.447421] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.447442] Call Trace: [ 14.447457] <TASK> [ 14.447471] dump_stack_lvl+0x73/0xb0 [ 14.447497] print_report+0xd1/0x610 [ 14.447519] ? __virt_addr_valid+0x1db/0x2d0 [ 14.447541] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.447562] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.447585] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.447607] kasan_report+0x141/0x180 [ 14.447628] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.447654] __asan_report_load4_noabort+0x18/0x20 [ 14.447679] kasan_atomics_helper+0x4b88/0x5450 [ 14.447700] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.447723] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.447748] ? kasan_atomics+0x152/0x310 [ 14.447774] kasan_atomics+0x1dc/0x310 [ 14.447798] ? __pfx_kasan_atomics+0x10/0x10 [ 14.447822] ? __pfx_read_tsc+0x10/0x10 [ 14.447843] ? ktime_get_ts64+0x86/0x230 [ 14.447867] kunit_try_run_case+0x1a5/0x480 [ 14.447891] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.447914] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.447938] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.447962] ? __kthread_parkme+0x82/0x180 [ 14.447983] ? preempt_count_sub+0x50/0x80 [ 14.448017] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.448042] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.448066] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.448090] kthread+0x337/0x6f0 [ 14.448110] ? trace_preempt_on+0x20/0xc0 [ 14.448133] ? __pfx_kthread+0x10/0x10 [ 14.448154] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.448175] ? calculate_sigpending+0x7b/0xa0 [ 14.448199] ? __pfx_kthread+0x10/0x10 [ 14.448221] ret_from_fork+0x116/0x1d0 [ 14.448239] ? __pfx_kthread+0x10/0x10 [ 14.448260] ret_from_fork_asm+0x1a/0x30 [ 14.448291] </TASK> [ 14.448302] [ 14.459558] Allocated by task 283: [ 14.459883] kasan_save_stack+0x45/0x70 [ 14.460338] kasan_save_track+0x18/0x40 [ 14.460772] kasan_save_alloc_info+0x3b/0x50 [ 14.461250] __kasan_kmalloc+0xb7/0xc0 [ 14.461662] __kmalloc_cache_noprof+0x189/0x420 [ 14.462180] kasan_atomics+0x95/0x310 [ 14.462610] kunit_try_run_case+0x1a5/0x480 [ 14.463025] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.463597] kthread+0x337/0x6f0 [ 14.463946] ret_from_fork+0x116/0x1d0 [ 14.464179] ret_from_fork_asm+0x1a/0x30 [ 14.464608] [ 14.464736] The buggy address belongs to the object at ffff8881039b8880 [ 14.464736] which belongs to the cache kmalloc-64 of size 64 [ 14.465617] The buggy address is located 0 bytes to the right of [ 14.465617] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 14.466361] [ 14.466542] The buggy address belongs to the physical page: [ 14.466736] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 14.467314] flags: 0x200000000000000(node=0|zone=2) [ 14.467742] page_type: f5(slab) [ 14.468088] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.468650] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.469369] page dumped because: kasan: bad access detected [ 14.469893] [ 14.469998] Memory state around the buggy address: [ 14.470173] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 14.470929] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.471613] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.472213] ^ [ 14.472699] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.472981] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.473196] ================================================================== [ 14.615084] ================================================================== [ 14.615314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 14.615538] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 14.615762] [ 14.615847] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.615889] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.615901] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.615923] Call Trace: [ 14.615936] <TASK> [ 14.615951] dump_stack_lvl+0x73/0xb0 [ 14.615976] print_report+0xd1/0x610 [ 14.615997] ? __virt_addr_valid+0x1db/0x2d0 [ 14.616030] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.616051] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.616074] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.616095] kasan_report+0x141/0x180 [ 14.616117] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.616143] kasan_check_range+0x10c/0x1c0 [ 14.616166] __kasan_check_write+0x18/0x20 [ 14.616185] kasan_atomics_helper+0x5fe/0x5450 [ 14.616223] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.616245] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.616271] ? kasan_atomics+0x152/0x310 [ 14.616296] kasan_atomics+0x1dc/0x310 [ 14.616319] ? __pfx_kasan_atomics+0x10/0x10 [ 14.616343] ? __pfx_read_tsc+0x10/0x10 [ 14.616363] ? ktime_get_ts64+0x86/0x230 [ 14.616387] kunit_try_run_case+0x1a5/0x480 [ 14.616411] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.616433] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.616457] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.616480] ? __kthread_parkme+0x82/0x180 [ 14.616500] ? preempt_count_sub+0x50/0x80 [ 14.616525] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.616549] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.616572] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.616596] kthread+0x337/0x6f0 [ 14.616615] ? trace_preempt_on+0x20/0xc0 [ 14.616637] ? __pfx_kthread+0x10/0x10 [ 14.616657] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.616679] ? calculate_sigpending+0x7b/0xa0 [ 14.616701] ? __pfx_kthread+0x10/0x10 [ 14.616723] ret_from_fork+0x116/0x1d0 [ 14.616741] ? __pfx_kthread+0x10/0x10 [ 14.616761] ret_from_fork_asm+0x1a/0x30 [ 14.616792] </TASK> [ 14.616802] [ 14.626310] Allocated by task 283: [ 14.626572] kasan_save_stack+0x45/0x70 [ 14.626774] kasan_save_track+0x18/0x40 [ 14.626964] kasan_save_alloc_info+0x3b/0x50 [ 14.627171] __kasan_kmalloc+0xb7/0xc0 [ 14.627341] __kmalloc_cache_noprof+0x189/0x420 [ 14.627589] kasan_atomics+0x95/0x310 [ 14.627756] kunit_try_run_case+0x1a5/0x480 [ 14.627945] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.628173] kthread+0x337/0x6f0 [ 14.628350] ret_from_fork+0x116/0x1d0 [ 14.628536] ret_from_fork_asm+0x1a/0x30 [ 14.628721] [ 14.628800] The buggy address belongs to the object at ffff8881039b8880 [ 14.628800] which belongs to the cache kmalloc-64 of size 64 [ 14.629197] The buggy address is located 0 bytes to the right of [ 14.629197] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 14.629984] [ 14.630116] The buggy address belongs to the physical page: [ 14.630370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 14.630676] flags: 0x200000000000000(node=0|zone=2) [ 14.630839] page_type: f5(slab) [ 14.631280] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.632062] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.632364] page dumped because: kasan: bad access detected [ 14.632597] [ 14.632679] Memory state around the buggy address: [ 14.632897] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 14.633135] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.633434] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.633754] ^ [ 14.633962] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.634241] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.634693] ================================================================== [ 14.826282] ================================================================== [ 14.826875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 14.827240] Read of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 14.827581] [ 14.827664] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.827706] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.827719] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.827740] Call Trace: [ 14.827754] <TASK> [ 14.827768] dump_stack_lvl+0x73/0xb0 [ 14.827812] print_report+0xd1/0x610 [ 14.827834] ? __virt_addr_valid+0x1db/0x2d0 [ 14.827856] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.827877] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.827900] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.827921] kasan_report+0x141/0x180 [ 14.827944] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.827969] __asan_report_load4_noabort+0x18/0x20 [ 14.827994] kasan_atomics_helper+0x4a84/0x5450 [ 14.828028] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.828050] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.828075] ? kasan_atomics+0x152/0x310 [ 14.828101] kasan_atomics+0x1dc/0x310 [ 14.828123] ? __pfx_kasan_atomics+0x10/0x10 [ 14.828147] ? __pfx_read_tsc+0x10/0x10 [ 14.828168] ? ktime_get_ts64+0x86/0x230 [ 14.828193] kunit_try_run_case+0x1a5/0x480 [ 14.828217] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.828240] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.828263] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.828286] ? __kthread_parkme+0x82/0x180 [ 14.828307] ? preempt_count_sub+0x50/0x80 [ 14.828330] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.828354] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.828389] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.828413] kthread+0x337/0x6f0 [ 14.828434] ? trace_preempt_on+0x20/0xc0 [ 14.828456] ? __pfx_kthread+0x10/0x10 [ 14.828478] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.828507] ? calculate_sigpending+0x7b/0xa0 [ 14.828530] ? __pfx_kthread+0x10/0x10 [ 14.828552] ret_from_fork+0x116/0x1d0 [ 14.828570] ? __pfx_kthread+0x10/0x10 [ 14.828590] ret_from_fork_asm+0x1a/0x30 [ 14.828621] </TASK> [ 14.828632] [ 14.836573] Allocated by task 283: [ 14.836743] kasan_save_stack+0x45/0x70 [ 14.837028] kasan_save_track+0x18/0x40 [ 14.837209] kasan_save_alloc_info+0x3b/0x50 [ 14.837358] __kasan_kmalloc+0xb7/0xc0 [ 14.837490] __kmalloc_cache_noprof+0x189/0x420 [ 14.837644] kasan_atomics+0x95/0x310 [ 14.837776] kunit_try_run_case+0x1a5/0x480 [ 14.837921] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.838225] kthread+0x337/0x6f0 [ 14.838401] ret_from_fork+0x116/0x1d0 [ 14.838589] ret_from_fork_asm+0x1a/0x30 [ 14.838786] [ 14.838880] The buggy address belongs to the object at ffff8881039b8880 [ 14.838880] which belongs to the cache kmalloc-64 of size 64 [ 14.839530] The buggy address is located 0 bytes to the right of [ 14.839530] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 14.840162] [ 14.840237] The buggy address belongs to the physical page: [ 14.840819] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 14.841210] flags: 0x200000000000000(node=0|zone=2) [ 14.843344] page_type: f5(slab) [ 14.843576] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.843907] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.844222] page dumped because: kasan: bad access detected [ 14.844416] [ 14.844515] Memory state around the buggy address: [ 14.845286] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 14.846189] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.846628] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.846854] ^ [ 14.847028] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.847385] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.847681] ================================================================== [ 15.742050] ================================================================== [ 15.742390] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 15.742719] Read of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 15.742942] [ 15.743036] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.743078] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.743090] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.743110] Call Trace: [ 15.743123] <TASK> [ 15.743138] dump_stack_lvl+0x73/0xb0 [ 15.743164] print_report+0xd1/0x610 [ 15.743185] ? __virt_addr_valid+0x1db/0x2d0 [ 15.743207] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.743228] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.743249] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.743271] kasan_report+0x141/0x180 [ 15.743292] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.743318] __asan_report_load8_noabort+0x18/0x20 [ 15.743342] kasan_atomics_helper+0x4f98/0x5450 [ 15.743364] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.743386] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.743410] ? kasan_atomics+0x152/0x310 [ 15.743436] kasan_atomics+0x1dc/0x310 [ 15.743459] ? __pfx_kasan_atomics+0x10/0x10 [ 15.743486] ? __pfx_read_tsc+0x10/0x10 [ 15.743505] ? ktime_get_ts64+0x86/0x230 [ 15.743529] kunit_try_run_case+0x1a5/0x480 [ 15.743552] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.743574] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.743598] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.743621] ? __kthread_parkme+0x82/0x180 [ 15.743641] ? preempt_count_sub+0x50/0x80 [ 15.743664] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.743688] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.743711] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.743735] kthread+0x337/0x6f0 [ 15.743755] ? trace_preempt_on+0x20/0xc0 [ 15.743777] ? __pfx_kthread+0x10/0x10 [ 15.743798] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.743819] ? calculate_sigpending+0x7b/0xa0 [ 15.743842] ? __pfx_kthread+0x10/0x10 [ 15.743863] ret_from_fork+0x116/0x1d0 [ 15.743881] ? __pfx_kthread+0x10/0x10 [ 15.743902] ret_from_fork_asm+0x1a/0x30 [ 15.743932] </TASK> [ 15.743943] [ 15.752965] Allocated by task 283: [ 15.753545] kasan_save_stack+0x45/0x70 [ 15.753984] kasan_save_track+0x18/0x40 [ 15.754156] kasan_save_alloc_info+0x3b/0x50 [ 15.754308] __kasan_kmalloc+0xb7/0xc0 [ 15.754862] __kmalloc_cache_noprof+0x189/0x420 [ 15.755451] kasan_atomics+0x95/0x310 [ 15.755925] kunit_try_run_case+0x1a5/0x480 [ 15.756515] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.757055] kthread+0x337/0x6f0 [ 15.757187] ret_from_fork+0x116/0x1d0 [ 15.757321] ret_from_fork_asm+0x1a/0x30 [ 15.757926] [ 15.758248] The buggy address belongs to the object at ffff8881039b8880 [ 15.758248] which belongs to the cache kmalloc-64 of size 64 [ 15.759555] The buggy address is located 0 bytes to the right of [ 15.759555] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 15.759933] [ 15.760020] The buggy address belongs to the physical page: [ 15.760196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.760921] flags: 0x200000000000000(node=0|zone=2) [ 15.761632] page_type: f5(slab) [ 15.762130] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.763130] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.763984] page dumped because: kasan: bad access detected [ 15.764725] [ 15.765044] Memory state around the buggy address: [ 15.765584] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.765811] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.766042] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.766306] ^ [ 15.766594] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.766892] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.767156] ================================================================== [ 15.122491] ================================================================== [ 15.123462] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 15.124171] Read of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 15.125220] [ 15.125332] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.125377] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.125390] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.125413] Call Trace: [ 15.125427] <TASK> [ 15.125461] dump_stack_lvl+0x73/0xb0 [ 15.125489] print_report+0xd1/0x610 [ 15.125627] ? __virt_addr_valid+0x1db/0x2d0 [ 15.125732] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.125756] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.125779] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.125800] kasan_report+0x141/0x180 [ 15.125823] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.125849] __asan_report_load4_noabort+0x18/0x20 [ 15.125874] kasan_atomics_helper+0x49ce/0x5450 [ 15.125896] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.125918] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.125944] ? kasan_atomics+0x152/0x310 [ 15.125970] kasan_atomics+0x1dc/0x310 [ 15.125992] ? __pfx_kasan_atomics+0x10/0x10 [ 15.126027] ? __pfx_read_tsc+0x10/0x10 [ 15.126047] ? ktime_get_ts64+0x86/0x230 [ 15.126071] kunit_try_run_case+0x1a5/0x480 [ 15.126094] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.126116] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.126139] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.126163] ? __kthread_parkme+0x82/0x180 [ 15.126183] ? preempt_count_sub+0x50/0x80 [ 15.126206] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.126230] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.126252] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.126276] kthread+0x337/0x6f0 [ 15.126295] ? trace_preempt_on+0x20/0xc0 [ 15.126318] ? __pfx_kthread+0x10/0x10 [ 15.126338] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.126359] ? calculate_sigpending+0x7b/0xa0 [ 15.126382] ? __pfx_kthread+0x10/0x10 [ 15.126404] ret_from_fork+0x116/0x1d0 [ 15.126433] ? __pfx_kthread+0x10/0x10 [ 15.126453] ret_from_fork_asm+0x1a/0x30 [ 15.126485] </TASK> [ 15.126495] [ 15.141447] Allocated by task 283: [ 15.141858] kasan_save_stack+0x45/0x70 [ 15.142235] kasan_save_track+0x18/0x40 [ 15.142754] kasan_save_alloc_info+0x3b/0x50 [ 15.143181] __kasan_kmalloc+0xb7/0xc0 [ 15.143617] __kmalloc_cache_noprof+0x189/0x420 [ 15.143840] kasan_atomics+0x95/0x310 [ 15.143973] kunit_try_run_case+0x1a5/0x480 [ 15.144134] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.144311] kthread+0x337/0x6f0 [ 15.144463] ret_from_fork+0x116/0x1d0 [ 15.144596] ret_from_fork_asm+0x1a/0x30 [ 15.144900] [ 15.145020] The buggy address belongs to the object at ffff8881039b8880 [ 15.145020] which belongs to the cache kmalloc-64 of size 64 [ 15.145726] The buggy address is located 0 bytes to the right of [ 15.145726] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 15.146242] [ 15.146344] The buggy address belongs to the physical page: [ 15.146645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.146974] flags: 0x200000000000000(node=0|zone=2) [ 15.147200] page_type: f5(slab) [ 15.147321] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.147611] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.148013] page dumped because: kasan: bad access detected [ 15.148183] [ 15.148253] Memory state around the buggy address: [ 15.148929] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.149524] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.149771] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.150115] ^ [ 15.150348] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.151224] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.151696] ================================================================== [ 15.206939] ================================================================== [ 15.207648] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 15.208019] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 15.208325] [ 15.208426] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.209023] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.209038] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.209060] Call Trace: [ 15.209076] <TASK> [ 15.209092] dump_stack_lvl+0x73/0xb0 [ 15.209121] print_report+0xd1/0x610 [ 15.209143] ? __virt_addr_valid+0x1db/0x2d0 [ 15.209165] ? kasan_atomics_helper+0x1467/0x5450 [ 15.209187] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.209209] ? kasan_atomics_helper+0x1467/0x5450 [ 15.209230] kasan_report+0x141/0x180 [ 15.209252] ? kasan_atomics_helper+0x1467/0x5450 [ 15.209278] kasan_check_range+0x10c/0x1c0 [ 15.209301] __kasan_check_write+0x18/0x20 [ 15.209321] kasan_atomics_helper+0x1467/0x5450 [ 15.209344] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.209461] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.209488] ? kasan_atomics+0x152/0x310 [ 15.209515] kasan_atomics+0x1dc/0x310 [ 15.209538] ? __pfx_kasan_atomics+0x10/0x10 [ 15.209563] ? __pfx_read_tsc+0x10/0x10 [ 15.209584] ? ktime_get_ts64+0x86/0x230 [ 15.209608] kunit_try_run_case+0x1a5/0x480 [ 15.209633] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.209655] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.209678] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.209702] ? __kthread_parkme+0x82/0x180 [ 15.209722] ? preempt_count_sub+0x50/0x80 [ 15.209746] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.209769] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.209793] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.209817] kthread+0x337/0x6f0 [ 15.209836] ? trace_preempt_on+0x20/0xc0 [ 15.209858] ? __pfx_kthread+0x10/0x10 [ 15.209879] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.209901] ? calculate_sigpending+0x7b/0xa0 [ 15.209924] ? __pfx_kthread+0x10/0x10 [ 15.209945] ret_from_fork+0x116/0x1d0 [ 15.209964] ? __pfx_kthread+0x10/0x10 [ 15.209984] ret_from_fork_asm+0x1a/0x30 [ 15.210026] </TASK> [ 15.210037] [ 15.221899] Allocated by task 283: [ 15.222048] kasan_save_stack+0x45/0x70 [ 15.222493] kasan_save_track+0x18/0x40 [ 15.222869] kasan_save_alloc_info+0x3b/0x50 [ 15.223094] __kasan_kmalloc+0xb7/0xc0 [ 15.223276] __kmalloc_cache_noprof+0x189/0x420 [ 15.223689] kasan_atomics+0x95/0x310 [ 15.223981] kunit_try_run_case+0x1a5/0x480 [ 15.224160] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.224631] kthread+0x337/0x6f0 [ 15.225097] ret_from_fork+0x116/0x1d0 [ 15.225266] ret_from_fork_asm+0x1a/0x30 [ 15.225812] [ 15.225914] The buggy address belongs to the object at ffff8881039b8880 [ 15.225914] which belongs to the cache kmalloc-64 of size 64 [ 15.226785] The buggy address is located 0 bytes to the right of [ 15.226785] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 15.227504] [ 15.227625] The buggy address belongs to the physical page: [ 15.227866] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.228223] flags: 0x200000000000000(node=0|zone=2) [ 15.228834] page_type: f5(slab) [ 15.229014] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.229556] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.229976] page dumped because: kasan: bad access detected [ 15.230324] [ 15.230547] Memory state around the buggy address: [ 15.230838] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.231169] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.231766] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.232039] ^ [ 15.232690] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.232976] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.233460] ================================================================== [ 15.319163] ================================================================== [ 15.319664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 15.320151] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 15.320795] [ 15.320906] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.320950] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.320962] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.320987] Call Trace: [ 15.321002] <TASK> [ 15.321028] dump_stack_lvl+0x73/0xb0 [ 15.321056] print_report+0xd1/0x610 [ 15.321078] ? __virt_addr_valid+0x1db/0x2d0 [ 15.321218] ? kasan_atomics_helper+0x164f/0x5450 [ 15.321240] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.321262] ? kasan_atomics_helper+0x164f/0x5450 [ 15.321284] kasan_report+0x141/0x180 [ 15.321306] ? kasan_atomics_helper+0x164f/0x5450 [ 15.321333] kasan_check_range+0x10c/0x1c0 [ 15.321356] __kasan_check_write+0x18/0x20 [ 15.321442] kasan_atomics_helper+0x164f/0x5450 [ 15.321465] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.321487] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.321512] ? kasan_atomics+0x152/0x310 [ 15.321537] kasan_atomics+0x1dc/0x310 [ 15.321559] ? __pfx_kasan_atomics+0x10/0x10 [ 15.321583] ? __pfx_read_tsc+0x10/0x10 [ 15.321605] ? ktime_get_ts64+0x86/0x230 [ 15.321629] kunit_try_run_case+0x1a5/0x480 [ 15.321653] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.321675] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.321699] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.321722] ? __kthread_parkme+0x82/0x180 [ 15.321742] ? preempt_count_sub+0x50/0x80 [ 15.321765] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.321789] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.321812] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.321835] kthread+0x337/0x6f0 [ 15.321855] ? trace_preempt_on+0x20/0xc0 [ 15.321878] ? __pfx_kthread+0x10/0x10 [ 15.321900] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.321920] ? calculate_sigpending+0x7b/0xa0 [ 15.321944] ? __pfx_kthread+0x10/0x10 [ 15.321966] ret_from_fork+0x116/0x1d0 [ 15.321984] ? __pfx_kthread+0x10/0x10 [ 15.322018] ret_from_fork_asm+0x1a/0x30 [ 15.322049] </TASK> [ 15.322059] [ 15.334730] Allocated by task 283: [ 15.334988] kasan_save_stack+0x45/0x70 [ 15.335292] kasan_save_track+0x18/0x40 [ 15.335544] kasan_save_alloc_info+0x3b/0x50 [ 15.335839] __kasan_kmalloc+0xb7/0xc0 [ 15.336037] __kmalloc_cache_noprof+0x189/0x420 [ 15.336258] kasan_atomics+0x95/0x310 [ 15.336882] kunit_try_run_case+0x1a5/0x480 [ 15.337104] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.337782] kthread+0x337/0x6f0 [ 15.338079] ret_from_fork+0x116/0x1d0 [ 15.338376] ret_from_fork_asm+0x1a/0x30 [ 15.338832] [ 15.338938] The buggy address belongs to the object at ffff8881039b8880 [ 15.338938] which belongs to the cache kmalloc-64 of size 64 [ 15.339720] The buggy address is located 0 bytes to the right of [ 15.339720] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 15.340373] [ 15.340730] The buggy address belongs to the physical page: [ 15.340931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.341349] flags: 0x200000000000000(node=0|zone=2) [ 15.341742] page_type: f5(slab) [ 15.341911] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.342264] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.342607] page dumped because: kasan: bad access detected [ 15.343044] [ 15.343217] Memory state around the buggy address: [ 15.343545] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.343861] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.344136] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.344762] ^ [ 15.345026] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.345329] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.345697] ================================================================== [ 15.721269] ================================================================== [ 15.721769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 15.722128] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 15.722526] [ 15.722618] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.722660] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.722672] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.722692] Call Trace: [ 15.722706] <TASK> [ 15.722719] dump_stack_lvl+0x73/0xb0 [ 15.722746] print_report+0xd1/0x610 [ 15.722768] ? __virt_addr_valid+0x1db/0x2d0 [ 15.722789] ? kasan_atomics_helper+0x2006/0x5450 [ 15.722810] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.722833] ? kasan_atomics_helper+0x2006/0x5450 [ 15.722855] kasan_report+0x141/0x180 [ 15.722877] ? kasan_atomics_helper+0x2006/0x5450 [ 15.722904] kasan_check_range+0x10c/0x1c0 [ 15.722928] __kasan_check_write+0x18/0x20 [ 15.722947] kasan_atomics_helper+0x2006/0x5450 [ 15.722970] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.722992] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.723028] ? kasan_atomics+0x152/0x310 [ 15.723054] kasan_atomics+0x1dc/0x310 [ 15.723076] ? __pfx_kasan_atomics+0x10/0x10 [ 15.723100] ? __pfx_read_tsc+0x10/0x10 [ 15.723120] ? ktime_get_ts64+0x86/0x230 [ 15.723146] kunit_try_run_case+0x1a5/0x480 [ 15.723170] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.723191] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.723215] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.723238] ? __kthread_parkme+0x82/0x180 [ 15.723258] ? preempt_count_sub+0x50/0x80 [ 15.723282] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.723306] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.723330] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.723428] kthread+0x337/0x6f0 [ 15.723451] ? trace_preempt_on+0x20/0xc0 [ 15.723475] ? __pfx_kthread+0x10/0x10 [ 15.723496] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.723518] ? calculate_sigpending+0x7b/0xa0 [ 15.723541] ? __pfx_kthread+0x10/0x10 [ 15.723563] ret_from_fork+0x116/0x1d0 [ 15.723582] ? __pfx_kthread+0x10/0x10 [ 15.723602] ret_from_fork_asm+0x1a/0x30 [ 15.723632] </TASK> [ 15.723644] [ 15.731732] Allocated by task 283: [ 15.731884] kasan_save_stack+0x45/0x70 [ 15.732101] kasan_save_track+0x18/0x40 [ 15.732279] kasan_save_alloc_info+0x3b/0x50 [ 15.732837] __kasan_kmalloc+0xb7/0xc0 [ 15.733058] __kmalloc_cache_noprof+0x189/0x420 [ 15.733215] kasan_atomics+0x95/0x310 [ 15.733599] kunit_try_run_case+0x1a5/0x480 [ 15.733823] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.734087] kthread+0x337/0x6f0 [ 15.734245] ret_from_fork+0x116/0x1d0 [ 15.734494] ret_from_fork_asm+0x1a/0x30 [ 15.734670] [ 15.734767] The buggy address belongs to the object at ffff8881039b8880 [ 15.734767] which belongs to the cache kmalloc-64 of size 64 [ 15.735256] The buggy address is located 0 bytes to the right of [ 15.735256] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 15.735751] [ 15.735828] The buggy address belongs to the physical page: [ 15.736002] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.736255] flags: 0x200000000000000(node=0|zone=2) [ 15.736553] page_type: f5(slab) [ 15.736725] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.737084] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.737614] page dumped because: kasan: bad access detected [ 15.737871] [ 15.737967] Memory state around the buggy address: [ 15.738195] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.738503] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.738788] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.739123] ^ [ 15.739417] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.739746] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.740052] ================================================================== [ 14.537840] ================================================================== [ 14.538470] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 14.539185] Read of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 14.539937] [ 14.540128] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.540172] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.540184] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.540206] Call Trace: [ 14.540222] <TASK> [ 14.540239] dump_stack_lvl+0x73/0xb0 [ 14.540267] print_report+0xd1/0x610 [ 14.540289] ? __virt_addr_valid+0x1db/0x2d0 [ 14.540310] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.540331] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.540353] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.540392] kasan_report+0x141/0x180 [ 14.540415] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.540441] __asan_report_load4_noabort+0x18/0x20 [ 14.540465] kasan_atomics_helper+0x4b54/0x5450 [ 14.540487] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.540509] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.540534] ? kasan_atomics+0x152/0x310 [ 14.540559] kasan_atomics+0x1dc/0x310 [ 14.540581] ? __pfx_kasan_atomics+0x10/0x10 [ 14.540606] ? __pfx_read_tsc+0x10/0x10 [ 14.540627] ? ktime_get_ts64+0x86/0x230 [ 14.540651] kunit_try_run_case+0x1a5/0x480 [ 14.540674] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.540698] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.540720] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.540744] ? __kthread_parkme+0x82/0x180 [ 14.540764] ? preempt_count_sub+0x50/0x80 [ 14.540787] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.540812] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.540835] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.540858] kthread+0x337/0x6f0 [ 14.540878] ? trace_preempt_on+0x20/0xc0 [ 14.540900] ? __pfx_kthread+0x10/0x10 [ 14.540921] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.540943] ? calculate_sigpending+0x7b/0xa0 [ 14.540967] ? __pfx_kthread+0x10/0x10 [ 14.540997] ret_from_fork+0x116/0x1d0 [ 14.541025] ? __pfx_kthread+0x10/0x10 [ 14.541046] ret_from_fork_asm+0x1a/0x30 [ 14.541099] </TASK> [ 14.541109] [ 14.548995] Allocated by task 283: [ 14.549173] kasan_save_stack+0x45/0x70 [ 14.549353] kasan_save_track+0x18/0x40 [ 14.549586] kasan_save_alloc_info+0x3b/0x50 [ 14.549799] __kasan_kmalloc+0xb7/0xc0 [ 14.549960] __kmalloc_cache_noprof+0x189/0x420 [ 14.550148] kasan_atomics+0x95/0x310 [ 14.550341] kunit_try_run_case+0x1a5/0x480 [ 14.550590] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.550822] kthread+0x337/0x6f0 [ 14.550944] ret_from_fork+0x116/0x1d0 [ 14.551089] ret_from_fork_asm+0x1a/0x30 [ 14.551309] [ 14.551403] The buggy address belongs to the object at ffff8881039b8880 [ 14.551403] which belongs to the cache kmalloc-64 of size 64 [ 14.551963] The buggy address is located 0 bytes to the right of [ 14.551963] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 14.552522] [ 14.552703] The buggy address belongs to the physical page: [ 14.552957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 14.553261] flags: 0x200000000000000(node=0|zone=2) [ 14.553483] page_type: f5(slab) [ 14.553603] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.553837] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.554072] page dumped because: kasan: bad access detected [ 14.554242] [ 14.554312] Memory state around the buggy address: [ 14.554557] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 14.554875] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.555201] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.555677] ^ [ 14.555899] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.556385] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.556602] ================================================================== [ 14.691701] ================================================================== [ 14.691927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 14.692239] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 14.692667] [ 14.692779] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.692820] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.692833] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.692854] Call Trace: [ 14.692868] <TASK> [ 14.692882] dump_stack_lvl+0x73/0xb0 [ 14.692908] print_report+0xd1/0x610 [ 14.692930] ? __virt_addr_valid+0x1db/0x2d0 [ 14.692952] ? kasan_atomics_helper+0x860/0x5450 [ 14.692979] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.693001] ? kasan_atomics_helper+0x860/0x5450 [ 14.693034] kasan_report+0x141/0x180 [ 14.693056] ? kasan_atomics_helper+0x860/0x5450 [ 14.693082] kasan_check_range+0x10c/0x1c0 [ 14.693105] __kasan_check_write+0x18/0x20 [ 14.693125] kasan_atomics_helper+0x860/0x5450 [ 14.693147] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.693169] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.693194] ? kasan_atomics+0x152/0x310 [ 14.693220] kasan_atomics+0x1dc/0x310 [ 14.693243] ? __pfx_kasan_atomics+0x10/0x10 [ 14.693267] ? __pfx_read_tsc+0x10/0x10 [ 14.693287] ? ktime_get_ts64+0x86/0x230 [ 14.693311] kunit_try_run_case+0x1a5/0x480 [ 14.693334] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.693532] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.693560] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.693585] ? __kthread_parkme+0x82/0x180 [ 14.693605] ? preempt_count_sub+0x50/0x80 [ 14.693627] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.693651] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.693676] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.693700] kthread+0x337/0x6f0 [ 14.693719] ? trace_preempt_on+0x20/0xc0 [ 14.693741] ? __pfx_kthread+0x10/0x10 [ 14.693762] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.693783] ? calculate_sigpending+0x7b/0xa0 [ 14.693807] ? __pfx_kthread+0x10/0x10 [ 14.693829] ret_from_fork+0x116/0x1d0 [ 14.693848] ? __pfx_kthread+0x10/0x10 [ 14.693868] ret_from_fork_asm+0x1a/0x30 [ 14.693899] </TASK> [ 14.693909] [ 14.701886] Allocated by task 283: [ 14.702060] kasan_save_stack+0x45/0x70 [ 14.702259] kasan_save_track+0x18/0x40 [ 14.702541] kasan_save_alloc_info+0x3b/0x50 [ 14.702755] __kasan_kmalloc+0xb7/0xc0 [ 14.702938] __kmalloc_cache_noprof+0x189/0x420 [ 14.703168] kasan_atomics+0x95/0x310 [ 14.703428] kunit_try_run_case+0x1a5/0x480 [ 14.703650] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.703902] kthread+0x337/0x6f0 [ 14.704078] ret_from_fork+0x116/0x1d0 [ 14.704266] ret_from_fork_asm+0x1a/0x30 [ 14.704542] [ 14.704643] The buggy address belongs to the object at ffff8881039b8880 [ 14.704643] which belongs to the cache kmalloc-64 of size 64 [ 14.705163] The buggy address is located 0 bytes to the right of [ 14.705163] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 14.705825] [ 14.705928] The buggy address belongs to the physical page: [ 14.706112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 14.706344] flags: 0x200000000000000(node=0|zone=2) [ 14.706670] page_type: f5(slab) [ 14.706842] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.707194] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.707595] page dumped because: kasan: bad access detected [ 14.707841] [ 14.707915] Memory state around the buggy address: [ 14.708122] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 14.708643] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.708942] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.709233] ^ [ 14.709628] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.709853] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.710115] ================================================================== [ 15.346152] ================================================================== [ 15.346780] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 15.347060] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 15.347495] [ 15.347613] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.347689] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.347702] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.347723] Call Trace: [ 15.347738] <TASK> [ 15.347752] dump_stack_lvl+0x73/0xb0 [ 15.347809] print_report+0xd1/0x610 [ 15.347832] ? __virt_addr_valid+0x1db/0x2d0 [ 15.347854] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.347875] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.347898] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.347919] kasan_report+0x141/0x180 [ 15.347942] ? kasan_atomics_helper+0x16e7/0x5450 [ 15.347995] kasan_check_range+0x10c/0x1c0 [ 15.348028] __kasan_check_write+0x18/0x20 [ 15.348048] kasan_atomics_helper+0x16e7/0x5450 [ 15.348070] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.348092] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.348117] ? kasan_atomics+0x152/0x310 [ 15.348143] kasan_atomics+0x1dc/0x310 [ 15.348166] ? __pfx_kasan_atomics+0x10/0x10 [ 15.348190] ? __pfx_read_tsc+0x10/0x10 [ 15.348211] ? ktime_get_ts64+0x86/0x230 [ 15.348235] kunit_try_run_case+0x1a5/0x480 [ 15.348261] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.348283] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.348306] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.348330] ? __kthread_parkme+0x82/0x180 [ 15.348350] ? preempt_count_sub+0x50/0x80 [ 15.348595] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.348621] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.348645] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.348669] kthread+0x337/0x6f0 [ 15.348689] ? trace_preempt_on+0x20/0xc0 [ 15.348712] ? __pfx_kthread+0x10/0x10 [ 15.348733] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.348756] ? calculate_sigpending+0x7b/0xa0 [ 15.348780] ? __pfx_kthread+0x10/0x10 [ 15.348801] ret_from_fork+0x116/0x1d0 [ 15.348819] ? __pfx_kthread+0x10/0x10 [ 15.348840] ret_from_fork_asm+0x1a/0x30 [ 15.348871] </TASK> [ 15.348882] [ 15.357948] Allocated by task 283: [ 15.358182] kasan_save_stack+0x45/0x70 [ 15.358687] kasan_save_track+0x18/0x40 [ 15.358890] kasan_save_alloc_info+0x3b/0x50 [ 15.359077] __kasan_kmalloc+0xb7/0xc0 [ 15.359213] __kmalloc_cache_noprof+0x189/0x420 [ 15.359429] kasan_atomics+0x95/0x310 [ 15.359613] kunit_try_run_case+0x1a5/0x480 [ 15.360048] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.360255] kthread+0x337/0x6f0 [ 15.360584] ret_from_fork+0x116/0x1d0 [ 15.360784] ret_from_fork_asm+0x1a/0x30 [ 15.361215] [ 15.361321] The buggy address belongs to the object at ffff8881039b8880 [ 15.361321] which belongs to the cache kmalloc-64 of size 64 [ 15.361958] The buggy address is located 0 bytes to the right of [ 15.361958] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 15.362639] [ 15.362730] The buggy address belongs to the physical page: [ 15.362997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.363365] flags: 0x200000000000000(node=0|zone=2) [ 15.363572] page_type: f5(slab) [ 15.363730] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.363962] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.364269] page dumped because: kasan: bad access detected [ 15.364651] [ 15.364829] Memory state around the buggy address: [ 15.365404] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.365817] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.366160] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.366393] ^ [ 15.366550] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.366852] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.367239] ================================================================== [ 15.520140] ================================================================== [ 15.520588] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 15.521045] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 15.521448] [ 15.521564] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.521607] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.521620] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.521642] Call Trace: [ 15.521656] <TASK> [ 15.521670] dump_stack_lvl+0x73/0xb0 [ 15.521698] print_report+0xd1/0x610 [ 15.521719] ? __virt_addr_valid+0x1db/0x2d0 [ 15.521767] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.521788] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.521811] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.521832] kasan_report+0x141/0x180 [ 15.521854] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.521881] kasan_check_range+0x10c/0x1c0 [ 15.521921] __kasan_check_write+0x18/0x20 [ 15.521942] kasan_atomics_helper+0x1b22/0x5450 [ 15.521965] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.521987] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.522021] ? kasan_atomics+0x152/0x310 [ 15.522048] kasan_atomics+0x1dc/0x310 [ 15.522070] ? __pfx_kasan_atomics+0x10/0x10 [ 15.522095] ? __pfx_read_tsc+0x10/0x10 [ 15.522115] ? ktime_get_ts64+0x86/0x230 [ 15.522138] kunit_try_run_case+0x1a5/0x480 [ 15.522162] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.522185] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.522208] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.522231] ? __kthread_parkme+0x82/0x180 [ 15.522251] ? preempt_count_sub+0x50/0x80 [ 15.522274] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.522298] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.522322] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.522345] kthread+0x337/0x6f0 [ 15.522364] ? trace_preempt_on+0x20/0xc0 [ 15.522591] ? __pfx_kthread+0x10/0x10 [ 15.522613] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.522635] ? calculate_sigpending+0x7b/0xa0 [ 15.522658] ? __pfx_kthread+0x10/0x10 [ 15.522680] ret_from_fork+0x116/0x1d0 [ 15.522698] ? __pfx_kthread+0x10/0x10 [ 15.522720] ret_from_fork_asm+0x1a/0x30 [ 15.522749] </TASK> [ 15.522761] [ 15.531367] Allocated by task 283: [ 15.531608] kasan_save_stack+0x45/0x70 [ 15.531757] kasan_save_track+0x18/0x40 [ 15.531893] kasan_save_alloc_info+0x3b/0x50 [ 15.532055] __kasan_kmalloc+0xb7/0xc0 [ 15.532259] __kmalloc_cache_noprof+0x189/0x420 [ 15.532479] kasan_atomics+0x95/0x310 [ 15.532666] kunit_try_run_case+0x1a5/0x480 [ 15.532873] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.533211] kthread+0x337/0x6f0 [ 15.533332] ret_from_fork+0x116/0x1d0 [ 15.533464] ret_from_fork_asm+0x1a/0x30 [ 15.533940] [ 15.534059] The buggy address belongs to the object at ffff8881039b8880 [ 15.534059] which belongs to the cache kmalloc-64 of size 64 [ 15.534621] The buggy address is located 0 bytes to the right of [ 15.534621] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 15.535275] [ 15.535355] The buggy address belongs to the physical page: [ 15.535530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.535774] flags: 0x200000000000000(node=0|zone=2) [ 15.536013] page_type: f5(slab) [ 15.536180] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.536525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.537385] page dumped because: kasan: bad access detected [ 15.537654] [ 15.537729] Memory state around the buggy address: [ 15.537887] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.538126] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.538545] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.539099] ^ [ 15.539423] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.539762] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.540113] ================================================================== [ 15.261831] ================================================================== [ 15.262480] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 15.262920] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 15.263274] [ 15.263367] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.263761] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.263774] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.263796] Call Trace: [ 15.263811] <TASK> [ 15.263826] dump_stack_lvl+0x73/0xb0 [ 15.263855] print_report+0xd1/0x610 [ 15.263877] ? __virt_addr_valid+0x1db/0x2d0 [ 15.263899] ? kasan_atomics_helper+0x151d/0x5450 [ 15.263920] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.263942] ? kasan_atomics_helper+0x151d/0x5450 [ 15.263964] kasan_report+0x141/0x180 [ 15.263985] ? kasan_atomics_helper+0x151d/0x5450 [ 15.264025] kasan_check_range+0x10c/0x1c0 [ 15.264049] __kasan_check_write+0x18/0x20 [ 15.264068] kasan_atomics_helper+0x151d/0x5450 [ 15.264092] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.264114] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.264139] ? kasan_atomics+0x152/0x310 [ 15.264165] kasan_atomics+0x1dc/0x310 [ 15.264187] ? __pfx_kasan_atomics+0x10/0x10 [ 15.264211] ? __pfx_read_tsc+0x10/0x10 [ 15.264233] ? ktime_get_ts64+0x86/0x230 [ 15.264257] kunit_try_run_case+0x1a5/0x480 [ 15.264281] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.264303] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.264326] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.264351] ? __kthread_parkme+0x82/0x180 [ 15.264384] ? preempt_count_sub+0x50/0x80 [ 15.264407] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.264444] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.264468] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.264491] kthread+0x337/0x6f0 [ 15.264511] ? trace_preempt_on+0x20/0xc0 [ 15.264534] ? __pfx_kthread+0x10/0x10 [ 15.264554] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.264576] ? calculate_sigpending+0x7b/0xa0 [ 15.264599] ? __pfx_kthread+0x10/0x10 [ 15.264621] ret_from_fork+0x116/0x1d0 [ 15.264640] ? __pfx_kthread+0x10/0x10 [ 15.264660] ret_from_fork_asm+0x1a/0x30 [ 15.264690] </TASK> [ 15.264701] [ 15.277043] Allocated by task 283: [ 15.277509] kasan_save_stack+0x45/0x70 [ 15.278150] kasan_save_track+0x18/0x40 [ 15.278332] kasan_save_alloc_info+0x3b/0x50 [ 15.278974] __kasan_kmalloc+0xb7/0xc0 [ 15.279174] __kmalloc_cache_noprof+0x189/0x420 [ 15.279386] kasan_atomics+0x95/0x310 [ 15.279875] kunit_try_run_case+0x1a5/0x480 [ 15.280161] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.280632] kthread+0x337/0x6f0 [ 15.280915] ret_from_fork+0x116/0x1d0 [ 15.281222] ret_from_fork_asm+0x1a/0x30 [ 15.281567] [ 15.281976] The buggy address belongs to the object at ffff8881039b8880 [ 15.281976] which belongs to the cache kmalloc-64 of size 64 [ 15.282481] The buggy address is located 0 bytes to the right of [ 15.282481] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 15.283374] [ 15.283832] The buggy address belongs to the physical page: [ 15.284084] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.284656] flags: 0x200000000000000(node=0|zone=2) [ 15.284991] page_type: f5(slab) [ 15.285288] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.286025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.286340] page dumped because: kasan: bad access detected [ 15.286832] [ 15.286945] Memory state around the buggy address: [ 15.287181] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.287776] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.288161] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.288674] ^ [ 15.289023] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.289486] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.290093] ================================================================== [ 15.683965] ================================================================== [ 15.684233] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 15.684532] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 15.684866] [ 15.684982] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.685035] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.685049] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.685070] Call Trace: [ 15.685085] <TASK> [ 15.685098] dump_stack_lvl+0x73/0xb0 [ 15.685124] print_report+0xd1/0x610 [ 15.685146] ? __virt_addr_valid+0x1db/0x2d0 [ 15.685167] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.685188] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.685209] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.685231] kasan_report+0x141/0x180 [ 15.685252] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.685278] kasan_check_range+0x10c/0x1c0 [ 15.685301] __kasan_check_write+0x18/0x20 [ 15.685320] kasan_atomics_helper+0x1f43/0x5450 [ 15.685342] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.685364] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.685388] ? kasan_atomics+0x152/0x310 [ 15.685414] kasan_atomics+0x1dc/0x310 [ 15.685436] ? __pfx_kasan_atomics+0x10/0x10 [ 15.685459] ? __pfx_read_tsc+0x10/0x10 [ 15.685480] ? ktime_get_ts64+0x86/0x230 [ 15.685503] kunit_try_run_case+0x1a5/0x480 [ 15.685526] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.685549] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.685572] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.685594] ? __kthread_parkme+0x82/0x180 [ 15.685614] ? preempt_count_sub+0x50/0x80 [ 15.685637] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.685661] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.685684] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.685707] kthread+0x337/0x6f0 [ 15.685726] ? trace_preempt_on+0x20/0xc0 [ 15.685748] ? __pfx_kthread+0x10/0x10 [ 15.685769] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.685791] ? calculate_sigpending+0x7b/0xa0 [ 15.685814] ? __pfx_kthread+0x10/0x10 [ 15.685835] ret_from_fork+0x116/0x1d0 [ 15.685853] ? __pfx_kthread+0x10/0x10 [ 15.685873] ret_from_fork_asm+0x1a/0x30 [ 15.685902] </TASK> [ 15.685913] [ 15.694153] Allocated by task 283: [ 15.694287] kasan_save_stack+0x45/0x70 [ 15.694559] kasan_save_track+0x18/0x40 [ 15.694756] kasan_save_alloc_info+0x3b/0x50 [ 15.694965] __kasan_kmalloc+0xb7/0xc0 [ 15.695166] __kmalloc_cache_noprof+0x189/0x420 [ 15.695463] kasan_atomics+0x95/0x310 [ 15.695657] kunit_try_run_case+0x1a5/0x480 [ 15.695865] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.696122] kthread+0x337/0x6f0 [ 15.696243] ret_from_fork+0x116/0x1d0 [ 15.696504] ret_from_fork_asm+0x1a/0x30 [ 15.696703] [ 15.696785] The buggy address belongs to the object at ffff8881039b8880 [ 15.696785] which belongs to the cache kmalloc-64 of size 64 [ 15.697273] The buggy address is located 0 bytes to the right of [ 15.697273] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 15.697961] [ 15.698066] The buggy address belongs to the physical page: [ 15.698300] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.698701] flags: 0x200000000000000(node=0|zone=2) [ 15.698910] page_type: f5(slab) [ 15.699092] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.699481] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.699787] page dumped because: kasan: bad access detected [ 15.699961] [ 15.700042] Memory state around the buggy address: [ 15.700196] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.700509] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.700830] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.701168] ^ [ 15.701599] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.701907] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.702136] ================================================================== [ 14.765784] ================================================================== [ 14.766085] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 14.766476] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 14.766710] [ 14.766797] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.766838] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.766853] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.766874] Call Trace: [ 14.766890] <TASK> [ 14.766904] dump_stack_lvl+0x73/0xb0 [ 14.766932] print_report+0xd1/0x610 [ 14.766953] ? __virt_addr_valid+0x1db/0x2d0 [ 14.766975] ? kasan_atomics_helper+0xac7/0x5450 [ 14.766996] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.767030] ? kasan_atomics_helper+0xac7/0x5450 [ 14.767052] kasan_report+0x141/0x180 [ 14.767074] ? kasan_atomics_helper+0xac7/0x5450 [ 14.767100] kasan_check_range+0x10c/0x1c0 [ 14.767123] __kasan_check_write+0x18/0x20 [ 14.767142] kasan_atomics_helper+0xac7/0x5450 [ 14.767165] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.767186] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.767211] ? kasan_atomics+0x152/0x310 [ 14.767237] kasan_atomics+0x1dc/0x310 [ 14.767259] ? __pfx_kasan_atomics+0x10/0x10 [ 14.767283] ? __pfx_read_tsc+0x10/0x10 [ 14.767306] ? ktime_get_ts64+0x86/0x230 [ 14.767330] kunit_try_run_case+0x1a5/0x480 [ 14.767431] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.767457] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.767481] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.767505] ? __kthread_parkme+0x82/0x180 [ 14.767525] ? preempt_count_sub+0x50/0x80 [ 14.767549] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.767573] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.767596] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.767619] kthread+0x337/0x6f0 [ 14.767638] ? trace_preempt_on+0x20/0xc0 [ 14.767661] ? __pfx_kthread+0x10/0x10 [ 14.767682] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.767703] ? calculate_sigpending+0x7b/0xa0 [ 14.767727] ? __pfx_kthread+0x10/0x10 [ 14.767749] ret_from_fork+0x116/0x1d0 [ 14.767768] ? __pfx_kthread+0x10/0x10 [ 14.767788] ret_from_fork_asm+0x1a/0x30 [ 14.767818] </TASK> [ 14.767828] [ 14.776160] Allocated by task 283: [ 14.776344] kasan_save_stack+0x45/0x70 [ 14.776621] kasan_save_track+0x18/0x40 [ 14.776809] kasan_save_alloc_info+0x3b/0x50 [ 14.777036] __kasan_kmalloc+0xb7/0xc0 [ 14.777206] __kmalloc_cache_noprof+0x189/0x420 [ 14.777602] kasan_atomics+0x95/0x310 [ 14.777763] kunit_try_run_case+0x1a5/0x480 [ 14.777971] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.778166] kthread+0x337/0x6f0 [ 14.778290] ret_from_fork+0x116/0x1d0 [ 14.778520] ret_from_fork_asm+0x1a/0x30 [ 14.778667] [ 14.778740] The buggy address belongs to the object at ffff8881039b8880 [ 14.778740] which belongs to the cache kmalloc-64 of size 64 [ 14.779292] The buggy address is located 0 bytes to the right of [ 14.779292] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 14.779864] [ 14.779964] The buggy address belongs to the physical page: [ 14.780328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 14.780756] flags: 0x200000000000000(node=0|zone=2) [ 14.781015] page_type: f5(slab) [ 14.781189] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.781738] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.781976] page dumped because: kasan: bad access detected [ 14.782162] [ 14.782234] Memory state around the buggy address: [ 14.782479] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 14.782806] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.783137] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.783534] ^ [ 14.783769] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.784026] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.784242] ================================================================== [ 14.891232] ================================================================== [ 14.891630] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 14.891926] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 14.892260] [ 14.892557] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.892603] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.892615] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.892636] Call Trace: [ 14.892650] <TASK> [ 14.892665] dump_stack_lvl+0x73/0xb0 [ 14.892692] print_report+0xd1/0x610 [ 14.892715] ? __virt_addr_valid+0x1db/0x2d0 [ 14.892737] ? kasan_atomics_helper+0xe78/0x5450 [ 14.892758] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.892780] ? kasan_atomics_helper+0xe78/0x5450 [ 14.892802] kasan_report+0x141/0x180 [ 14.892824] ? kasan_atomics_helper+0xe78/0x5450 [ 14.892850] kasan_check_range+0x10c/0x1c0 [ 14.892873] __kasan_check_write+0x18/0x20 [ 14.892893] kasan_atomics_helper+0xe78/0x5450 [ 14.892915] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.892937] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.892961] ? kasan_atomics+0x152/0x310 [ 14.892994] kasan_atomics+0x1dc/0x310 [ 14.893028] ? __pfx_kasan_atomics+0x10/0x10 [ 14.893052] ? __pfx_read_tsc+0x10/0x10 [ 14.893073] ? ktime_get_ts64+0x86/0x230 [ 14.893097] kunit_try_run_case+0x1a5/0x480 [ 14.893121] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.893144] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.893167] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.893190] ? __kthread_parkme+0x82/0x180 [ 14.893211] ? preempt_count_sub+0x50/0x80 [ 14.893234] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.893257] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.893281] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.893305] kthread+0x337/0x6f0 [ 14.893323] ? trace_preempt_on+0x20/0xc0 [ 14.893450] ? __pfx_kthread+0x10/0x10 [ 14.893476] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.893499] ? calculate_sigpending+0x7b/0xa0 [ 14.893523] ? __pfx_kthread+0x10/0x10 [ 14.893545] ret_from_fork+0x116/0x1d0 [ 14.893564] ? __pfx_kthread+0x10/0x10 [ 14.893584] ret_from_fork_asm+0x1a/0x30 [ 14.893615] </TASK> [ 14.893626] [ 14.901663] Allocated by task 283: [ 14.901810] kasan_save_stack+0x45/0x70 [ 14.901952] kasan_save_track+0x18/0x40 [ 14.902099] kasan_save_alloc_info+0x3b/0x50 [ 14.902250] __kasan_kmalloc+0xb7/0xc0 [ 14.902460] __kmalloc_cache_noprof+0x189/0x420 [ 14.902623] kasan_atomics+0x95/0x310 [ 14.902758] kunit_try_run_case+0x1a5/0x480 [ 14.902968] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.903230] kthread+0x337/0x6f0 [ 14.903479] ret_from_fork+0x116/0x1d0 [ 14.903673] ret_from_fork_asm+0x1a/0x30 [ 14.903876] [ 14.903971] The buggy address belongs to the object at ffff8881039b8880 [ 14.903971] which belongs to the cache kmalloc-64 of size 64 [ 14.904723] The buggy address is located 0 bytes to the right of [ 14.904723] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 14.905150] [ 14.905249] The buggy address belongs to the physical page: [ 14.905597] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 14.905965] flags: 0x200000000000000(node=0|zone=2) [ 14.906212] page_type: f5(slab) [ 14.906458] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.906757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.907080] page dumped because: kasan: bad access detected [ 14.907304] [ 14.907493] Memory state around the buggy address: [ 14.907693] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 14.907983] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.908276] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.908773] ^ [ 14.908994] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.909291] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.909703] ================================================================== [ 14.747065] ================================================================== [ 14.747492] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 14.747779] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 14.748028] [ 14.748122] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.748163] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.748175] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.748195] Call Trace: [ 14.748210] <TASK> [ 14.748223] dump_stack_lvl+0x73/0xb0 [ 14.748248] print_report+0xd1/0x610 [ 14.748270] ? __virt_addr_valid+0x1db/0x2d0 [ 14.748292] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.748313] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.748335] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.748430] kasan_report+0x141/0x180 [ 14.748455] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.748481] kasan_check_range+0x10c/0x1c0 [ 14.748504] __kasan_check_write+0x18/0x20 [ 14.748523] kasan_atomics_helper+0xa2b/0x5450 [ 14.748545] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.748567] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.748591] ? kasan_atomics+0x152/0x310 [ 14.748616] kasan_atomics+0x1dc/0x310 [ 14.748639] ? __pfx_kasan_atomics+0x10/0x10 [ 14.748663] ? __pfx_read_tsc+0x10/0x10 [ 14.748684] ? ktime_get_ts64+0x86/0x230 [ 14.748708] kunit_try_run_case+0x1a5/0x480 [ 14.748732] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.748756] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.748779] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.748803] ? __kthread_parkme+0x82/0x180 [ 14.748824] ? preempt_count_sub+0x50/0x80 [ 14.748847] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.748871] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.748895] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.748918] kthread+0x337/0x6f0 [ 14.748937] ? trace_preempt_on+0x20/0xc0 [ 14.748961] ? __pfx_kthread+0x10/0x10 [ 14.748988] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.749018] ? calculate_sigpending+0x7b/0xa0 [ 14.749041] ? __pfx_kthread+0x10/0x10 [ 14.749062] ret_from_fork+0x116/0x1d0 [ 14.749081] ? __pfx_kthread+0x10/0x10 [ 14.749101] ret_from_fork_asm+0x1a/0x30 [ 14.749132] </TASK> [ 14.749141] [ 14.757031] Allocated by task 283: [ 14.757214] kasan_save_stack+0x45/0x70 [ 14.757625] kasan_save_track+0x18/0x40 [ 14.757821] kasan_save_alloc_info+0x3b/0x50 [ 14.757991] __kasan_kmalloc+0xb7/0xc0 [ 14.758193] __kmalloc_cache_noprof+0x189/0x420 [ 14.758492] kasan_atomics+0x95/0x310 [ 14.758693] kunit_try_run_case+0x1a5/0x480 [ 14.758877] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.759102] kthread+0x337/0x6f0 [ 14.759258] ret_from_fork+0x116/0x1d0 [ 14.759521] ret_from_fork_asm+0x1a/0x30 [ 14.759688] [ 14.759786] The buggy address belongs to the object at ffff8881039b8880 [ 14.759786] which belongs to the cache kmalloc-64 of size 64 [ 14.760277] The buggy address is located 0 bytes to the right of [ 14.760277] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 14.760849] [ 14.760948] The buggy address belongs to the physical page: [ 14.761143] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 14.761579] flags: 0x200000000000000(node=0|zone=2) [ 14.761758] page_type: f5(slab) [ 14.761926] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.762278] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.762727] page dumped because: kasan: bad access detected [ 14.762984] [ 14.763092] Memory state around the buggy address: [ 14.763317] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 14.763627] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.763901] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.764243] ^ [ 14.764550] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.764842] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.765135] ================================================================== [ 15.638136] ================================================================== [ 15.638485] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 15.638931] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 15.639224] [ 15.639308] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.639352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.639364] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.639385] Call Trace: [ 15.639399] <TASK> [ 15.639413] dump_stack_lvl+0x73/0xb0 [ 15.639478] print_report+0xd1/0x610 [ 15.639501] ? __virt_addr_valid+0x1db/0x2d0 [ 15.639523] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.639544] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.639566] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.639588] kasan_report+0x141/0x180 [ 15.639610] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.639636] kasan_check_range+0x10c/0x1c0 [ 15.639660] __kasan_check_write+0x18/0x20 [ 15.639680] kasan_atomics_helper+0x1e12/0x5450 [ 15.639703] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.639726] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.639750] ? kasan_atomics+0x152/0x310 [ 15.639776] kasan_atomics+0x1dc/0x310 [ 15.639801] ? __pfx_kasan_atomics+0x10/0x10 [ 15.639825] ? __pfx_read_tsc+0x10/0x10 [ 15.639846] ? ktime_get_ts64+0x86/0x230 [ 15.639871] kunit_try_run_case+0x1a5/0x480 [ 15.639895] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.639918] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.639974] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.640032] ? __kthread_parkme+0x82/0x180 [ 15.640055] ? preempt_count_sub+0x50/0x80 [ 15.640077] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.640101] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.640124] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.640148] kthread+0x337/0x6f0 [ 15.640167] ? trace_preempt_on+0x20/0xc0 [ 15.640189] ? __pfx_kthread+0x10/0x10 [ 15.640210] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.640231] ? calculate_sigpending+0x7b/0xa0 [ 15.640254] ? __pfx_kthread+0x10/0x10 [ 15.640276] ret_from_fork+0x116/0x1d0 [ 15.640294] ? __pfx_kthread+0x10/0x10 [ 15.640317] ret_from_fork_asm+0x1a/0x30 [ 15.640348] </TASK> [ 15.640358] [ 15.648840] Allocated by task 283: [ 15.649020] kasan_save_stack+0x45/0x70 [ 15.649254] kasan_save_track+0x18/0x40 [ 15.649561] kasan_save_alloc_info+0x3b/0x50 [ 15.649820] __kasan_kmalloc+0xb7/0xc0 [ 15.650031] __kmalloc_cache_noprof+0x189/0x420 [ 15.650256] kasan_atomics+0x95/0x310 [ 15.650530] kunit_try_run_case+0x1a5/0x480 [ 15.650827] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.651091] kthread+0x337/0x6f0 [ 15.651293] ret_from_fork+0x116/0x1d0 [ 15.651550] ret_from_fork_asm+0x1a/0x30 [ 15.651724] [ 15.651794] The buggy address belongs to the object at ffff8881039b8880 [ 15.651794] which belongs to the cache kmalloc-64 of size 64 [ 15.652271] The buggy address is located 0 bytes to the right of [ 15.652271] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 15.652749] [ 15.652821] The buggy address belongs to the physical page: [ 15.652989] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.653230] flags: 0x200000000000000(node=0|zone=2) [ 15.653386] page_type: f5(slab) [ 15.653670] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.654017] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.654765] page dumped because: kasan: bad access detected [ 15.655014] [ 15.655107] Memory state around the buggy address: [ 15.655254] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.655460] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.655666] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.655877] ^ [ 15.656032] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.656704] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.657038] ================================================================== [ 15.821550] ================================================================== [ 15.821898] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 15.822231] Read of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 15.822543] [ 15.822649] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.822712] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.822724] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.822744] Call Trace: [ 15.822758] <TASK> [ 15.822773] dump_stack_lvl+0x73/0xb0 [ 15.822800] print_report+0xd1/0x610 [ 15.822822] ? __virt_addr_valid+0x1db/0x2d0 [ 15.822843] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.822886] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.822908] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.822929] kasan_report+0x141/0x180 [ 15.822951] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.822978] __asan_report_load8_noabort+0x18/0x20 [ 15.823002] kasan_atomics_helper+0x4fa5/0x5450 [ 15.823035] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.823057] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.823080] ? kasan_atomics+0x152/0x310 [ 15.823106] kasan_atomics+0x1dc/0x310 [ 15.823129] ? __pfx_kasan_atomics+0x10/0x10 [ 15.823153] ? __pfx_read_tsc+0x10/0x10 [ 15.823173] ? ktime_get_ts64+0x86/0x230 [ 15.823196] kunit_try_run_case+0x1a5/0x480 [ 15.823220] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.823242] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.823265] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.823289] ? __kthread_parkme+0x82/0x180 [ 15.823309] ? preempt_count_sub+0x50/0x80 [ 15.823332] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.823356] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.823399] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.823424] kthread+0x337/0x6f0 [ 15.823443] ? trace_preempt_on+0x20/0xc0 [ 15.823466] ? __pfx_kthread+0x10/0x10 [ 15.823486] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.823509] ? calculate_sigpending+0x7b/0xa0 [ 15.823532] ? __pfx_kthread+0x10/0x10 [ 15.823554] ret_from_fork+0x116/0x1d0 [ 15.823572] ? __pfx_kthread+0x10/0x10 [ 15.823613] ret_from_fork_asm+0x1a/0x30 [ 15.823644] </TASK> [ 15.823654] [ 15.830752] Allocated by task 283: [ 15.830934] kasan_save_stack+0x45/0x70 [ 15.831138] kasan_save_track+0x18/0x40 [ 15.831331] kasan_save_alloc_info+0x3b/0x50 [ 15.831506] __kasan_kmalloc+0xb7/0xc0 [ 15.831639] __kmalloc_cache_noprof+0x189/0x420 [ 15.831794] kasan_atomics+0x95/0x310 [ 15.831927] kunit_try_run_case+0x1a5/0x480 [ 15.832116] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.832371] kthread+0x337/0x6f0 [ 15.832560] ret_from_fork+0x116/0x1d0 [ 15.832752] ret_from_fork_asm+0x1a/0x30 [ 15.832955] [ 15.833068] The buggy address belongs to the object at ffff8881039b8880 [ 15.833068] which belongs to the cache kmalloc-64 of size 64 [ 15.833659] The buggy address is located 0 bytes to the right of [ 15.833659] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 15.834232] [ 15.834307] The buggy address belongs to the physical page: [ 15.834503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.834744] flags: 0x200000000000000(node=0|zone=2) [ 15.834934] page_type: f5(slab) [ 15.835110] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.835517] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.835872] page dumped because: kasan: bad access detected [ 15.836137] [ 15.836251] Memory state around the buggy address: [ 15.836484] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.836787] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.837103] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.837410] ^ [ 15.837628] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.837862] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.838118] ================================================================== [ 14.872427] ================================================================== [ 14.872840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 14.873215] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 14.873537] [ 14.873652] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.873694] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.873706] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.873728] Call Trace: [ 14.873743] <TASK> [ 14.873759] dump_stack_lvl+0x73/0xb0 [ 14.873785] print_report+0xd1/0x610 [ 14.873807] ? __virt_addr_valid+0x1db/0x2d0 [ 14.873828] ? kasan_atomics_helper+0xde0/0x5450 [ 14.873853] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.873875] ? kasan_atomics_helper+0xde0/0x5450 [ 14.873905] kasan_report+0x141/0x180 [ 14.873927] ? kasan_atomics_helper+0xde0/0x5450 [ 14.873954] kasan_check_range+0x10c/0x1c0 [ 14.873978] __kasan_check_write+0x18/0x20 [ 14.874023] kasan_atomics_helper+0xde0/0x5450 [ 14.874045] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.874067] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.874092] ? kasan_atomics+0x152/0x310 [ 14.874118] kasan_atomics+0x1dc/0x310 [ 14.874141] ? __pfx_kasan_atomics+0x10/0x10 [ 14.874165] ? __pfx_read_tsc+0x10/0x10 [ 14.874186] ? ktime_get_ts64+0x86/0x230 [ 14.874210] kunit_try_run_case+0x1a5/0x480 [ 14.874235] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.874257] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.874280] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.874304] ? __kthread_parkme+0x82/0x180 [ 14.874325] ? preempt_count_sub+0x50/0x80 [ 14.874348] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.874373] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.874404] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.874428] kthread+0x337/0x6f0 [ 14.874448] ? trace_preempt_on+0x20/0xc0 [ 14.874471] ? __pfx_kthread+0x10/0x10 [ 14.874492] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.874513] ? calculate_sigpending+0x7b/0xa0 [ 14.874537] ? __pfx_kthread+0x10/0x10 [ 14.874558] ret_from_fork+0x116/0x1d0 [ 14.874577] ? __pfx_kthread+0x10/0x10 [ 14.874597] ret_from_fork_asm+0x1a/0x30 [ 14.874628] </TASK> [ 14.874638] [ 14.882294] Allocated by task 283: [ 14.882438] kasan_save_stack+0x45/0x70 [ 14.882633] kasan_save_track+0x18/0x40 [ 14.882823] kasan_save_alloc_info+0x3b/0x50 [ 14.883058] __kasan_kmalloc+0xb7/0xc0 [ 14.883245] __kmalloc_cache_noprof+0x189/0x420 [ 14.883465] kasan_atomics+0x95/0x310 [ 14.883651] kunit_try_run_case+0x1a5/0x480 [ 14.883857] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.884669] kthread+0x337/0x6f0 [ 14.884845] ret_from_fork+0x116/0x1d0 [ 14.885035] ret_from_fork_asm+0x1a/0x30 [ 14.885209] [ 14.885281] The buggy address belongs to the object at ffff8881039b8880 [ 14.885281] which belongs to the cache kmalloc-64 of size 64 [ 14.885734] The buggy address is located 0 bytes to the right of [ 14.885734] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 14.886123] [ 14.886227] The buggy address belongs to the physical page: [ 14.886570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 14.886926] flags: 0x200000000000000(node=0|zone=2) [ 14.887165] page_type: f5(slab) [ 14.887333] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.887775] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.888130] page dumped because: kasan: bad access detected [ 14.888586] [ 14.888688] Memory state around the buggy address: [ 14.888920] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 14.889233] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.889600] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.889907] ^ [ 14.890115] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.890474] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.890777] ================================================================== [ 15.023965] ================================================================== [ 15.024311] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 15.024585] Read of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 15.024809] [ 15.024889] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.024930] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.024943] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.024964] Call Trace: [ 15.024984] <TASK> [ 15.024997] dump_stack_lvl+0x73/0xb0 [ 15.025045] print_report+0xd1/0x610 [ 15.025067] ? __virt_addr_valid+0x1db/0x2d0 [ 15.025110] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.025133] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.025156] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.025178] kasan_report+0x141/0x180 [ 15.025200] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.025226] __asan_report_load4_noabort+0x18/0x20 [ 15.025251] kasan_atomics_helper+0x4a02/0x5450 [ 15.025273] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.025295] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.025319] ? kasan_atomics+0x152/0x310 [ 15.025364] kasan_atomics+0x1dc/0x310 [ 15.025403] ? __pfx_kasan_atomics+0x10/0x10 [ 15.025427] ? __pfx_read_tsc+0x10/0x10 [ 15.025447] ? ktime_get_ts64+0x86/0x230 [ 15.025471] kunit_try_run_case+0x1a5/0x480 [ 15.025495] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.025517] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.025541] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.025564] ? __kthread_parkme+0x82/0x180 [ 15.025585] ? preempt_count_sub+0x50/0x80 [ 15.025608] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.025632] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.025655] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.025679] kthread+0x337/0x6f0 [ 15.025699] ? trace_preempt_on+0x20/0xc0 [ 15.025720] ? __pfx_kthread+0x10/0x10 [ 15.025742] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.025763] ? calculate_sigpending+0x7b/0xa0 [ 15.025787] ? __pfx_kthread+0x10/0x10 [ 15.025808] ret_from_fork+0x116/0x1d0 [ 15.025827] ? __pfx_kthread+0x10/0x10 [ 15.025847] ret_from_fork_asm+0x1a/0x30 [ 15.025877] </TASK> [ 15.025888] [ 15.034017] Allocated by task 283: [ 15.034236] kasan_save_stack+0x45/0x70 [ 15.034453] kasan_save_track+0x18/0x40 [ 15.034733] kasan_save_alloc_info+0x3b/0x50 [ 15.035074] __kasan_kmalloc+0xb7/0xc0 [ 15.035210] __kmalloc_cache_noprof+0x189/0x420 [ 15.035487] kasan_atomics+0x95/0x310 [ 15.035673] kunit_try_run_case+0x1a5/0x480 [ 15.035838] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.036026] kthread+0x337/0x6f0 [ 15.036261] ret_from_fork+0x116/0x1d0 [ 15.036474] ret_from_fork_asm+0x1a/0x30 [ 15.036770] [ 15.036842] The buggy address belongs to the object at ffff8881039b8880 [ 15.036842] which belongs to the cache kmalloc-64 of size 64 [ 15.037374] The buggy address is located 0 bytes to the right of [ 15.037374] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 15.037771] [ 15.037867] The buggy address belongs to the physical page: [ 15.038127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.038484] flags: 0x200000000000000(node=0|zone=2) [ 15.038704] page_type: f5(slab) [ 15.038852] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.039229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.039641] page dumped because: kasan: bad access detected [ 15.039859] [ 15.040021] Memory state around the buggy address: [ 15.040262] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.040551] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.040849] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.041175] ^ [ 15.041337] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.041553] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.041764] ================================================================== [ 15.862279] ================================================================== [ 15.863383] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 15.864260] Read of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 15.864862] [ 15.864954] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.865004] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.865028] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.865050] Call Trace: [ 15.865065] <TASK> [ 15.865080] dump_stack_lvl+0x73/0xb0 [ 15.865108] print_report+0xd1/0x610 [ 15.865129] ? __virt_addr_valid+0x1db/0x2d0 [ 15.865151] ? kasan_atomics_helper+0x5115/0x5450 [ 15.865173] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.865195] ? kasan_atomics_helper+0x5115/0x5450 [ 15.865216] kasan_report+0x141/0x180 [ 15.865239] ? kasan_atomics_helper+0x5115/0x5450 [ 15.865266] __asan_report_load8_noabort+0x18/0x20 [ 15.865290] kasan_atomics_helper+0x5115/0x5450 [ 15.865313] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.865335] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.865360] ? kasan_atomics+0x152/0x310 [ 15.865386] kasan_atomics+0x1dc/0x310 [ 15.865409] ? __pfx_kasan_atomics+0x10/0x10 [ 15.865433] ? __pfx_read_tsc+0x10/0x10 [ 15.865453] ? ktime_get_ts64+0x86/0x230 [ 15.865478] kunit_try_run_case+0x1a5/0x480 [ 15.865599] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.865623] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.865647] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.865671] ? __kthread_parkme+0x82/0x180 [ 15.865691] ? preempt_count_sub+0x50/0x80 [ 15.865716] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.865741] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.865766] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.865792] kthread+0x337/0x6f0 [ 15.865811] ? trace_preempt_on+0x20/0xc0 [ 15.865835] ? __pfx_kthread+0x10/0x10 [ 15.865858] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.865880] ? calculate_sigpending+0x7b/0xa0 [ 15.865905] ? __pfx_kthread+0x10/0x10 [ 15.865926] ret_from_fork+0x116/0x1d0 [ 15.865945] ? __pfx_kthread+0x10/0x10 [ 15.865966] ret_from_fork_asm+0x1a/0x30 [ 15.865998] </TASK> [ 15.866017] [ 15.873497] Allocated by task 283: [ 15.873685] kasan_save_stack+0x45/0x70 [ 15.873886] kasan_save_track+0x18/0x40 [ 15.874093] kasan_save_alloc_info+0x3b/0x50 [ 15.874318] __kasan_kmalloc+0xb7/0xc0 [ 15.874519] __kmalloc_cache_noprof+0x189/0x420 [ 15.874742] kasan_atomics+0x95/0x310 [ 15.874909] kunit_try_run_case+0x1a5/0x480 [ 15.875088] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.875366] kthread+0x337/0x6f0 [ 15.875562] ret_from_fork+0x116/0x1d0 [ 15.875738] ret_from_fork_asm+0x1a/0x30 [ 15.875941] [ 15.876045] The buggy address belongs to the object at ffff8881039b8880 [ 15.876045] which belongs to the cache kmalloc-64 of size 64 [ 15.876504] The buggy address is located 0 bytes to the right of [ 15.876504] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 15.876869] [ 15.876941] The buggy address belongs to the physical page: [ 15.877131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.877592] flags: 0x200000000000000(node=0|zone=2) [ 15.877855] page_type: f5(slab) [ 15.878042] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.878382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.878630] page dumped because: kasan: bad access detected [ 15.878800] [ 15.878869] Memory state around the buggy address: [ 15.879041] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.879364] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.879723] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.880048] ^ [ 15.880293] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.880573] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.880909] ================================================================== [ 14.672991] ================================================================== [ 14.673337] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 14.673869] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 14.674213] [ 14.674317] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.674396] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.674409] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.674430] Call Trace: [ 14.674443] <TASK> [ 14.674457] dump_stack_lvl+0x73/0xb0 [ 14.674483] print_report+0xd1/0x610 [ 14.674505] ? __virt_addr_valid+0x1db/0x2d0 [ 14.674526] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.674546] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.674569] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.674590] kasan_report+0x141/0x180 [ 14.674612] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.674638] kasan_check_range+0x10c/0x1c0 [ 14.674662] __kasan_check_write+0x18/0x20 [ 14.674681] kasan_atomics_helper+0x7c7/0x5450 [ 14.674704] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.674726] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.674750] ? kasan_atomics+0x152/0x310 [ 14.674776] kasan_atomics+0x1dc/0x310 [ 14.674799] ? __pfx_kasan_atomics+0x10/0x10 [ 14.674823] ? __pfx_read_tsc+0x10/0x10 [ 14.674843] ? ktime_get_ts64+0x86/0x230 [ 14.674867] kunit_try_run_case+0x1a5/0x480 [ 14.674892] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.674914] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.674936] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.674959] ? __kthread_parkme+0x82/0x180 [ 14.674979] ? preempt_count_sub+0x50/0x80 [ 14.675012] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.675036] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.675060] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.675084] kthread+0x337/0x6f0 [ 14.675103] ? trace_preempt_on+0x20/0xc0 [ 14.675126] ? __pfx_kthread+0x10/0x10 [ 14.675146] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.675167] ? calculate_sigpending+0x7b/0xa0 [ 14.675191] ? __pfx_kthread+0x10/0x10 [ 14.675212] ret_from_fork+0x116/0x1d0 [ 14.675231] ? __pfx_kthread+0x10/0x10 [ 14.675251] ret_from_fork_asm+0x1a/0x30 [ 14.675281] </TASK> [ 14.675291] [ 14.683284] Allocated by task 283: [ 14.683498] kasan_save_stack+0x45/0x70 [ 14.683648] kasan_save_track+0x18/0x40 [ 14.683801] kasan_save_alloc_info+0x3b/0x50 [ 14.684027] __kasan_kmalloc+0xb7/0xc0 [ 14.684216] __kmalloc_cache_noprof+0x189/0x420 [ 14.684543] kasan_atomics+0x95/0x310 [ 14.684739] kunit_try_run_case+0x1a5/0x480 [ 14.684952] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.685225] kthread+0x337/0x6f0 [ 14.685586] ret_from_fork+0x116/0x1d0 [ 14.685790] ret_from_fork_asm+0x1a/0x30 [ 14.685975] [ 14.686078] The buggy address belongs to the object at ffff8881039b8880 [ 14.686078] which belongs to the cache kmalloc-64 of size 64 [ 14.686631] The buggy address is located 0 bytes to the right of [ 14.686631] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 14.687133] [ 14.687218] The buggy address belongs to the physical page: [ 14.687502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 14.687826] flags: 0x200000000000000(node=0|zone=2) [ 14.688074] page_type: f5(slab) [ 14.688199] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.688508] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.688740] page dumped because: kasan: bad access detected [ 14.689013] [ 14.689107] Memory state around the buggy address: [ 14.689329] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 14.689840] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.690179] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.690587] ^ [ 14.690781] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.691068] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.691286] ================================================================== [ 14.987923] ================================================================== [ 14.988249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 14.988577] Read of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 14.988803] [ 14.988884] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.988923] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.988935] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.988955] Call Trace: [ 14.988974] <TASK> [ 14.988988] dump_stack_lvl+0x73/0xb0 [ 14.989024] print_report+0xd1/0x610 [ 14.989046] ? __virt_addr_valid+0x1db/0x2d0 [ 14.989071] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.989092] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.989115] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.989166] kasan_report+0x141/0x180 [ 14.989188] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.989215] __asan_report_load4_noabort+0x18/0x20 [ 14.989239] kasan_atomics_helper+0x4a1c/0x5450 [ 14.989263] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.989285] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.989310] ? kasan_atomics+0x152/0x310 [ 14.989337] kasan_atomics+0x1dc/0x310 [ 14.989368] ? __pfx_kasan_atomics+0x10/0x10 [ 14.989392] ? __pfx_read_tsc+0x10/0x10 [ 14.989412] ? ktime_get_ts64+0x86/0x230 [ 14.989436] kunit_try_run_case+0x1a5/0x480 [ 14.989460] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.989482] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.989506] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.989529] ? __kthread_parkme+0x82/0x180 [ 14.989550] ? preempt_count_sub+0x50/0x80 [ 14.989573] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.989598] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.989621] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.989645] kthread+0x337/0x6f0 [ 14.989664] ? trace_preempt_on+0x20/0xc0 [ 14.989687] ? __pfx_kthread+0x10/0x10 [ 14.989708] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.989729] ? calculate_sigpending+0x7b/0xa0 [ 14.989752] ? __pfx_kthread+0x10/0x10 [ 14.989774] ret_from_fork+0x116/0x1d0 [ 14.989793] ? __pfx_kthread+0x10/0x10 [ 14.989814] ret_from_fork_asm+0x1a/0x30 [ 14.989843] </TASK> [ 14.989853] [ 14.997802] Allocated by task 283: [ 14.997953] kasan_save_stack+0x45/0x70 [ 14.998174] kasan_save_track+0x18/0x40 [ 14.998361] kasan_save_alloc_info+0x3b/0x50 [ 14.998584] __kasan_kmalloc+0xb7/0xc0 [ 14.998718] __kmalloc_cache_noprof+0x189/0x420 [ 14.998874] kasan_atomics+0x95/0x310 [ 14.999016] kunit_try_run_case+0x1a5/0x480 [ 14.999224] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.999517] kthread+0x337/0x6f0 [ 14.999685] ret_from_fork+0x116/0x1d0 [ 14.999871] ret_from_fork_asm+0x1a/0x30 [ 15.000155] [ 15.000268] The buggy address belongs to the object at ffff8881039b8880 [ 15.000268] which belongs to the cache kmalloc-64 of size 64 [ 15.000810] The buggy address is located 0 bytes to the right of [ 15.000810] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 15.001385] [ 15.001483] The buggy address belongs to the physical page: [ 15.001703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.002000] flags: 0x200000000000000(node=0|zone=2) [ 15.002208] page_type: f5(slab) [ 15.002364] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.002671] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.002966] page dumped because: kasan: bad access detected [ 15.003221] [ 15.003305] Memory state around the buggy address: [ 15.003484] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.003791] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.004074] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.004288] ^ [ 15.004636] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.004982] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.005255] ================================================================== [ 15.152342] ================================================================== [ 15.153084] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 15.153367] Read of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 15.153862] [ 15.153971] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.154179] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.154245] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.154267] Call Trace: [ 15.154281] <TASK> [ 15.154295] dump_stack_lvl+0x73/0xb0 [ 15.154324] print_report+0xd1/0x610 [ 15.154346] ? __virt_addr_valid+0x1db/0x2d0 [ 15.154562] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.154590] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.154612] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.154634] kasan_report+0x141/0x180 [ 15.154657] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.154683] kasan_check_range+0x10c/0x1c0 [ 15.154707] __kasan_check_read+0x15/0x20 [ 15.154725] kasan_atomics_helper+0x13b5/0x5450 [ 15.154748] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.154770] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.154794] ? kasan_atomics+0x152/0x310 [ 15.154820] kasan_atomics+0x1dc/0x310 [ 15.154842] ? __pfx_kasan_atomics+0x10/0x10 [ 15.154866] ? __pfx_read_tsc+0x10/0x10 [ 15.154886] ? ktime_get_ts64+0x86/0x230 [ 15.154912] kunit_try_run_case+0x1a5/0x480 [ 15.154935] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.154958] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.154980] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.155016] ? __kthread_parkme+0x82/0x180 [ 15.155037] ? preempt_count_sub+0x50/0x80 [ 15.155061] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.155086] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.155109] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.155133] kthread+0x337/0x6f0 [ 15.155151] ? trace_preempt_on+0x20/0xc0 [ 15.155174] ? __pfx_kthread+0x10/0x10 [ 15.155194] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.155216] ? calculate_sigpending+0x7b/0xa0 [ 15.155239] ? __pfx_kthread+0x10/0x10 [ 15.155260] ret_from_fork+0x116/0x1d0 [ 15.155279] ? __pfx_kthread+0x10/0x10 [ 15.155299] ret_from_fork_asm+0x1a/0x30 [ 15.155329] </TASK> [ 15.155339] [ 15.166394] Allocated by task 283: [ 15.166792] kasan_save_stack+0x45/0x70 [ 15.167080] kasan_save_track+0x18/0x40 [ 15.167237] kasan_save_alloc_info+0x3b/0x50 [ 15.167458] __kasan_kmalloc+0xb7/0xc0 [ 15.167917] __kmalloc_cache_noprof+0x189/0x420 [ 15.168160] kasan_atomics+0x95/0x310 [ 15.168338] kunit_try_run_case+0x1a5/0x480 [ 15.168864] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.169096] kthread+0x337/0x6f0 [ 15.169497] ret_from_fork+0x116/0x1d0 [ 15.169685] ret_from_fork_asm+0x1a/0x30 [ 15.169867] [ 15.169950] The buggy address belongs to the object at ffff8881039b8880 [ 15.169950] which belongs to the cache kmalloc-64 of size 64 [ 15.170488] The buggy address is located 0 bytes to the right of [ 15.170488] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 15.171348] [ 15.171627] The buggy address belongs to the physical page: [ 15.172161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.172658] flags: 0x200000000000000(node=0|zone=2) [ 15.172960] page_type: f5(slab) [ 15.173107] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.173615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.173896] page dumped because: kasan: bad access detected [ 15.174164] [ 15.174263] Memory state around the buggy address: [ 15.174432] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.174749] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.175042] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.175328] ^ [ 15.176138] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.176494] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.177104] ================================================================== [ 14.505522] ================================================================== [ 14.506216] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 14.506913] Read of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 14.507519] [ 14.507679] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.507721] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.507733] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.507755] Call Trace: [ 14.507769] <TASK> [ 14.507782] dump_stack_lvl+0x73/0xb0 [ 14.507810] print_report+0xd1/0x610 [ 14.507832] ? __virt_addr_valid+0x1db/0x2d0 [ 14.507854] ? kasan_atomics_helper+0x3df/0x5450 [ 14.507874] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.507896] ? kasan_atomics_helper+0x3df/0x5450 [ 14.507918] kasan_report+0x141/0x180 [ 14.507939] ? kasan_atomics_helper+0x3df/0x5450 [ 14.507966] kasan_check_range+0x10c/0x1c0 [ 14.507989] __kasan_check_read+0x15/0x20 [ 14.508019] kasan_atomics_helper+0x3df/0x5450 [ 14.508041] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.508064] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.508088] ? kasan_atomics+0x152/0x310 [ 14.508114] kasan_atomics+0x1dc/0x310 [ 14.508136] ? __pfx_kasan_atomics+0x10/0x10 [ 14.508160] ? __pfx_read_tsc+0x10/0x10 [ 14.508182] ? ktime_get_ts64+0x86/0x230 [ 14.508206] kunit_try_run_case+0x1a5/0x480 [ 14.508231] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.508253] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.508278] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.508303] ? __kthread_parkme+0x82/0x180 [ 14.508323] ? preempt_count_sub+0x50/0x80 [ 14.508347] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.508382] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.508406] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.508429] kthread+0x337/0x6f0 [ 14.508449] ? trace_preempt_on+0x20/0xc0 [ 14.508472] ? __pfx_kthread+0x10/0x10 [ 14.508495] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.508527] ? calculate_sigpending+0x7b/0xa0 [ 14.508551] ? __pfx_kthread+0x10/0x10 [ 14.508574] ret_from_fork+0x116/0x1d0 [ 14.508592] ? __pfx_kthread+0x10/0x10 [ 14.508613] ret_from_fork_asm+0x1a/0x30 [ 14.508644] </TASK> [ 14.508654] [ 14.523251] Allocated by task 283: [ 14.523565] kasan_save_stack+0x45/0x70 [ 14.524001] kasan_save_track+0x18/0x40 [ 14.524443] kasan_save_alloc_info+0x3b/0x50 [ 14.524822] __kasan_kmalloc+0xb7/0xc0 [ 14.525224] __kmalloc_cache_noprof+0x189/0x420 [ 14.525624] kasan_atomics+0x95/0x310 [ 14.525772] kunit_try_run_case+0x1a5/0x480 [ 14.526181] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.526789] kthread+0x337/0x6f0 [ 14.526918] ret_from_fork+0x116/0x1d0 [ 14.527275] ret_from_fork_asm+0x1a/0x30 [ 14.527659] [ 14.527816] The buggy address belongs to the object at ffff8881039b8880 [ 14.527816] which belongs to the cache kmalloc-64 of size 64 [ 14.528717] The buggy address is located 0 bytes to the right of [ 14.528717] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 14.529943] [ 14.530036] The buggy address belongs to the physical page: [ 14.530207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 14.530549] flags: 0x200000000000000(node=0|zone=2) [ 14.531468] page_type: f5(slab) [ 14.531789] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.532547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.533211] page dumped because: kasan: bad access detected [ 14.533802] [ 14.533961] Memory state around the buggy address: [ 14.534445] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 14.534778] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.534989] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.535211] ^ [ 14.535374] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.536202] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.537054] ================================================================== [ 15.609703] ================================================================== [ 15.610297] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 15.610977] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 15.611261] [ 15.611347] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.611390] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.611403] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.611425] Call Trace: [ 15.611441] <TASK> [ 15.611456] dump_stack_lvl+0x73/0xb0 [ 15.611485] print_report+0xd1/0x610 [ 15.611507] ? __virt_addr_valid+0x1db/0x2d0 [ 15.611529] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.611550] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.611573] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.611595] kasan_report+0x141/0x180 [ 15.611617] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.611644] kasan_check_range+0x10c/0x1c0 [ 15.611667] __kasan_check_write+0x18/0x20 [ 15.611687] kasan_atomics_helper+0x1d7a/0x5450 [ 15.611709] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.611731] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.611756] ? kasan_atomics+0x152/0x310 [ 15.611782] kasan_atomics+0x1dc/0x310 [ 15.611804] ? __pfx_kasan_atomics+0x10/0x10 [ 15.611828] ? __pfx_read_tsc+0x10/0x10 [ 15.611849] ? ktime_get_ts64+0x86/0x230 [ 15.611872] kunit_try_run_case+0x1a5/0x480 [ 15.611896] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.611918] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.611941] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.611964] ? __kthread_parkme+0x82/0x180 [ 15.611983] ? preempt_count_sub+0x50/0x80 [ 15.612017] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.612041] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.612063] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.612087] kthread+0x337/0x6f0 [ 15.612106] ? trace_preempt_on+0x20/0xc0 [ 15.612128] ? __pfx_kthread+0x10/0x10 [ 15.612148] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.612170] ? calculate_sigpending+0x7b/0xa0 [ 15.612194] ? __pfx_kthread+0x10/0x10 [ 15.612215] ret_from_fork+0x116/0x1d0 [ 15.612233] ? __pfx_kthread+0x10/0x10 [ 15.612254] ret_from_fork_asm+0x1a/0x30 [ 15.612285] </TASK> [ 15.612295] [ 15.625131] Allocated by task 283: [ 15.625328] kasan_save_stack+0x45/0x70 [ 15.625907] kasan_save_track+0x18/0x40 [ 15.626077] kasan_save_alloc_info+0x3b/0x50 [ 15.626505] __kasan_kmalloc+0xb7/0xc0 [ 15.626860] __kmalloc_cache_noprof+0x189/0x420 [ 15.627101] kasan_atomics+0x95/0x310 [ 15.627295] kunit_try_run_case+0x1a5/0x480 [ 15.627811] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.628255] kthread+0x337/0x6f0 [ 15.628587] ret_from_fork+0x116/0x1d0 [ 15.628802] ret_from_fork_asm+0x1a/0x30 [ 15.629207] [ 15.629453] The buggy address belongs to the object at ffff8881039b8880 [ 15.629453] which belongs to the cache kmalloc-64 of size 64 [ 15.630259] The buggy address is located 0 bytes to the right of [ 15.630259] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 15.631030] [ 15.631312] The buggy address belongs to the physical page: [ 15.631640] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.632030] flags: 0x200000000000000(node=0|zone=2) [ 15.632501] page_type: f5(slab) [ 15.632754] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.633193] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.633724] page dumped because: kasan: bad access detected [ 15.634169] [ 15.634271] Memory state around the buggy address: [ 15.634551] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.635138] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.635644] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.636105] ^ [ 15.636317] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.636884] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.637481] ================================================================== [ 15.786239] ================================================================== [ 15.786591] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 15.787345] Read of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 15.787831] [ 15.787943] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.787986] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.787999] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.788032] Call Trace: [ 15.788048] <TASK> [ 15.788062] dump_stack_lvl+0x73/0xb0 [ 15.788089] print_report+0xd1/0x610 [ 15.788112] ? __virt_addr_valid+0x1db/0x2d0 [ 15.788134] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.788155] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.788178] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.788199] kasan_report+0x141/0x180 [ 15.788243] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.788270] __asan_report_load8_noabort+0x18/0x20 [ 15.788295] kasan_atomics_helper+0x4fb2/0x5450 [ 15.788318] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.788340] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.788401] ? kasan_atomics+0x152/0x310 [ 15.788427] kasan_atomics+0x1dc/0x310 [ 15.788449] ? __pfx_kasan_atomics+0x10/0x10 [ 15.788472] ? __pfx_read_tsc+0x10/0x10 [ 15.788493] ? ktime_get_ts64+0x86/0x230 [ 15.788517] kunit_try_run_case+0x1a5/0x480 [ 15.788541] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.788563] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.788586] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.788610] ? __kthread_parkme+0x82/0x180 [ 15.788630] ? preempt_count_sub+0x50/0x80 [ 15.788653] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.788677] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.788701] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.788724] kthread+0x337/0x6f0 [ 15.788761] ? trace_preempt_on+0x20/0xc0 [ 15.788785] ? __pfx_kthread+0x10/0x10 [ 15.788806] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.788828] ? calculate_sigpending+0x7b/0xa0 [ 15.788851] ? __pfx_kthread+0x10/0x10 [ 15.788872] ret_from_fork+0x116/0x1d0 [ 15.788891] ? __pfx_kthread+0x10/0x10 [ 15.788911] ret_from_fork_asm+0x1a/0x30 [ 15.788942] </TASK> [ 15.788952] [ 15.796341] Allocated by task 283: [ 15.796559] kasan_save_stack+0x45/0x70 [ 15.796740] kasan_save_track+0x18/0x40 [ 15.796942] kasan_save_alloc_info+0x3b/0x50 [ 15.797146] __kasan_kmalloc+0xb7/0xc0 [ 15.797332] __kmalloc_cache_noprof+0x189/0x420 [ 15.797562] kasan_atomics+0x95/0x310 [ 15.797746] kunit_try_run_case+0x1a5/0x480 [ 15.797965] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.798204] kthread+0x337/0x6f0 [ 15.798371] ret_from_fork+0x116/0x1d0 [ 15.798531] ret_from_fork_asm+0x1a/0x30 [ 15.798672] [ 15.798744] The buggy address belongs to the object at ffff8881039b8880 [ 15.798744] which belongs to the cache kmalloc-64 of size 64 [ 15.799248] The buggy address is located 0 bytes to the right of [ 15.799248] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 15.799815] [ 15.799901] The buggy address belongs to the physical page: [ 15.800083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.800460] flags: 0x200000000000000(node=0|zone=2) [ 15.800670] page_type: f5(slab) [ 15.800789] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.801056] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.801438] page dumped because: kasan: bad access detected [ 15.801692] [ 15.801788] Memory state around the buggy address: [ 15.802040] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.802372] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.802610] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.802826] ^ [ 15.803031] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.803392] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.803748] ================================================================== [ 15.060565] ================================================================== [ 15.060799] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 15.061051] Read of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 15.061272] [ 15.061392] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.061434] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.061446] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.061466] Call Trace: [ 15.061479] <TASK> [ 15.061493] dump_stack_lvl+0x73/0xb0 [ 15.061519] print_report+0xd1/0x610 [ 15.061541] ? __virt_addr_valid+0x1db/0x2d0 [ 15.061563] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.061584] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.061606] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.061628] kasan_report+0x141/0x180 [ 15.061649] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.061676] __asan_report_load4_noabort+0x18/0x20 [ 15.061700] kasan_atomics_helper+0x49e8/0x5450 [ 15.061722] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.061744] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.061768] ? kasan_atomics+0x152/0x310 [ 15.061794] kasan_atomics+0x1dc/0x310 [ 15.061830] ? __pfx_kasan_atomics+0x10/0x10 [ 15.061855] ? __pfx_read_tsc+0x10/0x10 [ 15.061875] ? ktime_get_ts64+0x86/0x230 [ 15.061898] kunit_try_run_case+0x1a5/0x480 [ 15.061922] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.061944] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.061967] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.061990] ? __kthread_parkme+0x82/0x180 [ 15.062020] ? preempt_count_sub+0x50/0x80 [ 15.062043] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.062066] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.062090] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.062113] kthread+0x337/0x6f0 [ 15.062133] ? trace_preempt_on+0x20/0xc0 [ 15.062155] ? __pfx_kthread+0x10/0x10 [ 15.062176] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.062197] ? calculate_sigpending+0x7b/0xa0 [ 15.062220] ? __pfx_kthread+0x10/0x10 [ 15.062242] ret_from_fork+0x116/0x1d0 [ 15.062260] ? __pfx_kthread+0x10/0x10 [ 15.062281] ret_from_fork_asm+0x1a/0x30 [ 15.062310] </TASK> [ 15.062321] [ 15.071129] Allocated by task 283: [ 15.071982] kasan_save_stack+0x45/0x70 [ 15.072528] kasan_save_track+0x18/0x40 [ 15.072830] kasan_save_alloc_info+0x3b/0x50 [ 15.073063] __kasan_kmalloc+0xb7/0xc0 [ 15.073220] __kmalloc_cache_noprof+0x189/0x420 [ 15.073767] kasan_atomics+0x95/0x310 [ 15.073986] kunit_try_run_case+0x1a5/0x480 [ 15.074817] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.075725] kthread+0x337/0x6f0 [ 15.076265] ret_from_fork+0x116/0x1d0 [ 15.077027] ret_from_fork_asm+0x1a/0x30 [ 15.077820] [ 15.077961] The buggy address belongs to the object at ffff8881039b8880 [ 15.077961] which belongs to the cache kmalloc-64 of size 64 [ 15.078955] The buggy address is located 0 bytes to the right of [ 15.078955] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 15.080600] [ 15.080684] The buggy address belongs to the physical page: [ 15.080941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.081273] flags: 0x200000000000000(node=0|zone=2) [ 15.081530] page_type: f5(slab) [ 15.081695] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.081928] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.082166] page dumped because: kasan: bad access detected [ 15.082338] [ 15.082408] Memory state around the buggy address: [ 15.082563] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.082887] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.084839] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.085929] ^ [ 15.086560] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.087691] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.088718] ================================================================== [ 14.575548] ================================================================== [ 14.576132] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 14.576673] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 14.577245] [ 14.577328] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.577368] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.577380] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.577400] Call Trace: [ 14.577412] <TASK> [ 14.577425] dump_stack_lvl+0x73/0xb0 [ 14.577458] print_report+0xd1/0x610 [ 14.577487] ? __virt_addr_valid+0x1db/0x2d0 [ 14.577517] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.577538] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.577560] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.577582] kasan_report+0x141/0x180 [ 14.577603] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.577629] __asan_report_store4_noabort+0x1b/0x30 [ 14.577653] kasan_atomics_helper+0x4b3a/0x5450 [ 14.577676] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.577698] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.577722] ? kasan_atomics+0x152/0x310 [ 14.577748] kasan_atomics+0x1dc/0x310 [ 14.577771] ? __pfx_kasan_atomics+0x10/0x10 [ 14.577794] ? __pfx_read_tsc+0x10/0x10 [ 14.577815] ? ktime_get_ts64+0x86/0x230 [ 14.577838] kunit_try_run_case+0x1a5/0x480 [ 14.577862] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.577884] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.577906] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.577929] ? __kthread_parkme+0x82/0x180 [ 14.577949] ? preempt_count_sub+0x50/0x80 [ 14.577972] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.577996] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.578030] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.578054] kthread+0x337/0x6f0 [ 14.578072] ? trace_preempt_on+0x20/0xc0 [ 14.578095] ? __pfx_kthread+0x10/0x10 [ 14.578116] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.578136] ? calculate_sigpending+0x7b/0xa0 [ 14.578159] ? __pfx_kthread+0x10/0x10 [ 14.578181] ret_from_fork+0x116/0x1d0 [ 14.578199] ? __pfx_kthread+0x10/0x10 [ 14.578219] ret_from_fork_asm+0x1a/0x30 [ 14.578250] </TASK> [ 14.578260] [ 14.586641] Allocated by task 283: [ 14.586818] kasan_save_stack+0x45/0x70 [ 14.587107] kasan_save_track+0x18/0x40 [ 14.587319] kasan_save_alloc_info+0x3b/0x50 [ 14.587670] __kasan_kmalloc+0xb7/0xc0 [ 14.587846] __kmalloc_cache_noprof+0x189/0x420 [ 14.588065] kasan_atomics+0x95/0x310 [ 14.588198] kunit_try_run_case+0x1a5/0x480 [ 14.588343] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.588599] kthread+0x337/0x6f0 [ 14.588912] ret_from_fork+0x116/0x1d0 [ 14.589135] ret_from_fork_asm+0x1a/0x30 [ 14.589275] [ 14.589345] The buggy address belongs to the object at ffff8881039b8880 [ 14.589345] which belongs to the cache kmalloc-64 of size 64 [ 14.590096] The buggy address is located 0 bytes to the right of [ 14.590096] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 14.590667] [ 14.590772] The buggy address belongs to the physical page: [ 14.590950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 14.591199] flags: 0x200000000000000(node=0|zone=2) [ 14.591430] page_type: f5(slab) [ 14.591751] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.592104] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.592425] page dumped because: kasan: bad access detected [ 14.592656] [ 14.592772] Memory state around the buggy address: [ 14.592971] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 14.593203] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.593676] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.594029] ^ [ 14.594229] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.594620] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.594949] ================================================================== [ 15.290923] ================================================================== [ 15.291212] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 15.292095] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 15.292788] [ 15.292907] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.293097] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.293113] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.293136] Call Trace: [ 15.293152] <TASK> [ 15.293168] dump_stack_lvl+0x73/0xb0 [ 15.293199] print_report+0xd1/0x610 [ 15.293223] ? __virt_addr_valid+0x1db/0x2d0 [ 15.293245] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.293267] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.293290] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.293312] kasan_report+0x141/0x180 [ 15.293334] ? kasan_atomics_helper+0x15b6/0x5450 [ 15.293361] kasan_check_range+0x10c/0x1c0 [ 15.293409] __kasan_check_write+0x18/0x20 [ 15.293428] kasan_atomics_helper+0x15b6/0x5450 [ 15.293451] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.293473] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.293498] ? kasan_atomics+0x152/0x310 [ 15.293524] kasan_atomics+0x1dc/0x310 [ 15.293547] ? __pfx_kasan_atomics+0x10/0x10 [ 15.293570] ? __pfx_read_tsc+0x10/0x10 [ 15.293591] ? ktime_get_ts64+0x86/0x230 [ 15.293615] kunit_try_run_case+0x1a5/0x480 [ 15.293639] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.293661] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.293684] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.293707] ? __kthread_parkme+0x82/0x180 [ 15.293728] ? preempt_count_sub+0x50/0x80 [ 15.293751] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.293775] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.293798] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.293822] kthread+0x337/0x6f0 [ 15.293840] ? trace_preempt_on+0x20/0xc0 [ 15.293863] ? __pfx_kthread+0x10/0x10 [ 15.293884] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.293906] ? calculate_sigpending+0x7b/0xa0 [ 15.293929] ? __pfx_kthread+0x10/0x10 [ 15.293951] ret_from_fork+0x116/0x1d0 [ 15.293970] ? __pfx_kthread+0x10/0x10 [ 15.293990] ret_from_fork_asm+0x1a/0x30 [ 15.294033] </TASK> [ 15.294043] [ 15.305930] Allocated by task 283: [ 15.306118] kasan_save_stack+0x45/0x70 [ 15.306309] kasan_save_track+0x18/0x40 [ 15.307144] kasan_save_alloc_info+0x3b/0x50 [ 15.307417] __kasan_kmalloc+0xb7/0xc0 [ 15.307797] __kmalloc_cache_noprof+0x189/0x420 [ 15.308134] kasan_atomics+0x95/0x310 [ 15.308533] kunit_try_run_case+0x1a5/0x480 [ 15.308915] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.309189] kthread+0x337/0x6f0 [ 15.309558] ret_from_fork+0x116/0x1d0 [ 15.309985] ret_from_fork_asm+0x1a/0x30 [ 15.310272] [ 15.310351] The buggy address belongs to the object at ffff8881039b8880 [ 15.310351] which belongs to the cache kmalloc-64 of size 64 [ 15.310927] The buggy address is located 0 bytes to the right of [ 15.310927] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 15.311984] [ 15.312104] The buggy address belongs to the physical page: [ 15.312315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.312936] flags: 0x200000000000000(node=0|zone=2) [ 15.313276] page_type: f5(slab) [ 15.313674] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.314143] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.314711] page dumped because: kasan: bad access detected [ 15.314940] [ 15.315053] Memory state around the buggy address: [ 15.315267] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.316017] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.316657] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.317003] ^ [ 15.317351] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.317850] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.318166] ================================================================== [ 15.540577] ================================================================== [ 15.540861] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 15.541317] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 15.541748] [ 15.541836] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.541879] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.541891] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.541912] Call Trace: [ 15.541927] <TASK> [ 15.541942] dump_stack_lvl+0x73/0xb0 [ 15.541969] print_report+0xd1/0x610 [ 15.541991] ? __virt_addr_valid+0x1db/0x2d0 [ 15.542025] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.542051] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.542073] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.542095] kasan_report+0x141/0x180 [ 15.542117] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.542144] kasan_check_range+0x10c/0x1c0 [ 15.542167] __kasan_check_write+0x18/0x20 [ 15.542187] kasan_atomics_helper+0x1c18/0x5450 [ 15.542209] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.542231] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.542256] ? kasan_atomics+0x152/0x310 [ 15.542282] kasan_atomics+0x1dc/0x310 [ 15.542305] ? __pfx_kasan_atomics+0x10/0x10 [ 15.542332] ? __pfx_read_tsc+0x10/0x10 [ 15.542353] ? ktime_get_ts64+0x86/0x230 [ 15.542393] kunit_try_run_case+0x1a5/0x480 [ 15.542443] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.542467] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.542489] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.542513] ? __kthread_parkme+0x82/0x180 [ 15.542533] ? preempt_count_sub+0x50/0x80 [ 15.542558] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.542583] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.542606] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.542836] kthread+0x337/0x6f0 [ 15.542858] ? trace_preempt_on+0x20/0xc0 [ 15.542881] ? __pfx_kthread+0x10/0x10 [ 15.542901] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.542923] ? calculate_sigpending+0x7b/0xa0 [ 15.542947] ? __pfx_kthread+0x10/0x10 [ 15.542968] ret_from_fork+0x116/0x1d0 [ 15.542987] ? __pfx_kthread+0x10/0x10 [ 15.543021] ret_from_fork_asm+0x1a/0x30 [ 15.543052] </TASK> [ 15.543062] [ 15.551916] Allocated by task 283: [ 15.552114] kasan_save_stack+0x45/0x70 [ 15.552257] kasan_save_track+0x18/0x40 [ 15.552541] kasan_save_alloc_info+0x3b/0x50 [ 15.552755] __kasan_kmalloc+0xb7/0xc0 [ 15.552946] __kmalloc_cache_noprof+0x189/0x420 [ 15.553154] kasan_atomics+0x95/0x310 [ 15.553288] kunit_try_run_case+0x1a5/0x480 [ 15.553652] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.553927] kthread+0x337/0x6f0 [ 15.554107] ret_from_fork+0x116/0x1d0 [ 15.554304] ret_from_fork_asm+0x1a/0x30 [ 15.554682] [ 15.554816] The buggy address belongs to the object at ffff8881039b8880 [ 15.554816] which belongs to the cache kmalloc-64 of size 64 [ 15.555301] The buggy address is located 0 bytes to the right of [ 15.555301] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 15.555944] [ 15.556046] The buggy address belongs to the physical page: [ 15.556288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.556702] flags: 0x200000000000000(node=0|zone=2) [ 15.556870] page_type: f5(slab) [ 15.556992] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.557236] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.557592] page dumped because: kasan: bad access detected [ 15.557845] [ 15.557968] Memory state around the buggy address: [ 15.558589] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.558826] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.559125] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.559584] ^ [ 15.559835] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.560064] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.560380] ================================================================== [ 14.635136] ================================================================== [ 14.635489] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 14.635815] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 14.636136] [ 14.636231] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.636272] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.636285] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.636305] Call Trace: [ 14.636321] <TASK> [ 14.636336] dump_stack_lvl+0x73/0xb0 [ 14.636362] print_report+0xd1/0x610 [ 14.636384] ? __virt_addr_valid+0x1db/0x2d0 [ 14.636406] ? kasan_atomics_helper+0x697/0x5450 [ 14.636427] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.636449] ? kasan_atomics_helper+0x697/0x5450 [ 14.636471] kasan_report+0x141/0x180 [ 14.636493] ? kasan_atomics_helper+0x697/0x5450 [ 14.636518] kasan_check_range+0x10c/0x1c0 [ 14.636542] __kasan_check_write+0x18/0x20 [ 14.636561] kasan_atomics_helper+0x697/0x5450 [ 14.636583] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.636604] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.636628] ? kasan_atomics+0x152/0x310 [ 14.636655] kasan_atomics+0x1dc/0x310 [ 14.636676] ? __pfx_kasan_atomics+0x10/0x10 [ 14.636700] ? __pfx_read_tsc+0x10/0x10 [ 14.636720] ? ktime_get_ts64+0x86/0x230 [ 14.636744] kunit_try_run_case+0x1a5/0x480 [ 14.636768] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.636790] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.636814] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.636836] ? __kthread_parkme+0x82/0x180 [ 14.636856] ? preempt_count_sub+0x50/0x80 [ 14.636880] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.636904] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.636927] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.636951] kthread+0x337/0x6f0 [ 14.636975] ? trace_preempt_on+0x20/0xc0 [ 14.636997] ? __pfx_kthread+0x10/0x10 [ 14.637207] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.637231] ? calculate_sigpending+0x7b/0xa0 [ 14.637256] ? __pfx_kthread+0x10/0x10 [ 14.637278] ret_from_fork+0x116/0x1d0 [ 14.637299] ? __pfx_kthread+0x10/0x10 [ 14.637320] ret_from_fork_asm+0x1a/0x30 [ 14.637351] </TASK> [ 14.637361] [ 14.645200] Allocated by task 283: [ 14.645375] kasan_save_stack+0x45/0x70 [ 14.645723] kasan_save_track+0x18/0x40 [ 14.645867] kasan_save_alloc_info+0x3b/0x50 [ 14.646097] __kasan_kmalloc+0xb7/0xc0 [ 14.646276] __kmalloc_cache_noprof+0x189/0x420 [ 14.646574] kasan_atomics+0x95/0x310 [ 14.646725] kunit_try_run_case+0x1a5/0x480 [ 14.646937] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.647164] kthread+0x337/0x6f0 [ 14.647334] ret_from_fork+0x116/0x1d0 [ 14.647535] ret_from_fork_asm+0x1a/0x30 [ 14.647744] [ 14.647837] The buggy address belongs to the object at ffff8881039b8880 [ 14.647837] which belongs to the cache kmalloc-64 of size 64 [ 14.648301] The buggy address is located 0 bytes to the right of [ 14.648301] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 14.649015] [ 14.649105] The buggy address belongs to the physical page: [ 14.649361] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 14.649814] flags: 0x200000000000000(node=0|zone=2) [ 14.650072] page_type: f5(slab) [ 14.650227] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.650465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.650692] page dumped because: kasan: bad access detected [ 14.650862] [ 14.650932] Memory state around the buggy address: [ 14.651167] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 14.651486] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.651867] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.652457] ^ [ 14.652613] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.652828] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.653173] ================================================================== [ 15.581678] ================================================================== [ 15.582091] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 15.583195] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 15.583502] [ 15.583581] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.583622] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.583634] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.583655] Call Trace: [ 15.583669] <TASK> [ 15.583683] dump_stack_lvl+0x73/0xb0 [ 15.583710] print_report+0xd1/0x610 [ 15.583788] ? __virt_addr_valid+0x1db/0x2d0 [ 15.583810] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.583831] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.583854] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.583876] kasan_report+0x141/0x180 [ 15.583898] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.583924] kasan_check_range+0x10c/0x1c0 [ 15.583948] __kasan_check_write+0x18/0x20 [ 15.583967] kasan_atomics_helper+0x1ce1/0x5450 [ 15.583990] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.584024] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.584048] ? kasan_atomics+0x152/0x310 [ 15.584075] kasan_atomics+0x1dc/0x310 [ 15.584097] ? __pfx_kasan_atomics+0x10/0x10 [ 15.584120] ? __pfx_read_tsc+0x10/0x10 [ 15.584142] ? ktime_get_ts64+0x86/0x230 [ 15.584166] kunit_try_run_case+0x1a5/0x480 [ 15.584190] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.584213] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.584235] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.584259] ? __kthread_parkme+0x82/0x180 [ 15.584279] ? preempt_count_sub+0x50/0x80 [ 15.584302] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.584326] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.584350] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.584373] kthread+0x337/0x6f0 [ 15.584510] ? trace_preempt_on+0x20/0xc0 [ 15.584538] ? __pfx_kthread+0x10/0x10 [ 15.584559] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.584581] ? calculate_sigpending+0x7b/0xa0 [ 15.584603] ? __pfx_kthread+0x10/0x10 [ 15.584625] ret_from_fork+0x116/0x1d0 [ 15.584643] ? __pfx_kthread+0x10/0x10 [ 15.584698] ret_from_fork_asm+0x1a/0x30 [ 15.584729] </TASK> [ 15.584740] [ 15.596221] Allocated by task 283: [ 15.596635] kasan_save_stack+0x45/0x70 [ 15.596839] kasan_save_track+0x18/0x40 [ 15.597152] kasan_save_alloc_info+0x3b/0x50 [ 15.597549] __kasan_kmalloc+0xb7/0xc0 [ 15.597938] __kmalloc_cache_noprof+0x189/0x420 [ 15.598409] kasan_atomics+0x95/0x310 [ 15.598690] kunit_try_run_case+0x1a5/0x480 [ 15.598974] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.599278] kthread+0x337/0x6f0 [ 15.599446] ret_from_fork+0x116/0x1d0 [ 15.600024] ret_from_fork_asm+0x1a/0x30 [ 15.600295] [ 15.600374] The buggy address belongs to the object at ffff8881039b8880 [ 15.600374] which belongs to the cache kmalloc-64 of size 64 [ 15.601258] The buggy address is located 0 bytes to the right of [ 15.601258] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 15.602281] [ 15.602389] The buggy address belongs to the physical page: [ 15.602748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.603276] flags: 0x200000000000000(node=0|zone=2) [ 15.603689] page_type: f5(slab) [ 15.603875] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.604557] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.604928] page dumped because: kasan: bad access detected [ 15.605287] [ 15.605423] Memory state around the buggy address: [ 15.605593] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.606250] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.606904] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.607383] ^ [ 15.607785] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.608310] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.608807] ================================================================== [ 14.653796] ================================================================== [ 14.654122] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 14.654525] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 14.654861] [ 14.654944] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.654985] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.654997] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.655029] Call Trace: [ 14.655041] <TASK> [ 14.655055] dump_stack_lvl+0x73/0xb0 [ 14.655081] print_report+0xd1/0x610 [ 14.655103] ? __virt_addr_valid+0x1db/0x2d0 [ 14.655126] ? kasan_atomics_helper+0x72f/0x5450 [ 14.655146] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.655171] ? kasan_atomics_helper+0x72f/0x5450 [ 14.655192] kasan_report+0x141/0x180 [ 14.655214] ? kasan_atomics_helper+0x72f/0x5450 [ 14.655240] kasan_check_range+0x10c/0x1c0 [ 14.655264] __kasan_check_write+0x18/0x20 [ 14.655283] kasan_atomics_helper+0x72f/0x5450 [ 14.655304] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.655326] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.655425] ? kasan_atomics+0x152/0x310 [ 14.655455] kasan_atomics+0x1dc/0x310 [ 14.655479] ? __pfx_kasan_atomics+0x10/0x10 [ 14.655504] ? __pfx_read_tsc+0x10/0x10 [ 14.655524] ? ktime_get_ts64+0x86/0x230 [ 14.655548] kunit_try_run_case+0x1a5/0x480 [ 14.655572] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.655595] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.655617] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.655640] ? __kthread_parkme+0x82/0x180 [ 14.655673] ? preempt_count_sub+0x50/0x80 [ 14.655696] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.655721] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.655744] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.655767] kthread+0x337/0x6f0 [ 14.655786] ? trace_preempt_on+0x20/0xc0 [ 14.655809] ? __pfx_kthread+0x10/0x10 [ 14.655829] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.655852] ? calculate_sigpending+0x7b/0xa0 [ 14.655874] ? __pfx_kthread+0x10/0x10 [ 14.655896] ret_from_fork+0x116/0x1d0 [ 14.655914] ? __pfx_kthread+0x10/0x10 [ 14.655934] ret_from_fork_asm+0x1a/0x30 [ 14.655964] </TASK> [ 14.655975] [ 14.664498] Allocated by task 283: [ 14.664683] kasan_save_stack+0x45/0x70 [ 14.664886] kasan_save_track+0x18/0x40 [ 14.665094] kasan_save_alloc_info+0x3b/0x50 [ 14.665305] __kasan_kmalloc+0xb7/0xc0 [ 14.665673] __kmalloc_cache_noprof+0x189/0x420 [ 14.665902] kasan_atomics+0x95/0x310 [ 14.666101] kunit_try_run_case+0x1a5/0x480 [ 14.666309] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.666669] kthread+0x337/0x6f0 [ 14.666840] ret_from_fork+0x116/0x1d0 [ 14.667035] ret_from_fork_asm+0x1a/0x30 [ 14.667237] [ 14.667320] The buggy address belongs to the object at ffff8881039b8880 [ 14.667320] which belongs to the cache kmalloc-64 of size 64 [ 14.667874] The buggy address is located 0 bytes to the right of [ 14.667874] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 14.668496] [ 14.668599] The buggy address belongs to the physical page: [ 14.668825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 14.669137] flags: 0x200000000000000(node=0|zone=2) [ 14.669605] page_type: f5(slab) [ 14.669762] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.670082] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.670474] page dumped because: kasan: bad access detected [ 14.670696] [ 14.670790] Memory state around the buggy address: [ 14.670973] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 14.671266] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.671646] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.671883] ^ [ 14.672052] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.672269] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.672582] ================================================================== [ 14.556946] ================================================================== [ 14.557195] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 14.557890] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 14.558242] [ 14.558425] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.558466] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.558478] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.558498] Call Trace: [ 14.558512] <TASK> [ 14.558526] dump_stack_lvl+0x73/0xb0 [ 14.558552] print_report+0xd1/0x610 [ 14.558573] ? __virt_addr_valid+0x1db/0x2d0 [ 14.558595] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.558615] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.558637] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.558658] kasan_report+0x141/0x180 [ 14.558680] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.558706] kasan_check_range+0x10c/0x1c0 [ 14.558729] __kasan_check_write+0x18/0x20 [ 14.558748] kasan_atomics_helper+0x4a0/0x5450 [ 14.558770] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.558792] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.558816] ? kasan_atomics+0x152/0x310 [ 14.558842] kasan_atomics+0x1dc/0x310 [ 14.558864] ? __pfx_kasan_atomics+0x10/0x10 [ 14.558888] ? __pfx_read_tsc+0x10/0x10 [ 14.558908] ? ktime_get_ts64+0x86/0x230 [ 14.558932] kunit_try_run_case+0x1a5/0x480 [ 14.558955] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.558978] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.559001] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.559035] ? __kthread_parkme+0x82/0x180 [ 14.559055] ? preempt_count_sub+0x50/0x80 [ 14.559078] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.559101] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.559125] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.559149] kthread+0x337/0x6f0 [ 14.559168] ? trace_preempt_on+0x20/0xc0 [ 14.559191] ? __pfx_kthread+0x10/0x10 [ 14.559212] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.559233] ? calculate_sigpending+0x7b/0xa0 [ 14.559256] ? __pfx_kthread+0x10/0x10 [ 14.559278] ret_from_fork+0x116/0x1d0 [ 14.559296] ? __pfx_kthread+0x10/0x10 [ 14.559317] ret_from_fork_asm+0x1a/0x30 [ 14.559347] </TASK> [ 14.559358] [ 14.568034] Allocated by task 283: [ 14.568254] kasan_save_stack+0x45/0x70 [ 14.568497] kasan_save_track+0x18/0x40 [ 14.568683] kasan_save_alloc_info+0x3b/0x50 [ 14.568893] __kasan_kmalloc+0xb7/0xc0 [ 14.569045] __kmalloc_cache_noprof+0x189/0x420 [ 14.569209] kasan_atomics+0x95/0x310 [ 14.569344] kunit_try_run_case+0x1a5/0x480 [ 14.569584] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.569841] kthread+0x337/0x6f0 [ 14.570019] ret_from_fork+0x116/0x1d0 [ 14.570211] ret_from_fork_asm+0x1a/0x30 [ 14.570368] [ 14.570438] The buggy address belongs to the object at ffff8881039b8880 [ 14.570438] which belongs to the cache kmalloc-64 of size 64 [ 14.570791] The buggy address is located 0 bytes to the right of [ 14.570791] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 14.571170] [ 14.571242] The buggy address belongs to the physical page: [ 14.571414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 14.571660] flags: 0x200000000000000(node=0|zone=2) [ 14.571905] page_type: f5(slab) [ 14.572078] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.572433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.572766] page dumped because: kasan: bad access detected [ 14.573029] [ 14.573121] Memory state around the buggy address: [ 14.573341] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 14.574035] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.574355] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.574631] ^ [ 14.574788] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.575013] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.575225] ================================================================== [ 14.729119] ================================================================== [ 14.729664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 14.729986] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 14.730291] [ 14.730475] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.730518] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.730530] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.730551] Call Trace: [ 14.730565] <TASK> [ 14.730578] dump_stack_lvl+0x73/0xb0 [ 14.730604] print_report+0xd1/0x610 [ 14.730626] ? __virt_addr_valid+0x1db/0x2d0 [ 14.730647] ? kasan_atomics_helper+0x992/0x5450 [ 14.730667] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.730689] ? kasan_atomics_helper+0x992/0x5450 [ 14.730710] kasan_report+0x141/0x180 [ 14.730732] ? kasan_atomics_helper+0x992/0x5450 [ 14.730757] kasan_check_range+0x10c/0x1c0 [ 14.730781] __kasan_check_write+0x18/0x20 [ 14.730799] kasan_atomics_helper+0x992/0x5450 [ 14.730822] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.730844] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.730868] ? kasan_atomics+0x152/0x310 [ 14.730894] kasan_atomics+0x1dc/0x310 [ 14.730917] ? __pfx_kasan_atomics+0x10/0x10 [ 14.730941] ? __pfx_read_tsc+0x10/0x10 [ 14.730961] ? ktime_get_ts64+0x86/0x230 [ 14.730985] kunit_try_run_case+0x1a5/0x480 [ 14.731020] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.731043] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.731067] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.731092] ? __kthread_parkme+0x82/0x180 [ 14.731112] ? preempt_count_sub+0x50/0x80 [ 14.731135] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.731159] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.731183] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.731206] kthread+0x337/0x6f0 [ 14.731226] ? trace_preempt_on+0x20/0xc0 [ 14.731249] ? __pfx_kthread+0x10/0x10 [ 14.731270] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.731291] ? calculate_sigpending+0x7b/0xa0 [ 14.731315] ? __pfx_kthread+0x10/0x10 [ 14.731336] ret_from_fork+0x116/0x1d0 [ 14.731428] ? __pfx_kthread+0x10/0x10 [ 14.731452] ret_from_fork_asm+0x1a/0x30 [ 14.731483] </TASK> [ 14.731494] [ 14.739065] Allocated by task 283: [ 14.739236] kasan_save_stack+0x45/0x70 [ 14.739470] kasan_save_track+0x18/0x40 [ 14.739613] kasan_save_alloc_info+0x3b/0x50 [ 14.739764] __kasan_kmalloc+0xb7/0xc0 [ 14.739897] __kmalloc_cache_noprof+0x189/0x420 [ 14.740091] kasan_atomics+0x95/0x310 [ 14.740277] kunit_try_run_case+0x1a5/0x480 [ 14.740565] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.740826] kthread+0x337/0x6f0 [ 14.741014] ret_from_fork+0x116/0x1d0 [ 14.741151] ret_from_fork_asm+0x1a/0x30 [ 14.741290] [ 14.741562] The buggy address belongs to the object at ffff8881039b8880 [ 14.741562] which belongs to the cache kmalloc-64 of size 64 [ 14.741921] The buggy address is located 0 bytes to the right of [ 14.741921] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 14.742306] [ 14.742488] The buggy address belongs to the physical page: [ 14.742771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 14.743134] flags: 0x200000000000000(node=0|zone=2) [ 14.743465] page_type: f5(slab) [ 14.743636] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.743984] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.744317] page dumped because: kasan: bad access detected [ 14.744573] [ 14.744649] Memory state around the buggy address: [ 14.744804] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 14.745046] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.745265] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.745671] ^ [ 14.745849] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.746188] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.746592] ================================================================== [ 15.657541] ================================================================== [ 15.657904] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 15.658279] Write of size 8 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 15.658512] [ 15.658590] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.658629] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.658642] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.658663] Call Trace: [ 15.658675] <TASK> [ 15.658690] dump_stack_lvl+0x73/0xb0 [ 15.659398] print_report+0xd1/0x610 [ 15.659424] ? __virt_addr_valid+0x1db/0x2d0 [ 15.659448] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.659480] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.659503] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.659525] kasan_report+0x141/0x180 [ 15.659548] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.659574] kasan_check_range+0x10c/0x1c0 [ 15.659600] __kasan_check_write+0x18/0x20 [ 15.659620] kasan_atomics_helper+0x1eaa/0x5450 [ 15.659643] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.659666] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.659690] ? kasan_atomics+0x152/0x310 [ 15.659717] kasan_atomics+0x1dc/0x310 [ 15.659740] ? __pfx_kasan_atomics+0x10/0x10 [ 15.659764] ? __pfx_read_tsc+0x10/0x10 [ 15.659785] ? ktime_get_ts64+0x86/0x230 [ 15.659810] kunit_try_run_case+0x1a5/0x480 [ 15.659834] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.659857] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.660514] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.660554] ? __kthread_parkme+0x82/0x180 [ 15.660593] ? preempt_count_sub+0x50/0x80 [ 15.660617] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.660642] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.660666] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.660690] kthread+0x337/0x6f0 [ 15.660709] ? trace_preempt_on+0x20/0xc0 [ 15.660734] ? __pfx_kthread+0x10/0x10 [ 15.660754] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.660775] ? calculate_sigpending+0x7b/0xa0 [ 15.660798] ? __pfx_kthread+0x10/0x10 [ 15.660819] ret_from_fork+0x116/0x1d0 [ 15.660838] ? __pfx_kthread+0x10/0x10 [ 15.660858] ret_from_fork_asm+0x1a/0x30 [ 15.660889] </TASK> [ 15.660899] [ 15.672344] Allocated by task 283: [ 15.672712] kasan_save_stack+0x45/0x70 [ 15.673083] kasan_save_track+0x18/0x40 [ 15.673426] kasan_save_alloc_info+0x3b/0x50 [ 15.673639] __kasan_kmalloc+0xb7/0xc0 [ 15.673820] __kmalloc_cache_noprof+0x189/0x420 [ 15.674053] kasan_atomics+0x95/0x310 [ 15.674235] kunit_try_run_case+0x1a5/0x480 [ 15.674649] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.675042] kthread+0x337/0x6f0 [ 15.675204] ret_from_fork+0x116/0x1d0 [ 15.675524] ret_from_fork_asm+0x1a/0x30 [ 15.675673] [ 15.675869] The buggy address belongs to the object at ffff8881039b8880 [ 15.675869] which belongs to the cache kmalloc-64 of size 64 [ 15.676601] The buggy address is located 0 bytes to the right of [ 15.676601] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 15.677235] [ 15.677350] The buggy address belongs to the physical page: [ 15.677749] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 15.678264] flags: 0x200000000000000(node=0|zone=2) [ 15.678622] page_type: f5(slab) [ 15.678823] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.679372] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.679938] page dumped because: kasan: bad access detected [ 15.680180] [ 15.680355] Memory state around the buggy address: [ 15.680573] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 15.681132] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.681641] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.682191] ^ [ 15.682502] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.683048] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.683424] ================================================================== [ 14.710694] ================================================================== [ 14.711053] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 14.711500] Write of size 4 at addr ffff8881039b88b0 by task kunit_try_catch/283 [ 14.711838] [ 14.711948] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.711990] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.712003] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.712035] Call Trace: [ 14.712050] <TASK> [ 14.712066] dump_stack_lvl+0x73/0xb0 [ 14.712094] print_report+0xd1/0x610 [ 14.712115] ? __virt_addr_valid+0x1db/0x2d0 [ 14.712138] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.712158] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.712181] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.712203] kasan_report+0x141/0x180 [ 14.712225] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.712251] kasan_check_range+0x10c/0x1c0 [ 14.712274] __kasan_check_write+0x18/0x20 [ 14.712293] kasan_atomics_helper+0x8f9/0x5450 [ 14.712316] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.712338] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.712440] ? kasan_atomics+0x152/0x310 [ 14.712466] kasan_atomics+0x1dc/0x310 [ 14.712489] ? __pfx_kasan_atomics+0x10/0x10 [ 14.712514] ? __pfx_read_tsc+0x10/0x10 [ 14.712535] ? ktime_get_ts64+0x86/0x230 [ 14.712559] kunit_try_run_case+0x1a5/0x480 [ 14.712584] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.712607] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.712630] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.712653] ? __kthread_parkme+0x82/0x180 [ 14.712674] ? preempt_count_sub+0x50/0x80 [ 14.712699] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.712723] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.712747] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.712770] kthread+0x337/0x6f0 [ 14.712789] ? trace_preempt_on+0x20/0xc0 [ 14.712812] ? __pfx_kthread+0x10/0x10 [ 14.712832] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.712854] ? calculate_sigpending+0x7b/0xa0 [ 14.712877] ? __pfx_kthread+0x10/0x10 [ 14.712899] ret_from_fork+0x116/0x1d0 [ 14.712916] ? __pfx_kthread+0x10/0x10 [ 14.712937] ret_from_fork_asm+0x1a/0x30 [ 14.712974] </TASK> [ 14.712985] [ 14.720850] Allocated by task 283: [ 14.720991] kasan_save_stack+0x45/0x70 [ 14.721198] kasan_save_track+0x18/0x40 [ 14.721643] kasan_save_alloc_info+0x3b/0x50 [ 14.721866] __kasan_kmalloc+0xb7/0xc0 [ 14.722069] __kmalloc_cache_noprof+0x189/0x420 [ 14.722295] kasan_atomics+0x95/0x310 [ 14.722565] kunit_try_run_case+0x1a5/0x480 [ 14.722748] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.722930] kthread+0x337/0x6f0 [ 14.723112] ret_from_fork+0x116/0x1d0 [ 14.723302] ret_from_fork_asm+0x1a/0x30 [ 14.723574] [ 14.723668] The buggy address belongs to the object at ffff8881039b8880 [ 14.723668] which belongs to the cache kmalloc-64 of size 64 [ 14.724107] The buggy address is located 0 bytes to the right of [ 14.724107] allocated 48-byte region [ffff8881039b8880, ffff8881039b88b0) [ 14.724671] [ 14.724761] The buggy address belongs to the physical page: [ 14.724967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039b8 [ 14.725304] flags: 0x200000000000000(node=0|zone=2) [ 14.725703] page_type: f5(slab) [ 14.725860] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.726161] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.726534] page dumped because: kasan: bad access detected [ 14.726701] [ 14.726770] Memory state around the buggy address: [ 14.726917] ffff8881039b8780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 14.727135] ffff8881039b8800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.727344] >ffff8881039b8880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.727648] ^ [ 14.727868] ffff8881039b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.728260] ffff8881039b8980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.728652] ==================================================================