Date
July 1, 2025, 12:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 20.203747] ================================================================== [ 20.204115] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 20.204323] Read of size 4 at addr fff00000c79f59b0 by task kunit_try_catch/265 [ 20.204473] [ 20.204539] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.204783] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.204819] Hardware name: linux,dummy-virt (DT) [ 20.204982] Call trace: [ 20.205042] show_stack+0x20/0x38 (C) [ 20.205098] dump_stack_lvl+0x8c/0xd0 [ 20.205151] print_report+0x118/0x608 [ 20.205350] kasan_report+0xdc/0x128 [ 20.205673] __asan_report_load4_noabort+0x20/0x30 [ 20.205786] kasan_atomics_helper+0x3dd8/0x4858 [ 20.205846] kasan_atomics+0x198/0x2e0 [ 20.205895] kunit_try_run_case+0x170/0x3f0 [ 20.206173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.206262] kthread+0x328/0x630 [ 20.206616] ret_from_fork+0x10/0x20 [ 20.206849] [ 20.206977] Allocated by task 265: [ 20.207053] kasan_save_stack+0x3c/0x68 [ 20.207102] kasan_save_track+0x20/0x40 [ 20.207143] kasan_save_alloc_info+0x40/0x58 [ 20.207187] __kasan_kmalloc+0xd4/0xd8 [ 20.207628] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.207905] kasan_atomics+0xb8/0x2e0 [ 20.208074] kunit_try_run_case+0x170/0x3f0 [ 20.208334] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.208560] kthread+0x328/0x630 [ 20.208623] ret_from_fork+0x10/0x20 [ 20.208947] [ 20.208978] The buggy address belongs to the object at fff00000c79f5980 [ 20.208978] which belongs to the cache kmalloc-64 of size 64 [ 20.209275] The buggy address is located 0 bytes to the right of [ 20.209275] allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0) [ 20.209775] [ 20.209912] The buggy address belongs to the physical page: [ 20.209951] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5 [ 20.210196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.210617] page_type: f5(slab) [ 20.210700] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.210926] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.210988] page dumped because: kasan: bad access detected [ 20.211121] [ 20.211266] Memory state around the buggy address: [ 20.211401] fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.211798] fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.212120] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.212383] ^ [ 20.212473] fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.212537] fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.212806] ================================================================== [ 20.304611] ================================================================== [ 20.304792] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 20.304853] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265 [ 20.304908] [ 20.304949] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.305301] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.305591] Hardware name: linux,dummy-virt (DT) [ 20.305678] Call trace: [ 20.305835] show_stack+0x20/0x38 (C) [ 20.306151] dump_stack_lvl+0x8c/0xd0 [ 20.306235] print_report+0x118/0x608 [ 20.306741] kasan_report+0xdc/0x128 [ 20.306856] kasan_check_range+0x100/0x1a8 [ 20.306971] __kasan_check_write+0x20/0x30 [ 20.307071] kasan_atomics_helper+0xff0/0x4858 [ 20.307211] kasan_atomics+0x198/0x2e0 [ 20.307272] kunit_try_run_case+0x170/0x3f0 [ 20.307328] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.307382] kthread+0x328/0x630 [ 20.307939] ret_from_fork+0x10/0x20 [ 20.308299] [ 20.308427] Allocated by task 265: [ 20.308527] kasan_save_stack+0x3c/0x68 [ 20.308635] kasan_save_track+0x20/0x40 [ 20.308684] kasan_save_alloc_info+0x40/0x58 [ 20.308894] __kasan_kmalloc+0xd4/0xd8 [ 20.309210] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.310693] kasan_atomics+0xb8/0x2e0 [ 20.310772] kunit_try_run_case+0x170/0x3f0 [ 20.310835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.310918] kthread+0x328/0x630 [ 20.310977] ret_from_fork+0x10/0x20 [ 20.311301] [ 20.311474] The buggy address belongs to the object at fff00000c79f5980 [ 20.311474] which belongs to the cache kmalloc-64 of size 64 [ 20.311690] The buggy address is located 0 bytes to the right of [ 20.311690] allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0) [ 20.312009] [ 20.312040] The buggy address belongs to the physical page: [ 20.312076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5 [ 20.312558] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.312966] page_type: f5(slab) [ 20.313073] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.313294] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.313386] page dumped because: kasan: bad access detected [ 20.313669] [ 20.313750] Memory state around the buggy address: [ 20.313937] fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.314169] fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.314581] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.314662] ^ [ 20.314875] fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.314939] fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.314990] ================================================================== [ 20.484116] ================================================================== [ 20.484331] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 20.484535] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265 [ 20.484632] [ 20.484666] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.484751] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.485007] Hardware name: linux,dummy-virt (DT) [ 20.485399] Call trace: [ 20.485487] show_stack+0x20/0x38 (C) [ 20.485549] dump_stack_lvl+0x8c/0xd0 [ 20.485651] print_report+0x118/0x608 [ 20.485723] kasan_report+0xdc/0x128 [ 20.485771] kasan_check_range+0x100/0x1a8 [ 20.486098] __kasan_check_write+0x20/0x30 [ 20.486266] kasan_atomics_helper+0x16d0/0x4858 [ 20.486329] kasan_atomics+0x198/0x2e0 [ 20.486442] kunit_try_run_case+0x170/0x3f0 [ 20.486519] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.486572] kthread+0x328/0x630 [ 20.486619] ret_from_fork+0x10/0x20 [ 20.486666] [ 20.486688] Allocated by task 265: [ 20.486717] kasan_save_stack+0x3c/0x68 [ 20.486760] kasan_save_track+0x20/0x40 [ 20.486882] kasan_save_alloc_info+0x40/0x58 [ 20.486933] __kasan_kmalloc+0xd4/0xd8 [ 20.486970] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.487061] kasan_atomics+0xb8/0x2e0 [ 20.487326] kunit_try_run_case+0x170/0x3f0 [ 20.487389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.488032] kthread+0x328/0x630 [ 20.488184] ret_from_fork+0x10/0x20 [ 20.488548] [ 20.488634] The buggy address belongs to the object at fff00000c79f5980 [ 20.488634] which belongs to the cache kmalloc-64 of size 64 [ 20.488913] The buggy address is located 0 bytes to the right of [ 20.488913] allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0) [ 20.489352] [ 20.489542] The buggy address belongs to the physical page: [ 20.489769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5 [ 20.489887] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.489941] page_type: f5(slab) [ 20.490027] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.490606] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.490698] page dumped because: kasan: bad access detected [ 20.491118] [ 20.491206] Memory state around the buggy address: [ 20.491484] fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.491739] fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.491982] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.492094] ^ [ 20.492197] fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.492283] fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.492673] ================================================================== [ 20.511565] ================================================================== [ 20.511691] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 20.511764] Read of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265 [ 20.511819] [ 20.511851] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.512084] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.512167] Hardware name: linux,dummy-virt (DT) [ 20.512304] Call trace: [ 20.512357] show_stack+0x20/0x38 (C) [ 20.512800] dump_stack_lvl+0x8c/0xd0 [ 20.512989] print_report+0x118/0x608 [ 20.513051] kasan_report+0xdc/0x128 [ 20.513103] __asan_report_load8_noabort+0x20/0x30 [ 20.513340] kasan_atomics_helper+0x3e20/0x4858 [ 20.513914] kasan_atomics+0x198/0x2e0 [ 20.514093] kunit_try_run_case+0x170/0x3f0 [ 20.514154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.514247] kthread+0x328/0x630 [ 20.514358] ret_from_fork+0x10/0x20 [ 20.514411] [ 20.514442] Allocated by task 265: [ 20.514484] kasan_save_stack+0x3c/0x68 [ 20.514683] kasan_save_track+0x20/0x40 [ 20.514726] kasan_save_alloc_info+0x40/0x58 [ 20.514769] __kasan_kmalloc+0xd4/0xd8 [ 20.514805] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.515144] kasan_atomics+0xb8/0x2e0 [ 20.515434] kunit_try_run_case+0x170/0x3f0 [ 20.515636] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.515707] kthread+0x328/0x630 [ 20.515768] ret_from_fork+0x10/0x20 [ 20.515814] [ 20.516092] The buggy address belongs to the object at fff00000c79f5980 [ 20.516092] which belongs to the cache kmalloc-64 of size 64 [ 20.516959] The buggy address is located 0 bytes to the right of [ 20.516959] allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0) [ 20.517377] [ 20.517426] The buggy address belongs to the physical page: [ 20.517496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5 [ 20.517807] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.517971] page_type: f5(slab) [ 20.518114] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.518337] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.518945] page dumped because: kasan: bad access detected [ 20.519049] [ 20.519237] Memory state around the buggy address: [ 20.519286] fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.519404] fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.519908] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.520002] ^ [ 20.520102] fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.520157] fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.520199] ================================================================== [ 20.341668] ================================================================== [ 20.341730] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 20.342238] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265 [ 20.342291] [ 20.342625] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.342723] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.342751] Hardware name: linux,dummy-virt (DT) [ 20.342784] Call trace: [ 20.343138] show_stack+0x20/0x38 (C) [ 20.343226] dump_stack_lvl+0x8c/0xd0 [ 20.343507] print_report+0x118/0x608 [ 20.343937] kasan_report+0xdc/0x128 [ 20.344114] kasan_check_range+0x100/0x1a8 [ 20.344426] __kasan_check_write+0x20/0x30 [ 20.344750] kasan_atomics_helper+0x1190/0x4858 [ 20.344928] kasan_atomics+0x198/0x2e0 [ 20.345188] kunit_try_run_case+0x170/0x3f0 [ 20.345573] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.345706] kthread+0x328/0x630 [ 20.345759] ret_from_fork+0x10/0x20 [ 20.345941] [ 20.346046] Allocated by task 265: [ 20.346285] kasan_save_stack+0x3c/0x68 [ 20.346614] kasan_save_track+0x20/0x40 [ 20.346873] kasan_save_alloc_info+0x40/0x58 [ 20.347019] __kasan_kmalloc+0xd4/0xd8 [ 20.347061] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.347103] kasan_atomics+0xb8/0x2e0 [ 20.347147] kunit_try_run_case+0x170/0x3f0 [ 20.347189] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.348174] kthread+0x328/0x630 [ 20.348241] ret_from_fork+0x10/0x20 [ 20.348316] [ 20.348372] The buggy address belongs to the object at fff00000c79f5980 [ 20.348372] which belongs to the cache kmalloc-64 of size 64 [ 20.348480] The buggy address is located 0 bytes to the right of [ 20.348480] allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0) [ 20.348818] [ 20.348949] The buggy address belongs to the physical page: [ 20.349363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5 [ 20.349484] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.349540] page_type: f5(slab) [ 20.349581] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.349895] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.350100] page dumped because: kasan: bad access detected [ 20.350148] [ 20.350422] Memory state around the buggy address: [ 20.350701] fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.351079] fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.351134] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.351179] ^ [ 20.351214] fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.351539] fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.351852] ================================================================== [ 20.234139] ================================================================== [ 20.234402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 20.234790] Read of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265 [ 20.234855] [ 20.235037] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.235985] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.236069] Hardware name: linux,dummy-virt (DT) [ 20.236107] Call trace: [ 20.236133] show_stack+0x20/0x38 (C) [ 20.236363] dump_stack_lvl+0x8c/0xd0 [ 20.236544] print_report+0x118/0x608 [ 20.236959] kasan_report+0xdc/0x128 [ 20.237110] kasan_check_range+0x100/0x1a8 [ 20.237560] __kasan_check_read+0x20/0x30 [ 20.237650] kasan_atomics_helper+0xdd4/0x4858 [ 20.238000] kasan_atomics+0x198/0x2e0 [ 20.238238] kunit_try_run_case+0x170/0x3f0 [ 20.238427] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.238585] kthread+0x328/0x630 [ 20.238651] ret_from_fork+0x10/0x20 [ 20.238959] [ 20.239204] Allocated by task 265: [ 20.239261] kasan_save_stack+0x3c/0x68 [ 20.239310] kasan_save_track+0x20/0x40 [ 20.239349] kasan_save_alloc_info+0x40/0x58 [ 20.239782] __kasan_kmalloc+0xd4/0xd8 [ 20.240277] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.240506] kasan_atomics+0xb8/0x2e0 [ 20.240747] kunit_try_run_case+0x170/0x3f0 [ 20.240821] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.241108] kthread+0x328/0x630 [ 20.241393] ret_from_fork+0x10/0x20 [ 20.241583] [ 20.241852] The buggy address belongs to the object at fff00000c79f5980 [ 20.241852] which belongs to the cache kmalloc-64 of size 64 [ 20.242052] The buggy address is located 0 bytes to the right of [ 20.242052] allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0) [ 20.242273] [ 20.242455] The buggy address belongs to the physical page: [ 20.242813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5 [ 20.242958] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.243252] page_type: f5(slab) [ 20.243677] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.243891] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.243952] page dumped because: kasan: bad access detected [ 20.243994] [ 20.244022] Memory state around the buggy address: [ 20.244715] fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.244841] fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.244978] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.245184] ^ [ 20.245429] fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.245524] fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.245689] ================================================================== [ 20.124205] ================================================================== [ 20.124316] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 20.124371] Write of size 4 at addr fff00000c79f59b0 by task kunit_try_catch/265 [ 20.124425] [ 20.124473] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.124559] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.124588] Hardware name: linux,dummy-virt (DT) [ 20.124624] Call trace: [ 20.124648] show_stack+0x20/0x38 (C) [ 20.124698] dump_stack_lvl+0x8c/0xd0 [ 20.124766] print_report+0x118/0x608 [ 20.124816] kasan_report+0xdc/0x128 [ 20.124862] kasan_check_range+0x100/0x1a8 [ 20.124913] __kasan_check_write+0x20/0x30 [ 20.124961] kasan_atomics_helper+0xa04/0x4858 [ 20.125011] kasan_atomics+0x198/0x2e0 [ 20.125057] kunit_try_run_case+0x170/0x3f0 [ 20.125107] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.125162] kthread+0x328/0x630 [ 20.125206] ret_from_fork+0x10/0x20 [ 20.125255] [ 20.125285] Allocated by task 265: [ 20.125316] kasan_save_stack+0x3c/0x68 [ 20.125357] kasan_save_track+0x20/0x40 [ 20.125398] kasan_save_alloc_info+0x40/0x58 [ 20.125441] __kasan_kmalloc+0xd4/0xd8 [ 20.125655] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.125706] kasan_atomics+0xb8/0x2e0 [ 20.125743] kunit_try_run_case+0x170/0x3f0 [ 20.126407] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.126711] kthread+0x328/0x630 [ 20.126802] ret_from_fork+0x10/0x20 [ 20.126882] [ 20.127198] The buggy address belongs to the object at fff00000c79f5980 [ 20.127198] which belongs to the cache kmalloc-64 of size 64 [ 20.127324] The buggy address is located 0 bytes to the right of [ 20.127324] allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0) [ 20.127497] [ 20.127680] The buggy address belongs to the physical page: [ 20.127736] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5 [ 20.128080] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.128261] page_type: f5(slab) [ 20.128388] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.128625] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.128886] page dumped because: kasan: bad access detected [ 20.129294] [ 20.129344] Memory state around the buggy address: [ 20.129486] fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.129539] fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.129776] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.129976] ^ [ 20.130083] fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.130179] fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.130222] ================================================================== [ 20.257034] ================================================================== [ 20.257168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 20.257222] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265 [ 20.257288] [ 20.257321] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.257408] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.257659] Hardware name: linux,dummy-virt (DT) [ 20.257801] Call trace: [ 20.257835] show_stack+0x20/0x38 (C) [ 20.258143] dump_stack_lvl+0x8c/0xd0 [ 20.258563] print_report+0x118/0x608 [ 20.258633] kasan_report+0xdc/0x128 [ 20.258733] kasan_check_range+0x100/0x1a8 [ 20.258787] __kasan_check_write+0x20/0x30 [ 20.259300] kasan_atomics_helper+0xe44/0x4858 [ 20.259470] kasan_atomics+0x198/0x2e0 [ 20.259832] kunit_try_run_case+0x170/0x3f0 [ 20.260470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.260659] kthread+0x328/0x630 [ 20.260785] ret_from_fork+0x10/0x20 [ 20.261189] [ 20.261221] Allocated by task 265: [ 20.261438] kasan_save_stack+0x3c/0x68 [ 20.261695] kasan_save_track+0x20/0x40 [ 20.261754] kasan_save_alloc_info+0x40/0x58 [ 20.262006] __kasan_kmalloc+0xd4/0xd8 [ 20.262259] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.262544] kasan_atomics+0xb8/0x2e0 [ 20.262820] kunit_try_run_case+0x170/0x3f0 [ 20.263087] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.263431] kthread+0x328/0x630 [ 20.263488] ret_from_fork+0x10/0x20 [ 20.263529] [ 20.263553] The buggy address belongs to the object at fff00000c79f5980 [ 20.263553] which belongs to the cache kmalloc-64 of size 64 [ 20.263940] The buggy address is located 0 bytes to the right of [ 20.263940] allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0) [ 20.264433] [ 20.264480] The buggy address belongs to the physical page: [ 20.264655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5 [ 20.264934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.265314] page_type: f5(slab) [ 20.265647] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.266081] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.266300] page dumped because: kasan: bad access detected [ 20.266557] [ 20.266585] Memory state around the buggy address: [ 20.266628] fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.266675] fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.266889] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.266983] ^ [ 20.267041] fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.267331] fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.267689] ================================================================== [ 20.324245] ================================================================== [ 20.324476] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 20.324602] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265 [ 20.324673] [ 20.324853] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.324950] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.324980] Hardware name: linux,dummy-virt (DT) [ 20.325144] Call trace: [ 20.325382] show_stack+0x20/0x38 (C) [ 20.325594] dump_stack_lvl+0x8c/0xd0 [ 20.325798] print_report+0x118/0x608 [ 20.325860] kasan_report+0xdc/0x128 [ 20.325913] kasan_check_range+0x100/0x1a8 [ 20.325964] __kasan_check_write+0x20/0x30 [ 20.326533] kasan_atomics_helper+0x10c0/0x4858 [ 20.326743] kasan_atomics+0x198/0x2e0 [ 20.326806] kunit_try_run_case+0x170/0x3f0 [ 20.326856] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.326918] kthread+0x328/0x630 [ 20.327368] ret_from_fork+0x10/0x20 [ 20.327817] [ 20.327856] Allocated by task 265: [ 20.327950] kasan_save_stack+0x3c/0x68 [ 20.328006] kasan_save_track+0x20/0x40 [ 20.328045] kasan_save_alloc_info+0x40/0x58 [ 20.328089] __kasan_kmalloc+0xd4/0xd8 [ 20.328127] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.328391] kasan_atomics+0xb8/0x2e0 [ 20.328797] kunit_try_run_case+0x170/0x3f0 [ 20.329168] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.329600] kthread+0x328/0x630 [ 20.329889] ret_from_fork+0x10/0x20 [ 20.330086] [ 20.330130] The buggy address belongs to the object at fff00000c79f5980 [ 20.330130] which belongs to the cache kmalloc-64 of size 64 [ 20.330378] The buggy address is located 0 bytes to the right of [ 20.330378] allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0) [ 20.330601] [ 20.330799] The buggy address belongs to the physical page: [ 20.330873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5 [ 20.331071] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.331129] page_type: f5(slab) [ 20.331171] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.331227] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.331273] page dumped because: kasan: bad access detected [ 20.331596] [ 20.331813] Memory state around the buggy address: [ 20.331870] fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.332405] fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.332707] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.332829] ^ [ 20.333406] fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.333669] fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.333897] ================================================================== [ 20.441424] ================================================================== [ 20.441495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 20.441547] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265 [ 20.441600] [ 20.442128] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.442241] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.442270] Hardware name: linux,dummy-virt (DT) [ 20.442526] Call trace: [ 20.442711] show_stack+0x20/0x38 (C) [ 20.442863] dump_stack_lvl+0x8c/0xd0 [ 20.443069] print_report+0x118/0x608 [ 20.443750] kasan_report+0xdc/0x128 [ 20.443938] kasan_check_range+0x100/0x1a8 [ 20.444182] __kasan_check_write+0x20/0x30 [ 20.444234] kasan_atomics_helper+0x15b4/0x4858 [ 20.444285] kasan_atomics+0x198/0x2e0 [ 20.444332] kunit_try_run_case+0x170/0x3f0 [ 20.444825] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.445121] kthread+0x328/0x630 [ 20.445395] ret_from_fork+0x10/0x20 [ 20.445522] [ 20.445548] Allocated by task 265: [ 20.445719] kasan_save_stack+0x3c/0x68 [ 20.445827] kasan_save_track+0x20/0x40 [ 20.446013] kasan_save_alloc_info+0x40/0x58 [ 20.446326] __kasan_kmalloc+0xd4/0xd8 [ 20.446539] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.446658] kasan_atomics+0xb8/0x2e0 [ 20.446705] kunit_try_run_case+0x170/0x3f0 [ 20.446744] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.446791] kthread+0x328/0x630 [ 20.446826] ret_from_fork+0x10/0x20 [ 20.446865] [ 20.446888] The buggy address belongs to the object at fff00000c79f5980 [ 20.446888] which belongs to the cache kmalloc-64 of size 64 [ 20.446951] The buggy address is located 0 bytes to the right of [ 20.446951] allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0) [ 20.447021] [ 20.447333] The buggy address belongs to the physical page: [ 20.447531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5 [ 20.447620] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.447674] page_type: f5(slab) [ 20.447726] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.447780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.447837] page dumped because: kasan: bad access detected [ 20.447873] [ 20.447902] Memory state around the buggy address: [ 20.447948] fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.447995] fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.448041] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.448094] ^ [ 20.448138] fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.448189] fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.448240] ================================================================== [ 20.411024] ================================================================== [ 20.411215] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 20.411628] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265 [ 20.411825] [ 20.411930] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.412024] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.412202] Hardware name: linux,dummy-virt (DT) [ 20.412619] Call trace: [ 20.412675] show_stack+0x20/0x38 (C) [ 20.413116] dump_stack_lvl+0x8c/0xd0 [ 20.413624] print_report+0x118/0x608 [ 20.413814] kasan_report+0xdc/0x128 [ 20.413912] kasan_check_range+0x100/0x1a8 [ 20.414162] __kasan_check_write+0x20/0x30 [ 20.414574] kasan_atomics_helper+0x147c/0x4858 [ 20.414804] kasan_atomics+0x198/0x2e0 [ 20.414957] kunit_try_run_case+0x170/0x3f0 [ 20.415022] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.415429] kthread+0x328/0x630 [ 20.415535] ret_from_fork+0x10/0x20 [ 20.415860] [ 20.416030] Allocated by task 265: [ 20.416119] kasan_save_stack+0x3c/0x68 [ 20.416274] kasan_save_track+0x20/0x40 [ 20.416381] kasan_save_alloc_info+0x40/0x58 [ 20.416517] __kasan_kmalloc+0xd4/0xd8 [ 20.416560] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.416605] kasan_atomics+0xb8/0x2e0 [ 20.416641] kunit_try_run_case+0x170/0x3f0 [ 20.416681] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.416728] kthread+0x328/0x630 [ 20.416764] ret_from_fork+0x10/0x20 [ 20.416802] [ 20.416841] The buggy address belongs to the object at fff00000c79f5980 [ 20.416841] which belongs to the cache kmalloc-64 of size 64 [ 20.416912] The buggy address is located 0 bytes to the right of [ 20.416912] allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0) [ 20.416981] [ 20.417017] The buggy address belongs to the physical page: [ 20.417060] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5 [ 20.417137] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.417198] page_type: f5(slab) [ 20.417239] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.417293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.417357] page dumped because: kasan: bad access detected [ 20.417393] [ 20.417422] Memory state around the buggy address: [ 20.417479] fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.417526] fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.417582] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.417631] ^ [ 20.417665] fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.417721] fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.417763] ================================================================== [ 20.114227] ================================================================== [ 20.114392] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 20.114466] Write of size 4 at addr fff00000c79f59b0 by task kunit_try_catch/265 [ 20.114521] [ 20.114634] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.114728] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.114775] Hardware name: linux,dummy-virt (DT) [ 20.115164] Call trace: [ 20.115215] show_stack+0x20/0x38 (C) [ 20.115457] dump_stack_lvl+0x8c/0xd0 [ 20.115607] print_report+0x118/0x608 [ 20.115711] kasan_report+0xdc/0x128 [ 20.115768] kasan_check_range+0x100/0x1a8 [ 20.115818] __kasan_check_write+0x20/0x30 [ 20.116045] kasan_atomics_helper+0x99c/0x4858 [ 20.116201] kasan_atomics+0x198/0x2e0 [ 20.116401] kunit_try_run_case+0x170/0x3f0 [ 20.116633] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.116713] kthread+0x328/0x630 [ 20.116799] ret_from_fork+0x10/0x20 [ 20.117288] [ 20.117319] Allocated by task 265: [ 20.117390] kasan_save_stack+0x3c/0x68 [ 20.117727] kasan_save_track+0x20/0x40 [ 20.117920] kasan_save_alloc_info+0x40/0x58 [ 20.118072] __kasan_kmalloc+0xd4/0xd8 [ 20.118183] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.118329] kasan_atomics+0xb8/0x2e0 [ 20.118623] kunit_try_run_case+0x170/0x3f0 [ 20.118870] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.118974] kthread+0x328/0x630 [ 20.119122] ret_from_fork+0x10/0x20 [ 20.119163] [ 20.119185] The buggy address belongs to the object at fff00000c79f5980 [ 20.119185] which belongs to the cache kmalloc-64 of size 64 [ 20.119255] The buggy address is located 0 bytes to the right of [ 20.119255] allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0) [ 20.119666] [ 20.119701] The buggy address belongs to the physical page: [ 20.119825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5 [ 20.119958] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.120102] page_type: f5(slab) [ 20.120149] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.120410] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.120665] page dumped because: kasan: bad access detected [ 20.121181] [ 20.121228] Memory state around the buggy address: [ 20.121694] fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.121978] fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.122042] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.122436] ^ [ 20.122711] fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.122809] fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.122921] ================================================================== [ 19.885600] ================================================================== [ 19.900033] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 19.900456] dump_stack_lvl+0x8c/0xd0 [ 19.901145] __kasan_kmalloc+0xd4/0xd8 [ 19.902268] The buggy address belongs to the physical page: [ 19.903568] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.904804] fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.905202] ^ [ 19.905404] ================================================================== [ 20.431305] ================================================================== [ 20.431805] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 20.432041] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265 [ 20.432156] [ 20.432217] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.432878] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.433079] Hardware name: linux,dummy-virt (DT) [ 20.433266] Call trace: [ 20.433371] show_stack+0x20/0x38 (C) [ 20.433842] dump_stack_lvl+0x8c/0xd0 [ 20.434042] print_report+0x118/0x608 [ 20.434133] kasan_report+0xdc/0x128 [ 20.434296] kasan_check_range+0x100/0x1a8 [ 20.434436] __kasan_check_write+0x20/0x30 [ 20.434494] kasan_atomics_helper+0x154c/0x4858 [ 20.434546] kasan_atomics+0x198/0x2e0 [ 20.434601] kunit_try_run_case+0x170/0x3f0 [ 20.434651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.434705] kthread+0x328/0x630 [ 20.434751] ret_from_fork+0x10/0x20 [ 20.434800] [ 20.434832] Allocated by task 265: [ 20.434878] kasan_save_stack+0x3c/0x68 [ 20.434921] kasan_save_track+0x20/0x40 [ 20.434971] kasan_save_alloc_info+0x40/0x58 [ 20.435276] __kasan_kmalloc+0xd4/0xd8 [ 20.435640] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.435728] kasan_atomics+0xb8/0x2e0 [ 20.436085] kunit_try_run_case+0x170/0x3f0 [ 20.436135] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.436191] kthread+0x328/0x630 [ 20.436226] ret_from_fork+0x10/0x20 [ 20.436587] [ 20.437036] The buggy address belongs to the object at fff00000c79f5980 [ 20.437036] which belongs to the cache kmalloc-64 of size 64 [ 20.437164] The buggy address is located 0 bytes to the right of [ 20.437164] allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0) [ 20.437525] [ 20.437740] The buggy address belongs to the physical page: [ 20.437860] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5 [ 20.438028] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.438246] page_type: f5(slab) [ 20.438722] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.438793] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.439016] page dumped because: kasan: bad access detected [ 20.439567] [ 20.439613] Memory state around the buggy address: [ 20.439668] fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.439717] fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.439763] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.439805] ^ [ 20.440368] fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.440602] fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.440766] ================================================================== [ 20.298112] ================================================================== [ 20.298361] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 20.298657] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265 [ 20.298727] [ 20.298826] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.298956] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.299021] Hardware name: linux,dummy-virt (DT) [ 20.299110] Call trace: [ 20.299170] show_stack+0x20/0x38 (C) [ 20.299310] dump_stack_lvl+0x8c/0xd0 [ 20.299488] print_report+0x118/0x608 [ 20.299610] kasan_report+0xdc/0x128 [ 20.299658] kasan_check_range+0x100/0x1a8 [ 20.299717] __kasan_check_write+0x20/0x30 [ 20.299926] kasan_atomics_helper+0xf88/0x4858 [ 20.300028] kasan_atomics+0x198/0x2e0 [ 20.300086] kunit_try_run_case+0x170/0x3f0 [ 20.300136] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.300192] kthread+0x328/0x630 [ 20.300237] ret_from_fork+0x10/0x20 [ 20.300295] [ 20.300318] Allocated by task 265: [ 20.300347] kasan_save_stack+0x3c/0x68 [ 20.300407] kasan_save_track+0x20/0x40 [ 20.300460] kasan_save_alloc_info+0x40/0x58 [ 20.300511] __kasan_kmalloc+0xd4/0xd8 [ 20.300552] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.300601] kasan_atomics+0xb8/0x2e0 [ 20.300647] kunit_try_run_case+0x170/0x3f0 [ 20.300688] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.300748] kthread+0x328/0x630 [ 20.300783] ret_from_fork+0x10/0x20 [ 20.300821] [ 20.300852] The buggy address belongs to the object at fff00000c79f5980 [ 20.300852] which belongs to the cache kmalloc-64 of size 64 [ 20.300920] The buggy address is located 0 bytes to the right of [ 20.300920] allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0) [ 20.300997] [ 20.301034] The buggy address belongs to the physical page: [ 20.301068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5 [ 20.301136] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.301188] page_type: f5(slab) [ 20.301228] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.301282] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.301336] page dumped because: kasan: bad access detected [ 20.301380] [ 20.301410] Memory state around the buggy address: [ 20.301552] fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.302409] fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.302618] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.302968] ^ [ 20.303031] fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.303576] fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.303708] ================================================================== [ 20.400083] ================================================================== [ 20.400612] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 20.400769] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265 [ 20.400866] [ 20.400900] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.401046] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.401410] Hardware name: linux,dummy-virt (DT) [ 20.401824] Call trace: [ 20.401870] show_stack+0x20/0x38 (C) [ 20.402014] dump_stack_lvl+0x8c/0xd0 [ 20.402071] print_report+0x118/0x608 [ 20.402203] kasan_report+0xdc/0x128 [ 20.402255] kasan_check_range+0x100/0x1a8 [ 20.402546] __kasan_check_write+0x20/0x30 [ 20.402596] kasan_atomics_helper+0x1414/0x4858 [ 20.402648] kasan_atomics+0x198/0x2e0 [ 20.402804] kunit_try_run_case+0x170/0x3f0 [ 20.402867] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.402923] kthread+0x328/0x630 [ 20.402968] ret_from_fork+0x10/0x20 [ 20.403751] [ 20.403878] Allocated by task 265: [ 20.404004] kasan_save_stack+0x3c/0x68 [ 20.404076] kasan_save_track+0x20/0x40 [ 20.404195] kasan_save_alloc_info+0x40/0x58 [ 20.404237] __kasan_kmalloc+0xd4/0xd8 [ 20.404277] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.404318] kasan_atomics+0xb8/0x2e0 [ 20.404521] kunit_try_run_case+0x170/0x3f0 [ 20.404756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.405046] kthread+0x328/0x630 [ 20.405283] ret_from_fork+0x10/0x20 [ 20.405366] [ 20.405415] The buggy address belongs to the object at fff00000c79f5980 [ 20.405415] which belongs to the cache kmalloc-64 of size 64 [ 20.405698] The buggy address is located 0 bytes to the right of [ 20.405698] allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0) [ 20.406166] [ 20.406534] The buggy address belongs to the physical page: [ 20.406810] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5 [ 20.407247] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.407309] page_type: f5(slab) [ 20.407607] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.408210] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.408293] page dumped because: kasan: bad access detected [ 20.408334] [ 20.408514] Memory state around the buggy address: [ 20.408788] fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.409016] fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.409071] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.409122] ^ [ 20.409158] fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.409728] fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.409793] ================================================================== [ 20.498979] ================================================================== [ 20.499927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 20.500026] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265 [ 20.500406] [ 20.500474] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.500632] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.500871] Hardware name: linux,dummy-virt (DT) [ 20.500911] Call trace: [ 20.501129] show_stack+0x20/0x38 (C) [ 20.501328] dump_stack_lvl+0x8c/0xd0 [ 20.501567] print_report+0x118/0x608 [ 20.501871] kasan_report+0xdc/0x128 [ 20.501930] kasan_check_range+0x100/0x1a8 [ 20.502251] __kasan_check_write+0x20/0x30 [ 20.502682] kasan_atomics_helper+0x175c/0x4858 [ 20.502892] kasan_atomics+0x198/0x2e0 [ 20.503008] kunit_try_run_case+0x170/0x3f0 [ 20.503105] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.503253] kthread+0x328/0x630 [ 20.503300] ret_from_fork+0x10/0x20 [ 20.503730] [ 20.503772] Allocated by task 265: [ 20.504289] kasan_save_stack+0x3c/0x68 [ 20.504421] kasan_save_track+0x20/0x40 [ 20.504574] kasan_save_alloc_info+0x40/0x58 [ 20.504617] __kasan_kmalloc+0xd4/0xd8 [ 20.504832] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.504953] kasan_atomics+0xb8/0x2e0 [ 20.505529] kunit_try_run_case+0x170/0x3f0 [ 20.505653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.505807] kthread+0x328/0x630 [ 20.505847] ret_from_fork+0x10/0x20 [ 20.506477] [ 20.506709] The buggy address belongs to the object at fff00000c79f5980 [ 20.506709] which belongs to the cache kmalloc-64 of size 64 [ 20.506949] The buggy address is located 0 bytes to the right of [ 20.506949] allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0) [ 20.507292] [ 20.507506] The buggy address belongs to the physical page: [ 20.507566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5 [ 20.507753] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.508009] page_type: f5(slab) [ 20.508256] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.508738] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.508831] page dumped because: kasan: bad access detected [ 20.508992] [ 20.509301] Memory state around the buggy address: [ 20.509553] fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.509618] fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.509817] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.509915] ^ [ 20.510244] fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.510557] fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.510761] ================================================================== [ 20.316514] ================================================================== [ 20.316997] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 20.317207] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265 [ 20.317262] [ 20.317298] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.317422] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.317462] Hardware name: linux,dummy-virt (DT) [ 20.317497] Call trace: [ 20.317532] show_stack+0x20/0x38 (C) [ 20.317582] dump_stack_lvl+0x8c/0xd0 [ 20.317640] print_report+0x118/0x608 [ 20.317688] kasan_report+0xdc/0x128 [ 20.317744] kasan_check_range+0x100/0x1a8 [ 20.317794] __kasan_check_write+0x20/0x30 [ 20.317841] kasan_atomics_helper+0x1058/0x4858 [ 20.317894] kasan_atomics+0x198/0x2e0 [ 20.317939] kunit_try_run_case+0x170/0x3f0 [ 20.317988] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.318043] kthread+0x328/0x630 [ 20.318085] ret_from_fork+0x10/0x20 [ 20.318134] [ 20.318154] Allocated by task 265: [ 20.318188] kasan_save_stack+0x3c/0x68 [ 20.318231] kasan_save_track+0x20/0x40 [ 20.318269] kasan_save_alloc_info+0x40/0x58 [ 20.318312] __kasan_kmalloc+0xd4/0xd8 [ 20.318349] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.318397] kasan_atomics+0xb8/0x2e0 [ 20.318439] kunit_try_run_case+0x170/0x3f0 [ 20.318486] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.318531] kthread+0x328/0x630 [ 20.318566] ret_from_fork+0x10/0x20 [ 20.318613] [ 20.318636] The buggy address belongs to the object at fff00000c79f5980 [ 20.318636] which belongs to the cache kmalloc-64 of size 64 [ 20.318699] The buggy address is located 0 bytes to the right of [ 20.318699] allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0) [ 20.318768] [ 20.318789] The buggy address belongs to the physical page: [ 20.318823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5 [ 20.318878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.318930] page_type: f5(slab) [ 20.318971] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.319411] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.319960] page dumped because: kasan: bad access detected [ 20.320021] [ 20.320089] Memory state around the buggy address: [ 20.320162] fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.320396] fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.320493] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.320821] ^ [ 20.321371] fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.321657] fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.321960] ================================================================== [ 20.364840] ================================================================== [ 20.364899] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 20.364950] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265 [ 20.365014] [ 20.365056] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.365141] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.365176] Hardware name: linux,dummy-virt (DT) [ 20.365218] Call trace: [ 20.365253] show_stack+0x20/0x38 (C) [ 20.365303] dump_stack_lvl+0x8c/0xd0 [ 20.365352] print_report+0x118/0x608 [ 20.365410] kasan_report+0xdc/0x128 [ 20.365471] kasan_check_range+0x100/0x1a8 [ 20.365531] __kasan_check_write+0x20/0x30 [ 20.365586] kasan_atomics_helper+0x126c/0x4858 [ 20.365644] kasan_atomics+0x198/0x2e0 [ 20.365700] kunit_try_run_case+0x170/0x3f0 [ 20.365750] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.365805] kthread+0x328/0x630 [ 20.365847] ret_from_fork+0x10/0x20 [ 20.365896] [ 20.365916] Allocated by task 265: [ 20.365946] kasan_save_stack+0x3c/0x68 [ 20.365987] kasan_save_track+0x20/0x40 [ 20.366027] kasan_save_alloc_info+0x40/0x58 [ 20.366073] __kasan_kmalloc+0xd4/0xd8 [ 20.366113] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.366158] kasan_atomics+0xb8/0x2e0 [ 20.366207] kunit_try_run_case+0x170/0x3f0 [ 20.366252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.366296] kthread+0x328/0x630 [ 20.366332] ret_from_fork+0x10/0x20 [ 20.366370] [ 20.366399] The buggy address belongs to the object at fff00000c79f5980 [ 20.366399] which belongs to the cache kmalloc-64 of size 64 [ 20.366898] The buggy address is located 0 bytes to the right of [ 20.366898] allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0) [ 20.366975] [ 20.366997] The buggy address belongs to the physical page: [ 20.367486] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5 [ 20.367565] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.367801] page_type: f5(slab) [ 20.368513] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.369161] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.369581] page dumped because: kasan: bad access detected [ 20.369627] [ 20.370336] Memory state around the buggy address: [ 20.370397] fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.370502] fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.370552] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.370846] ^ [ 20.371278] fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.371339] fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.371380] ================================================================== [ 20.335917] ================================================================== [ 20.336008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 20.336071] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265 [ 20.336123] [ 20.336154] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.336239] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.336472] Hardware name: linux,dummy-virt (DT) [ 20.336907] Call trace: [ 20.336955] show_stack+0x20/0x38 (C) [ 20.337009] dump_stack_lvl+0x8c/0xd0 [ 20.337210] print_report+0x118/0x608 [ 20.337286] kasan_report+0xdc/0x128 [ 20.337701] kasan_check_range+0x100/0x1a8 [ 20.337790] __kasan_check_write+0x20/0x30 [ 20.337840] kasan_atomics_helper+0x1128/0x4858 [ 20.338091] kasan_atomics+0x198/0x2e0 [ 20.338278] kunit_try_run_case+0x170/0x3f0 [ 20.338532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.338605] kthread+0x328/0x630 [ 20.338789] ret_from_fork+0x10/0x20 [ 20.339181] [ 20.339291] Allocated by task 265: [ 20.339378] kasan_save_stack+0x3c/0x68 [ 20.339617] kasan_save_track+0x20/0x40 [ 20.339666] kasan_save_alloc_info+0x40/0x58 [ 20.339833] __kasan_kmalloc+0xd4/0xd8 [ 20.340043] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.340094] kasan_atomics+0xb8/0x2e0 [ 20.340135] kunit_try_run_case+0x170/0x3f0 [ 20.340176] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.340246] kthread+0x328/0x630 [ 20.340290] ret_from_fork+0x10/0x20 [ 20.340327] [ 20.340361] The buggy address belongs to the object at fff00000c79f5980 [ 20.340361] which belongs to the cache kmalloc-64 of size 64 [ 20.340431] The buggy address is located 0 bytes to the right of [ 20.340431] allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0) [ 20.340512] [ 20.340552] The buggy address belongs to the physical page: [ 20.340593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5 [ 20.340662] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.340724] page_type: f5(slab) [ 20.340763] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.340819] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.340865] page dumped because: kasan: bad access detected [ 20.340900] [ 20.340939] Memory state around the buggy address: [ 20.340994] fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.341052] fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.341108] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.341151] ^ [ 20.341187] fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.341241] fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.341285] ================================================================== [ 20.493652] ================================================================== [ 20.493720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 20.493772] Read of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265 [ 20.493825] [ 20.493855] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.493937] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.493965] Hardware name: linux,dummy-virt (DT) [ 20.494000] Call trace: [ 20.494460] show_stack+0x20/0x38 (C) [ 20.494725] dump_stack_lvl+0x8c/0xd0 [ 20.494809] print_report+0x118/0x608 [ 20.494862] kasan_report+0xdc/0x128 [ 20.494974] __asan_report_load8_noabort+0x20/0x30 [ 20.495092] kasan_atomics_helper+0x3e10/0x4858 [ 20.495434] kasan_atomics+0x198/0x2e0 [ 20.495588] kunit_try_run_case+0x170/0x3f0 [ 20.495700] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.495914] kthread+0x328/0x630 [ 20.496125] ret_from_fork+0x10/0x20 [ 20.496622] [ 20.496654] Allocated by task 265: [ 20.496691] kasan_save_stack+0x3c/0x68 [ 20.496935] kasan_save_track+0x20/0x40 [ 20.496987] kasan_save_alloc_info+0x40/0x58 [ 20.497029] __kasan_kmalloc+0xd4/0xd8 [ 20.497130] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.497183] kasan_atomics+0xb8/0x2e0 [ 20.497233] kunit_try_run_case+0x170/0x3f0 [ 20.497273] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.497320] kthread+0x328/0x630 [ 20.497353] ret_from_fork+0x10/0x20 [ 20.497389] [ 20.497411] The buggy address belongs to the object at fff00000c79f5980 [ 20.497411] which belongs to the cache kmalloc-64 of size 64 [ 20.497485] The buggy address is located 0 bytes to the right of [ 20.497485] allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0) [ 20.497566] [ 20.497605] The buggy address belongs to the physical page: [ 20.497639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5 [ 20.497697] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.497747] page_type: f5(slab) [ 20.497788] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.497852] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.497899] page dumped because: kasan: bad access detected [ 20.497941] [ 20.497985] Memory state around the buggy address: [ 20.498025] fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.498093] fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.498139] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.498183] ^ [ 20.498219] fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.498264] fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.498306] ================================================================== [ 20.094976] ================================================================== [ 20.095254] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 20.095426] Read of size 4 at addr fff00000c79f59b0 by task kunit_try_catch/265 [ 20.095692] [ 20.095740] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.095917] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.096115] Hardware name: linux,dummy-virt (DT) [ 20.096155] Call trace: [ 20.096177] show_stack+0x20/0x38 (C) [ 20.096462] dump_stack_lvl+0x8c/0xd0 [ 20.096683] print_report+0x118/0x608 [ 20.096736] kasan_report+0xdc/0x128 [ 20.097199] __asan_report_load4_noabort+0x20/0x30 [ 20.097298] kasan_atomics_helper+0x42d8/0x4858 [ 20.097753] kasan_atomics+0x198/0x2e0 [ 20.097907] kunit_try_run_case+0x170/0x3f0 [ 20.097974] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.098185] kthread+0x328/0x630 [ 20.098402] ret_from_fork+0x10/0x20 [ 20.098824] [ 20.098881] Allocated by task 265: [ 20.099091] kasan_save_stack+0x3c/0x68 [ 20.099255] kasan_save_track+0x20/0x40 [ 20.099442] kasan_save_alloc_info+0x40/0x58 [ 20.099663] __kasan_kmalloc+0xd4/0xd8 [ 20.099710] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.100188] kasan_atomics+0xb8/0x2e0 [ 20.100364] kunit_try_run_case+0x170/0x3f0 [ 20.100496] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.100693] kthread+0x328/0x630 [ 20.100738] ret_from_fork+0x10/0x20 [ 20.100986] [ 20.101206] The buggy address belongs to the object at fff00000c79f5980 [ 20.101206] which belongs to the cache kmalloc-64 of size 64 [ 20.101278] The buggy address is located 0 bytes to the right of [ 20.101278] allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0) [ 20.101625] [ 20.101717] The buggy address belongs to the physical page: [ 20.101763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5 [ 20.101983] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.102172] page_type: f5(slab) [ 20.102456] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.102527] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.102890] Memory state around the buggy address: [ 20.103410] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.104911] ================================================================== [ 20.473272] ================================================================== [ 20.473325] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 20.473377] Read of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265 [ 20.473803] [ 20.473884] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.474039] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.474137] Hardware name: linux,dummy-virt (DT) [ 20.474181] Call trace: [ 20.474510] show_stack+0x20/0x38 (C) [ 20.474576] dump_stack_lvl+0x8c/0xd0 [ 20.474871] print_report+0x118/0x608 [ 20.475207] kasan_report+0xdc/0x128 [ 20.475434] __asan_report_load8_noabort+0x20/0x30 [ 20.475674] kasan_atomics_helper+0x3df4/0x4858 [ 20.475790] kasan_atomics+0x198/0x2e0 [ 20.476085] kunit_try_run_case+0x170/0x3f0 [ 20.476367] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.476531] kthread+0x328/0x630 [ 20.476581] ret_from_fork+0x10/0x20 [ 20.477146] [ 20.477229] Allocated by task 265: [ 20.477544] kasan_save_stack+0x3c/0x68 [ 20.477683] kasan_save_track+0x20/0x40 [ 20.477964] kasan_save_alloc_info+0x40/0x58 [ 20.478327] __kasan_kmalloc+0xd4/0xd8 [ 20.478537] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.478599] kasan_atomics+0xb8/0x2e0 [ 20.478647] kunit_try_run_case+0x170/0x3f0 [ 20.478689] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.478744] kthread+0x328/0x630 [ 20.478787] ret_from_fork+0x10/0x20 [ 20.478826] [ 20.478849] The buggy address belongs to the object at fff00000c79f5980 [ 20.478849] which belongs to the cache kmalloc-64 of size 64 [ 20.478922] The buggy address is located 0 bytes to the right of [ 20.478922] allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0) [ 20.479186] [ 20.479430] The buggy address belongs to the physical page: [ 20.479485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5 [ 20.480378] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.480918] page_type: f5(slab) [ 20.481001] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.481079] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.481149] page dumped because: kasan: bad access detected [ 20.481201] [ 20.481261] Memory state around the buggy address: [ 20.481610] fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.481678] fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.481855] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.482369] ^ [ 20.482651] fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.482729] fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.482978] ================================================================== [ 20.287934] ================================================================== [ 20.287991] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 20.288043] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265 [ 20.288097] [ 20.288603] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.288708] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.288737] Hardware name: linux,dummy-virt (DT) [ 20.288781] Call trace: [ 20.289241] show_stack+0x20/0x38 (C) [ 20.289490] dump_stack_lvl+0x8c/0xd0 [ 20.289686] print_report+0x118/0x608 [ 20.289780] kasan_report+0xdc/0x128 [ 20.289959] kasan_check_range+0x100/0x1a8 [ 20.290195] __kasan_check_write+0x20/0x30 [ 20.290263] kasan_atomics_helper+0xf20/0x4858 [ 20.290313] kasan_atomics+0x198/0x2e0 [ 20.290361] kunit_try_run_case+0x170/0x3f0 [ 20.290551] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.290748] kthread+0x328/0x630 [ 20.290834] ret_from_fork+0x10/0x20 [ 20.290896] [ 20.290918] Allocated by task 265: [ 20.290947] kasan_save_stack+0x3c/0x68 [ 20.291354] kasan_save_track+0x20/0x40 [ 20.291441] kasan_save_alloc_info+0x40/0x58 [ 20.291586] __kasan_kmalloc+0xd4/0xd8 [ 20.291919] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.292305] kasan_atomics+0xb8/0x2e0 [ 20.292387] kunit_try_run_case+0x170/0x3f0 [ 20.292486] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.292568] kthread+0x328/0x630 [ 20.292778] ret_from_fork+0x10/0x20 [ 20.292866] [ 20.293361] The buggy address belongs to the object at fff00000c79f5980 [ 20.293361] which belongs to the cache kmalloc-64 of size 64 [ 20.293631] The buggy address is located 0 bytes to the right of [ 20.293631] allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0) [ 20.294032] [ 20.294109] The buggy address belongs to the physical page: [ 20.294254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5 [ 20.294705] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.294771] page_type: f5(slab) [ 20.294943] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.295240] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.295425] page dumped because: kasan: bad access detected [ 20.295678] [ 20.295706] Memory state around the buggy address: [ 20.295748] fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.296044] fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.296510] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.296653] ^ [ 20.296715] fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.296769] fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.296812] ================================================================== [ 20.214784] ================================================================== [ 20.214926] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 20.214982] Write of size 4 at addr fff00000c79f59b0 by task kunit_try_catch/265 [ 20.215355] [ 20.215464] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.215604] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.215645] Hardware name: linux,dummy-virt (DT) [ 20.215678] Call trace: [ 20.215796] show_stack+0x20/0x38 (C) [ 20.215869] dump_stack_lvl+0x8c/0xd0 [ 20.215920] print_report+0x118/0x608 [ 20.215977] kasan_report+0xdc/0x128 [ 20.216025] kasan_check_range+0x100/0x1a8 [ 20.216073] __kasan_check_write+0x20/0x30 [ 20.216120] kasan_atomics_helper+0xd3c/0x4858 [ 20.216179] kasan_atomics+0x198/0x2e0 [ 20.216245] kunit_try_run_case+0x170/0x3f0 [ 20.216302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.216375] kthread+0x328/0x630 [ 20.216441] ret_from_fork+0x10/0x20 [ 20.217190] [ 20.217337] Allocated by task 265: [ 20.217968] kasan_save_stack+0x3c/0x68 [ 20.218035] kasan_save_track+0x20/0x40 [ 20.218405] kasan_save_alloc_info+0x40/0x58 [ 20.218735] __kasan_kmalloc+0xd4/0xd8 [ 20.218887] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.219220] kasan_atomics+0xb8/0x2e0 [ 20.219628] kunit_try_run_case+0x170/0x3f0 [ 20.219875] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.220473] kthread+0x328/0x630 [ 20.220533] ret_from_fork+0x10/0x20 [ 20.220872] [ 20.221124] The buggy address belongs to the object at fff00000c79f5980 [ 20.221124] which belongs to the cache kmalloc-64 of size 64 [ 20.221266] The buggy address is located 0 bytes to the right of [ 20.221266] allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0) [ 20.221636] [ 20.221722] The buggy address belongs to the physical page: [ 20.221890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5 [ 20.222189] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.222381] page_type: f5(slab) [ 20.222816] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.222901] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.223148] page dumped because: kasan: bad access detected [ 20.223377] [ 20.223407] Memory state around the buggy address: [ 20.223583] fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.223745] fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.223983] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.224430] ^ [ 20.224515] fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.224950] fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.225103] ================================================================== [ 20.391414] ================================================================== [ 20.391737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 20.391805] Read of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265 [ 20.391859] [ 20.391890] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.391974] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.392002] Hardware name: linux,dummy-virt (DT) [ 20.392037] Call trace: [ 20.392059] show_stack+0x20/0x38 (C) [ 20.392108] dump_stack_lvl+0x8c/0xd0 [ 20.392156] print_report+0x118/0x608 [ 20.392883] kasan_report+0xdc/0x128 [ 20.392955] __asan_report_load8_noabort+0x20/0x30 [ 20.393008] kasan_atomics_helper+0x3f04/0x4858 [ 20.393069] kasan_atomics+0x198/0x2e0 [ 20.393189] kunit_try_run_case+0x170/0x3f0 [ 20.393271] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.393329] kthread+0x328/0x630 [ 20.393797] ret_from_fork+0x10/0x20 [ 20.393994] [ 20.394071] Allocated by task 265: [ 20.394106] kasan_save_stack+0x3c/0x68 [ 20.394159] kasan_save_track+0x20/0x40 [ 20.394248] kasan_save_alloc_info+0x40/0x58 [ 20.394293] __kasan_kmalloc+0xd4/0xd8 [ 20.394359] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.394562] kasan_atomics+0xb8/0x2e0 [ 20.394732] kunit_try_run_case+0x170/0x3f0 [ 20.394787] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.394832] kthread+0x328/0x630 [ 20.394867] ret_from_fork+0x10/0x20 [ 20.395280] [ 20.395333] The buggy address belongs to the object at fff00000c79f5980 [ 20.395333] which belongs to the cache kmalloc-64 of size 64 [ 20.395774] The buggy address is located 0 bytes to the right of [ 20.395774] allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0) [ 20.396338] [ 20.396373] The buggy address belongs to the physical page: [ 20.396518] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5 [ 20.396675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.396899] page_type: f5(slab) [ 20.397158] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.397589] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.397858] page dumped because: kasan: bad access detected [ 20.398097] [ 20.398440] Memory state around the buggy address: [ 20.398514] fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.398563] fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.399002] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.399191] ^ [ 20.399433] fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.399573] fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.399614] ================================================================== [ 20.521940] ================================================================== [ 20.522520] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 20.522653] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265 [ 20.522711] [ 20.522742] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.522973] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.523014] Hardware name: linux,dummy-virt (DT) [ 20.523477] Call trace: [ 20.523506] show_stack+0x20/0x38 (C) [ 20.523561] dump_stack_lvl+0x8c/0xd0 [ 20.523610] print_report+0x118/0x608 [ 20.523659] kasan_report+0xdc/0x128 [ 20.523957] kasan_check_range+0x100/0x1a8 [ 20.524078] __kasan_check_write+0x20/0x30 [ 20.524126] kasan_atomics_helper+0x17ec/0x4858 [ 20.524193] kasan_atomics+0x198/0x2e0 [ 20.524261] kunit_try_run_case+0x170/0x3f0 [ 20.524320] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.524382] kthread+0x328/0x630 [ 20.524438] ret_from_fork+0x10/0x20 [ 20.524506] [ 20.524530] Allocated by task 265: [ 20.524560] kasan_save_stack+0x3c/0x68 [ 20.524613] kasan_save_track+0x20/0x40 [ 20.524661] kasan_save_alloc_info+0x40/0x58 [ 20.524714] __kasan_kmalloc+0xd4/0xd8 [ 20.524751] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.524794] kasan_atomics+0xb8/0x2e0 [ 20.524840] kunit_try_run_case+0x170/0x3f0 [ 20.524882] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.524928] kthread+0x328/0x630 [ 20.524963] ret_from_fork+0x10/0x20 [ 20.525000] [ 20.525035] The buggy address belongs to the object at fff00000c79f5980 [ 20.525035] which belongs to the cache kmalloc-64 of size 64 [ 20.525106] The buggy address is located 0 bytes to the right of [ 20.525106] allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0) [ 20.525175] [ 20.525196] The buggy address belongs to the physical page: [ 20.525239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5 [ 20.525306] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.525356] page_type: f5(slab) [ 20.525406] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.526379] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.526471] page dumped because: kasan: bad access detected [ 20.526521] [ 20.526543] Memory state around the buggy address: [ 20.527139] fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.527339] fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.527886] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.528211] ^ [ 20.528359] fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.528498] fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.528824] ================================================================== [ 20.248316] ================================================================== [ 20.248459] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 20.248658] Read of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265 [ 20.248718] [ 20.248831] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.248919] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.248948] Hardware name: linux,dummy-virt (DT) [ 20.249017] Call trace: [ 20.249045] show_stack+0x20/0x38 (C) [ 20.249097] dump_stack_lvl+0x8c/0xd0 [ 20.249457] print_report+0x118/0x608 [ 20.249528] kasan_report+0xdc/0x128 [ 20.249577] __asan_report_load8_noabort+0x20/0x30 [ 20.249634] kasan_atomics_helper+0x3f58/0x4858 [ 20.249703] kasan_atomics+0x198/0x2e0 [ 20.249752] kunit_try_run_case+0x170/0x3f0 [ 20.249809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.249865] kthread+0x328/0x630 [ 20.249912] ret_from_fork+0x10/0x20 [ 20.249963] [ 20.249985] Allocated by task 265: [ 20.250020] kasan_save_stack+0x3c/0x68 [ 20.250063] kasan_save_track+0x20/0x40 [ 20.250103] kasan_save_alloc_info+0x40/0x58 [ 20.250154] __kasan_kmalloc+0xd4/0xd8 [ 20.250195] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.250237] kasan_atomics+0xb8/0x2e0 [ 20.250276] kunit_try_run_case+0x170/0x3f0 [ 20.250317] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.250363] kthread+0x328/0x630 [ 20.250396] ret_from_fork+0x10/0x20 [ 20.250438] [ 20.250785] The buggy address belongs to the object at fff00000c79f5980 [ 20.250785] which belongs to the cache kmalloc-64 of size 64 [ 20.250854] The buggy address is located 0 bytes to the right of [ 20.250854] allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0) [ 20.250973] [ 20.251156] The buggy address belongs to the physical page: [ 20.251774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5 [ 20.251877] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.252287] page_type: f5(slab) [ 20.252612] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.253288] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.253403] page dumped because: kasan: bad access detected [ 20.253673] [ 20.253818] Memory state around the buggy address: [ 20.253888] fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.254476] fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.254978] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.255319] ^ [ 20.255550] fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.255699] fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.255784] ================================================================== [ 20.269501] ================================================================== [ 20.269562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 20.269618] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265 [ 20.269705] [ 20.269740] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.269824] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.269852] Hardware name: linux,dummy-virt (DT) [ 20.269888] Call trace: [ 20.270488] show_stack+0x20/0x38 (C) [ 20.270651] dump_stack_lvl+0x8c/0xd0 [ 20.270711] print_report+0x118/0x608 [ 20.270925] kasan_report+0xdc/0x128 [ 20.270982] __asan_report_store8_noabort+0x20/0x30 [ 20.271151] kasan_atomics_helper+0x3e5c/0x4858 [ 20.271677] kasan_atomics+0x198/0x2e0 [ 20.271834] kunit_try_run_case+0x170/0x3f0 [ 20.271948] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.272132] kthread+0x328/0x630 [ 20.272199] ret_from_fork+0x10/0x20 [ 20.272370] [ 20.272583] Allocated by task 265: [ 20.272630] kasan_save_stack+0x3c/0x68 [ 20.273034] kasan_save_track+0x20/0x40 [ 20.273108] kasan_save_alloc_info+0x40/0x58 [ 20.273154] __kasan_kmalloc+0xd4/0xd8 [ 20.273194] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.273237] kasan_atomics+0xb8/0x2e0 [ 20.273372] kunit_try_run_case+0x170/0x3f0 [ 20.273420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.273476] kthread+0x328/0x630 [ 20.273511] ret_from_fork+0x10/0x20 [ 20.273550] [ 20.273798] The buggy address belongs to the object at fff00000c79f5980 [ 20.273798] which belongs to the cache kmalloc-64 of size 64 [ 20.273883] The buggy address is located 0 bytes to the right of [ 20.273883] allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0) [ 20.273955] [ 20.273978] The buggy address belongs to the physical page: [ 20.274020] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5 [ 20.274105] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.274168] page_type: f5(slab) [ 20.274210] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.274265] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.274311] page dumped because: kasan: bad access detected [ 20.274354] [ 20.274379] Memory state around the buggy address: [ 20.274427] fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.274945] fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.274997] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.275040] ^ [ 20.275625] fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.275945] fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.276562] ================================================================== [ 20.450083] ================================================================== [ 20.450186] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 20.450492] Read of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265 [ 20.450728] [ 20.450803] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.450899] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.450927] Hardware name: linux,dummy-virt (DT) [ 20.451011] Call trace: [ 20.451062] show_stack+0x20/0x38 (C) [ 20.451116] dump_stack_lvl+0x8c/0xd0 [ 20.451324] print_report+0x118/0x608 [ 20.451839] kasan_report+0xdc/0x128 [ 20.452029] __asan_report_load8_noabort+0x20/0x30 [ 20.452333] kasan_atomics_helper+0x3db0/0x4858 [ 20.452503] kasan_atomics+0x198/0x2e0 [ 20.452787] kunit_try_run_case+0x170/0x3f0 [ 20.453264] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.453707] kthread+0x328/0x630 [ 20.453768] ret_from_fork+0x10/0x20 [ 20.453977] [ 20.454121] Allocated by task 265: [ 20.454291] kasan_save_stack+0x3c/0x68 [ 20.454595] kasan_save_track+0x20/0x40 [ 20.455347] kasan_save_alloc_info+0x40/0x58 [ 20.455751] __kasan_kmalloc+0xd4/0xd8 [ 20.455834] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.455877] kasan_atomics+0xb8/0x2e0 [ 20.455917] kunit_try_run_case+0x170/0x3f0 [ 20.455956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.456393] kthread+0x328/0x630 [ 20.456492] ret_from_fork+0x10/0x20 [ 20.456833] [ 20.456869] The buggy address belongs to the object at fff00000c79f5980 [ 20.456869] which belongs to the cache kmalloc-64 of size 64 [ 20.457333] The buggy address is located 0 bytes to the right of [ 20.457333] allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0) [ 20.457960] [ 20.458292] The buggy address belongs to the physical page: [ 20.458436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5 [ 20.458838] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.459227] page_type: f5(slab) [ 20.459503] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.459719] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.459782] page dumped because: kasan: bad access detected [ 20.459818] [ 20.459838] Memory state around the buggy address: [ 20.459876] fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.460405] fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.460726] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.460942] ^ [ 20.461114] fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.461355] fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.461537] ================================================================== [ 20.277856] ================================================================== [ 20.277926] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 20.277980] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265 [ 20.278041] [ 20.278362] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.278552] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.278597] Hardware name: linux,dummy-virt (DT) [ 20.278634] Call trace: [ 20.278676] show_stack+0x20/0x38 (C) [ 20.278730] dump_stack_lvl+0x8c/0xd0 [ 20.279161] print_report+0x118/0x608 [ 20.279293] kasan_report+0xdc/0x128 [ 20.279582] kasan_check_range+0x100/0x1a8 [ 20.279677] __kasan_check_write+0x20/0x30 [ 20.279725] kasan_atomics_helper+0xeb8/0x4858 [ 20.279774] kasan_atomics+0x198/0x2e0 [ 20.280307] kunit_try_run_case+0x170/0x3f0 [ 20.280594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.280710] kthread+0x328/0x630 [ 20.280818] ret_from_fork+0x10/0x20 [ 20.280927] [ 20.280947] Allocated by task 265: [ 20.281383] kasan_save_stack+0x3c/0x68 [ 20.281721] kasan_save_track+0x20/0x40 [ 20.281930] kasan_save_alloc_info+0x40/0x58 [ 20.282193] __kasan_kmalloc+0xd4/0xd8 [ 20.282238] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.282573] kasan_atomics+0xb8/0x2e0 [ 20.282907] kunit_try_run_case+0x170/0x3f0 [ 20.283093] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.283149] kthread+0x328/0x630 [ 20.283186] ret_from_fork+0x10/0x20 [ 20.283225] [ 20.283249] The buggy address belongs to the object at fff00000c79f5980 [ 20.283249] which belongs to the cache kmalloc-64 of size 64 [ 20.283312] The buggy address is located 0 bytes to the right of [ 20.283312] allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0) [ 20.283921] [ 20.284096] The buggy address belongs to the physical page: [ 20.284170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5 [ 20.284236] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.284297] page_type: f5(slab) [ 20.284528] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.285099] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.285400] page dumped because: kasan: bad access detected [ 20.285558] [ 20.285767] Memory state around the buggy address: [ 20.285845] fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.286015] fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.286225] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.286410] ^ [ 20.286642] fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.286871] fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.287145] ================================================================== [ 20.131497] ================================================================== [ 20.131560] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 20.131613] Write of size 4 at addr fff00000c79f59b0 by task kunit_try_catch/265 [ 20.131666] [ 20.132248] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.132461] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.132500] Hardware name: linux,dummy-virt (DT) [ 20.132681] Call trace: [ 20.132717] show_stack+0x20/0x38 (C) [ 20.132945] dump_stack_lvl+0x8c/0xd0 [ 20.133035] print_report+0x118/0x608 [ 20.133086] kasan_report+0xdc/0x128 [ 20.133411] kasan_check_range+0x100/0x1a8 [ 20.133500] __kasan_check_write+0x20/0x30 [ 20.133717] kasan_atomics_helper+0xa6c/0x4858 [ 20.133904] kasan_atomics+0x198/0x2e0 [ 20.134090] kunit_try_run_case+0x170/0x3f0 [ 20.134225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.134428] kthread+0x328/0x630 [ 20.134508] ret_from_fork+0x10/0x20 [ 20.134577] [ 20.134722] Allocated by task 265: [ 20.134765] kasan_save_stack+0x3c/0x68 [ 20.134999] kasan_save_track+0x20/0x40 [ 20.135077] kasan_save_alloc_info+0x40/0x58 [ 20.135122] __kasan_kmalloc+0xd4/0xd8 [ 20.135162] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.135204] kasan_atomics+0xb8/0x2e0 [ 20.135411] kunit_try_run_case+0x170/0x3f0 [ 20.135702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.135904] kthread+0x328/0x630 [ 20.136142] ret_from_fork+0x10/0x20 [ 20.136211] [ 20.136289] The buggy address belongs to the object at fff00000c79f5980 [ 20.136289] which belongs to the cache kmalloc-64 of size 64 [ 20.136394] The buggy address is located 0 bytes to the right of [ 20.136394] allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0) [ 20.136683] [ 20.136779] The buggy address belongs to the physical page: [ 20.136817] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5 [ 20.137238] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.137305] page_type: f5(slab) [ 20.137508] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.137763] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.138189] page dumped because: kasan: bad access detected [ 20.138342] [ 20.138574] Memory state around the buggy address: [ 20.138627] fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.138830] fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.138908] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.138988] ^ [ 20.139041] fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.139089] fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.139139] ================================================================== [ 20.140733] ================================================================== [ 20.140790] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 20.140841] Write of size 4 at addr fff00000c79f59b0 by task kunit_try_catch/265 [ 20.140892] [ 20.140923] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.141008] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.141081] Hardware name: linux,dummy-virt (DT) [ 20.141121] Call trace: [ 20.141165] show_stack+0x20/0x38 (C) [ 20.141218] dump_stack_lvl+0x8c/0xd0 [ 20.141267] print_report+0x118/0x608 [ 20.141315] kasan_report+0xdc/0x128 [ 20.141367] kasan_check_range+0x100/0x1a8 [ 20.141418] __kasan_check_write+0x20/0x30 [ 20.141476] kasan_atomics_helper+0xad4/0x4858 [ 20.141526] kasan_atomics+0x198/0x2e0 [ 20.141572] kunit_try_run_case+0x170/0x3f0 [ 20.141629] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.141684] kthread+0x328/0x630 [ 20.141738] ret_from_fork+0x10/0x20 [ 20.141787] [ 20.141809] Allocated by task 265: [ 20.141849] kasan_save_stack+0x3c/0x68 [ 20.141900] kasan_save_track+0x20/0x40 [ 20.141941] kasan_save_alloc_info+0x40/0x58 [ 20.141983] __kasan_kmalloc+0xd4/0xd8 [ 20.142022] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.142064] kasan_atomics+0xb8/0x2e0 [ 20.142102] kunit_try_run_case+0x170/0x3f0 [ 20.142142] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.142189] kthread+0x328/0x630 [ 20.142238] ret_from_fork+0x10/0x20 [ 20.142276] [ 20.142298] The buggy address belongs to the object at fff00000c79f5980 [ 20.142298] which belongs to the cache kmalloc-64 of size 64 [ 20.142362] The buggy address is located 0 bytes to the right of [ 20.142362] allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0) [ 20.142436] [ 20.143364] The buggy address belongs to the physical page: [ 20.143606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5 [ 20.143778] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.144096] page_type: f5(slab) [ 20.144147] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.144293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.144417] page dumped because: kasan: bad access detected [ 20.144558] [ 20.144777] Memory state around the buggy address: [ 20.145042] fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.145527] fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.145772] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.145937] ^ [ 20.146180] fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.146367] fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.146412] ================================================================== [ 20.147245] ================================================================== [ 20.147320] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 20.147374] Read of size 4 at addr fff00000c79f59b0 by task kunit_try_catch/265 [ 20.147428] [ 20.147470] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.147924] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.148099] Hardware name: linux,dummy-virt (DT) [ 20.148165] Call trace: [ 20.148192] show_stack+0x20/0x38 (C) [ 20.148305] dump_stack_lvl+0x8c/0xd0 [ 20.148470] print_report+0x118/0x608 [ 20.148675] kasan_report+0xdc/0x128 [ 20.148737] __asan_report_load4_noabort+0x20/0x30 [ 20.148788] kasan_atomics_helper+0x3dcc/0x4858 [ 20.149009] kasan_atomics+0x198/0x2e0 [ 20.149219] kunit_try_run_case+0x170/0x3f0 [ 20.149513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.149584] kthread+0x328/0x630 [ 20.149636] ret_from_fork+0x10/0x20 [ 20.149819] [ 20.149991] Allocated by task 265: [ 20.150037] kasan_save_stack+0x3c/0x68 [ 20.150226] kasan_save_track+0x20/0x40 [ 20.150331] kasan_save_alloc_info+0x40/0x58 [ 20.150383] __kasan_kmalloc+0xd4/0xd8 [ 20.150430] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.150797] kasan_atomics+0xb8/0x2e0 [ 20.150859] kunit_try_run_case+0x170/0x3f0 [ 20.150901] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.151063] kthread+0x328/0x630 [ 20.151154] ret_from_fork+0x10/0x20 [ 20.151320] [ 20.151391] The buggy address belongs to the object at fff00000c79f5980 [ 20.151391] which belongs to the cache kmalloc-64 of size 64 [ 20.151633] The buggy address is located 0 bytes to the right of [ 20.151633] allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0) [ 20.153687] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.154999] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.155733] ================================================================== [ 20.015344] ================================================================== [ 20.016915] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 20.017642] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.017759] Call trace: [ 20.018922] kasan_atomics_helper+0x54c/0x4858 [ 20.018974] kasan_atomics+0x198/0x2e0 [ 20.019826] ret_from_fork+0x10/0x20 [ 20.021576] kunit_try_run_case+0x170/0x3f0 [ 20.022153] The buggy address is located 0 bytes to the right of [ 20.022153] allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0) [ 20.022361] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5 [ 20.022442] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.022783] fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.022940] ^ [ 20.023610] fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.026313] Write of size 4 at addr fff00000c79f59b0 by task kunit_try_catch/265 [ 20.026526] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.027778] kasan_report+0xdc/0x128 [ 20.029279] kasan_atomics+0x198/0x2e0 [ 20.031901] kunit_try_run_case+0x170/0x3f0 [ 20.032919] The buggy address is located 0 bytes to the right of [ 20.032919] allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0) [ 20.035030] Memory state around the buggy address: [ 20.035514] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.036128] ================================================================== [ 20.353216] ================================================================== [ 20.353458] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 20.353898] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265 [ 20.353968] [ 20.354185] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.354477] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.354520] Hardware name: linux,dummy-virt (DT) [ 20.354701] Call trace: [ 20.354759] show_stack+0x20/0x38 (C) [ 20.354972] dump_stack_lvl+0x8c/0xd0 [ 20.355422] print_report+0x118/0x608 [ 20.355490] kasan_report+0xdc/0x128 [ 20.355538] kasan_check_range+0x100/0x1a8 [ 20.356118] __kasan_check_write+0x20/0x30 [ 20.356315] kasan_atomics_helper+0x11f8/0x4858 [ 20.356517] kasan_atomics+0x198/0x2e0 [ 20.356638] kunit_try_run_case+0x170/0x3f0 [ 20.356757] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.356842] kthread+0x328/0x630 [ 20.357180] ret_from_fork+0x10/0x20 [ 20.357413] [ 20.357672] Allocated by task 265: [ 20.357748] kasan_save_stack+0x3c/0x68 [ 20.357975] kasan_save_track+0x20/0x40 [ 20.358021] kasan_save_alloc_info+0x40/0x58 [ 20.358234] __kasan_kmalloc+0xd4/0xd8 [ 20.358503] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.358733] kasan_atomics+0xb8/0x2e0 [ 20.358891] kunit_try_run_case+0x170/0x3f0 [ 20.358938] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.359457] kthread+0x328/0x630 [ 20.359664] ret_from_fork+0x10/0x20 [ 20.359757] [ 20.359781] The buggy address belongs to the object at fff00000c79f5980 [ 20.359781] which belongs to the cache kmalloc-64 of size 64 [ 20.360014] The buggy address is located 0 bytes to the right of [ 20.360014] allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0) [ 20.360216] [ 20.360339] The buggy address belongs to the physical page: [ 20.360713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5 [ 20.360809] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.360992] page_type: f5(slab) [ 20.361579] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.361996] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.362069] page dumped because: kasan: bad access detected [ 20.362106] [ 20.362126] Memory state around the buggy address: [ 20.362167] fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.362785] fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.363001] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.363053] ^ [ 20.363089] fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.363136] fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.363177] ================================================================== [ 20.372215] ================================================================== [ 20.372286] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 20.372438] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265 [ 20.372508] [ 20.372569] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.372656] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.373060] Hardware name: linux,dummy-virt (DT) [ 20.373246] Call trace: [ 20.373282] show_stack+0x20/0x38 (C) [ 20.373639] dump_stack_lvl+0x8c/0xd0 [ 20.373728] print_report+0x118/0x608 [ 20.374030] kasan_report+0xdc/0x128 [ 20.374313] kasan_check_range+0x100/0x1a8 [ 20.374454] __kasan_check_write+0x20/0x30 [ 20.374507] kasan_atomics_helper+0x12d8/0x4858 [ 20.374700] kasan_atomics+0x198/0x2e0 [ 20.374951] kunit_try_run_case+0x170/0x3f0 [ 20.375197] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.375515] kthread+0x328/0x630 [ 20.375873] ret_from_fork+0x10/0x20 [ 20.376291] [ 20.376336] Allocated by task 265: [ 20.376473] kasan_save_stack+0x3c/0x68 [ 20.376628] kasan_save_track+0x20/0x40 [ 20.376744] kasan_save_alloc_info+0x40/0x58 [ 20.376786] __kasan_kmalloc+0xd4/0xd8 [ 20.376826] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.376985] kasan_atomics+0xb8/0x2e0 [ 20.377986] kunit_try_run_case+0x170/0x3f0 [ 20.378062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.378143] kthread+0x328/0x630 [ 20.378204] ret_from_fork+0x10/0x20 [ 20.378244] [ 20.378283] The buggy address belongs to the object at fff00000c79f5980 [ 20.378283] which belongs to the cache kmalloc-64 of size 64 [ 20.378579] The buggy address is located 0 bytes to the right of [ 20.378579] allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0) [ 20.378848] [ 20.379192] The buggy address belongs to the physical page: [ 20.379873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5 [ 20.379953] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.380331] page_type: f5(slab) [ 20.380684] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.380765] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.380913] page dumped because: kasan: bad access detected [ 20.381019] [ 20.381048] Memory state around the buggy address: [ 20.381088] fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.381275] fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.381716] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.381912] ^ [ 20.381955] fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.382243] fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.382641] ================================================================== [ 20.419457] ================================================================== [ 20.419513] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 20.420093] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265 [ 20.420180] [ 20.420216] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.420440] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.420546] Hardware name: linux,dummy-virt (DT) [ 20.420680] Call trace: [ 20.420766] show_stack+0x20/0x38 (C) [ 20.420821] dump_stack_lvl+0x8c/0xd0 [ 20.421047] print_report+0x118/0x608 [ 20.421279] kasan_report+0xdc/0x128 [ 20.421345] kasan_check_range+0x100/0x1a8 [ 20.421561] __kasan_check_write+0x20/0x30 [ 20.421827] kasan_atomics_helper+0x14e4/0x4858 [ 20.421899] kasan_atomics+0x198/0x2e0 [ 20.421945] kunit_try_run_case+0x170/0x3f0 [ 20.421995] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.422048] kthread+0x328/0x630 [ 20.422588] ret_from_fork+0x10/0x20 [ 20.422817] [ 20.422845] Allocated by task 265: [ 20.422923] kasan_save_stack+0x3c/0x68 [ 20.423032] kasan_save_track+0x20/0x40 [ 20.423257] kasan_save_alloc_info+0x40/0x58 [ 20.423304] __kasan_kmalloc+0xd4/0xd8 [ 20.423534] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.424028] kasan_atomics+0xb8/0x2e0 [ 20.424239] kunit_try_run_case+0x170/0x3f0 [ 20.424383] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.424569] kthread+0x328/0x630 [ 20.424609] ret_from_fork+0x10/0x20 [ 20.424957] [ 20.425316] The buggy address belongs to the object at fff00000c79f5980 [ 20.425316] which belongs to the cache kmalloc-64 of size 64 [ 20.425671] The buggy address is located 0 bytes to the right of [ 20.425671] allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0) [ 20.426111] [ 20.426149] The buggy address belongs to the physical page: [ 20.426469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5 [ 20.426711] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.426943] page_type: f5(slab) [ 20.427100] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.427399] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.427657] page dumped because: kasan: bad access detected [ 20.427917] [ 20.427967] Memory state around the buggy address: [ 20.428028] fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.428324] fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.428803] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.429021] ^ [ 20.429198] fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.429290] fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.429798] ================================================================== [ 20.226930] ================================================================== [ 20.226992] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 20.227046] Read of size 4 at addr fff00000c79f59b0 by task kunit_try_catch/265 [ 20.227101] [ 20.227138] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.227221] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.227285] Hardware name: linux,dummy-virt (DT) [ 20.227324] Call trace: [ 20.227347] show_stack+0x20/0x38 (C) [ 20.227398] dump_stack_lvl+0x8c/0xd0 [ 20.227462] print_report+0x118/0x608 [ 20.227511] kasan_report+0xdc/0x128 [ 20.227557] __asan_report_load4_noabort+0x20/0x30 [ 20.227617] kasan_atomics_helper+0x3e04/0x4858 [ 20.227679] kasan_atomics+0x198/0x2e0 [ 20.227735] kunit_try_run_case+0x170/0x3f0 [ 20.227786] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.227840] kthread+0x328/0x630 [ 20.227886] ret_from_fork+0x10/0x20 [ 20.227943] [ 20.227969] Allocated by task 265: [ 20.227999] kasan_save_stack+0x3c/0x68 [ 20.228042] kasan_save_track+0x20/0x40 [ 20.228081] kasan_save_alloc_info+0x40/0x58 [ 20.228123] __kasan_kmalloc+0xd4/0xd8 [ 20.228161] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.228212] kasan_atomics+0xb8/0x2e0 [ 20.228256] kunit_try_run_case+0x170/0x3f0 [ 20.228296] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.228341] kthread+0x328/0x630 [ 20.228384] ret_from_fork+0x10/0x20 [ 20.228421] [ 20.228802] The buggy address belongs to the object at fff00000c79f5980 [ 20.228802] which belongs to the cache kmalloc-64 of size 64 [ 20.229229] The buggy address is located 0 bytes to the right of [ 20.229229] allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0) [ 20.229338] [ 20.229360] The buggy address belongs to the physical page: [ 20.229395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5 [ 20.229467] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.229519] page_type: f5(slab) [ 20.229944] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.230570] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.230866] page dumped because: kasan: bad access detected [ 20.230924] [ 20.231157] Memory state around the buggy address: [ 20.231226] fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.231276] fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.231747] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.232062] ^ [ 20.232422] fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.232550] fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.232617] ================================================================== [ 20.383726] ================================================================== [ 20.383829] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 20.384021] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265 [ 20.384138] [ 20.384181] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.384266] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.384296] Hardware name: linux,dummy-virt (DT) [ 20.384749] Call trace: [ 20.384810] show_stack+0x20/0x38 (C) [ 20.384912] dump_stack_lvl+0x8c/0xd0 [ 20.384966] print_report+0x118/0x608 [ 20.385028] kasan_report+0xdc/0x128 [ 20.385269] kasan_check_range+0x100/0x1a8 [ 20.385620] __kasan_check_write+0x20/0x30 [ 20.385980] kasan_atomics_helper+0x1384/0x4858 [ 20.386065] kasan_atomics+0x198/0x2e0 [ 20.386263] kunit_try_run_case+0x170/0x3f0 [ 20.386374] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.386612] kthread+0x328/0x630 [ 20.386693] ret_from_fork+0x10/0x20 [ 20.386747] [ 20.386806] Allocated by task 265: [ 20.387111] kasan_save_stack+0x3c/0x68 [ 20.387379] kasan_save_track+0x20/0x40 [ 20.387540] kasan_save_alloc_info+0x40/0x58 [ 20.387642] __kasan_kmalloc+0xd4/0xd8 [ 20.387686] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.387727] kasan_atomics+0xb8/0x2e0 [ 20.387879] kunit_try_run_case+0x170/0x3f0 [ 20.388151] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.388383] kthread+0x328/0x630 [ 20.388699] ret_from_fork+0x10/0x20 [ 20.388922] [ 20.389242] The buggy address belongs to the object at fff00000c79f5980 [ 20.389242] which belongs to the cache kmalloc-64 of size 64 [ 20.389469] The buggy address is located 0 bytes to the right of [ 20.389469] allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0) [ 20.389567] [ 20.389600] The buggy address belongs to the physical page: [ 20.389643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5 [ 20.389722] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.389777] page_type: f5(slab) [ 20.389819] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.389873] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.389918] page dumped because: kasan: bad access detected [ 20.389967] [ 20.389987] Memory state around the buggy address: [ 20.390023] fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.390080] fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.390141] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.390183] ^ [ 20.390217] fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.390263] fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.390313] ================================================================== [ 20.464056] ================================================================== [ 20.464364] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 20.464561] Write of size 8 at addr fff00000c79f59b0 by task kunit_try_catch/265 [ 20.464631] [ 20.464665] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.464811] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.464909] Hardware name: linux,dummy-virt (DT) [ 20.464946] Call trace: [ 20.465315] show_stack+0x20/0x38 (C) [ 20.465396] dump_stack_lvl+0x8c/0xd0 [ 20.465468] print_report+0x118/0x608 [ 20.465689] kasan_report+0xdc/0x128 [ 20.466032] kasan_check_range+0x100/0x1a8 [ 20.466111] __kasan_check_write+0x20/0x30 [ 20.466157] kasan_atomics_helper+0x1644/0x4858 [ 20.466207] kasan_atomics+0x198/0x2e0 [ 20.466648] kunit_try_run_case+0x170/0x3f0 [ 20.466893] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.467197] kthread+0x328/0x630 [ 20.467483] ret_from_fork+0x10/0x20 [ 20.467825] [ 20.468019] Allocated by task 265: [ 20.468056] kasan_save_stack+0x3c/0x68 [ 20.468103] kasan_save_track+0x20/0x40 [ 20.468143] kasan_save_alloc_info+0x40/0x58 [ 20.468536] __kasan_kmalloc+0xd4/0xd8 [ 20.468727] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.469039] kasan_atomics+0xb8/0x2e0 [ 20.469114] kunit_try_run_case+0x170/0x3f0 [ 20.469345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.469397] kthread+0x328/0x630 [ 20.469644] ret_from_fork+0x10/0x20 [ 20.469817] [ 20.469869] The buggy address belongs to the object at fff00000c79f5980 [ 20.469869] which belongs to the cache kmalloc-64 of size 64 [ 20.470286] The buggy address is located 0 bytes to the right of [ 20.470286] allocated 48-byte region [fff00000c79f5980, fff00000c79f59b0) [ 20.470547] [ 20.470824] The buggy address belongs to the physical page: [ 20.470920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f5 [ 20.471110] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.471168] page_type: f5(slab) [ 20.471209] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.471265] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.471311] page dumped because: kasan: bad access detected [ 20.471346] [ 20.471366] Memory state around the buggy address: [ 20.471403] fff00000c79f5880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.471713] fff00000c79f5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.472064] >fff00000c79f5980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.472141] ^ [ 20.472353] fff00000c79f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.472471] fff00000c79f5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.472575] ==================================================================
[ 14.360217] ================================================================== [ 14.360791] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 14.361354] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.361596] [ 14.361694] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.361736] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.361750] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.361771] Call Trace: [ 14.361785] <TASK> [ 14.361802] dump_stack_lvl+0x73/0xb0 [ 14.361829] print_report+0xd1/0x650 [ 14.361853] ? __virt_addr_valid+0x1db/0x2d0 [ 14.361875] ? kasan_atomics_helper+0x1148/0x5450 [ 14.361896] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.361918] ? kasan_atomics_helper+0x1148/0x5450 [ 14.361940] kasan_report+0x141/0x180 [ 14.361963] ? kasan_atomics_helper+0x1148/0x5450 [ 14.361989] kasan_check_range+0x10c/0x1c0 [ 14.362013] __kasan_check_write+0x18/0x20 [ 14.362047] kasan_atomics_helper+0x1148/0x5450 [ 14.362125] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.362149] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.362174] ? kasan_atomics+0x152/0x310 [ 14.362202] kasan_atomics+0x1dc/0x310 [ 14.362224] ? __pfx_kasan_atomics+0x10/0x10 [ 14.362249] ? __pfx_read_tsc+0x10/0x10 [ 14.362271] ? ktime_get_ts64+0x86/0x230 [ 14.362295] kunit_try_run_case+0x1a5/0x480 [ 14.362319] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.362341] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.362364] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.362387] ? __kthread_parkme+0x82/0x180 [ 14.362408] ? preempt_count_sub+0x50/0x80 [ 14.362432] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.362456] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.362479] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.362502] kthread+0x337/0x6f0 [ 14.362522] ? trace_preempt_on+0x20/0xc0 [ 14.362546] ? __pfx_kthread+0x10/0x10 [ 14.362567] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.362588] ? calculate_sigpending+0x7b/0xa0 [ 14.362612] ? __pfx_kthread+0x10/0x10 [ 14.362634] ret_from_fork+0x116/0x1d0 [ 14.362653] ? __pfx_kthread+0x10/0x10 [ 14.362674] ret_from_fork_asm+0x1a/0x30 [ 14.362705] </TASK> [ 14.362716] [ 14.370913] Allocated by task 282: [ 14.371152] kasan_save_stack+0x45/0x70 [ 14.371332] kasan_save_track+0x18/0x40 [ 14.371496] kasan_save_alloc_info+0x3b/0x50 [ 14.371648] __kasan_kmalloc+0xb7/0xc0 [ 14.371802] __kmalloc_cache_noprof+0x189/0x420 [ 14.372025] kasan_atomics+0x95/0x310 [ 14.372370] kunit_try_run_case+0x1a5/0x480 [ 14.372527] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.372705] kthread+0x337/0x6f0 [ 14.372827] ret_from_fork+0x116/0x1d0 [ 14.372996] ret_from_fork_asm+0x1a/0x30 [ 14.373553] [ 14.373681] The buggy address belongs to the object at ffff888103916a00 [ 14.373681] which belongs to the cache kmalloc-64 of size 64 [ 14.374218] The buggy address is located 0 bytes to the right of [ 14.374218] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.374585] [ 14.374688] The buggy address belongs to the physical page: [ 14.375363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.375662] flags: 0x200000000000000(node=0|zone=2) [ 14.375824] page_type: f5(slab) [ 14.375943] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.376623] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.377387] page dumped because: kasan: bad access detected [ 14.377568] [ 14.377663] Memory state around the buggy address: [ 14.377891] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.378319] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.378608] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.378882] ^ [ 14.379169] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.379418] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.379636] ================================================================== [ 14.225813] ================================================================== [ 14.226148] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 14.226475] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.226758] [ 14.226872] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.226915] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.226928] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.226949] Call Trace: [ 14.226964] <TASK> [ 14.226979] dump_stack_lvl+0x73/0xb0 [ 14.227008] print_report+0xd1/0x650 [ 14.227254] ? __virt_addr_valid+0x1db/0x2d0 [ 14.227288] ? kasan_atomics_helper+0xde0/0x5450 [ 14.227311] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.227334] ? kasan_atomics_helper+0xde0/0x5450 [ 14.227356] kasan_report+0x141/0x180 [ 14.227379] ? kasan_atomics_helper+0xde0/0x5450 [ 14.227406] kasan_check_range+0x10c/0x1c0 [ 14.227430] __kasan_check_write+0x18/0x20 [ 14.227450] kasan_atomics_helper+0xde0/0x5450 [ 14.227473] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.227496] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.227522] ? kasan_atomics+0x152/0x310 [ 14.227550] kasan_atomics+0x1dc/0x310 [ 14.227573] ? __pfx_kasan_atomics+0x10/0x10 [ 14.227598] ? __pfx_read_tsc+0x10/0x10 [ 14.227620] ? ktime_get_ts64+0x86/0x230 [ 14.227643] kunit_try_run_case+0x1a5/0x480 [ 14.227668] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.227691] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.227715] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.227741] ? __kthread_parkme+0x82/0x180 [ 14.227763] ? preempt_count_sub+0x50/0x80 [ 14.227787] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.227812] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.227836] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.227859] kthread+0x337/0x6f0 [ 14.227879] ? trace_preempt_on+0x20/0xc0 [ 14.227902] ? __pfx_kthread+0x10/0x10 [ 14.227923] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.227945] ? calculate_sigpending+0x7b/0xa0 [ 14.227969] ? __pfx_kthread+0x10/0x10 [ 14.227991] ret_from_fork+0x116/0x1d0 [ 14.228010] ? __pfx_kthread+0x10/0x10 [ 14.228103] ret_from_fork_asm+0x1a/0x30 [ 14.228155] </TASK> [ 14.228168] [ 14.236010] Allocated by task 282: [ 14.236310] kasan_save_stack+0x45/0x70 [ 14.236527] kasan_save_track+0x18/0x40 [ 14.236677] kasan_save_alloc_info+0x3b/0x50 [ 14.236828] __kasan_kmalloc+0xb7/0xc0 [ 14.236984] __kmalloc_cache_noprof+0x189/0x420 [ 14.237312] kasan_atomics+0x95/0x310 [ 14.237506] kunit_try_run_case+0x1a5/0x480 [ 14.237714] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.237951] kthread+0x337/0x6f0 [ 14.238211] ret_from_fork+0x116/0x1d0 [ 14.238399] ret_from_fork_asm+0x1a/0x30 [ 14.238542] [ 14.238614] The buggy address belongs to the object at ffff888103916a00 [ 14.238614] which belongs to the cache kmalloc-64 of size 64 [ 14.238990] The buggy address is located 0 bytes to the right of [ 14.238990] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.239801] [ 14.239909] The buggy address belongs to the physical page: [ 14.240269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.240656] flags: 0x200000000000000(node=0|zone=2) [ 14.240873] page_type: f5(slab) [ 14.240994] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.241422] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.241785] page dumped because: kasan: bad access detected [ 14.242145] [ 14.242267] Memory state around the buggy address: [ 14.242494] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.242765] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.243301] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.243619] ^ [ 14.243799] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.244242] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.244583] ================================================================== [ 14.321949] ================================================================== [ 14.322391] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 14.322672] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.322898] [ 14.323003] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.323248] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.323265] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.323287] Call Trace: [ 14.323324] <TASK> [ 14.323340] dump_stack_lvl+0x73/0xb0 [ 14.323370] print_report+0xd1/0x650 [ 14.323394] ? __virt_addr_valid+0x1db/0x2d0 [ 14.323417] ? kasan_atomics_helper+0x1079/0x5450 [ 14.323439] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.323462] ? kasan_atomics_helper+0x1079/0x5450 [ 14.323485] kasan_report+0x141/0x180 [ 14.323508] ? kasan_atomics_helper+0x1079/0x5450 [ 14.323535] kasan_check_range+0x10c/0x1c0 [ 14.323559] __kasan_check_write+0x18/0x20 [ 14.323580] kasan_atomics_helper+0x1079/0x5450 [ 14.323602] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.323626] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.323652] ? kasan_atomics+0x152/0x310 [ 14.323679] kasan_atomics+0x1dc/0x310 [ 14.323702] ? __pfx_kasan_atomics+0x10/0x10 [ 14.323729] ? __pfx_read_tsc+0x10/0x10 [ 14.323750] ? ktime_get_ts64+0x86/0x230 [ 14.323774] kunit_try_run_case+0x1a5/0x480 [ 14.323798] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.323822] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.323845] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.323868] ? __kthread_parkme+0x82/0x180 [ 14.323889] ? preempt_count_sub+0x50/0x80 [ 14.323912] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.323936] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.323958] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.323982] kthread+0x337/0x6f0 [ 14.324002] ? trace_preempt_on+0x20/0xc0 [ 14.324025] ? __pfx_kthread+0x10/0x10 [ 14.324127] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.324151] ? calculate_sigpending+0x7b/0xa0 [ 14.324192] ? __pfx_kthread+0x10/0x10 [ 14.324215] ret_from_fork+0x116/0x1d0 [ 14.324235] ? __pfx_kthread+0x10/0x10 [ 14.324258] ret_from_fork_asm+0x1a/0x30 [ 14.324289] </TASK> [ 14.324301] [ 14.333018] Allocated by task 282: [ 14.333169] kasan_save_stack+0x45/0x70 [ 14.333321] kasan_save_track+0x18/0x40 [ 14.333515] kasan_save_alloc_info+0x3b/0x50 [ 14.333695] __kasan_kmalloc+0xb7/0xc0 [ 14.333881] __kmalloc_cache_noprof+0x189/0x420 [ 14.334248] kasan_atomics+0x95/0x310 [ 14.334443] kunit_try_run_case+0x1a5/0x480 [ 14.334618] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.334858] kthread+0x337/0x6f0 [ 14.335025] ret_from_fork+0x116/0x1d0 [ 14.335395] ret_from_fork_asm+0x1a/0x30 [ 14.335573] [ 14.335665] The buggy address belongs to the object at ffff888103916a00 [ 14.335665] which belongs to the cache kmalloc-64 of size 64 [ 14.336232] The buggy address is located 0 bytes to the right of [ 14.336232] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.336610] [ 14.336694] The buggy address belongs to the physical page: [ 14.336947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.337340] flags: 0x200000000000000(node=0|zone=2) [ 14.337512] page_type: f5(slab) [ 14.337669] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.338017] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.338453] page dumped because: kasan: bad access detected [ 14.338671] [ 14.338766] Memory state around the buggy address: [ 14.338981] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.339499] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.339796] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.340104] ^ [ 14.340328] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.340651] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.340966] ================================================================== [ 14.419971] ================================================================== [ 14.420323] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 14.420752] Read of size 4 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.421189] [ 14.421331] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.421396] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.421409] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.421432] Call Trace: [ 14.421448] <TASK> [ 14.421464] dump_stack_lvl+0x73/0xb0 [ 14.421492] print_report+0xd1/0x650 [ 14.421516] ? __virt_addr_valid+0x1db/0x2d0 [ 14.421558] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.421581] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.421603] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.421626] kasan_report+0x141/0x180 [ 14.421650] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.421677] __asan_report_load4_noabort+0x18/0x20 [ 14.421702] kasan_atomics_helper+0x49e8/0x5450 [ 14.421725] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.421749] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.421775] ? kasan_atomics+0x152/0x310 [ 14.421802] kasan_atomics+0x1dc/0x310 [ 14.421826] ? __pfx_kasan_atomics+0x10/0x10 [ 14.421851] ? __pfx_read_tsc+0x10/0x10 [ 14.421892] ? ktime_get_ts64+0x86/0x230 [ 14.421917] kunit_try_run_case+0x1a5/0x480 [ 14.421940] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.421963] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.421987] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.422012] ? __kthread_parkme+0x82/0x180 [ 14.422125] ? preempt_count_sub+0x50/0x80 [ 14.422188] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.422213] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.422237] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.422261] kthread+0x337/0x6f0 [ 14.422281] ? trace_preempt_on+0x20/0xc0 [ 14.422323] ? __pfx_kthread+0x10/0x10 [ 14.422344] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.422366] ? calculate_sigpending+0x7b/0xa0 [ 14.422391] ? __pfx_kthread+0x10/0x10 [ 14.422413] ret_from_fork+0x116/0x1d0 [ 14.422432] ? __pfx_kthread+0x10/0x10 [ 14.422452] ret_from_fork_asm+0x1a/0x30 [ 14.422483] </TASK> [ 14.422495] [ 14.433857] Allocated by task 282: [ 14.434288] kasan_save_stack+0x45/0x70 [ 14.434475] kasan_save_track+0x18/0x40 [ 14.434660] kasan_save_alloc_info+0x3b/0x50 [ 14.434856] __kasan_kmalloc+0xb7/0xc0 [ 14.435067] __kmalloc_cache_noprof+0x189/0x420 [ 14.435292] kasan_atomics+0x95/0x310 [ 14.435473] kunit_try_run_case+0x1a5/0x480 [ 14.435666] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.435905] kthread+0x337/0x6f0 [ 14.436603] ret_from_fork+0x116/0x1d0 [ 14.436797] ret_from_fork_asm+0x1a/0x30 [ 14.436986] [ 14.437352] The buggy address belongs to the object at ffff888103916a00 [ 14.437352] which belongs to the cache kmalloc-64 of size 64 [ 14.437940] The buggy address is located 0 bytes to the right of [ 14.437940] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.438948] [ 14.439067] The buggy address belongs to the physical page: [ 14.439515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.439961] flags: 0x200000000000000(node=0|zone=2) [ 14.440340] page_type: f5(slab) [ 14.440595] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.440937] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.441497] page dumped because: kasan: bad access detected [ 14.441904] [ 14.441990] Memory state around the buggy address: [ 14.442385] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.443130] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.443743] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.444044] ^ [ 14.444591] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.444945] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.445568] ================================================================== [ 14.075878] ================================================================== [ 14.076357] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 14.076699] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.076979] [ 14.077206] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.077253] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.077266] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.077289] Call Trace: [ 14.077305] <TASK> [ 14.077322] dump_stack_lvl+0x73/0xb0 [ 14.077361] print_report+0xd1/0x650 [ 14.077385] ? __virt_addr_valid+0x1db/0x2d0 [ 14.077407] ? kasan_atomics_helper+0x992/0x5450 [ 14.077441] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.077464] ? kasan_atomics_helper+0x992/0x5450 [ 14.077486] kasan_report+0x141/0x180 [ 14.077508] ? kasan_atomics_helper+0x992/0x5450 [ 14.077534] kasan_check_range+0x10c/0x1c0 [ 14.077557] __kasan_check_write+0x18/0x20 [ 14.077576] kasan_atomics_helper+0x992/0x5450 [ 14.077600] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.077622] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.077656] ? kasan_atomics+0x152/0x310 [ 14.077684] kasan_atomics+0x1dc/0x310 [ 14.077706] ? __pfx_kasan_atomics+0x10/0x10 [ 14.077741] ? __pfx_read_tsc+0x10/0x10 [ 14.077762] ? ktime_get_ts64+0x86/0x230 [ 14.077786] kunit_try_run_case+0x1a5/0x480 [ 14.077810] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.077832] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.077855] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.077878] ? __kthread_parkme+0x82/0x180 [ 14.077899] ? preempt_count_sub+0x50/0x80 [ 14.077932] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.077957] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.077980] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.078014] kthread+0x337/0x6f0 [ 14.078179] ? trace_preempt_on+0x20/0xc0 [ 14.078208] ? __pfx_kthread+0x10/0x10 [ 14.078281] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.078306] ? calculate_sigpending+0x7b/0xa0 [ 14.078350] ? __pfx_kthread+0x10/0x10 [ 14.078373] ret_from_fork+0x116/0x1d0 [ 14.078393] ? __pfx_kthread+0x10/0x10 [ 14.078414] ret_from_fork_asm+0x1a/0x30 [ 14.078445] </TASK> [ 14.078457] [ 14.086843] Allocated by task 282: [ 14.086998] kasan_save_stack+0x45/0x70 [ 14.087330] kasan_save_track+0x18/0x40 [ 14.087536] kasan_save_alloc_info+0x3b/0x50 [ 14.087749] __kasan_kmalloc+0xb7/0xc0 [ 14.087901] __kmalloc_cache_noprof+0x189/0x420 [ 14.088215] kasan_atomics+0x95/0x310 [ 14.088412] kunit_try_run_case+0x1a5/0x480 [ 14.088619] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.088845] kthread+0x337/0x6f0 [ 14.089096] ret_from_fork+0x116/0x1d0 [ 14.089338] ret_from_fork_asm+0x1a/0x30 [ 14.089517] [ 14.089637] The buggy address belongs to the object at ffff888103916a00 [ 14.089637] which belongs to the cache kmalloc-64 of size 64 [ 14.090314] The buggy address is located 0 bytes to the right of [ 14.090314] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.090809] [ 14.090908] The buggy address belongs to the physical page: [ 14.091293] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.091543] flags: 0x200000000000000(node=0|zone=2) [ 14.091770] page_type: f5(slab) [ 14.091935] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.092391] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.092658] page dumped because: kasan: bad access detected [ 14.092914] [ 14.093100] Memory state around the buggy address: [ 14.093370] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.093692] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.093953] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.094456] ^ [ 14.094685] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.094974] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.095378] ================================================================== [ 14.055511] ================================================================== [ 14.055846] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 14.056309] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.056633] [ 14.056734] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.056778] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.056792] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.056813] Call Trace: [ 14.056830] <TASK> [ 14.056846] dump_stack_lvl+0x73/0xb0 [ 14.056887] print_report+0xd1/0x650 [ 14.056910] ? __virt_addr_valid+0x1db/0x2d0 [ 14.056933] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.056966] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.056989] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.057012] kasan_report+0x141/0x180 [ 14.057116] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.057160] kasan_check_range+0x10c/0x1c0 [ 14.057200] __kasan_check_write+0x18/0x20 [ 14.057221] kasan_atomics_helper+0x8f9/0x5450 [ 14.057244] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.057267] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.057294] ? kasan_atomics+0x152/0x310 [ 14.057321] kasan_atomics+0x1dc/0x310 [ 14.057345] ? __pfx_kasan_atomics+0x10/0x10 [ 14.057369] ? __pfx_read_tsc+0x10/0x10 [ 14.057402] ? ktime_get_ts64+0x86/0x230 [ 14.057426] kunit_try_run_case+0x1a5/0x480 [ 14.057451] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.057487] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.057511] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.057535] ? __kthread_parkme+0x82/0x180 [ 14.057556] ? preempt_count_sub+0x50/0x80 [ 14.057579] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.057603] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.057627] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.057652] kthread+0x337/0x6f0 [ 14.057672] ? trace_preempt_on+0x20/0xc0 [ 14.057695] ? __pfx_kthread+0x10/0x10 [ 14.057717] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.057739] ? calculate_sigpending+0x7b/0xa0 [ 14.057762] ? __pfx_kthread+0x10/0x10 [ 14.057784] ret_from_fork+0x116/0x1d0 [ 14.057802] ? __pfx_kthread+0x10/0x10 [ 14.057822] ret_from_fork_asm+0x1a/0x30 [ 14.057853] </TASK> [ 14.057865] [ 14.066435] Allocated by task 282: [ 14.066620] kasan_save_stack+0x45/0x70 [ 14.066804] kasan_save_track+0x18/0x40 [ 14.066947] kasan_save_alloc_info+0x3b/0x50 [ 14.067300] __kasan_kmalloc+0xb7/0xc0 [ 14.067498] __kmalloc_cache_noprof+0x189/0x420 [ 14.067701] kasan_atomics+0x95/0x310 [ 14.067836] kunit_try_run_case+0x1a5/0x480 [ 14.068113] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.068443] kthread+0x337/0x6f0 [ 14.068651] ret_from_fork+0x116/0x1d0 [ 14.068792] ret_from_fork_asm+0x1a/0x30 [ 14.069006] [ 14.069215] The buggy address belongs to the object at ffff888103916a00 [ 14.069215] which belongs to the cache kmalloc-64 of size 64 [ 14.069705] The buggy address is located 0 bytes to the right of [ 14.069705] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.070457] [ 14.070586] The buggy address belongs to the physical page: [ 14.070836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.071305] flags: 0x200000000000000(node=0|zone=2) [ 14.071526] page_type: f5(slab) [ 14.071691] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.072154] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.072516] page dumped because: kasan: bad access detected [ 14.072756] [ 14.072878] Memory state around the buggy address: [ 14.073166] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.073498] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.073813] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.074206] ^ [ 14.074468] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.074779] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.075398] ================================================================== [ 14.302985] ================================================================== [ 14.303586] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 14.303938] Read of size 4 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.304351] [ 14.304467] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.304510] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.304523] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.304545] Call Trace: [ 14.304560] <TASK> [ 14.304577] dump_stack_lvl+0x73/0xb0 [ 14.304606] print_report+0xd1/0x650 [ 14.304629] ? __virt_addr_valid+0x1db/0x2d0 [ 14.304652] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.304674] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.304697] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.304721] kasan_report+0x141/0x180 [ 14.304743] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.304770] __asan_report_load4_noabort+0x18/0x20 [ 14.304795] kasan_atomics_helper+0x4a36/0x5450 [ 14.304819] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.304842] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.304867] ? kasan_atomics+0x152/0x310 [ 14.304894] kasan_atomics+0x1dc/0x310 [ 14.304918] ? __pfx_kasan_atomics+0x10/0x10 [ 14.304943] ? __pfx_read_tsc+0x10/0x10 [ 14.304965] ? ktime_get_ts64+0x86/0x230 [ 14.304989] kunit_try_run_case+0x1a5/0x480 [ 14.305015] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.305052] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.305078] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.305103] ? __kthread_parkme+0x82/0x180 [ 14.305124] ? preempt_count_sub+0x50/0x80 [ 14.305148] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.305174] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.305198] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.305222] kthread+0x337/0x6f0 [ 14.305242] ? trace_preempt_on+0x20/0xc0 [ 14.305265] ? __pfx_kthread+0x10/0x10 [ 14.305287] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.305308] ? calculate_sigpending+0x7b/0xa0 [ 14.305332] ? __pfx_kthread+0x10/0x10 [ 14.305354] ret_from_fork+0x116/0x1d0 [ 14.305374] ? __pfx_kthread+0x10/0x10 [ 14.305395] ret_from_fork_asm+0x1a/0x30 [ 14.305426] </TASK> [ 14.305438] [ 14.313369] Allocated by task 282: [ 14.313555] kasan_save_stack+0x45/0x70 [ 14.313759] kasan_save_track+0x18/0x40 [ 14.313937] kasan_save_alloc_info+0x3b/0x50 [ 14.314228] __kasan_kmalloc+0xb7/0xc0 [ 14.314427] __kmalloc_cache_noprof+0x189/0x420 [ 14.314618] kasan_atomics+0x95/0x310 [ 14.314786] kunit_try_run_case+0x1a5/0x480 [ 14.314933] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.315359] kthread+0x337/0x6f0 [ 14.315541] ret_from_fork+0x116/0x1d0 [ 14.315743] ret_from_fork_asm+0x1a/0x30 [ 14.315948] [ 14.316133] The buggy address belongs to the object at ffff888103916a00 [ 14.316133] which belongs to the cache kmalloc-64 of size 64 [ 14.316687] The buggy address is located 0 bytes to the right of [ 14.316687] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.317315] [ 14.317402] The buggy address belongs to the physical page: [ 14.317616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.317942] flags: 0x200000000000000(node=0|zone=2) [ 14.318219] page_type: f5(slab) [ 14.318394] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.318653] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.318894] page dumped because: kasan: bad access detected [ 14.319303] [ 14.319405] Memory state around the buggy address: [ 14.319629] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.319946] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.320381] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.320672] ^ [ 14.320831] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.321125] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.321480] ================================================================== [ 15.022508] ================================================================== [ 15.022813] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 15.023250] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282 [ 15.023553] [ 15.023648] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.023691] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.023703] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.023724] Call Trace: [ 15.023738] <TASK> [ 15.023754] dump_stack_lvl+0x73/0xb0 [ 15.023782] print_report+0xd1/0x650 [ 15.023805] ? __virt_addr_valid+0x1db/0x2d0 [ 15.023827] ? kasan_atomics_helper+0x2006/0x5450 [ 15.023848] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.023871] ? kasan_atomics_helper+0x2006/0x5450 [ 15.023893] kasan_report+0x141/0x180 [ 15.023916] ? kasan_atomics_helper+0x2006/0x5450 [ 15.023943] kasan_check_range+0x10c/0x1c0 [ 15.023967] __kasan_check_write+0x18/0x20 [ 15.023987] kasan_atomics_helper+0x2006/0x5450 [ 15.024010] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.024044] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.024070] ? kasan_atomics+0x152/0x310 [ 15.024097] kasan_atomics+0x1dc/0x310 [ 15.024120] ? __pfx_kasan_atomics+0x10/0x10 [ 15.024145] ? __pfx_read_tsc+0x10/0x10 [ 15.024167] ? ktime_get_ts64+0x86/0x230 [ 15.024190] kunit_try_run_case+0x1a5/0x480 [ 15.024215] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.024237] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.024261] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.024284] ? __kthread_parkme+0x82/0x180 [ 15.024305] ? preempt_count_sub+0x50/0x80 [ 15.024329] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.024353] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.024376] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.024400] kthread+0x337/0x6f0 [ 15.024419] ? trace_preempt_on+0x20/0xc0 [ 15.024443] ? __pfx_kthread+0x10/0x10 [ 15.024465] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.024487] ? calculate_sigpending+0x7b/0xa0 [ 15.024511] ? __pfx_kthread+0x10/0x10 [ 15.024534] ret_from_fork+0x116/0x1d0 [ 15.024553] ? __pfx_kthread+0x10/0x10 [ 15.024574] ret_from_fork_asm+0x1a/0x30 [ 15.024605] </TASK> [ 15.024616] [ 15.032727] Allocated by task 282: [ 15.032925] kasan_save_stack+0x45/0x70 [ 15.033395] kasan_save_track+0x18/0x40 [ 15.033562] kasan_save_alloc_info+0x3b/0x50 [ 15.033716] __kasan_kmalloc+0xb7/0xc0 [ 15.033851] __kmalloc_cache_noprof+0x189/0x420 [ 15.034088] kasan_atomics+0x95/0x310 [ 15.034284] kunit_try_run_case+0x1a5/0x480 [ 15.034492] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.034746] kthread+0x337/0x6f0 [ 15.034907] ret_from_fork+0x116/0x1d0 [ 15.035270] ret_from_fork_asm+0x1a/0x30 [ 15.035479] [ 15.035576] The buggy address belongs to the object at ffff888103916a00 [ 15.035576] which belongs to the cache kmalloc-64 of size 64 [ 15.036106] The buggy address is located 0 bytes to the right of [ 15.036106] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 15.036634] [ 15.036730] The buggy address belongs to the physical page: [ 15.036963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 15.037426] flags: 0x200000000000000(node=0|zone=2) [ 15.037596] page_type: f5(slab) [ 15.037715] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.037947] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.038292] page dumped because: kasan: bad access detected [ 15.038688] [ 15.038783] Memory state around the buggy address: [ 15.039062] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.039363] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.039581] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.039794] ^ [ 15.040396] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.040747] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.041175] ================================================================== [ 14.615245] ================================================================== [ 14.615911] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 14.616397] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.616995] [ 14.617269] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.617316] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.617431] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.617458] Call Trace: [ 14.617475] <TASK> [ 14.617493] dump_stack_lvl+0x73/0xb0 [ 14.617522] print_report+0xd1/0x650 [ 14.617545] ? __virt_addr_valid+0x1db/0x2d0 [ 14.617568] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.617624] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.617647] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.617671] kasan_report+0x141/0x180 [ 14.617695] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.617722] kasan_check_range+0x10c/0x1c0 [ 14.617747] __kasan_check_write+0x18/0x20 [ 14.617767] kasan_atomics_helper+0x15b6/0x5450 [ 14.617790] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.617813] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.617839] ? kasan_atomics+0x152/0x310 [ 14.617866] kasan_atomics+0x1dc/0x310 [ 14.617890] ? __pfx_kasan_atomics+0x10/0x10 [ 14.617915] ? __pfx_read_tsc+0x10/0x10 [ 14.617937] ? ktime_get_ts64+0x86/0x230 [ 14.617960] kunit_try_run_case+0x1a5/0x480 [ 14.617985] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.618007] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.618042] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.618085] ? __kthread_parkme+0x82/0x180 [ 14.618106] ? preempt_count_sub+0x50/0x80 [ 14.618130] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.618154] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.618178] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.618201] kthread+0x337/0x6f0 [ 14.618221] ? trace_preempt_on+0x20/0xc0 [ 14.618246] ? __pfx_kthread+0x10/0x10 [ 14.618266] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.618288] ? calculate_sigpending+0x7b/0xa0 [ 14.618312] ? __pfx_kthread+0x10/0x10 [ 14.618334] ret_from_fork+0x116/0x1d0 [ 14.618353] ? __pfx_kthread+0x10/0x10 [ 14.618374] ret_from_fork_asm+0x1a/0x30 [ 14.618406] </TASK> [ 14.618417] [ 14.630150] Allocated by task 282: [ 14.630551] kasan_save_stack+0x45/0x70 [ 14.630910] kasan_save_track+0x18/0x40 [ 14.631247] kasan_save_alloc_info+0x3b/0x50 [ 14.631598] __kasan_kmalloc+0xb7/0xc0 [ 14.631794] __kmalloc_cache_noprof+0x189/0x420 [ 14.632004] kasan_atomics+0x95/0x310 [ 14.632364] kunit_try_run_case+0x1a5/0x480 [ 14.632766] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.633256] kthread+0x337/0x6f0 [ 14.633561] ret_from_fork+0x116/0x1d0 [ 14.633745] ret_from_fork_asm+0x1a/0x30 [ 14.633928] [ 14.634022] The buggy address belongs to the object at ffff888103916a00 [ 14.634022] which belongs to the cache kmalloc-64 of size 64 [ 14.634883] The buggy address is located 0 bytes to the right of [ 14.634883] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.635883] [ 14.636152] The buggy address belongs to the physical page: [ 14.636391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.636721] flags: 0x200000000000000(node=0|zone=2) [ 14.636937] page_type: f5(slab) [ 14.637402] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.637849] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.638789] page dumped because: kasan: bad access detected [ 14.639112] [ 14.639351] Memory state around the buggy address: [ 14.639773] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.640284] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.640737] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.641212] ^ [ 14.641559] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.641859] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.642329] ================================================================== [ 13.806638] ================================================================== [ 13.806991] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 13.807252] Read of size 4 at addr ffff888103916a30 by task kunit_try_catch/282 [ 13.807627] [ 13.807733] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.807775] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.807786] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.807806] Call Trace: [ 13.807820] <TASK> [ 13.807834] dump_stack_lvl+0x73/0xb0 [ 13.807862] print_report+0xd1/0x650 [ 13.807883] ? __virt_addr_valid+0x1db/0x2d0 [ 13.807905] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.807925] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.807946] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.807967] kasan_report+0x141/0x180 [ 13.808071] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.808103] __asan_report_load4_noabort+0x18/0x20 [ 13.808138] kasan_atomics_helper+0x4b88/0x5450 [ 13.808161] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.808183] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.808220] ? kasan_atomics+0x152/0x310 [ 13.808247] kasan_atomics+0x1dc/0x310 [ 13.808269] ? __pfx_kasan_atomics+0x10/0x10 [ 13.808301] ? __pfx_read_tsc+0x10/0x10 [ 13.808323] ? ktime_get_ts64+0x86/0x230 [ 13.808357] kunit_try_run_case+0x1a5/0x480 [ 13.808380] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.808402] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.808424] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.808446] ? __kthread_parkme+0x82/0x180 [ 13.808465] ? preempt_count_sub+0x50/0x80 [ 13.808487] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.808509] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.808531] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.808553] kthread+0x337/0x6f0 [ 13.808572] ? trace_preempt_on+0x20/0xc0 [ 13.808595] ? __pfx_kthread+0x10/0x10 [ 13.808614] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.808634] ? calculate_sigpending+0x7b/0xa0 [ 13.808656] ? __pfx_kthread+0x10/0x10 [ 13.808677] ret_from_fork+0x116/0x1d0 [ 13.808695] ? __pfx_kthread+0x10/0x10 [ 13.808835] ret_from_fork_asm+0x1a/0x30 [ 13.808867] </TASK> [ 13.808910] [ 13.817971] Allocated by task 282: [ 13.818177] kasan_save_stack+0x45/0x70 [ 13.818384] kasan_save_track+0x18/0x40 [ 13.818577] kasan_save_alloc_info+0x3b/0x50 [ 13.819009] __kasan_kmalloc+0xb7/0xc0 [ 13.819403] __kmalloc_cache_noprof+0x189/0x420 [ 13.819616] kasan_atomics+0x95/0x310 [ 13.819804] kunit_try_run_case+0x1a5/0x480 [ 13.819953] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.820152] kthread+0x337/0x6f0 [ 13.820348] ret_from_fork+0x116/0x1d0 [ 13.820536] ret_from_fork_asm+0x1a/0x30 [ 13.820716] [ 13.820790] The buggy address belongs to the object at ffff888103916a00 [ 13.820790] which belongs to the cache kmalloc-64 of size 64 [ 13.821647] The buggy address is located 0 bytes to the right of [ 13.821647] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 13.822258] [ 13.822333] The buggy address belongs to the physical page: [ 13.822590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 13.823190] flags: 0x200000000000000(node=0|zone=2) [ 13.823420] page_type: f5(slab) [ 13.823584] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.823819] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.824181] page dumped because: kasan: bad access detected [ 13.824433] [ 13.824638] Memory state around the buggy address: [ 13.824858] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.825319] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.825641] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.825952] ^ [ 13.826381] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.826695] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.827294] ================================================================== [ 15.161775] ================================================================== [ 15.162310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 15.162723] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282 [ 15.163343] [ 15.163481] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.163526] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.163539] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.163561] Call Trace: [ 15.163577] <TASK> [ 15.163592] dump_stack_lvl+0x73/0xb0 [ 15.163621] print_report+0xd1/0x650 [ 15.163644] ? __virt_addr_valid+0x1db/0x2d0 [ 15.163665] ? kasan_atomics_helper+0x224c/0x5450 [ 15.163687] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.163709] ? kasan_atomics_helper+0x224c/0x5450 [ 15.163731] kasan_report+0x141/0x180 [ 15.163755] ? kasan_atomics_helper+0x224c/0x5450 [ 15.163783] kasan_check_range+0x10c/0x1c0 [ 15.163807] __kasan_check_write+0x18/0x20 [ 15.163827] kasan_atomics_helper+0x224c/0x5450 [ 15.163850] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.163873] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.163898] ? kasan_atomics+0x152/0x310 [ 15.163925] kasan_atomics+0x1dc/0x310 [ 15.163948] ? __pfx_kasan_atomics+0x10/0x10 [ 15.163973] ? __pfx_read_tsc+0x10/0x10 [ 15.163994] ? ktime_get_ts64+0x86/0x230 [ 15.164020] kunit_try_run_case+0x1a5/0x480 [ 15.164072] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.164095] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.164118] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.164141] ? __kthread_parkme+0x82/0x180 [ 15.164163] ? preempt_count_sub+0x50/0x80 [ 15.164187] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.164219] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.164242] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.164265] kthread+0x337/0x6f0 [ 15.164285] ? trace_preempt_on+0x20/0xc0 [ 15.164309] ? __pfx_kthread+0x10/0x10 [ 15.164330] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.164351] ? calculate_sigpending+0x7b/0xa0 [ 15.164375] ? __pfx_kthread+0x10/0x10 [ 15.164397] ret_from_fork+0x116/0x1d0 [ 15.164415] ? __pfx_kthread+0x10/0x10 [ 15.164436] ret_from_fork_asm+0x1a/0x30 [ 15.164467] </TASK> [ 15.164479] [ 15.173697] Allocated by task 282: [ 15.173934] kasan_save_stack+0x45/0x70 [ 15.174304] kasan_save_track+0x18/0x40 [ 15.174553] kasan_save_alloc_info+0x3b/0x50 [ 15.174793] __kasan_kmalloc+0xb7/0xc0 [ 15.175292] __kmalloc_cache_noprof+0x189/0x420 [ 15.175610] kasan_atomics+0x95/0x310 [ 15.175781] kunit_try_run_case+0x1a5/0x480 [ 15.176255] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.176612] kthread+0x337/0x6f0 [ 15.176763] ret_from_fork+0x116/0x1d0 [ 15.177015] ret_from_fork_asm+0x1a/0x30 [ 15.177378] [ 15.177503] The buggy address belongs to the object at ffff888103916a00 [ 15.177503] which belongs to the cache kmalloc-64 of size 64 [ 15.178170] The buggy address is located 0 bytes to the right of [ 15.178170] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 15.178875] [ 15.178980] The buggy address belongs to the physical page: [ 15.179432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 15.179853] flags: 0x200000000000000(node=0|zone=2) [ 15.180388] page_type: f5(slab) [ 15.180551] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.180865] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.181401] page dumped because: kasan: bad access detected [ 15.181626] [ 15.181782] Memory state around the buggy address: [ 15.182105] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.182512] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.182890] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.183372] ^ [ 15.183561] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.183967] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.184302] ================================================================== [ 14.033807] ================================================================== [ 14.034479] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 14.034818] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.035263] [ 14.035398] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.035442] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.035456] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.035477] Call Trace: [ 14.035492] <TASK> [ 14.035508] dump_stack_lvl+0x73/0xb0 [ 14.035536] print_report+0xd1/0x650 [ 14.035560] ? __virt_addr_valid+0x1db/0x2d0 [ 14.035594] ? kasan_atomics_helper+0x860/0x5450 [ 14.035615] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.035639] ? kasan_atomics_helper+0x860/0x5450 [ 14.035680] kasan_report+0x141/0x180 [ 14.035703] ? kasan_atomics_helper+0x860/0x5450 [ 14.035756] kasan_check_range+0x10c/0x1c0 [ 14.035782] __kasan_check_write+0x18/0x20 [ 14.035802] kasan_atomics_helper+0x860/0x5450 [ 14.035825] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.035848] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.035874] ? kasan_atomics+0x152/0x310 [ 14.035902] kasan_atomics+0x1dc/0x310 [ 14.036503] ? __pfx_kasan_atomics+0x10/0x10 [ 14.036544] ? __pfx_read_tsc+0x10/0x10 [ 14.036569] ? ktime_get_ts64+0x86/0x230 [ 14.036594] kunit_try_run_case+0x1a5/0x480 [ 14.036620] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.036643] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.036667] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.036691] ? __kthread_parkme+0x82/0x180 [ 14.036951] ? preempt_count_sub+0x50/0x80 [ 14.037003] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.037107] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.037154] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.037179] kthread+0x337/0x6f0 [ 14.037200] ? trace_preempt_on+0x20/0xc0 [ 14.037226] ? __pfx_kthread+0x10/0x10 [ 14.037246] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.037269] ? calculate_sigpending+0x7b/0xa0 [ 14.037293] ? __pfx_kthread+0x10/0x10 [ 14.037315] ret_from_fork+0x116/0x1d0 [ 14.037334] ? __pfx_kthread+0x10/0x10 [ 14.037355] ret_from_fork_asm+0x1a/0x30 [ 14.037385] </TASK> [ 14.037398] [ 14.045952] Allocated by task 282: [ 14.046266] kasan_save_stack+0x45/0x70 [ 14.046482] kasan_save_track+0x18/0x40 [ 14.046712] kasan_save_alloc_info+0x3b/0x50 [ 14.046953] __kasan_kmalloc+0xb7/0xc0 [ 14.047278] __kmalloc_cache_noprof+0x189/0x420 [ 14.047500] kasan_atomics+0x95/0x310 [ 14.047678] kunit_try_run_case+0x1a5/0x480 [ 14.048171] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.048443] kthread+0x337/0x6f0 [ 14.048619] ret_from_fork+0x116/0x1d0 [ 14.048798] ret_from_fork_asm+0x1a/0x30 [ 14.049004] [ 14.049219] The buggy address belongs to the object at ffff888103916a00 [ 14.049219] which belongs to the cache kmalloc-64 of size 64 [ 14.049724] The buggy address is located 0 bytes to the right of [ 14.049724] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.050285] [ 14.050389] The buggy address belongs to the physical page: [ 14.050638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.050980] flags: 0x200000000000000(node=0|zone=2) [ 14.051205] page_type: f5(slab) [ 14.051323] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.051667] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.051969] page dumped because: kasan: bad access detected [ 14.052428] [ 14.052525] Memory state around the buggy address: [ 14.052745] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.053097] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.053475] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.053710] ^ [ 14.053933] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.054566] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.054891] ================================================================== [ 15.113657] ================================================================== [ 15.114042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 15.114486] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282 [ 15.114749] [ 15.114836] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.114877] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.114890] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.114909] Call Trace: [ 15.114924] <TASK> [ 15.114939] dump_stack_lvl+0x73/0xb0 [ 15.114965] print_report+0xd1/0x650 [ 15.114989] ? __virt_addr_valid+0x1db/0x2d0 [ 15.115011] ? kasan_atomics_helper+0x218a/0x5450 [ 15.115044] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.115075] ? kasan_atomics_helper+0x218a/0x5450 [ 15.115096] kasan_report+0x141/0x180 [ 15.115119] ? kasan_atomics_helper+0x218a/0x5450 [ 15.115146] kasan_check_range+0x10c/0x1c0 [ 15.115170] __kasan_check_write+0x18/0x20 [ 15.115190] kasan_atomics_helper+0x218a/0x5450 [ 15.115213] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.115236] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.115261] ? kasan_atomics+0x152/0x310 [ 15.115289] kasan_atomics+0x1dc/0x310 [ 15.115312] ? __pfx_kasan_atomics+0x10/0x10 [ 15.115336] ? __pfx_read_tsc+0x10/0x10 [ 15.115358] ? ktime_get_ts64+0x86/0x230 [ 15.115381] kunit_try_run_case+0x1a5/0x480 [ 15.115405] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.115428] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.115451] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.115474] ? __kthread_parkme+0x82/0x180 [ 15.115496] ? preempt_count_sub+0x50/0x80 [ 15.115520] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.115544] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.115567] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.115591] kthread+0x337/0x6f0 [ 15.115611] ? trace_preempt_on+0x20/0xc0 [ 15.115634] ? __pfx_kthread+0x10/0x10 [ 15.115655] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.115678] ? calculate_sigpending+0x7b/0xa0 [ 15.115702] ? __pfx_kthread+0x10/0x10 [ 15.115724] ret_from_fork+0x116/0x1d0 [ 15.115743] ? __pfx_kthread+0x10/0x10 [ 15.115763] ret_from_fork_asm+0x1a/0x30 [ 15.115795] </TASK> [ 15.115807] [ 15.126722] Allocated by task 282: [ 15.126886] kasan_save_stack+0x45/0x70 [ 15.127120] kasan_save_track+0x18/0x40 [ 15.127643] kasan_save_alloc_info+0x3b/0x50 [ 15.127829] __kasan_kmalloc+0xb7/0xc0 [ 15.128012] __kmalloc_cache_noprof+0x189/0x420 [ 15.128382] kasan_atomics+0x95/0x310 [ 15.128694] kunit_try_run_case+0x1a5/0x480 [ 15.128911] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.129230] kthread+0x337/0x6f0 [ 15.129424] ret_from_fork+0x116/0x1d0 [ 15.129733] ret_from_fork_asm+0x1a/0x30 [ 15.129942] [ 15.130025] The buggy address belongs to the object at ffff888103916a00 [ 15.130025] which belongs to the cache kmalloc-64 of size 64 [ 15.130822] The buggy address is located 0 bytes to the right of [ 15.130822] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 15.131569] [ 15.131748] The buggy address belongs to the physical page: [ 15.132068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 15.132513] flags: 0x200000000000000(node=0|zone=2) [ 15.132853] page_type: f5(slab) [ 15.133010] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.133586] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.133898] page dumped because: kasan: bad access detected [ 15.134143] [ 15.134456] Memory state around the buggy address: [ 15.134757] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.135146] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.135693] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.136082] ^ [ 15.136443] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.136823] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.137104] ================================================================== [ 14.245002] ================================================================== [ 14.245444] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 14.245747] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.246125] [ 14.246330] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.246377] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.246390] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.246412] Call Trace: [ 14.246428] <TASK> [ 14.246444] dump_stack_lvl+0x73/0xb0 [ 14.246472] print_report+0xd1/0x650 [ 14.246495] ? __virt_addr_valid+0x1db/0x2d0 [ 14.246517] ? kasan_atomics_helper+0xe78/0x5450 [ 14.246559] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.246583] ? kasan_atomics_helper+0xe78/0x5450 [ 14.246605] kasan_report+0x141/0x180 [ 14.246644] ? kasan_atomics_helper+0xe78/0x5450 [ 14.246671] kasan_check_range+0x10c/0x1c0 [ 14.246708] __kasan_check_write+0x18/0x20 [ 14.246728] kasan_atomics_helper+0xe78/0x5450 [ 14.246751] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.246774] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.246799] ? kasan_atomics+0x152/0x310 [ 14.246826] kasan_atomics+0x1dc/0x310 [ 14.246866] ? __pfx_kasan_atomics+0x10/0x10 [ 14.246891] ? __pfx_read_tsc+0x10/0x10 [ 14.246912] ? ktime_get_ts64+0x86/0x230 [ 14.246937] kunit_try_run_case+0x1a5/0x480 [ 14.246961] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.246984] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.247024] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.247236] ? __kthread_parkme+0x82/0x180 [ 14.247262] ? preempt_count_sub+0x50/0x80 [ 14.247287] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.247312] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.247336] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.247360] kthread+0x337/0x6f0 [ 14.247380] ? trace_preempt_on+0x20/0xc0 [ 14.247404] ? __pfx_kthread+0x10/0x10 [ 14.247425] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.247447] ? calculate_sigpending+0x7b/0xa0 [ 14.247471] ? __pfx_kthread+0x10/0x10 [ 14.247493] ret_from_fork+0x116/0x1d0 [ 14.247512] ? __pfx_kthread+0x10/0x10 [ 14.247533] ret_from_fork_asm+0x1a/0x30 [ 14.247562] </TASK> [ 14.247574] [ 14.255915] Allocated by task 282: [ 14.256221] kasan_save_stack+0x45/0x70 [ 14.256410] kasan_save_track+0x18/0x40 [ 14.256623] kasan_save_alloc_info+0x3b/0x50 [ 14.256833] __kasan_kmalloc+0xb7/0xc0 [ 14.257007] __kmalloc_cache_noprof+0x189/0x420 [ 14.258213] kasan_atomics+0x95/0x310 [ 14.258416] kunit_try_run_case+0x1a5/0x480 [ 14.258602] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.258830] kthread+0x337/0x6f0 [ 14.258996] ret_from_fork+0x116/0x1d0 [ 14.259373] ret_from_fork_asm+0x1a/0x30 [ 14.259578] [ 14.259678] The buggy address belongs to the object at ffff888103916a00 [ 14.259678] which belongs to the cache kmalloc-64 of size 64 [ 14.260210] The buggy address is located 0 bytes to the right of [ 14.260210] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.260722] [ 14.260804] The buggy address belongs to the physical page: [ 14.261013] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.261353] flags: 0x200000000000000(node=0|zone=2) [ 14.261576] page_type: f5(slab) [ 14.261718] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.262098] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.262385] page dumped because: kasan: bad access detected [ 14.262632] [ 14.262728] Memory state around the buggy address: [ 14.262953] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.263436] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.263769] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.264022] ^ [ 14.264355] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.264647] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.264941] ================================================================== [ 14.187965] ================================================================== [ 14.188627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 14.188962] Read of size 4 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.189286] [ 14.189390] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.189435] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.189449] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.189470] Call Trace: [ 14.189485] <TASK> [ 14.189501] dump_stack_lvl+0x73/0xb0 [ 14.189529] print_report+0xd1/0x650 [ 14.189552] ? __virt_addr_valid+0x1db/0x2d0 [ 14.189576] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.189598] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.189621] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.189644] kasan_report+0x141/0x180 [ 14.189667] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.189693] __asan_report_load4_noabort+0x18/0x20 [ 14.189718] kasan_atomics_helper+0x4a84/0x5450 [ 14.189831] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.189856] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.189884] ? kasan_atomics+0x152/0x310 [ 14.189911] kasan_atomics+0x1dc/0x310 [ 14.189935] ? __pfx_kasan_atomics+0x10/0x10 [ 14.189960] ? __pfx_read_tsc+0x10/0x10 [ 14.189981] ? ktime_get_ts64+0x86/0x230 [ 14.190005] kunit_try_run_case+0x1a5/0x480 [ 14.190214] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.190250] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.190276] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.190299] ? __kthread_parkme+0x82/0x180 [ 14.190321] ? preempt_count_sub+0x50/0x80 [ 14.190345] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.190370] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.190393] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.190416] kthread+0x337/0x6f0 [ 14.190436] ? trace_preempt_on+0x20/0xc0 [ 14.190460] ? __pfx_kthread+0x10/0x10 [ 14.190482] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.190504] ? calculate_sigpending+0x7b/0xa0 [ 14.190528] ? __pfx_kthread+0x10/0x10 [ 14.190550] ret_from_fork+0x116/0x1d0 [ 14.190568] ? __pfx_kthread+0x10/0x10 [ 14.190590] ret_from_fork_asm+0x1a/0x30 [ 14.190620] </TASK> [ 14.190632] [ 14.198474] Allocated by task 282: [ 14.198609] kasan_save_stack+0x45/0x70 [ 14.198754] kasan_save_track+0x18/0x40 [ 14.198934] kasan_save_alloc_info+0x3b/0x50 [ 14.199249] __kasan_kmalloc+0xb7/0xc0 [ 14.199442] __kmalloc_cache_noprof+0x189/0x420 [ 14.199671] kasan_atomics+0x95/0x310 [ 14.199856] kunit_try_run_case+0x1a5/0x480 [ 14.200140] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.200388] kthread+0x337/0x6f0 [ 14.200512] ret_from_fork+0x116/0x1d0 [ 14.200645] ret_from_fork_asm+0x1a/0x30 [ 14.200804] [ 14.200902] The buggy address belongs to the object at ffff888103916a00 [ 14.200902] which belongs to the cache kmalloc-64 of size 64 [ 14.201664] The buggy address is located 0 bytes to the right of [ 14.201664] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.202352] [ 14.202452] The buggy address belongs to the physical page: [ 14.202703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.203154] flags: 0x200000000000000(node=0|zone=2) [ 14.203355] page_type: f5(slab) [ 14.203476] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.203823] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.204239] page dumped because: kasan: bad access detected [ 14.204418] [ 14.204515] Memory state around the buggy address: [ 14.204736] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.205130] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.205423] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.205669] ^ [ 14.205861] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.206396] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.206695] ================================================================== [ 14.820806] ================================================================== [ 14.821209] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 14.821543] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.821872] [ 14.821982] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.822037] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.822050] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.822071] Call Trace: [ 14.822087] <TASK> [ 14.822104] dump_stack_lvl+0x73/0xb0 [ 14.822131] print_report+0xd1/0x650 [ 14.822155] ? __virt_addr_valid+0x1db/0x2d0 [ 14.822177] ? kasan_atomics_helper+0x1b22/0x5450 [ 14.822199] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.822222] ? kasan_atomics_helper+0x1b22/0x5450 [ 14.822245] kasan_report+0x141/0x180 [ 14.822268] ? kasan_atomics_helper+0x1b22/0x5450 [ 14.822294] kasan_check_range+0x10c/0x1c0 [ 14.822318] __kasan_check_write+0x18/0x20 [ 14.822337] kasan_atomics_helper+0x1b22/0x5450 [ 14.822361] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.822382] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.822407] ? kasan_atomics+0x152/0x310 [ 14.822434] kasan_atomics+0x1dc/0x310 [ 14.822456] ? __pfx_kasan_atomics+0x10/0x10 [ 14.822481] ? __pfx_read_tsc+0x10/0x10 [ 14.822501] ? ktime_get_ts64+0x86/0x230 [ 14.822524] kunit_try_run_case+0x1a5/0x480 [ 14.822547] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.822569] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.822593] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.822615] ? __kthread_parkme+0x82/0x180 [ 14.822637] ? preempt_count_sub+0x50/0x80 [ 14.822659] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.822682] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.822706] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.822729] kthread+0x337/0x6f0 [ 14.822748] ? trace_preempt_on+0x20/0xc0 [ 14.822770] ? __pfx_kthread+0x10/0x10 [ 14.822791] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.822812] ? calculate_sigpending+0x7b/0xa0 [ 14.822835] ? __pfx_kthread+0x10/0x10 [ 14.822857] ret_from_fork+0x116/0x1d0 [ 14.822875] ? __pfx_kthread+0x10/0x10 [ 14.822896] ret_from_fork_asm+0x1a/0x30 [ 14.822925] </TASK> [ 14.822936] [ 14.830812] Allocated by task 282: [ 14.830993] kasan_save_stack+0x45/0x70 [ 14.831299] kasan_save_track+0x18/0x40 [ 14.831537] kasan_save_alloc_info+0x3b/0x50 [ 14.831786] __kasan_kmalloc+0xb7/0xc0 [ 14.831978] __kmalloc_cache_noprof+0x189/0x420 [ 14.832232] kasan_atomics+0x95/0x310 [ 14.832428] kunit_try_run_case+0x1a5/0x480 [ 14.832639] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.832895] kthread+0x337/0x6f0 [ 14.833184] ret_from_fork+0x116/0x1d0 [ 14.833533] ret_from_fork_asm+0x1a/0x30 [ 14.833722] [ 14.833902] The buggy address belongs to the object at ffff888103916a00 [ 14.833902] which belongs to the cache kmalloc-64 of size 64 [ 14.834327] The buggy address is located 0 bytes to the right of [ 14.834327] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.834695] [ 14.834767] The buggy address belongs to the physical page: [ 14.835116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.835468] flags: 0x200000000000000(node=0|zone=2) [ 14.835698] page_type: f5(slab) [ 14.835866] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.836215] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.836553] page dumped because: kasan: bad access detected [ 14.836782] [ 14.836856] Memory state around the buggy address: [ 14.837014] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.837288] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.837507] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.837722] ^ [ 14.837879] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.838433] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.838753] ================================================================== [ 14.981045] ================================================================== [ 14.981621] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 14.982001] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.982629] [ 14.982764] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.982806] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.982819] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.982840] Call Trace: [ 14.982855] <TASK> [ 14.982871] dump_stack_lvl+0x73/0xb0 [ 14.982900] print_report+0xd1/0x650 [ 14.982922] ? __virt_addr_valid+0x1db/0x2d0 [ 14.982944] ? kasan_atomics_helper+0x1f43/0x5450 [ 14.982966] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.982989] ? kasan_atomics_helper+0x1f43/0x5450 [ 14.983011] kasan_report+0x141/0x180 [ 14.983044] ? kasan_atomics_helper+0x1f43/0x5450 [ 14.983080] kasan_check_range+0x10c/0x1c0 [ 14.983105] __kasan_check_write+0x18/0x20 [ 14.983125] kasan_atomics_helper+0x1f43/0x5450 [ 14.983148] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.983181] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.983206] ? kasan_atomics+0x152/0x310 [ 14.984528] kasan_atomics+0x1dc/0x310 [ 14.984553] ? __pfx_kasan_atomics+0x10/0x10 [ 14.984578] ? __pfx_read_tsc+0x10/0x10 [ 14.984600] ? ktime_get_ts64+0x86/0x230 [ 14.984625] kunit_try_run_case+0x1a5/0x480 [ 14.984649] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.984672] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.984695] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.984719] ? __kthread_parkme+0x82/0x180 [ 14.984740] ? preempt_count_sub+0x50/0x80 [ 14.984764] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.984787] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.984811] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.984835] kthread+0x337/0x6f0 [ 14.984855] ? trace_preempt_on+0x20/0xc0 [ 14.984878] ? __pfx_kthread+0x10/0x10 [ 14.984899] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.984921] ? calculate_sigpending+0x7b/0xa0 [ 14.984945] ? __pfx_kthread+0x10/0x10 [ 14.984967] ret_from_fork+0x116/0x1d0 [ 14.984986] ? __pfx_kthread+0x10/0x10 [ 14.985006] ret_from_fork_asm+0x1a/0x30 [ 14.985047] </TASK> [ 14.985232] [ 14.993218] Allocated by task 282: [ 14.993407] kasan_save_stack+0x45/0x70 [ 14.993612] kasan_save_track+0x18/0x40 [ 14.993806] kasan_save_alloc_info+0x3b/0x50 [ 14.994010] __kasan_kmalloc+0xb7/0xc0 [ 14.994153] __kmalloc_cache_noprof+0x189/0x420 [ 14.994308] kasan_atomics+0x95/0x310 [ 14.994443] kunit_try_run_case+0x1a5/0x480 [ 14.994666] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.994925] kthread+0x337/0x6f0 [ 14.995109] ret_from_fork+0x116/0x1d0 [ 14.995686] ret_from_fork_asm+0x1a/0x30 [ 14.995882] [ 14.995985] The buggy address belongs to the object at ffff888103916a00 [ 14.995985] which belongs to the cache kmalloc-64 of size 64 [ 14.996581] The buggy address is located 0 bytes to the right of [ 14.996581] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.997145] [ 14.997247] The buggy address belongs to the physical page: [ 14.997472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.997775] flags: 0x200000000000000(node=0|zone=2) [ 14.997996] page_type: f5(slab) [ 14.998239] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.998475] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.998702] page dumped because: kasan: bad access detected [ 14.998875] [ 14.998973] Memory state around the buggy address: [ 14.999215] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.999537] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.999853] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.000168] ^ [ 15.000390] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.000943] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.001425] ================================================================== [ 15.001749] ================================================================== [ 15.002051] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 15.002857] Read of size 8 at addr ffff888103916a30 by task kunit_try_catch/282 [ 15.003287] [ 15.003403] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.003446] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.003459] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.003480] Call Trace: [ 15.003496] <TASK> [ 15.003512] dump_stack_lvl+0x73/0xb0 [ 15.003539] print_report+0xd1/0x650 [ 15.003562] ? __virt_addr_valid+0x1db/0x2d0 [ 15.003585] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.003607] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.003630] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.003652] kasan_report+0x141/0x180 [ 15.003675] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.003702] __asan_report_load8_noabort+0x18/0x20 [ 15.003727] kasan_atomics_helper+0x4f71/0x5450 [ 15.003750] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.003772] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.003798] ? kasan_atomics+0x152/0x310 [ 15.003825] kasan_atomics+0x1dc/0x310 [ 15.003848] ? __pfx_kasan_atomics+0x10/0x10 [ 15.003873] ? __pfx_read_tsc+0x10/0x10 [ 15.003895] ? ktime_get_ts64+0x86/0x230 [ 15.003918] kunit_try_run_case+0x1a5/0x480 [ 15.003943] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.003966] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.003989] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.004013] ? __kthread_parkme+0x82/0x180 [ 15.004048] ? preempt_count_sub+0x50/0x80 [ 15.004072] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.004096] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.004120] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.004144] kthread+0x337/0x6f0 [ 15.004164] ? trace_preempt_on+0x20/0xc0 [ 15.004188] ? __pfx_kthread+0x10/0x10 [ 15.004209] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.004230] ? calculate_sigpending+0x7b/0xa0 [ 15.004413] ? __pfx_kthread+0x10/0x10 [ 15.004437] ret_from_fork+0x116/0x1d0 [ 15.004457] ? __pfx_kthread+0x10/0x10 [ 15.004478] ret_from_fork_asm+0x1a/0x30 [ 15.004509] </TASK> [ 15.004523] [ 15.012431] Allocated by task 282: [ 15.012621] kasan_save_stack+0x45/0x70 [ 15.012815] kasan_save_track+0x18/0x40 [ 15.012952] kasan_save_alloc_info+0x3b/0x50 [ 15.013116] __kasan_kmalloc+0xb7/0xc0 [ 15.013252] __kmalloc_cache_noprof+0x189/0x420 [ 15.013409] kasan_atomics+0x95/0x310 [ 15.013542] kunit_try_run_case+0x1a5/0x480 [ 15.013938] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.014524] kthread+0x337/0x6f0 [ 15.014701] ret_from_fork+0x116/0x1d0 [ 15.014887] ret_from_fork_asm+0x1a/0x30 [ 15.015806] [ 15.015932] The buggy address belongs to the object at ffff888103916a00 [ 15.015932] which belongs to the cache kmalloc-64 of size 64 [ 15.016996] The buggy address is located 0 bytes to the right of [ 15.016996] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 15.017683] [ 15.017763] The buggy address belongs to the physical page: [ 15.017940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 15.018396] flags: 0x200000000000000(node=0|zone=2) [ 15.018586] page_type: f5(slab) [ 15.018714] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.019099] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.019438] page dumped because: kasan: bad access detected [ 15.019707] [ 15.019803] Memory state around the buggy address: [ 15.020040] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.020519] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.020820] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.021220] ^ [ 15.021436] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.021729] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.021989] ================================================================== [ 13.970314] ================================================================== [ 13.970677] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 13.971012] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282 [ 13.971441] [ 13.971569] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.971624] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.971638] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.971659] Call Trace: [ 13.971676] <TASK> [ 13.971691] dump_stack_lvl+0x73/0xb0 [ 13.971719] print_report+0xd1/0x650 [ 13.971753] ? __virt_addr_valid+0x1db/0x2d0 [ 13.971777] ? kasan_atomics_helper+0x697/0x5450 [ 13.971799] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.971832] ? kasan_atomics_helper+0x697/0x5450 [ 13.971855] kasan_report+0x141/0x180 [ 13.971878] ? kasan_atomics_helper+0x697/0x5450 [ 13.971913] kasan_check_range+0x10c/0x1c0 [ 13.971937] __kasan_check_write+0x18/0x20 [ 13.971957] kasan_atomics_helper+0x697/0x5450 [ 13.971990] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.972014] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.972133] ? kasan_atomics+0x152/0x310 [ 13.972164] kasan_atomics+0x1dc/0x310 [ 13.972212] ? __pfx_kasan_atomics+0x10/0x10 [ 13.972237] ? __pfx_read_tsc+0x10/0x10 [ 13.972259] ? ktime_get_ts64+0x86/0x230 [ 13.972294] kunit_try_run_case+0x1a5/0x480 [ 13.972318] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.972341] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.972364] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.972387] ? __kthread_parkme+0x82/0x180 [ 13.972408] ? preempt_count_sub+0x50/0x80 [ 13.972431] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.972455] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.972478] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.972502] kthread+0x337/0x6f0 [ 13.972522] ? trace_preempt_on+0x20/0xc0 [ 13.972544] ? __pfx_kthread+0x10/0x10 [ 13.972566] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.972588] ? calculate_sigpending+0x7b/0xa0 [ 13.972620] ? __pfx_kthread+0x10/0x10 [ 13.972642] ret_from_fork+0x116/0x1d0 [ 13.972661] ? __pfx_kthread+0x10/0x10 [ 13.972692] ret_from_fork_asm+0x1a/0x30 [ 13.972722] </TASK> [ 13.972734] [ 13.981111] Allocated by task 282: [ 13.981265] kasan_save_stack+0x45/0x70 [ 13.981497] kasan_save_track+0x18/0x40 [ 13.981691] kasan_save_alloc_info+0x3b/0x50 [ 13.981899] __kasan_kmalloc+0xb7/0xc0 [ 13.982852] __kmalloc_cache_noprof+0x189/0x420 [ 13.983543] kasan_atomics+0x95/0x310 [ 13.983780] kunit_try_run_case+0x1a5/0x480 [ 13.983975] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.984554] kthread+0x337/0x6f0 [ 13.984863] ret_from_fork+0x116/0x1d0 [ 13.985305] ret_from_fork_asm+0x1a/0x30 [ 13.985500] [ 13.985592] The buggy address belongs to the object at ffff888103916a00 [ 13.985592] which belongs to the cache kmalloc-64 of size 64 [ 13.986269] The buggy address is located 0 bytes to the right of [ 13.986269] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 13.986856] [ 13.986940] The buggy address belongs to the physical page: [ 13.987297] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 13.987663] flags: 0x200000000000000(node=0|zone=2) [ 13.987866] page_type: f5(slab) [ 13.988019] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.988482] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.988799] page dumped because: kasan: bad access detected [ 13.989100] [ 13.989221] Memory state around the buggy address: [ 13.989477] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.989730] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.990283] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.990602] ^ [ 13.990818] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.991223] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.991539] ================================================================== [ 14.864301] ================================================================== [ 14.864627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 14.864968] Read of size 8 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.865655] [ 14.865930] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.866138] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.866157] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.866178] Call Trace: [ 14.866194] <TASK> [ 14.866210] dump_stack_lvl+0x73/0xb0 [ 14.866240] print_report+0xd1/0x650 [ 14.866265] ? __virt_addr_valid+0x1db/0x2d0 [ 14.866288] ? kasan_atomics_helper+0x4f30/0x5450 [ 14.866311] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.866334] ? kasan_atomics_helper+0x4f30/0x5450 [ 14.866357] kasan_report+0x141/0x180 [ 14.866380] ? kasan_atomics_helper+0x4f30/0x5450 [ 14.866406] __asan_report_load8_noabort+0x18/0x20 [ 14.866431] kasan_atomics_helper+0x4f30/0x5450 [ 14.866454] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.866477] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.866502] ? kasan_atomics+0x152/0x310 [ 14.866529] kasan_atomics+0x1dc/0x310 [ 14.866553] ? __pfx_kasan_atomics+0x10/0x10 [ 14.866578] ? __pfx_read_tsc+0x10/0x10 [ 14.866600] ? ktime_get_ts64+0x86/0x230 [ 14.866623] kunit_try_run_case+0x1a5/0x480 [ 14.866647] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.866669] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.866692] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.866716] ? __kthread_parkme+0x82/0x180 [ 14.866737] ? preempt_count_sub+0x50/0x80 [ 14.866761] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.866784] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.866808] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.866831] kthread+0x337/0x6f0 [ 14.866851] ? trace_preempt_on+0x20/0xc0 [ 14.866874] ? __pfx_kthread+0x10/0x10 [ 14.866895] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.866916] ? calculate_sigpending+0x7b/0xa0 [ 14.866941] ? __pfx_kthread+0x10/0x10 [ 14.866963] ret_from_fork+0x116/0x1d0 [ 14.866981] ? __pfx_kthread+0x10/0x10 [ 14.867002] ret_from_fork_asm+0x1a/0x30 [ 14.867048] </TASK> [ 14.867087] [ 14.878131] Allocated by task 282: [ 14.878565] kasan_save_stack+0x45/0x70 [ 14.879001] kasan_save_track+0x18/0x40 [ 14.879248] kasan_save_alloc_info+0x3b/0x50 [ 14.879462] __kasan_kmalloc+0xb7/0xc0 [ 14.879659] __kmalloc_cache_noprof+0x189/0x420 [ 14.879864] kasan_atomics+0x95/0x310 [ 14.880070] kunit_try_run_case+0x1a5/0x480 [ 14.880557] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.880763] kthread+0x337/0x6f0 [ 14.881001] ret_from_fork+0x116/0x1d0 [ 14.881255] ret_from_fork_asm+0x1a/0x30 [ 14.881579] [ 14.881672] The buggy address belongs to the object at ffff888103916a00 [ 14.881672] which belongs to the cache kmalloc-64 of size 64 [ 14.882415] The buggy address is located 0 bytes to the right of [ 14.882415] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.883044] [ 14.883256] The buggy address belongs to the physical page: [ 14.883665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.884276] flags: 0x200000000000000(node=0|zone=2) [ 14.884460] page_type: f5(slab) [ 14.884704] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.885185] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.885537] page dumped because: kasan: bad access detected [ 14.885770] [ 14.885854] Memory state around the buggy address: [ 14.886216] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.886595] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.886941] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.887363] ^ [ 14.887569] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.888165] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.888540] ================================================================== [ 14.889214] ================================================================== [ 14.889491] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 14.889837] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.890181] [ 14.890268] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.890311] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.890747] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.890774] Call Trace: [ 14.890789] <TASK> [ 14.890859] dump_stack_lvl+0x73/0xb0 [ 14.890892] print_report+0xd1/0x650 [ 14.890916] ? __virt_addr_valid+0x1db/0x2d0 [ 14.890940] ? kasan_atomics_helper+0x1ce1/0x5450 [ 14.890962] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.890985] ? kasan_atomics_helper+0x1ce1/0x5450 [ 14.891008] kasan_report+0x141/0x180 [ 14.891042] ? kasan_atomics_helper+0x1ce1/0x5450 [ 14.891073] kasan_check_range+0x10c/0x1c0 [ 14.891097] __kasan_check_write+0x18/0x20 [ 14.891266] kasan_atomics_helper+0x1ce1/0x5450 [ 14.891405] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.891432] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.891459] ? kasan_atomics+0x152/0x310 [ 14.891487] kasan_atomics+0x1dc/0x310 [ 14.891510] ? __pfx_kasan_atomics+0x10/0x10 [ 14.891534] ? __pfx_read_tsc+0x10/0x10 [ 14.891557] ? ktime_get_ts64+0x86/0x230 [ 14.891581] kunit_try_run_case+0x1a5/0x480 [ 14.891606] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.891630] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.891652] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.891675] ? __kthread_parkme+0x82/0x180 [ 14.891695] ? preempt_count_sub+0x50/0x80 [ 14.891719] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.891744] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.891769] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.891794] kthread+0x337/0x6f0 [ 14.891814] ? trace_preempt_on+0x20/0xc0 [ 14.891838] ? __pfx_kthread+0x10/0x10 [ 14.891859] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.891881] ? calculate_sigpending+0x7b/0xa0 [ 14.891905] ? __pfx_kthread+0x10/0x10 [ 14.891928] ret_from_fork+0x116/0x1d0 [ 14.891947] ? __pfx_kthread+0x10/0x10 [ 14.891968] ret_from_fork_asm+0x1a/0x30 [ 14.891998] </TASK> [ 14.892010] [ 14.902303] Allocated by task 282: [ 14.902638] kasan_save_stack+0x45/0x70 [ 14.902897] kasan_save_track+0x18/0x40 [ 14.903335] kasan_save_alloc_info+0x3b/0x50 [ 14.903663] __kasan_kmalloc+0xb7/0xc0 [ 14.903840] __kmalloc_cache_noprof+0x189/0x420 [ 14.904056] kasan_atomics+0x95/0x310 [ 14.904513] kunit_try_run_case+0x1a5/0x480 [ 14.904701] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.905063] kthread+0x337/0x6f0 [ 14.905281] ret_from_fork+0x116/0x1d0 [ 14.905559] ret_from_fork_asm+0x1a/0x30 [ 14.905743] [ 14.905924] The buggy address belongs to the object at ffff888103916a00 [ 14.905924] which belongs to the cache kmalloc-64 of size 64 [ 14.906542] The buggy address is located 0 bytes to the right of [ 14.906542] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.907352] [ 14.907618] The buggy address belongs to the physical page: [ 14.907899] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.908436] flags: 0x200000000000000(node=0|zone=2) [ 14.908649] page_type: f5(slab) [ 14.908808] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.909325] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.909628] page dumped because: kasan: bad access detected [ 14.909936] [ 14.910113] Memory state around the buggy address: [ 14.910304] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.910852] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.911214] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.911643] ^ [ 14.911821] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.912330] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.912595] ================================================================== [ 14.729732] ================================================================== [ 14.730167] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 14.730642] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.730909] [ 14.731021] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.731123] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.731137] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.731174] Call Trace: [ 14.731191] <TASK> [ 14.731208] dump_stack_lvl+0x73/0xb0 [ 14.731238] print_report+0xd1/0x650 [ 14.731261] ? __virt_addr_valid+0x1db/0x2d0 [ 14.731284] ? kasan_atomics_helper+0x1818/0x5450 [ 14.731305] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.731328] ? kasan_atomics_helper+0x1818/0x5450 [ 14.731350] kasan_report+0x141/0x180 [ 14.731372] ? kasan_atomics_helper+0x1818/0x5450 [ 14.731398] kasan_check_range+0x10c/0x1c0 [ 14.731422] __kasan_check_write+0x18/0x20 [ 14.731442] kasan_atomics_helper+0x1818/0x5450 [ 14.731464] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.731486] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.731512] ? kasan_atomics+0x152/0x310 [ 14.731539] kasan_atomics+0x1dc/0x310 [ 14.731562] ? __pfx_kasan_atomics+0x10/0x10 [ 14.731587] ? __pfx_read_tsc+0x10/0x10 [ 14.731607] ? ktime_get_ts64+0x86/0x230 [ 14.731631] kunit_try_run_case+0x1a5/0x480 [ 14.731655] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.731677] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.731700] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.731723] ? __kthread_parkme+0x82/0x180 [ 14.731743] ? preempt_count_sub+0x50/0x80 [ 14.731767] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.731791] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.731814] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.731837] kthread+0x337/0x6f0 [ 14.731856] ? trace_preempt_on+0x20/0xc0 [ 14.731879] ? __pfx_kthread+0x10/0x10 [ 14.731900] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.731921] ? calculate_sigpending+0x7b/0xa0 [ 14.731944] ? __pfx_kthread+0x10/0x10 [ 14.731966] ret_from_fork+0x116/0x1d0 [ 14.731984] ? __pfx_kthread+0x10/0x10 [ 14.732006] ret_from_fork_asm+0x1a/0x30 [ 14.732058] </TASK> [ 14.732070] [ 14.740417] Allocated by task 282: [ 14.740560] kasan_save_stack+0x45/0x70 [ 14.740704] kasan_save_track+0x18/0x40 [ 14.740849] kasan_save_alloc_info+0x3b/0x50 [ 14.741077] __kasan_kmalloc+0xb7/0xc0 [ 14.741269] __kmalloc_cache_noprof+0x189/0x420 [ 14.741501] kasan_atomics+0x95/0x310 [ 14.741690] kunit_try_run_case+0x1a5/0x480 [ 14.741883] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.742129] kthread+0x337/0x6f0 [ 14.742299] ret_from_fork+0x116/0x1d0 [ 14.742522] ret_from_fork_asm+0x1a/0x30 [ 14.742718] [ 14.742791] The buggy address belongs to the object at ffff888103916a00 [ 14.742791] which belongs to the cache kmalloc-64 of size 64 [ 14.743252] The buggy address is located 0 bytes to the right of [ 14.743252] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.743786] [ 14.743885] The buggy address belongs to the physical page: [ 14.744181] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.744528] flags: 0x200000000000000(node=0|zone=2) [ 14.744733] page_type: f5(slab) [ 14.744891] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.745175] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.745503] page dumped because: kasan: bad access detected [ 14.745715] [ 14.745787] Memory state around the buggy address: [ 14.745943] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.746209] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.746427] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.746710] ^ [ 14.746934] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.747462] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.747783] ================================================================== [ 14.766403] ================================================================== [ 14.767121] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 14.767501] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.767825] [ 14.767915] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.767960] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.767975] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.767998] Call Trace: [ 14.768013] <TASK> [ 14.768039] dump_stack_lvl+0x73/0xb0 [ 14.768066] print_report+0xd1/0x650 [ 14.768089] ? __virt_addr_valid+0x1db/0x2d0 [ 14.768111] ? kasan_atomics_helper+0x194a/0x5450 [ 14.768169] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.768192] ? kasan_atomics_helper+0x194a/0x5450 [ 14.768231] kasan_report+0x141/0x180 [ 14.768253] ? kasan_atomics_helper+0x194a/0x5450 [ 14.768279] kasan_check_range+0x10c/0x1c0 [ 14.768304] __kasan_check_write+0x18/0x20 [ 14.768324] kasan_atomics_helper+0x194a/0x5450 [ 14.768346] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.768368] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.768393] ? kasan_atomics+0x152/0x310 [ 14.768420] kasan_atomics+0x1dc/0x310 [ 14.768442] ? __pfx_kasan_atomics+0x10/0x10 [ 14.768467] ? __pfx_read_tsc+0x10/0x10 [ 14.768488] ? ktime_get_ts64+0x86/0x230 [ 14.768512] kunit_try_run_case+0x1a5/0x480 [ 14.768536] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.768559] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.768582] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.768605] ? __kthread_parkme+0x82/0x180 [ 14.768626] ? preempt_count_sub+0x50/0x80 [ 14.768649] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.768674] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.768697] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.768720] kthread+0x337/0x6f0 [ 14.768739] ? trace_preempt_on+0x20/0xc0 [ 14.768763] ? __pfx_kthread+0x10/0x10 [ 14.768783] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.768804] ? calculate_sigpending+0x7b/0xa0 [ 14.768829] ? __pfx_kthread+0x10/0x10 [ 14.768850] ret_from_fork+0x116/0x1d0 [ 14.768868] ? __pfx_kthread+0x10/0x10 [ 14.768889] ret_from_fork_asm+0x1a/0x30 [ 14.768919] </TASK> [ 14.768931] [ 14.777410] Allocated by task 282: [ 14.777589] kasan_save_stack+0x45/0x70 [ 14.777745] kasan_save_track+0x18/0x40 [ 14.777941] kasan_save_alloc_info+0x3b/0x50 [ 14.778289] __kasan_kmalloc+0xb7/0xc0 [ 14.778457] __kmalloc_cache_noprof+0x189/0x420 [ 14.778674] kasan_atomics+0x95/0x310 [ 14.778865] kunit_try_run_case+0x1a5/0x480 [ 14.779083] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.779311] kthread+0x337/0x6f0 [ 14.779466] ret_from_fork+0x116/0x1d0 [ 14.779639] ret_from_fork_asm+0x1a/0x30 [ 14.779821] [ 14.779913] The buggy address belongs to the object at ffff888103916a00 [ 14.779913] which belongs to the cache kmalloc-64 of size 64 [ 14.780472] The buggy address is located 0 bytes to the right of [ 14.780472] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.780843] [ 14.780915] The buggy address belongs to the physical page: [ 14.781102] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.781363] flags: 0x200000000000000(node=0|zone=2) [ 14.781528] page_type: f5(slab) [ 14.781648] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.781988] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.782356] page dumped because: kasan: bad access detected [ 14.782606] [ 14.782700] Memory state around the buggy address: [ 14.782931] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.783339] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.783661] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.783976] ^ [ 14.784275] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.784602] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.784943] ================================================================== [ 14.962756] ================================================================== [ 14.963090] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 14.963670] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.963967] [ 14.964098] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.964142] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.964157] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.964179] Call Trace: [ 14.964195] <TASK> [ 14.964211] dump_stack_lvl+0x73/0xb0 [ 14.964239] print_report+0xd1/0x650 [ 14.964263] ? __virt_addr_valid+0x1db/0x2d0 [ 14.964286] ? kasan_atomics_helper+0x1eaa/0x5450 [ 14.964309] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.964332] ? kasan_atomics_helper+0x1eaa/0x5450 [ 14.964355] kasan_report+0x141/0x180 [ 14.964377] ? kasan_atomics_helper+0x1eaa/0x5450 [ 14.964404] kasan_check_range+0x10c/0x1c0 [ 14.964428] __kasan_check_write+0x18/0x20 [ 14.964448] kasan_atomics_helper+0x1eaa/0x5450 [ 14.964471] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.964494] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.964519] ? kasan_atomics+0x152/0x310 [ 14.964547] kasan_atomics+0x1dc/0x310 [ 14.964570] ? __pfx_kasan_atomics+0x10/0x10 [ 14.964595] ? __pfx_read_tsc+0x10/0x10 [ 14.964617] ? ktime_get_ts64+0x86/0x230 [ 14.964642] kunit_try_run_case+0x1a5/0x480 [ 14.964667] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.964689] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.964712] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.964735] ? __kthread_parkme+0x82/0x180 [ 14.964757] ? preempt_count_sub+0x50/0x80 [ 14.964781] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.964805] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.964828] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.964852] kthread+0x337/0x6f0 [ 14.964872] ? trace_preempt_on+0x20/0xc0 [ 14.964895] ? __pfx_kthread+0x10/0x10 [ 14.964916] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.964937] ? calculate_sigpending+0x7b/0xa0 [ 14.964962] ? __pfx_kthread+0x10/0x10 [ 14.964984] ret_from_fork+0x116/0x1d0 [ 14.965002] ? __pfx_kthread+0x10/0x10 [ 14.965023] ret_from_fork_asm+0x1a/0x30 [ 14.965085] </TASK> [ 14.965097] [ 14.972984] Allocated by task 282: [ 14.973175] kasan_save_stack+0x45/0x70 [ 14.973396] kasan_save_track+0x18/0x40 [ 14.973587] kasan_save_alloc_info+0x3b/0x50 [ 14.973758] __kasan_kmalloc+0xb7/0xc0 [ 14.973936] __kmalloc_cache_noprof+0x189/0x420 [ 14.974218] kasan_atomics+0x95/0x310 [ 14.974356] kunit_try_run_case+0x1a5/0x480 [ 14.974501] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.974818] kthread+0x337/0x6f0 [ 14.974988] ret_from_fork+0x116/0x1d0 [ 14.975252] ret_from_fork_asm+0x1a/0x30 [ 14.975500] [ 14.975575] The buggy address belongs to the object at ffff888103916a00 [ 14.975575] which belongs to the cache kmalloc-64 of size 64 [ 14.976017] The buggy address is located 0 bytes to the right of [ 14.976017] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.976569] [ 14.976670] The buggy address belongs to the physical page: [ 14.976894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.977146] flags: 0x200000000000000(node=0|zone=2) [ 14.977307] page_type: f5(slab) [ 14.977426] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.977655] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.978215] page dumped because: kasan: bad access detected [ 14.978515] [ 14.978611] Memory state around the buggy address: [ 14.978832] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.979280] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.979522] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.979735] ^ [ 14.979891] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.980231] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.980556] ================================================================== [ 14.748335] ================================================================== [ 14.748678] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 14.748944] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.749548] [ 14.749665] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.749707] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.749720] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.749741] Call Trace: [ 14.749757] <TASK> [ 14.749773] dump_stack_lvl+0x73/0xb0 [ 14.749808] print_report+0xd1/0x650 [ 14.749859] ? __virt_addr_valid+0x1db/0x2d0 [ 14.749882] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.749904] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.749926] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.749948] kasan_report+0x141/0x180 [ 14.749970] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.749997] kasan_check_range+0x10c/0x1c0 [ 14.750020] __kasan_check_write+0x18/0x20 [ 14.750057] kasan_atomics_helper+0x18b1/0x5450 [ 14.750081] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.750103] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.750128] ? kasan_atomics+0x152/0x310 [ 14.750155] kasan_atomics+0x1dc/0x310 [ 14.750178] ? __pfx_kasan_atomics+0x10/0x10 [ 14.750203] ? __pfx_read_tsc+0x10/0x10 [ 14.750224] ? ktime_get_ts64+0x86/0x230 [ 14.750248] kunit_try_run_case+0x1a5/0x480 [ 14.750271] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.750294] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.750317] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.750339] ? __kthread_parkme+0x82/0x180 [ 14.750359] ? preempt_count_sub+0x50/0x80 [ 14.750383] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.750407] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.750429] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.750453] kthread+0x337/0x6f0 [ 14.750473] ? trace_preempt_on+0x20/0xc0 [ 14.750496] ? __pfx_kthread+0x10/0x10 [ 14.750517] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.750538] ? calculate_sigpending+0x7b/0xa0 [ 14.750562] ? __pfx_kthread+0x10/0x10 [ 14.750583] ret_from_fork+0x116/0x1d0 [ 14.750602] ? __pfx_kthread+0x10/0x10 [ 14.750623] ret_from_fork_asm+0x1a/0x30 [ 14.750652] </TASK> [ 14.750663] [ 14.758297] Allocated by task 282: [ 14.758465] kasan_save_stack+0x45/0x70 [ 14.758687] kasan_save_track+0x18/0x40 [ 14.758882] kasan_save_alloc_info+0x3b/0x50 [ 14.759120] __kasan_kmalloc+0xb7/0xc0 [ 14.759289] __kmalloc_cache_noprof+0x189/0x420 [ 14.759446] kasan_atomics+0x95/0x310 [ 14.759580] kunit_try_run_case+0x1a5/0x480 [ 14.759922] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.760216] kthread+0x337/0x6f0 [ 14.760389] ret_from_fork+0x116/0x1d0 [ 14.760580] ret_from_fork_asm+0x1a/0x30 [ 14.760782] [ 14.760857] The buggy address belongs to the object at ffff888103916a00 [ 14.760857] which belongs to the cache kmalloc-64 of size 64 [ 14.761403] The buggy address is located 0 bytes to the right of [ 14.761403] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.761871] [ 14.761967] The buggy address belongs to the physical page: [ 14.762180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.762487] flags: 0x200000000000000(node=0|zone=2) [ 14.762704] page_type: f5(slab) [ 14.762869] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.763386] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.763705] page dumped because: kasan: bad access detected [ 14.763876] [ 14.763946] Memory state around the buggy address: [ 14.764119] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.764337] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.764553] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.764764] ^ [ 14.764977] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.765535] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.765847] ================================================================== [ 14.284351] ================================================================== [ 14.284684] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 14.284970] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.285357] [ 14.285469] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.285511] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.285524] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.285545] Call Trace: [ 14.285559] <TASK> [ 14.285573] dump_stack_lvl+0x73/0xb0 [ 14.285601] print_report+0xd1/0x650 [ 14.285623] ? __virt_addr_valid+0x1db/0x2d0 [ 14.285648] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.285669] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.285692] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.285714] kasan_report+0x141/0x180 [ 14.285736] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.285762] kasan_check_range+0x10c/0x1c0 [ 14.285787] __kasan_check_write+0x18/0x20 [ 14.285807] kasan_atomics_helper+0xfa9/0x5450 [ 14.285830] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.285853] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.285879] ? kasan_atomics+0x152/0x310 [ 14.285906] kasan_atomics+0x1dc/0x310 [ 14.285928] ? __pfx_kasan_atomics+0x10/0x10 [ 14.285953] ? __pfx_read_tsc+0x10/0x10 [ 14.285975] ? ktime_get_ts64+0x86/0x230 [ 14.285999] kunit_try_run_case+0x1a5/0x480 [ 14.286023] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.286117] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.286160] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.286184] ? __kthread_parkme+0x82/0x180 [ 14.286205] ? preempt_count_sub+0x50/0x80 [ 14.286228] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.286253] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.286276] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.286302] kthread+0x337/0x6f0 [ 14.286322] ? trace_preempt_on+0x20/0xc0 [ 14.286346] ? __pfx_kthread+0x10/0x10 [ 14.286367] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.286389] ? calculate_sigpending+0x7b/0xa0 [ 14.286413] ? __pfx_kthread+0x10/0x10 [ 14.286435] ret_from_fork+0x116/0x1d0 [ 14.286453] ? __pfx_kthread+0x10/0x10 [ 14.286475] ret_from_fork_asm+0x1a/0x30 [ 14.286506] </TASK> [ 14.286517] [ 14.294570] Allocated by task 282: [ 14.294704] kasan_save_stack+0x45/0x70 [ 14.294852] kasan_save_track+0x18/0x40 [ 14.295219] kasan_save_alloc_info+0x3b/0x50 [ 14.295480] __kasan_kmalloc+0xb7/0xc0 [ 14.295670] __kmalloc_cache_noprof+0x189/0x420 [ 14.295891] kasan_atomics+0x95/0x310 [ 14.296171] kunit_try_run_case+0x1a5/0x480 [ 14.296400] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.296620] kthread+0x337/0x6f0 [ 14.296741] ret_from_fork+0x116/0x1d0 [ 14.296873] ret_from_fork_asm+0x1a/0x30 [ 14.297014] [ 14.297207] The buggy address belongs to the object at ffff888103916a00 [ 14.297207] which belongs to the cache kmalloc-64 of size 64 [ 14.297735] The buggy address is located 0 bytes to the right of [ 14.297735] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.298320] [ 14.298396] The buggy address belongs to the physical page: [ 14.298572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.298845] flags: 0x200000000000000(node=0|zone=2) [ 14.299298] page_type: f5(slab) [ 14.299479] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.299826] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.300272] page dumped because: kasan: bad access detected [ 14.300458] [ 14.300560] Memory state around the buggy address: [ 14.300784] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.301114] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.301362] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.301653] ^ [ 14.301882] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.302293] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.302611] ================================================================== [ 13.908660] ================================================================== [ 13.908947] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 13.909388] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282 [ 13.909735] [ 13.909858] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.909902] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.909915] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.909936] Call Trace: [ 13.909954] <TASK> [ 13.909969] dump_stack_lvl+0x73/0xb0 [ 13.910005] print_report+0xd1/0x650 [ 13.910110] ? __virt_addr_valid+0x1db/0x2d0 [ 13.910138] ? kasan_atomics_helper+0x4b3a/0x5450 [ 13.910160] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.910211] ? kasan_atomics_helper+0x4b3a/0x5450 [ 13.910233] kasan_report+0x141/0x180 [ 13.910256] ? kasan_atomics_helper+0x4b3a/0x5450 [ 13.910283] __asan_report_store4_noabort+0x1b/0x30 [ 13.910305] kasan_atomics_helper+0x4b3a/0x5450 [ 13.910327] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.910350] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.910376] ? kasan_atomics+0x152/0x310 [ 13.910413] kasan_atomics+0x1dc/0x310 [ 13.910437] ? __pfx_kasan_atomics+0x10/0x10 [ 13.910461] ? __pfx_read_tsc+0x10/0x10 [ 13.910493] ? ktime_get_ts64+0x86/0x230 [ 13.910517] kunit_try_run_case+0x1a5/0x480 [ 13.910542] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.910563] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.910587] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.910611] ? __kthread_parkme+0x82/0x180 [ 13.910631] ? preempt_count_sub+0x50/0x80 [ 13.910655] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.910679] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.910702] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.910726] kthread+0x337/0x6f0 [ 13.910745] ? trace_preempt_on+0x20/0xc0 [ 13.910769] ? __pfx_kthread+0x10/0x10 [ 13.910798] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.910820] ? calculate_sigpending+0x7b/0xa0 [ 13.910843] ? __pfx_kthread+0x10/0x10 [ 13.910875] ret_from_fork+0x116/0x1d0 [ 13.910893] ? __pfx_kthread+0x10/0x10 [ 13.910915] ret_from_fork_asm+0x1a/0x30 [ 13.910944] </TASK> [ 13.910957] [ 13.919373] Allocated by task 282: [ 13.919548] kasan_save_stack+0x45/0x70 [ 13.919764] kasan_save_track+0x18/0x40 [ 13.919959] kasan_save_alloc_info+0x3b/0x50 [ 13.920372] __kasan_kmalloc+0xb7/0xc0 [ 13.920596] __kmalloc_cache_noprof+0x189/0x420 [ 13.920816] kasan_atomics+0x95/0x310 [ 13.920955] kunit_try_run_case+0x1a5/0x480 [ 13.921288] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.921532] kthread+0x337/0x6f0 [ 13.921709] ret_from_fork+0x116/0x1d0 [ 13.921912] ret_from_fork_asm+0x1a/0x30 [ 13.922125] [ 13.922212] The buggy address belongs to the object at ffff888103916a00 [ 13.922212] which belongs to the cache kmalloc-64 of size 64 [ 13.922735] The buggy address is located 0 bytes to the right of [ 13.922735] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 13.923225] [ 13.923299] The buggy address belongs to the physical page: [ 13.923474] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 13.923828] flags: 0x200000000000000(node=0|zone=2) [ 13.924309] page_type: f5(slab) [ 13.924489] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.924823] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.925243] page dumped because: kasan: bad access detected [ 13.925485] [ 13.925584] Memory state around the buggy address: [ 13.925810] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.926214] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.926508] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.926722] ^ [ 13.926948] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.927377] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.927723] ================================================================== [ 14.643187] ================================================================== [ 14.643509] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 14.643824] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.644796] [ 14.645057] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.645107] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.645121] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.645154] Call Trace: [ 14.645205] <TASK> [ 14.645221] dump_stack_lvl+0x73/0xb0 [ 14.645253] print_report+0xd1/0x650 [ 14.645276] ? __virt_addr_valid+0x1db/0x2d0 [ 14.645299] ? kasan_atomics_helper+0x164f/0x5450 [ 14.645321] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.645345] ? kasan_atomics_helper+0x164f/0x5450 [ 14.645368] kasan_report+0x141/0x180 [ 14.645391] ? kasan_atomics_helper+0x164f/0x5450 [ 14.645418] kasan_check_range+0x10c/0x1c0 [ 14.645441] __kasan_check_write+0x18/0x20 [ 14.645461] kasan_atomics_helper+0x164f/0x5450 [ 14.645485] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.645506] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.645534] ? kasan_atomics+0x152/0x310 [ 14.645562] kasan_atomics+0x1dc/0x310 [ 14.645585] ? __pfx_kasan_atomics+0x10/0x10 [ 14.645610] ? __pfx_read_tsc+0x10/0x10 [ 14.645632] ? ktime_get_ts64+0x86/0x230 [ 14.645658] kunit_try_run_case+0x1a5/0x480 [ 14.645682] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.645705] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.645730] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.645753] ? __kthread_parkme+0x82/0x180 [ 14.645774] ? preempt_count_sub+0x50/0x80 [ 14.645798] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.645822] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.645845] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.645870] kthread+0x337/0x6f0 [ 14.645889] ? trace_preempt_on+0x20/0xc0 [ 14.645913] ? __pfx_kthread+0x10/0x10 [ 14.645934] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.645955] ? calculate_sigpending+0x7b/0xa0 [ 14.645979] ? __pfx_kthread+0x10/0x10 [ 14.646001] ret_from_fork+0x116/0x1d0 [ 14.646020] ? __pfx_kthread+0x10/0x10 [ 14.646073] ret_from_fork_asm+0x1a/0x30 [ 14.646103] </TASK> [ 14.646116] [ 14.659457] Allocated by task 282: [ 14.659713] kasan_save_stack+0x45/0x70 [ 14.659911] kasan_save_track+0x18/0x40 [ 14.660378] kasan_save_alloc_info+0x3b/0x50 [ 14.660657] __kasan_kmalloc+0xb7/0xc0 [ 14.660937] __kmalloc_cache_noprof+0x189/0x420 [ 14.661374] kasan_atomics+0x95/0x310 [ 14.661569] kunit_try_run_case+0x1a5/0x480 [ 14.661766] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.661993] kthread+0x337/0x6f0 [ 14.662545] ret_from_fork+0x116/0x1d0 [ 14.662901] ret_from_fork_asm+0x1a/0x30 [ 14.663343] [ 14.663618] The buggy address belongs to the object at ffff888103916a00 [ 14.663618] which belongs to the cache kmalloc-64 of size 64 [ 14.664573] The buggy address is located 0 bytes to the right of [ 14.664573] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.665240] [ 14.665460] The buggy address belongs to the physical page: [ 14.665809] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.666356] flags: 0x200000000000000(node=0|zone=2) [ 14.666871] page_type: f5(slab) [ 14.667044] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.667769] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.668443] page dumped because: kasan: bad access detected [ 14.668746] [ 14.668847] Memory state around the buggy address: [ 14.669263] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.669703] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.670009] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.670548] ^ [ 14.670776] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.671290] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.671753] ================================================================== [ 14.542981] ================================================================== [ 14.543376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 14.543635] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.544209] [ 14.544308] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.544350] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.544363] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.544383] Call Trace: [ 14.544398] <TASK> [ 14.544413] dump_stack_lvl+0x73/0xb0 [ 14.544441] print_report+0xd1/0x650 [ 14.544484] ? __virt_addr_valid+0x1db/0x2d0 [ 14.544507] ? kasan_atomics_helper+0x1467/0x5450 [ 14.544529] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.544551] ? kasan_atomics_helper+0x1467/0x5450 [ 14.544574] kasan_report+0x141/0x180 [ 14.544596] ? kasan_atomics_helper+0x1467/0x5450 [ 14.544622] kasan_check_range+0x10c/0x1c0 [ 14.544653] __kasan_check_write+0x18/0x20 [ 14.544674] kasan_atomics_helper+0x1467/0x5450 [ 14.544697] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.544720] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.544745] ? kasan_atomics+0x152/0x310 [ 14.544772] kasan_atomics+0x1dc/0x310 [ 14.544795] ? __pfx_kasan_atomics+0x10/0x10 [ 14.544819] ? __pfx_read_tsc+0x10/0x10 [ 14.544840] ? ktime_get_ts64+0x86/0x230 [ 14.544865] kunit_try_run_case+0x1a5/0x480 [ 14.544889] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.544912] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.544935] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.544959] ? __kthread_parkme+0x82/0x180 [ 14.544980] ? preempt_count_sub+0x50/0x80 [ 14.545004] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.545038] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.545062] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.545086] kthread+0x337/0x6f0 [ 14.545105] ? trace_preempt_on+0x20/0xc0 [ 14.545130] ? __pfx_kthread+0x10/0x10 [ 14.545152] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.545174] ? calculate_sigpending+0x7b/0xa0 [ 14.545197] ? __pfx_kthread+0x10/0x10 [ 14.545219] ret_from_fork+0x116/0x1d0 [ 14.545238] ? __pfx_kthread+0x10/0x10 [ 14.545259] ret_from_fork_asm+0x1a/0x30 [ 14.545300] </TASK> [ 14.545312] [ 14.553262] Allocated by task 282: [ 14.553392] kasan_save_stack+0x45/0x70 [ 14.553603] kasan_save_track+0x18/0x40 [ 14.553792] kasan_save_alloc_info+0x3b/0x50 [ 14.554001] __kasan_kmalloc+0xb7/0xc0 [ 14.554159] __kmalloc_cache_noprof+0x189/0x420 [ 14.554315] kasan_atomics+0x95/0x310 [ 14.554449] kunit_try_run_case+0x1a5/0x480 [ 14.554741] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.554994] kthread+0x337/0x6f0 [ 14.555195] ret_from_fork+0x116/0x1d0 [ 14.555409] ret_from_fork_asm+0x1a/0x30 [ 14.555585] [ 14.555690] The buggy address belongs to the object at ffff888103916a00 [ 14.555690] which belongs to the cache kmalloc-64 of size 64 [ 14.556268] The buggy address is located 0 bytes to the right of [ 14.556268] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.556871] [ 14.556969] The buggy address belongs to the physical page: [ 14.557369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.557931] flags: 0x200000000000000(node=0|zone=2) [ 14.558258] page_type: f5(slab) [ 14.558470] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.558769] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.559089] page dumped because: kasan: bad access detected [ 14.559379] [ 14.559475] Memory state around the buggy address: [ 14.559665] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.559944] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.560231] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.560628] ^ [ 14.560900] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.561130] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.561347] ================================================================== [ 14.379947] ================================================================== [ 14.380366] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 14.380722] Read of size 4 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.381061] [ 14.381338] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.381385] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.381399] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.381420] Call Trace: [ 14.381435] <TASK> [ 14.381450] dump_stack_lvl+0x73/0xb0 [ 14.381480] print_report+0xd1/0x650 [ 14.381503] ? __virt_addr_valid+0x1db/0x2d0 [ 14.381527] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.381549] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.381571] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.381594] kasan_report+0x141/0x180 [ 14.381615] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.381642] __asan_report_load4_noabort+0x18/0x20 [ 14.381667] kasan_atomics_helper+0x4a02/0x5450 [ 14.381690] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.381713] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.381738] ? kasan_atomics+0x152/0x310 [ 14.381765] kasan_atomics+0x1dc/0x310 [ 14.381788] ? __pfx_kasan_atomics+0x10/0x10 [ 14.381813] ? __pfx_read_tsc+0x10/0x10 [ 14.381834] ? ktime_get_ts64+0x86/0x230 [ 14.381858] kunit_try_run_case+0x1a5/0x480 [ 14.381883] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.381906] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.381928] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.381952] ? __kthread_parkme+0x82/0x180 [ 14.381972] ? preempt_count_sub+0x50/0x80 [ 14.381996] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.382020] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.382111] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.382137] kthread+0x337/0x6f0 [ 14.382158] ? trace_preempt_on+0x20/0xc0 [ 14.382182] ? __pfx_kthread+0x10/0x10 [ 14.382204] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.382225] ? calculate_sigpending+0x7b/0xa0 [ 14.382250] ? __pfx_kthread+0x10/0x10 [ 14.382272] ret_from_fork+0x116/0x1d0 [ 14.382290] ? __pfx_kthread+0x10/0x10 [ 14.382312] ret_from_fork_asm+0x1a/0x30 [ 14.382343] </TASK> [ 14.382354] [ 14.390403] Allocated by task 282: [ 14.390589] kasan_save_stack+0x45/0x70 [ 14.390791] kasan_save_track+0x18/0x40 [ 14.390984] kasan_save_alloc_info+0x3b/0x50 [ 14.391233] __kasan_kmalloc+0xb7/0xc0 [ 14.391371] __kmalloc_cache_noprof+0x189/0x420 [ 14.391527] kasan_atomics+0x95/0x310 [ 14.391811] kunit_try_run_case+0x1a5/0x480 [ 14.392023] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.392349] kthread+0x337/0x6f0 [ 14.392514] ret_from_fork+0x116/0x1d0 [ 14.392706] ret_from_fork_asm+0x1a/0x30 [ 14.392892] [ 14.392970] The buggy address belongs to the object at ffff888103916a00 [ 14.392970] which belongs to the cache kmalloc-64 of size 64 [ 14.393525] The buggy address is located 0 bytes to the right of [ 14.393525] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.393903] [ 14.393976] The buggy address belongs to the physical page: [ 14.394368] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.394729] flags: 0x200000000000000(node=0|zone=2) [ 14.394960] page_type: f5(slab) [ 14.395356] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.395734] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.396167] page dumped because: kasan: bad access detected [ 14.396424] [ 14.396515] Memory state around the buggy address: [ 14.396673] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.396962] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.397420] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.397768] ^ [ 14.397996] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.398507] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.398832] ================================================================== [ 15.137760] ================================================================== [ 15.138195] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 15.138594] Read of size 8 at addr ffff888103916a30 by task kunit_try_catch/282 [ 15.138895] [ 15.139008] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.139063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.139080] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.139101] Call Trace: [ 15.139116] <TASK> [ 15.139132] dump_stack_lvl+0x73/0xb0 [ 15.139162] print_report+0xd1/0x650 [ 15.139185] ? __virt_addr_valid+0x1db/0x2d0 [ 15.139207] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.139229] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.139552] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.139670] kasan_report+0x141/0x180 [ 15.139697] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.139725] __asan_report_load8_noabort+0x18/0x20 [ 15.139751] kasan_atomics_helper+0x4fa5/0x5450 [ 15.139774] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.139797] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.139823] ? kasan_atomics+0x152/0x310 [ 15.139850] kasan_atomics+0x1dc/0x310 [ 15.139873] ? __pfx_kasan_atomics+0x10/0x10 [ 15.139897] ? __pfx_read_tsc+0x10/0x10 [ 15.139919] ? ktime_get_ts64+0x86/0x230 [ 15.139944] kunit_try_run_case+0x1a5/0x480 [ 15.139968] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.139991] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.140015] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.140065] ? __kthread_parkme+0x82/0x180 [ 15.140086] ? preempt_count_sub+0x50/0x80 [ 15.140111] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.140135] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.140159] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.140184] kthread+0x337/0x6f0 [ 15.140204] ? trace_preempt_on+0x20/0xc0 [ 15.140228] ? __pfx_kthread+0x10/0x10 [ 15.140250] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.140272] ? calculate_sigpending+0x7b/0xa0 [ 15.140296] ? __pfx_kthread+0x10/0x10 [ 15.140317] ret_from_fork+0x116/0x1d0 [ 15.140336] ? __pfx_kthread+0x10/0x10 [ 15.140357] ret_from_fork_asm+0x1a/0x30 [ 15.140387] </TASK> [ 15.140400] [ 15.150432] Allocated by task 282: [ 15.150620] kasan_save_stack+0x45/0x70 [ 15.151372] kasan_save_track+0x18/0x40 [ 15.151594] kasan_save_alloc_info+0x3b/0x50 [ 15.151918] __kasan_kmalloc+0xb7/0xc0 [ 15.152195] __kmalloc_cache_noprof+0x189/0x420 [ 15.152550] kasan_atomics+0x95/0x310 [ 15.152803] kunit_try_run_case+0x1a5/0x480 [ 15.152961] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.153436] kthread+0x337/0x6f0 [ 15.153591] ret_from_fork+0x116/0x1d0 [ 15.153783] ret_from_fork_asm+0x1a/0x30 [ 15.153957] [ 15.154149] The buggy address belongs to the object at ffff888103916a00 [ 15.154149] which belongs to the cache kmalloc-64 of size 64 [ 15.154782] The buggy address is located 0 bytes to the right of [ 15.154782] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 15.155634] [ 15.155738] The buggy address belongs to the physical page: [ 15.155961] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 15.156530] flags: 0x200000000000000(node=0|zone=2) [ 15.156737] page_type: f5(slab) [ 15.157038] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.157564] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.158186] page dumped because: kasan: bad access detected [ 15.158503] [ 15.158685] Memory state around the buggy address: [ 15.158902] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.159488] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.159802] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.160184] ^ [ 15.160529] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.160830] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.161135] ================================================================== [ 15.041605] ================================================================== [ 15.041907] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 15.042200] Read of size 8 at addr ffff888103916a30 by task kunit_try_catch/282 [ 15.042631] [ 15.042741] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.042797] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.042812] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.042832] Call Trace: [ 15.042847] <TASK> [ 15.042862] dump_stack_lvl+0x73/0xb0 [ 15.042888] print_report+0xd1/0x650 [ 15.042912] ? __virt_addr_valid+0x1db/0x2d0 [ 15.042934] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.042956] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.042979] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.043001] kasan_report+0x141/0x180 [ 15.043024] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.043061] __asan_report_load8_noabort+0x18/0x20 [ 15.043089] kasan_atomics_helper+0x4f98/0x5450 [ 15.043112] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.043136] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.043161] ? kasan_atomics+0x152/0x310 [ 15.043188] kasan_atomics+0x1dc/0x310 [ 15.043212] ? __pfx_kasan_atomics+0x10/0x10 [ 15.043237] ? __pfx_read_tsc+0x10/0x10 [ 15.043339] ? ktime_get_ts64+0x86/0x230 [ 15.043364] kunit_try_run_case+0x1a5/0x480 [ 15.043390] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.043413] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.043436] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.043459] ? __kthread_parkme+0x82/0x180 [ 15.043480] ? preempt_count_sub+0x50/0x80 [ 15.043503] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.043528] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.043551] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.043575] kthread+0x337/0x6f0 [ 15.043594] ? trace_preempt_on+0x20/0xc0 [ 15.043617] ? __pfx_kthread+0x10/0x10 [ 15.043639] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.043660] ? calculate_sigpending+0x7b/0xa0 [ 15.043686] ? __pfx_kthread+0x10/0x10 [ 15.043708] ret_from_fork+0x116/0x1d0 [ 15.043727] ? __pfx_kthread+0x10/0x10 [ 15.043748] ret_from_fork_asm+0x1a/0x30 [ 15.043779] </TASK> [ 15.043790] [ 15.056451] Allocated by task 282: [ 15.056629] kasan_save_stack+0x45/0x70 [ 15.056823] kasan_save_track+0x18/0x40 [ 15.057003] kasan_save_alloc_info+0x3b/0x50 [ 15.057531] __kasan_kmalloc+0xb7/0xc0 [ 15.057789] __kmalloc_cache_noprof+0x189/0x420 [ 15.058375] kasan_atomics+0x95/0x310 [ 15.058579] kunit_try_run_case+0x1a5/0x480 [ 15.058773] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.059002] kthread+0x337/0x6f0 [ 15.059599] ret_from_fork+0x116/0x1d0 [ 15.059799] ret_from_fork_asm+0x1a/0x30 [ 15.059983] [ 15.060466] The buggy address belongs to the object at ffff888103916a00 [ 15.060466] which belongs to the cache kmalloc-64 of size 64 [ 15.060949] The buggy address is located 0 bytes to the right of [ 15.060949] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 15.062199] [ 15.062308] The buggy address belongs to the physical page: [ 15.062552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 15.062874] flags: 0x200000000000000(node=0|zone=2) [ 15.063420] page_type: f5(slab) [ 15.063713] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.064234] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.064564] page dumped because: kasan: bad access detected [ 15.064794] [ 15.064888] Memory state around the buggy address: [ 15.065475] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.065801] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.066231] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.066523] ^ [ 15.066729] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.066948] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.067179] ================================================================== [ 15.184834] ================================================================== [ 15.185125] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 15.185576] Read of size 8 at addr ffff888103916a30 by task kunit_try_catch/282 [ 15.186229] [ 15.186500] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.186547] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.186561] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.186582] Call Trace: [ 15.186597] <TASK> [ 15.186614] dump_stack_lvl+0x73/0xb0 [ 15.186641] print_report+0xd1/0x650 [ 15.186664] ? __virt_addr_valid+0x1db/0x2d0 [ 15.186686] ? kasan_atomics_helper+0x5115/0x5450 [ 15.186708] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.186730] ? kasan_atomics_helper+0x5115/0x5450 [ 15.186753] kasan_report+0x141/0x180 [ 15.186776] ? kasan_atomics_helper+0x5115/0x5450 [ 15.186802] __asan_report_load8_noabort+0x18/0x20 [ 15.186827] kasan_atomics_helper+0x5115/0x5450 [ 15.186850] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.186873] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.186898] ? kasan_atomics+0x152/0x310 [ 15.186925] kasan_atomics+0x1dc/0x310 [ 15.186947] ? __pfx_kasan_atomics+0x10/0x10 [ 15.186972] ? __pfx_read_tsc+0x10/0x10 [ 15.186993] ? ktime_get_ts64+0x86/0x230 [ 15.187017] kunit_try_run_case+0x1a5/0x480 [ 15.187073] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.187096] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.187119] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.187144] ? __kthread_parkme+0x82/0x180 [ 15.187166] ? preempt_count_sub+0x50/0x80 [ 15.187194] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.187222] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.187247] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.187271] kthread+0x337/0x6f0 [ 15.187291] ? trace_preempt_on+0x20/0xc0 [ 15.187315] ? __pfx_kthread+0x10/0x10 [ 15.187336] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.187356] ? calculate_sigpending+0x7b/0xa0 [ 15.187381] ? __pfx_kthread+0x10/0x10 [ 15.187403] ret_from_fork+0x116/0x1d0 [ 15.187422] ? __pfx_kthread+0x10/0x10 [ 15.187445] ret_from_fork_asm+0x1a/0x30 [ 15.187476] </TASK> [ 15.187488] [ 15.195364] Allocated by task 282: [ 15.195590] kasan_save_stack+0x45/0x70 [ 15.195790] kasan_save_track+0x18/0x40 [ 15.195981] kasan_save_alloc_info+0x3b/0x50 [ 15.196271] __kasan_kmalloc+0xb7/0xc0 [ 15.196471] __kmalloc_cache_noprof+0x189/0x420 [ 15.196693] kasan_atomics+0x95/0x310 [ 15.196830] kunit_try_run_case+0x1a5/0x480 [ 15.196976] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.197470] kthread+0x337/0x6f0 [ 15.197704] ret_from_fork+0x116/0x1d0 [ 15.197855] ret_from_fork_asm+0x1a/0x30 [ 15.198141] [ 15.198246] The buggy address belongs to the object at ffff888103916a00 [ 15.198246] which belongs to the cache kmalloc-64 of size 64 [ 15.198682] The buggy address is located 0 bytes to the right of [ 15.198682] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 15.199114] [ 15.199213] The buggy address belongs to the physical page: [ 15.199469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 15.199969] flags: 0x200000000000000(node=0|zone=2) [ 15.200199] page_type: f5(slab) [ 15.200430] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.200814] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.201215] page dumped because: kasan: bad access detected [ 15.201432] [ 15.201504] Memory state around the buggy address: [ 15.201728] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.202063] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.202362] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.202638] ^ [ 15.202851] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.203212] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.203441] ================================================================== [ 13.748516] ================================================================== [ 13.749562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 13.750239] Read of size 4 at addr ffff888103916a30 by task kunit_try_catch/282 [ 13.751163] [ 13.751469] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.751521] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.751533] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.751554] Call Trace: [ 13.751568] <TASK> [ 13.751583] dump_stack_lvl+0x73/0xb0 [ 13.751612] print_report+0xd1/0x650 [ 13.751634] ? __virt_addr_valid+0x1db/0x2d0 [ 13.751655] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.751676] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.751696] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.751718] kasan_report+0x141/0x180 [ 13.751739] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.751764] __asan_report_load4_noabort+0x18/0x20 [ 13.751788] kasan_atomics_helper+0x4bbc/0x5450 [ 13.751809] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.751831] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.751857] ? kasan_atomics+0x152/0x310 [ 13.751883] kasan_atomics+0x1dc/0x310 [ 13.751905] ? __pfx_kasan_atomics+0x10/0x10 [ 13.751931] ? __pfx_read_tsc+0x10/0x10 [ 13.751952] ? ktime_get_ts64+0x86/0x230 [ 13.751975] kunit_try_run_case+0x1a5/0x480 [ 13.751999] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.752022] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.752057] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.752079] ? __kthread_parkme+0x82/0x180 [ 13.752099] ? preempt_count_sub+0x50/0x80 [ 13.752122] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.752145] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.752167] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.752190] kthread+0x337/0x6f0 [ 13.752208] ? trace_preempt_on+0x20/0xc0 [ 13.752231] ? __pfx_kthread+0x10/0x10 [ 13.752251] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.752271] ? calculate_sigpending+0x7b/0xa0 [ 13.752295] ? __pfx_kthread+0x10/0x10 [ 13.752315] ret_from_fork+0x116/0x1d0 [ 13.752333] ? __pfx_kthread+0x10/0x10 [ 13.752353] ret_from_fork_asm+0x1a/0x30 [ 13.752382] </TASK> [ 13.752395] [ 13.766483] Allocated by task 282: [ 13.766981] kasan_save_stack+0x45/0x70 [ 13.767334] kasan_save_track+0x18/0x40 [ 13.767966] kasan_save_alloc_info+0x3b/0x50 [ 13.768652] __kasan_kmalloc+0xb7/0xc0 [ 13.769149] __kmalloc_cache_noprof+0x189/0x420 [ 13.769612] kasan_atomics+0x95/0x310 [ 13.770136] kunit_try_run_case+0x1a5/0x480 [ 13.770528] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.770715] kthread+0x337/0x6f0 [ 13.770835] ret_from_fork+0x116/0x1d0 [ 13.770967] ret_from_fork_asm+0x1a/0x30 [ 13.771137] [ 13.771368] The buggy address belongs to the object at ffff888103916a00 [ 13.771368] which belongs to the cache kmalloc-64 of size 64 [ 13.772506] The buggy address is located 0 bytes to the right of [ 13.772506] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 13.773858] [ 13.774119] The buggy address belongs to the physical page: [ 13.774664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 13.775557] flags: 0x200000000000000(node=0|zone=2) [ 13.775795] page_type: f5(slab) [ 13.775918] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.776369] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.777024] page dumped because: kasan: bad access detected [ 13.777752] [ 13.777939] Memory state around the buggy address: [ 13.778480] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.778968] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.779402] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.780008] ^ [ 13.780553] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.780962] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.781498] ================================================================== [ 13.868540] ================================================================== [ 13.868841] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 13.869314] Read of size 4 at addr ffff888103916a30 by task kunit_try_catch/282 [ 13.869612] [ 13.869699] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.869741] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.869755] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.869775] Call Trace: [ 13.869800] <TASK> [ 13.869816] dump_stack_lvl+0x73/0xb0 [ 13.869842] print_report+0xd1/0x650 [ 13.869877] ? __virt_addr_valid+0x1db/0x2d0 [ 13.869900] ? kasan_atomics_helper+0x4b54/0x5450 [ 13.869922] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.869945] ? kasan_atomics_helper+0x4b54/0x5450 [ 13.869967] kasan_report+0x141/0x180 [ 13.869990] ? kasan_atomics_helper+0x4b54/0x5450 [ 13.870016] __asan_report_load4_noabort+0x18/0x20 [ 13.870109] kasan_atomics_helper+0x4b54/0x5450 [ 13.870160] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.870183] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.870221] ? kasan_atomics+0x152/0x310 [ 13.870249] kasan_atomics+0x1dc/0x310 [ 13.870273] ? __pfx_kasan_atomics+0x10/0x10 [ 13.870297] ? __pfx_read_tsc+0x10/0x10 [ 13.870319] ? ktime_get_ts64+0x86/0x230 [ 13.870343] kunit_try_run_case+0x1a5/0x480 [ 13.870367] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.870389] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.870413] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.870436] ? __kthread_parkme+0x82/0x180 [ 13.870456] ? preempt_count_sub+0x50/0x80 [ 13.870480] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.870506] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.870530] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.870554] kthread+0x337/0x6f0 [ 13.870574] ? trace_preempt_on+0x20/0xc0 [ 13.870597] ? __pfx_kthread+0x10/0x10 [ 13.870619] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.870641] ? calculate_sigpending+0x7b/0xa0 [ 13.870675] ? __pfx_kthread+0x10/0x10 [ 13.870697] ret_from_fork+0x116/0x1d0 [ 13.870716] ? __pfx_kthread+0x10/0x10 [ 13.870747] ret_from_fork_asm+0x1a/0x30 [ 13.870778] </TASK> [ 13.870789] [ 13.879298] Allocated by task 282: [ 13.879477] kasan_save_stack+0x45/0x70 [ 13.879694] kasan_save_track+0x18/0x40 [ 13.879878] kasan_save_alloc_info+0x3b/0x50 [ 13.880322] __kasan_kmalloc+0xb7/0xc0 [ 13.880517] __kmalloc_cache_noprof+0x189/0x420 [ 13.880740] kasan_atomics+0x95/0x310 [ 13.880924] kunit_try_run_case+0x1a5/0x480 [ 13.881114] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.881292] kthread+0x337/0x6f0 [ 13.881416] ret_from_fork+0x116/0x1d0 [ 13.881603] ret_from_fork_asm+0x1a/0x30 [ 13.881908] [ 13.882008] The buggy address belongs to the object at ffff888103916a00 [ 13.882008] which belongs to the cache kmalloc-64 of size 64 [ 13.882600] The buggy address is located 0 bytes to the right of [ 13.882600] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 13.883103] [ 13.883244] The buggy address belongs to the physical page: [ 13.883521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 13.883833] flags: 0x200000000000000(node=0|zone=2) [ 13.884107] page_type: f5(slab) [ 13.884268] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.884909] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.885279] page dumped because: kasan: bad access detected [ 13.885573] [ 13.885675] Memory state around the buggy address: [ 13.885908] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.886299] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.886627] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.886936] ^ [ 13.887249] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.887576] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.887886] ================================================================== [ 14.802780] ================================================================== [ 14.803014] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 14.803589] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.803938] [ 14.804071] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.804113] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.804127] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.804163] Call Trace: [ 14.804178] <TASK> [ 14.804193] dump_stack_lvl+0x73/0xb0 [ 14.804221] print_report+0xd1/0x650 [ 14.804244] ? __virt_addr_valid+0x1db/0x2d0 [ 14.804267] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.804289] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.804311] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.804334] kasan_report+0x141/0x180 [ 14.804357] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.804384] kasan_check_range+0x10c/0x1c0 [ 14.804407] __kasan_check_write+0x18/0x20 [ 14.804427] kasan_atomics_helper+0x1a7f/0x5450 [ 14.804450] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.804472] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.804497] ? kasan_atomics+0x152/0x310 [ 14.804525] kasan_atomics+0x1dc/0x310 [ 14.804548] ? __pfx_kasan_atomics+0x10/0x10 [ 14.804572] ? __pfx_read_tsc+0x10/0x10 [ 14.804593] ? ktime_get_ts64+0x86/0x230 [ 14.804617] kunit_try_run_case+0x1a5/0x480 [ 14.804642] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.804664] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.804687] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.804709] ? __kthread_parkme+0x82/0x180 [ 14.804730] ? preempt_count_sub+0x50/0x80 [ 14.804754] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.804778] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.804801] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.804824] kthread+0x337/0x6f0 [ 14.804844] ? trace_preempt_on+0x20/0xc0 [ 14.804867] ? __pfx_kthread+0x10/0x10 [ 14.804888] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.804910] ? calculate_sigpending+0x7b/0xa0 [ 14.804934] ? __pfx_kthread+0x10/0x10 [ 14.804955] ret_from_fork+0x116/0x1d0 [ 14.804974] ? __pfx_kthread+0x10/0x10 [ 14.804995] ret_from_fork_asm+0x1a/0x30 [ 14.805025] </TASK> [ 14.805060] [ 14.812851] Allocated by task 282: [ 14.813119] kasan_save_stack+0x45/0x70 [ 14.813338] kasan_save_track+0x18/0x40 [ 14.813531] kasan_save_alloc_info+0x3b/0x50 [ 14.813742] __kasan_kmalloc+0xb7/0xc0 [ 14.813895] __kmalloc_cache_noprof+0x189/0x420 [ 14.814155] kasan_atomics+0x95/0x310 [ 14.814322] kunit_try_run_case+0x1a5/0x480 [ 14.814470] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.814646] kthread+0x337/0x6f0 [ 14.814765] ret_from_fork+0x116/0x1d0 [ 14.814896] ret_from_fork_asm+0x1a/0x30 [ 14.815045] [ 14.815197] The buggy address belongs to the object at ffff888103916a00 [ 14.815197] which belongs to the cache kmalloc-64 of size 64 [ 14.815720] The buggy address is located 0 bytes to the right of [ 14.815720] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.816275] [ 14.816359] The buggy address belongs to the physical page: [ 14.816530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.816768] flags: 0x200000000000000(node=0|zone=2) [ 14.816929] page_type: f5(slab) [ 14.817081] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.817705] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.818089] page dumped because: kasan: bad access detected [ 14.818691] [ 14.818811] Memory state around the buggy address: [ 14.819049] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.819373] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.819607] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.819824] ^ [ 14.819980] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.820205] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.820418] ================================================================== [ 14.095833] ================================================================== [ 14.096300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 14.096607] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.096931] [ 14.097262] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.097342] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.097358] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.097379] Call Trace: [ 14.097394] <TASK> [ 14.097420] dump_stack_lvl+0x73/0xb0 [ 14.097448] print_report+0xd1/0x650 [ 14.097471] ? __virt_addr_valid+0x1db/0x2d0 [ 14.097493] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.097525] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.097547] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.097569] kasan_report+0x141/0x180 [ 14.097602] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.097628] kasan_check_range+0x10c/0x1c0 [ 14.097652] __kasan_check_write+0x18/0x20 [ 14.097672] kasan_atomics_helper+0xa2b/0x5450 [ 14.097695] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.097717] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.097742] ? kasan_atomics+0x152/0x310 [ 14.097770] kasan_atomics+0x1dc/0x310 [ 14.097802] ? __pfx_kasan_atomics+0x10/0x10 [ 14.097826] ? __pfx_read_tsc+0x10/0x10 [ 14.097847] ? ktime_get_ts64+0x86/0x230 [ 14.097884] kunit_try_run_case+0x1a5/0x480 [ 14.097909] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.097931] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.097955] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.097986] ? __kthread_parkme+0x82/0x180 [ 14.098009] ? preempt_count_sub+0x50/0x80 [ 14.098213] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.098247] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.098285] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.098309] kthread+0x337/0x6f0 [ 14.098330] ? trace_preempt_on+0x20/0xc0 [ 14.098367] ? __pfx_kthread+0x10/0x10 [ 14.098388] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.098410] ? calculate_sigpending+0x7b/0xa0 [ 14.098435] ? __pfx_kthread+0x10/0x10 [ 14.098457] ret_from_fork+0x116/0x1d0 [ 14.098477] ? __pfx_kthread+0x10/0x10 [ 14.098498] ret_from_fork_asm+0x1a/0x30 [ 14.098528] </TASK> [ 14.098540] [ 14.107659] Allocated by task 282: [ 14.107854] kasan_save_stack+0x45/0x70 [ 14.108515] kasan_save_track+0x18/0x40 [ 14.108700] kasan_save_alloc_info+0x3b/0x50 [ 14.108875] __kasan_kmalloc+0xb7/0xc0 [ 14.109083] __kmalloc_cache_noprof+0x189/0x420 [ 14.109373] kasan_atomics+0x95/0x310 [ 14.109581] kunit_try_run_case+0x1a5/0x480 [ 14.109772] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.110014] kthread+0x337/0x6f0 [ 14.110728] ret_from_fork+0x116/0x1d0 [ 14.110927] ret_from_fork_asm+0x1a/0x30 [ 14.111223] [ 14.111337] The buggy address belongs to the object at ffff888103916a00 [ 14.111337] which belongs to the cache kmalloc-64 of size 64 [ 14.111805] The buggy address is located 0 bytes to the right of [ 14.111805] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.112580] [ 14.112684] The buggy address belongs to the physical page: [ 14.113081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.113701] flags: 0x200000000000000(node=0|zone=2) [ 14.113891] page_type: f5(slab) [ 14.114516] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.114839] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.115318] page dumped because: kasan: bad access detected [ 14.115572] [ 14.115667] Memory state around the buggy address: [ 14.115862] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.116481] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.116774] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.117260] ^ [ 14.117466] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.117944] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.118432] ================================================================== [ 13.928985] ================================================================== [ 13.929654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 13.930446] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282 [ 13.930787] [ 13.930999] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.931141] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.931157] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.931194] Call Trace: [ 13.931208] <TASK> [ 13.931223] dump_stack_lvl+0x73/0xb0 [ 13.931263] print_report+0xd1/0x650 [ 13.931287] ? __virt_addr_valid+0x1db/0x2d0 [ 13.931310] ? kasan_atomics_helper+0x565/0x5450 [ 13.931344] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.931368] ? kasan_atomics_helper+0x565/0x5450 [ 13.931390] kasan_report+0x141/0x180 [ 13.931415] ? kasan_atomics_helper+0x565/0x5450 [ 13.931442] kasan_check_range+0x10c/0x1c0 [ 13.931466] __kasan_check_write+0x18/0x20 [ 13.931487] kasan_atomics_helper+0x565/0x5450 [ 13.931510] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.931532] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.931561] ? kasan_atomics+0x152/0x310 [ 13.931589] kasan_atomics+0x1dc/0x310 [ 13.931622] ? __pfx_kasan_atomics+0x10/0x10 [ 13.931646] ? __pfx_read_tsc+0x10/0x10 [ 13.931667] ? ktime_get_ts64+0x86/0x230 [ 13.931702] kunit_try_run_case+0x1a5/0x480 [ 13.931726] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.931748] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.931781] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.931804] ? __kthread_parkme+0x82/0x180 [ 13.931825] ? preempt_count_sub+0x50/0x80 [ 13.931859] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.931884] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.931907] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.931931] kthread+0x337/0x6f0 [ 13.931951] ? trace_preempt_on+0x20/0xc0 [ 13.931974] ? __pfx_kthread+0x10/0x10 [ 13.931995] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.932017] ? calculate_sigpending+0x7b/0xa0 [ 13.932160] ? __pfx_kthread+0x10/0x10 [ 13.932183] ret_from_fork+0x116/0x1d0 [ 13.932203] ? __pfx_kthread+0x10/0x10 [ 13.932241] ret_from_fork_asm+0x1a/0x30 [ 13.932272] </TASK> [ 13.932283] [ 13.940945] Allocated by task 282: [ 13.941315] kasan_save_stack+0x45/0x70 [ 13.941538] kasan_save_track+0x18/0x40 [ 13.941729] kasan_save_alloc_info+0x3b/0x50 [ 13.941944] __kasan_kmalloc+0xb7/0xc0 [ 13.942228] __kmalloc_cache_noprof+0x189/0x420 [ 13.942471] kasan_atomics+0x95/0x310 [ 13.942637] kunit_try_run_case+0x1a5/0x480 [ 13.942844] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.943155] kthread+0x337/0x6f0 [ 13.943283] ret_from_fork+0x116/0x1d0 [ 13.943472] ret_from_fork_asm+0x1a/0x30 [ 13.943696] [ 13.943795] The buggy address belongs to the object at ffff888103916a00 [ 13.943795] which belongs to the cache kmalloc-64 of size 64 [ 13.944379] The buggy address is located 0 bytes to the right of [ 13.944379] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 13.944936] [ 13.945236] The buggy address belongs to the physical page: [ 13.945490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 13.945845] flags: 0x200000000000000(node=0|zone=2) [ 13.946186] page_type: f5(slab) [ 13.946345] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.946650] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.946920] page dumped because: kasan: bad access detected [ 13.947282] [ 13.947383] Memory state around the buggy address: [ 13.947607] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.947933] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.948313] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.948671] ^ [ 13.948910] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.949381] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.949702] ================================================================== [ 14.265452] ================================================================== [ 14.265764] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 14.266197] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.266472] [ 14.266585] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.266629] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.266641] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.266662] Call Trace: [ 14.266676] <TASK> [ 14.266692] dump_stack_lvl+0x73/0xb0 [ 14.266719] print_report+0xd1/0x650 [ 14.266742] ? __virt_addr_valid+0x1db/0x2d0 [ 14.266764] ? kasan_atomics_helper+0xf10/0x5450 [ 14.266785] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.266808] ? kasan_atomics_helper+0xf10/0x5450 [ 14.266830] kasan_report+0x141/0x180 [ 14.266853] ? kasan_atomics_helper+0xf10/0x5450 [ 14.266880] kasan_check_range+0x10c/0x1c0 [ 14.266904] __kasan_check_write+0x18/0x20 [ 14.266923] kasan_atomics_helper+0xf10/0x5450 [ 14.266945] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.266969] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.266994] ? kasan_atomics+0x152/0x310 [ 14.267022] kasan_atomics+0x1dc/0x310 [ 14.267257] ? __pfx_kasan_atomics+0x10/0x10 [ 14.267283] ? __pfx_read_tsc+0x10/0x10 [ 14.267327] ? ktime_get_ts64+0x86/0x230 [ 14.267351] kunit_try_run_case+0x1a5/0x480 [ 14.267376] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.267399] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.267423] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.267446] ? __kthread_parkme+0x82/0x180 [ 14.267467] ? preempt_count_sub+0x50/0x80 [ 14.267491] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.267515] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.267538] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.267563] kthread+0x337/0x6f0 [ 14.267583] ? trace_preempt_on+0x20/0xc0 [ 14.267607] ? __pfx_kthread+0x10/0x10 [ 14.267628] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.267650] ? calculate_sigpending+0x7b/0xa0 [ 14.267675] ? __pfx_kthread+0x10/0x10 [ 14.267697] ret_from_fork+0x116/0x1d0 [ 14.267716] ? __pfx_kthread+0x10/0x10 [ 14.267737] ret_from_fork_asm+0x1a/0x30 [ 14.267767] </TASK> [ 14.267779] [ 14.275963] Allocated by task 282: [ 14.276263] kasan_save_stack+0x45/0x70 [ 14.276431] kasan_save_track+0x18/0x40 [ 14.276568] kasan_save_alloc_info+0x3b/0x50 [ 14.276770] __kasan_kmalloc+0xb7/0xc0 [ 14.276922] __kmalloc_cache_noprof+0x189/0x420 [ 14.277251] kasan_atomics+0x95/0x310 [ 14.277429] kunit_try_run_case+0x1a5/0x480 [ 14.277616] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.277825] kthread+0x337/0x6f0 [ 14.277993] ret_from_fork+0x116/0x1d0 [ 14.278271] ret_from_fork_asm+0x1a/0x30 [ 14.278478] [ 14.278568] The buggy address belongs to the object at ffff888103916a00 [ 14.278568] which belongs to the cache kmalloc-64 of size 64 [ 14.279219] The buggy address is located 0 bytes to the right of [ 14.279219] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.279773] [ 14.279868] The buggy address belongs to the physical page: [ 14.280126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.280404] flags: 0x200000000000000(node=0|zone=2) [ 14.280643] page_type: f5(slab) [ 14.280809] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.281246] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.281478] page dumped because: kasan: bad access detected [ 14.281668] [ 14.281763] Memory state around the buggy address: [ 14.281991] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.282406] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.282715] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.282998] ^ [ 14.283373] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.283683] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.283896] ================================================================== [ 14.162364] ================================================================== [ 14.162605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 14.162835] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.163270] [ 14.163396] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.163441] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.163469] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.163490] Call Trace: [ 14.163507] <TASK> [ 14.163523] dump_stack_lvl+0x73/0xb0 [ 14.163566] print_report+0xd1/0x650 [ 14.163589] ? __virt_addr_valid+0x1db/0x2d0 [ 14.163612] ? kasan_atomics_helper+0xc70/0x5450 [ 14.163633] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.163657] ? kasan_atomics_helper+0xc70/0x5450 [ 14.163679] kasan_report+0x141/0x180 [ 14.163701] ? kasan_atomics_helper+0xc70/0x5450 [ 14.163727] kasan_check_range+0x10c/0x1c0 [ 14.163751] __kasan_check_write+0x18/0x20 [ 14.163771] kasan_atomics_helper+0xc70/0x5450 [ 14.163794] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.163817] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.163842] ? kasan_atomics+0x152/0x310 [ 14.163869] kasan_atomics+0x1dc/0x310 [ 14.163892] ? __pfx_kasan_atomics+0x10/0x10 [ 14.163916] ? __pfx_read_tsc+0x10/0x10 [ 14.163937] ? ktime_get_ts64+0x86/0x230 [ 14.163961] kunit_try_run_case+0x1a5/0x480 [ 14.163986] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.164008] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.164041] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.164117] ? __kthread_parkme+0x82/0x180 [ 14.164139] ? preempt_count_sub+0x50/0x80 [ 14.164163] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.164187] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.164210] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.164234] kthread+0x337/0x6f0 [ 14.164254] ? trace_preempt_on+0x20/0xc0 [ 14.164277] ? __pfx_kthread+0x10/0x10 [ 14.164299] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.164319] ? calculate_sigpending+0x7b/0xa0 [ 14.164343] ? __pfx_kthread+0x10/0x10 [ 14.164365] ret_from_fork+0x116/0x1d0 [ 14.164384] ? __pfx_kthread+0x10/0x10 [ 14.164404] ret_from_fork_asm+0x1a/0x30 [ 14.164434] </TASK> [ 14.164445] [ 14.176600] Allocated by task 282: [ 14.176769] kasan_save_stack+0x45/0x70 [ 14.176963] kasan_save_track+0x18/0x40 [ 14.177158] kasan_save_alloc_info+0x3b/0x50 [ 14.177344] __kasan_kmalloc+0xb7/0xc0 [ 14.177537] __kmalloc_cache_noprof+0x189/0x420 [ 14.177737] kasan_atomics+0x95/0x310 [ 14.177926] kunit_try_run_case+0x1a5/0x480 [ 14.178589] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.178809] kthread+0x337/0x6f0 [ 14.179105] ret_from_fork+0x116/0x1d0 [ 14.179524] ret_from_fork_asm+0x1a/0x30 [ 14.179801] [ 14.179881] The buggy address belongs to the object at ffff888103916a00 [ 14.179881] which belongs to the cache kmalloc-64 of size 64 [ 14.180655] The buggy address is located 0 bytes to the right of [ 14.180655] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.181476] [ 14.181634] The buggy address belongs to the physical page: [ 14.181869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.182571] flags: 0x200000000000000(node=0|zone=2) [ 14.182799] page_type: f5(slab) [ 14.182946] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.183575] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.183883] page dumped because: kasan: bad access detected [ 14.184363] [ 14.184461] Memory state around the buggy address: [ 14.184806] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.185287] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.185683] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.186003] ^ [ 14.186530] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.186901] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.187395] ================================================================== [ 15.093489] ================================================================== [ 15.093808] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 15.094162] Read of size 8 at addr ffff888103916a30 by task kunit_try_catch/282 [ 15.094432] [ 15.094528] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.094572] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.094585] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.094606] Call Trace: [ 15.094622] <TASK> [ 15.094638] dump_stack_lvl+0x73/0xb0 [ 15.094664] print_report+0xd1/0x650 [ 15.094688] ? __virt_addr_valid+0x1db/0x2d0 [ 15.094711] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.094733] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.094756] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.094778] kasan_report+0x141/0x180 [ 15.094800] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.094827] __asan_report_load8_noabort+0x18/0x20 [ 15.094851] kasan_atomics_helper+0x4fb2/0x5450 [ 15.094874] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.094897] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.094923] ? kasan_atomics+0x152/0x310 [ 15.094949] kasan_atomics+0x1dc/0x310 [ 15.094973] ? __pfx_kasan_atomics+0x10/0x10 [ 15.094998] ? __pfx_read_tsc+0x10/0x10 [ 15.095020] ? ktime_get_ts64+0x86/0x230 [ 15.095056] kunit_try_run_case+0x1a5/0x480 [ 15.095085] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.095108] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.095132] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.095235] ? __kthread_parkme+0x82/0x180 [ 15.095261] ? preempt_count_sub+0x50/0x80 [ 15.095285] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.095310] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.095345] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.095369] kthread+0x337/0x6f0 [ 15.095389] ? trace_preempt_on+0x20/0xc0 [ 15.095413] ? __pfx_kthread+0x10/0x10 [ 15.095434] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.095456] ? calculate_sigpending+0x7b/0xa0 [ 15.095481] ? __pfx_kthread+0x10/0x10 [ 15.095502] ret_from_fork+0x116/0x1d0 [ 15.095522] ? __pfx_kthread+0x10/0x10 [ 15.095543] ret_from_fork_asm+0x1a/0x30 [ 15.095573] </TASK> [ 15.095586] [ 15.103776] Allocated by task 282: [ 15.103913] kasan_save_stack+0x45/0x70 [ 15.104252] kasan_save_track+0x18/0x40 [ 15.104473] kasan_save_alloc_info+0x3b/0x50 [ 15.104691] __kasan_kmalloc+0xb7/0xc0 [ 15.104884] __kmalloc_cache_noprof+0x189/0x420 [ 15.105210] kasan_atomics+0x95/0x310 [ 15.105382] kunit_try_run_case+0x1a5/0x480 [ 15.105586] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.105816] kthread+0x337/0x6f0 [ 15.105979] ret_from_fork+0x116/0x1d0 [ 15.106282] ret_from_fork_asm+0x1a/0x30 [ 15.106447] [ 15.106546] The buggy address belongs to the object at ffff888103916a00 [ 15.106546] which belongs to the cache kmalloc-64 of size 64 [ 15.107095] The buggy address is located 0 bytes to the right of [ 15.107095] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 15.107471] [ 15.107546] The buggy address belongs to the physical page: [ 15.107947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 15.108742] flags: 0x200000000000000(node=0|zone=2) [ 15.108915] page_type: f5(slab) [ 15.109050] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.109783] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.110147] page dumped because: kasan: bad access detected [ 15.110547] [ 15.110630] Memory state around the buggy address: [ 15.110797] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.111007] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.111356] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.111710] ^ [ 15.112096] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.112645] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.112982] ================================================================== [ 13.848831] ================================================================== [ 13.849258] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 13.849645] Read of size 4 at addr ffff888103916a30 by task kunit_try_catch/282 [ 13.849958] [ 13.850139] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.850184] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.850197] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.850218] Call Trace: [ 13.850232] <TASK> [ 13.850247] dump_stack_lvl+0x73/0xb0 [ 13.850276] print_report+0xd1/0x650 [ 13.850298] ? __virt_addr_valid+0x1db/0x2d0 [ 13.850320] ? kasan_atomics_helper+0x3df/0x5450 [ 13.850355] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.850379] ? kasan_atomics_helper+0x3df/0x5450 [ 13.850400] kasan_report+0x141/0x180 [ 13.850435] ? kasan_atomics_helper+0x3df/0x5450 [ 13.850461] kasan_check_range+0x10c/0x1c0 [ 13.850485] __kasan_check_read+0x15/0x20 [ 13.850504] kasan_atomics_helper+0x3df/0x5450 [ 13.850528] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.850549] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.850576] ? kasan_atomics+0x152/0x310 [ 13.850603] kasan_atomics+0x1dc/0x310 [ 13.850626] ? __pfx_kasan_atomics+0x10/0x10 [ 13.850650] ? __pfx_read_tsc+0x10/0x10 [ 13.850673] ? ktime_get_ts64+0x86/0x230 [ 13.850697] kunit_try_run_case+0x1a5/0x480 [ 13.850721] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.850754] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.850777] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.850799] ? __kthread_parkme+0x82/0x180 [ 13.850831] ? preempt_count_sub+0x50/0x80 [ 13.850856] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.850879] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.850911] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.850935] kthread+0x337/0x6f0 [ 13.850955] ? trace_preempt_on+0x20/0xc0 [ 13.850988] ? __pfx_kthread+0x10/0x10 [ 13.851009] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.851040] ? calculate_sigpending+0x7b/0xa0 [ 13.851070] ? __pfx_kthread+0x10/0x10 [ 13.851091] ret_from_fork+0x116/0x1d0 [ 13.851111] ? __pfx_kthread+0x10/0x10 [ 13.851132] ret_from_fork_asm+0x1a/0x30 [ 13.851163] </TASK> [ 13.851173] [ 13.859326] Allocated by task 282: [ 13.859481] kasan_save_stack+0x45/0x70 [ 13.859670] kasan_save_track+0x18/0x40 [ 13.859852] kasan_save_alloc_info+0x3b/0x50 [ 13.860011] __kasan_kmalloc+0xb7/0xc0 [ 13.860464] __kmalloc_cache_noprof+0x189/0x420 [ 13.860696] kasan_atomics+0x95/0x310 [ 13.860886] kunit_try_run_case+0x1a5/0x480 [ 13.861192] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.861463] kthread+0x337/0x6f0 [ 13.861653] ret_from_fork+0x116/0x1d0 [ 13.861841] ret_from_fork_asm+0x1a/0x30 [ 13.862089] [ 13.862234] The buggy address belongs to the object at ffff888103916a00 [ 13.862234] which belongs to the cache kmalloc-64 of size 64 [ 13.862726] The buggy address is located 0 bytes to the right of [ 13.862726] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 13.863318] [ 13.863396] The buggy address belongs to the physical page: [ 13.863570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 13.863940] flags: 0x200000000000000(node=0|zone=2) [ 13.864406] page_type: f5(slab) [ 13.864587] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.864928] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.865367] page dumped because: kasan: bad access detected [ 13.865563] [ 13.865644] Memory state around the buggy address: [ 13.865871] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.866338] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.866641] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.866947] ^ [ 13.867276] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.867588] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.867897] ================================================================== [ 14.399407] ================================================================== [ 14.399769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 14.400189] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.400542] [ 14.400630] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.400673] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.400707] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.400729] Call Trace: [ 14.400745] <TASK> [ 14.400761] dump_stack_lvl+0x73/0xb0 [ 14.400806] print_report+0xd1/0x650 [ 14.400829] ? __virt_addr_valid+0x1db/0x2d0 [ 14.400852] ? kasan_atomics_helper+0x1217/0x5450 [ 14.400874] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.400897] ? kasan_atomics_helper+0x1217/0x5450 [ 14.400919] kasan_report+0x141/0x180 [ 14.400960] ? kasan_atomics_helper+0x1217/0x5450 [ 14.400987] kasan_check_range+0x10c/0x1c0 [ 14.401011] __kasan_check_write+0x18/0x20 [ 14.401127] kasan_atomics_helper+0x1217/0x5450 [ 14.401156] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.401180] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.401206] ? kasan_atomics+0x152/0x310 [ 14.401233] kasan_atomics+0x1dc/0x310 [ 14.401257] ? __pfx_kasan_atomics+0x10/0x10 [ 14.401306] ? __pfx_read_tsc+0x10/0x10 [ 14.401342] ? ktime_get_ts64+0x86/0x230 [ 14.401401] kunit_try_run_case+0x1a5/0x480 [ 14.401427] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.401450] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.401473] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.401496] ? __kthread_parkme+0x82/0x180 [ 14.401516] ? preempt_count_sub+0x50/0x80 [ 14.401542] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.401566] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.401589] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.401613] kthread+0x337/0x6f0 [ 14.401632] ? trace_preempt_on+0x20/0xc0 [ 14.401656] ? __pfx_kthread+0x10/0x10 [ 14.401676] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.401698] ? calculate_sigpending+0x7b/0xa0 [ 14.401722] ? __pfx_kthread+0x10/0x10 [ 14.401744] ret_from_fork+0x116/0x1d0 [ 14.401763] ? __pfx_kthread+0x10/0x10 [ 14.401783] ret_from_fork_asm+0x1a/0x30 [ 14.401832] </TASK> [ 14.401844] [ 14.410438] Allocated by task 282: [ 14.410625] kasan_save_stack+0x45/0x70 [ 14.410854] kasan_save_track+0x18/0x40 [ 14.411253] kasan_save_alloc_info+0x3b/0x50 [ 14.411499] __kasan_kmalloc+0xb7/0xc0 [ 14.411687] __kmalloc_cache_noprof+0x189/0x420 [ 14.411916] kasan_atomics+0x95/0x310 [ 14.412261] kunit_try_run_case+0x1a5/0x480 [ 14.412457] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.412700] kthread+0x337/0x6f0 [ 14.412881] ret_from_fork+0x116/0x1d0 [ 14.413115] ret_from_fork_asm+0x1a/0x30 [ 14.413371] [ 14.413467] The buggy address belongs to the object at ffff888103916a00 [ 14.413467] which belongs to the cache kmalloc-64 of size 64 [ 14.414105] The buggy address is located 0 bytes to the right of [ 14.414105] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.414680] [ 14.414777] The buggy address belongs to the physical page: [ 14.414972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.415582] flags: 0x200000000000000(node=0|zone=2) [ 14.415854] page_type: f5(slab) [ 14.415985] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.416481] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.416815] page dumped because: kasan: bad access detected [ 14.417123] [ 14.417249] Memory state around the buggy address: [ 14.417481] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.417752] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.418167] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.418504] ^ [ 14.418731] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.419263] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.419564] ================================================================== [ 14.012428] ================================================================== [ 14.012801] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 14.013257] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.013578] [ 14.013704] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.013747] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.013761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.013783] Call Trace: [ 14.013797] <TASK> [ 14.013813] dump_stack_lvl+0x73/0xb0 [ 14.013840] print_report+0xd1/0x650 [ 14.013863] ? __virt_addr_valid+0x1db/0x2d0 [ 14.013886] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.013907] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.013941] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.013964] kasan_report+0x141/0x180 [ 14.013986] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.014025] kasan_check_range+0x10c/0x1c0 [ 14.014074] __kasan_check_write+0x18/0x20 [ 14.014094] kasan_atomics_helper+0x7c7/0x5450 [ 14.014118] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.014147] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.014173] ? kasan_atomics+0x152/0x310 [ 14.014200] kasan_atomics+0x1dc/0x310 [ 14.014224] ? __pfx_kasan_atomics+0x10/0x10 [ 14.014249] ? __pfx_read_tsc+0x10/0x10 [ 14.014271] ? ktime_get_ts64+0x86/0x230 [ 14.014295] kunit_try_run_case+0x1a5/0x480 [ 14.014320] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.014525] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.014552] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.014577] ? __kthread_parkme+0x82/0x180 [ 14.014599] ? preempt_count_sub+0x50/0x80 [ 14.014635] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.014660] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.014694] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.014719] kthread+0x337/0x6f0 [ 14.014740] ? trace_preempt_on+0x20/0xc0 [ 14.014763] ? __pfx_kthread+0x10/0x10 [ 14.014786] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.014808] ? calculate_sigpending+0x7b/0xa0 [ 14.014842] ? __pfx_kthread+0x10/0x10 [ 14.014863] ret_from_fork+0x116/0x1d0 [ 14.014882] ? __pfx_kthread+0x10/0x10 [ 14.014914] ret_from_fork_asm+0x1a/0x30 [ 14.014945] </TASK> [ 14.014956] [ 14.023353] Allocated by task 282: [ 14.023548] kasan_save_stack+0x45/0x70 [ 14.023765] kasan_save_track+0x18/0x40 [ 14.023938] kasan_save_alloc_info+0x3b/0x50 [ 14.024273] __kasan_kmalloc+0xb7/0xc0 [ 14.024479] __kmalloc_cache_noprof+0x189/0x420 [ 14.024669] kasan_atomics+0x95/0x310 [ 14.024804] kunit_try_run_case+0x1a5/0x480 [ 14.024952] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.025226] kthread+0x337/0x6f0 [ 14.025396] ret_from_fork+0x116/0x1d0 [ 14.025584] ret_from_fork_asm+0x1a/0x30 [ 14.025781] [ 14.025877] The buggy address belongs to the object at ffff888103916a00 [ 14.025877] which belongs to the cache kmalloc-64 of size 64 [ 14.026532] The buggy address is located 0 bytes to the right of [ 14.026532] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.027208] [ 14.027327] The buggy address belongs to the physical page: [ 14.027579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.027935] flags: 0x200000000000000(node=0|zone=2) [ 14.028219] page_type: f5(slab) [ 14.028346] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.028693] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.029831] page dumped because: kasan: bad access detected [ 14.030354] [ 14.030476] Memory state around the buggy address: [ 14.030929] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.031384] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.031697] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.031947] ^ [ 14.032598] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.032892] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.033317] ================================================================== [ 14.446368] ================================================================== [ 14.446840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 14.447567] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.447992] [ 14.448245] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.448292] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.448307] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.448329] Call Trace: [ 14.448345] <TASK> [ 14.448361] dump_stack_lvl+0x73/0xb0 [ 14.448532] print_report+0xd1/0x650 [ 14.448697] ? __virt_addr_valid+0x1db/0x2d0 [ 14.448722] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.448745] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.448769] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.448791] kasan_report+0x141/0x180 [ 14.448813] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.448840] kasan_check_range+0x10c/0x1c0 [ 14.448864] __kasan_check_write+0x18/0x20 [ 14.448884] kasan_atomics_helper+0x12e6/0x5450 [ 14.448907] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.448929] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.448954] ? kasan_atomics+0x152/0x310 [ 14.448981] kasan_atomics+0x1dc/0x310 [ 14.449003] ? __pfx_kasan_atomics+0x10/0x10 [ 14.449041] ? __pfx_read_tsc+0x10/0x10 [ 14.449077] ? ktime_get_ts64+0x86/0x230 [ 14.449101] kunit_try_run_case+0x1a5/0x480 [ 14.449126] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.449160] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.449183] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.449206] ? __kthread_parkme+0x82/0x180 [ 14.449226] ? preempt_count_sub+0x50/0x80 [ 14.449250] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.449273] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.449296] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.449321] kthread+0x337/0x6f0 [ 14.449340] ? trace_preempt_on+0x20/0xc0 [ 14.449363] ? __pfx_kthread+0x10/0x10 [ 14.449384] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.449405] ? calculate_sigpending+0x7b/0xa0 [ 14.449429] ? __pfx_kthread+0x10/0x10 [ 14.449451] ret_from_fork+0x116/0x1d0 [ 14.449470] ? __pfx_kthread+0x10/0x10 [ 14.449492] ret_from_fork_asm+0x1a/0x30 [ 14.449522] </TASK> [ 14.449533] [ 14.460864] Allocated by task 282: [ 14.461392] kasan_save_stack+0x45/0x70 [ 14.461623] kasan_save_track+0x18/0x40 [ 14.462059] kasan_save_alloc_info+0x3b/0x50 [ 14.462297] __kasan_kmalloc+0xb7/0xc0 [ 14.462682] __kmalloc_cache_noprof+0x189/0x420 [ 14.462900] kasan_atomics+0x95/0x310 [ 14.463237] kunit_try_run_case+0x1a5/0x480 [ 14.463478] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.463844] kthread+0x337/0x6f0 [ 14.464044] ret_from_fork+0x116/0x1d0 [ 14.464272] ret_from_fork_asm+0x1a/0x30 [ 14.464496] [ 14.464684] The buggy address belongs to the object at ffff888103916a00 [ 14.464684] which belongs to the cache kmalloc-64 of size 64 [ 14.465486] The buggy address is located 0 bytes to the right of [ 14.465486] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.466107] [ 14.466385] The buggy address belongs to the physical page: [ 14.466775] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.467266] flags: 0x200000000000000(node=0|zone=2) [ 14.467512] page_type: f5(slab) [ 14.467681] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.468278] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.468725] page dumped because: kasan: bad access detected [ 14.469105] [ 14.469371] Memory state around the buggy address: [ 14.469674] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.469982] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.470512] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.470890] ^ [ 14.471216] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.471634] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.471973] ================================================================== [ 14.499507] ================================================================== [ 14.499819] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 14.500494] Read of size 8 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.500877] [ 14.501103] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.501152] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.501165] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.501260] Call Trace: [ 14.501280] <TASK> [ 14.501298] dump_stack_lvl+0x73/0xb0 [ 14.501327] print_report+0xd1/0x650 [ 14.501351] ? __virt_addr_valid+0x1db/0x2d0 [ 14.501375] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.501396] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.501524] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.501547] kasan_report+0x141/0x180 [ 14.501570] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.501597] kasan_check_range+0x10c/0x1c0 [ 14.501621] __kasan_check_read+0x15/0x20 [ 14.501641] kasan_atomics_helper+0x13b5/0x5450 [ 14.501663] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.501686] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.501713] ? kasan_atomics+0x152/0x310 [ 14.501740] kasan_atomics+0x1dc/0x310 [ 14.501763] ? __pfx_kasan_atomics+0x10/0x10 [ 14.501788] ? __pfx_read_tsc+0x10/0x10 [ 14.501809] ? ktime_get_ts64+0x86/0x230 [ 14.501833] kunit_try_run_case+0x1a5/0x480 [ 14.501858] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.501880] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.501904] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.501927] ? __kthread_parkme+0x82/0x180 [ 14.501949] ? preempt_count_sub+0x50/0x80 [ 14.501972] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.501996] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.502020] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.502077] kthread+0x337/0x6f0 [ 14.502098] ? trace_preempt_on+0x20/0xc0 [ 14.502121] ? __pfx_kthread+0x10/0x10 [ 14.502142] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.502163] ? calculate_sigpending+0x7b/0xa0 [ 14.502188] ? __pfx_kthread+0x10/0x10 [ 14.502210] ret_from_fork+0x116/0x1d0 [ 14.502228] ? __pfx_kthread+0x10/0x10 [ 14.502250] ret_from_fork_asm+0x1a/0x30 [ 14.502280] </TASK> [ 14.502292] [ 14.512302] Allocated by task 282: [ 14.512627] kasan_save_stack+0x45/0x70 [ 14.513195] kasan_save_track+0x18/0x40 [ 14.513490] kasan_save_alloc_info+0x3b/0x50 [ 14.513765] __kasan_kmalloc+0xb7/0xc0 [ 14.513931] __kmalloc_cache_noprof+0x189/0x420 [ 14.514303] kasan_atomics+0x95/0x310 [ 14.514741] kunit_try_run_case+0x1a5/0x480 [ 14.515241] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.515480] kthread+0x337/0x6f0 [ 14.515726] ret_from_fork+0x116/0x1d0 [ 14.515900] ret_from_fork_asm+0x1a/0x30 [ 14.516105] [ 14.516404] The buggy address belongs to the object at ffff888103916a00 [ 14.516404] which belongs to the cache kmalloc-64 of size 64 [ 14.517087] The buggy address is located 0 bytes to the right of [ 14.517087] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.517722] [ 14.517829] The buggy address belongs to the physical page: [ 14.518216] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.518687] flags: 0x200000000000000(node=0|zone=2) [ 14.518906] page_type: f5(slab) [ 14.519199] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.519614] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.520010] page dumped because: kasan: bad access detected [ 14.520337] [ 14.520567] Memory state around the buggy address: [ 14.520926] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.521392] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.521843] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.522309] ^ [ 14.522600] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.522884] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.523373] ================================================================== [ 14.472892] ================================================================== [ 14.473297] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 14.474063] Read of size 4 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.474680] [ 14.474824] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.474884] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.474898] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.474920] Call Trace: [ 14.474937] <TASK> [ 14.474953] dump_stack_lvl+0x73/0xb0 [ 14.474983] print_report+0xd1/0x650 [ 14.475007] ? __virt_addr_valid+0x1db/0x2d0 [ 14.475041] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.475071] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.475233] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.475270] kasan_report+0x141/0x180 [ 14.475293] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.475320] __asan_report_load4_noabort+0x18/0x20 [ 14.475345] kasan_atomics_helper+0x49ce/0x5450 [ 14.475368] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.475391] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.475418] ? kasan_atomics+0x152/0x310 [ 14.475444] kasan_atomics+0x1dc/0x310 [ 14.475468] ? __pfx_kasan_atomics+0x10/0x10 [ 14.475492] ? __pfx_read_tsc+0x10/0x10 [ 14.475515] ? ktime_get_ts64+0x86/0x230 [ 14.475539] kunit_try_run_case+0x1a5/0x480 [ 14.475563] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.475586] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.475609] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.475633] ? __kthread_parkme+0x82/0x180 [ 14.475654] ? preempt_count_sub+0x50/0x80 [ 14.475677] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.475701] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.475725] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.475749] kthread+0x337/0x6f0 [ 14.475769] ? trace_preempt_on+0x20/0xc0 [ 14.475791] ? __pfx_kthread+0x10/0x10 [ 14.475813] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.475833] ? calculate_sigpending+0x7b/0xa0 [ 14.475857] ? __pfx_kthread+0x10/0x10 [ 14.475880] ret_from_fork+0x116/0x1d0 [ 14.475899] ? __pfx_kthread+0x10/0x10 [ 14.475920] ret_from_fork_asm+0x1a/0x30 [ 14.475951] </TASK> [ 14.475963] [ 14.487748] Allocated by task 282: [ 14.488166] kasan_save_stack+0x45/0x70 [ 14.488542] kasan_save_track+0x18/0x40 [ 14.488745] kasan_save_alloc_info+0x3b/0x50 [ 14.489246] __kasan_kmalloc+0xb7/0xc0 [ 14.489587] __kmalloc_cache_noprof+0x189/0x420 [ 14.489868] kasan_atomics+0x95/0x310 [ 14.490163] kunit_try_run_case+0x1a5/0x480 [ 14.490385] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.490659] kthread+0x337/0x6f0 [ 14.490826] ret_from_fork+0x116/0x1d0 [ 14.491005] ret_from_fork_asm+0x1a/0x30 [ 14.491460] [ 14.491544] The buggy address belongs to the object at ffff888103916a00 [ 14.491544] which belongs to the cache kmalloc-64 of size 64 [ 14.492277] The buggy address is located 0 bytes to the right of [ 14.492277] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.493166] [ 14.493295] The buggy address belongs to the physical page: [ 14.493610] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.494076] flags: 0x200000000000000(node=0|zone=2) [ 14.494407] page_type: f5(slab) [ 14.494706] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.495124] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.495519] page dumped because: kasan: bad access detected [ 14.495839] [ 14.495937] Memory state around the buggy address: [ 14.496154] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.496824] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.497148] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.497500] ^ [ 14.497953] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.498362] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.498750] ================================================================== [ 14.587828] ================================================================== [ 14.588310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 14.588750] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.589241] [ 14.589562] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.589618] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.589634] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.589656] Call Trace: [ 14.589673] <TASK> [ 14.589690] dump_stack_lvl+0x73/0xb0 [ 14.589753] print_report+0xd1/0x650 [ 14.589778] ? __virt_addr_valid+0x1db/0x2d0 [ 14.589801] ? kasan_atomics_helper+0x151d/0x5450 [ 14.589825] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.589848] ? kasan_atomics_helper+0x151d/0x5450 [ 14.589870] kasan_report+0x141/0x180 [ 14.589893] ? kasan_atomics_helper+0x151d/0x5450 [ 14.589919] kasan_check_range+0x10c/0x1c0 [ 14.589943] __kasan_check_write+0x18/0x20 [ 14.589963] kasan_atomics_helper+0x151d/0x5450 [ 14.589987] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.590009] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.590045] ? kasan_atomics+0x152/0x310 [ 14.590074] kasan_atomics+0x1dc/0x310 [ 14.590097] ? __pfx_kasan_atomics+0x10/0x10 [ 14.590121] ? __pfx_read_tsc+0x10/0x10 [ 14.590143] ? ktime_get_ts64+0x86/0x230 [ 14.590167] kunit_try_run_case+0x1a5/0x480 [ 14.590193] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.590216] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.590239] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.590262] ? __kthread_parkme+0x82/0x180 [ 14.590283] ? preempt_count_sub+0x50/0x80 [ 14.590307] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.590331] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.590354] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.590378] kthread+0x337/0x6f0 [ 14.590398] ? trace_preempt_on+0x20/0xc0 [ 14.590422] ? __pfx_kthread+0x10/0x10 [ 14.590444] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.590465] ? calculate_sigpending+0x7b/0xa0 [ 14.590490] ? __pfx_kthread+0x10/0x10 [ 14.590512] ret_from_fork+0x116/0x1d0 [ 14.590530] ? __pfx_kthread+0x10/0x10 [ 14.590551] ret_from_fork_asm+0x1a/0x30 [ 14.590582] </TASK> [ 14.590595] [ 14.601591] Allocated by task 282: [ 14.601768] kasan_save_stack+0x45/0x70 [ 14.601954] kasan_save_track+0x18/0x40 [ 14.602676] kasan_save_alloc_info+0x3b/0x50 [ 14.603156] __kasan_kmalloc+0xb7/0xc0 [ 14.603566] __kmalloc_cache_noprof+0x189/0x420 [ 14.603898] kasan_atomics+0x95/0x310 [ 14.604338] kunit_try_run_case+0x1a5/0x480 [ 14.604553] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.604784] kthread+0x337/0x6f0 [ 14.604944] ret_from_fork+0x116/0x1d0 [ 14.605541] ret_from_fork_asm+0x1a/0x30 [ 14.605810] [ 14.606045] The buggy address belongs to the object at ffff888103916a00 [ 14.606045] which belongs to the cache kmalloc-64 of size 64 [ 14.606998] The buggy address is located 0 bytes to the right of [ 14.606998] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.607896] [ 14.608005] The buggy address belongs to the physical page: [ 14.608421] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.608732] flags: 0x200000000000000(node=0|zone=2) [ 14.608951] page_type: f5(slab) [ 14.609377] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.609874] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.610510] page dumped because: kasan: bad access detected [ 14.610914] [ 14.611022] Memory state around the buggy address: [ 14.611403] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.611703] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.611995] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.612925] ^ [ 14.613268] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.613861] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.614371] ================================================================== [ 14.913244] ================================================================== [ 14.913591] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 14.913924] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.914618] [ 14.914714] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.914772] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.914785] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.914807] Call Trace: [ 14.914823] <TASK> [ 14.914946] dump_stack_lvl+0x73/0xb0 [ 14.914978] print_report+0xd1/0x650 [ 14.915002] ? __virt_addr_valid+0x1db/0x2d0 [ 14.915024] ? kasan_atomics_helper+0x1d7a/0x5450 [ 14.915176] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.915202] ? kasan_atomics_helper+0x1d7a/0x5450 [ 14.915227] kasan_report+0x141/0x180 [ 14.915250] ? kasan_atomics_helper+0x1d7a/0x5450 [ 14.915278] kasan_check_range+0x10c/0x1c0 [ 14.915302] __kasan_check_write+0x18/0x20 [ 14.915323] kasan_atomics_helper+0x1d7a/0x5450 [ 14.915347] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.915371] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.915397] ? kasan_atomics+0x152/0x310 [ 14.915424] kasan_atomics+0x1dc/0x310 [ 14.915448] ? __pfx_kasan_atomics+0x10/0x10 [ 14.915473] ? __pfx_read_tsc+0x10/0x10 [ 14.915495] ? ktime_get_ts64+0x86/0x230 [ 14.915520] kunit_try_run_case+0x1a5/0x480 [ 14.915544] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.915567] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.915591] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.915614] ? __kthread_parkme+0x82/0x180 [ 14.915636] ? preempt_count_sub+0x50/0x80 [ 14.915659] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.915683] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.915705] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.915729] kthread+0x337/0x6f0 [ 14.915748] ? trace_preempt_on+0x20/0xc0 [ 14.915771] ? __pfx_kthread+0x10/0x10 [ 14.915792] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.915813] ? calculate_sigpending+0x7b/0xa0 [ 14.915837] ? __pfx_kthread+0x10/0x10 [ 14.915859] ret_from_fork+0x116/0x1d0 [ 14.915877] ? __pfx_kthread+0x10/0x10 [ 14.915898] ret_from_fork_asm+0x1a/0x30 [ 14.915927] </TASK> [ 14.915939] [ 14.926627] Allocated by task 282: [ 14.927117] kasan_save_stack+0x45/0x70 [ 14.927289] kasan_save_track+0x18/0x40 [ 14.927545] kasan_save_alloc_info+0x3b/0x50 [ 14.927737] __kasan_kmalloc+0xb7/0xc0 [ 14.927913] __kmalloc_cache_noprof+0x189/0x420 [ 14.928487] kasan_atomics+0x95/0x310 [ 14.928674] kunit_try_run_case+0x1a5/0x480 [ 14.928998] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.929248] kthread+0x337/0x6f0 [ 14.929539] ret_from_fork+0x116/0x1d0 [ 14.929694] ret_from_fork_asm+0x1a/0x30 [ 14.929894] [ 14.930110] The buggy address belongs to the object at ffff888103916a00 [ 14.930110] which belongs to the cache kmalloc-64 of size 64 [ 14.930737] The buggy address is located 0 bytes to the right of [ 14.930737] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.931248] [ 14.931590] The buggy address belongs to the physical page: [ 14.931950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.932478] flags: 0x200000000000000(node=0|zone=2) [ 14.932769] page_type: f5(slab) [ 14.932931] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.933376] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.933811] page dumped because: kasan: bad access detected [ 14.934266] [ 14.934366] Memory state around the buggy address: [ 14.934983] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.935408] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.935792] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.936119] ^ [ 14.936486] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.936779] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.937233] ================================================================== [ 15.067552] ================================================================== [ 15.067785] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 15.068019] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282 [ 15.069795] [ 15.069907] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.070063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.070077] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.070099] Call Trace: [ 15.070230] <TASK> [ 15.070253] dump_stack_lvl+0x73/0xb0 [ 15.070286] print_report+0xd1/0x650 [ 15.070310] ? __virt_addr_valid+0x1db/0x2d0 [ 15.070334] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.070356] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.070379] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.070401] kasan_report+0x141/0x180 [ 15.070424] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.070450] kasan_check_range+0x10c/0x1c0 [ 15.070474] __kasan_check_write+0x18/0x20 [ 15.070494] kasan_atomics_helper+0x20c8/0x5450 [ 15.070517] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.070540] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.070566] ? kasan_atomics+0x152/0x310 [ 15.070593] kasan_atomics+0x1dc/0x310 [ 15.070616] ? __pfx_kasan_atomics+0x10/0x10 [ 15.070641] ? __pfx_read_tsc+0x10/0x10 [ 15.070662] ? ktime_get_ts64+0x86/0x230 [ 15.070686] kunit_try_run_case+0x1a5/0x480 [ 15.070711] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.070734] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.070757] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.070780] ? __kthread_parkme+0x82/0x180 [ 15.070802] ? preempt_count_sub+0x50/0x80 [ 15.070825] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.070849] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.070872] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.070896] kthread+0x337/0x6f0 [ 15.070916] ? trace_preempt_on+0x20/0xc0 [ 15.070939] ? __pfx_kthread+0x10/0x10 [ 15.070960] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.070982] ? calculate_sigpending+0x7b/0xa0 [ 15.071007] ? __pfx_kthread+0x10/0x10 [ 15.071042] ret_from_fork+0x116/0x1d0 [ 15.071119] ? __pfx_kthread+0x10/0x10 [ 15.071141] ret_from_fork_asm+0x1a/0x30 [ 15.071172] </TASK> [ 15.071185] [ 15.083661] Allocated by task 282: [ 15.083852] kasan_save_stack+0x45/0x70 [ 15.084254] kasan_save_track+0x18/0x40 [ 15.084417] kasan_save_alloc_info+0x3b/0x50 [ 15.084649] __kasan_kmalloc+0xb7/0xc0 [ 15.084825] __kmalloc_cache_noprof+0x189/0x420 [ 15.085041] kasan_atomics+0x95/0x310 [ 15.085823] kunit_try_run_case+0x1a5/0x480 [ 15.085996] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.086403] kthread+0x337/0x6f0 [ 15.086584] ret_from_fork+0x116/0x1d0 [ 15.086753] ret_from_fork_asm+0x1a/0x30 [ 15.086942] [ 15.087019] The buggy address belongs to the object at ffff888103916a00 [ 15.087019] which belongs to the cache kmalloc-64 of size 64 [ 15.087710] The buggy address is located 0 bytes to the right of [ 15.087710] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 15.088612] [ 15.088696] The buggy address belongs to the physical page: [ 15.088900] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 15.089403] flags: 0x200000000000000(node=0|zone=2) [ 15.089582] page_type: f5(slab) [ 15.089752] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.090125] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.090409] page dumped because: kasan: bad access detected [ 15.090661] [ 15.090738] Memory state around the buggy address: [ 15.090965] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.091315] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.091699] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.091924] ^ [ 15.092161] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.092512] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.092941] ================================================================== [ 13.888534] ================================================================== [ 13.888886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 13.889480] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282 [ 13.889771] [ 13.889883] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.889924] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.889937] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.889972] Call Trace: [ 13.889990] <TASK> [ 13.890004] dump_stack_lvl+0x73/0xb0 [ 13.890115] print_report+0xd1/0x650 [ 13.890162] ? __virt_addr_valid+0x1db/0x2d0 [ 13.890187] ? kasan_atomics_helper+0x4a0/0x5450 [ 13.890209] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.890233] ? kasan_atomics_helper+0x4a0/0x5450 [ 13.890254] kasan_report+0x141/0x180 [ 13.890277] ? kasan_atomics_helper+0x4a0/0x5450 [ 13.890304] kasan_check_range+0x10c/0x1c0 [ 13.890328] __kasan_check_write+0x18/0x20 [ 13.890349] kasan_atomics_helper+0x4a0/0x5450 [ 13.890372] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.890394] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.890420] ? kasan_atomics+0x152/0x310 [ 13.890457] kasan_atomics+0x1dc/0x310 [ 13.890481] ? __pfx_kasan_atomics+0x10/0x10 [ 13.890517] ? __pfx_read_tsc+0x10/0x10 [ 13.890538] ? ktime_get_ts64+0x86/0x230 [ 13.890563] kunit_try_run_case+0x1a5/0x480 [ 13.890588] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.890611] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.890634] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.890657] ? __kthread_parkme+0x82/0x180 [ 13.890678] ? preempt_count_sub+0x50/0x80 [ 13.890701] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.890725] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.890749] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.890773] kthread+0x337/0x6f0 [ 13.890793] ? trace_preempt_on+0x20/0xc0 [ 13.890815] ? __pfx_kthread+0x10/0x10 [ 13.890836] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.890858] ? calculate_sigpending+0x7b/0xa0 [ 13.890882] ? __pfx_kthread+0x10/0x10 [ 13.890903] ret_from_fork+0x116/0x1d0 [ 13.890922] ? __pfx_kthread+0x10/0x10 [ 13.890944] ret_from_fork_asm+0x1a/0x30 [ 13.890974] </TASK> [ 13.890986] [ 13.899485] Allocated by task 282: [ 13.899701] kasan_save_stack+0x45/0x70 [ 13.899920] kasan_save_track+0x18/0x40 [ 13.900338] kasan_save_alloc_info+0x3b/0x50 [ 13.900539] __kasan_kmalloc+0xb7/0xc0 [ 13.900678] __kmalloc_cache_noprof+0x189/0x420 [ 13.900883] kasan_atomics+0x95/0x310 [ 13.901112] kunit_try_run_case+0x1a5/0x480 [ 13.901438] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.901716] kthread+0x337/0x6f0 [ 13.901877] ret_from_fork+0x116/0x1d0 [ 13.902212] ret_from_fork_asm+0x1a/0x30 [ 13.902365] [ 13.902441] The buggy address belongs to the object at ffff888103916a00 [ 13.902441] which belongs to the cache kmalloc-64 of size 64 [ 13.902929] The buggy address is located 0 bytes to the right of [ 13.902929] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 13.903483] [ 13.903574] The buggy address belongs to the physical page: [ 13.903829] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 13.904461] flags: 0x200000000000000(node=0|zone=2) [ 13.904711] page_type: f5(slab) [ 13.904860] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.905242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.905585] page dumped because: kasan: bad access detected [ 13.905811] [ 13.905931] Memory state around the buggy address: [ 13.906230] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.906508] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.906833] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.907246] ^ [ 13.907460] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.907725] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.908197] ================================================================== [ 13.827741] ================================================================== [ 13.828161] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 13.828498] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282 [ 13.828769] [ 13.828875] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.828918] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.828930] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.828962] Call Trace: [ 13.828978] <TASK> [ 13.828994] dump_stack_lvl+0x73/0xb0 [ 13.829041] print_report+0xd1/0x650 [ 13.829080] ? __virt_addr_valid+0x1db/0x2d0 [ 13.829150] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.829175] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.829197] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.829219] kasan_report+0x141/0x180 [ 13.829242] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.829268] __asan_report_store4_noabort+0x1b/0x30 [ 13.829302] kasan_atomics_helper+0x4b6e/0x5450 [ 13.829326] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.829349] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.829387] ? kasan_atomics+0x152/0x310 [ 13.829415] kasan_atomics+0x1dc/0x310 [ 13.829438] ? __pfx_kasan_atomics+0x10/0x10 [ 13.829462] ? __pfx_read_tsc+0x10/0x10 [ 13.829483] ? ktime_get_ts64+0x86/0x230 [ 13.829507] kunit_try_run_case+0x1a5/0x480 [ 13.829532] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.829555] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.829579] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.829601] ? __kthread_parkme+0x82/0x180 [ 13.829633] ? preempt_count_sub+0x50/0x80 [ 13.829657] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.829681] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.829715] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.829739] kthread+0x337/0x6f0 [ 13.829759] ? trace_preempt_on+0x20/0xc0 [ 13.829791] ? __pfx_kthread+0x10/0x10 [ 13.829811] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.829833] ? calculate_sigpending+0x7b/0xa0 [ 13.829868] ? __pfx_kthread+0x10/0x10 [ 13.829889] ret_from_fork+0x116/0x1d0 [ 13.829909] ? __pfx_kthread+0x10/0x10 [ 13.829931] ret_from_fork_asm+0x1a/0x30 [ 13.829970] </TASK> [ 13.829982] [ 13.838775] Allocated by task 282: [ 13.838910] kasan_save_stack+0x45/0x70 [ 13.839428] kasan_save_track+0x18/0x40 [ 13.839627] kasan_save_alloc_info+0x3b/0x50 [ 13.839867] __kasan_kmalloc+0xb7/0xc0 [ 13.840040] __kmalloc_cache_noprof+0x189/0x420 [ 13.840413] kasan_atomics+0x95/0x310 [ 13.840571] kunit_try_run_case+0x1a5/0x480 [ 13.840813] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.841049] kthread+0x337/0x6f0 [ 13.841278] ret_from_fork+0x116/0x1d0 [ 13.841415] ret_from_fork_asm+0x1a/0x30 [ 13.841557] [ 13.841633] The buggy address belongs to the object at ffff888103916a00 [ 13.841633] which belongs to the cache kmalloc-64 of size 64 [ 13.842241] The buggy address is located 0 bytes to the right of [ 13.842241] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 13.843017] [ 13.843111] The buggy address belongs to the physical page: [ 13.843384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 13.843977] flags: 0x200000000000000(node=0|zone=2) [ 13.844184] page_type: f5(slab) [ 13.844306] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.844917] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.845396] page dumped because: kasan: bad access detected [ 13.845655] [ 13.845747] Memory state around the buggy address: [ 13.845966] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.846196] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.846817] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.847197] ^ [ 13.847478] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.847773] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.848017] ================================================================== [ 13.992008] ================================================================== [ 13.992462] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 13.992788] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282 [ 13.993378] [ 13.993512] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.993569] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.993583] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.993605] Call Trace: [ 13.993622] <TASK> [ 13.993638] dump_stack_lvl+0x73/0xb0 [ 13.993667] print_report+0xd1/0x650 [ 13.993691] ? __virt_addr_valid+0x1db/0x2d0 [ 13.993715] ? kasan_atomics_helper+0x72f/0x5450 [ 13.993736] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.993771] ? kasan_atomics_helper+0x72f/0x5450 [ 13.993793] kasan_report+0x141/0x180 [ 13.993816] ? kasan_atomics_helper+0x72f/0x5450 [ 13.993853] kasan_check_range+0x10c/0x1c0 [ 13.993877] __kasan_check_write+0x18/0x20 [ 13.993897] kasan_atomics_helper+0x72f/0x5450 [ 13.993920] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.993943] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.993969] ? kasan_atomics+0x152/0x310 [ 13.993997] kasan_atomics+0x1dc/0x310 [ 13.994019] ? __pfx_kasan_atomics+0x10/0x10 [ 13.994236] ? __pfx_read_tsc+0x10/0x10 [ 13.994260] ? ktime_get_ts64+0x86/0x230 [ 13.994297] kunit_try_run_case+0x1a5/0x480 [ 13.994322] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.994346] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.994369] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.994392] ? __kthread_parkme+0x82/0x180 [ 13.994414] ? preempt_count_sub+0x50/0x80 [ 13.994437] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.994462] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.994486] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.994510] kthread+0x337/0x6f0 [ 13.994530] ? trace_preempt_on+0x20/0xc0 [ 13.994555] ? __pfx_kthread+0x10/0x10 [ 13.994575] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.994597] ? calculate_sigpending+0x7b/0xa0 [ 13.994621] ? __pfx_kthread+0x10/0x10 [ 13.994642] ret_from_fork+0x116/0x1d0 [ 13.994661] ? __pfx_kthread+0x10/0x10 [ 13.994682] ret_from_fork_asm+0x1a/0x30 [ 13.994712] </TASK> [ 13.994724] [ 14.003387] Allocated by task 282: [ 14.003597] kasan_save_stack+0x45/0x70 [ 14.003823] kasan_save_track+0x18/0x40 [ 14.004070] kasan_save_alloc_info+0x3b/0x50 [ 14.004288] __kasan_kmalloc+0xb7/0xc0 [ 14.004467] __kmalloc_cache_noprof+0x189/0x420 [ 14.004692] kasan_atomics+0x95/0x310 [ 14.004954] kunit_try_run_case+0x1a5/0x480 [ 14.005256] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.005496] kthread+0x337/0x6f0 [ 14.005669] ret_from_fork+0x116/0x1d0 [ 14.005856] ret_from_fork_asm+0x1a/0x30 [ 14.006015] [ 14.006296] The buggy address belongs to the object at ffff888103916a00 [ 14.006296] which belongs to the cache kmalloc-64 of size 64 [ 14.006800] The buggy address is located 0 bytes to the right of [ 14.006800] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.007357] [ 14.007440] The buggy address belongs to the physical page: [ 14.007697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.008183] flags: 0x200000000000000(node=0|zone=2) [ 14.008352] page_type: f5(slab) [ 14.008500] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.008871] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.009310] page dumped because: kasan: bad access detected [ 14.009562] [ 14.009654] Memory state around the buggy address: [ 14.009878] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.010411] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.010725] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.010982] ^ [ 14.011157] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.011577] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.011890] ================================================================== [ 14.207139] ================================================================== [ 14.207542] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 14.207791] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.208136] [ 14.208242] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.208284] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.208297] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.208318] Call Trace: [ 14.208334] <TASK> [ 14.208349] dump_stack_lvl+0x73/0xb0 [ 14.208375] print_report+0xd1/0x650 [ 14.208398] ? __virt_addr_valid+0x1db/0x2d0 [ 14.208422] ? kasan_atomics_helper+0xd47/0x5450 [ 14.208445] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.208468] ? kasan_atomics_helper+0xd47/0x5450 [ 14.208490] kasan_report+0x141/0x180 [ 14.208513] ? kasan_atomics_helper+0xd47/0x5450 [ 14.208542] kasan_check_range+0x10c/0x1c0 [ 14.208568] __kasan_check_write+0x18/0x20 [ 14.208590] kasan_atomics_helper+0xd47/0x5450 [ 14.208615] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.208639] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.208665] ? kasan_atomics+0x152/0x310 [ 14.208692] kasan_atomics+0x1dc/0x310 [ 14.208717] ? __pfx_kasan_atomics+0x10/0x10 [ 14.208742] ? __pfx_read_tsc+0x10/0x10 [ 14.208763] ? ktime_get_ts64+0x86/0x230 [ 14.208788] kunit_try_run_case+0x1a5/0x480 [ 14.208814] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.208838] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.208862] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.208885] ? __kthread_parkme+0x82/0x180 [ 14.208906] ? preempt_count_sub+0x50/0x80 [ 14.208930] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.208954] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.208978] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.209002] kthread+0x337/0x6f0 [ 14.209021] ? trace_preempt_on+0x20/0xc0 [ 14.209121] ? __pfx_kthread+0x10/0x10 [ 14.209162] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.209184] ? calculate_sigpending+0x7b/0xa0 [ 14.209209] ? __pfx_kthread+0x10/0x10 [ 14.209231] ret_from_fork+0x116/0x1d0 [ 14.209249] ? __pfx_kthread+0x10/0x10 [ 14.209270] ret_from_fork_asm+0x1a/0x30 [ 14.209301] </TASK> [ 14.209312] [ 14.217396] Allocated by task 282: [ 14.217530] kasan_save_stack+0x45/0x70 [ 14.217713] kasan_save_track+0x18/0x40 [ 14.217907] kasan_save_alloc_info+0x3b/0x50 [ 14.218338] __kasan_kmalloc+0xb7/0xc0 [ 14.218545] __kmalloc_cache_noprof+0x189/0x420 [ 14.218764] kasan_atomics+0x95/0x310 [ 14.218930] kunit_try_run_case+0x1a5/0x480 [ 14.219245] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.219446] kthread+0x337/0x6f0 [ 14.219616] ret_from_fork+0x116/0x1d0 [ 14.219803] ret_from_fork_asm+0x1a/0x30 [ 14.219973] [ 14.220151] The buggy address belongs to the object at ffff888103916a00 [ 14.220151] which belongs to the cache kmalloc-64 of size 64 [ 14.220538] The buggy address is located 0 bytes to the right of [ 14.220538] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.220975] [ 14.221153] The buggy address belongs to the physical page: [ 14.221434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.221785] flags: 0x200000000000000(node=0|zone=2) [ 14.222017] page_type: f5(slab) [ 14.222389] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.222627] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.222880] page dumped because: kasan: bad access detected [ 14.223241] [ 14.223342] Memory state around the buggy address: [ 14.223570] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.223889] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.224305] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.224587] ^ [ 14.224780] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.225112] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.225401] ================================================================== [ 14.341433] ================================================================== [ 14.341770] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 14.342195] Read of size 4 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.342475] [ 14.342588] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.342629] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.342642] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.342664] Call Trace: [ 14.342678] <TASK> [ 14.342694] dump_stack_lvl+0x73/0xb0 [ 14.342721] print_report+0xd1/0x650 [ 14.342745] ? __virt_addr_valid+0x1db/0x2d0 [ 14.342768] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.342789] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.342812] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.342834] kasan_report+0x141/0x180 [ 14.342857] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.342884] __asan_report_load4_noabort+0x18/0x20 [ 14.342908] kasan_atomics_helper+0x4a1c/0x5450 [ 14.342932] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.342955] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.342980] ? kasan_atomics+0x152/0x310 [ 14.343008] kasan_atomics+0x1dc/0x310 [ 14.343045] ? __pfx_kasan_atomics+0x10/0x10 [ 14.343077] ? __pfx_read_tsc+0x10/0x10 [ 14.343099] ? ktime_get_ts64+0x86/0x230 [ 14.343122] kunit_try_run_case+0x1a5/0x480 [ 14.343148] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.343170] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.343194] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.343217] ? __kthread_parkme+0x82/0x180 [ 14.343237] ? preempt_count_sub+0x50/0x80 [ 14.343261] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.343285] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.343309] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.343334] kthread+0x337/0x6f0 [ 14.343354] ? trace_preempt_on+0x20/0xc0 [ 14.343378] ? __pfx_kthread+0x10/0x10 [ 14.343400] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.343421] ? calculate_sigpending+0x7b/0xa0 [ 14.343606] ? __pfx_kthread+0x10/0x10 [ 14.343637] ret_from_fork+0x116/0x1d0 [ 14.343657] ? __pfx_kthread+0x10/0x10 [ 14.343679] ret_from_fork_asm+0x1a/0x30 [ 14.343710] </TASK> [ 14.343721] [ 14.351726] Allocated by task 282: [ 14.351904] kasan_save_stack+0x45/0x70 [ 14.352098] kasan_save_track+0x18/0x40 [ 14.352444] kasan_save_alloc_info+0x3b/0x50 [ 14.352614] __kasan_kmalloc+0xb7/0xc0 [ 14.352749] __kmalloc_cache_noprof+0x189/0x420 [ 14.352985] kasan_atomics+0x95/0x310 [ 14.353333] kunit_try_run_case+0x1a5/0x480 [ 14.353626] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.353807] kthread+0x337/0x6f0 [ 14.353991] ret_from_fork+0x116/0x1d0 [ 14.354204] ret_from_fork_asm+0x1a/0x30 [ 14.354380] [ 14.354454] The buggy address belongs to the object at ffff888103916a00 [ 14.354454] which belongs to the cache kmalloc-64 of size 64 [ 14.354805] The buggy address is located 0 bytes to the right of [ 14.354805] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.355829] [ 14.355902] The buggy address belongs to the physical page: [ 14.356086] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.356334] flags: 0x200000000000000(node=0|zone=2) [ 14.356501] page_type: f5(slab) [ 14.356899] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.357270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.357615] page dumped because: kasan: bad access detected [ 14.357870] [ 14.357967] Memory state around the buggy address: [ 14.358194] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.358510] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.358793] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.359086] ^ [ 14.359299] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.359521] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.359734] ================================================================== [ 14.672594] ================================================================== [ 14.672919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 14.673772] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.674286] [ 14.674546] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.674596] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.674610] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.674632] Call Trace: [ 14.674657] <TASK> [ 14.674673] dump_stack_lvl+0x73/0xb0 [ 14.674704] print_report+0xd1/0x650 [ 14.674728] ? __virt_addr_valid+0x1db/0x2d0 [ 14.674751] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.674773] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.674796] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.674817] kasan_report+0x141/0x180 [ 14.674840] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.674866] kasan_check_range+0x10c/0x1c0 [ 14.674890] __kasan_check_write+0x18/0x20 [ 14.674910] kasan_atomics_helper+0x16e7/0x5450 [ 14.674932] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.674955] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.674981] ? kasan_atomics+0x152/0x310 [ 14.675008] kasan_atomics+0x1dc/0x310 [ 14.675043] ? __pfx_kasan_atomics+0x10/0x10 [ 14.675109] ? __pfx_read_tsc+0x10/0x10 [ 14.675131] ? ktime_get_ts64+0x86/0x230 [ 14.675167] kunit_try_run_case+0x1a5/0x480 [ 14.675192] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.675214] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.675239] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.675262] ? __kthread_parkme+0x82/0x180 [ 14.675283] ? preempt_count_sub+0x50/0x80 [ 14.675307] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.675331] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.675354] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.675378] kthread+0x337/0x6f0 [ 14.675398] ? trace_preempt_on+0x20/0xc0 [ 14.675421] ? __pfx_kthread+0x10/0x10 [ 14.675442] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.675464] ? calculate_sigpending+0x7b/0xa0 [ 14.675488] ? __pfx_kthread+0x10/0x10 [ 14.675510] ret_from_fork+0x116/0x1d0 [ 14.675529] ? __pfx_kthread+0x10/0x10 [ 14.675550] ret_from_fork_asm+0x1a/0x30 [ 14.675581] </TASK> [ 14.675593] [ 14.687881] Allocated by task 282: [ 14.688257] kasan_save_stack+0x45/0x70 [ 14.688498] kasan_save_track+0x18/0x40 [ 14.688687] kasan_save_alloc_info+0x3b/0x50 [ 14.688879] __kasan_kmalloc+0xb7/0xc0 [ 14.689288] __kmalloc_cache_noprof+0x189/0x420 [ 14.689551] kasan_atomics+0x95/0x310 [ 14.689842] kunit_try_run_case+0x1a5/0x480 [ 14.690238] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.690733] kthread+0x337/0x6f0 [ 14.690998] ret_from_fork+0x116/0x1d0 [ 14.691366] ret_from_fork_asm+0x1a/0x30 [ 14.691566] [ 14.691661] The buggy address belongs to the object at ffff888103916a00 [ 14.691661] which belongs to the cache kmalloc-64 of size 64 [ 14.692420] The buggy address is located 0 bytes to the right of [ 14.692420] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.693498] [ 14.693588] The buggy address belongs to the physical page: [ 14.693943] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.694767] flags: 0x200000000000000(node=0|zone=2) [ 14.695080] page_type: f5(slab) [ 14.695477] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.695931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.696558] page dumped because: kasan: bad access detected [ 14.696863] [ 14.696965] Memory state around the buggy address: [ 14.697380] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.697666] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.697959] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.698755] ^ [ 14.699070] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.699715] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.700178] ================================================================== [ 14.700950] ================================================================== [ 14.701567] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 14.701877] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.702399] [ 14.702717] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.702765] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.702779] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.702891] Call Trace: [ 14.702913] <TASK> [ 14.702931] dump_stack_lvl+0x73/0xb0 [ 14.702960] print_report+0xd1/0x650 [ 14.702984] ? __virt_addr_valid+0x1db/0x2d0 [ 14.703007] ? kasan_atomics_helper+0x177f/0x5450 [ 14.703075] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.703101] ? kasan_atomics_helper+0x177f/0x5450 [ 14.703125] kasan_report+0x141/0x180 [ 14.703148] ? kasan_atomics_helper+0x177f/0x5450 [ 14.703173] kasan_check_range+0x10c/0x1c0 [ 14.703197] __kasan_check_write+0x18/0x20 [ 14.703218] kasan_atomics_helper+0x177f/0x5450 [ 14.703240] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.703262] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.703288] ? kasan_atomics+0x152/0x310 [ 14.703316] kasan_atomics+0x1dc/0x310 [ 14.703338] ? __pfx_kasan_atomics+0x10/0x10 [ 14.703362] ? __pfx_read_tsc+0x10/0x10 [ 14.703383] ? ktime_get_ts64+0x86/0x230 [ 14.703407] kunit_try_run_case+0x1a5/0x480 [ 14.703430] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.703453] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.703476] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.703500] ? __kthread_parkme+0x82/0x180 [ 14.703520] ? preempt_count_sub+0x50/0x80 [ 14.703543] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.703567] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.703590] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.703614] kthread+0x337/0x6f0 [ 14.703634] ? trace_preempt_on+0x20/0xc0 [ 14.703657] ? __pfx_kthread+0x10/0x10 [ 14.703679] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.703700] ? calculate_sigpending+0x7b/0xa0 [ 14.703725] ? __pfx_kthread+0x10/0x10 [ 14.703746] ret_from_fork+0x116/0x1d0 [ 14.703764] ? __pfx_kthread+0x10/0x10 [ 14.703786] ret_from_fork_asm+0x1a/0x30 [ 14.703817] </TASK> [ 14.703828] [ 14.717264] Allocated by task 282: [ 14.717562] kasan_save_stack+0x45/0x70 [ 14.717763] kasan_save_track+0x18/0x40 [ 14.717934] kasan_save_alloc_info+0x3b/0x50 [ 14.718327] __kasan_kmalloc+0xb7/0xc0 [ 14.718608] __kmalloc_cache_noprof+0x189/0x420 [ 14.719025] kasan_atomics+0x95/0x310 [ 14.719409] kunit_try_run_case+0x1a5/0x480 [ 14.719610] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.719840] kthread+0x337/0x6f0 [ 14.719997] ret_from_fork+0x116/0x1d0 [ 14.720530] ret_from_fork_asm+0x1a/0x30 [ 14.720802] [ 14.721022] The buggy address belongs to the object at ffff888103916a00 [ 14.721022] which belongs to the cache kmalloc-64 of size 64 [ 14.721963] The buggy address is located 0 bytes to the right of [ 14.721963] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.722894] [ 14.723150] The buggy address belongs to the physical page: [ 14.723577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.724198] flags: 0x200000000000000(node=0|zone=2) [ 14.724421] page_type: f5(slab) [ 14.724589] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.724910] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.725239] page dumped because: kasan: bad access detected [ 14.725467] [ 14.725558] Memory state around the buggy address: [ 14.725763] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.726420] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.726858] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.727772] ^ [ 14.728102] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.728749] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.729199] ================================================================== [ 13.950245] ================================================================== [ 13.950561] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 13.950887] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282 [ 13.951472] [ 13.951589] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.951635] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.951648] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.951669] Call Trace: [ 13.951685] <TASK> [ 13.951700] dump_stack_lvl+0x73/0xb0 [ 13.951730] print_report+0xd1/0x650 [ 13.951754] ? __virt_addr_valid+0x1db/0x2d0 [ 13.951778] ? kasan_atomics_helper+0x5fe/0x5450 [ 13.951802] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.951825] ? kasan_atomics_helper+0x5fe/0x5450 [ 13.951848] kasan_report+0x141/0x180 [ 13.951870] ? kasan_atomics_helper+0x5fe/0x5450 [ 13.951897] kasan_check_range+0x10c/0x1c0 [ 13.951921] __kasan_check_write+0x18/0x20 [ 13.951942] kasan_atomics_helper+0x5fe/0x5450 [ 13.951965] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.951987] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.952013] ? kasan_atomics+0x152/0x310 [ 13.952055] kasan_atomics+0x1dc/0x310 [ 13.952079] ? __pfx_kasan_atomics+0x10/0x10 [ 13.952103] ? __pfx_read_tsc+0x10/0x10 [ 13.952152] ? ktime_get_ts64+0x86/0x230 [ 13.952177] kunit_try_run_case+0x1a5/0x480 [ 13.952212] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.952251] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.952276] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.952299] ? __kthread_parkme+0x82/0x180 [ 13.952319] ? preempt_count_sub+0x50/0x80 [ 13.952344] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.952368] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.952392] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.952418] kthread+0x337/0x6f0 [ 13.952438] ? trace_preempt_on+0x20/0xc0 [ 13.952472] ? __pfx_kthread+0x10/0x10 [ 13.952494] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.952515] ? calculate_sigpending+0x7b/0xa0 [ 13.952553] ? __pfx_kthread+0x10/0x10 [ 13.952574] ret_from_fork+0x116/0x1d0 [ 13.952593] ? __pfx_kthread+0x10/0x10 [ 13.952614] ret_from_fork_asm+0x1a/0x30 [ 13.952645] </TASK> [ 13.952656] [ 13.961055] Allocated by task 282: [ 13.961241] kasan_save_stack+0x45/0x70 [ 13.961404] kasan_save_track+0x18/0x40 [ 13.961809] kasan_save_alloc_info+0x3b/0x50 [ 13.962159] __kasan_kmalloc+0xb7/0xc0 [ 13.962340] __kmalloc_cache_noprof+0x189/0x420 [ 13.962590] kasan_atomics+0x95/0x310 [ 13.962794] kunit_try_run_case+0x1a5/0x480 [ 13.962990] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.963376] kthread+0x337/0x6f0 [ 13.963554] ret_from_fork+0x116/0x1d0 [ 13.963741] ret_from_fork_asm+0x1a/0x30 [ 13.963946] [ 13.964174] The buggy address belongs to the object at ffff888103916a00 [ 13.964174] which belongs to the cache kmalloc-64 of size 64 [ 13.964558] The buggy address is located 0 bytes to the right of [ 13.964558] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 13.965131] [ 13.965227] The buggy address belongs to the physical page: [ 13.965422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 13.965685] flags: 0x200000000000000(node=0|zone=2) [ 13.965919] page_type: f5(slab) [ 13.966355] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.966726] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.967112] page dumped because: kasan: bad access detected [ 13.967394] [ 13.967478] Memory state around the buggy address: [ 13.967713] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.968008] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.968444] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.968758] ^ [ 13.968922] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.969359] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.969661] ================================================================== [ 14.937814] ================================================================== [ 14.938211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 14.938612] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.939285] [ 14.939481] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.939551] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.939565] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.939587] Call Trace: [ 14.939602] <TASK> [ 14.939618] dump_stack_lvl+0x73/0xb0 [ 14.939647] print_report+0xd1/0x650 [ 14.939671] ? __virt_addr_valid+0x1db/0x2d0 [ 14.939694] ? kasan_atomics_helper+0x1e12/0x5450 [ 14.939717] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.939740] ? kasan_atomics_helper+0x1e12/0x5450 [ 14.939762] kasan_report+0x141/0x180 [ 14.939784] ? kasan_atomics_helper+0x1e12/0x5450 [ 14.939812] kasan_check_range+0x10c/0x1c0 [ 14.939836] __kasan_check_write+0x18/0x20 [ 14.939856] kasan_atomics_helper+0x1e12/0x5450 [ 14.939879] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.939902] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.939927] ? kasan_atomics+0x152/0x310 [ 14.939955] kasan_atomics+0x1dc/0x310 [ 14.939978] ? __pfx_kasan_atomics+0x10/0x10 [ 14.940003] ? __pfx_read_tsc+0x10/0x10 [ 14.940025] ? ktime_get_ts64+0x86/0x230 [ 14.940257] kunit_try_run_case+0x1a5/0x480 [ 14.940283] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.940306] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.940330] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.940352] ? __kthread_parkme+0x82/0x180 [ 14.940374] ? preempt_count_sub+0x50/0x80 [ 14.940398] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.940422] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.940446] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.940469] kthread+0x337/0x6f0 [ 14.940488] ? trace_preempt_on+0x20/0xc0 [ 14.940512] ? __pfx_kthread+0x10/0x10 [ 14.940533] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.940554] ? calculate_sigpending+0x7b/0xa0 [ 14.940578] ? __pfx_kthread+0x10/0x10 [ 14.940601] ret_from_fork+0x116/0x1d0 [ 14.940619] ? __pfx_kthread+0x10/0x10 [ 14.940640] ret_from_fork_asm+0x1a/0x30 [ 14.940670] </TASK> [ 14.940682] [ 14.951369] Allocated by task 282: [ 14.951613] kasan_save_stack+0x45/0x70 [ 14.951817] kasan_save_track+0x18/0x40 [ 14.951986] kasan_save_alloc_info+0x3b/0x50 [ 14.952231] __kasan_kmalloc+0xb7/0xc0 [ 14.952778] __kmalloc_cache_noprof+0x189/0x420 [ 14.953064] kasan_atomics+0x95/0x310 [ 14.953346] kunit_try_run_case+0x1a5/0x480 [ 14.953719] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.954023] kthread+0x337/0x6f0 [ 14.954268] ret_from_fork+0x116/0x1d0 [ 14.954654] ret_from_fork_asm+0x1a/0x30 [ 14.954842] [ 14.954917] The buggy address belongs to the object at ffff888103916a00 [ 14.954917] which belongs to the cache kmalloc-64 of size 64 [ 14.955674] The buggy address is located 0 bytes to the right of [ 14.955674] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.956409] [ 14.956672] The buggy address belongs to the physical page: [ 14.956895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.957457] flags: 0x200000000000000(node=0|zone=2) [ 14.957691] page_type: f5(slab) [ 14.957910] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.958383] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.958998] page dumped because: kasan: bad access detected [ 14.959484] [ 14.959588] Memory state around the buggy address: [ 14.959899] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.960176] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.960721] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.961080] ^ [ 14.961326] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.961719] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.962145] ================================================================== [ 14.785379] ================================================================== [ 14.785727] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 14.786111] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.786442] [ 14.786532] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.786573] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.786586] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.786607] Call Trace: [ 14.786620] <TASK> [ 14.786636] dump_stack_lvl+0x73/0xb0 [ 14.786662] print_report+0xd1/0x650 [ 14.786685] ? __virt_addr_valid+0x1db/0x2d0 [ 14.786708] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.786730] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.786753] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.786775] kasan_report+0x141/0x180 [ 14.786797] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.786823] kasan_check_range+0x10c/0x1c0 [ 14.786847] __kasan_check_write+0x18/0x20 [ 14.786866] kasan_atomics_helper+0x19e3/0x5450 [ 14.786889] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.786912] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.786938] ? kasan_atomics+0x152/0x310 [ 14.786965] kasan_atomics+0x1dc/0x310 [ 14.786987] ? __pfx_kasan_atomics+0x10/0x10 [ 14.787013] ? __pfx_read_tsc+0x10/0x10 [ 14.787073] ? ktime_get_ts64+0x86/0x230 [ 14.787098] kunit_try_run_case+0x1a5/0x480 [ 14.787124] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.787162] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.787185] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.787209] ? __kthread_parkme+0x82/0x180 [ 14.787230] ? preempt_count_sub+0x50/0x80 [ 14.787252] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.787276] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.787299] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.787323] kthread+0x337/0x6f0 [ 14.787343] ? trace_preempt_on+0x20/0xc0 [ 14.787366] ? __pfx_kthread+0x10/0x10 [ 14.787387] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.787408] ? calculate_sigpending+0x7b/0xa0 [ 14.787432] ? __pfx_kthread+0x10/0x10 [ 14.787454] ret_from_fork+0x116/0x1d0 [ 14.787472] ? __pfx_kthread+0x10/0x10 [ 14.787493] ret_from_fork_asm+0x1a/0x30 [ 14.787523] </TASK> [ 14.787534] [ 14.794956] Allocated by task 282: [ 14.795222] kasan_save_stack+0x45/0x70 [ 14.795499] kasan_save_track+0x18/0x40 [ 14.795704] kasan_save_alloc_info+0x3b/0x50 [ 14.795897] __kasan_kmalloc+0xb7/0xc0 [ 14.796059] __kmalloc_cache_noprof+0x189/0x420 [ 14.796283] kasan_atomics+0x95/0x310 [ 14.796430] kunit_try_run_case+0x1a5/0x480 [ 14.796639] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.796868] kthread+0x337/0x6f0 [ 14.797010] ret_from_fork+0x116/0x1d0 [ 14.797190] ret_from_fork_asm+0x1a/0x30 [ 14.797390] [ 14.797469] The buggy address belongs to the object at ffff888103916a00 [ 14.797469] which belongs to the cache kmalloc-64 of size 64 [ 14.797930] The buggy address is located 0 bytes to the right of [ 14.797930] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.798465] [ 14.798566] The buggy address belongs to the physical page: [ 14.798799] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.799210] flags: 0x200000000000000(node=0|zone=2) [ 14.799423] page_type: f5(slab) [ 14.799583] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.799874] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.800268] page dumped because: kasan: bad access detected [ 14.800443] [ 14.800514] Memory state around the buggy address: [ 14.800672] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.800890] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.801171] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.801482] ^ [ 14.801701] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.802020] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.802384] ================================================================== [ 14.144467] ================================================================== [ 14.144997] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 14.145407] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.145873] [ 14.145994] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.146052] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.146065] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.146087] Call Trace: [ 14.146104] <TASK> [ 14.146119] dump_stack_lvl+0x73/0xb0 [ 14.146173] print_report+0xd1/0x650 [ 14.146354] ? __virt_addr_valid+0x1db/0x2d0 [ 14.146387] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.146410] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.146433] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.146454] kasan_report+0x141/0x180 [ 14.146477] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.146504] kasan_check_range+0x10c/0x1c0 [ 14.146528] __kasan_check_write+0x18/0x20 [ 14.146547] kasan_atomics_helper+0xb6a/0x5450 [ 14.146570] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.146593] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.146619] ? kasan_atomics+0x152/0x310 [ 14.146647] kasan_atomics+0x1dc/0x310 [ 14.146670] ? __pfx_kasan_atomics+0x10/0x10 [ 14.146694] ? __pfx_read_tsc+0x10/0x10 [ 14.146716] ? ktime_get_ts64+0x86/0x230 [ 14.146740] kunit_try_run_case+0x1a5/0x480 [ 14.146764] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.146787] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.146810] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.146833] ? __kthread_parkme+0x82/0x180 [ 14.146854] ? preempt_count_sub+0x50/0x80 [ 14.146877] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.146901] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.146925] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.146948] kthread+0x337/0x6f0 [ 14.146968] ? trace_preempt_on+0x20/0xc0 [ 14.146990] ? __pfx_kthread+0x10/0x10 [ 14.147012] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.147103] ? calculate_sigpending+0x7b/0xa0 [ 14.147132] ? __pfx_kthread+0x10/0x10 [ 14.147154] ret_from_fork+0x116/0x1d0 [ 14.147172] ? __pfx_kthread+0x10/0x10 [ 14.147193] ret_from_fork_asm+0x1a/0x30 [ 14.147224] </TASK> [ 14.147236] [ 14.154698] Allocated by task 282: [ 14.154840] kasan_save_stack+0x45/0x70 [ 14.154988] kasan_save_track+0x18/0x40 [ 14.155143] kasan_save_alloc_info+0x3b/0x50 [ 14.155338] __kasan_kmalloc+0xb7/0xc0 [ 14.155524] __kmalloc_cache_noprof+0x189/0x420 [ 14.155745] kasan_atomics+0x95/0x310 [ 14.155901] kunit_try_run_case+0x1a5/0x480 [ 14.156057] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.156250] kthread+0x337/0x6f0 [ 14.156385] ret_from_fork+0x116/0x1d0 [ 14.156518] ret_from_fork_asm+0x1a/0x30 [ 14.156661] [ 14.156736] The buggy address belongs to the object at ffff888103916a00 [ 14.156736] which belongs to the cache kmalloc-64 of size 64 [ 14.157101] The buggy address is located 0 bytes to the right of [ 14.157101] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.157452] [ 14.157523] The buggy address belongs to the physical page: [ 14.157689] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.157918] flags: 0x200000000000000(node=0|zone=2) [ 14.158094] page_type: f5(slab) [ 14.158211] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.158745] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.159160] page dumped because: kasan: bad access detected [ 14.159421] [ 14.159515] Memory state around the buggy address: [ 14.159744] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.160167] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.160510] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.160841] ^ [ 14.161138] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.161468] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.161787] ================================================================== [ 14.119044] ================================================================== [ 14.119577] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 14.120090] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.120494] [ 14.120608] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.120652] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.120667] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.120687] Call Trace: [ 14.120703] <TASK> [ 14.120718] dump_stack_lvl+0x73/0xb0 [ 14.120746] print_report+0xd1/0x650 [ 14.120770] ? __virt_addr_valid+0x1db/0x2d0 [ 14.120793] ? kasan_atomics_helper+0xac7/0x5450 [ 14.120815] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.120838] ? kasan_atomics_helper+0xac7/0x5450 [ 14.120859] kasan_report+0x141/0x180 [ 14.120882] ? kasan_atomics_helper+0xac7/0x5450 [ 14.120908] kasan_check_range+0x10c/0x1c0 [ 14.120932] __kasan_check_write+0x18/0x20 [ 14.120951] kasan_atomics_helper+0xac7/0x5450 [ 14.120974] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.120996] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.121022] ? kasan_atomics+0x152/0x310 [ 14.121250] kasan_atomics+0x1dc/0x310 [ 14.121275] ? __pfx_kasan_atomics+0x10/0x10 [ 14.121300] ? __pfx_read_tsc+0x10/0x10 [ 14.121321] ? ktime_get_ts64+0x86/0x230 [ 14.121345] kunit_try_run_case+0x1a5/0x480 [ 14.121370] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.121393] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.121416] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.121439] ? __kthread_parkme+0x82/0x180 [ 14.121460] ? preempt_count_sub+0x50/0x80 [ 14.121483] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.121507] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.121530] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.121554] kthread+0x337/0x6f0 [ 14.121573] ? trace_preempt_on+0x20/0xc0 [ 14.121596] ? __pfx_kthread+0x10/0x10 [ 14.121617] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.121638] ? calculate_sigpending+0x7b/0xa0 [ 14.121662] ? __pfx_kthread+0x10/0x10 [ 14.121684] ret_from_fork+0x116/0x1d0 [ 14.121702] ? __pfx_kthread+0x10/0x10 [ 14.121723] ret_from_fork_asm+0x1a/0x30 [ 14.121753] </TASK> [ 14.121766] [ 14.132912] Allocated by task 282: [ 14.133208] kasan_save_stack+0x45/0x70 [ 14.133410] kasan_save_track+0x18/0x40 [ 14.133597] kasan_save_alloc_info+0x3b/0x50 [ 14.133790] __kasan_kmalloc+0xb7/0xc0 [ 14.133967] __kmalloc_cache_noprof+0x189/0x420 [ 14.134740] kasan_atomics+0x95/0x310 [ 14.134930] kunit_try_run_case+0x1a5/0x480 [ 14.135222] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.135573] kthread+0x337/0x6f0 [ 14.135741] ret_from_fork+0x116/0x1d0 [ 14.136042] ret_from_fork_asm+0x1a/0x30 [ 14.136419] [ 14.136502] The buggy address belongs to the object at ffff888103916a00 [ 14.136502] which belongs to the cache kmalloc-64 of size 64 [ 14.136995] The buggy address is located 0 bytes to the right of [ 14.136995] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.137538] [ 14.137636] The buggy address belongs to the physical page: [ 14.137863] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.138564] flags: 0x200000000000000(node=0|zone=2) [ 14.138741] page_type: f5(slab) [ 14.138914] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.139515] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.139959] page dumped because: kasan: bad access detected [ 14.140354] [ 14.140457] Memory state around the buggy address: [ 14.140663] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.141229] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.141635] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.142023] ^ [ 14.142530] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.142930] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.143516] ================================================================== [ 14.561666] ================================================================== [ 14.561969] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 14.562417] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.562738] [ 14.562843] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.562882] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.562894] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.562915] Call Trace: [ 14.562929] <TASK> [ 14.562944] dump_stack_lvl+0x73/0xb0 [ 14.562972] print_report+0xd1/0x650 [ 14.562995] ? __virt_addr_valid+0x1db/0x2d0 [ 14.563016] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.563049] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.563078] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.563100] kasan_report+0x141/0x180 [ 14.563123] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.563149] __asan_report_store8_noabort+0x1b/0x30 [ 14.563170] kasan_atomics_helper+0x50d4/0x5450 [ 14.563193] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.563215] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.563240] ? kasan_atomics+0x152/0x310 [ 14.563267] kasan_atomics+0x1dc/0x310 [ 14.563291] ? __pfx_kasan_atomics+0x10/0x10 [ 14.563317] ? __pfx_read_tsc+0x10/0x10 [ 14.563338] ? ktime_get_ts64+0x86/0x230 [ 14.563361] kunit_try_run_case+0x1a5/0x480 [ 14.563385] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.563408] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.563431] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.563454] ? __kthread_parkme+0x82/0x180 [ 14.563474] ? preempt_count_sub+0x50/0x80 [ 14.563498] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.563522] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.563545] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.563568] kthread+0x337/0x6f0 [ 14.563588] ? trace_preempt_on+0x20/0xc0 [ 14.563611] ? __pfx_kthread+0x10/0x10 [ 14.563632] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.563653] ? calculate_sigpending+0x7b/0xa0 [ 14.563676] ? __pfx_kthread+0x10/0x10 [ 14.563698] ret_from_fork+0x116/0x1d0 [ 14.563716] ? __pfx_kthread+0x10/0x10 [ 14.563737] ret_from_fork_asm+0x1a/0x30 [ 14.563766] </TASK> [ 14.563778] [ 14.573397] Allocated by task 282: [ 14.573543] kasan_save_stack+0x45/0x70 [ 14.573694] kasan_save_track+0x18/0x40 [ 14.573833] kasan_save_alloc_info+0x3b/0x50 [ 14.573983] __kasan_kmalloc+0xb7/0xc0 [ 14.574756] __kmalloc_cache_noprof+0x189/0x420 [ 14.575207] kasan_atomics+0x95/0x310 [ 14.575675] kunit_try_run_case+0x1a5/0x480 [ 14.576093] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.576579] kthread+0x337/0x6f0 [ 14.576772] ret_from_fork+0x116/0x1d0 [ 14.576962] ret_from_fork_asm+0x1a/0x30 [ 14.577551] [ 14.577664] The buggy address belongs to the object at ffff888103916a00 [ 14.577664] which belongs to the cache kmalloc-64 of size 64 [ 14.578766] The buggy address is located 0 bytes to the right of [ 14.578766] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.579732] [ 14.579841] The buggy address belongs to the physical page: [ 14.580341] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.580802] flags: 0x200000000000000(node=0|zone=2) [ 14.581285] page_type: f5(slab) [ 14.581483] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.581797] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.582344] page dumped because: kasan: bad access detected [ 14.582775] [ 14.582874] Memory state around the buggy address: [ 14.583526] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.583947] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.584754] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.585259] ^ [ 14.585699] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.586207] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.586797] ================================================================== [ 14.839365] ================================================================== [ 14.839716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 14.840095] Write of size 8 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.840549] [ 14.840690] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.840734] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.840747] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.840768] Call Trace: [ 14.840782] <TASK> [ 14.840798] dump_stack_lvl+0x73/0xb0 [ 14.840825] print_report+0xd1/0x650 [ 14.840849] ? __virt_addr_valid+0x1db/0x2d0 [ 14.840871] ? kasan_atomics_helper+0x1c18/0x5450 [ 14.840894] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.840916] ? kasan_atomics_helper+0x1c18/0x5450 [ 14.840938] kasan_report+0x141/0x180 [ 14.840961] ? kasan_atomics_helper+0x1c18/0x5450 [ 14.840987] kasan_check_range+0x10c/0x1c0 [ 14.841011] __kasan_check_write+0x18/0x20 [ 14.841043] kasan_atomics_helper+0x1c18/0x5450 [ 14.841068] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.841091] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.841117] ? kasan_atomics+0x152/0x310 [ 14.841179] kasan_atomics+0x1dc/0x310 [ 14.841202] ? __pfx_kasan_atomics+0x10/0x10 [ 14.841227] ? __pfx_read_tsc+0x10/0x10 [ 14.841249] ? ktime_get_ts64+0x86/0x230 [ 14.841274] kunit_try_run_case+0x1a5/0x480 [ 14.841299] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.841322] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.841345] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.841368] ? __kthread_parkme+0x82/0x180 [ 14.841389] ? preempt_count_sub+0x50/0x80 [ 14.841413] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.841436] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.841459] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.841482] kthread+0x337/0x6f0 [ 14.841502] ? trace_preempt_on+0x20/0xc0 [ 14.841525] ? __pfx_kthread+0x10/0x10 [ 14.841547] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.841568] ? calculate_sigpending+0x7b/0xa0 [ 14.841592] ? __pfx_kthread+0x10/0x10 [ 14.841614] ret_from_fork+0x116/0x1d0 [ 14.841632] ? __pfx_kthread+0x10/0x10 [ 14.841654] ret_from_fork_asm+0x1a/0x30 [ 14.841684] </TASK> [ 14.841695] [ 14.851394] Allocated by task 282: [ 14.851758] kasan_save_stack+0x45/0x70 [ 14.852406] kasan_save_track+0x18/0x40 [ 14.853246] kasan_save_alloc_info+0x3b/0x50 [ 14.853463] __kasan_kmalloc+0xb7/0xc0 [ 14.853811] __kmalloc_cache_noprof+0x189/0x420 [ 14.854150] kasan_atomics+0x95/0x310 [ 14.854327] kunit_try_run_case+0x1a5/0x480 [ 14.854635] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.854878] kthread+0x337/0x6f0 [ 14.855313] ret_from_fork+0x116/0x1d0 [ 14.855508] ret_from_fork_asm+0x1a/0x30 [ 14.855931] [ 14.856123] The buggy address belongs to the object at ffff888103916a00 [ 14.856123] which belongs to the cache kmalloc-64 of size 64 [ 14.856864] The buggy address is located 0 bytes to the right of [ 14.856864] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.857755] [ 14.857851] The buggy address belongs to the physical page: [ 14.858236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.858818] flags: 0x200000000000000(node=0|zone=2) [ 14.859088] page_type: f5(slab) [ 14.859368] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.859970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.860409] page dumped because: kasan: bad access detected [ 14.860723] [ 14.860819] Memory state around the buggy address: [ 14.861019] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.861682] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.862156] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.862427] ^ [ 14.862645] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.863267] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.863711] ================================================================== [ 14.523833] ================================================================== [ 14.524306] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 14.524665] Read of size 8 at addr ffff888103916a30 by task kunit_try_catch/282 [ 14.524976] [ 14.525346] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.525396] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.525409] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.525430] Call Trace: [ 14.525444] <TASK> [ 14.525460] dump_stack_lvl+0x73/0xb0 [ 14.525487] print_report+0xd1/0x650 [ 14.525511] ? __virt_addr_valid+0x1db/0x2d0 [ 14.525534] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.525556] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.525579] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.525601] kasan_report+0x141/0x180 [ 14.525623] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.525650] __asan_report_load8_noabort+0x18/0x20 [ 14.525675] kasan_atomics_helper+0x4eae/0x5450 [ 14.525697] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.525720] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.525746] ? kasan_atomics+0x152/0x310 [ 14.525773] kasan_atomics+0x1dc/0x310 [ 14.525797] ? __pfx_kasan_atomics+0x10/0x10 [ 14.525823] ? __pfx_read_tsc+0x10/0x10 [ 14.525844] ? ktime_get_ts64+0x86/0x230 [ 14.525868] kunit_try_run_case+0x1a5/0x480 [ 14.525891] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.525914] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.525937] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.525960] ? __kthread_parkme+0x82/0x180 [ 14.525982] ? preempt_count_sub+0x50/0x80 [ 14.526005] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.526042] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.526080] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.526103] kthread+0x337/0x6f0 [ 14.526123] ? trace_preempt_on+0x20/0xc0 [ 14.526147] ? __pfx_kthread+0x10/0x10 [ 14.526169] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.526190] ? calculate_sigpending+0x7b/0xa0 [ 14.526215] ? __pfx_kthread+0x10/0x10 [ 14.526237] ret_from_fork+0x116/0x1d0 [ 14.526255] ? __pfx_kthread+0x10/0x10 [ 14.526276] ret_from_fork_asm+0x1a/0x30 [ 14.526308] </TASK> [ 14.526320] [ 14.534087] Allocated by task 282: [ 14.534381] kasan_save_stack+0x45/0x70 [ 14.534585] kasan_save_track+0x18/0x40 [ 14.534776] kasan_save_alloc_info+0x3b/0x50 [ 14.534992] __kasan_kmalloc+0xb7/0xc0 [ 14.535260] __kmalloc_cache_noprof+0x189/0x420 [ 14.535468] kasan_atomics+0x95/0x310 [ 14.535605] kunit_try_run_case+0x1a5/0x480 [ 14.535752] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.535926] kthread+0x337/0x6f0 [ 14.536114] ret_from_fork+0x116/0x1d0 [ 14.536312] ret_from_fork_asm+0x1a/0x30 [ 14.536544] [ 14.536646] The buggy address belongs to the object at ffff888103916a00 [ 14.536646] which belongs to the cache kmalloc-64 of size 64 [ 14.537321] The buggy address is located 0 bytes to the right of [ 14.537321] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 14.538404] [ 14.538478] The buggy address belongs to the physical page: [ 14.538651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 14.538889] flags: 0x200000000000000(node=0|zone=2) [ 14.539065] page_type: f5(slab) [ 14.539233] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.539704] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.540048] page dumped because: kasan: bad access detected [ 14.540269] [ 14.540341] Memory state around the buggy address: [ 14.540495] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.540711] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.540944] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.541277] ^ [ 14.541521] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.541861] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.542360] ================================================================== [ 13.782593] ================================================================== [ 13.783338] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 13.783680] Write of size 4 at addr ffff888103916a30 by task kunit_try_catch/282 [ 13.783906] [ 13.783993] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.784095] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.784112] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.784131] Call Trace: [ 13.784163] <TASK> [ 13.784177] dump_stack_lvl+0x73/0xb0 [ 13.784206] print_report+0xd1/0x650 [ 13.784240] ? __virt_addr_valid+0x1db/0x2d0 [ 13.784263] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.784283] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.784305] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.784325] kasan_report+0x141/0x180 [ 13.784355] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.784380] __asan_report_store4_noabort+0x1b/0x30 [ 13.784400] kasan_atomics_helper+0x4ba2/0x5450 [ 13.784432] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.784454] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.784479] ? kasan_atomics+0x152/0x310 [ 13.784514] kasan_atomics+0x1dc/0x310 [ 13.784536] ? __pfx_kasan_atomics+0x10/0x10 [ 13.784559] ? __pfx_read_tsc+0x10/0x10 [ 13.784590] ? ktime_get_ts64+0x86/0x230 [ 13.784613] kunit_try_run_case+0x1a5/0x480 [ 13.784636] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.784657] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.784680] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.784702] ? __kthread_parkme+0x82/0x180 [ 13.784721] ? preempt_count_sub+0x50/0x80 [ 13.784743] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.784766] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.784787] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.784810] kthread+0x337/0x6f0 [ 13.784839] ? trace_preempt_on+0x20/0xc0 [ 13.784861] ? __pfx_kthread+0x10/0x10 [ 13.784880] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.784911] ? calculate_sigpending+0x7b/0xa0 [ 13.784934] ? __pfx_kthread+0x10/0x10 [ 13.784955] ret_from_fork+0x116/0x1d0 [ 13.784972] ? __pfx_kthread+0x10/0x10 [ 13.784992] ret_from_fork_asm+0x1a/0x30 [ 13.785021] </TASK> [ 13.785041] [ 13.797409] Allocated by task 282: [ 13.797773] kasan_save_stack+0x45/0x70 [ 13.797992] kasan_save_track+0x18/0x40 [ 13.798300] kasan_save_alloc_info+0x3b/0x50 [ 13.798494] __kasan_kmalloc+0xb7/0xc0 [ 13.798626] __kmalloc_cache_noprof+0x189/0x420 [ 13.799124] kasan_atomics+0x95/0x310 [ 13.799310] kunit_try_run_case+0x1a5/0x480 [ 13.799459] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.799740] kthread+0x337/0x6f0 [ 13.799908] ret_from_fork+0x116/0x1d0 [ 13.800165] ret_from_fork_asm+0x1a/0x30 [ 13.800314] [ 13.800389] The buggy address belongs to the object at ffff888103916a00 [ 13.800389] which belongs to the cache kmalloc-64 of size 64 [ 13.800928] The buggy address is located 0 bytes to the right of [ 13.800928] allocated 48-byte region [ffff888103916a00, ffff888103916a30) [ 13.801504] [ 13.801604] The buggy address belongs to the physical page: [ 13.801841] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103916 [ 13.802316] flags: 0x200000000000000(node=0|zone=2) [ 13.802584] page_type: f5(slab) [ 13.802738] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.803132] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.803430] page dumped because: kasan: bad access detected [ 13.803655] [ 13.803757] Memory state around the buggy address: [ 13.803996] ffff888103916900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.804309] ffff888103916980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.804665] >ffff888103916a00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.804971] ^ [ 13.805305] ffff888103916a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.805626] ffff888103916b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.805935] ==================================================================