Date
July 1, 2025, 3:08 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.731660] ================================================================== [ 19.731837] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 19.731921] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.731978] [ 19.732164] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.732352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.732386] Hardware name: linux,dummy-virt (DT) [ 19.732420] Call trace: [ 19.732467] show_stack+0x20/0x38 (C) [ 19.732585] dump_stack_lvl+0x8c/0xd0 [ 19.732634] print_report+0x118/0x608 [ 19.732682] kasan_report+0xdc/0x128 [ 19.732727] kasan_check_range+0x100/0x1a8 [ 19.732782] __kasan_check_write+0x20/0x30 [ 19.732829] kasan_atomics_helper+0xeb8/0x4858 [ 19.732877] kasan_atomics+0x198/0x2e0 [ 19.732924] kunit_try_run_case+0x170/0x3f0 [ 19.732972] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.733027] kthread+0x328/0x630 [ 19.733070] ret_from_fork+0x10/0x20 [ 19.733119] [ 19.733158] Allocated by task 266: [ 19.733193] kasan_save_stack+0x3c/0x68 [ 19.733239] kasan_save_track+0x20/0x40 [ 19.733285] kasan_save_alloc_info+0x40/0x58 [ 19.733337] __kasan_kmalloc+0xd4/0xd8 [ 19.733979] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.734143] kasan_atomics+0xb8/0x2e0 [ 19.734240] kunit_try_run_case+0x170/0x3f0 [ 19.734304] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.734351] kthread+0x328/0x630 [ 19.734392] ret_from_fork+0x10/0x20 [ 19.734430] [ 19.734452] The buggy address belongs to the object at fff00000c57aa700 [ 19.734452] which belongs to the cache kmalloc-64 of size 64 [ 19.734514] The buggy address is located 0 bytes to the right of [ 19.734514] allocated 48-byte region [fff00000c57aa700, fff00000c57aa730) [ 19.735078] [ 19.735194] The buggy address belongs to the physical page: [ 19.735288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.735396] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.735457] page_type: f5(slab) [ 19.735497] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.735845] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.735929] page dumped because: kasan: bad access detected [ 19.735977] [ 19.736028] Memory state around the buggy address: [ 19.736383] fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.736581] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.736741] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.736843] ^ [ 19.736895] fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.737195] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.737267] ================================================================== [ 19.754954] ================================================================== [ 19.755011] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 19.755063] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.755114] [ 19.755147] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.755232] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.755261] Hardware name: linux,dummy-virt (DT) [ 19.755302] Call trace: [ 19.755327] show_stack+0x20/0x38 (C) [ 19.755388] dump_stack_lvl+0x8c/0xd0 [ 19.755439] print_report+0x118/0x608 [ 19.755485] kasan_report+0xdc/0x128 [ 19.755540] kasan_check_range+0x100/0x1a8 [ 19.755612] __kasan_check_write+0x20/0x30 [ 19.755659] kasan_atomics_helper+0xff0/0x4858 [ 19.755709] kasan_atomics+0x198/0x2e0 [ 19.755754] kunit_try_run_case+0x170/0x3f0 [ 19.755802] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.755855] kthread+0x328/0x630 [ 19.755898] ret_from_fork+0x10/0x20 [ 19.755945] [ 19.755967] Allocated by task 266: [ 19.755995] kasan_save_stack+0x3c/0x68 [ 19.756037] kasan_save_track+0x20/0x40 [ 19.756077] kasan_save_alloc_info+0x40/0x58 [ 19.756117] __kasan_kmalloc+0xd4/0xd8 [ 19.756157] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.756209] kasan_atomics+0xb8/0x2e0 [ 19.756247] kunit_try_run_case+0x170/0x3f0 [ 19.756286] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.756332] kthread+0x328/0x630 [ 19.756382] ret_from_fork+0x10/0x20 [ 19.756426] [ 19.756448] The buggy address belongs to the object at fff00000c57aa700 [ 19.756448] which belongs to the cache kmalloc-64 of size 64 [ 19.756508] The buggy address is located 0 bytes to the right of [ 19.756508] allocated 48-byte region [fff00000c57aa700, fff00000c57aa730) [ 19.757125] [ 19.757196] The buggy address belongs to the physical page: [ 19.757234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.757299] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.758099] page_type: f5(slab) [ 19.758177] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.758422] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.758534] page dumped because: kasan: bad access detected [ 19.758893] [ 19.758949] Memory state around the buggy address: [ 19.759009] fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.759079] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.759359] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.759588] ^ [ 19.759901] fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.760072] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.760196] ================================================================== [ 19.946740] ================================================================== [ 19.946941] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 19.947014] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.947136] [ 19.947263] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.947660] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.947693] Hardware name: linux,dummy-virt (DT) [ 19.947924] Call trace: [ 19.947948] show_stack+0x20/0x38 (C) [ 19.947999] dump_stack_lvl+0x8c/0xd0 [ 19.948047] print_report+0x118/0x608 [ 19.948093] kasan_report+0xdc/0x128 [ 19.948141] kasan_check_range+0x100/0x1a8 [ 19.948190] __kasan_check_write+0x20/0x30 [ 19.948235] kasan_atomics_helper+0x175c/0x4858 [ 19.948284] kasan_atomics+0x198/0x2e0 [ 19.948329] kunit_try_run_case+0x170/0x3f0 [ 19.948378] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.948431] kthread+0x328/0x630 [ 19.948473] ret_from_fork+0x10/0x20 [ 19.948521] [ 19.948541] Allocated by task 266: [ 19.948580] kasan_save_stack+0x3c/0x68 [ 19.949093] kasan_save_track+0x20/0x40 [ 19.949151] kasan_save_alloc_info+0x40/0x58 [ 19.949813] __kasan_kmalloc+0xd4/0xd8 [ 19.950238] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.950495] kasan_atomics+0xb8/0x2e0 [ 19.950823] kunit_try_run_case+0x170/0x3f0 [ 19.950882] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.950929] kthread+0x328/0x630 [ 19.951081] ret_from_fork+0x10/0x20 [ 19.951311] [ 19.951442] The buggy address belongs to the object at fff00000c57aa700 [ 19.951442] which belongs to the cache kmalloc-64 of size 64 [ 19.951796] The buggy address is located 0 bytes to the right of [ 19.951796] allocated 48-byte region [fff00000c57aa700, fff00000c57aa730) [ 19.951868] [ 19.951891] The buggy address belongs to the physical page: [ 19.951924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.951979] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.952029] page_type: f5(slab) [ 19.952539] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.952630] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.953010] page dumped because: kasan: bad access detected [ 19.953162] [ 19.953364] Memory state around the buggy address: [ 19.953420] fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.953470] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.953583] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.953645] ^ [ 19.953742] fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.953946] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.954083] ================================================================== [ 19.602499] ================================================================== [ 19.602560] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 19.602628] Write of size 4 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.602681] [ 19.602730] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.602852] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.603359] Hardware name: linux,dummy-virt (DT) [ 19.603553] Call trace: [ 19.603727] show_stack+0x20/0x38 (C) [ 19.603937] dump_stack_lvl+0x8c/0xd0 [ 19.604212] print_report+0x118/0x608 [ 19.604263] kasan_report+0xdc/0x128 [ 19.604310] kasan_check_range+0x100/0x1a8 [ 19.604361] __kasan_check_write+0x20/0x30 [ 19.605006] kasan_atomics_helper+0xad4/0x4858 [ 19.605347] kasan_atomics+0x198/0x2e0 [ 19.605434] kunit_try_run_case+0x170/0x3f0 [ 19.605485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.605540] kthread+0x328/0x630 [ 19.605934] ret_from_fork+0x10/0x20 [ 19.605989] [ 19.606010] Allocated by task 266: [ 19.606298] kasan_save_stack+0x3c/0x68 [ 19.606435] kasan_save_track+0x20/0x40 [ 19.606590] kasan_save_alloc_info+0x40/0x58 [ 19.606634] __kasan_kmalloc+0xd4/0xd8 [ 19.606673] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.606726] kasan_atomics+0xb8/0x2e0 [ 19.606924] kunit_try_run_case+0x170/0x3f0 [ 19.606965] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.607011] kthread+0x328/0x630 [ 19.607084] ret_from_fork+0x10/0x20 [ 19.608588] [ 19.609022] The buggy address belongs to the object at fff00000c57aa700 [ 19.609022] which belongs to the cache kmalloc-64 of size 64 [ 19.609351] The buggy address is located 0 bytes to the right of [ 19.609351] allocated 48-byte region [fff00000c57aa700, fff00000c57aa730) [ 19.609423] [ 19.609556] The buggy address belongs to the physical page: [ 19.609642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.611573] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.611645] page_type: f5(slab) [ 19.611689] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.611742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.611786] page dumped because: kasan: bad access detected [ 19.611821] [ 19.611842] Memory state around the buggy address: [ 19.611879] fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.611925] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.611970] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.612012] ^ [ 19.612046] fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.612091] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.612132] ================================================================== [ 19.667089] ================================================================== [ 19.667166] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 19.667220] Write of size 4 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.667279] [ 19.667312] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.667397] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.667425] Hardware name: linux,dummy-virt (DT) [ 19.667459] Call trace: [ 19.667482] show_stack+0x20/0x38 (C) [ 19.667532] dump_stack_lvl+0x8c/0xd0 [ 19.667591] print_report+0x118/0x608 [ 19.667639] kasan_report+0xdc/0x128 [ 19.667684] kasan_check_range+0x100/0x1a8 [ 19.667735] __kasan_check_write+0x20/0x30 [ 19.667780] kasan_atomics_helper+0xd3c/0x4858 [ 19.667828] kasan_atomics+0x198/0x2e0 [ 19.667874] kunit_try_run_case+0x170/0x3f0 [ 19.667922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.667977] kthread+0x328/0x630 [ 19.668020] ret_from_fork+0x10/0x20 [ 19.668069] [ 19.668089] Allocated by task 266: [ 19.668119] kasan_save_stack+0x3c/0x68 [ 19.668162] kasan_save_track+0x20/0x40 [ 19.668202] kasan_save_alloc_info+0x40/0x58 [ 19.668244] __kasan_kmalloc+0xd4/0xd8 [ 19.668283] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.668325] kasan_atomics+0xb8/0x2e0 [ 19.668361] kunit_try_run_case+0x170/0x3f0 [ 19.668401] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.668447] kthread+0x328/0x630 [ 19.669047] ret_from_fork+0x10/0x20 [ 19.669796] [ 19.669824] The buggy address belongs to the object at fff00000c57aa700 [ 19.669824] which belongs to the cache kmalloc-64 of size 64 [ 19.669889] The buggy address is located 0 bytes to the right of [ 19.669889] allocated 48-byte region [fff00000c57aa700, fff00000c57aa730) [ 19.670512] [ 19.670552] The buggy address belongs to the physical page: [ 19.670687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.670979] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.671260] page_type: f5(slab) [ 19.671305] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.671826] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.672176] page dumped because: kasan: bad access detected [ 19.672516] [ 19.672785] Memory state around the buggy address: [ 19.672980] fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.673235] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.673532] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.673628] ^ [ 19.673849] fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.673899] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.673943] ================================================================== [ 19.954383] ================================================================== [ 19.954600] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 19.954653] Read of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.954705] [ 19.954736] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.954819] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.954849] Hardware name: linux,dummy-virt (DT) [ 19.955441] Call trace: [ 19.955738] show_stack+0x20/0x38 (C) [ 19.955792] dump_stack_lvl+0x8c/0xd0 [ 19.956029] print_report+0x118/0x608 [ 19.956359] kasan_report+0xdc/0x128 [ 19.956716] __asan_report_load8_noabort+0x20/0x30 [ 19.956972] kasan_atomics_helper+0x3e20/0x4858 [ 19.957350] kasan_atomics+0x198/0x2e0 [ 19.957640] kunit_try_run_case+0x170/0x3f0 [ 19.957707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.957863] kthread+0x328/0x630 [ 19.957931] ret_from_fork+0x10/0x20 [ 19.958121] [ 19.958350] Allocated by task 266: [ 19.958545] kasan_save_stack+0x3c/0x68 [ 19.958606] kasan_save_track+0x20/0x40 [ 19.959057] kasan_save_alloc_info+0x40/0x58 [ 19.959355] __kasan_kmalloc+0xd4/0xd8 [ 19.959395] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.959438] kasan_atomics+0xb8/0x2e0 [ 19.959474] kunit_try_run_case+0x170/0x3f0 [ 19.959515] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.959666] kthread+0x328/0x630 [ 19.959710] ret_from_fork+0x10/0x20 [ 19.959762] [ 19.959785] The buggy address belongs to the object at fff00000c57aa700 [ 19.959785] which belongs to the cache kmalloc-64 of size 64 [ 19.959941] The buggy address is located 0 bytes to the right of [ 19.959941] allocated 48-byte region [fff00000c57aa700, fff00000c57aa730) [ 19.960059] [ 19.960266] The buggy address belongs to the physical page: [ 19.960317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.960387] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.960446] page_type: f5(slab) [ 19.960534] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.960942] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.961078] page dumped because: kasan: bad access detected [ 19.961118] [ 19.961293] Memory state around the buggy address: [ 19.961495] fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.961788] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.961859] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.961927] ^ [ 19.962009] fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.962611] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.962685] ================================================================== [ 19.924721] ================================================================== [ 19.924777] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 19.924828] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.924879] [ 19.924911] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.925497] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.925540] Hardware name: linux,dummy-virt (DT) [ 19.925592] Call trace: [ 19.925616] show_stack+0x20/0x38 (C) [ 19.926020] dump_stack_lvl+0x8c/0xd0 [ 19.926486] print_report+0x118/0x608 [ 19.926636] kasan_report+0xdc/0x128 [ 19.926794] kasan_check_range+0x100/0x1a8 [ 19.926976] __kasan_check_write+0x20/0x30 [ 19.927264] kasan_atomics_helper+0x16d0/0x4858 [ 19.927536] kasan_atomics+0x198/0x2e0 [ 19.927597] kunit_try_run_case+0x170/0x3f0 [ 19.928043] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.928102] kthread+0x328/0x630 [ 19.928145] ret_from_fork+0x10/0x20 [ 19.928844] [ 19.929014] Allocated by task 266: [ 19.929054] kasan_save_stack+0x3c/0x68 [ 19.929237] kasan_save_track+0x20/0x40 [ 19.929455] kasan_save_alloc_info+0x40/0x58 [ 19.929510] __kasan_kmalloc+0xd4/0xd8 [ 19.929819] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.930051] kasan_atomics+0xb8/0x2e0 [ 19.930244] kunit_try_run_case+0x170/0x3f0 [ 19.930286] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.930596] kthread+0x328/0x630 [ 19.931026] ret_from_fork+0x10/0x20 [ 19.931141] [ 19.931323] The buggy address belongs to the object at fff00000c57aa700 [ 19.931323] which belongs to the cache kmalloc-64 of size 64 [ 19.931389] The buggy address is located 0 bytes to the right of [ 19.931389] allocated 48-byte region [fff00000c57aa700, fff00000c57aa730) [ 19.931636] [ 19.931676] The buggy address belongs to the physical page: [ 19.931710] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.933394] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.933451] page_type: f5(slab) [ 19.933491] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.933545] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.933732] page dumped because: kasan: bad access detected [ 19.934201] [ 19.934229] Memory state around the buggy address: [ 19.934266] fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.934322] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.934370] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.934516] ^ [ 19.934560] fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.934619] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.935018] ================================================================== [ 19.885550] ================================================================== [ 19.885615] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 19.885787] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.886122] [ 19.886171] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.886292] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.886370] Hardware name: linux,dummy-virt (DT) [ 19.886665] Call trace: [ 19.886695] show_stack+0x20/0x38 (C) [ 19.886953] dump_stack_lvl+0x8c/0xd0 [ 19.887003] print_report+0x118/0x608 [ 19.887049] kasan_report+0xdc/0x128 [ 19.887096] kasan_check_range+0x100/0x1a8 [ 19.887144] __kasan_check_write+0x20/0x30 [ 19.887192] kasan_atomics_helper+0x15b4/0x4858 [ 19.887732] kasan_atomics+0x198/0x2e0 [ 19.887970] kunit_try_run_case+0x170/0x3f0 [ 19.888095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.888154] kthread+0x328/0x630 [ 19.888366] ret_from_fork+0x10/0x20 [ 19.888502] [ 19.888524] Allocated by task 266: [ 19.888552] kasan_save_stack+0x3c/0x68 [ 19.888608] kasan_save_track+0x20/0x40 [ 19.888826] kasan_save_alloc_info+0x40/0x58 [ 19.888885] __kasan_kmalloc+0xd4/0xd8 [ 19.888938] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.889771] kasan_atomics+0xb8/0x2e0 [ 19.889854] kunit_try_run_case+0x170/0x3f0 [ 19.889897] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.889941] kthread+0x328/0x630 [ 19.889975] ret_from_fork+0x10/0x20 [ 19.890013] [ 19.890037] The buggy address belongs to the object at fff00000c57aa700 [ 19.890037] which belongs to the cache kmalloc-64 of size 64 [ 19.890509] The buggy address is located 0 bytes to the right of [ 19.890509] allocated 48-byte region [fff00000c57aa700, fff00000c57aa730) [ 19.890857] [ 19.890883] The buggy address belongs to the physical page: [ 19.890976] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.891397] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.891676] page_type: f5(slab) [ 19.891795] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.891916] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.892150] page dumped because: kasan: bad access detected [ 19.892191] [ 19.892375] Memory state around the buggy address: [ 19.892449] fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.892710] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.892918] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.893116] ^ [ 19.893296] fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.893370] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.893658] ================================================================== [ 19.704480] ================================================================== [ 19.704545] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 19.704949] Read of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.705003] [ 19.705041] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.705124] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.706002] Hardware name: linux,dummy-virt (DT) [ 19.706049] Call trace: [ 19.706076] show_stack+0x20/0x38 (C) [ 19.707221] dump_stack_lvl+0x8c/0xd0 [ 19.707282] print_report+0x118/0x608 [ 19.707331] kasan_report+0xdc/0x128 [ 19.707380] __asan_report_load8_noabort+0x20/0x30 [ 19.707429] kasan_atomics_helper+0x3f58/0x4858 [ 19.707480] kasan_atomics+0x198/0x2e0 [ 19.707526] kunit_try_run_case+0x170/0x3f0 [ 19.707586] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.707641] kthread+0x328/0x630 [ 19.707684] ret_from_fork+0x10/0x20 [ 19.707734] [ 19.707755] Allocated by task 266: [ 19.707786] kasan_save_stack+0x3c/0x68 [ 19.707829] kasan_save_track+0x20/0x40 [ 19.707869] kasan_save_alloc_info+0x40/0x58 [ 19.707912] __kasan_kmalloc+0xd4/0xd8 [ 19.707950] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.707992] kasan_atomics+0xb8/0x2e0 [ 19.708046] kunit_try_run_case+0x170/0x3f0 [ 19.708087] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.708149] kthread+0x328/0x630 [ 19.708193] ret_from_fork+0x10/0x20 [ 19.708240] [ 19.708295] The buggy address belongs to the object at fff00000c57aa700 [ 19.708295] which belongs to the cache kmalloc-64 of size 64 [ 19.708360] The buggy address is located 0 bytes to the right of [ 19.708360] allocated 48-byte region [fff00000c57aa700, fff00000c57aa730) [ 19.708431] [ 19.708486] The buggy address belongs to the physical page: [ 19.708577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.708831] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.708903] page_type: f5(slab) [ 19.709351] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.709661] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.709718] page dumped because: kasan: bad access detected [ 19.709751] [ 19.709770] Memory state around the buggy address: [ 19.709815] fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.709863] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.709910] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.710105] ^ [ 19.710145] fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.710322] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.710470] ================================================================== [ 19.815090] ================================================================== [ 19.815164] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 19.815563] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.815629] [ 19.815663] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.815957] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.816018] Hardware name: linux,dummy-virt (DT) [ 19.816346] Call trace: [ 19.816374] show_stack+0x20/0x38 (C) [ 19.816425] dump_stack_lvl+0x8c/0xd0 [ 19.816476] print_report+0x118/0x608 [ 19.816524] kasan_report+0xdc/0x128 [ 19.816579] kasan_check_range+0x100/0x1a8 [ 19.817052] __kasan_check_write+0x20/0x30 [ 19.817138] kasan_atomics_helper+0x12d8/0x4858 [ 19.817655] kasan_atomics+0x198/0x2e0 [ 19.817711] kunit_try_run_case+0x170/0x3f0 [ 19.817779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.817834] kthread+0x328/0x630 [ 19.817876] ret_from_fork+0x10/0x20 [ 19.818425] [ 19.818593] Allocated by task 266: [ 19.818824] kasan_save_stack+0x3c/0x68 [ 19.818887] kasan_save_track+0x20/0x40 [ 19.819023] kasan_save_alloc_info+0x40/0x58 [ 19.819071] __kasan_kmalloc+0xd4/0xd8 [ 19.819460] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.819652] kasan_atomics+0xb8/0x2e0 [ 19.820154] kunit_try_run_case+0x170/0x3f0 [ 19.820210] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.820373] kthread+0x328/0x630 [ 19.820723] ret_from_fork+0x10/0x20 [ 19.821096] [ 19.821151] The buggy address belongs to the object at fff00000c57aa700 [ 19.821151] which belongs to the cache kmalloc-64 of size 64 [ 19.821378] The buggy address is located 0 bytes to the right of [ 19.821378] allocated 48-byte region [fff00000c57aa700, fff00000c57aa730) [ 19.821448] [ 19.821471] The buggy address belongs to the physical page: [ 19.821505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.821923] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.821982] page_type: f5(slab) [ 19.822155] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.822216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.822262] page dumped because: kasan: bad access detected [ 19.822296] [ 19.822317] Memory state around the buggy address: [ 19.822352] fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.822398] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.822877] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.823137] ^ [ 19.823185] fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.823267] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.823384] ================================================================== [ 19.789767] ================================================================== [ 19.789822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 19.789873] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.789924] [ 19.789955] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.790040] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.790067] Hardware name: linux,dummy-virt (DT) [ 19.790112] Call trace: [ 19.790242] show_stack+0x20/0x38 (C) [ 19.790292] dump_stack_lvl+0x8c/0xd0 [ 19.790346] print_report+0x118/0x608 [ 19.790577] kasan_report+0xdc/0x128 [ 19.790695] kasan_check_range+0x100/0x1a8 [ 19.790837] __kasan_check_write+0x20/0x30 [ 19.790885] kasan_atomics_helper+0x1190/0x4858 [ 19.790997] kasan_atomics+0x198/0x2e0 [ 19.791045] kunit_try_run_case+0x170/0x3f0 [ 19.791094] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.791156] kthread+0x328/0x630 [ 19.791343] ret_from_fork+0x10/0x20 [ 19.791551] [ 19.791591] Allocated by task 266: [ 19.791619] kasan_save_stack+0x3c/0x68 [ 19.791663] kasan_save_track+0x20/0x40 [ 19.791752] kasan_save_alloc_info+0x40/0x58 [ 19.791833] __kasan_kmalloc+0xd4/0xd8 [ 19.791926] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.792030] kasan_atomics+0xb8/0x2e0 [ 19.792078] kunit_try_run_case+0x170/0x3f0 [ 19.792119] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.792164] kthread+0x328/0x630 [ 19.792199] ret_from_fork+0x10/0x20 [ 19.792235] [ 19.792255] The buggy address belongs to the object at fff00000c57aa700 [ 19.792255] which belongs to the cache kmalloc-64 of size 64 [ 19.792317] The buggy address is located 0 bytes to the right of [ 19.792317] allocated 48-byte region [fff00000c57aa700, fff00000c57aa730) [ 19.792385] [ 19.792464] The buggy address belongs to the physical page: [ 19.792499] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.792553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.792612] page_type: f5(slab) [ 19.792661] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.792715] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.792912] page dumped because: kasan: bad access detected [ 19.792960] [ 19.792981] Memory state around the buggy address: [ 19.793017] fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.793128] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.793284] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.793326] ^ [ 19.793363] fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.793512] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.793586] ================================================================== [ 19.778905] ================================================================== [ 19.778961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 19.779011] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.779065] [ 19.779095] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.779179] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.779208] Hardware name: linux,dummy-virt (DT) [ 19.779241] Call trace: [ 19.779265] show_stack+0x20/0x38 (C) [ 19.779313] dump_stack_lvl+0x8c/0xd0 [ 19.779361] print_report+0x118/0x608 [ 19.779408] kasan_report+0xdc/0x128 [ 19.779455] kasan_check_range+0x100/0x1a8 [ 19.779504] __kasan_check_write+0x20/0x30 [ 19.779549] kasan_atomics_helper+0x1128/0x4858 [ 19.779616] kasan_atomics+0x198/0x2e0 [ 19.779662] kunit_try_run_case+0x170/0x3f0 [ 19.779710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.779765] kthread+0x328/0x630 [ 19.779841] ret_from_fork+0x10/0x20 [ 19.779893] [ 19.779913] Allocated by task 266: [ 19.781501] kasan_save_stack+0x3c/0x68 [ 19.782063] kasan_save_track+0x20/0x40 [ 19.782581] kasan_save_alloc_info+0x40/0x58 [ 19.782658] __kasan_kmalloc+0xd4/0xd8 [ 19.782700] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.782741] kasan_atomics+0xb8/0x2e0 [ 19.782780] kunit_try_run_case+0x170/0x3f0 [ 19.782822] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.784353] kthread+0x328/0x630 [ 19.784414] ret_from_fork+0x10/0x20 [ 19.784454] [ 19.785107] The buggy address belongs to the object at fff00000c57aa700 [ 19.785107] which belongs to the cache kmalloc-64 of size 64 [ 19.785186] The buggy address is located 0 bytes to the right of [ 19.785186] allocated 48-byte region [fff00000c57aa700, fff00000c57aa730) [ 19.785256] [ 19.785285] The buggy address belongs to the physical page: [ 19.785319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.785374] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.785426] page_type: f5(slab) [ 19.785464] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.785519] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.785574] page dumped because: kasan: bad access detected [ 19.787137] [ 19.787856] Memory state around the buggy address: [ 19.788617] fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.788684] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.788776] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.788925] ^ [ 19.788964] fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.789011] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.789051] ================================================================== [ 19.692132] ================================================================== [ 19.692598] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 19.692840] Read of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.692979] [ 19.693017] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.693102] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.693131] Hardware name: linux,dummy-virt (DT) [ 19.693165] Call trace: [ 19.693616] show_stack+0x20/0x38 (C) [ 19.693940] dump_stack_lvl+0x8c/0xd0 [ 19.694226] print_report+0x118/0x608 [ 19.694300] kasan_report+0xdc/0x128 [ 19.694349] kasan_check_range+0x100/0x1a8 [ 19.694990] __kasan_check_read+0x20/0x30 [ 19.695050] kasan_atomics_helper+0xdd4/0x4858 [ 19.695099] kasan_atomics+0x198/0x2e0 [ 19.695147] kunit_try_run_case+0x170/0x3f0 [ 19.695195] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.695820] kthread+0x328/0x630 [ 19.696352] ret_from_fork+0x10/0x20 [ 19.696735] [ 19.696761] Allocated by task 266: [ 19.696973] kasan_save_stack+0x3c/0x68 [ 19.697177] kasan_save_track+0x20/0x40 [ 19.697292] kasan_save_alloc_info+0x40/0x58 [ 19.697693] __kasan_kmalloc+0xd4/0xd8 [ 19.697927] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.698021] kasan_atomics+0xb8/0x2e0 [ 19.698060] kunit_try_run_case+0x170/0x3f0 [ 19.698107] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.698634] kthread+0x328/0x630 [ 19.698672] ret_from_fork+0x10/0x20 [ 19.698711] [ 19.698733] The buggy address belongs to the object at fff00000c57aa700 [ 19.698733] which belongs to the cache kmalloc-64 of size 64 [ 19.699241] The buggy address is located 0 bytes to the right of [ 19.699241] allocated 48-byte region [fff00000c57aa700, fff00000c57aa730) [ 19.699533] [ 19.699665] The buggy address belongs to the physical page: [ 19.699985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.700242] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.700333] page_type: f5(slab) [ 19.700610] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.700868] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.701070] page dumped because: kasan: bad access detected [ 19.701368] [ 19.701528] Memory state around the buggy address: [ 19.701586] fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.701711] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.701759] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.701851] ^ [ 19.701887] fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.702317] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.702485] ================================================================== [ 19.794356] ================================================================== [ 19.794425] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 19.794494] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.794546] [ 19.794586] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.794671] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.794701] Hardware name: linux,dummy-virt (DT) [ 19.794732] Call trace: [ 19.794756] show_stack+0x20/0x38 (C) [ 19.794803] dump_stack_lvl+0x8c/0xd0 [ 19.794852] print_report+0x118/0x608 [ 19.794901] kasan_report+0xdc/0x128 [ 19.794947] kasan_check_range+0x100/0x1a8 [ 19.794997] __kasan_check_write+0x20/0x30 [ 19.795041] kasan_atomics_helper+0x11f8/0x4858 [ 19.795091] kasan_atomics+0x198/0x2e0 [ 19.795136] kunit_try_run_case+0x170/0x3f0 [ 19.795184] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.795239] kthread+0x328/0x630 [ 19.795292] ret_from_fork+0x10/0x20 [ 19.795342] [ 19.795361] Allocated by task 266: [ 19.795463] kasan_save_stack+0x3c/0x68 [ 19.795558] kasan_save_track+0x20/0x40 [ 19.795650] kasan_save_alloc_info+0x40/0x58 [ 19.795705] __kasan_kmalloc+0xd4/0xd8 [ 19.795748] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.795789] kasan_atomics+0xb8/0x2e0 [ 19.795827] kunit_try_run_case+0x170/0x3f0 [ 19.795876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.796032] kthread+0x328/0x630 [ 19.796120] ret_from_fork+0x10/0x20 [ 19.796157] [ 19.796179] The buggy address belongs to the object at fff00000c57aa700 [ 19.796179] which belongs to the cache kmalloc-64 of size 64 [ 19.796270] The buggy address is located 0 bytes to the right of [ 19.796270] allocated 48-byte region [fff00000c57aa700, fff00000c57aa730) [ 19.796340] [ 19.796362] The buggy address belongs to the physical page: [ 19.796642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.796915] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.796982] page_type: f5(slab) [ 19.797027] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.797099] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.797184] page dumped because: kasan: bad access detected [ 19.797320] [ 19.797423] Memory state around the buggy address: [ 19.797496] fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.797543] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.797596] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.797637] ^ [ 19.797679] fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.797881] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.798066] ================================================================== [ 19.480424] ================================================================== [ 19.480710] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 19.480925] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.481248] __kasan_check_write+0x20/0x30 [ 19.483874] [ 19.484165] kunit_try_run_case+0x170/0x3f0 [ 19.484205] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.484476] [ 19.484498] The buggy address belongs to the physical page: [ 19.484531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.484797] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.485091] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.485428] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.486314] ================================================================== [ 19.833547] ================================================================== [ 19.833616] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 19.833668] Read of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.833721] [ 19.833756] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.833838] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.833865] Hardware name: linux,dummy-virt (DT) [ 19.834345] Call trace: [ 19.834382] show_stack+0x20/0x38 (C) [ 19.834732] dump_stack_lvl+0x8c/0xd0 [ 19.834806] print_report+0x118/0x608 [ 19.834869] kasan_report+0xdc/0x128 [ 19.834923] __asan_report_load8_noabort+0x20/0x30 [ 19.835456] kasan_atomics_helper+0x3f04/0x4858 [ 19.835577] kasan_atomics+0x198/0x2e0 [ 19.835685] kunit_try_run_case+0x170/0x3f0 [ 19.835920] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.837015] kthread+0x328/0x630 [ 19.837201] ret_from_fork+0x10/0x20 [ 19.837639] [ 19.837696] Allocated by task 266: [ 19.837773] kasan_save_stack+0x3c/0x68 [ 19.837904] kasan_save_track+0x20/0x40 [ 19.838073] kasan_save_alloc_info+0x40/0x58 [ 19.838247] __kasan_kmalloc+0xd4/0xd8 [ 19.838295] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.838442] kasan_atomics+0xb8/0x2e0 [ 19.838870] kunit_try_run_case+0x170/0x3f0 [ 19.839108] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.839156] kthread+0x328/0x630 [ 19.839189] ret_from_fork+0x10/0x20 [ 19.839225] [ 19.839250] The buggy address belongs to the object at fff00000c57aa700 [ 19.839250] which belongs to the cache kmalloc-64 of size 64 [ 19.839867] The buggy address is located 0 bytes to the right of [ 19.839867] allocated 48-byte region [fff00000c57aa700, fff00000c57aa730) [ 19.839976] [ 19.840006] The buggy address belongs to the physical page: [ 19.840051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.840251] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.840306] page_type: f5(slab) [ 19.840351] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.840727] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.840778] page dumped because: kasan: bad access detected [ 19.840813] [ 19.840836] Memory state around the buggy address: [ 19.841276] fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.842308] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.842388] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.842458] ^ [ 19.842497] fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.842651] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.842693] ================================================================== [ 19.894346] ================================================================== [ 19.894421] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 19.894473] Read of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.894525] [ 19.894902] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.895021] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.895097] Hardware name: linux,dummy-virt (DT) [ 19.895133] Call trace: [ 19.895156] show_stack+0x20/0x38 (C) [ 19.895373] dump_stack_lvl+0x8c/0xd0 [ 19.895615] print_report+0x118/0x608 [ 19.896422] kasan_report+0xdc/0x128 [ 19.896472] __asan_report_load8_noabort+0x20/0x30 [ 19.896521] kasan_atomics_helper+0x3db0/0x4858 [ 19.896584] kasan_atomics+0x198/0x2e0 [ 19.896630] kunit_try_run_case+0x170/0x3f0 [ 19.897383] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.897475] kthread+0x328/0x630 [ 19.897519] ret_from_fork+0x10/0x20 [ 19.897585] [ 19.897605] Allocated by task 266: [ 19.897635] kasan_save_stack+0x3c/0x68 [ 19.898056] kasan_save_track+0x20/0x40 [ 19.898133] kasan_save_alloc_info+0x40/0x58 [ 19.898174] __kasan_kmalloc+0xd4/0xd8 [ 19.898213] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.898853] kasan_atomics+0xb8/0x2e0 [ 19.899198] kunit_try_run_case+0x170/0x3f0 [ 19.899274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.899322] kthread+0x328/0x630 [ 19.899872] ret_from_fork+0x10/0x20 [ 19.900323] [ 19.900526] The buggy address belongs to the object at fff00000c57aa700 [ 19.900526] which belongs to the cache kmalloc-64 of size 64 [ 19.900603] The buggy address is located 0 bytes to the right of [ 19.900603] allocated 48-byte region [fff00000c57aa700, fff00000c57aa730) [ 19.900674] [ 19.900697] The buggy address belongs to the physical page: [ 19.901127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.901214] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.901756] page_type: f5(slab) [ 19.901870] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.901923] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.901969] page dumped because: kasan: bad access detected [ 19.902003] [ 19.902024] Memory state around the buggy address: [ 19.902058] fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.902106] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.902153] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.902194] ^ [ 19.902230] fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.902275] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.902318] ================================================================== [ 19.619485] ================================================================== [ 19.619544] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 19.619608] Write of size 4 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.619660] [ 19.619695] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.619779] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.619810] Hardware name: linux,dummy-virt (DT) [ 19.619841] Call trace: [ 19.619865] show_stack+0x20/0x38 (C) [ 19.619914] dump_stack_lvl+0x8c/0xd0 [ 19.619982] print_report+0x118/0x608 [ 19.620030] kasan_report+0xdc/0x128 [ 19.620078] kasan_check_range+0x100/0x1a8 [ 19.620127] __kasan_check_write+0x20/0x30 [ 19.620704] kasan_atomics_helper+0xb70/0x4858 [ 19.620764] kasan_atomics+0x198/0x2e0 [ 19.620953] kunit_try_run_case+0x170/0x3f0 [ 19.621003] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.621058] kthread+0x328/0x630 [ 19.621103] ret_from_fork+0x10/0x20 [ 19.621153] [ 19.621173] Allocated by task 266: [ 19.621203] kasan_save_stack+0x3c/0x68 [ 19.621247] kasan_save_track+0x20/0x40 [ 19.621295] kasan_save_alloc_info+0x40/0x58 [ 19.621381] __kasan_kmalloc+0xd4/0xd8 [ 19.621420] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.621462] kasan_atomics+0xb8/0x2e0 [ 19.621502] kunit_try_run_case+0x170/0x3f0 [ 19.621542] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.622357] The buggy address belongs to the physical page: [ 19.623214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.623787] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.625158] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.626411] Allocated by task 266: [ 19.627205] kasan_atomics+0xb8/0x2e0 [ 19.627388] kunit_try_run_case+0x170/0x3f0 [ 19.627541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.627932] The buggy address is located 0 bytes to the right of [ 19.627932] allocated 48-byte region [fff00000c57aa700, fff00000c57aa730) [ 19.628617] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.629389] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.631124] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.632508] kasan_atomics_helper+0xc08/0x4858 [ 19.633917] kasan_save_stack+0x3c/0x68 [ 19.634393] kunit_try_run_case+0x170/0x3f0 [ 19.634696] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.634752] kthread+0x328/0x630 [ 19.634787] ret_from_fork+0x10/0x20 [ 19.634823] [ 19.634847] The buggy address belongs to the object at fff00000c57aa700 [ 19.634847] which belongs to the cache kmalloc-64 of size 64 [ 19.636663] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.637830] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.637953] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.640193] [ 19.640351] Hardware name: linux,dummy-virt (DT) [ 19.640557] kasan_report+0xdc/0x128 [ 19.641008] [ 19.642165] __kasan_kmalloc+0xd4/0xd8 [ 19.642776] kthread+0x328/0x630 [ 19.642826] ret_from_fork+0x10/0x20 [ 19.642864] [ 19.642887] The buggy address belongs to the object at fff00000c57aa700 [ 19.642887] which belongs to the cache kmalloc-64 of size 64 [ 19.644014] page_type: f5(slab) [ 19.644635] fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.646103] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 19.646422] Call trace: [ 19.646917] __kasan_check_write+0x20/0x30 [ 19.648598] ret_from_fork+0x10/0x20 [ 19.648647] [ 19.648678] The buggy address belongs to the object at fff00000c57aa700 [ 19.648678] which belongs to the cache kmalloc-64 of size 64 [ 19.648742] The buggy address is located 0 bytes to the right of [ 19.648742] allocated 48-byte region [fff00000c57aa700, fff00000c57aa730) [ 19.648860] [ 19.648891] The buggy address belongs to the physical page: [ 19.648926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.648990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.649971] page_type: f5(slab) [ 19.650022] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.650076] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.650169] page dumped because: kasan: bad access detected [ 19.650443] [ 19.650466] Memory state around the buggy address: [ 19.650860] fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.651392] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.651549] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.651627] ^ [ 19.651727] fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.652364] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.652603] ================================================================== [ 19.865601] ================================================================== [ 19.865705] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 19.865810] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.866155] [ 19.866206] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.866396] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.866424] Hardware name: linux,dummy-virt (DT) [ 19.866870] Call trace: [ 19.866920] show_stack+0x20/0x38 (C) [ 19.866982] dump_stack_lvl+0x8c/0xd0 [ 19.867031] print_report+0x118/0x608 [ 19.867078] kasan_report+0xdc/0x128 [ 19.867125] kasan_check_range+0x100/0x1a8 [ 19.867531] __kasan_check_write+0x20/0x30 [ 19.867614] kasan_atomics_helper+0x14e4/0x4858 [ 19.867663] kasan_atomics+0x198/0x2e0 [ 19.867996] kunit_try_run_case+0x170/0x3f0 [ 19.868366] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.868450] kthread+0x328/0x630 [ 19.868614] ret_from_fork+0x10/0x20 [ 19.868993] [ 19.869020] Allocated by task 266: [ 19.869332] kasan_save_stack+0x3c/0x68 [ 19.869468] kasan_save_track+0x20/0x40 [ 19.869508] kasan_save_alloc_info+0x40/0x58 [ 19.869609] __kasan_kmalloc+0xd4/0xd8 [ 19.869669] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.870079] kasan_atomics+0xb8/0x2e0 [ 19.870159] kunit_try_run_case+0x170/0x3f0 [ 19.870470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.870524] kthread+0x328/0x630 [ 19.870599] ret_from_fork+0x10/0x20 [ 19.870639] [ 19.870841] The buggy address belongs to the object at fff00000c57aa700 [ 19.870841] which belongs to the cache kmalloc-64 of size 64 [ 19.870907] The buggy address is located 0 bytes to the right of [ 19.870907] allocated 48-byte region [fff00000c57aa700, fff00000c57aa730) [ 19.871246] [ 19.871273] The buggy address belongs to the physical page: [ 19.871321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.871383] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.871725] page_type: f5(slab) [ 19.871779] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.871834] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.871987] page dumped because: kasan: bad access detected [ 19.872027] [ 19.872078] Memory state around the buggy address: [ 19.872188] fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.872772] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.872889] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.873046] ^ [ 19.873214] fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.873647] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.873736] ================================================================== [ 19.595371] ================================================================== [ 19.595429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 19.595484] Write of size 4 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.595539] [ 19.595584] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.595671] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.595702] Hardware name: linux,dummy-virt (DT) [ 19.595736] Call trace: [ 19.595761] show_stack+0x20/0x38 (C) [ 19.595810] dump_stack_lvl+0x8c/0xd0 [ 19.595859] print_report+0x118/0x608 [ 19.595907] kasan_report+0xdc/0x128 [ 19.595955] kasan_check_range+0x100/0x1a8 [ 19.596006] __kasan_check_write+0x20/0x30 [ 19.596054] kasan_atomics_helper+0xa6c/0x4858 [ 19.596113] kasan_atomics+0x198/0x2e0 [ 19.596344] kunit_try_run_case+0x170/0x3f0 [ 19.596418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.596883] kthread+0x328/0x630 [ 19.597166] ret_from_fork+0x10/0x20 [ 19.597218] [ 19.597239] Allocated by task 266: [ 19.597275] kasan_save_stack+0x3c/0x68 [ 19.597812] kasan_save_track+0x20/0x40 [ 19.597893] kasan_save_alloc_info+0x40/0x58 [ 19.597936] __kasan_kmalloc+0xd4/0xd8 [ 19.598266] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.598323] kasan_atomics+0xb8/0x2e0 [ 19.598360] kunit_try_run_case+0x170/0x3f0 [ 19.598399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.598457] kthread+0x328/0x630 [ 19.598492] ret_from_fork+0x10/0x20 [ 19.598756] [ 19.598945] The buggy address belongs to the object at fff00000c57aa700 [ 19.598945] which belongs to the cache kmalloc-64 of size 64 [ 19.599165] The buggy address is located 0 bytes to the right of [ 19.599165] allocated 48-byte region [fff00000c57aa700, fff00000c57aa730) [ 19.599533] [ 19.599597] The buggy address belongs to the physical page: [ 19.599632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.599699] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.599751] page_type: f5(slab) [ 19.599953] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.600099] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.600151] page dumped because: kasan: bad access detected [ 19.600188] [ 19.600384] Memory state around the buggy address: [ 19.600624] fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.600677] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.600938] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.601114] ^ [ 19.601154] fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.601201] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.601365] ================================================================== [ 19.612724] ================================================================== [ 19.612782] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 19.612836] Read of size 4 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.612888] [ 19.612922] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.613006] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.613034] Hardware name: linux,dummy-virt (DT) [ 19.613068] Call trace: [ 19.613092] show_stack+0x20/0x38 (C) [ 19.613142] dump_stack_lvl+0x8c/0xd0 [ 19.613193] print_report+0x118/0x608 [ 19.613241] kasan_report+0xdc/0x128 [ 19.613297] __asan_report_load4_noabort+0x20/0x30 [ 19.614685] kasan_atomics_helper+0x3dcc/0x4858 [ 19.614737] kasan_atomics+0x198/0x2e0 [ 19.614785] kunit_try_run_case+0x170/0x3f0 [ 19.614836] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.614891] kthread+0x328/0x630 [ 19.614935] ret_from_fork+0x10/0x20 [ 19.614986] [ 19.615006] Allocated by task 266: [ 19.615038] kasan_save_stack+0x3c/0x68 [ 19.615083] kasan_save_track+0x20/0x40 [ 19.615123] kasan_save_alloc_info+0x40/0x58 [ 19.615182] __kasan_kmalloc+0xd4/0xd8 [ 19.615221] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.615264] kasan_atomics+0xb8/0x2e0 [ 19.615323] kunit_try_run_case+0x170/0x3f0 [ 19.615543] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.615716] kthread+0x328/0x630 [ 19.615750] ret_from_fork+0x10/0x20 [ 19.615803] [ 19.615826] The buggy address belongs to the object at fff00000c57aa700 [ 19.615826] which belongs to the cache kmalloc-64 of size 64 [ 19.616053] The buggy address is located 0 bytes to the right of [ 19.616053] allocated 48-byte region [fff00000c57aa700, fff00000c57aa730) [ 19.616203] [ 19.616295] The buggy address belongs to the physical page: [ 19.616377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.616435] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.616700] page_type: f5(slab) [ 19.616744] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.616977] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.617021] page dumped because: kasan: bad access detected [ 19.617074] [ 19.617185] Memory state around the buggy address: [ 19.617721] fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.617893] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.618166] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.618217] ^ [ 19.618254] fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.618311] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.618493] ================================================================== [ 19.563753] ================================================================== [ 19.563913] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 19.564408] Read of size 4 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.564464] [ 19.564650] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.565009] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.565040] Hardware name: linux,dummy-virt (DT) [ 19.565074] Call trace: [ 19.565097] show_stack+0x20/0x38 (C) [ 19.565528] dump_stack_lvl+0x8c/0xd0 [ 19.565614] print_report+0x118/0x608 [ 19.565669] kasan_report+0xdc/0x128 [ 19.565716] __asan_report_load4_noabort+0x20/0x30 [ 19.566007] kasan_atomics_helper+0x42d8/0x4858 [ 19.566062] kasan_atomics+0x198/0x2e0 [ 19.566122] kunit_try_run_case+0x170/0x3f0 [ 19.566215] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.566300] kthread+0x328/0x630 [ 19.566343] ret_from_fork+0x10/0x20 [ 19.566597] [ 19.566618] Allocated by task 266: [ 19.566647] kasan_save_stack+0x3c/0x68 [ 19.566991] kasan_save_track+0x20/0x40 [ 19.567187] kasan_save_alloc_info+0x40/0x58 [ 19.567981] kthread+0x328/0x630 [ 19.569873] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.571895] Call trace: [ 19.572019] show_stack+0x20/0x38 (C) [ 19.572074] dump_stack_lvl+0x8c/0xd0 [ 19.572311] print_report+0x118/0x608 [ 19.572535] kasan_report+0xdc/0x128 [ 19.572615] kasan_check_range+0x100/0x1a8 [ 19.572666] __kasan_check_write+0x20/0x30 [ 19.572771] kasan_atomics_helper+0x934/0x4858 [ 19.573404] kasan_atomics+0x198/0x2e0 [ 19.573750] kunit_try_run_case+0x170/0x3f0 [ 19.573804] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.573859] kthread+0x328/0x630 [ 19.573902] ret_from_fork+0x10/0x20 [ 19.574357] [ 19.574479] Allocated by task 266: [ 19.574618] kasan_save_stack+0x3c/0x68 [ 19.575068] kasan_save_track+0x20/0x40 [ 19.575188] kasan_save_alloc_info+0x40/0x58 [ 19.575254] __kasan_kmalloc+0xd4/0xd8 [ 19.575342] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.575383] kasan_atomics+0xb8/0x2e0 [ 19.575459] kunit_try_run_case+0x170/0x3f0 [ 19.575501] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.575546] kthread+0x328/0x630 [ 19.575735] ret_from_fork+0x10/0x20 [ 19.575782] [ 19.575804] The buggy address belongs to the object at fff00000c57aa700 [ 19.575804] which belongs to the cache kmalloc-64 of size 64 [ 19.576224] The buggy address is located 0 bytes to the right of [ 19.576224] allocated 48-byte region [fff00000c57aa700, fff00000c57aa730) [ 19.576328] [ 19.576352] The buggy address belongs to the physical page: [ 19.576386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.576445] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.576496] page_type: f5(slab) [ 19.576549] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.576823] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.577211] page dumped because: kasan: bad access detected [ 19.577271] [ 19.577293] Memory state around the buggy address: [ 19.577346] fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.577394] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.577592] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.577887] ^ [ 19.577946] fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.577994] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.578038] ================================================================== [ 19.854983] ================================================================== [ 19.855046] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 19.855096] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.855149] [ 19.855182] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.855410] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.855676] Hardware name: linux,dummy-virt (DT) [ 19.855738] Call trace: [ 19.856250] show_stack+0x20/0x38 (C) [ 19.856378] dump_stack_lvl+0x8c/0xd0 [ 19.856632] print_report+0x118/0x608 [ 19.856906] kasan_report+0xdc/0x128 [ 19.857104] kasan_check_range+0x100/0x1a8 [ 19.857153] __kasan_check_write+0x20/0x30 [ 19.857200] kasan_atomics_helper+0x147c/0x4858 [ 19.857249] kasan_atomics+0x198/0x2e0 [ 19.857301] kunit_try_run_case+0x170/0x3f0 [ 19.857357] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.857411] kthread+0x328/0x630 [ 19.857452] ret_from_fork+0x10/0x20 [ 19.857499] [ 19.857521] Allocated by task 266: [ 19.857977] kasan_save_stack+0x3c/0x68 [ 19.858041] kasan_save_track+0x20/0x40 [ 19.858360] kasan_save_alloc_info+0x40/0x58 [ 19.858410] __kasan_kmalloc+0xd4/0xd8 [ 19.858647] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.859015] kasan_atomics+0xb8/0x2e0 [ 19.859270] kunit_try_run_case+0x170/0x3f0 [ 19.859435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.859560] kthread+0x328/0x630 [ 19.859620] ret_from_fork+0x10/0x20 [ 19.861080] [ 19.861273] The buggy address belongs to the object at fff00000c57aa700 [ 19.861273] which belongs to the cache kmalloc-64 of size 64 [ 19.861378] The buggy address is located 0 bytes to the right of [ 19.861378] allocated 48-byte region [fff00000c57aa700, fff00000c57aa730) [ 19.861654] [ 19.861678] The buggy address belongs to the physical page: [ 19.861713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.861954] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.862009] page_type: f5(slab) [ 19.862421] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.862550] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.863080] page dumped because: kasan: bad access detected [ 19.863200] [ 19.863221] Memory state around the buggy address: [ 19.863257] fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.863304] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.863957] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.864226] ^ [ 19.864271] fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.864688] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.864825] ================================================================== [ 19.843599] ================================================================== [ 19.843853] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 19.843916] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.844182] [ 19.844317] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.844628] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.844681] Hardware name: linux,dummy-virt (DT) [ 19.844724] Call trace: [ 19.844785] show_stack+0x20/0x38 (C) [ 19.845153] dump_stack_lvl+0x8c/0xd0 [ 19.845361] print_report+0x118/0x608 [ 19.845655] kasan_report+0xdc/0x128 [ 19.845705] kasan_check_range+0x100/0x1a8 [ 19.845755] __kasan_check_write+0x20/0x30 [ 19.846231] kasan_atomics_helper+0x1414/0x4858 [ 19.846315] kasan_atomics+0x198/0x2e0 [ 19.846448] kunit_try_run_case+0x170/0x3f0 [ 19.846504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.846559] kthread+0x328/0x630 [ 19.846825] ret_from_fork+0x10/0x20 [ 19.847034] [ 19.847317] Allocated by task 266: [ 19.847550] kasan_save_stack+0x3c/0x68 [ 19.847610] kasan_save_track+0x20/0x40 [ 19.847651] kasan_save_alloc_info+0x40/0x58 [ 19.847692] __kasan_kmalloc+0xd4/0xd8 [ 19.848418] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.849069] kasan_atomics+0xb8/0x2e0 [ 19.849171] kunit_try_run_case+0x170/0x3f0 [ 19.849777] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.849903] kthread+0x328/0x630 [ 19.849939] ret_from_fork+0x10/0x20 [ 19.849998] [ 19.850022] The buggy address belongs to the object at fff00000c57aa700 [ 19.850022] which belongs to the cache kmalloc-64 of size 64 [ 19.850539] The buggy address is located 0 bytes to the right of [ 19.850539] allocated 48-byte region [fff00000c57aa700, fff00000c57aa730) [ 19.850795] [ 19.850820] The buggy address belongs to the physical page: [ 19.850853] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.850911] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.851356] page_type: f5(slab) [ 19.851405] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.851666] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.851782] page dumped because: kasan: bad access detected [ 19.852253] [ 19.852332] Memory state around the buggy address: [ 19.852370] fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.852981] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.853065] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.853108] ^ [ 19.853542] fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.853603] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.853897] ================================================================== [ 19.824235] ================================================================== [ 19.824291] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 19.824341] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.825051] [ 19.825106] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.825194] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.825224] Hardware name: linux,dummy-virt (DT) [ 19.825256] Call trace: [ 19.825620] show_stack+0x20/0x38 (C) [ 19.825741] dump_stack_lvl+0x8c/0xd0 [ 19.825844] print_report+0x118/0x608 [ 19.825901] kasan_report+0xdc/0x128 [ 19.825948] kasan_check_range+0x100/0x1a8 [ 19.826237] __kasan_check_write+0x20/0x30 [ 19.826310] kasan_atomics_helper+0x1384/0x4858 [ 19.826672] kasan_atomics+0x198/0x2e0 [ 19.826721] kunit_try_run_case+0x170/0x3f0 [ 19.827054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.827262] kthread+0x328/0x630 [ 19.827332] ret_from_fork+0x10/0x20 [ 19.827699] [ 19.827737] Allocated by task 266: [ 19.827775] kasan_save_stack+0x3c/0x68 [ 19.827992] kasan_save_track+0x20/0x40 [ 19.828034] kasan_save_alloc_info+0x40/0x58 [ 19.828076] __kasan_kmalloc+0xd4/0xd8 [ 19.828670] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.828721] kasan_atomics+0xb8/0x2e0 [ 19.828761] kunit_try_run_case+0x170/0x3f0 [ 19.828800] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.828847] kthread+0x328/0x630 [ 19.828880] ret_from_fork+0x10/0x20 [ 19.828916] [ 19.828939] The buggy address belongs to the object at fff00000c57aa700 [ 19.828939] which belongs to the cache kmalloc-64 of size 64 [ 19.829001] The buggy address is located 0 bytes to the right of [ 19.829001] allocated 48-byte region [fff00000c57aa700, fff00000c57aa730) [ 19.829068] [ 19.829091] The buggy address belongs to the physical page: [ 19.829982] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.830231] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.830310] page_type: f5(slab) [ 19.830363] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.830912] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.830961] page dumped because: kasan: bad access detected [ 19.831477] [ 19.831510] Memory state around the buggy address: [ 19.831549] fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.831828] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.831877] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.831922] ^ [ 19.832362] fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.832426] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.832498] ================================================================== [ 19.875893] ================================================================== [ 19.875951] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 19.876002] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.876055] [ 19.876088] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.876815] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.876864] Hardware name: linux,dummy-virt (DT) [ 19.876900] Call trace: [ 19.876923] show_stack+0x20/0x38 (C) [ 19.876976] dump_stack_lvl+0x8c/0xd0 [ 19.877025] print_report+0x118/0x608 [ 19.877403] kasan_report+0xdc/0x128 [ 19.877540] kasan_check_range+0x100/0x1a8 [ 19.878204] __kasan_check_write+0x20/0x30 [ 19.878266] kasan_atomics_helper+0x154c/0x4858 [ 19.878315] kasan_atomics+0x198/0x2e0 [ 19.878362] kunit_try_run_case+0x170/0x3f0 [ 19.878901] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.879007] kthread+0x328/0x630 [ 19.879050] ret_from_fork+0x10/0x20 [ 19.879401] [ 19.879669] Allocated by task 266: [ 19.879990] kasan_save_stack+0x3c/0x68 [ 19.880224] kasan_save_track+0x20/0x40 [ 19.880277] kasan_save_alloc_info+0x40/0x58 [ 19.880322] __kasan_kmalloc+0xd4/0xd8 [ 19.880367] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.880653] kasan_atomics+0xb8/0x2e0 [ 19.880698] kunit_try_run_case+0x170/0x3f0 [ 19.880754] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.880977] kthread+0x328/0x630 [ 19.881341] ret_from_fork+0x10/0x20 [ 19.881386] [ 19.881573] The buggy address belongs to the object at fff00000c57aa700 [ 19.881573] which belongs to the cache kmalloc-64 of size 64 [ 19.881844] The buggy address is located 0 bytes to the right of [ 19.881844] allocated 48-byte region [fff00000c57aa700, fff00000c57aa730) [ 19.881922] [ 19.882131] The buggy address belongs to the physical page: [ 19.882178] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.882234] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.882470] page_type: f5(slab) [ 19.882557] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.882908] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.882958] page dumped because: kasan: bad access detected [ 19.883089] [ 19.883155] Memory state around the buggy address: [ 19.883248] fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.883588] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.883650] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.883693] ^ [ 19.883730] fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.883773] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.884551] ================================================================== [ 19.746347] ================================================================== [ 19.746415] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 19.746467] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.746519] [ 19.746553] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.746970] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.747073] Hardware name: linux,dummy-virt (DT) [ 19.747153] Call trace: [ 19.747201] show_stack+0x20/0x38 (C) [ 19.747264] dump_stack_lvl+0x8c/0xd0 [ 19.747546] print_report+0x118/0x608 [ 19.747635] kasan_report+0xdc/0x128 [ 19.747732] kasan_check_range+0x100/0x1a8 [ 19.747804] __kasan_check_write+0x20/0x30 [ 19.747859] kasan_atomics_helper+0xf88/0x4858 [ 19.747920] kasan_atomics+0x198/0x2e0 [ 19.748010] kunit_try_run_case+0x170/0x3f0 [ 19.748062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.748116] kthread+0x328/0x630 [ 19.748376] ret_from_fork+0x10/0x20 [ 19.748443] [ 19.748513] Allocated by task 266: [ 19.748546] kasan_save_stack+0x3c/0x68 [ 19.748825] kasan_save_track+0x20/0x40 [ 19.748903] kasan_save_alloc_info+0x40/0x58 [ 19.749012] __kasan_kmalloc+0xd4/0xd8 [ 19.749054] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.749109] kasan_atomics+0xb8/0x2e0 [ 19.749166] kunit_try_run_case+0x170/0x3f0 [ 19.749207] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.749254] kthread+0x328/0x630 [ 19.749937] ret_from_fork+0x10/0x20 [ 19.750319] [ 19.750347] The buggy address belongs to the object at fff00000c57aa700 [ 19.750347] which belongs to the cache kmalloc-64 of size 64 [ 19.750442] The buggy address is located 0 bytes to the right of [ 19.750442] allocated 48-byte region [fff00000c57aa700, fff00000c57aa730) [ 19.750554] [ 19.750619] The buggy address belongs to the physical page: [ 19.750672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.751133] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.751495] page_type: f5(slab) [ 19.751714] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.751846] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.752199] page dumped because: kasan: bad access detected [ 19.752301] [ 19.752360] Memory state around the buggy address: [ 19.752422] fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.752478] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.752816] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.753153] ^ [ 19.753348] fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.753785] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.753958] ================================================================== [ 19.798375] ================================================================== [ 19.798421] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 19.798467] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.798517] [ 19.798546] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.800046] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.800194] Hardware name: linux,dummy-virt (DT) [ 19.800228] Call trace: [ 19.800993] show_stack+0x20/0x38 (C) [ 19.801316] dump_stack_lvl+0x8c/0xd0 [ 19.801511] print_report+0x118/0x608 [ 19.802502] kasan_report+0xdc/0x128 [ 19.802653] kasan_check_range+0x100/0x1a8 [ 19.802714] __kasan_check_write+0x20/0x30 [ 19.803000] kasan_atomics_helper+0x126c/0x4858 [ 19.803363] kasan_atomics+0x198/0x2e0 [ 19.803413] kunit_try_run_case+0x170/0x3f0 [ 19.803826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.803911] kthread+0x328/0x630 [ 19.804291] ret_from_fork+0x10/0x20 [ 19.804553] [ 19.804744] Allocated by task 266: [ 19.804782] kasan_save_stack+0x3c/0x68 [ 19.805297] kasan_save_track+0x20/0x40 [ 19.805588] kasan_save_alloc_info+0x40/0x58 [ 19.805792] __kasan_kmalloc+0xd4/0xd8 [ 19.806079] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.806468] kasan_atomics+0xb8/0x2e0 [ 19.807007] kunit_try_run_case+0x170/0x3f0 [ 19.807362] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.807413] kthread+0x328/0x630 [ 19.807769] ret_from_fork+0x10/0x20 [ 19.808041] [ 19.808071] The buggy address belongs to the object at fff00000c57aa700 [ 19.808071] which belongs to the cache kmalloc-64 of size 64 [ 19.808454] The buggy address is located 0 bytes to the right of [ 19.808454] allocated 48-byte region [fff00000c57aa700, fff00000c57aa730) [ 19.809187] [ 19.809221] The buggy address belongs to the physical page: [ 19.809268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.809782] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.809844] page_type: f5(slab) [ 19.810100] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.810601] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.810653] page dumped because: kasan: bad access detected [ 19.811937] [ 19.812176] Memory state around the buggy address: [ 19.812219] fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.812398] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.812834] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.813053] ^ [ 19.813386] fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.813585] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.813629] ================================================================== [ 19.738402] ================================================================== [ 19.738729] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 19.738853] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.738912] [ 19.738945] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.739226] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.740267] Hardware name: linux,dummy-virt (DT) [ 19.740451] Call trace: [ 19.740504] show_stack+0x20/0x38 (C) [ 19.740574] dump_stack_lvl+0x8c/0xd0 [ 19.740627] print_report+0x118/0x608 [ 19.740757] kasan_report+0xdc/0x128 [ 19.740809] kasan_check_range+0x100/0x1a8 [ 19.740861] __kasan_check_write+0x20/0x30 [ 19.741017] kasan_atomics_helper+0xf20/0x4858 [ 19.741079] kasan_atomics+0x198/0x2e0 [ 19.741125] kunit_try_run_case+0x170/0x3f0 [ 19.741175] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.741268] kthread+0x328/0x630 [ 19.741312] ret_from_fork+0x10/0x20 [ 19.741370] [ 19.741741] Allocated by task 266: [ 19.741813] kasan_save_stack+0x3c/0x68 [ 19.741864] kasan_save_track+0x20/0x40 [ 19.741905] kasan_save_alloc_info+0x40/0x58 [ 19.741948] __kasan_kmalloc+0xd4/0xd8 [ 19.742244] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.742512] kasan_atomics+0xb8/0x2e0 [ 19.742689] kunit_try_run_case+0x170/0x3f0 [ 19.742827] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.742878] kthread+0x328/0x630 [ 19.742914] ret_from_fork+0x10/0x20 [ 19.743214] [ 19.743274] The buggy address belongs to the object at fff00000c57aa700 [ 19.743274] which belongs to the cache kmalloc-64 of size 64 [ 19.743607] The buggy address is located 0 bytes to the right of [ 19.743607] allocated 48-byte region [fff00000c57aa700, fff00000c57aa730) [ 19.744111] [ 19.744158] The buggy address belongs to the physical page: [ 19.744203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.744294] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.744349] page_type: f5(slab) [ 19.744389] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.744449] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.744495] page dumped because: kasan: bad access detected [ 19.744530] [ 19.744550] Memory state around the buggy address: [ 19.744625] fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.744679] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.744737] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.744785] ^ [ 19.744825] fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.744873] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.744917] ================================================================== [ 19.677016] ================================================================== [ 19.677275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 19.677496] Read of size 4 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.677794] [ 19.678036] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.678361] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.678522] Hardware name: linux,dummy-virt (DT) [ 19.678755] Call trace: [ 19.678959] show_stack+0x20/0x38 (C) [ 19.679065] dump_stack_lvl+0x8c/0xd0 [ 19.679119] print_report+0x118/0x608 [ 19.679683] kasan_report+0xdc/0x128 [ 19.679752] __asan_report_load4_noabort+0x20/0x30 [ 19.680109] kasan_atomics_helper+0x3e04/0x4858 [ 19.680342] kasan_atomics+0x198/0x2e0 [ 19.680862] kunit_try_run_case+0x170/0x3f0 [ 19.681268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.681460] kthread+0x328/0x630 [ 19.681662] ret_from_fork+0x10/0x20 [ 19.682232] [ 19.682298] Allocated by task 266: [ 19.682333] kasan_save_stack+0x3c/0x68 [ 19.682383] kasan_save_track+0x20/0x40 [ 19.682775] kasan_save_alloc_info+0x40/0x58 [ 19.683056] __kasan_kmalloc+0xd4/0xd8 [ 19.683475] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.683527] kasan_atomics+0xb8/0x2e0 [ 19.684004] kunit_try_run_case+0x170/0x3f0 [ 19.684249] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.684551] kthread+0x328/0x630 [ 19.684925] ret_from_fork+0x10/0x20 [ 19.684972] [ 19.684995] The buggy address belongs to the object at fff00000c57aa700 [ 19.684995] which belongs to the cache kmalloc-64 of size 64 [ 19.685059] The buggy address is located 0 bytes to the right of [ 19.685059] allocated 48-byte region [fff00000c57aa700, fff00000c57aa730) [ 19.685129] [ 19.685747] The buggy address belongs to the physical page: [ 19.685789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.685859] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.685914] page_type: f5(slab) [ 19.685957] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.686229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.686386] page dumped because: kasan: bad access detected [ 19.686513] [ 19.686534] Memory state around the buggy address: [ 19.686768] fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.686825] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.687272] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.687548] ^ [ 19.687653] fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.688276] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.688385] ================================================================== [ 19.964312] ================================================================== [ 19.964367] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 19.964418] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.964470] [ 19.964877] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.965001] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.965191] Hardware name: linux,dummy-virt (DT) [ 19.965232] Call trace: [ 19.965255] show_stack+0x20/0x38 (C) [ 19.965731] dump_stack_lvl+0x8c/0xd0 [ 19.965881] print_report+0x118/0x608 [ 19.965931] kasan_report+0xdc/0x128 [ 19.965977] kasan_check_range+0x100/0x1a8 [ 19.966455] __kasan_check_write+0x20/0x30 [ 19.966617] kasan_atomics_helper+0x17ec/0x4858 [ 19.967196] kasan_atomics+0x198/0x2e0 [ 19.967508] kunit_try_run_case+0x170/0x3f0 [ 19.967561] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.967924] kthread+0x328/0x630 [ 19.968030] ret_from_fork+0x10/0x20 [ 19.968354] [ 19.968493] Allocated by task 266: [ 19.968524] kasan_save_stack+0x3c/0x68 [ 19.968579] kasan_save_track+0x20/0x40 [ 19.968619] kasan_save_alloc_info+0x40/0x58 [ 19.969358] __kasan_kmalloc+0xd4/0xd8 [ 19.969967] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.970273] kasan_atomics+0xb8/0x2e0 [ 19.970453] kunit_try_run_case+0x170/0x3f0 [ 19.970499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.971062] kthread+0x328/0x630 [ 19.971527] ret_from_fork+0x10/0x20 [ 19.971581] [ 19.971604] The buggy address belongs to the object at fff00000c57aa700 [ 19.971604] which belongs to the cache kmalloc-64 of size 64 [ 19.971875] The buggy address is located 0 bytes to the right of [ 19.971875] allocated 48-byte region [fff00000c57aa700, fff00000c57aa730) [ 19.972060] [ 19.972369] The buggy address belongs to the physical page: [ 19.972414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.972804] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.972882] page_type: f5(slab) [ 19.972974] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.973027] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.973509] page dumped because: kasan: bad access detected [ 19.973578] [ 19.973600] Memory state around the buggy address: [ 19.973886] fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.974149] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.974329] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.974381] ^ [ 19.974424] fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.974574] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.974834] ================================================================== [ 19.760797] ================================================================== [ 19.761045] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 19.761125] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.761179] [ 19.761213] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.761707] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.762113] Hardware name: linux,dummy-virt (DT) [ 19.762181] Call trace: [ 19.762243] show_stack+0x20/0x38 (C) [ 19.762328] dump_stack_lvl+0x8c/0xd0 [ 19.762402] print_report+0x118/0x608 [ 19.762730] kasan_report+0xdc/0x128 [ 19.762853] kasan_check_range+0x100/0x1a8 [ 19.763022] __kasan_check_write+0x20/0x30 [ 19.763118] kasan_atomics_helper+0x1058/0x4858 [ 19.763685] kasan_atomics+0x198/0x2e0 [ 19.764010] kunit_try_run_case+0x170/0x3f0 [ 19.764108] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.764256] kthread+0x328/0x630 [ 19.764334] ret_from_fork+0x10/0x20 [ 19.764462] [ 19.764511] Allocated by task 266: [ 19.764540] kasan_save_stack+0x3c/0x68 [ 19.764880] kasan_save_track+0x20/0x40 [ 19.764959] kasan_save_alloc_info+0x40/0x58 [ 19.765221] __kasan_kmalloc+0xd4/0xd8 [ 19.765312] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.765390] kasan_atomics+0xb8/0x2e0 [ 19.765604] kunit_try_run_case+0x170/0x3f0 [ 19.765769] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.765909] kthread+0x328/0x630 [ 19.766148] ret_from_fork+0x10/0x20 [ 19.766349] [ 19.766610] The buggy address belongs to the object at fff00000c57aa700 [ 19.766610] which belongs to the cache kmalloc-64 of size 64 [ 19.766825] The buggy address is located 0 bytes to the right of [ 19.766825] allocated 48-byte region [fff00000c57aa700, fff00000c57aa730) [ 19.767298] [ 19.767642] The buggy address belongs to the physical page: [ 19.767712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.768200] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.768294] page_type: f5(slab) [ 19.768347] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.768410] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.768463] page dumped because: kasan: bad access detected [ 19.768498] [ 19.768526] Memory state around the buggy address: [ 19.768561] fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.769050] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.769117] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.769189] ^ [ 19.769247] fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.769523] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.769672] ================================================================== [ 19.711990] ================================================================== [ 19.712067] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 19.712528] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.712603] [ 19.712638] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.712723] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.712750] Hardware name: linux,dummy-virt (DT) [ 19.712784] Call trace: [ 19.712807] show_stack+0x20/0x38 (C) [ 19.712933] dump_stack_lvl+0x8c/0xd0 [ 19.713465] print_report+0x118/0x608 [ 19.714347] kasan_report+0xdc/0x128 [ 19.714590] kasan_check_range+0x100/0x1a8 [ 19.714647] __kasan_check_write+0x20/0x30 [ 19.714713] kasan_atomics_helper+0xe44/0x4858 [ 19.714818] kasan_atomics+0x198/0x2e0 [ 19.714889] kunit_try_run_case+0x170/0x3f0 [ 19.714939] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.714993] kthread+0x328/0x630 [ 19.715037] ret_from_fork+0x10/0x20 [ 19.715085] [ 19.715105] Allocated by task 266: [ 19.716638] kasan_save_stack+0x3c/0x68 [ 19.716701] kasan_save_track+0x20/0x40 [ 19.716744] kasan_save_alloc_info+0x40/0x58 [ 19.717070] __kasan_kmalloc+0xd4/0xd8 [ 19.717222] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.717425] kasan_atomics+0xb8/0x2e0 [ 19.717488] kunit_try_run_case+0x170/0x3f0 [ 19.717574] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.717814] kthread+0x328/0x630 [ 19.717868] ret_from_fork+0x10/0x20 [ 19.717945] [ 19.717976] The buggy address belongs to the object at fff00000c57aa700 [ 19.717976] which belongs to the cache kmalloc-64 of size 64 [ 19.718230] The buggy address is located 0 bytes to the right of [ 19.718230] allocated 48-byte region [fff00000c57aa700, fff00000c57aa730) [ 19.718754] [ 19.718901] The buggy address belongs to the physical page: [ 19.718938] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.718999] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.719057] page_type: f5(slab) [ 19.719099] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.719152] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.719547] page dumped because: kasan: bad access detected [ 19.719611] [ 19.719632] Memory state around the buggy address: [ 19.720144] fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.720206] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.720420] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.720655] ^ [ 19.720850] fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.720903] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.721300] ================================================================== [ 19.914002] ================================================================== [ 19.914094] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 19.914251] Read of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.914680] [ 19.914842] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.914981] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.915010] Hardware name: linux,dummy-virt (DT) [ 19.915460] Call trace: [ 19.915841] show_stack+0x20/0x38 (C) [ 19.915958] dump_stack_lvl+0x8c/0xd0 [ 19.916012] print_report+0x118/0x608 [ 19.916069] kasan_report+0xdc/0x128 [ 19.916402] __asan_report_load8_noabort+0x20/0x30 [ 19.916783] kasan_atomics_helper+0x3df4/0x4858 [ 19.917084] kasan_atomics+0x198/0x2e0 [ 19.917143] kunit_try_run_case+0x170/0x3f0 [ 19.917238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.917415] kthread+0x328/0x630 [ 19.917800] ret_from_fork+0x10/0x20 [ 19.918141] [ 19.918166] Allocated by task 266: [ 19.918207] kasan_save_stack+0x3c/0x68 [ 19.918280] kasan_save_track+0x20/0x40 [ 19.918327] kasan_save_alloc_info+0x40/0x58 [ 19.918732] __kasan_kmalloc+0xd4/0xd8 [ 19.918801] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.919153] kasan_atomics+0xb8/0x2e0 [ 19.919195] kunit_try_run_case+0x170/0x3f0 [ 19.919486] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.920092] kthread+0x328/0x630 [ 19.920294] ret_from_fork+0x10/0x20 [ 19.920378] [ 19.920399] The buggy address belongs to the object at fff00000c57aa700 [ 19.920399] which belongs to the cache kmalloc-64 of size 64 [ 19.920666] The buggy address is located 0 bytes to the right of [ 19.920666] allocated 48-byte region [fff00000c57aa700, fff00000c57aa730) [ 19.921067] [ 19.921206] The buggy address belongs to the physical page: [ 19.921393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.921545] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.921623] page_type: f5(slab) [ 19.921794] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.921908] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.922073] page dumped because: kasan: bad access detected [ 19.922121] [ 19.922149] Memory state around the buggy address: [ 19.922190] fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.922482] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.922668] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.922723] ^ [ 19.922760] fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.923321] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.923373] ================================================================== [ 19.935506] ================================================================== [ 19.935559] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 19.935619] Read of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.936118] [ 19.936276] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.936638] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.936838] Hardware name: linux,dummy-virt (DT) [ 19.937026] Call trace: [ 19.937105] show_stack+0x20/0x38 (C) [ 19.937418] dump_stack_lvl+0x8c/0xd0 [ 19.937586] print_report+0x118/0x608 [ 19.937643] kasan_report+0xdc/0x128 [ 19.937824] __asan_report_load8_noabort+0x20/0x30 [ 19.938143] kasan_atomics_helper+0x3e10/0x4858 [ 19.938439] kasan_atomics+0x198/0x2e0 [ 19.938730] kunit_try_run_case+0x170/0x3f0 [ 19.939058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.939122] kthread+0x328/0x630 [ 19.939166] ret_from_fork+0x10/0x20 [ 19.939216] [ 19.939236] Allocated by task 266: [ 19.939267] kasan_save_stack+0x3c/0x68 [ 19.940052] kasan_save_track+0x20/0x40 [ 19.940108] kasan_save_alloc_info+0x40/0x58 [ 19.940182] __kasan_kmalloc+0xd4/0xd8 [ 19.940241] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.940683] kasan_atomics+0xb8/0x2e0 [ 19.940876] kunit_try_run_case+0x170/0x3f0 [ 19.941167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.941532] kthread+0x328/0x630 [ 19.941588] ret_from_fork+0x10/0x20 [ 19.941626] [ 19.941648] The buggy address belongs to the object at fff00000c57aa700 [ 19.941648] which belongs to the cache kmalloc-64 of size 64 [ 19.941710] The buggy address is located 0 bytes to the right of [ 19.941710] allocated 48-byte region [fff00000c57aa700, fff00000c57aa730) [ 19.941780] [ 19.941802] The buggy address belongs to the physical page: [ 19.941835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.941891] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.942169] page_type: f5(slab) [ 19.942672] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.942761] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.943722] page dumped because: kasan: bad access detected [ 19.943762] [ 19.943784] Memory state around the buggy address: [ 19.944386] fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.944444] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.944499] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.945031] ^ [ 19.945122] fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.945219] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.945337] ================================================================== [ 19.654641] ================================================================== [ 19.654700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 19.655826] Read of size 4 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.656155] [ 19.656213] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.656297] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.656326] Hardware name: linux,dummy-virt (DT) [ 19.656361] Call trace: [ 19.656383] show_stack+0x20/0x38 (C) [ 19.656434] dump_stack_lvl+0x8c/0xd0 [ 19.656488] print_report+0x118/0x608 [ 19.656535] kasan_report+0xdc/0x128 [ 19.656596] __asan_report_load4_noabort+0x20/0x30 [ 19.656645] kasan_atomics_helper+0x3dd8/0x4858 [ 19.656693] kasan_atomics+0x198/0x2e0 [ 19.656741] kunit_try_run_case+0x170/0x3f0 [ 19.656790] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.658051] kthread+0x328/0x630 [ 19.658230] ret_from_fork+0x10/0x20 [ 19.658293] [ 19.658527] Allocated by task 266: [ 19.658674] kasan_save_stack+0x3c/0x68 [ 19.658897] kasan_save_track+0x20/0x40 [ 19.659120] kasan_save_alloc_info+0x40/0x58 [ 19.659202] __kasan_kmalloc+0xd4/0xd8 [ 19.659359] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.659637] kasan_atomics+0xb8/0x2e0 [ 19.659988] kunit_try_run_case+0x170/0x3f0 [ 19.660292] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.660532] kthread+0x328/0x630 [ 19.660760] ret_from_fork+0x10/0x20 [ 19.661113] [ 19.661185] The buggy address belongs to the object at fff00000c57aa700 [ 19.661185] which belongs to the cache kmalloc-64 of size 64 [ 19.661615] The buggy address is located 0 bytes to the right of [ 19.661615] allocated 48-byte region [fff00000c57aa700, fff00000c57aa730) [ 19.661692] [ 19.661947] The buggy address belongs to the physical page: [ 19.661988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.662056] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.662108] page_type: f5(slab) [ 19.662485] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.662935] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.662990] page dumped because: kasan: bad access detected [ 19.663025] [ 19.663610] Memory state around the buggy address: [ 19.663809] fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.664196] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.664259] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.664719] ^ [ 19.664767] fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.664964] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.665059] ================================================================== [ 19.723192] ================================================================== [ 19.723252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 19.723307] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.723359] [ 19.723393] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.723718] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.723762] Hardware name: linux,dummy-virt (DT) [ 19.723824] Call trace: [ 19.723846] show_stack+0x20/0x38 (C) [ 19.724378] dump_stack_lvl+0x8c/0xd0 [ 19.725013] print_report+0x118/0x608 [ 19.725295] kasan_report+0xdc/0x128 [ 19.725348] __asan_report_store8_noabort+0x20/0x30 [ 19.725477] kasan_atomics_helper+0x3e5c/0x4858 [ 19.725703] kasan_atomics+0x198/0x2e0 [ 19.725838] kunit_try_run_case+0x170/0x3f0 [ 19.725916] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.726109] kthread+0x328/0x630 [ 19.726459] ret_from_fork+0x10/0x20 [ 19.726963] [ 19.726991] Allocated by task 266: [ 19.727193] kasan_save_stack+0x3c/0x68 [ 19.727497] kasan_save_track+0x20/0x40 [ 19.727642] kasan_save_alloc_info+0x40/0x58 [ 19.727750] __kasan_kmalloc+0xd4/0xd8 [ 19.727806] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.728074] kasan_atomics+0xb8/0x2e0 [ 19.728163] kunit_try_run_case+0x170/0x3f0 [ 19.728235] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.728369] kthread+0x328/0x630 [ 19.728424] ret_from_fork+0x10/0x20 [ 19.728710] [ 19.728771] The buggy address belongs to the object at fff00000c57aa700 [ 19.728771] which belongs to the cache kmalloc-64 of size 64 [ 19.728857] The buggy address is located 0 bytes to the right of [ 19.728857] allocated 48-byte region [fff00000c57aa700, fff00000c57aa730) [ 19.728927] [ 19.728948] The buggy address belongs to the physical page: [ 19.729194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.729351] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.729440] page_type: f5(slab) [ 19.729692] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.729761] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.729914] page dumped because: kasan: bad access detected [ 19.729952] [ 19.729971] Memory state around the buggy address: [ 19.730051] fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.730124] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.730254] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.730334] ^ [ 19.730436] fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.730622] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.730683] ================================================================== [ 19.424171] ================================================================== [ 19.424237] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 19.424303] Read of size 4 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.424357] [ 19.424396] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.424482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.424512] Hardware name: linux,dummy-virt (DT) [ 19.424546] Call trace: [ 19.424585] show_stack+0x20/0x38 (C) [ 19.427612] kasan_save_stack+0x3c/0x68 [ 19.427668] kasan_save_track+0x20/0x40 [ 19.427709] kasan_save_alloc_info+0x40/0x58 [ 19.427753] __kasan_kmalloc+0xd4/0xd8 [ 19.427793] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.427836] kasan_atomics+0xb8/0x2e0 [ 19.427874] kunit_try_run_case+0x170/0x3f0 [ 19.427913] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.427960] kthread+0x328/0x630 [ 19.428031] [ 19.429802] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.432502] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.435969] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.437421] [ 19.437764] [ 19.437949] ^ [ 19.441653] kasan_check_range+0x100/0x1a8 [ 19.444636] [ 19.445721] kunit_try_run_case+0x170/0x3f0 [ 19.446887] [ 19.447424] page_type: f5(slab) [ 19.448015] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.448112] page dumped because: kasan: bad access detected [ 19.448263] [ 19.448499] Memory state around the buggy address: [ 19.448681] fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.448932] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.448983] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.449027] ^ [ 19.449505] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.450674] ================================================================== [ 19.503085] ================================================================== [ 19.504325] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 19.504887] Call trace: [ 19.505202] __kasan_check_write+0x20/0x30 [ 19.506088] kasan_save_alloc_info+0x40/0x58 [ 19.506409] [ 19.506559] [ 19.506621] The buggy address belongs to the physical page: [ 19.506663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.507166] page dumped because: kasan: bad access detected [ 19.507681] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.507838] fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.508641] Write of size 4 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.508844] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.509165] __kasan_check_write+0x20/0x30 [ 19.509359] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.509935] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.510137] The buggy address is located 0 bytes to the right of [ 19.510137] allocated 48-byte region [fff00000c57aa700, fff00000c57aa730) [ 19.510990] [ 19.511154] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.511200] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.511242] ^ [ 19.511276] fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.511962] Write of size 4 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.512414] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.512631] Hardware name: linux,dummy-virt (DT) [ 19.512770] dump_stack_lvl+0x8c/0xd0 [ 19.513622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.514685] kunit_try_run_case+0x170/0x3f0 [ 19.515466] [ 19.515523] The buggy address belongs to the physical page: [ 19.515716] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.516019] page_type: f5(slab) [ 19.516156] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.516605] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.516890] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.517862] ================================================================== [ 19.579387] ================================================================== [ 19.579449] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 19.579748] Write of size 4 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.579947] [ 19.579982] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.580212] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.580329] Hardware name: linux,dummy-virt (DT) [ 19.580362] Call trace: [ 19.580392] show_stack+0x20/0x38 (C) [ 19.580445] dump_stack_lvl+0x8c/0xd0 [ 19.580494] print_report+0x118/0x608 [ 19.580790] kasan_report+0xdc/0x128 [ 19.581474] kthread+0x328/0x630 [ 19.581618] ret_from_fork+0x10/0x20 [ 19.581676] [ 19.582066] Allocated by task 266: [ 19.582861] ret_from_fork+0x10/0x20 [ 19.583820] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.584595] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.587525] show_stack+0x20/0x38 (C) [ 19.590161] ret_from_fork+0x10/0x20 [ 19.590257] [ 19.590424] Allocated by task 266: [ 19.590508] kasan_save_stack+0x3c/0x68 [ 19.590555] kasan_save_track+0x20/0x40 [ 19.590605] kasan_save_alloc_info+0x40/0x58 [ 19.590648] __kasan_kmalloc+0xd4/0xd8 [ 19.591031] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.591077] kasan_atomics+0xb8/0x2e0 [ 19.591115] kunit_try_run_case+0x170/0x3f0 [ 19.591166] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.591325] kthread+0x328/0x630 [ 19.591427] ret_from_fork+0x10/0x20 [ 19.591494] [ 19.591519] The buggy address belongs to the object at fff00000c57aa700 [ 19.591519] which belongs to the cache kmalloc-64 of size 64 [ 19.591641] The buggy address is located 0 bytes to the right of [ 19.591641] allocated 48-byte region [fff00000c57aa700, fff00000c57aa730) [ 19.591709] [ 19.591731] The buggy address belongs to the physical page: [ 19.592111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.592172] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.592324] page_type: f5(slab) [ 19.592604] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.592684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.592728] page dumped because: kasan: bad access detected [ 19.592967] [ 19.592993] Memory state around the buggy address: [ 19.593132] fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.593310] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.593357] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.593477] ^ [ 19.593522] fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.593585] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.593628] ================================================================== [ 19.904249] ================================================================== [ 19.904309] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 19.904360] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.904421] [ 19.904452] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.905471] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.905519] Hardware name: linux,dummy-virt (DT) [ 19.905553] Call trace: [ 19.905594] show_stack+0x20/0x38 (C) [ 19.905644] dump_stack_lvl+0x8c/0xd0 [ 19.905693] print_report+0x118/0x608 [ 19.906078] kasan_report+0xdc/0x128 [ 19.906137] kasan_check_range+0x100/0x1a8 [ 19.906415] __kasan_check_write+0x20/0x30 [ 19.906476] kasan_atomics_helper+0x1644/0x4858 [ 19.906595] kasan_atomics+0x198/0x2e0 [ 19.906836] kunit_try_run_case+0x170/0x3f0 [ 19.906885] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.907151] kthread+0x328/0x630 [ 19.907220] ret_from_fork+0x10/0x20 [ 19.907934] [ 19.908120] Allocated by task 266: [ 19.908153] kasan_save_stack+0x3c/0x68 [ 19.908778] kasan_save_track+0x20/0x40 [ 19.908890] kasan_save_alloc_info+0x40/0x58 [ 19.909288] __kasan_kmalloc+0xd4/0xd8 [ 19.909377] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.909885] kasan_atomics+0xb8/0x2e0 [ 19.909934] kunit_try_run_case+0x170/0x3f0 [ 19.909998] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.910047] kthread+0x328/0x630 [ 19.910080] ret_from_fork+0x10/0x20 [ 19.910117] [ 19.910140] The buggy address belongs to the object at fff00000c57aa700 [ 19.910140] which belongs to the cache kmalloc-64 of size 64 [ 19.910203] The buggy address is located 0 bytes to the right of [ 19.910203] allocated 48-byte region [fff00000c57aa700, fff00000c57aa730) [ 19.910271] [ 19.910829] The buggy address belongs to the physical page: [ 19.910879] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.911256] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.911492] page_type: f5(slab) [ 19.911614] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.912003] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.912098] page dumped because: kasan: bad access detected [ 19.912147] [ 19.912168] Memory state around the buggy address: [ 19.912361] fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.912613] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.912860] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.912920] ^ [ 19.913020] fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.913193] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.913432] ================================================================== [ 19.770758] ================================================================== [ 19.770957] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 19.771048] Write of size 8 at addr fff00000c57aa730 by task kunit_try_catch/266 [ 19.771102] [ 19.771686] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.771824] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.771906] Hardware name: linux,dummy-virt (DT) [ 19.771983] Call trace: [ 19.772008] show_stack+0x20/0x38 (C) [ 19.772062] dump_stack_lvl+0x8c/0xd0 [ 19.772161] print_report+0x118/0x608 [ 19.772213] kasan_report+0xdc/0x128 [ 19.772288] kasan_check_range+0x100/0x1a8 [ 19.772341] __kasan_check_write+0x20/0x30 [ 19.772387] kasan_atomics_helper+0x10c0/0x4858 [ 19.772580] kasan_atomics+0x198/0x2e0 [ 19.772730] kunit_try_run_case+0x170/0x3f0 [ 19.772789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.772877] kthread+0x328/0x630 [ 19.772925] ret_from_fork+0x10/0x20 [ 19.772973] [ 19.772993] Allocated by task 266: [ 19.773023] kasan_save_stack+0x3c/0x68 [ 19.773067] kasan_save_track+0x20/0x40 [ 19.773107] kasan_save_alloc_info+0x40/0x58 [ 19.773148] __kasan_kmalloc+0xd4/0xd8 [ 19.773208] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.773249] kasan_atomics+0xb8/0x2e0 [ 19.773305] kunit_try_run_case+0x170/0x3f0 [ 19.773863] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.773959] kthread+0x328/0x630 [ 19.774043] ret_from_fork+0x10/0x20 [ 19.774108] [ 19.774201] The buggy address belongs to the object at fff00000c57aa700 [ 19.774201] which belongs to the cache kmalloc-64 of size 64 [ 19.774302] The buggy address is located 0 bytes to the right of [ 19.774302] allocated 48-byte region [fff00000c57aa700, fff00000c57aa730) [ 19.774371] [ 19.774393] The buggy address belongs to the physical page: [ 19.774554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057aa [ 19.774740] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.774866] page_type: f5(slab) [ 19.774942] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.775021] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.775380] page dumped because: kasan: bad access detected [ 19.775423] [ 19.775997] Memory state around the buggy address: [ 19.776282] fff00000c57aa600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.776552] fff00000c57aa680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.776916] >fff00000c57aa700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.777093] ^ [ 19.777177] fff00000c57aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.777227] fff00000c57aa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.777298] ==================================================================
[ 14.902893] ================================================================== [ 14.903237] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 14.903482] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.904107] [ 14.904214] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.904261] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.904285] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.904309] Call Trace: [ 14.904330] <TASK> [ 14.904362] dump_stack_lvl+0x73/0xb0 [ 14.904392] print_report+0xd1/0x650 [ 14.904416] ? __virt_addr_valid+0x1db/0x2d0 [ 14.904450] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.904474] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.904496] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.904530] kasan_report+0x141/0x180 [ 14.904553] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.904579] kasan_check_range+0x10c/0x1c0 [ 14.904613] __kasan_check_write+0x18/0x20 [ 14.904633] kasan_atomics_helper+0x16e7/0x5450 [ 14.904665] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.904698] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.904725] ? trace_hardirqs_on+0x37/0xe0 [ 14.904749] ? kasan_atomics+0x152/0x310 [ 14.904777] kasan_atomics+0x1dc/0x310 [ 14.904800] ? __pfx_kasan_atomics+0x10/0x10 [ 14.904824] ? __pfx_kasan_atomics+0x10/0x10 [ 14.904851] kunit_try_run_case+0x1a5/0x480 [ 14.904877] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.904899] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.904925] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.904948] ? __kthread_parkme+0x82/0x180 [ 14.904970] ? preempt_count_sub+0x50/0x80 [ 14.904995] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.905019] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.905054] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.905077] kthread+0x337/0x6f0 [ 14.905098] ? trace_preempt_on+0x20/0xc0 [ 14.905120] ? __pfx_kthread+0x10/0x10 [ 14.905142] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.905164] ? calculate_sigpending+0x7b/0xa0 [ 14.905189] ? __pfx_kthread+0x10/0x10 [ 14.905211] ret_from_fork+0x116/0x1d0 [ 14.905240] ? __pfx_kthread+0x10/0x10 [ 14.905262] ret_from_fork_asm+0x1a/0x30 [ 14.905294] </TASK> [ 14.905318] [ 14.912497] Allocated by task 282: [ 14.912631] kasan_save_stack+0x45/0x70 [ 14.912834] kasan_save_track+0x18/0x40 [ 14.913047] kasan_save_alloc_info+0x3b/0x50 [ 14.913272] __kasan_kmalloc+0xb7/0xc0 [ 14.913469] __kmalloc_cache_noprof+0x189/0x420 [ 14.913717] kasan_atomics+0x95/0x310 [ 14.913937] kunit_try_run_case+0x1a5/0x480 [ 14.914170] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.914427] kthread+0x337/0x6f0 [ 14.914623] ret_from_fork+0x116/0x1d0 [ 14.914826] ret_from_fork_asm+0x1a/0x30 [ 14.915050] [ 14.915155] The buggy address belongs to the object at ffff8881033c5500 [ 14.915155] which belongs to the cache kmalloc-64 of size 64 [ 14.915543] The buggy address is located 0 bytes to the right of [ 14.915543] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.915910] [ 14.915984] The buggy address belongs to the physical page: [ 14.916230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.916583] flags: 0x200000000000000(node=0|zone=2) [ 14.916991] page_type: f5(slab) [ 14.917189] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.917490] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.917772] page dumped because: kasan: bad access detected [ 14.918030] [ 14.918124] Memory state around the buggy address: [ 14.918313] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.918530] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.919013] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.919341] ^ [ 14.919594] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.919873] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.920137] ================================================================== [ 14.123606] ================================================================== [ 14.124377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 14.124705] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.124971] [ 14.125111] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.125167] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.125180] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.125202] Call Trace: [ 14.125220] <TASK> [ 14.125238] dump_stack_lvl+0x73/0xb0 [ 14.125276] print_report+0xd1/0x650 [ 14.125300] ? __virt_addr_valid+0x1db/0x2d0 [ 14.125324] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.125357] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.125380] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.125403] kasan_report+0x141/0x180 [ 14.125425] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.125451] __asan_report_store4_noabort+0x1b/0x30 [ 14.125473] kasan_atomics_helper+0x4b6e/0x5450 [ 14.125496] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.125518] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.125544] ? trace_hardirqs_on+0x37/0xe0 [ 14.125567] ? kasan_atomics+0x152/0x310 [ 14.125595] kasan_atomics+0x1dc/0x310 [ 14.125618] ? __pfx_kasan_atomics+0x10/0x10 [ 14.125652] ? __pfx_kasan_atomics+0x10/0x10 [ 14.125688] kunit_try_run_case+0x1a5/0x480 [ 14.125713] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.125737] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.125773] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.125796] ? __kthread_parkme+0x82/0x180 [ 14.125818] ? preempt_count_sub+0x50/0x80 [ 14.125842] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.125867] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.125891] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.125914] kthread+0x337/0x6f0 [ 14.125934] ? trace_preempt_on+0x20/0xc0 [ 14.125957] ? __pfx_kthread+0x10/0x10 [ 14.125978] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.126000] ? calculate_sigpending+0x7b/0xa0 [ 14.126033] ? __pfx_kthread+0x10/0x10 [ 14.126054] ret_from_fork+0x116/0x1d0 [ 14.126074] ? __pfx_kthread+0x10/0x10 [ 14.126095] ret_from_fork_asm+0x1a/0x30 [ 14.126126] </TASK> [ 14.126139] [ 14.133487] Allocated by task 282: [ 14.133768] kasan_save_stack+0x45/0x70 [ 14.134001] kasan_save_track+0x18/0x40 [ 14.134175] kasan_save_alloc_info+0x3b/0x50 [ 14.134388] __kasan_kmalloc+0xb7/0xc0 [ 14.134524] __kmalloc_cache_noprof+0x189/0x420 [ 14.134854] kasan_atomics+0x95/0x310 [ 14.135075] kunit_try_run_case+0x1a5/0x480 [ 14.135272] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.135516] kthread+0x337/0x6f0 [ 14.135703] ret_from_fork+0x116/0x1d0 [ 14.135891] ret_from_fork_asm+0x1a/0x30 [ 14.136052] [ 14.136174] The buggy address belongs to the object at ffff8881033c5500 [ 14.136174] which belongs to the cache kmalloc-64 of size 64 [ 14.136640] The buggy address is located 0 bytes to the right of [ 14.136640] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.137075] [ 14.137150] The buggy address belongs to the physical page: [ 14.137323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.137645] flags: 0x200000000000000(node=0|zone=2) [ 14.137877] page_type: f5(slab) [ 14.138054] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.138395] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.138824] page dumped because: kasan: bad access detected [ 14.139186] [ 14.139258] Memory state around the buggy address: [ 14.139417] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.139634] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.139974] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.140331] ^ [ 14.140586] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.140944] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.141202] ================================================================== [ 14.258080] ================================================================== [ 14.258707] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 14.259054] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.259344] [ 14.259459] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.259516] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.259530] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.259553] Call Trace: [ 14.259573] <TASK> [ 14.259594] dump_stack_lvl+0x73/0xb0 [ 14.259623] print_report+0xd1/0x650 [ 14.259659] ? __virt_addr_valid+0x1db/0x2d0 [ 14.259685] ? kasan_atomics_helper+0x697/0x5450 [ 14.259707] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.259730] ? kasan_atomics_helper+0x697/0x5450 [ 14.259754] kasan_report+0x141/0x180 [ 14.259776] ? kasan_atomics_helper+0x697/0x5450 [ 14.259803] kasan_check_range+0x10c/0x1c0 [ 14.259829] __kasan_check_write+0x18/0x20 [ 14.259859] kasan_atomics_helper+0x697/0x5450 [ 14.259883] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.259906] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.259944] ? trace_hardirqs_on+0x37/0xe0 [ 14.259968] ? kasan_atomics+0x152/0x310 [ 14.259995] kasan_atomics+0x1dc/0x310 [ 14.260018] ? __pfx_kasan_atomics+0x10/0x10 [ 14.260052] ? __pfx_kasan_atomics+0x10/0x10 [ 14.260078] kunit_try_run_case+0x1a5/0x480 [ 14.260102] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.260125] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.260153] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.260176] ? __kthread_parkme+0x82/0x180 [ 14.260197] ? preempt_count_sub+0x50/0x80 [ 14.260222] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.260246] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.260269] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.260292] kthread+0x337/0x6f0 [ 14.260312] ? trace_preempt_on+0x20/0xc0 [ 14.260335] ? __pfx_kthread+0x10/0x10 [ 14.260356] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.260378] ? calculate_sigpending+0x7b/0xa0 [ 14.260401] ? __pfx_kthread+0x10/0x10 [ 14.260423] ret_from_fork+0x116/0x1d0 [ 14.260442] ? __pfx_kthread+0x10/0x10 [ 14.260464] ret_from_fork_asm+0x1a/0x30 [ 14.260504] </TASK> [ 14.260517] [ 14.268064] Allocated by task 282: [ 14.268270] kasan_save_stack+0x45/0x70 [ 14.268485] kasan_save_track+0x18/0x40 [ 14.268696] kasan_save_alloc_info+0x3b/0x50 [ 14.269006] __kasan_kmalloc+0xb7/0xc0 [ 14.269165] __kmalloc_cache_noprof+0x189/0x420 [ 14.269389] kasan_atomics+0x95/0x310 [ 14.269603] kunit_try_run_case+0x1a5/0x480 [ 14.269805] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.270074] kthread+0x337/0x6f0 [ 14.270253] ret_from_fork+0x116/0x1d0 [ 14.270430] ret_from_fork_asm+0x1a/0x30 [ 14.270572] [ 14.270654] The buggy address belongs to the object at ffff8881033c5500 [ 14.270654] which belongs to the cache kmalloc-64 of size 64 [ 14.271204] The buggy address is located 0 bytes to the right of [ 14.271204] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.271660] [ 14.271772] The buggy address belongs to the physical page: [ 14.272052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.272401] flags: 0x200000000000000(node=0|zone=2) [ 14.272651] page_type: f5(slab) [ 14.272804] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.273143] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.273483] page dumped because: kasan: bad access detected [ 14.273736] [ 14.273808] Memory state around the buggy address: [ 14.273964] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.274192] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.274409] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.274623] ^ [ 14.274796] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.275154] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.275469] ================================================================== [ 15.264906] ================================================================== [ 15.265284] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 15.265675] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 15.266010] [ 15.266138] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.266182] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.266196] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.266220] Call Trace: [ 15.266241] <TASK> [ 15.266261] dump_stack_lvl+0x73/0xb0 [ 15.266292] print_report+0xd1/0x650 [ 15.266314] ? __virt_addr_valid+0x1db/0x2d0 [ 15.266340] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.266362] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.266384] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.266407] kasan_report+0x141/0x180 [ 15.266429] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.266456] kasan_check_range+0x10c/0x1c0 [ 15.266481] __kasan_check_write+0x18/0x20 [ 15.266502] kasan_atomics_helper+0x20c8/0x5450 [ 15.266525] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.266547] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.266573] ? trace_hardirqs_on+0x37/0xe0 [ 15.266596] ? kasan_atomics+0x152/0x310 [ 15.266643] kasan_atomics+0x1dc/0x310 [ 15.266667] ? __pfx_kasan_atomics+0x10/0x10 [ 15.266691] ? __pfx_kasan_atomics+0x10/0x10 [ 15.266718] kunit_try_run_case+0x1a5/0x480 [ 15.266744] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.266767] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.266792] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.266815] ? __kthread_parkme+0x82/0x180 [ 15.266836] ? preempt_count_sub+0x50/0x80 [ 15.266861] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.266885] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.266909] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.266933] kthread+0x337/0x6f0 [ 15.266955] ? trace_preempt_on+0x20/0xc0 [ 15.266978] ? __pfx_kthread+0x10/0x10 [ 15.266998] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.267031] ? calculate_sigpending+0x7b/0xa0 [ 15.267056] ? __pfx_kthread+0x10/0x10 [ 15.267077] ret_from_fork+0x116/0x1d0 [ 15.267096] ? __pfx_kthread+0x10/0x10 [ 15.267117] ret_from_fork_asm+0x1a/0x30 [ 15.267147] </TASK> [ 15.267160] [ 15.274282] Allocated by task 282: [ 15.274412] kasan_save_stack+0x45/0x70 [ 15.274611] kasan_save_track+0x18/0x40 [ 15.274822] kasan_save_alloc_info+0x3b/0x50 [ 15.275041] __kasan_kmalloc+0xb7/0xc0 [ 15.275223] __kmalloc_cache_noprof+0x189/0x420 [ 15.275442] kasan_atomics+0x95/0x310 [ 15.275645] kunit_try_run_case+0x1a5/0x480 [ 15.275851] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.276109] kthread+0x337/0x6f0 [ 15.276280] ret_from_fork+0x116/0x1d0 [ 15.276468] ret_from_fork_asm+0x1a/0x30 [ 15.276676] [ 15.276752] The buggy address belongs to the object at ffff8881033c5500 [ 15.276752] which belongs to the cache kmalloc-64 of size 64 [ 15.277200] The buggy address is located 0 bytes to the right of [ 15.277200] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 15.277564] [ 15.277691] The buggy address belongs to the physical page: [ 15.277950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 15.278332] flags: 0x200000000000000(node=0|zone=2) [ 15.278572] page_type: f5(slab) [ 15.278720] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.279069] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.279378] page dumped because: kasan: bad access detected [ 15.279596] [ 15.279709] Memory state around the buggy address: [ 15.279903] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.280188] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.280500] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.280781] ^ [ 15.281006] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.281297] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.281561] ================================================================== [ 14.796015] ================================================================== [ 14.796426] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 14.796953] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.797275] [ 14.797384] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.797429] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.797442] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.797464] Call Trace: [ 14.797482] <TASK> [ 14.797498] dump_stack_lvl+0x73/0xb0 [ 14.797528] print_report+0xd1/0x650 [ 14.797553] ? __virt_addr_valid+0x1db/0x2d0 [ 14.797578] ? kasan_atomics_helper+0x1467/0x5450 [ 14.797600] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.797623] ? kasan_atomics_helper+0x1467/0x5450 [ 14.797646] kasan_report+0x141/0x180 [ 14.797670] ? kasan_atomics_helper+0x1467/0x5450 [ 14.797697] kasan_check_range+0x10c/0x1c0 [ 14.797721] __kasan_check_write+0x18/0x20 [ 14.797741] kasan_atomics_helper+0x1467/0x5450 [ 14.797764] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.797787] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.797813] ? trace_hardirqs_on+0x37/0xe0 [ 14.797838] ? kasan_atomics+0x152/0x310 [ 14.797865] kasan_atomics+0x1dc/0x310 [ 14.797890] ? __pfx_kasan_atomics+0x10/0x10 [ 14.797914] ? __pfx_kasan_atomics+0x10/0x10 [ 14.797942] kunit_try_run_case+0x1a5/0x480 [ 14.797967] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.797990] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.798015] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.798048] ? __kthread_parkme+0x82/0x180 [ 14.798071] ? preempt_count_sub+0x50/0x80 [ 14.798096] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.798120] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.798143] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.798167] kthread+0x337/0x6f0 [ 14.798187] ? trace_preempt_on+0x20/0xc0 [ 14.798208] ? __pfx_kthread+0x10/0x10 [ 14.798230] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.798251] ? calculate_sigpending+0x7b/0xa0 [ 14.798277] ? __pfx_kthread+0x10/0x10 [ 14.798298] ret_from_fork+0x116/0x1d0 [ 14.798317] ? __pfx_kthread+0x10/0x10 [ 14.798338] ret_from_fork_asm+0x1a/0x30 [ 14.798370] </TASK> [ 14.798382] [ 14.805882] Allocated by task 282: [ 14.806044] kasan_save_stack+0x45/0x70 [ 14.806773] kasan_save_track+0x18/0x40 [ 14.807178] kasan_save_alloc_info+0x3b/0x50 [ 14.807553] __kasan_kmalloc+0xb7/0xc0 [ 14.808014] __kmalloc_cache_noprof+0x189/0x420 [ 14.808489] kasan_atomics+0x95/0x310 [ 14.808914] kunit_try_run_case+0x1a5/0x480 [ 14.809360] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.809899] kthread+0x337/0x6f0 [ 14.810226] ret_from_fork+0x116/0x1d0 [ 14.810580] ret_from_fork_asm+0x1a/0x30 [ 14.810948] [ 14.811127] The buggy address belongs to the object at ffff8881033c5500 [ 14.811127] which belongs to the cache kmalloc-64 of size 64 [ 14.812313] The buggy address is located 0 bytes to the right of [ 14.812313] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.813419] [ 14.813606] The buggy address belongs to the physical page: [ 14.814125] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.814854] flags: 0x200000000000000(node=0|zone=2) [ 14.815323] page_type: f5(slab) [ 14.815611] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.816401] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.817238] page dumped because: kasan: bad access detected [ 14.817761] [ 14.817926] Memory state around the buggy address: [ 14.818193] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.818415] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.818631] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.819265] ^ [ 14.819687] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.820356] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.821007] ================================================================== [ 14.559868] ================================================================== [ 14.560288] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 14.560777] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.561168] [ 14.561292] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.561337] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.561351] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.561373] Call Trace: [ 14.561402] <TASK> [ 14.561421] dump_stack_lvl+0x73/0xb0 [ 14.561450] print_report+0xd1/0x650 [ 14.561486] ? __virt_addr_valid+0x1db/0x2d0 [ 14.561512] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.561533] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.561555] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.561577] kasan_report+0x141/0x180 [ 14.561600] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.561626] kasan_check_range+0x10c/0x1c0 [ 14.561663] __kasan_check_write+0x18/0x20 [ 14.561683] kasan_atomics_helper+0xfa9/0x5450 [ 14.561706] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.561729] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.561754] ? trace_hardirqs_on+0x37/0xe0 [ 14.561778] ? kasan_atomics+0x152/0x310 [ 14.561806] kasan_atomics+0x1dc/0x310 [ 14.561829] ? __pfx_kasan_atomics+0x10/0x10 [ 14.561853] ? __pfx_kasan_atomics+0x10/0x10 [ 14.561879] kunit_try_run_case+0x1a5/0x480 [ 14.561905] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.561938] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.561963] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.561986] ? __kthread_parkme+0x82/0x180 [ 14.562018] ? preempt_count_sub+0x50/0x80 [ 14.562051] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.562076] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.562099] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.562123] kthread+0x337/0x6f0 [ 14.562143] ? trace_preempt_on+0x20/0xc0 [ 14.562165] ? __pfx_kthread+0x10/0x10 [ 14.562186] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.562208] ? calculate_sigpending+0x7b/0xa0 [ 14.562232] ? __pfx_kthread+0x10/0x10 [ 14.562255] ret_from_fork+0x116/0x1d0 [ 14.562275] ? __pfx_kthread+0x10/0x10 [ 14.562301] ret_from_fork_asm+0x1a/0x30 [ 14.562333] </TASK> [ 14.562346] [ 14.570050] Allocated by task 282: [ 14.570239] kasan_save_stack+0x45/0x70 [ 14.570416] kasan_save_track+0x18/0x40 [ 14.570633] kasan_save_alloc_info+0x3b/0x50 [ 14.570820] __kasan_kmalloc+0xb7/0xc0 [ 14.571035] __kmalloc_cache_noprof+0x189/0x420 [ 14.571256] kasan_atomics+0x95/0x310 [ 14.571441] kunit_try_run_case+0x1a5/0x480 [ 14.571648] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.571965] kthread+0x337/0x6f0 [ 14.572166] ret_from_fork+0x116/0x1d0 [ 14.572305] ret_from_fork_asm+0x1a/0x30 [ 14.572448] [ 14.572525] The buggy address belongs to the object at ffff8881033c5500 [ 14.572525] which belongs to the cache kmalloc-64 of size 64 [ 14.573098] The buggy address is located 0 bytes to the right of [ 14.573098] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.573572] [ 14.573693] The buggy address belongs to the physical page: [ 14.573954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.574303] flags: 0x200000000000000(node=0|zone=2) [ 14.574541] page_type: f5(slab) [ 14.574750] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.575090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.575340] page dumped because: kasan: bad access detected [ 14.575512] [ 14.575583] Memory state around the buggy address: [ 14.575738] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.575954] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.576443] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.576889] ^ [ 14.577124] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.577375] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.577587] ================================================================== [ 14.141861] ================================================================== [ 14.142217] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 14.142510] Read of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.143258] [ 14.143397] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.143445] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.143458] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.143482] Call Trace: [ 14.143498] <TASK> [ 14.143515] dump_stack_lvl+0x73/0xb0 [ 14.143546] print_report+0xd1/0x650 [ 14.143581] ? __virt_addr_valid+0x1db/0x2d0 [ 14.143605] ? kasan_atomics_helper+0x3df/0x5450 [ 14.143627] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.143661] ? kasan_atomics_helper+0x3df/0x5450 [ 14.143684] kasan_report+0x141/0x180 [ 14.143706] ? kasan_atomics_helper+0x3df/0x5450 [ 14.143744] kasan_check_range+0x10c/0x1c0 [ 14.143768] __kasan_check_read+0x15/0x20 [ 14.143788] kasan_atomics_helper+0x3df/0x5450 [ 14.143821] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.143844] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.143870] ? trace_hardirqs_on+0x37/0xe0 [ 14.143893] ? kasan_atomics+0x152/0x310 [ 14.143920] kasan_atomics+0x1dc/0x310 [ 14.143952] ? __pfx_kasan_atomics+0x10/0x10 [ 14.143977] ? __pfx_kasan_atomics+0x10/0x10 [ 14.144003] kunit_try_run_case+0x1a5/0x480 [ 14.144049] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.144073] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.144098] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.144122] ? __kthread_parkme+0x82/0x180 [ 14.144150] ? preempt_count_sub+0x50/0x80 [ 14.144175] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.144199] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.144223] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.144246] kthread+0x337/0x6f0 [ 14.144267] ? trace_preempt_on+0x20/0xc0 [ 14.144289] ? __pfx_kthread+0x10/0x10 [ 14.144311] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.144333] ? calculate_sigpending+0x7b/0xa0 [ 14.144366] ? __pfx_kthread+0x10/0x10 [ 14.144389] ret_from_fork+0x116/0x1d0 [ 14.144409] ? __pfx_kthread+0x10/0x10 [ 14.144441] ret_from_fork_asm+0x1a/0x30 [ 14.144472] </TASK> [ 14.144485] [ 14.152378] Allocated by task 282: [ 14.152514] kasan_save_stack+0x45/0x70 [ 14.152679] kasan_save_track+0x18/0x40 [ 14.152902] kasan_save_alloc_info+0x3b/0x50 [ 14.153125] __kasan_kmalloc+0xb7/0xc0 [ 14.153316] __kmalloc_cache_noprof+0x189/0x420 [ 14.153556] kasan_atomics+0x95/0x310 [ 14.153784] kunit_try_run_case+0x1a5/0x480 [ 14.153932] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.154120] kthread+0x337/0x6f0 [ 14.154242] ret_from_fork+0x116/0x1d0 [ 14.154375] ret_from_fork_asm+0x1a/0x30 [ 14.154556] [ 14.154653] The buggy address belongs to the object at ffff8881033c5500 [ 14.154653] which belongs to the cache kmalloc-64 of size 64 [ 14.155189] The buggy address is located 0 bytes to the right of [ 14.155189] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.155800] [ 14.155904] The buggy address belongs to the physical page: [ 14.156197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.156552] flags: 0x200000000000000(node=0|zone=2) [ 14.156721] page_type: f5(slab) [ 14.156846] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.157406] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.157811] page dumped because: kasan: bad access detected [ 14.158040] [ 14.158115] Memory state around the buggy address: [ 14.158343] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.158674] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.158969] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.159282] ^ [ 14.159509] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.159853] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.160177] ================================================================== [ 14.105047] ================================================================== [ 14.105422] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 14.105823] Read of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.106325] [ 14.106456] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.106500] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.106512] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.106534] Call Trace: [ 14.106556] <TASK> [ 14.106574] dump_stack_lvl+0x73/0xb0 [ 14.106604] print_report+0xd1/0x650 [ 14.106648] ? __virt_addr_valid+0x1db/0x2d0 [ 14.106671] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.106692] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.106712] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.106742] kasan_report+0x141/0x180 [ 14.106764] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.106789] __asan_report_load4_noabort+0x18/0x20 [ 14.106822] kasan_atomics_helper+0x4b88/0x5450 [ 14.106845] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.106866] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.106889] ? trace_hardirqs_on+0x37/0xe0 [ 14.106912] ? kasan_atomics+0x152/0x310 [ 14.106938] kasan_atomics+0x1dc/0x310 [ 14.106961] ? __pfx_kasan_atomics+0x10/0x10 [ 14.106983] ? __pfx_kasan_atomics+0x10/0x10 [ 14.107009] kunit_try_run_case+0x1a5/0x480 [ 14.107046] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.107068] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.107091] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.107123] ? __kthread_parkme+0x82/0x180 [ 14.107143] ? preempt_count_sub+0x50/0x80 [ 14.107166] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.107199] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.107221] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.107245] kthread+0x337/0x6f0 [ 14.107264] ? trace_preempt_on+0x20/0xc0 [ 14.107286] ? __pfx_kthread+0x10/0x10 [ 14.107306] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.107326] ? calculate_sigpending+0x7b/0xa0 [ 14.107349] ? __pfx_kthread+0x10/0x10 [ 14.107369] ret_from_fork+0x116/0x1d0 [ 14.107388] ? __pfx_kthread+0x10/0x10 [ 14.107408] ret_from_fork_asm+0x1a/0x30 [ 14.107439] </TASK> [ 14.107450] [ 14.114997] Allocated by task 282: [ 14.115186] kasan_save_stack+0x45/0x70 [ 14.115387] kasan_save_track+0x18/0x40 [ 14.115581] kasan_save_alloc_info+0x3b/0x50 [ 14.115822] __kasan_kmalloc+0xb7/0xc0 [ 14.116016] __kmalloc_cache_noprof+0x189/0x420 [ 14.116189] kasan_atomics+0x95/0x310 [ 14.116342] kunit_try_run_case+0x1a5/0x480 [ 14.116552] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.116796] kthread+0x337/0x6f0 [ 14.117138] ret_from_fork+0x116/0x1d0 [ 14.117302] ret_from_fork_asm+0x1a/0x30 [ 14.117464] [ 14.117580] The buggy address belongs to the object at ffff8881033c5500 [ 14.117580] which belongs to the cache kmalloc-64 of size 64 [ 14.118126] The buggy address is located 0 bytes to the right of [ 14.118126] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.118605] [ 14.118675] The buggy address belongs to the physical page: [ 14.118840] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.119125] flags: 0x200000000000000(node=0|zone=2) [ 14.119392] page_type: f5(slab) [ 14.119554] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.120151] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.120371] page dumped because: kasan: bad access detected [ 14.120537] [ 14.120649] Memory state around the buggy address: [ 14.120887] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.121397] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.121799] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.122163] ^ [ 14.122387] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.122729] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.122951] ================================================================== [ 14.315081] ================================================================== [ 14.315412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 14.315638] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.316356] [ 14.316544] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.316619] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.316632] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.316667] Call Trace: [ 14.316684] <TASK> [ 14.316702] dump_stack_lvl+0x73/0xb0 [ 14.316733] print_report+0xd1/0x650 [ 14.316756] ? __virt_addr_valid+0x1db/0x2d0 [ 14.316780] ? kasan_atomics_helper+0x860/0x5450 [ 14.316802] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.316825] ? kasan_atomics_helper+0x860/0x5450 [ 14.316847] kasan_report+0x141/0x180 [ 14.316870] ? kasan_atomics_helper+0x860/0x5450 [ 14.316897] kasan_check_range+0x10c/0x1c0 [ 14.316921] __kasan_check_write+0x18/0x20 [ 14.316941] kasan_atomics_helper+0x860/0x5450 [ 14.316964] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.316986] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.317013] ? trace_hardirqs_on+0x37/0xe0 [ 14.317047] ? kasan_atomics+0x152/0x310 [ 14.317075] kasan_atomics+0x1dc/0x310 [ 14.317098] ? __pfx_kasan_atomics+0x10/0x10 [ 14.317123] ? __pfx_kasan_atomics+0x10/0x10 [ 14.317150] kunit_try_run_case+0x1a5/0x480 [ 14.317175] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.317199] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.317224] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.317247] ? __kthread_parkme+0x82/0x180 [ 14.317270] ? preempt_count_sub+0x50/0x80 [ 14.317294] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.317319] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.317342] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.317366] kthread+0x337/0x6f0 [ 14.317385] ? trace_preempt_on+0x20/0xc0 [ 14.317407] ? __pfx_kthread+0x10/0x10 [ 14.317429] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.317480] ? calculate_sigpending+0x7b/0xa0 [ 14.317505] ? __pfx_kthread+0x10/0x10 [ 14.317554] ret_from_fork+0x116/0x1d0 [ 14.317588] ? __pfx_kthread+0x10/0x10 [ 14.317622] ret_from_fork_asm+0x1a/0x30 [ 14.317654] </TASK> [ 14.317667] [ 14.326099] Allocated by task 282: [ 14.326290] kasan_save_stack+0x45/0x70 [ 14.326524] kasan_save_track+0x18/0x40 [ 14.326787] kasan_save_alloc_info+0x3b/0x50 [ 14.327065] __kasan_kmalloc+0xb7/0xc0 [ 14.327257] __kmalloc_cache_noprof+0x189/0x420 [ 14.327514] kasan_atomics+0x95/0x310 [ 14.327659] kunit_try_run_case+0x1a5/0x480 [ 14.327942] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.328250] kthread+0x337/0x6f0 [ 14.328442] ret_from_fork+0x116/0x1d0 [ 14.328644] ret_from_fork_asm+0x1a/0x30 [ 14.328859] [ 14.328976] The buggy address belongs to the object at ffff8881033c5500 [ 14.328976] which belongs to the cache kmalloc-64 of size 64 [ 14.329354] The buggy address is located 0 bytes to the right of [ 14.329354] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.329880] [ 14.329992] The buggy address belongs to the physical page: [ 14.330244] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.330628] flags: 0x200000000000000(node=0|zone=2) [ 14.330836] page_type: f5(slab) [ 14.330959] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.331290] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.331696] page dumped because: kasan: bad access detected [ 14.331980] [ 14.332067] Memory state around the buggy address: [ 14.332228] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.332467] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.333087] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.333430] ^ [ 14.333653] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.333994] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.334315] ================================================================== [ 14.492844] ================================================================== [ 14.493256] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 14.494102] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.494934] [ 14.495099] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.495270] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.495289] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.495314] Call Trace: [ 14.495348] <TASK> [ 14.495369] dump_stack_lvl+0x73/0xb0 [ 14.495438] print_report+0xd1/0x650 [ 14.495465] ? __virt_addr_valid+0x1db/0x2d0 [ 14.495491] ? kasan_atomics_helper+0xde0/0x5450 [ 14.495513] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.495536] ? kasan_atomics_helper+0xde0/0x5450 [ 14.495558] kasan_report+0x141/0x180 [ 14.495581] ? kasan_atomics_helper+0xde0/0x5450 [ 14.495609] kasan_check_range+0x10c/0x1c0 [ 14.495633] __kasan_check_write+0x18/0x20 [ 14.495654] kasan_atomics_helper+0xde0/0x5450 [ 14.495679] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.495705] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.495731] ? trace_hardirqs_on+0x37/0xe0 [ 14.495757] ? kasan_atomics+0x152/0x310 [ 14.495784] kasan_atomics+0x1dc/0x310 [ 14.495808] ? __pfx_kasan_atomics+0x10/0x10 [ 14.495832] ? __pfx_kasan_atomics+0x10/0x10 [ 14.495860] kunit_try_run_case+0x1a5/0x480 [ 14.495885] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.495908] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.495933] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.495957] ? __kthread_parkme+0x82/0x180 [ 14.495978] ? preempt_count_sub+0x50/0x80 [ 14.496003] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.496038] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.496064] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.496088] kthread+0x337/0x6f0 [ 14.496108] ? trace_preempt_on+0x20/0xc0 [ 14.496130] ? __pfx_kthread+0x10/0x10 [ 14.496155] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.496178] ? calculate_sigpending+0x7b/0xa0 [ 14.496204] ? __pfx_kthread+0x10/0x10 [ 14.496226] ret_from_fork+0x116/0x1d0 [ 14.496246] ? __pfx_kthread+0x10/0x10 [ 14.496267] ret_from_fork_asm+0x1a/0x30 [ 14.496299] </TASK> [ 14.496312] [ 14.509008] Allocated by task 282: [ 14.509383] kasan_save_stack+0x45/0x70 [ 14.509742] kasan_save_track+0x18/0x40 [ 14.509934] kasan_save_alloc_info+0x3b/0x50 [ 14.510146] __kasan_kmalloc+0xb7/0xc0 [ 14.510323] __kmalloc_cache_noprof+0x189/0x420 [ 14.510529] kasan_atomics+0x95/0x310 [ 14.510987] kunit_try_run_case+0x1a5/0x480 [ 14.511393] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.511829] kthread+0x337/0x6f0 [ 14.512133] ret_from_fork+0x116/0x1d0 [ 14.512479] ret_from_fork_asm+0x1a/0x30 [ 14.512869] [ 14.512983] The buggy address belongs to the object at ffff8881033c5500 [ 14.512983] which belongs to the cache kmalloc-64 of size 64 [ 14.513634] The buggy address is located 0 bytes to the right of [ 14.513634] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.514139] [ 14.514234] The buggy address belongs to the physical page: [ 14.514467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.515242] flags: 0x200000000000000(node=0|zone=2) [ 14.515558] page_type: f5(slab) [ 14.515975] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.516451] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.517283] page dumped because: kasan: bad access detected [ 14.517738] [ 14.517971] Memory state around the buggy address: [ 14.518406] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.519095] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.519598] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.520118] ^ [ 14.520336] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.520632] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.520920] ================================================================== [ 14.750682] ================================================================== [ 14.751166] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 14.751448] Read of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.751924] [ 14.752039] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.752085] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.752098] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.752120] Call Trace: [ 14.752136] <TASK> [ 14.752158] dump_stack_lvl+0x73/0xb0 [ 14.752187] print_report+0xd1/0x650 [ 14.752210] ? __virt_addr_valid+0x1db/0x2d0 [ 14.752235] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.752256] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.752279] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.752302] kasan_report+0x141/0x180 [ 14.752324] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.752350] kasan_check_range+0x10c/0x1c0 [ 14.752374] __kasan_check_read+0x15/0x20 [ 14.752395] kasan_atomics_helper+0x13b5/0x5450 [ 14.752418] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.752440] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.752464] ? trace_hardirqs_on+0x37/0xe0 [ 14.752488] ? kasan_atomics+0x152/0x310 [ 14.752514] kasan_atomics+0x1dc/0x310 [ 14.752537] ? __pfx_kasan_atomics+0x10/0x10 [ 14.752561] ? __pfx_kasan_atomics+0x10/0x10 [ 14.752588] kunit_try_run_case+0x1a5/0x480 [ 14.752612] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.752635] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.752670] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.752694] ? __kthread_parkme+0x82/0x180 [ 14.752714] ? preempt_count_sub+0x50/0x80 [ 14.752738] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.752762] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.752787] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.752812] kthread+0x337/0x6f0 [ 14.752834] ? trace_preempt_on+0x20/0xc0 [ 14.752857] ? __pfx_kthread+0x10/0x10 [ 14.752879] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.752901] ? calculate_sigpending+0x7b/0xa0 [ 14.752925] ? __pfx_kthread+0x10/0x10 [ 14.752947] ret_from_fork+0x116/0x1d0 [ 14.752967] ? __pfx_kthread+0x10/0x10 [ 14.752989] ret_from_fork_asm+0x1a/0x30 [ 14.753030] </TASK> [ 14.753044] [ 14.760488] Allocated by task 282: [ 14.760652] kasan_save_stack+0x45/0x70 [ 14.760858] kasan_save_track+0x18/0x40 [ 14.761063] kasan_save_alloc_info+0x3b/0x50 [ 14.761277] __kasan_kmalloc+0xb7/0xc0 [ 14.761469] __kmalloc_cache_noprof+0x189/0x420 [ 14.761757] kasan_atomics+0x95/0x310 [ 14.761947] kunit_try_run_case+0x1a5/0x480 [ 14.762108] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.762283] kthread+0x337/0x6f0 [ 14.762404] ret_from_fork+0x116/0x1d0 [ 14.762536] ret_from_fork_asm+0x1a/0x30 [ 14.762675] [ 14.762746] The buggy address belongs to the object at ffff8881033c5500 [ 14.762746] which belongs to the cache kmalloc-64 of size 64 [ 14.763271] The buggy address is located 0 bytes to the right of [ 14.763271] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.763813] [ 14.763910] The buggy address belongs to the physical page: [ 14.764203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.764445] flags: 0x200000000000000(node=0|zone=2) [ 14.764612] page_type: f5(slab) [ 14.764966] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.765327] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.765654] page dumped because: kasan: bad access detected [ 14.765874] [ 14.765952] Memory state around the buggy address: [ 14.766127] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.766343] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.766632] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.766960] ^ [ 14.767199] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.767531] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.767837] ================================================================== [ 14.920772] ================================================================== [ 14.921132] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 14.921662] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.921934] [ 14.922038] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.922083] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.922096] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.922118] Call Trace: [ 14.922135] <TASK> [ 14.922153] dump_stack_lvl+0x73/0xb0 [ 14.922194] print_report+0xd1/0x650 [ 14.922216] ? __virt_addr_valid+0x1db/0x2d0 [ 14.922252] ? kasan_atomics_helper+0x177f/0x5450 [ 14.922274] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.922297] ? kasan_atomics_helper+0x177f/0x5450 [ 14.922319] kasan_report+0x141/0x180 [ 14.922351] ? kasan_atomics_helper+0x177f/0x5450 [ 14.922379] kasan_check_range+0x10c/0x1c0 [ 14.922403] __kasan_check_write+0x18/0x20 [ 14.922433] kasan_atomics_helper+0x177f/0x5450 [ 14.922457] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.922479] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.922514] ? trace_hardirqs_on+0x37/0xe0 [ 14.922538] ? kasan_atomics+0x152/0x310 [ 14.922576] kasan_atomics+0x1dc/0x310 [ 14.922600] ? __pfx_kasan_atomics+0x10/0x10 [ 14.922624] ? __pfx_kasan_atomics+0x10/0x10 [ 14.922660] kunit_try_run_case+0x1a5/0x480 [ 14.922693] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.922716] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.922740] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.922775] ? __kthread_parkme+0x82/0x180 [ 14.922797] ? preempt_count_sub+0x50/0x80 [ 14.922821] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.922855] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.922879] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.922903] kthread+0x337/0x6f0 [ 14.922934] ? trace_preempt_on+0x20/0xc0 [ 14.922957] ? __pfx_kthread+0x10/0x10 [ 14.922978] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.923007] ? calculate_sigpending+0x7b/0xa0 [ 14.923041] ? __pfx_kthread+0x10/0x10 [ 14.923063] ret_from_fork+0x116/0x1d0 [ 14.923093] ? __pfx_kthread+0x10/0x10 [ 14.923114] ret_from_fork_asm+0x1a/0x30 [ 14.923146] </TASK> [ 14.923158] [ 14.932413] Allocated by task 282: [ 14.932566] kasan_save_stack+0x45/0x70 [ 14.932935] kasan_save_track+0x18/0x40 [ 14.933338] kasan_save_alloc_info+0x3b/0x50 [ 14.933770] __kasan_kmalloc+0xb7/0xc0 [ 14.934172] __kmalloc_cache_noprof+0x189/0x420 [ 14.934595] kasan_atomics+0x95/0x310 [ 14.934998] kunit_try_run_case+0x1a5/0x480 [ 14.935402] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.935922] kthread+0x337/0x6f0 [ 14.936091] ret_from_fork+0x116/0x1d0 [ 14.936470] ret_from_fork_asm+0x1a/0x30 [ 14.936824] [ 14.936966] The buggy address belongs to the object at ffff8881033c5500 [ 14.936966] which belongs to the cache kmalloc-64 of size 64 [ 14.937625] The buggy address is located 0 bytes to the right of [ 14.937625] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.938753] [ 14.938947] The buggy address belongs to the physical page: [ 14.939291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.939534] flags: 0x200000000000000(node=0|zone=2) [ 14.939740] page_type: f5(slab) [ 14.940077] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.940761] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.941407] page dumped because: kasan: bad access detected [ 14.941894] [ 14.942070] Memory state around the buggy address: [ 14.942513] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.943237] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.943623] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.944274] ^ [ 14.944722] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.945153] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.945368] ================================================================== [ 15.342863] ================================================================== [ 15.343551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 15.343938] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 15.344461] [ 15.344704] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.344755] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.344790] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.344813] Call Trace: [ 15.344833] <TASK> [ 15.344851] dump_stack_lvl+0x73/0xb0 [ 15.344882] print_report+0xd1/0x650 [ 15.344906] ? __virt_addr_valid+0x1db/0x2d0 [ 15.344931] ? kasan_atomics_helper+0x224c/0x5450 [ 15.344954] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.344977] ? kasan_atomics_helper+0x224c/0x5450 [ 15.345000] kasan_report+0x141/0x180 [ 15.345034] ? kasan_atomics_helper+0x224c/0x5450 [ 15.345062] kasan_check_range+0x10c/0x1c0 [ 15.345086] __kasan_check_write+0x18/0x20 [ 15.345109] kasan_atomics_helper+0x224c/0x5450 [ 15.345134] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.345157] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.345182] ? trace_hardirqs_on+0x37/0xe0 [ 15.345206] ? kasan_atomics+0x152/0x310 [ 15.345233] kasan_atomics+0x1dc/0x310 [ 15.345257] ? __pfx_kasan_atomics+0x10/0x10 [ 15.345280] ? __pfx_kasan_atomics+0x10/0x10 [ 15.345308] kunit_try_run_case+0x1a5/0x480 [ 15.345332] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.345355] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.345380] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.345405] ? __kthread_parkme+0x82/0x180 [ 15.345426] ? preempt_count_sub+0x50/0x80 [ 15.345451] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.345476] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.345500] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.345524] kthread+0x337/0x6f0 [ 15.345543] ? trace_preempt_on+0x20/0xc0 [ 15.345566] ? __pfx_kthread+0x10/0x10 [ 15.345587] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.345608] ? calculate_sigpending+0x7b/0xa0 [ 15.345640] ? __pfx_kthread+0x10/0x10 [ 15.345662] ret_from_fork+0x116/0x1d0 [ 15.345681] ? __pfx_kthread+0x10/0x10 [ 15.345703] ret_from_fork_asm+0x1a/0x30 [ 15.345734] </TASK> [ 15.345746] [ 15.353068] Allocated by task 282: [ 15.353203] kasan_save_stack+0x45/0x70 [ 15.353479] kasan_save_track+0x18/0x40 [ 15.353705] kasan_save_alloc_info+0x3b/0x50 [ 15.353920] __kasan_kmalloc+0xb7/0xc0 [ 15.354078] __kmalloc_cache_noprof+0x189/0x420 [ 15.354237] kasan_atomics+0x95/0x310 [ 15.354383] kunit_try_run_case+0x1a5/0x480 [ 15.354590] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.355099] kthread+0x337/0x6f0 [ 15.355275] ret_from_fork+0x116/0x1d0 [ 15.355446] ret_from_fork_asm+0x1a/0x30 [ 15.355587] [ 15.355658] The buggy address belongs to the object at ffff8881033c5500 [ 15.355658] which belongs to the cache kmalloc-64 of size 64 [ 15.356074] The buggy address is located 0 bytes to the right of [ 15.356074] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 15.356625] [ 15.356713] The buggy address belongs to the physical page: [ 15.356886] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 15.357136] flags: 0x200000000000000(node=0|zone=2) [ 15.357394] page_type: f5(slab) [ 15.357565] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.358065] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.358413] page dumped because: kasan: bad access detected [ 15.358687] [ 15.358784] Memory state around the buggy address: [ 15.358976] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.359243] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.359549] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.359933] ^ [ 15.360114] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.360447] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.360754] ================================================================== [ 14.396045] ================================================================== [ 14.396316] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 14.396795] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.397073] [ 14.397222] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.397270] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.397294] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.397318] Call Trace: [ 14.397339] <TASK> [ 14.397369] dump_stack_lvl+0x73/0xb0 [ 14.397400] print_report+0xd1/0x650 [ 14.397426] ? __virt_addr_valid+0x1db/0x2d0 [ 14.397451] ? kasan_atomics_helper+0xac7/0x5450 [ 14.397473] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.397495] ? kasan_atomics_helper+0xac7/0x5450 [ 14.397516] kasan_report+0x141/0x180 [ 14.397539] ? kasan_atomics_helper+0xac7/0x5450 [ 14.397565] kasan_check_range+0x10c/0x1c0 [ 14.397590] __kasan_check_write+0x18/0x20 [ 14.397610] kasan_atomics_helper+0xac7/0x5450 [ 14.397632] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.397665] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.397693] ? trace_hardirqs_on+0x37/0xe0 [ 14.397720] ? kasan_atomics+0x152/0x310 [ 14.397759] kasan_atomics+0x1dc/0x310 [ 14.397782] ? __pfx_kasan_atomics+0x10/0x10 [ 14.397817] ? __pfx_kasan_atomics+0x10/0x10 [ 14.397845] kunit_try_run_case+0x1a5/0x480 [ 14.397869] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.397902] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.397928] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.397953] ? __kthread_parkme+0x82/0x180 [ 14.397975] ? preempt_count_sub+0x50/0x80 [ 14.397999] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.398033] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.398057] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.398081] kthread+0x337/0x6f0 [ 14.398101] ? trace_preempt_on+0x20/0xc0 [ 14.398123] ? __pfx_kthread+0x10/0x10 [ 14.398144] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.398165] ? calculate_sigpending+0x7b/0xa0 [ 14.398202] ? __pfx_kthread+0x10/0x10 [ 14.398224] ret_from_fork+0x116/0x1d0 [ 14.398244] ? __pfx_kthread+0x10/0x10 [ 14.398276] ret_from_fork_asm+0x1a/0x30 [ 14.398308] </TASK> [ 14.398320] [ 14.405998] Allocated by task 282: [ 14.406140] kasan_save_stack+0x45/0x70 [ 14.406283] kasan_save_track+0x18/0x40 [ 14.406474] kasan_save_alloc_info+0x3b/0x50 [ 14.406689] __kasan_kmalloc+0xb7/0xc0 [ 14.406871] __kmalloc_cache_noprof+0x189/0x420 [ 14.407097] kasan_atomics+0x95/0x310 [ 14.407254] kunit_try_run_case+0x1a5/0x480 [ 14.407398] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.407694] kthread+0x337/0x6f0 [ 14.407865] ret_from_fork+0x116/0x1d0 [ 14.408066] ret_from_fork_asm+0x1a/0x30 [ 14.408298] [ 14.408408] The buggy address belongs to the object at ffff8881033c5500 [ 14.408408] which belongs to the cache kmalloc-64 of size 64 [ 14.408906] The buggy address is located 0 bytes to the right of [ 14.408906] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.409455] [ 14.409555] The buggy address belongs to the physical page: [ 14.409793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.410107] flags: 0x200000000000000(node=0|zone=2) [ 14.410343] page_type: f5(slab) [ 14.410494] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.410727] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.410955] page dumped because: kasan: bad access detected [ 14.411149] [ 14.411278] Memory state around the buggy address: [ 14.411503] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.412079] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.412316] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.412530] ^ [ 14.412713] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.413055] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.413413] ================================================================== [ 14.672888] ================================================================== [ 14.673357] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 14.673874] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.674118] [ 14.674238] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.674318] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.674331] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.674367] Call Trace: [ 14.674399] <TASK> [ 14.674430] dump_stack_lvl+0x73/0xb0 [ 14.674474] print_report+0xd1/0x650 [ 14.674525] ? __virt_addr_valid+0x1db/0x2d0 [ 14.674563] ? kasan_atomics_helper+0x1217/0x5450 [ 14.674599] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.674635] ? kasan_atomics_helper+0x1217/0x5450 [ 14.674683] kasan_report+0x141/0x180 [ 14.674718] ? kasan_atomics_helper+0x1217/0x5450 [ 14.674758] kasan_check_range+0x10c/0x1c0 [ 14.674813] __kasan_check_write+0x18/0x20 [ 14.674833] kasan_atomics_helper+0x1217/0x5450 [ 14.674869] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.674904] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.674930] ? trace_hardirqs_on+0x37/0xe0 [ 14.674964] ? kasan_atomics+0x152/0x310 [ 14.674990] kasan_atomics+0x1dc/0x310 [ 14.675014] ? __pfx_kasan_atomics+0x10/0x10 [ 14.675048] ? __pfx_kasan_atomics+0x10/0x10 [ 14.675075] kunit_try_run_case+0x1a5/0x480 [ 14.675099] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.675122] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.675146] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.675169] ? __kthread_parkme+0x82/0x180 [ 14.675190] ? preempt_count_sub+0x50/0x80 [ 14.675214] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.675238] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.675262] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.675285] kthread+0x337/0x6f0 [ 14.675305] ? trace_preempt_on+0x20/0xc0 [ 14.675327] ? __pfx_kthread+0x10/0x10 [ 14.675349] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.675372] ? calculate_sigpending+0x7b/0xa0 [ 14.675395] ? __pfx_kthread+0x10/0x10 [ 14.675417] ret_from_fork+0x116/0x1d0 [ 14.675437] ? __pfx_kthread+0x10/0x10 [ 14.675457] ret_from_fork_asm+0x1a/0x30 [ 14.675488] </TASK> [ 14.675500] [ 14.686198] Allocated by task 282: [ 14.686408] kasan_save_stack+0x45/0x70 [ 14.686726] kasan_save_track+0x18/0x40 [ 14.686909] kasan_save_alloc_info+0x3b/0x50 [ 14.687122] __kasan_kmalloc+0xb7/0xc0 [ 14.687287] __kmalloc_cache_noprof+0x189/0x420 [ 14.687481] kasan_atomics+0x95/0x310 [ 14.687644] kunit_try_run_case+0x1a5/0x480 [ 14.687826] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.688062] kthread+0x337/0x6f0 [ 14.688227] ret_from_fork+0x116/0x1d0 [ 14.688386] ret_from_fork_asm+0x1a/0x30 [ 14.688562] [ 14.688646] The buggy address belongs to the object at ffff8881033c5500 [ 14.688646] which belongs to the cache kmalloc-64 of size 64 [ 14.689595] The buggy address is located 0 bytes to the right of [ 14.689595] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.690301] [ 14.690403] The buggy address belongs to the physical page: [ 14.690629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.691221] flags: 0x200000000000000(node=0|zone=2) [ 14.691515] page_type: f5(slab) [ 14.691760] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.692161] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.692522] page dumped because: kasan: bad access detected [ 14.692796] [ 14.693064] Memory state around the buggy address: [ 14.693281] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.693676] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.694064] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.694436] ^ [ 14.694605] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.695067] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.695406] ================================================================== [ 14.768835] ================================================================== [ 14.769537] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 14.770208] Read of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.770442] [ 14.770534] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.770589] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.770603] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.770626] Call Trace: [ 14.770646] <TASK> [ 14.770664] dump_stack_lvl+0x73/0xb0 [ 14.770694] print_report+0xd1/0x650 [ 14.770716] ? __virt_addr_valid+0x1db/0x2d0 [ 14.770749] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.770771] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.770793] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.770817] kasan_report+0x141/0x180 [ 14.770839] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.770866] __asan_report_load8_noabort+0x18/0x20 [ 14.770891] kasan_atomics_helper+0x4eae/0x5450 [ 14.770914] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.770937] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.770963] ? trace_hardirqs_on+0x37/0xe0 [ 14.770987] ? kasan_atomics+0x152/0x310 [ 14.771015] kasan_atomics+0x1dc/0x310 [ 14.771297] ? __pfx_kasan_atomics+0x10/0x10 [ 14.771324] ? __pfx_kasan_atomics+0x10/0x10 [ 14.771354] kunit_try_run_case+0x1a5/0x480 [ 14.771378] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.771410] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.771437] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.771462] ? __kthread_parkme+0x82/0x180 [ 14.771484] ? preempt_count_sub+0x50/0x80 [ 14.771508] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.771534] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.771557] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.771582] kthread+0x337/0x6f0 [ 14.771602] ? trace_preempt_on+0x20/0xc0 [ 14.771626] ? __pfx_kthread+0x10/0x10 [ 14.772086] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.772122] ? calculate_sigpending+0x7b/0xa0 [ 14.772154] ? __pfx_kthread+0x10/0x10 [ 14.772178] ret_from_fork+0x116/0x1d0 [ 14.772199] ? __pfx_kthread+0x10/0x10 [ 14.772220] ret_from_fork_asm+0x1a/0x30 [ 14.772252] </TASK> [ 14.772266] [ 14.783210] Allocated by task 282: [ 14.783386] kasan_save_stack+0x45/0x70 [ 14.783585] kasan_save_track+0x18/0x40 [ 14.783973] kasan_save_alloc_info+0x3b/0x50 [ 14.784383] __kasan_kmalloc+0xb7/0xc0 [ 14.784687] __kmalloc_cache_noprof+0x189/0x420 [ 14.784909] kasan_atomics+0x95/0x310 [ 14.785099] kunit_try_run_case+0x1a5/0x480 [ 14.785294] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.785529] kthread+0x337/0x6f0 [ 14.785982] ret_from_fork+0x116/0x1d0 [ 14.786315] ret_from_fork_asm+0x1a/0x30 [ 14.786739] [ 14.786963] The buggy address belongs to the object at ffff8881033c5500 [ 14.786963] which belongs to the cache kmalloc-64 of size 64 [ 14.787860] The buggy address is located 0 bytes to the right of [ 14.787860] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.788402] [ 14.788499] The buggy address belongs to the physical page: [ 14.788939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.789456] flags: 0x200000000000000(node=0|zone=2) [ 14.790059] page_type: f5(slab) [ 14.790238] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.790557] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.791091] page dumped because: kasan: bad access detected [ 14.791514] [ 14.791609] Memory state around the buggy address: [ 14.791988] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.792298] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.792592] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.793182] ^ [ 14.793640] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.794102] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.794524] ================================================================== [ 15.361363] ================================================================== [ 15.361715] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 15.362038] Read of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 15.362309] [ 15.362420] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.362465] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.362478] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.362502] Call Trace: [ 15.362521] <TASK> [ 15.362540] dump_stack_lvl+0x73/0xb0 [ 15.362568] print_report+0xd1/0x650 [ 15.362591] ? __virt_addr_valid+0x1db/0x2d0 [ 15.362617] ? kasan_atomics_helper+0x5115/0x5450 [ 15.362639] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.362673] ? kasan_atomics_helper+0x5115/0x5450 [ 15.362696] kasan_report+0x141/0x180 [ 15.362718] ? kasan_atomics_helper+0x5115/0x5450 [ 15.362745] __asan_report_load8_noabort+0x18/0x20 [ 15.362770] kasan_atomics_helper+0x5115/0x5450 [ 15.362793] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.362817] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.362843] ? trace_hardirqs_on+0x37/0xe0 [ 15.362866] ? kasan_atomics+0x152/0x310 [ 15.362893] kasan_atomics+0x1dc/0x310 [ 15.362917] ? __pfx_kasan_atomics+0x10/0x10 [ 15.362941] ? __pfx_kasan_atomics+0x10/0x10 [ 15.362969] kunit_try_run_case+0x1a5/0x480 [ 15.362994] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.363016] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.363052] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.363077] ? __kthread_parkme+0x82/0x180 [ 15.363099] ? preempt_count_sub+0x50/0x80 [ 15.363124] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.363149] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.363172] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.363197] kthread+0x337/0x6f0 [ 15.363216] ? trace_preempt_on+0x20/0xc0 [ 15.363239] ? __pfx_kthread+0x10/0x10 [ 15.363260] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.363281] ? calculate_sigpending+0x7b/0xa0 [ 15.363306] ? __pfx_kthread+0x10/0x10 [ 15.363329] ret_from_fork+0x116/0x1d0 [ 15.363349] ? __pfx_kthread+0x10/0x10 [ 15.363370] ret_from_fork_asm+0x1a/0x30 [ 15.363401] </TASK> [ 15.363414] [ 15.370585] Allocated by task 282: [ 15.370792] kasan_save_stack+0x45/0x70 [ 15.371046] kasan_save_track+0x18/0x40 [ 15.371239] kasan_save_alloc_info+0x3b/0x50 [ 15.371422] __kasan_kmalloc+0xb7/0xc0 [ 15.371612] __kmalloc_cache_noprof+0x189/0x420 [ 15.371816] kasan_atomics+0x95/0x310 [ 15.371991] kunit_try_run_case+0x1a5/0x480 [ 15.372184] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.372393] kthread+0x337/0x6f0 [ 15.372563] ret_from_fork+0x116/0x1d0 [ 15.372751] ret_from_fork_asm+0x1a/0x30 [ 15.372987] [ 15.373067] The buggy address belongs to the object at ffff8881033c5500 [ 15.373067] which belongs to the cache kmalloc-64 of size 64 [ 15.373667] The buggy address is located 0 bytes to the right of [ 15.373667] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 15.374175] [ 15.374273] The buggy address belongs to the physical page: [ 15.374499] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 15.374817] flags: 0x200000000000000(node=0|zone=2) [ 15.374980] page_type: f5(slab) [ 15.375110] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.375342] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.375566] page dumped because: kasan: bad access detected [ 15.375735] [ 15.375806] Memory state around the buggy address: [ 15.375959] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.376273] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.376598] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.376906] ^ [ 15.377136] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.377460] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.377837] ================================================================== [ 14.238260] ================================================================== [ 14.238623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 14.239437] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.239778] [ 14.239914] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.239972] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.239985] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.240009] Call Trace: [ 14.240036] <TASK> [ 14.240055] dump_stack_lvl+0x73/0xb0 [ 14.240084] print_report+0xd1/0x650 [ 14.240108] ? __virt_addr_valid+0x1db/0x2d0 [ 14.240132] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.240160] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.240186] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.240208] kasan_report+0x141/0x180 [ 14.240231] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.240257] kasan_check_range+0x10c/0x1c0 [ 14.240293] __kasan_check_write+0x18/0x20 [ 14.240314] kasan_atomics_helper+0x5fe/0x5450 [ 14.240337] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.240370] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.240397] ? trace_hardirqs_on+0x37/0xe0 [ 14.240420] ? kasan_atomics+0x152/0x310 [ 14.240448] kasan_atomics+0x1dc/0x310 [ 14.240480] ? __pfx_kasan_atomics+0x10/0x10 [ 14.240504] ? __pfx_kasan_atomics+0x10/0x10 [ 14.240543] kunit_try_run_case+0x1a5/0x480 [ 14.240567] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.240589] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.240624] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.240656] ? __kthread_parkme+0x82/0x180 [ 14.240677] ? preempt_count_sub+0x50/0x80 [ 14.240712] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.240736] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.240760] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.240785] kthread+0x337/0x6f0 [ 14.240804] ? trace_preempt_on+0x20/0xc0 [ 14.240836] ? __pfx_kthread+0x10/0x10 [ 14.240856] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.240879] ? calculate_sigpending+0x7b/0xa0 [ 14.240913] ? __pfx_kthread+0x10/0x10 [ 14.240935] ret_from_fork+0x116/0x1d0 [ 14.240955] ? __pfx_kthread+0x10/0x10 [ 14.240982] ret_from_fork_asm+0x1a/0x30 [ 14.241014] </TASK> [ 14.241042] [ 14.248810] Allocated by task 282: [ 14.249178] kasan_save_stack+0x45/0x70 [ 14.249332] kasan_save_track+0x18/0x40 [ 14.249554] kasan_save_alloc_info+0x3b/0x50 [ 14.249789] __kasan_kmalloc+0xb7/0xc0 [ 14.249996] __kmalloc_cache_noprof+0x189/0x420 [ 14.250173] kasan_atomics+0x95/0x310 [ 14.250363] kunit_try_run_case+0x1a5/0x480 [ 14.250601] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.250835] kthread+0x337/0x6f0 [ 14.251032] ret_from_fork+0x116/0x1d0 [ 14.251175] ret_from_fork_asm+0x1a/0x30 [ 14.251390] [ 14.251485] The buggy address belongs to the object at ffff8881033c5500 [ 14.251485] which belongs to the cache kmalloc-64 of size 64 [ 14.251984] The buggy address is located 0 bytes to the right of [ 14.251984] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.252491] [ 14.252570] The buggy address belongs to the physical page: [ 14.252880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.253252] flags: 0x200000000000000(node=0|zone=2) [ 14.253439] page_type: f5(slab) [ 14.253563] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.253883] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.254244] page dumped because: kasan: bad access detected [ 14.254417] [ 14.254486] Memory state around the buggy address: [ 14.254643] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.255008] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.255353] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.255738] ^ [ 14.255928] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.256211] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.256553] ================================================================== [ 14.276518] ================================================================== [ 14.277101] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 14.277511] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.277982] [ 14.278097] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.278142] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.278156] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.278179] Call Trace: [ 14.278193] <TASK> [ 14.278209] dump_stack_lvl+0x73/0xb0 [ 14.278237] print_report+0xd1/0x650 [ 14.278262] ? __virt_addr_valid+0x1db/0x2d0 [ 14.278286] ? kasan_atomics_helper+0x72f/0x5450 [ 14.278309] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.278332] ? kasan_atomics_helper+0x72f/0x5450 [ 14.278366] kasan_report+0x141/0x180 [ 14.278389] ? kasan_atomics_helper+0x72f/0x5450 [ 14.278426] kasan_check_range+0x10c/0x1c0 [ 14.278451] __kasan_check_write+0x18/0x20 [ 14.278471] kasan_atomics_helper+0x72f/0x5450 [ 14.278494] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.278517] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.278542] ? trace_hardirqs_on+0x37/0xe0 [ 14.278566] ? kasan_atomics+0x152/0x310 [ 14.278594] kasan_atomics+0x1dc/0x310 [ 14.278617] ? __pfx_kasan_atomics+0x10/0x10 [ 14.278640] ? __pfx_kasan_atomics+0x10/0x10 [ 14.278667] kunit_try_run_case+0x1a5/0x480 [ 14.278692] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.278714] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.278739] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.278762] ? __kthread_parkme+0x82/0x180 [ 14.278782] ? preempt_count_sub+0x50/0x80 [ 14.278808] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.278831] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.278854] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.278878] kthread+0x337/0x6f0 [ 14.278897] ? trace_preempt_on+0x20/0xc0 [ 14.278920] ? __pfx_kthread+0x10/0x10 [ 14.278942] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.278962] ? calculate_sigpending+0x7b/0xa0 [ 14.278987] ? __pfx_kthread+0x10/0x10 [ 14.279008] ret_from_fork+0x116/0x1d0 [ 14.279036] ? __pfx_kthread+0x10/0x10 [ 14.279057] ret_from_fork_asm+0x1a/0x30 [ 14.279088] </TASK> [ 14.279100] [ 14.286988] Allocated by task 282: [ 14.287179] kasan_save_stack+0x45/0x70 [ 14.287370] kasan_save_track+0x18/0x40 [ 14.287509] kasan_save_alloc_info+0x3b/0x50 [ 14.287789] __kasan_kmalloc+0xb7/0xc0 [ 14.287947] __kmalloc_cache_noprof+0x189/0x420 [ 14.288117] kasan_atomics+0x95/0x310 [ 14.288259] kunit_try_run_case+0x1a5/0x480 [ 14.288408] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.288583] kthread+0x337/0x6f0 [ 14.288704] ret_from_fork+0x116/0x1d0 [ 14.288837] ret_from_fork_asm+0x1a/0x30 [ 14.289000] [ 14.289139] The buggy address belongs to the object at ffff8881033c5500 [ 14.289139] which belongs to the cache kmalloc-64 of size 64 [ 14.289664] The buggy address is located 0 bytes to the right of [ 14.289664] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.290213] [ 14.290309] The buggy address belongs to the physical page: [ 14.290556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.291068] flags: 0x200000000000000(node=0|zone=2) [ 14.291234] page_type: f5(slab) [ 14.291360] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.291591] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.292125] page dumped because: kasan: bad access detected [ 14.292384] [ 14.292490] Memory state around the buggy address: [ 14.292736] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.293157] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.293413] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.293761] ^ [ 14.294066] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.294323] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.294540] ================================================================== [ 14.733277] ================================================================== [ 14.733635] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 14.733979] Read of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.734302] [ 14.734422] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.734468] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.734481] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.734503] Call Trace: [ 14.734521] <TASK> [ 14.734539] dump_stack_lvl+0x73/0xb0 [ 14.734567] print_report+0xd1/0x650 [ 14.734590] ? __virt_addr_valid+0x1db/0x2d0 [ 14.734614] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.734635] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.734658] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.734680] kasan_report+0x141/0x180 [ 14.734703] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.734729] __asan_report_load4_noabort+0x18/0x20 [ 14.734754] kasan_atomics_helper+0x49ce/0x5450 [ 14.734776] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.734798] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.734823] ? trace_hardirqs_on+0x37/0xe0 [ 14.734846] ? kasan_atomics+0x152/0x310 [ 14.734873] kasan_atomics+0x1dc/0x310 [ 14.734895] ? __pfx_kasan_atomics+0x10/0x10 [ 14.734919] ? __pfx_kasan_atomics+0x10/0x10 [ 14.734945] kunit_try_run_case+0x1a5/0x480 [ 14.734970] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.734992] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.735017] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.735051] ? __kthread_parkme+0x82/0x180 [ 14.735074] ? preempt_count_sub+0x50/0x80 [ 14.735098] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.735123] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.735146] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.735170] kthread+0x337/0x6f0 [ 14.735189] ? trace_preempt_on+0x20/0xc0 [ 14.735211] ? __pfx_kthread+0x10/0x10 [ 14.735232] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.735255] ? calculate_sigpending+0x7b/0xa0 [ 14.735279] ? __pfx_kthread+0x10/0x10 [ 14.735301] ret_from_fork+0x116/0x1d0 [ 14.735321] ? __pfx_kthread+0x10/0x10 [ 14.735343] ret_from_fork_asm+0x1a/0x30 [ 14.735373] </TASK> [ 14.735386] [ 14.742552] Allocated by task 282: [ 14.742843] kasan_save_stack+0x45/0x70 [ 14.743054] kasan_save_track+0x18/0x40 [ 14.743248] kasan_save_alloc_info+0x3b/0x50 [ 14.743463] __kasan_kmalloc+0xb7/0xc0 [ 14.743627] __kmalloc_cache_noprof+0x189/0x420 [ 14.743840] kasan_atomics+0x95/0x310 [ 14.743997] kunit_try_run_case+0x1a5/0x480 [ 14.744159] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.744360] kthread+0x337/0x6f0 [ 14.744524] ret_from_fork+0x116/0x1d0 [ 14.744719] ret_from_fork_asm+0x1a/0x30 [ 14.745110] [ 14.745198] The buggy address belongs to the object at ffff8881033c5500 [ 14.745198] which belongs to the cache kmalloc-64 of size 64 [ 14.745663] The buggy address is located 0 bytes to the right of [ 14.745663] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.746096] [ 14.746194] The buggy address belongs to the physical page: [ 14.746448] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.746797] flags: 0x200000000000000(node=0|zone=2) [ 14.747006] page_type: f5(slab) [ 14.747191] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.747495] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.747958] page dumped because: kasan: bad access detected [ 14.748204] [ 14.748281] Memory state around the buggy address: [ 14.748473] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.748803] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.749113] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.749377] ^ [ 14.749571] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.749787] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.749999] ================================================================== [ 14.615314] ================================================================== [ 14.615947] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 14.616301] Read of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.616605] [ 14.617607] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.617664] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.617678] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.617701] Call Trace: [ 14.617719] <TASK> [ 14.617737] dump_stack_lvl+0x73/0xb0 [ 14.617769] print_report+0xd1/0x650 [ 14.617794] ? __virt_addr_valid+0x1db/0x2d0 [ 14.617818] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.617841] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.617863] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.617885] kasan_report+0x141/0x180 [ 14.617908] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.617934] __asan_report_load4_noabort+0x18/0x20 [ 14.617959] kasan_atomics_helper+0x4a1c/0x5450 [ 14.617982] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.618004] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.618044] ? trace_hardirqs_on+0x37/0xe0 [ 14.618067] ? kasan_atomics+0x152/0x310 [ 14.618094] kasan_atomics+0x1dc/0x310 [ 14.618118] ? __pfx_kasan_atomics+0x10/0x10 [ 14.618142] ? __pfx_kasan_atomics+0x10/0x10 [ 14.618170] kunit_try_run_case+0x1a5/0x480 [ 14.618195] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.618217] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.618241] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.618265] ? __kthread_parkme+0x82/0x180 [ 14.618287] ? preempt_count_sub+0x50/0x80 [ 14.618311] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.618336] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.618359] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.618383] kthread+0x337/0x6f0 [ 14.618403] ? trace_preempt_on+0x20/0xc0 [ 14.618425] ? __pfx_kthread+0x10/0x10 [ 14.618446] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.618468] ? calculate_sigpending+0x7b/0xa0 [ 14.618492] ? __pfx_kthread+0x10/0x10 [ 14.618514] ret_from_fork+0x116/0x1d0 [ 14.618534] ? __pfx_kthread+0x10/0x10 [ 14.618555] ret_from_fork_asm+0x1a/0x30 [ 14.618585] </TASK> [ 14.618598] [ 14.626124] Allocated by task 282: [ 14.626309] kasan_save_stack+0x45/0x70 [ 14.626513] kasan_save_track+0x18/0x40 [ 14.626702] kasan_save_alloc_info+0x3b/0x50 [ 14.626910] __kasan_kmalloc+0xb7/0xc0 [ 14.627166] __kmalloc_cache_noprof+0x189/0x420 [ 14.627323] kasan_atomics+0x95/0x310 [ 14.627456] kunit_try_run_case+0x1a5/0x480 [ 14.627600] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.627768] kthread+0x337/0x6f0 [ 14.628010] ret_from_fork+0x116/0x1d0 [ 14.628218] ret_from_fork_asm+0x1a/0x30 [ 14.628440] [ 14.628558] The buggy address belongs to the object at ffff8881033c5500 [ 14.628558] which belongs to the cache kmalloc-64 of size 64 [ 14.629454] The buggy address is located 0 bytes to the right of [ 14.629454] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.630051] [ 14.630169] The buggy address belongs to the physical page: [ 14.630428] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.630929] flags: 0x200000000000000(node=0|zone=2) [ 14.631113] page_type: f5(slab) [ 14.631235] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.631462] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.631841] page dumped because: kasan: bad access detected [ 14.632105] [ 14.632208] Memory state around the buggy address: [ 14.632453] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.632796] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.633216] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.633575] ^ [ 14.633826] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.634157] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.634501] ================================================================== [ 14.039214] ================================================================== [ 14.040470] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 14.041017] Read of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.041255] [ 14.041354] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.041409] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.041421] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.041445] Call Trace: [ 14.041459] <TASK> [ 14.041480] dump_stack_lvl+0x73/0xb0 [ 14.041512] print_report+0xd1/0x650 [ 14.041536] ? __virt_addr_valid+0x1db/0x2d0 [ 14.041560] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.041581] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.041602] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.041623] kasan_report+0x141/0x180 [ 14.041643] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.041668] __asan_report_load4_noabort+0x18/0x20 [ 14.041692] kasan_atomics_helper+0x4bbc/0x5450 [ 14.041713] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.041734] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.041758] ? trace_hardirqs_on+0x37/0xe0 [ 14.041781] ? kasan_atomics+0x152/0x310 [ 14.041806] kasan_atomics+0x1dc/0x310 [ 14.041828] ? __pfx_kasan_atomics+0x10/0x10 [ 14.041851] ? __pfx_kasan_atomics+0x10/0x10 [ 14.041878] kunit_try_run_case+0x1a5/0x480 [ 14.041904] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.041925] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.041949] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.041971] ? __kthread_parkme+0x82/0x180 [ 14.041992] ? preempt_count_sub+0x50/0x80 [ 14.042016] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.042050] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.042072] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.042094] kthread+0x337/0x6f0 [ 14.042113] ? trace_preempt_on+0x20/0xc0 [ 14.042134] ? __pfx_kthread+0x10/0x10 [ 14.042154] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.042175] ? calculate_sigpending+0x7b/0xa0 [ 14.042200] ? __pfx_kthread+0x10/0x10 [ 14.042221] ret_from_fork+0x116/0x1d0 [ 14.042240] ? __pfx_kthread+0x10/0x10 [ 14.042260] ret_from_fork_asm+0x1a/0x30 [ 14.042290] </TASK> [ 14.042302] [ 14.058589] Allocated by task 282: [ 14.059172] kasan_save_stack+0x45/0x70 [ 14.059552] kasan_save_track+0x18/0x40 [ 14.060088] kasan_save_alloc_info+0x3b/0x50 [ 14.060648] __kasan_kmalloc+0xb7/0xc0 [ 14.061149] __kmalloc_cache_noprof+0x189/0x420 [ 14.061356] kasan_atomics+0x95/0x310 [ 14.061495] kunit_try_run_case+0x1a5/0x480 [ 14.061715] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.062430] kthread+0x337/0x6f0 [ 14.062859] ret_from_fork+0x116/0x1d0 [ 14.063328] ret_from_fork_asm+0x1a/0x30 [ 14.063792] [ 14.063973] The buggy address belongs to the object at ffff8881033c5500 [ 14.063973] which belongs to the cache kmalloc-64 of size 64 [ 14.065205] The buggy address is located 0 bytes to the right of [ 14.065205] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.065578] [ 14.065680] The buggy address belongs to the physical page: [ 14.066604] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.067395] flags: 0x200000000000000(node=0|zone=2) [ 14.067939] page_type: f5(slab) [ 14.068391] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.069193] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.069981] page dumped because: kasan: bad access detected [ 14.070467] [ 14.070557] Memory state around the buggy address: [ 14.071042] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.071390] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.071612] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.072328] ^ [ 14.072854] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.073476] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.074200] ================================================================== [ 14.847147] ================================================================== [ 14.847514] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 14.847868] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.848287] [ 14.848409] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.848464] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.848478] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.848501] Call Trace: [ 14.848532] <TASK> [ 14.848552] dump_stack_lvl+0x73/0xb0 [ 14.848582] print_report+0xd1/0x650 [ 14.848607] ? __virt_addr_valid+0x1db/0x2d0 [ 14.848646] ? kasan_atomics_helper+0x151d/0x5450 [ 14.848668] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.848713] ? kasan_atomics_helper+0x151d/0x5450 [ 14.848737] kasan_report+0x141/0x180 [ 14.848762] ? kasan_atomics_helper+0x151d/0x5450 [ 14.848789] kasan_check_range+0x10c/0x1c0 [ 14.848814] __kasan_check_write+0x18/0x20 [ 14.848835] kasan_atomics_helper+0x151d/0x5450 [ 14.848859] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.848883] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.848908] ? trace_hardirqs_on+0x37/0xe0 [ 14.848932] ? kasan_atomics+0x152/0x310 [ 14.848959] kasan_atomics+0x1dc/0x310 [ 14.848990] ? __pfx_kasan_atomics+0x10/0x10 [ 14.849014] ? __pfx_kasan_atomics+0x10/0x10 [ 14.849057] kunit_try_run_case+0x1a5/0x480 [ 14.849082] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.849105] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.849130] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.849154] ? __kthread_parkme+0x82/0x180 [ 14.849175] ? preempt_count_sub+0x50/0x80 [ 14.849200] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.849223] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.849247] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.849271] kthread+0x337/0x6f0 [ 14.849291] ? trace_preempt_on+0x20/0xc0 [ 14.849322] ? __pfx_kthread+0x10/0x10 [ 14.849343] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.849365] ? calculate_sigpending+0x7b/0xa0 [ 14.849400] ? __pfx_kthread+0x10/0x10 [ 14.849422] ret_from_fork+0x116/0x1d0 [ 14.849442] ? __pfx_kthread+0x10/0x10 [ 14.849472] ret_from_fork_asm+0x1a/0x30 [ 14.849504] </TASK> [ 14.849516] [ 14.857076] Allocated by task 282: [ 14.857259] kasan_save_stack+0x45/0x70 [ 14.857457] kasan_save_track+0x18/0x40 [ 14.857649] kasan_save_alloc_info+0x3b/0x50 [ 14.857820] __kasan_kmalloc+0xb7/0xc0 [ 14.858028] __kmalloc_cache_noprof+0x189/0x420 [ 14.858187] kasan_atomics+0x95/0x310 [ 14.858368] kunit_try_run_case+0x1a5/0x480 [ 14.858607] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.858871] kthread+0x337/0x6f0 [ 14.859047] ret_from_fork+0x116/0x1d0 [ 14.859218] ret_from_fork_asm+0x1a/0x30 [ 14.859422] [ 14.859516] The buggy address belongs to the object at ffff8881033c5500 [ 14.859516] which belongs to the cache kmalloc-64 of size 64 [ 14.860097] The buggy address is located 0 bytes to the right of [ 14.860097] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.860619] [ 14.860712] The buggy address belongs to the physical page: [ 14.860946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.861289] flags: 0x200000000000000(node=0|zone=2) [ 14.861526] page_type: f5(slab) [ 14.861677] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.862005] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.862337] page dumped because: kasan: bad access detected [ 14.862582] [ 14.862694] Memory state around the buggy address: [ 14.862880] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.863107] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.863323] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.863612] ^ [ 14.863857] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.864202] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.864457] ================================================================== [ 14.696344] ================================================================== [ 14.696647] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 14.697380] Read of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.697743] [ 14.697869] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.697916] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.697929] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.697951] Call Trace: [ 14.697970] <TASK> [ 14.697988] dump_stack_lvl+0x73/0xb0 [ 14.698032] print_report+0xd1/0x650 [ 14.698056] ? __virt_addr_valid+0x1db/0x2d0 [ 14.698082] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.698104] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.698126] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.698149] kasan_report+0x141/0x180 [ 14.698171] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.698198] __asan_report_load4_noabort+0x18/0x20 [ 14.698223] kasan_atomics_helper+0x49e8/0x5450 [ 14.698247] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.698269] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.698295] ? trace_hardirqs_on+0x37/0xe0 [ 14.698318] ? kasan_atomics+0x152/0x310 [ 14.698345] kasan_atomics+0x1dc/0x310 [ 14.698368] ? __pfx_kasan_atomics+0x10/0x10 [ 14.698392] ? __pfx_kasan_atomics+0x10/0x10 [ 14.698419] kunit_try_run_case+0x1a5/0x480 [ 14.698444] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.698466] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.698491] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.698514] ? __kthread_parkme+0x82/0x180 [ 14.698535] ? preempt_count_sub+0x50/0x80 [ 14.698560] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.698583] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.698607] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.698631] kthread+0x337/0x6f0 [ 14.698662] ? trace_preempt_on+0x20/0xc0 [ 14.698684] ? __pfx_kthread+0x10/0x10 [ 14.698706] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.698728] ? calculate_sigpending+0x7b/0xa0 [ 14.698752] ? __pfx_kthread+0x10/0x10 [ 14.698774] ret_from_fork+0x116/0x1d0 [ 14.698795] ? __pfx_kthread+0x10/0x10 [ 14.698816] ret_from_fork_asm+0x1a/0x30 [ 14.698848] </TASK> [ 14.698860] [ 14.707315] Allocated by task 282: [ 14.707450] kasan_save_stack+0x45/0x70 [ 14.707599] kasan_save_track+0x18/0x40 [ 14.707776] kasan_save_alloc_info+0x3b/0x50 [ 14.707999] __kasan_kmalloc+0xb7/0xc0 [ 14.708198] __kmalloc_cache_noprof+0x189/0x420 [ 14.708418] kasan_atomics+0x95/0x310 [ 14.708603] kunit_try_run_case+0x1a5/0x480 [ 14.708797] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.708973] kthread+0x337/0x6f0 [ 14.709585] ret_from_fork+0x116/0x1d0 [ 14.709809] ret_from_fork_asm+0x1a/0x30 [ 14.710009] [ 14.710115] The buggy address belongs to the object at ffff8881033c5500 [ 14.710115] which belongs to the cache kmalloc-64 of size 64 [ 14.710573] The buggy address is located 0 bytes to the right of [ 14.710573] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.711139] [ 14.711216] The buggy address belongs to the physical page: [ 14.711438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.711817] flags: 0x200000000000000(node=0|zone=2) [ 14.712041] page_type: f5(slab) [ 14.712186] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.712422] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.712758] page dumped because: kasan: bad access detected [ 14.713030] [ 14.713127] Memory state around the buggy address: [ 14.713309] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.713526] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.714105] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.714388] ^ [ 14.714600] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.714916] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.715150] ================================================================== [ 15.320042] ================================================================== [ 15.320607] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 15.321044] Read of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 15.321412] [ 15.321509] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.321555] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.321569] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.321592] Call Trace: [ 15.321609] <TASK> [ 15.321833] dump_stack_lvl+0x73/0xb0 [ 15.321872] print_report+0xd1/0x650 [ 15.321896] ? __virt_addr_valid+0x1db/0x2d0 [ 15.321922] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.321944] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.321968] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.321991] kasan_report+0x141/0x180 [ 15.322013] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.322053] __asan_report_load8_noabort+0x18/0x20 [ 15.322079] kasan_atomics_helper+0x4fa5/0x5450 [ 15.322103] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.322126] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.322152] ? trace_hardirqs_on+0x37/0xe0 [ 15.322175] ? kasan_atomics+0x152/0x310 [ 15.322203] kasan_atomics+0x1dc/0x310 [ 15.322226] ? __pfx_kasan_atomics+0x10/0x10 [ 15.322249] ? __pfx_kasan_atomics+0x10/0x10 [ 15.322277] kunit_try_run_case+0x1a5/0x480 [ 15.322302] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.322325] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.322350] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.322374] ? __kthread_parkme+0x82/0x180 [ 15.322396] ? preempt_count_sub+0x50/0x80 [ 15.322421] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.322446] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.322470] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.322494] kthread+0x337/0x6f0 [ 15.322514] ? trace_preempt_on+0x20/0xc0 [ 15.322537] ? __pfx_kthread+0x10/0x10 [ 15.322558] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.322580] ? calculate_sigpending+0x7b/0xa0 [ 15.322603] ? __pfx_kthread+0x10/0x10 [ 15.322649] ret_from_fork+0x116/0x1d0 [ 15.322669] ? __pfx_kthread+0x10/0x10 [ 15.322690] ret_from_fork_asm+0x1a/0x30 [ 15.322721] </TASK> [ 15.322734] [ 15.332335] Allocated by task 282: [ 15.332524] kasan_save_stack+0x45/0x70 [ 15.332872] kasan_save_track+0x18/0x40 [ 15.333083] kasan_save_alloc_info+0x3b/0x50 [ 15.333283] __kasan_kmalloc+0xb7/0xc0 [ 15.333452] __kmalloc_cache_noprof+0x189/0x420 [ 15.333907] kasan_atomics+0x95/0x310 [ 15.334090] kunit_try_run_case+0x1a5/0x480 [ 15.334390] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.334824] kthread+0x337/0x6f0 [ 15.334991] ret_from_fork+0x116/0x1d0 [ 15.335319] ret_from_fork_asm+0x1a/0x30 [ 15.335505] [ 15.335585] The buggy address belongs to the object at ffff8881033c5500 [ 15.335585] which belongs to the cache kmalloc-64 of size 64 [ 15.336265] The buggy address is located 0 bytes to the right of [ 15.336265] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 15.336939] [ 15.337050] The buggy address belongs to the physical page: [ 15.337394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 15.337851] flags: 0x200000000000000(node=0|zone=2) [ 15.338165] page_type: f5(slab) [ 15.338338] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.338789] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.339181] page dumped because: kasan: bad access detected [ 15.339382] [ 15.339553] Memory state around the buggy address: [ 15.339903] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.340238] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.340547] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.341013] ^ [ 15.341316] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.341580] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.342004] ================================================================== [ 15.061425] ================================================================== [ 15.062126] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 15.062554] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 15.063004] [ 15.063303] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.063354] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.063367] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.063390] Call Trace: [ 15.063407] <TASK> [ 15.063424] dump_stack_lvl+0x73/0xb0 [ 15.063454] print_report+0xd1/0x650 [ 15.063478] ? __virt_addr_valid+0x1db/0x2d0 [ 15.063503] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.063525] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.063547] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.063766] kasan_report+0x141/0x180 [ 15.063795] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.063823] kasan_check_range+0x10c/0x1c0 [ 15.063849] __kasan_check_write+0x18/0x20 [ 15.063869] kasan_atomics_helper+0x1c18/0x5450 [ 15.063893] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.063915] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.063942] ? trace_hardirqs_on+0x37/0xe0 [ 15.063965] ? kasan_atomics+0x152/0x310 [ 15.063993] kasan_atomics+0x1dc/0x310 [ 15.064016] ? __pfx_kasan_atomics+0x10/0x10 [ 15.064052] ? __pfx_kasan_atomics+0x10/0x10 [ 15.064079] kunit_try_run_case+0x1a5/0x480 [ 15.064103] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.064126] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.064155] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.064179] ? __kthread_parkme+0x82/0x180 [ 15.064201] ? preempt_count_sub+0x50/0x80 [ 15.064225] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.064249] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.064272] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.064296] kthread+0x337/0x6f0 [ 15.064317] ? trace_preempt_on+0x20/0xc0 [ 15.064339] ? __pfx_kthread+0x10/0x10 [ 15.064359] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.064382] ? calculate_sigpending+0x7b/0xa0 [ 15.064407] ? __pfx_kthread+0x10/0x10 [ 15.064429] ret_from_fork+0x116/0x1d0 [ 15.064448] ? __pfx_kthread+0x10/0x10 [ 15.064469] ret_from_fork_asm+0x1a/0x30 [ 15.064500] </TASK> [ 15.064513] [ 15.075007] Allocated by task 282: [ 15.075308] kasan_save_stack+0x45/0x70 [ 15.075479] kasan_save_track+0x18/0x40 [ 15.075681] kasan_save_alloc_info+0x3b/0x50 [ 15.076160] __kasan_kmalloc+0xb7/0xc0 [ 15.076480] __kmalloc_cache_noprof+0x189/0x420 [ 15.076705] kasan_atomics+0x95/0x310 [ 15.077070] kunit_try_run_case+0x1a5/0x480 [ 15.077274] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.077627] kthread+0x337/0x6f0 [ 15.077776] ret_from_fork+0x116/0x1d0 [ 15.078097] ret_from_fork_asm+0x1a/0x30 [ 15.078390] [ 15.078476] The buggy address belongs to the object at ffff8881033c5500 [ 15.078476] which belongs to the cache kmalloc-64 of size 64 [ 15.079144] The buggy address is located 0 bytes to the right of [ 15.079144] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 15.079936] [ 15.080039] The buggy address belongs to the physical page: [ 15.080302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 15.080800] flags: 0x200000000000000(node=0|zone=2) [ 15.081118] page_type: f5(slab) [ 15.081429] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.081795] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.082193] page dumped because: kasan: bad access detected [ 15.082448] [ 15.082528] Memory state around the buggy address: [ 15.082986] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.083302] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.083730] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.084122] ^ [ 15.084316] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.084787] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.085163] ================================================================== [ 14.075517] ================================================================== [ 14.076459] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 14.077038] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.078070] [ 14.078273] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.078320] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.078333] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.078365] Call Trace: [ 14.078378] <TASK> [ 14.078396] dump_stack_lvl+0x73/0xb0 [ 14.078438] print_report+0xd1/0x650 [ 14.078461] ? __virt_addr_valid+0x1db/0x2d0 [ 14.078484] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.078505] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.078526] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.078547] kasan_report+0x141/0x180 [ 14.078568] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.078592] __asan_report_store4_noabort+0x1b/0x30 [ 14.078613] kasan_atomics_helper+0x4ba2/0x5450 [ 14.078634] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.078665] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.078690] ? trace_hardirqs_on+0x37/0xe0 [ 14.078711] ? kasan_atomics+0x152/0x310 [ 14.078737] kasan_atomics+0x1dc/0x310 [ 14.078760] ? __pfx_kasan_atomics+0x10/0x10 [ 14.078782] ? __pfx_kasan_atomics+0x10/0x10 [ 14.078808] kunit_try_run_case+0x1a5/0x480 [ 14.078831] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.078853] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.078876] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.078899] ? __kthread_parkme+0x82/0x180 [ 14.078919] ? preempt_count_sub+0x50/0x80 [ 14.078942] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.078965] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.078987] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.079009] kthread+0x337/0x6f0 [ 14.079038] ? trace_preempt_on+0x20/0xc0 [ 14.079059] ? __pfx_kthread+0x10/0x10 [ 14.079079] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.079100] ? calculate_sigpending+0x7b/0xa0 [ 14.079123] ? __pfx_kthread+0x10/0x10 [ 14.079144] ret_from_fork+0x116/0x1d0 [ 14.079163] ? __pfx_kthread+0x10/0x10 [ 14.079182] ret_from_fork_asm+0x1a/0x30 [ 14.079212] </TASK> [ 14.079224] [ 14.092476] Allocated by task 282: [ 14.092917] kasan_save_stack+0x45/0x70 [ 14.093320] kasan_save_track+0x18/0x40 [ 14.093685] kasan_save_alloc_info+0x3b/0x50 [ 14.094174] __kasan_kmalloc+0xb7/0xc0 [ 14.094309] __kmalloc_cache_noprof+0x189/0x420 [ 14.094695] kasan_atomics+0x95/0x310 [ 14.095060] kunit_try_run_case+0x1a5/0x480 [ 14.095448] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.095912] kthread+0x337/0x6f0 [ 14.096315] ret_from_fork+0x116/0x1d0 [ 14.096456] ret_from_fork_asm+0x1a/0x30 [ 14.096595] [ 14.096785] The buggy address belongs to the object at ffff8881033c5500 [ 14.096785] which belongs to the cache kmalloc-64 of size 64 [ 14.097902] The buggy address is located 0 bytes to the right of [ 14.097902] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.099157] [ 14.099344] The buggy address belongs to the physical page: [ 14.099760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.100184] flags: 0x200000000000000(node=0|zone=2) [ 14.100354] page_type: f5(slab) [ 14.100475] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.100724] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.101162] page dumped because: kasan: bad access detected [ 14.101367] [ 14.101461] Memory state around the buggy address: [ 14.101733] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.102036] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.102473] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.102770] ^ [ 14.103239] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.103535] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.103878] ================================================================== [ 14.201379] ================================================================== [ 14.202172] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 14.202519] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.202867] [ 14.203070] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.203119] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.203133] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.203156] Call Trace: [ 14.203175] <TASK> [ 14.203194] dump_stack_lvl+0x73/0xb0 [ 14.203236] print_report+0xd1/0x650 [ 14.203261] ? __virt_addr_valid+0x1db/0x2d0 [ 14.203287] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.203321] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.203344] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.203366] kasan_report+0x141/0x180 [ 14.203388] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.203414] __asan_report_store4_noabort+0x1b/0x30 [ 14.203444] kasan_atomics_helper+0x4b3a/0x5450 [ 14.203467] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.203490] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.203526] ? trace_hardirqs_on+0x37/0xe0 [ 14.203549] ? kasan_atomics+0x152/0x310 [ 14.203577] kasan_atomics+0x1dc/0x310 [ 14.203600] ? __pfx_kasan_atomics+0x10/0x10 [ 14.203624] ? __pfx_kasan_atomics+0x10/0x10 [ 14.203671] kunit_try_run_case+0x1a5/0x480 [ 14.203696] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.203718] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.203754] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.203778] ? __kthread_parkme+0x82/0x180 [ 14.203799] ? preempt_count_sub+0x50/0x80 [ 14.203823] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.203847] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.203871] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.203894] kthread+0x337/0x6f0 [ 14.203914] ? trace_preempt_on+0x20/0xc0 [ 14.203936] ? __pfx_kthread+0x10/0x10 [ 14.203957] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.203978] ? calculate_sigpending+0x7b/0xa0 [ 14.204003] ? __pfx_kthread+0x10/0x10 [ 14.204033] ret_from_fork+0x116/0x1d0 [ 14.204053] ? __pfx_kthread+0x10/0x10 [ 14.204074] ret_from_fork_asm+0x1a/0x30 [ 14.204107] </TASK> [ 14.204119] [ 14.211462] Allocated by task 282: [ 14.211660] kasan_save_stack+0x45/0x70 [ 14.211861] kasan_save_track+0x18/0x40 [ 14.212102] kasan_save_alloc_info+0x3b/0x50 [ 14.212311] __kasan_kmalloc+0xb7/0xc0 [ 14.212447] __kmalloc_cache_noprof+0x189/0x420 [ 14.212604] kasan_atomics+0x95/0x310 [ 14.212973] kunit_try_run_case+0x1a5/0x480 [ 14.213191] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.213517] kthread+0x337/0x6f0 [ 14.213770] ret_from_fork+0x116/0x1d0 [ 14.213940] ret_from_fork_asm+0x1a/0x30 [ 14.214093] [ 14.214191] The buggy address belongs to the object at ffff8881033c5500 [ 14.214191] which belongs to the cache kmalloc-64 of size 64 [ 14.214768] The buggy address is located 0 bytes to the right of [ 14.214768] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.215284] [ 14.215395] The buggy address belongs to the physical page: [ 14.215580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.215982] flags: 0x200000000000000(node=0|zone=2) [ 14.216192] page_type: f5(slab) [ 14.216314] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.216627] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.217002] page dumped because: kasan: bad access detected [ 14.217246] [ 14.217344] Memory state around the buggy address: [ 14.217576] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.217906] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.218219] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.218508] ^ [ 14.218769] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.218988] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.219321] ================================================================== [ 14.295532] ================================================================== [ 14.296212] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 14.296459] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.296715] [ 14.296923] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.296968] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.296981] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.297004] Call Trace: [ 14.297035] <TASK> [ 14.297054] dump_stack_lvl+0x73/0xb0 [ 14.297083] print_report+0xd1/0x650 [ 14.297108] ? __virt_addr_valid+0x1db/0x2d0 [ 14.297133] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.297166] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.297189] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.297213] kasan_report+0x141/0x180 [ 14.297248] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.297274] kasan_check_range+0x10c/0x1c0 [ 14.297299] __kasan_check_write+0x18/0x20 [ 14.297319] kasan_atomics_helper+0x7c7/0x5450 [ 14.297342] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.297365] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.297391] ? trace_hardirqs_on+0x37/0xe0 [ 14.297415] ? kasan_atomics+0x152/0x310 [ 14.297442] kasan_atomics+0x1dc/0x310 [ 14.297466] ? __pfx_kasan_atomics+0x10/0x10 [ 14.297490] ? __pfx_kasan_atomics+0x10/0x10 [ 14.297517] kunit_try_run_case+0x1a5/0x480 [ 14.297542] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.297565] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.297591] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.297613] ? __kthread_parkme+0x82/0x180 [ 14.297635] ? preempt_count_sub+0x50/0x80 [ 14.297660] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.297683] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.297707] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.297740] kthread+0x337/0x6f0 [ 14.297759] ? trace_preempt_on+0x20/0xc0 [ 14.297782] ? __pfx_kthread+0x10/0x10 [ 14.297813] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.297835] ? calculate_sigpending+0x7b/0xa0 [ 14.297859] ? __pfx_kthread+0x10/0x10 [ 14.297881] ret_from_fork+0x116/0x1d0 [ 14.297900] ? __pfx_kthread+0x10/0x10 [ 14.297921] ret_from_fork_asm+0x1a/0x30 [ 14.297952] </TASK> [ 14.297965] [ 14.305268] Allocated by task 282: [ 14.305495] kasan_save_stack+0x45/0x70 [ 14.305758] kasan_save_track+0x18/0x40 [ 14.305974] kasan_save_alloc_info+0x3b/0x50 [ 14.306205] __kasan_kmalloc+0xb7/0xc0 [ 14.306412] __kmalloc_cache_noprof+0x189/0x420 [ 14.306707] kasan_atomics+0x95/0x310 [ 14.306902] kunit_try_run_case+0x1a5/0x480 [ 14.307109] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.307406] kthread+0x337/0x6f0 [ 14.307600] ret_from_fork+0x116/0x1d0 [ 14.307838] ret_from_fork_asm+0x1a/0x30 [ 14.307976] [ 14.308065] The buggy address belongs to the object at ffff8881033c5500 [ 14.308065] which belongs to the cache kmalloc-64 of size 64 [ 14.308771] The buggy address is located 0 bytes to the right of [ 14.308771] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.309298] [ 14.309400] The buggy address belongs to the physical page: [ 14.309761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.310123] flags: 0x200000000000000(node=0|zone=2) [ 14.310403] page_type: f5(slab) [ 14.310571] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.311012] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.311360] page dumped because: kasan: bad access detected [ 14.311615] [ 14.311785] Memory state around the buggy address: [ 14.312014] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.312360] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.312693] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.312971] ^ [ 14.313247] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.313609] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.313906] ================================================================== [ 14.433531] ================================================================== [ 14.433900] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 14.434401] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.434862] [ 14.435095] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.435142] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.435168] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.435190] Call Trace: [ 14.435211] <TASK> [ 14.435230] dump_stack_lvl+0x73/0xb0 [ 14.435271] print_report+0xd1/0x650 [ 14.435295] ? __virt_addr_valid+0x1db/0x2d0 [ 14.435320] ? kasan_atomics_helper+0xc70/0x5450 [ 14.435341] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.435364] ? kasan_atomics_helper+0xc70/0x5450 [ 14.435388] kasan_report+0x141/0x180 [ 14.435410] ? kasan_atomics_helper+0xc70/0x5450 [ 14.435436] kasan_check_range+0x10c/0x1c0 [ 14.435460] __kasan_check_write+0x18/0x20 [ 14.435479] kasan_atomics_helper+0xc70/0x5450 [ 14.435502] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.435525] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.435550] ? trace_hardirqs_on+0x37/0xe0 [ 14.435573] ? kasan_atomics+0x152/0x310 [ 14.435600] kasan_atomics+0x1dc/0x310 [ 14.435623] ? __pfx_kasan_atomics+0x10/0x10 [ 14.435647] ? __pfx_kasan_atomics+0x10/0x10 [ 14.435674] kunit_try_run_case+0x1a5/0x480 [ 14.435699] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.435721] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.435745] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.435769] ? __kthread_parkme+0x82/0x180 [ 14.435790] ? preempt_count_sub+0x50/0x80 [ 14.435814] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.435838] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.435862] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.435885] kthread+0x337/0x6f0 [ 14.435907] ? trace_preempt_on+0x20/0xc0 [ 14.435929] ? __pfx_kthread+0x10/0x10 [ 14.435950] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.435971] ? calculate_sigpending+0x7b/0xa0 [ 14.435995] ? __pfx_kthread+0x10/0x10 [ 14.436018] ret_from_fork+0x116/0x1d0 [ 14.436046] ? __pfx_kthread+0x10/0x10 [ 14.436068] ret_from_fork_asm+0x1a/0x30 [ 14.436099] </TASK> [ 14.436112] [ 14.443727] Allocated by task 282: [ 14.443896] kasan_save_stack+0x45/0x70 [ 14.444052] kasan_save_track+0x18/0x40 [ 14.444196] kasan_save_alloc_info+0x3b/0x50 [ 14.444547] __kasan_kmalloc+0xb7/0xc0 [ 14.444850] __kmalloc_cache_noprof+0x189/0x420 [ 14.445109] kasan_atomics+0x95/0x310 [ 14.445270] kunit_try_run_case+0x1a5/0x480 [ 14.445458] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.445717] kthread+0x337/0x6f0 [ 14.445882] ret_from_fork+0x116/0x1d0 [ 14.446015] ret_from_fork_asm+0x1a/0x30 [ 14.446226] [ 14.446322] The buggy address belongs to the object at ffff8881033c5500 [ 14.446322] which belongs to the cache kmalloc-64 of size 64 [ 14.446848] The buggy address is located 0 bytes to the right of [ 14.446848] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.447372] [ 14.447470] The buggy address belongs to the physical page: [ 14.447733] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.448082] flags: 0x200000000000000(node=0|zone=2) [ 14.448320] page_type: f5(slab) [ 14.448477] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.448810] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.449051] page dumped because: kasan: bad access detected [ 14.449224] [ 14.449293] Memory state around the buggy address: [ 14.449448] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.449770] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.450094] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.450670] ^ [ 14.450827] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.451059] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.451282] ================================================================== [ 14.219887] ================================================================== [ 14.220438] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 14.220824] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.221169] [ 14.221289] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.221335] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.221360] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.221382] Call Trace: [ 14.221397] <TASK> [ 14.221413] dump_stack_lvl+0x73/0xb0 [ 14.221442] print_report+0xd1/0x650 [ 14.221465] ? __virt_addr_valid+0x1db/0x2d0 [ 14.221499] ? kasan_atomics_helper+0x565/0x5450 [ 14.221521] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.221545] ? kasan_atomics_helper+0x565/0x5450 [ 14.221578] kasan_report+0x141/0x180 [ 14.221602] ? kasan_atomics_helper+0x565/0x5450 [ 14.221628] kasan_check_range+0x10c/0x1c0 [ 14.221665] __kasan_check_write+0x18/0x20 [ 14.221685] kasan_atomics_helper+0x565/0x5450 [ 14.221709] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.221734] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.221760] ? trace_hardirqs_on+0x37/0xe0 [ 14.221785] ? kasan_atomics+0x152/0x310 [ 14.221812] kasan_atomics+0x1dc/0x310 [ 14.221836] ? __pfx_kasan_atomics+0x10/0x10 [ 14.221860] ? __pfx_kasan_atomics+0x10/0x10 [ 14.221886] kunit_try_run_case+0x1a5/0x480 [ 14.221911] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.221933] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.221959] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.221982] ? __kthread_parkme+0x82/0x180 [ 14.222003] ? preempt_count_sub+0x50/0x80 [ 14.222037] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.222061] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.222094] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.222118] kthread+0x337/0x6f0 [ 14.222138] ? trace_preempt_on+0x20/0xc0 [ 14.222170] ? __pfx_kthread+0x10/0x10 [ 14.222192] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.222215] ? calculate_sigpending+0x7b/0xa0 [ 14.222238] ? __pfx_kthread+0x10/0x10 [ 14.222261] ret_from_fork+0x116/0x1d0 [ 14.222280] ? __pfx_kthread+0x10/0x10 [ 14.222301] ret_from_fork_asm+0x1a/0x30 [ 14.222332] </TASK> [ 14.222346] [ 14.230088] Allocated by task 282: [ 14.230302] kasan_save_stack+0x45/0x70 [ 14.230512] kasan_save_track+0x18/0x40 [ 14.230699] kasan_save_alloc_info+0x3b/0x50 [ 14.230948] __kasan_kmalloc+0xb7/0xc0 [ 14.231129] __kmalloc_cache_noprof+0x189/0x420 [ 14.231352] kasan_atomics+0x95/0x310 [ 14.231542] kunit_try_run_case+0x1a5/0x480 [ 14.231741] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.232003] kthread+0x337/0x6f0 [ 14.232138] ret_from_fork+0x116/0x1d0 [ 14.232276] ret_from_fork_asm+0x1a/0x30 [ 14.232496] [ 14.232591] The buggy address belongs to the object at ffff8881033c5500 [ 14.232591] which belongs to the cache kmalloc-64 of size 64 [ 14.233010] The buggy address is located 0 bytes to the right of [ 14.233010] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.233546] [ 14.233664] The buggy address belongs to the physical page: [ 14.233902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.234244] flags: 0x200000000000000(node=0|zone=2) [ 14.234427] page_type: f5(slab) [ 14.234551] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.234784] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.235012] page dumped because: kasan: bad access detected [ 14.235333] [ 14.235466] Memory state around the buggy address: [ 14.235749] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.236077] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.236353] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.236568] ^ [ 14.236938] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.237288] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.237630] ================================================================== [ 15.151396] ================================================================== [ 15.151708] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 15.151986] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 15.152392] [ 15.152510] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.152877] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.152891] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.152914] Call Trace: [ 15.152931] <TASK> [ 15.152947] dump_stack_lvl+0x73/0xb0 [ 15.152977] print_report+0xd1/0x650 [ 15.153000] ? __virt_addr_valid+0x1db/0x2d0 [ 15.153036] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.153058] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.153081] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.153104] kasan_report+0x141/0x180 [ 15.153126] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.153153] kasan_check_range+0x10c/0x1c0 [ 15.153178] __kasan_check_write+0x18/0x20 [ 15.153197] kasan_atomics_helper+0x1e12/0x5450 [ 15.153221] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.153266] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.153291] ? trace_hardirqs_on+0x37/0xe0 [ 15.153314] ? kasan_atomics+0x152/0x310 [ 15.153341] kasan_atomics+0x1dc/0x310 [ 15.153365] ? __pfx_kasan_atomics+0x10/0x10 [ 15.153389] ? __pfx_kasan_atomics+0x10/0x10 [ 15.153416] kunit_try_run_case+0x1a5/0x480 [ 15.153440] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.153462] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.153508] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.153532] ? __kthread_parkme+0x82/0x180 [ 15.153553] ? preempt_count_sub+0x50/0x80 [ 15.153577] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.153601] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.153624] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.153658] kthread+0x337/0x6f0 [ 15.153679] ? trace_preempt_on+0x20/0xc0 [ 15.153701] ? __pfx_kthread+0x10/0x10 [ 15.153722] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.153744] ? calculate_sigpending+0x7b/0xa0 [ 15.153768] ? __pfx_kthread+0x10/0x10 [ 15.153790] ret_from_fork+0x116/0x1d0 [ 15.153809] ? __pfx_kthread+0x10/0x10 [ 15.153830] ret_from_fork_asm+0x1a/0x30 [ 15.153861] </TASK> [ 15.153873] [ 15.162346] Allocated by task 282: [ 15.162562] kasan_save_stack+0x45/0x70 [ 15.162770] kasan_save_track+0x18/0x40 [ 15.163135] kasan_save_alloc_info+0x3b/0x50 [ 15.163372] __kasan_kmalloc+0xb7/0xc0 [ 15.163507] __kmalloc_cache_noprof+0x189/0x420 [ 15.163664] kasan_atomics+0x95/0x310 [ 15.163798] kunit_try_run_case+0x1a5/0x480 [ 15.164001] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.164275] kthread+0x337/0x6f0 [ 15.164449] ret_from_fork+0x116/0x1d0 [ 15.164637] ret_from_fork_asm+0x1a/0x30 [ 15.165013] [ 15.165102] The buggy address belongs to the object at ffff8881033c5500 [ 15.165102] which belongs to the cache kmalloc-64 of size 64 [ 15.165542] The buggy address is located 0 bytes to the right of [ 15.165542] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 15.166071] [ 15.166206] The buggy address belongs to the physical page: [ 15.166465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 15.166869] flags: 0x200000000000000(node=0|zone=2) [ 15.167144] page_type: f5(slab) [ 15.167267] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.167491] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.167755] page dumped because: kasan: bad access detected [ 15.168077] [ 15.168207] Memory state around the buggy address: [ 15.168557] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.169089] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.169393] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.169703] ^ [ 15.169895] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.170240] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.170448] ================================================================== [ 14.355184] ================================================================== [ 14.355521] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 14.356031] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.356265] [ 14.356353] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.356396] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.356410] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.356464] Call Trace: [ 14.356484] <TASK> [ 14.356517] dump_stack_lvl+0x73/0xb0 [ 14.356592] print_report+0xd1/0x650 [ 14.356617] ? __virt_addr_valid+0x1db/0x2d0 [ 14.356661] ? kasan_atomics_helper+0x992/0x5450 [ 14.356709] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.356732] ? kasan_atomics_helper+0x992/0x5450 [ 14.356753] kasan_report+0x141/0x180 [ 14.356788] ? kasan_atomics_helper+0x992/0x5450 [ 14.356814] kasan_check_range+0x10c/0x1c0 [ 14.356838] __kasan_check_write+0x18/0x20 [ 14.356858] kasan_atomics_helper+0x992/0x5450 [ 14.356881] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.356904] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.356929] ? trace_hardirqs_on+0x37/0xe0 [ 14.356976] ? kasan_atomics+0x152/0x310 [ 14.357002] kasan_atomics+0x1dc/0x310 [ 14.357042] ? __pfx_kasan_atomics+0x10/0x10 [ 14.357066] ? __pfx_kasan_atomics+0x10/0x10 [ 14.357093] kunit_try_run_case+0x1a5/0x480 [ 14.357143] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.357166] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.357191] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.357225] ? __kthread_parkme+0x82/0x180 [ 14.357247] ? preempt_count_sub+0x50/0x80 [ 14.357297] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.357321] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.357346] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.357380] kthread+0x337/0x6f0 [ 14.357417] ? trace_preempt_on+0x20/0xc0 [ 14.357449] ? __pfx_kthread+0x10/0x10 [ 14.357471] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.357492] ? calculate_sigpending+0x7b/0xa0 [ 14.357528] ? __pfx_kthread+0x10/0x10 [ 14.357575] ret_from_fork+0x116/0x1d0 [ 14.357595] ? __pfx_kthread+0x10/0x10 [ 14.357616] ret_from_fork_asm+0x1a/0x30 [ 14.357658] </TASK> [ 14.357670] [ 14.365707] Allocated by task 282: [ 14.365945] kasan_save_stack+0x45/0x70 [ 14.366351] kasan_save_track+0x18/0x40 [ 14.366629] kasan_save_alloc_info+0x3b/0x50 [ 14.366897] __kasan_kmalloc+0xb7/0xc0 [ 14.367044] __kmalloc_cache_noprof+0x189/0x420 [ 14.367198] kasan_atomics+0x95/0x310 [ 14.367430] kunit_try_run_case+0x1a5/0x480 [ 14.367712] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.367962] kthread+0x337/0x6f0 [ 14.368150] ret_from_fork+0x116/0x1d0 [ 14.368373] ret_from_fork_asm+0x1a/0x30 [ 14.368575] [ 14.368719] The buggy address belongs to the object at ffff8881033c5500 [ 14.368719] which belongs to the cache kmalloc-64 of size 64 [ 14.369240] The buggy address is located 0 bytes to the right of [ 14.369240] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.369845] [ 14.369950] The buggy address belongs to the physical page: [ 14.370215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.370612] flags: 0x200000000000000(node=0|zone=2) [ 14.370895] page_type: f5(slab) [ 14.371083] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.371465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.371825] page dumped because: kasan: bad access detected [ 14.372132] [ 14.372230] Memory state around the buggy address: [ 14.372453] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.372765] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.373115] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.373322] ^ [ 14.373470] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.374101] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.374419] ================================================================== [ 14.964445] ================================================================== [ 14.964833] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 14.965176] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.965497] [ 14.965618] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.965664] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.965678] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.965700] Call Trace: [ 14.965718] <TASK> [ 14.965747] dump_stack_lvl+0x73/0xb0 [ 14.965776] print_report+0xd1/0x650 [ 14.965811] ? __virt_addr_valid+0x1db/0x2d0 [ 14.965836] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.965858] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.965881] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.965911] kasan_report+0x141/0x180 [ 14.965934] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.965960] kasan_check_range+0x10c/0x1c0 [ 14.965995] __kasan_check_write+0x18/0x20 [ 14.966015] kasan_atomics_helper+0x18b1/0x5450 [ 14.966047] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.966070] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.966095] ? trace_hardirqs_on+0x37/0xe0 [ 14.966117] ? kasan_atomics+0x152/0x310 [ 14.966145] kasan_atomics+0x1dc/0x310 [ 14.966168] ? __pfx_kasan_atomics+0x10/0x10 [ 14.966191] ? __pfx_kasan_atomics+0x10/0x10 [ 14.966219] kunit_try_run_case+0x1a5/0x480 [ 14.966244] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.966266] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.966292] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.966325] ? __kthread_parkme+0x82/0x180 [ 14.966348] ? preempt_count_sub+0x50/0x80 [ 14.966383] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.966407] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.966431] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.966454] kthread+0x337/0x6f0 [ 14.966475] ? trace_preempt_on+0x20/0xc0 [ 14.966499] ? __pfx_kthread+0x10/0x10 [ 14.966520] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.966542] ? calculate_sigpending+0x7b/0xa0 [ 14.966567] ? __pfx_kthread+0x10/0x10 [ 14.966589] ret_from_fork+0x116/0x1d0 [ 14.966609] ? __pfx_kthread+0x10/0x10 [ 14.966630] ret_from_fork_asm+0x1a/0x30 [ 14.966675] </TASK> [ 14.966687] [ 14.974298] Allocated by task 282: [ 14.974445] kasan_save_stack+0x45/0x70 [ 14.974592] kasan_save_track+0x18/0x40 [ 14.974728] kasan_save_alloc_info+0x3b/0x50 [ 14.974876] __kasan_kmalloc+0xb7/0xc0 [ 14.975087] __kmalloc_cache_noprof+0x189/0x420 [ 14.975311] kasan_atomics+0x95/0x310 [ 14.975497] kunit_try_run_case+0x1a5/0x480 [ 14.975706] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.976087] kthread+0x337/0x6f0 [ 14.976214] ret_from_fork+0x116/0x1d0 [ 14.976346] ret_from_fork_asm+0x1a/0x30 [ 14.976495] [ 14.976591] The buggy address belongs to the object at ffff8881033c5500 [ 14.976591] which belongs to the cache kmalloc-64 of size 64 [ 14.977546] The buggy address is located 0 bytes to the right of [ 14.977546] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.977971] [ 14.978057] The buggy address belongs to the physical page: [ 14.978231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.978602] flags: 0x200000000000000(node=0|zone=2) [ 14.979112] page_type: f5(slab) [ 14.979281] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.979571] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.980065] page dumped because: kasan: bad access detected [ 14.980243] [ 14.980314] Memory state around the buggy address: [ 14.980470] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.980849] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.981179] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.981520] ^ [ 14.981915] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.982238] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.982525] ================================================================== [ 15.039874] ================================================================== [ 15.040240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 15.040475] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 15.041016] [ 15.041122] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.041167] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.041180] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.041203] Call Trace: [ 15.041220] <TASK> [ 15.041238] dump_stack_lvl+0x73/0xb0 [ 15.041266] print_report+0xd1/0x650 [ 15.041290] ? __virt_addr_valid+0x1db/0x2d0 [ 15.041314] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.041336] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.041359] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.041382] kasan_report+0x141/0x180 [ 15.041404] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.041430] kasan_check_range+0x10c/0x1c0 [ 15.041454] __kasan_check_write+0x18/0x20 [ 15.041474] kasan_atomics_helper+0x1b22/0x5450 [ 15.041498] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.041520] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.041546] ? trace_hardirqs_on+0x37/0xe0 [ 15.041570] ? kasan_atomics+0x152/0x310 [ 15.041597] kasan_atomics+0x1dc/0x310 [ 15.041620] ? __pfx_kasan_atomics+0x10/0x10 [ 15.041644] ? __pfx_kasan_atomics+0x10/0x10 [ 15.041697] kunit_try_run_case+0x1a5/0x480 [ 15.041728] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.041763] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.041789] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.041812] ? __kthread_parkme+0x82/0x180 [ 15.041834] ? preempt_count_sub+0x50/0x80 [ 15.041859] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.041883] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.041907] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.041941] kthread+0x337/0x6f0 [ 15.041962] ? trace_preempt_on+0x20/0xc0 [ 15.041985] ? __pfx_kthread+0x10/0x10 [ 15.042016] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.042048] ? calculate_sigpending+0x7b/0xa0 [ 15.042073] ? __pfx_kthread+0x10/0x10 [ 15.042095] ret_from_fork+0x116/0x1d0 [ 15.042114] ? __pfx_kthread+0x10/0x10 [ 15.042135] ret_from_fork_asm+0x1a/0x30 [ 15.042166] </TASK> [ 15.042178] [ 15.050256] Allocated by task 282: [ 15.050459] kasan_save_stack+0x45/0x70 [ 15.050724] kasan_save_track+0x18/0x40 [ 15.050906] kasan_save_alloc_info+0x3b/0x50 [ 15.051079] __kasan_kmalloc+0xb7/0xc0 [ 15.051214] __kmalloc_cache_noprof+0x189/0x420 [ 15.051371] kasan_atomics+0x95/0x310 [ 15.051505] kunit_try_run_case+0x1a5/0x480 [ 15.051774] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.052044] kthread+0x337/0x6f0 [ 15.052381] ret_from_fork+0x116/0x1d0 [ 15.052601] ret_from_fork_asm+0x1a/0x30 [ 15.052873] [ 15.052945] The buggy address belongs to the object at ffff8881033c5500 [ 15.052945] which belongs to the cache kmalloc-64 of size 64 [ 15.053595] The buggy address is located 0 bytes to the right of [ 15.053595] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 15.054104] [ 15.054177] The buggy address belongs to the physical page: [ 15.054350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 15.054697] flags: 0x200000000000000(node=0|zone=2) [ 15.054964] page_type: f5(slab) [ 15.055162] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.055505] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.056317] page dumped because: kasan: bad access detected [ 15.057029] [ 15.057219] Memory state around the buggy address: [ 15.057410] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.058592] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.058923] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.059378] ^ [ 15.059784] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.060096] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.060485] ================================================================== [ 14.180074] ================================================================== [ 14.180434] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 14.181006] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.181247] [ 14.181335] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.181378] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.181390] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.181413] Call Trace: [ 14.181431] <TASK> [ 14.181450] dump_stack_lvl+0x73/0xb0 [ 14.181478] print_report+0xd1/0x650 [ 14.181501] ? __virt_addr_valid+0x1db/0x2d0 [ 14.181525] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.181547] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.181570] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.181592] kasan_report+0x141/0x180 [ 14.181615] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.181641] kasan_check_range+0x10c/0x1c0 [ 14.181665] __kasan_check_write+0x18/0x20 [ 14.181684] kasan_atomics_helper+0x4a0/0x5450 [ 14.181708] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.181731] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.181756] ? trace_hardirqs_on+0x37/0xe0 [ 14.181778] ? kasan_atomics+0x152/0x310 [ 14.181805] kasan_atomics+0x1dc/0x310 [ 14.181828] ? __pfx_kasan_atomics+0x10/0x10 [ 14.181852] ? __pfx_kasan_atomics+0x10/0x10 [ 14.181880] kunit_try_run_case+0x1a5/0x480 [ 14.181925] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.181948] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.181973] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.182008] ? __kthread_parkme+0x82/0x180 [ 14.182039] ? preempt_count_sub+0x50/0x80 [ 14.182063] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.182087] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.182110] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.182133] kthread+0x337/0x6f0 [ 14.182154] ? trace_preempt_on+0x20/0xc0 [ 14.182176] ? __pfx_kthread+0x10/0x10 [ 14.182198] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.182219] ? calculate_sigpending+0x7b/0xa0 [ 14.182243] ? __pfx_kthread+0x10/0x10 [ 14.182265] ret_from_fork+0x116/0x1d0 [ 14.182285] ? __pfx_kthread+0x10/0x10 [ 14.182305] ret_from_fork_asm+0x1a/0x30 [ 14.182337] </TASK> [ 14.182350] [ 14.190552] Allocated by task 282: [ 14.190779] kasan_save_stack+0x45/0x70 [ 14.190980] kasan_save_track+0x18/0x40 [ 14.191187] kasan_save_alloc_info+0x3b/0x50 [ 14.191358] __kasan_kmalloc+0xb7/0xc0 [ 14.191494] __kmalloc_cache_noprof+0x189/0x420 [ 14.191842] kasan_atomics+0x95/0x310 [ 14.192043] kunit_try_run_case+0x1a5/0x480 [ 14.192194] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.192400] kthread+0x337/0x6f0 [ 14.192599] ret_from_fork+0x116/0x1d0 [ 14.192994] ret_from_fork_asm+0x1a/0x30 [ 14.193324] [ 14.193403] The buggy address belongs to the object at ffff8881033c5500 [ 14.193403] which belongs to the cache kmalloc-64 of size 64 [ 14.195788] The buggy address is located 0 bytes to the right of [ 14.195788] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.196267] [ 14.196374] The buggy address belongs to the physical page: [ 14.196661] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.196935] flags: 0x200000000000000(node=0|zone=2) [ 14.197215] page_type: f5(slab) [ 14.197385] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.197716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.198054] page dumped because: kasan: bad access detected [ 14.198318] [ 14.198410] Memory state around the buggy address: [ 14.198630] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.198948] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.199279] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.199592] ^ [ 14.199823] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.200136] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.200456] ================================================================== [ 14.715807] ================================================================== [ 14.716392] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 14.716720] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.717012] [ 14.717115] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.717160] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.717173] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.717195] Call Trace: [ 14.717212] <TASK> [ 14.717229] dump_stack_lvl+0x73/0xb0 [ 14.717257] print_report+0xd1/0x650 [ 14.717281] ? __virt_addr_valid+0x1db/0x2d0 [ 14.717305] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.717327] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.717349] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.717371] kasan_report+0x141/0x180 [ 14.717394] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.717421] kasan_check_range+0x10c/0x1c0 [ 14.717444] __kasan_check_write+0x18/0x20 [ 14.717464] kasan_atomics_helper+0x12e6/0x5450 [ 14.717487] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.717509] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.717536] ? trace_hardirqs_on+0x37/0xe0 [ 14.717558] ? kasan_atomics+0x152/0x310 [ 14.717585] kasan_atomics+0x1dc/0x310 [ 14.717608] ? __pfx_kasan_atomics+0x10/0x10 [ 14.717631] ? __pfx_kasan_atomics+0x10/0x10 [ 14.717658] kunit_try_run_case+0x1a5/0x480 [ 14.717682] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.717708] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.717734] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.717758] ? __kthread_parkme+0x82/0x180 [ 14.717780] ? preempt_count_sub+0x50/0x80 [ 14.717804] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.717828] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.717852] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.717876] kthread+0x337/0x6f0 [ 14.717895] ? trace_preempt_on+0x20/0xc0 [ 14.717918] ? __pfx_kthread+0x10/0x10 [ 14.717939] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.717961] ? calculate_sigpending+0x7b/0xa0 [ 14.717985] ? __pfx_kthread+0x10/0x10 [ 14.718007] ret_from_fork+0x116/0x1d0 [ 14.718036] ? __pfx_kthread+0x10/0x10 [ 14.718058] ret_from_fork_asm+0x1a/0x30 [ 14.718088] </TASK> [ 14.718102] [ 14.725248] Allocated by task 282: [ 14.725442] kasan_save_stack+0x45/0x70 [ 14.725653] kasan_save_track+0x18/0x40 [ 14.725843] kasan_save_alloc_info+0x3b/0x50 [ 14.726067] __kasan_kmalloc+0xb7/0xc0 [ 14.726258] __kmalloc_cache_noprof+0x189/0x420 [ 14.726483] kasan_atomics+0x95/0x310 [ 14.726653] kunit_try_run_case+0x1a5/0x480 [ 14.726833] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.727045] kthread+0x337/0x6f0 [ 14.727212] ret_from_fork+0x116/0x1d0 [ 14.727383] ret_from_fork_asm+0x1a/0x30 [ 14.727555] [ 14.727658] The buggy address belongs to the object at ffff8881033c5500 [ 14.727658] which belongs to the cache kmalloc-64 of size 64 [ 14.728102] The buggy address is located 0 bytes to the right of [ 14.728102] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.728472] [ 14.728546] The buggy address belongs to the physical page: [ 14.728816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.729177] flags: 0x200000000000000(node=0|zone=2) [ 14.729414] page_type: f5(slab) [ 14.729583] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.730037] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.730300] page dumped because: kasan: bad access detected [ 14.730473] [ 14.730546] Memory state around the buggy address: [ 14.730705] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.730989] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.731317] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.731635] ^ [ 14.731860] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.732377] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.732592] ================================================================== [ 14.452231] ================================================================== [ 14.452589] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 14.453241] Read of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.453617] [ 14.453740] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.453785] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.453809] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.453832] Call Trace: [ 14.453848] <TASK> [ 14.453866] dump_stack_lvl+0x73/0xb0 [ 14.453907] print_report+0xd1/0x650 [ 14.453929] ? __virt_addr_valid+0x1db/0x2d0 [ 14.453954] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.453976] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.453999] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.454032] kasan_report+0x141/0x180 [ 14.454055] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.454081] __asan_report_load4_noabort+0x18/0x20 [ 14.454105] kasan_atomics_helper+0x4a84/0x5450 [ 14.454127] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.454150] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.454184] ? trace_hardirqs_on+0x37/0xe0 [ 14.454208] ? kasan_atomics+0x152/0x310 [ 14.454245] kasan_atomics+0x1dc/0x310 [ 14.454269] ? __pfx_kasan_atomics+0x10/0x10 [ 14.454293] ? __pfx_kasan_atomics+0x10/0x10 [ 14.454329] kunit_try_run_case+0x1a5/0x480 [ 14.454353] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.454376] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.454411] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.454434] ? __kthread_parkme+0x82/0x180 [ 14.454457] ? preempt_count_sub+0x50/0x80 [ 14.454492] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.454518] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.454544] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.454577] kthread+0x337/0x6f0 [ 14.454598] ? trace_preempt_on+0x20/0xc0 [ 14.454620] ? __pfx_kthread+0x10/0x10 [ 14.454651] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.454672] ? calculate_sigpending+0x7b/0xa0 [ 14.454697] ? __pfx_kthread+0x10/0x10 [ 14.454730] ret_from_fork+0x116/0x1d0 [ 14.454762] ? __pfx_kthread+0x10/0x10 [ 14.454784] ret_from_fork_asm+0x1a/0x30 [ 14.454815] </TASK> [ 14.454827] [ 14.462555] Allocated by task 282: [ 14.462769] kasan_save_stack+0x45/0x70 [ 14.462986] kasan_save_track+0x18/0x40 [ 14.463174] kasan_save_alloc_info+0x3b/0x50 [ 14.463402] __kasan_kmalloc+0xb7/0xc0 [ 14.463553] __kmalloc_cache_noprof+0x189/0x420 [ 14.463852] kasan_atomics+0x95/0x310 [ 14.464000] kunit_try_run_case+0x1a5/0x480 [ 14.464237] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.464414] kthread+0x337/0x6f0 [ 14.464537] ret_from_fork+0x116/0x1d0 [ 14.464671] ret_from_fork_asm+0x1a/0x30 [ 14.464811] [ 14.464882] The buggy address belongs to the object at ffff8881033c5500 [ 14.464882] which belongs to the cache kmalloc-64 of size 64 [ 14.465359] The buggy address is located 0 bytes to the right of [ 14.465359] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.466169] [ 14.466269] The buggy address belongs to the physical page: [ 14.466469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.466708] flags: 0x200000000000000(node=0|zone=2) [ 14.466872] page_type: f5(slab) [ 14.466994] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.467233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.467586] page dumped because: kasan: bad access detected [ 14.468089] [ 14.468205] Memory state around the buggy address: [ 14.468455] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.468986] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.469333] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.469630] ^ [ 14.469864] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.470173] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.470389] ================================================================== [ 14.983196] ================================================================== [ 14.983598] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 14.983904] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.984264] [ 14.984381] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.984427] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.984441] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.984462] Call Trace: [ 14.984478] <TASK> [ 14.984494] dump_stack_lvl+0x73/0xb0 [ 14.984522] print_report+0xd1/0x650 [ 14.984545] ? __virt_addr_valid+0x1db/0x2d0 [ 14.984568] ? kasan_atomics_helper+0x194a/0x5450 [ 14.984590] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.984613] ? kasan_atomics_helper+0x194a/0x5450 [ 14.984636] kasan_report+0x141/0x180 [ 14.984671] ? kasan_atomics_helper+0x194a/0x5450 [ 14.984708] kasan_check_range+0x10c/0x1c0 [ 14.984732] __kasan_check_write+0x18/0x20 [ 14.984763] kasan_atomics_helper+0x194a/0x5450 [ 14.984787] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.984809] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.984834] ? trace_hardirqs_on+0x37/0xe0 [ 14.984867] ? kasan_atomics+0x152/0x310 [ 14.984897] kasan_atomics+0x1dc/0x310 [ 14.984924] ? __pfx_kasan_atomics+0x10/0x10 [ 14.984960] ? __pfx_kasan_atomics+0x10/0x10 [ 14.984988] kunit_try_run_case+0x1a5/0x480 [ 14.985019] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.985050] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.985076] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.985112] ? __kthread_parkme+0x82/0x180 [ 14.985133] ? preempt_count_sub+0x50/0x80 [ 14.985159] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.985194] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.985218] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.985243] kthread+0x337/0x6f0 [ 14.985263] ? trace_preempt_on+0x20/0xc0 [ 14.985285] ? __pfx_kthread+0x10/0x10 [ 14.985306] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.985327] ? calculate_sigpending+0x7b/0xa0 [ 14.985352] ? __pfx_kthread+0x10/0x10 [ 14.985374] ret_from_fork+0x116/0x1d0 [ 14.985395] ? __pfx_kthread+0x10/0x10 [ 14.985425] ret_from_fork_asm+0x1a/0x30 [ 14.985456] </TASK> [ 14.985469] [ 14.993335] Allocated by task 282: [ 14.993529] kasan_save_stack+0x45/0x70 [ 14.993696] kasan_save_track+0x18/0x40 [ 14.993875] kasan_save_alloc_info+0x3b/0x50 [ 14.994076] __kasan_kmalloc+0xb7/0xc0 [ 14.994244] __kmalloc_cache_noprof+0x189/0x420 [ 14.994444] kasan_atomics+0x95/0x310 [ 14.994619] kunit_try_run_case+0x1a5/0x480 [ 14.994826] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.995070] kthread+0x337/0x6f0 [ 14.995195] ret_from_fork+0x116/0x1d0 [ 14.995330] ret_from_fork_asm+0x1a/0x30 [ 14.995486] [ 14.995620] The buggy address belongs to the object at ffff8881033c5500 [ 14.995620] which belongs to the cache kmalloc-64 of size 64 [ 14.996153] The buggy address is located 0 bytes to the right of [ 14.996153] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.996574] [ 14.996649] The buggy address belongs to the physical page: [ 14.996915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.997311] flags: 0x200000000000000(node=0|zone=2) [ 14.997540] page_type: f5(slab) [ 14.997665] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.997898] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.998137] page dumped because: kasan: bad access detected [ 14.998421] [ 14.998530] Memory state around the buggy address: [ 14.998759] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.999104] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.999465] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.999920] ^ [ 15.000109] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.000404] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.000616] ================================================================== [ 14.375158] ================================================================== [ 14.375564] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 14.375934] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.376293] [ 14.376454] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.376499] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.376512] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.376560] Call Trace: [ 14.376580] <TASK> [ 14.376599] dump_stack_lvl+0x73/0xb0 [ 14.376640] print_report+0xd1/0x650 [ 14.376664] ? __virt_addr_valid+0x1db/0x2d0 [ 14.376688] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.376736] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.376759] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.376781] kasan_report+0x141/0x180 [ 14.376814] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.376841] kasan_check_range+0x10c/0x1c0 [ 14.376867] __kasan_check_write+0x18/0x20 [ 14.376912] kasan_atomics_helper+0xa2b/0x5450 [ 14.376936] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.376958] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.376994] ? trace_hardirqs_on+0x37/0xe0 [ 14.377018] ? kasan_atomics+0x152/0x310 [ 14.377083] kasan_atomics+0x1dc/0x310 [ 14.377106] ? __pfx_kasan_atomics+0x10/0x10 [ 14.377141] ? __pfx_kasan_atomics+0x10/0x10 [ 14.377169] kunit_try_run_case+0x1a5/0x480 [ 14.377220] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.377256] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.377293] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.377318] ? __kthread_parkme+0x82/0x180 [ 14.377341] ? preempt_count_sub+0x50/0x80 [ 14.377378] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.377402] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.377427] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.377463] kthread+0x337/0x6f0 [ 14.377484] ? trace_preempt_on+0x20/0xc0 [ 14.377506] ? __pfx_kthread+0x10/0x10 [ 14.377528] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.377566] ? calculate_sigpending+0x7b/0xa0 [ 14.377604] ? __pfx_kthread+0x10/0x10 [ 14.377626] ret_from_fork+0x116/0x1d0 [ 14.377667] ? __pfx_kthread+0x10/0x10 [ 14.377689] ret_from_fork_asm+0x1a/0x30 [ 14.377721] </TASK> [ 14.377745] [ 14.385696] Allocated by task 282: [ 14.385888] kasan_save_stack+0x45/0x70 [ 14.386095] kasan_save_track+0x18/0x40 [ 14.386284] kasan_save_alloc_info+0x3b/0x50 [ 14.386453] __kasan_kmalloc+0xb7/0xc0 [ 14.386584] __kmalloc_cache_noprof+0x189/0x420 [ 14.387001] kasan_atomics+0x95/0x310 [ 14.387194] kunit_try_run_case+0x1a5/0x480 [ 14.387396] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.387703] kthread+0x337/0x6f0 [ 14.387873] ret_from_fork+0x116/0x1d0 [ 14.388073] ret_from_fork_asm+0x1a/0x30 [ 14.388217] [ 14.388288] The buggy address belongs to the object at ffff8881033c5500 [ 14.388288] which belongs to the cache kmalloc-64 of size 64 [ 14.389049] The buggy address is located 0 bytes to the right of [ 14.389049] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.389581] [ 14.389681] The buggy address belongs to the physical page: [ 14.389936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.390298] flags: 0x200000000000000(node=0|zone=2) [ 14.390551] page_type: f5(slab) [ 14.390779] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.391123] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.391469] page dumped because: kasan: bad access detected [ 14.391749] [ 14.391878] Memory state around the buggy address: [ 14.392149] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.392541] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.392952] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.393270] ^ [ 14.393654] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.393920] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.394725] ================================================================== [ 15.085959] ================================================================== [ 15.086549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 15.087064] Read of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 15.087653] [ 15.087777] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.087825] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.087852] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.087874] Call Trace: [ 15.087893] <TASK> [ 15.087992] dump_stack_lvl+0x73/0xb0 [ 15.088039] print_report+0xd1/0x650 [ 15.088064] ? __virt_addr_valid+0x1db/0x2d0 [ 15.088089] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.088111] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.088135] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.088161] kasan_report+0x141/0x180 [ 15.088183] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.088210] __asan_report_load8_noabort+0x18/0x20 [ 15.088234] kasan_atomics_helper+0x4f30/0x5450 [ 15.088258] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.088280] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.088305] ? trace_hardirqs_on+0x37/0xe0 [ 15.088328] ? kasan_atomics+0x152/0x310 [ 15.088357] kasan_atomics+0x1dc/0x310 [ 15.088380] ? __pfx_kasan_atomics+0x10/0x10 [ 15.088405] ? __pfx_kasan_atomics+0x10/0x10 [ 15.088432] kunit_try_run_case+0x1a5/0x480 [ 15.088456] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.088479] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.088503] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.088527] ? __kthread_parkme+0x82/0x180 [ 15.088549] ? preempt_count_sub+0x50/0x80 [ 15.088573] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.088599] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.088622] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.088645] kthread+0x337/0x6f0 [ 15.088667] ? trace_preempt_on+0x20/0xc0 [ 15.088688] ? __pfx_kthread+0x10/0x10 [ 15.088709] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.088730] ? calculate_sigpending+0x7b/0xa0 [ 15.088755] ? __pfx_kthread+0x10/0x10 [ 15.088776] ret_from_fork+0x116/0x1d0 [ 15.088795] ? __pfx_kthread+0x10/0x10 [ 15.088816] ret_from_fork_asm+0x1a/0x30 [ 15.088849] </TASK> [ 15.088861] [ 15.099075] Allocated by task 282: [ 15.099277] kasan_save_stack+0x45/0x70 [ 15.099484] kasan_save_track+0x18/0x40 [ 15.100081] kasan_save_alloc_info+0x3b/0x50 [ 15.100302] __kasan_kmalloc+0xb7/0xc0 [ 15.100462] __kmalloc_cache_noprof+0x189/0x420 [ 15.100909] kasan_atomics+0x95/0x310 [ 15.101208] kunit_try_run_case+0x1a5/0x480 [ 15.101513] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.101986] kthread+0x337/0x6f0 [ 15.102196] ret_from_fork+0x116/0x1d0 [ 15.102494] ret_from_fork_asm+0x1a/0x30 [ 15.102849] [ 15.102977] The buggy address belongs to the object at ffff8881033c5500 [ 15.102977] which belongs to the cache kmalloc-64 of size 64 [ 15.103799] The buggy address is located 0 bytes to the right of [ 15.103799] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 15.104425] [ 15.104537] The buggy address belongs to the physical page: [ 15.104954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 15.105325] flags: 0x200000000000000(node=0|zone=2) [ 15.105549] page_type: f5(slab) [ 15.105988] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.106299] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.106801] page dumped because: kasan: bad access detected [ 15.107156] [ 15.107261] Memory state around the buggy address: [ 15.107631] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.108158] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.108493] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.109065] ^ [ 15.109300] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.109907] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.110318] ================================================================== [ 15.171059] ================================================================== [ 15.171493] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 15.172174] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 15.172486] [ 15.172591] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.172674] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.172689] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.172713] Call Trace: [ 15.172733] <TASK> [ 15.172754] dump_stack_lvl+0x73/0xb0 [ 15.172784] print_report+0xd1/0x650 [ 15.172807] ? __virt_addr_valid+0x1db/0x2d0 [ 15.172866] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.172889] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.172911] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.172933] kasan_report+0x141/0x180 [ 15.172957] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.173013] kasan_check_range+0x10c/0x1c0 [ 15.173049] __kasan_check_write+0x18/0x20 [ 15.173069] kasan_atomics_helper+0x1eaa/0x5450 [ 15.173091] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.173114] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.173140] ? trace_hardirqs_on+0x37/0xe0 [ 15.173197] ? kasan_atomics+0x152/0x310 [ 15.173225] kasan_atomics+0x1dc/0x310 [ 15.173248] ? __pfx_kasan_atomics+0x10/0x10 [ 15.173272] ? __pfx_kasan_atomics+0x10/0x10 [ 15.173299] kunit_try_run_case+0x1a5/0x480 [ 15.173354] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.173377] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.173402] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.173425] ? __kthread_parkme+0x82/0x180 [ 15.173446] ? preempt_count_sub+0x50/0x80 [ 15.173500] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.173525] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.173548] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.173572] kthread+0x337/0x6f0 [ 15.173592] ? trace_preempt_on+0x20/0xc0 [ 15.173641] ? __pfx_kthread+0x10/0x10 [ 15.173663] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.173684] ? calculate_sigpending+0x7b/0xa0 [ 15.173708] ? __pfx_kthread+0x10/0x10 [ 15.173730] ret_from_fork+0x116/0x1d0 [ 15.173750] ? __pfx_kthread+0x10/0x10 [ 15.173770] ret_from_fork_asm+0x1a/0x30 [ 15.173801] </TASK> [ 15.173840] [ 15.181927] Allocated by task 282: [ 15.182204] kasan_save_stack+0x45/0x70 [ 15.182424] kasan_save_track+0x18/0x40 [ 15.182589] kasan_save_alloc_info+0x3b/0x50 [ 15.182962] __kasan_kmalloc+0xb7/0xc0 [ 15.183184] __kmalloc_cache_noprof+0x189/0x420 [ 15.183373] kasan_atomics+0x95/0x310 [ 15.183504] kunit_try_run_case+0x1a5/0x480 [ 15.183662] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.183915] kthread+0x337/0x6f0 [ 15.184193] ret_from_fork+0x116/0x1d0 [ 15.184396] ret_from_fork_asm+0x1a/0x30 [ 15.184627] [ 15.184719] The buggy address belongs to the object at ffff8881033c5500 [ 15.184719] which belongs to the cache kmalloc-64 of size 64 [ 15.185234] The buggy address is located 0 bytes to the right of [ 15.185234] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 15.185778] [ 15.185909] The buggy address belongs to the physical page: [ 15.186169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 15.186529] flags: 0x200000000000000(node=0|zone=2) [ 15.186846] page_type: f5(slab) [ 15.187012] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.187381] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.187633] page dumped because: kasan: bad access detected [ 15.187914] [ 15.188053] Memory state around the buggy address: [ 15.188233] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.188578] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.188947] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.189250] ^ [ 15.189489] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.189842] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.190091] ================================================================== [ 15.248137] ================================================================== [ 15.248485] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 15.248834] Read of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 15.249130] [ 15.249245] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.249291] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.249304] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.249326] Call Trace: [ 15.249343] <TASK> [ 15.249360] dump_stack_lvl+0x73/0xb0 [ 15.249387] print_report+0xd1/0x650 [ 15.249410] ? __virt_addr_valid+0x1db/0x2d0 [ 15.249434] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.249455] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.249478] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.249501] kasan_report+0x141/0x180 [ 15.249523] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.249550] __asan_report_load8_noabort+0x18/0x20 [ 15.249575] kasan_atomics_helper+0x4f98/0x5450 [ 15.249599] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.249621] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.249646] ? trace_hardirqs_on+0x37/0xe0 [ 15.249670] ? kasan_atomics+0x152/0x310 [ 15.249698] kasan_atomics+0x1dc/0x310 [ 15.249721] ? __pfx_kasan_atomics+0x10/0x10 [ 15.249745] ? __pfx_kasan_atomics+0x10/0x10 [ 15.249772] kunit_try_run_case+0x1a5/0x480 [ 15.249796] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.249818] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.249843] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.249866] ? __kthread_parkme+0x82/0x180 [ 15.249887] ? preempt_count_sub+0x50/0x80 [ 15.249911] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.249935] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.249958] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.249981] kthread+0x337/0x6f0 [ 15.250001] ? trace_preempt_on+0x20/0xc0 [ 15.250058] ? __pfx_kthread+0x10/0x10 [ 15.250080] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.250103] ? calculate_sigpending+0x7b/0xa0 [ 15.250128] ? __pfx_kthread+0x10/0x10 [ 15.250150] ret_from_fork+0x116/0x1d0 [ 15.250169] ? __pfx_kthread+0x10/0x10 [ 15.250190] ret_from_fork_asm+0x1a/0x30 [ 15.250221] </TASK> [ 15.250234] [ 15.257335] Allocated by task 282: [ 15.257515] kasan_save_stack+0x45/0x70 [ 15.257717] kasan_save_track+0x18/0x40 [ 15.257900] kasan_save_alloc_info+0x3b/0x50 [ 15.258101] __kasan_kmalloc+0xb7/0xc0 [ 15.258273] __kmalloc_cache_noprof+0x189/0x420 [ 15.258484] kasan_atomics+0x95/0x310 [ 15.258680] kunit_try_run_case+0x1a5/0x480 [ 15.258886] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.259110] kthread+0x337/0x6f0 [ 15.259279] ret_from_fork+0x116/0x1d0 [ 15.259445] ret_from_fork_asm+0x1a/0x30 [ 15.259609] [ 15.259701] The buggy address belongs to the object at ffff8881033c5500 [ 15.259701] which belongs to the cache kmalloc-64 of size 64 [ 15.260227] The buggy address is located 0 bytes to the right of [ 15.260227] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 15.260671] [ 15.260770] The buggy address belongs to the physical page: [ 15.261035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 15.261384] flags: 0x200000000000000(node=0|zone=2) [ 15.261614] page_type: f5(slab) [ 15.261799] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.262042] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.262270] page dumped because: kasan: bad access detected [ 15.262442] [ 15.262511] Memory state around the buggy address: [ 15.262764] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.263100] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.263416] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.263702] ^ [ 15.263857] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.264081] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.264300] ================================================================== [ 15.190596] ================================================================== [ 15.191346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 15.191735] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 15.192145] [ 15.192265] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.192312] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.192325] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.192348] Call Trace: [ 15.192367] <TASK> [ 15.192385] dump_stack_lvl+0x73/0xb0 [ 15.192415] print_report+0xd1/0x650 [ 15.192439] ? __virt_addr_valid+0x1db/0x2d0 [ 15.192464] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.192486] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.192508] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.192531] kasan_report+0x141/0x180 [ 15.192554] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.192580] kasan_check_range+0x10c/0x1c0 [ 15.192604] __kasan_check_write+0x18/0x20 [ 15.192624] kasan_atomics_helper+0x1f43/0x5450 [ 15.192647] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.192670] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.192695] ? trace_hardirqs_on+0x37/0xe0 [ 15.192718] ? kasan_atomics+0x152/0x310 [ 15.192745] kasan_atomics+0x1dc/0x310 [ 15.192768] ? __pfx_kasan_atomics+0x10/0x10 [ 15.192791] ? __pfx_kasan_atomics+0x10/0x10 [ 15.192819] kunit_try_run_case+0x1a5/0x480 [ 15.192844] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.192868] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.192893] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.192930] ? __kthread_parkme+0x82/0x180 [ 15.192952] ? preempt_count_sub+0x50/0x80 [ 15.192976] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.193000] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.193034] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.193093] kthread+0x337/0x6f0 [ 15.193139] ? trace_preempt_on+0x20/0xc0 [ 15.193162] ? __pfx_kthread+0x10/0x10 [ 15.193182] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.193204] ? calculate_sigpending+0x7b/0xa0 [ 15.193228] ? __pfx_kthread+0x10/0x10 [ 15.193250] ret_from_fork+0x116/0x1d0 [ 15.193269] ? __pfx_kthread+0x10/0x10 [ 15.193290] ret_from_fork_asm+0x1a/0x30 [ 15.193321] </TASK> [ 15.193333] [ 15.201611] Allocated by task 282: [ 15.201817] kasan_save_stack+0x45/0x70 [ 15.202044] kasan_save_track+0x18/0x40 [ 15.202295] kasan_save_alloc_info+0x3b/0x50 [ 15.202487] __kasan_kmalloc+0xb7/0xc0 [ 15.202642] __kmalloc_cache_noprof+0x189/0x420 [ 15.202890] kasan_atomics+0x95/0x310 [ 15.203084] kunit_try_run_case+0x1a5/0x480 [ 15.203289] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.203533] kthread+0x337/0x6f0 [ 15.203651] ret_from_fork+0x116/0x1d0 [ 15.203780] ret_from_fork_asm+0x1a/0x30 [ 15.203976] [ 15.204086] The buggy address belongs to the object at ffff8881033c5500 [ 15.204086] which belongs to the cache kmalloc-64 of size 64 [ 15.204758] The buggy address is located 0 bytes to the right of [ 15.204758] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 15.205262] [ 15.205396] The buggy address belongs to the physical page: [ 15.205649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 15.206016] flags: 0x200000000000000(node=0|zone=2) [ 15.206277] page_type: f5(slab) [ 15.206442] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.206846] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.207203] page dumped because: kasan: bad access detected [ 15.207461] [ 15.207550] Memory state around the buggy address: [ 15.207876] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.208207] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.208524] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.208858] ^ [ 15.209085] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.209383] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.209774] ================================================================== [ 14.414315] ================================================================== [ 14.414585] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 14.415119] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.415451] [ 14.415592] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.415637] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.415662] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.415686] Call Trace: [ 14.415705] <TASK> [ 14.415723] dump_stack_lvl+0x73/0xb0 [ 14.415752] print_report+0xd1/0x650 [ 14.415776] ? __virt_addr_valid+0x1db/0x2d0 [ 14.415802] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.415824] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.415846] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.415868] kasan_report+0x141/0x180 [ 14.415902] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.415928] kasan_check_range+0x10c/0x1c0 [ 14.415952] __kasan_check_write+0x18/0x20 [ 14.415985] kasan_atomics_helper+0xb6a/0x5450 [ 14.416007] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.416040] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.416065] ? trace_hardirqs_on+0x37/0xe0 [ 14.416088] ? kasan_atomics+0x152/0x310 [ 14.416115] kasan_atomics+0x1dc/0x310 [ 14.416138] ? __pfx_kasan_atomics+0x10/0x10 [ 14.416168] ? __pfx_kasan_atomics+0x10/0x10 [ 14.416196] kunit_try_run_case+0x1a5/0x480 [ 14.416219] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.416242] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.416267] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.416290] ? __kthread_parkme+0x82/0x180 [ 14.416311] ? preempt_count_sub+0x50/0x80 [ 14.416335] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.416359] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.416382] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.416406] kthread+0x337/0x6f0 [ 14.416435] ? trace_preempt_on+0x20/0xc0 [ 14.416458] ? __pfx_kthread+0x10/0x10 [ 14.416480] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.416511] ? calculate_sigpending+0x7b/0xa0 [ 14.416536] ? __pfx_kthread+0x10/0x10 [ 14.416559] ret_from_fork+0x116/0x1d0 [ 14.416578] ? __pfx_kthread+0x10/0x10 [ 14.416609] ret_from_fork_asm+0x1a/0x30 [ 14.416639] </TASK> [ 14.416652] [ 14.424552] Allocated by task 282: [ 14.424785] kasan_save_stack+0x45/0x70 [ 14.424970] kasan_save_track+0x18/0x40 [ 14.425181] kasan_save_alloc_info+0x3b/0x50 [ 14.425333] __kasan_kmalloc+0xb7/0xc0 [ 14.425469] __kmalloc_cache_noprof+0x189/0x420 [ 14.425667] kasan_atomics+0x95/0x310 [ 14.425895] kunit_try_run_case+0x1a5/0x480 [ 14.426112] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.426348] kthread+0x337/0x6f0 [ 14.426471] ret_from_fork+0x116/0x1d0 [ 14.426604] ret_from_fork_asm+0x1a/0x30 [ 14.426798] [ 14.426893] The buggy address belongs to the object at ffff8881033c5500 [ 14.426893] which belongs to the cache kmalloc-64 of size 64 [ 14.427630] The buggy address is located 0 bytes to the right of [ 14.427630] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.428101] [ 14.428206] The buggy address belongs to the physical page: [ 14.428484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.428812] flags: 0x200000000000000(node=0|zone=2) [ 14.429061] page_type: f5(slab) [ 14.429235] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.429568] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.429946] page dumped because: kasan: bad access detected [ 14.430192] [ 14.430288] Memory state around the buggy address: [ 14.430507] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.430804] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.431032] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.431249] ^ [ 14.431404] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.431744] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.432067] ================================================================== [ 14.471054] ================================================================== [ 14.471410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 14.471877] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.472208] [ 14.472350] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.472398] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.472412] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.472434] Call Trace: [ 14.472463] <TASK> [ 14.472480] dump_stack_lvl+0x73/0xb0 [ 14.472509] print_report+0xd1/0x650 [ 14.472545] ? __virt_addr_valid+0x1db/0x2d0 [ 14.472570] ? kasan_atomics_helper+0xd47/0x5450 [ 14.472591] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.472615] ? kasan_atomics_helper+0xd47/0x5450 [ 14.472637] kasan_report+0x141/0x180 [ 14.472670] ? kasan_atomics_helper+0xd47/0x5450 [ 14.472706] kasan_check_range+0x10c/0x1c0 [ 14.472730] __kasan_check_write+0x18/0x20 [ 14.472760] kasan_atomics_helper+0xd47/0x5450 [ 14.472784] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.472807] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.472832] ? trace_hardirqs_on+0x37/0xe0 [ 14.472864] ? kasan_atomics+0x152/0x310 [ 14.472891] kasan_atomics+0x1dc/0x310 [ 14.472914] ? __pfx_kasan_atomics+0x10/0x10 [ 14.472949] ? __pfx_kasan_atomics+0x10/0x10 [ 14.472976] kunit_try_run_case+0x1a5/0x480 [ 14.473001] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.473041] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.473066] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.473089] ? __kthread_parkme+0x82/0x180 [ 14.473122] ? preempt_count_sub+0x50/0x80 [ 14.473146] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.473171] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.473203] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.473226] kthread+0x337/0x6f0 [ 14.473246] ? trace_preempt_on+0x20/0xc0 [ 14.473277] ? __pfx_kthread+0x10/0x10 [ 14.473299] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.473320] ? calculate_sigpending+0x7b/0xa0 [ 14.473345] ? __pfx_kthread+0x10/0x10 [ 14.473366] ret_from_fork+0x116/0x1d0 [ 14.473386] ? __pfx_kthread+0x10/0x10 [ 14.473406] ret_from_fork_asm+0x1a/0x30 [ 14.473438] </TASK> [ 14.473450] [ 14.481223] Allocated by task 282: [ 14.481353] kasan_save_stack+0x45/0x70 [ 14.481502] kasan_save_track+0x18/0x40 [ 14.481643] kasan_save_alloc_info+0x3b/0x50 [ 14.481896] __kasan_kmalloc+0xb7/0xc0 [ 14.482097] __kmalloc_cache_noprof+0x189/0x420 [ 14.482319] kasan_atomics+0x95/0x310 [ 14.482536] kunit_try_run_case+0x1a5/0x480 [ 14.482868] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.483133] kthread+0x337/0x6f0 [ 14.483322] ret_from_fork+0x116/0x1d0 [ 14.483518] ret_from_fork_asm+0x1a/0x30 [ 14.483659] [ 14.483730] The buggy address belongs to the object at ffff8881033c5500 [ 14.483730] which belongs to the cache kmalloc-64 of size 64 [ 14.484090] The buggy address is located 0 bytes to the right of [ 14.484090] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.484958] [ 14.485069] The buggy address belongs to the physical page: [ 14.485352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.485758] flags: 0x200000000000000(node=0|zone=2) [ 14.486029] page_type: f5(slab) [ 14.486196] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.486432] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.486990] page dumped because: kasan: bad access detected [ 14.487237] [ 14.487309] Memory state around the buggy address: [ 14.487464] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.488641] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.489013] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.489339] ^ [ 14.489563] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.490546] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.491166] ================================================================== [ 15.001609] ================================================================== [ 15.002340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 15.002831] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 15.003220] [ 15.003340] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.003388] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.003401] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.003436] Call Trace: [ 15.003457] <TASK> [ 15.003476] dump_stack_lvl+0x73/0xb0 [ 15.003507] print_report+0xd1/0x650 [ 15.003531] ? __virt_addr_valid+0x1db/0x2d0 [ 15.003556] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.003578] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.003600] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.003623] kasan_report+0x141/0x180 [ 15.003653] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.003689] kasan_check_range+0x10c/0x1c0 [ 15.003714] __kasan_check_write+0x18/0x20 [ 15.003734] kasan_atomics_helper+0x19e3/0x5450 [ 15.003768] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.003790] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.003815] ? trace_hardirqs_on+0x37/0xe0 [ 15.003838] ? kasan_atomics+0x152/0x310 [ 15.003865] kasan_atomics+0x1dc/0x310 [ 15.003888] ? __pfx_kasan_atomics+0x10/0x10 [ 15.003912] ? __pfx_kasan_atomics+0x10/0x10 [ 15.003949] kunit_try_run_case+0x1a5/0x480 [ 15.003973] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.003995] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.004039] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.004063] ? __kthread_parkme+0x82/0x180 [ 15.004084] ? preempt_count_sub+0x50/0x80 [ 15.004118] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.004148] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.004172] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.004206] kthread+0x337/0x6f0 [ 15.004226] ? trace_preempt_on+0x20/0xc0 [ 15.004248] ? __pfx_kthread+0x10/0x10 [ 15.004270] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.004300] ? calculate_sigpending+0x7b/0xa0 [ 15.004325] ? __pfx_kthread+0x10/0x10 [ 15.004346] ret_from_fork+0x116/0x1d0 [ 15.004376] ? __pfx_kthread+0x10/0x10 [ 15.004397] ret_from_fork_asm+0x1a/0x30 [ 15.004430] </TASK> [ 15.004443] [ 15.012299] Allocated by task 282: [ 15.012481] kasan_save_stack+0x45/0x70 [ 15.012633] kasan_save_track+0x18/0x40 [ 15.012837] kasan_save_alloc_info+0x3b/0x50 [ 15.013065] __kasan_kmalloc+0xb7/0xc0 [ 15.013212] __kmalloc_cache_noprof+0x189/0x420 [ 15.013368] kasan_atomics+0x95/0x310 [ 15.013551] kunit_try_run_case+0x1a5/0x480 [ 15.013934] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.014200] kthread+0x337/0x6f0 [ 15.014358] ret_from_fork+0x116/0x1d0 [ 15.014529] ret_from_fork_asm+0x1a/0x30 [ 15.014735] [ 15.014857] The buggy address belongs to the object at ffff8881033c5500 [ 15.014857] which belongs to the cache kmalloc-64 of size 64 [ 15.015373] The buggy address is located 0 bytes to the right of [ 15.015373] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 15.015905] [ 15.016016] The buggy address belongs to the physical page: [ 15.016228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 15.016476] flags: 0x200000000000000(node=0|zone=2) [ 15.016649] page_type: f5(slab) [ 15.016774] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.017461] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.017797] page dumped because: kasan: bad access detected [ 15.018061] [ 15.018189] Memory state around the buggy address: [ 15.018362] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.018581] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.019229] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.019546] ^ [ 15.019803] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.020091] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.020312] ================================================================== [ 14.335079] ================================================================== [ 14.335657] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 14.336013] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.336350] [ 14.336497] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.336558] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.336585] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.336620] Call Trace: [ 14.336638] <TASK> [ 14.336669] dump_stack_lvl+0x73/0xb0 [ 14.336699] print_report+0xd1/0x650 [ 14.336733] ? __virt_addr_valid+0x1db/0x2d0 [ 14.336757] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.336779] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.336814] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.336836] kasan_report+0x141/0x180 [ 14.336860] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.336888] kasan_check_range+0x10c/0x1c0 [ 14.336912] __kasan_check_write+0x18/0x20 [ 14.336960] kasan_atomics_helper+0x8f9/0x5450 [ 14.336983] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.337006] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.337053] ? trace_hardirqs_on+0x37/0xe0 [ 14.337106] ? kasan_atomics+0x152/0x310 [ 14.337134] kasan_atomics+0x1dc/0x310 [ 14.337159] ? __pfx_kasan_atomics+0x10/0x10 [ 14.337194] ? __pfx_kasan_atomics+0x10/0x10 [ 14.337249] kunit_try_run_case+0x1a5/0x480 [ 14.337274] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.337297] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.337334] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.337357] ? __kthread_parkme+0x82/0x180 [ 14.337405] ? preempt_count_sub+0x50/0x80 [ 14.337430] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.337454] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.337490] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.337539] kthread+0x337/0x6f0 [ 14.337559] ? trace_preempt_on+0x20/0xc0 [ 14.337582] ? __pfx_kthread+0x10/0x10 [ 14.337613] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.337634] ? calculate_sigpending+0x7b/0xa0 [ 14.337670] ? __pfx_kthread+0x10/0x10 [ 14.337691] ret_from_fork+0x116/0x1d0 [ 14.337737] ? __pfx_kthread+0x10/0x10 [ 14.337759] ret_from_fork_asm+0x1a/0x30 [ 14.337790] </TASK> [ 14.337814] [ 14.346034] Allocated by task 282: [ 14.346188] kasan_save_stack+0x45/0x70 [ 14.346428] kasan_save_track+0x18/0x40 [ 14.346634] kasan_save_alloc_info+0x3b/0x50 [ 14.346873] __kasan_kmalloc+0xb7/0xc0 [ 14.347066] __kmalloc_cache_noprof+0x189/0x420 [ 14.347328] kasan_atomics+0x95/0x310 [ 14.347571] kunit_try_run_case+0x1a5/0x480 [ 14.347802] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.348092] kthread+0x337/0x6f0 [ 14.348263] ret_from_fork+0x116/0x1d0 [ 14.348451] ret_from_fork_asm+0x1a/0x30 [ 14.348637] [ 14.348708] The buggy address belongs to the object at ffff8881033c5500 [ 14.348708] which belongs to the cache kmalloc-64 of size 64 [ 14.349076] The buggy address is located 0 bytes to the right of [ 14.349076] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.349682] [ 14.349818] The buggy address belongs to the physical page: [ 14.350085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.350461] flags: 0x200000000000000(node=0|zone=2) [ 14.350799] page_type: f5(slab) [ 14.350978] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.351334] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.351633] page dumped because: kasan: bad access detected [ 14.351900] [ 14.352035] Memory state around the buggy address: [ 14.352250] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.352599] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.352944] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.353267] ^ [ 14.353498] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.354137] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.354479] ================================================================== [ 14.578769] ================================================================== [ 14.579120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 14.579361] Read of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.579706] [ 14.579859] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.579905] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.579918] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.579941] Call Trace: [ 14.579959] <TASK> [ 14.579976] dump_stack_lvl+0x73/0xb0 [ 14.580004] print_report+0xd1/0x650 [ 14.580039] ? __virt_addr_valid+0x1db/0x2d0 [ 14.580064] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.580085] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.580109] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.580132] kasan_report+0x141/0x180 [ 14.580158] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.580185] __asan_report_load4_noabort+0x18/0x20 [ 14.580209] kasan_atomics_helper+0x4a36/0x5450 [ 14.580233] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.580255] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.580280] ? trace_hardirqs_on+0x37/0xe0 [ 14.580304] ? kasan_atomics+0x152/0x310 [ 14.580331] kasan_atomics+0x1dc/0x310 [ 14.580355] ? __pfx_kasan_atomics+0x10/0x10 [ 14.580379] ? __pfx_kasan_atomics+0x10/0x10 [ 14.580406] kunit_try_run_case+0x1a5/0x480 [ 14.580431] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.580453] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.580478] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.580501] ? __kthread_parkme+0x82/0x180 [ 14.580523] ? preempt_count_sub+0x50/0x80 [ 14.580548] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.580572] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.580596] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.580620] kthread+0x337/0x6f0 [ 14.580640] ? trace_preempt_on+0x20/0xc0 [ 14.580662] ? __pfx_kthread+0x10/0x10 [ 14.580684] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.580705] ? calculate_sigpending+0x7b/0xa0 [ 14.580729] ? __pfx_kthread+0x10/0x10 [ 14.580751] ret_from_fork+0x116/0x1d0 [ 14.580770] ? __pfx_kthread+0x10/0x10 [ 14.580791] ret_from_fork_asm+0x1a/0x30 [ 14.580822] </TASK> [ 14.580835] [ 14.588536] Allocated by task 282: [ 14.588742] kasan_save_stack+0x45/0x70 [ 14.588944] kasan_save_track+0x18/0x40 [ 14.589143] kasan_save_alloc_info+0x3b/0x50 [ 14.589351] __kasan_kmalloc+0xb7/0xc0 [ 14.589546] __kmalloc_cache_noprof+0x189/0x420 [ 14.589773] kasan_atomics+0x95/0x310 [ 14.589954] kunit_try_run_case+0x1a5/0x480 [ 14.590168] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.590428] kthread+0x337/0x6f0 [ 14.590601] ret_from_fork+0x116/0x1d0 [ 14.590789] ret_from_fork_asm+0x1a/0x30 [ 14.590972] [ 14.591056] The buggy address belongs to the object at ffff8881033c5500 [ 14.591056] which belongs to the cache kmalloc-64 of size 64 [ 14.591553] The buggy address is located 0 bytes to the right of [ 14.591553] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.592072] [ 14.592176] The buggy address belongs to the physical page: [ 14.592429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.592813] flags: 0x200000000000000(node=0|zone=2) [ 14.592982] page_type: f5(slab) [ 14.593158] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.593522] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.593866] page dumped because: kasan: bad access detected [ 14.594048] [ 14.594143] Memory state around the buggy address: [ 14.594370] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.594802] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.595087] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.595381] ^ [ 14.595540] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.595753] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.595965] ================================================================== [ 14.653986] ================================================================== [ 14.654340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 14.655165] Read of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.655505] [ 14.655627] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.655672] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.655705] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.655742] Call Trace: [ 14.655761] <TASK> [ 14.655791] dump_stack_lvl+0x73/0xb0 [ 14.655836] print_report+0xd1/0x650 [ 14.655859] ? __virt_addr_valid+0x1db/0x2d0 [ 14.655885] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.655921] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.655957] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.655979] kasan_report+0x141/0x180 [ 14.656015] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.656066] __asan_report_load4_noabort+0x18/0x20 [ 14.656091] kasan_atomics_helper+0x4a02/0x5450 [ 14.656115] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.656137] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.656167] ? trace_hardirqs_on+0x37/0xe0 [ 14.656190] ? kasan_atomics+0x152/0x310 [ 14.656218] kasan_atomics+0x1dc/0x310 [ 14.656240] ? __pfx_kasan_atomics+0x10/0x10 [ 14.656265] ? __pfx_kasan_atomics+0x10/0x10 [ 14.656293] kunit_try_run_case+0x1a5/0x480 [ 14.656317] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.656340] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.656366] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.656390] ? __kthread_parkme+0x82/0x180 [ 14.656411] ? preempt_count_sub+0x50/0x80 [ 14.656436] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.656460] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.656484] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.656508] kthread+0x337/0x6f0 [ 14.656528] ? trace_preempt_on+0x20/0xc0 [ 14.656550] ? __pfx_kthread+0x10/0x10 [ 14.656571] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.656593] ? calculate_sigpending+0x7b/0xa0 [ 14.656618] ? __pfx_kthread+0x10/0x10 [ 14.656652] ret_from_fork+0x116/0x1d0 [ 14.656672] ? __pfx_kthread+0x10/0x10 [ 14.656694] ret_from_fork_asm+0x1a/0x30 [ 14.656725] </TASK> [ 14.656738] [ 14.664303] Allocated by task 282: [ 14.664473] kasan_save_stack+0x45/0x70 [ 14.664705] kasan_save_track+0x18/0x40 [ 14.664911] kasan_save_alloc_info+0x3b/0x50 [ 14.665092] __kasan_kmalloc+0xb7/0xc0 [ 14.665304] __kmalloc_cache_noprof+0x189/0x420 [ 14.665536] kasan_atomics+0x95/0x310 [ 14.665762] kunit_try_run_case+0x1a5/0x480 [ 14.665945] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.666159] kthread+0x337/0x6f0 [ 14.666327] ret_from_fork+0x116/0x1d0 [ 14.666536] ret_from_fork_asm+0x1a/0x30 [ 14.666756] [ 14.666871] The buggy address belongs to the object at ffff8881033c5500 [ 14.666871] which belongs to the cache kmalloc-64 of size 64 [ 14.667357] The buggy address is located 0 bytes to the right of [ 14.667357] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.667952] [ 14.668040] The buggy address belongs to the physical page: [ 14.668267] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.668656] flags: 0x200000000000000(node=0|zone=2) [ 14.668888] page_type: f5(slab) [ 14.669036] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.669398] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.669746] page dumped because: kasan: bad access detected [ 14.669955] [ 14.670079] Memory state around the buggy address: [ 14.670316] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.670570] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.671071] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.671358] ^ [ 14.671509] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.671943] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.672282] ================================================================== [ 14.865050] ================================================================== [ 14.865400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 14.866002] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.866376] [ 14.866466] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.866510] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.866524] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.866547] Call Trace: [ 14.866574] <TASK> [ 14.866592] dump_stack_lvl+0x73/0xb0 [ 14.866622] print_report+0xd1/0x650 [ 14.866657] ? __virt_addr_valid+0x1db/0x2d0 [ 14.866682] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.866703] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.866726] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.866749] kasan_report+0x141/0x180 [ 14.866781] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.866808] kasan_check_range+0x10c/0x1c0 [ 14.866832] __kasan_check_write+0x18/0x20 [ 14.866863] kasan_atomics_helper+0x15b6/0x5450 [ 14.866885] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.866909] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.866942] ? trace_hardirqs_on+0x37/0xe0 [ 14.866966] ? kasan_atomics+0x152/0x310 [ 14.866993] kasan_atomics+0x1dc/0x310 [ 14.867034] ? __pfx_kasan_atomics+0x10/0x10 [ 14.867058] ? __pfx_kasan_atomics+0x10/0x10 [ 14.867086] kunit_try_run_case+0x1a5/0x480 [ 14.867120] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.867144] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.867168] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.867202] ? __kthread_parkme+0x82/0x180 [ 14.867224] ? preempt_count_sub+0x50/0x80 [ 14.867248] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.867281] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.867305] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.867328] kthread+0x337/0x6f0 [ 14.867359] ? trace_preempt_on+0x20/0xc0 [ 14.867382] ? __pfx_kthread+0x10/0x10 [ 14.867404] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.867435] ? calculate_sigpending+0x7b/0xa0 [ 14.867460] ? __pfx_kthread+0x10/0x10 [ 14.867482] ret_from_fork+0x116/0x1d0 [ 14.867512] ? __pfx_kthread+0x10/0x10 [ 14.867533] ret_from_fork_asm+0x1a/0x30 [ 14.867565] </TASK> [ 14.867578] [ 14.875409] Allocated by task 282: [ 14.875592] kasan_save_stack+0x45/0x70 [ 14.875861] kasan_save_track+0x18/0x40 [ 14.876043] kasan_save_alloc_info+0x3b/0x50 [ 14.876202] __kasan_kmalloc+0xb7/0xc0 [ 14.876336] __kmalloc_cache_noprof+0x189/0x420 [ 14.876493] kasan_atomics+0x95/0x310 [ 14.876626] kunit_try_run_case+0x1a5/0x480 [ 14.876773] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.876967] kthread+0x337/0x6f0 [ 14.877206] ret_from_fork+0x116/0x1d0 [ 14.877412] ret_from_fork_asm+0x1a/0x30 [ 14.877609] [ 14.877706] The buggy address belongs to the object at ffff8881033c5500 [ 14.877706] which belongs to the cache kmalloc-64 of size 64 [ 14.878243] The buggy address is located 0 bytes to the right of [ 14.878243] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.879173] [ 14.879247] The buggy address belongs to the physical page: [ 14.879418] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.879652] flags: 0x200000000000000(node=0|zone=2) [ 14.879822] page_type: f5(slab) [ 14.879991] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.880378] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.880823] page dumped because: kasan: bad access detected [ 14.881110] [ 14.881216] Memory state around the buggy address: [ 14.881477] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.881965] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.882205] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.882427] ^ [ 14.882679] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.882999] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.883309] ================================================================== [ 14.884281] ================================================================== [ 14.884547] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 14.885349] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.885662] [ 14.885790] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.885836] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.885860] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.885882] Call Trace: [ 14.885900] <TASK> [ 14.885916] dump_stack_lvl+0x73/0xb0 [ 14.885953] print_report+0xd1/0x650 [ 14.885978] ? __virt_addr_valid+0x1db/0x2d0 [ 14.886003] ? kasan_atomics_helper+0x164f/0x5450 [ 14.886041] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.886064] ? kasan_atomics_helper+0x164f/0x5450 [ 14.886087] kasan_report+0x141/0x180 [ 14.886110] ? kasan_atomics_helper+0x164f/0x5450 [ 14.886146] kasan_check_range+0x10c/0x1c0 [ 14.886171] __kasan_check_write+0x18/0x20 [ 14.886192] kasan_atomics_helper+0x164f/0x5450 [ 14.886226] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.886249] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.886275] ? trace_hardirqs_on+0x37/0xe0 [ 14.886307] ? kasan_atomics+0x152/0x310 [ 14.886334] kasan_atomics+0x1dc/0x310 [ 14.886369] ? __pfx_kasan_atomics+0x10/0x10 [ 14.886393] ? __pfx_kasan_atomics+0x10/0x10 [ 14.886420] kunit_try_run_case+0x1a5/0x480 [ 14.886446] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.886469] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.886494] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.886518] ? __kthread_parkme+0x82/0x180 [ 14.886539] ? preempt_count_sub+0x50/0x80 [ 14.886563] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.886587] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.886611] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.886636] kthread+0x337/0x6f0 [ 14.886665] ? trace_preempt_on+0x20/0xc0 [ 14.886697] ? __pfx_kthread+0x10/0x10 [ 14.886718] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.886740] ? calculate_sigpending+0x7b/0xa0 [ 14.886776] ? __pfx_kthread+0x10/0x10 [ 14.886798] ret_from_fork+0x116/0x1d0 [ 14.886817] ? __pfx_kthread+0x10/0x10 [ 14.886839] ret_from_fork_asm+0x1a/0x30 [ 14.886871] </TASK> [ 14.886884] [ 14.894265] Allocated by task 282: [ 14.894403] kasan_save_stack+0x45/0x70 [ 14.894549] kasan_save_track+0x18/0x40 [ 14.894816] kasan_save_alloc_info+0x3b/0x50 [ 14.895039] __kasan_kmalloc+0xb7/0xc0 [ 14.895260] __kmalloc_cache_noprof+0x189/0x420 [ 14.895531] kasan_atomics+0x95/0x310 [ 14.895756] kunit_try_run_case+0x1a5/0x480 [ 14.895992] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.896280] kthread+0x337/0x6f0 [ 14.896477] ret_from_fork+0x116/0x1d0 [ 14.896696] ret_from_fork_asm+0x1a/0x30 [ 14.896893] [ 14.896993] The buggy address belongs to the object at ffff8881033c5500 [ 14.896993] which belongs to the cache kmalloc-64 of size 64 [ 14.897383] The buggy address is located 0 bytes to the right of [ 14.897383] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.898124] [ 14.898235] The buggy address belongs to the physical page: [ 14.898467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.898775] flags: 0x200000000000000(node=0|zone=2) [ 14.898933] page_type: f5(slab) [ 14.899106] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.899457] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.899783] page dumped because: kasan: bad access detected [ 14.899948] [ 14.900085] Memory state around the buggy address: [ 14.900343] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.900652] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.900960] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.901212] ^ [ 14.901449] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.901757] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.902073] ================================================================== [ 15.210342] ================================================================== [ 15.210661] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 15.211142] Read of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 15.211356] [ 15.211490] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.211536] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.211549] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.211572] Call Trace: [ 15.211589] <TASK> [ 15.211606] dump_stack_lvl+0x73/0xb0 [ 15.211634] print_report+0xd1/0x650 [ 15.211657] ? __virt_addr_valid+0x1db/0x2d0 [ 15.211682] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.211704] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.211727] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.211750] kasan_report+0x141/0x180 [ 15.211772] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.211799] __asan_report_load8_noabort+0x18/0x20 [ 15.211823] kasan_atomics_helper+0x4f71/0x5450 [ 15.211846] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.211870] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.211895] ? trace_hardirqs_on+0x37/0xe0 [ 15.211918] ? kasan_atomics+0x152/0x310 [ 15.211945] kasan_atomics+0x1dc/0x310 [ 15.211968] ? __pfx_kasan_atomics+0x10/0x10 [ 15.211992] ? __pfx_kasan_atomics+0x10/0x10 [ 15.212030] kunit_try_run_case+0x1a5/0x480 [ 15.212055] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.212077] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.212101] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.212124] ? __kthread_parkme+0x82/0x180 [ 15.212151] ? preempt_count_sub+0x50/0x80 [ 15.212175] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.212198] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.212257] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.212306] kthread+0x337/0x6f0 [ 15.212327] ? trace_preempt_on+0x20/0xc0 [ 15.212377] ? __pfx_kthread+0x10/0x10 [ 15.212439] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.212462] ? calculate_sigpending+0x7b/0xa0 [ 15.212486] ? __pfx_kthread+0x10/0x10 [ 15.212509] ret_from_fork+0x116/0x1d0 [ 15.212530] ? __pfx_kthread+0x10/0x10 [ 15.212553] ret_from_fork_asm+0x1a/0x30 [ 15.212584] </TASK> [ 15.212596] [ 15.221059] Allocated by task 282: [ 15.221187] kasan_save_stack+0x45/0x70 [ 15.221428] kasan_save_track+0x18/0x40 [ 15.221656] kasan_save_alloc_info+0x3b/0x50 [ 15.221854] __kasan_kmalloc+0xb7/0xc0 [ 15.222041] __kmalloc_cache_noprof+0x189/0x420 [ 15.222273] kasan_atomics+0x95/0x310 [ 15.222466] kunit_try_run_case+0x1a5/0x480 [ 15.222709] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.222911] kthread+0x337/0x6f0 [ 15.223042] ret_from_fork+0x116/0x1d0 [ 15.223232] ret_from_fork_asm+0x1a/0x30 [ 15.223434] [ 15.223532] The buggy address belongs to the object at ffff8881033c5500 [ 15.223532] which belongs to the cache kmalloc-64 of size 64 [ 15.223962] The buggy address is located 0 bytes to the right of [ 15.223962] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 15.224379] [ 15.224508] The buggy address belongs to the physical page: [ 15.224913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 15.225278] flags: 0x200000000000000(node=0|zone=2) [ 15.225516] page_type: f5(slab) [ 15.225704] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.226057] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.226415] page dumped because: kasan: bad access detected [ 15.226682] [ 15.226777] Memory state around the buggy address: [ 15.227012] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.227331] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.227662] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.227965] ^ [ 15.228187] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.228498] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.228895] ================================================================== [ 14.521492] ================================================================== [ 14.521888] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 14.522370] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.522714] [ 14.522825] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.522870] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.522883] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.522906] Call Trace: [ 14.522925] <TASK> [ 14.522945] dump_stack_lvl+0x73/0xb0 [ 14.522973] print_report+0xd1/0x650 [ 14.522997] ? __virt_addr_valid+0x1db/0x2d0 [ 14.523042] ? kasan_atomics_helper+0xe78/0x5450 [ 14.523064] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.523087] ? kasan_atomics_helper+0xe78/0x5450 [ 14.523109] kasan_report+0x141/0x180 [ 14.523141] ? kasan_atomics_helper+0xe78/0x5450 [ 14.523168] kasan_check_range+0x10c/0x1c0 [ 14.523192] __kasan_check_write+0x18/0x20 [ 14.523223] kasan_atomics_helper+0xe78/0x5450 [ 14.523246] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.523268] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.523294] ? trace_hardirqs_on+0x37/0xe0 [ 14.523317] ? kasan_atomics+0x152/0x310 [ 14.523345] kasan_atomics+0x1dc/0x310 [ 14.523368] ? __pfx_kasan_atomics+0x10/0x10 [ 14.523391] ? __pfx_kasan_atomics+0x10/0x10 [ 14.523418] kunit_try_run_case+0x1a5/0x480 [ 14.523442] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.523465] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.523499] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.523523] ? __kthread_parkme+0x82/0x180 [ 14.523544] ? preempt_count_sub+0x50/0x80 [ 14.523580] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.523604] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.523627] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.523663] kthread+0x337/0x6f0 [ 14.523683] ? trace_preempt_on+0x20/0xc0 [ 14.523706] ? __pfx_kthread+0x10/0x10 [ 14.523727] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.523749] ? calculate_sigpending+0x7b/0xa0 [ 14.523783] ? __pfx_kthread+0x10/0x10 [ 14.523805] ret_from_fork+0x116/0x1d0 [ 14.523824] ? __pfx_kthread+0x10/0x10 [ 14.523856] ret_from_fork_asm+0x1a/0x30 [ 14.523888] </TASK> [ 14.523901] [ 14.531546] Allocated by task 282: [ 14.531732] kasan_save_stack+0x45/0x70 [ 14.531935] kasan_save_track+0x18/0x40 [ 14.532161] kasan_save_alloc_info+0x3b/0x50 [ 14.532309] __kasan_kmalloc+0xb7/0xc0 [ 14.532440] __kmalloc_cache_noprof+0x189/0x420 [ 14.532924] kasan_atomics+0x95/0x310 [ 14.533126] kunit_try_run_case+0x1a5/0x480 [ 14.533359] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.533658] kthread+0x337/0x6f0 [ 14.533831] ret_from_fork+0x116/0x1d0 [ 14.534011] ret_from_fork_asm+0x1a/0x30 [ 14.534162] [ 14.534234] The buggy address belongs to the object at ffff8881033c5500 [ 14.534234] which belongs to the cache kmalloc-64 of size 64 [ 14.534660] The buggy address is located 0 bytes to the right of [ 14.534660] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.535226] [ 14.535336] The buggy address belongs to the physical page: [ 14.535591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.536042] flags: 0x200000000000000(node=0|zone=2) [ 14.536216] page_type: f5(slab) [ 14.536360] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.536759] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.537127] page dumped because: kasan: bad access detected [ 14.537377] [ 14.537466] Memory state around the buggy address: [ 14.537675] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.537953] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.538178] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.538392] ^ [ 14.538623] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.538936] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.539257] ================================================================== [ 14.541173] ================================================================== [ 14.541545] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 14.541986] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.542321] [ 14.542430] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.542472] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.542497] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.542518] Call Trace: [ 14.542534] <TASK> [ 14.542549] dump_stack_lvl+0x73/0xb0 [ 14.542642] print_report+0xd1/0x650 [ 14.542665] ? __virt_addr_valid+0x1db/0x2d0 [ 14.542690] ? kasan_atomics_helper+0xf10/0x5450 [ 14.542723] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.542746] ? kasan_atomics_helper+0xf10/0x5450 [ 14.542768] kasan_report+0x141/0x180 [ 14.542791] ? kasan_atomics_helper+0xf10/0x5450 [ 14.542817] kasan_check_range+0x10c/0x1c0 [ 14.542850] __kasan_check_write+0x18/0x20 [ 14.542870] kasan_atomics_helper+0xf10/0x5450 [ 14.542893] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.542926] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.542951] ? trace_hardirqs_on+0x37/0xe0 [ 14.542975] ? kasan_atomics+0x152/0x310 [ 14.543001] kasan_atomics+0x1dc/0x310 [ 14.543033] ? __pfx_kasan_atomics+0x10/0x10 [ 14.543057] ? __pfx_kasan_atomics+0x10/0x10 [ 14.543084] kunit_try_run_case+0x1a5/0x480 [ 14.543108] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.543130] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.543155] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.543179] ? __kthread_parkme+0x82/0x180 [ 14.543209] ? preempt_count_sub+0x50/0x80 [ 14.543233] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.543258] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.543291] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.543315] kthread+0x337/0x6f0 [ 14.543336] ? trace_preempt_on+0x20/0xc0 [ 14.543358] ? __pfx_kthread+0x10/0x10 [ 14.543379] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.543400] ? calculate_sigpending+0x7b/0xa0 [ 14.543424] ? __pfx_kthread+0x10/0x10 [ 14.543446] ret_from_fork+0x116/0x1d0 [ 14.543465] ? __pfx_kthread+0x10/0x10 [ 14.543486] ret_from_fork_asm+0x1a/0x30 [ 14.543527] </TASK> [ 14.543541] [ 14.551418] Allocated by task 282: [ 14.551624] kasan_save_stack+0x45/0x70 [ 14.551868] kasan_save_track+0x18/0x40 [ 14.552088] kasan_save_alloc_info+0x3b/0x50 [ 14.552299] __kasan_kmalloc+0xb7/0xc0 [ 14.552457] __kmalloc_cache_noprof+0x189/0x420 [ 14.552659] kasan_atomics+0x95/0x310 [ 14.552863] kunit_try_run_case+0x1a5/0x480 [ 14.553092] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.553326] kthread+0x337/0x6f0 [ 14.553496] ret_from_fork+0x116/0x1d0 [ 14.553679] ret_from_fork_asm+0x1a/0x30 [ 14.553879] [ 14.553970] The buggy address belongs to the object at ffff8881033c5500 [ 14.553970] which belongs to the cache kmalloc-64 of size 64 [ 14.554458] The buggy address is located 0 bytes to the right of [ 14.554458] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.555064] [ 14.555150] The buggy address belongs to the physical page: [ 14.555391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.555753] flags: 0x200000000000000(node=0|zone=2) [ 14.555987] page_type: f5(slab) [ 14.556151] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.556428] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.556657] page dumped because: kasan: bad access detected [ 14.556830] [ 14.556900] Memory state around the buggy address: [ 14.557199] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.557526] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.558124] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.558448] ^ [ 14.558636] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.558961] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.559206] ================================================================== [ 14.821989] ================================================================== [ 14.822599] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 14.823057] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.823655] [ 14.823868] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.823916] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.823938] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.823962] Call Trace: [ 14.823981] <TASK> [ 14.824000] dump_stack_lvl+0x73/0xb0 [ 14.824051] print_report+0xd1/0x650 [ 14.824075] ? __virt_addr_valid+0x1db/0x2d0 [ 14.824100] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.824122] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.824148] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.824171] kasan_report+0x141/0x180 [ 14.824194] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.824220] __asan_report_store8_noabort+0x1b/0x30 [ 14.824242] kasan_atomics_helper+0x50d4/0x5450 [ 14.824265] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.824289] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.824325] ? trace_hardirqs_on+0x37/0xe0 [ 14.824348] ? kasan_atomics+0x152/0x310 [ 14.824386] kasan_atomics+0x1dc/0x310 [ 14.824410] ? __pfx_kasan_atomics+0x10/0x10 [ 14.824434] ? __pfx_kasan_atomics+0x10/0x10 [ 14.824461] kunit_try_run_case+0x1a5/0x480 [ 14.824486] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.824518] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.824544] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.824567] ? __kthread_parkme+0x82/0x180 [ 14.824600] ? preempt_count_sub+0x50/0x80 [ 14.824623] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.824659] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.824683] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.824706] kthread+0x337/0x6f0 [ 14.824726] ? trace_preempt_on+0x20/0xc0 [ 14.824748] ? __pfx_kthread+0x10/0x10 [ 14.824769] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.824791] ? calculate_sigpending+0x7b/0xa0 [ 14.824816] ? __pfx_kthread+0x10/0x10 [ 14.824837] ret_from_fork+0x116/0x1d0 [ 14.824858] ? __pfx_kthread+0x10/0x10 [ 14.824878] ret_from_fork_asm+0x1a/0x30 [ 14.824910] </TASK> [ 14.824922] [ 14.836863] Allocated by task 282: [ 14.837209] kasan_save_stack+0x45/0x70 [ 14.837584] kasan_save_track+0x18/0x40 [ 14.838017] kasan_save_alloc_info+0x3b/0x50 [ 14.838363] __kasan_kmalloc+0xb7/0xc0 [ 14.838498] __kmalloc_cache_noprof+0x189/0x420 [ 14.838675] kasan_atomics+0x95/0x310 [ 14.839053] kunit_try_run_case+0x1a5/0x480 [ 14.839455] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.839940] kthread+0x337/0x6f0 [ 14.840281] ret_from_fork+0x116/0x1d0 [ 14.840649] ret_from_fork_asm+0x1a/0x30 [ 14.840925] [ 14.840998] The buggy address belongs to the object at ffff8881033c5500 [ 14.840998] which belongs to the cache kmalloc-64 of size 64 [ 14.841346] The buggy address is located 0 bytes to the right of [ 14.841346] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.841734] [ 14.841901] The buggy address belongs to the physical page: [ 14.842531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.843037] flags: 0x200000000000000(node=0|zone=2) [ 14.843203] page_type: f5(slab) [ 14.843323] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.843547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.843812] page dumped because: kasan: bad access detected [ 14.844127] [ 14.844218] Memory state around the buggy address: [ 14.844438] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.844707] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.845032] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.845343] ^ [ 14.845497] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.845957] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.846281] ================================================================== [ 14.946132] ================================================================== [ 14.946466] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 14.946821] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.947136] [ 14.947255] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.947312] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.947325] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.947361] Call Trace: [ 14.947380] <TASK> [ 14.947399] dump_stack_lvl+0x73/0xb0 [ 14.947440] print_report+0xd1/0x650 [ 14.947465] ? __virt_addr_valid+0x1db/0x2d0 [ 14.947489] ? kasan_atomics_helper+0x1818/0x5450 [ 14.947511] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.947534] ? kasan_atomics_helper+0x1818/0x5450 [ 14.947556] kasan_report+0x141/0x180 [ 14.947588] ? kasan_atomics_helper+0x1818/0x5450 [ 14.947614] kasan_check_range+0x10c/0x1c0 [ 14.947639] __kasan_check_write+0x18/0x20 [ 14.947678] kasan_atomics_helper+0x1818/0x5450 [ 14.947701] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.947724] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.947749] ? trace_hardirqs_on+0x37/0xe0 [ 14.947781] ? kasan_atomics+0x152/0x310 [ 14.947808] kasan_atomics+0x1dc/0x310 [ 14.947843] ? __pfx_kasan_atomics+0x10/0x10 [ 14.947867] ? __pfx_kasan_atomics+0x10/0x10 [ 14.947894] kunit_try_run_case+0x1a5/0x480 [ 14.947918] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.947941] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.947965] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.947989] ? __kthread_parkme+0x82/0x180 [ 14.948010] ? preempt_count_sub+0x50/0x80 [ 14.948053] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.948077] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.948101] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.948134] kthread+0x337/0x6f0 [ 14.948157] ? trace_preempt_on+0x20/0xc0 [ 14.948180] ? __pfx_kthread+0x10/0x10 [ 14.948201] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.948223] ? calculate_sigpending+0x7b/0xa0 [ 14.948256] ? __pfx_kthread+0x10/0x10 [ 14.948278] ret_from_fork+0x116/0x1d0 [ 14.948297] ? __pfx_kthread+0x10/0x10 [ 14.948318] ret_from_fork_asm+0x1a/0x30 [ 14.948360] </TASK> [ 14.948373] [ 14.956213] Allocated by task 282: [ 14.956407] kasan_save_stack+0x45/0x70 [ 14.956625] kasan_save_track+0x18/0x40 [ 14.956853] kasan_save_alloc_info+0x3b/0x50 [ 14.957062] __kasan_kmalloc+0xb7/0xc0 [ 14.957230] __kmalloc_cache_noprof+0x189/0x420 [ 14.957449] kasan_atomics+0x95/0x310 [ 14.957629] kunit_try_run_case+0x1a5/0x480 [ 14.957875] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.958144] kthread+0x337/0x6f0 [ 14.958324] ret_from_fork+0x116/0x1d0 [ 14.958497] ret_from_fork_asm+0x1a/0x30 [ 14.958638] [ 14.958771] The buggy address belongs to the object at ffff8881033c5500 [ 14.958771] which belongs to the cache kmalloc-64 of size 64 [ 14.959300] The buggy address is located 0 bytes to the right of [ 14.959300] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.959874] [ 14.959996] The buggy address belongs to the physical page: [ 14.960241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.960582] flags: 0x200000000000000(node=0|zone=2) [ 14.960856] page_type: f5(slab) [ 14.961040] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.961281] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.961511] page dumped because: kasan: bad access detected [ 14.961704] [ 14.961828] Memory state around the buggy address: [ 14.962060] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.962376] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.962654] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.962936] ^ [ 14.963101] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.963317] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.963615] ================================================================== [ 14.596783] ================================================================== [ 14.597478] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 14.598085] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.598363] [ 14.598456] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.598499] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.598513] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.598535] Call Trace: [ 14.598556] <TASK> [ 14.598574] dump_stack_lvl+0x73/0xb0 [ 14.598603] print_report+0xd1/0x650 [ 14.598625] ? __virt_addr_valid+0x1db/0x2d0 [ 14.598660] ? kasan_atomics_helper+0x1079/0x5450 [ 14.598681] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.598716] ? kasan_atomics_helper+0x1079/0x5450 [ 14.598737] kasan_report+0x141/0x180 [ 14.598760] ? kasan_atomics_helper+0x1079/0x5450 [ 14.598798] kasan_check_range+0x10c/0x1c0 [ 14.598822] __kasan_check_write+0x18/0x20 [ 14.598842] kasan_atomics_helper+0x1079/0x5450 [ 14.598865] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.598897] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.598921] ? trace_hardirqs_on+0x37/0xe0 [ 14.598945] ? kasan_atomics+0x152/0x310 [ 14.598982] kasan_atomics+0x1dc/0x310 [ 14.599006] ? __pfx_kasan_atomics+0x10/0x10 [ 14.599039] ? __pfx_kasan_atomics+0x10/0x10 [ 14.599075] kunit_try_run_case+0x1a5/0x480 [ 14.599099] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.599132] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.599158] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.599181] ? __kthread_parkme+0x82/0x180 [ 14.599203] ? preempt_count_sub+0x50/0x80 [ 14.599236] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.599260] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.599284] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.599318] kthread+0x337/0x6f0 [ 14.599339] ? trace_preempt_on+0x20/0xc0 [ 14.599361] ? __pfx_kthread+0x10/0x10 [ 14.599391] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.599413] ? calculate_sigpending+0x7b/0xa0 [ 14.599436] ? __pfx_kthread+0x10/0x10 [ 14.599469] ret_from_fork+0x116/0x1d0 [ 14.599489] ? __pfx_kthread+0x10/0x10 [ 14.599510] ret_from_fork_asm+0x1a/0x30 [ 14.599550] </TASK> [ 14.599562] [ 14.607363] Allocated by task 282: [ 14.607489] kasan_save_stack+0x45/0x70 [ 14.607632] kasan_save_track+0x18/0x40 [ 14.607854] kasan_save_alloc_info+0x3b/0x50 [ 14.608076] __kasan_kmalloc+0xb7/0xc0 [ 14.608270] __kmalloc_cache_noprof+0x189/0x420 [ 14.608435] kasan_atomics+0x95/0x310 [ 14.608655] kunit_try_run_case+0x1a5/0x480 [ 14.608811] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.608979] kthread+0x337/0x6f0 [ 14.609107] ret_from_fork+0x116/0x1d0 [ 14.609235] ret_from_fork_asm+0x1a/0x30 [ 14.609370] [ 14.609439] The buggy address belongs to the object at ffff8881033c5500 [ 14.609439] which belongs to the cache kmalloc-64 of size 64 [ 14.609868] The buggy address is located 0 bytes to the right of [ 14.609868] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.610506] [ 14.610617] The buggy address belongs to the physical page: [ 14.610886] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.611161] flags: 0x200000000000000(node=0|zone=2) [ 14.611319] page_type: f5(slab) [ 14.611436] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.611660] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.612237] page dumped because: kasan: bad access detected [ 14.612490] [ 14.612608] Memory state around the buggy address: [ 14.613076] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.613426] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.613899] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.614134] ^ [ 14.614359] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.614672] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.614916] ================================================================== [ 15.298786] ================================================================== [ 15.299146] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 15.299795] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 15.300118] [ 15.300223] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.300266] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.300279] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.300302] Call Trace: [ 15.300319] <TASK> [ 15.300335] dump_stack_lvl+0x73/0xb0 [ 15.300364] print_report+0xd1/0x650 [ 15.300387] ? __virt_addr_valid+0x1db/0x2d0 [ 15.300412] ? kasan_atomics_helper+0x218a/0x5450 [ 15.300434] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.300457] ? kasan_atomics_helper+0x218a/0x5450 [ 15.300479] kasan_report+0x141/0x180 [ 15.300502] ? kasan_atomics_helper+0x218a/0x5450 [ 15.300528] kasan_check_range+0x10c/0x1c0 [ 15.300552] __kasan_check_write+0x18/0x20 [ 15.300572] kasan_atomics_helper+0x218a/0x5450 [ 15.300595] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.300618] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.300667] ? trace_hardirqs_on+0x37/0xe0 [ 15.300690] ? kasan_atomics+0x152/0x310 [ 15.300718] kasan_atomics+0x1dc/0x310 [ 15.300741] ? __pfx_kasan_atomics+0x10/0x10 [ 15.300765] ? __pfx_kasan_atomics+0x10/0x10 [ 15.300792] kunit_try_run_case+0x1a5/0x480 [ 15.300816] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.300839] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.300864] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.300888] ? __kthread_parkme+0x82/0x180 [ 15.300910] ? preempt_count_sub+0x50/0x80 [ 15.300935] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.300960] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.300984] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.301008] kthread+0x337/0x6f0 [ 15.301037] ? trace_preempt_on+0x20/0xc0 [ 15.301060] ? __pfx_kthread+0x10/0x10 [ 15.301081] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.301102] ? calculate_sigpending+0x7b/0xa0 [ 15.301126] ? __pfx_kthread+0x10/0x10 [ 15.301149] ret_from_fork+0x116/0x1d0 [ 15.301168] ? __pfx_kthread+0x10/0x10 [ 15.301190] ret_from_fork_asm+0x1a/0x30 [ 15.301221] </TASK> [ 15.301233] [ 15.308788] Allocated by task 282: [ 15.308915] kasan_save_stack+0x45/0x70 [ 15.309730] kasan_save_track+0x18/0x40 [ 15.309934] kasan_save_alloc_info+0x3b/0x50 [ 15.310158] __kasan_kmalloc+0xb7/0xc0 [ 15.310321] __kmalloc_cache_noprof+0x189/0x420 [ 15.310542] kasan_atomics+0x95/0x310 [ 15.311751] kunit_try_run_case+0x1a5/0x480 [ 15.311933] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.312202] kthread+0x337/0x6f0 [ 15.312360] ret_from_fork+0x116/0x1d0 [ 15.312528] ret_from_fork_asm+0x1a/0x30 [ 15.312981] [ 15.313087] The buggy address belongs to the object at ffff8881033c5500 [ 15.313087] which belongs to the cache kmalloc-64 of size 64 [ 15.313783] The buggy address is located 0 bytes to the right of [ 15.313783] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 15.314335] [ 15.314559] The buggy address belongs to the physical page: [ 15.314813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 15.315279] flags: 0x200000000000000(node=0|zone=2) [ 15.315525] page_type: f5(slab) [ 15.315820] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.316150] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.316466] page dumped because: kasan: bad access detected [ 15.316857] [ 15.316962] Memory state around the buggy address: [ 15.317342] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.317672] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.317923] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.318367] ^ [ 15.318692] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.318964] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.319287] ================================================================== [ 15.021171] ================================================================== [ 15.021532] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 15.022102] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 15.022445] [ 15.022563] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.022618] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.022632] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.022654] Call Trace: [ 15.022686] <TASK> [ 15.022716] dump_stack_lvl+0x73/0xb0 [ 15.022746] print_report+0xd1/0x650 [ 15.022770] ? __virt_addr_valid+0x1db/0x2d0 [ 15.022805] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.022827] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.022849] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.022882] kasan_report+0x141/0x180 [ 15.022905] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.022931] kasan_check_range+0x10c/0x1c0 [ 15.022963] __kasan_check_write+0x18/0x20 [ 15.022983] kasan_atomics_helper+0x1a7f/0x5450 [ 15.023006] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.023044] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.023069] ? trace_hardirqs_on+0x37/0xe0 [ 15.023093] ? kasan_atomics+0x152/0x310 [ 15.023121] kasan_atomics+0x1dc/0x310 [ 15.023154] ? __pfx_kasan_atomics+0x10/0x10 [ 15.023178] ? __pfx_kasan_atomics+0x10/0x10 [ 15.023205] kunit_try_run_case+0x1a5/0x480 [ 15.023239] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.023263] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.023287] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.023311] ? __kthread_parkme+0x82/0x180 [ 15.023333] ? preempt_count_sub+0x50/0x80 [ 15.023357] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.023381] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.023405] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.023430] kthread+0x337/0x6f0 [ 15.023449] ? trace_preempt_on+0x20/0xc0 [ 15.023480] ? __pfx_kthread+0x10/0x10 [ 15.023502] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.023523] ? calculate_sigpending+0x7b/0xa0 [ 15.023558] ? __pfx_kthread+0x10/0x10 [ 15.023580] ret_from_fork+0x116/0x1d0 [ 15.023600] ? __pfx_kthread+0x10/0x10 [ 15.023620] ret_from_fork_asm+0x1a/0x30 [ 15.023653] </TASK> [ 15.023666] [ 15.031281] Allocated by task 282: [ 15.031413] kasan_save_stack+0x45/0x70 [ 15.031616] kasan_save_track+0x18/0x40 [ 15.031848] kasan_save_alloc_info+0x3b/0x50 [ 15.032059] __kasan_kmalloc+0xb7/0xc0 [ 15.032257] __kmalloc_cache_noprof+0x189/0x420 [ 15.032476] kasan_atomics+0x95/0x310 [ 15.032674] kunit_try_run_case+0x1a5/0x480 [ 15.032874] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.033130] kthread+0x337/0x6f0 [ 15.033311] ret_from_fork+0x116/0x1d0 [ 15.033494] ret_from_fork_asm+0x1a/0x30 [ 15.033740] [ 15.033826] The buggy address belongs to the object at ffff8881033c5500 [ 15.033826] which belongs to the cache kmalloc-64 of size 64 [ 15.034341] The buggy address is located 0 bytes to the right of [ 15.034341] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 15.034885] [ 15.035003] The buggy address belongs to the physical page: [ 15.035250] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 15.035560] flags: 0x200000000000000(node=0|zone=2) [ 15.035867] page_type: f5(slab) [ 15.036032] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.036370] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.036730] page dumped because: kasan: bad access detected [ 15.036974] [ 15.037103] Memory state around the buggy address: [ 15.037310] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.037528] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.037743] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.037955] ^ [ 15.038123] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.038703] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.039041] ================================================================== [ 15.281982] ================================================================== [ 15.282227] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 15.282456] Read of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 15.282792] [ 15.282901] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.282942] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.282954] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.282976] Call Trace: [ 15.282992] <TASK> [ 15.283007] dump_stack_lvl+0x73/0xb0 [ 15.283045] print_report+0xd1/0x650 [ 15.283068] ? __virt_addr_valid+0x1db/0x2d0 [ 15.283092] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.283115] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.283137] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.283159] kasan_report+0x141/0x180 [ 15.283182] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.283208] __asan_report_load8_noabort+0x18/0x20 [ 15.283233] kasan_atomics_helper+0x4fb2/0x5450 [ 15.283256] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.283279] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.283302] ? trace_hardirqs_on+0x37/0xe0 [ 15.283325] ? kasan_atomics+0x152/0x310 [ 15.283351] kasan_atomics+0x1dc/0x310 [ 15.283375] ? __pfx_kasan_atomics+0x10/0x10 [ 15.283399] ? __pfx_kasan_atomics+0x10/0x10 [ 15.283426] kunit_try_run_case+0x1a5/0x480 [ 15.283451] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.283473] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.283498] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.283522] ? __kthread_parkme+0x82/0x180 [ 15.283542] ? preempt_count_sub+0x50/0x80 [ 15.283567] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.283591] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.283614] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.283659] kthread+0x337/0x6f0 [ 15.283680] ? trace_preempt_on+0x20/0xc0 [ 15.283702] ? __pfx_kthread+0x10/0x10 [ 15.283724] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.283745] ? calculate_sigpending+0x7b/0xa0 [ 15.283769] ? __pfx_kthread+0x10/0x10 [ 15.283792] ret_from_fork+0x116/0x1d0 [ 15.283811] ? __pfx_kthread+0x10/0x10 [ 15.283831] ret_from_fork_asm+0x1a/0x30 [ 15.283862] </TASK> [ 15.283874] [ 15.290933] Allocated by task 282: [ 15.291083] kasan_save_stack+0x45/0x70 [ 15.291285] kasan_save_track+0x18/0x40 [ 15.291476] kasan_save_alloc_info+0x3b/0x50 [ 15.291713] __kasan_kmalloc+0xb7/0xc0 [ 15.291900] __kmalloc_cache_noprof+0x189/0x420 [ 15.292133] kasan_atomics+0x95/0x310 [ 15.292326] kunit_try_run_case+0x1a5/0x480 [ 15.292534] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.292809] kthread+0x337/0x6f0 [ 15.292977] ret_from_fork+0x116/0x1d0 [ 15.293158] ret_from_fork_asm+0x1a/0x30 [ 15.293342] [ 15.293426] The buggy address belongs to the object at ffff8881033c5500 [ 15.293426] which belongs to the cache kmalloc-64 of size 64 [ 15.293870] The buggy address is located 0 bytes to the right of [ 15.293870] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 15.294366] [ 15.294462] The buggy address belongs to the physical page: [ 15.294743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 15.295029] flags: 0x200000000000000(node=0|zone=2) [ 15.295252] page_type: f5(slab) [ 15.295423] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.295773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.296102] page dumped because: kasan: bad access detected [ 15.296359] [ 15.296443] Memory state around the buggy address: [ 15.296685] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.296989] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.297286] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.297534] ^ [ 15.297706] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.297921] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.298143] ================================================================== [ 15.111050] ================================================================== [ 15.111294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 15.111580] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 15.111987] [ 15.112627] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.112679] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.112692] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.112715] Call Trace: [ 15.112925] <TASK> [ 15.112952] dump_stack_lvl+0x73/0xb0 [ 15.112986] print_report+0xd1/0x650 [ 15.113010] ? __virt_addr_valid+0x1db/0x2d0 [ 15.113048] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.113072] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.113095] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.113117] kasan_report+0x141/0x180 [ 15.113139] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.113166] kasan_check_range+0x10c/0x1c0 [ 15.113190] __kasan_check_write+0x18/0x20 [ 15.113210] kasan_atomics_helper+0x1ce1/0x5450 [ 15.113232] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.113255] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.113281] ? trace_hardirqs_on+0x37/0xe0 [ 15.113305] ? kasan_atomics+0x152/0x310 [ 15.113331] kasan_atomics+0x1dc/0x310 [ 15.113355] ? __pfx_kasan_atomics+0x10/0x10 [ 15.113378] ? __pfx_kasan_atomics+0x10/0x10 [ 15.113405] kunit_try_run_case+0x1a5/0x480 [ 15.113429] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.113452] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.113476] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.113499] ? __kthread_parkme+0x82/0x180 [ 15.113521] ? preempt_count_sub+0x50/0x80 [ 15.113546] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.113569] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.113593] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.113616] kthread+0x337/0x6f0 [ 15.113636] ? trace_preempt_on+0x20/0xc0 [ 15.113658] ? __pfx_kthread+0x10/0x10 [ 15.113679] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.113701] ? calculate_sigpending+0x7b/0xa0 [ 15.113725] ? __pfx_kthread+0x10/0x10 [ 15.113746] ret_from_fork+0x116/0x1d0 [ 15.113767] ? __pfx_kthread+0x10/0x10 [ 15.113788] ret_from_fork_asm+0x1a/0x30 [ 15.113819] </TASK> [ 15.113831] [ 15.124824] Allocated by task 282: [ 15.125003] kasan_save_stack+0x45/0x70 [ 15.125215] kasan_save_track+0x18/0x40 [ 15.125397] kasan_save_alloc_info+0x3b/0x50 [ 15.125604] __kasan_kmalloc+0xb7/0xc0 [ 15.125829] __kmalloc_cache_noprof+0x189/0x420 [ 15.126038] kasan_atomics+0x95/0x310 [ 15.126224] kunit_try_run_case+0x1a5/0x480 [ 15.126424] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.126677] kthread+0x337/0x6f0 [ 15.126851] ret_from_fork+0x116/0x1d0 [ 15.127049] ret_from_fork_asm+0x1a/0x30 [ 15.127250] [ 15.127342] The buggy address belongs to the object at ffff8881033c5500 [ 15.127342] which belongs to the cache kmalloc-64 of size 64 [ 15.127858] The buggy address is located 0 bytes to the right of [ 15.127858] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 15.128246] [ 15.128322] The buggy address belongs to the physical page: [ 15.128491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 15.128782] flags: 0x200000000000000(node=0|zone=2) [ 15.129035] page_type: f5(slab) [ 15.129209] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.129560] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.129944] page dumped because: kasan: bad access detected [ 15.130207] [ 15.130307] Memory state around the buggy address: [ 15.130505] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.130827] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.131123] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.131333] ^ [ 15.131483] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.131724] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.132054] ================================================================== [ 15.132752] ================================================================== [ 15.133272] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 15.133589] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 15.133910] [ 15.134003] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.134061] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.134075] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.134098] Call Trace: [ 15.134118] <TASK> [ 15.134137] dump_stack_lvl+0x73/0xb0 [ 15.134167] print_report+0xd1/0x650 [ 15.134192] ? __virt_addr_valid+0x1db/0x2d0 [ 15.134216] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.134237] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.134260] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.134306] kasan_report+0x141/0x180 [ 15.134332] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.134359] kasan_check_range+0x10c/0x1c0 [ 15.134382] __kasan_check_write+0x18/0x20 [ 15.134403] kasan_atomics_helper+0x1d7a/0x5450 [ 15.134426] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.134448] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.134493] ? trace_hardirqs_on+0x37/0xe0 [ 15.134517] ? kasan_atomics+0x152/0x310 [ 15.134544] kasan_atomics+0x1dc/0x310 [ 15.134567] ? __pfx_kasan_atomics+0x10/0x10 [ 15.134592] ? __pfx_kasan_atomics+0x10/0x10 [ 15.134618] kunit_try_run_case+0x1a5/0x480 [ 15.134654] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.134676] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.134701] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.134725] ? __kthread_parkme+0x82/0x180 [ 15.134746] ? preempt_count_sub+0x50/0x80 [ 15.134770] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.134794] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.134838] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.134862] kthread+0x337/0x6f0 [ 15.134882] ? trace_preempt_on+0x20/0xc0 [ 15.134905] ? __pfx_kthread+0x10/0x10 [ 15.134925] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.134947] ? calculate_sigpending+0x7b/0xa0 [ 15.134971] ? __pfx_kthread+0x10/0x10 [ 15.134993] ret_from_fork+0x116/0x1d0 [ 15.135012] ? __pfx_kthread+0x10/0x10 [ 15.135044] ret_from_fork_asm+0x1a/0x30 [ 15.135079] </TASK> [ 15.135092] [ 15.142860] Allocated by task 282: [ 15.143030] kasan_save_stack+0x45/0x70 [ 15.143230] kasan_save_track+0x18/0x40 [ 15.143423] kasan_save_alloc_info+0x3b/0x50 [ 15.143589] __kasan_kmalloc+0xb7/0xc0 [ 15.143919] __kmalloc_cache_noprof+0x189/0x420 [ 15.144092] kasan_atomics+0x95/0x310 [ 15.144233] kunit_try_run_case+0x1a5/0x480 [ 15.144381] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.144634] kthread+0x337/0x6f0 [ 15.144802] ret_from_fork+0x116/0x1d0 [ 15.145056] ret_from_fork_asm+0x1a/0x30 [ 15.145259] [ 15.145355] The buggy address belongs to the object at ffff8881033c5500 [ 15.145355] which belongs to the cache kmalloc-64 of size 64 [ 15.145761] The buggy address is located 0 bytes to the right of [ 15.145761] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 15.146334] [ 15.146430] The buggy address belongs to the physical page: [ 15.146695] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 15.146936] flags: 0x200000000000000(node=0|zone=2) [ 15.147113] page_type: f5(slab) [ 15.147270] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.147637] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.147980] page dumped because: kasan: bad access detected [ 15.148290] [ 15.148365] Memory state around the buggy address: [ 15.148558] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.148777] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.149092] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.149607] ^ [ 15.149851] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.150074] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.150578] ================================================================== [ 15.229843] ================================================================== [ 15.230190] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 15.230424] Write of size 8 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 15.230745] [ 15.230982] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.231066] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.231079] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.231103] Call Trace: [ 15.231124] <TASK> [ 15.231143] dump_stack_lvl+0x73/0xb0 [ 15.231173] print_report+0xd1/0x650 [ 15.231197] ? __virt_addr_valid+0x1db/0x2d0 [ 15.231222] ? kasan_atomics_helper+0x2006/0x5450 [ 15.231244] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.231267] ? kasan_atomics_helper+0x2006/0x5450 [ 15.231289] kasan_report+0x141/0x180 [ 15.231312] ? kasan_atomics_helper+0x2006/0x5450 [ 15.231338] kasan_check_range+0x10c/0x1c0 [ 15.231362] __kasan_check_write+0x18/0x20 [ 15.231383] kasan_atomics_helper+0x2006/0x5450 [ 15.231406] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.231430] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.231455] ? trace_hardirqs_on+0x37/0xe0 [ 15.231479] ? kasan_atomics+0x152/0x310 [ 15.231505] kasan_atomics+0x1dc/0x310 [ 15.231528] ? __pfx_kasan_atomics+0x10/0x10 [ 15.231552] ? __pfx_kasan_atomics+0x10/0x10 [ 15.231579] kunit_try_run_case+0x1a5/0x480 [ 15.231604] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.231627] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.231663] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.231685] ? __kthread_parkme+0x82/0x180 [ 15.231706] ? preempt_count_sub+0x50/0x80 [ 15.231731] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.231754] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.231778] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.231801] kthread+0x337/0x6f0 [ 15.231820] ? trace_preempt_on+0x20/0xc0 [ 15.231843] ? __pfx_kthread+0x10/0x10 [ 15.231863] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.231886] ? calculate_sigpending+0x7b/0xa0 [ 15.231910] ? __pfx_kthread+0x10/0x10 [ 15.231932] ret_from_fork+0x116/0x1d0 [ 15.231951] ? __pfx_kthread+0x10/0x10 [ 15.231972] ret_from_fork_asm+0x1a/0x30 [ 15.232004] </TASK> [ 15.232017] [ 15.239494] Allocated by task 282: [ 15.239666] kasan_save_stack+0x45/0x70 [ 15.239866] kasan_save_track+0x18/0x40 [ 15.240063] kasan_save_alloc_info+0x3b/0x50 [ 15.240274] __kasan_kmalloc+0xb7/0xc0 [ 15.240481] __kmalloc_cache_noprof+0x189/0x420 [ 15.240938] kasan_atomics+0x95/0x310 [ 15.241133] kunit_try_run_case+0x1a5/0x480 [ 15.241288] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.241458] kthread+0x337/0x6f0 [ 15.241575] ret_from_fork+0x116/0x1d0 [ 15.241882] ret_from_fork_asm+0x1a/0x30 [ 15.242098] [ 15.242218] The buggy address belongs to the object at ffff8881033c5500 [ 15.242218] which belongs to the cache kmalloc-64 of size 64 [ 15.242820] The buggy address is located 0 bytes to the right of [ 15.242820] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 15.243279] [ 15.243351] The buggy address belongs to the physical page: [ 15.243518] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 15.243825] flags: 0x200000000000000(node=0|zone=2) [ 15.244074] page_type: f5(slab) [ 15.244250] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.244736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.244959] page dumped because: kasan: bad access detected [ 15.245136] [ 15.245206] Memory state around the buggy address: [ 15.245452] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.245763] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.246244] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.246448] ^ [ 15.246596] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.246801] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.247005] ================================================================== [ 14.635843] ================================================================== [ 14.636229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 14.636557] Write of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.637005] [ 14.637154] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.637200] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.637214] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.637235] Call Trace: [ 14.637273] <TASK> [ 14.637292] dump_stack_lvl+0x73/0xb0 [ 14.637336] print_report+0xd1/0x650 [ 14.637374] ? __virt_addr_valid+0x1db/0x2d0 [ 14.637411] ? kasan_atomics_helper+0x1148/0x5450 [ 14.637433] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.637469] ? kasan_atomics_helper+0x1148/0x5450 [ 14.637491] kasan_report+0x141/0x180 [ 14.637528] ? kasan_atomics_helper+0x1148/0x5450 [ 14.637555] kasan_check_range+0x10c/0x1c0 [ 14.637591] __kasan_check_write+0x18/0x20 [ 14.637624] kasan_atomics_helper+0x1148/0x5450 [ 14.637660] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.637683] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.637709] ? trace_hardirqs_on+0x37/0xe0 [ 14.637732] ? kasan_atomics+0x152/0x310 [ 14.637759] kasan_atomics+0x1dc/0x310 [ 14.637782] ? __pfx_kasan_atomics+0x10/0x10 [ 14.637805] ? __pfx_kasan_atomics+0x10/0x10 [ 14.637833] kunit_try_run_case+0x1a5/0x480 [ 14.637858] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.637880] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.637905] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.637928] ? __kthread_parkme+0x82/0x180 [ 14.637950] ? preempt_count_sub+0x50/0x80 [ 14.637974] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.637999] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.638032] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.638056] kthread+0x337/0x6f0 [ 14.638075] ? trace_preempt_on+0x20/0xc0 [ 14.638097] ? __pfx_kthread+0x10/0x10 [ 14.638118] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.638141] ? calculate_sigpending+0x7b/0xa0 [ 14.638165] ? __pfx_kthread+0x10/0x10 [ 14.638187] ret_from_fork+0x116/0x1d0 [ 14.638207] ? __pfx_kthread+0x10/0x10 [ 14.638228] ret_from_fork_asm+0x1a/0x30 [ 14.638260] </TASK> [ 14.638273] [ 14.645917] Allocated by task 282: [ 14.646222] kasan_save_stack+0x45/0x70 [ 14.646369] kasan_save_track+0x18/0x40 [ 14.646501] kasan_save_alloc_info+0x3b/0x50 [ 14.646739] __kasan_kmalloc+0xb7/0xc0 [ 14.646951] __kmalloc_cache_noprof+0x189/0x420 [ 14.647209] kasan_atomics+0x95/0x310 [ 14.647399] kunit_try_run_case+0x1a5/0x480 [ 14.647610] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.647845] kthread+0x337/0x6f0 [ 14.647969] ret_from_fork+0x116/0x1d0 [ 14.648192] ret_from_fork_asm+0x1a/0x30 [ 14.648390] [ 14.648487] The buggy address belongs to the object at ffff8881033c5500 [ 14.648487] which belongs to the cache kmalloc-64 of size 64 [ 14.648988] The buggy address is located 0 bytes to the right of [ 14.648988] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.649493] [ 14.649592] The buggy address belongs to the physical page: [ 14.649859] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.650215] flags: 0x200000000000000(node=0|zone=2) [ 14.650419] page_type: f5(slab) [ 14.650570] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.650930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.651326] page dumped because: kasan: bad access detected [ 14.651597] [ 14.651669] Memory state around the buggy address: [ 14.651906] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.652228] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.652536] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.652816] ^ [ 14.652968] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.653184] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.653393] ================================================================== [ 14.161299] ================================================================== [ 14.161824] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 14.162195] Read of size 4 at addr ffff8881033c5530 by task kunit_try_catch/282 [ 14.162465] [ 14.162557] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.162603] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.162616] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.162639] Call Trace: [ 14.162658] <TASK> [ 14.162676] dump_stack_lvl+0x73/0xb0 [ 14.162716] print_report+0xd1/0x650 [ 14.162740] ? __virt_addr_valid+0x1db/0x2d0 [ 14.162765] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.162799] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.162821] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.162844] kasan_report+0x141/0x180 [ 14.162867] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.162893] __asan_report_load4_noabort+0x18/0x20 [ 14.162918] kasan_atomics_helper+0x4b54/0x5450 [ 14.162941] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.162963] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.162989] ? trace_hardirqs_on+0x37/0xe0 [ 14.163012] ? kasan_atomics+0x152/0x310 [ 14.163048] kasan_atomics+0x1dc/0x310 [ 14.163072] ? __pfx_kasan_atomics+0x10/0x10 [ 14.163095] ? __pfx_kasan_atomics+0x10/0x10 [ 14.163135] kunit_try_run_case+0x1a5/0x480 [ 14.163160] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.163183] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.163209] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.163232] ? __kthread_parkme+0x82/0x180 [ 14.163253] ? preempt_count_sub+0x50/0x80 [ 14.163287] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.163311] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.163335] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.163371] kthread+0x337/0x6f0 [ 14.163390] ? trace_preempt_on+0x20/0xc0 [ 14.163413] ? __pfx_kthread+0x10/0x10 [ 14.163434] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.163456] ? calculate_sigpending+0x7b/0xa0 [ 14.163480] ? __pfx_kthread+0x10/0x10 [ 14.163503] ret_from_fork+0x116/0x1d0 [ 14.163523] ? __pfx_kthread+0x10/0x10 [ 14.163544] ret_from_fork_asm+0x1a/0x30 [ 14.163575] </TASK> [ 14.163587] [ 14.171756] Allocated by task 282: [ 14.171894] kasan_save_stack+0x45/0x70 [ 14.172049] kasan_save_track+0x18/0x40 [ 14.172246] kasan_save_alloc_info+0x3b/0x50 [ 14.172493] __kasan_kmalloc+0xb7/0xc0 [ 14.172708] __kmalloc_cache_noprof+0x189/0x420 [ 14.172929] kasan_atomics+0x95/0x310 [ 14.173093] kunit_try_run_case+0x1a5/0x480 [ 14.173243] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.173433] kthread+0x337/0x6f0 [ 14.173615] ret_from_fork+0x116/0x1d0 [ 14.173825] ret_from_fork_asm+0x1a/0x30 [ 14.174034] [ 14.174145] The buggy address belongs to the object at ffff8881033c5500 [ 14.174145] which belongs to the cache kmalloc-64 of size 64 [ 14.174656] The buggy address is located 0 bytes to the right of [ 14.174656] allocated 48-byte region [ffff8881033c5500, ffff8881033c5530) [ 14.175175] [ 14.175296] The buggy address belongs to the physical page: [ 14.175519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033c5 [ 14.175894] flags: 0x200000000000000(node=0|zone=2) [ 14.176135] page_type: f5(slab) [ 14.176327] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.176654] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.176978] page dumped because: kasan: bad access detected [ 14.177236] [ 14.177330] Memory state around the buggy address: [ 14.177509] ffff8881033c5400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.177905] ffff8881033c5480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.178134] >ffff8881033c5500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.178349] ^ [ 14.178504] ffff8881033c5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.178794] ffff8881033c5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.179130] ==================================================================