Date
July 3, 2025, 6:13 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.752182] ================================================================== [ 19.752247] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 19.752297] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265 [ 19.752571] [ 19.752841] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.753059] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.753124] Hardware name: linux,dummy-virt (DT) [ 19.753195] Call trace: [ 19.753294] show_stack+0x20/0x38 (C) [ 19.753392] dump_stack_lvl+0x8c/0xd0 [ 19.753455] print_report+0x118/0x608 [ 19.753504] kasan_report+0xdc/0x128 [ 19.753921] kasan_check_range+0x100/0x1a8 [ 19.754153] __kasan_check_write+0x20/0x30 [ 19.754382] kasan_atomics_helper+0x147c/0x4858 [ 19.754460] kasan_atomics+0x198/0x2e0 [ 19.754629] kunit_try_run_case+0x170/0x3f0 [ 19.754735] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.755135] kthread+0x328/0x630 [ 19.755619] ret_from_fork+0x10/0x20 [ 19.755772] [ 19.755829] Allocated by task 265: [ 19.755992] kasan_save_stack+0x3c/0x68 [ 19.756126] kasan_save_track+0x20/0x40 [ 19.756733] kasan_save_alloc_info+0x40/0x58 [ 19.756956] __kasan_kmalloc+0xd4/0xd8 [ 19.757153] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.757228] kasan_atomics+0xb8/0x2e0 [ 19.757559] kunit_try_run_case+0x170/0x3f0 [ 19.757610] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.757749] kthread+0x328/0x630 [ 19.758059] ret_from_fork+0x10/0x20 [ 19.758212] [ 19.758392] The buggy address belongs to the object at fff00000c65c5b80 [ 19.758392] which belongs to the cache kmalloc-64 of size 64 [ 19.758642] The buggy address is located 0 bytes to the right of [ 19.758642] allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0) [ 19.758715] [ 19.758737] The buggy address belongs to the physical page: [ 19.758771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 19.759529] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.759642] page_type: f5(slab) [ 19.759687] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.760102] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.760390] page dumped because: kasan: bad access detected [ 19.760547] [ 19.760569] Memory state around the buggy address: [ 19.760606] fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.760664] fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.760982] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.761057] ^ [ 19.761179] fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.761281] fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.761425] ================================================================== [ 19.778562] ================================================================== [ 19.778680] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 19.778788] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265 [ 19.778840] [ 19.778890] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.779064] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.779096] Hardware name: linux,dummy-virt (DT) [ 19.779149] Call trace: [ 19.779493] show_stack+0x20/0x38 (C) [ 19.779870] dump_stack_lvl+0x8c/0xd0 [ 19.779947] print_report+0x118/0x608 [ 19.780042] kasan_report+0xdc/0x128 [ 19.780095] kasan_check_range+0x100/0x1a8 [ 19.780391] __kasan_check_write+0x20/0x30 [ 19.780549] kasan_atomics_helper+0x15b4/0x4858 [ 19.780666] kasan_atomics+0x198/0x2e0 [ 19.780857] kunit_try_run_case+0x170/0x3f0 [ 19.781090] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.781217] kthread+0x328/0x630 [ 19.781348] ret_from_fork+0x10/0x20 [ 19.781430] [ 19.781588] Allocated by task 265: [ 19.781660] kasan_save_stack+0x3c/0x68 [ 19.781827] kasan_save_track+0x20/0x40 [ 19.781945] kasan_save_alloc_info+0x40/0x58 [ 19.782069] __kasan_kmalloc+0xd4/0xd8 [ 19.782244] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.782540] kasan_atomics+0xb8/0x2e0 [ 19.782587] kunit_try_run_case+0x170/0x3f0 [ 19.782629] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.782695] kthread+0x328/0x630 [ 19.782729] ret_from_fork+0x10/0x20 [ 19.782767] [ 19.782788] The buggy address belongs to the object at fff00000c65c5b80 [ 19.782788] which belongs to the cache kmalloc-64 of size 64 [ 19.782850] The buggy address is located 0 bytes to the right of [ 19.782850] allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0) [ 19.782922] [ 19.782943] The buggy address belongs to the physical page: [ 19.782988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 19.783063] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.783120] page_type: f5(slab) [ 19.783179] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.783239] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.783283] page dumped because: kasan: bad access detected [ 19.783316] [ 19.783345] Memory state around the buggy address: [ 19.783379] fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.783437] fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.783493] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.783551] ^ [ 19.783588] fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.783641] fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.783686] ================================================================== [ 19.662373] ================================================================== [ 19.662509] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 19.662735] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265 [ 19.663020] [ 19.663083] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.663465] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.663644] Hardware name: linux,dummy-virt (DT) [ 19.663681] Call trace: [ 19.663963] show_stack+0x20/0x38 (C) [ 19.664126] dump_stack_lvl+0x8c/0xd0 [ 19.664219] print_report+0x118/0x608 [ 19.664298] kasan_report+0xdc/0x128 [ 19.664434] kasan_check_range+0x100/0x1a8 [ 19.664540] __kasan_check_write+0x20/0x30 [ 19.664591] kasan_atomics_helper+0xf88/0x4858 [ 19.664639] kasan_atomics+0x198/0x2e0 [ 19.664978] kunit_try_run_case+0x170/0x3f0 [ 19.665089] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.665545] kthread+0x328/0x630 [ 19.665688] ret_from_fork+0x10/0x20 [ 19.665902] [ 19.665999] Allocated by task 265: [ 19.666044] kasan_save_stack+0x3c/0x68 [ 19.666427] kasan_save_track+0x20/0x40 [ 19.666511] kasan_save_alloc_info+0x40/0x58 [ 19.666584] __kasan_kmalloc+0xd4/0xd8 [ 19.667107] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.667199] kasan_atomics+0xb8/0x2e0 [ 19.667322] kunit_try_run_case+0x170/0x3f0 [ 19.667364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.667859] kthread+0x328/0x630 [ 19.668039] ret_from_fork+0x10/0x20 [ 19.668104] [ 19.668147] The buggy address belongs to the object at fff00000c65c5b80 [ 19.668147] which belongs to the cache kmalloc-64 of size 64 [ 19.668208] The buggy address is located 0 bytes to the right of [ 19.668208] allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0) [ 19.668361] [ 19.668389] The buggy address belongs to the physical page: [ 19.668447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 19.668500] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.668869] page_type: f5(slab) [ 19.668999] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.669276] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.669330] page dumped because: kasan: bad access detected [ 19.669364] [ 19.669491] Memory state around the buggy address: [ 19.669541] fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.669659] fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.669779] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.669864] ^ [ 19.670294] fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.670473] fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.670546] ================================================================== [ 19.685818] ================================================================== [ 19.685870] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 19.685917] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265 [ 19.685968] [ 19.685997] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.686126] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.687076] Hardware name: linux,dummy-virt (DT) [ 19.687119] Call trace: [ 19.687144] show_stack+0x20/0x38 (C) [ 19.687207] dump_stack_lvl+0x8c/0xd0 [ 19.687255] print_report+0x118/0x608 [ 19.687328] kasan_report+0xdc/0x128 [ 19.687651] kasan_check_range+0x100/0x1a8 [ 19.688131] __kasan_check_write+0x20/0x30 [ 19.688243] kasan_atomics_helper+0x10c0/0x4858 [ 19.688330] kasan_atomics+0x198/0x2e0 [ 19.688543] kunit_try_run_case+0x170/0x3f0 [ 19.688596] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.688685] kthread+0x328/0x630 [ 19.688729] ret_from_fork+0x10/0x20 [ 19.689088] [ 19.689400] Allocated by task 265: [ 19.689473] kasan_save_stack+0x3c/0x68 [ 19.689610] kasan_save_track+0x20/0x40 [ 19.689739] kasan_save_alloc_info+0x40/0x58 [ 19.689820] __kasan_kmalloc+0xd4/0xd8 [ 19.689999] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.690510] kasan_atomics+0xb8/0x2e0 [ 19.690759] kunit_try_run_case+0x170/0x3f0 [ 19.690851] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.691163] kthread+0x328/0x630 [ 19.691377] ret_from_fork+0x10/0x20 [ 19.691450] [ 19.691552] The buggy address belongs to the object at fff00000c65c5b80 [ 19.691552] which belongs to the cache kmalloc-64 of size 64 [ 19.691735] The buggy address is located 0 bytes to the right of [ 19.691735] allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0) [ 19.691853] [ 19.692248] The buggy address belongs to the physical page: [ 19.692330] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 19.692409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.692837] page_type: f5(slab) [ 19.692893] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.692981] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.693182] page dumped because: kasan: bad access detected [ 19.693281] [ 19.693311] Memory state around the buggy address: [ 19.693354] fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.693400] fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.693443] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.693787] ^ [ 19.694252] fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.694656] fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.694733] ================================================================== [ 19.625943] ================================================================== [ 19.626618] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 19.626691] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265 [ 19.626751] [ 19.627127] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.627519] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.627588] Hardware name: linux,dummy-virt (DT) [ 19.627624] Call trace: [ 19.627650] show_stack+0x20/0x38 (C) [ 19.627705] dump_stack_lvl+0x8c/0xd0 [ 19.627839] print_report+0x118/0x608 [ 19.627894] kasan_report+0xdc/0x128 [ 19.627942] kasan_check_range+0x100/0x1a8 [ 19.628277] __kasan_check_write+0x20/0x30 [ 19.628365] kasan_atomics_helper+0xe44/0x4858 [ 19.628424] kasan_atomics+0x198/0x2e0 [ 19.628735] kunit_try_run_case+0x170/0x3f0 [ 19.628901] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.629090] kthread+0x328/0x630 [ 19.629221] ret_from_fork+0x10/0x20 [ 19.629304] [ 19.629326] Allocated by task 265: [ 19.629363] kasan_save_stack+0x3c/0x68 [ 19.629404] kasan_save_track+0x20/0x40 [ 19.629762] kasan_save_alloc_info+0x40/0x58 [ 19.629835] __kasan_kmalloc+0xd4/0xd8 [ 19.630311] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.630374] kasan_atomics+0xb8/0x2e0 [ 19.630414] kunit_try_run_case+0x170/0x3f0 [ 19.630564] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.630654] kthread+0x328/0x630 [ 19.631176] ret_from_fork+0x10/0x20 [ 19.631606] [ 19.631718] The buggy address belongs to the object at fff00000c65c5b80 [ 19.631718] which belongs to the cache kmalloc-64 of size 64 [ 19.632271] The buggy address is located 0 bytes to the right of [ 19.632271] allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0) [ 19.632707] [ 19.632759] The buggy address belongs to the physical page: [ 19.633153] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 19.633220] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.633291] page_type: f5(slab) [ 19.633332] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.633658] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.633756] page dumped because: kasan: bad access detected [ 19.634088] [ 19.634150] Memory state around the buggy address: [ 19.634203] fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.634408] fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.634452] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.635098] ^ [ 19.635163] fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.635244] fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.635612] ================================================================== [ 19.783889] ================================================================== [ 19.783956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 19.784014] Read of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265 [ 19.784755] [ 19.784863] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.785258] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.785809] Hardware name: linux,dummy-virt (DT) [ 19.786118] Call trace: [ 19.786177] show_stack+0x20/0x38 (C) [ 19.786236] dump_stack_lvl+0x8c/0xd0 [ 19.786609] print_report+0x118/0x608 [ 19.787075] kasan_report+0xdc/0x128 [ 19.787242] __asan_report_load8_noabort+0x20/0x30 [ 19.787403] kasan_atomics_helper+0x3db0/0x4858 [ 19.787485] kasan_atomics+0x198/0x2e0 [ 19.787910] kunit_try_run_case+0x170/0x3f0 [ 19.788319] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.788475] kthread+0x328/0x630 [ 19.788693] ret_from_fork+0x10/0x20 [ 19.788951] [ 19.789060] Allocated by task 265: [ 19.789137] kasan_save_stack+0x3c/0x68 [ 19.789320] kasan_save_track+0x20/0x40 [ 19.789520] kasan_save_alloc_info+0x40/0x58 [ 19.789605] __kasan_kmalloc+0xd4/0xd8 [ 19.789767] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.789865] kasan_atomics+0xb8/0x2e0 [ 19.790006] kunit_try_run_case+0x170/0x3f0 [ 19.790058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.790259] kthread+0x328/0x630 [ 19.790478] ret_from_fork+0x10/0x20 [ 19.790542] [ 19.790956] The buggy address belongs to the object at fff00000c65c5b80 [ 19.790956] which belongs to the cache kmalloc-64 of size 64 [ 19.791065] The buggy address is located 0 bytes to the right of [ 19.791065] allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0) [ 19.791247] [ 19.791311] The buggy address belongs to the physical page: [ 19.791463] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 19.791574] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.791629] page_type: f5(slab) [ 19.791669] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.792042] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.792136] page dumped because: kasan: bad access detected [ 19.792215] [ 19.792510] Memory state around the buggy address: [ 19.792556] fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.792627] fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.792674] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.793116] ^ [ 19.793340] fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.793547] fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.793721] ================================================================== [ 19.762710] ================================================================== [ 19.762908] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 19.763006] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265 [ 19.763185] [ 19.763279] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.763366] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.763395] Hardware name: linux,dummy-virt (DT) [ 19.763454] Call trace: [ 19.763479] show_stack+0x20/0x38 (C) [ 19.763550] dump_stack_lvl+0x8c/0xd0 [ 19.763599] print_report+0x118/0x608 [ 19.763656] kasan_report+0xdc/0x128 [ 19.763703] kasan_check_range+0x100/0x1a8 [ 19.763754] __kasan_check_write+0x20/0x30 [ 19.763805] kasan_atomics_helper+0x14e4/0x4858 [ 19.763863] kasan_atomics+0x198/0x2e0 [ 19.763910] kunit_try_run_case+0x170/0x3f0 [ 19.763967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.764019] kthread+0x328/0x630 [ 19.764073] ret_from_fork+0x10/0x20 [ 19.764119] [ 19.764150] Allocated by task 265: [ 19.764179] kasan_save_stack+0x3c/0x68 [ 19.764221] kasan_save_track+0x20/0x40 [ 19.764258] kasan_save_alloc_info+0x40/0x58 [ 19.764299] __kasan_kmalloc+0xd4/0xd8 [ 19.764336] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.764385] kasan_atomics+0xb8/0x2e0 [ 19.764422] kunit_try_run_case+0x170/0x3f0 [ 19.764470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.764652] kthread+0x328/0x630 [ 19.764833] ret_from_fork+0x10/0x20 [ 19.765537] [ 19.765681] The buggy address belongs to the object at fff00000c65c5b80 [ 19.765681] which belongs to the cache kmalloc-64 of size 64 [ 19.765879] The buggy address is located 0 bytes to the right of [ 19.765879] allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0) [ 19.766155] [ 19.766403] The buggy address belongs to the physical page: [ 19.766451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 19.766542] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.766884] page_type: f5(slab) [ 19.766957] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.767302] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.767506] page dumped because: kasan: bad access detected [ 19.767621] [ 19.767773] Memory state around the buggy address: [ 19.767959] fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.768102] fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.768198] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.768368] ^ [ 19.768439] fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.768628] fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.768670] ================================================================== [ 19.729334] ================================================================== [ 19.729601] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 19.729670] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265 [ 19.729721] [ 19.729940] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.730057] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.730088] Hardware name: linux,dummy-virt (DT) [ 19.730119] Call trace: [ 19.730143] show_stack+0x20/0x38 (C) [ 19.730192] dump_stack_lvl+0x8c/0xd0 [ 19.730243] print_report+0x118/0x608 [ 19.730290] kasan_report+0xdc/0x128 [ 19.730348] kasan_check_range+0x100/0x1a8 [ 19.730398] __kasan_check_write+0x20/0x30 [ 19.730452] kasan_atomics_helper+0x1384/0x4858 [ 19.730510] kasan_atomics+0x198/0x2e0 [ 19.730564] kunit_try_run_case+0x170/0x3f0 [ 19.730630] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.730686] kthread+0x328/0x630 [ 19.730729] ret_from_fork+0x10/0x20 [ 19.730793] [ 19.730814] Allocated by task 265: [ 19.730844] kasan_save_stack+0x3c/0x68 [ 19.730884] kasan_save_track+0x20/0x40 [ 19.730923] kasan_save_alloc_info+0x40/0x58 [ 19.730963] __kasan_kmalloc+0xd4/0xd8 [ 19.731001] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.731603] kasan_atomics+0xb8/0x2e0 [ 19.731664] kunit_try_run_case+0x170/0x3f0 [ 19.731714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.731771] kthread+0x328/0x630 [ 19.731805] ret_from_fork+0x10/0x20 [ 19.731841] [ 19.732012] The buggy address belongs to the object at fff00000c65c5b80 [ 19.732012] which belongs to the cache kmalloc-64 of size 64 [ 19.732239] The buggy address is located 0 bytes to the right of [ 19.732239] allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0) [ 19.732320] [ 19.732545] The buggy address belongs to the physical page: [ 19.732691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 19.732768] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.733055] page_type: f5(slab) [ 19.733162] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.733319] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.733689] page dumped because: kasan: bad access detected [ 19.733740] [ 19.733760] Memory state around the buggy address: [ 19.733805] fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.734115] fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.734435] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.734661] ^ [ 19.734705] fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.735373] fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.735484] ================================================================== [ 19.746214] ================================================================== [ 19.746661] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 19.746731] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265 [ 19.746807] [ 19.746885] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.747057] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.747170] Hardware name: linux,dummy-virt (DT) [ 19.747205] Call trace: [ 19.747245] show_stack+0x20/0x38 (C) [ 19.747490] dump_stack_lvl+0x8c/0xd0 [ 19.747696] print_report+0x118/0x608 [ 19.747772] kasan_report+0xdc/0x128 [ 19.747824] kasan_check_range+0x100/0x1a8 [ 19.748127] __kasan_check_write+0x20/0x30 [ 19.748191] kasan_atomics_helper+0x1414/0x4858 [ 19.748273] kasan_atomics+0x198/0x2e0 [ 19.748323] kunit_try_run_case+0x170/0x3f0 [ 19.748698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.748776] kthread+0x328/0x630 [ 19.748819] ret_from_fork+0x10/0x20 [ 19.748883] [ 19.748904] Allocated by task 265: [ 19.748935] kasan_save_stack+0x3c/0x68 [ 19.748984] kasan_save_track+0x20/0x40 [ 19.749025] kasan_save_alloc_info+0x40/0x58 [ 19.749078] __kasan_kmalloc+0xd4/0xd8 [ 19.749116] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.749165] kasan_atomics+0xb8/0x2e0 [ 19.749206] kunit_try_run_case+0x170/0x3f0 [ 19.749244] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.749291] kthread+0x328/0x630 [ 19.749325] ret_from_fork+0x10/0x20 [ 19.749362] [ 19.749399] The buggy address belongs to the object at fff00000c65c5b80 [ 19.749399] which belongs to the cache kmalloc-64 of size 64 [ 19.749459] The buggy address is located 0 bytes to the right of [ 19.749459] allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0) [ 19.749529] [ 19.749571] The buggy address belongs to the physical page: [ 19.749605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 19.749657] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.749704] page_type: f5(slab) [ 19.749741] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.749794] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.749837] page dumped because: kasan: bad access detected [ 19.749870] [ 19.749898] Memory state around the buggy address: [ 19.749935] fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.749980] fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.750024] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.750088] ^ [ 19.750137] fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.750208] fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.751011] ================================================================== [ 19.819226] ================================================================== [ 19.819285] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 19.819337] Read of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265 [ 19.819388] [ 19.819420] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.819960] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.820046] Hardware name: linux,dummy-virt (DT) [ 19.820216] Call trace: [ 19.820253] show_stack+0x20/0x38 (C) [ 19.820550] dump_stack_lvl+0x8c/0xd0 [ 19.820743] print_report+0x118/0x608 [ 19.820832] kasan_report+0xdc/0x128 [ 19.820967] __asan_report_load8_noabort+0x20/0x30 [ 19.821093] kasan_atomics_helper+0x3e10/0x4858 [ 19.821153] kasan_atomics+0x198/0x2e0 [ 19.821200] kunit_try_run_case+0x170/0x3f0 [ 19.821250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.821305] kthread+0x328/0x630 [ 19.821348] ret_from_fork+0x10/0x20 [ 19.822142] [ 19.822242] Allocated by task 265: [ 19.822331] kasan_save_stack+0x3c/0x68 [ 19.822499] kasan_save_track+0x20/0x40 [ 19.822588] kasan_save_alloc_info+0x40/0x58 [ 19.823063] __kasan_kmalloc+0xd4/0xd8 [ 19.823116] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.823157] kasan_atomics+0xb8/0x2e0 [ 19.823205] kunit_try_run_case+0x170/0x3f0 [ 19.823243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.823289] kthread+0x328/0x630 [ 19.823332] ret_from_fork+0x10/0x20 [ 19.823372] [ 19.823402] The buggy address belongs to the object at fff00000c65c5b80 [ 19.823402] which belongs to the cache kmalloc-64 of size 64 [ 19.823462] The buggy address is located 0 bytes to the right of [ 19.823462] allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0) [ 19.823530] [ 19.823562] The buggy address belongs to the physical page: [ 19.823604] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 19.823660] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.823709] page_type: f5(slab) [ 19.823759] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.823812] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.823856] page dumped because: kasan: bad access detected [ 19.823890] [ 19.823927] Memory state around the buggy address: [ 19.823962] fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.824008] fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.824072] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.824290] ^ [ 19.824638] fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.825416] fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.825471] ================================================================== [ 19.769770] ================================================================== [ 19.769866] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 19.770215] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265 [ 19.770294] [ 19.770563] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.770727] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.770759] Hardware name: linux,dummy-virt (DT) [ 19.770821] Call trace: [ 19.770851] show_stack+0x20/0x38 (C) [ 19.771199] dump_stack_lvl+0x8c/0xd0 [ 19.771277] print_report+0x118/0x608 [ 19.771508] kasan_report+0xdc/0x128 [ 19.771744] kasan_check_range+0x100/0x1a8 [ 19.771841] __kasan_check_write+0x20/0x30 [ 19.771892] kasan_atomics_helper+0x154c/0x4858 [ 19.771970] kasan_atomics+0x198/0x2e0 [ 19.772159] kunit_try_run_case+0x170/0x3f0 [ 19.772209] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.772573] kthread+0x328/0x630 [ 19.772706] ret_from_fork+0x10/0x20 [ 19.772886] [ 19.772921] Allocated by task 265: [ 19.772952] kasan_save_stack+0x3c/0x68 [ 19.773044] kasan_save_track+0x20/0x40 [ 19.773084] kasan_save_alloc_info+0x40/0x58 [ 19.773495] __kasan_kmalloc+0xd4/0xd8 [ 19.773868] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.773984] kasan_atomics+0xb8/0x2e0 [ 19.774184] kunit_try_run_case+0x170/0x3f0 [ 19.774291] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.774386] kthread+0x328/0x630 [ 19.774422] ret_from_fork+0x10/0x20 [ 19.774586] [ 19.774800] The buggy address belongs to the object at fff00000c65c5b80 [ 19.774800] which belongs to the cache kmalloc-64 of size 64 [ 19.774900] The buggy address is located 0 bytes to the right of [ 19.774900] allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0) [ 19.775355] [ 19.775387] The buggy address belongs to the physical page: [ 19.775422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 19.775587] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.775659] page_type: f5(slab) [ 19.775708] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.775767] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.775820] page dumped because: kasan: bad access detected [ 19.775860] [ 19.775881] Memory state around the buggy address: [ 19.775915] fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.775960] fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.776013] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.776458] ^ [ 19.776531] fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.776779] fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.776826] ================================================================== [ 19.593385] ================================================================== [ 19.593435] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 19.593484] Read of size 4 at addr fff00000c65c5bb0 by task kunit_try_catch/265 [ 19.593533] [ 19.593565] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.593644] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.593673] Hardware name: linux,dummy-virt (DT) [ 19.593704] Call trace: [ 19.593728] show_stack+0x20/0x38 (C) [ 19.593775] dump_stack_lvl+0x8c/0xd0 [ 19.593824] print_report+0x118/0x608 [ 19.593870] kasan_report+0xdc/0x128 [ 19.593917] __asan_report_load4_noabort+0x20/0x30 [ 19.593966] kasan_atomics_helper+0x3dd8/0x4858 [ 19.594016] kasan_atomics+0x198/0x2e0 [ 19.594079] kunit_try_run_case+0x170/0x3f0 [ 19.594125] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.594179] kthread+0x328/0x630 [ 19.594222] ret_from_fork+0x10/0x20 [ 19.594271] [ 19.594292] Allocated by task 265: [ 19.594321] kasan_save_stack+0x3c/0x68 [ 19.594362] kasan_save_track+0x20/0x40 [ 19.594402] kasan_save_alloc_info+0x40/0x58 [ 19.594444] __kasan_kmalloc+0xd4/0xd8 [ 19.594480] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.594520] kasan_atomics+0xb8/0x2e0 [ 19.594556] kunit_try_run_case+0x170/0x3f0 [ 19.594595] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.594639] kthread+0x328/0x630 [ 19.594672] ret_from_fork+0x10/0x20 [ 19.594709] [ 19.594730] The buggy address belongs to the object at fff00000c65c5b80 [ 19.594730] which belongs to the cache kmalloc-64 of size 64 [ 19.594788] The buggy address is located 0 bytes to the right of [ 19.594788] allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0) [ 19.594853] [ 19.594874] The buggy address belongs to the physical page: [ 19.594907] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 19.594958] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.595007] page_type: f5(slab) [ 19.595082] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.595168] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.595212] page dumped because: kasan: bad access detected [ 19.595243] [ 19.595264] Memory state around the buggy address: [ 19.595296] fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.595340] fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.595385] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.595425] ^ [ 19.595489] fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.595533] fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.595611] ================================================================== [ 19.702599] ================================================================== [ 19.702647] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 19.702695] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265 [ 19.702745] [ 19.702774] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.702856] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.702883] Hardware name: linux,dummy-virt (DT) [ 19.702915] Call trace: [ 19.702938] show_stack+0x20/0x38 (C) [ 19.702987] dump_stack_lvl+0x8c/0xd0 [ 19.703048] print_report+0x118/0x608 [ 19.703098] kasan_report+0xdc/0x128 [ 19.703143] kasan_check_range+0x100/0x1a8 [ 19.703310] __kasan_check_write+0x20/0x30 [ 19.703500] kasan_atomics_helper+0x1190/0x4858 [ 19.703598] kasan_atomics+0x198/0x2e0 [ 19.703646] kunit_try_run_case+0x170/0x3f0 [ 19.703730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.703980] kthread+0x328/0x630 [ 19.704039] ret_from_fork+0x10/0x20 [ 19.704086] [ 19.704108] Allocated by task 265: [ 19.704136] kasan_save_stack+0x3c/0x68 [ 19.704178] kasan_save_track+0x20/0x40 [ 19.704316] kasan_save_alloc_info+0x40/0x58 [ 19.704378] __kasan_kmalloc+0xd4/0xd8 [ 19.704415] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.704495] kasan_atomics+0xb8/0x2e0 [ 19.704558] kunit_try_run_case+0x170/0x3f0 [ 19.704605] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.704650] kthread+0x328/0x630 [ 19.704719] ret_from_fork+0x10/0x20 [ 19.704806] [ 19.704946] The buggy address belongs to the object at fff00000c65c5b80 [ 19.704946] which belongs to the cache kmalloc-64 of size 64 [ 19.705023] The buggy address is located 0 bytes to the right of [ 19.705023] allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0) [ 19.705098] [ 19.705168] The buggy address belongs to the physical page: [ 19.705201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 19.705253] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.705301] page_type: f5(slab) [ 19.705338] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.705390] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.705433] page dumped because: kasan: bad access detected [ 19.705465] [ 19.705486] Memory state around the buggy address: [ 19.705519] fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.705564] fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.705811] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.705996] ^ [ 19.706103] fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.706191] fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.706241] ================================================================== [ 19.810253] ================================================================== [ 19.810598] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 19.810851] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265 [ 19.810917] [ 19.811130] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.811220] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.811257] Hardware name: linux,dummy-virt (DT) [ 19.811290] Call trace: [ 19.811316] show_stack+0x20/0x38 (C) [ 19.811749] dump_stack_lvl+0x8c/0xd0 [ 19.812143] print_report+0x118/0x608 [ 19.812223] kasan_report+0xdc/0x128 [ 19.812488] kasan_check_range+0x100/0x1a8 [ 19.812608] __kasan_check_write+0x20/0x30 [ 19.812803] kasan_atomics_helper+0x16d0/0x4858 [ 19.813103] kasan_atomics+0x198/0x2e0 [ 19.813269] kunit_try_run_case+0x170/0x3f0 [ 19.813409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.813744] kthread+0x328/0x630 [ 19.813806] ret_from_fork+0x10/0x20 [ 19.814062] [ 19.814114] Allocated by task 265: [ 19.814190] kasan_save_stack+0x3c/0x68 [ 19.814295] kasan_save_track+0x20/0x40 [ 19.814631] kasan_save_alloc_info+0x40/0x58 [ 19.814862] __kasan_kmalloc+0xd4/0xd8 [ 19.814928] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.815116] kasan_atomics+0xb8/0x2e0 [ 19.815179] kunit_try_run_case+0x170/0x3f0 [ 19.815240] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.815288] kthread+0x328/0x630 [ 19.815333] ret_from_fork+0x10/0x20 [ 19.815370] [ 19.815407] The buggy address belongs to the object at fff00000c65c5b80 [ 19.815407] which belongs to the cache kmalloc-64 of size 64 [ 19.815469] The buggy address is located 0 bytes to the right of [ 19.815469] allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0) [ 19.815545] [ 19.815582] The buggy address belongs to the physical page: [ 19.815630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 19.815687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.815753] page_type: f5(slab) [ 19.815803] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.815857] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.815902] page dumped because: kasan: bad access detected [ 19.815942] [ 19.815964] Memory state around the buggy address: [ 19.816003] fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.816069] fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.816503] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.816594] ^ [ 19.817012] fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.817265] fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.817383] ================================================================== [ 19.595751] ================================================================== [ 19.595794] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 19.596296] Write of size 4 at addr fff00000c65c5bb0 by task kunit_try_catch/265 [ 19.596358] [ 19.596418] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.596592] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.596673] Hardware name: linux,dummy-virt (DT) [ 19.596873] Call trace: [ 19.596998] show_stack+0x20/0x38 (C) [ 19.597125] dump_stack_lvl+0x8c/0xd0 [ 19.597173] print_report+0x118/0x608 [ 19.597241] kasan_report+0xdc/0x128 [ 19.597635] kasan_check_range+0x100/0x1a8 [ 19.597984] __kasan_check_write+0x20/0x30 [ 19.598149] kasan_atomics_helper+0xd3c/0x4858 [ 19.598224] kasan_atomics+0x198/0x2e0 [ 19.598348] kunit_try_run_case+0x170/0x3f0 [ 19.598445] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.598594] kthread+0x328/0x630 [ 19.598721] ret_from_fork+0x10/0x20 [ 19.599220] [ 19.599517] Allocated by task 265: [ 19.599578] kasan_save_stack+0x3c/0x68 [ 19.599700] kasan_save_track+0x20/0x40 [ 19.599740] kasan_save_alloc_info+0x40/0x58 [ 19.600163] __kasan_kmalloc+0xd4/0xd8 [ 19.600289] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.600580] kasan_atomics+0xb8/0x2e0 [ 19.600715] kunit_try_run_case+0x170/0x3f0 [ 19.600826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.600877] kthread+0x328/0x630 [ 19.600912] ret_from_fork+0x10/0x20 [ 19.601334] [ 19.601398] The buggy address belongs to the object at fff00000c65c5b80 [ 19.601398] which belongs to the cache kmalloc-64 of size 64 [ 19.601509] The buggy address is located 0 bytes to the right of [ 19.601509] allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0) [ 19.601795] [ 19.601952] The buggy address belongs to the physical page: [ 19.601990] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 19.602075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.602270] page_type: f5(slab) [ 19.602494] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.602731] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.602991] page dumped because: kasan: bad access detected [ 19.603045] [ 19.603065] Memory state around the buggy address: [ 19.603218] fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.603511] fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.603758] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.603805] ^ [ 19.603841] fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.603886] fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.604065] ================================================================== [ 19.554522] ================================================================== [ 19.554576] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 19.554628] Read of size 4 at addr fff00000c65c5bb0 by task kunit_try_catch/265 [ 19.554762] [ 19.554799] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.554952] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.555010] Hardware name: linux,dummy-virt (DT) [ 19.555275] Call trace: [ 19.555402] show_stack+0x20/0x38 (C) [ 19.555456] dump_stack_lvl+0x8c/0xd0 [ 19.555533] print_report+0x118/0x608 [ 19.555624] kasan_report+0xdc/0x128 [ 19.555672] __asan_report_load4_noabort+0x20/0x30 [ 19.555722] kasan_atomics_helper+0x3dcc/0x4858 [ 19.555900] kasan_atomics+0x198/0x2e0 [ 19.555976] kunit_try_run_case+0x170/0x3f0 [ 19.556121] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.556197] kthread+0x328/0x630 [ 19.556318] ret_from_fork+0x10/0x20 [ 19.556395] [ 19.556422] Allocated by task 265: [ 19.556587] kasan_save_stack+0x3c/0x68 [ 19.556678] kasan_save_track+0x20/0x40 [ 19.556746] kasan_save_alloc_info+0x40/0x58 [ 19.556870] __kasan_kmalloc+0xd4/0xd8 [ 19.556991] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.557126] kasan_atomics+0xb8/0x2e0 [ 19.557296] kunit_try_run_case+0x170/0x3f0 [ 19.557387] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.557461] kthread+0x328/0x630 [ 19.557758] ret_from_fork+0x10/0x20 [ 19.557835] [ 19.558003] The buggy address belongs to the object at fff00000c65c5b80 [ 19.558003] which belongs to the cache kmalloc-64 of size 64 [ 19.558276] The buggy address is located 0 bytes to the right of [ 19.558276] allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0) [ 19.558478] [ 19.558545] The buggy address belongs to the physical page: [ 19.558615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 19.558740] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.558789] page_type: f5(slab) [ 19.558848] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.558902] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.559253] page dumped because: kasan: bad access detected [ 19.559362] [ 19.559468] Memory state around the buggy address: [ 19.559576] fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.559640] fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.559984] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.560123] ^ [ 19.560276] fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.560371] fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.560560] ================================================================== [ 19.605360] ================================================================== [ 19.605564] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 19.605633] Read of size 4 at addr fff00000c65c5bb0 by task kunit_try_catch/265 [ 19.605684] [ 19.605886] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.606068] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.606158] Hardware name: linux,dummy-virt (DT) [ 19.606490] Call trace: [ 19.606535] show_stack+0x20/0x38 (C) [ 19.606680] dump_stack_lvl+0x8c/0xd0 [ 19.606934] print_report+0x118/0x608 [ 19.607008] kasan_report+0xdc/0x128 [ 19.607072] __asan_report_load4_noabort+0x20/0x30 [ 19.607120] kasan_atomics_helper+0x3e04/0x4858 [ 19.607499] kasan_atomics+0x198/0x2e0 [ 19.607610] kunit_try_run_case+0x170/0x3f0 [ 19.607693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.607872] kthread+0x328/0x630 [ 19.607939] ret_from_fork+0x10/0x20 [ 19.608026] [ 19.608199] Allocated by task 265: [ 19.608298] kasan_save_stack+0x3c/0x68 [ 19.608473] kasan_save_track+0x20/0x40 [ 19.608612] kasan_save_alloc_info+0x40/0x58 [ 19.608658] __kasan_kmalloc+0xd4/0xd8 [ 19.608731] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.608795] kasan_atomics+0xb8/0x2e0 [ 19.609264] kunit_try_run_case+0x170/0x3f0 [ 19.609619] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.609687] kthread+0x328/0x630 [ 19.609721] ret_from_fork+0x10/0x20 [ 19.609871] [ 19.609898] The buggy address belongs to the object at fff00000c65c5b80 [ 19.609898] which belongs to the cache kmalloc-64 of size 64 [ 19.609958] The buggy address is located 0 bytes to the right of [ 19.609958] allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0) [ 19.610094] [ 19.610194] The buggy address belongs to the physical page: [ 19.610284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 19.610636] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.610712] page_type: f5(slab) [ 19.610901] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.611094] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.611140] page dumped because: kasan: bad access detected [ 19.611172] [ 19.611193] Memory state around the buggy address: [ 19.611288] fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.611335] fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.611400] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.611448] ^ [ 19.611501] fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.611547] fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.611599] ================================================================== [ 19.671903] ================================================================== [ 19.671956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 19.672394] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265 [ 19.672601] [ 19.672983] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.673120] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.673263] Hardware name: linux,dummy-virt (DT) [ 19.673432] Call trace: [ 19.673468] show_stack+0x20/0x38 (C) [ 19.673881] dump_stack_lvl+0x8c/0xd0 [ 19.674006] print_report+0x118/0x608 [ 19.674390] kasan_report+0xdc/0x128 [ 19.674595] kasan_check_range+0x100/0x1a8 [ 19.674714] __kasan_check_write+0x20/0x30 [ 19.674990] kasan_atomics_helper+0xff0/0x4858 [ 19.675190] kasan_atomics+0x198/0x2e0 [ 19.675266] kunit_try_run_case+0x170/0x3f0 [ 19.675396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.675463] kthread+0x328/0x630 [ 19.675516] ret_from_fork+0x10/0x20 [ 19.675575] [ 19.675605] Allocated by task 265: [ 19.675645] kasan_save_stack+0x3c/0x68 [ 19.675686] kasan_save_track+0x20/0x40 [ 19.675736] kasan_save_alloc_info+0x40/0x58 [ 19.675811] __kasan_kmalloc+0xd4/0xd8 [ 19.675848] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.675906] kasan_atomics+0xb8/0x2e0 [ 19.675943] kunit_try_run_case+0x170/0x3f0 [ 19.675993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.676081] kthread+0x328/0x630 [ 19.676569] ret_from_fork+0x10/0x20 [ 19.676651] [ 19.676823] The buggy address belongs to the object at fff00000c65c5b80 [ 19.676823] which belongs to the cache kmalloc-64 of size 64 [ 19.677049] The buggy address is located 0 bytes to the right of [ 19.677049] allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0) [ 19.677134] [ 19.677366] The buggy address belongs to the physical page: [ 19.677720] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 19.677825] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.677878] page_type: f5(slab) [ 19.678220] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.678311] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.678553] page dumped because: kasan: bad access detected [ 19.678797] [ 19.678855] Memory state around the buggy address: [ 19.678931] fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.679291] fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.679349] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.679697] ^ [ 19.679846] fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.679968] fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.680409] ================================================================== [ 19.681451] ================================================================== [ 19.681770] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 19.681841] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265 [ 19.682217] [ 19.682288] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.682375] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.682402] Hardware name: linux,dummy-virt (DT) [ 19.682513] Call trace: [ 19.682539] show_stack+0x20/0x38 (C) [ 19.682638] dump_stack_lvl+0x8c/0xd0 [ 19.682990] print_report+0x118/0x608 [ 19.683104] kasan_report+0xdc/0x128 [ 19.683433] kasan_check_range+0x100/0x1a8 [ 19.683616] __kasan_check_write+0x20/0x30 [ 19.683671] kasan_atomics_helper+0x1058/0x4858 [ 19.683750] kasan_atomics+0x198/0x2e0 [ 19.683846] kunit_try_run_case+0x170/0x3f0 [ 19.684015] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.684087] kthread+0x328/0x630 [ 19.684147] ret_from_fork+0x10/0x20 [ 19.684205] [ 19.684363] Allocated by task 265: [ 19.684404] kasan_save_stack+0x3c/0x68 [ 19.684476] kasan_save_track+0x20/0x40 [ 19.684526] kasan_save_alloc_info+0x40/0x58 [ 19.684567] __kasan_kmalloc+0xd4/0xd8 [ 19.684607] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.684646] kasan_atomics+0xb8/0x2e0 [ 19.684693] kunit_try_run_case+0x170/0x3f0 [ 19.684740] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.684784] kthread+0x328/0x630 [ 19.684819] ret_from_fork+0x10/0x20 [ 19.684856] [ 19.684877] The buggy address belongs to the object at fff00000c65c5b80 [ 19.684877] which belongs to the cache kmalloc-64 of size 64 [ 19.684937] The buggy address is located 0 bytes to the right of [ 19.684937] allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0) [ 19.685002] [ 19.685044] The buggy address belongs to the physical page: [ 19.685077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 19.685143] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.685195] page_type: f5(slab) [ 19.685235] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.685288] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.685330] page dumped because: kasan: bad access detected [ 19.685372] [ 19.685393] Memory state around the buggy address: [ 19.685426] fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.685478] fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.685523] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.685564] ^ [ 19.685606] fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.685652] fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.685700] ================================================================== [ 19.547311] ================================================================== [ 19.547533] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 19.547626] Write of size 4 at addr fff00000c65c5bb0 by task kunit_try_catch/265 [ 19.547688] [ 19.547785] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.547899] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.547991] Hardware name: linux,dummy-virt (DT) [ 19.548038] Call trace: [ 19.548099] show_stack+0x20/0x38 (C) [ 19.548266] dump_stack_lvl+0x8c/0xd0 [ 19.548534] print_report+0x118/0x608 [ 19.548921] kasan_report+0xdc/0x128 [ 19.549670] kasan_check_range+0x100/0x1a8 [ 19.549760] __kasan_check_write+0x20/0x30 [ 19.549920] kasan_atomics_helper+0xad4/0x4858 [ 19.550075] kasan_atomics+0x198/0x2e0 [ 19.550128] kunit_try_run_case+0x170/0x3f0 [ 19.550296] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.550481] kthread+0x328/0x630 [ 19.550590] ret_from_fork+0x10/0x20 [ 19.550800] [ 19.550824] Allocated by task 265: [ 19.550883] kasan_save_stack+0x3c/0x68 [ 19.551124] kasan_save_track+0x20/0x40 [ 19.551182] kasan_save_alloc_info+0x40/0x58 [ 19.551317] __kasan_kmalloc+0xd4/0xd8 [ 19.551369] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.551411] kasan_atomics+0xb8/0x2e0 [ 19.551456] kunit_try_run_case+0x170/0x3f0 [ 19.551497] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.551543] kthread+0x328/0x630 [ 19.551602] ret_from_fork+0x10/0x20 [ 19.551651] [ 19.551673] The buggy address belongs to the object at fff00000c65c5b80 [ 19.551673] which belongs to the cache kmalloc-64 of size 64 [ 19.551734] The buggy address is located 0 bytes to the right of [ 19.551734] allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0) [ 19.551812] [ 19.551842] The buggy address belongs to the physical page: [ 19.551894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 19.551956] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.552005] page_type: f5(slab) [ 19.552393] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.552627] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.552735] page dumped because: kasan: bad access detected [ 19.552821] [ 19.552847] Memory state around the buggy address: [ 19.552886] fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.552933] fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.553235] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.553303] ^ [ 19.553473] fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.553558] fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.553607] ================================================================== [ 19.712090] ================================================================== [ 19.712141] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 19.712190] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265 [ 19.712467] [ 19.712513] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.713003] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.713049] Hardware name: linux,dummy-virt (DT) [ 19.713109] Call trace: [ 19.713135] show_stack+0x20/0x38 (C) [ 19.713185] dump_stack_lvl+0x8c/0xd0 [ 19.713235] print_report+0x118/0x608 [ 19.713323] kasan_report+0xdc/0x128 [ 19.713485] kasan_check_range+0x100/0x1a8 [ 19.713705] __kasan_check_write+0x20/0x30 [ 19.713833] kasan_atomics_helper+0x126c/0x4858 [ 19.714191] kasan_atomics+0x198/0x2e0 [ 19.714344] kunit_try_run_case+0x170/0x3f0 [ 19.714534] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.714676] kthread+0x328/0x630 [ 19.714860] ret_from_fork+0x10/0x20 [ 19.715022] [ 19.715055] Allocated by task 265: [ 19.715087] kasan_save_stack+0x3c/0x68 [ 19.715339] kasan_save_track+0x20/0x40 [ 19.715586] kasan_save_alloc_info+0x40/0x58 [ 19.715703] __kasan_kmalloc+0xd4/0xd8 [ 19.715800] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.716152] kasan_atomics+0xb8/0x2e0 [ 19.716329] kunit_try_run_case+0x170/0x3f0 [ 19.716428] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.716654] kthread+0x328/0x630 [ 19.716735] ret_from_fork+0x10/0x20 [ 19.716794] [ 19.716918] The buggy address belongs to the object at fff00000c65c5b80 [ 19.716918] which belongs to the cache kmalloc-64 of size 64 [ 19.717007] The buggy address is located 0 bytes to the right of [ 19.717007] allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0) [ 19.717081] [ 19.717129] The buggy address belongs to the physical page: [ 19.717162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 19.717215] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.717264] page_type: f5(slab) [ 19.717303] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.717355] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.717438] page dumped because: kasan: bad access detected [ 19.717472] [ 19.717493] Memory state around the buggy address: [ 19.717527] fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.717677] fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.717726] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.717795] ^ [ 19.717880] fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.718150] fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.718195] ================================================================== [ 19.827125] ================================================================== [ 19.827187] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 19.827242] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265 [ 19.827498] [ 19.827673] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.827793] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.827854] Hardware name: linux,dummy-virt (DT) [ 19.827889] Call trace: [ 19.827915] show_stack+0x20/0x38 (C) [ 19.828122] dump_stack_lvl+0x8c/0xd0 [ 19.828237] print_report+0x118/0x608 [ 19.828379] kasan_report+0xdc/0x128 [ 19.828438] kasan_check_range+0x100/0x1a8 [ 19.828671] __kasan_check_write+0x20/0x30 [ 19.828976] kasan_atomics_helper+0x175c/0x4858 [ 19.829124] kasan_atomics+0x198/0x2e0 [ 19.829175] kunit_try_run_case+0x170/0x3f0 [ 19.829379] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.829446] kthread+0x328/0x630 [ 19.829597] ret_from_fork+0x10/0x20 [ 19.829773] [ 19.829995] Allocated by task 265: [ 19.830381] kasan_save_stack+0x3c/0x68 [ 19.830448] kasan_save_track+0x20/0x40 [ 19.830558] kasan_save_alloc_info+0x40/0x58 [ 19.830750] __kasan_kmalloc+0xd4/0xd8 [ 19.830795] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.831456] kasan_atomics+0xb8/0x2e0 [ 19.831534] kunit_try_run_case+0x170/0x3f0 [ 19.831641] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.831776] kthread+0x328/0x630 [ 19.832176] ret_from_fork+0x10/0x20 [ 19.832476] [ 19.832524] The buggy address belongs to the object at fff00000c65c5b80 [ 19.832524] which belongs to the cache kmalloc-64 of size 64 [ 19.832607] The buggy address is located 0 bytes to the right of [ 19.832607] allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0) [ 19.832688] [ 19.832712] The buggy address belongs to the physical page: [ 19.832768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 19.832824] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.833235] page_type: f5(slab) [ 19.833300] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.833701] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.833803] page dumped because: kasan: bad access detected [ 19.833839] [ 19.834148] Memory state around the buggy address: [ 19.834218] fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.834481] fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.834535] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.834577] ^ [ 19.834621] fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.834669] fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.834727] ================================================================== [ 19.513811] ================================================================== [ 19.514046] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 19.514274] Read of size 4 at addr fff00000c65c5bb0 by task kunit_try_catch/265 [ 19.514330] [ 19.514418] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.514868] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.514928] Hardware name: linux,dummy-virt (DT) [ 19.514963] Call trace: [ 19.515093] show_stack+0x20/0x38 (C) [ 19.515158] dump_stack_lvl+0x8c/0xd0 [ 19.515280] print_report+0x118/0x608 [ 19.515335] kasan_report+0xdc/0x128 [ 19.515431] __asan_report_load4_noabort+0x20/0x30 [ 19.515484] kasan_atomics_helper+0x42d8/0x4858 [ 19.515839] kasan_atomics+0x198/0x2e0 [ 19.516580] [ 19.517398] kasan_save_alloc_info+0x40/0x58 [ 19.517686] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.518851] The buggy address is located 0 bytes to the right of [ 19.518851] allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0) [ 19.520469] Memory state around the buggy address: [ 19.521906] ================================================================== [ 19.839847] ================================================================== [ 19.839912] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 19.839960] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265 [ 19.840011] [ 19.840087] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.840649] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.841189] Hardware name: linux,dummy-virt (DT) [ 19.841233] Call trace: [ 19.841257] show_stack+0x20/0x38 (C) [ 19.841310] dump_stack_lvl+0x8c/0xd0 [ 19.841415] print_report+0x118/0x608 [ 19.841488] kasan_report+0xdc/0x128 [ 19.841569] kasan_check_range+0x100/0x1a8 [ 19.841827] __kasan_check_write+0x20/0x30 [ 19.842252] kasan_atomics_helper+0x17ec/0x4858 [ 19.842433] kasan_atomics+0x198/0x2e0 [ 19.842487] kunit_try_run_case+0x170/0x3f0 [ 19.842764] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.843359] kthread+0x328/0x630 [ 19.843495] ret_from_fork+0x10/0x20 [ 19.843613] [ 19.843703] Allocated by task 265: [ 19.843821] kasan_save_stack+0x3c/0x68 [ 19.843866] kasan_save_track+0x20/0x40 [ 19.844083] kasan_save_alloc_info+0x40/0x58 [ 19.844246] __kasan_kmalloc+0xd4/0xd8 [ 19.844628] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.844735] kasan_atomics+0xb8/0x2e0 [ 19.844985] kunit_try_run_case+0x170/0x3f0 [ 19.845135] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.845328] kthread+0x328/0x630 [ 19.845373] ret_from_fork+0x10/0x20 [ 19.845436] [ 19.845480] The buggy address belongs to the object at fff00000c65c5b80 [ 19.845480] which belongs to the cache kmalloc-64 of size 64 [ 19.846057] The buggy address is located 0 bytes to the right of [ 19.846057] allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0) [ 19.846461] [ 19.846518] The buggy address belongs to the physical page: [ 19.846589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 19.846658] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.846742] page_type: f5(slab) [ 19.847005] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.847227] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.847428] page dumped because: kasan: bad access detected [ 19.847613] [ 19.847796] Memory state around the buggy address: [ 19.848093] fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.848186] fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.848353] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.848712] ^ [ 19.848795] fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.848844] fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.848989] ================================================================== [ 19.529272] ================================================================== [ 19.529325] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 19.529374] Write of size 4 at addr fff00000c65c5bb0 by task kunit_try_catch/265 [ 19.529764] [ 19.529816] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.530048] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.530085] Hardware name: linux,dummy-virt (DT) [ 19.530119] Call trace: [ 19.530143] show_stack+0x20/0x38 (C) [ 19.530255] dump_stack_lvl+0x8c/0xd0 [ 19.530319] print_report+0x118/0x608 [ 19.530366] kasan_report+0xdc/0x128 [ 19.530411] kasan_check_range+0x100/0x1a8 [ 19.530475] __kasan_check_write+0x20/0x30 [ 19.530521] kasan_atomics_helper+0x99c/0x4858 [ 19.530585] kasan_atomics+0x198/0x2e0 [ 19.530644] kunit_try_run_case+0x170/0x3f0 [ 19.530702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.530756] kthread+0x328/0x630 [ 19.530797] ret_from_fork+0x10/0x20 [ 19.530854] [ 19.530883] Allocated by task 265: [ 19.530921] kasan_save_stack+0x3c/0x68 [ 19.530963] kasan_save_track+0x20/0x40 [ 19.531002] kasan_save_alloc_info+0x40/0x58 [ 19.531051] __kasan_kmalloc+0xd4/0xd8 [ 19.531089] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.531135] kasan_atomics+0xb8/0x2e0 [ 19.531173] kunit_try_run_case+0x170/0x3f0 [ 19.531212] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.531255] kthread+0x328/0x630 [ 19.531294] ret_from_fork+0x10/0x20 [ 19.531330] [ 19.531352] The buggy address belongs to the object at fff00000c65c5b80 [ 19.531352] which belongs to the cache kmalloc-64 of size 64 [ 19.531413] The buggy address is located 0 bytes to the right of [ 19.531413] allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0) [ 19.531485] [ 19.531507] The buggy address belongs to the physical page: [ 19.531538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 19.531589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.531638] page_type: f5(slab) [ 19.531675] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.531728] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.531913] fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.534917] kasan_atomics_helper+0xa04/0x4858 [ 19.535419] ret_from_fork+0x10/0x20 [ 19.535533] [ 19.535558] Allocated by task 265: [ 19.535642] kasan_save_stack+0x3c/0x68 [ 19.535719] kasan_save_track+0x20/0x40 [ 19.535799] kasan_save_alloc_info+0x40/0x58 [ 19.535848] __kasan_kmalloc+0xd4/0xd8 [ 19.535904] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.535992] kasan_atomics+0xb8/0x2e0 [ 19.536081] kunit_try_run_case+0x170/0x3f0 [ 19.536140] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.536233] kthread+0x328/0x630 [ 19.536271] ret_from_fork+0x10/0x20 [ 19.536338] [ 19.536376] The buggy address belongs to the object at fff00000c65c5b80 [ 19.536376] which belongs to the cache kmalloc-64 of size 64 [ 19.536477] The buggy address is located 0 bytes to the right of [ 19.536477] allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0) [ 19.536847] [ 19.536918] The buggy address belongs to the physical page: [ 19.537060] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 19.537174] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.537231] page_type: f5(slab) [ 19.537405] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.537613] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.537723] page dumped because: kasan: bad access detected [ 19.537835] [ 19.537891] Memory state around the buggy address: [ 19.538000] fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.538058] fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.538262] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.538449] ^ [ 19.538487] fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.538813] fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.538930] ================================================================== [ 19.613575] ================================================================== [ 19.613831] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 19.614013] Read of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265 [ 19.614081] [ 19.614113] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.614373] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.614498] Hardware name: linux,dummy-virt (DT) [ 19.614534] Call trace: [ 19.614574] show_stack+0x20/0x38 (C) [ 19.614824] dump_stack_lvl+0x8c/0xd0 [ 19.615010] print_report+0x118/0x608 [ 19.615095] kasan_report+0xdc/0x128 [ 19.615147] kasan_check_range+0x100/0x1a8 [ 19.615234] __kasan_check_read+0x20/0x30 [ 19.615343] kasan_atomics_helper+0xdd4/0x4858 [ 19.615430] kasan_atomics+0x198/0x2e0 [ 19.615506] kunit_try_run_case+0x170/0x3f0 [ 19.615782] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.615884] kthread+0x328/0x630 [ 19.616021] ret_from_fork+0x10/0x20 [ 19.616104] [ 19.616359] Allocated by task 265: [ 19.616400] kasan_save_stack+0x3c/0x68 [ 19.616565] kasan_save_track+0x20/0x40 [ 19.616797] kasan_save_alloc_info+0x40/0x58 [ 19.616894] __kasan_kmalloc+0xd4/0xd8 [ 19.617222] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.617324] kasan_atomics+0xb8/0x2e0 [ 19.617453] kunit_try_run_case+0x170/0x3f0 [ 19.617497] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.617541] kthread+0x328/0x630 [ 19.617575] ret_from_fork+0x10/0x20 [ 19.617613] [ 19.617636] The buggy address belongs to the object at fff00000c65c5b80 [ 19.617636] which belongs to the cache kmalloc-64 of size 64 [ 19.617695] The buggy address is located 0 bytes to the right of [ 19.617695] allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0) [ 19.617761] [ 19.618285] The buggy address belongs to the physical page: [ 19.618666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 19.618746] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.619081] page_type: f5(slab) [ 19.619159] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.619349] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.619445] page dumped because: kasan: bad access detected [ 19.619754] [ 19.619817] Memory state around the buggy address: [ 19.619906] fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.620334] fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.620446] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.620590] ^ [ 19.620675] fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.621086] fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.621209] ================================================================== [ 19.561613] ================================================================== [ 19.561691] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 19.561743] Write of size 4 at addr fff00000c65c5bb0 by task kunit_try_catch/265 [ 19.561878] [ 19.561913] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.562050] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.562323] Hardware name: linux,dummy-virt (DT) [ 19.562385] Call trace: [ 19.562410] show_stack+0x20/0x38 (C) [ 19.562547] dump_stack_lvl+0x8c/0xd0 [ 19.562642] print_report+0x118/0x608 [ 19.562768] kasan_report+0xdc/0x128 [ 19.562824] kasan_check_range+0x100/0x1a8 [ 19.562941] __kasan_check_write+0x20/0x30 [ 19.563000] kasan_atomics_helper+0xb70/0x4858 [ 19.563062] kasan_atomics+0x198/0x2e0 [ 19.563115] kunit_try_run_case+0x170/0x3f0 [ 19.563164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.563218] kthread+0x328/0x630 [ 19.563260] ret_from_fork+0x10/0x20 [ 19.563317] [ 19.563346] Allocated by task 265: [ 19.563377] kasan_save_stack+0x3c/0x68 [ 19.563421] kasan_save_track+0x20/0x40 [ 19.563461] kasan_save_alloc_info+0x40/0x58 [ 19.563501] __kasan_kmalloc+0xd4/0xd8 [ 19.563539] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.563581] kasan_atomics+0xb8/0x2e0 [ 19.563618] kunit_try_run_case+0x170/0x3f0 [ 19.563871] The buggy address is located 0 bytes to the right of [ 19.563871] allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0) [ 19.565475] ^ [ 19.567040] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.568599] kasan_save_track+0x20/0x40 [ 19.570415] [ 19.572250] fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.575338] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.576222] kthread+0x328/0x630 [ 19.577791] [ 19.579142] fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.583531] kasan_save_stack+0x3c/0x68 [ 19.584712] ret_from_fork+0x10/0x20 [ 19.585942] page_type: f5(slab) [ 19.587244] fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.589667] kasan_report+0xdc/0x128 [ 19.591175] kthread+0x328/0x630 [ 19.591218] ret_from_fork+0x10/0x20 [ 19.591255] [ 19.591285] The buggy address belongs to the object at fff00000c65c5b80 [ 19.591285] which belongs to the cache kmalloc-64 of size 64 [ 19.591343] The buggy address is located 0 bytes to the right of [ 19.591343] allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0) [ 19.591418] [ 19.591440] The buggy address belongs to the physical page: [ 19.591471] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 19.591532] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.591588] page_type: f5(slab) [ 19.591639] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.591691] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.591730] page dumped because: kasan: bad access detected [ 19.591764] [ 19.591783] Memory state around the buggy address: [ 19.591816] fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.591867] fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.591914] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.591953] ^ [ 19.592004] fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.592684] fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.592739] ================================================================== [ 19.835767] ================================================================== [ 19.835817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 19.835873] Read of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265 [ 19.835926] [ 19.836221] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.836385] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.836494] Hardware name: linux,dummy-virt (DT) [ 19.836543] Call trace: [ 19.836569] show_stack+0x20/0x38 (C) [ 19.836621] dump_stack_lvl+0x8c/0xd0 [ 19.836891] print_report+0x118/0x608 [ 19.837134] kasan_report+0xdc/0x128 [ 19.837239] __asan_report_load8_noabort+0x20/0x30 [ 19.837588] kasan_atomics_helper+0x3e20/0x4858 [ 19.837676] kasan_atomics+0x198/0x2e0 [ 19.837807] kunit_try_run_case+0x170/0x3f0 [ 19.837859] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.838054] kthread+0x328/0x630 [ 19.838137] ret_from_fork+0x10/0x20 [ 19.838192] [ 19.838237] Allocated by task 265: [ 19.838273] kasan_save_stack+0x3c/0x68 [ 19.838335] kasan_save_track+0x20/0x40 [ 19.838374] kasan_save_alloc_info+0x40/0x58 [ 19.838416] __kasan_kmalloc+0xd4/0xd8 [ 19.838453] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.838499] kasan_atomics+0xb8/0x2e0 [ 19.838537] kunit_try_run_case+0x170/0x3f0 [ 19.838587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.838633] kthread+0x328/0x630 [ 19.838665] ret_from_fork+0x10/0x20 [ 19.838724] [ 19.838756] The buggy address belongs to the object at fff00000c65c5b80 [ 19.838756] which belongs to the cache kmalloc-64 of size 64 [ 19.838822] The buggy address is located 0 bytes to the right of [ 19.838822] allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0) [ 19.838888] [ 19.838917] The buggy address belongs to the physical page: [ 19.838958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 19.839013] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.839073] page_type: f5(slab) [ 19.839121] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.839174] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.839219] page dumped because: kasan: bad access detected [ 19.839252] [ 19.839275] Memory state around the buggy address: [ 19.839313] fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.839359] fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.839414] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.839464] ^ [ 19.839500] fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.839556] fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.839598] ================================================================== [ 19.795064] ================================================================== [ 19.795133] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 19.795188] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265 [ 19.795508] [ 19.795812] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.795929] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.796011] Hardware name: linux,dummy-virt (DT) [ 19.796104] Call trace: [ 19.796191] show_stack+0x20/0x38 (C) [ 19.796245] dump_stack_lvl+0x8c/0xd0 [ 19.796349] print_report+0x118/0x608 [ 19.796397] kasan_report+0xdc/0x128 [ 19.796463] kasan_check_range+0x100/0x1a8 [ 19.796513] __kasan_check_write+0x20/0x30 [ 19.797216] kasan_atomics_helper+0x1644/0x4858 [ 19.797335] kasan_atomics+0x198/0x2e0 [ 19.797460] kunit_try_run_case+0x170/0x3f0 [ 19.797664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.797738] kthread+0x328/0x630 [ 19.797790] ret_from_fork+0x10/0x20 [ 19.797841] [ 19.798145] Allocated by task 265: [ 19.798522] kasan_save_stack+0x3c/0x68 [ 19.798604] kasan_save_track+0x20/0x40 [ 19.798648] kasan_save_alloc_info+0x40/0x58 [ 19.798742] __kasan_kmalloc+0xd4/0xd8 [ 19.798795] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.798853] kasan_atomics+0xb8/0x2e0 [ 19.798892] kunit_try_run_case+0x170/0x3f0 [ 19.798931] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.798978] kthread+0x328/0x630 [ 19.799022] ret_from_fork+0x10/0x20 [ 19.799090] [ 19.799114] The buggy address belongs to the object at fff00000c65c5b80 [ 19.799114] which belongs to the cache kmalloc-64 of size 64 [ 19.799184] The buggy address is located 0 bytes to the right of [ 19.799184] allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0) [ 19.799260] [ 19.799296] The buggy address belongs to the physical page: [ 19.799362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 19.799425] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.799476] page_type: f5(slab) [ 19.799524] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.799587] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.799640] page dumped because: kasan: bad access detected [ 19.799674] [ 19.799696] Memory state around the buggy address: [ 19.799739] fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.799785] fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.799839] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.799897] ^ [ 19.799935] fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.799988] fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.800827] ================================================================== [ 19.706821] ================================================================== [ 19.706874] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 19.706921] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265 [ 19.706971] [ 19.706999] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.707178] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.707285] Hardware name: linux,dummy-virt (DT) [ 19.707373] Call trace: [ 19.707513] show_stack+0x20/0x38 (C) [ 19.707610] dump_stack_lvl+0x8c/0xd0 [ 19.707662] print_report+0x118/0x608 [ 19.707708] kasan_report+0xdc/0x128 [ 19.707783] kasan_check_range+0x100/0x1a8 [ 19.707859] __kasan_check_write+0x20/0x30 [ 19.707931] kasan_atomics_helper+0x11f8/0x4858 [ 19.707981] kasan_atomics+0x198/0x2e0 [ 19.708026] kunit_try_run_case+0x170/0x3f0 [ 19.708393] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.708543] kthread+0x328/0x630 [ 19.708656] ret_from_fork+0x10/0x20 [ 19.708801] [ 19.708871] Allocated by task 265: [ 19.709227] kasan_save_stack+0x3c/0x68 [ 19.709285] kasan_save_track+0x20/0x40 [ 19.709326] kasan_save_alloc_info+0x40/0x58 [ 19.709366] __kasan_kmalloc+0xd4/0xd8 [ 19.709404] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.709598] kasan_atomics+0xb8/0x2e0 [ 19.709638] kunit_try_run_case+0x170/0x3f0 [ 19.709676] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.709721] kthread+0x328/0x630 [ 19.709755] ret_from_fork+0x10/0x20 [ 19.709792] [ 19.709815] The buggy address belongs to the object at fff00000c65c5b80 [ 19.709815] which belongs to the cache kmalloc-64 of size 64 [ 19.709973] The buggy address is located 0 bytes to the right of [ 19.709973] allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0) [ 19.710137] [ 19.710217] The buggy address belongs to the physical page: [ 19.710282] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 19.710361] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.710449] page_type: f5(slab) [ 19.710737] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.710879] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.711044] page dumped because: kasan: bad access detected [ 19.711130] [ 19.711155] Memory state around the buggy address: [ 19.711190] fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.711237] fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.711522] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.711579] ^ [ 19.711625] fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.711676] fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.711722] ================================================================== [ 19.622058] ================================================================== [ 19.622113] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 19.622164] Read of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265 [ 19.622226] [ 19.622258] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.622355] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.622394] Hardware name: linux,dummy-virt (DT) [ 19.622425] Call trace: [ 19.622454] show_stack+0x20/0x38 (C) [ 19.622503] dump_stack_lvl+0x8c/0xd0 [ 19.622552] print_report+0x118/0x608 [ 19.622598] kasan_report+0xdc/0x128 [ 19.622645] __asan_report_load8_noabort+0x20/0x30 [ 19.622692] kasan_atomics_helper+0x3f58/0x4858 [ 19.622743] kasan_atomics+0x198/0x2e0 [ 19.622788] kunit_try_run_case+0x170/0x3f0 [ 19.622837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.622890] kthread+0x328/0x630 [ 19.622934] ret_from_fork+0x10/0x20 [ 19.622980] [ 19.623000] Allocated by task 265: [ 19.623044] kasan_save_stack+0x3c/0x68 [ 19.623087] kasan_save_track+0x20/0x40 [ 19.623126] kasan_save_alloc_info+0x40/0x58 [ 19.623168] __kasan_kmalloc+0xd4/0xd8 [ 19.623206] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.623246] kasan_atomics+0xb8/0x2e0 [ 19.623283] kunit_try_run_case+0x170/0x3f0 [ 19.623321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.623371] kthread+0x328/0x630 [ 19.623407] ret_from_fork+0x10/0x20 [ 19.623443] [ 19.623465] The buggy address belongs to the object at fff00000c65c5b80 [ 19.623465] which belongs to the cache kmalloc-64 of size 64 [ 19.623522] The buggy address is located 0 bytes to the right of [ 19.623522] allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0) [ 19.623588] [ 19.623608] The buggy address belongs to the physical page: [ 19.623641] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 19.623693] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.623741] page_type: f5(slab) [ 19.623780] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.623832] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.623885] page dumped because: kasan: bad access detected [ 19.623919] [ 19.623943] Memory state around the buggy address: [ 19.623974] fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.624037] fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.624656] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.625260] ^ [ 19.625314] fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.625361] fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.625402] ================================================================== [ 19.801241] ================================================================== [ 19.801689] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 19.801761] Read of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265 [ 19.801814] [ 19.802183] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.802407] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.802502] Hardware name: linux,dummy-virt (DT) [ 19.802537] Call trace: [ 19.802620] show_stack+0x20/0x38 (C) [ 19.802675] dump_stack_lvl+0x8c/0xd0 [ 19.802850] print_report+0x118/0x608 [ 19.802913] kasan_report+0xdc/0x128 [ 19.803138] __asan_report_load8_noabort+0x20/0x30 [ 19.803321] kasan_atomics_helper+0x3df4/0x4858 [ 19.803386] kasan_atomics+0x198/0x2e0 [ 19.803685] kunit_try_run_case+0x170/0x3f0 [ 19.803767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.803970] kthread+0x328/0x630 [ 19.804045] ret_from_fork+0x10/0x20 [ 19.804264] [ 19.804315] Allocated by task 265: [ 19.804349] kasan_save_stack+0x3c/0x68 [ 19.804396] kasan_save_track+0x20/0x40 [ 19.804543] kasan_save_alloc_info+0x40/0x58 [ 19.804595] __kasan_kmalloc+0xd4/0xd8 [ 19.804659] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.804709] kasan_atomics+0xb8/0x2e0 [ 19.805108] kunit_try_run_case+0x170/0x3f0 [ 19.805323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.805448] kthread+0x328/0x630 [ 19.805613] ret_from_fork+0x10/0x20 [ 19.805786] [ 19.805855] The buggy address belongs to the object at fff00000c65c5b80 [ 19.805855] which belongs to the cache kmalloc-64 of size 64 [ 19.805997] The buggy address is located 0 bytes to the right of [ 19.805997] allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0) [ 19.806680] [ 19.806842] The buggy address belongs to the physical page: [ 19.806895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 19.806960] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.807318] page_type: f5(slab) [ 19.807405] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.807749] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.807824] page dumped because: kasan: bad access detected [ 19.807861] [ 19.807883] Memory state around the buggy address: [ 19.808231] fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.808461] fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.808649] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.808712] ^ [ 19.808874] fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.808927] fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.809198] ================================================================== [ 19.637622] ================================================================== [ 19.637680] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 19.637741] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265 [ 19.637793] [ 19.638104] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.638618] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.638667] Hardware name: linux,dummy-virt (DT) [ 19.638748] Call trace: [ 19.638773] show_stack+0x20/0x38 (C) [ 19.638828] dump_stack_lvl+0x8c/0xd0 [ 19.638902] print_report+0x118/0x608 [ 19.639070] kasan_report+0xdc/0x128 [ 19.639123] __asan_report_store8_noabort+0x20/0x30 [ 19.639214] kasan_atomics_helper+0x3e5c/0x4858 [ 19.639582] kasan_atomics+0x198/0x2e0 [ 19.639962] kunit_try_run_case+0x170/0x3f0 [ 19.640139] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.640203] kthread+0x328/0x630 [ 19.640247] ret_from_fork+0x10/0x20 [ 19.640396] [ 19.640420] Allocated by task 265: [ 19.640457] kasan_save_stack+0x3c/0x68 [ 19.640509] kasan_save_track+0x20/0x40 [ 19.640727] kasan_save_alloc_info+0x40/0x58 [ 19.640965] __kasan_kmalloc+0xd4/0xd8 [ 19.641038] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.641495] kasan_atomics+0xb8/0x2e0 [ 19.641724] kunit_try_run_case+0x170/0x3f0 [ 19.641818] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.641893] kthread+0x328/0x630 [ 19.642063] ret_from_fork+0x10/0x20 [ 19.642105] [ 19.642127] The buggy address belongs to the object at fff00000c65c5b80 [ 19.642127] which belongs to the cache kmalloc-64 of size 64 [ 19.642194] The buggy address is located 0 bytes to the right of [ 19.642194] allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0) [ 19.642467] [ 19.642660] The buggy address belongs to the physical page: [ 19.642978] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 19.643479] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.643624] page_type: f5(slab) [ 19.644300] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.644386] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.644452] page dumped because: kasan: bad access detected [ 19.644753] [ 19.644922] Memory state around the buggy address: [ 19.644961] fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.645008] fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.645070] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.645110] ^ [ 19.645146] fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.645191] fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.645232] ================================================================== [ 19.646902] ================================================================== [ 19.647129] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 19.647190] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265 [ 19.647355] [ 19.647394] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.647590] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.647623] Hardware name: linux,dummy-virt (DT) [ 19.647654] Call trace: [ 19.647932] show_stack+0x20/0x38 (C) [ 19.648211] dump_stack_lvl+0x8c/0xd0 [ 19.648296] print_report+0x118/0x608 [ 19.648433] kasan_report+0xdc/0x128 [ 19.648581] kasan_check_range+0x100/0x1a8 [ 19.648677] __kasan_check_write+0x20/0x30 [ 19.648749] kasan_atomics_helper+0xeb8/0x4858 [ 19.648875] kasan_atomics+0x198/0x2e0 [ 19.648922] kunit_try_run_case+0x170/0x3f0 [ 19.648970] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.649022] kthread+0x328/0x630 [ 19.649076] ret_from_fork+0x10/0x20 [ 19.649671] [ 19.649799] Allocated by task 265: [ 19.649865] kasan_save_stack+0x3c/0x68 [ 19.649955] kasan_save_track+0x20/0x40 [ 19.650101] kasan_save_alloc_info+0x40/0x58 [ 19.650196] __kasan_kmalloc+0xd4/0xd8 [ 19.650264] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.650305] kasan_atomics+0xb8/0x2e0 [ 19.650342] kunit_try_run_case+0x170/0x3f0 [ 19.650382] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.650427] kthread+0x328/0x630 [ 19.650530] ret_from_fork+0x10/0x20 [ 19.650570] [ 19.650601] The buggy address belongs to the object at fff00000c65c5b80 [ 19.650601] which belongs to the cache kmalloc-64 of size 64 [ 19.650661] The buggy address is located 0 bytes to the right of [ 19.650661] allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0) [ 19.650737] [ 19.650777] The buggy address belongs to the physical page: [ 19.650811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 19.650866] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.650931] page_type: f5(slab) [ 19.650970] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.651051] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.651095] page dumped because: kasan: bad access detected [ 19.651129] [ 19.651148] Memory state around the buggy address: [ 19.651182] fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.651228] fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.651269] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.651310] ^ [ 19.651343] fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.651417] fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.651468] ================================================================== [ 19.651692] ================================================================== [ 19.651751] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 19.651799] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265 [ 19.651854] [ 19.651884] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.651967] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.651994] Hardware name: linux,dummy-virt (DT) [ 19.652026] Call trace: [ 19.652642] show_stack+0x20/0x38 (C) [ 19.653226] dump_stack_lvl+0x8c/0xd0 [ 19.653303] print_report+0x118/0x608 [ 19.653354] kasan_report+0xdc/0x128 [ 19.653427] kasan_check_range+0x100/0x1a8 [ 19.653478] __kasan_check_write+0x20/0x30 [ 19.654134] kasan_atomics_helper+0xf20/0x4858 [ 19.654239] kasan_atomics+0x198/0x2e0 [ 19.654315] kunit_try_run_case+0x170/0x3f0 [ 19.654466] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.654679] kthread+0x328/0x630 [ 19.654759] ret_from_fork+0x10/0x20 [ 19.654807] [ 19.654891] Allocated by task 265: [ 19.655162] kasan_save_stack+0x3c/0x68 [ 19.655365] kasan_save_track+0x20/0x40 [ 19.655447] kasan_save_alloc_info+0x40/0x58 [ 19.655870] __kasan_kmalloc+0xd4/0xd8 [ 19.655997] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.656386] kasan_atomics+0xb8/0x2e0 [ 19.656590] kunit_try_run_case+0x170/0x3f0 [ 19.656714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.657055] kthread+0x328/0x630 [ 19.657133] ret_from_fork+0x10/0x20 [ 19.657197] [ 19.657218] The buggy address belongs to the object at fff00000c65c5b80 [ 19.657218] which belongs to the cache kmalloc-64 of size 64 [ 19.657278] The buggy address is located 0 bytes to the right of [ 19.657278] allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0) [ 19.657777] [ 19.657897] The buggy address belongs to the physical page: [ 19.658102] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 19.658208] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.658285] page_type: f5(slab) [ 19.658931] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.659012] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.659361] page dumped because: kasan: bad access detected [ 19.659445] [ 19.659501] Memory state around the buggy address: [ 19.659616] fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.659932] fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.660154] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.660198] ^ [ 19.660243] fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.660590] fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.660663] ================================================================== [ 19.737264] ================================================================== [ 19.737325] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 19.737780] Read of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265 [ 19.737963] [ 19.737999] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.738093] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.738132] Hardware name: linux,dummy-virt (DT) [ 19.738166] Call trace: [ 19.738226] show_stack+0x20/0x38 (C) [ 19.738805] dump_stack_lvl+0x8c/0xd0 [ 19.738886] print_report+0x118/0x608 [ 19.738938] kasan_report+0xdc/0x128 [ 19.738984] __asan_report_load8_noabort+0x20/0x30 [ 19.739419] kasan_atomics_helper+0x3f04/0x4858 [ 19.739539] kasan_atomics+0x198/0x2e0 [ 19.739606] kunit_try_run_case+0x170/0x3f0 [ 19.739658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.739713] kthread+0x328/0x630 [ 19.740047] ret_from_fork+0x10/0x20 [ 19.740230] [ 19.740255] Allocated by task 265: [ 19.740301] kasan_save_stack+0x3c/0x68 [ 19.740345] kasan_save_track+0x20/0x40 [ 19.740414] kasan_save_alloc_info+0x40/0x58 [ 19.741175] __kasan_kmalloc+0xd4/0xd8 [ 19.741253] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.741383] kasan_atomics+0xb8/0x2e0 [ 19.741493] kunit_try_run_case+0x170/0x3f0 [ 19.741755] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.741822] kthread+0x328/0x630 [ 19.742078] ret_from_fork+0x10/0x20 [ 19.742199] [ 19.742461] The buggy address belongs to the object at fff00000c65c5b80 [ 19.742461] which belongs to the cache kmalloc-64 of size 64 [ 19.742592] The buggy address is located 0 bytes to the right of [ 19.742592] allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0) [ 19.742681] [ 19.742736] The buggy address belongs to the physical page: [ 19.742786] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 19.742842] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.742961] page_type: f5(slab) [ 19.743020] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.743233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.743494] page dumped because: kasan: bad access detected [ 19.743802] [ 19.743836] Memory state around the buggy address: [ 19.744050] fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.744142] fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.744617] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.744687] ^ [ 19.744735] fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.744778] fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.744975] ================================================================== [ 19.540051] ================================================================== [ 19.540106] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 19.540233] Write of size 4 at addr fff00000c65c5bb0 by task kunit_try_catch/265 [ 19.540289] [ 19.540320] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.540673] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.540746] Hardware name: linux,dummy-virt (DT) [ 19.540817] Call trace: [ 19.540912] show_stack+0x20/0x38 (C) [ 19.540967] dump_stack_lvl+0x8c/0xd0 [ 19.541024] print_report+0x118/0x608 [ 19.541082] kasan_report+0xdc/0x128 [ 19.541130] kasan_check_range+0x100/0x1a8 [ 19.541348] __kasan_check_write+0x20/0x30 [ 19.541520] kasan_atomics_helper+0xa6c/0x4858 [ 19.541671] kasan_atomics+0x198/0x2e0 [ 19.541781] kunit_try_run_case+0x170/0x3f0 [ 19.541849] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.542197] kthread+0x328/0x630 [ 19.542322] ret_from_fork+0x10/0x20 [ 19.542379] [ 19.542402] Allocated by task 265: [ 19.542766] kasan_save_stack+0x3c/0x68 [ 19.542859] kasan_save_track+0x20/0x40 [ 19.542944] kasan_save_alloc_info+0x40/0x58 [ 19.543079] __kasan_kmalloc+0xd4/0xd8 [ 19.543123] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.543189] kasan_atomics+0xb8/0x2e0 [ 19.543536] kunit_try_run_case+0x170/0x3f0 [ 19.543607] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.543711] kthread+0x328/0x630 [ 19.543745] ret_from_fork+0x10/0x20 [ 19.544077] [ 19.544122] The buggy address belongs to the object at fff00000c65c5b80 [ 19.544122] which belongs to the cache kmalloc-64 of size 64 [ 19.544262] The buggy address is located 0 bytes to the right of [ 19.544262] allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0) [ 19.544333] [ 19.544354] The buggy address belongs to the physical page: [ 19.544573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 19.544671] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.544789] page_type: f5(slab) [ 19.544938] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.545100] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.545161] page dumped because: kasan: bad access detected [ 19.545195] [ 19.545215] Memory state around the buggy address: [ 19.545597] fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.545652] fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.545800] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.545872] ^ [ 19.545923] fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.546321] fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.546463] ================================================================== [ 19.718952] ================================================================== [ 19.719303] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 19.719505] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265 [ 19.719560] [ 19.719709] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.719817] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.719855] Hardware name: linux,dummy-virt (DT) [ 19.719887] Call trace: [ 19.719912] show_stack+0x20/0x38 (C) [ 19.719961] dump_stack_lvl+0x8c/0xd0 [ 19.720012] print_report+0x118/0x608 [ 19.720070] kasan_report+0xdc/0x128 [ 19.720117] kasan_check_range+0x100/0x1a8 [ 19.720178] __kasan_check_write+0x20/0x30 [ 19.720322] kasan_atomics_helper+0x12d8/0x4858 [ 19.720378] kasan_atomics+0x198/0x2e0 [ 19.720424] kunit_try_run_case+0x170/0x3f0 [ 19.720479] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.720556] kthread+0x328/0x630 [ 19.720738] ret_from_fork+0x10/0x20 [ 19.721350] [ 19.721384] Allocated by task 265: [ 19.721427] kasan_save_stack+0x3c/0x68 [ 19.721825] kasan_save_track+0x20/0x40 [ 19.721903] kasan_save_alloc_info+0x40/0x58 [ 19.722270] __kasan_kmalloc+0xd4/0xd8 [ 19.722362] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.722630] kasan_atomics+0xb8/0x2e0 [ 19.723009] kunit_try_run_case+0x170/0x3f0 [ 19.723210] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.723599] kthread+0x328/0x630 [ 19.723779] ret_from_fork+0x10/0x20 [ 19.723840] [ 19.724004] The buggy address belongs to the object at fff00000c65c5b80 [ 19.724004] which belongs to the cache kmalloc-64 of size 64 [ 19.724483] The buggy address is located 0 bytes to the right of [ 19.724483] allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0) [ 19.724684] [ 19.724999] The buggy address belongs to the physical page: [ 19.725147] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 19.725219] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.725277] page_type: f5(slab) [ 19.725512] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.725696] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.726178] page dumped because: kasan: bad access detected [ 19.726228] [ 19.726290] Memory state around the buggy address: [ 19.726633] fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.727008] fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.727169] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.727389] ^ [ 19.727529] fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.727611] fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.727658] ================================================================== [ 19.696615] ================================================================== [ 19.696877] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 19.697369] Write of size 8 at addr fff00000c65c5bb0 by task kunit_try_catch/265 [ 19.697486] [ 19.697571] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.697782] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.697813] Hardware name: linux,dummy-virt (DT) [ 19.697846] Call trace: [ 19.698250] show_stack+0x20/0x38 (C) [ 19.698336] dump_stack_lvl+0x8c/0xd0 [ 19.698856] print_report+0x118/0x608 [ 19.699178] kasan_report+0xdc/0x128 [ 19.699365] kasan_check_range+0x100/0x1a8 [ 19.699446] __kasan_check_write+0x20/0x30 [ 19.699784] kasan_atomics_helper+0x1128/0x4858 [ 19.700011] kasan_atomics+0x198/0x2e0 [ 19.700601] kunit_try_run_case+0x170/0x3f0 [ 19.700652] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.700706] kthread+0x328/0x630 [ 19.700748] ret_from_fork+0x10/0x20 [ 19.700796] [ 19.700817] Allocated by task 265: [ 19.700845] kasan_save_stack+0x3c/0x68 [ 19.700888] kasan_save_track+0x20/0x40 [ 19.700930] kasan_save_alloc_info+0x40/0x58 [ 19.700971] __kasan_kmalloc+0xd4/0xd8 [ 19.701010] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.701062] kasan_atomics+0xb8/0x2e0 [ 19.701099] kunit_try_run_case+0x170/0x3f0 [ 19.701137] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.701182] kthread+0x328/0x630 [ 19.701214] ret_from_fork+0x10/0x20 [ 19.701253] [ 19.701273] The buggy address belongs to the object at fff00000c65c5b80 [ 19.701273] which belongs to the cache kmalloc-64 of size 64 [ 19.701332] The buggy address is located 0 bytes to the right of [ 19.701332] allocated 48-byte region [fff00000c65c5b80, fff00000c65c5bb0) [ 19.701396] [ 19.701417] The buggy address belongs to the physical page: [ 19.701449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c5 [ 19.701504] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.701553] page_type: f5(slab) [ 19.701636] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.701688] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.701731] page dumped because: kasan: bad access detected [ 19.701764] [ 19.701785] Memory state around the buggy address: [ 19.701857] fff00000c65c5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.702048] fff00000c65c5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.702135] >fff00000c65c5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 19.702272] ^ [ 19.702309] fff00000c65c5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.702356] fff00000c65c5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.702394] ==================================================================
[ 14.333663] ================================================================== [ 14.334035] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 14.334461] Read of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.334762] [ 14.334872] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.334914] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.334927] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.334949] Call Trace: [ 14.334964] <TASK> [ 14.334978] dump_stack_lvl+0x73/0xb0 [ 14.335005] print_report+0xd1/0x650 [ 14.335028] ? __virt_addr_valid+0x1db/0x2d0 [ 14.335050] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.335072] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.335108] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.335131] kasan_report+0x141/0x180 [ 14.335154] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.335180] __asan_report_load4_noabort+0x18/0x20 [ 14.335211] kasan_atomics_helper+0x4a84/0x5450 [ 14.335234] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.335256] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.335281] ? kasan_atomics+0x152/0x310 [ 14.335308] kasan_atomics+0x1dc/0x310 [ 14.335331] ? __pfx_kasan_atomics+0x10/0x10 [ 14.335355] ? __pfx_read_tsc+0x10/0x10 [ 14.335376] ? ktime_get_ts64+0x86/0x230 [ 14.335401] kunit_try_run_case+0x1a5/0x480 [ 14.335425] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.335448] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.335471] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.335495] ? __kthread_parkme+0x82/0x180 [ 14.335517] ? preempt_count_sub+0x50/0x80 [ 14.335565] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.335589] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.335613] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.335636] kthread+0x337/0x6f0 [ 14.335656] ? trace_preempt_on+0x20/0xc0 [ 14.335680] ? __pfx_kthread+0x10/0x10 [ 14.335701] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.335722] ? calculate_sigpending+0x7b/0xa0 [ 14.335745] ? __pfx_kthread+0x10/0x10 [ 14.335767] ret_from_fork+0x116/0x1d0 [ 14.335786] ? __pfx_kthread+0x10/0x10 [ 14.335807] ret_from_fork_asm+0x1a/0x30 [ 14.335838] </TASK> [ 14.335850] [ 14.344930] Allocated by task 283: [ 14.345063] kasan_save_stack+0x45/0x70 [ 14.345395] kasan_save_track+0x18/0x40 [ 14.345813] kasan_save_alloc_info+0x3b/0x50 [ 14.346061] __kasan_kmalloc+0xb7/0xc0 [ 14.346297] __kmalloc_cache_noprof+0x189/0x420 [ 14.346547] kasan_atomics+0x95/0x310 [ 14.346775] kunit_try_run_case+0x1a5/0x480 [ 14.346983] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.347265] kthread+0x337/0x6f0 [ 14.347444] ret_from_fork+0x116/0x1d0 [ 14.347632] ret_from_fork_asm+0x1a/0x30 [ 14.347830] [ 14.347928] The buggy address belongs to the object at ffff8881038eb080 [ 14.347928] which belongs to the cache kmalloc-64 of size 64 [ 14.348909] The buggy address is located 0 bytes to the right of [ 14.348909] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.349884] [ 14.350132] The buggy address belongs to the physical page: [ 14.350871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.351623] flags: 0x200000000000000(node=0|zone=2) [ 14.351986] page_type: f5(slab) [ 14.352475] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.352946] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.353567] page dumped because: kasan: bad access detected [ 14.353817] [ 14.353911] Memory state around the buggy address: [ 14.354442] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.354904] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.355677] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.356371] ^ [ 14.356598] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.356878] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.357636] ================================================================== [ 14.496469] ================================================================== [ 14.496792] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 14.497120] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.498011] [ 14.498322] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.498481] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.498499] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.498522] Call Trace: [ 14.498544] <TASK> [ 14.498563] dump_stack_lvl+0x73/0xb0 [ 14.498594] print_report+0xd1/0x650 [ 14.498619] ? __virt_addr_valid+0x1db/0x2d0 [ 14.498643] ? kasan_atomics_helper+0x1079/0x5450 [ 14.498667] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.498690] ? kasan_atomics_helper+0x1079/0x5450 [ 14.498712] kasan_report+0x141/0x180 [ 14.498735] ? kasan_atomics_helper+0x1079/0x5450 [ 14.498762] kasan_check_range+0x10c/0x1c0 [ 14.498786] __kasan_check_write+0x18/0x20 [ 14.498805] kasan_atomics_helper+0x1079/0x5450 [ 14.498828] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.498851] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.498875] ? kasan_atomics+0x152/0x310 [ 14.498903] kasan_atomics+0x1dc/0x310 [ 14.498926] ? __pfx_kasan_atomics+0x10/0x10 [ 14.498950] ? __pfx_read_tsc+0x10/0x10 [ 14.498972] ? ktime_get_ts64+0x86/0x230 [ 14.498997] kunit_try_run_case+0x1a5/0x480 [ 14.499022] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.499044] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.499069] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.499092] ? __kthread_parkme+0x82/0x180 [ 14.499129] ? preempt_count_sub+0x50/0x80 [ 14.499153] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.499177] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.499207] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.499231] kthread+0x337/0x6f0 [ 14.499251] ? trace_preempt_on+0x20/0xc0 [ 14.499275] ? __pfx_kthread+0x10/0x10 [ 14.499296] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.499318] ? calculate_sigpending+0x7b/0xa0 [ 14.499342] ? __pfx_kthread+0x10/0x10 [ 14.499364] ret_from_fork+0x116/0x1d0 [ 14.499383] ? __pfx_kthread+0x10/0x10 [ 14.499404] ret_from_fork_asm+0x1a/0x30 [ 14.499435] </TASK> [ 14.499448] [ 14.510497] Allocated by task 283: [ 14.510798] kasan_save_stack+0x45/0x70 [ 14.511090] kasan_save_track+0x18/0x40 [ 14.511457] kasan_save_alloc_info+0x3b/0x50 [ 14.511667] __kasan_kmalloc+0xb7/0xc0 [ 14.511846] __kmalloc_cache_noprof+0x189/0x420 [ 14.512069] kasan_atomics+0x95/0x310 [ 14.512256] kunit_try_run_case+0x1a5/0x480 [ 14.512804] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.513129] kthread+0x337/0x6f0 [ 14.513389] ret_from_fork+0x116/0x1d0 [ 14.513655] ret_from_fork_asm+0x1a/0x30 [ 14.513945] [ 14.514201] The buggy address belongs to the object at ffff8881038eb080 [ 14.514201] which belongs to the cache kmalloc-64 of size 64 [ 14.514881] The buggy address is located 0 bytes to the right of [ 14.514881] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.515666] [ 14.515776] The buggy address belongs to the physical page: [ 14.516184] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.516628] flags: 0x200000000000000(node=0|zone=2) [ 14.516950] page_type: f5(slab) [ 14.517143] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.517694] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.518034] page dumped because: kasan: bad access detected [ 14.518407] [ 14.518622] Memory state around the buggy address: [ 14.518889] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.519254] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.519770] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.520202] ^ [ 14.520604] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.521011] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.521327] ================================================================== [ 14.826900] ================================================================== [ 14.827587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 14.827897] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.828320] [ 14.828472] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.828735] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.828754] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.828776] Call Trace: [ 14.828795] <TASK> [ 14.828810] dump_stack_lvl+0x73/0xb0 [ 14.828839] print_report+0xd1/0x650 [ 14.828862] ? __virt_addr_valid+0x1db/0x2d0 [ 14.828885] ? kasan_atomics_helper+0x177f/0x5450 [ 14.828907] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.828929] ? kasan_atomics_helper+0x177f/0x5450 [ 14.828952] kasan_report+0x141/0x180 [ 14.828974] ? kasan_atomics_helper+0x177f/0x5450 [ 14.829000] kasan_check_range+0x10c/0x1c0 [ 14.829025] __kasan_check_write+0x18/0x20 [ 14.829044] kasan_atomics_helper+0x177f/0x5450 [ 14.829067] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.829089] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.829126] ? kasan_atomics+0x152/0x310 [ 14.829154] kasan_atomics+0x1dc/0x310 [ 14.829176] ? __pfx_kasan_atomics+0x10/0x10 [ 14.829200] ? __pfx_read_tsc+0x10/0x10 [ 14.829221] ? ktime_get_ts64+0x86/0x230 [ 14.829246] kunit_try_run_case+0x1a5/0x480 [ 14.829269] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.829292] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.829315] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.829352] ? __kthread_parkme+0x82/0x180 [ 14.829375] ? preempt_count_sub+0x50/0x80 [ 14.829400] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.829424] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.829447] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.829471] kthread+0x337/0x6f0 [ 14.829491] ? trace_preempt_on+0x20/0xc0 [ 14.829515] ? __pfx_kthread+0x10/0x10 [ 14.829536] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.829557] ? calculate_sigpending+0x7b/0xa0 [ 14.829581] ? __pfx_kthread+0x10/0x10 [ 14.829603] ret_from_fork+0x116/0x1d0 [ 14.829622] ? __pfx_kthread+0x10/0x10 [ 14.829644] ret_from_fork_asm+0x1a/0x30 [ 14.829675] </TASK> [ 14.829687] [ 14.839932] Allocated by task 283: [ 14.840320] kasan_save_stack+0x45/0x70 [ 14.840531] kasan_save_track+0x18/0x40 [ 14.840866] kasan_save_alloc_info+0x3b/0x50 [ 14.841142] __kasan_kmalloc+0xb7/0xc0 [ 14.841462] __kmalloc_cache_noprof+0x189/0x420 [ 14.841663] kasan_atomics+0x95/0x310 [ 14.841966] kunit_try_run_case+0x1a5/0x480 [ 14.842192] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.842614] kthread+0x337/0x6f0 [ 14.842818] ret_from_fork+0x116/0x1d0 [ 14.843079] ret_from_fork_asm+0x1a/0x30 [ 14.843413] [ 14.843503] The buggy address belongs to the object at ffff8881038eb080 [ 14.843503] which belongs to the cache kmalloc-64 of size 64 [ 14.844233] The buggy address is located 0 bytes to the right of [ 14.844233] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.844839] [ 14.844947] The buggy address belongs to the physical page: [ 14.845199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.845757] flags: 0x200000000000000(node=0|zone=2) [ 14.846031] page_type: f5(slab) [ 14.846217] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.846747] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.847162] page dumped because: kasan: bad access detected [ 14.847442] [ 14.847678] Memory state around the buggy address: [ 14.847989] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.848306] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.848719] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.849127] ^ [ 14.849471] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.849854] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.850272] ================================================================== [ 15.094558] ================================================================== [ 15.094961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 15.095205] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 15.095422] [ 15.095624] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.095688] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.095702] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.095723] Call Trace: [ 15.095736] <TASK> [ 15.095766] dump_stack_lvl+0x73/0xb0 [ 15.095807] print_report+0xd1/0x650 [ 15.095843] ? __virt_addr_valid+0x1db/0x2d0 [ 15.095867] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.095902] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.095937] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.095973] kasan_report+0x141/0x180 [ 15.096010] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.096037] kasan_check_range+0x10c/0x1c0 [ 15.096060] __kasan_check_write+0x18/0x20 [ 15.096080] kasan_atomics_helper+0x1eaa/0x5450 [ 15.096117] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.096140] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.096166] ? kasan_atomics+0x152/0x310 [ 15.096193] kasan_atomics+0x1dc/0x310 [ 15.096216] ? __pfx_kasan_atomics+0x10/0x10 [ 15.096242] ? __pfx_read_tsc+0x10/0x10 [ 15.096263] ? ktime_get_ts64+0x86/0x230 [ 15.096287] kunit_try_run_case+0x1a5/0x480 [ 15.096311] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.096345] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.096368] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.096391] ? __kthread_parkme+0x82/0x180 [ 15.096412] ? preempt_count_sub+0x50/0x80 [ 15.096436] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.096460] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.096484] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.096507] kthread+0x337/0x6f0 [ 15.096527] ? trace_preempt_on+0x20/0xc0 [ 15.096550] ? __pfx_kthread+0x10/0x10 [ 15.096590] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.096611] ? calculate_sigpending+0x7b/0xa0 [ 15.096636] ? __pfx_kthread+0x10/0x10 [ 15.096658] ret_from_fork+0x116/0x1d0 [ 15.096677] ? __pfx_kthread+0x10/0x10 [ 15.096697] ret_from_fork_asm+0x1a/0x30 [ 15.096728] </TASK> [ 15.096739] [ 15.104319] Allocated by task 283: [ 15.104495] kasan_save_stack+0x45/0x70 [ 15.104687] kasan_save_track+0x18/0x40 [ 15.104877] kasan_save_alloc_info+0x3b/0x50 [ 15.105071] __kasan_kmalloc+0xb7/0xc0 [ 15.105284] __kmalloc_cache_noprof+0x189/0x420 [ 15.105531] kasan_atomics+0x95/0x310 [ 15.105724] kunit_try_run_case+0x1a5/0x480 [ 15.105939] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.106155] kthread+0x337/0x6f0 [ 15.106332] ret_from_fork+0x116/0x1d0 [ 15.106528] ret_from_fork_asm+0x1a/0x30 [ 15.106680] [ 15.106775] The buggy address belongs to the object at ffff8881038eb080 [ 15.106775] which belongs to the cache kmalloc-64 of size 64 [ 15.107307] The buggy address is located 0 bytes to the right of [ 15.107307] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 15.107806] [ 15.107921] The buggy address belongs to the physical page: [ 15.108186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 15.108514] flags: 0x200000000000000(node=0|zone=2) [ 15.108675] page_type: f5(slab) [ 15.108792] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.109150] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.109597] page dumped because: kasan: bad access detected [ 15.109870] [ 15.109987] Memory state around the buggy address: [ 15.110193] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.110406] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.110806] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.111106] ^ [ 15.111371] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.111658] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.111955] ================================================================== [ 15.130879] ================================================================== [ 15.131289] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 15.131598] Read of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 15.131923] [ 15.132037] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.132117] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.132130] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.132151] Call Trace: [ 15.132166] <TASK> [ 15.132180] dump_stack_lvl+0x73/0xb0 [ 15.132207] print_report+0xd1/0x650 [ 15.132230] ? __virt_addr_valid+0x1db/0x2d0 [ 15.132253] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.132274] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.132299] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.132321] kasan_report+0x141/0x180 [ 15.132343] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.132370] __asan_report_load8_noabort+0x18/0x20 [ 15.132415] kasan_atomics_helper+0x4f71/0x5450 [ 15.132439] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.132461] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.132486] ? kasan_atomics+0x152/0x310 [ 15.132512] kasan_atomics+0x1dc/0x310 [ 15.132535] ? __pfx_kasan_atomics+0x10/0x10 [ 15.132577] ? __pfx_read_tsc+0x10/0x10 [ 15.132599] ? ktime_get_ts64+0x86/0x230 [ 15.132623] kunit_try_run_case+0x1a5/0x480 [ 15.132647] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.132670] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.132693] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.132734] ? __kthread_parkme+0x82/0x180 [ 15.132756] ? preempt_count_sub+0x50/0x80 [ 15.132780] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.132804] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.132828] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.132852] kthread+0x337/0x6f0 [ 15.132872] ? trace_preempt_on+0x20/0xc0 [ 15.132895] ? __pfx_kthread+0x10/0x10 [ 15.132932] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.132968] ? calculate_sigpending+0x7b/0xa0 [ 15.133005] ? __pfx_kthread+0x10/0x10 [ 15.133040] ret_from_fork+0x116/0x1d0 [ 15.133072] ? __pfx_kthread+0x10/0x10 [ 15.133117] ret_from_fork_asm+0x1a/0x30 [ 15.133176] </TASK> [ 15.133188] [ 15.140955] Allocated by task 283: [ 15.141158] kasan_save_stack+0x45/0x70 [ 15.141367] kasan_save_track+0x18/0x40 [ 15.141558] kasan_save_alloc_info+0x3b/0x50 [ 15.141759] __kasan_kmalloc+0xb7/0xc0 [ 15.141927] __kmalloc_cache_noprof+0x189/0x420 [ 15.142195] kasan_atomics+0x95/0x310 [ 15.142407] kunit_try_run_case+0x1a5/0x480 [ 15.142598] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.142825] kthread+0x337/0x6f0 [ 15.142948] ret_from_fork+0x116/0x1d0 [ 15.143076] ret_from_fork_asm+0x1a/0x30 [ 15.143318] [ 15.143427] The buggy address belongs to the object at ffff8881038eb080 [ 15.143427] which belongs to the cache kmalloc-64 of size 64 [ 15.143948] The buggy address is located 0 bytes to the right of [ 15.143948] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 15.144484] [ 15.144578] The buggy address belongs to the physical page: [ 15.144822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 15.145201] flags: 0x200000000000000(node=0|zone=2) [ 15.145433] page_type: f5(slab) [ 15.145598] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.145883] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.146111] page dumped because: kasan: bad access detected [ 15.146276] [ 15.146345] Memory state around the buggy address: [ 15.146494] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.146701] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.147041] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.147432] ^ [ 15.147677] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.148035] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.148392] ================================================================== [ 15.027658] ================================================================== [ 15.027922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 15.028201] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 15.028811] [ 15.028920] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.028962] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.028975] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.028996] Call Trace: [ 15.029011] <TASK> [ 15.029026] dump_stack_lvl+0x73/0xb0 [ 15.029052] print_report+0xd1/0x650 [ 15.029075] ? __virt_addr_valid+0x1db/0x2d0 [ 15.029109] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.029132] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.029155] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.029178] kasan_report+0x141/0x180 [ 15.029201] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.029229] kasan_check_range+0x10c/0x1c0 [ 15.029254] __kasan_check_write+0x18/0x20 [ 15.029276] kasan_atomics_helper+0x1ce1/0x5450 [ 15.029303] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.029326] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.029351] ? kasan_atomics+0x152/0x310 [ 15.029379] kasan_atomics+0x1dc/0x310 [ 15.029402] ? __pfx_kasan_atomics+0x10/0x10 [ 15.029426] ? __pfx_read_tsc+0x10/0x10 [ 15.029448] ? ktime_get_ts64+0x86/0x230 [ 15.029471] kunit_try_run_case+0x1a5/0x480 [ 15.029495] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.029519] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.029543] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.029566] ? __kthread_parkme+0x82/0x180 [ 15.029588] ? preempt_count_sub+0x50/0x80 [ 15.029613] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.029638] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.029662] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.029685] kthread+0x337/0x6f0 [ 15.029705] ? trace_preempt_on+0x20/0xc0 [ 15.029729] ? __pfx_kthread+0x10/0x10 [ 15.029750] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.029773] ? calculate_sigpending+0x7b/0xa0 [ 15.029796] ? __pfx_kthread+0x10/0x10 [ 15.029819] ret_from_fork+0x116/0x1d0 [ 15.029837] ? __pfx_kthread+0x10/0x10 [ 15.029858] ret_from_fork_asm+0x1a/0x30 [ 15.029889] </TASK> [ 15.029901] [ 15.037210] Allocated by task 283: [ 15.037357] kasan_save_stack+0x45/0x70 [ 15.037559] kasan_save_track+0x18/0x40 [ 15.037757] kasan_save_alloc_info+0x3b/0x50 [ 15.037978] __kasan_kmalloc+0xb7/0xc0 [ 15.038178] __kmalloc_cache_noprof+0x189/0x420 [ 15.038477] kasan_atomics+0x95/0x310 [ 15.038655] kunit_try_run_case+0x1a5/0x480 [ 15.038819] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.038996] kthread+0x337/0x6f0 [ 15.039128] ret_from_fork+0x116/0x1d0 [ 15.039274] ret_from_fork_asm+0x1a/0x30 [ 15.039417] [ 15.039489] The buggy address belongs to the object at ffff8881038eb080 [ 15.039489] which belongs to the cache kmalloc-64 of size 64 [ 15.039891] The buggy address is located 0 bytes to the right of [ 15.039891] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 15.040457] [ 15.040556] The buggy address belongs to the physical page: [ 15.040823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 15.041431] flags: 0x200000000000000(node=0|zone=2) [ 15.041677] page_type: f5(slab) [ 15.041803] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.042146] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.042462] page dumped because: kasan: bad access detected [ 15.042689] [ 15.042788] Memory state around the buggy address: [ 15.042960] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.043190] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.043474] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.043795] ^ [ 15.044024] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.045176] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.045639] ================================================================== [ 14.358541] ================================================================== [ 14.358882] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 14.359215] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.359521] [ 14.359625] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.359668] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.359682] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.359703] Call Trace: [ 14.359718] <TASK> [ 14.359734] dump_stack_lvl+0x73/0xb0 [ 14.359760] print_report+0xd1/0x650 [ 14.359782] ? __virt_addr_valid+0x1db/0x2d0 [ 14.359806] ? kasan_atomics_helper+0xd47/0x5450 [ 14.359828] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.359851] ? kasan_atomics_helper+0xd47/0x5450 [ 14.359874] kasan_report+0x141/0x180 [ 14.359897] ? kasan_atomics_helper+0xd47/0x5450 [ 14.359924] kasan_check_range+0x10c/0x1c0 [ 14.359948] __kasan_check_write+0x18/0x20 [ 14.359968] kasan_atomics_helper+0xd47/0x5450 [ 14.359991] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.360013] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.360038] ? kasan_atomics+0x152/0x310 [ 14.360064] kasan_atomics+0x1dc/0x310 [ 14.360088] ? __pfx_kasan_atomics+0x10/0x10 [ 14.360195] ? __pfx_read_tsc+0x10/0x10 [ 14.360217] ? ktime_get_ts64+0x86/0x230 [ 14.360241] kunit_try_run_case+0x1a5/0x480 [ 14.360267] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.360291] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.360333] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.360357] ? __kthread_parkme+0x82/0x180 [ 14.360377] ? preempt_count_sub+0x50/0x80 [ 14.360401] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.360426] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.360449] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.360472] kthread+0x337/0x6f0 [ 14.360492] ? trace_preempt_on+0x20/0xc0 [ 14.360514] ? __pfx_kthread+0x10/0x10 [ 14.360536] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.360557] ? calculate_sigpending+0x7b/0xa0 [ 14.360582] ? __pfx_kthread+0x10/0x10 [ 14.360604] ret_from_fork+0x116/0x1d0 [ 14.360622] ? __pfx_kthread+0x10/0x10 [ 14.360644] ret_from_fork_asm+0x1a/0x30 [ 14.360674] </TASK> [ 14.360687] [ 14.368715] Allocated by task 283: [ 14.368901] kasan_save_stack+0x45/0x70 [ 14.369119] kasan_save_track+0x18/0x40 [ 14.369385] kasan_save_alloc_info+0x3b/0x50 [ 14.369563] __kasan_kmalloc+0xb7/0xc0 [ 14.369742] __kmalloc_cache_noprof+0x189/0x420 [ 14.369967] kasan_atomics+0x95/0x310 [ 14.370162] kunit_try_run_case+0x1a5/0x480 [ 14.370347] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.370584] kthread+0x337/0x6f0 [ 14.370732] ret_from_fork+0x116/0x1d0 [ 14.370920] ret_from_fork_asm+0x1a/0x30 [ 14.371062] [ 14.371152] The buggy address belongs to the object at ffff8881038eb080 [ 14.371152] which belongs to the cache kmalloc-64 of size 64 [ 14.371796] The buggy address is located 0 bytes to the right of [ 14.371796] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.372456] [ 14.372536] The buggy address belongs to the physical page: [ 14.372712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.372958] flags: 0x200000000000000(node=0|zone=2) [ 14.373262] page_type: f5(slab) [ 14.373465] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.373817] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.374242] page dumped because: kasan: bad access detected [ 14.374520] [ 14.374617] Memory state around the buggy address: [ 14.374849] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.375247] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.375498] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.375805] ^ [ 14.376037] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.376642] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.376949] ================================================================== [ 13.908423] ================================================================== [ 13.908737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 13.909084] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 13.909473] [ 13.909570] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.910193] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.910206] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.910228] Call Trace: [ 13.910240] <TASK> [ 13.910256] dump_stack_lvl+0x73/0xb0 [ 13.910283] print_report+0xd1/0x650 [ 13.910306] ? __virt_addr_valid+0x1db/0x2d0 [ 13.910327] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.910348] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.910369] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.910390] kasan_report+0x141/0x180 [ 13.910412] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.910437] __asan_report_store4_noabort+0x1b/0x30 [ 13.910456] kasan_atomics_helper+0x4ba2/0x5450 [ 13.910478] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.910501] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.910539] ? kasan_atomics+0x152/0x310 [ 13.910566] kasan_atomics+0x1dc/0x310 [ 13.910589] ? __pfx_kasan_atomics+0x10/0x10 [ 13.910612] ? __pfx_read_tsc+0x10/0x10 [ 13.910632] ? ktime_get_ts64+0x86/0x230 [ 13.910656] kunit_try_run_case+0x1a5/0x480 [ 13.910679] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.910701] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.910723] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.910745] ? __kthread_parkme+0x82/0x180 [ 13.910765] ? preempt_count_sub+0x50/0x80 [ 13.910788] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.910811] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.910833] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.910856] kthread+0x337/0x6f0 [ 13.910874] ? trace_preempt_on+0x20/0xc0 [ 13.910897] ? __pfx_kthread+0x10/0x10 [ 13.910917] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.910937] ? calculate_sigpending+0x7b/0xa0 [ 13.910959] ? __pfx_kthread+0x10/0x10 [ 13.910984] ret_from_fork+0x116/0x1d0 [ 13.911005] ? __pfx_kthread+0x10/0x10 [ 13.911026] ret_from_fork_asm+0x1a/0x30 [ 13.911057] </TASK> [ 13.911070] [ 13.924205] Allocated by task 283: [ 13.925858] kasan_save_stack+0x45/0x70 [ 13.926036] kasan_save_track+0x18/0x40 [ 13.926363] kasan_save_alloc_info+0x3b/0x50 [ 13.926800] __kasan_kmalloc+0xb7/0xc0 [ 13.927085] __kmalloc_cache_noprof+0x189/0x420 [ 13.927271] kasan_atomics+0x95/0x310 [ 13.927405] kunit_try_run_case+0x1a5/0x480 [ 13.927551] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.927726] kthread+0x337/0x6f0 [ 13.928424] ret_from_fork+0x116/0x1d0 [ 13.928821] ret_from_fork_asm+0x1a/0x30 [ 13.929274] [ 13.929501] The buggy address belongs to the object at ffff8881038eb080 [ 13.929501] which belongs to the cache kmalloc-64 of size 64 [ 13.930211] The buggy address is located 0 bytes to the right of [ 13.930211] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 13.931390] [ 13.931554] The buggy address belongs to the physical page: [ 13.931749] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 13.932602] flags: 0x200000000000000(node=0|zone=2) [ 13.932779] page_type: f5(slab) [ 13.932903] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.933242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.933585] page dumped because: kasan: bad access detected [ 13.933868] [ 13.933967] Memory state around the buggy address: [ 13.934267] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.934608] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.934926] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.935300] ^ [ 13.935535] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.935825] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.936123] ================================================================== [ 14.522446] ================================================================== [ 14.522774] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 14.523083] Read of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.524199] [ 14.524483] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.524534] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.524549] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.524573] Call Trace: [ 14.524593] <TASK> [ 14.524612] dump_stack_lvl+0x73/0xb0 [ 14.524646] print_report+0xd1/0x650 [ 14.524670] ? __virt_addr_valid+0x1db/0x2d0 [ 14.524694] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.524716] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.524739] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.524760] kasan_report+0x141/0x180 [ 14.524786] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.524813] __asan_report_load4_noabort+0x18/0x20 [ 14.524838] kasan_atomics_helper+0x4a1c/0x5450 [ 14.524861] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.524884] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.524909] ? kasan_atomics+0x152/0x310 [ 14.524935] kasan_atomics+0x1dc/0x310 [ 14.524958] ? __pfx_kasan_atomics+0x10/0x10 [ 14.524984] ? __pfx_read_tsc+0x10/0x10 [ 14.525005] ? ktime_get_ts64+0x86/0x230 [ 14.525031] kunit_try_run_case+0x1a5/0x480 [ 14.525055] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.525078] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.525116] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.525140] ? __kthread_parkme+0x82/0x180 [ 14.525161] ? preempt_count_sub+0x50/0x80 [ 14.525185] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.525209] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.525233] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.525257] kthread+0x337/0x6f0 [ 14.525277] ? trace_preempt_on+0x20/0xc0 [ 14.525301] ? __pfx_kthread+0x10/0x10 [ 14.525325] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.525347] ? calculate_sigpending+0x7b/0xa0 [ 14.525372] ? __pfx_kthread+0x10/0x10 [ 14.525394] ret_from_fork+0x116/0x1d0 [ 14.525414] ? __pfx_kthread+0x10/0x10 [ 14.525435] ret_from_fork_asm+0x1a/0x30 [ 14.525466] </TASK> [ 14.525479] [ 14.536432] Allocated by task 283: [ 14.536719] kasan_save_stack+0x45/0x70 [ 14.537005] kasan_save_track+0x18/0x40 [ 14.537324] kasan_save_alloc_info+0x3b/0x50 [ 14.537626] __kasan_kmalloc+0xb7/0xc0 [ 14.537774] __kmalloc_cache_noprof+0x189/0x420 [ 14.537985] kasan_atomics+0x95/0x310 [ 14.538378] kunit_try_run_case+0x1a5/0x480 [ 14.538671] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.539013] kthread+0x337/0x6f0 [ 14.539287] ret_from_fork+0x116/0x1d0 [ 14.539593] ret_from_fork_asm+0x1a/0x30 [ 14.539895] [ 14.540066] The buggy address belongs to the object at ffff8881038eb080 [ 14.540066] which belongs to the cache kmalloc-64 of size 64 [ 14.540794] The buggy address is located 0 bytes to the right of [ 14.540794] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.541551] [ 14.541665] The buggy address belongs to the physical page: [ 14.542071] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.542623] flags: 0x200000000000000(node=0|zone=2) [ 14.542965] page_type: f5(slab) [ 14.543167] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.543660] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.544091] page dumped because: kasan: bad access detected [ 14.544488] [ 14.544695] Memory state around the buggy address: [ 14.544972] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.545309] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.545703] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.545982] ^ [ 14.546238] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.546746] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.547154] ================================================================== [ 14.761193] ================================================================== [ 14.761424] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 14.762168] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.762696] [ 14.762804] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.762845] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.762858] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.762905] Call Trace: [ 14.762917] <TASK> [ 14.762932] dump_stack_lvl+0x73/0xb0 [ 14.762977] print_report+0xd1/0x650 [ 14.763000] ? __virt_addr_valid+0x1db/0x2d0 [ 14.763041] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.763063] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.763113] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.763136] kasan_report+0x141/0x180 [ 14.763173] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.763232] kasan_check_range+0x10c/0x1c0 [ 14.763256] __kasan_check_write+0x18/0x20 [ 14.763276] kasan_atomics_helper+0x15b6/0x5450 [ 14.763299] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.763332] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.763357] ? kasan_atomics+0x152/0x310 [ 14.763384] kasan_atomics+0x1dc/0x310 [ 14.763407] ? __pfx_kasan_atomics+0x10/0x10 [ 14.763431] ? __pfx_read_tsc+0x10/0x10 [ 14.763453] ? ktime_get_ts64+0x86/0x230 [ 14.763493] kunit_try_run_case+0x1a5/0x480 [ 14.763531] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.763567] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.763604] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.763640] ? __kthread_parkme+0x82/0x180 [ 14.763675] ? preempt_count_sub+0x50/0x80 [ 14.763725] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.763763] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.763800] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.763826] kthread+0x337/0x6f0 [ 14.763846] ? trace_preempt_on+0x20/0xc0 [ 14.763869] ? __pfx_kthread+0x10/0x10 [ 14.763890] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.763913] ? calculate_sigpending+0x7b/0xa0 [ 14.763936] ? __pfx_kthread+0x10/0x10 [ 14.763958] ret_from_fork+0x116/0x1d0 [ 14.763978] ? __pfx_kthread+0x10/0x10 [ 14.763998] ret_from_fork_asm+0x1a/0x30 [ 14.764028] </TASK> [ 14.764041] [ 14.773448] Allocated by task 283: [ 14.773577] kasan_save_stack+0x45/0x70 [ 14.773776] kasan_save_track+0x18/0x40 [ 14.773966] kasan_save_alloc_info+0x3b/0x50 [ 14.774212] __kasan_kmalloc+0xb7/0xc0 [ 14.774398] __kmalloc_cache_noprof+0x189/0x420 [ 14.774662] kasan_atomics+0x95/0x310 [ 14.774830] kunit_try_run_case+0x1a5/0x480 [ 14.774973] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.775152] kthread+0x337/0x6f0 [ 14.775278] ret_from_fork+0x116/0x1d0 [ 14.775484] ret_from_fork_asm+0x1a/0x30 [ 14.775705] [ 14.775798] The buggy address belongs to the object at ffff8881038eb080 [ 14.775798] which belongs to the cache kmalloc-64 of size 64 [ 14.776437] The buggy address is located 0 bytes to the right of [ 14.776437] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.776987] [ 14.777081] The buggy address belongs to the physical page: [ 14.777273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.777769] flags: 0x200000000000000(node=0|zone=2) [ 14.778027] page_type: f5(slab) [ 14.778213] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.778568] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.778807] page dumped because: kasan: bad access detected [ 14.779061] [ 14.779185] Memory state around the buggy address: [ 14.779439] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.779728] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.780043] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.780366] ^ [ 14.780530] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.780849] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.781177] ================================================================== [ 14.900679] ================================================================== [ 14.901018] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 14.901466] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.901876] [ 14.901970] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.902015] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.902028] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.902173] Call Trace: [ 14.902192] <TASK> [ 14.902370] dump_stack_lvl+0x73/0xb0 [ 14.902405] print_report+0xd1/0x650 [ 14.902430] ? __virt_addr_valid+0x1db/0x2d0 [ 14.902453] ? kasan_atomics_helper+0x194a/0x5450 [ 14.902475] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.902498] ? kasan_atomics_helper+0x194a/0x5450 [ 14.902523] kasan_report+0x141/0x180 [ 14.902546] ? kasan_atomics_helper+0x194a/0x5450 [ 14.902573] kasan_check_range+0x10c/0x1c0 [ 14.902596] __kasan_check_write+0x18/0x20 [ 14.902616] kasan_atomics_helper+0x194a/0x5450 [ 14.902639] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.902662] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.902689] ? kasan_atomics+0x152/0x310 [ 14.902716] kasan_atomics+0x1dc/0x310 [ 14.902738] ? __pfx_kasan_atomics+0x10/0x10 [ 14.902762] ? __pfx_read_tsc+0x10/0x10 [ 14.902783] ? ktime_get_ts64+0x86/0x230 [ 14.902808] kunit_try_run_case+0x1a5/0x480 [ 14.902833] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.902855] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.902878] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.902901] ? __kthread_parkme+0x82/0x180 [ 14.902921] ? preempt_count_sub+0x50/0x80 [ 14.902945] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.902968] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.902991] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.903015] kthread+0x337/0x6f0 [ 14.903034] ? trace_preempt_on+0x20/0xc0 [ 14.903058] ? __pfx_kthread+0x10/0x10 [ 14.903079] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.903111] ? calculate_sigpending+0x7b/0xa0 [ 14.903135] ? __pfx_kthread+0x10/0x10 [ 14.903157] ret_from_fork+0x116/0x1d0 [ 14.903175] ? __pfx_kthread+0x10/0x10 [ 14.903196] ret_from_fork_asm+0x1a/0x30 [ 14.903231] </TASK> [ 14.903244] [ 14.913828] Allocated by task 283: [ 14.914000] kasan_save_stack+0x45/0x70 [ 14.914283] kasan_save_track+0x18/0x40 [ 14.914555] kasan_save_alloc_info+0x3b/0x50 [ 14.914830] __kasan_kmalloc+0xb7/0xc0 [ 14.915084] __kmalloc_cache_noprof+0x189/0x420 [ 14.915316] kasan_atomics+0x95/0x310 [ 14.915651] kunit_try_run_case+0x1a5/0x480 [ 14.915967] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.916318] kthread+0x337/0x6f0 [ 14.916594] ret_from_fork+0x116/0x1d0 [ 14.916865] ret_from_fork_asm+0x1a/0x30 [ 14.917069] [ 14.917175] The buggy address belongs to the object at ffff8881038eb080 [ 14.917175] which belongs to the cache kmalloc-64 of size 64 [ 14.917969] The buggy address is located 0 bytes to the right of [ 14.917969] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.918754] [ 14.919020] The buggy address belongs to the physical page: [ 14.919291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.919963] flags: 0x200000000000000(node=0|zone=2) [ 14.920145] page_type: f5(slab) [ 14.920267] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.921115] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.921892] page dumped because: kasan: bad access detected [ 14.922448] [ 14.922527] Memory state around the buggy address: [ 14.922684] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.922897] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.923126] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.923366] ^ [ 14.923519] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.924458] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.924815] ================================================================== [ 15.190601] ================================================================== [ 15.190946] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 15.191374] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 15.191873] [ 15.191963] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.192013] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.192026] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.192050] Call Trace: [ 15.192064] <TASK> [ 15.192079] dump_stack_lvl+0x73/0xb0 [ 15.192119] print_report+0xd1/0x650 [ 15.192141] ? __virt_addr_valid+0x1db/0x2d0 [ 15.192164] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.192186] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.192208] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.192230] kasan_report+0x141/0x180 [ 15.192252] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.192279] kasan_check_range+0x10c/0x1c0 [ 15.192303] __kasan_check_write+0x18/0x20 [ 15.192322] kasan_atomics_helper+0x20c8/0x5450 [ 15.192345] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.192378] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.192403] ? kasan_atomics+0x152/0x310 [ 15.192429] kasan_atomics+0x1dc/0x310 [ 15.192452] ? __pfx_kasan_atomics+0x10/0x10 [ 15.192476] ? __pfx_read_tsc+0x10/0x10 [ 15.192498] ? ktime_get_ts64+0x86/0x230 [ 15.192522] kunit_try_run_case+0x1a5/0x480 [ 15.192546] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.192568] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.192592] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.192615] ? __kthread_parkme+0x82/0x180 [ 15.192636] ? preempt_count_sub+0x50/0x80 [ 15.192659] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.192683] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.192707] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.192730] kthread+0x337/0x6f0 [ 15.192749] ? trace_preempt_on+0x20/0xc0 [ 15.192772] ? __pfx_kthread+0x10/0x10 [ 15.192794] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.192815] ? calculate_sigpending+0x7b/0xa0 [ 15.192839] ? __pfx_kthread+0x10/0x10 [ 15.192862] ret_from_fork+0x116/0x1d0 [ 15.192881] ? __pfx_kthread+0x10/0x10 [ 15.192902] ret_from_fork_asm+0x1a/0x30 [ 15.192933] </TASK> [ 15.192945] [ 15.200112] Allocated by task 283: [ 15.200262] kasan_save_stack+0x45/0x70 [ 15.200533] kasan_save_track+0x18/0x40 [ 15.200668] kasan_save_alloc_info+0x3b/0x50 [ 15.200817] __kasan_kmalloc+0xb7/0xc0 [ 15.200953] __kmalloc_cache_noprof+0x189/0x420 [ 15.201187] kasan_atomics+0x95/0x310 [ 15.201424] kunit_try_run_case+0x1a5/0x480 [ 15.201624] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.201876] kthread+0x337/0x6f0 [ 15.202033] ret_from_fork+0x116/0x1d0 [ 15.202222] ret_from_fork_asm+0x1a/0x30 [ 15.202448] [ 15.202524] The buggy address belongs to the object at ffff8881038eb080 [ 15.202524] which belongs to the cache kmalloc-64 of size 64 [ 15.202978] The buggy address is located 0 bytes to the right of [ 15.202978] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 15.203493] [ 15.203590] The buggy address belongs to the physical page: [ 15.203806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 15.204124] flags: 0x200000000000000(node=0|zone=2) [ 15.204346] page_type: f5(slab) [ 15.204501] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.204765] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.204989] page dumped because: kasan: bad access detected [ 15.205170] [ 15.205241] Memory state around the buggy address: [ 15.205431] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.205763] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.206069] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.206382] ^ [ 15.206548] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.206763] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.206975] ================================================================== [ 13.936725] ================================================================== [ 13.937043] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 13.937603] Read of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 13.937890] [ 13.938004] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.938045] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.938057] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.938077] Call Trace: [ 13.938093] <TASK> [ 13.938117] dump_stack_lvl+0x73/0xb0 [ 13.938146] print_report+0xd1/0x650 [ 13.938168] ? __virt_addr_valid+0x1db/0x2d0 [ 13.938191] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.938211] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.938233] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.938254] kasan_report+0x141/0x180 [ 13.938275] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.938300] __asan_report_load4_noabort+0x18/0x20 [ 13.938324] kasan_atomics_helper+0x4b88/0x5450 [ 13.938346] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.938367] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.938392] ? kasan_atomics+0x152/0x310 [ 13.938418] kasan_atomics+0x1dc/0x310 [ 13.938440] ? __pfx_kasan_atomics+0x10/0x10 [ 13.938463] ? __pfx_read_tsc+0x10/0x10 [ 13.938482] ? ktime_get_ts64+0x86/0x230 [ 13.938506] kunit_try_run_case+0x1a5/0x480 [ 13.938528] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.938550] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.938572] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.938594] ? __kthread_parkme+0x82/0x180 [ 13.938614] ? preempt_count_sub+0x50/0x80 [ 13.938647] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.938739] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.938765] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.938789] kthread+0x337/0x6f0 [ 13.938808] ? trace_preempt_on+0x20/0xc0 [ 13.938830] ? __pfx_kthread+0x10/0x10 [ 13.938865] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.938897] ? calculate_sigpending+0x7b/0xa0 [ 13.938921] ? __pfx_kthread+0x10/0x10 [ 13.938942] ret_from_fork+0x116/0x1d0 [ 13.938970] ? __pfx_kthread+0x10/0x10 [ 13.938992] ret_from_fork_asm+0x1a/0x30 [ 13.939021] </TASK> [ 13.939032] [ 13.947221] Allocated by task 283: [ 13.947356] kasan_save_stack+0x45/0x70 [ 13.947764] kasan_save_track+0x18/0x40 [ 13.947979] kasan_save_alloc_info+0x3b/0x50 [ 13.948462] __kasan_kmalloc+0xb7/0xc0 [ 13.948670] __kmalloc_cache_noprof+0x189/0x420 [ 13.948868] kasan_atomics+0x95/0x310 [ 13.949074] kunit_try_run_case+0x1a5/0x480 [ 13.949343] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.949609] kthread+0x337/0x6f0 [ 13.949763] ret_from_fork+0x116/0x1d0 [ 13.949969] ret_from_fork_asm+0x1a/0x30 [ 13.950208] [ 13.950308] The buggy address belongs to the object at ffff8881038eb080 [ 13.950308] which belongs to the cache kmalloc-64 of size 64 [ 13.950723] The buggy address is located 0 bytes to the right of [ 13.950723] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 13.951262] [ 13.951498] The buggy address belongs to the physical page: [ 13.951853] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 13.952125] flags: 0x200000000000000(node=0|zone=2) [ 13.952887] page_type: f5(slab) [ 13.953326] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.953679] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.953993] page dumped because: kasan: bad access detected [ 13.954616] [ 13.954705] Memory state around the buggy address: [ 13.954911] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.955336] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.955633] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.955917] ^ [ 13.956134] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.957062] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.957776] ================================================================== [ 14.587507] ================================================================== [ 14.587741] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 14.587987] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.588816] [ 14.588921] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.588965] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.588979] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.589000] Call Trace: [ 14.589014] <TASK> [ 14.589027] dump_stack_lvl+0x73/0xb0 [ 14.589056] print_report+0xd1/0x650 [ 14.589079] ? __virt_addr_valid+0x1db/0x2d0 [ 14.589114] ? kasan_atomics_helper+0x1217/0x5450 [ 14.589137] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.589159] ? kasan_atomics_helper+0x1217/0x5450 [ 14.589184] kasan_report+0x141/0x180 [ 14.589207] ? kasan_atomics_helper+0x1217/0x5450 [ 14.589234] kasan_check_range+0x10c/0x1c0 [ 14.589258] __kasan_check_write+0x18/0x20 [ 14.589279] kasan_atomics_helper+0x1217/0x5450 [ 14.589303] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.589324] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.589452] ? kasan_atomics+0x152/0x310 [ 14.589483] kasan_atomics+0x1dc/0x310 [ 14.589534] ? __pfx_kasan_atomics+0x10/0x10 [ 14.589589] ? __pfx_read_tsc+0x10/0x10 [ 14.589609] ? ktime_get_ts64+0x86/0x230 [ 14.589634] kunit_try_run_case+0x1a5/0x480 [ 14.589658] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.589681] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.589705] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.589727] ? __kthread_parkme+0x82/0x180 [ 14.589749] ? preempt_count_sub+0x50/0x80 [ 14.589773] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.589797] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.589820] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.589844] kthread+0x337/0x6f0 [ 14.589864] ? trace_preempt_on+0x20/0xc0 [ 14.589919] ? __pfx_kthread+0x10/0x10 [ 14.589941] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.589962] ? calculate_sigpending+0x7b/0xa0 [ 14.589986] ? __pfx_kthread+0x10/0x10 [ 14.590008] ret_from_fork+0x116/0x1d0 [ 14.590027] ? __pfx_kthread+0x10/0x10 [ 14.590079] ret_from_fork_asm+0x1a/0x30 [ 14.590119] </TASK> [ 14.590131] [ 14.598904] Allocated by task 283: [ 14.599108] kasan_save_stack+0x45/0x70 [ 14.599339] kasan_save_track+0x18/0x40 [ 14.599511] kasan_save_alloc_info+0x3b/0x50 [ 14.599664] __kasan_kmalloc+0xb7/0xc0 [ 14.599800] __kmalloc_cache_noprof+0x189/0x420 [ 14.600008] kasan_atomics+0x95/0x310 [ 14.600157] kunit_try_run_case+0x1a5/0x480 [ 14.600308] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.600614] kthread+0x337/0x6f0 [ 14.600793] ret_from_fork+0x116/0x1d0 [ 14.601013] ret_from_fork_asm+0x1a/0x30 [ 14.601225] [ 14.601323] The buggy address belongs to the object at ffff8881038eb080 [ 14.601323] which belongs to the cache kmalloc-64 of size 64 [ 14.602050] The buggy address is located 0 bytes to the right of [ 14.602050] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.602610] [ 14.602758] The buggy address belongs to the physical page: [ 14.602943] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.603196] flags: 0x200000000000000(node=0|zone=2) [ 14.603370] page_type: f5(slab) [ 14.603492] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.603732] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.604140] page dumped because: kasan: bad access detected [ 14.604487] [ 14.604637] Memory state around the buggy address: [ 14.604951] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.605441] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.605759] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.605982] ^ [ 14.606153] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.606627] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.606984] ================================================================== [ 14.441559] ================================================================== [ 14.441873] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 14.443672] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.443921] [ 14.444018] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.444062] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.444076] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.444112] Call Trace: [ 14.444132] <TASK> [ 14.444151] dump_stack_lvl+0x73/0xb0 [ 14.444182] print_report+0xd1/0x650 [ 14.444207] ? __virt_addr_valid+0x1db/0x2d0 [ 14.444230] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.444252] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.444277] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.444299] kasan_report+0x141/0x180 [ 14.444323] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.444349] kasan_check_range+0x10c/0x1c0 [ 14.444376] __kasan_check_write+0x18/0x20 [ 14.444396] kasan_atomics_helper+0xfa9/0x5450 [ 14.444419] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.444442] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.444467] ? kasan_atomics+0x152/0x310 [ 14.444494] kasan_atomics+0x1dc/0x310 [ 14.444517] ? __pfx_kasan_atomics+0x10/0x10 [ 14.444541] ? __pfx_read_tsc+0x10/0x10 [ 14.444564] ? ktime_get_ts64+0x86/0x230 [ 14.444592] kunit_try_run_case+0x1a5/0x480 [ 14.444617] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.444640] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.444664] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.444687] ? __kthread_parkme+0x82/0x180 [ 14.444709] ? preempt_count_sub+0x50/0x80 [ 14.444733] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.444757] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.444781] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.444804] kthread+0x337/0x6f0 [ 14.444824] ? trace_preempt_on+0x20/0xc0 [ 14.444848] ? __pfx_kthread+0x10/0x10 [ 14.444869] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.444891] ? calculate_sigpending+0x7b/0xa0 [ 14.444915] ? __pfx_kthread+0x10/0x10 [ 14.444938] ret_from_fork+0x116/0x1d0 [ 14.444957] ? __pfx_kthread+0x10/0x10 [ 14.444978] ret_from_fork_asm+0x1a/0x30 [ 14.445009] </TASK> [ 14.445023] [ 14.458776] Allocated by task 283: [ 14.458975] kasan_save_stack+0x45/0x70 [ 14.459183] kasan_save_track+0x18/0x40 [ 14.459572] kasan_save_alloc_info+0x3b/0x50 [ 14.459866] __kasan_kmalloc+0xb7/0xc0 [ 14.460186] __kmalloc_cache_noprof+0x189/0x420 [ 14.460582] kasan_atomics+0x95/0x310 [ 14.460889] kunit_try_run_case+0x1a5/0x480 [ 14.461179] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.461579] kthread+0x337/0x6f0 [ 14.461879] ret_from_fork+0x116/0x1d0 [ 14.462035] ret_from_fork_asm+0x1a/0x30 [ 14.462252] [ 14.462667] The buggy address belongs to the object at ffff8881038eb080 [ 14.462667] which belongs to the cache kmalloc-64 of size 64 [ 14.463344] The buggy address is located 0 bytes to the right of [ 14.463344] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.463964] [ 14.464057] The buggy address belongs to the physical page: [ 14.464328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.464910] flags: 0x200000000000000(node=0|zone=2) [ 14.465247] page_type: f5(slab) [ 14.465578] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.466004] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.466546] page dumped because: kasan: bad access detected [ 14.466890] [ 14.467112] Memory state around the buggy address: [ 14.467358] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.467741] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.468044] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.468553] ^ [ 14.468845] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.469224] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.469626] ================================================================== [ 13.999534] ================================================================== [ 13.999886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 14.000360] Read of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.000653] [ 14.000765] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.000806] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.000818] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.000839] Call Trace: [ 14.000853] <TASK> [ 14.000866] dump_stack_lvl+0x73/0xb0 [ 14.000895] print_report+0xd1/0x650 [ 14.000918] ? __virt_addr_valid+0x1db/0x2d0 [ 14.000940] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.000962] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.000984] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.001006] kasan_report+0x141/0x180 [ 14.001029] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.001055] __asan_report_load4_noabort+0x18/0x20 [ 14.001081] kasan_atomics_helper+0x4b54/0x5450 [ 14.001116] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.001139] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.001266] ? kasan_atomics+0x152/0x310 [ 14.001294] kasan_atomics+0x1dc/0x310 [ 14.001318] ? __pfx_kasan_atomics+0x10/0x10 [ 14.001365] ? __pfx_read_tsc+0x10/0x10 [ 14.001387] ? ktime_get_ts64+0x86/0x230 [ 14.001411] kunit_try_run_case+0x1a5/0x480 [ 14.001435] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.001467] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.001490] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.001514] ? __kthread_parkme+0x82/0x180 [ 14.001546] ? preempt_count_sub+0x50/0x80 [ 14.001570] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.001595] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.001619] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.001652] kthread+0x337/0x6f0 [ 14.001672] ? trace_preempt_on+0x20/0xc0 [ 14.001696] ? __pfx_kthread+0x10/0x10 [ 14.001728] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.001749] ? calculate_sigpending+0x7b/0xa0 [ 14.001774] ? __pfx_kthread+0x10/0x10 [ 14.001796] ret_from_fork+0x116/0x1d0 [ 14.001815] ? __pfx_kthread+0x10/0x10 [ 14.001836] ret_from_fork_asm+0x1a/0x30 [ 14.001868] </TASK> [ 14.001880] [ 14.009842] Allocated by task 283: [ 14.009988] kasan_save_stack+0x45/0x70 [ 14.010298] kasan_save_track+0x18/0x40 [ 14.010525] kasan_save_alloc_info+0x3b/0x50 [ 14.010720] __kasan_kmalloc+0xb7/0xc0 [ 14.010857] __kmalloc_cache_noprof+0x189/0x420 [ 14.011068] kasan_atomics+0x95/0x310 [ 14.011283] kunit_try_run_case+0x1a5/0x480 [ 14.011795] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.012048] kthread+0x337/0x6f0 [ 14.012301] ret_from_fork+0x116/0x1d0 [ 14.012547] ret_from_fork_asm+0x1a/0x30 [ 14.012727] [ 14.012827] The buggy address belongs to the object at ffff8881038eb080 [ 14.012827] which belongs to the cache kmalloc-64 of size 64 [ 14.013441] The buggy address is located 0 bytes to the right of [ 14.013441] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.013960] [ 14.014071] The buggy address belongs to the physical page: [ 14.014401] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.014746] flags: 0x200000000000000(node=0|zone=2) [ 14.014972] page_type: f5(slab) [ 14.015106] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.015592] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.015847] page dumped because: kasan: bad access detected [ 14.016316] [ 14.016504] Memory state around the buggy address: [ 14.016742] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.017020] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.017304] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.017749] ^ [ 14.018007] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.018488] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.018842] ================================================================== [ 14.081149] ================================================================== [ 14.081915] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 14.082178] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.082768] [ 14.082897] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.082940] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.082953] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.082974] Call Trace: [ 14.082989] <TASK> [ 14.083002] dump_stack_lvl+0x73/0xb0 [ 14.083034] print_report+0xd1/0x650 [ 14.083088] ? __virt_addr_valid+0x1db/0x2d0 [ 14.083122] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.083145] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.083260] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.083284] kasan_report+0x141/0x180 [ 14.083308] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.083346] kasan_check_range+0x10c/0x1c0 [ 14.083370] __kasan_check_write+0x18/0x20 [ 14.083417] kasan_atomics_helper+0x5fe/0x5450 [ 14.083440] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.083464] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.083500] ? kasan_atomics+0x152/0x310 [ 14.083526] kasan_atomics+0x1dc/0x310 [ 14.083549] ? __pfx_kasan_atomics+0x10/0x10 [ 14.083574] ? __pfx_read_tsc+0x10/0x10 [ 14.083594] ? ktime_get_ts64+0x86/0x230 [ 14.083618] kunit_try_run_case+0x1a5/0x480 [ 14.083642] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.083665] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.083688] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.083711] ? __kthread_parkme+0x82/0x180 [ 14.083733] ? preempt_count_sub+0x50/0x80 [ 14.083757] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.083781] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.083803] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.083827] kthread+0x337/0x6f0 [ 14.083848] ? trace_preempt_on+0x20/0xc0 [ 14.083872] ? __pfx_kthread+0x10/0x10 [ 14.083919] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.083941] ? calculate_sigpending+0x7b/0xa0 [ 14.083965] ? __pfx_kthread+0x10/0x10 [ 14.084024] ret_from_fork+0x116/0x1d0 [ 14.084042] ? __pfx_kthread+0x10/0x10 [ 14.084090] ret_from_fork_asm+0x1a/0x30 [ 14.084129] </TASK> [ 14.084141] [ 14.093556] Allocated by task 283: [ 14.093758] kasan_save_stack+0x45/0x70 [ 14.093963] kasan_save_track+0x18/0x40 [ 14.094272] kasan_save_alloc_info+0x3b/0x50 [ 14.094488] __kasan_kmalloc+0xb7/0xc0 [ 14.094677] __kmalloc_cache_noprof+0x189/0x420 [ 14.094952] kasan_atomics+0x95/0x310 [ 14.095160] kunit_try_run_case+0x1a5/0x480 [ 14.095371] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.095830] kthread+0x337/0x6f0 [ 14.095988] ret_from_fork+0x116/0x1d0 [ 14.096251] ret_from_fork_asm+0x1a/0x30 [ 14.096545] [ 14.096622] The buggy address belongs to the object at ffff8881038eb080 [ 14.096622] which belongs to the cache kmalloc-64 of size 64 [ 14.097071] The buggy address is located 0 bytes to the right of [ 14.097071] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.098113] [ 14.098317] The buggy address belongs to the physical page: [ 14.098532] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.098945] flags: 0x200000000000000(node=0|zone=2) [ 14.099151] page_type: f5(slab) [ 14.099425] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.099823] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.100217] page dumped because: kasan: bad access detected [ 14.100570] [ 14.100689] Memory state around the buggy address: [ 14.100908] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.101429] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.101752] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.102055] ^ [ 14.102291] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.102649] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.103308] ================================================================== [ 14.310042] ================================================================== [ 14.310405] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 14.311140] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.311642] [ 14.311732] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.311775] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.311788] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.311811] Call Trace: [ 14.311825] <TASK> [ 14.311841] dump_stack_lvl+0x73/0xb0 [ 14.311868] print_report+0xd1/0x650 [ 14.311894] ? __virt_addr_valid+0x1db/0x2d0 [ 14.311950] ? kasan_atomics_helper+0xc70/0x5450 [ 14.311972] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.312025] ? kasan_atomics_helper+0xc70/0x5450 [ 14.312047] kasan_report+0x141/0x180 [ 14.312070] ? kasan_atomics_helper+0xc70/0x5450 [ 14.312104] kasan_check_range+0x10c/0x1c0 [ 14.312128] __kasan_check_write+0x18/0x20 [ 14.312149] kasan_atomics_helper+0xc70/0x5450 [ 14.312215] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.312269] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.312300] ? kasan_atomics+0x152/0x310 [ 14.312352] kasan_atomics+0x1dc/0x310 [ 14.312376] ? __pfx_kasan_atomics+0x10/0x10 [ 14.312401] ? __pfx_read_tsc+0x10/0x10 [ 14.312449] ? ktime_get_ts64+0x86/0x230 [ 14.312474] kunit_try_run_case+0x1a5/0x480 [ 14.312498] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.312531] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.312554] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.312578] ? __kthread_parkme+0x82/0x180 [ 14.312599] ? preempt_count_sub+0x50/0x80 [ 14.312624] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.312648] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.312672] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.312695] kthread+0x337/0x6f0 [ 14.312716] ? trace_preempt_on+0x20/0xc0 [ 14.312739] ? __pfx_kthread+0x10/0x10 [ 14.312761] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.312782] ? calculate_sigpending+0x7b/0xa0 [ 14.312806] ? __pfx_kthread+0x10/0x10 [ 14.312829] ret_from_fork+0x116/0x1d0 [ 14.312848] ? __pfx_kthread+0x10/0x10 [ 14.312869] ret_from_fork_asm+0x1a/0x30 [ 14.312899] </TASK> [ 14.312912] [ 14.323054] Allocated by task 283: [ 14.323354] kasan_save_stack+0x45/0x70 [ 14.323587] kasan_save_track+0x18/0x40 [ 14.323830] kasan_save_alloc_info+0x3b/0x50 [ 14.324050] __kasan_kmalloc+0xb7/0xc0 [ 14.324381] __kmalloc_cache_noprof+0x189/0x420 [ 14.324647] kasan_atomics+0x95/0x310 [ 14.324860] kunit_try_run_case+0x1a5/0x480 [ 14.325048] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.325378] kthread+0x337/0x6f0 [ 14.325834] ret_from_fork+0x116/0x1d0 [ 14.325985] ret_from_fork_asm+0x1a/0x30 [ 14.326260] [ 14.326375] The buggy address belongs to the object at ffff8881038eb080 [ 14.326375] which belongs to the cache kmalloc-64 of size 64 [ 14.327091] The buggy address is located 0 bytes to the right of [ 14.327091] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.327770] [ 14.327904] The buggy address belongs to the physical page: [ 14.328354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.328732] flags: 0x200000000000000(node=0|zone=2) [ 14.329010] page_type: f5(slab) [ 14.329220] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.329727] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.329989] page dumped because: kasan: bad access detected [ 14.330177] [ 14.330252] Memory state around the buggy address: [ 14.330516] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.330965] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.331312] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.331849] ^ [ 14.332025] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.332696] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.333037] ================================================================== [ 14.662533] ================================================================== [ 14.663311] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 14.663691] Read of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.664021] [ 14.664145] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.664185] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.664198] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.664219] Call Trace: [ 14.664232] <TASK> [ 14.664247] dump_stack_lvl+0x73/0xb0 [ 14.664274] print_report+0xd1/0x650 [ 14.664297] ? __virt_addr_valid+0x1db/0x2d0 [ 14.664319] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.664341] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.664364] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.664385] kasan_report+0x141/0x180 [ 14.664408] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.664434] kasan_check_range+0x10c/0x1c0 [ 14.664458] __kasan_check_read+0x15/0x20 [ 14.664478] kasan_atomics_helper+0x13b5/0x5450 [ 14.664501] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.664524] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.664549] ? kasan_atomics+0x152/0x310 [ 14.664575] kasan_atomics+0x1dc/0x310 [ 14.664598] ? __pfx_kasan_atomics+0x10/0x10 [ 14.664621] ? __pfx_read_tsc+0x10/0x10 [ 14.664643] ? ktime_get_ts64+0x86/0x230 [ 14.664667] kunit_try_run_case+0x1a5/0x480 [ 14.664691] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.664713] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.664735] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.664758] ? __kthread_parkme+0x82/0x180 [ 14.664778] ? preempt_count_sub+0x50/0x80 [ 14.664802] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.664826] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.664848] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.664872] kthread+0x337/0x6f0 [ 14.664893] ? trace_preempt_on+0x20/0xc0 [ 14.664915] ? __pfx_kthread+0x10/0x10 [ 14.664936] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.664957] ? calculate_sigpending+0x7b/0xa0 [ 14.664982] ? __pfx_kthread+0x10/0x10 [ 14.665003] ret_from_fork+0x116/0x1d0 [ 14.665021] ? __pfx_kthread+0x10/0x10 [ 14.665043] ret_from_fork_asm+0x1a/0x30 [ 14.665073] </TASK> [ 14.665085] [ 14.672547] Allocated by task 283: [ 14.672723] kasan_save_stack+0x45/0x70 [ 14.672922] kasan_save_track+0x18/0x40 [ 14.673125] kasan_save_alloc_info+0x3b/0x50 [ 14.673353] __kasan_kmalloc+0xb7/0xc0 [ 14.673540] __kmalloc_cache_noprof+0x189/0x420 [ 14.673743] kasan_atomics+0x95/0x310 [ 14.673897] kunit_try_run_case+0x1a5/0x480 [ 14.674047] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.674235] kthread+0x337/0x6f0 [ 14.674361] ret_from_fork+0x116/0x1d0 [ 14.674494] ret_from_fork_asm+0x1a/0x30 [ 14.674735] [ 14.674834] The buggy address belongs to the object at ffff8881038eb080 [ 14.674834] which belongs to the cache kmalloc-64 of size 64 [ 14.675389] The buggy address is located 0 bytes to the right of [ 14.675389] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.675955] [ 14.676053] The buggy address belongs to the physical page: [ 14.676278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.676653] flags: 0x200000000000000(node=0|zone=2) [ 14.676838] page_type: f5(slab) [ 14.676961] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.677274] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.677730] page dumped because: kasan: bad access detected [ 14.677924] [ 14.677995] Memory state around the buggy address: [ 14.678162] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.678440] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.678760] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.679071] ^ [ 14.679312] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.679652] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.679871] ================================================================== [ 14.723910] ================================================================== [ 14.724404] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 14.724720] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.725093] [ 14.725206] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.725251] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.725285] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.725308] Call Trace: [ 14.725324] <TASK> [ 14.725341] dump_stack_lvl+0x73/0xb0 [ 14.725367] print_report+0xd1/0x650 [ 14.725391] ? __virt_addr_valid+0x1db/0x2d0 [ 14.725413] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.725435] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.725457] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.725480] kasan_report+0x141/0x180 [ 14.725502] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.725546] __asan_report_store8_noabort+0x1b/0x30 [ 14.725583] kasan_atomics_helper+0x50d4/0x5450 [ 14.725606] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.725643] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.725682] ? kasan_atomics+0x152/0x310 [ 14.725708] kasan_atomics+0x1dc/0x310 [ 14.725745] ? __pfx_kasan_atomics+0x10/0x10 [ 14.725782] ? __pfx_read_tsc+0x10/0x10 [ 14.725804] ? ktime_get_ts64+0x86/0x230 [ 14.725828] kunit_try_run_case+0x1a5/0x480 [ 14.725865] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.725901] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.725924] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.725948] ? __kthread_parkme+0x82/0x180 [ 14.725968] ? preempt_count_sub+0x50/0x80 [ 14.725991] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.726016] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.726039] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.726064] kthread+0x337/0x6f0 [ 14.726084] ? trace_preempt_on+0x20/0xc0 [ 14.726118] ? __pfx_kthread+0x10/0x10 [ 14.726139] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.726161] ? calculate_sigpending+0x7b/0xa0 [ 14.726184] ? __pfx_kthread+0x10/0x10 [ 14.726207] ret_from_fork+0x116/0x1d0 [ 14.726225] ? __pfx_kthread+0x10/0x10 [ 14.726247] ret_from_fork_asm+0x1a/0x30 [ 14.726276] </TASK> [ 14.726289] [ 14.734032] Allocated by task 283: [ 14.734226] kasan_save_stack+0x45/0x70 [ 14.734423] kasan_save_track+0x18/0x40 [ 14.734746] kasan_save_alloc_info+0x3b/0x50 [ 14.734958] __kasan_kmalloc+0xb7/0xc0 [ 14.735152] __kmalloc_cache_noprof+0x189/0x420 [ 14.735349] kasan_atomics+0x95/0x310 [ 14.735553] kunit_try_run_case+0x1a5/0x480 [ 14.735776] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.736019] kthread+0x337/0x6f0 [ 14.736180] ret_from_fork+0x116/0x1d0 [ 14.736311] ret_from_fork_asm+0x1a/0x30 [ 14.736449] [ 14.736520] The buggy address belongs to the object at ffff8881038eb080 [ 14.736520] which belongs to the cache kmalloc-64 of size 64 [ 14.737375] The buggy address is located 0 bytes to the right of [ 14.737375] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.737921] [ 14.738050] The buggy address belongs to the physical page: [ 14.738335] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.738692] flags: 0x200000000000000(node=0|zone=2) [ 14.738922] page_type: f5(slab) [ 14.739091] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.739542] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.739863] page dumped because: kasan: bad access detected [ 14.740073] [ 14.740153] Memory state around the buggy address: [ 14.740305] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.740516] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.740853] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.741197] ^ [ 14.741458] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.741786] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.742198] ================================================================== [ 14.149891] ================================================================== [ 14.150284] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 14.150643] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.150915] [ 14.151033] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.151076] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.151091] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.151148] Call Trace: [ 14.151166] <TASK> [ 14.151183] dump_stack_lvl+0x73/0xb0 [ 14.151226] print_report+0xd1/0x650 [ 14.151249] ? __virt_addr_valid+0x1db/0x2d0 [ 14.151337] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.151362] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.151405] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.151428] kasan_report+0x141/0x180 [ 14.151466] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.151504] kasan_check_range+0x10c/0x1c0 [ 14.151528] __kasan_check_write+0x18/0x20 [ 14.151549] kasan_atomics_helper+0x7c7/0x5450 [ 14.151584] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.151607] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.151633] ? kasan_atomics+0x152/0x310 [ 14.151660] kasan_atomics+0x1dc/0x310 [ 14.151683] ? __pfx_kasan_atomics+0x10/0x10 [ 14.151707] ? __pfx_read_tsc+0x10/0x10 [ 14.151729] ? ktime_get_ts64+0x86/0x230 [ 14.151753] kunit_try_run_case+0x1a5/0x480 [ 14.151777] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.151799] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.151823] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.151845] ? __kthread_parkme+0x82/0x180 [ 14.151866] ? preempt_count_sub+0x50/0x80 [ 14.151890] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.151914] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.151938] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.151961] kthread+0x337/0x6f0 [ 14.151981] ? trace_preempt_on+0x20/0xc0 [ 14.152004] ? __pfx_kthread+0x10/0x10 [ 14.152025] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.152047] ? calculate_sigpending+0x7b/0xa0 [ 14.152071] ? __pfx_kthread+0x10/0x10 [ 14.152093] ret_from_fork+0x116/0x1d0 [ 14.152125] ? __pfx_kthread+0x10/0x10 [ 14.152145] ret_from_fork_asm+0x1a/0x30 [ 14.152215] </TASK> [ 14.152227] [ 14.161689] Allocated by task 283: [ 14.161917] kasan_save_stack+0x45/0x70 [ 14.162142] kasan_save_track+0x18/0x40 [ 14.162415] kasan_save_alloc_info+0x3b/0x50 [ 14.162643] __kasan_kmalloc+0xb7/0xc0 [ 14.162860] __kmalloc_cache_noprof+0x189/0x420 [ 14.163090] kasan_atomics+0x95/0x310 [ 14.163375] kunit_try_run_case+0x1a5/0x480 [ 14.163606] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.163820] kthread+0x337/0x6f0 [ 14.163971] ret_from_fork+0x116/0x1d0 [ 14.164116] ret_from_fork_asm+0x1a/0x30 [ 14.164508] [ 14.164584] The buggy address belongs to the object at ffff8881038eb080 [ 14.164584] which belongs to the cache kmalloc-64 of size 64 [ 14.165156] The buggy address is located 0 bytes to the right of [ 14.165156] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.165897] [ 14.166078] The buggy address belongs to the physical page: [ 14.166505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.166917] flags: 0x200000000000000(node=0|zone=2) [ 14.167196] page_type: f5(slab) [ 14.167503] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.167816] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.168224] page dumped because: kasan: bad access detected [ 14.168583] [ 14.168698] Memory state around the buggy address: [ 14.168885] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.169312] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.169760] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.170125] ^ [ 14.170605] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.170945] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.171309] ================================================================== [ 15.074504] ================================================================== [ 15.075230] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 15.075905] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 15.076575] [ 15.076767] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.076811] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.076842] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.076865] Call Trace: [ 15.076882] <TASK> [ 15.076897] dump_stack_lvl+0x73/0xb0 [ 15.076924] print_report+0xd1/0x650 [ 15.076947] ? __virt_addr_valid+0x1db/0x2d0 [ 15.076970] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.076993] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.077016] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.077038] kasan_report+0x141/0x180 [ 15.077061] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.077088] kasan_check_range+0x10c/0x1c0 [ 15.077125] __kasan_check_write+0x18/0x20 [ 15.077145] kasan_atomics_helper+0x1e12/0x5450 [ 15.077168] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.077192] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.077217] ? kasan_atomics+0x152/0x310 [ 15.077245] kasan_atomics+0x1dc/0x310 [ 15.077268] ? __pfx_kasan_atomics+0x10/0x10 [ 15.077293] ? __pfx_read_tsc+0x10/0x10 [ 15.077314] ? ktime_get_ts64+0x86/0x230 [ 15.077347] kunit_try_run_case+0x1a5/0x480 [ 15.077371] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.077393] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.077416] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.077440] ? __kthread_parkme+0x82/0x180 [ 15.077461] ? preempt_count_sub+0x50/0x80 [ 15.077485] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.077509] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.077532] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.077556] kthread+0x337/0x6f0 [ 15.077575] ? trace_preempt_on+0x20/0xc0 [ 15.077599] ? __pfx_kthread+0x10/0x10 [ 15.077619] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.077641] ? calculate_sigpending+0x7b/0xa0 [ 15.077665] ? __pfx_kthread+0x10/0x10 [ 15.077687] ret_from_fork+0x116/0x1d0 [ 15.077705] ? __pfx_kthread+0x10/0x10 [ 15.077727] ret_from_fork_asm+0x1a/0x30 [ 15.077756] </TASK> [ 15.077768] [ 15.085881] Allocated by task 283: [ 15.086078] kasan_save_stack+0x45/0x70 [ 15.086314] kasan_save_track+0x18/0x40 [ 15.086537] kasan_save_alloc_info+0x3b/0x50 [ 15.086742] __kasan_kmalloc+0xb7/0xc0 [ 15.086934] __kmalloc_cache_noprof+0x189/0x420 [ 15.087140] kasan_atomics+0x95/0x310 [ 15.087359] kunit_try_run_case+0x1a5/0x480 [ 15.087599] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.087847] kthread+0x337/0x6f0 [ 15.088079] ret_from_fork+0x116/0x1d0 [ 15.088280] ret_from_fork_asm+0x1a/0x30 [ 15.088581] [ 15.088670] The buggy address belongs to the object at ffff8881038eb080 [ 15.088670] which belongs to the cache kmalloc-64 of size 64 [ 15.089037] The buggy address is located 0 bytes to the right of [ 15.089037] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 15.089797] [ 15.089896] The buggy address belongs to the physical page: [ 15.090164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 15.090435] flags: 0x200000000000000(node=0|zone=2) [ 15.090679] page_type: f5(slab) [ 15.090861] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.091163] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.091562] page dumped because: kasan: bad access detected [ 15.091826] [ 15.091941] Memory state around the buggy address: [ 15.092106] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.092409] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.092706] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.093013] ^ [ 15.093231] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.093622] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.093924] ================================================================== [ 13.958245] ================================================================== [ 13.958688] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 13.959025] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 13.959404] [ 13.959581] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.959625] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.959637] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.959655] Call Trace: [ 13.959670] <TASK> [ 13.959694] dump_stack_lvl+0x73/0xb0 [ 13.959721] print_report+0xd1/0x650 [ 13.959741] ? __virt_addr_valid+0x1db/0x2d0 [ 13.959775] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.959805] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.959826] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.959847] kasan_report+0x141/0x180 [ 13.959880] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.959905] __asan_report_store4_noabort+0x1b/0x30 [ 13.959926] kasan_atomics_helper+0x4b6e/0x5450 [ 13.959947] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.959969] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.959993] ? kasan_atomics+0x152/0x310 [ 13.960019] kasan_atomics+0x1dc/0x310 [ 13.960041] ? __pfx_kasan_atomics+0x10/0x10 [ 13.960065] ? __pfx_read_tsc+0x10/0x10 [ 13.960085] ? ktime_get_ts64+0x86/0x230 [ 13.960119] kunit_try_run_case+0x1a5/0x480 [ 13.960142] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.960164] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.960185] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.960208] ? __kthread_parkme+0x82/0x180 [ 13.960228] ? preempt_count_sub+0x50/0x80 [ 13.960374] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.960415] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.960527] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.960553] kthread+0x337/0x6f0 [ 13.960573] ? trace_preempt_on+0x20/0xc0 [ 13.960596] ? __pfx_kthread+0x10/0x10 [ 13.960618] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.960640] ? calculate_sigpending+0x7b/0xa0 [ 13.960664] ? __pfx_kthread+0x10/0x10 [ 13.960686] ret_from_fork+0x116/0x1d0 [ 13.960704] ? __pfx_kthread+0x10/0x10 [ 13.960726] ret_from_fork_asm+0x1a/0x30 [ 13.960757] </TASK> [ 13.960768] [ 13.969868] Allocated by task 283: [ 13.970078] kasan_save_stack+0x45/0x70 [ 13.970359] kasan_save_track+0x18/0x40 [ 13.970530] kasan_save_alloc_info+0x3b/0x50 [ 13.970683] __kasan_kmalloc+0xb7/0xc0 [ 13.970819] __kmalloc_cache_noprof+0x189/0x420 [ 13.971043] kasan_atomics+0x95/0x310 [ 13.971261] kunit_try_run_case+0x1a5/0x480 [ 13.971520] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.971882] kthread+0x337/0x6f0 [ 13.972011] ret_from_fork+0x116/0x1d0 [ 13.972418] ret_from_fork_asm+0x1a/0x30 [ 13.972646] [ 13.972746] The buggy address belongs to the object at ffff8881038eb080 [ 13.972746] which belongs to the cache kmalloc-64 of size 64 [ 13.973236] The buggy address is located 0 bytes to the right of [ 13.973236] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 13.973879] [ 13.973988] The buggy address belongs to the physical page: [ 13.974389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 13.974723] flags: 0x200000000000000(node=0|zone=2) [ 13.974965] page_type: f5(slab) [ 13.975107] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.975363] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.975974] page dumped because: kasan: bad access detected [ 13.976365] [ 13.976440] Memory state around the buggy address: [ 13.976598] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.976917] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.977450] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.977786] ^ [ 13.978231] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.978598] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.978978] ================================================================== [ 14.742789] ================================================================== [ 14.743066] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 14.743673] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.743966] [ 14.744055] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.744109] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.744122] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.744162] Call Trace: [ 14.744192] <TASK> [ 14.744207] dump_stack_lvl+0x73/0xb0 [ 14.744248] print_report+0xd1/0x650 [ 14.744285] ? __virt_addr_valid+0x1db/0x2d0 [ 14.744321] ? kasan_atomics_helper+0x151d/0x5450 [ 14.744356] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.744379] ? kasan_atomics_helper+0x151d/0x5450 [ 14.744401] kasan_report+0x141/0x180 [ 14.744424] ? kasan_atomics_helper+0x151d/0x5450 [ 14.744451] kasan_check_range+0x10c/0x1c0 [ 14.744475] __kasan_check_write+0x18/0x20 [ 14.744495] kasan_atomics_helper+0x151d/0x5450 [ 14.744518] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.744541] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.744567] ? kasan_atomics+0x152/0x310 [ 14.744594] kasan_atomics+0x1dc/0x310 [ 14.744617] ? __pfx_kasan_atomics+0x10/0x10 [ 14.744642] ? __pfx_read_tsc+0x10/0x10 [ 14.744663] ? ktime_get_ts64+0x86/0x230 [ 14.744688] kunit_try_run_case+0x1a5/0x480 [ 14.744721] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.744744] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.744768] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.744792] ? __kthread_parkme+0x82/0x180 [ 14.744812] ? preempt_count_sub+0x50/0x80 [ 14.744836] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.744880] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.744904] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.744928] kthread+0x337/0x6f0 [ 14.744949] ? trace_preempt_on+0x20/0xc0 [ 14.744972] ? __pfx_kthread+0x10/0x10 [ 14.744993] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.745015] ? calculate_sigpending+0x7b/0xa0 [ 14.745040] ? __pfx_kthread+0x10/0x10 [ 14.745061] ret_from_fork+0x116/0x1d0 [ 14.745079] ? __pfx_kthread+0x10/0x10 [ 14.745110] ret_from_fork_asm+0x1a/0x30 [ 14.745141] </TASK> [ 14.745152] [ 14.753125] Allocated by task 283: [ 14.753324] kasan_save_stack+0x45/0x70 [ 14.753545] kasan_save_track+0x18/0x40 [ 14.753703] kasan_save_alloc_info+0x3b/0x50 [ 14.753918] __kasan_kmalloc+0xb7/0xc0 [ 14.754109] __kmalloc_cache_noprof+0x189/0x420 [ 14.754327] kasan_atomics+0x95/0x310 [ 14.754490] kunit_try_run_case+0x1a5/0x480 [ 14.754698] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.754930] kthread+0x337/0x6f0 [ 14.755107] ret_from_fork+0x116/0x1d0 [ 14.755296] ret_from_fork_asm+0x1a/0x30 [ 14.755493] [ 14.755590] The buggy address belongs to the object at ffff8881038eb080 [ 14.755590] which belongs to the cache kmalloc-64 of size 64 [ 14.756069] The buggy address is located 0 bytes to the right of [ 14.756069] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.756627] [ 14.756705] The buggy address belongs to the physical page: [ 14.756953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.757288] flags: 0x200000000000000(node=0|zone=2) [ 14.757509] page_type: f5(slab) [ 14.757671] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.758024] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.758437] page dumped because: kasan: bad access detected [ 14.758711] [ 14.758808] Memory state around the buggy address: [ 14.759027] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.759358] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.759670] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.759981] ^ [ 14.760208] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.760516] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.760793] ================================================================== [ 14.265426] ================================================================== [ 14.265770] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 14.266144] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.266483] [ 14.266705] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.266750] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.266764] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.266784] Call Trace: [ 14.266799] <TASK> [ 14.266814] dump_stack_lvl+0x73/0xb0 [ 14.266841] print_report+0xd1/0x650 [ 14.266863] ? __virt_addr_valid+0x1db/0x2d0 [ 14.266922] ? kasan_atomics_helper+0xac7/0x5450 [ 14.266945] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.266968] ? kasan_atomics_helper+0xac7/0x5450 [ 14.267001] kasan_report+0x141/0x180 [ 14.267025] ? kasan_atomics_helper+0xac7/0x5450 [ 14.267076] kasan_check_range+0x10c/0x1c0 [ 14.267118] __kasan_check_write+0x18/0x20 [ 14.267139] kasan_atomics_helper+0xac7/0x5450 [ 14.267161] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.267184] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.267215] ? kasan_atomics+0x152/0x310 [ 14.267309] kasan_atomics+0x1dc/0x310 [ 14.267346] ? __pfx_kasan_atomics+0x10/0x10 [ 14.267371] ? __pfx_read_tsc+0x10/0x10 [ 14.267392] ? ktime_get_ts64+0x86/0x230 [ 14.267427] kunit_try_run_case+0x1a5/0x480 [ 14.267452] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.267503] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.267528] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.267551] ? __kthread_parkme+0x82/0x180 [ 14.267582] ? preempt_count_sub+0x50/0x80 [ 14.267606] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.267657] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.267680] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.267703] kthread+0x337/0x6f0 [ 14.267734] ? trace_preempt_on+0x20/0xc0 [ 14.267758] ? __pfx_kthread+0x10/0x10 [ 14.267779] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.267801] ? calculate_sigpending+0x7b/0xa0 [ 14.267825] ? __pfx_kthread+0x10/0x10 [ 14.267848] ret_from_fork+0x116/0x1d0 [ 14.267866] ? __pfx_kthread+0x10/0x10 [ 14.267887] ret_from_fork_asm+0x1a/0x30 [ 14.267918] </TASK> [ 14.267930] [ 14.277145] Allocated by task 283: [ 14.277478] kasan_save_stack+0x45/0x70 [ 14.277726] kasan_save_track+0x18/0x40 [ 14.278119] kasan_save_alloc_info+0x3b/0x50 [ 14.278494] __kasan_kmalloc+0xb7/0xc0 [ 14.278683] __kmalloc_cache_noprof+0x189/0x420 [ 14.278844] kasan_atomics+0x95/0x310 [ 14.279030] kunit_try_run_case+0x1a5/0x480 [ 14.279405] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.279732] kthread+0x337/0x6f0 [ 14.279922] ret_from_fork+0x116/0x1d0 [ 14.280070] ret_from_fork_asm+0x1a/0x30 [ 14.280567] [ 14.280686] The buggy address belongs to the object at ffff8881038eb080 [ 14.280686] which belongs to the cache kmalloc-64 of size 64 [ 14.281085] The buggy address is located 0 bytes to the right of [ 14.281085] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.281927] [ 14.282005] The buggy address belongs to the physical page: [ 14.282202] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.282638] flags: 0x200000000000000(node=0|zone=2) [ 14.283167] page_type: f5(slab) [ 14.283414] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.283666] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.284005] page dumped because: kasan: bad access detected [ 14.284449] [ 14.284540] Memory state around the buggy address: [ 14.284739] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.285032] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.285592] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.285947] ^ [ 14.286149] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.286404] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.286948] ================================================================== [ 14.608750] ================================================================== [ 14.609762] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 14.610122] Read of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.610415] [ 14.610528] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.610571] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.610584] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.610622] Call Trace: [ 14.610637] <TASK> [ 14.610653] dump_stack_lvl+0x73/0xb0 [ 14.610680] print_report+0xd1/0x650 [ 14.610704] ? __virt_addr_valid+0x1db/0x2d0 [ 14.610727] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.610749] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.610771] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.610793] kasan_report+0x141/0x180 [ 14.610817] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.610845] __asan_report_load4_noabort+0x18/0x20 [ 14.610870] kasan_atomics_helper+0x49e8/0x5450 [ 14.610893] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.610916] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.610942] ? kasan_atomics+0x152/0x310 [ 14.610970] kasan_atomics+0x1dc/0x310 [ 14.610992] ? __pfx_kasan_atomics+0x10/0x10 [ 14.611017] ? __pfx_read_tsc+0x10/0x10 [ 14.611038] ? ktime_get_ts64+0x86/0x230 [ 14.611062] kunit_try_run_case+0x1a5/0x480 [ 14.611085] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.611118] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.611142] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.611165] ? __kthread_parkme+0x82/0x180 [ 14.611185] ? preempt_count_sub+0x50/0x80 [ 14.611215] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.611239] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.611262] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.611286] kthread+0x337/0x6f0 [ 14.611305] ? trace_preempt_on+0x20/0xc0 [ 14.611338] ? __pfx_kthread+0x10/0x10 [ 14.611360] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.611380] ? calculate_sigpending+0x7b/0xa0 [ 14.611405] ? __pfx_kthread+0x10/0x10 [ 14.611426] ret_from_fork+0x116/0x1d0 [ 14.611444] ? __pfx_kthread+0x10/0x10 [ 14.611466] ret_from_fork_asm+0x1a/0x30 [ 14.611496] </TASK> [ 14.611508] [ 14.618584] Allocated by task 283: [ 14.618732] kasan_save_stack+0x45/0x70 [ 14.618941] kasan_save_track+0x18/0x40 [ 14.619148] kasan_save_alloc_info+0x3b/0x50 [ 14.619366] __kasan_kmalloc+0xb7/0xc0 [ 14.619691] __kmalloc_cache_noprof+0x189/0x420 [ 14.619848] kasan_atomics+0x95/0x310 [ 14.619981] kunit_try_run_case+0x1a5/0x480 [ 14.620254] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.620668] kthread+0x337/0x6f0 [ 14.620845] ret_from_fork+0x116/0x1d0 [ 14.621035] ret_from_fork_asm+0x1a/0x30 [ 14.621187] [ 14.621265] The buggy address belongs to the object at ffff8881038eb080 [ 14.621265] which belongs to the cache kmalloc-64 of size 64 [ 14.621654] The buggy address is located 0 bytes to the right of [ 14.621654] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.622232] [ 14.622336] The buggy address belongs to the physical page: [ 14.622594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.622933] flags: 0x200000000000000(node=0|zone=2) [ 14.623151] page_type: f5(slab) [ 14.623284] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.623633] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.623983] page dumped because: kasan: bad access detected [ 14.624167] [ 14.624240] Memory state around the buggy address: [ 14.624467] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.624784] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.625082] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.625309] ^ [ 14.625467] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.625685] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.626001] ================================================================== [ 14.126926] ================================================================== [ 14.127416] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 14.127855] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.128250] [ 14.128357] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.128401] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.128415] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.128437] Call Trace: [ 14.128452] <TASK> [ 14.128501] dump_stack_lvl+0x73/0xb0 [ 14.128530] print_report+0xd1/0x650 [ 14.128553] ? __virt_addr_valid+0x1db/0x2d0 [ 14.128607] ? kasan_atomics_helper+0x72f/0x5450 [ 14.128629] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.128652] ? kasan_atomics_helper+0x72f/0x5450 [ 14.128685] kasan_report+0x141/0x180 [ 14.128710] ? kasan_atomics_helper+0x72f/0x5450 [ 14.128736] kasan_check_range+0x10c/0x1c0 [ 14.128786] __kasan_check_write+0x18/0x20 [ 14.128807] kasan_atomics_helper+0x72f/0x5450 [ 14.128829] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.128862] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.128888] ? kasan_atomics+0x152/0x310 [ 14.128916] kasan_atomics+0x1dc/0x310 [ 14.128938] ? __pfx_kasan_atomics+0x10/0x10 [ 14.128963] ? __pfx_read_tsc+0x10/0x10 [ 14.128984] ? ktime_get_ts64+0x86/0x230 [ 14.129034] kunit_try_run_case+0x1a5/0x480 [ 14.129058] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.129081] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.129121] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.129145] ? __kthread_parkme+0x82/0x180 [ 14.129237] ? preempt_count_sub+0x50/0x80 [ 14.129260] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.129306] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.129331] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.129355] kthread+0x337/0x6f0 [ 14.129375] ? trace_preempt_on+0x20/0xc0 [ 14.129399] ? __pfx_kthread+0x10/0x10 [ 14.129421] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.129442] ? calculate_sigpending+0x7b/0xa0 [ 14.129467] ? __pfx_kthread+0x10/0x10 [ 14.129489] ret_from_fork+0x116/0x1d0 [ 14.129508] ? __pfx_kthread+0x10/0x10 [ 14.129528] ret_from_fork_asm+0x1a/0x30 [ 14.129559] </TASK> [ 14.129572] [ 14.138907] Allocated by task 283: [ 14.139085] kasan_save_stack+0x45/0x70 [ 14.139432] kasan_save_track+0x18/0x40 [ 14.139788] kasan_save_alloc_info+0x3b/0x50 [ 14.139997] __kasan_kmalloc+0xb7/0xc0 [ 14.140230] __kmalloc_cache_noprof+0x189/0x420 [ 14.140471] kasan_atomics+0x95/0x310 [ 14.140669] kunit_try_run_case+0x1a5/0x480 [ 14.141126] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.141378] kthread+0x337/0x6f0 [ 14.141505] ret_from_fork+0x116/0x1d0 [ 14.141852] ret_from_fork_asm+0x1a/0x30 [ 14.142093] [ 14.142255] The buggy address belongs to the object at ffff8881038eb080 [ 14.142255] which belongs to the cache kmalloc-64 of size 64 [ 14.142835] The buggy address is located 0 bytes to the right of [ 14.142835] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.143739] [ 14.143844] The buggy address belongs to the physical page: [ 14.144023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.144788] flags: 0x200000000000000(node=0|zone=2) [ 14.145000] page_type: f5(slab) [ 14.145213] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.145719] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.146171] page dumped because: kasan: bad access detected [ 14.146467] [ 14.146665] Memory state around the buggy address: [ 14.146916] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.147292] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.147742] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.148077] ^ [ 14.148379] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.148950] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.149371] ================================================================== [ 14.697923] ================================================================== [ 14.698470] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 14.698782] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.699036] [ 14.699134] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.699177] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.699191] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.699216] Call Trace: [ 14.699229] <TASK> [ 14.699246] dump_stack_lvl+0x73/0xb0 [ 14.699271] print_report+0xd1/0x650 [ 14.699294] ? __virt_addr_valid+0x1db/0x2d0 [ 14.699317] ? kasan_atomics_helper+0x1467/0x5450 [ 14.699338] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.699361] ? kasan_atomics_helper+0x1467/0x5450 [ 14.699383] kasan_report+0x141/0x180 [ 14.699405] ? kasan_atomics_helper+0x1467/0x5450 [ 14.699433] kasan_check_range+0x10c/0x1c0 [ 14.699458] __kasan_check_write+0x18/0x20 [ 14.699478] kasan_atomics_helper+0x1467/0x5450 [ 14.699502] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.699525] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.699550] ? kasan_atomics+0x152/0x310 [ 14.699576] kasan_atomics+0x1dc/0x310 [ 14.699601] ? __pfx_kasan_atomics+0x10/0x10 [ 14.699625] ? __pfx_read_tsc+0x10/0x10 [ 14.699646] ? ktime_get_ts64+0x86/0x230 [ 14.699669] kunit_try_run_case+0x1a5/0x480 [ 14.699693] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.699717] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.699739] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.699762] ? __kthread_parkme+0x82/0x180 [ 14.699783] ? preempt_count_sub+0x50/0x80 [ 14.699807] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.699831] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.699867] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.699892] kthread+0x337/0x6f0 [ 14.699911] ? trace_preempt_on+0x20/0xc0 [ 14.699935] ? __pfx_kthread+0x10/0x10 [ 14.699958] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.699980] ? calculate_sigpending+0x7b/0xa0 [ 14.700004] ? __pfx_kthread+0x10/0x10 [ 14.700026] ret_from_fork+0x116/0x1d0 [ 14.700045] ? __pfx_kthread+0x10/0x10 [ 14.700066] ret_from_fork_asm+0x1a/0x30 [ 14.700106] </TASK> [ 14.700118] [ 14.715018] Allocated by task 283: [ 14.715368] kasan_save_stack+0x45/0x70 [ 14.715584] kasan_save_track+0x18/0x40 [ 14.715766] kasan_save_alloc_info+0x3b/0x50 [ 14.715969] __kasan_kmalloc+0xb7/0xc0 [ 14.716162] __kmalloc_cache_noprof+0x189/0x420 [ 14.716688] kasan_atomics+0x95/0x310 [ 14.716876] kunit_try_run_case+0x1a5/0x480 [ 14.717203] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.717409] kthread+0x337/0x6f0 [ 14.717621] ret_from_fork+0x116/0x1d0 [ 14.717805] ret_from_fork_asm+0x1a/0x30 [ 14.718009] [ 14.718107] The buggy address belongs to the object at ffff8881038eb080 [ 14.718107] which belongs to the cache kmalloc-64 of size 64 [ 14.718636] The buggy address is located 0 bytes to the right of [ 14.718636] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.719144] [ 14.719267] The buggy address belongs to the physical page: [ 14.719486] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.719802] flags: 0x200000000000000(node=0|zone=2) [ 14.720057] page_type: f5(slab) [ 14.720240] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.720532] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.720860] page dumped because: kasan: bad access detected [ 14.721113] [ 14.721203] Memory state around the buggy address: [ 14.721551] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.721853] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.722175] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.722477] ^ [ 14.722650] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.722970] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.723209] ================================================================== [ 14.781782] ================================================================== [ 14.782087] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 14.782539] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.782891] [ 14.783008] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.783049] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.783062] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.783083] Call Trace: [ 14.783108] <TASK> [ 14.783124] dump_stack_lvl+0x73/0xb0 [ 14.783150] print_report+0xd1/0x650 [ 14.783173] ? __virt_addr_valid+0x1db/0x2d0 [ 14.783195] ? kasan_atomics_helper+0x164f/0x5450 [ 14.783221] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.783245] ? kasan_atomics_helper+0x164f/0x5450 [ 14.783268] kasan_report+0x141/0x180 [ 14.783289] ? kasan_atomics_helper+0x164f/0x5450 [ 14.783317] kasan_check_range+0x10c/0x1c0 [ 14.783352] __kasan_check_write+0x18/0x20 [ 14.783373] kasan_atomics_helper+0x164f/0x5450 [ 14.783396] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.783440] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.783466] ? kasan_atomics+0x152/0x310 [ 14.783492] kasan_atomics+0x1dc/0x310 [ 14.783531] ? __pfx_kasan_atomics+0x10/0x10 [ 14.783556] ? __pfx_read_tsc+0x10/0x10 [ 14.783577] ? ktime_get_ts64+0x86/0x230 [ 14.783601] kunit_try_run_case+0x1a5/0x480 [ 14.783624] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.783647] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.783669] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.783693] ? __kthread_parkme+0x82/0x180 [ 14.783713] ? preempt_count_sub+0x50/0x80 [ 14.783737] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.783778] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.783802] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.783827] kthread+0x337/0x6f0 [ 14.783846] ? trace_preempt_on+0x20/0xc0 [ 14.783869] ? __pfx_kthread+0x10/0x10 [ 14.783890] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.783912] ? calculate_sigpending+0x7b/0xa0 [ 14.783936] ? __pfx_kthread+0x10/0x10 [ 14.783958] ret_from_fork+0x116/0x1d0 [ 14.783976] ? __pfx_kthread+0x10/0x10 [ 14.783997] ret_from_fork_asm+0x1a/0x30 [ 14.784028] </TASK> [ 14.784056] [ 14.791718] Allocated by task 283: [ 14.791929] kasan_save_stack+0x45/0x70 [ 14.792170] kasan_save_track+0x18/0x40 [ 14.792413] kasan_save_alloc_info+0x3b/0x50 [ 14.792665] __kasan_kmalloc+0xb7/0xc0 [ 14.792870] __kmalloc_cache_noprof+0x189/0x420 [ 14.793145] kasan_atomics+0x95/0x310 [ 14.793337] kunit_try_run_case+0x1a5/0x480 [ 14.793543] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.793728] kthread+0x337/0x6f0 [ 14.793847] ret_from_fork+0x116/0x1d0 [ 14.793978] ret_from_fork_asm+0x1a/0x30 [ 14.794124] [ 14.794218] The buggy address belongs to the object at ffff8881038eb080 [ 14.794218] which belongs to the cache kmalloc-64 of size 64 [ 14.795427] The buggy address is located 0 bytes to the right of [ 14.795427] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.795943] [ 14.796036] The buggy address belongs to the physical page: [ 14.796275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.797352] flags: 0x200000000000000(node=0|zone=2) [ 14.797540] page_type: f5(slab) [ 14.798355] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.798727] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.799074] page dumped because: kasan: bad access detected [ 14.799357] [ 14.799453] Memory state around the buggy address: [ 14.799652] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.799876] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.800349] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.800982] ^ [ 14.801528] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.801988] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.802542] ================================================================== [ 15.010080] ================================================================== [ 15.010524] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 15.010806] Read of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 15.011243] [ 15.011331] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.011374] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.011387] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.011409] Call Trace: [ 15.011424] <TASK> [ 15.011438] dump_stack_lvl+0x73/0xb0 [ 15.011465] print_report+0xd1/0x650 [ 15.011489] ? __virt_addr_valid+0x1db/0x2d0 [ 15.011512] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.011534] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.011557] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.011580] kasan_report+0x141/0x180 [ 15.011603] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.011631] __asan_report_load8_noabort+0x18/0x20 [ 15.011667] kasan_atomics_helper+0x4f30/0x5450 [ 15.011691] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.011714] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.011739] ? kasan_atomics+0x152/0x310 [ 15.011766] kasan_atomics+0x1dc/0x310 [ 15.011789] ? __pfx_kasan_atomics+0x10/0x10 [ 15.011813] ? __pfx_read_tsc+0x10/0x10 [ 15.011836] ? ktime_get_ts64+0x86/0x230 [ 15.011859] kunit_try_run_case+0x1a5/0x480 [ 15.011884] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.011906] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.011929] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.011953] ? __kthread_parkme+0x82/0x180 [ 15.011976] ? preempt_count_sub+0x50/0x80 [ 15.012000] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.012024] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.012047] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.012072] kthread+0x337/0x6f0 [ 15.012092] ? trace_preempt_on+0x20/0xc0 [ 15.012126] ? __pfx_kthread+0x10/0x10 [ 15.012147] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.012170] ? calculate_sigpending+0x7b/0xa0 [ 15.012193] ? __pfx_kthread+0x10/0x10 [ 15.012215] ret_from_fork+0x116/0x1d0 [ 15.012234] ? __pfx_kthread+0x10/0x10 [ 15.012255] ret_from_fork_asm+0x1a/0x30 [ 15.012286] </TASK> [ 15.012300] [ 15.019763] Allocated by task 283: [ 15.019925] kasan_save_stack+0x45/0x70 [ 15.020076] kasan_save_track+0x18/0x40 [ 15.020279] kasan_save_alloc_info+0x3b/0x50 [ 15.020571] __kasan_kmalloc+0xb7/0xc0 [ 15.020765] __kmalloc_cache_noprof+0x189/0x420 [ 15.020964] kasan_atomics+0x95/0x310 [ 15.021144] kunit_try_run_case+0x1a5/0x480 [ 15.021335] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.021572] kthread+0x337/0x6f0 [ 15.021702] ret_from_fork+0x116/0x1d0 [ 15.021836] ret_from_fork_asm+0x1a/0x30 [ 15.021977] [ 15.022050] The buggy address belongs to the object at ffff8881038eb080 [ 15.022050] which belongs to the cache kmalloc-64 of size 64 [ 15.022645] The buggy address is located 0 bytes to the right of [ 15.022645] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 15.023213] [ 15.023309] The buggy address belongs to the physical page: [ 15.023507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 15.023752] flags: 0x200000000000000(node=0|zone=2) [ 15.023920] page_type: f5(slab) [ 15.024058] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.024502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.024849] page dumped because: kasan: bad access detected [ 15.025115] [ 15.025215] Memory state around the buggy address: [ 15.025503] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.025762] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.026048] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.026380] ^ [ 15.026579] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.026867] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.027162] ================================================================== [ 15.168218] ================================================================== [ 15.168691] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 15.169009] Read of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 15.169337] [ 15.169457] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.169499] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.169512] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.169532] Call Trace: [ 15.169547] <TASK> [ 15.169563] dump_stack_lvl+0x73/0xb0 [ 15.169609] print_report+0xd1/0x650 [ 15.169631] ? __virt_addr_valid+0x1db/0x2d0 [ 15.169654] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.169676] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.169698] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.169721] kasan_report+0x141/0x180 [ 15.169759] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.169787] __asan_report_load8_noabort+0x18/0x20 [ 15.169812] kasan_atomics_helper+0x4f98/0x5450 [ 15.169836] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.169859] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.169884] ? kasan_atomics+0x152/0x310 [ 15.169926] kasan_atomics+0x1dc/0x310 [ 15.169950] ? __pfx_kasan_atomics+0x10/0x10 [ 15.169974] ? __pfx_read_tsc+0x10/0x10 [ 15.169995] ? ktime_get_ts64+0x86/0x230 [ 15.170019] kunit_try_run_case+0x1a5/0x480 [ 15.170044] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.170066] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.170089] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.170124] ? __kthread_parkme+0x82/0x180 [ 15.170145] ? preempt_count_sub+0x50/0x80 [ 15.170169] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.170193] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.170216] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.170241] kthread+0x337/0x6f0 [ 15.170261] ? trace_preempt_on+0x20/0xc0 [ 15.170285] ? __pfx_kthread+0x10/0x10 [ 15.170306] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.170344] ? calculate_sigpending+0x7b/0xa0 [ 15.170369] ? __pfx_kthread+0x10/0x10 [ 15.170391] ret_from_fork+0x116/0x1d0 [ 15.170411] ? __pfx_kthread+0x10/0x10 [ 15.170432] ret_from_fork_asm+0x1a/0x30 [ 15.170463] </TASK> [ 15.170475] [ 15.182254] Allocated by task 283: [ 15.182610] kasan_save_stack+0x45/0x70 [ 15.182970] kasan_save_track+0x18/0x40 [ 15.183360] kasan_save_alloc_info+0x3b/0x50 [ 15.183716] __kasan_kmalloc+0xb7/0xc0 [ 15.183844] __kmalloc_cache_noprof+0x189/0x420 [ 15.183995] kasan_atomics+0x95/0x310 [ 15.184135] kunit_try_run_case+0x1a5/0x480 [ 15.184279] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.184474] kthread+0x337/0x6f0 [ 15.184593] ret_from_fork+0x116/0x1d0 [ 15.184882] ret_from_fork_asm+0x1a/0x30 [ 15.185071] [ 15.185178] The buggy address belongs to the object at ffff8881038eb080 [ 15.185178] which belongs to the cache kmalloc-64 of size 64 [ 15.185598] The buggy address is located 0 bytes to the right of [ 15.185598] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 15.186061] [ 15.186144] The buggy address belongs to the physical page: [ 15.186363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 15.186778] flags: 0x200000000000000(node=0|zone=2) [ 15.187040] page_type: f5(slab) [ 15.187299] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.187558] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.187855] page dumped because: kasan: bad access detected [ 15.188117] [ 15.188215] Memory state around the buggy address: [ 15.188415] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.188735] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.189028] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.189328] ^ [ 15.189521] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.189815] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.190105] ================================================================== [ 14.194522] ================================================================== [ 14.195083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 14.195526] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.195919] [ 14.196044] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.196132] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.196147] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.196169] Call Trace: [ 14.196186] <TASK> [ 14.196214] dump_stack_lvl+0x73/0xb0 [ 14.196289] print_report+0xd1/0x650 [ 14.196336] ? __virt_addr_valid+0x1db/0x2d0 [ 14.196370] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.196393] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.196427] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.196450] kasan_report+0x141/0x180 [ 14.196474] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.196529] kasan_check_range+0x10c/0x1c0 [ 14.196553] __kasan_check_write+0x18/0x20 [ 14.196586] kasan_atomics_helper+0x8f9/0x5450 [ 14.196610] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.196633] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.196694] ? kasan_atomics+0x152/0x310 [ 14.196722] kasan_atomics+0x1dc/0x310 [ 14.196746] ? __pfx_kasan_atomics+0x10/0x10 [ 14.196781] ? __pfx_read_tsc+0x10/0x10 [ 14.196828] ? ktime_get_ts64+0x86/0x230 [ 14.196853] kunit_try_run_case+0x1a5/0x480 [ 14.196877] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.196913] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.196936] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.196985] ? __kthread_parkme+0x82/0x180 [ 14.197021] ? preempt_count_sub+0x50/0x80 [ 14.197066] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.197111] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.197134] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.197159] kthread+0x337/0x6f0 [ 14.197190] ? trace_preempt_on+0x20/0xc0 [ 14.197213] ? __pfx_kthread+0x10/0x10 [ 14.197236] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.197257] ? calculate_sigpending+0x7b/0xa0 [ 14.197281] ? __pfx_kthread+0x10/0x10 [ 14.197303] ret_from_fork+0x116/0x1d0 [ 14.197361] ? __pfx_kthread+0x10/0x10 [ 14.197386] ret_from_fork_asm+0x1a/0x30 [ 14.197418] </TASK> [ 14.197431] [ 14.206916] Allocated by task 283: [ 14.207117] kasan_save_stack+0x45/0x70 [ 14.207393] kasan_save_track+0x18/0x40 [ 14.207638] kasan_save_alloc_info+0x3b/0x50 [ 14.207864] __kasan_kmalloc+0xb7/0xc0 [ 14.208105] __kmalloc_cache_noprof+0x189/0x420 [ 14.208517] kasan_atomics+0x95/0x310 [ 14.208679] kunit_try_run_case+0x1a5/0x480 [ 14.208830] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.209009] kthread+0x337/0x6f0 [ 14.209193] ret_from_fork+0x116/0x1d0 [ 14.209595] ret_from_fork_asm+0x1a/0x30 [ 14.209833] [ 14.209932] The buggy address belongs to the object at ffff8881038eb080 [ 14.209932] which belongs to the cache kmalloc-64 of size 64 [ 14.210598] The buggy address is located 0 bytes to the right of [ 14.210598] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.211252] [ 14.211376] The buggy address belongs to the physical page: [ 14.211655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.212014] flags: 0x200000000000000(node=0|zone=2) [ 14.212424] page_type: f5(slab) [ 14.212708] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.213130] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.213496] page dumped because: kasan: bad access detected [ 14.213892] [ 14.213995] Memory state around the buggy address: [ 14.214272] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.214717] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.214947] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.215564] ^ [ 14.215784] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.216204] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.216539] ================================================================== [ 15.112527] ================================================================== [ 15.112875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 15.113501] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 15.113874] [ 15.114005] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.114049] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.114078] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.114111] Call Trace: [ 15.114126] <TASK> [ 15.114142] dump_stack_lvl+0x73/0xb0 [ 15.114169] print_report+0xd1/0x650 [ 15.114192] ? __virt_addr_valid+0x1db/0x2d0 [ 15.114214] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.114236] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.114258] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.114282] kasan_report+0x141/0x180 [ 15.114322] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.114362] kasan_check_range+0x10c/0x1c0 [ 15.114387] __kasan_check_write+0x18/0x20 [ 15.114408] kasan_atomics_helper+0x1f43/0x5450 [ 15.114431] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.114454] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.114478] ? kasan_atomics+0x152/0x310 [ 15.114505] kasan_atomics+0x1dc/0x310 [ 15.114528] ? __pfx_kasan_atomics+0x10/0x10 [ 15.114552] ? __pfx_read_tsc+0x10/0x10 [ 15.114591] ? ktime_get_ts64+0x86/0x230 [ 15.114629] kunit_try_run_case+0x1a5/0x480 [ 15.114666] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.114703] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.114754] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.114791] ? __kthread_parkme+0x82/0x180 [ 15.114824] ? preempt_count_sub+0x50/0x80 [ 15.114862] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.114899] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.114922] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.114946] kthread+0x337/0x6f0 [ 15.114966] ? trace_preempt_on+0x20/0xc0 [ 15.114989] ? __pfx_kthread+0x10/0x10 [ 15.115010] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.115033] ? calculate_sigpending+0x7b/0xa0 [ 15.115057] ? __pfx_kthread+0x10/0x10 [ 15.115078] ret_from_fork+0x116/0x1d0 [ 15.115108] ? __pfx_kthread+0x10/0x10 [ 15.115129] ret_from_fork_asm+0x1a/0x30 [ 15.115159] </TASK> [ 15.115173] [ 15.122509] Allocated by task 283: [ 15.122699] kasan_save_stack+0x45/0x70 [ 15.122930] kasan_save_track+0x18/0x40 [ 15.123092] kasan_save_alloc_info+0x3b/0x50 [ 15.123310] __kasan_kmalloc+0xb7/0xc0 [ 15.123492] __kmalloc_cache_noprof+0x189/0x420 [ 15.123705] kasan_atomics+0x95/0x310 [ 15.123883] kunit_try_run_case+0x1a5/0x480 [ 15.124121] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.124563] kthread+0x337/0x6f0 [ 15.124732] ret_from_fork+0x116/0x1d0 [ 15.124882] ret_from_fork_asm+0x1a/0x30 [ 15.125019] [ 15.125090] The buggy address belongs to the object at ffff8881038eb080 [ 15.125090] which belongs to the cache kmalloc-64 of size 64 [ 15.125763] The buggy address is located 0 bytes to the right of [ 15.125763] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 15.126355] [ 15.126457] The buggy address belongs to the physical page: [ 15.126702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 15.126998] flags: 0x200000000000000(node=0|zone=2) [ 15.127169] page_type: f5(slab) [ 15.127298] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.127666] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.128022] page dumped because: kasan: bad access detected [ 15.128304] [ 15.128434] Memory state around the buggy address: [ 15.128609] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.128885] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.129247] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.129563] ^ [ 15.129741] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.130067] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.130385] ================================================================== [ 14.470493] ================================================================== [ 14.470807] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 14.471890] Read of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.472432] [ 14.472658] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.472812] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.472830] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.472854] Call Trace: [ 14.472872] <TASK> [ 14.472889] dump_stack_lvl+0x73/0xb0 [ 14.472919] print_report+0xd1/0x650 [ 14.472944] ? __virt_addr_valid+0x1db/0x2d0 [ 14.472968] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.472989] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.473013] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.473038] kasan_report+0x141/0x180 [ 14.473061] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.473088] __asan_report_load4_noabort+0x18/0x20 [ 14.473128] kasan_atomics_helper+0x4a36/0x5450 [ 14.473151] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.473174] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.473200] ? kasan_atomics+0x152/0x310 [ 14.473226] kasan_atomics+0x1dc/0x310 [ 14.473249] ? __pfx_kasan_atomics+0x10/0x10 [ 14.473273] ? __pfx_read_tsc+0x10/0x10 [ 14.473295] ? ktime_get_ts64+0x86/0x230 [ 14.473320] kunit_try_run_case+0x1a5/0x480 [ 14.473345] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.473367] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.473390] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.473414] ? __kthread_parkme+0x82/0x180 [ 14.473435] ? preempt_count_sub+0x50/0x80 [ 14.473458] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.473483] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.473507] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.473531] kthread+0x337/0x6f0 [ 14.473551] ? trace_preempt_on+0x20/0xc0 [ 14.473575] ? __pfx_kthread+0x10/0x10 [ 14.473596] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.473617] ? calculate_sigpending+0x7b/0xa0 [ 14.473642] ? __pfx_kthread+0x10/0x10 [ 14.473664] ret_from_fork+0x116/0x1d0 [ 14.473682] ? __pfx_kthread+0x10/0x10 [ 14.473704] ret_from_fork_asm+0x1a/0x30 [ 14.473734] </TASK> [ 14.473748] [ 14.484539] Allocated by task 283: [ 14.484933] kasan_save_stack+0x45/0x70 [ 14.485241] kasan_save_track+0x18/0x40 [ 14.485520] kasan_save_alloc_info+0x3b/0x50 [ 14.485827] __kasan_kmalloc+0xb7/0xc0 [ 14.486013] __kmalloc_cache_noprof+0x189/0x420 [ 14.486238] kasan_atomics+0x95/0x310 [ 14.486473] kunit_try_run_case+0x1a5/0x480 [ 14.486947] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.487316] kthread+0x337/0x6f0 [ 14.487585] ret_from_fork+0x116/0x1d0 [ 14.487861] ret_from_fork_asm+0x1a/0x30 [ 14.488192] [ 14.488272] The buggy address belongs to the object at ffff8881038eb080 [ 14.488272] which belongs to the cache kmalloc-64 of size 64 [ 14.488987] The buggy address is located 0 bytes to the right of [ 14.488987] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.489734] [ 14.489818] The buggy address belongs to the physical page: [ 14.490076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.490693] flags: 0x200000000000000(node=0|zone=2) [ 14.490923] page_type: f5(slab) [ 14.491186] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.491646] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.492070] page dumped because: kasan: bad access detected [ 14.492459] [ 14.492668] Memory state around the buggy address: [ 14.492836] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.493089] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.493623] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.493989] ^ [ 14.494290] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.494686] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.495080] ================================================================== [ 14.417145] ================================================================== [ 14.417967] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 14.418614] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.418938] [ 14.419056] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.419110] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.419123] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.419145] Call Trace: [ 14.419158] <TASK> [ 14.419174] dump_stack_lvl+0x73/0xb0 [ 14.419211] print_report+0xd1/0x650 [ 14.419234] ? __virt_addr_valid+0x1db/0x2d0 [ 14.419257] ? kasan_atomics_helper+0xf10/0x5450 [ 14.419279] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.419303] ? kasan_atomics_helper+0xf10/0x5450 [ 14.419604] kasan_report+0x141/0x180 [ 14.419636] ? kasan_atomics_helper+0xf10/0x5450 [ 14.419665] kasan_check_range+0x10c/0x1c0 [ 14.419689] __kasan_check_write+0x18/0x20 [ 14.419710] kasan_atomics_helper+0xf10/0x5450 [ 14.419737] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.419761] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.419786] ? kasan_atomics+0x152/0x310 [ 14.419812] kasan_atomics+0x1dc/0x310 [ 14.419836] ? __pfx_kasan_atomics+0x10/0x10 [ 14.419861] ? __pfx_read_tsc+0x10/0x10 [ 14.419883] ? ktime_get_ts64+0x86/0x230 [ 14.419907] kunit_try_run_case+0x1a5/0x480 [ 14.419932] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.419954] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.419978] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.420001] ? __kthread_parkme+0x82/0x180 [ 14.420022] ? preempt_count_sub+0x50/0x80 [ 14.420047] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.420071] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.420108] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.420133] kthread+0x337/0x6f0 [ 14.420153] ? trace_preempt_on+0x20/0xc0 [ 14.420177] ? __pfx_kthread+0x10/0x10 [ 14.420198] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.420220] ? calculate_sigpending+0x7b/0xa0 [ 14.420244] ? __pfx_kthread+0x10/0x10 [ 14.420267] ret_from_fork+0x116/0x1d0 [ 14.420285] ? __pfx_kthread+0x10/0x10 [ 14.420307] ret_from_fork_asm+0x1a/0x30 [ 14.420337] </TASK> [ 14.420350] [ 14.430515] Allocated by task 283: [ 14.430840] kasan_save_stack+0x45/0x70 [ 14.431169] kasan_save_track+0x18/0x40 [ 14.431372] kasan_save_alloc_info+0x3b/0x50 [ 14.431710] __kasan_kmalloc+0xb7/0xc0 [ 14.431892] __kmalloc_cache_noprof+0x189/0x420 [ 14.432127] kasan_atomics+0x95/0x310 [ 14.432319] kunit_try_run_case+0x1a5/0x480 [ 14.432757] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.433075] kthread+0x337/0x6f0 [ 14.433243] ret_from_fork+0x116/0x1d0 [ 14.433616] ret_from_fork_asm+0x1a/0x30 [ 14.433885] [ 14.433991] The buggy address belongs to the object at ffff8881038eb080 [ 14.433991] which belongs to the cache kmalloc-64 of size 64 [ 14.434769] The buggy address is located 0 bytes to the right of [ 14.434769] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.435424] [ 14.435525] The buggy address belongs to the physical page: [ 14.435888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.436296] flags: 0x200000000000000(node=0|zone=2) [ 14.436594] page_type: f5(slab) [ 14.436918] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.437352] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.437803] page dumped because: kasan: bad access detected [ 14.438137] [ 14.438239] Memory state around the buggy address: [ 14.438637] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.438948] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.439267] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.439792] ^ [ 14.440114] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.440595] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.440894] ================================================================== [ 14.240147] ================================================================== [ 14.240648] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 14.240982] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.241374] [ 14.241508] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.241584] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.241598] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.241648] Call Trace: [ 14.241666] <TASK> [ 14.241682] dump_stack_lvl+0x73/0xb0 [ 14.241721] print_report+0xd1/0x650 [ 14.241744] ? __virt_addr_valid+0x1db/0x2d0 [ 14.241767] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.241788] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.241837] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.241861] kasan_report+0x141/0x180 [ 14.241885] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.241923] kasan_check_range+0x10c/0x1c0 [ 14.241947] __kasan_check_write+0x18/0x20 [ 14.241966] kasan_atomics_helper+0xa2b/0x5450 [ 14.241989] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.242012] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.242037] ? kasan_atomics+0x152/0x310 [ 14.242064] kasan_atomics+0x1dc/0x310 [ 14.242088] ? __pfx_kasan_atomics+0x10/0x10 [ 14.242123] ? __pfx_read_tsc+0x10/0x10 [ 14.242144] ? ktime_get_ts64+0x86/0x230 [ 14.242212] kunit_try_run_case+0x1a5/0x480 [ 14.242238] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.242261] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.242327] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.242352] ? __kthread_parkme+0x82/0x180 [ 14.242402] ? preempt_count_sub+0x50/0x80 [ 14.242439] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.242463] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.242498] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.242522] kthread+0x337/0x6f0 [ 14.242543] ? trace_preempt_on+0x20/0xc0 [ 14.242594] ? __pfx_kthread+0x10/0x10 [ 14.242616] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.242639] ? calculate_sigpending+0x7b/0xa0 [ 14.242675] ? __pfx_kthread+0x10/0x10 [ 14.242697] ret_from_fork+0x116/0x1d0 [ 14.242716] ? __pfx_kthread+0x10/0x10 [ 14.242738] ret_from_fork_asm+0x1a/0x30 [ 14.242769] </TASK> [ 14.242781] [ 14.252619] Allocated by task 283: [ 14.252846] kasan_save_stack+0x45/0x70 [ 14.253039] kasan_save_track+0x18/0x40 [ 14.253320] kasan_save_alloc_info+0x3b/0x50 [ 14.253669] __kasan_kmalloc+0xb7/0xc0 [ 14.253879] __kmalloc_cache_noprof+0x189/0x420 [ 14.254182] kasan_atomics+0x95/0x310 [ 14.255407] kunit_try_run_case+0x1a5/0x480 [ 14.255723] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.255903] kthread+0x337/0x6f0 [ 14.256026] ret_from_fork+0x116/0x1d0 [ 14.256268] ret_from_fork_asm+0x1a/0x30 [ 14.256708] [ 14.256915] The buggy address belongs to the object at ffff8881038eb080 [ 14.256915] which belongs to the cache kmalloc-64 of size 64 [ 14.258171] The buggy address is located 0 bytes to the right of [ 14.258171] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.259541] [ 14.259725] The buggy address belongs to the physical page: [ 14.260137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.260712] flags: 0x200000000000000(node=0|zone=2) [ 14.260886] page_type: f5(slab) [ 14.261011] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.261323] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.261784] page dumped because: kasan: bad access detected [ 14.262046] [ 14.262205] Memory state around the buggy address: [ 14.262563] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.262910] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.263404] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.263717] ^ [ 14.263926] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.264446] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.264756] ================================================================== [ 14.626653] ================================================================== [ 14.626999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 14.627363] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.627954] [ 14.628069] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.628126] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.628140] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.628175] Call Trace: [ 14.628189] <TASK> [ 14.628204] dump_stack_lvl+0x73/0xb0 [ 14.628231] print_report+0xd1/0x650 [ 14.628254] ? __virt_addr_valid+0x1db/0x2d0 [ 14.628278] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.628300] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.628323] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.628344] kasan_report+0x141/0x180 [ 14.628367] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.628394] kasan_check_range+0x10c/0x1c0 [ 14.628418] __kasan_check_write+0x18/0x20 [ 14.628437] kasan_atomics_helper+0x12e6/0x5450 [ 14.628460] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.628483] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.628507] ? kasan_atomics+0x152/0x310 [ 14.628533] kasan_atomics+0x1dc/0x310 [ 14.628557] ? __pfx_kasan_atomics+0x10/0x10 [ 14.628580] ? __pfx_read_tsc+0x10/0x10 [ 14.628602] ? ktime_get_ts64+0x86/0x230 [ 14.628625] kunit_try_run_case+0x1a5/0x480 [ 14.628650] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.628672] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.628695] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.628718] ? __kthread_parkme+0x82/0x180 [ 14.628738] ? preempt_count_sub+0x50/0x80 [ 14.628762] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.628785] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.628809] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.628833] kthread+0x337/0x6f0 [ 14.628853] ? trace_preempt_on+0x20/0xc0 [ 14.628876] ? __pfx_kthread+0x10/0x10 [ 14.628897] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.628919] ? calculate_sigpending+0x7b/0xa0 [ 14.628942] ? __pfx_kthread+0x10/0x10 [ 14.628964] ret_from_fork+0x116/0x1d0 [ 14.628982] ? __pfx_kthread+0x10/0x10 [ 14.629003] ret_from_fork_asm+0x1a/0x30 [ 14.629034] </TASK> [ 14.629047] [ 14.636580] Allocated by task 283: [ 14.636717] kasan_save_stack+0x45/0x70 [ 14.636893] kasan_save_track+0x18/0x40 [ 14.637089] kasan_save_alloc_info+0x3b/0x50 [ 14.637317] __kasan_kmalloc+0xb7/0xc0 [ 14.637491] __kmalloc_cache_noprof+0x189/0x420 [ 14.637707] kasan_atomics+0x95/0x310 [ 14.637862] kunit_try_run_case+0x1a5/0x480 [ 14.638075] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.638310] kthread+0x337/0x6f0 [ 14.638485] ret_from_fork+0x116/0x1d0 [ 14.638630] ret_from_fork_asm+0x1a/0x30 [ 14.638816] [ 14.638904] The buggy address belongs to the object at ffff8881038eb080 [ 14.638904] which belongs to the cache kmalloc-64 of size 64 [ 14.639438] The buggy address is located 0 bytes to the right of [ 14.639438] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.639857] [ 14.639954] The buggy address belongs to the physical page: [ 14.640203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.640467] flags: 0x200000000000000(node=0|zone=2) [ 14.640820] page_type: f5(slab) [ 14.640995] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.641324] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.641669] page dumped because: kasan: bad access detected [ 14.641906] [ 14.641991] Memory state around the buggy address: [ 14.642199] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.642419] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.642642] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.642860] ^ [ 14.643018] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.643311] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.643642] ================================================================== [ 14.377443] ================================================================== [ 14.377756] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 14.378078] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.378498] [ 14.378607] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.378650] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.378662] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.378683] Call Trace: [ 14.378700] <TASK> [ 14.378714] dump_stack_lvl+0x73/0xb0 [ 14.378757] print_report+0xd1/0x650 [ 14.378780] ? __virt_addr_valid+0x1db/0x2d0 [ 14.378803] ? kasan_atomics_helper+0xde0/0x5450 [ 14.378824] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.378846] ? kasan_atomics_helper+0xde0/0x5450 [ 14.378869] kasan_report+0x141/0x180 [ 14.378892] ? kasan_atomics_helper+0xde0/0x5450 [ 14.378918] kasan_check_range+0x10c/0x1c0 [ 14.378942] __kasan_check_write+0x18/0x20 [ 14.378962] kasan_atomics_helper+0xde0/0x5450 [ 14.378985] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.379008] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.379034] ? kasan_atomics+0x152/0x310 [ 14.379061] kasan_atomics+0x1dc/0x310 [ 14.379084] ? __pfx_kasan_atomics+0x10/0x10 [ 14.379121] ? __pfx_read_tsc+0x10/0x10 [ 14.379206] ? ktime_get_ts64+0x86/0x230 [ 14.379234] kunit_try_run_case+0x1a5/0x480 [ 14.379258] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.379281] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.379304] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.379327] ? __kthread_parkme+0x82/0x180 [ 14.379364] ? preempt_count_sub+0x50/0x80 [ 14.379388] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.379413] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.379438] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.379462] kthread+0x337/0x6f0 [ 14.379482] ? trace_preempt_on+0x20/0xc0 [ 14.379507] ? __pfx_kthread+0x10/0x10 [ 14.379528] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.379550] ? calculate_sigpending+0x7b/0xa0 [ 14.379573] ? __pfx_kthread+0x10/0x10 [ 14.379596] ret_from_fork+0x116/0x1d0 [ 14.379615] ? __pfx_kthread+0x10/0x10 [ 14.379637] ret_from_fork_asm+0x1a/0x30 [ 14.379668] </TASK> [ 14.379679] [ 14.387623] Allocated by task 283: [ 14.387814] kasan_save_stack+0x45/0x70 [ 14.388024] kasan_save_track+0x18/0x40 [ 14.388392] kasan_save_alloc_info+0x3b/0x50 [ 14.388617] __kasan_kmalloc+0xb7/0xc0 [ 14.388816] __kmalloc_cache_noprof+0x189/0x420 [ 14.389013] kasan_atomics+0x95/0x310 [ 14.389277] kunit_try_run_case+0x1a5/0x480 [ 14.389508] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.389739] kthread+0x337/0x6f0 [ 14.389899] ret_from_fork+0x116/0x1d0 [ 14.390056] ret_from_fork_asm+0x1a/0x30 [ 14.390309] [ 14.390433] The buggy address belongs to the object at ffff8881038eb080 [ 14.390433] which belongs to the cache kmalloc-64 of size 64 [ 14.390915] The buggy address is located 0 bytes to the right of [ 14.390915] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.391442] [ 14.391519] The buggy address belongs to the physical page: [ 14.391694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.392040] flags: 0x200000000000000(node=0|zone=2) [ 14.392361] page_type: f5(slab) [ 14.392539] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.392885] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.393375] page dumped because: kasan: bad access detected [ 14.393588] [ 14.393663] Memory state around the buggy address: [ 14.393860] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.394268] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.394614] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.394943] ^ [ 14.395266] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.395625] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.395899] ================================================================== [ 14.974583] ================================================================== [ 14.974892] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 14.975291] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.975660] [ 14.975775] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.975820] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.975833] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.975856] Call Trace: [ 14.975872] <TASK> [ 14.975889] dump_stack_lvl+0x73/0xb0 [ 14.975916] print_report+0xd1/0x650 [ 14.975938] ? __virt_addr_valid+0x1db/0x2d0 [ 14.975963] ? kasan_atomics_helper+0x1b22/0x5450 [ 14.975984] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.976008] ? kasan_atomics_helper+0x1b22/0x5450 [ 14.976030] kasan_report+0x141/0x180 [ 14.976052] ? kasan_atomics_helper+0x1b22/0x5450 [ 14.976079] kasan_check_range+0x10c/0x1c0 [ 14.976123] __kasan_check_write+0x18/0x20 [ 14.976145] kasan_atomics_helper+0x1b22/0x5450 [ 14.976167] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.976190] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.976215] ? kasan_atomics+0x152/0x310 [ 14.976243] kasan_atomics+0x1dc/0x310 [ 14.976267] ? __pfx_kasan_atomics+0x10/0x10 [ 14.976291] ? __pfx_read_tsc+0x10/0x10 [ 14.976312] ? ktime_get_ts64+0x86/0x230 [ 14.976336] kunit_try_run_case+0x1a5/0x480 [ 14.976361] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.976383] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.976406] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.976429] ? __kthread_parkme+0x82/0x180 [ 14.976450] ? preempt_count_sub+0x50/0x80 [ 14.976475] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.976500] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.976524] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.976549] kthread+0x337/0x6f0 [ 14.976569] ? trace_preempt_on+0x20/0xc0 [ 14.976593] ? __pfx_kthread+0x10/0x10 [ 14.976614] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.976646] ? calculate_sigpending+0x7b/0xa0 [ 14.976670] ? __pfx_kthread+0x10/0x10 [ 14.976692] ret_from_fork+0x116/0x1d0 [ 14.976710] ? __pfx_kthread+0x10/0x10 [ 14.976732] ret_from_fork_asm+0x1a/0x30 [ 14.976762] </TASK> [ 14.976773] [ 14.984311] Allocated by task 283: [ 14.984446] kasan_save_stack+0x45/0x70 [ 14.984594] kasan_save_track+0x18/0x40 [ 14.984732] kasan_save_alloc_info+0x3b/0x50 [ 14.984986] __kasan_kmalloc+0xb7/0xc0 [ 14.985183] __kmalloc_cache_noprof+0x189/0x420 [ 14.985536] kasan_atomics+0x95/0x310 [ 14.985726] kunit_try_run_case+0x1a5/0x480 [ 14.985933] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.986196] kthread+0x337/0x6f0 [ 14.986332] ret_from_fork+0x116/0x1d0 [ 14.986517] ret_from_fork_asm+0x1a/0x30 [ 14.986659] [ 14.986733] The buggy address belongs to the object at ffff8881038eb080 [ 14.986733] which belongs to the cache kmalloc-64 of size 64 [ 14.987247] The buggy address is located 0 bytes to the right of [ 14.987247] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.987908] [ 14.987989] The buggy address belongs to the physical page: [ 14.988209] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.988577] flags: 0x200000000000000(node=0|zone=2) [ 14.988803] page_type: f5(slab) [ 14.988941] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.989242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.989604] page dumped because: kasan: bad access detected [ 14.989799] [ 14.989872] Memory state around the buggy address: [ 14.990030] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.990339] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.990659] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.990940] ^ [ 14.991153] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.991534] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.991801] ================================================================== [ 14.038813] ================================================================== [ 14.039222] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 14.039887] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.040367] [ 14.040458] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.040503] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.040516] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.040538] Call Trace: [ 14.040552] <TASK> [ 14.040568] dump_stack_lvl+0x73/0xb0 [ 14.040596] print_report+0xd1/0x650 [ 14.040619] ? __virt_addr_valid+0x1db/0x2d0 [ 14.040642] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.040678] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.040701] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.040735] kasan_report+0x141/0x180 [ 14.040758] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.040784] __asan_report_store4_noabort+0x1b/0x30 [ 14.040805] kasan_atomics_helper+0x4b3a/0x5450 [ 14.040839] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.040862] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.040897] ? kasan_atomics+0x152/0x310 [ 14.040925] kasan_atomics+0x1dc/0x310 [ 14.040948] ? __pfx_kasan_atomics+0x10/0x10 [ 14.040973] ? __pfx_read_tsc+0x10/0x10 [ 14.041002] ? ktime_get_ts64+0x86/0x230 [ 14.041026] kunit_try_run_case+0x1a5/0x480 [ 14.041049] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.041084] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.041118] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.041141] ? __kthread_parkme+0x82/0x180 [ 14.041161] ? preempt_count_sub+0x50/0x80 [ 14.041195] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.041218] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.041242] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.041315] kthread+0x337/0x6f0 [ 14.041349] ? trace_preempt_on+0x20/0xc0 [ 14.041383] ? __pfx_kthread+0x10/0x10 [ 14.041405] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.041427] ? calculate_sigpending+0x7b/0xa0 [ 14.041461] ? __pfx_kthread+0x10/0x10 [ 14.041483] ret_from_fork+0x116/0x1d0 [ 14.041502] ? __pfx_kthread+0x10/0x10 [ 14.041523] ret_from_fork_asm+0x1a/0x30 [ 14.041563] </TASK> [ 14.041576] [ 14.049920] Allocated by task 283: [ 14.050078] kasan_save_stack+0x45/0x70 [ 14.050337] kasan_save_track+0x18/0x40 [ 14.050655] kasan_save_alloc_info+0x3b/0x50 [ 14.050887] __kasan_kmalloc+0xb7/0xc0 [ 14.051084] __kmalloc_cache_noprof+0x189/0x420 [ 14.051286] kasan_atomics+0x95/0x310 [ 14.051557] kunit_try_run_case+0x1a5/0x480 [ 14.051731] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.051912] kthread+0x337/0x6f0 [ 14.052037] ret_from_fork+0x116/0x1d0 [ 14.052219] ret_from_fork_asm+0x1a/0x30 [ 14.052578] [ 14.052754] The buggy address belongs to the object at ffff8881038eb080 [ 14.052754] which belongs to the cache kmalloc-64 of size 64 [ 14.053256] The buggy address is located 0 bytes to the right of [ 14.053256] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.053903] [ 14.054033] The buggy address belongs to the physical page: [ 14.054411] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.054997] flags: 0x200000000000000(node=0|zone=2) [ 14.055494] page_type: f5(slab) [ 14.055642] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.055880] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.056210] page dumped because: kasan: bad access detected [ 14.056464] [ 14.056560] Memory state around the buggy address: [ 14.056783] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.057084] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.057314] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.057533] ^ [ 14.057797] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.058142] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.058698] ================================================================== [ 14.644584] ================================================================== [ 14.644927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 14.645231] Read of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.645867] [ 14.645987] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.646032] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.646048] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.646071] Call Trace: [ 14.646086] <TASK> [ 14.646113] dump_stack_lvl+0x73/0xb0 [ 14.646140] print_report+0xd1/0x650 [ 14.646164] ? __virt_addr_valid+0x1db/0x2d0 [ 14.646186] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.646208] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.646232] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.646254] kasan_report+0x141/0x180 [ 14.646277] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.646304] __asan_report_load4_noabort+0x18/0x20 [ 14.646338] kasan_atomics_helper+0x49ce/0x5450 [ 14.646362] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.646384] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.646410] ? kasan_atomics+0x152/0x310 [ 14.646437] kasan_atomics+0x1dc/0x310 [ 14.646459] ? __pfx_kasan_atomics+0x10/0x10 [ 14.646484] ? __pfx_read_tsc+0x10/0x10 [ 14.646504] ? ktime_get_ts64+0x86/0x230 [ 14.646529] kunit_try_run_case+0x1a5/0x480 [ 14.646553] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.646575] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.646597] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.646620] ? __kthread_parkme+0x82/0x180 [ 14.646641] ? preempt_count_sub+0x50/0x80 [ 14.646664] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.646687] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.646710] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.646734] kthread+0x337/0x6f0 [ 14.646753] ? trace_preempt_on+0x20/0xc0 [ 14.646776] ? __pfx_kthread+0x10/0x10 [ 14.646798] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.646819] ? calculate_sigpending+0x7b/0xa0 [ 14.646842] ? __pfx_kthread+0x10/0x10 [ 14.646864] ret_from_fork+0x116/0x1d0 [ 14.646884] ? __pfx_kthread+0x10/0x10 [ 14.646905] ret_from_fork_asm+0x1a/0x30 [ 14.646935] </TASK> [ 14.646947] [ 14.654149] Allocated by task 283: [ 14.654341] kasan_save_stack+0x45/0x70 [ 14.654546] kasan_save_track+0x18/0x40 [ 14.654699] kasan_save_alloc_info+0x3b/0x50 [ 14.654852] __kasan_kmalloc+0xb7/0xc0 [ 14.655042] __kmalloc_cache_noprof+0x189/0x420 [ 14.655284] kasan_atomics+0x95/0x310 [ 14.655546] kunit_try_run_case+0x1a5/0x480 [ 14.655727] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.655961] kthread+0x337/0x6f0 [ 14.656136] ret_from_fork+0x116/0x1d0 [ 14.656304] ret_from_fork_asm+0x1a/0x30 [ 14.656480] [ 14.656554] The buggy address belongs to the object at ffff8881038eb080 [ 14.656554] which belongs to the cache kmalloc-64 of size 64 [ 14.656985] The buggy address is located 0 bytes to the right of [ 14.656985] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.657675] [ 14.657751] The buggy address belongs to the physical page: [ 14.657926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.658248] flags: 0x200000000000000(node=0|zone=2) [ 14.658688] page_type: f5(slab) [ 14.658862] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.659224] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.659595] page dumped because: kasan: bad access detected [ 14.659807] [ 14.659903] Memory state around the buggy address: [ 14.660139] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.660437] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.660788] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.661037] ^ [ 14.661205] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.661425] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.661641] ================================================================== [ 14.925513] ================================================================== [ 14.926278] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 14.926722] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.927241] [ 14.927536] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.927585] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.927600] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.927623] Call Trace: [ 14.927637] <TASK> [ 14.927652] dump_stack_lvl+0x73/0xb0 [ 14.927681] print_report+0xd1/0x650 [ 14.927705] ? __virt_addr_valid+0x1db/0x2d0 [ 14.927727] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.927749] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.927774] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.927797] kasan_report+0x141/0x180 [ 14.927819] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.927846] kasan_check_range+0x10c/0x1c0 [ 14.927871] __kasan_check_write+0x18/0x20 [ 14.927890] kasan_atomics_helper+0x19e3/0x5450 [ 14.927913] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.927936] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.927961] ? kasan_atomics+0x152/0x310 [ 14.927989] kasan_atomics+0x1dc/0x310 [ 14.928011] ? __pfx_kasan_atomics+0x10/0x10 [ 14.928036] ? __pfx_read_tsc+0x10/0x10 [ 14.928056] ? ktime_get_ts64+0x86/0x230 [ 14.928080] kunit_try_run_case+0x1a5/0x480 [ 14.928119] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.928141] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.928164] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.928188] ? __kthread_parkme+0x82/0x180 [ 14.928208] ? preempt_count_sub+0x50/0x80 [ 14.928232] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.928256] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.928279] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.928302] kthread+0x337/0x6f0 [ 14.928334] ? trace_preempt_on+0x20/0xc0 [ 14.928357] ? __pfx_kthread+0x10/0x10 [ 14.928378] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.928400] ? calculate_sigpending+0x7b/0xa0 [ 14.928425] ? __pfx_kthread+0x10/0x10 [ 14.928448] ret_from_fork+0x116/0x1d0 [ 14.928467] ? __pfx_kthread+0x10/0x10 [ 14.928489] ret_from_fork_asm+0x1a/0x30 [ 14.928519] </TASK> [ 14.928531] [ 14.938927] Allocated by task 283: [ 14.939316] kasan_save_stack+0x45/0x70 [ 14.939624] kasan_save_track+0x18/0x40 [ 14.939893] kasan_save_alloc_info+0x3b/0x50 [ 14.940193] __kasan_kmalloc+0xb7/0xc0 [ 14.940570] __kmalloc_cache_noprof+0x189/0x420 [ 14.940880] kasan_atomics+0x95/0x310 [ 14.941165] kunit_try_run_case+0x1a5/0x480 [ 14.941532] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.941761] kthread+0x337/0x6f0 [ 14.941932] ret_from_fork+0x116/0x1d0 [ 14.942120] ret_from_fork_asm+0x1a/0x30 [ 14.942310] [ 14.942713] The buggy address belongs to the object at ffff8881038eb080 [ 14.942713] which belongs to the cache kmalloc-64 of size 64 [ 14.943297] The buggy address is located 0 bytes to the right of [ 14.943297] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.944083] [ 14.944313] The buggy address belongs to the physical page: [ 14.944663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.945109] flags: 0x200000000000000(node=0|zone=2) [ 14.945327] page_type: f5(slab) [ 14.945568] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.946148] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.946576] page dumped because: kasan: bad access detected [ 14.946909] [ 14.947128] Memory state around the buggy address: [ 14.947534] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.947852] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.948269] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.948670] ^ [ 14.948904] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.949174] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.949708] ================================================================== [ 14.171727] ================================================================== [ 14.172052] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 14.172297] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.172942] [ 14.173029] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.173072] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.173085] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.173116] Call Trace: [ 14.173130] <TASK> [ 14.173145] dump_stack_lvl+0x73/0xb0 [ 14.173172] print_report+0xd1/0x650 [ 14.173195] ? __virt_addr_valid+0x1db/0x2d0 [ 14.173218] ? kasan_atomics_helper+0x860/0x5450 [ 14.173240] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.173263] ? kasan_atomics_helper+0x860/0x5450 [ 14.173285] kasan_report+0x141/0x180 [ 14.173308] ? kasan_atomics_helper+0x860/0x5450 [ 14.173335] kasan_check_range+0x10c/0x1c0 [ 14.173359] __kasan_check_write+0x18/0x20 [ 14.173379] kasan_atomics_helper+0x860/0x5450 [ 14.173404] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.173428] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.173453] ? kasan_atomics+0x152/0x310 [ 14.173480] kasan_atomics+0x1dc/0x310 [ 14.173536] ? __pfx_kasan_atomics+0x10/0x10 [ 14.173561] ? __pfx_read_tsc+0x10/0x10 [ 14.173582] ? ktime_get_ts64+0x86/0x230 [ 14.173646] kunit_try_run_case+0x1a5/0x480 [ 14.173749] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.173774] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.173798] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.173821] ? __kthread_parkme+0x82/0x180 [ 14.173842] ? preempt_count_sub+0x50/0x80 [ 14.173866] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.173889] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.173913] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.173966] kthread+0x337/0x6f0 [ 14.173986] ? trace_preempt_on+0x20/0xc0 [ 14.174010] ? __pfx_kthread+0x10/0x10 [ 14.174043] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.174066] ? calculate_sigpending+0x7b/0xa0 [ 14.174091] ? __pfx_kthread+0x10/0x10 [ 14.174122] ret_from_fork+0x116/0x1d0 [ 14.174141] ? __pfx_kthread+0x10/0x10 [ 14.174204] ret_from_fork_asm+0x1a/0x30 [ 14.174269] </TASK> [ 14.174282] [ 14.183728] Allocated by task 283: [ 14.183922] kasan_save_stack+0x45/0x70 [ 14.184126] kasan_save_track+0x18/0x40 [ 14.184322] kasan_save_alloc_info+0x3b/0x50 [ 14.185040] __kasan_kmalloc+0xb7/0xc0 [ 14.185423] __kmalloc_cache_noprof+0x189/0x420 [ 14.185663] kasan_atomics+0x95/0x310 [ 14.185801] kunit_try_run_case+0x1a5/0x480 [ 14.185945] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.186140] kthread+0x337/0x6f0 [ 14.186635] ret_from_fork+0x116/0x1d0 [ 14.186979] ret_from_fork_asm+0x1a/0x30 [ 14.187136] [ 14.187217] The buggy address belongs to the object at ffff8881038eb080 [ 14.187217] which belongs to the cache kmalloc-64 of size 64 [ 14.187564] The buggy address is located 0 bytes to the right of [ 14.187564] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.188693] [ 14.188774] The buggy address belongs to the physical page: [ 14.189504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.189838] flags: 0x200000000000000(node=0|zone=2) [ 14.190004] page_type: f5(slab) [ 14.190517] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.191088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.191477] page dumped because: kasan: bad access detected [ 14.191655] [ 14.191728] Memory state around the buggy address: [ 14.191885] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.192191] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.192640] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.192994] ^ [ 14.193319] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.193643] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.193856] ================================================================== [ 14.396367] ================================================================== [ 14.396715] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 14.397013] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.397408] [ 14.397521] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.397562] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.397576] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.397598] Call Trace: [ 14.397614] <TASK> [ 14.397629] dump_stack_lvl+0x73/0xb0 [ 14.397656] print_report+0xd1/0x650 [ 14.397679] ? __virt_addr_valid+0x1db/0x2d0 [ 14.397701] ? kasan_atomics_helper+0xe78/0x5450 [ 14.397723] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.397746] ? kasan_atomics_helper+0xe78/0x5450 [ 14.397768] kasan_report+0x141/0x180 [ 14.397790] ? kasan_atomics_helper+0xe78/0x5450 [ 14.397818] kasan_check_range+0x10c/0x1c0 [ 14.397843] __kasan_check_write+0x18/0x20 [ 14.397864] kasan_atomics_helper+0xe78/0x5450 [ 14.397887] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.397910] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.397938] ? kasan_atomics+0x152/0x310 [ 14.397965] kasan_atomics+0x1dc/0x310 [ 14.397989] ? __pfx_kasan_atomics+0x10/0x10 [ 14.398013] ? __pfx_read_tsc+0x10/0x10 [ 14.398035] ? ktime_get_ts64+0x86/0x230 [ 14.398059] kunit_try_run_case+0x1a5/0x480 [ 14.398083] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.398117] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.398203] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.398230] ? __kthread_parkme+0x82/0x180 [ 14.398251] ? preempt_count_sub+0x50/0x80 [ 14.398274] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.398299] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.398322] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.398362] kthread+0x337/0x6f0 [ 14.398383] ? trace_preempt_on+0x20/0xc0 [ 14.398407] ? __pfx_kthread+0x10/0x10 [ 14.398428] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.398454] ? calculate_sigpending+0x7b/0xa0 [ 14.398480] ? __pfx_kthread+0x10/0x10 [ 14.398504] ret_from_fork+0x116/0x1d0 [ 14.398524] ? __pfx_kthread+0x10/0x10 [ 14.398545] ret_from_fork_asm+0x1a/0x30 [ 14.398576] </TASK> [ 14.398590] [ 14.406645] Allocated by task 283: [ 14.406832] kasan_save_stack+0x45/0x70 [ 14.407039] kasan_save_track+0x18/0x40 [ 14.407464] kasan_save_alloc_info+0x3b/0x50 [ 14.407679] __kasan_kmalloc+0xb7/0xc0 [ 14.407850] __kmalloc_cache_noprof+0x189/0x420 [ 14.408035] kasan_atomics+0x95/0x310 [ 14.408275] kunit_try_run_case+0x1a5/0x480 [ 14.408512] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.408757] kthread+0x337/0x6f0 [ 14.408907] ret_from_fork+0x116/0x1d0 [ 14.409119] ret_from_fork_asm+0x1a/0x30 [ 14.409384] [ 14.409460] The buggy address belongs to the object at ffff8881038eb080 [ 14.409460] which belongs to the cache kmalloc-64 of size 64 [ 14.409843] The buggy address is located 0 bytes to the right of [ 14.409843] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.410481] [ 14.410584] The buggy address belongs to the physical page: [ 14.410801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.411046] flags: 0x200000000000000(node=0|zone=2) [ 14.411384] page_type: f5(slab) [ 14.411556] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.411901] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.412245] page dumped because: kasan: bad access detected [ 14.412487] [ 14.412582] Memory state around the buggy address: [ 14.412761] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.413076] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.413599] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.413861] ^ [ 14.414021] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.414426] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.414748] ================================================================== [ 15.046974] ================================================================== [ 15.047507] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 15.047854] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 15.048200] [ 15.048311] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.049175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.049194] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.049217] Call Trace: [ 15.049235] <TASK> [ 15.049250] dump_stack_lvl+0x73/0xb0 [ 15.049280] print_report+0xd1/0x650 [ 15.049304] ? __virt_addr_valid+0x1db/0x2d0 [ 15.049336] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.049358] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.049382] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.049404] kasan_report+0x141/0x180 [ 15.049427] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.049456] kasan_check_range+0x10c/0x1c0 [ 15.049482] __kasan_check_write+0x18/0x20 [ 15.049503] kasan_atomics_helper+0x1d7a/0x5450 [ 15.049527] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.049550] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.049575] ? kasan_atomics+0x152/0x310 [ 15.049601] kasan_atomics+0x1dc/0x310 [ 15.049624] ? __pfx_kasan_atomics+0x10/0x10 [ 15.049649] ? __pfx_read_tsc+0x10/0x10 [ 15.049673] ? ktime_get_ts64+0x86/0x230 [ 15.049697] kunit_try_run_case+0x1a5/0x480 [ 15.049722] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.049744] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.049766] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.049789] ? __kthread_parkme+0x82/0x180 [ 15.049809] ? preempt_count_sub+0x50/0x80 [ 15.049833] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.049858] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.049880] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.049903] kthread+0x337/0x6f0 [ 15.049923] ? trace_preempt_on+0x20/0xc0 [ 15.049947] ? __pfx_kthread+0x10/0x10 [ 15.049967] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.049989] ? calculate_sigpending+0x7b/0xa0 [ 15.050012] ? __pfx_kthread+0x10/0x10 [ 15.050033] ret_from_fork+0x116/0x1d0 [ 15.050053] ? __pfx_kthread+0x10/0x10 [ 15.050073] ret_from_fork_asm+0x1a/0x30 [ 15.050114] </TASK> [ 15.050126] [ 15.062482] Allocated by task 283: [ 15.062619] kasan_save_stack+0x45/0x70 [ 15.062764] kasan_save_track+0x18/0x40 [ 15.062897] kasan_save_alloc_info+0x3b/0x50 [ 15.063039] __kasan_kmalloc+0xb7/0xc0 [ 15.063381] __kmalloc_cache_noprof+0x189/0x420 [ 15.063538] kasan_atomics+0x95/0x310 [ 15.063668] kunit_try_run_case+0x1a5/0x480 [ 15.063811] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.063979] kthread+0x337/0x6f0 [ 15.064107] ret_from_fork+0x116/0x1d0 [ 15.064238] ret_from_fork_asm+0x1a/0x30 [ 15.064560] [ 15.064737] The buggy address belongs to the object at ffff8881038eb080 [ 15.064737] which belongs to the cache kmalloc-64 of size 64 [ 15.065854] The buggy address is located 0 bytes to the right of [ 15.065854] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 15.066942] [ 15.067123] The buggy address belongs to the physical page: [ 15.067626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 15.068298] flags: 0x200000000000000(node=0|zone=2) [ 15.068743] page_type: f5(slab) [ 15.069043] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.069632] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.069854] page dumped because: kasan: bad access detected [ 15.070019] [ 15.070088] Memory state around the buggy address: [ 15.070597] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.071232] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.071854] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.072481] ^ [ 15.072892] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.073286] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.073781] ================================================================== [ 14.992382] ================================================================== [ 14.992699] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 14.992996] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.993236] [ 14.993319] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.993359] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.993372] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.993393] Call Trace: [ 14.993409] <TASK> [ 14.993423] dump_stack_lvl+0x73/0xb0 [ 14.993449] print_report+0xd1/0x650 [ 14.993488] ? __virt_addr_valid+0x1db/0x2d0 [ 14.993512] ? kasan_atomics_helper+0x1c18/0x5450 [ 14.993534] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.993557] ? kasan_atomics_helper+0x1c18/0x5450 [ 14.993580] kasan_report+0x141/0x180 [ 14.993602] ? kasan_atomics_helper+0x1c18/0x5450 [ 14.993630] kasan_check_range+0x10c/0x1c0 [ 14.993653] __kasan_check_write+0x18/0x20 [ 14.993673] kasan_atomics_helper+0x1c18/0x5450 [ 14.993696] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.993718] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.993744] ? kasan_atomics+0x152/0x310 [ 14.993770] kasan_atomics+0x1dc/0x310 [ 14.993793] ? __pfx_kasan_atomics+0x10/0x10 [ 14.993817] ? __pfx_read_tsc+0x10/0x10 [ 14.993838] ? ktime_get_ts64+0x86/0x230 [ 14.993863] kunit_try_run_case+0x1a5/0x480 [ 14.993887] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.993910] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.993932] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.993956] ? __kthread_parkme+0x82/0x180 [ 14.993977] ? preempt_count_sub+0x50/0x80 [ 14.994001] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.994028] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.994052] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.994076] kthread+0x337/0x6f0 [ 14.994111] ? trace_preempt_on+0x20/0xc0 [ 14.994135] ? __pfx_kthread+0x10/0x10 [ 14.994156] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.994178] ? calculate_sigpending+0x7b/0xa0 [ 14.994202] ? __pfx_kthread+0x10/0x10 [ 14.994224] ret_from_fork+0x116/0x1d0 [ 14.994243] ? __pfx_kthread+0x10/0x10 [ 14.994264] ret_from_fork_asm+0x1a/0x30 [ 14.994296] </TASK> [ 14.994307] [ 15.001829] Allocated by task 283: [ 15.002013] kasan_save_stack+0x45/0x70 [ 15.002189] kasan_save_track+0x18/0x40 [ 15.002337] kasan_save_alloc_info+0x3b/0x50 [ 15.002552] __kasan_kmalloc+0xb7/0xc0 [ 15.002739] __kmalloc_cache_noprof+0x189/0x420 [ 15.002914] kasan_atomics+0x95/0x310 [ 15.003050] kunit_try_run_case+0x1a5/0x480 [ 15.003212] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.003390] kthread+0x337/0x6f0 [ 15.003511] ret_from_fork+0x116/0x1d0 [ 15.003646] ret_from_fork_asm+0x1a/0x30 [ 15.003847] [ 15.003944] The buggy address belongs to the object at ffff8881038eb080 [ 15.003944] which belongs to the cache kmalloc-64 of size 64 [ 15.004478] The buggy address is located 0 bytes to the right of [ 15.004478] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 15.005186] [ 15.005376] The buggy address belongs to the physical page: [ 15.005606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 15.005919] flags: 0x200000000000000(node=0|zone=2) [ 15.006086] page_type: f5(slab) [ 15.006227] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.006829] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.007161] page dumped because: kasan: bad access detected [ 15.007406] [ 15.007481] Memory state around the buggy address: [ 15.007639] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.007859] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.008176] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.008500] ^ [ 15.008786] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.009122] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.009543] ================================================================== [ 14.287575] ================================================================== [ 14.287925] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 14.288461] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.288808] [ 14.288920] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.288991] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.289003] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.289025] Call Trace: [ 14.289051] <TASK> [ 14.289068] dump_stack_lvl+0x73/0xb0 [ 14.289105] print_report+0xd1/0x650 [ 14.289147] ? __virt_addr_valid+0x1db/0x2d0 [ 14.289225] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.289259] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.289282] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.289304] kasan_report+0x141/0x180 [ 14.289328] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.289354] kasan_check_range+0x10c/0x1c0 [ 14.289378] __kasan_check_write+0x18/0x20 [ 14.289398] kasan_atomics_helper+0xb6a/0x5450 [ 14.289421] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.289443] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.289487] ? kasan_atomics+0x152/0x310 [ 14.289528] kasan_atomics+0x1dc/0x310 [ 14.289564] ? __pfx_kasan_atomics+0x10/0x10 [ 14.289589] ? __pfx_read_tsc+0x10/0x10 [ 14.289623] ? ktime_get_ts64+0x86/0x230 [ 14.289647] kunit_try_run_case+0x1a5/0x480 [ 14.289684] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.289721] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.289752] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.289776] ? __kthread_parkme+0x82/0x180 [ 14.289797] ? preempt_count_sub+0x50/0x80 [ 14.289831] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.289856] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.289882] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.289905] kthread+0x337/0x6f0 [ 14.289925] ? trace_preempt_on+0x20/0xc0 [ 14.289948] ? __pfx_kthread+0x10/0x10 [ 14.289969] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.289991] ? calculate_sigpending+0x7b/0xa0 [ 14.290015] ? __pfx_kthread+0x10/0x10 [ 14.290037] ret_from_fork+0x116/0x1d0 [ 14.290056] ? __pfx_kthread+0x10/0x10 [ 14.290078] ret_from_fork_asm+0x1a/0x30 [ 14.290118] </TASK> [ 14.290129] [ 14.299849] Allocated by task 283: [ 14.300041] kasan_save_stack+0x45/0x70 [ 14.300406] kasan_save_track+0x18/0x40 [ 14.300645] kasan_save_alloc_info+0x3b/0x50 [ 14.300863] __kasan_kmalloc+0xb7/0xc0 [ 14.301076] __kmalloc_cache_noprof+0x189/0x420 [ 14.301347] kasan_atomics+0x95/0x310 [ 14.301597] kunit_try_run_case+0x1a5/0x480 [ 14.301785] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.302002] kthread+0x337/0x6f0 [ 14.302339] ret_from_fork+0x116/0x1d0 [ 14.302590] ret_from_fork_asm+0x1a/0x30 [ 14.302805] [ 14.302923] The buggy address belongs to the object at ffff8881038eb080 [ 14.302923] which belongs to the cache kmalloc-64 of size 64 [ 14.303609] The buggy address is located 0 bytes to the right of [ 14.303609] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.304312] [ 14.304464] The buggy address belongs to the physical page: [ 14.304744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.305086] flags: 0x200000000000000(node=0|zone=2) [ 14.305273] page_type: f5(slab) [ 14.305397] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.305894] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.306249] page dumped because: kasan: bad access detected [ 14.306509] [ 14.306606] Memory state around the buggy address: [ 14.307184] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.307595] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.307873] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.308340] ^ [ 14.308566] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.308955] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.309532] ================================================================== [ 15.230432] ================================================================== [ 15.230681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 15.230926] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 15.232717] [ 15.233240] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.233297] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.233577] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.233609] Call Trace: [ 15.233630] <TASK> [ 15.233650] dump_stack_lvl+0x73/0xb0 [ 15.233681] print_report+0xd1/0x650 [ 15.233707] ? __virt_addr_valid+0x1db/0x2d0 [ 15.233740] ? kasan_atomics_helper+0x218a/0x5450 [ 15.233762] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.233785] ? kasan_atomics_helper+0x218a/0x5450 [ 15.233807] kasan_report+0x141/0x180 [ 15.233829] ? kasan_atomics_helper+0x218a/0x5450 [ 15.233856] kasan_check_range+0x10c/0x1c0 [ 15.233881] __kasan_check_write+0x18/0x20 [ 15.233901] kasan_atomics_helper+0x218a/0x5450 [ 15.233924] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.233947] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.233972] ? kasan_atomics+0x152/0x310 [ 15.233998] kasan_atomics+0x1dc/0x310 [ 15.234023] ? __pfx_kasan_atomics+0x10/0x10 [ 15.234047] ? __pfx_read_tsc+0x10/0x10 [ 15.234070] ? ktime_get_ts64+0x86/0x230 [ 15.234105] kunit_try_run_case+0x1a5/0x480 [ 15.234130] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.234175] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.234199] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.234223] ? __kthread_parkme+0x82/0x180 [ 15.234245] ? preempt_count_sub+0x50/0x80 [ 15.234269] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.234293] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.234333] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.234357] kthread+0x337/0x6f0 [ 15.234377] ? trace_preempt_on+0x20/0xc0 [ 15.234401] ? __pfx_kthread+0x10/0x10 [ 15.234422] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.234444] ? calculate_sigpending+0x7b/0xa0 [ 15.234469] ? __pfx_kthread+0x10/0x10 [ 15.234491] ret_from_fork+0x116/0x1d0 [ 15.234510] ? __pfx_kthread+0x10/0x10 [ 15.234532] ret_from_fork_asm+0x1a/0x30 [ 15.234563] </TASK> [ 15.234576] [ 15.245466] Allocated by task 283: [ 15.245837] kasan_save_stack+0x45/0x70 [ 15.246069] kasan_save_track+0x18/0x40 [ 15.246430] kasan_save_alloc_info+0x3b/0x50 [ 15.246784] __kasan_kmalloc+0xb7/0xc0 [ 15.246954] __kmalloc_cache_noprof+0x189/0x420 [ 15.247192] kasan_atomics+0x95/0x310 [ 15.247644] kunit_try_run_case+0x1a5/0x480 [ 15.247849] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.248154] kthread+0x337/0x6f0 [ 15.248507] ret_from_fork+0x116/0x1d0 [ 15.248684] ret_from_fork_asm+0x1a/0x30 [ 15.248960] [ 15.249063] The buggy address belongs to the object at ffff8881038eb080 [ 15.249063] which belongs to the cache kmalloc-64 of size 64 [ 15.249846] The buggy address is located 0 bytes to the right of [ 15.249846] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 15.250561] [ 15.250710] The buggy address belongs to the physical page: [ 15.250987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 15.251283] flags: 0x200000000000000(node=0|zone=2) [ 15.251541] page_type: f5(slab) [ 15.251729] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.252023] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.252422] page dumped because: kasan: bad access detected [ 15.252667] [ 15.252769] Memory state around the buggy address: [ 15.252938] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.253293] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.253624] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.253918] ^ [ 15.254118] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.254464] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.254738] ================================================================== [ 13.874033] ================================================================== [ 13.874752] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 13.875075] Read of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 13.875425] [ 13.875546] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.875591] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.875603] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.875623] Call Trace: [ 13.875635] <TASK> [ 13.875652] dump_stack_lvl+0x73/0xb0 [ 13.875678] print_report+0xd1/0x650 [ 13.875700] ? __virt_addr_valid+0x1db/0x2d0 [ 13.875722] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.875742] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.875764] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.875786] kasan_report+0x141/0x180 [ 13.875807] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.875833] __asan_report_load4_noabort+0x18/0x20 [ 13.875856] kasan_atomics_helper+0x4bbc/0x5450 [ 13.875879] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.875901] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.875924] ? kasan_atomics+0x152/0x310 [ 13.875950] kasan_atomics+0x1dc/0x310 [ 13.875973] ? __pfx_kasan_atomics+0x10/0x10 [ 13.875997] ? __pfx_read_tsc+0x10/0x10 [ 13.876017] ? ktime_get_ts64+0x86/0x230 [ 13.876040] kunit_try_run_case+0x1a5/0x480 [ 13.876063] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.876083] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.876119] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.876142] ? __kthread_parkme+0x82/0x180 [ 13.876175] ? preempt_count_sub+0x50/0x80 [ 13.876198] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.876222] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.876244] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.876267] kthread+0x337/0x6f0 [ 13.876286] ? trace_preempt_on+0x20/0xc0 [ 13.876309] ? __pfx_kthread+0x10/0x10 [ 13.876368] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.876391] ? calculate_sigpending+0x7b/0xa0 [ 13.876414] ? __pfx_kthread+0x10/0x10 [ 13.876434] ret_from_fork+0x116/0x1d0 [ 13.876452] ? __pfx_kthread+0x10/0x10 [ 13.876481] ret_from_fork_asm+0x1a/0x30 [ 13.876511] </TASK> [ 13.876522] [ 13.890053] Allocated by task 283: [ 13.890495] kasan_save_stack+0x45/0x70 [ 13.890843] kasan_save_track+0x18/0x40 [ 13.890981] kasan_save_alloc_info+0x3b/0x50 [ 13.891146] __kasan_kmalloc+0xb7/0xc0 [ 13.891582] __kmalloc_cache_noprof+0x189/0x420 [ 13.893302] kasan_atomics+0x95/0x310 [ 13.894265] kunit_try_run_case+0x1a5/0x480 [ 13.895320] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.895514] kthread+0x337/0x6f0 [ 13.895638] ret_from_fork+0x116/0x1d0 [ 13.895772] ret_from_fork_asm+0x1a/0x30 [ 13.895914] [ 13.895987] The buggy address belongs to the object at ffff8881038eb080 [ 13.895987] which belongs to the cache kmalloc-64 of size 64 [ 13.896939] The buggy address is located 0 bytes to the right of [ 13.896939] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 13.898740] [ 13.899682] The buggy address belongs to the physical page: [ 13.899874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 13.900141] flags: 0x200000000000000(node=0|zone=2) [ 13.901296] page_type: f5(slab) [ 13.901506] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.901863] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.902223] page dumped because: kasan: bad access detected [ 13.902480] [ 13.902573] Memory state around the buggy address: [ 13.902803] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.903035] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.904606] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.905205] ^ [ 13.905388] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.906156] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.906599] ================================================================== [ 14.548680] ================================================================== [ 14.549017] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 14.549567] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.550139] [ 14.550364] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.550432] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.550447] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.550471] Call Trace: [ 14.550487] <TASK> [ 14.550503] dump_stack_lvl+0x73/0xb0 [ 14.550533] print_report+0xd1/0x650 [ 14.550557] ? __virt_addr_valid+0x1db/0x2d0 [ 14.550580] ? kasan_atomics_helper+0x1148/0x5450 [ 14.550602] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.550625] ? kasan_atomics_helper+0x1148/0x5450 [ 14.550647] kasan_report+0x141/0x180 [ 14.550671] ? kasan_atomics_helper+0x1148/0x5450 [ 14.550699] kasan_check_range+0x10c/0x1c0 [ 14.550724] __kasan_check_write+0x18/0x20 [ 14.550745] kasan_atomics_helper+0x1148/0x5450 [ 14.550769] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.550791] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.550816] ? kasan_atomics+0x152/0x310 [ 14.550842] kasan_atomics+0x1dc/0x310 [ 14.550866] ? __pfx_kasan_atomics+0x10/0x10 [ 14.550890] ? __pfx_read_tsc+0x10/0x10 [ 14.550911] ? ktime_get_ts64+0x86/0x230 [ 14.550935] kunit_try_run_case+0x1a5/0x480 [ 14.550959] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.550983] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.551005] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.551029] ? __kthread_parkme+0x82/0x180 [ 14.551050] ? preempt_count_sub+0x50/0x80 [ 14.551072] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.551115] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.551140] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.551165] kthread+0x337/0x6f0 [ 14.551185] ? trace_preempt_on+0x20/0xc0 [ 14.551212] ? __pfx_kthread+0x10/0x10 [ 14.551234] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.551257] ? calculate_sigpending+0x7b/0xa0 [ 14.551280] ? __pfx_kthread+0x10/0x10 [ 14.551302] ret_from_fork+0x116/0x1d0 [ 14.551322] ? __pfx_kthread+0x10/0x10 [ 14.551355] ret_from_fork_asm+0x1a/0x30 [ 14.551387] </TASK> [ 14.551399] [ 14.559315] Allocated by task 283: [ 14.559507] kasan_save_stack+0x45/0x70 [ 14.559730] kasan_save_track+0x18/0x40 [ 14.559908] kasan_save_alloc_info+0x3b/0x50 [ 14.560128] __kasan_kmalloc+0xb7/0xc0 [ 14.560316] __kmalloc_cache_noprof+0x189/0x420 [ 14.560523] kasan_atomics+0x95/0x310 [ 14.560712] kunit_try_run_case+0x1a5/0x480 [ 14.560914] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.561168] kthread+0x337/0x6f0 [ 14.561337] ret_from_fork+0x116/0x1d0 [ 14.561531] ret_from_fork_asm+0x1a/0x30 [ 14.561699] [ 14.561817] The buggy address belongs to the object at ffff8881038eb080 [ 14.561817] which belongs to the cache kmalloc-64 of size 64 [ 14.562301] The buggy address is located 0 bytes to the right of [ 14.562301] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.562842] [ 14.562933] The buggy address belongs to the physical page: [ 14.563214] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.563725] flags: 0x200000000000000(node=0|zone=2) [ 14.563928] page_type: f5(slab) [ 14.564052] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.564291] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.565033] page dumped because: kasan: bad access detected [ 14.565238] [ 14.565310] Memory state around the buggy address: [ 14.565469] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.565698] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.566089] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.566669] ^ [ 14.566959] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.567336] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.567646] ================================================================== [ 14.803322] ================================================================== [ 14.803643] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 14.803961] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.804528] [ 14.804872] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.804920] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.804934] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.804957] Call Trace: [ 14.804973] <TASK> [ 14.804989] dump_stack_lvl+0x73/0xb0 [ 14.805016] print_report+0xd1/0x650 [ 14.805041] ? __virt_addr_valid+0x1db/0x2d0 [ 14.805065] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.805087] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.805122] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.805146] kasan_report+0x141/0x180 [ 14.805168] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.805194] kasan_check_range+0x10c/0x1c0 [ 14.805244] __kasan_check_write+0x18/0x20 [ 14.805265] kasan_atomics_helper+0x16e7/0x5450 [ 14.805288] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.805311] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.805337] ? kasan_atomics+0x152/0x310 [ 14.805364] kasan_atomics+0x1dc/0x310 [ 14.805404] ? __pfx_kasan_atomics+0x10/0x10 [ 14.805429] ? __pfx_read_tsc+0x10/0x10 [ 14.805451] ? ktime_get_ts64+0x86/0x230 [ 14.805492] kunit_try_run_case+0x1a5/0x480 [ 14.805530] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.805553] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.805590] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.805615] ? __kthread_parkme+0x82/0x180 [ 14.805676] ? preempt_count_sub+0x50/0x80 [ 14.805700] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.805724] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.805747] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.805771] kthread+0x337/0x6f0 [ 14.805792] ? trace_preempt_on+0x20/0xc0 [ 14.805816] ? __pfx_kthread+0x10/0x10 [ 14.805837] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.805859] ? calculate_sigpending+0x7b/0xa0 [ 14.805882] ? __pfx_kthread+0x10/0x10 [ 14.805904] ret_from_fork+0x116/0x1d0 [ 14.805924] ? __pfx_kthread+0x10/0x10 [ 14.805945] ret_from_fork_asm+0x1a/0x30 [ 14.805977] </TASK> [ 14.805990] [ 14.815964] Allocated by task 283: [ 14.816177] kasan_save_stack+0x45/0x70 [ 14.816435] kasan_save_track+0x18/0x40 [ 14.816814] kasan_save_alloc_info+0x3b/0x50 [ 14.817090] __kasan_kmalloc+0xb7/0xc0 [ 14.817393] __kmalloc_cache_noprof+0x189/0x420 [ 14.817626] kasan_atomics+0x95/0x310 [ 14.817919] kunit_try_run_case+0x1a5/0x480 [ 14.818164] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.818536] kthread+0x337/0x6f0 [ 14.818820] ret_from_fork+0x116/0x1d0 [ 14.819032] ret_from_fork_asm+0x1a/0x30 [ 14.819244] [ 14.819440] The buggy address belongs to the object at ffff8881038eb080 [ 14.819440] which belongs to the cache kmalloc-64 of size 64 [ 14.820063] The buggy address is located 0 bytes to the right of [ 14.820063] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.820851] [ 14.820935] The buggy address belongs to the physical page: [ 14.821418] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.821770] flags: 0x200000000000000(node=0|zone=2) [ 14.822093] page_type: f5(slab) [ 14.822272] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.822686] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.823146] page dumped because: kasan: bad access detected [ 14.823530] [ 14.823653] Memory state around the buggy address: [ 14.823995] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.824366] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.824671] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.824970] ^ [ 14.825198] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.825779] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.826153] ================================================================== [ 14.217120] ================================================================== [ 14.217698] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 14.217997] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.218237] [ 14.218589] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.218651] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.218665] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.218688] Call Trace: [ 14.218715] <TASK> [ 14.218731] dump_stack_lvl+0x73/0xb0 [ 14.218796] print_report+0xd1/0x650 [ 14.218848] ? __virt_addr_valid+0x1db/0x2d0 [ 14.218897] ? kasan_atomics_helper+0x992/0x5450 [ 14.218919] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.218942] ? kasan_atomics_helper+0x992/0x5450 [ 14.218974] kasan_report+0x141/0x180 [ 14.218997] ? kasan_atomics_helper+0x992/0x5450 [ 14.219025] kasan_check_range+0x10c/0x1c0 [ 14.219049] __kasan_check_write+0x18/0x20 [ 14.219070] kasan_atomics_helper+0x992/0x5450 [ 14.219092] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.219123] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.219149] ? kasan_atomics+0x152/0x310 [ 14.219226] kasan_atomics+0x1dc/0x310 [ 14.219250] ? __pfx_kasan_atomics+0x10/0x10 [ 14.219322] ? __pfx_read_tsc+0x10/0x10 [ 14.219345] ? ktime_get_ts64+0x86/0x230 [ 14.219399] kunit_try_run_case+0x1a5/0x480 [ 14.219424] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.219448] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.219482] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.219506] ? __kthread_parkme+0x82/0x180 [ 14.219527] ? preempt_count_sub+0x50/0x80 [ 14.219551] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.219575] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.219599] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.219623] kthread+0x337/0x6f0 [ 14.219643] ? trace_preempt_on+0x20/0xc0 [ 14.219667] ? __pfx_kthread+0x10/0x10 [ 14.219688] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.219710] ? calculate_sigpending+0x7b/0xa0 [ 14.219734] ? __pfx_kthread+0x10/0x10 [ 14.219756] ret_from_fork+0x116/0x1d0 [ 14.219777] ? __pfx_kthread+0x10/0x10 [ 14.219798] ret_from_fork_asm+0x1a/0x30 [ 14.219829] </TASK> [ 14.219841] [ 14.229634] Allocated by task 283: [ 14.229896] kasan_save_stack+0x45/0x70 [ 14.230091] kasan_save_track+0x18/0x40 [ 14.230423] kasan_save_alloc_info+0x3b/0x50 [ 14.230725] __kasan_kmalloc+0xb7/0xc0 [ 14.230932] __kmalloc_cache_noprof+0x189/0x420 [ 14.231209] kasan_atomics+0x95/0x310 [ 14.231460] kunit_try_run_case+0x1a5/0x480 [ 14.231656] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.231963] kthread+0x337/0x6f0 [ 14.232362] ret_from_fork+0x116/0x1d0 [ 14.232549] ret_from_fork_asm+0x1a/0x30 [ 14.232695] [ 14.232769] The buggy address belongs to the object at ffff8881038eb080 [ 14.232769] which belongs to the cache kmalloc-64 of size 64 [ 14.233569] The buggy address is located 0 bytes to the right of [ 14.233569] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.234073] [ 14.234207] The buggy address belongs to the physical page: [ 14.234503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.234963] flags: 0x200000000000000(node=0|zone=2) [ 14.235354] page_type: f5(slab) [ 14.235551] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.235843] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.236233] page dumped because: kasan: bad access detected [ 14.236705] [ 14.236827] Memory state around the buggy address: [ 14.237073] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.237588] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.237870] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.238501] ^ [ 14.238768] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.239139] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.239529] ================================================================== [ 14.680434] ================================================================== [ 14.680776] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 14.681131] Read of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.681515] [ 14.681624] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.681666] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.681679] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.681699] Call Trace: [ 14.681713] <TASK> [ 14.681727] dump_stack_lvl+0x73/0xb0 [ 14.681752] print_report+0xd1/0x650 [ 14.681775] ? __virt_addr_valid+0x1db/0x2d0 [ 14.681797] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.681818] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.681841] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.681863] kasan_report+0x141/0x180 [ 14.681886] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.681912] __asan_report_load8_noabort+0x18/0x20 [ 14.681937] kasan_atomics_helper+0x4eae/0x5450 [ 14.681960] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.681982] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.682007] ? kasan_atomics+0x152/0x310 [ 14.682033] kasan_atomics+0x1dc/0x310 [ 14.682056] ? __pfx_kasan_atomics+0x10/0x10 [ 14.682081] ? __pfx_read_tsc+0x10/0x10 [ 14.682115] ? ktime_get_ts64+0x86/0x230 [ 14.682139] kunit_try_run_case+0x1a5/0x480 [ 14.682163] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.682186] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.682210] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.682233] ? __kthread_parkme+0x82/0x180 [ 14.682254] ? preempt_count_sub+0x50/0x80 [ 14.682278] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.682302] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.682338] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.682362] kthread+0x337/0x6f0 [ 14.682382] ? trace_preempt_on+0x20/0xc0 [ 14.682405] ? __pfx_kthread+0x10/0x10 [ 14.682426] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.682448] ? calculate_sigpending+0x7b/0xa0 [ 14.682472] ? __pfx_kthread+0x10/0x10 [ 14.682494] ret_from_fork+0x116/0x1d0 [ 14.682513] ? __pfx_kthread+0x10/0x10 [ 14.682534] ret_from_fork_asm+0x1a/0x30 [ 14.682565] </TASK> [ 14.682577] [ 14.689977] Allocated by task 283: [ 14.690170] kasan_save_stack+0x45/0x70 [ 14.690350] kasan_save_track+0x18/0x40 [ 14.690539] kasan_save_alloc_info+0x3b/0x50 [ 14.690749] __kasan_kmalloc+0xb7/0xc0 [ 14.690901] __kmalloc_cache_noprof+0x189/0x420 [ 14.691107] kasan_atomics+0x95/0x310 [ 14.691304] kunit_try_run_case+0x1a5/0x480 [ 14.691488] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.691748] kthread+0x337/0x6f0 [ 14.691873] ret_from_fork+0x116/0x1d0 [ 14.692007] ret_from_fork_asm+0x1a/0x30 [ 14.692158] [ 14.692231] The buggy address belongs to the object at ffff8881038eb080 [ 14.692231] which belongs to the cache kmalloc-64 of size 64 [ 14.692589] The buggy address is located 0 bytes to the right of [ 14.692589] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.693129] [ 14.693242] The buggy address belongs to the physical page: [ 14.693672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.694027] flags: 0x200000000000000(node=0|zone=2) [ 14.694273] page_type: f5(slab) [ 14.694440] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.694774] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.695003] page dumped because: kasan: bad access detected [ 14.695184] [ 14.695261] Memory state around the buggy address: [ 14.695418] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.695753] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.696073] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.696491] ^ [ 14.696723] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.697053] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.697337] ================================================================== [ 14.850888] ================================================================== [ 14.851414] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 14.851724] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.852074] [ 14.852199] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.852241] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.852254] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.852275] Call Trace: [ 14.852289] <TASK> [ 14.852303] dump_stack_lvl+0x73/0xb0 [ 14.852575] print_report+0xd1/0x650 [ 14.852827] ? __virt_addr_valid+0x1db/0x2d0 [ 14.852853] ? kasan_atomics_helper+0x1818/0x5450 [ 14.852876] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.852900] ? kasan_atomics_helper+0x1818/0x5450 [ 14.852922] kasan_report+0x141/0x180 [ 14.852945] ? kasan_atomics_helper+0x1818/0x5450 [ 14.852971] kasan_check_range+0x10c/0x1c0 [ 14.852995] __kasan_check_write+0x18/0x20 [ 14.853015] kasan_atomics_helper+0x1818/0x5450 [ 14.853038] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.853060] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.853085] ? kasan_atomics+0x152/0x310 [ 14.853123] kasan_atomics+0x1dc/0x310 [ 14.853146] ? __pfx_kasan_atomics+0x10/0x10 [ 14.853170] ? __pfx_read_tsc+0x10/0x10 [ 14.853191] ? ktime_get_ts64+0x86/0x230 [ 14.853216] kunit_try_run_case+0x1a5/0x480 [ 14.853240] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.853262] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.853286] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.853309] ? __kthread_parkme+0x82/0x180 [ 14.853337] ? preempt_count_sub+0x50/0x80 [ 14.853363] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.853386] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.853409] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.853433] kthread+0x337/0x6f0 [ 14.853452] ? trace_preempt_on+0x20/0xc0 [ 14.853476] ? __pfx_kthread+0x10/0x10 [ 14.853497] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.853519] ? calculate_sigpending+0x7b/0xa0 [ 14.853543] ? __pfx_kthread+0x10/0x10 [ 14.853565] ret_from_fork+0x116/0x1d0 [ 14.853584] ? __pfx_kthread+0x10/0x10 [ 14.853604] ret_from_fork_asm+0x1a/0x30 [ 14.853635] </TASK> [ 14.853648] [ 14.864307] Allocated by task 283: [ 14.864511] kasan_save_stack+0x45/0x70 [ 14.864710] kasan_save_track+0x18/0x40 [ 14.865036] kasan_save_alloc_info+0x3b/0x50 [ 14.865337] __kasan_kmalloc+0xb7/0xc0 [ 14.865636] __kmalloc_cache_noprof+0x189/0x420 [ 14.865914] kasan_atomics+0x95/0x310 [ 14.866152] kunit_try_run_case+0x1a5/0x480 [ 14.866582] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.866832] kthread+0x337/0x6f0 [ 14.867076] ret_from_fork+0x116/0x1d0 [ 14.867272] ret_from_fork_asm+0x1a/0x30 [ 14.867480] [ 14.867736] The buggy address belongs to the object at ffff8881038eb080 [ 14.867736] which belongs to the cache kmalloc-64 of size 64 [ 14.868470] The buggy address is located 0 bytes to the right of [ 14.868470] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.869137] [ 14.869402] The buggy address belongs to the physical page: [ 14.869640] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.870123] flags: 0x200000000000000(node=0|zone=2) [ 14.870515] page_type: f5(slab) [ 14.870840] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.871179] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.871578] page dumped because: kasan: bad access detected [ 14.871823] [ 14.871923] Memory state around the buggy address: [ 14.872148] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.872707] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.872991] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.873411] ^ [ 14.873729] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.874126] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.874558] ================================================================== [ 15.207694] ================================================================== [ 15.208039] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 15.208724] Read of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 15.209011] [ 15.209108] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.209154] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.209167] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.209188] Call Trace: [ 15.209203] <TASK> [ 15.209221] dump_stack_lvl+0x73/0xb0 [ 15.209246] print_report+0xd1/0x650 [ 15.209270] ? __virt_addr_valid+0x1db/0x2d0 [ 15.209293] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.209316] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.209350] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.209373] kasan_report+0x141/0x180 [ 15.209396] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.209422] __asan_report_load8_noabort+0x18/0x20 [ 15.209447] kasan_atomics_helper+0x4fb2/0x5450 [ 15.209471] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.209494] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.209519] ? kasan_atomics+0x152/0x310 [ 15.209545] kasan_atomics+0x1dc/0x310 [ 15.209568] ? __pfx_kasan_atomics+0x10/0x10 [ 15.209592] ? __pfx_read_tsc+0x10/0x10 [ 15.209613] ? ktime_get_ts64+0x86/0x230 [ 15.209637] kunit_try_run_case+0x1a5/0x480 [ 15.209661] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.209684] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.209707] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.209730] ? __kthread_parkme+0x82/0x180 [ 15.209751] ? preempt_count_sub+0x50/0x80 [ 15.209776] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.209802] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.209826] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.209850] kthread+0x337/0x6f0 [ 15.209870] ? trace_preempt_on+0x20/0xc0 [ 15.209894] ? __pfx_kthread+0x10/0x10 [ 15.209915] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.209937] ? calculate_sigpending+0x7b/0xa0 [ 15.209960] ? __pfx_kthread+0x10/0x10 [ 15.209982] ret_from_fork+0x116/0x1d0 [ 15.210001] ? __pfx_kthread+0x10/0x10 [ 15.210022] ret_from_fork_asm+0x1a/0x30 [ 15.210053] </TASK> [ 15.210066] [ 15.217524] Allocated by task 283: [ 15.217703] kasan_save_stack+0x45/0x70 [ 15.217846] kasan_save_track+0x18/0x40 [ 15.217982] kasan_save_alloc_info+0x3b/0x50 [ 15.218141] __kasan_kmalloc+0xb7/0xc0 [ 15.218336] __kmalloc_cache_noprof+0x189/0x420 [ 15.218564] kasan_atomics+0x95/0x310 [ 15.218753] kunit_try_run_case+0x1a5/0x480 [ 15.218963] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.219210] kthread+0x337/0x6f0 [ 15.219401] ret_from_fork+0x116/0x1d0 [ 15.219536] ret_from_fork_asm+0x1a/0x30 [ 15.219731] [ 15.219824] The buggy address belongs to the object at ffff8881038eb080 [ 15.219824] which belongs to the cache kmalloc-64 of size 64 [ 15.220278] The buggy address is located 0 bytes to the right of [ 15.220278] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 15.220772] [ 15.220859] The buggy address belongs to the physical page: [ 15.221074] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 15.221441] flags: 0x200000000000000(node=0|zone=2) [ 15.221629] page_type: f5(slab) [ 15.221751] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.221988] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.222288] page dumped because: kasan: bad access detected [ 15.222486] [ 15.222557] Memory state around the buggy address: [ 15.222714] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.226129] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.227815] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.228156] ^ [ 15.228327] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.229505] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.229746] ================================================================== [ 13.979510] ================================================================== [ 13.980080] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 13.980588] Read of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 13.980909] [ 13.981022] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.981065] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.981080] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.981121] Call Trace: [ 13.981138] <TASK> [ 13.981179] dump_stack_lvl+0x73/0xb0 [ 13.981207] print_report+0xd1/0x650 [ 13.981230] ? __virt_addr_valid+0x1db/0x2d0 [ 13.981254] ? kasan_atomics_helper+0x3df/0x5450 [ 13.981275] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.981298] ? kasan_atomics_helper+0x3df/0x5450 [ 13.981320] kasan_report+0x141/0x180 [ 13.981343] ? kasan_atomics_helper+0x3df/0x5450 [ 13.981369] kasan_check_range+0x10c/0x1c0 [ 13.981393] __kasan_check_read+0x15/0x20 [ 13.981414] kasan_atomics_helper+0x3df/0x5450 [ 13.981438] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.981461] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.981535] ? kasan_atomics+0x152/0x310 [ 13.981574] kasan_atomics+0x1dc/0x310 [ 13.981598] ? __pfx_kasan_atomics+0x10/0x10 [ 13.981623] ? __pfx_read_tsc+0x10/0x10 [ 13.981645] ? ktime_get_ts64+0x86/0x230 [ 13.981669] kunit_try_run_case+0x1a5/0x480 [ 13.981703] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.981727] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.981750] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.981775] ? __kthread_parkme+0x82/0x180 [ 13.981796] ? preempt_count_sub+0x50/0x80 [ 13.981820] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.981844] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.981868] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.981901] kthread+0x337/0x6f0 [ 13.981922] ? trace_preempt_on+0x20/0xc0 [ 13.981957] ? __pfx_kthread+0x10/0x10 [ 13.981979] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.982001] ? calculate_sigpending+0x7b/0xa0 [ 13.982025] ? __pfx_kthread+0x10/0x10 [ 13.982047] ret_from_fork+0x116/0x1d0 [ 13.982066] ? __pfx_kthread+0x10/0x10 [ 13.982087] ret_from_fork_asm+0x1a/0x30 [ 13.982128] </TASK> [ 13.982141] [ 13.990835] Allocated by task 283: [ 13.991017] kasan_save_stack+0x45/0x70 [ 13.991324] kasan_save_track+0x18/0x40 [ 13.991475] kasan_save_alloc_info+0x3b/0x50 [ 13.991630] __kasan_kmalloc+0xb7/0xc0 [ 13.991889] __kmalloc_cache_noprof+0x189/0x420 [ 13.992122] kasan_atomics+0x95/0x310 [ 13.992260] kunit_try_run_case+0x1a5/0x480 [ 13.992602] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.992932] kthread+0x337/0x6f0 [ 13.993134] ret_from_fork+0x116/0x1d0 [ 13.993381] ret_from_fork_asm+0x1a/0x30 [ 13.993602] [ 13.993714] The buggy address belongs to the object at ffff8881038eb080 [ 13.993714] which belongs to the cache kmalloc-64 of size 64 [ 13.994247] The buggy address is located 0 bytes to the right of [ 13.994247] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 13.994808] [ 13.994888] The buggy address belongs to the physical page: [ 13.995106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 13.995648] flags: 0x200000000000000(node=0|zone=2) [ 13.995919] page_type: f5(slab) [ 13.996092] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.996559] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.996844] page dumped because: kasan: bad access detected [ 13.997023] [ 13.997107] Memory state around the buggy address: [ 13.997268] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.997606] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.997935] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.998258] ^ [ 13.998573] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.998816] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.999033] ================================================================== [ 14.875567] ================================================================== [ 14.875865] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 14.876348] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.876895] [ 14.877142] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.877191] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.877204] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.877341] Call Trace: [ 14.877362] <TASK> [ 14.877379] dump_stack_lvl+0x73/0xb0 [ 14.877407] print_report+0xd1/0x650 [ 14.877430] ? __virt_addr_valid+0x1db/0x2d0 [ 14.877453] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.877476] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.877499] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.877521] kasan_report+0x141/0x180 [ 14.877545] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.877573] kasan_check_range+0x10c/0x1c0 [ 14.877597] __kasan_check_write+0x18/0x20 [ 14.877617] kasan_atomics_helper+0x18b1/0x5450 [ 14.877640] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.877662] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.877687] ? kasan_atomics+0x152/0x310 [ 14.877713] kasan_atomics+0x1dc/0x310 [ 14.877737] ? __pfx_kasan_atomics+0x10/0x10 [ 14.877762] ? __pfx_read_tsc+0x10/0x10 [ 14.877782] ? ktime_get_ts64+0x86/0x230 [ 14.877806] kunit_try_run_case+0x1a5/0x480 [ 14.877829] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.877851] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.877874] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.877896] ? __kthread_parkme+0x82/0x180 [ 14.877917] ? preempt_count_sub+0x50/0x80 [ 14.877939] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.877963] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.877987] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.878010] kthread+0x337/0x6f0 [ 14.878029] ? trace_preempt_on+0x20/0xc0 [ 14.878052] ? __pfx_kthread+0x10/0x10 [ 14.878073] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.878107] ? calculate_sigpending+0x7b/0xa0 [ 14.878131] ? __pfx_kthread+0x10/0x10 [ 14.878154] ret_from_fork+0x116/0x1d0 [ 14.878173] ? __pfx_kthread+0x10/0x10 [ 14.878194] ret_from_fork_asm+0x1a/0x30 [ 14.878225] </TASK> [ 14.878237] [ 14.888657] Allocated by task 283: [ 14.888859] kasan_save_stack+0x45/0x70 [ 14.889143] kasan_save_track+0x18/0x40 [ 14.889448] kasan_save_alloc_info+0x3b/0x50 [ 14.889746] __kasan_kmalloc+0xb7/0xc0 [ 14.890005] __kmalloc_cache_noprof+0x189/0x420 [ 14.890337] kasan_atomics+0x95/0x310 [ 14.890625] kunit_try_run_case+0x1a5/0x480 [ 14.890920] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.891284] kthread+0x337/0x6f0 [ 14.891568] ret_from_fork+0x116/0x1d0 [ 14.891767] ret_from_fork_asm+0x1a/0x30 [ 14.891979] [ 14.892075] The buggy address belongs to the object at ffff8881038eb080 [ 14.892075] which belongs to the cache kmalloc-64 of size 64 [ 14.892983] The buggy address is located 0 bytes to the right of [ 14.892983] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.893662] [ 14.893771] The buggy address belongs to the physical page: [ 14.894175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.894649] flags: 0x200000000000000(node=0|zone=2) [ 14.894965] page_type: f5(slab) [ 14.895230] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.895684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.896134] page dumped because: kasan: bad access detected [ 14.896522] [ 14.896604] Memory state around the buggy address: [ 14.896946] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.897376] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.897785] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.898194] ^ [ 14.898599] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.898997] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.899550] ================================================================== [ 15.255307] ================================================================== [ 15.255749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 15.256134] Read of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 15.256458] [ 15.256627] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.256668] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.256681] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.256702] Call Trace: [ 15.256717] <TASK> [ 15.256731] dump_stack_lvl+0x73/0xb0 [ 15.256757] print_report+0xd1/0x650 [ 15.256780] ? __virt_addr_valid+0x1db/0x2d0 [ 15.256802] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.256824] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.256866] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.256902] kasan_report+0x141/0x180 [ 15.256925] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.256953] __asan_report_load8_noabort+0x18/0x20 [ 15.256978] kasan_atomics_helper+0x4fa5/0x5450 [ 15.257001] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.257023] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.257048] ? kasan_atomics+0x152/0x310 [ 15.257074] kasan_atomics+0x1dc/0x310 [ 15.257108] ? __pfx_kasan_atomics+0x10/0x10 [ 15.257133] ? __pfx_read_tsc+0x10/0x10 [ 15.257156] ? ktime_get_ts64+0x86/0x230 [ 15.257179] kunit_try_run_case+0x1a5/0x480 [ 15.257203] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.257244] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.257268] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.257306] ? __kthread_parkme+0x82/0x180 [ 15.257337] ? preempt_count_sub+0x50/0x80 [ 15.257362] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.257386] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.257410] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.257433] kthread+0x337/0x6f0 [ 15.257453] ? trace_preempt_on+0x20/0xc0 [ 15.257476] ? __pfx_kthread+0x10/0x10 [ 15.257499] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.257520] ? calculate_sigpending+0x7b/0xa0 [ 15.257545] ? __pfx_kthread+0x10/0x10 [ 15.257567] ret_from_fork+0x116/0x1d0 [ 15.257586] ? __pfx_kthread+0x10/0x10 [ 15.257607] ret_from_fork_asm+0x1a/0x30 [ 15.257637] </TASK> [ 15.257649] [ 15.265575] Allocated by task 283: [ 15.265745] kasan_save_stack+0x45/0x70 [ 15.265888] kasan_save_track+0x18/0x40 [ 15.266020] kasan_save_alloc_info+0x3b/0x50 [ 15.266217] __kasan_kmalloc+0xb7/0xc0 [ 15.266510] __kmalloc_cache_noprof+0x189/0x420 [ 15.266754] kasan_atomics+0x95/0x310 [ 15.266965] kunit_try_run_case+0x1a5/0x480 [ 15.267214] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.267456] kthread+0x337/0x6f0 [ 15.267578] ret_from_fork+0x116/0x1d0 [ 15.267756] ret_from_fork_asm+0x1a/0x30 [ 15.267953] [ 15.268071] The buggy address belongs to the object at ffff8881038eb080 [ 15.268071] which belongs to the cache kmalloc-64 of size 64 [ 15.268578] The buggy address is located 0 bytes to the right of [ 15.268578] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 15.269134] [ 15.269234] The buggy address belongs to the physical page: [ 15.269502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 15.269825] flags: 0x200000000000000(node=0|zone=2) [ 15.270088] page_type: f5(slab) [ 15.270304] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.270671] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.271021] page dumped because: kasan: bad access detected [ 15.271295] [ 15.271390] Memory state around the buggy address: [ 15.271604] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.271820] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.272032] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.272624] ^ [ 15.272853] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.273181] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.273571] ================================================================== [ 14.568108] ================================================================== [ 14.568788] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 14.569278] Read of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.569666] [ 14.569806] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.569850] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.569864] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.569885] Call Trace: [ 14.569901] <TASK> [ 14.569915] dump_stack_lvl+0x73/0xb0 [ 14.569943] print_report+0xd1/0x650 [ 14.569966] ? __virt_addr_valid+0x1db/0x2d0 [ 14.569990] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.570012] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.570035] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.570056] kasan_report+0x141/0x180 [ 14.570079] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.570119] __asan_report_load4_noabort+0x18/0x20 [ 14.570145] kasan_atomics_helper+0x4a02/0x5450 [ 14.570170] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.570192] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.570218] ? kasan_atomics+0x152/0x310 [ 14.570245] kasan_atomics+0x1dc/0x310 [ 14.570268] ? __pfx_kasan_atomics+0x10/0x10 [ 14.570328] ? __pfx_read_tsc+0x10/0x10 [ 14.570352] ? ktime_get_ts64+0x86/0x230 [ 14.570378] kunit_try_run_case+0x1a5/0x480 [ 14.570428] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.570451] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.570474] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.570498] ? __kthread_parkme+0x82/0x180 [ 14.570520] ? preempt_count_sub+0x50/0x80 [ 14.570544] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.570568] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.570591] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.570646] kthread+0x337/0x6f0 [ 14.570666] ? trace_preempt_on+0x20/0xc0 [ 14.570689] ? __pfx_kthread+0x10/0x10 [ 14.570711] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.570732] ? calculate_sigpending+0x7b/0xa0 [ 14.570756] ? __pfx_kthread+0x10/0x10 [ 14.570809] ret_from_fork+0x116/0x1d0 [ 14.570829] ? __pfx_kthread+0x10/0x10 [ 14.570850] ret_from_fork_asm+0x1a/0x30 [ 14.570881] </TASK> [ 14.570893] [ 14.578603] Allocated by task 283: [ 14.578800] kasan_save_stack+0x45/0x70 [ 14.579014] kasan_save_track+0x18/0x40 [ 14.579209] kasan_save_alloc_info+0x3b/0x50 [ 14.579552] __kasan_kmalloc+0xb7/0xc0 [ 14.579745] __kmalloc_cache_noprof+0x189/0x420 [ 14.579966] kasan_atomics+0x95/0x310 [ 14.580170] kunit_try_run_case+0x1a5/0x480 [ 14.580395] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.580662] kthread+0x337/0x6f0 [ 14.580795] ret_from_fork+0x116/0x1d0 [ 14.581018] ret_from_fork_asm+0x1a/0x30 [ 14.581269] [ 14.581385] The buggy address belongs to the object at ffff8881038eb080 [ 14.581385] which belongs to the cache kmalloc-64 of size 64 [ 14.581886] The buggy address is located 0 bytes to the right of [ 14.581886] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.582481] [ 14.582556] The buggy address belongs to the physical page: [ 14.582726] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.582959] flags: 0x200000000000000(node=0|zone=2) [ 14.583191] page_type: f5(slab) [ 14.583366] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.583702] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.584229] page dumped because: kasan: bad access detected [ 14.584580] [ 14.584677] Memory state around the buggy address: [ 14.584859] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.585072] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.585499] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.585815] ^ [ 14.586048] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.586275] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.586830] ================================================================== [ 15.292947] ================================================================== [ 15.293592] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 15.293934] Read of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 15.294210] [ 15.294304] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.294348] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.294361] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.294383] Call Trace: [ 15.294401] <TASK> [ 15.294421] dump_stack_lvl+0x73/0xb0 [ 15.294448] print_report+0xd1/0x650 [ 15.294470] ? __virt_addr_valid+0x1db/0x2d0 [ 15.294492] ? kasan_atomics_helper+0x5115/0x5450 [ 15.294515] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.294537] ? kasan_atomics_helper+0x5115/0x5450 [ 15.294559] kasan_report+0x141/0x180 [ 15.294583] ? kasan_atomics_helper+0x5115/0x5450 [ 15.294609] __asan_report_load8_noabort+0x18/0x20 [ 15.294634] kasan_atomics_helper+0x5115/0x5450 [ 15.294657] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.294680] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.294706] ? kasan_atomics+0x152/0x310 [ 15.294732] kasan_atomics+0x1dc/0x310 [ 15.294756] ? __pfx_kasan_atomics+0x10/0x10 [ 15.294781] ? __pfx_read_tsc+0x10/0x10 [ 15.294802] ? ktime_get_ts64+0x86/0x230 [ 15.294826] kunit_try_run_case+0x1a5/0x480 [ 15.294851] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.294874] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.294898] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.294922] ? __kthread_parkme+0x82/0x180 [ 15.294943] ? preempt_count_sub+0x50/0x80 [ 15.294967] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.294991] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.295015] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.295039] kthread+0x337/0x6f0 [ 15.295058] ? trace_preempt_on+0x20/0xc0 [ 15.295083] ? __pfx_kthread+0x10/0x10 [ 15.295149] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.295172] ? calculate_sigpending+0x7b/0xa0 [ 15.295197] ? __pfx_kthread+0x10/0x10 [ 15.295225] ret_from_fork+0x116/0x1d0 [ 15.295244] ? __pfx_kthread+0x10/0x10 [ 15.295266] ret_from_fork_asm+0x1a/0x30 [ 15.295298] </TASK> [ 15.295310] [ 15.305877] Allocated by task 283: [ 15.306057] kasan_save_stack+0x45/0x70 [ 15.306224] kasan_save_track+0x18/0x40 [ 15.306439] kasan_save_alloc_info+0x3b/0x50 [ 15.307055] __kasan_kmalloc+0xb7/0xc0 [ 15.307250] __kmalloc_cache_noprof+0x189/0x420 [ 15.307587] kasan_atomics+0x95/0x310 [ 15.307797] kunit_try_run_case+0x1a5/0x480 [ 15.308106] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.308655] kthread+0x337/0x6f0 [ 15.308800] ret_from_fork+0x116/0x1d0 [ 15.309071] ret_from_fork_asm+0x1a/0x30 [ 15.309483] [ 15.309595] The buggy address belongs to the object at ffff8881038eb080 [ 15.309595] which belongs to the cache kmalloc-64 of size 64 [ 15.310386] The buggy address is located 0 bytes to the right of [ 15.310386] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 15.311062] [ 15.311295] The buggy address belongs to the physical page: [ 15.311646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 15.312108] flags: 0x200000000000000(node=0|zone=2) [ 15.312431] page_type: f5(slab) [ 15.312743] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.313155] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.313651] page dumped because: kasan: bad access detected [ 15.314011] [ 15.314111] Memory state around the buggy address: [ 15.314480] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.314932] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.315421] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.315790] ^ [ 15.315993] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.316315] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.316915] ================================================================== [ 14.103809] ================================================================== [ 14.104229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 14.104630] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.104984] [ 14.105128] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.105183] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.105197] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.105269] Call Trace: [ 14.105284] <TASK> [ 14.105323] dump_stack_lvl+0x73/0xb0 [ 14.105363] print_report+0xd1/0x650 [ 14.105402] ? __virt_addr_valid+0x1db/0x2d0 [ 14.105468] ? kasan_atomics_helper+0x697/0x5450 [ 14.105491] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.105514] ? kasan_atomics_helper+0x697/0x5450 [ 14.105546] kasan_report+0x141/0x180 [ 14.105570] ? kasan_atomics_helper+0x697/0x5450 [ 14.105596] kasan_check_range+0x10c/0x1c0 [ 14.105620] __kasan_check_write+0x18/0x20 [ 14.105641] kasan_atomics_helper+0x697/0x5450 [ 14.105663] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.105685] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.105711] ? kasan_atomics+0x152/0x310 [ 14.105737] kasan_atomics+0x1dc/0x310 [ 14.105762] ? __pfx_kasan_atomics+0x10/0x10 [ 14.105814] ? __pfx_read_tsc+0x10/0x10 [ 14.105836] ? ktime_get_ts64+0x86/0x230 [ 14.105860] kunit_try_run_case+0x1a5/0x480 [ 14.105895] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.105918] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.105942] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.105990] ? __kthread_parkme+0x82/0x180 [ 14.106011] ? preempt_count_sub+0x50/0x80 [ 14.106062] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.106110] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.106136] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.106160] kthread+0x337/0x6f0 [ 14.106180] ? trace_preempt_on+0x20/0xc0 [ 14.106202] ? __pfx_kthread+0x10/0x10 [ 14.106223] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.106288] ? calculate_sigpending+0x7b/0xa0 [ 14.106326] ? __pfx_kthread+0x10/0x10 [ 14.106348] ret_from_fork+0x116/0x1d0 [ 14.106367] ? __pfx_kthread+0x10/0x10 [ 14.106417] ret_from_fork_asm+0x1a/0x30 [ 14.106449] </TASK> [ 14.106460] [ 14.116022] Allocated by task 283: [ 14.116317] kasan_save_stack+0x45/0x70 [ 14.116577] kasan_save_track+0x18/0x40 [ 14.116796] kasan_save_alloc_info+0x3b/0x50 [ 14.117042] __kasan_kmalloc+0xb7/0xc0 [ 14.117344] __kmalloc_cache_noprof+0x189/0x420 [ 14.117634] kasan_atomics+0x95/0x310 [ 14.117877] kunit_try_run_case+0x1a5/0x480 [ 14.118112] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.118400] kthread+0x337/0x6f0 [ 14.118729] ret_from_fork+0x116/0x1d0 [ 14.118918] ret_from_fork_asm+0x1a/0x30 [ 14.119059] [ 14.119144] The buggy address belongs to the object at ffff8881038eb080 [ 14.119144] which belongs to the cache kmalloc-64 of size 64 [ 14.120080] The buggy address is located 0 bytes to the right of [ 14.120080] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.120938] [ 14.121044] The buggy address belongs to the physical page: [ 14.121493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.121841] flags: 0x200000000000000(node=0|zone=2) [ 14.122034] page_type: f5(slab) [ 14.122297] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.122692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.123004] page dumped because: kasan: bad access detected [ 14.123333] [ 14.123468] Memory state around the buggy address: [ 14.123685] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.124040] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.124455] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.124810] ^ [ 14.125057] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.125690] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.126078] ================================================================== [ 14.019411] ================================================================== [ 14.019699] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 14.020008] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.020278] [ 14.020364] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.020458] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.020472] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.020494] Call Trace: [ 14.020509] <TASK> [ 14.020525] dump_stack_lvl+0x73/0xb0 [ 14.020551] print_report+0xd1/0x650 [ 14.020575] ? __virt_addr_valid+0x1db/0x2d0 [ 14.020611] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.020634] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.020656] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.020690] kasan_report+0x141/0x180 [ 14.020712] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.020739] kasan_check_range+0x10c/0x1c0 [ 14.020764] __kasan_check_write+0x18/0x20 [ 14.020785] kasan_atomics_helper+0x4a0/0x5450 [ 14.020807] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.020830] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.020855] ? kasan_atomics+0x152/0x310 [ 14.020881] kasan_atomics+0x1dc/0x310 [ 14.020914] ? __pfx_kasan_atomics+0x10/0x10 [ 14.020938] ? __pfx_read_tsc+0x10/0x10 [ 14.020959] ? ktime_get_ts64+0x86/0x230 [ 14.020993] kunit_try_run_case+0x1a5/0x480 [ 14.021016] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.021039] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.021062] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.021087] ? __kthread_parkme+0x82/0x180 [ 14.021115] ? preempt_count_sub+0x50/0x80 [ 14.021139] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.021164] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.021186] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.021210] kthread+0x337/0x6f0 [ 14.021230] ? trace_preempt_on+0x20/0xc0 [ 14.021254] ? __pfx_kthread+0x10/0x10 [ 14.021275] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.021296] ? calculate_sigpending+0x7b/0xa0 [ 14.021320] ? __pfx_kthread+0x10/0x10 [ 14.021403] ret_from_fork+0x116/0x1d0 [ 14.021424] ? __pfx_kthread+0x10/0x10 [ 14.021449] ret_from_fork_asm+0x1a/0x30 [ 14.021482] </TASK> [ 14.021494] [ 14.029768] Allocated by task 283: [ 14.029904] kasan_save_stack+0x45/0x70 [ 14.030051] kasan_save_track+0x18/0x40 [ 14.030298] kasan_save_alloc_info+0x3b/0x50 [ 14.030555] __kasan_kmalloc+0xb7/0xc0 [ 14.030772] __kmalloc_cache_noprof+0x189/0x420 [ 14.031002] kasan_atomics+0x95/0x310 [ 14.031287] kunit_try_run_case+0x1a5/0x480 [ 14.031532] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.031783] kthread+0x337/0x6f0 [ 14.031957] ret_from_fork+0x116/0x1d0 [ 14.032128] ret_from_fork_asm+0x1a/0x30 [ 14.032514] [ 14.032701] The buggy address belongs to the object at ffff8881038eb080 [ 14.032701] which belongs to the cache kmalloc-64 of size 64 [ 14.033272] The buggy address is located 0 bytes to the right of [ 14.033272] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.033870] [ 14.033979] The buggy address belongs to the physical page: [ 14.034276] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.034644] flags: 0x200000000000000(node=0|zone=2) [ 14.034886] page_type: f5(slab) [ 14.035053] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.035501] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.035735] page dumped because: kasan: bad access detected [ 14.035919] [ 14.035995] Memory state around the buggy address: [ 14.036300] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.036755] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.037077] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.037523] ^ [ 14.037680] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.037898] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.038123] ================================================================== [ 14.059180] ================================================================== [ 14.059877] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 14.060488] Write of size 4 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.060726] [ 14.060820] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.060862] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.060875] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.060897] Call Trace: [ 14.060914] <TASK> [ 14.060930] dump_stack_lvl+0x73/0xb0 [ 14.060956] print_report+0xd1/0x650 [ 14.060980] ? __virt_addr_valid+0x1db/0x2d0 [ 14.061003] ? kasan_atomics_helper+0x565/0x5450 [ 14.061025] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.061058] ? kasan_atomics_helper+0x565/0x5450 [ 14.061081] kasan_report+0x141/0x180 [ 14.061125] ? kasan_atomics_helper+0x565/0x5450 [ 14.061153] kasan_check_range+0x10c/0x1c0 [ 14.061179] __kasan_check_write+0x18/0x20 [ 14.061199] kasan_atomics_helper+0x565/0x5450 [ 14.061221] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.061293] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.061336] ? kasan_atomics+0x152/0x310 [ 14.061365] kasan_atomics+0x1dc/0x310 [ 14.061388] ? __pfx_kasan_atomics+0x10/0x10 [ 14.061413] ? __pfx_read_tsc+0x10/0x10 [ 14.061444] ? ktime_get_ts64+0x86/0x230 [ 14.061468] kunit_try_run_case+0x1a5/0x480 [ 14.061492] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.061524] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.061548] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.061571] ? __kthread_parkme+0x82/0x180 [ 14.061591] ? preempt_count_sub+0x50/0x80 [ 14.061615] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.061648] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.061671] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.061705] kthread+0x337/0x6f0 [ 14.061725] ? trace_preempt_on+0x20/0xc0 [ 14.061748] ? __pfx_kthread+0x10/0x10 [ 14.061769] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.061790] ? calculate_sigpending+0x7b/0xa0 [ 14.061823] ? __pfx_kthread+0x10/0x10 [ 14.061846] ret_from_fork+0x116/0x1d0 [ 14.061867] ? __pfx_kthread+0x10/0x10 [ 14.061898] ret_from_fork_asm+0x1a/0x30 [ 14.061929] </TASK> [ 14.061943] [ 14.070677] Allocated by task 283: [ 14.070939] kasan_save_stack+0x45/0x70 [ 14.071158] kasan_save_track+0x18/0x40 [ 14.071430] kasan_save_alloc_info+0x3b/0x50 [ 14.071690] __kasan_kmalloc+0xb7/0xc0 [ 14.071898] __kmalloc_cache_noprof+0x189/0x420 [ 14.072142] kasan_atomics+0x95/0x310 [ 14.072404] kunit_try_run_case+0x1a5/0x480 [ 14.072608] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.072827] kthread+0x337/0x6f0 [ 14.073047] ret_from_fork+0x116/0x1d0 [ 14.073335] ret_from_fork_asm+0x1a/0x30 [ 14.073603] [ 14.073705] The buggy address belongs to the object at ffff8881038eb080 [ 14.073705] which belongs to the cache kmalloc-64 of size 64 [ 14.074269] The buggy address is located 0 bytes to the right of [ 14.074269] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.074950] [ 14.075036] The buggy address belongs to the physical page: [ 14.075323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.075948] flags: 0x200000000000000(node=0|zone=2) [ 14.076324] page_type: f5(slab) [ 14.076521] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.076879] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.077281] page dumped because: kasan: bad access detected [ 14.077673] [ 14.077803] Memory state around the buggy address: [ 14.078063] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.078446] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.078858] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.079424] ^ [ 14.079707] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.080207] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.080654] ================================================================== [ 15.274147] ================================================================== [ 15.274619] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 15.274966] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 15.275301] [ 15.275429] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.275475] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.275508] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.275531] Call Trace: [ 15.275550] <TASK> [ 15.275567] dump_stack_lvl+0x73/0xb0 [ 15.275595] print_report+0xd1/0x650 [ 15.275618] ? __virt_addr_valid+0x1db/0x2d0 [ 15.275640] ? kasan_atomics_helper+0x224c/0x5450 [ 15.275662] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.275704] ? kasan_atomics_helper+0x224c/0x5450 [ 15.275726] kasan_report+0x141/0x180 [ 15.275749] ? kasan_atomics_helper+0x224c/0x5450 [ 15.275776] kasan_check_range+0x10c/0x1c0 [ 15.275800] __kasan_check_write+0x18/0x20 [ 15.275820] kasan_atomics_helper+0x224c/0x5450 [ 15.275843] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.275883] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.275908] ? kasan_atomics+0x152/0x310 [ 15.275935] kasan_atomics+0x1dc/0x310 [ 15.275976] ? __pfx_kasan_atomics+0x10/0x10 [ 15.276001] ? __pfx_read_tsc+0x10/0x10 [ 15.276022] ? ktime_get_ts64+0x86/0x230 [ 15.276046] kunit_try_run_case+0x1a5/0x480 [ 15.276071] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.276093] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.276128] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.276152] ? __kthread_parkme+0x82/0x180 [ 15.276173] ? preempt_count_sub+0x50/0x80 [ 15.276197] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.276221] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.276244] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.276286] kthread+0x337/0x6f0 [ 15.276305] ? trace_preempt_on+0x20/0xc0 [ 15.276338] ? __pfx_kthread+0x10/0x10 [ 15.276360] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.276382] ? calculate_sigpending+0x7b/0xa0 [ 15.276407] ? __pfx_kthread+0x10/0x10 [ 15.276428] ret_from_fork+0x116/0x1d0 [ 15.276447] ? __pfx_kthread+0x10/0x10 [ 15.276468] ret_from_fork_asm+0x1a/0x30 [ 15.276518] </TASK> [ 15.276530] [ 15.284242] Allocated by task 283: [ 15.284446] kasan_save_stack+0x45/0x70 [ 15.284649] kasan_save_track+0x18/0x40 [ 15.284852] kasan_save_alloc_info+0x3b/0x50 [ 15.285059] __kasan_kmalloc+0xb7/0xc0 [ 15.285238] __kmalloc_cache_noprof+0x189/0x420 [ 15.285395] kasan_atomics+0x95/0x310 [ 15.285607] kunit_try_run_case+0x1a5/0x480 [ 15.285817] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.286062] kthread+0x337/0x6f0 [ 15.286236] ret_from_fork+0x116/0x1d0 [ 15.286400] ret_from_fork_asm+0x1a/0x30 [ 15.286620] [ 15.286745] The buggy address belongs to the object at ffff8881038eb080 [ 15.286745] which belongs to the cache kmalloc-64 of size 64 [ 15.287379] The buggy address is located 0 bytes to the right of [ 15.287379] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 15.288200] [ 15.288297] The buggy address belongs to the physical page: [ 15.288547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 15.288892] flags: 0x200000000000000(node=0|zone=2) [ 15.289134] page_type: f5(slab) [ 15.289304] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.289698] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.289920] page dumped because: kasan: bad access detected [ 15.290086] [ 15.290165] Memory state around the buggy address: [ 15.290318] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.290709] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.291035] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.291483] ^ [ 15.291739] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.292079] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.292380] ================================================================== [ 14.950459] ================================================================== [ 14.951036] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 14.951543] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 14.951842] [ 14.951947] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.951991] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.952004] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.952026] Call Trace: [ 14.952041] <TASK> [ 14.952060] dump_stack_lvl+0x73/0xb0 [ 14.952087] print_report+0xd1/0x650 [ 14.952123] ? __virt_addr_valid+0x1db/0x2d0 [ 14.952146] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.952169] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.952193] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.952215] kasan_report+0x141/0x180 [ 14.952238] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.952264] kasan_check_range+0x10c/0x1c0 [ 14.952289] __kasan_check_write+0x18/0x20 [ 14.952309] kasan_atomics_helper+0x1a7f/0x5450 [ 14.952331] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.952355] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.952379] ? kasan_atomics+0x152/0x310 [ 14.952406] kasan_atomics+0x1dc/0x310 [ 14.952429] ? __pfx_kasan_atomics+0x10/0x10 [ 14.952454] ? __pfx_read_tsc+0x10/0x10 [ 14.952475] ? ktime_get_ts64+0x86/0x230 [ 14.952498] kunit_try_run_case+0x1a5/0x480 [ 14.952522] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.952544] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.952567] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.952590] ? __kthread_parkme+0x82/0x180 [ 14.952610] ? preempt_count_sub+0x50/0x80 [ 14.952633] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.952657] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.952680] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.952703] kthread+0x337/0x6f0 [ 14.952723] ? trace_preempt_on+0x20/0xc0 [ 14.952745] ? __pfx_kthread+0x10/0x10 [ 14.952766] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.952788] ? calculate_sigpending+0x7b/0xa0 [ 14.952811] ? __pfx_kthread+0x10/0x10 [ 14.952833] ret_from_fork+0x116/0x1d0 [ 14.952852] ? __pfx_kthread+0x10/0x10 [ 14.952872] ret_from_fork_asm+0x1a/0x30 [ 14.952903] </TASK> [ 14.952915] [ 14.963092] Allocated by task 283: [ 14.963269] kasan_save_stack+0x45/0x70 [ 14.963422] kasan_save_track+0x18/0x40 [ 14.963562] kasan_save_alloc_info+0x3b/0x50 [ 14.963717] __kasan_kmalloc+0xb7/0xc0 [ 14.963852] __kmalloc_cache_noprof+0x189/0x420 [ 14.964011] kasan_atomics+0x95/0x310 [ 14.964156] kunit_try_run_case+0x1a5/0x480 [ 14.964339] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.964574] kthread+0x337/0x6f0 [ 14.965464] ret_from_fork+0x116/0x1d0 [ 14.965924] ret_from_fork_asm+0x1a/0x30 [ 14.966084] [ 14.966175] The buggy address belongs to the object at ffff8881038eb080 [ 14.966175] which belongs to the cache kmalloc-64 of size 64 [ 14.968192] The buggy address is located 0 bytes to the right of [ 14.968192] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 14.969006] [ 14.969143] The buggy address belongs to the physical page: [ 14.969432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 14.969682] flags: 0x200000000000000(node=0|zone=2) [ 14.969901] page_type: f5(slab) [ 14.970171] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.970421] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.970926] page dumped because: kasan: bad access detected [ 14.971109] [ 14.971184] Memory state around the buggy address: [ 14.972245] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.972482] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.972704] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.973185] ^ [ 14.973390] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.973706] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.973968] ================================================================== [ 15.149281] ================================================================== [ 15.149705] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 15.150081] Write of size 8 at addr ffff8881038eb0b0 by task kunit_try_catch/283 [ 15.150482] [ 15.150603] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.150658] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.150671] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.150711] Call Trace: [ 15.150727] <TASK> [ 15.150742] dump_stack_lvl+0x73/0xb0 [ 15.150785] print_report+0xd1/0x650 [ 15.150809] ? __virt_addr_valid+0x1db/0x2d0 [ 15.150832] ? kasan_atomics_helper+0x2006/0x5450 [ 15.150854] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.150877] ? kasan_atomics_helper+0x2006/0x5450 [ 15.150900] kasan_report+0x141/0x180 [ 15.150921] ? kasan_atomics_helper+0x2006/0x5450 [ 15.150948] kasan_check_range+0x10c/0x1c0 [ 15.150973] __kasan_check_write+0x18/0x20 [ 15.150993] kasan_atomics_helper+0x2006/0x5450 [ 15.151016] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.151039] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.151065] ? kasan_atomics+0x152/0x310 [ 15.151093] kasan_atomics+0x1dc/0x310 [ 15.151130] ? __pfx_kasan_atomics+0x10/0x10 [ 15.151155] ? __pfx_read_tsc+0x10/0x10 [ 15.151176] ? ktime_get_ts64+0x86/0x230 [ 15.151205] kunit_try_run_case+0x1a5/0x480 [ 15.151229] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.151251] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.151275] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.151298] ? __kthread_parkme+0x82/0x180 [ 15.151318] ? preempt_count_sub+0x50/0x80 [ 15.151355] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.151380] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.151403] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.151427] kthread+0x337/0x6f0 [ 15.151448] ? trace_preempt_on+0x20/0xc0 [ 15.151472] ? __pfx_kthread+0x10/0x10 [ 15.151513] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.151534] ? calculate_sigpending+0x7b/0xa0 [ 15.151557] ? __pfx_kthread+0x10/0x10 [ 15.151596] ret_from_fork+0x116/0x1d0 [ 15.151616] ? __pfx_kthread+0x10/0x10 [ 15.151636] ret_from_fork_asm+0x1a/0x30 [ 15.151685] </TASK> [ 15.151699] [ 15.159311] Allocated by task 283: [ 15.159684] kasan_save_stack+0x45/0x70 [ 15.159924] kasan_save_track+0x18/0x40 [ 15.160144] kasan_save_alloc_info+0x3b/0x50 [ 15.160398] __kasan_kmalloc+0xb7/0xc0 [ 15.160562] __kmalloc_cache_noprof+0x189/0x420 [ 15.160786] kasan_atomics+0x95/0x310 [ 15.160918] kunit_try_run_case+0x1a5/0x480 [ 15.161058] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.161316] kthread+0x337/0x6f0 [ 15.161519] ret_from_fork+0x116/0x1d0 [ 15.161737] ret_from_fork_asm+0x1a/0x30 [ 15.161933] [ 15.162029] The buggy address belongs to the object at ffff8881038eb080 [ 15.162029] which belongs to the cache kmalloc-64 of size 64 [ 15.162557] The buggy address is located 0 bytes to the right of [ 15.162557] allocated 48-byte region [ffff8881038eb080, ffff8881038eb0b0) [ 15.163012] [ 15.163084] The buggy address belongs to the physical page: [ 15.163266] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038eb [ 15.163989] flags: 0x200000000000000(node=0|zone=2) [ 15.164217] page_type: f5(slab) [ 15.164412] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.164727] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.165030] page dumped because: kasan: bad access detected [ 15.165240] [ 15.165346] Memory state around the buggy address: [ 15.165567] ffff8881038eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.165876] ffff8881038eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.166167] >ffff8881038eb080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.166481] ^ [ 15.166683] ffff8881038eb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.166990] ffff8881038eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.167301] ==================================================================