Date
July 5, 2025, 5:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 20.900359] ================================================================== [ 20.900412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 20.900465] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265 [ 20.900920] [ 20.901000] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.901175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.901234] Hardware name: linux,dummy-virt (DT) [ 20.901267] Call trace: [ 20.901293] show_stack+0x20/0x38 (C) [ 20.901565] dump_stack_lvl+0x8c/0xd0 [ 20.901629] print_report+0x118/0x608 [ 20.902011] kasan_report+0xdc/0x128 [ 20.902083] kasan_check_range+0x100/0x1a8 [ 20.902189] __kasan_check_write+0x20/0x30 [ 20.902257] kasan_atomics_helper+0xe44/0x4858 [ 20.902402] kasan_atomics+0x198/0x2e0 [ 20.902480] kunit_try_run_case+0x170/0x3f0 [ 20.902543] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.902775] kthread+0x328/0x630 [ 20.903025] ret_from_fork+0x10/0x20 [ 20.903288] [ 20.903393] Allocated by task 265: [ 20.903538] kasan_save_stack+0x3c/0x68 [ 20.903605] kasan_save_track+0x20/0x40 [ 20.903768] kasan_save_alloc_info+0x40/0x58 [ 20.903992] __kasan_kmalloc+0xd4/0xd8 [ 20.904192] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.904263] kasan_atomics+0xb8/0x2e0 [ 20.904606] kunit_try_run_case+0x170/0x3f0 [ 20.904763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.905083] kthread+0x328/0x630 [ 20.905235] ret_from_fork+0x10/0x20 [ 20.905362] [ 20.905423] The buggy address belongs to the object at fff00000c77daf80 [ 20.905423] which belongs to the cache kmalloc-64 of size 64 [ 20.905752] The buggy address is located 0 bytes to the right of [ 20.905752] allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0) [ 20.906012] [ 20.906449] The buggy address belongs to the physical page: [ 20.906516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da [ 20.906769] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.907015] page_type: f5(slab) [ 20.907070] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.907317] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.907483] page dumped because: kasan: bad access detected [ 20.907584] [ 20.907951] Memory state around the buggy address: [ 20.908000] fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.908083] fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.908313] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.908453] ^ [ 20.908526] fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.908986] fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.909176] ================================================================== [ 20.869682] ================================================================== [ 20.869737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 20.870236] Write of size 4 at addr fff00000c77dafb0 by task kunit_try_catch/265 [ 20.870306] [ 20.870343] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.870695] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.870926] Hardware name: linux,dummy-virt (DT) [ 20.871118] Call trace: [ 20.871228] show_stack+0x20/0x38 (C) [ 20.871369] dump_stack_lvl+0x8c/0xd0 [ 20.871473] print_report+0x118/0x608 [ 20.871592] kasan_report+0xdc/0x128 [ 20.871643] kasan_check_range+0x100/0x1a8 [ 20.871694] __kasan_check_write+0x20/0x30 [ 20.872023] kasan_atomics_helper+0xd3c/0x4858 [ 20.872347] kasan_atomics+0x198/0x2e0 [ 20.872762] kunit_try_run_case+0x170/0x3f0 [ 20.873142] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.873236] kthread+0x328/0x630 [ 20.873282] ret_from_fork+0x10/0x20 [ 20.873576] [ 20.873627] Allocated by task 265: [ 20.873680] kasan_save_stack+0x3c/0x68 [ 20.874029] kasan_save_track+0x20/0x40 [ 20.874123] kasan_save_alloc_info+0x40/0x58 [ 20.874169] __kasan_kmalloc+0xd4/0xd8 [ 20.874453] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.874614] kasan_atomics+0xb8/0x2e0 [ 20.874835] kunit_try_run_case+0x170/0x3f0 [ 20.875028] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.875083] kthread+0x328/0x630 [ 20.875118] ret_from_fork+0x10/0x20 [ 20.875157] [ 20.875189] The buggy address belongs to the object at fff00000c77daf80 [ 20.875189] which belongs to the cache kmalloc-64 of size 64 [ 20.875567] The buggy address is located 0 bytes to the right of [ 20.875567] allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0) [ 20.875690] [ 20.876220] The buggy address belongs to the physical page: [ 20.876287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da [ 20.876651] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.876731] page_type: f5(slab) [ 20.876774] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.877050] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.877359] page dumped because: kasan: bad access detected [ 20.877552] [ 20.877614] Memory state around the buggy address: [ 20.877690] fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.877827] fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.877902] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.878143] ^ [ 20.878380] fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.878559] fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.878685] ================================================================== [ 21.044928] ================================================================== [ 21.045043] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 21.045123] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265 [ 21.045176] [ 21.045306] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.045392] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.045422] Hardware name: linux,dummy-virt (DT) [ 21.045715] Call trace: [ 21.045759] show_stack+0x20/0x38 (C) [ 21.045812] dump_stack_lvl+0x8c/0xd0 [ 21.045874] print_report+0x118/0x608 [ 21.046370] kasan_report+0xdc/0x128 [ 21.046444] kasan_check_range+0x100/0x1a8 [ 21.046621] __kasan_check_write+0x20/0x30 [ 21.046685] kasan_atomics_helper+0x147c/0x4858 [ 21.047078] kasan_atomics+0x198/0x2e0 [ 21.047386] kunit_try_run_case+0x170/0x3f0 [ 21.047585] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.047666] kthread+0x328/0x630 [ 21.047715] ret_from_fork+0x10/0x20 [ 21.048015] [ 21.048178] Allocated by task 265: [ 21.048315] kasan_save_stack+0x3c/0x68 [ 21.048386] kasan_save_track+0x20/0x40 [ 21.048463] kasan_save_alloc_info+0x40/0x58 [ 21.048536] __kasan_kmalloc+0xd4/0xd8 [ 21.048717] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.048934] kasan_atomics+0xb8/0x2e0 [ 21.048998] kunit_try_run_case+0x170/0x3f0 [ 21.049052] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.049097] kthread+0x328/0x630 [ 21.049302] ret_from_fork+0x10/0x20 [ 21.049361] [ 21.049953] The buggy address belongs to the object at fff00000c77daf80 [ 21.049953] which belongs to the cache kmalloc-64 of size 64 [ 21.050025] The buggy address is located 0 bytes to the right of [ 21.050025] allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0) [ 21.050278] [ 21.050453] The buggy address belongs to the physical page: [ 21.050519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da [ 21.050953] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.051316] page_type: f5(slab) [ 21.051464] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.051836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.052060] page dumped because: kasan: bad access detected [ 21.052101] [ 21.052257] Memory state around the buggy address: [ 21.052426] fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.052600] fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.052879] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.053024] ^ [ 21.053063] fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.053324] fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.053523] ================================================================== [ 20.794272] ================================================================== [ 20.794381] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 20.794435] Write of size 4 at addr fff00000c77dafb0 by task kunit_try_catch/265 [ 20.795765] __kasan_check_write+0x20/0x30 [ 20.797100] [ 20.797217] Allocated by task 265: [ 20.797287] kasan_save_stack+0x3c/0x68 [ 20.797432] kasan_save_track+0x20/0x40 [ 20.797506] kasan_save_alloc_info+0x40/0x58 [ 20.797576] __kasan_kmalloc+0xd4/0xd8 [ 20.798001] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.798103] kasan_atomics+0xb8/0x2e0 [ 20.798200] kunit_try_run_case+0x170/0x3f0 [ 20.798269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.798352] kthread+0x328/0x630 [ 20.798458] ret_from_fork+0x10/0x20 [ 20.798502] [ 20.798559] The buggy address belongs to the object at fff00000c77daf80 [ 20.798559] which belongs to the cache kmalloc-64 of size 64 [ 20.798872] The buggy address is located 0 bytes to the right of [ 20.798872] allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0) [ 20.799125] [ 20.799168] The buggy address belongs to the physical page: [ 20.799229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da [ 20.799371] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.799442] page_type: f5(slab) [ 20.799483] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.799541] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.799583] page dumped because: kasan: bad access detected [ 20.799618] [ 20.799638] Memory state around the buggy address: [ 20.799671] fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.799924] fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.800432] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.800704] ^ [ 20.800753] fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.800811] fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.800886] ================================================================== [ 20.959605] ================================================================== [ 20.959771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 20.959832] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265 [ 20.959895] [ 20.959928] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.960010] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.960260] Hardware name: linux,dummy-virt (DT) [ 20.960513] Call trace: [ 20.960541] show_stack+0x20/0x38 (C) [ 20.960596] dump_stack_lvl+0x8c/0xd0 [ 20.960644] print_report+0x118/0x608 [ 20.961155] kasan_report+0xdc/0x128 [ 20.961227] kasan_check_range+0x100/0x1a8 [ 20.961403] __kasan_check_write+0x20/0x30 [ 20.961568] kasan_atomics_helper+0x10c0/0x4858 [ 20.961625] kasan_atomics+0x198/0x2e0 [ 20.961672] kunit_try_run_case+0x170/0x3f0 [ 20.961731] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.961783] kthread+0x328/0x630 [ 20.961826] ret_from_fork+0x10/0x20 [ 20.961882] [ 20.961982] Allocated by task 265: [ 20.962023] kasan_save_stack+0x3c/0x68 [ 20.962075] kasan_save_track+0x20/0x40 [ 20.962125] kasan_save_alloc_info+0x40/0x58 [ 20.962168] __kasan_kmalloc+0xd4/0xd8 [ 20.962207] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.962253] kasan_atomics+0xb8/0x2e0 [ 20.962308] kunit_try_run_case+0x170/0x3f0 [ 20.962347] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.962394] kthread+0x328/0x630 [ 20.962428] ret_from_fork+0x10/0x20 [ 20.962467] [ 20.962488] The buggy address belongs to the object at fff00000c77daf80 [ 20.962488] which belongs to the cache kmalloc-64 of size 64 [ 20.962548] The buggy address is located 0 bytes to the right of [ 20.962548] allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0) [ 20.962612] [ 20.962634] The buggy address belongs to the physical page: [ 20.962666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da [ 20.962722] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.963451] page_type: f5(slab) [ 20.963522] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.963967] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.964417] page dumped because: kasan: bad access detected [ 20.964486] [ 20.964843] Memory state around the buggy address: [ 20.964940] fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.965014] fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.965744] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.965830] ^ [ 20.967173] fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.967383] fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.969798] ================================================================== [ 21.020930] ================================================================== [ 21.020994] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 21.021107] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265 [ 21.021368] [ 21.021445] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.021549] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.021589] Hardware name: linux,dummy-virt (DT) [ 21.021623] Call trace: [ 21.021836] show_stack+0x20/0x38 (C) [ 21.021916] dump_stack_lvl+0x8c/0xd0 [ 21.021972] print_report+0x118/0x608 [ 21.022312] kasan_report+0xdc/0x128 [ 21.022553] kasan_check_range+0x100/0x1a8 [ 21.022621] __kasan_check_write+0x20/0x30 [ 21.022682] kasan_atomics_helper+0x1384/0x4858 [ 21.022733] kasan_atomics+0x198/0x2e0 [ 21.023150] kunit_try_run_case+0x170/0x3f0 [ 21.023268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.023333] kthread+0x328/0x630 [ 21.023378] ret_from_fork+0x10/0x20 [ 21.023431] [ 21.023451] Allocated by task 265: [ 21.023482] kasan_save_stack+0x3c/0x68 [ 21.023526] kasan_save_track+0x20/0x40 [ 21.023566] kasan_save_alloc_info+0x40/0x58 [ 21.023608] __kasan_kmalloc+0xd4/0xd8 [ 21.023646] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.024375] kasan_atomics+0xb8/0x2e0 [ 21.024499] kunit_try_run_case+0x170/0x3f0 [ 21.024636] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.024801] kthread+0x328/0x630 [ 21.024882] ret_from_fork+0x10/0x20 [ 21.024921] [ 21.025115] The buggy address belongs to the object at fff00000c77daf80 [ 21.025115] which belongs to the cache kmalloc-64 of size 64 [ 21.025352] The buggy address is located 0 bytes to the right of [ 21.025352] allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0) [ 21.025438] [ 21.025747] The buggy address belongs to the physical page: [ 21.026107] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da [ 21.026302] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.026612] page_type: f5(slab) [ 21.026679] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.026795] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.027223] page dumped because: kasan: bad access detected [ 21.027330] [ 21.027739] Memory state around the buggy address: [ 21.027815] fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.027881] fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.028109] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.028288] ^ [ 21.028351] fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.028616] fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.028660] ================================================================== [ 21.141737] ================================================================== [ 21.141800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 21.142293] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265 [ 21.142433] [ 21.142509] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.142703] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.142738] Hardware name: linux,dummy-virt (DT) [ 21.142881] Call trace: [ 21.142988] show_stack+0x20/0x38 (C) [ 21.143068] dump_stack_lvl+0x8c/0xd0 [ 21.143118] print_report+0x118/0x608 [ 21.143591] kasan_report+0xdc/0x128 [ 21.143799] kasan_check_range+0x100/0x1a8 [ 21.143960] __kasan_check_write+0x20/0x30 [ 21.144510] kasan_atomics_helper+0x17ec/0x4858 [ 21.144767] kasan_atomics+0x198/0x2e0 [ 21.144914] kunit_try_run_case+0x170/0x3f0 [ 21.145090] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.145167] kthread+0x328/0x630 [ 21.145241] ret_from_fork+0x10/0x20 [ 21.145574] [ 21.145918] Allocated by task 265: [ 21.146073] kasan_save_stack+0x3c/0x68 [ 21.146182] kasan_save_track+0x20/0x40 [ 21.146372] kasan_save_alloc_info+0x40/0x58 [ 21.146421] __kasan_kmalloc+0xd4/0xd8 [ 21.146478] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.146559] kasan_atomics+0xb8/0x2e0 [ 21.146814] kunit_try_run_case+0x170/0x3f0 [ 21.146952] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.147049] kthread+0x328/0x630 [ 21.147471] ret_from_fork+0x10/0x20 [ 21.147673] [ 21.147748] The buggy address belongs to the object at fff00000c77daf80 [ 21.147748] which belongs to the cache kmalloc-64 of size 64 [ 21.147835] The buggy address is located 0 bytes to the right of [ 21.147835] allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0) [ 21.148284] [ 21.148330] The buggy address belongs to the physical page: [ 21.148519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da [ 21.148620] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.148807] page_type: f5(slab) [ 21.149055] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.149228] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.149439] page dumped because: kasan: bad access detected [ 21.149586] [ 21.149608] Memory state around the buggy address: [ 21.149755] fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.150016] fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.150235] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.150494] ^ [ 21.150818] fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.151070] fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.151136] ================================================================== [ 20.925837] ================================================================== [ 20.925905] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 20.925992] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265 [ 20.926243] [ 20.926308] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.926700] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.926828] Hardware name: linux,dummy-virt (DT) [ 20.926919] Call trace: [ 20.926966] show_stack+0x20/0x38 (C) [ 20.927047] dump_stack_lvl+0x8c/0xd0 [ 20.927195] print_report+0x118/0x608 [ 20.927263] kasan_report+0xdc/0x128 [ 20.927311] kasan_check_range+0x100/0x1a8 [ 20.927557] __kasan_check_write+0x20/0x30 [ 20.927758] kasan_atomics_helper+0xf20/0x4858 [ 20.928152] kasan_atomics+0x198/0x2e0 [ 20.928336] kunit_try_run_case+0x170/0x3f0 [ 20.928434] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.928522] kthread+0x328/0x630 [ 20.928840] ret_from_fork+0x10/0x20 [ 20.929087] [ 20.929159] Allocated by task 265: [ 20.929361] kasan_save_stack+0x3c/0x68 [ 20.929556] kasan_save_track+0x20/0x40 [ 20.929629] kasan_save_alloc_info+0x40/0x58 [ 20.929817] __kasan_kmalloc+0xd4/0xd8 [ 20.929921] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.929982] kasan_atomics+0xb8/0x2e0 [ 20.930022] kunit_try_run_case+0x170/0x3f0 [ 20.930394] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.930650] kthread+0x328/0x630 [ 20.931087] ret_from_fork+0x10/0x20 [ 20.931205] [ 20.931264] The buggy address belongs to the object at fff00000c77daf80 [ 20.931264] which belongs to the cache kmalloc-64 of size 64 [ 20.931358] The buggy address is located 0 bytes to the right of [ 20.931358] allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0) [ 20.931600] [ 20.931626] The buggy address belongs to the physical page: [ 20.931694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da [ 20.932082] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.932341] page_type: f5(slab) [ 20.932415] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.932921] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.932994] page dumped because: kasan: bad access detected [ 20.933205] [ 20.933330] Memory state around the buggy address: [ 20.933495] fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.933559] fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.933605] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.933788] ^ [ 20.934012] fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.934379] fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.934444] ================================================================== [ 21.115287] ================================================================== [ 21.115339] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 21.115813] Read of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265 [ 21.116224] [ 21.116277] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.116489] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.116545] Hardware name: linux,dummy-virt (DT) [ 21.116605] Call trace: [ 21.116632] show_stack+0x20/0x38 (C) [ 21.116686] dump_stack_lvl+0x8c/0xd0 [ 21.116903] print_report+0x118/0x608 [ 21.117100] kasan_report+0xdc/0x128 [ 21.117374] __asan_report_load8_noabort+0x20/0x30 [ 21.117648] kasan_atomics_helper+0x3e10/0x4858 [ 21.117725] kasan_atomics+0x198/0x2e0 [ 21.118046] kunit_try_run_case+0x170/0x3f0 [ 21.118187] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.118272] kthread+0x328/0x630 [ 21.118381] ret_from_fork+0x10/0x20 [ 21.118446] [ 21.118488] Allocated by task 265: [ 21.118522] kasan_save_stack+0x3c/0x68 [ 21.118586] kasan_save_track+0x20/0x40 [ 21.118847] kasan_save_alloc_info+0x40/0x58 [ 21.119018] __kasan_kmalloc+0xd4/0xd8 [ 21.119309] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.119516] kasan_atomics+0xb8/0x2e0 [ 21.119579] kunit_try_run_case+0x170/0x3f0 [ 21.119721] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.120128] kthread+0x328/0x630 [ 21.120235] ret_from_fork+0x10/0x20 [ 21.120475] [ 21.120526] The buggy address belongs to the object at fff00000c77daf80 [ 21.120526] which belongs to the cache kmalloc-64 of size 64 [ 21.120612] The buggy address is located 0 bytes to the right of [ 21.120612] allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0) [ 21.121232] [ 21.121321] The buggy address belongs to the physical page: [ 21.121718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da [ 21.121816] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.122112] page_type: f5(slab) [ 21.122281] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.122782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.122887] page dumped because: kasan: bad access detected [ 21.123124] [ 21.123263] Memory state around the buggy address: [ 21.123474] fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.123721] fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.123953] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.124220] ^ [ 21.124263] fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.124493] fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.124585] ================================================================== [ 20.887491] ================================================================== [ 20.887556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 20.887728] Read of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265 [ 20.887992] [ 20.888068] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.888278] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.888464] Hardware name: linux,dummy-virt (DT) [ 20.888523] Call trace: [ 20.888548] show_stack+0x20/0x38 (C) [ 20.888696] dump_stack_lvl+0x8c/0xd0 [ 20.888782] print_report+0x118/0x608 [ 20.888965] kasan_report+0xdc/0x128 [ 20.889171] kasan_check_range+0x100/0x1a8 [ 20.889248] __kasan_check_read+0x20/0x30 [ 20.889442] kasan_atomics_helper+0xdd4/0x4858 [ 20.889629] kasan_atomics+0x198/0x2e0 [ 20.889705] kunit_try_run_case+0x170/0x3f0 [ 20.889759] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.889822] kthread+0x328/0x630 [ 20.889875] ret_from_fork+0x10/0x20 [ 20.889968] [ 20.890020] Allocated by task 265: [ 20.890055] kasan_save_stack+0x3c/0x68 [ 20.890101] kasan_save_track+0x20/0x40 [ 20.890431] kasan_save_alloc_info+0x40/0x58 [ 20.890645] __kasan_kmalloc+0xd4/0xd8 [ 20.890695] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.890975] kasan_atomics+0xb8/0x2e0 [ 20.891227] kunit_try_run_case+0x170/0x3f0 [ 20.891282] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.891344] kthread+0x328/0x630 [ 20.891387] ret_from_fork+0x10/0x20 [ 20.891465] [ 20.891509] The buggy address belongs to the object at fff00000c77daf80 [ 20.891509] which belongs to the cache kmalloc-64 of size 64 [ 20.891577] The buggy address is located 0 bytes to the right of [ 20.891577] allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0) [ 20.891781] [ 20.892157] The buggy address belongs to the physical page: [ 20.892320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da [ 20.892695] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.893036] page_type: f5(slab) [ 20.893495] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.893606] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.893675] page dumped because: kasan: bad access detected [ 20.893767] [ 20.893788] Memory state around the buggy address: [ 20.893828] fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.894183] fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.894360] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.894406] ^ [ 20.894743] fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.895009] fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.895109] ================================================================== [ 20.941357] ================================================================== [ 20.941410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 20.941459] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265 [ 20.941509] [ 20.941674] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.941774] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.942261] Hardware name: linux,dummy-virt (DT) [ 20.942318] Call trace: [ 20.942434] show_stack+0x20/0x38 (C) [ 20.942490] dump_stack_lvl+0x8c/0xd0 [ 20.942557] print_report+0x118/0x608 [ 20.942625] kasan_report+0xdc/0x128 [ 20.942675] kasan_check_range+0x100/0x1a8 [ 20.942724] __kasan_check_write+0x20/0x30 [ 20.943148] kasan_atomics_helper+0xff0/0x4858 [ 20.943471] kasan_atomics+0x198/0x2e0 [ 20.943666] kunit_try_run_case+0x170/0x3f0 [ 20.943755] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.943953] kthread+0x328/0x630 [ 20.944015] ret_from_fork+0x10/0x20 [ 20.944063] [ 20.944085] Allocated by task 265: [ 20.944287] kasan_save_stack+0x3c/0x68 [ 20.944407] kasan_save_track+0x20/0x40 [ 20.944846] kasan_save_alloc_info+0x40/0x58 [ 20.944998] __kasan_kmalloc+0xd4/0xd8 [ 20.945085] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.945247] kasan_atomics+0xb8/0x2e0 [ 20.945315] kunit_try_run_case+0x170/0x3f0 [ 20.945368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.945420] kthread+0x328/0x630 [ 20.945661] ret_from_fork+0x10/0x20 [ 20.946049] [ 20.946093] The buggy address belongs to the object at fff00000c77daf80 [ 20.946093] which belongs to the cache kmalloc-64 of size 64 [ 20.946156] The buggy address is located 0 bytes to the right of [ 20.946156] allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0) [ 20.946539] [ 20.946792] The buggy address belongs to the physical page: [ 20.946894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da [ 20.947151] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.947403] page_type: f5(slab) [ 20.947476] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.947767] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.947977] page dumped because: kasan: bad access detected [ 20.948016] [ 20.948275] Memory state around the buggy address: [ 20.948912] fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.949000] fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.949329] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.949494] ^ [ 20.949721] fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.949897] fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.950012] ================================================================== [ 20.952002] ================================================================== [ 20.952086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 20.952207] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265 [ 20.952260] [ 20.952296] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.952386] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.952726] Hardware name: linux,dummy-virt (DT) [ 20.952779] Call trace: [ 20.952806] show_stack+0x20/0x38 (C) [ 20.952898] dump_stack_lvl+0x8c/0xd0 [ 20.952952] print_report+0x118/0x608 [ 20.953018] kasan_report+0xdc/0x128 [ 20.953301] kasan_check_range+0x100/0x1a8 [ 20.953475] __kasan_check_write+0x20/0x30 [ 20.953537] kasan_atomics_helper+0x1058/0x4858 [ 20.953589] kasan_atomics+0x198/0x2e0 [ 20.953635] kunit_try_run_case+0x170/0x3f0 [ 20.954083] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.954246] kthread+0x328/0x630 [ 20.954305] ret_from_fork+0x10/0x20 [ 20.954357] [ 20.954382] Allocated by task 265: [ 20.954421] kasan_save_stack+0x3c/0x68 [ 20.954476] kasan_save_track+0x20/0x40 [ 20.954516] kasan_save_alloc_info+0x40/0x58 [ 20.954559] __kasan_kmalloc+0xd4/0xd8 [ 20.954596] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.954638] kasan_atomics+0xb8/0x2e0 [ 20.954676] kunit_try_run_case+0x170/0x3f0 [ 20.954714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.954777] kthread+0x328/0x630 [ 20.955190] ret_from_fork+0x10/0x20 [ 20.955485] [ 20.955602] The buggy address belongs to the object at fff00000c77daf80 [ 20.955602] which belongs to the cache kmalloc-64 of size 64 [ 20.955700] The buggy address is located 0 bytes to the right of [ 20.955700] allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0) [ 20.955918] [ 20.955975] The buggy address belongs to the physical page: [ 20.956194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da [ 20.956268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.956419] page_type: f5(slab) [ 20.956646] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.956732] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.956966] page dumped because: kasan: bad access detected [ 20.957148] [ 20.957193] Memory state around the buggy address: [ 20.957267] fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.957343] fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.957776] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.957842] ^ [ 20.957901] fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.958239] fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.958344] ================================================================== [ 20.802542] ================================================================== [ 20.802996] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 20.803189] Write of size 4 at addr fff00000c77dafb0 by task kunit_try_catch/265 [ 20.803318] [ 20.803775] Call trace: [ 20.806475] kasan_save_alloc_info+0x40/0x58 [ 20.806689] __kasan_kmalloc+0xd4/0xd8 [ 20.806830] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.806898] kasan_atomics+0xb8/0x2e0 [ 20.807069] kunit_try_run_case+0x170/0x3f0 [ 20.807285] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.808068] [ 20.808490] [ 20.811429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 20.814835] kasan_save_alloc_info+0x40/0x58 [ 20.815017] __kasan_kmalloc+0xd4/0xd8 [ 20.815082] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.815133] kasan_atomics+0xb8/0x2e0 [ 20.815172] kunit_try_run_case+0x170/0x3f0 [ 20.815213] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.815398] kthread+0x328/0x630 [ 20.815782] The buggy address belongs to the object at fff00000c77daf80 [ 20.815782] which belongs to the cache kmalloc-64 of size 64 [ 20.818332] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.820954] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.823516] page dumped because: kasan: bad access detected [ 20.827184] kasan_atomics+0x198/0x2e0 [ 20.830845] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.834591] ret_from_fork+0x10/0x20 [ 20.838361] page_type: f5(slab) [ 20.838721] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.841955] kunit_try_run_case+0x170/0x3f0 [ 20.843525] kthread+0x328/0x630 [ 20.846070] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.848644] Hardware name: linux,dummy-virt (DT) [ 20.849460] __kasan_kmalloc+0xd4/0xd8 [ 20.851977] page dumped because: kasan: bad access detected [ 20.853612] ================================================================== [ 21.125636] ================================================================== [ 21.125691] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 21.126243] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265 [ 21.126314] [ 21.126588] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.127099] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.127143] Hardware name: linux,dummy-virt (DT) [ 21.127179] Call trace: [ 21.127203] show_stack+0x20/0x38 (C) [ 21.127257] dump_stack_lvl+0x8c/0xd0 [ 21.127304] print_report+0x118/0x608 [ 21.127354] kasan_report+0xdc/0x128 [ 21.127399] kasan_check_range+0x100/0x1a8 [ 21.127455] __kasan_check_write+0x20/0x30 [ 21.127501] kasan_atomics_helper+0x175c/0x4858 [ 21.127549] kasan_atomics+0x198/0x2e0 [ 21.127891] kunit_try_run_case+0x170/0x3f0 [ 21.128079] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.128294] kthread+0x328/0x630 [ 21.128509] ret_from_fork+0x10/0x20 [ 21.128599] [ 21.128698] Allocated by task 265: [ 21.128809] kasan_save_stack+0x3c/0x68 [ 21.128854] kasan_save_track+0x20/0x40 [ 21.129297] kasan_save_alloc_info+0x40/0x58 [ 21.129368] __kasan_kmalloc+0xd4/0xd8 [ 21.129747] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.129818] kasan_atomics+0xb8/0x2e0 [ 21.129969] kunit_try_run_case+0x170/0x3f0 [ 21.130069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.130510] kthread+0x328/0x630 [ 21.130743] ret_from_fork+0x10/0x20 [ 21.130947] [ 21.131004] The buggy address belongs to the object at fff00000c77daf80 [ 21.131004] which belongs to the cache kmalloc-64 of size 64 [ 21.131280] The buggy address is located 0 bytes to the right of [ 21.131280] allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0) [ 21.131555] [ 21.131612] The buggy address belongs to the physical page: [ 21.131670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da [ 21.131752] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.132084] page_type: f5(slab) [ 21.132156] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.132613] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.132667] page dumped because: kasan: bad access detected [ 21.132704] [ 21.132886] Memory state around the buggy address: [ 21.133070] fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.133143] fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.133500] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.133565] ^ [ 21.133603] fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.133970] fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.134293] ================================================================== [ 21.097491] ================================================================== [ 21.098027] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 21.098102] Read of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265 [ 21.098472] [ 21.098516] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.098601] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.098870] Hardware name: linux,dummy-virt (DT) [ 21.098976] Call trace: [ 21.099001] show_stack+0x20/0x38 (C) [ 21.099056] dump_stack_lvl+0x8c/0xd0 [ 21.099104] print_report+0x118/0x608 [ 21.099815] kasan_report+0xdc/0x128 [ 21.100002] __asan_report_load8_noabort+0x20/0x30 [ 21.100128] kasan_atomics_helper+0x3df4/0x4858 [ 21.100219] kasan_atomics+0x198/0x2e0 [ 21.100402] kunit_try_run_case+0x170/0x3f0 [ 21.100460] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.100670] kthread+0x328/0x630 [ 21.101219] ret_from_fork+0x10/0x20 [ 21.101364] [ 21.101444] Allocated by task 265: [ 21.101569] kasan_save_stack+0x3c/0x68 [ 21.101673] kasan_save_track+0x20/0x40 [ 21.101982] kasan_save_alloc_info+0x40/0x58 [ 21.102510] __kasan_kmalloc+0xd4/0xd8 [ 21.102627] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.103006] kasan_atomics+0xb8/0x2e0 [ 21.103058] kunit_try_run_case+0x170/0x3f0 [ 21.103097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.103395] kthread+0x328/0x630 [ 21.103881] ret_from_fork+0x10/0x20 [ 21.104136] [ 21.104352] The buggy address belongs to the object at fff00000c77daf80 [ 21.104352] which belongs to the cache kmalloc-64 of size 64 [ 21.104463] The buggy address is located 0 bytes to the right of [ 21.104463] allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0) [ 21.105026] [ 21.105102] The buggy address belongs to the physical page: [ 21.105280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da [ 21.105512] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.105592] page_type: f5(slab) [ 21.105634] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.106005] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.106352] page dumped because: kasan: bad access detected [ 21.106429] [ 21.106450] Memory state around the buggy address: [ 21.106631] fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.106855] fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.106945] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.107299] ^ [ 21.107447] fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.107720] fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.108011] ================================================================== [ 20.879544] ================================================================== [ 20.879629] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 20.879683] Read of size 4 at addr fff00000c77dafb0 by task kunit_try_catch/265 [ 20.879744] [ 20.879895] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.880054] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.880087] Hardware name: linux,dummy-virt (DT) [ 20.880121] Call trace: [ 20.880145] show_stack+0x20/0x38 (C) [ 20.880203] dump_stack_lvl+0x8c/0xd0 [ 20.880253] print_report+0x118/0x608 [ 20.880542] kasan_report+0xdc/0x128 [ 20.880792] __asan_report_load4_noabort+0x20/0x30 [ 20.881016] kasan_atomics_helper+0x3e04/0x4858 [ 20.881081] kasan_atomics+0x198/0x2e0 [ 20.881220] kunit_try_run_case+0x170/0x3f0 [ 20.881305] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.881497] kthread+0x328/0x630 [ 20.881558] ret_from_fork+0x10/0x20 [ 20.881763] [ 20.881794] Allocated by task 265: [ 20.882155] kasan_save_stack+0x3c/0x68 [ 20.882218] kasan_save_track+0x20/0x40 [ 20.882540] kasan_save_alloc_info+0x40/0x58 [ 20.882598] __kasan_kmalloc+0xd4/0xd8 [ 20.882638] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.882679] kasan_atomics+0xb8/0x2e0 [ 20.882715] kunit_try_run_case+0x170/0x3f0 [ 20.882755] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.882800] kthread+0x328/0x630 [ 20.882834] ret_from_fork+0x10/0x20 [ 20.882921] [ 20.882945] The buggy address belongs to the object at fff00000c77daf80 [ 20.882945] which belongs to the cache kmalloc-64 of size 64 [ 20.883015] The buggy address is located 0 bytes to the right of [ 20.883015] allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0) [ 20.883089] [ 20.883129] The buggy address belongs to the physical page: [ 20.883442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da [ 20.883510] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.883560] page_type: f5(slab) [ 20.883628] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.884054] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.884351] page dumped because: kasan: bad access detected [ 20.884404] [ 20.884691] Memory state around the buggy address: [ 20.884935] fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.885024] fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.885199] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.885504] ^ [ 20.885880] fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.886044] fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.886123] ================================================================== [ 20.935245] ================================================================== [ 20.935299] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 20.935481] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265 [ 20.935536] [ 20.935570] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.935893] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.935933] Hardware name: linux,dummy-virt (DT) [ 20.935968] Call trace: [ 20.936373] show_stack+0x20/0x38 (C) [ 20.936448] dump_stack_lvl+0x8c/0xd0 [ 20.936500] print_report+0x118/0x608 [ 20.936548] kasan_report+0xdc/0x128 [ 20.936596] kasan_check_range+0x100/0x1a8 [ 20.936645] __kasan_check_write+0x20/0x30 [ 20.936690] kasan_atomics_helper+0xf88/0x4858 [ 20.936739] kasan_atomics+0x198/0x2e0 [ 20.936785] kunit_try_run_case+0x170/0x3f0 [ 20.936835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.936901] kthread+0x328/0x630 [ 20.936943] ret_from_fork+0x10/0x20 [ 20.936992] [ 20.937090] Allocated by task 265: [ 20.937124] kasan_save_stack+0x3c/0x68 [ 20.937180] kasan_save_track+0x20/0x40 [ 20.937231] kasan_save_alloc_info+0x40/0x58 [ 20.937274] __kasan_kmalloc+0xd4/0xd8 [ 20.937313] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.937353] kasan_atomics+0xb8/0x2e0 [ 20.937392] kunit_try_run_case+0x170/0x3f0 [ 20.937434] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.937479] kthread+0x328/0x630 [ 20.937523] ret_from_fork+0x10/0x20 [ 20.937562] [ 20.937590] The buggy address belongs to the object at fff00000c77daf80 [ 20.937590] which belongs to the cache kmalloc-64 of size 64 [ 20.937657] The buggy address is located 0 bytes to the right of [ 20.937657] allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0) [ 20.937723] [ 20.937744] The buggy address belongs to the physical page: [ 20.937775] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da [ 20.937831] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.938674] page_type: f5(slab) [ 20.938779] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.939121] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.939452] page dumped because: kasan: bad access detected [ 20.939500] [ 20.939692] Memory state around the buggy address: [ 20.939754] fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.939976] fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.940185] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.940250] ^ [ 20.940309] fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.940498] fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.940551] ================================================================== [ 21.065487] ================================================================== [ 21.065543] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 21.065595] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265 [ 21.065881] [ 21.065939] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.066025] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.066055] Hardware name: linux,dummy-virt (DT) [ 21.066361] Call trace: [ 21.066406] show_stack+0x20/0x38 (C) [ 21.066613] dump_stack_lvl+0x8c/0xd0 [ 21.066883] print_report+0x118/0x608 [ 21.066961] kasan_report+0xdc/0x128 [ 21.067477] kasan_check_range+0x100/0x1a8 [ 21.067555] __kasan_check_write+0x20/0x30 [ 21.067778] kasan_atomics_helper+0x154c/0x4858 [ 21.068080] kasan_atomics+0x198/0x2e0 [ 21.068258] kunit_try_run_case+0x170/0x3f0 [ 21.068524] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.068703] kthread+0x328/0x630 [ 21.069017] ret_from_fork+0x10/0x20 [ 21.069164] [ 21.069310] Allocated by task 265: [ 21.069350] kasan_save_stack+0x3c/0x68 [ 21.069481] kasan_save_track+0x20/0x40 [ 21.069522] kasan_save_alloc_info+0x40/0x58 [ 21.069566] __kasan_kmalloc+0xd4/0xd8 [ 21.069618] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.069658] kasan_atomics+0xb8/0x2e0 [ 21.069697] kunit_try_run_case+0x170/0x3f0 [ 21.069737] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.069816] kthread+0x328/0x630 [ 21.069853] ret_from_fork+0x10/0x20 [ 21.069905] [ 21.069943] The buggy address belongs to the object at fff00000c77daf80 [ 21.069943] which belongs to the cache kmalloc-64 of size 64 [ 21.070010] The buggy address is located 0 bytes to the right of [ 21.070010] allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0) [ 21.070093] [ 21.070124] The buggy address belongs to the physical page: [ 21.070161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da [ 21.070232] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.070298] page_type: f5(slab) [ 21.070351] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.070410] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.070458] page dumped because: kasan: bad access detected [ 21.070493] [ 21.070513] Memory state around the buggy address: [ 21.070549] fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.070617] fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.070679] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.070737] ^ [ 21.070802] fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.070846] fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.070895] ================================================================== [ 20.862736] ================================================================== [ 20.863143] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 20.863251] Read of size 4 at addr fff00000c77dafb0 by task kunit_try_catch/265 [ 20.863365] [ 20.863411] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.863520] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.863614] Hardware name: linux,dummy-virt (DT) [ 20.863650] Call trace: [ 20.863696] show_stack+0x20/0x38 (C) [ 20.863754] dump_stack_lvl+0x8c/0xd0 [ 20.864041] print_report+0x118/0x608 [ 20.864389] kasan_report+0xdc/0x128 [ 20.864560] __asan_report_load4_noabort+0x20/0x30 [ 20.864657] kasan_atomics_helper+0x3dd8/0x4858 [ 20.865126] kasan_atomics+0x198/0x2e0 [ 20.865189] kunit_try_run_case+0x170/0x3f0 [ 20.865352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.865460] kthread+0x328/0x630 [ 20.866000] ret_from_fork+0x10/0x20 [ 20.866080] [ 20.866102] Allocated by task 265: [ 20.866347] kasan_save_stack+0x3c/0x68 [ 20.866549] kasan_save_track+0x20/0x40 [ 20.866792] kasan_save_alloc_info+0x40/0x58 [ 20.866850] __kasan_kmalloc+0xd4/0xd8 [ 20.866904] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.866946] kasan_atomics+0xb8/0x2e0 [ 20.866984] kunit_try_run_case+0x170/0x3f0 [ 20.867570] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.867728] kthread+0x328/0x630 [ 20.867796] ret_from_fork+0x10/0x20 [ 20.867845] [ 20.867883] The buggy address belongs to the object at fff00000c77daf80 [ 20.867883] which belongs to the cache kmalloc-64 of size 64 [ 20.867946] The buggy address is located 0 bytes to the right of [ 20.867946] allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0) [ 20.868013] [ 20.868057] The buggy address belongs to the physical page: [ 20.868103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da [ 20.868179] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.868235] page_type: f5(slab) [ 20.868291] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.868343] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.868386] page dumped because: kasan: bad access detected [ 20.868436] [ 20.868456] Memory state around the buggy address: [ 20.868489] fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.868543] fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.868588] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.868628] ^ [ 20.868662] fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.868706] fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.868756] ================================================================== [ 21.072225] ================================================================== [ 21.072440] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 21.072524] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265 [ 21.072779] [ 21.072825] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.072922] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.073175] Hardware name: linux,dummy-virt (DT) [ 21.073566] Call trace: [ 21.073609] show_stack+0x20/0x38 (C) [ 21.073661] dump_stack_lvl+0x8c/0xd0 [ 21.073718] print_report+0x118/0x608 [ 21.073971] kasan_report+0xdc/0x128 [ 21.074052] kasan_check_range+0x100/0x1a8 [ 21.074107] __kasan_check_write+0x20/0x30 [ 21.074153] kasan_atomics_helper+0x15b4/0x4858 [ 21.074290] kasan_atomics+0x198/0x2e0 [ 21.074344] kunit_try_run_case+0x170/0x3f0 [ 21.074396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.074450] kthread+0x328/0x630 [ 21.074491] ret_from_fork+0x10/0x20 [ 21.074540] [ 21.074659] Allocated by task 265: [ 21.074701] kasan_save_stack+0x3c/0x68 [ 21.075342] kasan_save_track+0x20/0x40 [ 21.075523] kasan_save_alloc_info+0x40/0x58 [ 21.075684] __kasan_kmalloc+0xd4/0xd8 [ 21.075818] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.075923] kasan_atomics+0xb8/0x2e0 [ 21.076372] kunit_try_run_case+0x170/0x3f0 [ 21.076501] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.076701] kthread+0x328/0x630 [ 21.076811] ret_from_fork+0x10/0x20 [ 21.076904] [ 21.077245] The buggy address belongs to the object at fff00000c77daf80 [ 21.077245] which belongs to the cache kmalloc-64 of size 64 [ 21.077520] The buggy address is located 0 bytes to the right of [ 21.077520] allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0) [ 21.077620] [ 21.077925] The buggy address belongs to the physical page: [ 21.078023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da [ 21.078503] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.078761] page_type: f5(slab) [ 21.078937] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.079553] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.079604] page dumped because: kasan: bad access detected [ 21.079641] [ 21.079661] Memory state around the buggy address: [ 21.079697] fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.079953] fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.080150] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.080220] ^ [ 21.080450] fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.080599] fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.080641] ================================================================== [ 21.081907] ================================================================== [ 21.082135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 21.082253] Read of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265 [ 21.082309] [ 21.082603] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.082700] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.082737] Hardware name: linux,dummy-virt (DT) [ 21.083204] Call trace: [ 21.083257] show_stack+0x20/0x38 (C) [ 21.083470] dump_stack_lvl+0x8c/0xd0 [ 21.083603] print_report+0x118/0x608 [ 21.083761] kasan_report+0xdc/0x128 [ 21.083836] __asan_report_load8_noabort+0x20/0x30 [ 21.083898] kasan_atomics_helper+0x3db0/0x4858 [ 21.084335] kasan_atomics+0x198/0x2e0 [ 21.084551] kunit_try_run_case+0x170/0x3f0 [ 21.084751] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.084849] kthread+0x328/0x630 [ 21.084905] ret_from_fork+0x10/0x20 [ 21.084954] [ 21.085518] Allocated by task 265: [ 21.085615] kasan_save_stack+0x3c/0x68 [ 21.085758] kasan_save_track+0x20/0x40 [ 21.085843] kasan_save_alloc_info+0x40/0x58 [ 21.085955] __kasan_kmalloc+0xd4/0xd8 [ 21.086387] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.086570] kasan_atomics+0xb8/0x2e0 [ 21.086645] kunit_try_run_case+0x170/0x3f0 [ 21.086783] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.086897] kthread+0x328/0x630 [ 21.086985] ret_from_fork+0x10/0x20 [ 21.087405] [ 21.087449] The buggy address belongs to the object at fff00000c77daf80 [ 21.087449] which belongs to the cache kmalloc-64 of size 64 [ 21.087777] The buggy address is located 0 bytes to the right of [ 21.087777] allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0) [ 21.088044] [ 21.088073] The buggy address belongs to the physical page: [ 21.088107] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da [ 21.088169] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.088672] page_type: f5(slab) [ 21.088725] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.089039] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.089474] page dumped because: kasan: bad access detected [ 21.089607] [ 21.089632] Memory state around the buggy address: [ 21.089670] fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.089995] fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.090140] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.090381] ^ [ 21.090509] fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.090553] fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.090919] ================================================================== [ 21.030096] ================================================================== [ 21.030192] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 21.030366] Read of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265 [ 21.030428] [ 21.030531] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.030638] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.030675] Hardware name: linux,dummy-virt (DT) [ 21.030708] Call trace: [ 21.030734] show_stack+0x20/0x38 (C) [ 21.031044] dump_stack_lvl+0x8c/0xd0 [ 21.031268] print_report+0x118/0x608 [ 21.031477] kasan_report+0xdc/0x128 [ 21.031595] __asan_report_load8_noabort+0x20/0x30 [ 21.031833] kasan_atomics_helper+0x3f04/0x4858 [ 21.032074] kasan_atomics+0x198/0x2e0 [ 21.032337] kunit_try_run_case+0x170/0x3f0 [ 21.032542] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.032759] kthread+0x328/0x630 [ 21.033219] ret_from_fork+0x10/0x20 [ 21.033491] [ 21.033645] Allocated by task 265: [ 21.033785] kasan_save_stack+0x3c/0x68 [ 21.033837] kasan_save_track+0x20/0x40 [ 21.034071] kasan_save_alloc_info+0x40/0x58 [ 21.034335] __kasan_kmalloc+0xd4/0xd8 [ 21.034582] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.034734] kasan_atomics+0xb8/0x2e0 [ 21.034977] kunit_try_run_case+0x170/0x3f0 [ 21.035024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.035091] kthread+0x328/0x630 [ 21.035132] ret_from_fork+0x10/0x20 [ 21.035352] [ 21.036031] The buggy address belongs to the object at fff00000c77daf80 [ 21.036031] which belongs to the cache kmalloc-64 of size 64 [ 21.036147] The buggy address is located 0 bytes to the right of [ 21.036147] allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0) [ 21.036244] [ 21.036471] The buggy address belongs to the physical page: [ 21.036518] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da [ 21.037006] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.037086] page_type: f5(slab) [ 21.037332] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.037840] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.037923] page dumped because: kasan: bad access detected [ 21.038337] [ 21.038555] Memory state around the buggy address: [ 21.038599] fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.038646] fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.038877] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.039216] ^ [ 21.039437] fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.039509] fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.039551] ================================================================== [ 20.918977] ================================================================== [ 20.919139] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 20.919321] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265 [ 20.919405] [ 20.919478] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.919562] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.919591] Hardware name: linux,dummy-virt (DT) [ 20.919625] Call trace: [ 20.919648] show_stack+0x20/0x38 (C) [ 20.919697] dump_stack_lvl+0x8c/0xd0 [ 20.919747] print_report+0x118/0x608 [ 20.919796] kasan_report+0xdc/0x128 [ 20.919842] kasan_check_range+0x100/0x1a8 [ 20.919904] __kasan_check_write+0x20/0x30 [ 20.920174] kasan_atomics_helper+0xeb8/0x4858 [ 20.920649] kasan_atomics+0x198/0x2e0 [ 20.920838] kunit_try_run_case+0x170/0x3f0 [ 20.920923] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.921108] kthread+0x328/0x630 [ 20.921181] ret_from_fork+0x10/0x20 [ 20.921231] [ 20.921283] Allocated by task 265: [ 20.921527] kasan_save_stack+0x3c/0x68 [ 20.921892] kasan_save_track+0x20/0x40 [ 20.922045] kasan_save_alloc_info+0x40/0x58 [ 20.922143] __kasan_kmalloc+0xd4/0xd8 [ 20.922309] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.922395] kasan_atomics+0xb8/0x2e0 [ 20.922526] kunit_try_run_case+0x170/0x3f0 [ 20.922747] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.922927] kthread+0x328/0x630 [ 20.923311] ret_from_fork+0x10/0x20 [ 20.923426] [ 20.923459] The buggy address belongs to the object at fff00000c77daf80 [ 20.923459] which belongs to the cache kmalloc-64 of size 64 [ 20.923521] The buggy address is located 0 bytes to the right of [ 20.923521] allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0) [ 20.923585] [ 20.923927] The buggy address belongs to the physical page: [ 20.924058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da [ 20.924122] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.924175] page_type: f5(slab) [ 20.924214] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.924278] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.924322] page dumped because: kasan: bad access detected [ 20.924357] [ 20.924387] Memory state around the buggy address: [ 20.924422] fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.924484] fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.924537] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.924576] ^ [ 20.924612] fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.924655] fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.924695] ================================================================== [ 21.108894] ================================================================== [ 21.108972] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 21.109023] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265 [ 21.109320] [ 21.109364] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.109458] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.109801] Hardware name: linux,dummy-virt (DT) [ 21.109853] Call trace: [ 21.110073] show_stack+0x20/0x38 (C) [ 21.110153] dump_stack_lvl+0x8c/0xd0 [ 21.110358] print_report+0x118/0x608 [ 21.110420] kasan_report+0xdc/0x128 [ 21.110498] kasan_check_range+0x100/0x1a8 [ 21.110647] __kasan_check_write+0x20/0x30 [ 21.110711] kasan_atomics_helper+0x16d0/0x4858 [ 21.111109] kasan_atomics+0x198/0x2e0 [ 21.111471] kunit_try_run_case+0x170/0x3f0 [ 21.111702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.111765] kthread+0x328/0x630 [ 21.111807] ret_from_fork+0x10/0x20 [ 21.111895] [ 21.112172] Allocated by task 265: [ 21.112440] kasan_save_stack+0x3c/0x68 [ 21.112585] kasan_save_track+0x20/0x40 [ 21.112712] kasan_save_alloc_info+0x40/0x58 [ 21.112764] __kasan_kmalloc+0xd4/0xd8 [ 21.112804] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.112883] kasan_atomics+0xb8/0x2e0 [ 21.112925] kunit_try_run_case+0x170/0x3f0 [ 21.112964] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.113022] kthread+0x328/0x630 [ 21.113066] ret_from_fork+0x10/0x20 [ 21.113103] [ 21.113135] The buggy address belongs to the object at fff00000c77daf80 [ 21.113135] which belongs to the cache kmalloc-64 of size 64 [ 21.113212] The buggy address is located 0 bytes to the right of [ 21.113212] allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0) [ 21.113278] [ 21.113299] The buggy address belongs to the physical page: [ 21.113346] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da [ 21.113411] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.113471] page_type: f5(slab) [ 21.113535] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.113587] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.113629] page dumped because: kasan: bad access detected [ 21.113673] [ 21.113693] Memory state around the buggy address: [ 21.113728] fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.113782] fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.113827] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.114217] ^ [ 21.114614] fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.114694] fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.114776] ================================================================== [ 21.135315] ================================================================== [ 21.135588] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 21.135652] Read of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265 [ 21.135703] [ 21.135736] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.135816] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.135844] Hardware name: linux,dummy-virt (DT) [ 21.135960] Call trace: [ 21.135986] show_stack+0x20/0x38 (C) [ 21.136038] dump_stack_lvl+0x8c/0xd0 [ 21.136085] print_report+0x118/0x608 [ 21.136134] kasan_report+0xdc/0x128 [ 21.136181] __asan_report_load8_noabort+0x20/0x30 [ 21.136230] kasan_atomics_helper+0x3e20/0x4858 [ 21.136282] kasan_atomics+0x198/0x2e0 [ 21.136341] kunit_try_run_case+0x170/0x3f0 [ 21.136393] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.136447] kthread+0x328/0x630 [ 21.136500] ret_from_fork+0x10/0x20 [ 21.136551] [ 21.136571] Allocated by task 265: [ 21.136600] kasan_save_stack+0x3c/0x68 [ 21.136652] kasan_save_track+0x20/0x40 [ 21.136696] kasan_save_alloc_info+0x40/0x58 [ 21.136748] __kasan_kmalloc+0xd4/0xd8 [ 21.136787] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.136835] kasan_atomics+0xb8/0x2e0 [ 21.137631] kunit_try_run_case+0x170/0x3f0 [ 21.137712] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.137773] kthread+0x328/0x630 [ 21.137808] ret_from_fork+0x10/0x20 [ 21.138037] [ 21.138072] The buggy address belongs to the object at fff00000c77daf80 [ 21.138072] which belongs to the cache kmalloc-64 of size 64 [ 21.138133] The buggy address is located 0 bytes to the right of [ 21.138133] allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0) [ 21.138208] [ 21.138229] The buggy address belongs to the physical page: [ 21.138262] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da [ 21.138319] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.138662] page_type: f5(slab) [ 21.138873] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.139127] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.139215] page dumped because: kasan: bad access detected [ 21.139384] [ 21.139447] Memory state around the buggy address: [ 21.139900] fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.139993] fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.140219] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.140412] ^ [ 21.140496] fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.140703] fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.140751] ================================================================== [ 21.091850] ================================================================== [ 21.092018] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 21.092161] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265 [ 21.092247] [ 21.092282] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.092397] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.092425] Hardware name: linux,dummy-virt (DT) [ 21.092622] Call trace: [ 21.092794] show_stack+0x20/0x38 (C) [ 21.092875] dump_stack_lvl+0x8c/0xd0 [ 21.093138] print_report+0x118/0x608 [ 21.093206] kasan_report+0xdc/0x128 [ 21.093440] kasan_check_range+0x100/0x1a8 [ 21.093665] __kasan_check_write+0x20/0x30 [ 21.093728] kasan_atomics_helper+0x1644/0x4858 [ 21.093808] kasan_atomics+0x198/0x2e0 [ 21.093905] kunit_try_run_case+0x170/0x3f0 [ 21.094111] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.094224] kthread+0x328/0x630 [ 21.094511] ret_from_fork+0x10/0x20 [ 21.094593] [ 21.094630] Allocated by task 265: [ 21.094665] kasan_save_stack+0x3c/0x68 [ 21.094710] kasan_save_track+0x20/0x40 [ 21.094947] kasan_save_alloc_info+0x40/0x58 [ 21.095119] __kasan_kmalloc+0xd4/0xd8 [ 21.095168] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.095211] kasan_atomics+0xb8/0x2e0 [ 21.095297] kunit_try_run_case+0x170/0x3f0 [ 21.095342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.095401] kthread+0x328/0x630 [ 21.095442] ret_from_fork+0x10/0x20 [ 21.095480] [ 21.095522] The buggy address belongs to the object at fff00000c77daf80 [ 21.095522] which belongs to the cache kmalloc-64 of size 64 [ 21.095584] The buggy address is located 0 bytes to the right of [ 21.095584] allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0) [ 21.095667] [ 21.095692] The buggy address belongs to the physical page: [ 21.095746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da [ 21.095812] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.095879] page_type: f5(slab) [ 21.095938] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.095997] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.096039] page dumped because: kasan: bad access detected [ 21.096075] [ 21.096095] Memory state around the buggy address: [ 21.096130] fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.096177] fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.096231] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.096287] ^ [ 21.096323] fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.096364] fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.096413] ================================================================== [ 21.040019] ================================================================== [ 21.040088] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 21.040150] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265 [ 21.040204] [ 21.040238] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.040320] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.040348] Hardware name: linux,dummy-virt (DT) [ 21.040392] Call trace: [ 21.040416] show_stack+0x20/0x38 (C) [ 21.040467] dump_stack_lvl+0x8c/0xd0 [ 21.040513] print_report+0x118/0x608 [ 21.040568] kasan_report+0xdc/0x128 [ 21.040615] kasan_check_range+0x100/0x1a8 [ 21.040673] __kasan_check_write+0x20/0x30 [ 21.040721] kasan_atomics_helper+0x1414/0x4858 [ 21.040777] kasan_atomics+0x198/0x2e0 [ 21.040826] kunit_try_run_case+0x170/0x3f0 [ 21.040905] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.040974] kthread+0x328/0x630 [ 21.041018] ret_from_fork+0x10/0x20 [ 21.041066] [ 21.041086] Allocated by task 265: [ 21.041117] kasan_save_stack+0x3c/0x68 [ 21.041166] kasan_save_track+0x20/0x40 [ 21.041220] kasan_save_alloc_info+0x40/0x58 [ 21.041272] __kasan_kmalloc+0xd4/0xd8 [ 21.041311] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.041352] kasan_atomics+0xb8/0x2e0 [ 21.041396] kunit_try_run_case+0x170/0x3f0 [ 21.041446] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.041491] kthread+0x328/0x630 [ 21.041524] ret_from_fork+0x10/0x20 [ 21.041562] [ 21.041588] The buggy address belongs to the object at fff00000c77daf80 [ 21.041588] which belongs to the cache kmalloc-64 of size 64 [ 21.041649] The buggy address is located 0 bytes to the right of [ 21.041649] allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0) [ 21.041713] [ 21.041735] The buggy address belongs to the physical page: [ 21.041776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da [ 21.041837] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.041925] page_type: f5(slab) [ 21.042389] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.042459] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.043047] page dumped because: kasan: bad access detected [ 21.043143] [ 21.043187] Memory state around the buggy address: [ 21.043260] fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.043332] fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.043407] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.043729] ^ [ 21.043773] fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.043922] fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.043964] ================================================================== [ 20.772892] ================================================================== [ 20.772944] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 20.772995] Read of size 4 at addr fff00000c77dafb0 by task kunit_try_catch/265 [ 20.773047] [ 20.773380] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.773550] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.773585] Hardware name: linux,dummy-virt (DT) [ 20.773619] Call trace: [ 20.773683] show_stack+0x20/0x38 (C) [ 20.773912] dump_stack_lvl+0x8c/0xd0 [ 20.774127] print_report+0x118/0x608 [ 20.774192] kasan_report+0xdc/0x128 [ 20.774242] __asan_report_load4_noabort+0x20/0x30 [ 20.774531] kasan_atomics_helper+0x42d8/0x4858 [ 20.774660] kasan_atomics+0x198/0x2e0 [ 20.774723] kunit_try_run_case+0x170/0x3f0 [ 20.774823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.774956] kthread+0x328/0x630 [ 20.775014] ret_from_fork+0x10/0x20 [ 20.775445] [ 20.776111] __kasan_kmalloc+0xd4/0xd8 [ 20.776163] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.776251] kasan_atomics+0xb8/0x2e0 [ 20.776466] kunit_try_run_case+0x170/0x3f0 [ 20.776783] kthread+0x328/0x630 [ 20.777217] The buggy address is located 0 bytes to the right of [ 20.777217] allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0) [ 20.778852] [ 20.779192] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.780998] ================================================================== [ 20.895991] ================================================================== [ 20.896155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 20.896219] Read of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265 [ 20.896271] [ 20.896304] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.896385] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.896436] Hardware name: linux,dummy-virt (DT) [ 20.896471] Call trace: [ 20.896495] show_stack+0x20/0x38 (C) [ 20.896545] dump_stack_lvl+0x8c/0xd0 [ 20.896596] print_report+0x118/0x608 [ 20.896644] kasan_report+0xdc/0x128 [ 20.896692] __asan_report_load8_noabort+0x20/0x30 [ 20.896741] kasan_atomics_helper+0x3f58/0x4858 [ 20.896790] kasan_atomics+0x198/0x2e0 [ 20.896837] kunit_try_run_case+0x170/0x3f0 [ 20.896902] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.896962] kthread+0x328/0x630 [ 20.897007] ret_from_fork+0x10/0x20 [ 20.897055] [ 20.897075] Allocated by task 265: [ 20.897106] kasan_save_stack+0x3c/0x68 [ 20.897150] kasan_save_track+0x20/0x40 [ 20.897191] kasan_save_alloc_info+0x40/0x58 [ 20.897234] __kasan_kmalloc+0xd4/0xd8 [ 20.897273] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.897316] kasan_atomics+0xb8/0x2e0 [ 20.897354] kunit_try_run_case+0x170/0x3f0 [ 20.897394] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.897440] kthread+0x328/0x630 [ 20.897496] ret_from_fork+0x10/0x20 [ 20.897541] [ 20.897567] The buggy address belongs to the object at fff00000c77daf80 [ 20.897567] which belongs to the cache kmalloc-64 of size 64 [ 20.897627] The buggy address is located 0 bytes to the right of [ 20.897627] allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0) [ 20.897703] [ 20.897733] The buggy address belongs to the physical page: [ 20.897766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da [ 20.897824] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.898269] page_type: f5(slab) [ 20.898318] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.898714] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.898803] page dumped because: kasan: bad access detected [ 20.898858] [ 20.898888] Memory state around the buggy address: [ 20.898923] fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.898967] fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.899012] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.899053] ^ [ 20.899335] fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.899696] fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.899984] ================================================================== [ 20.909718] ================================================================== [ 20.909879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 20.909937] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265 [ 20.910004] [ 20.910205] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.910300] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.910336] Hardware name: linux,dummy-virt (DT) [ 20.910641] Call trace: [ 20.910819] show_stack+0x20/0x38 (C) [ 20.910969] dump_stack_lvl+0x8c/0xd0 [ 20.911121] print_report+0x118/0x608 [ 20.911182] kasan_report+0xdc/0x128 [ 20.911229] __asan_report_store8_noabort+0x20/0x30 [ 20.911286] kasan_atomics_helper+0x3e5c/0x4858 [ 20.911670] kasan_atomics+0x198/0x2e0 [ 20.911748] kunit_try_run_case+0x170/0x3f0 [ 20.911961] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.912170] kthread+0x328/0x630 [ 20.912328] ret_from_fork+0x10/0x20 [ 20.912448] [ 20.912507] Allocated by task 265: [ 20.912879] kasan_save_stack+0x3c/0x68 [ 20.913201] kasan_save_track+0x20/0x40 [ 20.913285] kasan_save_alloc_info+0x40/0x58 [ 20.913623] __kasan_kmalloc+0xd4/0xd8 [ 20.913698] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.914052] kasan_atomics+0xb8/0x2e0 [ 20.914455] kunit_try_run_case+0x170/0x3f0 [ 20.914553] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.914847] kthread+0x328/0x630 [ 20.915046] ret_from_fork+0x10/0x20 [ 20.915098] [ 20.915121] The buggy address belongs to the object at fff00000c77daf80 [ 20.915121] which belongs to the cache kmalloc-64 of size 64 [ 20.915180] The buggy address is located 0 bytes to the right of [ 20.915180] allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0) [ 20.915536] [ 20.915992] The buggy address belongs to the physical page: [ 20.916041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da [ 20.916483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.916590] page_type: f5(slab) [ 20.916665] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.916944] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.917109] page dumped because: kasan: bad access detected [ 20.917370] [ 20.917412] Memory state around the buggy address: [ 20.917549] fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.917613] fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.917671] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.917709] ^ [ 20.917755] fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.917799] fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.917848] ================================================================== [ 20.789097] ================================================================== [ 20.789192] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 20.789324] Write of size 4 at addr fff00000c77dafb0 by task kunit_try_catch/265 [ 20.789410] [ 20.789508] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.789597] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.789626] Hardware name: linux,dummy-virt (DT) [ 20.789675] Call trace: [ 20.789702] show_stack+0x20/0x38 (C) [ 20.790026] dump_stack_lvl+0x8c/0xd0 [ 20.790109] print_report+0x118/0x608 [ 20.790286] kasan_report+0xdc/0x128 [ 20.790500] kasan_check_range+0x100/0x1a8 [ 20.790562] __kasan_check_write+0x20/0x30 [ 20.790608] kasan_atomics_helper+0x99c/0x4858 [ 20.790774] kasan_atomics+0x198/0x2e0 [ 20.790961] kunit_try_run_case+0x170/0x3f0 [ 20.791031] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.791105] kthread+0x328/0x630 [ 20.791149] ret_from_fork+0x10/0x20 [ 20.791198] [ 20.791597] Allocated by task 265: [ 20.791692] kasan_save_stack+0x3c/0x68 [ 20.791757] kasan_save_track+0x20/0x40 [ 20.791846] kasan_save_alloc_info+0x40/0x58 [ 20.791912] __kasan_kmalloc+0xd4/0xd8 [ 20.791955] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.791995] kasan_atomics+0xb8/0x2e0 [ 20.792043] kunit_try_run_case+0x170/0x3f0 [ 20.792093] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.792140] kthread+0x328/0x630 [ 20.792185] ret_from_fork+0x10/0x20 [ 20.792223] [ 20.792245] The buggy address belongs to the object at fff00000c77daf80 [ 20.792245] which belongs to the cache kmalloc-64 of size 64 [ 20.792314] The buggy address is located 0 bytes to the right of [ 20.792314] allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0) [ 20.792378] [ 20.792399] The buggy address belongs to the physical page: [ 20.792433] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da [ 20.792489] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.792538] page_type: f5(slab) [ 20.792577] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.792629] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.792687] page dumped because: kasan: bad access detected [ 20.792721] [ 20.792747] Memory state around the buggy address: [ 20.792780] fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.792832] fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.792895] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.792946] ^ [ 20.792982] fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.793035] fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.793074] ================================================================== [ 20.990395] ================================================================== [ 20.990456] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 20.990505] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265 [ 20.990730] [ 20.990875] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.991447] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.991606] Hardware name: linux,dummy-virt (DT) [ 20.991645] Call trace: [ 20.991670] show_stack+0x20/0x38 (C) [ 20.992297] dump_stack_lvl+0x8c/0xd0 [ 20.992512] print_report+0x118/0x608 [ 20.992850] kasan_report+0xdc/0x128 [ 20.993109] kasan_check_range+0x100/0x1a8 [ 20.993188] __kasan_check_write+0x20/0x30 [ 20.993322] kasan_atomics_helper+0x11f8/0x4858 [ 20.993442] kasan_atomics+0x198/0x2e0 [ 20.993510] kunit_try_run_case+0x170/0x3f0 [ 20.993785] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.994157] kthread+0x328/0x630 [ 20.994385] ret_from_fork+0x10/0x20 [ 20.994490] [ 20.994544] Allocated by task 265: [ 20.994713] kasan_save_stack+0x3c/0x68 [ 20.994837] kasan_save_track+0x20/0x40 [ 20.995231] kasan_save_alloc_info+0x40/0x58 [ 20.995511] __kasan_kmalloc+0xd4/0xd8 [ 20.995682] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.995842] kasan_atomics+0xb8/0x2e0 [ 20.995991] kunit_try_run_case+0x170/0x3f0 [ 20.996035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.996100] kthread+0x328/0x630 [ 20.996438] ret_from_fork+0x10/0x20 [ 20.996772] [ 20.996844] The buggy address belongs to the object at fff00000c77daf80 [ 20.996844] which belongs to the cache kmalloc-64 of size 64 [ 20.997314] The buggy address is located 0 bytes to the right of [ 20.997314] allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0) [ 20.997794] [ 20.997827] The buggy address belongs to the physical page: [ 20.997926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da [ 20.998333] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.998798] page_type: f5(slab) [ 20.998856] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.999217] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.999502] page dumped because: kasan: bad access detected [ 20.999810] [ 20.999887] Memory state around the buggy address: [ 21.000093] fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.000440] fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.000499] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.000971] ^ [ 21.001337] fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.001421] fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.001819] ================================================================== [ 21.054636] ================================================================== [ 21.054854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 21.055023] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265 [ 21.055086] [ 21.055140] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.055393] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.055589] Hardware name: linux,dummy-virt (DT) [ 21.055643] Call trace: [ 21.055843] show_stack+0x20/0x38 (C) [ 21.056319] dump_stack_lvl+0x8c/0xd0 [ 21.056423] print_report+0x118/0x608 [ 21.056615] kasan_report+0xdc/0x128 [ 21.056694] kasan_check_range+0x100/0x1a8 [ 21.057107] __kasan_check_write+0x20/0x30 [ 21.057320] kasan_atomics_helper+0x14e4/0x4858 [ 21.057440] kasan_atomics+0x198/0x2e0 [ 21.057856] kunit_try_run_case+0x170/0x3f0 [ 21.057955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.058272] kthread+0x328/0x630 [ 21.058428] ret_from_fork+0x10/0x20 [ 21.058645] [ 21.058935] Allocated by task 265: [ 21.059232] kasan_save_stack+0x3c/0x68 [ 21.059448] kasan_save_track+0x20/0x40 [ 21.059654] kasan_save_alloc_info+0x40/0x58 [ 21.059733] __kasan_kmalloc+0xd4/0xd8 [ 21.059896] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.060009] kasan_atomics+0xb8/0x2e0 [ 21.060193] kunit_try_run_case+0x170/0x3f0 [ 21.060281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.060525] kthread+0x328/0x630 [ 21.060956] ret_from_fork+0x10/0x20 [ 21.061039] [ 21.061189] The buggy address belongs to the object at fff00000c77daf80 [ 21.061189] which belongs to the cache kmalloc-64 of size 64 [ 21.061292] The buggy address is located 0 bytes to the right of [ 21.061292] allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0) [ 21.061510] [ 21.061559] The buggy address belongs to the physical page: [ 21.061648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da [ 21.061876] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.062104] page_type: f5(slab) [ 21.062173] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.062465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.062595] page dumped because: kasan: bad access detected [ 21.062741] [ 21.063236] Memory state around the buggy address: [ 21.063296] fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.063494] fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.063755] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.063929] ^ [ 21.064208] fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.064393] fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.064448] ================================================================== [ 21.002848] ================================================================== [ 21.003123] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 21.003175] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265 [ 21.003472] [ 21.003651] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.004176] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.004269] Hardware name: linux,dummy-virt (DT) [ 21.004318] Call trace: [ 21.004498] show_stack+0x20/0x38 (C) [ 21.004572] dump_stack_lvl+0x8c/0xd0 [ 21.004688] print_report+0x118/0x608 [ 21.005040] kasan_report+0xdc/0x128 [ 21.005287] kasan_check_range+0x100/0x1a8 [ 21.005390] __kasan_check_write+0x20/0x30 [ 21.005452] kasan_atomics_helper+0x126c/0x4858 [ 21.005501] kasan_atomics+0x198/0x2e0 [ 21.005553] kunit_try_run_case+0x170/0x3f0 [ 21.005605] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.005672] kthread+0x328/0x630 [ 21.005719] ret_from_fork+0x10/0x20 [ 21.005790] [ 21.005819] Allocated by task 265: [ 21.005872] kasan_save_stack+0x3c/0x68 [ 21.005926] kasan_save_track+0x20/0x40 [ 21.005967] kasan_save_alloc_info+0x40/0x58 [ 21.006010] __kasan_kmalloc+0xd4/0xd8 [ 21.006048] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.006090] kasan_atomics+0xb8/0x2e0 [ 21.006127] kunit_try_run_case+0x170/0x3f0 [ 21.006174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.006225] kthread+0x328/0x630 [ 21.006267] ret_from_fork+0x10/0x20 [ 21.006317] [ 21.006348] The buggy address belongs to the object at fff00000c77daf80 [ 21.006348] which belongs to the cache kmalloc-64 of size 64 [ 21.006410] The buggy address is located 0 bytes to the right of [ 21.006410] allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0) [ 21.006476] [ 21.006497] The buggy address belongs to the physical page: [ 21.006545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da [ 21.006617] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.006668] page_type: f5(slab) [ 21.006706] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.007090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.007521] page dumped because: kasan: bad access detected [ 21.007581] [ 21.007603] Memory state around the buggy address: [ 21.007639] fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.007738] fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.008067] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.008131] ^ [ 21.008618] fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.009190] fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.009509] ================================================================== [ 21.010057] ================================================================== [ 21.010371] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 21.010435] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265 [ 21.010487] [ 21.010716] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.010905] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.011249] Hardware name: linux,dummy-virt (DT) [ 21.011307] Call trace: [ 21.011434] show_stack+0x20/0x38 (C) [ 21.011650] dump_stack_lvl+0x8c/0xd0 [ 21.011746] print_report+0x118/0x608 [ 21.011967] kasan_report+0xdc/0x128 [ 21.012217] kasan_check_range+0x100/0x1a8 [ 21.012435] __kasan_check_write+0x20/0x30 [ 21.012533] kasan_atomics_helper+0x12d8/0x4858 [ 21.012935] kasan_atomics+0x198/0x2e0 [ 21.013028] kunit_try_run_case+0x170/0x3f0 [ 21.013225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.013303] kthread+0x328/0x630 [ 21.013379] ret_from_fork+0x10/0x20 [ 21.013880] [ 21.014084] Allocated by task 265: [ 21.014241] kasan_save_stack+0x3c/0x68 [ 21.014448] kasan_save_track+0x20/0x40 [ 21.014532] kasan_save_alloc_info+0x40/0x58 [ 21.014576] __kasan_kmalloc+0xd4/0xd8 [ 21.014639] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.014792] kasan_atomics+0xb8/0x2e0 [ 21.015128] kunit_try_run_case+0x170/0x3f0 [ 21.015232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.015457] kthread+0x328/0x630 [ 21.015710] ret_from_fork+0x10/0x20 [ 21.015848] [ 21.015895] The buggy address belongs to the object at fff00000c77daf80 [ 21.015895] which belongs to the cache kmalloc-64 of size 64 [ 21.015958] The buggy address is located 0 bytes to the right of [ 21.015958] allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0) [ 21.016023] [ 21.016470] The buggy address belongs to the physical page: [ 21.016713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da [ 21.016982] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.017042] page_type: f5(slab) [ 21.017264] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.017664] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.017732] page dumped because: kasan: bad access detected [ 21.017853] [ 21.018138] Memory state around the buggy address: [ 21.018359] fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.018684] fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.019041] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.019120] ^ [ 21.019493] fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.019545] fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.019585] ================================================================== [ 20.983697] ================================================================== [ 20.983752] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 20.983805] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265 [ 20.984230] [ 20.984311] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.984473] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.984503] Hardware name: linux,dummy-virt (DT) [ 20.984535] Call trace: [ 20.984561] show_stack+0x20/0x38 (C) [ 20.984634] dump_stack_lvl+0x8c/0xd0 [ 20.984686] print_report+0x118/0x608 [ 20.984733] kasan_report+0xdc/0x128 [ 20.984780] kasan_check_range+0x100/0x1a8 [ 20.984828] __kasan_check_write+0x20/0x30 [ 20.984937] kasan_atomics_helper+0x1190/0x4858 [ 20.984988] kasan_atomics+0x198/0x2e0 [ 20.985033] kunit_try_run_case+0x170/0x3f0 [ 20.985082] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.985138] kthread+0x328/0x630 [ 20.985181] ret_from_fork+0x10/0x20 [ 20.985231] [ 20.985251] Allocated by task 265: [ 20.985290] kasan_save_stack+0x3c/0x68 [ 20.985340] kasan_save_track+0x20/0x40 [ 20.985379] kasan_save_alloc_info+0x40/0x58 [ 20.985428] __kasan_kmalloc+0xd4/0xd8 [ 20.985468] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.985508] kasan_atomics+0xb8/0x2e0 [ 20.985546] kunit_try_run_case+0x170/0x3f0 [ 20.985594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.985641] kthread+0x328/0x630 [ 20.985674] ret_from_fork+0x10/0x20 [ 20.985710] [ 20.985731] The buggy address belongs to the object at fff00000c77daf80 [ 20.985731] which belongs to the cache kmalloc-64 of size 64 [ 20.985790] The buggy address is located 0 bytes to the right of [ 20.985790] allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0) [ 20.985854] [ 20.985886] The buggy address belongs to the physical page: [ 20.986048] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da [ 20.986562] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.987001] page_type: f5(slab) [ 20.987114] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.987229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.987514] page dumped because: kasan: bad access detected [ 20.987638] [ 20.987730] Memory state around the buggy address: [ 20.988217] fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.988342] fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.988422] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.988877] ^ [ 20.988935] fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.989009] fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.989284] ================================================================== [ 20.973658] ================================================================== [ 20.973713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 20.973766] Write of size 8 at addr fff00000c77dafb0 by task kunit_try_catch/265 [ 20.975242] [ 20.975300] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.975385] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.975414] Hardware name: linux,dummy-virt (DT) [ 20.975454] Call trace: [ 20.975477] show_stack+0x20/0x38 (C) [ 20.975532] dump_stack_lvl+0x8c/0xd0 [ 20.975581] print_report+0x118/0x608 [ 20.975629] kasan_report+0xdc/0x128 [ 20.975674] kasan_check_range+0x100/0x1a8 [ 20.975723] __kasan_check_write+0x20/0x30 [ 20.975768] kasan_atomics_helper+0x1128/0x4858 [ 20.975817] kasan_atomics+0x198/0x2e0 [ 20.975880] kunit_try_run_case+0x170/0x3f0 [ 20.975952] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.976065] kthread+0x328/0x630 [ 20.976245] ret_from_fork+0x10/0x20 [ 20.976570] [ 20.976632] Allocated by task 265: [ 20.976685] kasan_save_stack+0x3c/0x68 [ 20.976757] kasan_save_track+0x20/0x40 [ 20.977158] kasan_save_alloc_info+0x40/0x58 [ 20.977337] __kasan_kmalloc+0xd4/0xd8 [ 20.977397] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.977448] kasan_atomics+0xb8/0x2e0 [ 20.977676] kunit_try_run_case+0x170/0x3f0 [ 20.978166] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.978371] kthread+0x328/0x630 [ 20.978539] ret_from_fork+0x10/0x20 [ 20.978782] [ 20.978840] The buggy address belongs to the object at fff00000c77daf80 [ 20.978840] which belongs to the cache kmalloc-64 of size 64 [ 20.978958] The buggy address is located 0 bytes to the right of [ 20.978958] allocated 48-byte region [fff00000c77daf80, fff00000c77dafb0) [ 20.979119] [ 20.979177] The buggy address belongs to the physical page: [ 20.979452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077da [ 20.980102] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.980202] page_type: f5(slab) [ 20.980281] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.980651] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.980843] page dumped because: kasan: bad access detected [ 20.981066] [ 20.981308] Memory state around the buggy address: [ 20.981388] fff00000c77dae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.981857] fff00000c77daf00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.981929] >fff00000c77daf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.981970] ^ [ 20.982006] fff00000c77db000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.982052] fff00000c77db080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.982179] ==================================================================
[ 14.902731] ================================================================== [ 14.903187] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 14.903873] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.904144] [ 14.904262] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.904307] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.904332] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.904355] Call Trace: [ 14.904372] <TASK> [ 14.904400] dump_stack_lvl+0x73/0xb0 [ 14.904430] print_report+0xd1/0x650 [ 14.904464] ? __virt_addr_valid+0x1db/0x2d0 [ 14.904487] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.904519] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.904542] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.904576] kasan_report+0x141/0x180 [ 14.904601] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.904630] __asan_report_store8_noabort+0x1b/0x30 [ 14.904653] kasan_atomics_helper+0x50d4/0x5450 [ 14.904679] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.904705] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.904732] ? kasan_atomics+0x152/0x310 [ 14.904775] kasan_atomics+0x1dc/0x310 [ 14.904799] ? __pfx_kasan_atomics+0x10/0x10 [ 14.904825] ? __pfx_read_tsc+0x10/0x10 [ 14.904847] ? ktime_get_ts64+0x86/0x230 [ 14.904873] kunit_try_run_case+0x1a5/0x480 [ 14.904898] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.904931] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.904956] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.904991] ? __kthread_parkme+0x82/0x180 [ 14.905013] ? preempt_count_sub+0x50/0x80 [ 14.905038] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.905063] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.905087] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.905112] kthread+0x337/0x6f0 [ 14.905133] ? trace_preempt_on+0x20/0xc0 [ 14.905157] ? __pfx_kthread+0x10/0x10 [ 14.905179] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.905201] ? calculate_sigpending+0x7b/0xa0 [ 14.905226] ? __pfx_kthread+0x10/0x10 [ 14.905249] ret_from_fork+0x116/0x1d0 [ 14.905268] ? __pfx_kthread+0x10/0x10 [ 14.905290] ret_from_fork_asm+0x1a/0x30 [ 14.905331] </TASK> [ 14.905344] [ 14.912837] Allocated by task 283: [ 14.913032] kasan_save_stack+0x45/0x70 [ 14.913219] kasan_save_track+0x18/0x40 [ 14.913405] kasan_save_alloc_info+0x3b/0x50 [ 14.913593] __kasan_kmalloc+0xb7/0xc0 [ 14.913850] __kmalloc_cache_noprof+0x189/0x420 [ 14.914044] kasan_atomics+0x95/0x310 [ 14.914215] kunit_try_run_case+0x1a5/0x480 [ 14.914366] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.914633] kthread+0x337/0x6f0 [ 14.914839] ret_from_fork+0x116/0x1d0 [ 14.915016] ret_from_fork_asm+0x1a/0x30 [ 14.915190] [ 14.915289] The buggy address belongs to the object at ffff8881031c4500 [ 14.915289] which belongs to the cache kmalloc-64 of size 64 [ 14.915820] The buggy address is located 0 bytes to the right of [ 14.915820] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.916356] [ 14.916473] The buggy address belongs to the physical page: [ 14.916715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.917057] flags: 0x200000000000000(node=0|zone=2) [ 14.917278] page_type: f5(slab) [ 14.917408] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.917657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.917933] page dumped because: kasan: bad access detected [ 14.918211] [ 14.918321] Memory state around the buggy address: [ 14.918558] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.918833] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.919052] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.919269] ^ [ 14.919676] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.919998] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.920345] ================================================================== [ 15.096857] ================================================================== [ 15.097101] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 15.097732] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 15.098064] [ 15.098199] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.098244] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.098259] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.098283] Call Trace: [ 15.098300] <TASK> [ 15.098316] dump_stack_lvl+0x73/0xb0 [ 15.098345] print_report+0xd1/0x650 [ 15.098368] ? __virt_addr_valid+0x1db/0x2d0 [ 15.098391] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.098415] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.098439] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.098476] kasan_report+0x141/0x180 [ 15.098499] ? kasan_atomics_helper+0x19e3/0x5450 [ 15.098528] kasan_check_range+0x10c/0x1c0 [ 15.098553] __kasan_check_write+0x18/0x20 [ 15.098573] kasan_atomics_helper+0x19e3/0x5450 [ 15.098598] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.098621] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.098648] ? kasan_atomics+0x152/0x310 [ 15.098675] kasan_atomics+0x1dc/0x310 [ 15.098710] ? __pfx_kasan_atomics+0x10/0x10 [ 15.098735] ? __pfx_read_tsc+0x10/0x10 [ 15.098757] ? ktime_get_ts64+0x86/0x230 [ 15.098782] kunit_try_run_case+0x1a5/0x480 [ 15.098808] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.098830] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.098854] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.098879] ? __kthread_parkme+0x82/0x180 [ 15.098901] ? preempt_count_sub+0x50/0x80 [ 15.098927] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.098952] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.098976] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.099000] kthread+0x337/0x6f0 [ 15.099022] ? trace_preempt_on+0x20/0xc0 [ 15.099045] ? __pfx_kthread+0x10/0x10 [ 15.099068] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.099091] ? calculate_sigpending+0x7b/0xa0 [ 15.099116] ? __pfx_kthread+0x10/0x10 [ 15.099138] ret_from_fork+0x116/0x1d0 [ 15.099158] ? __pfx_kthread+0x10/0x10 [ 15.099179] ret_from_fork_asm+0x1a/0x30 [ 15.099211] </TASK> [ 15.099226] [ 15.107026] Allocated by task 283: [ 15.107168] kasan_save_stack+0x45/0x70 [ 15.107327] kasan_save_track+0x18/0x40 [ 15.107534] kasan_save_alloc_info+0x3b/0x50 [ 15.107822] __kasan_kmalloc+0xb7/0xc0 [ 15.107993] __kmalloc_cache_noprof+0x189/0x420 [ 15.108185] kasan_atomics+0x95/0x310 [ 15.108322] kunit_try_run_case+0x1a5/0x480 [ 15.108483] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.108663] kthread+0x337/0x6f0 [ 15.108843] ret_from_fork+0x116/0x1d0 [ 15.109035] ret_from_fork_asm+0x1a/0x30 [ 15.109242] [ 15.109345] The buggy address belongs to the object at ffff8881031c4500 [ 15.109345] which belongs to the cache kmalloc-64 of size 64 [ 15.109947] The buggy address is located 0 bytes to the right of [ 15.109947] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 15.110363] [ 15.110474] The buggy address belongs to the physical page: [ 15.110793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 15.111150] flags: 0x200000000000000(node=0|zone=2) [ 15.111367] page_type: f5(slab) [ 15.111554] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.111907] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.112204] page dumped because: kasan: bad access detected [ 15.112450] [ 15.112536] Memory state around the buggy address: [ 15.112769] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.113063] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.113345] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.113652] ^ [ 15.113860] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.114147] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.114424] ================================================================== [ 15.458013] ================================================================== [ 15.458554] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 15.459042] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 15.459308] [ 15.459401] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.459445] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.459469] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.459493] Call Trace: [ 15.459508] <TASK> [ 15.459524] dump_stack_lvl+0x73/0xb0 [ 15.459555] print_report+0xd1/0x650 [ 15.459578] ? __virt_addr_valid+0x1db/0x2d0 [ 15.459602] ? kasan_atomics_helper+0x224c/0x5450 [ 15.459625] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.459648] ? kasan_atomics_helper+0x224c/0x5450 [ 15.459678] kasan_report+0x141/0x180 [ 15.459702] ? kasan_atomics_helper+0x224c/0x5450 [ 15.459730] kasan_check_range+0x10c/0x1c0 [ 15.459755] __kasan_check_write+0x18/0x20 [ 15.459776] kasan_atomics_helper+0x224c/0x5450 [ 15.459800] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.459824] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.459850] ? kasan_atomics+0x152/0x310 [ 15.459878] kasan_atomics+0x1dc/0x310 [ 15.459902] ? __pfx_kasan_atomics+0x10/0x10 [ 15.459927] ? __pfx_read_tsc+0x10/0x10 [ 15.459949] ? ktime_get_ts64+0x86/0x230 [ 15.459993] kunit_try_run_case+0x1a5/0x480 [ 15.460038] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.460061] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.460086] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.460111] ? __kthread_parkme+0x82/0x180 [ 15.460150] ? preempt_count_sub+0x50/0x80 [ 15.460175] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.460201] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.460225] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.460249] kthread+0x337/0x6f0 [ 15.460271] ? trace_preempt_on+0x20/0xc0 [ 15.460295] ? __pfx_kthread+0x10/0x10 [ 15.460317] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.460340] ? calculate_sigpending+0x7b/0xa0 [ 15.460365] ? __pfx_kthread+0x10/0x10 [ 15.460388] ret_from_fork+0x116/0x1d0 [ 15.460406] ? __pfx_kthread+0x10/0x10 [ 15.460430] ret_from_fork_asm+0x1a/0x30 [ 15.460471] </TASK> [ 15.460484] [ 15.467860] Allocated by task 283: [ 15.468035] kasan_save_stack+0x45/0x70 [ 15.468228] kasan_save_track+0x18/0x40 [ 15.468370] kasan_save_alloc_info+0x3b/0x50 [ 15.468600] __kasan_kmalloc+0xb7/0xc0 [ 15.468818] __kmalloc_cache_noprof+0x189/0x420 [ 15.468978] kasan_atomics+0x95/0x310 [ 15.469116] kunit_try_run_case+0x1a5/0x480 [ 15.469267] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.469463] kthread+0x337/0x6f0 [ 15.469639] ret_from_fork+0x116/0x1d0 [ 15.469846] ret_from_fork_asm+0x1a/0x30 [ 15.470046] [ 15.470144] The buggy address belongs to the object at ffff8881031c4500 [ 15.470144] which belongs to the cache kmalloc-64 of size 64 [ 15.470711] The buggy address is located 0 bytes to the right of [ 15.470711] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 15.471216] [ 15.471291] The buggy address belongs to the physical page: [ 15.471477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 15.471833] flags: 0x200000000000000(node=0|zone=2) [ 15.472072] page_type: f5(slab) [ 15.472239] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.472592] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.472904] page dumped because: kasan: bad access detected [ 15.473163] [ 15.473237] Memory state around the buggy address: [ 15.473461] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.473775] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.474072] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.474354] ^ [ 15.474563] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.474867] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.475138] ================================================================== [ 14.184640] ================================================================== [ 14.185029] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 14.185444] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.185816] [ 14.185953] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.185997] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.186011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.186034] Call Trace: [ 14.186050] <TASK> [ 14.186067] dump_stack_lvl+0x73/0xb0 [ 14.186117] print_report+0xd1/0x650 [ 14.186143] ? __virt_addr_valid+0x1db/0x2d0 [ 14.186167] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.186254] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.186301] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.186326] kasan_report+0x141/0x180 [ 14.186351] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.186378] kasan_check_range+0x10c/0x1c0 [ 14.186403] __kasan_check_write+0x18/0x20 [ 14.186426] kasan_atomics_helper+0x4a0/0x5450 [ 14.186481] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.186504] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.186547] ? kasan_atomics+0x152/0x310 [ 14.186577] kasan_atomics+0x1dc/0x310 [ 14.186600] ? __pfx_kasan_atomics+0x10/0x10 [ 14.186626] ? __pfx_read_tsc+0x10/0x10 [ 14.186648] ? ktime_get_ts64+0x86/0x230 [ 14.186672] kunit_try_run_case+0x1a5/0x480 [ 14.186715] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.186740] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.186765] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.186805] ? __kthread_parkme+0x82/0x180 [ 14.186841] ? preempt_count_sub+0x50/0x80 [ 14.186879] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.186917] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.186941] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.186979] kthread+0x337/0x6f0 [ 14.187014] ? trace_preempt_on+0x20/0xc0 [ 14.187038] ? __pfx_kthread+0x10/0x10 [ 14.187060] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.187081] ? calculate_sigpending+0x7b/0xa0 [ 14.187106] ? __pfx_kthread+0x10/0x10 [ 14.187129] ret_from_fork+0x116/0x1d0 [ 14.187149] ? __pfx_kthread+0x10/0x10 [ 14.187170] ret_from_fork_asm+0x1a/0x30 [ 14.187264] </TASK> [ 14.187277] [ 14.196141] Allocated by task 283: [ 14.196395] kasan_save_stack+0x45/0x70 [ 14.196596] kasan_save_track+0x18/0x40 [ 14.196758] kasan_save_alloc_info+0x3b/0x50 [ 14.196994] __kasan_kmalloc+0xb7/0xc0 [ 14.197216] __kmalloc_cache_noprof+0x189/0x420 [ 14.197516] kasan_atomics+0x95/0x310 [ 14.197731] kunit_try_run_case+0x1a5/0x480 [ 14.197965] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.198176] kthread+0x337/0x6f0 [ 14.198447] ret_from_fork+0x116/0x1d0 [ 14.198653] ret_from_fork_asm+0x1a/0x30 [ 14.198882] [ 14.198976] The buggy address belongs to the object at ffff8881031c4500 [ 14.198976] which belongs to the cache kmalloc-64 of size 64 [ 14.199606] The buggy address is located 0 bytes to the right of [ 14.199606] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.200415] [ 14.200517] The buggy address belongs to the physical page: [ 14.200705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.201170] flags: 0x200000000000000(node=0|zone=2) [ 14.201477] page_type: f5(slab) [ 14.201681] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.202012] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.202426] page dumped because: kasan: bad access detected [ 14.202710] [ 14.202826] Memory state around the buggy address: [ 14.203057] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.203434] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.203753] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.204052] ^ [ 14.204375] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.204685] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.205031] ================================================================== [ 14.106667] ================================================================== [ 14.106995] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 14.107388] Read of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.107688] [ 14.107801] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.107842] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.107856] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.107876] Call Trace: [ 14.107892] <TASK> [ 14.107907] dump_stack_lvl+0x73/0xb0 [ 14.107936] print_report+0xd1/0x650 [ 14.107959] ? __virt_addr_valid+0x1db/0x2d0 [ 14.107980] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.108002] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.108024] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.108045] kasan_report+0x141/0x180 [ 14.108066] ? kasan_atomics_helper+0x4b88/0x5450 [ 14.108092] __asan_report_load4_noabort+0x18/0x20 [ 14.108115] kasan_atomics_helper+0x4b88/0x5450 [ 14.108138] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.108159] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.108183] ? kasan_atomics+0x152/0x310 [ 14.108251] kasan_atomics+0x1dc/0x310 [ 14.108274] ? __pfx_kasan_atomics+0x10/0x10 [ 14.108298] ? __pfx_read_tsc+0x10/0x10 [ 14.108318] ? ktime_get_ts64+0x86/0x230 [ 14.108340] kunit_try_run_case+0x1a5/0x480 [ 14.108364] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.108386] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.108408] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.108431] ? __kthread_parkme+0x82/0x180 [ 14.108464] ? preempt_count_sub+0x50/0x80 [ 14.108488] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.108511] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.108533] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.108555] kthread+0x337/0x6f0 [ 14.108575] ? trace_preempt_on+0x20/0xc0 [ 14.108598] ? __pfx_kthread+0x10/0x10 [ 14.108617] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.108638] ? calculate_sigpending+0x7b/0xa0 [ 14.108662] ? __pfx_kthread+0x10/0x10 [ 14.108682] ret_from_fork+0x116/0x1d0 [ 14.108708] ? __pfx_kthread+0x10/0x10 [ 14.108728] ret_from_fork_asm+0x1a/0x30 [ 14.108759] </TASK> [ 14.108770] [ 14.116511] Allocated by task 283: [ 14.116644] kasan_save_stack+0x45/0x70 [ 14.116811] kasan_save_track+0x18/0x40 [ 14.116976] kasan_save_alloc_info+0x3b/0x50 [ 14.117599] __kasan_kmalloc+0xb7/0xc0 [ 14.117832] __kmalloc_cache_noprof+0x189/0x420 [ 14.118058] kasan_atomics+0x95/0x310 [ 14.118218] kunit_try_run_case+0x1a5/0x480 [ 14.118368] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.118654] kthread+0x337/0x6f0 [ 14.118850] ret_from_fork+0x116/0x1d0 [ 14.119039] ret_from_fork_asm+0x1a/0x30 [ 14.119307] [ 14.119408] The buggy address belongs to the object at ffff8881031c4500 [ 14.119408] which belongs to the cache kmalloc-64 of size 64 [ 14.119962] The buggy address is located 0 bytes to the right of [ 14.119962] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.120471] [ 14.120575] The buggy address belongs to the physical page: [ 14.120855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.121196] flags: 0x200000000000000(node=0|zone=2) [ 14.121413] page_type: f5(slab) [ 14.121547] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.121892] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.122236] page dumped because: kasan: bad access detected [ 14.122515] [ 14.122618] Memory state around the buggy address: [ 14.122825] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.123105] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.123579] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.123939] ^ [ 14.124236] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.124537] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.124822] ================================================================== [ 14.609520] ================================================================== [ 14.609861] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 14.610160] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.610485] [ 14.610871] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.610918] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.610932] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.610954] Call Trace: [ 14.610971] <TASK> [ 14.610988] dump_stack_lvl+0x73/0xb0 [ 14.611020] print_report+0xd1/0x650 [ 14.611045] ? __virt_addr_valid+0x1db/0x2d0 [ 14.611067] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.611090] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.611113] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.611135] kasan_report+0x141/0x180 [ 14.611159] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.611186] kasan_check_range+0x10c/0x1c0 [ 14.611229] __kasan_check_write+0x18/0x20 [ 14.611250] kasan_atomics_helper+0xfa9/0x5450 [ 14.611274] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.611297] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.611324] ? kasan_atomics+0x152/0x310 [ 14.611352] kasan_atomics+0x1dc/0x310 [ 14.611376] ? __pfx_kasan_atomics+0x10/0x10 [ 14.611402] ? __pfx_read_tsc+0x10/0x10 [ 14.611424] ? ktime_get_ts64+0x86/0x230 [ 14.611449] kunit_try_run_case+0x1a5/0x480 [ 14.611556] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.611580] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.611605] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.611629] ? __kthread_parkme+0x82/0x180 [ 14.611651] ? preempt_count_sub+0x50/0x80 [ 14.611675] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.611700] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.611724] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.611748] kthread+0x337/0x6f0 [ 14.611770] ? trace_preempt_on+0x20/0xc0 [ 14.611794] ? __pfx_kthread+0x10/0x10 [ 14.611815] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.611837] ? calculate_sigpending+0x7b/0xa0 [ 14.611863] ? __pfx_kthread+0x10/0x10 [ 14.611885] ret_from_fork+0x116/0x1d0 [ 14.611905] ? __pfx_kthread+0x10/0x10 [ 14.611944] ret_from_fork_asm+0x1a/0x30 [ 14.611976] </TASK> [ 14.611990] [ 14.623355] Allocated by task 283: [ 14.623543] kasan_save_stack+0x45/0x70 [ 14.624021] kasan_save_track+0x18/0x40 [ 14.624335] kasan_save_alloc_info+0x3b/0x50 [ 14.624789] __kasan_kmalloc+0xb7/0xc0 [ 14.624981] __kmalloc_cache_noprof+0x189/0x420 [ 14.625187] kasan_atomics+0x95/0x310 [ 14.625363] kunit_try_run_case+0x1a5/0x480 [ 14.625567] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.626511] kthread+0x337/0x6f0 [ 14.626922] ret_from_fork+0x116/0x1d0 [ 14.627314] ret_from_fork_asm+0x1a/0x30 [ 14.627531] [ 14.627631] The buggy address belongs to the object at ffff8881031c4500 [ 14.627631] which belongs to the cache kmalloc-64 of size 64 [ 14.628618] The buggy address is located 0 bytes to the right of [ 14.628618] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.629484] [ 14.629596] The buggy address belongs to the physical page: [ 14.629779] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.630158] flags: 0x200000000000000(node=0|zone=2) [ 14.630562] page_type: f5(slab) [ 14.630755] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.631059] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.631437] page dumped because: kasan: bad access detected [ 14.631666] [ 14.631779] Memory state around the buggy address: [ 14.631988] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.632255] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.632534] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.632959] ^ [ 14.633140] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.633637] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.633932] ================================================================== [ 14.275107] ================================================================== [ 14.275471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 14.275828] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.276090] [ 14.276181] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.276224] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.276239] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.276261] Call Trace: [ 14.276277] <TASK> [ 14.276294] dump_stack_lvl+0x73/0xb0 [ 14.276325] print_report+0xd1/0x650 [ 14.276350] ? __virt_addr_valid+0x1db/0x2d0 [ 14.276373] ? kasan_atomics_helper+0x697/0x5450 [ 14.276395] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.276419] ? kasan_atomics_helper+0x697/0x5450 [ 14.276442] kasan_report+0x141/0x180 [ 14.276477] ? kasan_atomics_helper+0x697/0x5450 [ 14.276505] kasan_check_range+0x10c/0x1c0 [ 14.276530] __kasan_check_write+0x18/0x20 [ 14.276551] kasan_atomics_helper+0x697/0x5450 [ 14.276575] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.276598] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.276625] ? kasan_atomics+0x152/0x310 [ 14.276654] kasan_atomics+0x1dc/0x310 [ 14.276700] ? __pfx_kasan_atomics+0x10/0x10 [ 14.276728] ? __pfx_read_tsc+0x10/0x10 [ 14.276751] ? ktime_get_ts64+0x86/0x230 [ 14.276776] kunit_try_run_case+0x1a5/0x480 [ 14.276802] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.276825] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.276850] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.276874] ? __kthread_parkme+0x82/0x180 [ 14.276896] ? preempt_count_sub+0x50/0x80 [ 14.276921] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.276946] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.276970] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.276994] kthread+0x337/0x6f0 [ 14.277015] ? trace_preempt_on+0x20/0xc0 [ 14.277039] ? __pfx_kthread+0x10/0x10 [ 14.277060] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.277083] ? calculate_sigpending+0x7b/0xa0 [ 14.277108] ? __pfx_kthread+0x10/0x10 [ 14.277130] ret_from_fork+0x116/0x1d0 [ 14.277150] ? __pfx_kthread+0x10/0x10 [ 14.277171] ret_from_fork_asm+0x1a/0x30 [ 14.277203] </TASK> [ 14.277216] [ 14.286440] Allocated by task 283: [ 14.286701] kasan_save_stack+0x45/0x70 [ 14.286911] kasan_save_track+0x18/0x40 [ 14.287096] kasan_save_alloc_info+0x3b/0x50 [ 14.287570] __kasan_kmalloc+0xb7/0xc0 [ 14.288050] __kmalloc_cache_noprof+0x189/0x420 [ 14.288563] kasan_atomics+0x95/0x310 [ 14.288895] kunit_try_run_case+0x1a5/0x480 [ 14.289363] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.289616] kthread+0x337/0x6f0 [ 14.290077] ret_from_fork+0x116/0x1d0 [ 14.290561] ret_from_fork_asm+0x1a/0x30 [ 14.290768] [ 14.290865] The buggy address belongs to the object at ffff8881031c4500 [ 14.290865] which belongs to the cache kmalloc-64 of size 64 [ 14.291645] The buggy address is located 0 bytes to the right of [ 14.291645] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.292566] [ 14.292835] The buggy address belongs to the physical page: [ 14.293073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.293664] flags: 0x200000000000000(node=0|zone=2) [ 14.294065] page_type: f5(slab) [ 14.294385] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.294875] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.295367] page dumped because: kasan: bad access detected [ 14.295913] [ 14.296025] Memory state around the buggy address: [ 14.296506] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.297127] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.297562] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.298175] ^ [ 14.298530] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.299253] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.299947] ================================================================== [ 14.751354] ================================================================== [ 14.751660] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 14.752591] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.752958] [ 14.753078] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.753125] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.753139] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.753164] Call Trace: [ 14.753179] <TASK> [ 14.753197] dump_stack_lvl+0x73/0xb0 [ 14.753229] print_report+0xd1/0x650 [ 14.753259] ? __virt_addr_valid+0x1db/0x2d0 [ 14.753284] ? kasan_atomics_helper+0x1217/0x5450 [ 14.753332] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.753356] ? kasan_atomics_helper+0x1217/0x5450 [ 14.753384] kasan_report+0x141/0x180 [ 14.753407] ? kasan_atomics_helper+0x1217/0x5450 [ 14.753436] kasan_check_range+0x10c/0x1c0 [ 14.753473] __kasan_check_write+0x18/0x20 [ 14.753495] kasan_atomics_helper+0x1217/0x5450 [ 14.753519] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.753542] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.753569] ? kasan_atomics+0x152/0x310 [ 14.753596] kasan_atomics+0x1dc/0x310 [ 14.753620] ? __pfx_kasan_atomics+0x10/0x10 [ 14.753647] ? __pfx_read_tsc+0x10/0x10 [ 14.753669] ? ktime_get_ts64+0x86/0x230 [ 14.753704] kunit_try_run_case+0x1a5/0x480 [ 14.753729] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.753753] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.753777] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.753801] ? __kthread_parkme+0x82/0x180 [ 14.753822] ? preempt_count_sub+0x50/0x80 [ 14.753848] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.753872] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.753896] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.753920] kthread+0x337/0x6f0 [ 14.753941] ? trace_preempt_on+0x20/0xc0 [ 14.753965] ? __pfx_kthread+0x10/0x10 [ 14.753987] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.754009] ? calculate_sigpending+0x7b/0xa0 [ 14.754034] ? __pfx_kthread+0x10/0x10 [ 14.754057] ret_from_fork+0x116/0x1d0 [ 14.754077] ? __pfx_kthread+0x10/0x10 [ 14.754098] ret_from_fork_asm+0x1a/0x30 [ 14.754130] </TASK> [ 14.754142] [ 14.764471] Allocated by task 283: [ 14.764839] kasan_save_stack+0x45/0x70 [ 14.765115] kasan_save_track+0x18/0x40 [ 14.765307] kasan_save_alloc_info+0x3b/0x50 [ 14.765536] __kasan_kmalloc+0xb7/0xc0 [ 14.765961] __kmalloc_cache_noprof+0x189/0x420 [ 14.766198] kasan_atomics+0x95/0x310 [ 14.766464] kunit_try_run_case+0x1a5/0x480 [ 14.766682] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.767074] kthread+0x337/0x6f0 [ 14.767321] ret_from_fork+0x116/0x1d0 [ 14.767630] ret_from_fork_asm+0x1a/0x30 [ 14.767920] [ 14.768025] The buggy address belongs to the object at ffff8881031c4500 [ 14.768025] which belongs to the cache kmalloc-64 of size 64 [ 14.768822] The buggy address is located 0 bytes to the right of [ 14.768822] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.769362] [ 14.769467] The buggy address belongs to the physical page: [ 14.769944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.770273] flags: 0x200000000000000(node=0|zone=2) [ 14.770591] page_type: f5(slab) [ 14.770932] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.771272] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.771691] page dumped because: kasan: bad access detected [ 14.772035] [ 14.772143] Memory state around the buggy address: [ 14.772338] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.772679] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.773219] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.773611] ^ [ 14.773975] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.774369] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.774856] ================================================================== [ 15.475547] ================================================================== [ 15.476031] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 15.476478] Read of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 15.476804] [ 15.476920] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.476963] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.476977] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.477000] Call Trace: [ 15.477018] <TASK> [ 15.477035] dump_stack_lvl+0x73/0xb0 [ 15.477063] print_report+0xd1/0x650 [ 15.477086] ? __virt_addr_valid+0x1db/0x2d0 [ 15.477111] ? kasan_atomics_helper+0x5115/0x5450 [ 15.477133] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.477156] ? kasan_atomics_helper+0x5115/0x5450 [ 15.477180] kasan_report+0x141/0x180 [ 15.477203] ? kasan_atomics_helper+0x5115/0x5450 [ 15.477232] __asan_report_load8_noabort+0x18/0x20 [ 15.477257] kasan_atomics_helper+0x5115/0x5450 [ 15.477281] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.477304] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.477331] ? kasan_atomics+0x152/0x310 [ 15.477359] kasan_atomics+0x1dc/0x310 [ 15.477388] ? __pfx_kasan_atomics+0x10/0x10 [ 15.477414] ? __pfx_read_tsc+0x10/0x10 [ 15.477435] ? ktime_get_ts64+0x86/0x230 [ 15.477470] kunit_try_run_case+0x1a5/0x480 [ 15.477496] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.477519] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.477544] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.477568] ? __kthread_parkme+0x82/0x180 [ 15.477589] ? preempt_count_sub+0x50/0x80 [ 15.477614] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.477640] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.477684] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.477709] kthread+0x337/0x6f0 [ 15.477731] ? trace_preempt_on+0x20/0xc0 [ 15.477756] ? __pfx_kthread+0x10/0x10 [ 15.477778] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.477800] ? calculate_sigpending+0x7b/0xa0 [ 15.477825] ? __pfx_kthread+0x10/0x10 [ 15.477848] ret_from_fork+0x116/0x1d0 [ 15.477867] ? __pfx_kthread+0x10/0x10 [ 15.477890] ret_from_fork_asm+0x1a/0x30 [ 15.477921] </TASK> [ 15.477935] [ 15.485028] Allocated by task 283: [ 15.485185] kasan_save_stack+0x45/0x70 [ 15.485349] kasan_save_track+0x18/0x40 [ 15.485565] kasan_save_alloc_info+0x3b/0x50 [ 15.485787] __kasan_kmalloc+0xb7/0xc0 [ 15.485961] __kmalloc_cache_noprof+0x189/0x420 [ 15.486122] kasan_atomics+0x95/0x310 [ 15.486261] kunit_try_run_case+0x1a5/0x480 [ 15.486412] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.486691] kthread+0x337/0x6f0 [ 15.486868] ret_from_fork+0x116/0x1d0 [ 15.487058] ret_from_fork_asm+0x1a/0x30 [ 15.487256] [ 15.487354] The buggy address belongs to the object at ffff8881031c4500 [ 15.487354] which belongs to the cache kmalloc-64 of size 64 [ 15.487828] The buggy address is located 0 bytes to the right of [ 15.487828] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 15.488328] [ 15.488429] The buggy address belongs to the physical page: [ 15.488649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 15.488994] flags: 0x200000000000000(node=0|zone=2) [ 15.489212] page_type: f5(slab) [ 15.489367] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.489686] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.490008] page dumped because: kasan: bad access detected [ 15.490250] [ 15.490352] Memory state around the buggy address: [ 15.490579] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.490901] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.491128] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.491347] ^ [ 15.491516] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.491827] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.492154] ================================================================== [ 14.125366] ================================================================== [ 14.125752] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 14.126041] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.126460] [ 14.126568] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.126613] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.126626] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.126650] Call Trace: [ 14.126666] <TASK> [ 14.126681] dump_stack_lvl+0x73/0xb0 [ 14.126730] print_report+0xd1/0x650 [ 14.126754] ? __virt_addr_valid+0x1db/0x2d0 [ 14.126777] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.126799] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.126822] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.126844] kasan_report+0x141/0x180 [ 14.126868] ? kasan_atomics_helper+0x4b6e/0x5450 [ 14.126895] __asan_report_store4_noabort+0x1b/0x30 [ 14.126917] kasan_atomics_helper+0x4b6e/0x5450 [ 14.126940] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.126963] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.126989] ? kasan_atomics+0x152/0x310 [ 14.127016] kasan_atomics+0x1dc/0x310 [ 14.127041] ? __pfx_kasan_atomics+0x10/0x10 [ 14.127066] ? __pfx_read_tsc+0x10/0x10 [ 14.127088] ? ktime_get_ts64+0x86/0x230 [ 14.127114] kunit_try_run_case+0x1a5/0x480 [ 14.127139] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.127162] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.127244] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.127271] ? __kthread_parkme+0x82/0x180 [ 14.127292] ? preempt_count_sub+0x50/0x80 [ 14.127317] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.127342] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.127366] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.127390] kthread+0x337/0x6f0 [ 14.127412] ? trace_preempt_on+0x20/0xc0 [ 14.127436] ? __pfx_kthread+0x10/0x10 [ 14.127469] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.127491] ? calculate_sigpending+0x7b/0xa0 [ 14.127516] ? __pfx_kthread+0x10/0x10 [ 14.127539] ret_from_fork+0x116/0x1d0 [ 14.127559] ? __pfx_kthread+0x10/0x10 [ 14.127581] ret_from_fork_asm+0x1a/0x30 [ 14.127612] </TASK> [ 14.127625] [ 14.135707] Allocated by task 283: [ 14.135894] kasan_save_stack+0x45/0x70 [ 14.136092] kasan_save_track+0x18/0x40 [ 14.136471] kasan_save_alloc_info+0x3b/0x50 [ 14.136664] __kasan_kmalloc+0xb7/0xc0 [ 14.136881] __kmalloc_cache_noprof+0x189/0x420 [ 14.137073] kasan_atomics+0x95/0x310 [ 14.137333] kunit_try_run_case+0x1a5/0x480 [ 14.137544] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.137810] kthread+0x337/0x6f0 [ 14.137970] ret_from_fork+0x116/0x1d0 [ 14.138139] ret_from_fork_asm+0x1a/0x30 [ 14.138361] [ 14.138446] The buggy address belongs to the object at ffff8881031c4500 [ 14.138446] which belongs to the cache kmalloc-64 of size 64 [ 14.138970] The buggy address is located 0 bytes to the right of [ 14.138970] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.139443] [ 14.139531] The buggy address belongs to the physical page: [ 14.139707] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.140064] flags: 0x200000000000000(node=0|zone=2) [ 14.140298] page_type: f5(slab) [ 14.140617] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.141052] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.141528] page dumped because: kasan: bad access detected [ 14.141762] [ 14.141862] Memory state around the buggy address: [ 14.142097] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.142499] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.142854] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.143176] ^ [ 14.143438] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.143745] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.144035] ================================================================== [ 15.391544] ================================================================== [ 15.392937] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 15.393632] Read of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 15.394253] [ 15.394430] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.394486] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.394500] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.394523] Call Trace: [ 15.394542] <TASK> [ 15.394559] dump_stack_lvl+0x73/0xb0 [ 15.394589] print_report+0xd1/0x650 [ 15.394613] ? __virt_addr_valid+0x1db/0x2d0 [ 15.394638] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.394660] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.394705] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.394728] kasan_report+0x141/0x180 [ 15.394751] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.394779] __asan_report_load8_noabort+0x18/0x20 [ 15.394804] kasan_atomics_helper+0x4fb2/0x5450 [ 15.394828] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.394851] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.394877] ? kasan_atomics+0x152/0x310 [ 15.394905] kasan_atomics+0x1dc/0x310 [ 15.394930] ? __pfx_kasan_atomics+0x10/0x10 [ 15.394955] ? __pfx_read_tsc+0x10/0x10 [ 15.394977] ? ktime_get_ts64+0x86/0x230 [ 15.395002] kunit_try_run_case+0x1a5/0x480 [ 15.395027] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.395050] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.395074] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.395099] ? __kthread_parkme+0x82/0x180 [ 15.395120] ? preempt_count_sub+0x50/0x80 [ 15.395145] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.395170] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.395194] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.395219] kthread+0x337/0x6f0 [ 15.395241] ? trace_preempt_on+0x20/0xc0 [ 15.395265] ? __pfx_kthread+0x10/0x10 [ 15.395287] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.395309] ? calculate_sigpending+0x7b/0xa0 [ 15.395334] ? __pfx_kthread+0x10/0x10 [ 15.395356] ret_from_fork+0x116/0x1d0 [ 15.395376] ? __pfx_kthread+0x10/0x10 [ 15.395398] ret_from_fork_asm+0x1a/0x30 [ 15.395431] </TASK> [ 15.395445] [ 15.408402] Allocated by task 283: [ 15.408754] kasan_save_stack+0x45/0x70 [ 15.409107] kasan_save_track+0x18/0x40 [ 15.409417] kasan_save_alloc_info+0x3b/0x50 [ 15.409583] __kasan_kmalloc+0xb7/0xc0 [ 15.409840] __kmalloc_cache_noprof+0x189/0x420 [ 15.410250] kasan_atomics+0x95/0x310 [ 15.410604] kunit_try_run_case+0x1a5/0x480 [ 15.410997] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.411467] kthread+0x337/0x6f0 [ 15.411621] ret_from_fork+0x116/0x1d0 [ 15.411984] ret_from_fork_asm+0x1a/0x30 [ 15.412354] [ 15.412528] The buggy address belongs to the object at ffff8881031c4500 [ 15.412528] which belongs to the cache kmalloc-64 of size 64 [ 15.412993] The buggy address is located 0 bytes to the right of [ 15.412993] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 15.414222] [ 15.414386] The buggy address belongs to the physical page: [ 15.414782] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 15.415182] flags: 0x200000000000000(node=0|zone=2) [ 15.415350] page_type: f5(slab) [ 15.415484] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.415737] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.416152] page dumped because: kasan: bad access detected [ 15.416381] [ 15.416494] Memory state around the buggy address: [ 15.417144] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.417448] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.417793] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.418212] ^ [ 15.418437] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.418872] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.419163] ================================================================== [ 14.331805] ================================================================== [ 14.332163] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 14.332653] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.333510] [ 14.333747] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.333802] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.333819] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.333945] Call Trace: [ 14.333965] <TASK> [ 14.333985] dump_stack_lvl+0x73/0xb0 [ 14.334017] print_report+0xd1/0x650 [ 14.334041] ? __virt_addr_valid+0x1db/0x2d0 [ 14.334096] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.334121] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.334144] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.334167] kasan_report+0x141/0x180 [ 14.334208] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.334235] kasan_check_range+0x10c/0x1c0 [ 14.334260] __kasan_check_write+0x18/0x20 [ 14.334281] kasan_atomics_helper+0x7c7/0x5450 [ 14.334305] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.334329] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.334356] ? kasan_atomics+0x152/0x310 [ 14.334384] kasan_atomics+0x1dc/0x310 [ 14.334408] ? __pfx_kasan_atomics+0x10/0x10 [ 14.334434] ? __pfx_read_tsc+0x10/0x10 [ 14.334468] ? ktime_get_ts64+0x86/0x230 [ 14.334493] kunit_try_run_case+0x1a5/0x480 [ 14.334519] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.334542] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.334566] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.334591] ? __kthread_parkme+0x82/0x180 [ 14.334612] ? preempt_count_sub+0x50/0x80 [ 14.334638] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.334662] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.334686] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.334711] kthread+0x337/0x6f0 [ 14.334732] ? trace_preempt_on+0x20/0xc0 [ 14.334757] ? __pfx_kthread+0x10/0x10 [ 14.334779] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.334802] ? calculate_sigpending+0x7b/0xa0 [ 14.334827] ? __pfx_kthread+0x10/0x10 [ 14.334850] ret_from_fork+0x116/0x1d0 [ 14.334869] ? __pfx_kthread+0x10/0x10 [ 14.334891] ret_from_fork_asm+0x1a/0x30 [ 14.334923] </TASK> [ 14.334935] [ 14.348996] Allocated by task 283: [ 14.349763] kasan_save_stack+0x45/0x70 [ 14.350276] kasan_save_track+0x18/0x40 [ 14.351019] kasan_save_alloc_info+0x3b/0x50 [ 14.351210] __kasan_kmalloc+0xb7/0xc0 [ 14.351597] __kmalloc_cache_noprof+0x189/0x420 [ 14.351805] kasan_atomics+0x95/0x310 [ 14.352145] kunit_try_run_case+0x1a5/0x480 [ 14.352510] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.352888] kthread+0x337/0x6f0 [ 14.353141] ret_from_fork+0x116/0x1d0 [ 14.353425] ret_from_fork_asm+0x1a/0x30 [ 14.353630] [ 14.353769] The buggy address belongs to the object at ffff8881031c4500 [ 14.353769] which belongs to the cache kmalloc-64 of size 64 [ 14.354245] The buggy address is located 0 bytes to the right of [ 14.354245] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.354959] [ 14.355058] The buggy address belongs to the physical page: [ 14.355300] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.356212] flags: 0x200000000000000(node=0|zone=2) [ 14.356577] page_type: f5(slab) [ 14.356728] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.357266] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.357779] page dumped because: kasan: bad access detected [ 14.358126] [ 14.358236] Memory state around the buggy address: [ 14.358578] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.359109] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.359653] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.359990] ^ [ 14.360248] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.360604] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.361017] ================================================================== [ 14.697978] ================================================================== [ 14.698395] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 14.698649] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.698991] [ 14.699105] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.699149] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.699164] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.699189] Call Trace: [ 14.699244] <TASK> [ 14.699265] dump_stack_lvl+0x73/0xb0 [ 14.699296] print_report+0xd1/0x650 [ 14.699320] ? __virt_addr_valid+0x1db/0x2d0 [ 14.699344] ? kasan_atomics_helper+0x1148/0x5450 [ 14.699368] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.699393] ? kasan_atomics_helper+0x1148/0x5450 [ 14.699416] kasan_report+0x141/0x180 [ 14.699440] ? kasan_atomics_helper+0x1148/0x5450 [ 14.699482] kasan_check_range+0x10c/0x1c0 [ 14.699508] __kasan_check_write+0x18/0x20 [ 14.699528] kasan_atomics_helper+0x1148/0x5450 [ 14.699552] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.699575] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.699601] ? kasan_atomics+0x152/0x310 [ 14.699629] kasan_atomics+0x1dc/0x310 [ 14.699653] ? __pfx_kasan_atomics+0x10/0x10 [ 14.699679] ? __pfx_read_tsc+0x10/0x10 [ 14.699700] ? ktime_get_ts64+0x86/0x230 [ 14.699725] kunit_try_run_case+0x1a5/0x480 [ 14.699750] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.699774] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.699798] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.699822] ? __kthread_parkme+0x82/0x180 [ 14.699843] ? preempt_count_sub+0x50/0x80 [ 14.699869] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.699895] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.699919] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.699943] kthread+0x337/0x6f0 [ 14.699964] ? trace_preempt_on+0x20/0xc0 [ 14.700000] ? __pfx_kthread+0x10/0x10 [ 14.700022] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.700044] ? calculate_sigpending+0x7b/0xa0 [ 14.700069] ? __pfx_kthread+0x10/0x10 [ 14.700091] ret_from_fork+0x116/0x1d0 [ 14.700111] ? __pfx_kthread+0x10/0x10 [ 14.700132] ret_from_fork_asm+0x1a/0x30 [ 14.700164] </TASK> [ 14.700177] [ 14.708281] Allocated by task 283: [ 14.708477] kasan_save_stack+0x45/0x70 [ 14.708685] kasan_save_track+0x18/0x40 [ 14.709132] kasan_save_alloc_info+0x3b/0x50 [ 14.709529] __kasan_kmalloc+0xb7/0xc0 [ 14.709779] __kmalloc_cache_noprof+0x189/0x420 [ 14.709966] kasan_atomics+0x95/0x310 [ 14.710141] kunit_try_run_case+0x1a5/0x480 [ 14.710292] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.710481] kthread+0x337/0x6f0 [ 14.710655] ret_from_fork+0x116/0x1d0 [ 14.710846] ret_from_fork_asm+0x1a/0x30 [ 14.711264] [ 14.711353] The buggy address belongs to the object at ffff8881031c4500 [ 14.711353] which belongs to the cache kmalloc-64 of size 64 [ 14.711842] The buggy address is located 0 bytes to the right of [ 14.711842] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.712400] [ 14.712495] The buggy address belongs to the physical page: [ 14.712696] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.712941] flags: 0x200000000000000(node=0|zone=2) [ 14.713107] page_type: f5(slab) [ 14.713371] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.713742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.714084] page dumped because: kasan: bad access detected [ 14.714391] [ 14.714489] Memory state around the buggy address: [ 14.714714] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.714938] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.715157] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.715591] ^ [ 14.716040] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.716585] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.717089] ================================================================== [ 14.146571] ================================================================== [ 14.146896] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 14.147197] Read of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.147533] [ 14.147631] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.147695] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.147710] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.147733] Call Trace: [ 14.147751] <TASK> [ 14.147768] dump_stack_lvl+0x73/0xb0 [ 14.147796] print_report+0xd1/0x650 [ 14.147820] ? __virt_addr_valid+0x1db/0x2d0 [ 14.147843] ? kasan_atomics_helper+0x3df/0x5450 [ 14.147865] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.147888] ? kasan_atomics_helper+0x3df/0x5450 [ 14.147911] kasan_report+0x141/0x180 [ 14.147934] ? kasan_atomics_helper+0x3df/0x5450 [ 14.147962] kasan_check_range+0x10c/0x1c0 [ 14.147987] __kasan_check_read+0x15/0x20 [ 14.148007] kasan_atomics_helper+0x3df/0x5450 [ 14.148031] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.148054] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.148079] ? kasan_atomics+0x152/0x310 [ 14.148108] kasan_atomics+0x1dc/0x310 [ 14.148131] ? __pfx_kasan_atomics+0x10/0x10 [ 14.148157] ? __pfx_read_tsc+0x10/0x10 [ 14.148179] ? ktime_get_ts64+0x86/0x230 [ 14.148203] kunit_try_run_case+0x1a5/0x480 [ 14.148229] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.148252] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.148276] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.148301] ? __kthread_parkme+0x82/0x180 [ 14.148321] ? preempt_count_sub+0x50/0x80 [ 14.148345] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.148371] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.148394] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.148419] kthread+0x337/0x6f0 [ 14.148440] ? trace_preempt_on+0x20/0xc0 [ 14.148474] ? __pfx_kthread+0x10/0x10 [ 14.148496] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.148519] ? calculate_sigpending+0x7b/0xa0 [ 14.148544] ? __pfx_kthread+0x10/0x10 [ 14.148567] ret_from_fork+0x116/0x1d0 [ 14.148587] ? __pfx_kthread+0x10/0x10 [ 14.148609] ret_from_fork_asm+0x1a/0x30 [ 14.148641] </TASK> [ 14.148655] [ 14.156812] Allocated by task 283: [ 14.157001] kasan_save_stack+0x45/0x70 [ 14.157268] kasan_save_track+0x18/0x40 [ 14.157437] kasan_save_alloc_info+0x3b/0x50 [ 14.157601] __kasan_kmalloc+0xb7/0xc0 [ 14.157782] __kmalloc_cache_noprof+0x189/0x420 [ 14.158011] kasan_atomics+0x95/0x310 [ 14.158410] kunit_try_run_case+0x1a5/0x480 [ 14.158647] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.158889] kthread+0x337/0x6f0 [ 14.159014] ret_from_fork+0x116/0x1d0 [ 14.159160] ret_from_fork_asm+0x1a/0x30 [ 14.159425] [ 14.159540] The buggy address belongs to the object at ffff8881031c4500 [ 14.159540] which belongs to the cache kmalloc-64 of size 64 [ 14.160100] The buggy address is located 0 bytes to the right of [ 14.160100] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.160668] [ 14.160775] The buggy address belongs to the physical page: [ 14.161004] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.161410] flags: 0x200000000000000(node=0|zone=2) [ 14.161594] page_type: f5(slab) [ 14.161740] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.162090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.162504] page dumped because: kasan: bad access detected [ 14.162789] [ 14.162885] Memory state around the buggy address: [ 14.163044] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.163592] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.163895] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.164290] ^ [ 14.164501] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.164817] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.165068] ================================================================== [ 15.229563] ================================================================== [ 15.230000] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 15.230382] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 15.231134] [ 15.231410] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.231472] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.231486] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.231510] Call Trace: [ 15.231528] <TASK> [ 15.231544] dump_stack_lvl+0x73/0xb0 [ 15.231574] print_report+0xd1/0x650 [ 15.231619] ? __virt_addr_valid+0x1db/0x2d0 [ 15.231643] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.231690] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.231714] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.231737] kasan_report+0x141/0x180 [ 15.231761] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.231789] kasan_check_range+0x10c/0x1c0 [ 15.231814] __kasan_check_write+0x18/0x20 [ 15.231835] kasan_atomics_helper+0x1d7a/0x5450 [ 15.231859] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.231883] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.231910] ? kasan_atomics+0x152/0x310 [ 15.231938] kasan_atomics+0x1dc/0x310 [ 15.231962] ? __pfx_kasan_atomics+0x10/0x10 [ 15.231987] ? __pfx_read_tsc+0x10/0x10 [ 15.232009] ? ktime_get_ts64+0x86/0x230 [ 15.232035] kunit_try_run_case+0x1a5/0x480 [ 15.232061] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.232085] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.232109] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.232134] ? __kthread_parkme+0x82/0x180 [ 15.232155] ? preempt_count_sub+0x50/0x80 [ 15.232181] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.232216] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.232239] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.232262] kthread+0x337/0x6f0 [ 15.232312] ? trace_preempt_on+0x20/0xc0 [ 15.232337] ? __pfx_kthread+0x10/0x10 [ 15.232387] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.232409] ? calculate_sigpending+0x7b/0xa0 [ 15.232471] ? __pfx_kthread+0x10/0x10 [ 15.232494] ret_from_fork+0x116/0x1d0 [ 15.232531] ? __pfx_kthread+0x10/0x10 [ 15.232565] ret_from_fork_asm+0x1a/0x30 [ 15.232613] </TASK> [ 15.232637] [ 15.241245] Allocated by task 283: [ 15.241485] kasan_save_stack+0x45/0x70 [ 15.241740] kasan_save_track+0x18/0x40 [ 15.241927] kasan_save_alloc_info+0x3b/0x50 [ 15.242163] __kasan_kmalloc+0xb7/0xc0 [ 15.242378] __kmalloc_cache_noprof+0x189/0x420 [ 15.242634] kasan_atomics+0x95/0x310 [ 15.242872] kunit_try_run_case+0x1a5/0x480 [ 15.243096] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.243384] kthread+0x337/0x6f0 [ 15.243581] ret_from_fork+0x116/0x1d0 [ 15.243951] ret_from_fork_asm+0x1a/0x30 [ 15.244157] [ 15.244232] The buggy address belongs to the object at ffff8881031c4500 [ 15.244232] which belongs to the cache kmalloc-64 of size 64 [ 15.244800] The buggy address is located 0 bytes to the right of [ 15.244800] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 15.245539] [ 15.245660] The buggy address belongs to the physical page: [ 15.245923] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 15.246241] flags: 0x200000000000000(node=0|zone=2) [ 15.246402] page_type: f5(slab) [ 15.246534] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.246941] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.247318] page dumped because: kasan: bad access detected [ 15.247663] [ 15.247799] Memory state around the buggy address: [ 15.248135] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.248409] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.248787] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.249190] ^ [ 15.249438] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.249815] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.250033] ================================================================== [ 14.547040] ================================================================== [ 14.547436] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 14.547770] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.548010] [ 14.548125] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.548169] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.548247] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.548272] Call Trace: [ 14.548290] <TASK> [ 14.548307] dump_stack_lvl+0x73/0xb0 [ 14.548337] print_report+0xd1/0x650 [ 14.548361] ? __virt_addr_valid+0x1db/0x2d0 [ 14.548385] ? kasan_atomics_helper+0xde0/0x5450 [ 14.548407] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.548431] ? kasan_atomics_helper+0xde0/0x5450 [ 14.548463] kasan_report+0x141/0x180 [ 14.548487] ? kasan_atomics_helper+0xde0/0x5450 [ 14.548515] kasan_check_range+0x10c/0x1c0 [ 14.548539] __kasan_check_write+0x18/0x20 [ 14.548561] kasan_atomics_helper+0xde0/0x5450 [ 14.548585] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.548608] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.548635] ? kasan_atomics+0x152/0x310 [ 14.548662] kasan_atomics+0x1dc/0x310 [ 14.548686] ? __pfx_kasan_atomics+0x10/0x10 [ 14.548730] ? __pfx_read_tsc+0x10/0x10 [ 14.548752] ? ktime_get_ts64+0x86/0x230 [ 14.548777] kunit_try_run_case+0x1a5/0x480 [ 14.548802] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.548825] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.548851] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.548876] ? __kthread_parkme+0x82/0x180 [ 14.548898] ? preempt_count_sub+0x50/0x80 [ 14.548923] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.548948] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.548972] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.548997] kthread+0x337/0x6f0 [ 14.549018] ? trace_preempt_on+0x20/0xc0 [ 14.549043] ? __pfx_kthread+0x10/0x10 [ 14.549065] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.549089] ? calculate_sigpending+0x7b/0xa0 [ 14.549115] ? __pfx_kthread+0x10/0x10 [ 14.549138] ret_from_fork+0x116/0x1d0 [ 14.549157] ? __pfx_kthread+0x10/0x10 [ 14.549233] ret_from_fork_asm+0x1a/0x30 [ 14.549268] </TASK> [ 14.549282] [ 14.557440] Allocated by task 283: [ 14.557608] kasan_save_stack+0x45/0x70 [ 14.557758] kasan_save_track+0x18/0x40 [ 14.558380] kasan_save_alloc_info+0x3b/0x50 [ 14.558626] __kasan_kmalloc+0xb7/0xc0 [ 14.558813] __kmalloc_cache_noprof+0x189/0x420 [ 14.559009] kasan_atomics+0x95/0x310 [ 14.559148] kunit_try_run_case+0x1a5/0x480 [ 14.559298] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.559566] kthread+0x337/0x6f0 [ 14.559780] ret_from_fork+0x116/0x1d0 [ 14.559973] ret_from_fork_asm+0x1a/0x30 [ 14.560118] [ 14.560244] The buggy address belongs to the object at ffff8881031c4500 [ 14.560244] which belongs to the cache kmalloc-64 of size 64 [ 14.560797] The buggy address is located 0 bytes to the right of [ 14.560797] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.561336] [ 14.561446] The buggy address belongs to the physical page: [ 14.561699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.561948] flags: 0x200000000000000(node=0|zone=2) [ 14.562113] page_type: f5(slab) [ 14.562470] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.562805] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.563242] page dumped because: kasan: bad access detected [ 14.563505] [ 14.563605] Memory state around the buggy address: [ 14.563850] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.564105] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.564388] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.564638] ^ [ 14.564894] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.565276] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.565566] ================================================================== [ 15.168932] ================================================================== [ 15.169406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 15.169672] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 15.170046] [ 15.170172] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.170217] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.170231] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.170284] Call Trace: [ 15.170300] <TASK> [ 15.170319] dump_stack_lvl+0x73/0xb0 [ 15.170362] print_report+0xd1/0x650 [ 15.170404] ? __virt_addr_valid+0x1db/0x2d0 [ 15.170436] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.170475] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.170499] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.170524] kasan_report+0x141/0x180 [ 15.170548] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.170593] kasan_check_range+0x10c/0x1c0 [ 15.170627] __kasan_check_write+0x18/0x20 [ 15.170648] kasan_atomics_helper+0x1c18/0x5450 [ 15.170682] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.170706] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.170732] ? kasan_atomics+0x152/0x310 [ 15.170760] kasan_atomics+0x1dc/0x310 [ 15.170786] ? __pfx_kasan_atomics+0x10/0x10 [ 15.170810] ? __pfx_read_tsc+0x10/0x10 [ 15.170831] ? ktime_get_ts64+0x86/0x230 [ 15.170856] kunit_try_run_case+0x1a5/0x480 [ 15.170880] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.170903] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.170928] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.170979] ? __kthread_parkme+0x82/0x180 [ 15.171000] ? preempt_count_sub+0x50/0x80 [ 15.171024] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.171060] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.171084] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.171133] kthread+0x337/0x6f0 [ 15.171154] ? trace_preempt_on+0x20/0xc0 [ 15.171179] ? __pfx_kthread+0x10/0x10 [ 15.171211] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.171234] ? calculate_sigpending+0x7b/0xa0 [ 15.171259] ? __pfx_kthread+0x10/0x10 [ 15.171281] ret_from_fork+0x116/0x1d0 [ 15.171300] ? __pfx_kthread+0x10/0x10 [ 15.171321] ret_from_fork_asm+0x1a/0x30 [ 15.171353] </TASK> [ 15.171365] [ 15.179647] Allocated by task 283: [ 15.179844] kasan_save_stack+0x45/0x70 [ 15.180049] kasan_save_track+0x18/0x40 [ 15.180233] kasan_save_alloc_info+0x3b/0x50 [ 15.180386] __kasan_kmalloc+0xb7/0xc0 [ 15.180533] __kmalloc_cache_noprof+0x189/0x420 [ 15.180728] kasan_atomics+0x95/0x310 [ 15.180972] kunit_try_run_case+0x1a5/0x480 [ 15.181262] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.181572] kthread+0x337/0x6f0 [ 15.181808] ret_from_fork+0x116/0x1d0 [ 15.182042] ret_from_fork_asm+0x1a/0x30 [ 15.182243] [ 15.182388] The buggy address belongs to the object at ffff8881031c4500 [ 15.182388] which belongs to the cache kmalloc-64 of size 64 [ 15.182947] The buggy address is located 0 bytes to the right of [ 15.182947] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 15.183532] [ 15.183670] The buggy address belongs to the physical page: [ 15.183937] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 15.184290] flags: 0x200000000000000(node=0|zone=2) [ 15.184561] page_type: f5(slab) [ 15.184769] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.185114] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.185473] page dumped because: kasan: bad access detected [ 15.185819] [ 15.185929] Memory state around the buggy address: [ 15.186143] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.186531] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.186897] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.187231] ^ [ 15.187447] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.187861] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.188236] ================================================================== [ 14.444892] ================================================================== [ 14.445286] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 14.445572] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.445845] [ 14.445974] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.446019] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.446033] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.446057] Call Trace: [ 14.446073] <TASK> [ 14.446090] dump_stack_lvl+0x73/0xb0 [ 14.446119] print_report+0xd1/0x650 [ 14.446143] ? __virt_addr_valid+0x1db/0x2d0 [ 14.446167] ? kasan_atomics_helper+0xac7/0x5450 [ 14.446189] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.446258] ? kasan_atomics_helper+0xac7/0x5450 [ 14.446286] kasan_report+0x141/0x180 [ 14.446310] ? kasan_atomics_helper+0xac7/0x5450 [ 14.446337] kasan_check_range+0x10c/0x1c0 [ 14.446362] __kasan_check_write+0x18/0x20 [ 14.446382] kasan_atomics_helper+0xac7/0x5450 [ 14.446406] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.446430] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.446468] ? kasan_atomics+0x152/0x310 [ 14.446496] kasan_atomics+0x1dc/0x310 [ 14.446520] ? __pfx_kasan_atomics+0x10/0x10 [ 14.446546] ? __pfx_read_tsc+0x10/0x10 [ 14.446569] ? ktime_get_ts64+0x86/0x230 [ 14.446593] kunit_try_run_case+0x1a5/0x480 [ 14.446619] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.446642] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.446666] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.446691] ? __kthread_parkme+0x82/0x180 [ 14.446712] ? preempt_count_sub+0x50/0x80 [ 14.446736] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.446761] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.446785] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.446809] kthread+0x337/0x6f0 [ 14.446831] ? trace_preempt_on+0x20/0xc0 [ 14.446855] ? __pfx_kthread+0x10/0x10 [ 14.446877] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.446898] ? calculate_sigpending+0x7b/0xa0 [ 14.446923] ? __pfx_kthread+0x10/0x10 [ 14.446945] ret_from_fork+0x116/0x1d0 [ 14.446965] ? __pfx_kthread+0x10/0x10 [ 14.446988] ret_from_fork_asm+0x1a/0x30 [ 14.447020] </TASK> [ 14.447034] [ 14.455029] Allocated by task 283: [ 14.455363] kasan_save_stack+0x45/0x70 [ 14.455580] kasan_save_track+0x18/0x40 [ 14.455818] kasan_save_alloc_info+0x3b/0x50 [ 14.456004] __kasan_kmalloc+0xb7/0xc0 [ 14.456142] __kmalloc_cache_noprof+0x189/0x420 [ 14.456483] kasan_atomics+0x95/0x310 [ 14.456671] kunit_try_run_case+0x1a5/0x480 [ 14.456895] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.457074] kthread+0x337/0x6f0 [ 14.457198] ret_from_fork+0x116/0x1d0 [ 14.457333] ret_from_fork_asm+0x1a/0x30 [ 14.457548] [ 14.457648] The buggy address belongs to the object at ffff8881031c4500 [ 14.457648] which belongs to the cache kmalloc-64 of size 64 [ 14.458411] The buggy address is located 0 bytes to the right of [ 14.458411] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.458836] [ 14.458914] The buggy address belongs to the physical page: [ 14.459087] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.459929] flags: 0x200000000000000(node=0|zone=2) [ 14.460181] page_type: f5(slab) [ 14.460353] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.460746] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.461037] page dumped because: kasan: bad access detected [ 14.461239] [ 14.461314] Memory state around the buggy address: [ 14.461489] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.461805] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.462110] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.462536] ^ [ 14.462765] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.463044] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.463655] ================================================================== [ 15.290855] ================================================================== [ 15.291150] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 15.291617] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 15.292120] [ 15.292276] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.292321] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.292335] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.292359] Call Trace: [ 15.292373] <TASK> [ 15.292390] dump_stack_lvl+0x73/0xb0 [ 15.292421] print_report+0xd1/0x650 [ 15.292444] ? __virt_addr_valid+0x1db/0x2d0 [ 15.292509] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.292532] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.292584] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.292632] kasan_report+0x141/0x180 [ 15.292657] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.292703] kasan_check_range+0x10c/0x1c0 [ 15.292729] __kasan_check_write+0x18/0x20 [ 15.292749] kasan_atomics_helper+0x1f43/0x5450 [ 15.292790] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.292827] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.292878] ? kasan_atomics+0x152/0x310 [ 15.292905] kasan_atomics+0x1dc/0x310 [ 15.292941] ? __pfx_kasan_atomics+0x10/0x10 [ 15.292967] ? __pfx_read_tsc+0x10/0x10 [ 15.292988] ? ktime_get_ts64+0x86/0x230 [ 15.293014] kunit_try_run_case+0x1a5/0x480 [ 15.293039] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.293063] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.293088] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.293112] ? __kthread_parkme+0x82/0x180 [ 15.293134] ? preempt_count_sub+0x50/0x80 [ 15.293159] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.293184] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.293208] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.293233] kthread+0x337/0x6f0 [ 15.293254] ? trace_preempt_on+0x20/0xc0 [ 15.293296] ? __pfx_kthread+0x10/0x10 [ 15.293328] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.293349] ? calculate_sigpending+0x7b/0xa0 [ 15.293391] ? __pfx_kthread+0x10/0x10 [ 15.293414] ret_from_fork+0x116/0x1d0 [ 15.293434] ? __pfx_kthread+0x10/0x10 [ 15.293488] ret_from_fork_asm+0x1a/0x30 [ 15.293534] </TASK> [ 15.293568] [ 15.301981] Allocated by task 283: [ 15.302211] kasan_save_stack+0x45/0x70 [ 15.302436] kasan_save_track+0x18/0x40 [ 15.302695] kasan_save_alloc_info+0x3b/0x50 [ 15.302926] __kasan_kmalloc+0xb7/0xc0 [ 15.303114] __kmalloc_cache_noprof+0x189/0x420 [ 15.303333] kasan_atomics+0x95/0x310 [ 15.303478] kunit_try_run_case+0x1a5/0x480 [ 15.303662] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.304066] kthread+0x337/0x6f0 [ 15.304232] ret_from_fork+0x116/0x1d0 [ 15.304368] ret_from_fork_asm+0x1a/0x30 [ 15.304522] [ 15.304596] The buggy address belongs to the object at ffff8881031c4500 [ 15.304596] which belongs to the cache kmalloc-64 of size 64 [ 15.305096] The buggy address is located 0 bytes to the right of [ 15.305096] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 15.305687] [ 15.305788] The buggy address belongs to the physical page: [ 15.306104] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 15.306352] flags: 0x200000000000000(node=0|zone=2) [ 15.306629] page_type: f5(slab) [ 15.306801] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.307278] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.307780] page dumped because: kasan: bad access detected [ 15.307999] [ 15.308074] Memory state around the buggy address: [ 15.308248] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.308653] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.309033] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.309327] ^ [ 15.309567] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.309910] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.310241] ================================================================== [ 15.330747] ================================================================== [ 15.331139] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 15.331532] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 15.331965] [ 15.332087] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.332164] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.332191] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.332228] Call Trace: [ 15.332244] <TASK> [ 15.332274] dump_stack_lvl+0x73/0xb0 [ 15.332317] print_report+0xd1/0x650 [ 15.332342] ? __virt_addr_valid+0x1db/0x2d0 [ 15.332377] ? kasan_atomics_helper+0x2006/0x5450 [ 15.332400] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.332424] ? kasan_atomics_helper+0x2006/0x5450 [ 15.332469] kasan_report+0x141/0x180 [ 15.332493] ? kasan_atomics_helper+0x2006/0x5450 [ 15.332521] kasan_check_range+0x10c/0x1c0 [ 15.332546] __kasan_check_write+0x18/0x20 [ 15.332567] kasan_atomics_helper+0x2006/0x5450 [ 15.332591] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.332615] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.332643] ? kasan_atomics+0x152/0x310 [ 15.332672] kasan_atomics+0x1dc/0x310 [ 15.332695] ? __pfx_kasan_atomics+0x10/0x10 [ 15.332722] ? __pfx_read_tsc+0x10/0x10 [ 15.332746] ? ktime_get_ts64+0x86/0x230 [ 15.332800] kunit_try_run_case+0x1a5/0x480 [ 15.332826] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.332860] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.332885] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.332909] ? __kthread_parkme+0x82/0x180 [ 15.332931] ? preempt_count_sub+0x50/0x80 [ 15.332955] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.332980] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.333005] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.333030] kthread+0x337/0x6f0 [ 15.333078] ? trace_preempt_on+0x20/0xc0 [ 15.333103] ? __pfx_kthread+0x10/0x10 [ 15.333125] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.333159] ? calculate_sigpending+0x7b/0xa0 [ 15.333184] ? __pfx_kthread+0x10/0x10 [ 15.333232] ret_from_fork+0x116/0x1d0 [ 15.333252] ? __pfx_kthread+0x10/0x10 [ 15.333274] ret_from_fork_asm+0x1a/0x30 [ 15.333316] </TASK> [ 15.333330] [ 15.341791] Allocated by task 283: [ 15.341987] kasan_save_stack+0x45/0x70 [ 15.342207] kasan_save_track+0x18/0x40 [ 15.342418] kasan_save_alloc_info+0x3b/0x50 [ 15.342641] __kasan_kmalloc+0xb7/0xc0 [ 15.342865] __kmalloc_cache_noprof+0x189/0x420 [ 15.343156] kasan_atomics+0x95/0x310 [ 15.343338] kunit_try_run_case+0x1a5/0x480 [ 15.343587] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.343892] kthread+0x337/0x6f0 [ 15.344196] ret_from_fork+0x116/0x1d0 [ 15.344371] ret_from_fork_asm+0x1a/0x30 [ 15.344535] [ 15.344634] The buggy address belongs to the object at ffff8881031c4500 [ 15.344634] which belongs to the cache kmalloc-64 of size 64 [ 15.345256] The buggy address is located 0 bytes to the right of [ 15.345256] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 15.345868] [ 15.346011] The buggy address belongs to the physical page: [ 15.346278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 15.346630] flags: 0x200000000000000(node=0|zone=2) [ 15.346911] page_type: f5(slab) [ 15.347105] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.347466] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.347864] page dumped because: kasan: bad access detected [ 15.348038] [ 15.348109] Memory state around the buggy address: [ 15.348262] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.348522] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.348842] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.349283] ^ [ 15.349475] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.349688] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.349898] ================================================================== [ 14.381628] ================================================================== [ 14.381988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 14.382328] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.382713] [ 14.382832] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.382878] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.382912] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.382936] Call Trace: [ 14.382953] <TASK> [ 14.382970] dump_stack_lvl+0x73/0xb0 [ 14.383000] print_report+0xd1/0x650 [ 14.383024] ? __virt_addr_valid+0x1db/0x2d0 [ 14.383047] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.383090] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.383117] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.383141] kasan_report+0x141/0x180 [ 14.383164] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.383273] kasan_check_range+0x10c/0x1c0 [ 14.383300] __kasan_check_write+0x18/0x20 [ 14.383321] kasan_atomics_helper+0x8f9/0x5450 [ 14.383345] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.383369] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.383396] ? kasan_atomics+0x152/0x310 [ 14.383443] kasan_atomics+0x1dc/0x310 [ 14.383478] ? __pfx_kasan_atomics+0x10/0x10 [ 14.383503] ? __pfx_read_tsc+0x10/0x10 [ 14.383525] ? ktime_get_ts64+0x86/0x230 [ 14.383550] kunit_try_run_case+0x1a5/0x480 [ 14.383575] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.383601] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.383626] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.383651] ? __kthread_parkme+0x82/0x180 [ 14.383672] ? preempt_count_sub+0x50/0x80 [ 14.383696] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.383739] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.383764] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.383810] kthread+0x337/0x6f0 [ 14.383831] ? trace_preempt_on+0x20/0xc0 [ 14.383856] ? __pfx_kthread+0x10/0x10 [ 14.383878] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.383901] ? calculate_sigpending+0x7b/0xa0 [ 14.383926] ? __pfx_kthread+0x10/0x10 [ 14.383949] ret_from_fork+0x116/0x1d0 [ 14.383987] ? __pfx_kthread+0x10/0x10 [ 14.384009] ret_from_fork_asm+0x1a/0x30 [ 14.384040] </TASK> [ 14.384054] [ 14.392470] Allocated by task 283: [ 14.392684] kasan_save_stack+0x45/0x70 [ 14.392906] kasan_save_track+0x18/0x40 [ 14.393089] kasan_save_alloc_info+0x3b/0x50 [ 14.393408] __kasan_kmalloc+0xb7/0xc0 [ 14.393596] __kmalloc_cache_noprof+0x189/0x420 [ 14.393856] kasan_atomics+0x95/0x310 [ 14.394041] kunit_try_run_case+0x1a5/0x480 [ 14.394287] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.394481] kthread+0x337/0x6f0 [ 14.394669] ret_from_fork+0x116/0x1d0 [ 14.394878] ret_from_fork_asm+0x1a/0x30 [ 14.395075] [ 14.395176] The buggy address belongs to the object at ffff8881031c4500 [ 14.395176] which belongs to the cache kmalloc-64 of size 64 [ 14.395743] The buggy address is located 0 bytes to the right of [ 14.395743] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.396357] [ 14.396471] The buggy address belongs to the physical page: [ 14.396741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.397073] flags: 0x200000000000000(node=0|zone=2) [ 14.397519] page_type: f5(slab) [ 14.397701] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.398063] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.398472] page dumped because: kasan: bad access detected [ 14.398762] [ 14.398839] Memory state around the buggy address: [ 14.399015] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.399410] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.399767] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.400083] ^ [ 14.400376] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.400721] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.401028] ================================================================== [ 15.009516] ================================================================== [ 15.009787] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 15.010488] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 15.011021] [ 15.011227] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.011270] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.011284] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.011307] Call Trace: [ 15.011323] <TASK> [ 15.011339] dump_stack_lvl+0x73/0xb0 [ 15.011368] print_report+0xd1/0x650 [ 15.011392] ? __virt_addr_valid+0x1db/0x2d0 [ 15.011415] ? kasan_atomics_helper+0x177f/0x5450 [ 15.011437] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.011472] ? kasan_atomics_helper+0x177f/0x5450 [ 15.011495] kasan_report+0x141/0x180 [ 15.011520] ? kasan_atomics_helper+0x177f/0x5450 [ 15.011547] kasan_check_range+0x10c/0x1c0 [ 15.011573] __kasan_check_write+0x18/0x20 [ 15.011594] kasan_atomics_helper+0x177f/0x5450 [ 15.011617] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.011641] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.011686] ? kasan_atomics+0x152/0x310 [ 15.011714] kasan_atomics+0x1dc/0x310 [ 15.011741] ? __pfx_kasan_atomics+0x10/0x10 [ 15.011768] ? __pfx_read_tsc+0x10/0x10 [ 15.011790] ? ktime_get_ts64+0x86/0x230 [ 15.011814] kunit_try_run_case+0x1a5/0x480 [ 15.011839] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.011882] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.011906] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.011931] ? __kthread_parkme+0x82/0x180 [ 15.011952] ? preempt_count_sub+0x50/0x80 [ 15.011976] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.012002] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.012025] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.012049] kthread+0x337/0x6f0 [ 15.012071] ? trace_preempt_on+0x20/0xc0 [ 15.012094] ? __pfx_kthread+0x10/0x10 [ 15.012116] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.012140] ? calculate_sigpending+0x7b/0xa0 [ 15.012164] ? __pfx_kthread+0x10/0x10 [ 15.012187] ret_from_fork+0x116/0x1d0 [ 15.012207] ? __pfx_kthread+0x10/0x10 [ 15.012229] ret_from_fork_asm+0x1a/0x30 [ 15.012261] </TASK> [ 15.012274] [ 15.022828] Allocated by task 283: [ 15.023003] kasan_save_stack+0x45/0x70 [ 15.023214] kasan_save_track+0x18/0x40 [ 15.023382] kasan_save_alloc_info+0x3b/0x50 [ 15.023607] __kasan_kmalloc+0xb7/0xc0 [ 15.024023] __kmalloc_cache_noprof+0x189/0x420 [ 15.024337] kasan_atomics+0x95/0x310 [ 15.024597] kunit_try_run_case+0x1a5/0x480 [ 15.024898] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.025157] kthread+0x337/0x6f0 [ 15.025438] ret_from_fork+0x116/0x1d0 [ 15.025637] ret_from_fork_asm+0x1a/0x30 [ 15.025965] [ 15.026067] The buggy address belongs to the object at ffff8881031c4500 [ 15.026067] which belongs to the cache kmalloc-64 of size 64 [ 15.026684] The buggy address is located 0 bytes to the right of [ 15.026684] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 15.027334] [ 15.027434] The buggy address belongs to the physical page: [ 15.027883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 15.028242] flags: 0x200000000000000(node=0|zone=2) [ 15.028480] page_type: f5(slab) [ 15.028636] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.029151] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.029511] page dumped because: kasan: bad access detected [ 15.029878] [ 15.029983] Memory state around the buggy address: [ 15.030294] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.030690] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.031049] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.031350] ^ [ 15.031583] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.032112] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.032499] ================================================================== [ 15.271104] ================================================================== [ 15.271538] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 15.271991] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 15.272342] [ 15.272498] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.272546] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.272571] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.272595] Call Trace: [ 15.272612] <TASK> [ 15.272657] dump_stack_lvl+0x73/0xb0 [ 15.272689] print_report+0xd1/0x650 [ 15.272737] ? __virt_addr_valid+0x1db/0x2d0 [ 15.272761] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.272811] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.272835] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.272897] kasan_report+0x141/0x180 [ 15.272921] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.272971] kasan_check_range+0x10c/0x1c0 [ 15.272997] __kasan_check_write+0x18/0x20 [ 15.273018] kasan_atomics_helper+0x1eaa/0x5450 [ 15.273054] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.273078] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.273115] ? kasan_atomics+0x152/0x310 [ 15.273144] kasan_atomics+0x1dc/0x310 [ 15.273168] ? __pfx_kasan_atomics+0x10/0x10 [ 15.273194] ? __pfx_read_tsc+0x10/0x10 [ 15.273217] ? ktime_get_ts64+0x86/0x230 [ 15.273242] kunit_try_run_case+0x1a5/0x480 [ 15.273267] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.273292] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.273317] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.273342] ? __kthread_parkme+0x82/0x180 [ 15.273386] ? preempt_count_sub+0x50/0x80 [ 15.273419] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.273444] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.273486] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.273510] kthread+0x337/0x6f0 [ 15.273533] ? trace_preempt_on+0x20/0xc0 [ 15.273581] ? __pfx_kthread+0x10/0x10 [ 15.273604] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.273649] ? calculate_sigpending+0x7b/0xa0 [ 15.273674] ? __pfx_kthread+0x10/0x10 [ 15.273722] ret_from_fork+0x116/0x1d0 [ 15.273756] ? __pfx_kthread+0x10/0x10 [ 15.273790] ret_from_fork_asm+0x1a/0x30 [ 15.273821] </TASK> [ 15.273836] [ 15.282033] Allocated by task 283: [ 15.282260] kasan_save_stack+0x45/0x70 [ 15.282493] kasan_save_track+0x18/0x40 [ 15.282686] kasan_save_alloc_info+0x3b/0x50 [ 15.282953] __kasan_kmalloc+0xb7/0xc0 [ 15.283205] __kmalloc_cache_noprof+0x189/0x420 [ 15.283459] kasan_atomics+0x95/0x310 [ 15.283646] kunit_try_run_case+0x1a5/0x480 [ 15.283890] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.284145] kthread+0x337/0x6f0 [ 15.284290] ret_from_fork+0x116/0x1d0 [ 15.284429] ret_from_fork_asm+0x1a/0x30 [ 15.284581] [ 15.284662] The buggy address belongs to the object at ffff8881031c4500 [ 15.284662] which belongs to the cache kmalloc-64 of size 64 [ 15.285192] The buggy address is located 0 bytes to the right of [ 15.285192] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 15.285728] [ 15.285806] The buggy address belongs to the physical page: [ 15.285983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 15.286401] flags: 0x200000000000000(node=0|zone=2) [ 15.286693] page_type: f5(slab) [ 15.286926] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.287358] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.287800] page dumped because: kasan: bad access detected [ 15.288032] [ 15.288106] Memory state around the buggy address: [ 15.288284] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.288695] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.289031] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.289391] ^ [ 15.289611] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.289972] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.290315] ================================================================== [ 14.361543] ================================================================== [ 14.361862] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 14.362313] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.362633] [ 14.362813] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.362857] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.362895] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.362919] Call Trace: [ 14.362935] <TASK> [ 14.362952] dump_stack_lvl+0x73/0xb0 [ 14.362983] print_report+0xd1/0x650 [ 14.363007] ? __virt_addr_valid+0x1db/0x2d0 [ 14.363030] ? kasan_atomics_helper+0x860/0x5450 [ 14.363073] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.363096] ? kasan_atomics_helper+0x860/0x5450 [ 14.363119] kasan_report+0x141/0x180 [ 14.363142] ? kasan_atomics_helper+0x860/0x5450 [ 14.363170] kasan_check_range+0x10c/0x1c0 [ 14.363258] __kasan_check_write+0x18/0x20 [ 14.363284] kasan_atomics_helper+0x860/0x5450 [ 14.363308] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.363332] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.363359] ? kasan_atomics+0x152/0x310 [ 14.363387] kasan_atomics+0x1dc/0x310 [ 14.363411] ? __pfx_kasan_atomics+0x10/0x10 [ 14.363475] ? __pfx_read_tsc+0x10/0x10 [ 14.363498] ? ktime_get_ts64+0x86/0x230 [ 14.363524] kunit_try_run_case+0x1a5/0x480 [ 14.363551] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.363574] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.363598] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.363624] ? __kthread_parkme+0x82/0x180 [ 14.363646] ? preempt_count_sub+0x50/0x80 [ 14.363670] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.363712] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.363736] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.363782] kthread+0x337/0x6f0 [ 14.363803] ? trace_preempt_on+0x20/0xc0 [ 14.363829] ? __pfx_kthread+0x10/0x10 [ 14.363851] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.363874] ? calculate_sigpending+0x7b/0xa0 [ 14.363899] ? __pfx_kthread+0x10/0x10 [ 14.363921] ret_from_fork+0x116/0x1d0 [ 14.363941] ? __pfx_kthread+0x10/0x10 [ 14.363963] ret_from_fork_asm+0x1a/0x30 [ 14.363995] </TASK> [ 14.364009] [ 14.372572] Allocated by task 283: [ 14.372756] kasan_save_stack+0x45/0x70 [ 14.372906] kasan_save_track+0x18/0x40 [ 14.373094] kasan_save_alloc_info+0x3b/0x50 [ 14.373550] __kasan_kmalloc+0xb7/0xc0 [ 14.373784] __kmalloc_cache_noprof+0x189/0x420 [ 14.374006] kasan_atomics+0x95/0x310 [ 14.374169] kunit_try_run_case+0x1a5/0x480 [ 14.374476] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.374690] kthread+0x337/0x6f0 [ 14.374863] ret_from_fork+0x116/0x1d0 [ 14.375056] ret_from_fork_asm+0x1a/0x30 [ 14.375299] [ 14.375378] The buggy address belongs to the object at ffff8881031c4500 [ 14.375378] which belongs to the cache kmalloc-64 of size 64 [ 14.375971] The buggy address is located 0 bytes to the right of [ 14.375971] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.376540] [ 14.376641] The buggy address belongs to the physical page: [ 14.376902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.377219] flags: 0x200000000000000(node=0|zone=2) [ 14.377462] page_type: f5(slab) [ 14.377632] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.378025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.378517] page dumped because: kasan: bad access detected [ 14.378852] [ 14.378971] Memory state around the buggy address: [ 14.379279] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.379608] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.379904] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.380298] ^ [ 14.380540] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.380864] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.381133] ================================================================== [ 14.660363] ================================================================== [ 14.660667] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 14.660972] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.661262] [ 14.661351] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.661400] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.661414] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.661437] Call Trace: [ 14.661469] <TASK> [ 14.661532] dump_stack_lvl+0x73/0xb0 [ 14.661566] print_report+0xd1/0x650 [ 14.661589] ? __virt_addr_valid+0x1db/0x2d0 [ 14.661613] ? kasan_atomics_helper+0x1079/0x5450 [ 14.661637] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.661662] ? kasan_atomics_helper+0x1079/0x5450 [ 14.661686] kasan_report+0x141/0x180 [ 14.661709] ? kasan_atomics_helper+0x1079/0x5450 [ 14.661737] kasan_check_range+0x10c/0x1c0 [ 14.661776] __kasan_check_write+0x18/0x20 [ 14.661797] kasan_atomics_helper+0x1079/0x5450 [ 14.661821] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.661845] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.661871] ? kasan_atomics+0x152/0x310 [ 14.661900] kasan_atomics+0x1dc/0x310 [ 14.661923] ? __pfx_kasan_atomics+0x10/0x10 [ 14.661949] ? __pfx_read_tsc+0x10/0x10 [ 14.661971] ? ktime_get_ts64+0x86/0x230 [ 14.661996] kunit_try_run_case+0x1a5/0x480 [ 14.662020] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.662044] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.662068] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.662093] ? __kthread_parkme+0x82/0x180 [ 14.662114] ? preempt_count_sub+0x50/0x80 [ 14.662138] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.662163] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.662187] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.662251] kthread+0x337/0x6f0 [ 14.662272] ? trace_preempt_on+0x20/0xc0 [ 14.662297] ? __pfx_kthread+0x10/0x10 [ 14.662319] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.662342] ? calculate_sigpending+0x7b/0xa0 [ 14.662366] ? __pfx_kthread+0x10/0x10 [ 14.662389] ret_from_fork+0x116/0x1d0 [ 14.662408] ? __pfx_kthread+0x10/0x10 [ 14.662430] ret_from_fork_asm+0x1a/0x30 [ 14.662473] </TASK> [ 14.662486] [ 14.670553] Allocated by task 283: [ 14.670796] kasan_save_stack+0x45/0x70 [ 14.670951] kasan_save_track+0x18/0x40 [ 14.671092] kasan_save_alloc_info+0x3b/0x50 [ 14.671525] __kasan_kmalloc+0xb7/0xc0 [ 14.671760] __kmalloc_cache_noprof+0x189/0x420 [ 14.671996] kasan_atomics+0x95/0x310 [ 14.672249] kunit_try_run_case+0x1a5/0x480 [ 14.672493] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.672767] kthread+0x337/0x6f0 [ 14.672894] ret_from_fork+0x116/0x1d0 [ 14.673069] ret_from_fork_asm+0x1a/0x30 [ 14.673320] [ 14.673430] The buggy address belongs to the object at ffff8881031c4500 [ 14.673430] which belongs to the cache kmalloc-64 of size 64 [ 14.673962] The buggy address is located 0 bytes to the right of [ 14.673962] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.674352] [ 14.674429] The buggy address belongs to the physical page: [ 14.674626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.675083] flags: 0x200000000000000(node=0|zone=2) [ 14.675520] page_type: f5(slab) [ 14.675707] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.675993] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.676465] page dumped because: kasan: bad access detected [ 14.676835] [ 14.676933] Memory state around the buggy address: [ 14.677160] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.677515] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.677740] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.678231] ^ [ 14.678479] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.678802] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.679044] ================================================================== [ 14.793659] ================================================================== [ 14.794007] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 14.794762] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.795066] [ 14.795181] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.795482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.795497] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.795520] Call Trace: [ 14.795538] <TASK> [ 14.795554] dump_stack_lvl+0x73/0xb0 [ 14.795585] print_report+0xd1/0x650 [ 14.795608] ? __virt_addr_valid+0x1db/0x2d0 [ 14.795632] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.795654] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.795679] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.795714] kasan_report+0x141/0x180 [ 14.795739] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.795766] kasan_check_range+0x10c/0x1c0 [ 14.795791] __kasan_check_write+0x18/0x20 [ 14.795811] kasan_atomics_helper+0x12e6/0x5450 [ 14.795836] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.795859] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.795885] ? kasan_atomics+0x152/0x310 [ 14.795913] kasan_atomics+0x1dc/0x310 [ 14.795936] ? __pfx_kasan_atomics+0x10/0x10 [ 14.795962] ? __pfx_read_tsc+0x10/0x10 [ 14.795984] ? ktime_get_ts64+0x86/0x230 [ 14.796008] kunit_try_run_case+0x1a5/0x480 [ 14.796033] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.796057] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.796081] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.796105] ? __kthread_parkme+0x82/0x180 [ 14.796126] ? preempt_count_sub+0x50/0x80 [ 14.796151] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.796175] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.796200] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.796224] kthread+0x337/0x6f0 [ 14.796245] ? trace_preempt_on+0x20/0xc0 [ 14.796269] ? __pfx_kthread+0x10/0x10 [ 14.796291] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.796313] ? calculate_sigpending+0x7b/0xa0 [ 14.796337] ? __pfx_kthread+0x10/0x10 [ 14.796360] ret_from_fork+0x116/0x1d0 [ 14.796378] ? __pfx_kthread+0x10/0x10 [ 14.796400] ret_from_fork_asm+0x1a/0x30 [ 14.796432] </TASK> [ 14.796444] [ 14.803790] Allocated by task 283: [ 14.803985] kasan_save_stack+0x45/0x70 [ 14.804185] kasan_save_track+0x18/0x40 [ 14.804583] kasan_save_alloc_info+0x3b/0x50 [ 14.804817] __kasan_kmalloc+0xb7/0xc0 [ 14.804954] __kmalloc_cache_noprof+0x189/0x420 [ 14.805113] kasan_atomics+0x95/0x310 [ 14.805250] kunit_try_run_case+0x1a5/0x480 [ 14.805405] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.805594] kthread+0x337/0x6f0 [ 14.805741] ret_from_fork+0x116/0x1d0 [ 14.805933] ret_from_fork_asm+0x1a/0x30 [ 14.806168] [ 14.806267] The buggy address belongs to the object at ffff8881031c4500 [ 14.806267] which belongs to the cache kmalloc-64 of size 64 [ 14.806860] The buggy address is located 0 bytes to the right of [ 14.806860] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.807228] [ 14.807305] The buggy address belongs to the physical page: [ 14.807488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.808223] flags: 0x200000000000000(node=0|zone=2) [ 14.808496] page_type: f5(slab) [ 14.808802] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.809429] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.811241] page dumped because: kasan: bad access detected [ 14.811894] [ 14.812339] Memory state around the buggy address: [ 14.813125] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.813863] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.814097] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.814318] ^ [ 14.814489] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.814857] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.815230] ================================================================== [ 14.401583] ================================================================== [ 14.401918] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 14.402519] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.402853] [ 14.402945] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.402992] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.403006] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.403029] Call Trace: [ 14.403046] <TASK> [ 14.403063] dump_stack_lvl+0x73/0xb0 [ 14.403093] print_report+0xd1/0x650 [ 14.403117] ? __virt_addr_valid+0x1db/0x2d0 [ 14.403141] ? kasan_atomics_helper+0x992/0x5450 [ 14.403209] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.403235] ? kasan_atomics_helper+0x992/0x5450 [ 14.403258] kasan_report+0x141/0x180 [ 14.403281] ? kasan_atomics_helper+0x992/0x5450 [ 14.403309] kasan_check_range+0x10c/0x1c0 [ 14.403334] __kasan_check_write+0x18/0x20 [ 14.403415] kasan_atomics_helper+0x992/0x5450 [ 14.403440] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.403475] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.403502] ? kasan_atomics+0x152/0x310 [ 14.403531] kasan_atomics+0x1dc/0x310 [ 14.403555] ? __pfx_kasan_atomics+0x10/0x10 [ 14.403581] ? __pfx_read_tsc+0x10/0x10 [ 14.403603] ? ktime_get_ts64+0x86/0x230 [ 14.403628] kunit_try_run_case+0x1a5/0x480 [ 14.403653] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.403695] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.403720] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.403744] ? __kthread_parkme+0x82/0x180 [ 14.403764] ? preempt_count_sub+0x50/0x80 [ 14.403813] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.403838] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.403862] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.403886] kthread+0x337/0x6f0 [ 14.403907] ? trace_preempt_on+0x20/0xc0 [ 14.403931] ? __pfx_kthread+0x10/0x10 [ 14.403953] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.403975] ? calculate_sigpending+0x7b/0xa0 [ 14.403999] ? __pfx_kthread+0x10/0x10 [ 14.404023] ret_from_fork+0x116/0x1d0 [ 14.404043] ? __pfx_kthread+0x10/0x10 [ 14.404065] ret_from_fork_asm+0x1a/0x30 [ 14.404098] </TASK> [ 14.404111] [ 14.412309] Allocated by task 283: [ 14.412460] kasan_save_stack+0x45/0x70 [ 14.412713] kasan_save_track+0x18/0x40 [ 14.412898] kasan_save_alloc_info+0x3b/0x50 [ 14.413095] __kasan_kmalloc+0xb7/0xc0 [ 14.413582] __kmalloc_cache_noprof+0x189/0x420 [ 14.413788] kasan_atomics+0x95/0x310 [ 14.413953] kunit_try_run_case+0x1a5/0x480 [ 14.414250] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.414543] kthread+0x337/0x6f0 [ 14.414709] ret_from_fork+0x116/0x1d0 [ 14.414843] ret_from_fork_asm+0x1a/0x30 [ 14.414989] [ 14.415089] The buggy address belongs to the object at ffff8881031c4500 [ 14.415089] which belongs to the cache kmalloc-64 of size 64 [ 14.415643] The buggy address is located 0 bytes to the right of [ 14.415643] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.416243] [ 14.416349] The buggy address belongs to the physical page: [ 14.416613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.416960] flags: 0x200000000000000(node=0|zone=2) [ 14.417131] page_type: f5(slab) [ 14.417353] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.417800] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.418144] page dumped because: kasan: bad access detected [ 14.418585] [ 14.418714] Memory state around the buggy address: [ 14.418964] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.419375] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.419692] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.420030] ^ [ 14.420321] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.420596] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.420950] ================================================================== [ 14.921062] ================================================================== [ 14.921782] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 14.922064] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.922396] [ 14.922499] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.922542] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.922557] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.922581] Call Trace: [ 14.922597] <TASK> [ 14.922615] dump_stack_lvl+0x73/0xb0 [ 14.922654] print_report+0xd1/0x650 [ 14.922683] ? __virt_addr_valid+0x1db/0x2d0 [ 14.922707] ? kasan_atomics_helper+0x151d/0x5450 [ 14.922729] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.922753] ? kasan_atomics_helper+0x151d/0x5450 [ 14.922776] kasan_report+0x141/0x180 [ 14.922811] ? kasan_atomics_helper+0x151d/0x5450 [ 14.922840] kasan_check_range+0x10c/0x1c0 [ 14.922878] __kasan_check_write+0x18/0x20 [ 14.922899] kasan_atomics_helper+0x151d/0x5450 [ 14.922924] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.922958] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.922985] ? kasan_atomics+0x152/0x310 [ 14.923013] kasan_atomics+0x1dc/0x310 [ 14.923038] ? __pfx_kasan_atomics+0x10/0x10 [ 14.923063] ? __pfx_read_tsc+0x10/0x10 [ 14.923084] ? ktime_get_ts64+0x86/0x230 [ 14.923109] kunit_try_run_case+0x1a5/0x480 [ 14.923133] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.923157] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.923181] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.923206] ? __kthread_parkme+0x82/0x180 [ 14.923227] ? preempt_count_sub+0x50/0x80 [ 14.923251] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.923276] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.923301] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.923325] kthread+0x337/0x6f0 [ 14.923346] ? trace_preempt_on+0x20/0xc0 [ 14.923371] ? __pfx_kthread+0x10/0x10 [ 14.923394] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.923418] ? calculate_sigpending+0x7b/0xa0 [ 14.923462] ? __pfx_kthread+0x10/0x10 [ 14.923485] ret_from_fork+0x116/0x1d0 [ 14.923505] ? __pfx_kthread+0x10/0x10 [ 14.923537] ret_from_fork_asm+0x1a/0x30 [ 14.923569] </TASK> [ 14.923582] [ 14.933502] Allocated by task 283: [ 14.933696] kasan_save_stack+0x45/0x70 [ 14.934022] kasan_save_track+0x18/0x40 [ 14.934313] kasan_save_alloc_info+0x3b/0x50 [ 14.934501] __kasan_kmalloc+0xb7/0xc0 [ 14.934856] __kmalloc_cache_noprof+0x189/0x420 [ 14.935083] kasan_atomics+0x95/0x310 [ 14.935363] kunit_try_run_case+0x1a5/0x480 [ 14.935560] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.935961] kthread+0x337/0x6f0 [ 14.936250] ret_from_fork+0x116/0x1d0 [ 14.936397] ret_from_fork_asm+0x1a/0x30 [ 14.936760] [ 14.936867] The buggy address belongs to the object at ffff8881031c4500 [ 14.936867] which belongs to the cache kmalloc-64 of size 64 [ 14.937370] The buggy address is located 0 bytes to the right of [ 14.937370] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.938235] [ 14.938336] The buggy address belongs to the physical page: [ 14.938529] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.939040] flags: 0x200000000000000(node=0|zone=2) [ 14.939355] page_type: f5(slab) [ 14.939514] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.939976] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.940394] page dumped because: kasan: bad access detected [ 14.940657] [ 14.940933] Memory state around the buggy address: [ 14.941132] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.941664] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.942378] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.943152] ^ [ 14.943660] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.944330] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.945008] ================================================================== [ 14.970687] ================================================================== [ 14.971057] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 14.971613] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.972038] [ 14.972157] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.972266] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.972284] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.972370] Call Trace: [ 14.972387] <TASK> [ 14.972476] dump_stack_lvl+0x73/0xb0 [ 14.972549] print_report+0xd1/0x650 [ 14.972629] ? __virt_addr_valid+0x1db/0x2d0 [ 14.972654] ? kasan_atomics_helper+0x164f/0x5450 [ 14.972697] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.972721] ? kasan_atomics_helper+0x164f/0x5450 [ 14.972744] kasan_report+0x141/0x180 [ 14.972768] ? kasan_atomics_helper+0x164f/0x5450 [ 14.972795] kasan_check_range+0x10c/0x1c0 [ 14.972821] __kasan_check_write+0x18/0x20 [ 14.972841] kasan_atomics_helper+0x164f/0x5450 [ 14.972865] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.972888] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.972914] ? kasan_atomics+0x152/0x310 [ 14.972943] kasan_atomics+0x1dc/0x310 [ 14.972967] ? __pfx_kasan_atomics+0x10/0x10 [ 14.972993] ? __pfx_read_tsc+0x10/0x10 [ 14.973015] ? ktime_get_ts64+0x86/0x230 [ 14.973040] kunit_try_run_case+0x1a5/0x480 [ 14.973066] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.973090] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.973115] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.973140] ? __kthread_parkme+0x82/0x180 [ 14.973161] ? preempt_count_sub+0x50/0x80 [ 14.973187] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.973212] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.973236] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.973261] kthread+0x337/0x6f0 [ 14.973283] ? trace_preempt_on+0x20/0xc0 [ 14.973309] ? __pfx_kthread+0x10/0x10 [ 14.973331] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.973354] ? calculate_sigpending+0x7b/0xa0 [ 14.973385] ? __pfx_kthread+0x10/0x10 [ 14.973408] ret_from_fork+0x116/0x1d0 [ 14.973428] ? __pfx_kthread+0x10/0x10 [ 14.973450] ret_from_fork_asm+0x1a/0x30 [ 14.973495] </TASK> [ 14.973508] [ 14.984121] Allocated by task 283: [ 14.984327] kasan_save_stack+0x45/0x70 [ 14.984545] kasan_save_track+0x18/0x40 [ 14.984733] kasan_save_alloc_info+0x3b/0x50 [ 14.984886] __kasan_kmalloc+0xb7/0xc0 [ 14.985096] __kmalloc_cache_noprof+0x189/0x420 [ 14.985342] kasan_atomics+0x95/0x310 [ 14.985535] kunit_try_run_case+0x1a5/0x480 [ 14.985764] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.985947] kthread+0x337/0x6f0 [ 14.986121] ret_from_fork+0x116/0x1d0 [ 14.986310] ret_from_fork_asm+0x1a/0x30 [ 14.986538] [ 14.986637] The buggy address belongs to the object at ffff8881031c4500 [ 14.986637] which belongs to the cache kmalloc-64 of size 64 [ 14.987114] The buggy address is located 0 bytes to the right of [ 14.987114] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.987692] [ 14.987795] The buggy address belongs to the physical page: [ 14.988021] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.988339] flags: 0x200000000000000(node=0|zone=2) [ 14.988570] page_type: f5(slab) [ 14.988754] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.989071] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.989328] page dumped because: kasan: bad access detected [ 14.989524] [ 14.989598] Memory state around the buggy address: [ 14.989783] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.990111] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.990441] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.990797] ^ [ 14.991031] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.991288] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.991593] ================================================================== [ 15.209351] ================================================================== [ 15.209781] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 15.210175] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 15.210543] [ 15.210710] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.210756] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.210769] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.210792] Call Trace: [ 15.210837] <TASK> [ 15.210854] dump_stack_lvl+0x73/0xb0 [ 15.210913] print_report+0xd1/0x650 [ 15.210938] ? __virt_addr_valid+0x1db/0x2d0 [ 15.210962] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.210984] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.211007] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.211030] kasan_report+0x141/0x180 [ 15.211054] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.211107] kasan_check_range+0x10c/0x1c0 [ 15.211133] __kasan_check_write+0x18/0x20 [ 15.211171] kasan_atomics_helper+0x1ce1/0x5450 [ 15.211207] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.211230] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.211257] ? kasan_atomics+0x152/0x310 [ 15.211285] kasan_atomics+0x1dc/0x310 [ 15.211310] ? __pfx_kasan_atomics+0x10/0x10 [ 15.211335] ? __pfx_read_tsc+0x10/0x10 [ 15.211357] ? ktime_get_ts64+0x86/0x230 [ 15.211382] kunit_try_run_case+0x1a5/0x480 [ 15.211407] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.211430] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.211492] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.211516] ? __kthread_parkme+0x82/0x180 [ 15.211537] ? preempt_count_sub+0x50/0x80 [ 15.211571] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.211595] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.211646] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.211671] kthread+0x337/0x6f0 [ 15.211703] ? trace_preempt_on+0x20/0xc0 [ 15.211766] ? __pfx_kthread+0x10/0x10 [ 15.211788] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.211810] ? calculate_sigpending+0x7b/0xa0 [ 15.211845] ? __pfx_kthread+0x10/0x10 [ 15.211868] ret_from_fork+0x116/0x1d0 [ 15.211887] ? __pfx_kthread+0x10/0x10 [ 15.211924] ret_from_fork_asm+0x1a/0x30 [ 15.211956] </TASK> [ 15.211969] [ 15.220178] Allocated by task 283: [ 15.220316] kasan_save_stack+0x45/0x70 [ 15.220467] kasan_save_track+0x18/0x40 [ 15.220689] kasan_save_alloc_info+0x3b/0x50 [ 15.220953] __kasan_kmalloc+0xb7/0xc0 [ 15.221188] __kmalloc_cache_noprof+0x189/0x420 [ 15.221432] kasan_atomics+0x95/0x310 [ 15.221594] kunit_try_run_case+0x1a5/0x480 [ 15.221846] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.222119] kthread+0x337/0x6f0 [ 15.222345] ret_from_fork+0x116/0x1d0 [ 15.222556] ret_from_fork_asm+0x1a/0x30 [ 15.222772] [ 15.222906] The buggy address belongs to the object at ffff8881031c4500 [ 15.222906] which belongs to the cache kmalloc-64 of size 64 [ 15.223620] The buggy address is located 0 bytes to the right of [ 15.223620] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 15.224170] [ 15.224291] The buggy address belongs to the physical page: [ 15.224616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 15.225035] flags: 0x200000000000000(node=0|zone=2) [ 15.225336] page_type: f5(slab) [ 15.225511] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.225926] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.226287] page dumped because: kasan: bad access detected [ 15.226571] [ 15.226682] Memory state around the buggy address: [ 15.226979] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.227311] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.227648] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.227994] ^ [ 15.228253] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.228607] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.228965] ================================================================== [ 14.508103] ================================================================== [ 14.508662] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 14.509019] Read of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.509532] [ 14.509640] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.509684] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.509699] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.509721] Call Trace: [ 14.509738] <TASK> [ 14.509754] dump_stack_lvl+0x73/0xb0 [ 14.509784] print_report+0xd1/0x650 [ 14.509818] ? __virt_addr_valid+0x1db/0x2d0 [ 14.509842] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.509864] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.509888] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.509911] kasan_report+0x141/0x180 [ 14.509935] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.509963] __asan_report_load4_noabort+0x18/0x20 [ 14.509989] kasan_atomics_helper+0x4a84/0x5450 [ 14.510013] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.510036] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.510063] ? kasan_atomics+0x152/0x310 [ 14.510091] kasan_atomics+0x1dc/0x310 [ 14.510114] ? __pfx_kasan_atomics+0x10/0x10 [ 14.510140] ? __pfx_read_tsc+0x10/0x10 [ 14.510162] ? ktime_get_ts64+0x86/0x230 [ 14.510186] kunit_try_run_case+0x1a5/0x480 [ 14.510211] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.510235] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.510259] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.510284] ? __kthread_parkme+0x82/0x180 [ 14.510304] ? preempt_count_sub+0x50/0x80 [ 14.510329] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.510353] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.510378] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.510402] kthread+0x337/0x6f0 [ 14.510423] ? trace_preempt_on+0x20/0xc0 [ 14.510448] ? __pfx_kthread+0x10/0x10 [ 14.510481] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.510504] ? calculate_sigpending+0x7b/0xa0 [ 14.510528] ? __pfx_kthread+0x10/0x10 [ 14.510551] ret_from_fork+0x116/0x1d0 [ 14.510570] ? __pfx_kthread+0x10/0x10 [ 14.510592] ret_from_fork_asm+0x1a/0x30 [ 14.510623] </TASK> [ 14.510636] [ 14.518840] Allocated by task 283: [ 14.519016] kasan_save_stack+0x45/0x70 [ 14.519233] kasan_save_track+0x18/0x40 [ 14.519387] kasan_save_alloc_info+0x3b/0x50 [ 14.519597] __kasan_kmalloc+0xb7/0xc0 [ 14.519811] __kmalloc_cache_noprof+0x189/0x420 [ 14.520015] kasan_atomics+0x95/0x310 [ 14.520208] kunit_try_run_case+0x1a5/0x480 [ 14.520614] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.520859] kthread+0x337/0x6f0 [ 14.521036] ret_from_fork+0x116/0x1d0 [ 14.521279] ret_from_fork_asm+0x1a/0x30 [ 14.521478] [ 14.521564] The buggy address belongs to the object at ffff8881031c4500 [ 14.521564] which belongs to the cache kmalloc-64 of size 64 [ 14.522070] The buggy address is located 0 bytes to the right of [ 14.522070] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.522610] [ 14.522721] The buggy address belongs to the physical page: [ 14.522936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.523180] flags: 0x200000000000000(node=0|zone=2) [ 14.523345] page_type: f5(slab) [ 14.523478] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.524051] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.524387] page dumped because: kasan: bad access detected [ 14.524663] [ 14.524760] Memory state around the buggy address: [ 14.524984] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.525239] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.525474] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.526835] ^ [ 14.527055] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.527356] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.527657] ================================================================== [ 14.300713] ================================================================== [ 14.301032] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 14.301817] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.302138] [ 14.302319] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.302369] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.302384] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.302410] Call Trace: [ 14.302427] <TASK> [ 14.302445] dump_stack_lvl+0x73/0xb0 [ 14.302489] print_report+0xd1/0x650 [ 14.302512] ? __virt_addr_valid+0x1db/0x2d0 [ 14.302537] ? kasan_atomics_helper+0x72f/0x5450 [ 14.302559] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.302583] ? kasan_atomics_helper+0x72f/0x5450 [ 14.302606] kasan_report+0x141/0x180 [ 14.302629] ? kasan_atomics_helper+0x72f/0x5450 [ 14.302657] kasan_check_range+0x10c/0x1c0 [ 14.302682] __kasan_check_write+0x18/0x20 [ 14.302703] kasan_atomics_helper+0x72f/0x5450 [ 14.302727] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.302751] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.302778] ? kasan_atomics+0x152/0x310 [ 14.302806] kasan_atomics+0x1dc/0x310 [ 14.302830] ? __pfx_kasan_atomics+0x10/0x10 [ 14.302857] ? __pfx_read_tsc+0x10/0x10 [ 14.302878] ? ktime_get_ts64+0x86/0x230 [ 14.302903] kunit_try_run_case+0x1a5/0x480 [ 14.302928] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.302952] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.302977] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.303001] ? __kthread_parkme+0x82/0x180 [ 14.303022] ? preempt_count_sub+0x50/0x80 [ 14.303047] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.303073] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.303096] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.303120] kthread+0x337/0x6f0 [ 14.303141] ? trace_preempt_on+0x20/0xc0 [ 14.303165] ? __pfx_kthread+0x10/0x10 [ 14.303538] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.303576] ? calculate_sigpending+0x7b/0xa0 [ 14.303604] ? __pfx_kthread+0x10/0x10 [ 14.303628] ret_from_fork+0x116/0x1d0 [ 14.303650] ? __pfx_kthread+0x10/0x10 [ 14.303674] ret_from_fork_asm+0x1a/0x30 [ 14.303746] </TASK> [ 14.303760] [ 14.316976] Allocated by task 283: [ 14.317145] kasan_save_stack+0x45/0x70 [ 14.317402] kasan_save_track+0x18/0x40 [ 14.317609] kasan_save_alloc_info+0x3b/0x50 [ 14.318225] __kasan_kmalloc+0xb7/0xc0 [ 14.318550] __kmalloc_cache_noprof+0x189/0x420 [ 14.318971] kasan_atomics+0x95/0x310 [ 14.319289] kunit_try_run_case+0x1a5/0x480 [ 14.319812] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.320074] kthread+0x337/0x6f0 [ 14.320446] ret_from_fork+0x116/0x1d0 [ 14.320658] ret_from_fork_asm+0x1a/0x30 [ 14.321011] [ 14.321111] The buggy address belongs to the object at ffff8881031c4500 [ 14.321111] which belongs to the cache kmalloc-64 of size 64 [ 14.322125] The buggy address is located 0 bytes to the right of [ 14.322125] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.323421] [ 14.323550] The buggy address belongs to the physical page: [ 14.324093] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.324822] flags: 0x200000000000000(node=0|zone=2) [ 14.325058] page_type: f5(slab) [ 14.325270] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.325607] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.326676] page dumped because: kasan: bad access detected [ 14.327016] [ 14.327313] Memory state around the buggy address: [ 14.327804] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.328137] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.328491] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.329142] ^ [ 14.329623] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.330128] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.330568] ================================================================== [ 14.465309] ================================================================== [ 14.465805] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 14.466078] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.466603] [ 14.466823] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.466871] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.466885] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.466908] Call Trace: [ 14.466926] <TASK> [ 14.466943] dump_stack_lvl+0x73/0xb0 [ 14.466977] print_report+0xd1/0x650 [ 14.467004] ? __virt_addr_valid+0x1db/0x2d0 [ 14.467027] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.467050] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.467073] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.467097] kasan_report+0x141/0x180 [ 14.467120] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.467146] kasan_check_range+0x10c/0x1c0 [ 14.467171] __kasan_check_write+0x18/0x20 [ 14.467191] kasan_atomics_helper+0xb6a/0x5450 [ 14.467215] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.467238] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.467265] ? kasan_atomics+0x152/0x310 [ 14.467292] kasan_atomics+0x1dc/0x310 [ 14.467328] ? __pfx_kasan_atomics+0x10/0x10 [ 14.467354] ? __pfx_read_tsc+0x10/0x10 [ 14.467375] ? ktime_get_ts64+0x86/0x230 [ 14.467400] kunit_try_run_case+0x1a5/0x480 [ 14.467425] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.467447] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.467484] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.467509] ? __kthread_parkme+0x82/0x180 [ 14.467530] ? preempt_count_sub+0x50/0x80 [ 14.467554] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.467579] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.467603] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.467628] kthread+0x337/0x6f0 [ 14.467649] ? trace_preempt_on+0x20/0xc0 [ 14.467673] ? __pfx_kthread+0x10/0x10 [ 14.467737] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.467760] ? calculate_sigpending+0x7b/0xa0 [ 14.467784] ? __pfx_kthread+0x10/0x10 [ 14.467807] ret_from_fork+0x116/0x1d0 [ 14.467827] ? __pfx_kthread+0x10/0x10 [ 14.467848] ret_from_fork_asm+0x1a/0x30 [ 14.467879] </TASK> [ 14.467892] [ 14.478877] Allocated by task 283: [ 14.479015] kasan_save_stack+0x45/0x70 [ 14.479354] kasan_save_track+0x18/0x40 [ 14.479565] kasan_save_alloc_info+0x3b/0x50 [ 14.479847] __kasan_kmalloc+0xb7/0xc0 [ 14.479985] __kmalloc_cache_noprof+0x189/0x420 [ 14.480145] kasan_atomics+0x95/0x310 [ 14.480285] kunit_try_run_case+0x1a5/0x480 [ 14.480586] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.481042] kthread+0x337/0x6f0 [ 14.481220] ret_from_fork+0x116/0x1d0 [ 14.481521] ret_from_fork_asm+0x1a/0x30 [ 14.481911] [ 14.482014] The buggy address belongs to the object at ffff8881031c4500 [ 14.482014] which belongs to the cache kmalloc-64 of size 64 [ 14.482500] The buggy address is located 0 bytes to the right of [ 14.482500] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.483190] [ 14.483269] The buggy address belongs to the physical page: [ 14.483446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.484046] flags: 0x200000000000000(node=0|zone=2) [ 14.484256] page_type: f5(slab) [ 14.484381] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.484771] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.485117] page dumped because: kasan: bad access detected [ 14.485372] [ 14.485484] Memory state around the buggy address: [ 14.485739] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.485965] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.486522] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.486824] ^ [ 14.486986] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.487205] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.487887] ================================================================== [ 14.566025] ================================================================== [ 14.566417] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 14.566733] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.567010] [ 14.567125] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.567169] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.567241] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.567267] Call Trace: [ 14.567283] <TASK> [ 14.567299] dump_stack_lvl+0x73/0xb0 [ 14.567328] print_report+0xd1/0x650 [ 14.567352] ? __virt_addr_valid+0x1db/0x2d0 [ 14.567375] ? kasan_atomics_helper+0xe78/0x5450 [ 14.567397] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.567421] ? kasan_atomics_helper+0xe78/0x5450 [ 14.567443] kasan_report+0x141/0x180 [ 14.567477] ? kasan_atomics_helper+0xe78/0x5450 [ 14.567505] kasan_check_range+0x10c/0x1c0 [ 14.567529] __kasan_check_write+0x18/0x20 [ 14.567549] kasan_atomics_helper+0xe78/0x5450 [ 14.567574] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.567598] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.567624] ? kasan_atomics+0x152/0x310 [ 14.567653] kasan_atomics+0x1dc/0x310 [ 14.567677] ? __pfx_kasan_atomics+0x10/0x10 [ 14.567720] ? __pfx_read_tsc+0x10/0x10 [ 14.567743] ? ktime_get_ts64+0x86/0x230 [ 14.567768] kunit_try_run_case+0x1a5/0x480 [ 14.567794] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.567818] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.567842] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.567867] ? __kthread_parkme+0x82/0x180 [ 14.567888] ? preempt_count_sub+0x50/0x80 [ 14.567913] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.567938] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.567962] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.567986] kthread+0x337/0x6f0 [ 14.568007] ? trace_preempt_on+0x20/0xc0 [ 14.568031] ? __pfx_kthread+0x10/0x10 [ 14.568053] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.568076] ? calculate_sigpending+0x7b/0xa0 [ 14.568102] ? __pfx_kthread+0x10/0x10 [ 14.568125] ret_from_fork+0x116/0x1d0 [ 14.568144] ? __pfx_kthread+0x10/0x10 [ 14.568167] ret_from_fork_asm+0x1a/0x30 [ 14.568254] </TASK> [ 14.568269] [ 14.576011] Allocated by task 283: [ 14.576176] kasan_save_stack+0x45/0x70 [ 14.576368] kasan_save_track+0x18/0x40 [ 14.576536] kasan_save_alloc_info+0x3b/0x50 [ 14.576742] __kasan_kmalloc+0xb7/0xc0 [ 14.576890] __kmalloc_cache_noprof+0x189/0x420 [ 14.577115] kasan_atomics+0x95/0x310 [ 14.577289] kunit_try_run_case+0x1a5/0x480 [ 14.577563] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.577776] kthread+0x337/0x6f0 [ 14.577907] ret_from_fork+0x116/0x1d0 [ 14.578044] ret_from_fork_asm+0x1a/0x30 [ 14.578486] [ 14.578606] The buggy address belongs to the object at ffff8881031c4500 [ 14.578606] which belongs to the cache kmalloc-64 of size 64 [ 14.579163] The buggy address is located 0 bytes to the right of [ 14.579163] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.579818] [ 14.579918] The buggy address belongs to the physical page: [ 14.580229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.580568] flags: 0x200000000000000(node=0|zone=2) [ 14.580814] page_type: f5(slab) [ 14.580964] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.581259] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.581514] page dumped because: kasan: bad access detected [ 14.581776] [ 14.581875] Memory state around the buggy address: [ 14.582105] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.582432] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.582755] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.583024] ^ [ 14.583181] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.583414] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.583751] ================================================================== [ 14.205698] ================================================================== [ 14.206099] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 14.206506] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.206868] [ 14.207009] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.207054] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.207068] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.207091] Call Trace: [ 14.207107] <TASK> [ 14.207123] dump_stack_lvl+0x73/0xb0 [ 14.207152] print_report+0xd1/0x650 [ 14.207251] ? __virt_addr_valid+0x1db/0x2d0 [ 14.207299] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.207323] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.207348] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.207371] kasan_report+0x141/0x180 [ 14.207396] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.207424] __asan_report_store4_noabort+0x1b/0x30 [ 14.207446] kasan_atomics_helper+0x4b3a/0x5450 [ 14.207480] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.207504] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.207530] ? kasan_atomics+0x152/0x310 [ 14.207558] kasan_atomics+0x1dc/0x310 [ 14.207583] ? __pfx_kasan_atomics+0x10/0x10 [ 14.207609] ? __pfx_read_tsc+0x10/0x10 [ 14.207630] ? ktime_get_ts64+0x86/0x230 [ 14.207654] kunit_try_run_case+0x1a5/0x480 [ 14.207698] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.207721] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.207764] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.207788] ? __kthread_parkme+0x82/0x180 [ 14.207825] ? preempt_count_sub+0x50/0x80 [ 14.207862] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.207901] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.207925] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.207950] kthread+0x337/0x6f0 [ 14.207988] ? trace_preempt_on+0x20/0xc0 [ 14.208027] ? __pfx_kthread+0x10/0x10 [ 14.208049] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.208072] ? calculate_sigpending+0x7b/0xa0 [ 14.208096] ? __pfx_kthread+0x10/0x10 [ 14.208119] ret_from_fork+0x116/0x1d0 [ 14.208139] ? __pfx_kthread+0x10/0x10 [ 14.208162] ret_from_fork_asm+0x1a/0x30 [ 14.208250] </TASK> [ 14.208265] [ 14.216908] Allocated by task 283: [ 14.217047] kasan_save_stack+0x45/0x70 [ 14.217265] kasan_save_track+0x18/0x40 [ 14.217487] kasan_save_alloc_info+0x3b/0x50 [ 14.217750] __kasan_kmalloc+0xb7/0xc0 [ 14.217949] __kmalloc_cache_noprof+0x189/0x420 [ 14.218183] kasan_atomics+0x95/0x310 [ 14.218356] kunit_try_run_case+0x1a5/0x480 [ 14.218537] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.218799] kthread+0x337/0x6f0 [ 14.218960] ret_from_fork+0x116/0x1d0 [ 14.219144] ret_from_fork_asm+0x1a/0x30 [ 14.219307] [ 14.219410] The buggy address belongs to the object at ffff8881031c4500 [ 14.219410] which belongs to the cache kmalloc-64 of size 64 [ 14.219979] The buggy address is located 0 bytes to the right of [ 14.219979] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.220432] [ 14.220570] The buggy address belongs to the physical page: [ 14.220888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.221533] flags: 0x200000000000000(node=0|zone=2) [ 14.221837] page_type: f5(slab) [ 14.222007] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.222419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.222759] page dumped because: kasan: bad access detected [ 14.222941] [ 14.223038] Memory state around the buggy address: [ 14.223379] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.223743] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.224074] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.224473] ^ [ 14.224671] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.225032] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.225402] ================================================================== [ 14.717492] ================================================================== [ 14.717736] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 14.718218] Read of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.718569] [ 14.718686] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.718734] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.718747] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.718770] Call Trace: [ 14.718788] <TASK> [ 14.718804] dump_stack_lvl+0x73/0xb0 [ 14.718833] print_report+0xd1/0x650 [ 14.718857] ? __virt_addr_valid+0x1db/0x2d0 [ 14.718880] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.718901] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.718925] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.718948] kasan_report+0x141/0x180 [ 14.719027] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.719057] __asan_report_load4_noabort+0x18/0x20 [ 14.719084] kasan_atomics_helper+0x4a02/0x5450 [ 14.719108] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.719133] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.719160] ? kasan_atomics+0x152/0x310 [ 14.719189] kasan_atomics+0x1dc/0x310 [ 14.719212] ? __pfx_kasan_atomics+0x10/0x10 [ 14.719238] ? __pfx_read_tsc+0x10/0x10 [ 14.719259] ? ktime_get_ts64+0x86/0x230 [ 14.719283] kunit_try_run_case+0x1a5/0x480 [ 14.719308] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.719332] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.719355] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.719379] ? __kthread_parkme+0x82/0x180 [ 14.719400] ? preempt_count_sub+0x50/0x80 [ 14.719425] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.719449] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.719485] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.719509] kthread+0x337/0x6f0 [ 14.719529] ? trace_preempt_on+0x20/0xc0 [ 14.719583] ? __pfx_kthread+0x10/0x10 [ 14.719607] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.719628] ? calculate_sigpending+0x7b/0xa0 [ 14.719654] ? __pfx_kthread+0x10/0x10 [ 14.719676] ret_from_fork+0x116/0x1d0 [ 14.719696] ? __pfx_kthread+0x10/0x10 [ 14.719719] ret_from_fork_asm+0x1a/0x30 [ 14.719752] </TASK> [ 14.719765] [ 14.733872] Allocated by task 283: [ 14.734021] kasan_save_stack+0x45/0x70 [ 14.734656] kasan_save_track+0x18/0x40 [ 14.735187] kasan_save_alloc_info+0x3b/0x50 [ 14.735824] __kasan_kmalloc+0xb7/0xc0 [ 14.736176] __kmalloc_cache_noprof+0x189/0x420 [ 14.736669] kasan_atomics+0x95/0x310 [ 14.736819] kunit_try_run_case+0x1a5/0x480 [ 14.736976] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.737160] kthread+0x337/0x6f0 [ 14.737797] ret_from_fork+0x116/0x1d0 [ 14.738426] ret_from_fork_asm+0x1a/0x30 [ 14.739042] [ 14.739373] The buggy address belongs to the object at ffff8881031c4500 [ 14.739373] which belongs to the cache kmalloc-64 of size 64 [ 14.740938] The buggy address is located 0 bytes to the right of [ 14.740938] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.742003] [ 14.742092] The buggy address belongs to the physical page: [ 14.742307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.743550] flags: 0x200000000000000(node=0|zone=2) [ 14.744248] page_type: f5(slab) [ 14.744789] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.745105] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.745340] page dumped because: kasan: bad access detected [ 14.745535] [ 14.745619] Memory state around the buggy address: [ 14.746084] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.747113] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.747833] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.748615] ^ [ 14.749216] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.750040] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.750855] ================================================================== [ 14.584546] ================================================================== [ 14.584923] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 14.585314] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.585656] [ 14.585793] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.585838] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.585852] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.585875] Call Trace: [ 14.585891] <TASK> [ 14.585908] dump_stack_lvl+0x73/0xb0 [ 14.585938] print_report+0xd1/0x650 [ 14.585962] ? __virt_addr_valid+0x1db/0x2d0 [ 14.585985] ? kasan_atomics_helper+0xf10/0x5450 [ 14.586007] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.586030] ? kasan_atomics_helper+0xf10/0x5450 [ 14.586053] kasan_report+0x141/0x180 [ 14.586077] ? kasan_atomics_helper+0xf10/0x5450 [ 14.586104] kasan_check_range+0x10c/0x1c0 [ 14.586129] __kasan_check_write+0x18/0x20 [ 14.586149] kasan_atomics_helper+0xf10/0x5450 [ 14.586173] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.586263] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.586289] ? kasan_atomics+0x152/0x310 [ 14.586317] kasan_atomics+0x1dc/0x310 [ 14.586342] ? __pfx_kasan_atomics+0x10/0x10 [ 14.586367] ? __pfx_read_tsc+0x10/0x10 [ 14.586388] ? ktime_get_ts64+0x86/0x230 [ 14.586413] kunit_try_run_case+0x1a5/0x480 [ 14.586439] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.586472] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.586496] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.586521] ? __kthread_parkme+0x82/0x180 [ 14.586543] ? preempt_count_sub+0x50/0x80 [ 14.586568] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.586594] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.586618] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.586644] kthread+0x337/0x6f0 [ 14.586664] ? trace_preempt_on+0x20/0xc0 [ 14.586689] ? __pfx_kthread+0x10/0x10 [ 14.586730] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.586753] ? calculate_sigpending+0x7b/0xa0 [ 14.586778] ? __pfx_kthread+0x10/0x10 [ 14.586800] ret_from_fork+0x116/0x1d0 [ 14.586821] ? __pfx_kthread+0x10/0x10 [ 14.586843] ret_from_fork_asm+0x1a/0x30 [ 14.586876] </TASK> [ 14.586888] [ 14.594768] Allocated by task 283: [ 14.594956] kasan_save_stack+0x45/0x70 [ 14.595161] kasan_save_track+0x18/0x40 [ 14.595554] kasan_save_alloc_info+0x3b/0x50 [ 14.595780] __kasan_kmalloc+0xb7/0xc0 [ 14.595963] __kmalloc_cache_noprof+0x189/0x420 [ 14.596166] kasan_atomics+0x95/0x310 [ 14.596437] kunit_try_run_case+0x1a5/0x480 [ 14.596621] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.596876] kthread+0x337/0x6f0 [ 14.597047] ret_from_fork+0x116/0x1d0 [ 14.597271] ret_from_fork_asm+0x1a/0x30 [ 14.597493] [ 14.597586] The buggy address belongs to the object at ffff8881031c4500 [ 14.597586] which belongs to the cache kmalloc-64 of size 64 [ 14.598041] The buggy address is located 0 bytes to the right of [ 14.598041] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.598617] [ 14.598716] The buggy address belongs to the physical page: [ 14.598894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.599141] flags: 0x200000000000000(node=0|zone=2) [ 14.599429] page_type: f5(slab) [ 14.599611] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.599977] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.602748] page dumped because: kasan: bad access detected [ 14.603499] [ 14.604059] Memory state around the buggy address: [ 14.605024] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.606260] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.607546] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.607914] ^ [ 14.608191] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.608702] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.608964] ================================================================== [ 14.679552] ================================================================== [ 14.680110] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 14.680535] Read of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.680767] [ 14.680854] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.680896] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.680910] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.680932] Call Trace: [ 14.680948] <TASK> [ 14.680965] dump_stack_lvl+0x73/0xb0 [ 14.680993] print_report+0xd1/0x650 [ 14.681016] ? __virt_addr_valid+0x1db/0x2d0 [ 14.681039] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.681061] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.681084] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.681107] kasan_report+0x141/0x180 [ 14.681130] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.681158] __asan_report_load4_noabort+0x18/0x20 [ 14.681184] kasan_atomics_helper+0x4a1c/0x5450 [ 14.681208] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.681230] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.681257] ? kasan_atomics+0x152/0x310 [ 14.681285] kasan_atomics+0x1dc/0x310 [ 14.681308] ? __pfx_kasan_atomics+0x10/0x10 [ 14.681334] ? __pfx_read_tsc+0x10/0x10 [ 14.681356] ? ktime_get_ts64+0x86/0x230 [ 14.681386] kunit_try_run_case+0x1a5/0x480 [ 14.681411] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.681435] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.681468] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.681492] ? __kthread_parkme+0x82/0x180 [ 14.681513] ? preempt_count_sub+0x50/0x80 [ 14.681538] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.681562] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.681586] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.681611] kthread+0x337/0x6f0 [ 14.681632] ? trace_preempt_on+0x20/0xc0 [ 14.681656] ? __pfx_kthread+0x10/0x10 [ 14.681678] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.681701] ? calculate_sigpending+0x7b/0xa0 [ 14.681724] ? __pfx_kthread+0x10/0x10 [ 14.681747] ret_from_fork+0x116/0x1d0 [ 14.681767] ? __pfx_kthread+0x10/0x10 [ 14.681789] ret_from_fork_asm+0x1a/0x30 [ 14.681821] </TASK> [ 14.681834] [ 14.689231] Allocated by task 283: [ 14.689419] kasan_save_stack+0x45/0x70 [ 14.689646] kasan_save_track+0x18/0x40 [ 14.690126] kasan_save_alloc_info+0x3b/0x50 [ 14.690374] __kasan_kmalloc+0xb7/0xc0 [ 14.690536] __kmalloc_cache_noprof+0x189/0x420 [ 14.690707] kasan_atomics+0x95/0x310 [ 14.690845] kunit_try_run_case+0x1a5/0x480 [ 14.691039] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.691439] kthread+0x337/0x6f0 [ 14.691630] ret_from_fork+0x116/0x1d0 [ 14.691817] ret_from_fork_asm+0x1a/0x30 [ 14.692112] [ 14.692251] The buggy address belongs to the object at ffff8881031c4500 [ 14.692251] which belongs to the cache kmalloc-64 of size 64 [ 14.692676] The buggy address is located 0 bytes to the right of [ 14.692676] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.693263] [ 14.693370] The buggy address belongs to the physical page: [ 14.693600] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.693926] flags: 0x200000000000000(node=0|zone=2) [ 14.694138] page_type: f5(slab) [ 14.694309] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.694606] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.694837] page dumped because: kasan: bad access detected [ 14.695012] [ 14.695086] Memory state around the buggy address: [ 14.695245] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.695521] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.695904] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.696388] ^ [ 14.696648] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.696974] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.697477] ================================================================== [ 14.078082] ================================================================== [ 14.078782] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 14.079122] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.079855] [ 14.079963] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.080009] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.080024] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.080045] Call Trace: [ 14.080058] <TASK> [ 14.080074] dump_stack_lvl+0x73/0xb0 [ 14.080104] print_report+0xd1/0x650 [ 14.080126] ? __virt_addr_valid+0x1db/0x2d0 [ 14.080149] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.080169] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.080364] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.080395] kasan_report+0x141/0x180 [ 14.080418] ? kasan_atomics_helper+0x4ba2/0x5450 [ 14.080445] __asan_report_store4_noabort+0x1b/0x30 [ 14.080482] kasan_atomics_helper+0x4ba2/0x5450 [ 14.080505] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.080527] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.080552] ? kasan_atomics+0x152/0x310 [ 14.080578] kasan_atomics+0x1dc/0x310 [ 14.080601] ? __pfx_kasan_atomics+0x10/0x10 [ 14.080624] ? __pfx_read_tsc+0x10/0x10 [ 14.080646] ? ktime_get_ts64+0x86/0x230 [ 14.080668] kunit_try_run_case+0x1a5/0x480 [ 14.080692] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.080714] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.080738] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.080760] ? __kthread_parkme+0x82/0x180 [ 14.080781] ? preempt_count_sub+0x50/0x80 [ 14.080804] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.080828] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.080851] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.080874] kthread+0x337/0x6f0 [ 14.080894] ? trace_preempt_on+0x20/0xc0 [ 14.080917] ? __pfx_kthread+0x10/0x10 [ 14.080937] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.080958] ? calculate_sigpending+0x7b/0xa0 [ 14.080981] ? __pfx_kthread+0x10/0x10 [ 14.081003] ret_from_fork+0x116/0x1d0 [ 14.081021] ? __pfx_kthread+0x10/0x10 [ 14.081042] ret_from_fork_asm+0x1a/0x30 [ 14.081071] </TASK> [ 14.081083] [ 14.096134] Allocated by task 283: [ 14.096389] kasan_save_stack+0x45/0x70 [ 14.096875] kasan_save_track+0x18/0x40 [ 14.097150] kasan_save_alloc_info+0x3b/0x50 [ 14.097510] __kasan_kmalloc+0xb7/0xc0 [ 14.097701] __kmalloc_cache_noprof+0x189/0x420 [ 14.098084] kasan_atomics+0x95/0x310 [ 14.098338] kunit_try_run_case+0x1a5/0x480 [ 14.098697] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.098939] kthread+0x337/0x6f0 [ 14.099399] ret_from_fork+0x116/0x1d0 [ 14.099622] ret_from_fork_asm+0x1a/0x30 [ 14.099954] [ 14.100038] The buggy address belongs to the object at ffff8881031c4500 [ 14.100038] which belongs to the cache kmalloc-64 of size 64 [ 14.100807] The buggy address is located 0 bytes to the right of [ 14.100807] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.101543] [ 14.101626] The buggy address belongs to the physical page: [ 14.101961] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.102298] flags: 0x200000000000000(node=0|zone=2) [ 14.102640] page_type: f5(slab) [ 14.102800] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.103170] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.103581] page dumped because: kasan: bad access detected [ 14.103806] [ 14.103898] Memory state around the buggy address: [ 14.104104] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.104590] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.104927] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.105252] ^ [ 14.105419] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.105746] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.106140] ================================================================== [ 14.251256] ================================================================== [ 14.252509] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 14.252991] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.254104] [ 14.254293] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.254344] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.254359] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.254382] Call Trace: [ 14.254397] <TASK> [ 14.254414] dump_stack_lvl+0x73/0xb0 [ 14.254445] print_report+0xd1/0x650 [ 14.254482] ? __virt_addr_valid+0x1db/0x2d0 [ 14.254507] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.254530] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.254553] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.254576] kasan_report+0x141/0x180 [ 14.254600] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.254628] kasan_check_range+0x10c/0x1c0 [ 14.254653] __kasan_check_write+0x18/0x20 [ 14.254673] kasan_atomics_helper+0x5fe/0x5450 [ 14.254708] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.254731] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.254759] ? kasan_atomics+0x152/0x310 [ 14.254787] kasan_atomics+0x1dc/0x310 [ 14.254811] ? __pfx_kasan_atomics+0x10/0x10 [ 14.254837] ? __pfx_read_tsc+0x10/0x10 [ 14.254859] ? ktime_get_ts64+0x86/0x230 [ 14.254885] kunit_try_run_case+0x1a5/0x480 [ 14.254910] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.254933] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.254959] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.254983] ? __kthread_parkme+0x82/0x180 [ 14.255005] ? preempt_count_sub+0x50/0x80 [ 14.255030] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.255055] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.255080] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.255103] kthread+0x337/0x6f0 [ 14.255125] ? trace_preempt_on+0x20/0xc0 [ 14.255148] ? __pfx_kthread+0x10/0x10 [ 14.255170] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.255235] ? calculate_sigpending+0x7b/0xa0 [ 14.255263] ? __pfx_kthread+0x10/0x10 [ 14.255286] ret_from_fork+0x116/0x1d0 [ 14.255306] ? __pfx_kthread+0x10/0x10 [ 14.255328] ret_from_fork_asm+0x1a/0x30 [ 14.255359] </TASK> [ 14.255372] [ 14.265589] Allocated by task 283: [ 14.265758] kasan_save_stack+0x45/0x70 [ 14.265957] kasan_save_track+0x18/0x40 [ 14.266131] kasan_save_alloc_info+0x3b/0x50 [ 14.266692] __kasan_kmalloc+0xb7/0xc0 [ 14.266927] __kmalloc_cache_noprof+0x189/0x420 [ 14.267234] kasan_atomics+0x95/0x310 [ 14.267585] kunit_try_run_case+0x1a5/0x480 [ 14.267938] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.268153] kthread+0x337/0x6f0 [ 14.268537] ret_from_fork+0x116/0x1d0 [ 14.268862] ret_from_fork_asm+0x1a/0x30 [ 14.269126] [ 14.269214] The buggy address belongs to the object at ffff8881031c4500 [ 14.269214] which belongs to the cache kmalloc-64 of size 64 [ 14.269774] The buggy address is located 0 bytes to the right of [ 14.269774] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.270266] [ 14.270422] The buggy address belongs to the physical page: [ 14.270676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.271044] flags: 0x200000000000000(node=0|zone=2) [ 14.271243] page_type: f5(slab) [ 14.271415] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.271951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.272277] page dumped because: kasan: bad access detected [ 14.272581] [ 14.272688] Memory state around the buggy address: [ 14.272893] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.273243] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.273524] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.273826] ^ [ 14.274040] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.274268] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.274722] ================================================================== [ 14.816036] ================================================================== [ 14.816419] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 14.816810] Read of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.817144] [ 14.817262] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.817307] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.817321] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.817356] Call Trace: [ 14.817374] <TASK> [ 14.817395] dump_stack_lvl+0x73/0xb0 [ 14.817430] print_report+0xd1/0x650 [ 14.817463] ? __virt_addr_valid+0x1db/0x2d0 [ 14.817486] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.817509] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.817532] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.817555] kasan_report+0x141/0x180 [ 14.817579] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.817606] __asan_report_load4_noabort+0x18/0x20 [ 14.817633] kasan_atomics_helper+0x49ce/0x5450 [ 14.817657] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.817705] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.817731] ? kasan_atomics+0x152/0x310 [ 14.817760] kasan_atomics+0x1dc/0x310 [ 14.817784] ? __pfx_kasan_atomics+0x10/0x10 [ 14.817810] ? __pfx_read_tsc+0x10/0x10 [ 14.817832] ? ktime_get_ts64+0x86/0x230 [ 14.817857] kunit_try_run_case+0x1a5/0x480 [ 14.817884] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.817908] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.817943] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.817967] ? __kthread_parkme+0x82/0x180 [ 14.817988] ? preempt_count_sub+0x50/0x80 [ 14.818026] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.818051] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.818085] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.818110] kthread+0x337/0x6f0 [ 14.818131] ? trace_preempt_on+0x20/0xc0 [ 14.818155] ? __pfx_kthread+0x10/0x10 [ 14.818177] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.818198] ? calculate_sigpending+0x7b/0xa0 [ 14.818223] ? __pfx_kthread+0x10/0x10 [ 14.818246] ret_from_fork+0x116/0x1d0 [ 14.818265] ? __pfx_kthread+0x10/0x10 [ 14.818287] ret_from_fork_asm+0x1a/0x30 [ 14.818319] </TASK> [ 14.818332] [ 14.825813] Allocated by task 283: [ 14.825970] kasan_save_stack+0x45/0x70 [ 14.826119] kasan_save_track+0x18/0x40 [ 14.826257] kasan_save_alloc_info+0x3b/0x50 [ 14.826506] __kasan_kmalloc+0xb7/0xc0 [ 14.826734] __kmalloc_cache_noprof+0x189/0x420 [ 14.826957] kasan_atomics+0x95/0x310 [ 14.827146] kunit_try_run_case+0x1a5/0x480 [ 14.827332] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.827561] kthread+0x337/0x6f0 [ 14.827759] ret_from_fork+0x116/0x1d0 [ 14.827982] ret_from_fork_asm+0x1a/0x30 [ 14.828162] [ 14.828236] The buggy address belongs to the object at ffff8881031c4500 [ 14.828236] which belongs to the cache kmalloc-64 of size 64 [ 14.828637] The buggy address is located 0 bytes to the right of [ 14.828637] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.829232] [ 14.829325] The buggy address belongs to the physical page: [ 14.829520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.829805] flags: 0x200000000000000(node=0|zone=2) [ 14.830043] page_type: f5(slab) [ 14.830239] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.830609] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.831000] page dumped because: kasan: bad access detected [ 14.831264] [ 14.831376] Memory state around the buggy address: [ 14.831604] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.831933] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.832260] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.832596] ^ [ 14.832873] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.833213] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.833442] ================================================================== [ 14.225897] ================================================================== [ 14.226422] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 14.226811] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.227159] [ 14.227275] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.227387] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.227405] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.227429] Call Trace: [ 14.227446] <TASK> [ 14.227474] dump_stack_lvl+0x73/0xb0 [ 14.227505] print_report+0xd1/0x650 [ 14.227529] ? __virt_addr_valid+0x1db/0x2d0 [ 14.227575] ? kasan_atomics_helper+0x565/0x5450 [ 14.227598] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.227624] ? kasan_atomics_helper+0x565/0x5450 [ 14.227647] kasan_report+0x141/0x180 [ 14.227689] ? kasan_atomics_helper+0x565/0x5450 [ 14.227736] kasan_check_range+0x10c/0x1c0 [ 14.227761] __kasan_check_write+0x18/0x20 [ 14.227782] kasan_atomics_helper+0x565/0x5450 [ 14.227806] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.227830] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.227856] ? kasan_atomics+0x152/0x310 [ 14.227900] kasan_atomics+0x1dc/0x310 [ 14.227925] ? __pfx_kasan_atomics+0x10/0x10 [ 14.227965] ? __pfx_read_tsc+0x10/0x10 [ 14.227987] ? ktime_get_ts64+0x86/0x230 [ 14.228012] kunit_try_run_case+0x1a5/0x480 [ 14.228038] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.228064] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.228089] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.228114] ? __kthread_parkme+0x82/0x180 [ 14.228151] ? preempt_count_sub+0x50/0x80 [ 14.228238] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.228269] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.228294] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.228318] kthread+0x337/0x6f0 [ 14.228339] ? trace_preempt_on+0x20/0xc0 [ 14.228364] ? __pfx_kthread+0x10/0x10 [ 14.228386] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.228409] ? calculate_sigpending+0x7b/0xa0 [ 14.228433] ? __pfx_kthread+0x10/0x10 [ 14.228468] ret_from_fork+0x116/0x1d0 [ 14.228487] ? __pfx_kthread+0x10/0x10 [ 14.228510] ret_from_fork_asm+0x1a/0x30 [ 14.228543] </TASK> [ 14.228557] [ 14.239921] Allocated by task 283: [ 14.240112] kasan_save_stack+0x45/0x70 [ 14.240580] kasan_save_track+0x18/0x40 [ 14.240797] kasan_save_alloc_info+0x3b/0x50 [ 14.241002] __kasan_kmalloc+0xb7/0xc0 [ 14.241180] __kmalloc_cache_noprof+0x189/0x420 [ 14.241655] kasan_atomics+0x95/0x310 [ 14.241881] kunit_try_run_case+0x1a5/0x480 [ 14.242285] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.242634] kthread+0x337/0x6f0 [ 14.242829] ret_from_fork+0x116/0x1d0 [ 14.243014] ret_from_fork_asm+0x1a/0x30 [ 14.243470] [ 14.243577] The buggy address belongs to the object at ffff8881031c4500 [ 14.243577] which belongs to the cache kmalloc-64 of size 64 [ 14.244317] The buggy address is located 0 bytes to the right of [ 14.244317] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.245018] [ 14.245102] The buggy address belongs to the physical page: [ 14.245497] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.245951] flags: 0x200000000000000(node=0|zone=2) [ 14.246267] page_type: f5(slab) [ 14.246470] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.246800] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.247111] page dumped because: kasan: bad access detected [ 14.247356] [ 14.247445] Memory state around the buggy address: [ 14.247666] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.248510] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.248979] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.249300] ^ [ 14.249646] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.250143] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.250720] ================================================================== [ 14.488448] ================================================================== [ 14.488830] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 14.489082] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.489334] [ 14.489469] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.489515] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.489529] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.489552] Call Trace: [ 14.489570] <TASK> [ 14.489638] dump_stack_lvl+0x73/0xb0 [ 14.489669] print_report+0xd1/0x650 [ 14.489707] ? __virt_addr_valid+0x1db/0x2d0 [ 14.489731] ? kasan_atomics_helper+0xc70/0x5450 [ 14.489753] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.489777] ? kasan_atomics_helper+0xc70/0x5450 [ 14.489800] kasan_report+0x141/0x180 [ 14.489824] ? kasan_atomics_helper+0xc70/0x5450 [ 14.489852] kasan_check_range+0x10c/0x1c0 [ 14.489877] __kasan_check_write+0x18/0x20 [ 14.489898] kasan_atomics_helper+0xc70/0x5450 [ 14.489922] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.489946] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.489972] ? kasan_atomics+0x152/0x310 [ 14.490000] kasan_atomics+0x1dc/0x310 [ 14.490024] ? __pfx_kasan_atomics+0x10/0x10 [ 14.490049] ? __pfx_read_tsc+0x10/0x10 [ 14.490071] ? ktime_get_ts64+0x86/0x230 [ 14.490096] kunit_try_run_case+0x1a5/0x480 [ 14.490121] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.490145] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.490169] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.490192] ? __kthread_parkme+0x82/0x180 [ 14.490251] ? preempt_count_sub+0x50/0x80 [ 14.490275] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.490300] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.490325] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.490348] kthread+0x337/0x6f0 [ 14.490370] ? trace_preempt_on+0x20/0xc0 [ 14.490394] ? __pfx_kthread+0x10/0x10 [ 14.490416] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.490437] ? calculate_sigpending+0x7b/0xa0 [ 14.490472] ? __pfx_kthread+0x10/0x10 [ 14.490494] ret_from_fork+0x116/0x1d0 [ 14.490514] ? __pfx_kthread+0x10/0x10 [ 14.490536] ret_from_fork_asm+0x1a/0x30 [ 14.490569] </TASK> [ 14.490581] [ 14.499000] Allocated by task 283: [ 14.499135] kasan_save_stack+0x45/0x70 [ 14.499712] kasan_save_track+0x18/0x40 [ 14.499930] kasan_save_alloc_info+0x3b/0x50 [ 14.500153] __kasan_kmalloc+0xb7/0xc0 [ 14.500439] __kmalloc_cache_noprof+0x189/0x420 [ 14.500617] kasan_atomics+0x95/0x310 [ 14.500758] kunit_try_run_case+0x1a5/0x480 [ 14.500972] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.501297] kthread+0x337/0x6f0 [ 14.501515] ret_from_fork+0x116/0x1d0 [ 14.501913] ret_from_fork_asm+0x1a/0x30 [ 14.502089] [ 14.502188] The buggy address belongs to the object at ffff8881031c4500 [ 14.502188] which belongs to the cache kmalloc-64 of size 64 [ 14.502668] The buggy address is located 0 bytes to the right of [ 14.502668] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.503144] [ 14.503228] The buggy address belongs to the physical page: [ 14.503463] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.503833] flags: 0x200000000000000(node=0|zone=2) [ 14.504042] page_type: f5(slab) [ 14.504252] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.504520] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.504755] page dumped because: kasan: bad access detected [ 14.504933] [ 14.505008] Memory state around the buggy address: [ 14.505204] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.505976] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.506393] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.506624] ^ [ 14.506783] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.507001] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.507649] ================================================================== [ 14.858279] ================================================================== [ 14.858597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 14.858840] Read of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.859128] [ 14.860198] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.860252] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.860267] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.860292] Call Trace: [ 14.860310] <TASK> [ 14.860326] dump_stack_lvl+0x73/0xb0 [ 14.860360] print_report+0xd1/0x650 [ 14.860384] ? __virt_addr_valid+0x1db/0x2d0 [ 14.860407] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.860429] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.860468] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.860490] kasan_report+0x141/0x180 [ 14.860514] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.860542] __asan_report_load8_noabort+0x18/0x20 [ 14.860566] kasan_atomics_helper+0x4eae/0x5450 [ 14.860590] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.860614] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.860639] ? kasan_atomics+0x152/0x310 [ 14.860690] kasan_atomics+0x1dc/0x310 [ 14.860715] ? __pfx_kasan_atomics+0x10/0x10 [ 14.860741] ? __pfx_read_tsc+0x10/0x10 [ 14.860762] ? ktime_get_ts64+0x86/0x230 [ 14.860787] kunit_try_run_case+0x1a5/0x480 [ 14.860811] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.860834] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.860859] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.860883] ? __kthread_parkme+0x82/0x180 [ 14.860904] ? preempt_count_sub+0x50/0x80 [ 14.860928] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.860952] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.860976] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.861001] kthread+0x337/0x6f0 [ 14.861021] ? trace_preempt_on+0x20/0xc0 [ 14.861045] ? __pfx_kthread+0x10/0x10 [ 14.861067] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.861089] ? calculate_sigpending+0x7b/0xa0 [ 14.861113] ? __pfx_kthread+0x10/0x10 [ 14.861136] ret_from_fork+0x116/0x1d0 [ 14.861157] ? __pfx_kthread+0x10/0x10 [ 14.861178] ret_from_fork_asm+0x1a/0x30 [ 14.861211] </TASK> [ 14.861224] [ 14.874313] Allocated by task 283: [ 14.874539] kasan_save_stack+0x45/0x70 [ 14.874757] kasan_save_track+0x18/0x40 [ 14.874978] kasan_save_alloc_info+0x3b/0x50 [ 14.875184] __kasan_kmalloc+0xb7/0xc0 [ 14.875349] __kmalloc_cache_noprof+0x189/0x420 [ 14.875590] kasan_atomics+0x95/0x310 [ 14.875836] kunit_try_run_case+0x1a5/0x480 [ 14.876001] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.876253] kthread+0x337/0x6f0 [ 14.876438] ret_from_fork+0x116/0x1d0 [ 14.876600] ret_from_fork_asm+0x1a/0x30 [ 14.876768] [ 14.876939] The buggy address belongs to the object at ffff8881031c4500 [ 14.876939] which belongs to the cache kmalloc-64 of size 64 [ 14.877446] The buggy address is located 0 bytes to the right of [ 14.877446] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.878039] [ 14.878141] The buggy address belongs to the physical page: [ 14.878356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.878699] flags: 0x200000000000000(node=0|zone=2) [ 14.879026] page_type: f5(slab) [ 14.879176] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.879497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.879899] page dumped because: kasan: bad access detected [ 14.880185] [ 14.880285] Memory state around the buggy address: [ 14.880538] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.880824] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.881179] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.881480] ^ [ 14.881692] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.882022] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.882332] ================================================================== [ 14.992088] ================================================================== [ 14.992490] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 14.992879] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.993258] [ 14.993363] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.993413] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.993427] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.993450] Call Trace: [ 14.993480] <TASK> [ 14.993497] dump_stack_lvl+0x73/0xb0 [ 14.993525] print_report+0xd1/0x650 [ 14.993549] ? __virt_addr_valid+0x1db/0x2d0 [ 14.993573] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.993595] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.993618] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.993641] kasan_report+0x141/0x180 [ 14.993665] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.993692] kasan_check_range+0x10c/0x1c0 [ 14.993717] __kasan_check_write+0x18/0x20 [ 14.993738] kasan_atomics_helper+0x16e7/0x5450 [ 14.993761] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.993784] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.993811] ? kasan_atomics+0x152/0x310 [ 14.993838] kasan_atomics+0x1dc/0x310 [ 14.993862] ? __pfx_kasan_atomics+0x10/0x10 [ 14.993887] ? __pfx_read_tsc+0x10/0x10 [ 14.993910] ? ktime_get_ts64+0x86/0x230 [ 14.993935] kunit_try_run_case+0x1a5/0x480 [ 14.993959] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.993982] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.994007] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.994030] ? __kthread_parkme+0x82/0x180 [ 14.994052] ? preempt_count_sub+0x50/0x80 [ 14.994077] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.994102] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.994127] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.994151] kthread+0x337/0x6f0 [ 14.994172] ? trace_preempt_on+0x20/0xc0 [ 14.994197] ? __pfx_kthread+0x10/0x10 [ 14.994219] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.994241] ? calculate_sigpending+0x7b/0xa0 [ 14.994266] ? __pfx_kthread+0x10/0x10 [ 14.994289] ret_from_fork+0x116/0x1d0 [ 14.994308] ? __pfx_kthread+0x10/0x10 [ 14.994331] ret_from_fork_asm+0x1a/0x30 [ 14.994362] </TASK> [ 14.994375] [ 15.001642] Allocated by task 283: [ 15.001871] kasan_save_stack+0x45/0x70 [ 15.002078] kasan_save_track+0x18/0x40 [ 15.002272] kasan_save_alloc_info+0x3b/0x50 [ 15.002499] __kasan_kmalloc+0xb7/0xc0 [ 15.002715] __kmalloc_cache_noprof+0x189/0x420 [ 15.002940] kasan_atomics+0x95/0x310 [ 15.003133] kunit_try_run_case+0x1a5/0x480 [ 15.003299] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.003567] kthread+0x337/0x6f0 [ 15.003722] ret_from_fork+0x116/0x1d0 [ 15.003859] ret_from_fork_asm+0x1a/0x30 [ 15.004062] [ 15.004162] The buggy address belongs to the object at ffff8881031c4500 [ 15.004162] which belongs to the cache kmalloc-64 of size 64 [ 15.004683] The buggy address is located 0 bytes to the right of [ 15.004683] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 15.005175] [ 15.005268] The buggy address belongs to the physical page: [ 15.005507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 15.005844] flags: 0x200000000000000(node=0|zone=2) [ 15.006071] page_type: f5(slab) [ 15.006234] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.006547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.006871] page dumped because: kasan: bad access detected [ 15.007104] [ 15.007182] Memory state around the buggy address: [ 15.007372] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.007605] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.007852] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.008084] ^ [ 15.008313] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.008643] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.008978] ================================================================== [ 15.078820] ================================================================== [ 15.079234] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 15.079736] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 15.080158] [ 15.080280] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.080328] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.080343] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.080366] Call Trace: [ 15.080383] <TASK> [ 15.080401] dump_stack_lvl+0x73/0xb0 [ 15.080430] print_report+0xd1/0x650 [ 15.080466] ? __virt_addr_valid+0x1db/0x2d0 [ 15.080489] ? kasan_atomics_helper+0x194a/0x5450 [ 15.080513] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.080538] ? kasan_atomics_helper+0x194a/0x5450 [ 15.080562] kasan_report+0x141/0x180 [ 15.080585] ? kasan_atomics_helper+0x194a/0x5450 [ 15.080612] kasan_check_range+0x10c/0x1c0 [ 15.080637] __kasan_check_write+0x18/0x20 [ 15.080657] kasan_atomics_helper+0x194a/0x5450 [ 15.080682] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.080705] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.080732] ? kasan_atomics+0x152/0x310 [ 15.080761] kasan_atomics+0x1dc/0x310 [ 15.080786] ? __pfx_kasan_atomics+0x10/0x10 [ 15.080813] ? __pfx_read_tsc+0x10/0x10 [ 15.080834] ? ktime_get_ts64+0x86/0x230 [ 15.080858] kunit_try_run_case+0x1a5/0x480 [ 15.080884] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.080908] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.080932] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.080958] ? __kthread_parkme+0x82/0x180 [ 15.080980] ? preempt_count_sub+0x50/0x80 [ 15.081004] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.081029] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.081055] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.081081] kthread+0x337/0x6f0 [ 15.081103] ? trace_preempt_on+0x20/0xc0 [ 15.081127] ? __pfx_kthread+0x10/0x10 [ 15.081150] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.081172] ? calculate_sigpending+0x7b/0xa0 [ 15.081197] ? __pfx_kthread+0x10/0x10 [ 15.081220] ret_from_fork+0x116/0x1d0 [ 15.081239] ? __pfx_kthread+0x10/0x10 [ 15.081261] ret_from_fork_asm+0x1a/0x30 [ 15.081291] </TASK> [ 15.081304] [ 15.088725] Allocated by task 283: [ 15.088925] kasan_save_stack+0x45/0x70 [ 15.089119] kasan_save_track+0x18/0x40 [ 15.089307] kasan_save_alloc_info+0x3b/0x50 [ 15.089516] __kasan_kmalloc+0xb7/0xc0 [ 15.089700] __kmalloc_cache_noprof+0x189/0x420 [ 15.089861] kasan_atomics+0x95/0x310 [ 15.089999] kunit_try_run_case+0x1a5/0x480 [ 15.090201] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.090469] kthread+0x337/0x6f0 [ 15.090643] ret_from_fork+0x116/0x1d0 [ 15.090906] ret_from_fork_asm+0x1a/0x30 [ 15.091050] [ 15.091125] The buggy address belongs to the object at ffff8881031c4500 [ 15.091125] which belongs to the cache kmalloc-64 of size 64 [ 15.091644] The buggy address is located 0 bytes to the right of [ 15.091644] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 15.092150] [ 15.092258] The buggy address belongs to the physical page: [ 15.092490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 15.092822] flags: 0x200000000000000(node=0|zone=2) [ 15.093046] page_type: f5(slab) [ 15.093196] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.093507] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.093832] page dumped because: kasan: bad access detected [ 15.094057] [ 15.094160] Memory state around the buggy address: [ 15.094363] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.094676] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.094969] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.095188] ^ [ 15.095347] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.095636] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.096300] ================================================================== [ 14.528109] ================================================================== [ 14.528410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 14.528985] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.529328] [ 14.529446] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.529501] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.529514] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.529538] Call Trace: [ 14.529555] <TASK> [ 14.529571] dump_stack_lvl+0x73/0xb0 [ 14.529603] print_report+0xd1/0x650 [ 14.529627] ? __virt_addr_valid+0x1db/0x2d0 [ 14.529651] ? kasan_atomics_helper+0xd47/0x5450 [ 14.529757] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.529785] ? kasan_atomics_helper+0xd47/0x5450 [ 14.529809] kasan_report+0x141/0x180 [ 14.529834] ? kasan_atomics_helper+0xd47/0x5450 [ 14.529862] kasan_check_range+0x10c/0x1c0 [ 14.529888] __kasan_check_write+0x18/0x20 [ 14.529909] kasan_atomics_helper+0xd47/0x5450 [ 14.529934] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.529958] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.529985] ? kasan_atomics+0x152/0x310 [ 14.530013] kasan_atomics+0x1dc/0x310 [ 14.530038] ? __pfx_kasan_atomics+0x10/0x10 [ 14.530063] ? __pfx_read_tsc+0x10/0x10 [ 14.530086] ? ktime_get_ts64+0x86/0x230 [ 14.530112] kunit_try_run_case+0x1a5/0x480 [ 14.530138] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.530162] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.530240] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.530267] ? __kthread_parkme+0x82/0x180 [ 14.530289] ? preempt_count_sub+0x50/0x80 [ 14.530314] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.530339] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.530364] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.530389] kthread+0x337/0x6f0 [ 14.530411] ? trace_preempt_on+0x20/0xc0 [ 14.530435] ? __pfx_kthread+0x10/0x10 [ 14.530469] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.530491] ? calculate_sigpending+0x7b/0xa0 [ 14.530516] ? __pfx_kthread+0x10/0x10 [ 14.530540] ret_from_fork+0x116/0x1d0 [ 14.530560] ? __pfx_kthread+0x10/0x10 [ 14.530582] ret_from_fork_asm+0x1a/0x30 [ 14.530615] </TASK> [ 14.530628] [ 14.538392] Allocated by task 283: [ 14.538571] kasan_save_stack+0x45/0x70 [ 14.538748] kasan_save_track+0x18/0x40 [ 14.538904] kasan_save_alloc_info+0x3b/0x50 [ 14.539121] __kasan_kmalloc+0xb7/0xc0 [ 14.539513] __kmalloc_cache_noprof+0x189/0x420 [ 14.539753] kasan_atomics+0x95/0x310 [ 14.539975] kunit_try_run_case+0x1a5/0x480 [ 14.540248] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.540517] kthread+0x337/0x6f0 [ 14.540645] ret_from_fork+0x116/0x1d0 [ 14.540808] ret_from_fork_asm+0x1a/0x30 [ 14.540953] [ 14.541053] The buggy address belongs to the object at ffff8881031c4500 [ 14.541053] which belongs to the cache kmalloc-64 of size 64 [ 14.541654] The buggy address is located 0 bytes to the right of [ 14.541654] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.542061] [ 14.542159] The buggy address belongs to the physical page: [ 14.542483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.542874] flags: 0x200000000000000(node=0|zone=2) [ 14.543113] page_type: f5(slab) [ 14.543312] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.543566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.543872] page dumped because: kasan: bad access detected [ 14.544123] [ 14.544423] Memory state around the buggy address: [ 14.544668] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.545027] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.545408] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.545732] ^ [ 14.545937] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.546275] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.546550] ================================================================== [ 15.351027] ================================================================== [ 15.351792] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 15.352174] Read of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 15.352558] [ 15.352674] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.352749] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.352764] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.352787] Call Trace: [ 15.352805] <TASK> [ 15.352833] dump_stack_lvl+0x73/0xb0 [ 15.352864] print_report+0xd1/0x650 [ 15.352888] ? __virt_addr_valid+0x1db/0x2d0 [ 15.352911] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.352934] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.352958] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.352981] kasan_report+0x141/0x180 [ 15.353005] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.353060] __asan_report_load8_noabort+0x18/0x20 [ 15.353086] kasan_atomics_helper+0x4f98/0x5450 [ 15.353110] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.353144] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.353171] ? kasan_atomics+0x152/0x310 [ 15.353226] kasan_atomics+0x1dc/0x310 [ 15.353251] ? __pfx_kasan_atomics+0x10/0x10 [ 15.353277] ? __pfx_read_tsc+0x10/0x10 [ 15.353310] ? ktime_get_ts64+0x86/0x230 [ 15.353335] kunit_try_run_case+0x1a5/0x480 [ 15.353391] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.353415] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.353440] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.353479] ? __kthread_parkme+0x82/0x180 [ 15.353500] ? preempt_count_sub+0x50/0x80 [ 15.353525] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.353550] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.353574] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.353598] kthread+0x337/0x6f0 [ 15.353620] ? trace_preempt_on+0x20/0xc0 [ 15.353644] ? __pfx_kthread+0x10/0x10 [ 15.353666] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.353699] ? calculate_sigpending+0x7b/0xa0 [ 15.353724] ? __pfx_kthread+0x10/0x10 [ 15.353748] ret_from_fork+0x116/0x1d0 [ 15.353768] ? __pfx_kthread+0x10/0x10 [ 15.353820] ret_from_fork_asm+0x1a/0x30 [ 15.353852] </TASK> [ 15.353865] [ 15.361962] Allocated by task 283: [ 15.362147] kasan_save_stack+0x45/0x70 [ 15.362351] kasan_save_track+0x18/0x40 [ 15.362554] kasan_save_alloc_info+0x3b/0x50 [ 15.362844] __kasan_kmalloc+0xb7/0xc0 [ 15.362985] __kmalloc_cache_noprof+0x189/0x420 [ 15.363143] kasan_atomics+0x95/0x310 [ 15.363280] kunit_try_run_case+0x1a5/0x480 [ 15.363507] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.363822] kthread+0x337/0x6f0 [ 15.364081] ret_from_fork+0x116/0x1d0 [ 15.364447] ret_from_fork_asm+0x1a/0x30 [ 15.364764] [ 15.364873] The buggy address belongs to the object at ffff8881031c4500 [ 15.364873] which belongs to the cache kmalloc-64 of size 64 [ 15.365291] The buggy address is located 0 bytes to the right of [ 15.365291] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 15.365922] [ 15.366077] The buggy address belongs to the physical page: [ 15.366373] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 15.366804] flags: 0x200000000000000(node=0|zone=2) [ 15.367019] page_type: f5(slab) [ 15.367182] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.367550] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.367929] page dumped because: kasan: bad access detected [ 15.368210] [ 15.368337] Memory state around the buggy address: [ 15.368577] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.368948] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.369283] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.369648] ^ [ 15.369922] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.370238] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.370581] ================================================================== [ 15.441036] ================================================================== [ 15.441381] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 15.441774] Read of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 15.442074] [ 15.442178] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.442222] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.442236] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.442260] Call Trace: [ 15.442276] <TASK> [ 15.442293] dump_stack_lvl+0x73/0xb0 [ 15.442325] print_report+0xd1/0x650 [ 15.442348] ? __virt_addr_valid+0x1db/0x2d0 [ 15.442370] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.442393] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.442416] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.442439] kasan_report+0x141/0x180 [ 15.442475] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.442503] __asan_report_load8_noabort+0x18/0x20 [ 15.442529] kasan_atomics_helper+0x4fa5/0x5450 [ 15.442553] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.442576] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.442603] ? kasan_atomics+0x152/0x310 [ 15.442631] kasan_atomics+0x1dc/0x310 [ 15.442655] ? __pfx_kasan_atomics+0x10/0x10 [ 15.442702] ? __pfx_read_tsc+0x10/0x10 [ 15.442724] ? ktime_get_ts64+0x86/0x230 [ 15.442749] kunit_try_run_case+0x1a5/0x480 [ 15.442774] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.442798] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.442822] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.442847] ? __kthread_parkme+0x82/0x180 [ 15.442869] ? preempt_count_sub+0x50/0x80 [ 15.442893] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.442919] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.442943] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.442967] kthread+0x337/0x6f0 [ 15.442989] ? trace_preempt_on+0x20/0xc0 [ 15.443014] ? __pfx_kthread+0x10/0x10 [ 15.443036] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.443059] ? calculate_sigpending+0x7b/0xa0 [ 15.443084] ? __pfx_kthread+0x10/0x10 [ 15.443106] ret_from_fork+0x116/0x1d0 [ 15.443126] ? __pfx_kthread+0x10/0x10 [ 15.443147] ret_from_fork_asm+0x1a/0x30 [ 15.443180] </TASK> [ 15.443193] [ 15.450308] Allocated by task 283: [ 15.450442] kasan_save_stack+0x45/0x70 [ 15.450596] kasan_save_track+0x18/0x40 [ 15.450819] kasan_save_alloc_info+0x3b/0x50 [ 15.451040] __kasan_kmalloc+0xb7/0xc0 [ 15.451230] __kmalloc_cache_noprof+0x189/0x420 [ 15.451466] kasan_atomics+0x95/0x310 [ 15.451627] kunit_try_run_case+0x1a5/0x480 [ 15.451852] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.452089] kthread+0x337/0x6f0 [ 15.452241] ret_from_fork+0x116/0x1d0 [ 15.452406] ret_from_fork_asm+0x1a/0x30 [ 15.452615] [ 15.452735] The buggy address belongs to the object at ffff8881031c4500 [ 15.452735] which belongs to the cache kmalloc-64 of size 64 [ 15.453186] The buggy address is located 0 bytes to the right of [ 15.453186] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 15.453707] [ 15.453808] The buggy address belongs to the physical page: [ 15.454055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 15.454400] flags: 0x200000000000000(node=0|zone=2) [ 15.454616] page_type: f5(slab) [ 15.454796] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.455092] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.455397] page dumped because: kasan: bad access detected [ 15.455644] [ 15.455761] Memory state around the buggy address: [ 15.455971] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.456251] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.456517] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.456760] ^ [ 15.456920] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.457147] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.457478] ================================================================== [ 15.144389] ================================================================== [ 15.144752] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 15.145067] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 15.145909] [ 15.146151] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.146307] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.146326] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.146350] Call Trace: [ 15.146381] <TASK> [ 15.146401] dump_stack_lvl+0x73/0xb0 [ 15.146480] print_report+0xd1/0x650 [ 15.146507] ? __virt_addr_valid+0x1db/0x2d0 [ 15.146531] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.146554] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.146578] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.146601] kasan_report+0x141/0x180 [ 15.146624] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.146651] kasan_check_range+0x10c/0x1c0 [ 15.146690] __kasan_check_write+0x18/0x20 [ 15.146711] kasan_atomics_helper+0x1b22/0x5450 [ 15.146734] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.146758] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.146784] ? kasan_atomics+0x152/0x310 [ 15.146812] kasan_atomics+0x1dc/0x310 [ 15.146835] ? __pfx_kasan_atomics+0x10/0x10 [ 15.146860] ? __pfx_read_tsc+0x10/0x10 [ 15.146881] ? ktime_get_ts64+0x86/0x230 [ 15.146906] kunit_try_run_case+0x1a5/0x480 [ 15.146931] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.146955] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.146979] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.147003] ? __kthread_parkme+0x82/0x180 [ 15.147025] ? preempt_count_sub+0x50/0x80 [ 15.147049] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.147073] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.147096] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.147121] kthread+0x337/0x6f0 [ 15.147142] ? trace_preempt_on+0x20/0xc0 [ 15.147166] ? __pfx_kthread+0x10/0x10 [ 15.147187] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.147209] ? calculate_sigpending+0x7b/0xa0 [ 15.147234] ? __pfx_kthread+0x10/0x10 [ 15.147257] ret_from_fork+0x116/0x1d0 [ 15.147276] ? __pfx_kthread+0x10/0x10 [ 15.147297] ret_from_fork_asm+0x1a/0x30 [ 15.147329] </TASK> [ 15.147342] [ 15.156618] Allocated by task 283: [ 15.157169] kasan_save_stack+0x45/0x70 [ 15.157493] kasan_save_track+0x18/0x40 [ 15.157827] kasan_save_alloc_info+0x3b/0x50 [ 15.158127] __kasan_kmalloc+0xb7/0xc0 [ 15.158409] __kmalloc_cache_noprof+0x189/0x420 [ 15.158759] kasan_atomics+0x95/0x310 [ 15.159041] kunit_try_run_case+0x1a5/0x480 [ 15.159334] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.159677] kthread+0x337/0x6f0 [ 15.159992] ret_from_fork+0x116/0x1d0 [ 15.160276] ret_from_fork_asm+0x1a/0x30 [ 15.160525] [ 15.160630] The buggy address belongs to the object at ffff8881031c4500 [ 15.160630] which belongs to the cache kmalloc-64 of size 64 [ 15.161485] The buggy address is located 0 bytes to the right of [ 15.161485] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 15.162250] [ 15.162333] The buggy address belongs to the physical page: [ 15.162784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 15.163222] flags: 0x200000000000000(node=0|zone=2) [ 15.163558] page_type: f5(slab) [ 15.163909] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.164268] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.164785] page dumped because: kasan: bad access detected [ 15.165126] [ 15.165338] Memory state around the buggy address: [ 15.165711] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.166110] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.166523] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.167038] ^ [ 15.167351] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.167771] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.168170] ================================================================== [ 15.310905] ================================================================== [ 15.311280] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 15.311625] Read of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 15.311984] [ 15.312102] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.312174] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.312188] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.312222] Call Trace: [ 15.312241] <TASK> [ 15.312257] dump_stack_lvl+0x73/0xb0 [ 15.312314] print_report+0xd1/0x650 [ 15.312338] ? __virt_addr_valid+0x1db/0x2d0 [ 15.312389] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.312412] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.312436] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.312468] kasan_report+0x141/0x180 [ 15.312492] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.312520] __asan_report_load8_noabort+0x18/0x20 [ 15.312572] kasan_atomics_helper+0x4f71/0x5450 [ 15.312597] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.312659] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.312686] ? kasan_atomics+0x152/0x310 [ 15.312724] kasan_atomics+0x1dc/0x310 [ 15.312748] ? __pfx_kasan_atomics+0x10/0x10 [ 15.312784] ? __pfx_read_tsc+0x10/0x10 [ 15.312805] ? ktime_get_ts64+0x86/0x230 [ 15.312830] kunit_try_run_case+0x1a5/0x480 [ 15.312854] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.312879] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.312903] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.312954] ? __kthread_parkme+0x82/0x180 [ 15.312975] ? preempt_count_sub+0x50/0x80 [ 15.313028] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.313078] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.313103] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.313128] kthread+0x337/0x6f0 [ 15.313161] ? trace_preempt_on+0x20/0xc0 [ 15.313186] ? __pfx_kthread+0x10/0x10 [ 15.313208] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.313230] ? calculate_sigpending+0x7b/0xa0 [ 15.313255] ? __pfx_kthread+0x10/0x10 [ 15.313277] ret_from_fork+0x116/0x1d0 [ 15.313297] ? __pfx_kthread+0x10/0x10 [ 15.313319] ret_from_fork_asm+0x1a/0x30 [ 15.313350] </TASK> [ 15.313392] [ 15.321288] Allocated by task 283: [ 15.321504] kasan_save_stack+0x45/0x70 [ 15.321740] kasan_save_track+0x18/0x40 [ 15.321932] kasan_save_alloc_info+0x3b/0x50 [ 15.322172] __kasan_kmalloc+0xb7/0xc0 [ 15.322406] __kmalloc_cache_noprof+0x189/0x420 [ 15.322675] kasan_atomics+0x95/0x310 [ 15.322895] kunit_try_run_case+0x1a5/0x480 [ 15.323044] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.323551] kthread+0x337/0x6f0 [ 15.323701] ret_from_fork+0x116/0x1d0 [ 15.323963] ret_from_fork_asm+0x1a/0x30 [ 15.324143] [ 15.324232] The buggy address belongs to the object at ffff8881031c4500 [ 15.324232] which belongs to the cache kmalloc-64 of size 64 [ 15.324678] The buggy address is located 0 bytes to the right of [ 15.324678] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 15.325231] [ 15.325306] The buggy address belongs to the physical page: [ 15.325538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 15.325998] flags: 0x200000000000000(node=0|zone=2) [ 15.326162] page_type: f5(slab) [ 15.326282] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.326517] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.326862] page dumped because: kasan: bad access detected [ 15.327361] [ 15.327505] Memory state around the buggy address: [ 15.327919] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.328252] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.328498] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.329086] ^ [ 15.329283] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.329640] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.329992] ================================================================== [ 14.047651] ================================================================== [ 14.049488] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 14.049748] Read of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.049976] [ 14.050068] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.050115] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.050127] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.050150] Call Trace: [ 14.050163] <TASK> [ 14.050178] dump_stack_lvl+0x73/0xb0 [ 14.050206] print_report+0xd1/0x650 [ 14.050227] ? __virt_addr_valid+0x1db/0x2d0 [ 14.050249] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.050270] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.050291] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.050315] kasan_report+0x141/0x180 [ 14.050338] ? kasan_atomics_helper+0x4bbc/0x5450 [ 14.050363] __asan_report_load4_noabort+0x18/0x20 [ 14.050387] kasan_atomics_helper+0x4bbc/0x5450 [ 14.050409] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.050431] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.050731] ? kasan_atomics+0x152/0x310 [ 14.050829] kasan_atomics+0x1dc/0x310 [ 14.051066] ? __pfx_kasan_atomics+0x10/0x10 [ 14.051095] ? __pfx_read_tsc+0x10/0x10 [ 14.051117] ? ktime_get_ts64+0x86/0x230 [ 14.051168] kunit_try_run_case+0x1a5/0x480 [ 14.051221] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.051243] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.051267] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.051289] ? __kthread_parkme+0x82/0x180 [ 14.051309] ? preempt_count_sub+0x50/0x80 [ 14.051334] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.051357] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.051380] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.051403] kthread+0x337/0x6f0 [ 14.051422] ? trace_preempt_on+0x20/0xc0 [ 14.051444] ? __pfx_kthread+0x10/0x10 [ 14.051474] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.051494] ? calculate_sigpending+0x7b/0xa0 [ 14.051517] ? __pfx_kthread+0x10/0x10 [ 14.051539] ret_from_fork+0x116/0x1d0 [ 14.051557] ? __pfx_kthread+0x10/0x10 [ 14.051577] ret_from_fork_asm+0x1a/0x30 [ 14.051607] </TASK> [ 14.051619] [ 14.065173] Allocated by task 283: [ 14.065551] kasan_save_stack+0x45/0x70 [ 14.065761] kasan_save_track+0x18/0x40 [ 14.066127] kasan_save_alloc_info+0x3b/0x50 [ 14.066422] __kasan_kmalloc+0xb7/0xc0 [ 14.066732] __kmalloc_cache_noprof+0x189/0x420 [ 14.066982] kasan_atomics+0x95/0x310 [ 14.067157] kunit_try_run_case+0x1a5/0x480 [ 14.067609] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.067983] kthread+0x337/0x6f0 [ 14.068253] ret_from_fork+0x116/0x1d0 [ 14.068611] ret_from_fork_asm+0x1a/0x30 [ 14.068869] [ 14.068971] The buggy address belongs to the object at ffff8881031c4500 [ 14.068971] which belongs to the cache kmalloc-64 of size 64 [ 14.069712] The buggy address is located 0 bytes to the right of [ 14.069712] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.070443] [ 14.070569] The buggy address belongs to the physical page: [ 14.071020] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.071509] flags: 0x200000000000000(node=0|zone=2) [ 14.071845] page_type: f5(slab) [ 14.072141] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.072637] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.073242] page dumped because: kasan: bad access detected [ 14.073604] [ 14.073695] Memory state around the buggy address: [ 14.074057] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.074632] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.075052] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.075512] ^ [ 14.075871] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.076261] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.076765] ================================================================== [ 15.055880] ================================================================== [ 15.056194] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 15.057029] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 15.057404] [ 15.057517] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.057714] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.057799] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.057825] Call Trace: [ 15.057839] <TASK> [ 15.057857] dump_stack_lvl+0x73/0xb0 [ 15.057889] print_report+0xd1/0x650 [ 15.057914] ? __virt_addr_valid+0x1db/0x2d0 [ 15.057938] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.057961] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.057984] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.058007] kasan_report+0x141/0x180 [ 15.058030] ? kasan_atomics_helper+0x18b1/0x5450 [ 15.058057] kasan_check_range+0x10c/0x1c0 [ 15.058083] __kasan_check_write+0x18/0x20 [ 15.058104] kasan_atomics_helper+0x18b1/0x5450 [ 15.058127] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.058151] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.058177] ? kasan_atomics+0x152/0x310 [ 15.058205] kasan_atomics+0x1dc/0x310 [ 15.058229] ? __pfx_kasan_atomics+0x10/0x10 [ 15.058255] ? __pfx_read_tsc+0x10/0x10 [ 15.058276] ? ktime_get_ts64+0x86/0x230 [ 15.058301] kunit_try_run_case+0x1a5/0x480 [ 15.058326] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.058350] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.058374] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.058399] ? __kthread_parkme+0x82/0x180 [ 15.058419] ? preempt_count_sub+0x50/0x80 [ 15.058445] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.058483] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.058507] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.058532] kthread+0x337/0x6f0 [ 15.058552] ? trace_preempt_on+0x20/0xc0 [ 15.058578] ? __pfx_kthread+0x10/0x10 [ 15.058600] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.058622] ? calculate_sigpending+0x7b/0xa0 [ 15.058648] ? __pfx_kthread+0x10/0x10 [ 15.058671] ret_from_fork+0x116/0x1d0 [ 15.058699] ? __pfx_kthread+0x10/0x10 [ 15.058721] ret_from_fork_asm+0x1a/0x30 [ 15.058753] </TASK> [ 15.058767] [ 15.068588] Allocated by task 283: [ 15.068934] kasan_save_stack+0x45/0x70 [ 15.069106] kasan_save_track+0x18/0x40 [ 15.069309] kasan_save_alloc_info+0x3b/0x50 [ 15.069698] __kasan_kmalloc+0xb7/0xc0 [ 15.069874] __kmalloc_cache_noprof+0x189/0x420 [ 15.070076] kasan_atomics+0x95/0x310 [ 15.070259] kunit_try_run_case+0x1a5/0x480 [ 15.070450] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.070698] kthread+0x337/0x6f0 [ 15.071129] ret_from_fork+0x116/0x1d0 [ 15.071286] ret_from_fork_asm+0x1a/0x30 [ 15.071577] [ 15.071772] The buggy address belongs to the object at ffff8881031c4500 [ 15.071772] which belongs to the cache kmalloc-64 of size 64 [ 15.072314] The buggy address is located 0 bytes to the right of [ 15.072314] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 15.072976] [ 15.073198] The buggy address belongs to the physical page: [ 15.073537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 15.074008] flags: 0x200000000000000(node=0|zone=2) [ 15.074281] page_type: f5(slab) [ 15.074469] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.074976] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.075342] page dumped because: kasan: bad access detected [ 15.075691] [ 15.075776] Memory state around the buggy address: [ 15.075993] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.076288] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.076626] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.077197] ^ [ 15.077400] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.077847] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.078211] ================================================================== [ 14.421527] ================================================================== [ 14.421892] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 14.422274] Write of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.422602] [ 14.422733] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.422777] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.422791] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.422832] Call Trace: [ 14.422849] <TASK> [ 14.422865] dump_stack_lvl+0x73/0xb0 [ 14.422896] print_report+0xd1/0x650 [ 14.422919] ? __virt_addr_valid+0x1db/0x2d0 [ 14.422943] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.422966] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.422989] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.423032] kasan_report+0x141/0x180 [ 14.423056] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.423084] kasan_check_range+0x10c/0x1c0 [ 14.423108] __kasan_check_write+0x18/0x20 [ 14.423129] kasan_atomics_helper+0xa2b/0x5450 [ 14.423153] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.423175] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.423268] ? kasan_atomics+0x152/0x310 [ 14.423295] kasan_atomics+0x1dc/0x310 [ 14.423320] ? __pfx_kasan_atomics+0x10/0x10 [ 14.423345] ? __pfx_read_tsc+0x10/0x10 [ 14.423367] ? ktime_get_ts64+0x86/0x230 [ 14.423390] kunit_try_run_case+0x1a5/0x480 [ 14.423416] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.423439] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.423473] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.423498] ? __kthread_parkme+0x82/0x180 [ 14.423538] ? preempt_count_sub+0x50/0x80 [ 14.423563] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.423587] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.423611] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.423635] kthread+0x337/0x6f0 [ 14.423656] ? trace_preempt_on+0x20/0xc0 [ 14.423681] ? __pfx_kthread+0x10/0x10 [ 14.423721] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.423744] ? calculate_sigpending+0x7b/0xa0 [ 14.423769] ? __pfx_kthread+0x10/0x10 [ 14.423792] ret_from_fork+0x116/0x1d0 [ 14.423811] ? __pfx_kthread+0x10/0x10 [ 14.423832] ret_from_fork_asm+0x1a/0x30 [ 14.423864] </TASK> [ 14.423877] [ 14.433447] Allocated by task 283: [ 14.433635] kasan_save_stack+0x45/0x70 [ 14.433948] kasan_save_track+0x18/0x40 [ 14.434300] kasan_save_alloc_info+0x3b/0x50 [ 14.434636] __kasan_kmalloc+0xb7/0xc0 [ 14.434942] __kmalloc_cache_noprof+0x189/0x420 [ 14.435267] kasan_atomics+0x95/0x310 [ 14.435433] kunit_try_run_case+0x1a5/0x480 [ 14.435650] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.436173] kthread+0x337/0x6f0 [ 14.436499] ret_from_fork+0x116/0x1d0 [ 14.436823] ret_from_fork_asm+0x1a/0x30 [ 14.437020] [ 14.437114] The buggy address belongs to the object at ffff8881031c4500 [ 14.437114] which belongs to the cache kmalloc-64 of size 64 [ 14.438138] The buggy address is located 0 bytes to the right of [ 14.438138] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.438729] [ 14.438822] The buggy address belongs to the physical page: [ 14.439063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.439743] flags: 0x200000000000000(node=0|zone=2) [ 14.439980] page_type: f5(slab) [ 14.440328] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.440698] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.441085] page dumped because: kasan: bad access detected [ 14.441554] [ 14.441652] Memory state around the buggy address: [ 14.442021] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.442615] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.443133] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.443695] ^ [ 14.443917] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.444167] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.444461] ================================================================== [ 14.946152] ================================================================== [ 14.946835] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 14.947650] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.948097] [ 14.948191] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.948235] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.948249] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.948272] Call Trace: [ 14.948288] <TASK> [ 14.948304] dump_stack_lvl+0x73/0xb0 [ 14.948336] print_report+0xd1/0x650 [ 14.948359] ? __virt_addr_valid+0x1db/0x2d0 [ 14.948381] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.948404] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.948427] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.948464] kasan_report+0x141/0x180 [ 14.948489] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.948518] kasan_check_range+0x10c/0x1c0 [ 14.948543] __kasan_check_write+0x18/0x20 [ 14.948564] kasan_atomics_helper+0x15b6/0x5450 [ 14.948588] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.948612] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.948638] ? kasan_atomics+0x152/0x310 [ 14.948668] kasan_atomics+0x1dc/0x310 [ 14.948710] ? __pfx_kasan_atomics+0x10/0x10 [ 14.948736] ? __pfx_read_tsc+0x10/0x10 [ 14.948758] ? ktime_get_ts64+0x86/0x230 [ 14.948784] kunit_try_run_case+0x1a5/0x480 [ 14.948810] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.948833] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.948857] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.948882] ? __kthread_parkme+0x82/0x180 [ 14.948904] ? preempt_count_sub+0x50/0x80 [ 14.948928] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.948953] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.948977] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.949001] kthread+0x337/0x6f0 [ 14.949023] ? trace_preempt_on+0x20/0xc0 [ 14.949048] ? __pfx_kthread+0x10/0x10 [ 14.949070] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.949091] ? calculate_sigpending+0x7b/0xa0 [ 14.949116] ? __pfx_kthread+0x10/0x10 [ 14.949140] ret_from_fork+0x116/0x1d0 [ 14.949161] ? __pfx_kthread+0x10/0x10 [ 14.949183] ret_from_fork_asm+0x1a/0x30 [ 14.949216] </TASK> [ 14.949229] [ 14.959210] Allocated by task 283: [ 14.959344] kasan_save_stack+0x45/0x70 [ 14.959575] kasan_save_track+0x18/0x40 [ 14.959767] kasan_save_alloc_info+0x3b/0x50 [ 14.960030] __kasan_kmalloc+0xb7/0xc0 [ 14.960229] __kmalloc_cache_noprof+0x189/0x420 [ 14.960468] kasan_atomics+0x95/0x310 [ 14.960651] kunit_try_run_case+0x1a5/0x480 [ 14.961182] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.961435] kthread+0x337/0x6f0 [ 14.961605] ret_from_fork+0x116/0x1d0 [ 14.961804] ret_from_fork_asm+0x1a/0x30 [ 14.962567] [ 14.962658] The buggy address belongs to the object at ffff8881031c4500 [ 14.962658] which belongs to the cache kmalloc-64 of size 64 [ 14.963024] The buggy address is located 0 bytes to the right of [ 14.963024] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.963388] [ 14.963472] The buggy address belongs to the physical page: [ 14.963983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.964238] flags: 0x200000000000000(node=0|zone=2) [ 14.964407] page_type: f5(slab) [ 14.964815] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.965524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.966240] page dumped because: kasan: bad access detected [ 14.966804] [ 14.966968] Memory state around the buggy address: [ 14.967318] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.967553] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.968076] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.968759] ^ [ 14.969236] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.969896] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.970118] ================================================================== [ 14.775538] ================================================================== [ 14.776239] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 14.776548] Read of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.777009] [ 14.777131] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.777175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.777190] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.777213] Call Trace: [ 14.777229] <TASK> [ 14.777245] dump_stack_lvl+0x73/0xb0 [ 14.777276] print_report+0xd1/0x650 [ 14.777299] ? __virt_addr_valid+0x1db/0x2d0 [ 14.777323] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.777347] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.777371] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.777400] kasan_report+0x141/0x180 [ 14.777424] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.777465] __asan_report_load4_noabort+0x18/0x20 [ 14.777491] kasan_atomics_helper+0x49e8/0x5450 [ 14.777516] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.777538] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.777565] ? kasan_atomics+0x152/0x310 [ 14.777593] kasan_atomics+0x1dc/0x310 [ 14.777617] ? __pfx_kasan_atomics+0x10/0x10 [ 14.777643] ? __pfx_read_tsc+0x10/0x10 [ 14.777665] ? ktime_get_ts64+0x86/0x230 [ 14.777701] kunit_try_run_case+0x1a5/0x480 [ 14.777726] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.777749] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.777774] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.777798] ? __kthread_parkme+0x82/0x180 [ 14.777819] ? preempt_count_sub+0x50/0x80 [ 14.777843] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.777868] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.777892] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.777917] kthread+0x337/0x6f0 [ 14.777938] ? trace_preempt_on+0x20/0xc0 [ 14.777963] ? __pfx_kthread+0x10/0x10 [ 14.777985] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.778007] ? calculate_sigpending+0x7b/0xa0 [ 14.778032] ? __pfx_kthread+0x10/0x10 [ 14.778054] ret_from_fork+0x116/0x1d0 [ 14.778074] ? __pfx_kthread+0x10/0x10 [ 14.778095] ret_from_fork_asm+0x1a/0x30 [ 14.778129] </TASK> [ 14.778142] [ 14.785420] Allocated by task 283: [ 14.785582] kasan_save_stack+0x45/0x70 [ 14.785911] kasan_save_track+0x18/0x40 [ 14.786113] kasan_save_alloc_info+0x3b/0x50 [ 14.786330] __kasan_kmalloc+0xb7/0xc0 [ 14.786533] __kmalloc_cache_noprof+0x189/0x420 [ 14.786867] kasan_atomics+0x95/0x310 [ 14.787051] kunit_try_run_case+0x1a5/0x480 [ 14.787233] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.787477] kthread+0x337/0x6f0 [ 14.787642] ret_from_fork+0x116/0x1d0 [ 14.787850] ret_from_fork_asm+0x1a/0x30 [ 14.787995] [ 14.788071] The buggy address belongs to the object at ffff8881031c4500 [ 14.788071] which belongs to the cache kmalloc-64 of size 64 [ 14.788603] The buggy address is located 0 bytes to the right of [ 14.788603] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.789205] [ 14.789286] The buggy address belongs to the physical page: [ 14.789514] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.790010] flags: 0x200000000000000(node=0|zone=2) [ 14.790218] page_type: f5(slab) [ 14.790370] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.790672] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.790967] page dumped because: kasan: bad access detected [ 14.791211] [ 14.791308] Memory state around the buggy address: [ 14.791524] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.791746] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.791967] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.792201] ^ [ 14.792441] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.792876] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.793193] ================================================================== [ 14.634317] ================================================================== [ 14.635913] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 14.636270] Read of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.636571] [ 14.636674] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.636899] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.636914] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.636938] Call Trace: [ 14.636956] <TASK> [ 14.636972] dump_stack_lvl+0x73/0xb0 [ 14.637002] print_report+0xd1/0x650 [ 14.637026] ? __virt_addr_valid+0x1db/0x2d0 [ 14.638268] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.638311] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.638337] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.638360] kasan_report+0x141/0x180 [ 14.638387] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.638415] __asan_report_load4_noabort+0x18/0x20 [ 14.638442] kasan_atomics_helper+0x4a36/0x5450 [ 14.638479] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.638503] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.638531] ? kasan_atomics+0x152/0x310 [ 14.638559] kasan_atomics+0x1dc/0x310 [ 14.638582] ? __pfx_kasan_atomics+0x10/0x10 [ 14.638608] ? __pfx_read_tsc+0x10/0x10 [ 14.638629] ? ktime_get_ts64+0x86/0x230 [ 14.638654] kunit_try_run_case+0x1a5/0x480 [ 14.638705] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.638738] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.638763] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.638788] ? __kthread_parkme+0x82/0x180 [ 14.638809] ? preempt_count_sub+0x50/0x80 [ 14.638835] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.638901] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.638927] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.638952] kthread+0x337/0x6f0 [ 14.638973] ? trace_preempt_on+0x20/0xc0 [ 14.638998] ? __pfx_kthread+0x10/0x10 [ 14.639020] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.639042] ? calculate_sigpending+0x7b/0xa0 [ 14.639067] ? __pfx_kthread+0x10/0x10 [ 14.639090] ret_from_fork+0x116/0x1d0 [ 14.639109] ? __pfx_kthread+0x10/0x10 [ 14.639131] ret_from_fork_asm+0x1a/0x30 [ 14.639163] </TASK> [ 14.639233] [ 14.649373] Allocated by task 283: [ 14.649555] kasan_save_stack+0x45/0x70 [ 14.650076] kasan_save_track+0x18/0x40 [ 14.650332] kasan_save_alloc_info+0x3b/0x50 [ 14.650548] __kasan_kmalloc+0xb7/0xc0 [ 14.650737] __kmalloc_cache_noprof+0x189/0x420 [ 14.650954] kasan_atomics+0x95/0x310 [ 14.651120] kunit_try_run_case+0x1a5/0x480 [ 14.651577] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.651791] kthread+0x337/0x6f0 [ 14.652109] ret_from_fork+0x116/0x1d0 [ 14.652604] ret_from_fork_asm+0x1a/0x30 [ 14.652885] [ 14.653199] The buggy address belongs to the object at ffff8881031c4500 [ 14.653199] which belongs to the cache kmalloc-64 of size 64 [ 14.653806] The buggy address is located 0 bytes to the right of [ 14.653806] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.654621] [ 14.654793] The buggy address belongs to the physical page: [ 14.655145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.655595] flags: 0x200000000000000(node=0|zone=2) [ 14.656042] page_type: f5(slab) [ 14.656207] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.656683] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.657015] page dumped because: kasan: bad access detected [ 14.657577] [ 14.657676] Memory state around the buggy address: [ 14.657911] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.658175] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.658553] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.658972] ^ [ 14.659186] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.659531] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.659816] ================================================================== [ 14.883594] ================================================================== [ 14.884052] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 14.884550] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.884957] [ 14.885079] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.885134] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.885148] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.885173] Call Trace: [ 14.885202] <TASK> [ 14.885219] dump_stack_lvl+0x73/0xb0 [ 14.885249] print_report+0xd1/0x650 [ 14.885273] ? __virt_addr_valid+0x1db/0x2d0 [ 14.885297] ? kasan_atomics_helper+0x1467/0x5450 [ 14.885319] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.885353] ? kasan_atomics_helper+0x1467/0x5450 [ 14.885375] kasan_report+0x141/0x180 [ 14.885403] ? kasan_atomics_helper+0x1467/0x5450 [ 14.885442] kasan_check_range+0x10c/0x1c0 [ 14.885476] __kasan_check_write+0x18/0x20 [ 14.885496] kasan_atomics_helper+0x1467/0x5450 [ 14.885520] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.885543] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.885569] ? kasan_atomics+0x152/0x310 [ 14.885606] kasan_atomics+0x1dc/0x310 [ 14.885629] ? __pfx_kasan_atomics+0x10/0x10 [ 14.885666] ? __pfx_read_tsc+0x10/0x10 [ 14.885688] ? ktime_get_ts64+0x86/0x230 [ 14.885712] kunit_try_run_case+0x1a5/0x480 [ 14.885737] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.885761] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.885794] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.885818] ? __kthread_parkme+0x82/0x180 [ 14.885840] ? preempt_count_sub+0x50/0x80 [ 14.885875] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.885900] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.885925] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.885949] kthread+0x337/0x6f0 [ 14.885971] ? trace_preempt_on+0x20/0xc0 [ 14.885996] ? __pfx_kthread+0x10/0x10 [ 14.886018] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.886040] ? calculate_sigpending+0x7b/0xa0 [ 14.886065] ? __pfx_kthread+0x10/0x10 [ 14.886087] ret_from_fork+0x116/0x1d0 [ 14.886106] ? __pfx_kthread+0x10/0x10 [ 14.886129] ret_from_fork_asm+0x1a/0x30 [ 14.886161] </TASK> [ 14.886173] [ 14.894232] Allocated by task 283: [ 14.894443] kasan_save_stack+0x45/0x70 [ 14.894659] kasan_save_track+0x18/0x40 [ 14.894850] kasan_save_alloc_info+0x3b/0x50 [ 14.895061] __kasan_kmalloc+0xb7/0xc0 [ 14.895233] __kmalloc_cache_noprof+0x189/0x420 [ 14.895462] kasan_atomics+0x95/0x310 [ 14.895650] kunit_try_run_case+0x1a5/0x480 [ 14.895882] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.896068] kthread+0x337/0x6f0 [ 14.896193] ret_from_fork+0x116/0x1d0 [ 14.896361] ret_from_fork_asm+0x1a/0x30 [ 14.896585] [ 14.896681] The buggy address belongs to the object at ffff8881031c4500 [ 14.896681] which belongs to the cache kmalloc-64 of size 64 [ 14.897214] The buggy address is located 0 bytes to the right of [ 14.897214] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.897674] [ 14.897851] The buggy address belongs to the physical page: [ 14.898132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.898469] flags: 0x200000000000000(node=0|zone=2) [ 14.898660] page_type: f5(slab) [ 14.898856] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.899233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.899550] page dumped because: kasan: bad access detected [ 14.899851] [ 14.899965] Memory state around the buggy address: [ 14.900167] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.900488] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.900814] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.901125] ^ [ 14.901366] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.901602] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.901818] ================================================================== [ 14.165560] ================================================================== [ 14.165876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 14.166264] Read of size 4 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.166542] [ 14.166659] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.166722] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.166736] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.166758] Call Trace: [ 14.166774] <TASK> [ 14.166791] dump_stack_lvl+0x73/0xb0 [ 14.166823] print_report+0xd1/0x650 [ 14.166847] ? __virt_addr_valid+0x1db/0x2d0 [ 14.166870] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.166892] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.166916] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.166939] kasan_report+0x141/0x180 [ 14.166962] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.166990] __asan_report_load4_noabort+0x18/0x20 [ 14.167015] kasan_atomics_helper+0x4b54/0x5450 [ 14.167038] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.167063] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.167089] ? kasan_atomics+0x152/0x310 [ 14.167117] kasan_atomics+0x1dc/0x310 [ 14.167141] ? __pfx_kasan_atomics+0x10/0x10 [ 14.167166] ? __pfx_read_tsc+0x10/0x10 [ 14.167249] ? ktime_get_ts64+0x86/0x230 [ 14.167274] kunit_try_run_case+0x1a5/0x480 [ 14.167301] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.167324] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.167349] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.167373] ? __kthread_parkme+0x82/0x180 [ 14.167394] ? preempt_count_sub+0x50/0x80 [ 14.167418] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.167443] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.167478] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.167502] kthread+0x337/0x6f0 [ 14.167522] ? trace_preempt_on+0x20/0xc0 [ 14.167547] ? __pfx_kthread+0x10/0x10 [ 14.167568] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.167590] ? calculate_sigpending+0x7b/0xa0 [ 14.167614] ? __pfx_kthread+0x10/0x10 [ 14.167637] ret_from_fork+0x116/0x1d0 [ 14.167656] ? __pfx_kthread+0x10/0x10 [ 14.167677] ret_from_fork_asm+0x1a/0x30 [ 14.167727] </TASK> [ 14.167741] [ 14.175680] Allocated by task 283: [ 14.175869] kasan_save_stack+0x45/0x70 [ 14.176076] kasan_save_track+0x18/0x40 [ 14.176311] kasan_save_alloc_info+0x3b/0x50 [ 14.176530] __kasan_kmalloc+0xb7/0xc0 [ 14.176686] __kmalloc_cache_noprof+0x189/0x420 [ 14.176886] kasan_atomics+0x95/0x310 [ 14.177078] kunit_try_run_case+0x1a5/0x480 [ 14.177543] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.177751] kthread+0x337/0x6f0 [ 14.177973] ret_from_fork+0x116/0x1d0 [ 14.178167] ret_from_fork_asm+0x1a/0x30 [ 14.178424] [ 14.178513] The buggy address belongs to the object at ffff8881031c4500 [ 14.178513] which belongs to the cache kmalloc-64 of size 64 [ 14.179041] The buggy address is located 0 bytes to the right of [ 14.179041] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.179686] [ 14.179775] The buggy address belongs to the physical page: [ 14.179951] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.180286] flags: 0x200000000000000(node=0|zone=2) [ 14.180532] page_type: f5(slab) [ 14.180701] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.181056] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.181337] page dumped because: kasan: bad access detected [ 14.181715] [ 14.181818] Memory state around the buggy address: [ 14.182055] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.182427] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.182742] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.182963] ^ [ 14.183123] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.183693] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.184081] ================================================================== [ 15.250701] ================================================================== [ 15.251056] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 15.251508] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 15.251863] [ 15.252006] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.252051] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.252077] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.252099] Call Trace: [ 15.252142] <TASK> [ 15.252161] dump_stack_lvl+0x73/0xb0 [ 15.252191] print_report+0xd1/0x650 [ 15.252224] ? __virt_addr_valid+0x1db/0x2d0 [ 15.252247] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.252271] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.252295] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.252318] kasan_report+0x141/0x180 [ 15.252340] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.252368] kasan_check_range+0x10c/0x1c0 [ 15.252392] __kasan_check_write+0x18/0x20 [ 15.252414] kasan_atomics_helper+0x1e12/0x5450 [ 15.252438] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.252471] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.252497] ? kasan_atomics+0x152/0x310 [ 15.252526] kasan_atomics+0x1dc/0x310 [ 15.252550] ? __pfx_kasan_atomics+0x10/0x10 [ 15.252576] ? __pfx_read_tsc+0x10/0x10 [ 15.252598] ? ktime_get_ts64+0x86/0x230 [ 15.252622] kunit_try_run_case+0x1a5/0x480 [ 15.252648] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.252673] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.252727] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.252752] ? __kthread_parkme+0x82/0x180 [ 15.252774] ? preempt_count_sub+0x50/0x80 [ 15.252809] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.252834] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.252860] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.252885] kthread+0x337/0x6f0 [ 15.252906] ? trace_preempt_on+0x20/0xc0 [ 15.252930] ? __pfx_kthread+0x10/0x10 [ 15.252952] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.252974] ? calculate_sigpending+0x7b/0xa0 [ 15.252999] ? __pfx_kthread+0x10/0x10 [ 15.253022] ret_from_fork+0x116/0x1d0 [ 15.253069] ? __pfx_kthread+0x10/0x10 [ 15.253091] ret_from_fork_asm+0x1a/0x30 [ 15.253122] </TASK> [ 15.253146] [ 15.261584] Allocated by task 283: [ 15.261814] kasan_save_stack+0x45/0x70 [ 15.262043] kasan_save_track+0x18/0x40 [ 15.262235] kasan_save_alloc_info+0x3b/0x50 [ 15.262474] __kasan_kmalloc+0xb7/0xc0 [ 15.262673] __kmalloc_cache_noprof+0x189/0x420 [ 15.262962] kasan_atomics+0x95/0x310 [ 15.263142] kunit_try_run_case+0x1a5/0x480 [ 15.263371] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.263624] kthread+0x337/0x6f0 [ 15.263964] ret_from_fork+0x116/0x1d0 [ 15.264145] ret_from_fork_asm+0x1a/0x30 [ 15.264355] [ 15.264489] The buggy address belongs to the object at ffff8881031c4500 [ 15.264489] which belongs to the cache kmalloc-64 of size 64 [ 15.265049] The buggy address is located 0 bytes to the right of [ 15.265049] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 15.265644] [ 15.265785] The buggy address belongs to the physical page: [ 15.266132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 15.266518] flags: 0x200000000000000(node=0|zone=2) [ 15.266791] page_type: f5(slab) [ 15.267023] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.267404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.267788] page dumped because: kasan: bad access detected [ 15.268085] [ 15.268184] Memory state around the buggy address: [ 15.268464] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.268780] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.269002] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.269217] ^ [ 15.269476] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.269957] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.270389] ================================================================== [ 14.834063] ================================================================== [ 14.834782] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 14.835104] Read of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 14.835331] [ 14.835421] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.835474] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.835488] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.835511] Call Trace: [ 14.835529] <TASK> [ 14.835546] dump_stack_lvl+0x73/0xb0 [ 14.835575] print_report+0xd1/0x650 [ 14.835599] ? __virt_addr_valid+0x1db/0x2d0 [ 14.835622] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.835645] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.835728] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.835753] kasan_report+0x141/0x180 [ 14.835788] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.835816] kasan_check_range+0x10c/0x1c0 [ 14.835841] __kasan_check_read+0x15/0x20 [ 14.835862] kasan_atomics_helper+0x13b5/0x5450 [ 14.835885] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.835909] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.835935] ? kasan_atomics+0x152/0x310 [ 14.835963] kasan_atomics+0x1dc/0x310 [ 14.835986] ? __pfx_kasan_atomics+0x10/0x10 [ 14.836012] ? __pfx_read_tsc+0x10/0x10 [ 14.836033] ? ktime_get_ts64+0x86/0x230 [ 14.836058] kunit_try_run_case+0x1a5/0x480 [ 14.836082] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.836106] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.836130] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.836154] ? __kthread_parkme+0x82/0x180 [ 14.836176] ? preempt_count_sub+0x50/0x80 [ 14.836232] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.836257] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.836319] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.836344] kthread+0x337/0x6f0 [ 14.836365] ? trace_preempt_on+0x20/0xc0 [ 14.836400] ? __pfx_kthread+0x10/0x10 [ 14.836422] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.836445] ? calculate_sigpending+0x7b/0xa0 [ 14.836476] ? __pfx_kthread+0x10/0x10 [ 14.836500] ret_from_fork+0x116/0x1d0 [ 14.836519] ? __pfx_kthread+0x10/0x10 [ 14.836541] ret_from_fork_asm+0x1a/0x30 [ 14.836572] </TASK> [ 14.836584] [ 14.845515] Allocated by task 283: [ 14.846006] kasan_save_stack+0x45/0x70 [ 14.846274] kasan_save_track+0x18/0x40 [ 14.846601] kasan_save_alloc_info+0x3b/0x50 [ 14.846971] __kasan_kmalloc+0xb7/0xc0 [ 14.847154] __kmalloc_cache_noprof+0x189/0x420 [ 14.847369] kasan_atomics+0x95/0x310 [ 14.847557] kunit_try_run_case+0x1a5/0x480 [ 14.848088] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.848385] kthread+0x337/0x6f0 [ 14.848817] ret_from_fork+0x116/0x1d0 [ 14.849082] ret_from_fork_asm+0x1a/0x30 [ 14.849282] [ 14.849381] The buggy address belongs to the object at ffff8881031c4500 [ 14.849381] which belongs to the cache kmalloc-64 of size 64 [ 14.850190] The buggy address is located 0 bytes to the right of [ 14.850190] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 14.851067] [ 14.851174] The buggy address belongs to the physical page: [ 14.851418] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 14.851681] flags: 0x200000000000000(node=0|zone=2) [ 14.852054] page_type: f5(slab) [ 14.852328] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.852764] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.853156] page dumped because: kasan: bad access detected [ 14.853514] [ 14.853971] Memory state around the buggy address: [ 14.854202] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.854604] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.855008] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.855381] ^ [ 14.855717] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.856120] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.856400] ================================================================== [ 15.114959] ================================================================== [ 15.115324] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 15.115690] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 15.115983] [ 15.116665] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.116711] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.116725] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.116748] Call Trace: [ 15.116821] <TASK> [ 15.116837] dump_stack_lvl+0x73/0xb0 [ 15.116866] print_report+0xd1/0x650 [ 15.116890] ? __virt_addr_valid+0x1db/0x2d0 [ 15.116913] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.116937] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.116960] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.116984] kasan_report+0x141/0x180 [ 15.117008] ? kasan_atomics_helper+0x1a7f/0x5450 [ 15.117674] kasan_check_range+0x10c/0x1c0 [ 15.117705] __kasan_check_write+0x18/0x20 [ 15.117727] kasan_atomics_helper+0x1a7f/0x5450 [ 15.117752] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.117776] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.117803] ? kasan_atomics+0x152/0x310 [ 15.117831] kasan_atomics+0x1dc/0x310 [ 15.117854] ? __pfx_kasan_atomics+0x10/0x10 [ 15.117881] ? __pfx_read_tsc+0x10/0x10 [ 15.117902] ? ktime_get_ts64+0x86/0x230 [ 15.117928] kunit_try_run_case+0x1a5/0x480 [ 15.117952] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.117976] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.118001] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.118024] ? __kthread_parkme+0x82/0x180 [ 15.118217] ? preempt_count_sub+0x50/0x80 [ 15.118243] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.118269] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.118295] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.118319] kthread+0x337/0x6f0 [ 15.118340] ? trace_preempt_on+0x20/0xc0 [ 15.118365] ? __pfx_kthread+0x10/0x10 [ 15.118387] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.118409] ? calculate_sigpending+0x7b/0xa0 [ 15.118434] ? __pfx_kthread+0x10/0x10 [ 15.118471] ret_from_fork+0x116/0x1d0 [ 15.118491] ? __pfx_kthread+0x10/0x10 [ 15.118514] ret_from_fork_asm+0x1a/0x30 [ 15.118546] </TASK> [ 15.118559] [ 15.132836] Allocated by task 283: [ 15.133110] kasan_save_stack+0x45/0x70 [ 15.133429] kasan_save_track+0x18/0x40 [ 15.133582] kasan_save_alloc_info+0x3b/0x50 [ 15.133913] __kasan_kmalloc+0xb7/0xc0 [ 15.134279] __kmalloc_cache_noprof+0x189/0x420 [ 15.134725] kasan_atomics+0x95/0x310 [ 15.134865] kunit_try_run_case+0x1a5/0x480 [ 15.135017] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.135195] kthread+0x337/0x6f0 [ 15.135317] ret_from_fork+0x116/0x1d0 [ 15.135462] ret_from_fork_asm+0x1a/0x30 [ 15.135648] [ 15.135745] The buggy address belongs to the object at ffff8881031c4500 [ 15.135745] which belongs to the cache kmalloc-64 of size 64 [ 15.136270] The buggy address is located 0 bytes to the right of [ 15.136270] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 15.137116] [ 15.137202] The buggy address belongs to the physical page: [ 15.137439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 15.137698] flags: 0x200000000000000(node=0|zone=2) [ 15.138053] page_type: f5(slab) [ 15.138535] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.139063] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.139551] page dumped because: kasan: bad access detected [ 15.140144] [ 15.140401] Memory state around the buggy address: [ 15.140889] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.141225] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.141544] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.142137] ^ [ 15.142439] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.143058] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.143363] ================================================================== [ 15.188932] ================================================================== [ 15.189484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 15.189964] Read of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 15.190291] [ 15.190434] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.190522] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.190537] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.190587] Call Trace: [ 15.190604] <TASK> [ 15.190621] dump_stack_lvl+0x73/0xb0 [ 15.190653] print_report+0xd1/0x650 [ 15.190677] ? __virt_addr_valid+0x1db/0x2d0 [ 15.190700] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.190723] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.190756] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.190780] kasan_report+0x141/0x180 [ 15.190822] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.190859] __asan_report_load8_noabort+0x18/0x20 [ 15.190884] kasan_atomics_helper+0x4f30/0x5450 [ 15.190919] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.190944] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.190996] ? kasan_atomics+0x152/0x310 [ 15.191024] kasan_atomics+0x1dc/0x310 [ 15.191048] ? __pfx_kasan_atomics+0x10/0x10 [ 15.191084] ? __pfx_read_tsc+0x10/0x10 [ 15.191107] ? ktime_get_ts64+0x86/0x230 [ 15.191157] kunit_try_run_case+0x1a5/0x480 [ 15.191182] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.191205] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.191240] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.191289] ? __kthread_parkme+0x82/0x180 [ 15.191310] ? preempt_count_sub+0x50/0x80 [ 15.191336] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.191371] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.191394] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.191443] kthread+0x337/0x6f0 [ 15.191480] ? trace_preempt_on+0x20/0xc0 [ 15.191504] ? __pfx_kthread+0x10/0x10 [ 15.191527] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.191548] ? calculate_sigpending+0x7b/0xa0 [ 15.191599] ? __pfx_kthread+0x10/0x10 [ 15.191621] ret_from_fork+0x116/0x1d0 [ 15.191642] ? __pfx_kthread+0x10/0x10 [ 15.191674] ret_from_fork_asm+0x1a/0x30 [ 15.191712] </TASK> [ 15.191725] [ 15.200054] Allocated by task 283: [ 15.200298] kasan_save_stack+0x45/0x70 [ 15.200466] kasan_save_track+0x18/0x40 [ 15.200602] kasan_save_alloc_info+0x3b/0x50 [ 15.200933] __kasan_kmalloc+0xb7/0xc0 [ 15.201125] __kmalloc_cache_noprof+0x189/0x420 [ 15.201417] kasan_atomics+0x95/0x310 [ 15.201685] kunit_try_run_case+0x1a5/0x480 [ 15.201943] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.202192] kthread+0x337/0x6f0 [ 15.202319] ret_from_fork+0x116/0x1d0 [ 15.202566] ret_from_fork_asm+0x1a/0x30 [ 15.202889] [ 15.203029] The buggy address belongs to the object at ffff8881031c4500 [ 15.203029] which belongs to the cache kmalloc-64 of size 64 [ 15.203541] The buggy address is located 0 bytes to the right of [ 15.203541] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 15.204138] [ 15.204237] The buggy address belongs to the physical page: [ 15.204537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 15.204881] flags: 0x200000000000000(node=0|zone=2) [ 15.205050] page_type: f5(slab) [ 15.205175] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.205525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.206138] page dumped because: kasan: bad access detected [ 15.206391] [ 15.206479] Memory state around the buggy address: [ 15.206639] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.206860] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.207166] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.207603] ^ [ 15.207953] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.208379] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.208719] ================================================================== [ 15.371352] ================================================================== [ 15.371889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 15.372282] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 15.372630] [ 15.372746] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.372819] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.372833] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.372868] Call Trace: [ 15.372884] <TASK> [ 15.372900] dump_stack_lvl+0x73/0xb0 [ 15.372931] print_report+0xd1/0x650 [ 15.372982] ? __virt_addr_valid+0x1db/0x2d0 [ 15.373005] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.373027] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.373084] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.373107] kasan_report+0x141/0x180 [ 15.373131] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.373170] kasan_check_range+0x10c/0x1c0 [ 15.373195] __kasan_check_write+0x18/0x20 [ 15.373215] kasan_atomics_helper+0x20c8/0x5450 [ 15.373240] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.373263] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.373316] ? kasan_atomics+0x152/0x310 [ 15.373344] kasan_atomics+0x1dc/0x310 [ 15.373384] ? __pfx_kasan_atomics+0x10/0x10 [ 15.373411] ? __pfx_read_tsc+0x10/0x10 [ 15.373432] ? ktime_get_ts64+0x86/0x230 [ 15.373465] kunit_try_run_case+0x1a5/0x480 [ 15.373491] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.373515] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.373539] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.373564] ? __kthread_parkme+0x82/0x180 [ 15.373585] ? preempt_count_sub+0x50/0x80 [ 15.373609] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.373635] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.373659] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.373712] kthread+0x337/0x6f0 [ 15.373735] ? trace_preempt_on+0x20/0xc0 [ 15.373758] ? __pfx_kthread+0x10/0x10 [ 15.373791] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.373814] ? calculate_sigpending+0x7b/0xa0 [ 15.373838] ? __pfx_kthread+0x10/0x10 [ 15.373861] ret_from_fork+0x116/0x1d0 [ 15.373881] ? __pfx_kthread+0x10/0x10 [ 15.373903] ret_from_fork_asm+0x1a/0x30 [ 15.373937] </TASK> [ 15.373950] [ 15.381907] Allocated by task 283: [ 15.382041] kasan_save_stack+0x45/0x70 [ 15.382184] kasan_save_track+0x18/0x40 [ 15.382321] kasan_save_alloc_info+0x3b/0x50 [ 15.382486] __kasan_kmalloc+0xb7/0xc0 [ 15.382622] __kmalloc_cache_noprof+0x189/0x420 [ 15.383590] kasan_atomics+0x95/0x310 [ 15.383822] kunit_try_run_case+0x1a5/0x480 [ 15.384035] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.384293] kthread+0x337/0x6f0 [ 15.384427] ret_from_fork+0x116/0x1d0 [ 15.384575] ret_from_fork_asm+0x1a/0x30 [ 15.384718] [ 15.384794] The buggy address belongs to the object at ffff8881031c4500 [ 15.384794] which belongs to the cache kmalloc-64 of size 64 [ 15.385340] The buggy address is located 0 bytes to the right of [ 15.385340] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 15.385739] [ 15.385849] The buggy address belongs to the physical page: [ 15.386136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 15.386558] flags: 0x200000000000000(node=0|zone=2) [ 15.387423] page_type: f5(slab) [ 15.387582] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.387873] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.388212] page dumped because: kasan: bad access detected [ 15.388835] [ 15.388988] Memory state around the buggy address: [ 15.389149] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.389365] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.389606] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.390445] ^ [ 15.390690] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.390927] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.391149] ================================================================== [ 15.419920] ================================================================== [ 15.420222] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 15.420913] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 15.421262] [ 15.421370] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.421423] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.421437] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.421472] Call Trace: [ 15.421490] <TASK> [ 15.421507] dump_stack_lvl+0x73/0xb0 [ 15.421538] print_report+0xd1/0x650 [ 15.421563] ? __virt_addr_valid+0x1db/0x2d0 [ 15.421587] ? kasan_atomics_helper+0x218a/0x5450 [ 15.421609] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.421634] ? kasan_atomics_helper+0x218a/0x5450 [ 15.421657] kasan_report+0x141/0x180 [ 15.421681] ? kasan_atomics_helper+0x218a/0x5450 [ 15.421709] kasan_check_range+0x10c/0x1c0 [ 15.421734] __kasan_check_write+0x18/0x20 [ 15.421755] kasan_atomics_helper+0x218a/0x5450 [ 15.421779] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.421803] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.421847] ? kasan_atomics+0x152/0x310 [ 15.421876] kasan_atomics+0x1dc/0x310 [ 15.421900] ? __pfx_kasan_atomics+0x10/0x10 [ 15.421925] ? __pfx_read_tsc+0x10/0x10 [ 15.421947] ? ktime_get_ts64+0x86/0x230 [ 15.421972] kunit_try_run_case+0x1a5/0x480 [ 15.421998] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.422021] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.422045] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.422070] ? __kthread_parkme+0x82/0x180 [ 15.422091] ? preempt_count_sub+0x50/0x80 [ 15.422115] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.422141] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.422165] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.422192] kthread+0x337/0x6f0 [ 15.422213] ? trace_preempt_on+0x20/0xc0 [ 15.422238] ? __pfx_kthread+0x10/0x10 [ 15.422261] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.422283] ? calculate_sigpending+0x7b/0xa0 [ 15.422308] ? __pfx_kthread+0x10/0x10 [ 15.422330] ret_from_fork+0x116/0x1d0 [ 15.422350] ? __pfx_kthread+0x10/0x10 [ 15.422371] ret_from_fork_asm+0x1a/0x30 [ 15.422403] </TASK> [ 15.422416] [ 15.432297] Allocated by task 283: [ 15.432472] kasan_save_stack+0x45/0x70 [ 15.432620] kasan_save_track+0x18/0x40 [ 15.432981] kasan_save_alloc_info+0x3b/0x50 [ 15.433191] __kasan_kmalloc+0xb7/0xc0 [ 15.433361] __kmalloc_cache_noprof+0x189/0x420 [ 15.433588] kasan_atomics+0x95/0x310 [ 15.433810] kunit_try_run_case+0x1a5/0x480 [ 15.433979] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.434255] kthread+0x337/0x6f0 [ 15.434424] ret_from_fork+0x116/0x1d0 [ 15.434581] ret_from_fork_asm+0x1a/0x30 [ 15.434764] [ 15.434841] The buggy address belongs to the object at ffff8881031c4500 [ 15.434841] which belongs to the cache kmalloc-64 of size 64 [ 15.435345] The buggy address is located 0 bytes to the right of [ 15.435345] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 15.435729] [ 15.435809] The buggy address belongs to the physical page: [ 15.436066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 15.436419] flags: 0x200000000000000(node=0|zone=2) [ 15.437179] page_type: f5(slab) [ 15.437357] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.437610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.438178] page dumped because: kasan: bad access detected [ 15.438439] [ 15.438530] Memory state around the buggy address: [ 15.438777] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.439081] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.439396] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.439710] ^ [ 15.439929] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.440251] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.440510] ================================================================== [ 15.033340] ================================================================== [ 15.033657] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 15.034304] Write of size 8 at addr ffff8881031c4530 by task kunit_try_catch/283 [ 15.034845] [ 15.034958] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.035162] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.035178] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.035203] Call Trace: [ 15.035220] <TASK> [ 15.035239] dump_stack_lvl+0x73/0xb0 [ 15.035270] print_report+0xd1/0x650 [ 15.035293] ? __virt_addr_valid+0x1db/0x2d0 [ 15.035317] ? kasan_atomics_helper+0x1818/0x5450 [ 15.035339] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.035363] ? kasan_atomics_helper+0x1818/0x5450 [ 15.035386] kasan_report+0x141/0x180 [ 15.035410] ? kasan_atomics_helper+0x1818/0x5450 [ 15.035438] kasan_check_range+0x10c/0x1c0 [ 15.035477] __kasan_check_write+0x18/0x20 [ 15.035499] kasan_atomics_helper+0x1818/0x5450 [ 15.035522] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.035546] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.035571] ? kasan_atomics+0x152/0x310 [ 15.035600] kasan_atomics+0x1dc/0x310 [ 15.035624] ? __pfx_kasan_atomics+0x10/0x10 [ 15.035650] ? __pfx_read_tsc+0x10/0x10 [ 15.035695] ? ktime_get_ts64+0x86/0x230 [ 15.035720] kunit_try_run_case+0x1a5/0x480 [ 15.035745] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.035769] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.035793] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.035818] ? __kthread_parkme+0x82/0x180 [ 15.035840] ? preempt_count_sub+0x50/0x80 [ 15.035863] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.035888] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.035913] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.035937] kthread+0x337/0x6f0 [ 15.035959] ? trace_preempt_on+0x20/0xc0 [ 15.035982] ? __pfx_kthread+0x10/0x10 [ 15.036005] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.036027] ? calculate_sigpending+0x7b/0xa0 [ 15.036052] ? __pfx_kthread+0x10/0x10 [ 15.036074] ret_from_fork+0x116/0x1d0 [ 15.036094] ? __pfx_kthread+0x10/0x10 [ 15.036116] ret_from_fork_asm+0x1a/0x30 [ 15.036148] </TASK> [ 15.036161] [ 15.045461] Allocated by task 283: [ 15.045604] kasan_save_stack+0x45/0x70 [ 15.046249] kasan_save_track+0x18/0x40 [ 15.046436] kasan_save_alloc_info+0x3b/0x50 [ 15.046606] __kasan_kmalloc+0xb7/0xc0 [ 15.046957] __kmalloc_cache_noprof+0x189/0x420 [ 15.047287] kasan_atomics+0x95/0x310 [ 15.047533] kunit_try_run_case+0x1a5/0x480 [ 15.047866] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.048172] kthread+0x337/0x6f0 [ 15.048300] ret_from_fork+0x116/0x1d0 [ 15.048620] ret_from_fork_asm+0x1a/0x30 [ 15.048784] [ 15.049005] The buggy address belongs to the object at ffff8881031c4500 [ 15.049005] which belongs to the cache kmalloc-64 of size 64 [ 15.049477] The buggy address is located 0 bytes to the right of [ 15.049477] allocated 48-byte region [ffff8881031c4500, ffff8881031c4530) [ 15.050155] [ 15.050327] The buggy address belongs to the physical page: [ 15.050697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c4 [ 15.051102] flags: 0x200000000000000(node=0|zone=2) [ 15.051297] page_type: f5(slab) [ 15.051593] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.052018] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.052445] page dumped because: kasan: bad access detected [ 15.052820] [ 15.052922] Memory state around the buggy address: [ 15.053223] ffff8881031c4400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.053553] ffff8881031c4480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.054049] >ffff8881031c4500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.054344] ^ [ 15.054668] ffff8881031c4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.054993] ffff8881031c4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.055282] ==================================================================