Date
July 9, 2025, 2:07 p.m.
Environment | |
---|---|
qemu-x86_64 |
[ 15.404007] ================================================================== [ 15.404829] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 15.405274] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 15.405859] [ 15.406102] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.406152] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.406165] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.406292] Call Trace: [ 15.406310] <TASK> [ 15.406329] dump_stack_lvl+0x73/0xb0 [ 15.406362] print_report+0xd1/0x650 [ 15.406386] ? __virt_addr_valid+0x1db/0x2d0 [ 15.406413] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.406437] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.406466] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.406489] kasan_report+0x141/0x180 [ 15.406513] ? kasan_atomics_helper+0x7c7/0x5450 [ 15.406541] kasan_check_range+0x10c/0x1c0 [ 15.406566] __kasan_check_write+0x18/0x20 [ 15.406586] kasan_atomics_helper+0x7c7/0x5450 [ 15.406624] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.406648] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.406674] ? kasan_atomics+0x152/0x310 [ 15.406701] kasan_atomics+0x1dc/0x310 [ 15.406724] ? __pfx_kasan_atomics+0x10/0x10 [ 15.406750] ? __pfx_read_tsc+0x10/0x10 [ 15.406783] ? ktime_get_ts64+0x86/0x230 [ 15.406809] kunit_try_run_case+0x1a5/0x480 [ 15.406842] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.406866] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.406891] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.406917] ? __kthread_parkme+0x82/0x180 [ 15.406939] ? preempt_count_sub+0x50/0x80 [ 15.406965] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.406990] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.407016] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.407042] kthread+0x337/0x6f0 [ 15.407061] ? trace_preempt_on+0x20/0xc0 [ 15.407087] ? __pfx_kthread+0x10/0x10 [ 15.407108] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.407130] ? calculate_sigpending+0x7b/0xa0 [ 15.407156] ? __pfx_kthread+0x10/0x10 [ 15.407178] ret_from_fork+0x116/0x1d0 [ 15.407198] ? __pfx_kthread+0x10/0x10 [ 15.407219] ret_from_fork_asm+0x1a/0x30 [ 15.407251] </TASK> [ 15.407262] [ 15.418207] Allocated by task 282: [ 15.418502] kasan_save_stack+0x45/0x70 [ 15.418798] kasan_save_track+0x18/0x40 [ 15.419010] kasan_save_alloc_info+0x3b/0x50 [ 15.419369] __kasan_kmalloc+0xb7/0xc0 [ 15.419553] __kmalloc_cache_noprof+0x189/0x420 [ 15.419775] kasan_atomics+0x95/0x310 [ 15.420250] kunit_try_run_case+0x1a5/0x480 [ 15.420413] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.420824] kthread+0x337/0x6f0 [ 15.421107] ret_from_fork+0x116/0x1d0 [ 15.421246] ret_from_fork_asm+0x1a/0x30 [ 15.421589] [ 15.421697] The buggy address belongs to the object at ffff8881029cd380 [ 15.421697] which belongs to the cache kmalloc-64 of size 64 [ 15.422514] The buggy address is located 0 bytes to the right of [ 15.422514] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 15.423146] [ 15.423361] The buggy address belongs to the physical page: [ 15.423550] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 15.424083] flags: 0x200000000000000(node=0|zone=2) [ 15.424318] page_type: f5(slab) [ 15.424474] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.424947] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.425262] page dumped because: kasan: bad access detected [ 15.425485] [ 15.425558] Memory state around the buggy address: [ 15.425768] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.426386] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.426650] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.427169] ^ [ 15.427437] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.427712] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.428171] ================================================================== [ 15.881625] ================================================================== [ 15.882423] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 15.883193] Read of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 15.883707] [ 15.883811] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.883857] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.883905] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.883927] Call Trace: [ 15.883946] <TASK> [ 15.883965] dump_stack_lvl+0x73/0xb0 [ 15.883995] print_report+0xd1/0x650 [ 15.884045] ? __virt_addr_valid+0x1db/0x2d0 [ 15.884070] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.884092] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.884116] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.884139] kasan_report+0x141/0x180 [ 15.884161] ? kasan_atomics_helper+0x49ce/0x5450 [ 15.884188] __asan_report_load4_noabort+0x18/0x20 [ 15.884214] kasan_atomics_helper+0x49ce/0x5450 [ 15.884237] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.884261] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.884291] ? kasan_atomics+0x152/0x310 [ 15.884320] kasan_atomics+0x1dc/0x310 [ 15.884344] ? __pfx_kasan_atomics+0x10/0x10 [ 15.884370] ? __pfx_read_tsc+0x10/0x10 [ 15.884391] ? ktime_get_ts64+0x86/0x230 [ 15.884418] kunit_try_run_case+0x1a5/0x480 [ 15.884444] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.884467] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.884493] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.884521] ? __kthread_parkme+0x82/0x180 [ 15.884542] ? preempt_count_sub+0x50/0x80 [ 15.884567] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.884603] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.884628] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.884654] kthread+0x337/0x6f0 [ 15.884673] ? trace_preempt_on+0x20/0xc0 [ 15.884699] ? __pfx_kthread+0x10/0x10 [ 15.884720] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.884742] ? calculate_sigpending+0x7b/0xa0 [ 15.884768] ? __pfx_kthread+0x10/0x10 [ 15.884801] ret_from_fork+0x116/0x1d0 [ 15.884820] ? __pfx_kthread+0x10/0x10 [ 15.884841] ret_from_fork_asm+0x1a/0x30 [ 15.884874] </TASK> [ 15.884885] [ 15.898044] Allocated by task 282: [ 15.898389] kasan_save_stack+0x45/0x70 [ 15.898793] kasan_save_track+0x18/0x40 [ 15.899030] kasan_save_alloc_info+0x3b/0x50 [ 15.899176] __kasan_kmalloc+0xb7/0xc0 [ 15.899304] __kmalloc_cache_noprof+0x189/0x420 [ 15.899455] kasan_atomics+0x95/0x310 [ 15.899584] kunit_try_run_case+0x1a5/0x480 [ 15.899737] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.900234] kthread+0x337/0x6f0 [ 15.900525] ret_from_fork+0x116/0x1d0 [ 15.900916] ret_from_fork_asm+0x1a/0x30 [ 15.901352] [ 15.901533] The buggy address belongs to the object at ffff8881029cd380 [ 15.901533] which belongs to the cache kmalloc-64 of size 64 [ 15.902617] The buggy address is located 0 bytes to the right of [ 15.902617] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 15.903867] [ 15.904027] The buggy address belongs to the physical page: [ 15.904530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 15.905224] flags: 0x200000000000000(node=0|zone=2) [ 15.905472] page_type: f5(slab) [ 15.905590] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.905931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.906564] page dumped because: kasan: bad access detected [ 15.907080] [ 15.907263] Memory state around the buggy address: [ 15.907717] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.908319] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.908535] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.908759] ^ [ 15.909189] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.909839] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.910565] ================================================================== [ 16.240027] ================================================================== [ 16.240361] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 16.240696] Read of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 16.241296] [ 16.241515] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.241563] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.241577] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.241699] Call Trace: [ 16.241717] <TASK> [ 16.241736] dump_stack_lvl+0x73/0xb0 [ 16.241769] print_report+0xd1/0x650 [ 16.241802] ? __virt_addr_valid+0x1db/0x2d0 [ 16.241826] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.241884] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.241910] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.241932] kasan_report+0x141/0x180 [ 16.241956] ? kasan_atomics_helper+0x4f30/0x5450 [ 16.241983] __asan_report_load8_noabort+0x18/0x20 [ 16.242009] kasan_atomics_helper+0x4f30/0x5450 [ 16.242033] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.242056] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.242082] ? kasan_atomics+0x152/0x310 [ 16.242109] kasan_atomics+0x1dc/0x310 [ 16.242132] ? __pfx_kasan_atomics+0x10/0x10 [ 16.242158] ? __pfx_read_tsc+0x10/0x10 [ 16.242179] ? ktime_get_ts64+0x86/0x230 [ 16.242205] kunit_try_run_case+0x1a5/0x480 [ 16.242230] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.242254] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.242278] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.242303] ? __kthread_parkme+0x82/0x180 [ 16.242325] ? preempt_count_sub+0x50/0x80 [ 16.242350] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.242375] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.242401] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.242427] kthread+0x337/0x6f0 [ 16.242446] ? trace_preempt_on+0x20/0xc0 [ 16.242471] ? __pfx_kthread+0x10/0x10 [ 16.242493] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.242516] ? calculate_sigpending+0x7b/0xa0 [ 16.242541] ? __pfx_kthread+0x10/0x10 [ 16.242563] ret_from_fork+0x116/0x1d0 [ 16.242583] ? __pfx_kthread+0x10/0x10 [ 16.242617] ret_from_fork_asm+0x1a/0x30 [ 16.242649] </TASK> [ 16.242661] [ 16.251575] Allocated by task 282: [ 16.251824] kasan_save_stack+0x45/0x70 [ 16.252071] kasan_save_track+0x18/0x40 [ 16.252282] kasan_save_alloc_info+0x3b/0x50 [ 16.252491] __kasan_kmalloc+0xb7/0xc0 [ 16.252699] __kmalloc_cache_noprof+0x189/0x420 [ 16.252858] kasan_atomics+0x95/0x310 [ 16.252992] kunit_try_run_case+0x1a5/0x480 [ 16.253201] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.253689] kthread+0x337/0x6f0 [ 16.253814] ret_from_fork+0x116/0x1d0 [ 16.254128] ret_from_fork_asm+0x1a/0x30 [ 16.254320] [ 16.254425] The buggy address belongs to the object at ffff8881029cd380 [ 16.254425] which belongs to the cache kmalloc-64 of size 64 [ 16.254858] The buggy address is located 0 bytes to the right of [ 16.254858] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 16.255535] [ 16.255627] The buggy address belongs to the physical page: [ 16.255806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 16.256373] flags: 0x200000000000000(node=0|zone=2) [ 16.257219] page_type: f5(slab) [ 16.257741] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.258198] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.258631] page dumped because: kasan: bad access detected [ 16.259000] [ 16.259088] Memory state around the buggy address: [ 16.259470] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.259927] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.260297] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.260707] ^ [ 16.261072] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.261364] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.261670] ================================================================== [ 15.669890] ================================================================== [ 15.670131] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 15.670977] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 15.671414] [ 15.671525] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.671570] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.671582] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.671679] Call Trace: [ 15.671749] <TASK> [ 15.671768] dump_stack_lvl+0x73/0xb0 [ 15.671799] print_report+0xd1/0x650 [ 15.671823] ? __virt_addr_valid+0x1db/0x2d0 [ 15.671846] ? kasan_atomics_helper+0xf10/0x5450 [ 15.671869] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.671895] ? kasan_atomics_helper+0xf10/0x5450 [ 15.671918] kasan_report+0x141/0x180 [ 15.671941] ? kasan_atomics_helper+0xf10/0x5450 [ 15.671970] kasan_check_range+0x10c/0x1c0 [ 15.672097] __kasan_check_write+0x18/0x20 [ 15.672119] kasan_atomics_helper+0xf10/0x5450 [ 15.672142] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.672167] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.672194] ? kasan_atomics+0x152/0x310 [ 15.672221] kasan_atomics+0x1dc/0x310 [ 15.672245] ? __pfx_kasan_atomics+0x10/0x10 [ 15.672271] ? __pfx_read_tsc+0x10/0x10 [ 15.672292] ? ktime_get_ts64+0x86/0x230 [ 15.672318] kunit_try_run_case+0x1a5/0x480 [ 15.672343] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.672367] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.672392] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.672416] ? __kthread_parkme+0x82/0x180 [ 15.672438] ? preempt_count_sub+0x50/0x80 [ 15.672463] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.672488] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.672513] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.672540] kthread+0x337/0x6f0 [ 15.672559] ? trace_preempt_on+0x20/0xc0 [ 15.672585] ? __pfx_kthread+0x10/0x10 [ 15.672618] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.672640] ? calculate_sigpending+0x7b/0xa0 [ 15.672666] ? __pfx_kthread+0x10/0x10 [ 15.672688] ret_from_fork+0x116/0x1d0 [ 15.672708] ? __pfx_kthread+0x10/0x10 [ 15.672728] ret_from_fork_asm+0x1a/0x30 [ 15.672760] </TASK> [ 15.672772] [ 15.682942] Allocated by task 282: [ 15.683128] kasan_save_stack+0x45/0x70 [ 15.683330] kasan_save_track+0x18/0x40 [ 15.683511] kasan_save_alloc_info+0x3b/0x50 [ 15.683734] __kasan_kmalloc+0xb7/0xc0 [ 15.683924] __kmalloc_cache_noprof+0x189/0x420 [ 15.684530] kasan_atomics+0x95/0x310 [ 15.684688] kunit_try_run_case+0x1a5/0x480 [ 15.685073] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.685294] kthread+0x337/0x6f0 [ 15.685569] ret_from_fork+0x116/0x1d0 [ 15.685730] ret_from_fork_asm+0x1a/0x30 [ 15.686084] [ 15.686180] The buggy address belongs to the object at ffff8881029cd380 [ 15.686180] which belongs to the cache kmalloc-64 of size 64 [ 15.686747] The buggy address is located 0 bytes to the right of [ 15.686747] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 15.687525] [ 15.687644] The buggy address belongs to the physical page: [ 15.688054] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 15.688423] flags: 0x200000000000000(node=0|zone=2) [ 15.688742] page_type: f5(slab) [ 15.689007] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.689330] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.689632] page dumped because: kasan: bad access detected [ 15.690066] [ 15.690151] Memory state around the buggy address: [ 15.690369] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.690772] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.691187] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.691475] ^ [ 15.691795] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.692169] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.692454] ================================================================== [ 16.202062] ================================================================== [ 16.202548] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 16.202944] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 16.203234] [ 16.203346] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.203390] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.203402] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.203424] Call Trace: [ 16.203440] <TASK> [ 16.203457] dump_stack_lvl+0x73/0xb0 [ 16.203485] print_report+0xd1/0x650 [ 16.203508] ? __virt_addr_valid+0x1db/0x2d0 [ 16.203532] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.203554] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.203578] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.203616] kasan_report+0x141/0x180 [ 16.203638] ? kasan_atomics_helper+0x1b22/0x5450 [ 16.203666] kasan_check_range+0x10c/0x1c0 [ 16.203690] __kasan_check_write+0x18/0x20 [ 16.203711] kasan_atomics_helper+0x1b22/0x5450 [ 16.203734] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.203757] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.203782] ? kasan_atomics+0x152/0x310 [ 16.203808] kasan_atomics+0x1dc/0x310 [ 16.203831] ? __pfx_kasan_atomics+0x10/0x10 [ 16.203856] ? __pfx_read_tsc+0x10/0x10 [ 16.203879] ? ktime_get_ts64+0x86/0x230 [ 16.203903] kunit_try_run_case+0x1a5/0x480 [ 16.203928] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.203952] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.203976] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.204000] ? __kthread_parkme+0x82/0x180 [ 16.204021] ? preempt_count_sub+0x50/0x80 [ 16.204046] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.204070] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.204096] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.204122] kthread+0x337/0x6f0 [ 16.204141] ? trace_preempt_on+0x20/0xc0 [ 16.204165] ? __pfx_kthread+0x10/0x10 [ 16.204186] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.204208] ? calculate_sigpending+0x7b/0xa0 [ 16.204245] ? __pfx_kthread+0x10/0x10 [ 16.204267] ret_from_fork+0x116/0x1d0 [ 16.204286] ? __pfx_kthread+0x10/0x10 [ 16.204307] ret_from_fork_asm+0x1a/0x30 [ 16.204338] </TASK> [ 16.204350] [ 16.211553] Allocated by task 282: [ 16.211734] kasan_save_stack+0x45/0x70 [ 16.212140] kasan_save_track+0x18/0x40 [ 16.212332] kasan_save_alloc_info+0x3b/0x50 [ 16.212553] __kasan_kmalloc+0xb7/0xc0 [ 16.212756] __kmalloc_cache_noprof+0x189/0x420 [ 16.212988] kasan_atomics+0x95/0x310 [ 16.213162] kunit_try_run_case+0x1a5/0x480 [ 16.213316] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.213555] kthread+0x337/0x6f0 [ 16.213735] ret_from_fork+0x116/0x1d0 [ 16.213937] ret_from_fork_asm+0x1a/0x30 [ 16.214083] [ 16.214157] The buggy address belongs to the object at ffff8881029cd380 [ 16.214157] which belongs to the cache kmalloc-64 of size 64 [ 16.214684] The buggy address is located 0 bytes to the right of [ 16.214684] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 16.215138] [ 16.215229] The buggy address belongs to the physical page: [ 16.215477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 16.215734] flags: 0x200000000000000(node=0|zone=2) [ 16.216209] page_type: f5(slab) [ 16.216338] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.216569] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.216861] page dumped because: kasan: bad access detected [ 16.217113] [ 16.217206] Memory state around the buggy address: [ 16.217430] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.217725] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.218063] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.218279] ^ [ 16.218433] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.218659] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.218976] ================================================================== [ 15.693026] ================================================================== [ 15.693305] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 15.694100] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 15.694536] [ 15.694728] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.694774] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.694787] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.694809] Call Trace: [ 15.694948] <TASK> [ 15.694966] dump_stack_lvl+0x73/0xb0 [ 15.694997] print_report+0xd1/0x650 [ 15.695019] ? __virt_addr_valid+0x1db/0x2d0 [ 15.695043] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.695065] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.695090] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.695112] kasan_report+0x141/0x180 [ 15.695134] ? kasan_atomics_helper+0xfa9/0x5450 [ 15.695161] kasan_check_range+0x10c/0x1c0 [ 15.695186] __kasan_check_write+0x18/0x20 [ 15.695207] kasan_atomics_helper+0xfa9/0x5450 [ 15.695230] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.695254] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.695280] ? kasan_atomics+0x152/0x310 [ 15.695307] kasan_atomics+0x1dc/0x310 [ 15.695329] ? __pfx_kasan_atomics+0x10/0x10 [ 15.695354] ? __pfx_read_tsc+0x10/0x10 [ 15.695377] ? ktime_get_ts64+0x86/0x230 [ 15.695403] kunit_try_run_case+0x1a5/0x480 [ 15.695427] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.695451] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.695475] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.695500] ? __kthread_parkme+0x82/0x180 [ 15.695522] ? preempt_count_sub+0x50/0x80 [ 15.695547] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.695572] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.695609] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.695636] kthread+0x337/0x6f0 [ 15.695656] ? trace_preempt_on+0x20/0xc0 [ 15.695681] ? __pfx_kthread+0x10/0x10 [ 15.695704] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.695727] ? calculate_sigpending+0x7b/0xa0 [ 15.695753] ? __pfx_kthread+0x10/0x10 [ 15.695788] ret_from_fork+0x116/0x1d0 [ 15.695807] ? __pfx_kthread+0x10/0x10 [ 15.695829] ret_from_fork_asm+0x1a/0x30 [ 15.695861] </TASK> [ 15.695872] [ 15.705520] Allocated by task 282: [ 15.705802] kasan_save_stack+0x45/0x70 [ 15.706164] kasan_save_track+0x18/0x40 [ 15.706416] kasan_save_alloc_info+0x3b/0x50 [ 15.706700] __kasan_kmalloc+0xb7/0xc0 [ 15.706903] __kmalloc_cache_noprof+0x189/0x420 [ 15.707234] kasan_atomics+0x95/0x310 [ 15.707423] kunit_try_run_case+0x1a5/0x480 [ 15.707619] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.707848] kthread+0x337/0x6f0 [ 15.708198] ret_from_fork+0x116/0x1d0 [ 15.708446] ret_from_fork_asm+0x1a/0x30 [ 15.708619] [ 15.708713] The buggy address belongs to the object at ffff8881029cd380 [ 15.708713] which belongs to the cache kmalloc-64 of size 64 [ 15.709459] The buggy address is located 0 bytes to the right of [ 15.709459] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 15.710150] [ 15.710227] The buggy address belongs to the physical page: [ 15.710611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 15.711008] flags: 0x200000000000000(node=0|zone=2) [ 15.711293] page_type: f5(slab) [ 15.711430] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.711857] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.712263] page dumped because: kasan: bad access detected [ 15.712499] [ 15.712576] Memory state around the buggy address: [ 15.712981] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.713274] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.713632] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.713989] ^ [ 15.714326] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.714652] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.715058] ================================================================== [ 15.501341] ================================================================== [ 15.501931] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 15.502375] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 15.502612] [ 15.502722] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.502785] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.502815] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.502840] Call Trace: [ 15.502857] <TASK> [ 15.502874] dump_stack_lvl+0x73/0xb0 [ 15.502903] print_report+0xd1/0x650 [ 15.502925] ? __virt_addr_valid+0x1db/0x2d0 [ 15.502950] ? kasan_atomics_helper+0xac7/0x5450 [ 15.502972] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.502997] ? kasan_atomics_helper+0xac7/0x5450 [ 15.503019] kasan_report+0x141/0x180 [ 15.503051] ? kasan_atomics_helper+0xac7/0x5450 [ 15.503078] kasan_check_range+0x10c/0x1c0 [ 15.503120] __kasan_check_write+0x18/0x20 [ 15.503141] kasan_atomics_helper+0xac7/0x5450 [ 15.503164] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.503188] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.503214] ? kasan_atomics+0x152/0x310 [ 15.503241] kasan_atomics+0x1dc/0x310 [ 15.503273] ? __pfx_kasan_atomics+0x10/0x10 [ 15.503297] ? __pfx_read_tsc+0x10/0x10 [ 15.503319] ? ktime_get_ts64+0x86/0x230 [ 15.503344] kunit_try_run_case+0x1a5/0x480 [ 15.503368] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.503401] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.503426] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.503450] ? __kthread_parkme+0x82/0x180 [ 15.503471] ? preempt_count_sub+0x50/0x80 [ 15.503496] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.503522] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.503547] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.503573] kthread+0x337/0x6f0 [ 15.503603] ? trace_preempt_on+0x20/0xc0 [ 15.503628] ? __pfx_kthread+0x10/0x10 [ 15.503649] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.503672] ? calculate_sigpending+0x7b/0xa0 [ 15.503696] ? __pfx_kthread+0x10/0x10 [ 15.503718] ret_from_fork+0x116/0x1d0 [ 15.503738] ? __pfx_kthread+0x10/0x10 [ 15.503759] ret_from_fork_asm+0x1a/0x30 [ 15.503808] </TASK> [ 15.503820] [ 15.511018] Allocated by task 282: [ 15.511198] kasan_save_stack+0x45/0x70 [ 15.511401] kasan_save_track+0x18/0x40 [ 15.511617] kasan_save_alloc_info+0x3b/0x50 [ 15.511815] __kasan_kmalloc+0xb7/0xc0 [ 15.512012] __kmalloc_cache_noprof+0x189/0x420 [ 15.512198] kasan_atomics+0x95/0x310 [ 15.512371] kunit_try_run_case+0x1a5/0x480 [ 15.512573] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.512777] kthread+0x337/0x6f0 [ 15.512911] ret_from_fork+0x116/0x1d0 [ 15.513098] ret_from_fork_asm+0x1a/0x30 [ 15.513296] [ 15.513389] The buggy address belongs to the object at ffff8881029cd380 [ 15.513389] which belongs to the cache kmalloc-64 of size 64 [ 15.513778] The buggy address is located 0 bytes to the right of [ 15.513778] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 15.514329] [ 15.514428] The buggy address belongs to the physical page: [ 15.514672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 15.515039] flags: 0x200000000000000(node=0|zone=2) [ 15.515219] page_type: f5(slab) [ 15.515338] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.515570] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.516265] page dumped because: kasan: bad access detected [ 15.516943] [ 15.517025] Memory state around the buggy address: [ 15.517229] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.517545] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.518731] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.518978] ^ [ 15.519139] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.519360] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.519578] ================================================================== [ 15.239441] ================================================================== [ 15.239942] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 15.240275] Read of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 15.240563] [ 15.240692] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.240735] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.240748] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.240843] Call Trace: [ 15.240863] <TASK> [ 15.240879] dump_stack_lvl+0x73/0xb0 [ 15.240907] print_report+0xd1/0x650 [ 15.240930] ? __virt_addr_valid+0x1db/0x2d0 [ 15.240954] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.240977] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.241001] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.241024] kasan_report+0x141/0x180 [ 15.241047] ? kasan_atomics_helper+0x4b54/0x5450 [ 15.241074] __asan_report_load4_noabort+0x18/0x20 [ 15.241100] kasan_atomics_helper+0x4b54/0x5450 [ 15.241124] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.241148] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.241174] ? kasan_atomics+0x152/0x310 [ 15.241201] kasan_atomics+0x1dc/0x310 [ 15.241224] ? __pfx_kasan_atomics+0x10/0x10 [ 15.241249] ? __pfx_read_tsc+0x10/0x10 [ 15.241271] ? ktime_get_ts64+0x86/0x230 [ 15.241296] kunit_try_run_case+0x1a5/0x480 [ 15.241320] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.241344] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.241369] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.241397] ? __kthread_parkme+0x82/0x180 [ 15.241419] ? preempt_count_sub+0x50/0x80 [ 15.241444] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.241471] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.241496] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.241522] kthread+0x337/0x6f0 [ 15.241542] ? trace_preempt_on+0x20/0xc0 [ 15.241566] ? __pfx_kthread+0x10/0x10 [ 15.241587] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.241622] ? calculate_sigpending+0x7b/0xa0 [ 15.241648] ? __pfx_kthread+0x10/0x10 [ 15.241670] ret_from_fork+0x116/0x1d0 [ 15.241690] ? __pfx_kthread+0x10/0x10 [ 15.241711] ret_from_fork_asm+0x1a/0x30 [ 15.241743] </TASK> [ 15.241753] [ 15.249460] Allocated by task 282: [ 15.249664] kasan_save_stack+0x45/0x70 [ 15.249936] kasan_save_track+0x18/0x40 [ 15.250136] kasan_save_alloc_info+0x3b/0x50 [ 15.250349] __kasan_kmalloc+0xb7/0xc0 [ 15.250539] __kmalloc_cache_noprof+0x189/0x420 [ 15.250783] kasan_atomics+0x95/0x310 [ 15.250947] kunit_try_run_case+0x1a5/0x480 [ 15.251096] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.251304] kthread+0x337/0x6f0 [ 15.251474] ret_from_fork+0x116/0x1d0 [ 15.251942] ret_from_fork_asm+0x1a/0x30 [ 15.252151] [ 15.252248] The buggy address belongs to the object at ffff8881029cd380 [ 15.252248] which belongs to the cache kmalloc-64 of size 64 [ 15.252744] The buggy address is located 0 bytes to the right of [ 15.252744] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 15.253300] [ 15.253400] The buggy address belongs to the physical page: [ 15.253633] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 15.254038] flags: 0x200000000000000(node=0|zone=2) [ 15.254256] page_type: f5(slab) [ 15.254422] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.254707] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.255149] page dumped because: kasan: bad access detected [ 15.255412] [ 15.255509] Memory state around the buggy address: [ 15.255752] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.256096] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.256367] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.256582] ^ [ 15.256748] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.257072] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.257394] ================================================================== [ 15.842227] ================================================================== [ 15.842492] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 15.843261] Read of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 15.843562] [ 15.843689] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.843735] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.843748] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.843770] Call Trace: [ 15.843789] <TASK> [ 15.843808] dump_stack_lvl+0x73/0xb0 [ 15.843836] print_report+0xd1/0x650 [ 15.843859] ? __virt_addr_valid+0x1db/0x2d0 [ 15.843883] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.843905] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.843929] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.843952] kasan_report+0x141/0x180 [ 15.843974] ? kasan_atomics_helper+0x49e8/0x5450 [ 15.844001] __asan_report_load4_noabort+0x18/0x20 [ 15.844026] kasan_atomics_helper+0x49e8/0x5450 [ 15.844050] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.844073] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.844100] ? kasan_atomics+0x152/0x310 [ 15.844126] kasan_atomics+0x1dc/0x310 [ 15.844148] ? __pfx_kasan_atomics+0x10/0x10 [ 15.844173] ? __pfx_read_tsc+0x10/0x10 [ 15.844194] ? ktime_get_ts64+0x86/0x230 [ 15.844219] kunit_try_run_case+0x1a5/0x480 [ 15.844245] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.844268] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.844293] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.844318] ? __kthread_parkme+0x82/0x180 [ 15.844340] ? preempt_count_sub+0x50/0x80 [ 15.844365] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.844390] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.844416] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.844442] kthread+0x337/0x6f0 [ 15.844463] ? trace_preempt_on+0x20/0xc0 [ 15.844488] ? __pfx_kthread+0x10/0x10 [ 15.844509] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.844531] ? calculate_sigpending+0x7b/0xa0 [ 15.844556] ? __pfx_kthread+0x10/0x10 [ 15.844579] ret_from_fork+0x116/0x1d0 [ 15.844614] ? __pfx_kthread+0x10/0x10 [ 15.844635] ret_from_fork_asm+0x1a/0x30 [ 15.844666] </TASK> [ 15.844678] [ 15.852004] Allocated by task 282: [ 15.852220] kasan_save_stack+0x45/0x70 [ 15.852445] kasan_save_track+0x18/0x40 [ 15.852637] kasan_save_alloc_info+0x3b/0x50 [ 15.852785] __kasan_kmalloc+0xb7/0xc0 [ 15.853015] __kmalloc_cache_noprof+0x189/0x420 [ 15.853417] kasan_atomics+0x95/0x310 [ 15.853583] kunit_try_run_case+0x1a5/0x480 [ 15.853775] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.853988] kthread+0x337/0x6f0 [ 15.854171] ret_from_fork+0x116/0x1d0 [ 15.854381] ret_from_fork_asm+0x1a/0x30 [ 15.854519] [ 15.854588] The buggy address belongs to the object at ffff8881029cd380 [ 15.854588] which belongs to the cache kmalloc-64 of size 64 [ 15.855373] The buggy address is located 0 bytes to the right of [ 15.855373] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 15.855887] [ 15.856005] The buggy address belongs to the physical page: [ 15.856252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 15.856506] flags: 0x200000000000000(node=0|zone=2) [ 15.856678] page_type: f5(slab) [ 15.856797] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.857253] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.857585] page dumped because: kasan: bad access detected [ 15.858047] [ 15.858116] Memory state around the buggy address: [ 15.858268] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.858473] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.858913] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.859233] ^ [ 15.859465] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.859812] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.860135] ================================================================== [ 15.446538] ================================================================== [ 15.447051] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 15.447310] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 15.447636] [ 15.447722] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.448672] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.448684] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.448705] Call Trace: [ 15.448722] <TASK> [ 15.448740] dump_stack_lvl+0x73/0xb0 [ 15.448776] print_report+0xd1/0x650 [ 15.448798] ? __virt_addr_valid+0x1db/0x2d0 [ 15.448821] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.448844] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.448894] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.448939] kasan_report+0x141/0x180 [ 15.448965] ? kasan_atomics_helper+0x8f9/0x5450 [ 15.449004] kasan_check_range+0x10c/0x1c0 [ 15.449028] __kasan_check_write+0x18/0x20 [ 15.449049] kasan_atomics_helper+0x8f9/0x5450 [ 15.449072] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.449096] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.449124] ? kasan_atomics+0x152/0x310 [ 15.449151] kasan_atomics+0x1dc/0x310 [ 15.449174] ? __pfx_kasan_atomics+0x10/0x10 [ 15.449199] ? __pfx_read_tsc+0x10/0x10 [ 15.449222] ? ktime_get_ts64+0x86/0x230 [ 15.449247] kunit_try_run_case+0x1a5/0x480 [ 15.449272] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.449296] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.449321] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.449346] ? __kthread_parkme+0x82/0x180 [ 15.449368] ? preempt_count_sub+0x50/0x80 [ 15.449393] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.449438] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.449465] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.449491] kthread+0x337/0x6f0 [ 15.449511] ? trace_preempt_on+0x20/0xc0 [ 15.449537] ? __pfx_kthread+0x10/0x10 [ 15.449558] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.449581] ? calculate_sigpending+0x7b/0xa0 [ 15.449615] ? __pfx_kthread+0x10/0x10 [ 15.449638] ret_from_fork+0x116/0x1d0 [ 15.449657] ? __pfx_kthread+0x10/0x10 [ 15.449701] ret_from_fork_asm+0x1a/0x30 [ 15.449734] </TASK> [ 15.449745] [ 15.456933] Allocated by task 282: [ 15.457064] kasan_save_stack+0x45/0x70 [ 15.457270] kasan_save_track+0x18/0x40 [ 15.457480] kasan_save_alloc_info+0x3b/0x50 [ 15.457715] __kasan_kmalloc+0xb7/0xc0 [ 15.457929] __kmalloc_cache_noprof+0x189/0x420 [ 15.458155] kasan_atomics+0x95/0x310 [ 15.458344] kunit_try_run_case+0x1a5/0x480 [ 15.458524] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.458705] kthread+0x337/0x6f0 [ 15.458862] ret_from_fork+0x116/0x1d0 [ 15.459073] ret_from_fork_asm+0x1a/0x30 [ 15.459268] [ 15.459359] The buggy address belongs to the object at ffff8881029cd380 [ 15.459359] which belongs to the cache kmalloc-64 of size 64 [ 15.459828] The buggy address is located 0 bytes to the right of [ 15.459828] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 15.460235] [ 15.460333] The buggy address belongs to the physical page: [ 15.460619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 15.461031] flags: 0x200000000000000(node=0|zone=2) [ 15.461273] page_type: f5(slab) [ 15.461452] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.461723] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.461969] page dumped because: kasan: bad access detected [ 15.462212] [ 15.462302] Memory state around the buggy address: [ 15.462545] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.462889] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.463105] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.463362] ^ [ 15.463588] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.463956] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.464243] ================================================================== [ 15.624766] ================================================================== [ 15.625029] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 15.625868] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 15.626320] [ 15.626478] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.626582] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.626607] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.626629] Call Trace: [ 15.626645] <TASK> [ 15.626663] dump_stack_lvl+0x73/0xb0 [ 15.626694] print_report+0xd1/0x650 [ 15.626718] ? __virt_addr_valid+0x1db/0x2d0 [ 15.626743] ? kasan_atomics_helper+0xde0/0x5450 [ 15.626765] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.626804] ? kasan_atomics_helper+0xde0/0x5450 [ 15.626832] kasan_report+0x141/0x180 [ 15.626855] ? kasan_atomics_helper+0xde0/0x5450 [ 15.626883] kasan_check_range+0x10c/0x1c0 [ 15.626908] __kasan_check_write+0x18/0x20 [ 15.626928] kasan_atomics_helper+0xde0/0x5450 [ 15.626952] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.626976] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.627002] ? kasan_atomics+0x152/0x310 [ 15.627028] kasan_atomics+0x1dc/0x310 [ 15.627052] ? __pfx_kasan_atomics+0x10/0x10 [ 15.627077] ? __pfx_read_tsc+0x10/0x10 [ 15.627099] ? ktime_get_ts64+0x86/0x230 [ 15.627124] kunit_try_run_case+0x1a5/0x480 [ 15.627149] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.627173] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.627198] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.627223] ? __kthread_parkme+0x82/0x180 [ 15.627246] ? preempt_count_sub+0x50/0x80 [ 15.627271] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.627297] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.627322] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.627348] kthread+0x337/0x6f0 [ 15.627369] ? trace_preempt_on+0x20/0xc0 [ 15.627394] ? __pfx_kthread+0x10/0x10 [ 15.627415] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.627438] ? calculate_sigpending+0x7b/0xa0 [ 15.627464] ? __pfx_kthread+0x10/0x10 [ 15.627486] ret_from_fork+0x116/0x1d0 [ 15.627509] ? __pfx_kthread+0x10/0x10 [ 15.627530] ret_from_fork_asm+0x1a/0x30 [ 15.627562] </TASK> [ 15.627574] [ 15.637178] Allocated by task 282: [ 15.637514] kasan_save_stack+0x45/0x70 [ 15.637697] kasan_save_track+0x18/0x40 [ 15.638084] kasan_save_alloc_info+0x3b/0x50 [ 15.638361] __kasan_kmalloc+0xb7/0xc0 [ 15.638609] __kmalloc_cache_noprof+0x189/0x420 [ 15.638938] kasan_atomics+0x95/0x310 [ 15.639103] kunit_try_run_case+0x1a5/0x480 [ 15.639312] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.639551] kthread+0x337/0x6f0 [ 15.639723] ret_from_fork+0x116/0x1d0 [ 15.640166] ret_from_fork_asm+0x1a/0x30 [ 15.640417] [ 15.640506] The buggy address belongs to the object at ffff8881029cd380 [ 15.640506] which belongs to the cache kmalloc-64 of size 64 [ 15.641220] The buggy address is located 0 bytes to the right of [ 15.641220] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 15.641874] [ 15.641953] The buggy address belongs to the physical page: [ 15.642296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 15.642647] flags: 0x200000000000000(node=0|zone=2) [ 15.643031] page_type: f5(slab) [ 15.643202] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.643633] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.644062] page dumped because: kasan: bad access detected [ 15.644286] [ 15.644477] Memory state around the buggy address: [ 15.644749] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.645141] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.645432] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.645844] ^ [ 15.646117] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.646408] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.646724] ================================================================== [ 16.124324] ================================================================== [ 16.124647] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 16.125016] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 16.125246] [ 16.125327] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.125366] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.125378] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.125399] Call Trace: [ 16.125413] <TASK> [ 16.125429] dump_stack_lvl+0x73/0xb0 [ 16.125456] print_report+0xd1/0x650 [ 16.125478] ? __virt_addr_valid+0x1db/0x2d0 [ 16.125501] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.125523] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.125547] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.125570] kasan_report+0x141/0x180 [ 16.125604] ? kasan_atomics_helper+0x18b1/0x5450 [ 16.125631] kasan_check_range+0x10c/0x1c0 [ 16.125655] __kasan_check_write+0x18/0x20 [ 16.125676] kasan_atomics_helper+0x18b1/0x5450 [ 16.125700] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.125723] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.125748] ? kasan_atomics+0x152/0x310 [ 16.125775] kasan_atomics+0x1dc/0x310 [ 16.125797] ? __pfx_kasan_atomics+0x10/0x10 [ 16.125823] ? __pfx_read_tsc+0x10/0x10 [ 16.125845] ? ktime_get_ts64+0x86/0x230 [ 16.125869] kunit_try_run_case+0x1a5/0x480 [ 16.125894] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.125917] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.125941] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.125966] ? __kthread_parkme+0x82/0x180 [ 16.125986] ? preempt_count_sub+0x50/0x80 [ 16.126011] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.126036] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.126061] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.126088] kthread+0x337/0x6f0 [ 16.126107] ? trace_preempt_on+0x20/0xc0 [ 16.126131] ? __pfx_kthread+0x10/0x10 [ 16.126152] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.126175] ? calculate_sigpending+0x7b/0xa0 [ 16.126199] ? __pfx_kthread+0x10/0x10 [ 16.126222] ret_from_fork+0x116/0x1d0 [ 16.126241] ? __pfx_kthread+0x10/0x10 [ 16.126262] ret_from_fork_asm+0x1a/0x30 [ 16.126293] </TASK> [ 16.126304] [ 16.134286] Allocated by task 282: [ 16.134415] kasan_save_stack+0x45/0x70 [ 16.134556] kasan_save_track+0x18/0x40 [ 16.134703] kasan_save_alloc_info+0x3b/0x50 [ 16.134858] __kasan_kmalloc+0xb7/0xc0 [ 16.134991] __kmalloc_cache_noprof+0x189/0x420 [ 16.135409] kasan_atomics+0x95/0x310 [ 16.135610] kunit_try_run_case+0x1a5/0x480 [ 16.135822] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.136298] kthread+0x337/0x6f0 [ 16.136476] ret_from_fork+0x116/0x1d0 [ 16.136675] ret_from_fork_asm+0x1a/0x30 [ 16.136981] [ 16.137079] The buggy address belongs to the object at ffff8881029cd380 [ 16.137079] which belongs to the cache kmalloc-64 of size 64 [ 16.137560] The buggy address is located 0 bytes to the right of [ 16.137560] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 16.138250] [ 16.138351] The buggy address belongs to the physical page: [ 16.138548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 16.138858] flags: 0x200000000000000(node=0|zone=2) [ 16.139103] page_type: f5(slab) [ 16.139258] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.139527] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.139848] page dumped because: kasan: bad access detected [ 16.140093] [ 16.140171] Memory state around the buggy address: [ 16.140363] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.140663] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.140976] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.141222] ^ [ 16.141379] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.141604] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.142105] ================================================================== [ 15.555468] ================================================================== [ 15.555809] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 15.556898] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 15.557144] [ 15.557240] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.557286] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.557300] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.557323] Call Trace: [ 15.557341] <TASK> [ 15.557361] dump_stack_lvl+0x73/0xb0 [ 15.557393] print_report+0xd1/0x650 [ 15.557417] ? __virt_addr_valid+0x1db/0x2d0 [ 15.557442] ? kasan_atomics_helper+0xc70/0x5450 [ 15.557465] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.557490] ? kasan_atomics_helper+0xc70/0x5450 [ 15.557512] kasan_report+0x141/0x180 [ 15.557535] ? kasan_atomics_helper+0xc70/0x5450 [ 15.557562] kasan_check_range+0x10c/0x1c0 [ 15.557587] __kasan_check_write+0x18/0x20 [ 15.557622] kasan_atomics_helper+0xc70/0x5450 [ 15.557855] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.557881] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.557909] ? kasan_atomics+0x152/0x310 [ 15.557936] kasan_atomics+0x1dc/0x310 [ 15.557959] ? __pfx_kasan_atomics+0x10/0x10 [ 15.558151] ? __pfx_read_tsc+0x10/0x10 [ 15.558176] ? ktime_get_ts64+0x86/0x230 [ 15.558203] kunit_try_run_case+0x1a5/0x480 [ 15.558229] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.558253] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.558279] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.558303] ? __kthread_parkme+0x82/0x180 [ 15.558325] ? preempt_count_sub+0x50/0x80 [ 15.558351] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.558376] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.558401] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.558428] kthread+0x337/0x6f0 [ 15.558447] ? trace_preempt_on+0x20/0xc0 [ 15.558474] ? __pfx_kthread+0x10/0x10 [ 15.558496] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.558518] ? calculate_sigpending+0x7b/0xa0 [ 15.558543] ? __pfx_kthread+0x10/0x10 [ 15.558565] ret_from_fork+0x116/0x1d0 [ 15.558584] ? __pfx_kthread+0x10/0x10 [ 15.558618] ret_from_fork_asm+0x1a/0x30 [ 15.558651] </TASK> [ 15.558664] [ 15.569683] Allocated by task 282: [ 15.570125] kasan_save_stack+0x45/0x70 [ 15.570388] kasan_save_track+0x18/0x40 [ 15.570683] kasan_save_alloc_info+0x3b/0x50 [ 15.571043] __kasan_kmalloc+0xb7/0xc0 [ 15.571331] __kmalloc_cache_noprof+0x189/0x420 [ 15.571562] kasan_atomics+0x95/0x310 [ 15.571746] kunit_try_run_case+0x1a5/0x480 [ 15.572180] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.572527] kthread+0x337/0x6f0 [ 15.572765] ret_from_fork+0x116/0x1d0 [ 15.573128] ret_from_fork_asm+0x1a/0x30 [ 15.573328] [ 15.573418] The buggy address belongs to the object at ffff8881029cd380 [ 15.573418] which belongs to the cache kmalloc-64 of size 64 [ 15.574131] The buggy address is located 0 bytes to the right of [ 15.574131] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 15.575049] [ 15.575159] The buggy address belongs to the physical page: [ 15.575399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 15.575705] flags: 0x200000000000000(node=0|zone=2) [ 15.575875] page_type: f5(slab) [ 15.576073] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.576400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.576649] page dumped because: kasan: bad access detected [ 15.576903] [ 15.577033] Memory state around the buggy address: [ 15.577234] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.577498] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.577846] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.578145] ^ [ 15.578338] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.578588] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.578932] ================================================================== [ 16.358330] ================================================================== [ 16.358705] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 16.359091] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 16.359420] [ 16.359527] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.359571] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.359583] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.359617] Call Trace: [ 16.359635] <TASK> [ 16.359653] dump_stack_lvl+0x73/0xb0 [ 16.359683] print_report+0xd1/0x650 [ 16.359706] ? __virt_addr_valid+0x1db/0x2d0 [ 16.359731] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.359753] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.359778] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.359812] kasan_report+0x141/0x180 [ 16.359854] ? kasan_atomics_helper+0x1f43/0x5450 [ 16.359882] kasan_check_range+0x10c/0x1c0 [ 16.359910] __kasan_check_write+0x18/0x20 [ 16.359929] kasan_atomics_helper+0x1f43/0x5450 [ 16.359953] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.359977] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.360003] ? kasan_atomics+0x152/0x310 [ 16.360030] kasan_atomics+0x1dc/0x310 [ 16.360053] ? __pfx_kasan_atomics+0x10/0x10 [ 16.360079] ? __pfx_read_tsc+0x10/0x10 [ 16.360101] ? ktime_get_ts64+0x86/0x230 [ 16.360126] kunit_try_run_case+0x1a5/0x480 [ 16.360151] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.360175] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.360201] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.360226] ? __kthread_parkme+0x82/0x180 [ 16.360248] ? preempt_count_sub+0x50/0x80 [ 16.360273] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.360299] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.360324] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.360351] kthread+0x337/0x6f0 [ 16.360370] ? trace_preempt_on+0x20/0xc0 [ 16.360396] ? __pfx_kthread+0x10/0x10 [ 16.360417] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.360440] ? calculate_sigpending+0x7b/0xa0 [ 16.360466] ? __pfx_kthread+0x10/0x10 [ 16.360488] ret_from_fork+0x116/0x1d0 [ 16.360507] ? __pfx_kthread+0x10/0x10 [ 16.360528] ret_from_fork_asm+0x1a/0x30 [ 16.360559] </TASK> [ 16.360570] [ 16.368216] Allocated by task 282: [ 16.368476] kasan_save_stack+0x45/0x70 [ 16.368717] kasan_save_track+0x18/0x40 [ 16.368962] kasan_save_alloc_info+0x3b/0x50 [ 16.369112] __kasan_kmalloc+0xb7/0xc0 [ 16.369244] __kmalloc_cache_noprof+0x189/0x420 [ 16.369439] kasan_atomics+0x95/0x310 [ 16.369638] kunit_try_run_case+0x1a5/0x480 [ 16.369975] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.370235] kthread+0x337/0x6f0 [ 16.370415] ret_from_fork+0x116/0x1d0 [ 16.370572] ret_from_fork_asm+0x1a/0x30 [ 16.370800] [ 16.370954] The buggy address belongs to the object at ffff8881029cd380 [ 16.370954] which belongs to the cache kmalloc-64 of size 64 [ 16.371449] The buggy address is located 0 bytes to the right of [ 16.371449] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 16.372118] [ 16.372206] The buggy address belongs to the physical page: [ 16.372445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 16.372767] flags: 0x200000000000000(node=0|zone=2) [ 16.373033] page_type: f5(slab) [ 16.373181] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.373416] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.373693] page dumped because: kasan: bad access detected [ 16.373949] [ 16.374048] Memory state around the buggy address: [ 16.374295] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.374628] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.375039] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.375327] ^ [ 16.375483] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.375758] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.376419] ================================================================== [ 16.415092] ================================================================== [ 16.415642] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 16.416013] Read of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 16.416340] [ 16.416468] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.416513] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.416525] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.416547] Call Trace: [ 16.416565] <TASK> [ 16.416583] dump_stack_lvl+0x73/0xb0 [ 16.416625] print_report+0xd1/0x650 [ 16.416648] ? __virt_addr_valid+0x1db/0x2d0 [ 16.416672] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.416695] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.416720] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.416744] kasan_report+0x141/0x180 [ 16.416766] ? kasan_atomics_helper+0x4f98/0x5450 [ 16.416802] __asan_report_load8_noabort+0x18/0x20 [ 16.416850] kasan_atomics_helper+0x4f98/0x5450 [ 16.416874] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.416898] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.416925] ? kasan_atomics+0x152/0x310 [ 16.416952] kasan_atomics+0x1dc/0x310 [ 16.416975] ? __pfx_kasan_atomics+0x10/0x10 [ 16.417000] ? __pfx_read_tsc+0x10/0x10 [ 16.417023] ? ktime_get_ts64+0x86/0x230 [ 16.417049] kunit_try_run_case+0x1a5/0x480 [ 16.417074] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.417098] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.417124] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.417149] ? __kthread_parkme+0x82/0x180 [ 16.417193] ? preempt_count_sub+0x50/0x80 [ 16.417218] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.417243] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.417269] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.417295] kthread+0x337/0x6f0 [ 16.417315] ? trace_preempt_on+0x20/0xc0 [ 16.417340] ? __pfx_kthread+0x10/0x10 [ 16.417362] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.417385] ? calculate_sigpending+0x7b/0xa0 [ 16.417410] ? __pfx_kthread+0x10/0x10 [ 16.417432] ret_from_fork+0x116/0x1d0 [ 16.417453] ? __pfx_kthread+0x10/0x10 [ 16.417475] ret_from_fork_asm+0x1a/0x30 [ 16.417507] </TASK> [ 16.417518] [ 16.425043] Allocated by task 282: [ 16.425230] kasan_save_stack+0x45/0x70 [ 16.425433] kasan_save_track+0x18/0x40 [ 16.425638] kasan_save_alloc_info+0x3b/0x50 [ 16.425931] __kasan_kmalloc+0xb7/0xc0 [ 16.426068] __kmalloc_cache_noprof+0x189/0x420 [ 16.426225] kasan_atomics+0x95/0x310 [ 16.426378] kunit_try_run_case+0x1a5/0x480 [ 16.426587] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.426875] kthread+0x337/0x6f0 [ 16.427050] ret_from_fork+0x116/0x1d0 [ 16.427298] ret_from_fork_asm+0x1a/0x30 [ 16.427440] [ 16.427509] The buggy address belongs to the object at ffff8881029cd380 [ 16.427509] which belongs to the cache kmalloc-64 of size 64 [ 16.428468] The buggy address is located 0 bytes to the right of [ 16.428468] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 16.429649] [ 16.429953] The buggy address belongs to the physical page: [ 16.430391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 16.431250] flags: 0x200000000000000(node=0|zone=2) [ 16.431549] page_type: f5(slab) [ 16.431849] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.432388] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.432696] page dumped because: kasan: bad access detected [ 16.433120] [ 16.433341] Memory state around the buggy address: [ 16.433795] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.434124] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.434401] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.434700] ^ [ 16.435236] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.435706] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.436200] ================================================================== [ 16.262843] ================================================================== [ 16.263614] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 16.264034] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 16.264394] [ 16.264615] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.264662] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.264674] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.264697] Call Trace: [ 16.264719] <TASK> [ 16.264921] dump_stack_lvl+0x73/0xb0 [ 16.265108] print_report+0xd1/0x650 [ 16.265138] ? __virt_addr_valid+0x1db/0x2d0 [ 16.265163] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.265185] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.265210] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.265233] kasan_report+0x141/0x180 [ 16.265256] ? kasan_atomics_helper+0x1ce1/0x5450 [ 16.265284] kasan_check_range+0x10c/0x1c0 [ 16.265308] __kasan_check_write+0x18/0x20 [ 16.265329] kasan_atomics_helper+0x1ce1/0x5450 [ 16.265353] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.265376] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.265404] ? kasan_atomics+0x152/0x310 [ 16.265430] kasan_atomics+0x1dc/0x310 [ 16.265453] ? __pfx_kasan_atomics+0x10/0x10 [ 16.265478] ? __pfx_read_tsc+0x10/0x10 [ 16.265501] ? ktime_get_ts64+0x86/0x230 [ 16.265526] kunit_try_run_case+0x1a5/0x480 [ 16.265552] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.265576] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.265613] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.265637] ? __kthread_parkme+0x82/0x180 [ 16.265659] ? preempt_count_sub+0x50/0x80 [ 16.265685] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.265710] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.265735] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.265762] kthread+0x337/0x6f0 [ 16.265794] ? trace_preempt_on+0x20/0xc0 [ 16.265820] ? __pfx_kthread+0x10/0x10 [ 16.265841] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.265863] ? calculate_sigpending+0x7b/0xa0 [ 16.265889] ? __pfx_kthread+0x10/0x10 [ 16.265911] ret_from_fork+0x116/0x1d0 [ 16.265930] ? __pfx_kthread+0x10/0x10 [ 16.265951] ret_from_fork_asm+0x1a/0x30 [ 16.265983] </TASK> [ 16.265994] [ 16.276320] Allocated by task 282: [ 16.276653] kasan_save_stack+0x45/0x70 [ 16.276906] kasan_save_track+0x18/0x40 [ 16.277169] kasan_save_alloc_info+0x3b/0x50 [ 16.277460] __kasan_kmalloc+0xb7/0xc0 [ 16.277731] __kmalloc_cache_noprof+0x189/0x420 [ 16.278089] kasan_atomics+0x95/0x310 [ 16.278296] kunit_try_run_case+0x1a5/0x480 [ 16.278590] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.279117] kthread+0x337/0x6f0 [ 16.279313] ret_from_fork+0x116/0x1d0 [ 16.279629] ret_from_fork_asm+0x1a/0x30 [ 16.279865] [ 16.280206] The buggy address belongs to the object at ffff8881029cd380 [ 16.280206] which belongs to the cache kmalloc-64 of size 64 [ 16.280703] The buggy address is located 0 bytes to the right of [ 16.280703] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 16.281499] [ 16.281606] The buggy address belongs to the physical page: [ 16.282001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 16.282341] flags: 0x200000000000000(node=0|zone=2) [ 16.282642] page_type: f5(slab) [ 16.282917] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.283226] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.283543] page dumped because: kasan: bad access detected [ 16.284008] [ 16.284109] Memory state around the buggy address: [ 16.284396] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.284792] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.285151] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.285527] ^ [ 16.285714] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.286292] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.286671] ================================================================== [ 15.912069] ================================================================== [ 15.912796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 15.913043] Read of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 15.913266] [ 15.913355] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.913400] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.913412] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.913434] Call Trace: [ 15.913453] <TASK> [ 15.913471] dump_stack_lvl+0x73/0xb0 [ 15.913499] print_report+0xd1/0x650 [ 15.913522] ? __virt_addr_valid+0x1db/0x2d0 [ 15.913546] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.913569] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.914032] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.914084] kasan_report+0x141/0x180 [ 15.914109] ? kasan_atomics_helper+0x13b5/0x5450 [ 15.914136] kasan_check_range+0x10c/0x1c0 [ 15.914161] __kasan_check_read+0x15/0x20 [ 15.914180] kasan_atomics_helper+0x13b5/0x5450 [ 15.914204] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.914228] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.914255] ? kasan_atomics+0x152/0x310 [ 15.914282] kasan_atomics+0x1dc/0x310 [ 15.914304] ? __pfx_kasan_atomics+0x10/0x10 [ 15.914329] ? __pfx_read_tsc+0x10/0x10 [ 15.914351] ? ktime_get_ts64+0x86/0x230 [ 15.914396] kunit_try_run_case+0x1a5/0x480 [ 15.914422] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.914445] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.914471] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.914496] ? __kthread_parkme+0x82/0x180 [ 15.914517] ? preempt_count_sub+0x50/0x80 [ 15.914542] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.914567] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.914622] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.914649] kthread+0x337/0x6f0 [ 15.914668] ? trace_preempt_on+0x20/0xc0 [ 15.914693] ? __pfx_kthread+0x10/0x10 [ 15.914715] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.914737] ? calculate_sigpending+0x7b/0xa0 [ 15.914763] ? __pfx_kthread+0x10/0x10 [ 15.914798] ret_from_fork+0x116/0x1d0 [ 15.914818] ? __pfx_kthread+0x10/0x10 [ 15.914846] ret_from_fork_asm+0x1a/0x30 [ 15.914879] </TASK> [ 15.914891] [ 15.929253] Allocated by task 282: [ 15.929402] kasan_save_stack+0x45/0x70 [ 15.929555] kasan_save_track+0x18/0x40 [ 15.929715] kasan_save_alloc_info+0x3b/0x50 [ 15.929937] __kasan_kmalloc+0xb7/0xc0 [ 15.930071] __kmalloc_cache_noprof+0x189/0x420 [ 15.930332] kasan_atomics+0x95/0x310 [ 15.930521] kunit_try_run_case+0x1a5/0x480 [ 15.930688] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.930920] kthread+0x337/0x6f0 [ 15.931131] ret_from_fork+0x116/0x1d0 [ 15.931285] ret_from_fork_asm+0x1a/0x30 [ 15.931425] [ 15.931517] The buggy address belongs to the object at ffff8881029cd380 [ 15.931517] which belongs to the cache kmalloc-64 of size 64 [ 15.932231] The buggy address is located 0 bytes to the right of [ 15.932231] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 15.932737] [ 15.932907] The buggy address belongs to the physical page: [ 15.933162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 15.933430] flags: 0x200000000000000(node=0|zone=2) [ 15.933697] page_type: f5(slab) [ 15.933939] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.934261] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.934584] page dumped because: kasan: bad access detected [ 15.934840] [ 15.934931] Memory state around the buggy address: [ 15.935167] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.935426] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.935651] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.936113] ^ [ 15.936300] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.936621] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.936932] ================================================================== [ 16.106664] ================================================================== [ 16.107019] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 16.107342] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 16.107558] [ 16.107657] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.107701] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.107714] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.107735] Call Trace: [ 16.107753] <TASK> [ 16.107771] dump_stack_lvl+0x73/0xb0 [ 16.107799] print_report+0xd1/0x650 [ 16.107822] ? __virt_addr_valid+0x1db/0x2d0 [ 16.107846] ? kasan_atomics_helper+0x1818/0x5450 [ 16.107868] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.107893] ? kasan_atomics_helper+0x1818/0x5450 [ 16.107916] kasan_report+0x141/0x180 [ 16.107938] ? kasan_atomics_helper+0x1818/0x5450 [ 16.107965] kasan_check_range+0x10c/0x1c0 [ 16.107990] __kasan_check_write+0x18/0x20 [ 16.108010] kasan_atomics_helper+0x1818/0x5450 [ 16.108043] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.108067] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.108094] ? kasan_atomics+0x152/0x310 [ 16.108119] kasan_atomics+0x1dc/0x310 [ 16.108142] ? __pfx_kasan_atomics+0x10/0x10 [ 16.108168] ? __pfx_read_tsc+0x10/0x10 [ 16.108190] ? ktime_get_ts64+0x86/0x230 [ 16.108215] kunit_try_run_case+0x1a5/0x480 [ 16.108240] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.108264] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.108289] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.108314] ? __kthread_parkme+0x82/0x180 [ 16.108335] ? preempt_count_sub+0x50/0x80 [ 16.108360] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.108387] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.108412] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.108439] kthread+0x337/0x6f0 [ 16.108458] ? trace_preempt_on+0x20/0xc0 [ 16.108483] ? __pfx_kthread+0x10/0x10 [ 16.108503] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.108526] ? calculate_sigpending+0x7b/0xa0 [ 16.108551] ? __pfx_kthread+0x10/0x10 [ 16.108573] ret_from_fork+0x116/0x1d0 [ 16.108606] ? __pfx_kthread+0x10/0x10 [ 16.108628] ret_from_fork_asm+0x1a/0x30 [ 16.108658] </TASK> [ 16.108669] [ 16.116476] Allocated by task 282: [ 16.116636] kasan_save_stack+0x45/0x70 [ 16.116836] kasan_save_track+0x18/0x40 [ 16.116968] kasan_save_alloc_info+0x3b/0x50 [ 16.117113] __kasan_kmalloc+0xb7/0xc0 [ 16.117241] __kmalloc_cache_noprof+0x189/0x420 [ 16.117391] kasan_atomics+0x95/0x310 [ 16.117518] kunit_try_run_case+0x1a5/0x480 [ 16.117739] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.117987] kthread+0x337/0x6f0 [ 16.118151] ret_from_fork+0x116/0x1d0 [ 16.118334] ret_from_fork_asm+0x1a/0x30 [ 16.118526] [ 16.118602] The buggy address belongs to the object at ffff8881029cd380 [ 16.118602] which belongs to the cache kmalloc-64 of size 64 [ 16.118943] The buggy address is located 0 bytes to the right of [ 16.118943] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 16.119292] [ 16.119466] The buggy address belongs to the physical page: [ 16.119728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 16.120470] flags: 0x200000000000000(node=0|zone=2) [ 16.120717] page_type: f5(slab) [ 16.120884] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.121310] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.121619] page dumped because: kasan: bad access detected [ 16.121880] [ 16.121949] Memory state around the buggy address: [ 16.122105] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.122435] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.122761] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.123031] ^ [ 16.123253] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.123523] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.123841] ================================================================== [ 16.161261] ================================================================== [ 16.161703] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 16.162240] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 16.162477] [ 16.162563] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.162617] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.162629] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.162651] Call Trace: [ 16.162668] <TASK> [ 16.162684] dump_stack_lvl+0x73/0xb0 [ 16.162713] print_report+0xd1/0x650 [ 16.162735] ? __virt_addr_valid+0x1db/0x2d0 [ 16.162760] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.162781] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.162815] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.162845] kasan_report+0x141/0x180 [ 16.162867] ? kasan_atomics_helper+0x19e3/0x5450 [ 16.162894] kasan_check_range+0x10c/0x1c0 [ 16.162918] __kasan_check_write+0x18/0x20 [ 16.162939] kasan_atomics_helper+0x19e3/0x5450 [ 16.162962] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.162986] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.163011] ? kasan_atomics+0x152/0x310 [ 16.163037] kasan_atomics+0x1dc/0x310 [ 16.163061] ? __pfx_kasan_atomics+0x10/0x10 [ 16.163085] ? __pfx_read_tsc+0x10/0x10 [ 16.163107] ? ktime_get_ts64+0x86/0x230 [ 16.163132] kunit_try_run_case+0x1a5/0x480 [ 16.163156] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.163180] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.163206] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.163231] ? __kthread_parkme+0x82/0x180 [ 16.163251] ? preempt_count_sub+0x50/0x80 [ 16.163276] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.163301] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.163326] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.163352] kthread+0x337/0x6f0 [ 16.163372] ? trace_preempt_on+0x20/0xc0 [ 16.163397] ? __pfx_kthread+0x10/0x10 [ 16.163417] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.163440] ? calculate_sigpending+0x7b/0xa0 [ 16.163464] ? __pfx_kthread+0x10/0x10 [ 16.163487] ret_from_fork+0x116/0x1d0 [ 16.163505] ? __pfx_kthread+0x10/0x10 [ 16.163527] ret_from_fork_asm+0x1a/0x30 [ 16.163557] </TASK> [ 16.163568] [ 16.170998] Allocated by task 282: [ 16.171155] kasan_save_stack+0x45/0x70 [ 16.171361] kasan_save_track+0x18/0x40 [ 16.171722] kasan_save_alloc_info+0x3b/0x50 [ 16.172137] __kasan_kmalloc+0xb7/0xc0 [ 16.172323] __kmalloc_cache_noprof+0x189/0x420 [ 16.172580] kasan_atomics+0x95/0x310 [ 16.172795] kunit_try_run_case+0x1a5/0x480 [ 16.173002] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.173257] kthread+0x337/0x6f0 [ 16.173425] ret_from_fork+0x116/0x1d0 [ 16.173618] ret_from_fork_asm+0x1a/0x30 [ 16.173860] [ 16.173955] The buggy address belongs to the object at ffff8881029cd380 [ 16.173955] which belongs to the cache kmalloc-64 of size 64 [ 16.175527] The buggy address is located 0 bytes to the right of [ 16.175527] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 16.176537] [ 16.176660] The buggy address belongs to the physical page: [ 16.177122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 16.177734] flags: 0x200000000000000(node=0|zone=2) [ 16.178195] page_type: f5(slab) [ 16.178508] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.179070] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.179570] page dumped because: kasan: bad access detected [ 16.180023] [ 16.180131] Memory state around the buggy address: [ 16.180367] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.180699] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.181350] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.181763] ^ [ 16.182207] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.182712] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.183200] ================================================================== [ 16.142732] ================================================================== [ 16.143249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 16.143560] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 16.143833] [ 16.143989] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.144031] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.144044] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.144065] Call Trace: [ 16.144081] <TASK> [ 16.144098] dump_stack_lvl+0x73/0xb0 [ 16.144125] print_report+0xd1/0x650 [ 16.144148] ? __virt_addr_valid+0x1db/0x2d0 [ 16.144172] ? kasan_atomics_helper+0x194a/0x5450 [ 16.144194] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.144217] ? kasan_atomics_helper+0x194a/0x5450 [ 16.144240] kasan_report+0x141/0x180 [ 16.144264] ? kasan_atomics_helper+0x194a/0x5450 [ 16.144292] kasan_check_range+0x10c/0x1c0 [ 16.144316] __kasan_check_write+0x18/0x20 [ 16.144337] kasan_atomics_helper+0x194a/0x5450 [ 16.144361] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.144385] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.144411] ? kasan_atomics+0x152/0x310 [ 16.144437] kasan_atomics+0x1dc/0x310 [ 16.144460] ? __pfx_kasan_atomics+0x10/0x10 [ 16.144484] ? __pfx_read_tsc+0x10/0x10 [ 16.144506] ? ktime_get_ts64+0x86/0x230 [ 16.144531] kunit_try_run_case+0x1a5/0x480 [ 16.144556] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.144580] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.144615] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.144640] ? __kthread_parkme+0x82/0x180 [ 16.144662] ? preempt_count_sub+0x50/0x80 [ 16.144687] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.144712] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.144738] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.144764] kthread+0x337/0x6f0 [ 16.144784] ? trace_preempt_on+0x20/0xc0 [ 16.144809] ? __pfx_kthread+0x10/0x10 [ 16.144831] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.144854] ? calculate_sigpending+0x7b/0xa0 [ 16.144879] ? __pfx_kthread+0x10/0x10 [ 16.144901] ret_from_fork+0x116/0x1d0 [ 16.144920] ? __pfx_kthread+0x10/0x10 [ 16.144940] ret_from_fork_asm+0x1a/0x30 [ 16.144973] </TASK> [ 16.144984] [ 16.153216] Allocated by task 282: [ 16.153405] kasan_save_stack+0x45/0x70 [ 16.153616] kasan_save_track+0x18/0x40 [ 16.153838] kasan_save_alloc_info+0x3b/0x50 [ 16.154038] __kasan_kmalloc+0xb7/0xc0 [ 16.154171] __kmalloc_cache_noprof+0x189/0x420 [ 16.154328] kasan_atomics+0x95/0x310 [ 16.154463] kunit_try_run_case+0x1a5/0x480 [ 16.154619] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.154997] kthread+0x337/0x6f0 [ 16.155169] ret_from_fork+0x116/0x1d0 [ 16.155361] ret_from_fork_asm+0x1a/0x30 [ 16.155563] [ 16.155668] The buggy address belongs to the object at ffff8881029cd380 [ 16.155668] which belongs to the cache kmalloc-64 of size 64 [ 16.156268] The buggy address is located 0 bytes to the right of [ 16.156268] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 16.156784] [ 16.156874] The buggy address belongs to the physical page: [ 16.157072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 16.157377] flags: 0x200000000000000(node=0|zone=2) [ 16.157542] page_type: f5(slab) [ 16.157726] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.158242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.158532] page dumped because: kasan: bad access detected [ 16.158713] [ 16.158783] Memory state around the buggy address: [ 16.158945] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.159160] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.159372] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.159714] ^ [ 16.160060] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.160375] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.160697] ================================================================== [ 16.464630] ================================================================== [ 16.465244] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 16.465572] Read of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 16.466142] [ 16.466259] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.466521] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.466535] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.466558] Call Trace: [ 16.466575] <TASK> [ 16.466633] dump_stack_lvl+0x73/0xb0 [ 16.466669] print_report+0xd1/0x650 [ 16.466693] ? __virt_addr_valid+0x1db/0x2d0 [ 16.466718] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.466741] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.466765] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.466804] kasan_report+0x141/0x180 [ 16.466832] ? kasan_atomics_helper+0x4fb2/0x5450 [ 16.466859] __asan_report_load8_noabort+0x18/0x20 [ 16.466885] kasan_atomics_helper+0x4fb2/0x5450 [ 16.466909] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.466933] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.466959] ? kasan_atomics+0x152/0x310 [ 16.466986] kasan_atomics+0x1dc/0x310 [ 16.467009] ? __pfx_kasan_atomics+0x10/0x10 [ 16.467034] ? __pfx_read_tsc+0x10/0x10 [ 16.467056] ? ktime_get_ts64+0x86/0x230 [ 16.467081] kunit_try_run_case+0x1a5/0x480 [ 16.467107] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.467132] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.467157] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.467183] ? __kthread_parkme+0x82/0x180 [ 16.467205] ? preempt_count_sub+0x50/0x80 [ 16.467230] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.467258] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.467283] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.467310] kthread+0x337/0x6f0 [ 16.467330] ? trace_preempt_on+0x20/0xc0 [ 16.467356] ? __pfx_kthread+0x10/0x10 [ 16.467378] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.467400] ? calculate_sigpending+0x7b/0xa0 [ 16.467425] ? __pfx_kthread+0x10/0x10 [ 16.467448] ret_from_fork+0x116/0x1d0 [ 16.467467] ? __pfx_kthread+0x10/0x10 [ 16.467489] ret_from_fork_asm+0x1a/0x30 [ 16.467521] </TASK> [ 16.467533] [ 16.478748] Allocated by task 282: [ 16.479139] kasan_save_stack+0x45/0x70 [ 16.479335] kasan_save_track+0x18/0x40 [ 16.479514] kasan_save_alloc_info+0x3b/0x50 [ 16.479714] __kasan_kmalloc+0xb7/0xc0 [ 16.480315] __kmalloc_cache_noprof+0x189/0x420 [ 16.480589] kasan_atomics+0x95/0x310 [ 16.480967] kunit_try_run_case+0x1a5/0x480 [ 16.481282] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.481712] kthread+0x337/0x6f0 [ 16.481992] ret_from_fork+0x116/0x1d0 [ 16.482370] ret_from_fork_asm+0x1a/0x30 [ 16.482707] [ 16.482830] The buggy address belongs to the object at ffff8881029cd380 [ 16.482830] which belongs to the cache kmalloc-64 of size 64 [ 16.483305] The buggy address is located 0 bytes to the right of [ 16.483305] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 16.483761] [ 16.483835] The buggy address belongs to the physical page: [ 16.484100] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 16.484431] flags: 0x200000000000000(node=0|zone=2) [ 16.484616] page_type: f5(slab) [ 16.484796] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.485145] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.485435] page dumped because: kasan: bad access detected [ 16.485669] [ 16.485738] Memory state around the buggy address: [ 16.486121] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.486422] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.486728] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.487033] ^ [ 16.487227] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.487515] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.487742] ================================================================== [ 16.524521] ================================================================== [ 16.524971] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 16.525355] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 16.525726] [ 16.525868] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.525913] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.525926] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.525947] Call Trace: [ 16.525963] <TASK> [ 16.525980] dump_stack_lvl+0x73/0xb0 [ 16.526010] print_report+0xd1/0x650 [ 16.526032] ? __virt_addr_valid+0x1db/0x2d0 [ 16.526056] ? kasan_atomics_helper+0x224c/0x5450 [ 16.526079] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.526102] ? kasan_atomics_helper+0x224c/0x5450 [ 16.526126] kasan_report+0x141/0x180 [ 16.526149] ? kasan_atomics_helper+0x224c/0x5450 [ 16.526176] kasan_check_range+0x10c/0x1c0 [ 16.526201] __kasan_check_write+0x18/0x20 [ 16.526221] kasan_atomics_helper+0x224c/0x5450 [ 16.526245] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.526269] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.526295] ? kasan_atomics+0x152/0x310 [ 16.526322] kasan_atomics+0x1dc/0x310 [ 16.526346] ? __pfx_kasan_atomics+0x10/0x10 [ 16.526371] ? __pfx_read_tsc+0x10/0x10 [ 16.526392] ? ktime_get_ts64+0x86/0x230 [ 16.526418] kunit_try_run_case+0x1a5/0x480 [ 16.526443] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.526467] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.526492] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.526517] ? __kthread_parkme+0x82/0x180 [ 16.526565] ? preempt_count_sub+0x50/0x80 [ 16.526591] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.526627] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.526652] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.526679] kthread+0x337/0x6f0 [ 16.526698] ? trace_preempt_on+0x20/0xc0 [ 16.526723] ? __pfx_kthread+0x10/0x10 [ 16.526744] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.526787] ? calculate_sigpending+0x7b/0xa0 [ 16.526813] ? __pfx_kthread+0x10/0x10 [ 16.526844] ret_from_fork+0x116/0x1d0 [ 16.526864] ? __pfx_kthread+0x10/0x10 [ 16.526886] ret_from_fork_asm+0x1a/0x30 [ 16.526918] </TASK> [ 16.526929] [ 16.534375] Allocated by task 282: [ 16.534564] kasan_save_stack+0x45/0x70 [ 16.534789] kasan_save_track+0x18/0x40 [ 16.534989] kasan_save_alloc_info+0x3b/0x50 [ 16.535189] __kasan_kmalloc+0xb7/0xc0 [ 16.535319] __kmalloc_cache_noprof+0x189/0x420 [ 16.535470] kasan_atomics+0x95/0x310 [ 16.535610] kunit_try_run_case+0x1a5/0x480 [ 16.535830] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.536109] kthread+0x337/0x6f0 [ 16.536280] ret_from_fork+0x116/0x1d0 [ 16.536483] ret_from_fork_asm+0x1a/0x30 [ 16.536693] [ 16.536809] The buggy address belongs to the object at ffff8881029cd380 [ 16.536809] which belongs to the cache kmalloc-64 of size 64 [ 16.537285] The buggy address is located 0 bytes to the right of [ 16.537285] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 16.537647] [ 16.537717] The buggy address belongs to the physical page: [ 16.538011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 16.538359] flags: 0x200000000000000(node=0|zone=2) [ 16.538589] page_type: f5(slab) [ 16.538780] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.539097] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.539315] page dumped because: kasan: bad access detected [ 16.539481] [ 16.539548] Memory state around the buggy address: [ 16.539783] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.540109] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.540434] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.540807] ^ [ 16.540960] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.541256] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.541573] ================================================================== [ 15.336235] ================================================================== [ 15.336543] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 15.337339] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 15.337693] [ 15.337812] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.337858] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.337870] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.337892] Call Trace: [ 15.337920] <TASK> [ 15.337938] dump_stack_lvl+0x73/0xb0 [ 15.337968] print_report+0xd1/0x650 [ 15.338003] ? __virt_addr_valid+0x1db/0x2d0 [ 15.338029] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.338051] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.338084] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.338107] kasan_report+0x141/0x180 [ 15.338130] ? kasan_atomics_helper+0x5fe/0x5450 [ 15.338168] kasan_check_range+0x10c/0x1c0 [ 15.338194] __kasan_check_write+0x18/0x20 [ 15.338214] kasan_atomics_helper+0x5fe/0x5450 [ 15.338238] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.338263] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.338291] ? kasan_atomics+0x152/0x310 [ 15.338318] kasan_atomics+0x1dc/0x310 [ 15.338341] ? __pfx_kasan_atomics+0x10/0x10 [ 15.338375] ? __pfx_read_tsc+0x10/0x10 [ 15.338397] ? ktime_get_ts64+0x86/0x230 [ 15.338422] kunit_try_run_case+0x1a5/0x480 [ 15.338458] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.338482] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.338507] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.338538] ? __kthread_parkme+0x82/0x180 [ 15.338560] ? preempt_count_sub+0x50/0x80 [ 15.338585] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.338626] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.338652] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.338678] kthread+0x337/0x6f0 [ 15.338698] ? trace_preempt_on+0x20/0xc0 [ 15.338722] ? __pfx_kthread+0x10/0x10 [ 15.338744] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.338766] ? calculate_sigpending+0x7b/0xa0 [ 15.338800] ? __pfx_kthread+0x10/0x10 [ 15.338822] ret_from_fork+0x116/0x1d0 [ 15.338846] ? __pfx_kthread+0x10/0x10 [ 15.338867] ret_from_fork_asm+0x1a/0x30 [ 15.338900] </TASK> [ 15.338911] [ 15.347257] Allocated by task 282: [ 15.347479] kasan_save_stack+0x45/0x70 [ 15.347657] kasan_save_track+0x18/0x40 [ 15.347977] kasan_save_alloc_info+0x3b/0x50 [ 15.348159] __kasan_kmalloc+0xb7/0xc0 [ 15.348386] __kmalloc_cache_noprof+0x189/0x420 [ 15.348634] kasan_atomics+0x95/0x310 [ 15.348855] kunit_try_run_case+0x1a5/0x480 [ 15.349101] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.349349] kthread+0x337/0x6f0 [ 15.349570] ret_from_fork+0x116/0x1d0 [ 15.349799] ret_from_fork_asm+0x1a/0x30 [ 15.349977] [ 15.350045] The buggy address belongs to the object at ffff8881029cd380 [ 15.350045] which belongs to the cache kmalloc-64 of size 64 [ 15.350426] The buggy address is located 0 bytes to the right of [ 15.350426] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 15.350992] [ 15.351069] The buggy address belongs to the physical page: [ 15.351237] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 15.351500] flags: 0x200000000000000(node=0|zone=2) [ 15.351756] page_type: f5(slab) [ 15.351978] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.352327] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.352683] page dumped because: kasan: bad access detected [ 15.352978] [ 15.353094] Memory state around the buggy address: [ 15.353283] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.353616] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.353952] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.354316] ^ [ 15.354531] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.354882] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.355148] ================================================================== [ 15.428866] ================================================================== [ 15.429249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 15.429787] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 15.430139] [ 15.430252] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.430296] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.430308] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.430329] Call Trace: [ 15.430348] <TASK> [ 15.430365] dump_stack_lvl+0x73/0xb0 [ 15.430394] print_report+0xd1/0x650 [ 15.430417] ? __virt_addr_valid+0x1db/0x2d0 [ 15.430441] ? kasan_atomics_helper+0x860/0x5450 [ 15.430464] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.430488] ? kasan_atomics_helper+0x860/0x5450 [ 15.430511] kasan_report+0x141/0x180 [ 15.430534] ? kasan_atomics_helper+0x860/0x5450 [ 15.430561] kasan_check_range+0x10c/0x1c0 [ 15.430585] __kasan_check_write+0x18/0x20 [ 15.430618] kasan_atomics_helper+0x860/0x5450 [ 15.430642] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.430665] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.430692] ? kasan_atomics+0x152/0x310 [ 15.430718] kasan_atomics+0x1dc/0x310 [ 15.430742] ? __pfx_kasan_atomics+0x10/0x10 [ 15.430767] ? __pfx_read_tsc+0x10/0x10 [ 15.430801] ? ktime_get_ts64+0x86/0x230 [ 15.430833] kunit_try_run_case+0x1a5/0x480 [ 15.430859] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.430883] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.430910] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.430936] ? __kthread_parkme+0x82/0x180 [ 15.430957] ? preempt_count_sub+0x50/0x80 [ 15.430982] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.431008] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.431034] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.431061] kthread+0x337/0x6f0 [ 15.431080] ? trace_preempt_on+0x20/0xc0 [ 15.431106] ? __pfx_kthread+0x10/0x10 [ 15.431128] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.431151] ? calculate_sigpending+0x7b/0xa0 [ 15.431175] ? __pfx_kthread+0x10/0x10 [ 15.431197] ret_from_fork+0x116/0x1d0 [ 15.431216] ? __pfx_kthread+0x10/0x10 [ 15.431237] ret_from_fork_asm+0x1a/0x30 [ 15.431267] </TASK> [ 15.431278] [ 15.438712] Allocated by task 282: [ 15.438931] kasan_save_stack+0x45/0x70 [ 15.439082] kasan_save_track+0x18/0x40 [ 15.439278] kasan_save_alloc_info+0x3b/0x50 [ 15.439494] __kasan_kmalloc+0xb7/0xc0 [ 15.439672] __kmalloc_cache_noprof+0x189/0x420 [ 15.439903] kasan_atomics+0x95/0x310 [ 15.440055] kunit_try_run_case+0x1a5/0x480 [ 15.440258] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.440493] kthread+0x337/0x6f0 [ 15.440640] ret_from_fork+0x116/0x1d0 [ 15.440887] ret_from_fork_asm+0x1a/0x30 [ 15.441085] [ 15.441174] The buggy address belongs to the object at ffff8881029cd380 [ 15.441174] which belongs to the cache kmalloc-64 of size 64 [ 15.441640] The buggy address is located 0 bytes to the right of [ 15.441640] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 15.442139] [ 15.442231] The buggy address belongs to the physical page: [ 15.442405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 15.442654] flags: 0x200000000000000(node=0|zone=2) [ 15.442818] page_type: f5(slab) [ 15.442940] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.443298] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.443645] page dumped because: kasan: bad access detected [ 15.443948] [ 15.444018] Memory state around the buggy address: [ 15.444174] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.444391] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.444618] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.444905] ^ [ 15.445131] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.445454] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.445784] ================================================================== [ 16.183928] ================================================================== [ 16.184721] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 16.185255] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 16.185752] [ 16.185879] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.185925] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.185938] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.185959] Call Trace: [ 16.185976] <TASK> [ 16.185992] dump_stack_lvl+0x73/0xb0 [ 16.186022] print_report+0xd1/0x650 [ 16.186044] ? __virt_addr_valid+0x1db/0x2d0 [ 16.186068] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.186091] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.186114] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.186137] kasan_report+0x141/0x180 [ 16.186160] ? kasan_atomics_helper+0x1a7f/0x5450 [ 16.186187] kasan_check_range+0x10c/0x1c0 [ 16.186211] __kasan_check_write+0x18/0x20 [ 16.186231] kasan_atomics_helper+0x1a7f/0x5450 [ 16.186255] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.186278] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.186305] ? kasan_atomics+0x152/0x310 [ 16.186332] kasan_atomics+0x1dc/0x310 [ 16.186355] ? __pfx_kasan_atomics+0x10/0x10 [ 16.186381] ? __pfx_read_tsc+0x10/0x10 [ 16.186402] ? ktime_get_ts64+0x86/0x230 [ 16.186427] kunit_try_run_case+0x1a5/0x480 [ 16.186452] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.186476] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.186499] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.186524] ? __kthread_parkme+0x82/0x180 [ 16.186545] ? preempt_count_sub+0x50/0x80 [ 16.186569] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.186605] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.186632] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.186657] kthread+0x337/0x6f0 [ 16.186676] ? trace_preempt_on+0x20/0xc0 [ 16.186702] ? __pfx_kthread+0x10/0x10 [ 16.186725] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.186747] ? calculate_sigpending+0x7b/0xa0 [ 16.186772] ? __pfx_kthread+0x10/0x10 [ 16.186794] ret_from_fork+0x116/0x1d0 [ 16.186813] ? __pfx_kthread+0x10/0x10 [ 16.186841] ret_from_fork_asm+0x1a/0x30 [ 16.186872] </TASK> [ 16.186882] [ 16.193941] Allocated by task 282: [ 16.194073] kasan_save_stack+0x45/0x70 [ 16.194471] kasan_save_track+0x18/0x40 [ 16.194675] kasan_save_alloc_info+0x3b/0x50 [ 16.194893] __kasan_kmalloc+0xb7/0xc0 [ 16.195086] __kmalloc_cache_noprof+0x189/0x420 [ 16.195322] kasan_atomics+0x95/0x310 [ 16.195505] kunit_try_run_case+0x1a5/0x480 [ 16.195726] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.195940] kthread+0x337/0x6f0 [ 16.196074] ret_from_fork+0x116/0x1d0 [ 16.196266] ret_from_fork_asm+0x1a/0x30 [ 16.196462] [ 16.196549] The buggy address belongs to the object at ffff8881029cd380 [ 16.196549] which belongs to the cache kmalloc-64 of size 64 [ 16.197026] The buggy address is located 0 bytes to the right of [ 16.197026] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 16.197397] [ 16.197469] The buggy address belongs to the physical page: [ 16.197652] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 16.198210] flags: 0x200000000000000(node=0|zone=2) [ 16.198442] page_type: f5(slab) [ 16.198623] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.198972] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.199230] page dumped because: kasan: bad access detected [ 16.199402] [ 16.199470] Memory state around the buggy address: [ 16.199636] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.199853] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.200176] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.200496] ^ [ 16.200735] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.201064] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.201581] ================================================================== [ 15.220649] ================================================================== [ 15.220984] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 15.221282] Read of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 15.221619] [ 15.221735] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.221779] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.221791] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.221878] Call Trace: [ 15.221898] <TASK> [ 15.221917] dump_stack_lvl+0x73/0xb0 [ 15.221946] print_report+0xd1/0x650 [ 15.221969] ? __virt_addr_valid+0x1db/0x2d0 [ 15.221993] ? kasan_atomics_helper+0x3df/0x5450 [ 15.222016] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.222041] ? kasan_atomics_helper+0x3df/0x5450 [ 15.222065] kasan_report+0x141/0x180 [ 15.222087] ? kasan_atomics_helper+0x3df/0x5450 [ 15.222114] kasan_check_range+0x10c/0x1c0 [ 15.222138] __kasan_check_read+0x15/0x20 [ 15.222160] kasan_atomics_helper+0x3df/0x5450 [ 15.222184] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.222207] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.222234] ? kasan_atomics+0x152/0x310 [ 15.222261] kasan_atomics+0x1dc/0x310 [ 15.222284] ? __pfx_kasan_atomics+0x10/0x10 [ 15.222308] ? __pfx_read_tsc+0x10/0x10 [ 15.222331] ? ktime_get_ts64+0x86/0x230 [ 15.222357] kunit_try_run_case+0x1a5/0x480 [ 15.222381] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.222405] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.222431] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.222455] ? __kthread_parkme+0x82/0x180 [ 15.222477] ? preempt_count_sub+0x50/0x80 [ 15.222505] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.222531] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.222557] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.222583] kthread+0x337/0x6f0 [ 15.222613] ? trace_preempt_on+0x20/0xc0 [ 15.222639] ? __pfx_kthread+0x10/0x10 [ 15.222660] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.222683] ? calculate_sigpending+0x7b/0xa0 [ 15.222709] ? __pfx_kthread+0x10/0x10 [ 15.222731] ret_from_fork+0x116/0x1d0 [ 15.222751] ? __pfx_kthread+0x10/0x10 [ 15.222772] ret_from_fork_asm+0x1a/0x30 [ 15.223125] </TASK> [ 15.223144] [ 15.231109] Allocated by task 282: [ 15.231299] kasan_save_stack+0x45/0x70 [ 15.231503] kasan_save_track+0x18/0x40 [ 15.231719] kasan_save_alloc_info+0x3b/0x50 [ 15.232034] __kasan_kmalloc+0xb7/0xc0 [ 15.232229] __kmalloc_cache_noprof+0x189/0x420 [ 15.232451] kasan_atomics+0x95/0x310 [ 15.232646] kunit_try_run_case+0x1a5/0x480 [ 15.232906] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.233143] kthread+0x337/0x6f0 [ 15.233278] ret_from_fork+0x116/0x1d0 [ 15.233411] ret_from_fork_asm+0x1a/0x30 [ 15.233553] [ 15.233635] The buggy address belongs to the object at ffff8881029cd380 [ 15.233635] which belongs to the cache kmalloc-64 of size 64 [ 15.234236] The buggy address is located 0 bytes to the right of [ 15.234236] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 15.234784] [ 15.235046] The buggy address belongs to the physical page: [ 15.235226] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 15.235471] flags: 0x200000000000000(node=0|zone=2) [ 15.235722] page_type: f5(slab) [ 15.235892] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.236315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.236680] page dumped because: kasan: bad access detected [ 15.237016] [ 15.237117] Memory state around the buggy address: [ 15.237355] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.237663] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.237955] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.238197] ^ [ 15.238420] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.238747] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.239087] ================================================================== [ 16.396512] ================================================================== [ 16.396886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 16.397276] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 16.397583] [ 16.397681] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.397726] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.397738] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.397759] Call Trace: [ 16.397776] <TASK> [ 16.397803] dump_stack_lvl+0x73/0xb0 [ 16.397832] print_report+0xd1/0x650 [ 16.397856] ? __virt_addr_valid+0x1db/0x2d0 [ 16.397880] ? kasan_atomics_helper+0x2006/0x5450 [ 16.397902] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.397926] ? kasan_atomics_helper+0x2006/0x5450 [ 16.397972] kasan_report+0x141/0x180 [ 16.397994] ? kasan_atomics_helper+0x2006/0x5450 [ 16.398021] kasan_check_range+0x10c/0x1c0 [ 16.398046] __kasan_check_write+0x18/0x20 [ 16.398067] kasan_atomics_helper+0x2006/0x5450 [ 16.398091] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.398115] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.398142] ? kasan_atomics+0x152/0x310 [ 16.398168] kasan_atomics+0x1dc/0x310 [ 16.398191] ? __pfx_kasan_atomics+0x10/0x10 [ 16.398216] ? __pfx_read_tsc+0x10/0x10 [ 16.398238] ? ktime_get_ts64+0x86/0x230 [ 16.398264] kunit_try_run_case+0x1a5/0x480 [ 16.398289] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.398313] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.398338] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.398363] ? __kthread_parkme+0x82/0x180 [ 16.398386] ? preempt_count_sub+0x50/0x80 [ 16.398411] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.398436] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.398479] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.398505] kthread+0x337/0x6f0 [ 16.398525] ? trace_preempt_on+0x20/0xc0 [ 16.398552] ? __pfx_kthread+0x10/0x10 [ 16.398574] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.398608] ? calculate_sigpending+0x7b/0xa0 [ 16.398634] ? __pfx_kthread+0x10/0x10 [ 16.398657] ret_from_fork+0x116/0x1d0 [ 16.398676] ? __pfx_kthread+0x10/0x10 [ 16.398697] ret_from_fork_asm+0x1a/0x30 [ 16.398730] </TASK> [ 16.398742] [ 16.406973] Allocated by task 282: [ 16.407155] kasan_save_stack+0x45/0x70 [ 16.407351] kasan_save_track+0x18/0x40 [ 16.407528] kasan_save_alloc_info+0x3b/0x50 [ 16.407738] __kasan_kmalloc+0xb7/0xc0 [ 16.407951] __kmalloc_cache_noprof+0x189/0x420 [ 16.408131] kasan_atomics+0x95/0x310 [ 16.408263] kunit_try_run_case+0x1a5/0x480 [ 16.408490] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.408759] kthread+0x337/0x6f0 [ 16.409020] ret_from_fork+0x116/0x1d0 [ 16.409233] ret_from_fork_asm+0x1a/0x30 [ 16.409426] [ 16.409498] The buggy address belongs to the object at ffff8881029cd380 [ 16.409498] which belongs to the cache kmalloc-64 of size 64 [ 16.410031] The buggy address is located 0 bytes to the right of [ 16.410031] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 16.410404] [ 16.410481] The buggy address belongs to the physical page: [ 16.410745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 16.411105] flags: 0x200000000000000(node=0|zone=2) [ 16.411351] page_type: f5(slab) [ 16.411521] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.411845] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.412172] page dumped because: kasan: bad access detected [ 16.412429] [ 16.412522] Memory state around the buggy address: [ 16.412746] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.413024] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.413243] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.413458] ^ [ 16.413698] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.414188] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.414616] ================================================================== [ 15.993974] ================================================================== [ 15.994310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 15.994668] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 15.995062] [ 15.995152] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.995199] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.995211] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.995233] Call Trace: [ 15.995251] <TASK> [ 15.995268] dump_stack_lvl+0x73/0xb0 [ 15.995299] print_report+0xd1/0x650 [ 15.995322] ? __virt_addr_valid+0x1db/0x2d0 [ 15.995401] ? kasan_atomics_helper+0x151d/0x5450 [ 15.995464] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.995489] ? kasan_atomics_helper+0x151d/0x5450 [ 15.995512] kasan_report+0x141/0x180 [ 15.995535] ? kasan_atomics_helper+0x151d/0x5450 [ 15.995562] kasan_check_range+0x10c/0x1c0 [ 15.995587] __kasan_check_write+0x18/0x20 [ 15.995619] kasan_atomics_helper+0x151d/0x5450 [ 15.995642] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.995666] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.995693] ? kasan_atomics+0x152/0x310 [ 15.995720] kasan_atomics+0x1dc/0x310 [ 15.995743] ? __pfx_kasan_atomics+0x10/0x10 [ 15.995768] ? __pfx_read_tsc+0x10/0x10 [ 15.995819] ? ktime_get_ts64+0x86/0x230 [ 15.995844] kunit_try_run_case+0x1a5/0x480 [ 15.995869] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.995894] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.995919] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.995944] ? __kthread_parkme+0x82/0x180 [ 15.995966] ? preempt_count_sub+0x50/0x80 [ 15.995991] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.996017] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.996042] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.996069] kthread+0x337/0x6f0 [ 15.996089] ? trace_preempt_on+0x20/0xc0 [ 15.996113] ? __pfx_kthread+0x10/0x10 [ 15.996134] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.996157] ? calculate_sigpending+0x7b/0xa0 [ 15.996182] ? __pfx_kthread+0x10/0x10 [ 15.996204] ret_from_fork+0x116/0x1d0 [ 15.996223] ? __pfx_kthread+0x10/0x10 [ 15.996245] ret_from_fork_asm+0x1a/0x30 [ 15.996276] </TASK> [ 15.996287] [ 16.004464] Allocated by task 282: [ 16.004689] kasan_save_stack+0x45/0x70 [ 16.005038] kasan_save_track+0x18/0x40 [ 16.005217] kasan_save_alloc_info+0x3b/0x50 [ 16.005435] __kasan_kmalloc+0xb7/0xc0 [ 16.005635] __kmalloc_cache_noprof+0x189/0x420 [ 16.005885] kasan_atomics+0x95/0x310 [ 16.006100] kunit_try_run_case+0x1a5/0x480 [ 16.006312] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.006571] kthread+0x337/0x6f0 [ 16.006744] ret_from_fork+0x116/0x1d0 [ 16.006984] ret_from_fork_asm+0x1a/0x30 [ 16.007175] [ 16.007299] The buggy address belongs to the object at ffff8881029cd380 [ 16.007299] which belongs to the cache kmalloc-64 of size 64 [ 16.007774] The buggy address is located 0 bytes to the right of [ 16.007774] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 16.008342] [ 16.008436] The buggy address belongs to the physical page: [ 16.008616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 16.009047] flags: 0x200000000000000(node=0|zone=2) [ 16.009277] page_type: f5(slab) [ 16.009476] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.009756] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.009999] page dumped because: kasan: bad access detected [ 16.010317] [ 16.010432] Memory state around the buggy address: [ 16.010703] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.011023] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.011346] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.011553] ^ [ 16.011806] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.012422] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.012700] ================================================================== [ 15.937662] ================================================================== [ 15.938023] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 15.938278] Read of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 15.938523] [ 15.938645] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.938690] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.938702] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.938722] Call Trace: [ 15.938742] <TASK> [ 15.938759] dump_stack_lvl+0x73/0xb0 [ 15.938801] print_report+0xd1/0x650 [ 15.938831] ? __virt_addr_valid+0x1db/0x2d0 [ 15.938858] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.938880] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.938904] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.938926] kasan_report+0x141/0x180 [ 15.938949] ? kasan_atomics_helper+0x4eae/0x5450 [ 15.938976] __asan_report_load8_noabort+0x18/0x20 [ 15.939002] kasan_atomics_helper+0x4eae/0x5450 [ 15.939025] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.939048] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.939075] ? kasan_atomics+0x152/0x310 [ 15.939101] kasan_atomics+0x1dc/0x310 [ 15.939123] ? __pfx_kasan_atomics+0x10/0x10 [ 15.939149] ? __pfx_read_tsc+0x10/0x10 [ 15.939170] ? ktime_get_ts64+0x86/0x230 [ 15.939195] kunit_try_run_case+0x1a5/0x480 [ 15.939245] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.939270] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.939294] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.939318] ? __kthread_parkme+0x82/0x180 [ 15.939340] ? preempt_count_sub+0x50/0x80 [ 15.939383] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.939408] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.939434] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.939459] kthread+0x337/0x6f0 [ 15.939479] ? trace_preempt_on+0x20/0xc0 [ 15.939505] ? __pfx_kthread+0x10/0x10 [ 15.939526] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.939564] ? calculate_sigpending+0x7b/0xa0 [ 15.939589] ? __pfx_kthread+0x10/0x10 [ 15.939624] ret_from_fork+0x116/0x1d0 [ 15.939644] ? __pfx_kthread+0x10/0x10 [ 15.939664] ret_from_fork_asm+0x1a/0x30 [ 15.939713] </TASK> [ 15.939725] [ 15.947605] Allocated by task 282: [ 15.947790] kasan_save_stack+0x45/0x70 [ 15.948036] kasan_save_track+0x18/0x40 [ 15.948229] kasan_save_alloc_info+0x3b/0x50 [ 15.948441] __kasan_kmalloc+0xb7/0xc0 [ 15.948634] __kmalloc_cache_noprof+0x189/0x420 [ 15.948803] kasan_atomics+0x95/0x310 [ 15.948941] kunit_try_run_case+0x1a5/0x480 [ 15.949090] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.949340] kthread+0x337/0x6f0 [ 15.949587] ret_from_fork+0x116/0x1d0 [ 15.949813] ret_from_fork_asm+0x1a/0x30 [ 15.950077] [ 15.950149] The buggy address belongs to the object at ffff8881029cd380 [ 15.950149] which belongs to the cache kmalloc-64 of size 64 [ 15.950719] The buggy address is located 0 bytes to the right of [ 15.950719] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 15.951358] [ 15.951431] The buggy address belongs to the physical page: [ 15.951903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 15.952227] flags: 0x200000000000000(node=0|zone=2) [ 15.952384] page_type: f5(slab) [ 15.952500] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.952733] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.953063] page dumped because: kasan: bad access detected [ 15.953316] [ 15.953410] Memory state around the buggy address: [ 15.953842] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.954111] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.954370] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.954701] ^ [ 15.955116] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.955339] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.955544] ================================================================== [ 15.141364] ================================================================== [ 15.142216] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 15.142553] Read of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 15.142972] [ 15.143096] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.143144] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.143156] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.143177] Call Trace: [ 15.143189] <TASK> [ 15.143206] dump_stack_lvl+0x73/0xb0 [ 15.143234] print_report+0xd1/0x650 [ 15.143282] ? __virt_addr_valid+0x1db/0x2d0 [ 15.143306] ? kasan_atomics_helper+0x4bbc/0x5450 [ 15.143327] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.143350] ? kasan_atomics_helper+0x4bbc/0x5450 [ 15.143372] kasan_report+0x141/0x180 [ 15.143393] ? kasan_atomics_helper+0x4bbc/0x5450 [ 15.143420] __asan_report_load4_noabort+0x18/0x20 [ 15.143444] kasan_atomics_helper+0x4bbc/0x5450 [ 15.143484] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.143507] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.143534] ? kasan_atomics+0x152/0x310 [ 15.143559] kasan_atomics+0x1dc/0x310 [ 15.143582] ? __pfx_kasan_atomics+0x10/0x10 [ 15.143619] ? __pfx_read_tsc+0x10/0x10 [ 15.143657] ? ktime_get_ts64+0x86/0x230 [ 15.143683] kunit_try_run_case+0x1a5/0x480 [ 15.143707] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.143731] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.143755] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.143810] ? __kthread_parkme+0x82/0x180 [ 15.143832] ? preempt_count_sub+0x50/0x80 [ 15.143857] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.143882] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.143942] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.143968] kthread+0x337/0x6f0 [ 15.143986] ? trace_preempt_on+0x20/0xc0 [ 15.144012] ? __pfx_kthread+0x10/0x10 [ 15.144031] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.144053] ? calculate_sigpending+0x7b/0xa0 [ 15.144077] ? __pfx_kthread+0x10/0x10 [ 15.144099] ret_from_fork+0x116/0x1d0 [ 15.144118] ? __pfx_kthread+0x10/0x10 [ 15.144138] ret_from_fork_asm+0x1a/0x30 [ 15.144186] </TASK> [ 15.144196] [ 15.152428] Allocated by task 282: [ 15.152736] kasan_save_stack+0x45/0x70 [ 15.152984] kasan_save_track+0x18/0x40 [ 15.153148] kasan_save_alloc_info+0x3b/0x50 [ 15.153346] __kasan_kmalloc+0xb7/0xc0 [ 15.153532] __kmalloc_cache_noprof+0x189/0x420 [ 15.153726] kasan_atomics+0x95/0x310 [ 15.153905] kunit_try_run_case+0x1a5/0x480 [ 15.154054] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.154230] kthread+0x337/0x6f0 [ 15.154352] ret_from_fork+0x116/0x1d0 [ 15.154485] ret_from_fork_asm+0x1a/0x30 [ 15.154701] [ 15.154890] The buggy address belongs to the object at ffff8881029cd380 [ 15.154890] which belongs to the cache kmalloc-64 of size 64 [ 15.155488] The buggy address is located 0 bytes to the right of [ 15.155488] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 15.156122] [ 15.156224] The buggy address belongs to the physical page: [ 15.156775] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 15.157109] flags: 0x200000000000000(node=0|zone=2) [ 15.157368] page_type: f5(slab) [ 15.157580] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.158033] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.158693] page dumped because: kasan: bad access detected [ 15.159008] [ 15.159102] Memory state around the buggy address: [ 15.159267] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.159483] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.159719] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.159933] ^ [ 15.160290] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.160835] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.161182] ================================================================== [ 15.183153] ================================================================== [ 15.183474] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 15.183841] Read of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 15.184090] [ 15.184176] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.184219] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.184230] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.184250] Call Trace: [ 15.184263] <TASK> [ 15.184278] dump_stack_lvl+0x73/0xb0 [ 15.184305] print_report+0xd1/0x650 [ 15.184327] ? __virt_addr_valid+0x1db/0x2d0 [ 15.184349] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.184371] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.184394] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.184415] kasan_report+0x141/0x180 [ 15.184436] ? kasan_atomics_helper+0x4b88/0x5450 [ 15.184463] __asan_report_load4_noabort+0x18/0x20 [ 15.184488] kasan_atomics_helper+0x4b88/0x5450 [ 15.184510] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.184533] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.184566] ? kasan_atomics+0x152/0x310 [ 15.184604] kasan_atomics+0x1dc/0x310 [ 15.184626] ? __pfx_kasan_atomics+0x10/0x10 [ 15.184650] ? __pfx_read_tsc+0x10/0x10 [ 15.184670] ? ktime_get_ts64+0x86/0x230 [ 15.184697] kunit_try_run_case+0x1a5/0x480 [ 15.184722] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.184745] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.184788] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.184846] ? __kthread_parkme+0x82/0x180 [ 15.184866] ? preempt_count_sub+0x50/0x80 [ 15.184891] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.184915] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.184939] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.184965] kthread+0x337/0x6f0 [ 15.184984] ? trace_preempt_on+0x20/0xc0 [ 15.185008] ? __pfx_kthread+0x10/0x10 [ 15.185028] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.185049] ? calculate_sigpending+0x7b/0xa0 [ 15.185074] ? __pfx_kthread+0x10/0x10 [ 15.185095] ret_from_fork+0x116/0x1d0 [ 15.185114] ? __pfx_kthread+0x10/0x10 [ 15.185134] ret_from_fork_asm+0x1a/0x30 [ 15.185165] </TASK> [ 15.185175] [ 15.192821] Allocated by task 282: [ 15.192998] kasan_save_stack+0x45/0x70 [ 15.193172] kasan_save_track+0x18/0x40 [ 15.193307] kasan_save_alloc_info+0x3b/0x50 [ 15.193456] __kasan_kmalloc+0xb7/0xc0 [ 15.193588] __kmalloc_cache_noprof+0x189/0x420 [ 15.193992] kasan_atomics+0x95/0x310 [ 15.194184] kunit_try_run_case+0x1a5/0x480 [ 15.194396] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.194666] kthread+0x337/0x6f0 [ 15.194968] ret_from_fork+0x116/0x1d0 [ 15.195122] ret_from_fork_asm+0x1a/0x30 [ 15.195321] [ 15.195400] The buggy address belongs to the object at ffff8881029cd380 [ 15.195400] which belongs to the cache kmalloc-64 of size 64 [ 15.195991] The buggy address is located 0 bytes to the right of [ 15.195991] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 15.196675] [ 15.196793] The buggy address belongs to the physical page: [ 15.197010] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 15.197359] flags: 0x200000000000000(node=0|zone=2) [ 15.197676] page_type: f5(slab) [ 15.197873] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.198137] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.198366] page dumped because: kasan: bad access detected [ 15.198539] [ 15.198619] Memory state around the buggy address: [ 15.198895] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.199521] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.199790] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.200104] ^ [ 15.200278] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.200514] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.201081] ================================================================== [ 16.437651] ================================================================== [ 16.438287] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 16.438687] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 16.439224] [ 16.439339] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.439384] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.439396] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.439417] Call Trace: [ 16.439434] <TASK> [ 16.439452] dump_stack_lvl+0x73/0xb0 [ 16.439482] print_report+0xd1/0x650 [ 16.439505] ? __virt_addr_valid+0x1db/0x2d0 [ 16.439529] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.439551] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.439576] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.439611] kasan_report+0x141/0x180 [ 16.439633] ? kasan_atomics_helper+0x20c8/0x5450 [ 16.439661] kasan_check_range+0x10c/0x1c0 [ 16.439686] __kasan_check_write+0x18/0x20 [ 16.439706] kasan_atomics_helper+0x20c8/0x5450 [ 16.439729] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.439753] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.439931] ? kasan_atomics+0x152/0x310 [ 16.439963] kasan_atomics+0x1dc/0x310 [ 16.439987] ? __pfx_kasan_atomics+0x10/0x10 [ 16.440013] ? __pfx_read_tsc+0x10/0x10 [ 16.440035] ? ktime_get_ts64+0x86/0x230 [ 16.440097] kunit_try_run_case+0x1a5/0x480 [ 16.440125] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.440149] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.440177] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.440202] ? __kthread_parkme+0x82/0x180 [ 16.440223] ? preempt_count_sub+0x50/0x80 [ 16.440249] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.440274] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.440300] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.440326] kthread+0x337/0x6f0 [ 16.440346] ? trace_preempt_on+0x20/0xc0 [ 16.440371] ? __pfx_kthread+0x10/0x10 [ 16.440392] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.440415] ? calculate_sigpending+0x7b/0xa0 [ 16.440440] ? __pfx_kthread+0x10/0x10 [ 16.440462] ret_from_fork+0x116/0x1d0 [ 16.440482] ? __pfx_kthread+0x10/0x10 [ 16.440504] ret_from_fork_asm+0x1a/0x30 [ 16.440536] </TASK> [ 16.440548] [ 16.451561] Allocated by task 282: [ 16.451760] kasan_save_stack+0x45/0x70 [ 16.452284] kasan_save_track+0x18/0x40 [ 16.452574] kasan_save_alloc_info+0x3b/0x50 [ 16.452977] __kasan_kmalloc+0xb7/0xc0 [ 16.453280] __kmalloc_cache_noprof+0x189/0x420 [ 16.453489] kasan_atomics+0x95/0x310 [ 16.453672] kunit_try_run_case+0x1a5/0x480 [ 16.454204] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.454505] kthread+0x337/0x6f0 [ 16.454776] ret_from_fork+0x116/0x1d0 [ 16.455174] ret_from_fork_asm+0x1a/0x30 [ 16.455467] [ 16.455696] The buggy address belongs to the object at ffff8881029cd380 [ 16.455696] which belongs to the cache kmalloc-64 of size 64 [ 16.456357] The buggy address is located 0 bytes to the right of [ 16.456357] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 16.457084] [ 16.457309] The buggy address belongs to the physical page: [ 16.457806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 16.458272] flags: 0x200000000000000(node=0|zone=2) [ 16.458624] page_type: f5(slab) [ 16.458953] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.459359] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.459684] page dumped because: kasan: bad access detected [ 16.460069] [ 16.460298] Memory state around the buggy address: [ 16.460690] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.461141] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.461443] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.461743] ^ [ 16.462298] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.462793] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.463279] ================================================================== [ 15.520702] ================================================================== [ 15.522073] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 15.523187] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 15.524200] [ 15.524570] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.524811] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.524827] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.524849] Call Trace: [ 15.524866] <TASK> [ 15.524885] dump_stack_lvl+0x73/0xb0 [ 15.524927] print_report+0xd1/0x650 [ 15.524950] ? __virt_addr_valid+0x1db/0x2d0 [ 15.524973] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.524996] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.525020] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.525042] kasan_report+0x141/0x180 [ 15.525065] ? kasan_atomics_helper+0xb6a/0x5450 [ 15.525092] kasan_check_range+0x10c/0x1c0 [ 15.525117] __kasan_check_write+0x18/0x20 [ 15.525137] kasan_atomics_helper+0xb6a/0x5450 [ 15.525161] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.525184] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.525210] ? kasan_atomics+0x152/0x310 [ 15.525237] kasan_atomics+0x1dc/0x310 [ 15.525260] ? __pfx_kasan_atomics+0x10/0x10 [ 15.525284] ? __pfx_read_tsc+0x10/0x10 [ 15.525307] ? ktime_get_ts64+0x86/0x230 [ 15.525331] kunit_try_run_case+0x1a5/0x480 [ 15.525356] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.525379] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.525403] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.525428] ? __kthread_parkme+0x82/0x180 [ 15.525452] ? preempt_count_sub+0x50/0x80 [ 15.525476] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.525580] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.525631] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.525657] kthread+0x337/0x6f0 [ 15.525677] ? trace_preempt_on+0x20/0xc0 [ 15.525702] ? __pfx_kthread+0x10/0x10 [ 15.525723] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.525746] ? calculate_sigpending+0x7b/0xa0 [ 15.525772] ? __pfx_kthread+0x10/0x10 [ 15.525793] ret_from_fork+0x116/0x1d0 [ 15.525813] ? __pfx_kthread+0x10/0x10 [ 15.525835] ret_from_fork_asm+0x1a/0x30 [ 15.525867] </TASK> [ 15.525878] [ 15.542088] Allocated by task 282: [ 15.542487] kasan_save_stack+0x45/0x70 [ 15.542982] kasan_save_track+0x18/0x40 [ 15.543122] kasan_save_alloc_info+0x3b/0x50 [ 15.543270] __kasan_kmalloc+0xb7/0xc0 [ 15.543398] __kmalloc_cache_noprof+0x189/0x420 [ 15.543550] kasan_atomics+0x95/0x310 [ 15.543689] kunit_try_run_case+0x1a5/0x480 [ 15.543854] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.544024] kthread+0x337/0x6f0 [ 15.544559] ret_from_fork+0x116/0x1d0 [ 15.545116] ret_from_fork_asm+0x1a/0x30 [ 15.545513] [ 15.545719] The buggy address belongs to the object at ffff8881029cd380 [ 15.545719] which belongs to the cache kmalloc-64 of size 64 [ 15.546490] The buggy address is located 0 bytes to the right of [ 15.546490] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 15.547275] [ 15.547376] The buggy address belongs to the physical page: [ 15.547575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 15.548318] flags: 0x200000000000000(node=0|zone=2) [ 15.548965] page_type: f5(slab) [ 15.549458] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.550300] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.550894] page dumped because: kasan: bad access detected [ 15.551511] [ 15.551698] Memory state around the buggy address: [ 15.552123] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.552855] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.553081] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.553288] ^ [ 15.553438] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.553670] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.554323] ================================================================== [ 16.013321] ================================================================== [ 16.013575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 16.013824] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 16.014047] [ 16.014126] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.014167] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.014179] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.014198] Call Trace: [ 16.014262] <TASK> [ 16.014279] dump_stack_lvl+0x73/0xb0 [ 16.014306] print_report+0xd1/0x650 [ 16.014328] ? __virt_addr_valid+0x1db/0x2d0 [ 16.014351] ? kasan_atomics_helper+0x15b6/0x5450 [ 16.014374] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.014398] ? kasan_atomics_helper+0x15b6/0x5450 [ 16.014421] kasan_report+0x141/0x180 [ 16.014444] ? kasan_atomics_helper+0x15b6/0x5450 [ 16.014470] kasan_check_range+0x10c/0x1c0 [ 16.014495] __kasan_check_write+0x18/0x20 [ 16.014516] kasan_atomics_helper+0x15b6/0x5450 [ 16.014539] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.014563] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.014589] ? kasan_atomics+0x152/0x310 [ 16.014627] kasan_atomics+0x1dc/0x310 [ 16.014652] ? __pfx_kasan_atomics+0x10/0x10 [ 16.014676] ? __pfx_read_tsc+0x10/0x10 [ 16.014700] ? ktime_get_ts64+0x86/0x230 [ 16.014725] kunit_try_run_case+0x1a5/0x480 [ 16.014750] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.014774] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.014808] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.014843] ? __kthread_parkme+0x82/0x180 [ 16.014901] ? preempt_count_sub+0x50/0x80 [ 16.014926] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.014952] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.014979] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.015006] kthread+0x337/0x6f0 [ 16.015026] ? trace_preempt_on+0x20/0xc0 [ 16.015049] ? __pfx_kthread+0x10/0x10 [ 16.015071] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.015094] ? calculate_sigpending+0x7b/0xa0 [ 16.015119] ? __pfx_kthread+0x10/0x10 [ 16.015141] ret_from_fork+0x116/0x1d0 [ 16.015190] ? __pfx_kthread+0x10/0x10 [ 16.015235] ret_from_fork_asm+0x1a/0x30 [ 16.015266] </TASK> [ 16.015278] [ 16.023777] Allocated by task 282: [ 16.023958] kasan_save_stack+0x45/0x70 [ 16.024106] kasan_save_track+0x18/0x40 [ 16.024238] kasan_save_alloc_info+0x3b/0x50 [ 16.024384] __kasan_kmalloc+0xb7/0xc0 [ 16.024616] __kmalloc_cache_noprof+0x189/0x420 [ 16.025034] kasan_atomics+0x95/0x310 [ 16.025287] kunit_try_run_case+0x1a5/0x480 [ 16.025505] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.025817] kthread+0x337/0x6f0 [ 16.026002] ret_from_fork+0x116/0x1d0 [ 16.026131] ret_from_fork_asm+0x1a/0x30 [ 16.026302] [ 16.026429] The buggy address belongs to the object at ffff8881029cd380 [ 16.026429] which belongs to the cache kmalloc-64 of size 64 [ 16.027062] The buggy address is located 0 bytes to the right of [ 16.027062] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 16.027616] [ 16.027719] The buggy address belongs to the physical page: [ 16.027989] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 16.028435] flags: 0x200000000000000(node=0|zone=2) [ 16.028609] page_type: f5(slab) [ 16.028727] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.028967] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.029295] page dumped because: kasan: bad access detected [ 16.029540] [ 16.029676] Memory state around the buggy address: [ 16.029897] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.030207] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.030627] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.031273] ^ [ 16.031516] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.032264] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.033060] ================================================================== [ 16.089301] ================================================================== [ 16.089613] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 16.089869] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 16.090162] [ 16.090250] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.090298] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.090310] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.090333] Call Trace: [ 16.090353] <TASK> [ 16.090373] dump_stack_lvl+0x73/0xb0 [ 16.090403] print_report+0xd1/0x650 [ 16.090426] ? __virt_addr_valid+0x1db/0x2d0 [ 16.090451] ? kasan_atomics_helper+0x177f/0x5450 [ 16.090474] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.090498] ? kasan_atomics_helper+0x177f/0x5450 [ 16.090521] kasan_report+0x141/0x180 [ 16.090544] ? kasan_atomics_helper+0x177f/0x5450 [ 16.090571] kasan_check_range+0x10c/0x1c0 [ 16.090606] __kasan_check_write+0x18/0x20 [ 16.090627] kasan_atomics_helper+0x177f/0x5450 [ 16.090651] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.090674] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.090701] ? kasan_atomics+0x152/0x310 [ 16.090727] kasan_atomics+0x1dc/0x310 [ 16.090750] ? __pfx_kasan_atomics+0x10/0x10 [ 16.090775] ? __pfx_read_tsc+0x10/0x10 [ 16.090810] ? ktime_get_ts64+0x86/0x230 [ 16.090839] kunit_try_run_case+0x1a5/0x480 [ 16.090864] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.090888] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.090913] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.090938] ? __kthread_parkme+0x82/0x180 [ 16.090960] ? preempt_count_sub+0x50/0x80 [ 16.090985] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.091010] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.091035] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.091061] kthread+0x337/0x6f0 [ 16.091081] ? trace_preempt_on+0x20/0xc0 [ 16.091107] ? __pfx_kthread+0x10/0x10 [ 16.091127] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.091151] ? calculate_sigpending+0x7b/0xa0 [ 16.091176] ? __pfx_kthread+0x10/0x10 [ 16.091198] ret_from_fork+0x116/0x1d0 [ 16.091218] ? __pfx_kthread+0x10/0x10 [ 16.091239] ret_from_fork_asm+0x1a/0x30 [ 16.091271] </TASK> [ 16.091282] [ 16.098588] Allocated by task 282: [ 16.098734] kasan_save_stack+0x45/0x70 [ 16.098893] kasan_save_track+0x18/0x40 [ 16.099027] kasan_save_alloc_info+0x3b/0x50 [ 16.099425] __kasan_kmalloc+0xb7/0xc0 [ 16.099619] __kmalloc_cache_noprof+0x189/0x420 [ 16.099834] kasan_atomics+0x95/0x310 [ 16.099997] kunit_try_run_case+0x1a5/0x480 [ 16.100139] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.100309] kthread+0x337/0x6f0 [ 16.100425] ret_from_fork+0x116/0x1d0 [ 16.100553] ret_from_fork_asm+0x1a/0x30 [ 16.100768] [ 16.100864] The buggy address belongs to the object at ffff8881029cd380 [ 16.100864] which belongs to the cache kmalloc-64 of size 64 [ 16.101401] The buggy address is located 0 bytes to the right of [ 16.101401] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 16.102147] [ 16.102219] The buggy address belongs to the physical page: [ 16.102384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 16.102643] flags: 0x200000000000000(node=0|zone=2) [ 16.102878] page_type: f5(slab) [ 16.103045] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.103383] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.103745] page dumped because: kasan: bad access detected [ 16.104104] [ 16.104205] Memory state around the buggy address: [ 16.104408] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.104624] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.104831] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.105121] ^ [ 16.105351] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.105687] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.106126] ================================================================== [ 16.542225] ================================================================== [ 16.542471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 16.542859] Read of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 16.543193] [ 16.543292] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.543336] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.543347] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.543369] Call Trace: [ 16.543384] <TASK> [ 16.543404] dump_stack_lvl+0x73/0xb0 [ 16.543431] print_report+0xd1/0x650 [ 16.543453] ? __virt_addr_valid+0x1db/0x2d0 [ 16.543477] ? kasan_atomics_helper+0x5115/0x5450 [ 16.543499] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.543523] ? kasan_atomics_helper+0x5115/0x5450 [ 16.543547] kasan_report+0x141/0x180 [ 16.543570] ? kasan_atomics_helper+0x5115/0x5450 [ 16.543608] __asan_report_load8_noabort+0x18/0x20 [ 16.543634] kasan_atomics_helper+0x5115/0x5450 [ 16.543658] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.543682] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.543708] ? kasan_atomics+0x152/0x310 [ 16.543735] kasan_atomics+0x1dc/0x310 [ 16.543758] ? __pfx_kasan_atomics+0x10/0x10 [ 16.543790] ? __pfx_read_tsc+0x10/0x10 [ 16.543812] ? ktime_get_ts64+0x86/0x230 [ 16.543837] kunit_try_run_case+0x1a5/0x480 [ 16.543862] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.543885] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.543910] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.543936] ? __kthread_parkme+0x82/0x180 [ 16.543957] ? preempt_count_sub+0x50/0x80 [ 16.543982] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.544007] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.544033] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.544059] kthread+0x337/0x6f0 [ 16.544079] ? trace_preempt_on+0x20/0xc0 [ 16.544104] ? __pfx_kthread+0x10/0x10 [ 16.544126] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.544148] ? calculate_sigpending+0x7b/0xa0 [ 16.544175] ? __pfx_kthread+0x10/0x10 [ 16.544196] ret_from_fork+0x116/0x1d0 [ 16.544216] ? __pfx_kthread+0x10/0x10 [ 16.544237] ret_from_fork_asm+0x1a/0x30 [ 16.544269] </TASK> [ 16.544280] [ 16.554966] Allocated by task 282: [ 16.555301] kasan_save_stack+0x45/0x70 [ 16.555540] kasan_save_track+0x18/0x40 [ 16.555757] kasan_save_alloc_info+0x3b/0x50 [ 16.556172] __kasan_kmalloc+0xb7/0xc0 [ 16.556479] __kmalloc_cache_noprof+0x189/0x420 [ 16.556710] kasan_atomics+0x95/0x310 [ 16.557000] kunit_try_run_case+0x1a5/0x480 [ 16.557305] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.557636] kthread+0x337/0x6f0 [ 16.557950] ret_from_fork+0x116/0x1d0 [ 16.558292] ret_from_fork_asm+0x1a/0x30 [ 16.558491] [ 16.558572] The buggy address belongs to the object at ffff8881029cd380 [ 16.558572] which belongs to the cache kmalloc-64 of size 64 [ 16.559381] The buggy address is located 0 bytes to the right of [ 16.559381] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 16.560081] [ 16.560166] The buggy address belongs to the physical page: [ 16.560547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 16.560855] flags: 0x200000000000000(node=0|zone=2) [ 16.561020] page_type: f5(slab) [ 16.561138] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.561363] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.561584] page dumped because: kasan: bad access detected [ 16.561781] [ 16.561850] Memory state around the buggy address: [ 16.562003] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.562213] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.562424] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.562644] ^ [ 16.562834] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.563045] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.563576] ================================================================== [ 16.065644] ================================================================== [ 16.066400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 16.067096] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 16.067880] [ 16.068055] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.068124] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.068138] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.068171] Call Trace: [ 16.068190] <TASK> [ 16.068208] dump_stack_lvl+0x73/0xb0 [ 16.068238] print_report+0xd1/0x650 [ 16.068261] ? __virt_addr_valid+0x1db/0x2d0 [ 16.068285] ? kasan_atomics_helper+0x16e7/0x5450 [ 16.068307] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.068331] ? kasan_atomics_helper+0x16e7/0x5450 [ 16.068354] kasan_report+0x141/0x180 [ 16.068377] ? kasan_atomics_helper+0x16e7/0x5450 [ 16.068404] kasan_check_range+0x10c/0x1c0 [ 16.068428] __kasan_check_write+0x18/0x20 [ 16.068449] kasan_atomics_helper+0x16e7/0x5450 [ 16.068472] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.068496] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.068523] ? kasan_atomics+0x152/0x310 [ 16.068549] kasan_atomics+0x1dc/0x310 [ 16.068571] ? __pfx_kasan_atomics+0x10/0x10 [ 16.068607] ? __pfx_read_tsc+0x10/0x10 [ 16.068629] ? ktime_get_ts64+0x86/0x230 [ 16.068653] kunit_try_run_case+0x1a5/0x480 [ 16.068678] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.068702] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.068728] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.068753] ? __kthread_parkme+0x82/0x180 [ 16.068785] ? preempt_count_sub+0x50/0x80 [ 16.068813] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.068839] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.068865] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.068891] kthread+0x337/0x6f0 [ 16.068911] ? trace_preempt_on+0x20/0xc0 [ 16.068937] ? __pfx_kthread+0x10/0x10 [ 16.068959] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.068981] ? calculate_sigpending+0x7b/0xa0 [ 16.069007] ? __pfx_kthread+0x10/0x10 [ 16.069029] ret_from_fork+0x116/0x1d0 [ 16.069049] ? __pfx_kthread+0x10/0x10 [ 16.069070] ret_from_fork_asm+0x1a/0x30 [ 16.069102] </TASK> [ 16.069112] [ 16.076738] Allocated by task 282: [ 16.077628] kasan_save_stack+0x45/0x70 [ 16.077907] kasan_save_track+0x18/0x40 [ 16.078111] kasan_save_alloc_info+0x3b/0x50 [ 16.078324] __kasan_kmalloc+0xb7/0xc0 [ 16.078512] __kmalloc_cache_noprof+0x189/0x420 [ 16.078726] kasan_atomics+0x95/0x310 [ 16.079180] kunit_try_run_case+0x1a5/0x480 [ 16.079549] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.079828] kthread+0x337/0x6f0 [ 16.079988] ret_from_fork+0x116/0x1d0 [ 16.080166] ret_from_fork_asm+0x1a/0x30 [ 16.080349] [ 16.080439] The buggy address belongs to the object at ffff8881029cd380 [ 16.080439] which belongs to the cache kmalloc-64 of size 64 [ 16.081313] The buggy address is located 0 bytes to the right of [ 16.081313] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 16.082147] [ 16.082251] The buggy address belongs to the physical page: [ 16.082483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 16.083040] flags: 0x200000000000000(node=0|zone=2) [ 16.083257] page_type: f5(slab) [ 16.083410] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.083727] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.084722] page dumped because: kasan: bad access detected [ 16.085117] [ 16.085286] Memory state around the buggy address: [ 16.085714] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.086202] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.086681] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.087196] ^ [ 16.087536] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.088079] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.088492] ================================================================== [ 15.600704] ================================================================== [ 15.601480] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 15.601909] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 15.602362] [ 15.602626] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.602676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.602689] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.602712] Call Trace: [ 15.602731] <TASK> [ 15.602750] dump_stack_lvl+0x73/0xb0 [ 15.602782] print_report+0xd1/0x650 [ 15.602815] ? __virt_addr_valid+0x1db/0x2d0 [ 15.602845] ? kasan_atomics_helper+0xd47/0x5450 [ 15.602868] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.602892] ? kasan_atomics_helper+0xd47/0x5450 [ 15.602914] kasan_report+0x141/0x180 [ 15.602937] ? kasan_atomics_helper+0xd47/0x5450 [ 15.602964] kasan_check_range+0x10c/0x1c0 [ 15.602989] __kasan_check_write+0x18/0x20 [ 15.603010] kasan_atomics_helper+0xd47/0x5450 [ 15.603033] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.603057] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.603085] ? kasan_atomics+0x152/0x310 [ 15.603112] kasan_atomics+0x1dc/0x310 [ 15.603135] ? __pfx_kasan_atomics+0x10/0x10 [ 15.603161] ? __pfx_read_tsc+0x10/0x10 [ 15.603184] ? ktime_get_ts64+0x86/0x230 [ 15.603209] kunit_try_run_case+0x1a5/0x480 [ 15.603234] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.603261] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.603285] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.603310] ? __kthread_parkme+0x82/0x180 [ 15.603332] ? preempt_count_sub+0x50/0x80 [ 15.603357] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.603383] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.603408] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.603435] kthread+0x337/0x6f0 [ 15.603454] ? trace_preempt_on+0x20/0xc0 [ 15.603479] ? __pfx_kthread+0x10/0x10 [ 15.603500] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.603523] ? calculate_sigpending+0x7b/0xa0 [ 15.603549] ? __pfx_kthread+0x10/0x10 [ 15.603572] ret_from_fork+0x116/0x1d0 [ 15.603591] ? __pfx_kthread+0x10/0x10 [ 15.603624] ret_from_fork_asm+0x1a/0x30 [ 15.603655] </TASK> [ 15.603667] [ 15.615170] Allocated by task 282: [ 15.615304] kasan_save_stack+0x45/0x70 [ 15.615464] kasan_save_track+0x18/0x40 [ 15.615648] kasan_save_alloc_info+0x3b/0x50 [ 15.615864] __kasan_kmalloc+0xb7/0xc0 [ 15.615998] __kmalloc_cache_noprof+0x189/0x420 [ 15.616247] kasan_atomics+0x95/0x310 [ 15.616448] kunit_try_run_case+0x1a5/0x480 [ 15.616631] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.616908] kthread+0x337/0x6f0 [ 15.617029] ret_from_fork+0x116/0x1d0 [ 15.617163] ret_from_fork_asm+0x1a/0x30 [ 15.617358] [ 15.617453] The buggy address belongs to the object at ffff8881029cd380 [ 15.617453] which belongs to the cache kmalloc-64 of size 64 [ 15.618067] The buggy address is located 0 bytes to the right of [ 15.618067] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 15.618892] [ 15.618994] The buggy address belongs to the physical page: [ 15.619221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 15.619551] flags: 0x200000000000000(node=0|zone=2) [ 15.620423] page_type: f5(slab) [ 15.620588] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.620986] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.621404] page dumped because: kasan: bad access detected [ 15.621721] [ 15.621823] Memory state around the buggy address: [ 15.621987] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.622422] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.622728] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.623136] ^ [ 15.623364] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.623750] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.624185] ================================================================== [ 15.974260] ================================================================== [ 15.974545] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 15.975056] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 15.975274] [ 15.975356] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.975397] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.975409] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.975429] Call Trace: [ 15.975444] <TASK> [ 15.975461] dump_stack_lvl+0x73/0xb0 [ 15.975489] print_report+0xd1/0x650 [ 15.975510] ? __virt_addr_valid+0x1db/0x2d0 [ 15.975533] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.975607] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.975661] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.975685] kasan_report+0x141/0x180 [ 15.975731] ? kasan_atomics_helper+0x50d4/0x5450 [ 15.975758] __asan_report_store8_noabort+0x1b/0x30 [ 15.975824] kasan_atomics_helper+0x50d4/0x5450 [ 15.975848] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.975895] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.975921] ? kasan_atomics+0x152/0x310 [ 15.975948] kasan_atomics+0x1dc/0x310 [ 15.975970] ? __pfx_kasan_atomics+0x10/0x10 [ 15.975996] ? __pfx_read_tsc+0x10/0x10 [ 15.976017] ? ktime_get_ts64+0x86/0x230 [ 15.976041] kunit_try_run_case+0x1a5/0x480 [ 15.976066] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.976090] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.976115] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.976139] ? __kthread_parkme+0x82/0x180 [ 15.976161] ? preempt_count_sub+0x50/0x80 [ 15.976217] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.976242] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.976268] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.976294] kthread+0x337/0x6f0 [ 15.976313] ? trace_preempt_on+0x20/0xc0 [ 15.976369] ? __pfx_kthread+0x10/0x10 [ 15.976390] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.976412] ? calculate_sigpending+0x7b/0xa0 [ 15.976438] ? __pfx_kthread+0x10/0x10 [ 15.976460] ret_from_fork+0x116/0x1d0 [ 15.976508] ? __pfx_kthread+0x10/0x10 [ 15.976529] ret_from_fork_asm+0x1a/0x30 [ 15.976561] </TASK> [ 15.976572] [ 15.984863] Allocated by task 282: [ 15.985076] kasan_save_stack+0x45/0x70 [ 15.985241] kasan_save_track+0x18/0x40 [ 15.985405] kasan_save_alloc_info+0x3b/0x50 [ 15.985560] __kasan_kmalloc+0xb7/0xc0 [ 15.985702] __kmalloc_cache_noprof+0x189/0x420 [ 15.985854] kasan_atomics+0x95/0x310 [ 15.985985] kunit_try_run_case+0x1a5/0x480 [ 15.986128] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.986333] kthread+0x337/0x6f0 [ 15.986497] ret_from_fork+0x116/0x1d0 [ 15.986733] ret_from_fork_asm+0x1a/0x30 [ 15.987153] [ 15.987247] The buggy address belongs to the object at ffff8881029cd380 [ 15.987247] which belongs to the cache kmalloc-64 of size 64 [ 15.987772] The buggy address is located 0 bytes to the right of [ 15.987772] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 15.988184] [ 15.988256] The buggy address belongs to the physical page: [ 15.988424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 15.988669] flags: 0x200000000000000(node=0|zone=2) [ 15.989003] page_type: f5(slab) [ 15.989174] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.989627] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.990330] page dumped because: kasan: bad access detected [ 15.990625] [ 15.990720] Memory state around the buggy address: [ 15.991172] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.991518] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.991741] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.992416] ^ [ 15.992641] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.993006] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.993318] ================================================================== [ 15.733687] ================================================================== [ 15.734058] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 15.734369] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 15.734689] [ 15.734778] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.734822] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.734841] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.734863] Call Trace: [ 15.734882] <TASK> [ 15.734902] dump_stack_lvl+0x73/0xb0 [ 15.734930] print_report+0xd1/0x650 [ 15.734954] ? __virt_addr_valid+0x1db/0x2d0 [ 15.734978] ? kasan_atomics_helper+0x1079/0x5450 [ 15.735000] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.735024] ? kasan_atomics_helper+0x1079/0x5450 [ 15.735047] kasan_report+0x141/0x180 [ 15.735069] ? kasan_atomics_helper+0x1079/0x5450 [ 15.735097] kasan_check_range+0x10c/0x1c0 [ 15.735121] __kasan_check_write+0x18/0x20 [ 15.735142] kasan_atomics_helper+0x1079/0x5450 [ 15.735165] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.735192] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.735219] ? kasan_atomics+0x152/0x310 [ 15.735246] kasan_atomics+0x1dc/0x310 [ 15.735269] ? __pfx_kasan_atomics+0x10/0x10 [ 15.735294] ? __pfx_read_tsc+0x10/0x10 [ 15.735316] ? ktime_get_ts64+0x86/0x230 [ 15.735342] kunit_try_run_case+0x1a5/0x480 [ 15.735367] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.735391] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.735415] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.735440] ? __kthread_parkme+0x82/0x180 [ 15.735462] ? preempt_count_sub+0x50/0x80 [ 15.735487] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.735513] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.735538] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.735564] kthread+0x337/0x6f0 [ 15.735584] ? trace_preempt_on+0x20/0xc0 [ 15.735618] ? __pfx_kthread+0x10/0x10 [ 15.735639] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.735662] ? calculate_sigpending+0x7b/0xa0 [ 15.735688] ? __pfx_kthread+0x10/0x10 [ 15.735711] ret_from_fork+0x116/0x1d0 [ 15.735730] ? __pfx_kthread+0x10/0x10 [ 15.735751] ret_from_fork_asm+0x1a/0x30 [ 15.735784] </TASK> [ 15.735795] [ 15.743497] Allocated by task 282: [ 15.743688] kasan_save_stack+0x45/0x70 [ 15.743986] kasan_save_track+0x18/0x40 [ 15.744180] kasan_save_alloc_info+0x3b/0x50 [ 15.744389] __kasan_kmalloc+0xb7/0xc0 [ 15.744547] __kmalloc_cache_noprof+0x189/0x420 [ 15.744772] kasan_atomics+0x95/0x310 [ 15.744959] kunit_try_run_case+0x1a5/0x480 [ 15.745145] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.745371] kthread+0x337/0x6f0 [ 15.745494] ret_from_fork+0x116/0x1d0 [ 15.745637] ret_from_fork_asm+0x1a/0x30 [ 15.745778] [ 15.745848] The buggy address belongs to the object at ffff8881029cd380 [ 15.745848] which belongs to the cache kmalloc-64 of size 64 [ 15.746203] The buggy address is located 0 bytes to the right of [ 15.746203] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 15.746960] [ 15.747058] The buggy address belongs to the physical page: [ 15.747312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 15.747674] flags: 0x200000000000000(node=0|zone=2) [ 15.748002] page_type: f5(slab) [ 15.748133] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.748366] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.748609] page dumped because: kasan: bad access detected [ 15.748789] [ 15.748886] Memory state around the buggy address: [ 15.749125] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.749454] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.749796] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.750119] ^ [ 15.750339] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.750653] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.750944] ================================================================== [ 16.377575] ================================================================== [ 16.377925] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 16.378814] Read of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 16.379055] [ 16.379221] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.379290] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.379303] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.379323] Call Trace: [ 16.379339] <TASK> [ 16.379357] dump_stack_lvl+0x73/0xb0 [ 16.379387] print_report+0xd1/0x650 [ 16.379409] ? __virt_addr_valid+0x1db/0x2d0 [ 16.379434] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.379475] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.379500] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.379523] kasan_report+0x141/0x180 [ 16.379545] ? kasan_atomics_helper+0x4f71/0x5450 [ 16.379573] __asan_report_load8_noabort+0x18/0x20 [ 16.379610] kasan_atomics_helper+0x4f71/0x5450 [ 16.379634] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.379658] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.379684] ? kasan_atomics+0x152/0x310 [ 16.379728] kasan_atomics+0x1dc/0x310 [ 16.379752] ? __pfx_kasan_atomics+0x10/0x10 [ 16.379777] ? __pfx_read_tsc+0x10/0x10 [ 16.379799] ? ktime_get_ts64+0x86/0x230 [ 16.379824] kunit_try_run_case+0x1a5/0x480 [ 16.379849] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.379873] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.379899] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.379925] ? __kthread_parkme+0x82/0x180 [ 16.379946] ? preempt_count_sub+0x50/0x80 [ 16.379973] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.379998] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.380025] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.380052] kthread+0x337/0x6f0 [ 16.380072] ? trace_preempt_on+0x20/0xc0 [ 16.380097] ? __pfx_kthread+0x10/0x10 [ 16.380118] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.380141] ? calculate_sigpending+0x7b/0xa0 [ 16.380167] ? __pfx_kthread+0x10/0x10 [ 16.380189] ret_from_fork+0x116/0x1d0 [ 16.380208] ? __pfx_kthread+0x10/0x10 [ 16.380237] ret_from_fork_asm+0x1a/0x30 [ 16.380288] </TASK> [ 16.380299] [ 16.387708] Allocated by task 282: [ 16.387943] kasan_save_stack+0x45/0x70 [ 16.388097] kasan_save_track+0x18/0x40 [ 16.388233] kasan_save_alloc_info+0x3b/0x50 [ 16.388415] __kasan_kmalloc+0xb7/0xc0 [ 16.388611] __kmalloc_cache_noprof+0x189/0x420 [ 16.388832] kasan_atomics+0x95/0x310 [ 16.389021] kunit_try_run_case+0x1a5/0x480 [ 16.389169] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.389429] kthread+0x337/0x6f0 [ 16.389611] ret_from_fork+0x116/0x1d0 [ 16.389857] ret_from_fork_asm+0x1a/0x30 [ 16.390063] [ 16.390153] The buggy address belongs to the object at ffff8881029cd380 [ 16.390153] which belongs to the cache kmalloc-64 of size 64 [ 16.390506] The buggy address is located 0 bytes to the right of [ 16.390506] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 16.391110] [ 16.391208] The buggy address belongs to the physical page: [ 16.391545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 16.391797] flags: 0x200000000000000(node=0|zone=2) [ 16.391971] page_type: f5(slab) [ 16.392227] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.392606] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.393157] page dumped because: kasan: bad access detected [ 16.393418] [ 16.393489] Memory state around the buggy address: [ 16.393714] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.394041] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.394257] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.394764] ^ [ 16.394945] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.395161] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.395374] ================================================================== [ 15.860787] ================================================================== [ 15.861087] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 15.861406] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 15.861902] [ 15.861995] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.862040] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.862053] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.862075] Call Trace: [ 15.862094] <TASK> [ 15.862111] dump_stack_lvl+0x73/0xb0 [ 15.862169] print_report+0xd1/0x650 [ 15.862191] ? __virt_addr_valid+0x1db/0x2d0 [ 15.862215] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.862237] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.862261] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.862284] kasan_report+0x141/0x180 [ 15.862330] ? kasan_atomics_helper+0x12e6/0x5450 [ 15.862358] kasan_check_range+0x10c/0x1c0 [ 15.862383] __kasan_check_write+0x18/0x20 [ 15.862403] kasan_atomics_helper+0x12e6/0x5450 [ 15.862427] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.862450] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.862494] ? kasan_atomics+0x152/0x310 [ 15.862520] kasan_atomics+0x1dc/0x310 [ 15.862544] ? __pfx_kasan_atomics+0x10/0x10 [ 15.862568] ? __pfx_read_tsc+0x10/0x10 [ 15.862590] ? ktime_get_ts64+0x86/0x230 [ 15.862626] kunit_try_run_case+0x1a5/0x480 [ 15.862651] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.862674] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.862699] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.862725] ? __kthread_parkme+0x82/0x180 [ 15.862746] ? preempt_count_sub+0x50/0x80 [ 15.862771] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.862804] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.862834] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.862880] kthread+0x337/0x6f0 [ 15.862900] ? trace_preempt_on+0x20/0xc0 [ 15.862924] ? __pfx_kthread+0x10/0x10 [ 15.862946] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.862968] ? calculate_sigpending+0x7b/0xa0 [ 15.862994] ? __pfx_kthread+0x10/0x10 [ 15.863017] ret_from_fork+0x116/0x1d0 [ 15.863036] ? __pfx_kthread+0x10/0x10 [ 15.863058] ret_from_fork_asm+0x1a/0x30 [ 15.863090] </TASK> [ 15.863100] [ 15.870562] Allocated by task 282: [ 15.870747] kasan_save_stack+0x45/0x70 [ 15.870935] kasan_save_track+0x18/0x40 [ 15.871070] kasan_save_alloc_info+0x3b/0x50 [ 15.871217] __kasan_kmalloc+0xb7/0xc0 [ 15.871346] __kmalloc_cache_noprof+0x189/0x420 [ 15.871498] kasan_atomics+0x95/0x310 [ 15.871696] kunit_try_run_case+0x1a5/0x480 [ 15.871927] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.872216] kthread+0x337/0x6f0 [ 15.872412] ret_from_fork+0x116/0x1d0 [ 15.872601] ret_from_fork_asm+0x1a/0x30 [ 15.872798] [ 15.872890] The buggy address belongs to the object at ffff8881029cd380 [ 15.872890] which belongs to the cache kmalloc-64 of size 64 [ 15.873418] The buggy address is located 0 bytes to the right of [ 15.873418] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 15.873976] [ 15.874066] The buggy address belongs to the physical page: [ 15.874300] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 15.874566] flags: 0x200000000000000(node=0|zone=2) [ 15.875127] page_type: f5(slab) [ 15.875485] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.876074] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.876891] page dumped because: kasan: bad access detected [ 15.877376] [ 15.877448] Memory state around the buggy address: [ 15.877616] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.878009] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.878636] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.879332] ^ [ 15.879795] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.880425] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.880801] ================================================================== [ 15.956026] ================================================================== [ 15.956358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 15.956729] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 15.957019] [ 15.957102] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.957142] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.957155] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.957202] Call Trace: [ 15.957217] <TASK> [ 15.957233] dump_stack_lvl+0x73/0xb0 [ 15.957261] print_report+0xd1/0x650 [ 15.957282] ? __virt_addr_valid+0x1db/0x2d0 [ 15.957306] ? kasan_atomics_helper+0x1467/0x5450 [ 15.957328] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.957352] ? kasan_atomics_helper+0x1467/0x5450 [ 15.957375] kasan_report+0x141/0x180 [ 15.957397] ? kasan_atomics_helper+0x1467/0x5450 [ 15.957423] kasan_check_range+0x10c/0x1c0 [ 15.957447] __kasan_check_write+0x18/0x20 [ 15.957468] kasan_atomics_helper+0x1467/0x5450 [ 15.957491] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.957515] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.957540] ? kasan_atomics+0x152/0x310 [ 15.957566] kasan_atomics+0x1dc/0x310 [ 15.957589] ? __pfx_kasan_atomics+0x10/0x10 [ 15.957625] ? __pfx_read_tsc+0x10/0x10 [ 15.957646] ? ktime_get_ts64+0x86/0x230 [ 15.957673] kunit_try_run_case+0x1a5/0x480 [ 15.957698] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.957722] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.957747] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.957772] ? __kthread_parkme+0x82/0x180 [ 15.957824] ? preempt_count_sub+0x50/0x80 [ 15.957849] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.957875] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.957901] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.957927] kthread+0x337/0x6f0 [ 15.957947] ? trace_preempt_on+0x20/0xc0 [ 15.957970] ? __pfx_kthread+0x10/0x10 [ 15.958009] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.958032] ? calculate_sigpending+0x7b/0xa0 [ 15.958068] ? __pfx_kthread+0x10/0x10 [ 15.958091] ret_from_fork+0x116/0x1d0 [ 15.958110] ? __pfx_kthread+0x10/0x10 [ 15.958131] ret_from_fork_asm+0x1a/0x30 [ 15.958163] </TASK> [ 15.958173] [ 15.965538] Allocated by task 282: [ 15.965742] kasan_save_stack+0x45/0x70 [ 15.965944] kasan_save_track+0x18/0x40 [ 15.966150] kasan_save_alloc_info+0x3b/0x50 [ 15.966313] __kasan_kmalloc+0xb7/0xc0 [ 15.966506] __kmalloc_cache_noprof+0x189/0x420 [ 15.966747] kasan_atomics+0x95/0x310 [ 15.966946] kunit_try_run_case+0x1a5/0x480 [ 15.967146] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.967367] kthread+0x337/0x6f0 [ 15.967549] ret_from_fork+0x116/0x1d0 [ 15.967737] ret_from_fork_asm+0x1a/0x30 [ 15.967941] [ 15.968050] The buggy address belongs to the object at ffff8881029cd380 [ 15.968050] which belongs to the cache kmalloc-64 of size 64 [ 15.968481] The buggy address is located 0 bytes to the right of [ 15.968481] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 15.969111] [ 15.969262] The buggy address belongs to the physical page: [ 15.969546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 15.970003] flags: 0x200000000000000(node=0|zone=2) [ 15.970165] page_type: f5(slab) [ 15.970282] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.970636] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.970964] page dumped because: kasan: bad access detected [ 15.971208] [ 15.971379] Memory state around the buggy address: [ 15.971558] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.971920] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.972216] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.972456] ^ [ 15.972616] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.972908] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.973289] ================================================================== [ 16.219481] ================================================================== [ 16.220111] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 16.220455] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 16.220762] [ 16.220934] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.220974] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.220985] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.221006] Call Trace: [ 16.221019] <TASK> [ 16.221033] dump_stack_lvl+0x73/0xb0 [ 16.221060] print_report+0xd1/0x650 [ 16.221082] ? __virt_addr_valid+0x1db/0x2d0 [ 16.221106] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.221128] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.221152] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.221175] kasan_report+0x141/0x180 [ 16.221198] ? kasan_atomics_helper+0x1c18/0x5450 [ 16.221225] kasan_check_range+0x10c/0x1c0 [ 16.221249] __kasan_check_write+0x18/0x20 [ 16.221270] kasan_atomics_helper+0x1c18/0x5450 [ 16.221293] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.221317] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.221343] ? kasan_atomics+0x152/0x310 [ 16.221369] kasan_atomics+0x1dc/0x310 [ 16.221393] ? __pfx_kasan_atomics+0x10/0x10 [ 16.221419] ? __pfx_read_tsc+0x10/0x10 [ 16.221440] ? ktime_get_ts64+0x86/0x230 [ 16.221464] kunit_try_run_case+0x1a5/0x480 [ 16.221488] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.221512] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.221536] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.221561] ? __kthread_parkme+0x82/0x180 [ 16.221583] ? preempt_count_sub+0x50/0x80 [ 16.221619] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.221645] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.221671] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.221697] kthread+0x337/0x6f0 [ 16.221716] ? trace_preempt_on+0x20/0xc0 [ 16.221740] ? __pfx_kthread+0x10/0x10 [ 16.221761] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.221783] ? calculate_sigpending+0x7b/0xa0 [ 16.221807] ? __pfx_kthread+0x10/0x10 [ 16.221829] ret_from_fork+0x116/0x1d0 [ 16.221848] ? __pfx_kthread+0x10/0x10 [ 16.221869] ret_from_fork_asm+0x1a/0x30 [ 16.221900] </TASK> [ 16.221910] [ 16.229634] Allocated by task 282: [ 16.229823] kasan_save_stack+0x45/0x70 [ 16.229998] kasan_save_track+0x18/0x40 [ 16.230163] kasan_save_alloc_info+0x3b/0x50 [ 16.230317] __kasan_kmalloc+0xb7/0xc0 [ 16.230507] __kmalloc_cache_noprof+0x189/0x420 [ 16.230739] kasan_atomics+0x95/0x310 [ 16.230906] kunit_try_run_case+0x1a5/0x480 [ 16.231115] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.231341] kthread+0x337/0x6f0 [ 16.231497] ret_from_fork+0x116/0x1d0 [ 16.231683] ret_from_fork_asm+0x1a/0x30 [ 16.231944] [ 16.232027] The buggy address belongs to the object at ffff8881029cd380 [ 16.232027] which belongs to the cache kmalloc-64 of size 64 [ 16.232495] The buggy address is located 0 bytes to the right of [ 16.232495] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 16.232876] [ 16.232947] The buggy address belongs to the physical page: [ 16.233121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 16.233361] flags: 0x200000000000000(node=0|zone=2) [ 16.233522] page_type: f5(slab) [ 16.233695] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.234424] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.234766] page dumped because: kasan: bad access detected [ 16.234981] [ 16.235051] Memory state around the buggy address: [ 16.235207] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.235425] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.235650] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.236300] ^ [ 16.237207] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.237716] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.238563] ================================================================== [ 15.162059] ================================================================== [ 15.162418] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 15.162760] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 15.163123] [ 15.163218] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.163266] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.163277] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.163299] Call Trace: [ 15.163318] <TASK> [ 15.163336] dump_stack_lvl+0x73/0xb0 [ 15.163365] print_report+0xd1/0x650 [ 15.163386] ? __virt_addr_valid+0x1db/0x2d0 [ 15.163410] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.163432] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.163454] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.163477] kasan_report+0x141/0x180 [ 15.163498] ? kasan_atomics_helper+0x4ba2/0x5450 [ 15.163546] __asan_report_store4_noabort+0x1b/0x30 [ 15.163571] kasan_atomics_helper+0x4ba2/0x5450 [ 15.163604] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.163627] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.163671] ? kasan_atomics+0x152/0x310 [ 15.163707] kasan_atomics+0x1dc/0x310 [ 15.163728] ? __pfx_kasan_atomics+0x10/0x10 [ 15.163753] ? __pfx_read_tsc+0x10/0x10 [ 15.163807] ? ktime_get_ts64+0x86/0x230 [ 15.163832] kunit_try_run_case+0x1a5/0x480 [ 15.163857] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.163881] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.163906] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.163930] ? __kthread_parkme+0x82/0x180 [ 15.163951] ? preempt_count_sub+0x50/0x80 [ 15.163975] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.164000] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.164024] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.164069] kthread+0x337/0x6f0 [ 15.164088] ? trace_preempt_on+0x20/0xc0 [ 15.164114] ? __pfx_kthread+0x10/0x10 [ 15.164135] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.164156] ? calculate_sigpending+0x7b/0xa0 [ 15.164181] ? __pfx_kthread+0x10/0x10 [ 15.164202] ret_from_fork+0x116/0x1d0 [ 15.164221] ? __pfx_kthread+0x10/0x10 [ 15.164242] ret_from_fork_asm+0x1a/0x30 [ 15.164273] </TASK> [ 15.164283] [ 15.173739] Allocated by task 282: [ 15.174240] kasan_save_stack+0x45/0x70 [ 15.174610] kasan_save_track+0x18/0x40 [ 15.175017] kasan_save_alloc_info+0x3b/0x50 [ 15.175377] __kasan_kmalloc+0xb7/0xc0 [ 15.175571] __kmalloc_cache_noprof+0x189/0x420 [ 15.175753] kasan_atomics+0x95/0x310 [ 15.175981] kunit_try_run_case+0x1a5/0x480 [ 15.176205] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.176441] kthread+0x337/0x6f0 [ 15.176624] ret_from_fork+0x116/0x1d0 [ 15.176845] ret_from_fork_asm+0x1a/0x30 [ 15.177001] [ 15.177168] The buggy address belongs to the object at ffff8881029cd380 [ 15.177168] which belongs to the cache kmalloc-64 of size 64 [ 15.177585] The buggy address is located 0 bytes to the right of [ 15.177585] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 15.178239] [ 15.178314] The buggy address belongs to the physical page: [ 15.178533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 15.178966] flags: 0x200000000000000(node=0|zone=2) [ 15.179223] page_type: f5(slab) [ 15.179361] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.179678] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.179986] page dumped because: kasan: bad access detected [ 15.180232] [ 15.180327] Memory state around the buggy address: [ 15.180518] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.180743] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.181107] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.181392] ^ [ 15.181547] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.181834] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.182184] ================================================================== [ 15.311610] ================================================================== [ 15.312355] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 15.312736] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 15.313145] [ 15.313338] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.313384] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.313397] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.313421] Call Trace: [ 15.313442] <TASK> [ 15.313505] dump_stack_lvl+0x73/0xb0 [ 15.313538] print_report+0xd1/0x650 [ 15.313623] ? __virt_addr_valid+0x1db/0x2d0 [ 15.313651] ? kasan_atomics_helper+0x565/0x5450 [ 15.313673] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.313708] ? kasan_atomics_helper+0x565/0x5450 [ 15.313731] kasan_report+0x141/0x180 [ 15.313754] ? kasan_atomics_helper+0x565/0x5450 [ 15.313791] kasan_check_range+0x10c/0x1c0 [ 15.313817] __kasan_check_write+0x18/0x20 [ 15.313839] kasan_atomics_helper+0x565/0x5450 [ 15.313862] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.313886] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.313914] ? kasan_atomics+0x152/0x310 [ 15.313941] kasan_atomics+0x1dc/0x310 [ 15.313966] ? __pfx_kasan_atomics+0x10/0x10 [ 15.313991] ? __pfx_read_tsc+0x10/0x10 [ 15.314013] ? ktime_get_ts64+0x86/0x230 [ 15.314040] kunit_try_run_case+0x1a5/0x480 [ 15.314065] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.314090] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.314116] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.314143] ? __kthread_parkme+0x82/0x180 [ 15.314165] ? preempt_count_sub+0x50/0x80 [ 15.314191] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.314215] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.314242] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.314268] kthread+0x337/0x6f0 [ 15.314290] ? trace_preempt_on+0x20/0xc0 [ 15.314317] ? __pfx_kthread+0x10/0x10 [ 15.314339] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.314362] ? calculate_sigpending+0x7b/0xa0 [ 15.314386] ? __pfx_kthread+0x10/0x10 [ 15.314409] ret_from_fork+0x116/0x1d0 [ 15.314428] ? __pfx_kthread+0x10/0x10 [ 15.314449] ret_from_fork_asm+0x1a/0x30 [ 15.314481] </TASK> [ 15.314492] [ 15.327002] Allocated by task 282: [ 15.327350] kasan_save_stack+0x45/0x70 [ 15.327510] kasan_save_track+0x18/0x40 [ 15.327657] kasan_save_alloc_info+0x3b/0x50 [ 15.327920] __kasan_kmalloc+0xb7/0xc0 [ 15.328116] __kmalloc_cache_noprof+0x189/0x420 [ 15.328407] kasan_atomics+0x95/0x310 [ 15.328632] kunit_try_run_case+0x1a5/0x480 [ 15.328792] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.329050] kthread+0x337/0x6f0 [ 15.329379] ret_from_fork+0x116/0x1d0 [ 15.329574] ret_from_fork_asm+0x1a/0x30 [ 15.329774] [ 15.329947] The buggy address belongs to the object at ffff8881029cd380 [ 15.329947] which belongs to the cache kmalloc-64 of size 64 [ 15.330401] The buggy address is located 0 bytes to the right of [ 15.330401] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 15.330934] [ 15.331009] The buggy address belongs to the physical page: [ 15.331479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 15.331770] flags: 0x200000000000000(node=0|zone=2) [ 15.332093] page_type: f5(slab) [ 15.332226] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.332465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.332799] page dumped because: kasan: bad access detected [ 15.333111] [ 15.333210] Memory state around the buggy address: [ 15.333470] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.333795] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.334051] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.334444] ^ [ 15.334722] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.335092] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.335383] ================================================================== [ 15.464885] ================================================================== [ 15.465210] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 15.465532] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 15.465849] [ 15.465937] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.465980] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.465994] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.466015] Call Trace: [ 15.466031] <TASK> [ 15.466047] dump_stack_lvl+0x73/0xb0 [ 15.466075] print_report+0xd1/0x650 [ 15.466119] ? __virt_addr_valid+0x1db/0x2d0 [ 15.466144] ? kasan_atomics_helper+0x992/0x5450 [ 15.466166] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.466191] ? kasan_atomics_helper+0x992/0x5450 [ 15.466213] kasan_report+0x141/0x180 [ 15.466236] ? kasan_atomics_helper+0x992/0x5450 [ 15.466263] kasan_check_range+0x10c/0x1c0 [ 15.466287] __kasan_check_write+0x18/0x20 [ 15.466308] kasan_atomics_helper+0x992/0x5450 [ 15.466331] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.466354] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.466379] ? kasan_atomics+0x152/0x310 [ 15.466405] kasan_atomics+0x1dc/0x310 [ 15.466429] ? __pfx_kasan_atomics+0x10/0x10 [ 15.466454] ? __pfx_read_tsc+0x10/0x10 [ 15.466476] ? ktime_get_ts64+0x86/0x230 [ 15.466501] kunit_try_run_case+0x1a5/0x480 [ 15.466525] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.466550] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.466575] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.466609] ? __kthread_parkme+0x82/0x180 [ 15.466631] ? preempt_count_sub+0x50/0x80 [ 15.466655] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.466681] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.466707] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.466734] kthread+0x337/0x6f0 [ 15.466754] ? trace_preempt_on+0x20/0xc0 [ 15.466800] ? __pfx_kthread+0x10/0x10 [ 15.466821] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.466848] ? calculate_sigpending+0x7b/0xa0 [ 15.466873] ? __pfx_kthread+0x10/0x10 [ 15.466895] ret_from_fork+0x116/0x1d0 [ 15.466914] ? __pfx_kthread+0x10/0x10 [ 15.466936] ret_from_fork_asm+0x1a/0x30 [ 15.466967] </TASK> [ 15.466979] [ 15.474260] Allocated by task 282: [ 15.474410] kasan_save_stack+0x45/0x70 [ 15.474551] kasan_save_track+0x18/0x40 [ 15.474709] kasan_save_alloc_info+0x3b/0x50 [ 15.474972] __kasan_kmalloc+0xb7/0xc0 [ 15.475163] __kmalloc_cache_noprof+0x189/0x420 [ 15.475380] kasan_atomics+0x95/0x310 [ 15.475567] kunit_try_run_case+0x1a5/0x480 [ 15.475804] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.476038] kthread+0x337/0x6f0 [ 15.476191] ret_from_fork+0x116/0x1d0 [ 15.476376] ret_from_fork_asm+0x1a/0x30 [ 15.476549] [ 15.476630] The buggy address belongs to the object at ffff8881029cd380 [ 15.476630] which belongs to the cache kmalloc-64 of size 64 [ 15.477138] The buggy address is located 0 bytes to the right of [ 15.477138] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 15.477496] [ 15.477613] The buggy address belongs to the physical page: [ 15.477891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 15.478240] flags: 0x200000000000000(node=0|zone=2) [ 15.478467] page_type: f5(slab) [ 15.478609] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.478864] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.479174] page dumped because: kasan: bad access detected [ 15.479448] [ 15.479543] Memory state around the buggy address: [ 15.479852] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.480141] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.480886] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.481676] ^ [ 15.482414] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.482673] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.483282] ================================================================== [ 15.647684] ================================================================== [ 15.648006] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 15.648645] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 15.649035] [ 15.649272] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.649321] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.649334] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.649356] Call Trace: [ 15.649374] <TASK> [ 15.649391] dump_stack_lvl+0x73/0xb0 [ 15.649423] print_report+0xd1/0x650 [ 15.649447] ? __virt_addr_valid+0x1db/0x2d0 [ 15.649472] ? kasan_atomics_helper+0xe78/0x5450 [ 15.649494] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.649518] ? kasan_atomics_helper+0xe78/0x5450 [ 15.649541] kasan_report+0x141/0x180 [ 15.649564] ? kasan_atomics_helper+0xe78/0x5450 [ 15.649591] kasan_check_range+0x10c/0x1c0 [ 15.649632] __kasan_check_write+0x18/0x20 [ 15.649652] kasan_atomics_helper+0xe78/0x5450 [ 15.649676] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.649700] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.649727] ? kasan_atomics+0x152/0x310 [ 15.649754] kasan_atomics+0x1dc/0x310 [ 15.649888] ? __pfx_kasan_atomics+0x10/0x10 [ 15.649921] ? __pfx_read_tsc+0x10/0x10 [ 15.649944] ? ktime_get_ts64+0x86/0x230 [ 15.649971] kunit_try_run_case+0x1a5/0x480 [ 15.649996] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.650021] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.650047] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.650073] ? __kthread_parkme+0x82/0x180 [ 15.650095] ? preempt_count_sub+0x50/0x80 [ 15.650121] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.650146] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.650172] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.650199] kthread+0x337/0x6f0 [ 15.650218] ? trace_preempt_on+0x20/0xc0 [ 15.650244] ? __pfx_kthread+0x10/0x10 [ 15.650266] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.650288] ? calculate_sigpending+0x7b/0xa0 [ 15.650314] ? __pfx_kthread+0x10/0x10 [ 15.650336] ret_from_fork+0x116/0x1d0 [ 15.650355] ? __pfx_kthread+0x10/0x10 [ 15.650376] ret_from_fork_asm+0x1a/0x30 [ 15.650408] </TASK> [ 15.650420] [ 15.659781] Allocated by task 282: [ 15.660233] kasan_save_stack+0x45/0x70 [ 15.660441] kasan_save_track+0x18/0x40 [ 15.660625] kasan_save_alloc_info+0x3b/0x50 [ 15.661008] __kasan_kmalloc+0xb7/0xc0 [ 15.661188] __kmalloc_cache_noprof+0x189/0x420 [ 15.661464] kasan_atomics+0x95/0x310 [ 15.661615] kunit_try_run_case+0x1a5/0x480 [ 15.661828] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.662234] kthread+0x337/0x6f0 [ 15.662410] ret_from_fork+0x116/0x1d0 [ 15.662712] ret_from_fork_asm+0x1a/0x30 [ 15.662938] [ 15.663037] The buggy address belongs to the object at ffff8881029cd380 [ 15.663037] which belongs to the cache kmalloc-64 of size 64 [ 15.663493] The buggy address is located 0 bytes to the right of [ 15.663493] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 15.664297] [ 15.664395] The buggy address belongs to the physical page: [ 15.664585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 15.665207] flags: 0x200000000000000(node=0|zone=2) [ 15.665492] page_type: f5(slab) [ 15.665681] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.666160] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.666548] page dumped because: kasan: bad access detected [ 15.666755] [ 15.666940] Memory state around the buggy address: [ 15.667168] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.667591] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.668005] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.668312] ^ [ 15.668646] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.668972] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.669249] ================================================================== [ 15.376943] ================================================================== [ 15.377784] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 15.378172] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 15.378502] [ 15.378628] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.378697] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.378710] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.378753] Call Trace: [ 15.378771] <TASK> [ 15.378802] dump_stack_lvl+0x73/0xb0 [ 15.378837] print_report+0xd1/0x650 [ 15.378860] ? __virt_addr_valid+0x1db/0x2d0 [ 15.378884] ? kasan_atomics_helper+0x72f/0x5450 [ 15.378906] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.378931] ? kasan_atomics_helper+0x72f/0x5450 [ 15.378953] kasan_report+0x141/0x180 [ 15.378979] ? kasan_atomics_helper+0x72f/0x5450 [ 15.379005] kasan_check_range+0x10c/0x1c0 [ 15.379031] __kasan_check_write+0x18/0x20 [ 15.379051] kasan_atomics_helper+0x72f/0x5450 [ 15.379075] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.379098] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.379124] ? kasan_atomics+0x152/0x310 [ 15.379151] kasan_atomics+0x1dc/0x310 [ 15.379174] ? __pfx_kasan_atomics+0x10/0x10 [ 15.379199] ? __pfx_read_tsc+0x10/0x10 [ 15.379222] ? ktime_get_ts64+0x86/0x230 [ 15.379247] kunit_try_run_case+0x1a5/0x480 [ 15.379273] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.379296] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.379320] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.379345] ? __kthread_parkme+0x82/0x180 [ 15.379366] ? preempt_count_sub+0x50/0x80 [ 15.379391] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.379416] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.379442] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.379468] kthread+0x337/0x6f0 [ 15.379488] ? trace_preempt_on+0x20/0xc0 [ 15.379513] ? __pfx_kthread+0x10/0x10 [ 15.379534] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.379557] ? calculate_sigpending+0x7b/0xa0 [ 15.379582] ? __pfx_kthread+0x10/0x10 [ 15.379615] ret_from_fork+0x116/0x1d0 [ 15.379645] ? __pfx_kthread+0x10/0x10 [ 15.379667] ret_from_fork_asm+0x1a/0x30 [ 15.379699] </TASK> [ 15.379722] [ 15.391143] Allocated by task 282: [ 15.391288] kasan_save_stack+0x45/0x70 [ 15.391443] kasan_save_track+0x18/0x40 [ 15.391582] kasan_save_alloc_info+0x3b/0x50 [ 15.391751] __kasan_kmalloc+0xb7/0xc0 [ 15.392368] __kmalloc_cache_noprof+0x189/0x420 [ 15.392890] kasan_atomics+0x95/0x310 [ 15.393249] kunit_try_run_case+0x1a5/0x480 [ 15.393409] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.393590] kthread+0x337/0x6f0 [ 15.393728] ret_from_fork+0x116/0x1d0 [ 15.394355] ret_from_fork_asm+0x1a/0x30 [ 15.394857] [ 15.395022] The buggy address belongs to the object at ffff8881029cd380 [ 15.395022] which belongs to the cache kmalloc-64 of size 64 [ 15.396408] The buggy address is located 0 bytes to the right of [ 15.396408] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 15.397509] [ 15.397845] The buggy address belongs to the physical page: [ 15.398222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 15.398481] flags: 0x200000000000000(node=0|zone=2) [ 15.398670] page_type: f5(slab) [ 15.399112] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.399424] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.399857] page dumped because: kasan: bad access detected [ 15.400326] [ 15.400430] Memory state around the buggy address: [ 15.400859] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.401272] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.401692] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.402086] ^ [ 15.402327] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.402903] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.403341] ================================================================== [ 15.751678] ================================================================== [ 15.752246] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 15.752610] Read of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 15.753018] [ 15.753107] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.753151] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.753164] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.753184] Call Trace: [ 15.753200] <TASK> [ 15.753217] dump_stack_lvl+0x73/0xb0 [ 15.753245] print_report+0xd1/0x650 [ 15.753269] ? __virt_addr_valid+0x1db/0x2d0 [ 15.753292] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.753314] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.753338] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.753361] kasan_report+0x141/0x180 [ 15.753383] ? kasan_atomics_helper+0x4a1c/0x5450 [ 15.753419] __asan_report_load4_noabort+0x18/0x20 [ 15.753450] kasan_atomics_helper+0x4a1c/0x5450 [ 15.753474] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.753498] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.753523] ? kasan_atomics+0x152/0x310 [ 15.753550] kasan_atomics+0x1dc/0x310 [ 15.753573] ? __pfx_kasan_atomics+0x10/0x10 [ 15.753609] ? __pfx_read_tsc+0x10/0x10 [ 15.753632] ? ktime_get_ts64+0x86/0x230 [ 15.753656] kunit_try_run_case+0x1a5/0x480 [ 15.753681] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.753705] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.753730] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.753755] ? __kthread_parkme+0x82/0x180 [ 15.753787] ? preempt_count_sub+0x50/0x80 [ 15.753813] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.753838] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.753865] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.753892] kthread+0x337/0x6f0 [ 15.753913] ? trace_preempt_on+0x20/0xc0 [ 15.753938] ? __pfx_kthread+0x10/0x10 [ 15.753960] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.753982] ? calculate_sigpending+0x7b/0xa0 [ 15.754007] ? __pfx_kthread+0x10/0x10 [ 15.754029] ret_from_fork+0x116/0x1d0 [ 15.754049] ? __pfx_kthread+0x10/0x10 [ 15.754070] ret_from_fork_asm+0x1a/0x30 [ 15.754102] </TASK> [ 15.754112] [ 15.761591] Allocated by task 282: [ 15.761730] kasan_save_stack+0x45/0x70 [ 15.762155] kasan_save_track+0x18/0x40 [ 15.762352] kasan_save_alloc_info+0x3b/0x50 [ 15.762565] __kasan_kmalloc+0xb7/0xc0 [ 15.762764] __kmalloc_cache_noprof+0x189/0x420 [ 15.762954] kasan_atomics+0x95/0x310 [ 15.763089] kunit_try_run_case+0x1a5/0x480 [ 15.763242] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.763428] kthread+0x337/0x6f0 [ 15.763552] ret_from_fork+0x116/0x1d0 [ 15.763750] ret_from_fork_asm+0x1a/0x30 [ 15.763962] [ 15.764054] The buggy address belongs to the object at ffff8881029cd380 [ 15.764054] which belongs to the cache kmalloc-64 of size 64 [ 15.764610] The buggy address is located 0 bytes to the right of [ 15.764610] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 15.765340] [ 15.765414] The buggy address belongs to the physical page: [ 15.765589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 15.765838] flags: 0x200000000000000(node=0|zone=2) [ 15.766091] page_type: f5(slab) [ 15.766257] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.766601] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.767053] page dumped because: kasan: bad access detected [ 15.767225] [ 15.767293] Memory state around the buggy address: [ 15.767448] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.767674] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.768290] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.768620] ^ [ 15.768854] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.769103] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.769321] ================================================================== [ 15.201609] ================================================================== [ 15.202056] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 15.202410] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 15.202735] [ 15.203085] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.203134] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.203147] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.203169] Call Trace: [ 15.203188] <TASK> [ 15.203207] dump_stack_lvl+0x73/0xb0 [ 15.203238] print_report+0xd1/0x650 [ 15.203261] ? __virt_addr_valid+0x1db/0x2d0 [ 15.203286] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.203308] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.203333] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.203356] kasan_report+0x141/0x180 [ 15.203379] ? kasan_atomics_helper+0x4b6e/0x5450 [ 15.203406] __asan_report_store4_noabort+0x1b/0x30 [ 15.203432] kasan_atomics_helper+0x4b6e/0x5450 [ 15.203456] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.203479] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.203506] ? kasan_atomics+0x152/0x310 [ 15.203533] kasan_atomics+0x1dc/0x310 [ 15.203556] ? __pfx_kasan_atomics+0x10/0x10 [ 15.203581] ? __pfx_read_tsc+0x10/0x10 [ 15.203618] ? ktime_get_ts64+0x86/0x230 [ 15.203645] kunit_try_run_case+0x1a5/0x480 [ 15.203672] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.203696] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.203722] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.203746] ? __kthread_parkme+0x82/0x180 [ 15.203851] ? preempt_count_sub+0x50/0x80 [ 15.203882] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.203908] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.203936] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.203963] kthread+0x337/0x6f0 [ 15.203983] ? trace_preempt_on+0x20/0xc0 [ 15.204009] ? __pfx_kthread+0x10/0x10 [ 15.204030] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.204053] ? calculate_sigpending+0x7b/0xa0 [ 15.204078] ? __pfx_kthread+0x10/0x10 [ 15.204102] ret_from_fork+0x116/0x1d0 [ 15.204122] ? __pfx_kthread+0x10/0x10 [ 15.204144] ret_from_fork_asm+0x1a/0x30 [ 15.204176] </TASK> [ 15.204187] [ 15.211988] Allocated by task 282: [ 15.212140] kasan_save_stack+0x45/0x70 [ 15.212299] kasan_save_track+0x18/0x40 [ 15.212477] kasan_save_alloc_info+0x3b/0x50 [ 15.212708] __kasan_kmalloc+0xb7/0xc0 [ 15.212971] __kmalloc_cache_noprof+0x189/0x420 [ 15.213203] kasan_atomics+0x95/0x310 [ 15.213402] kunit_try_run_case+0x1a5/0x480 [ 15.213627] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.213947] kthread+0x337/0x6f0 [ 15.214077] ret_from_fork+0x116/0x1d0 [ 15.214211] ret_from_fork_asm+0x1a/0x30 [ 15.214374] [ 15.214470] The buggy address belongs to the object at ffff8881029cd380 [ 15.214470] which belongs to the cache kmalloc-64 of size 64 [ 15.215229] The buggy address is located 0 bytes to the right of [ 15.215229] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 15.215782] [ 15.215881] The buggy address belongs to the physical page: [ 15.216183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 15.216488] flags: 0x200000000000000(node=0|zone=2) [ 15.216733] page_type: f5(slab) [ 15.216901] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.217205] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.217514] page dumped because: kasan: bad access detected [ 15.217881] [ 15.217971] Memory state around the buggy address: [ 15.218202] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.218485] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.218757] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.219184] ^ [ 15.219422] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.219756] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.220159] ================================================================== [ 15.769805] ================================================================== [ 15.770340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 15.770705] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 15.771212] [ 15.771300] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.771343] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.771356] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.771377] Call Trace: [ 15.771393] <TASK> [ 15.771410] dump_stack_lvl+0x73/0xb0 [ 15.771439] print_report+0xd1/0x650 [ 15.771462] ? __virt_addr_valid+0x1db/0x2d0 [ 15.771485] ? kasan_atomics_helper+0x1148/0x5450 [ 15.771507] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.771532] ? kasan_atomics_helper+0x1148/0x5450 [ 15.771554] kasan_report+0x141/0x180 [ 15.771577] ? kasan_atomics_helper+0x1148/0x5450 [ 15.771615] kasan_check_range+0x10c/0x1c0 [ 15.771640] __kasan_check_write+0x18/0x20 [ 15.771660] kasan_atomics_helper+0x1148/0x5450 [ 15.771684] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.771708] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.771733] ? kasan_atomics+0x152/0x310 [ 15.771760] kasan_atomics+0x1dc/0x310 [ 15.771783] ? __pfx_kasan_atomics+0x10/0x10 [ 15.771808] ? __pfx_read_tsc+0x10/0x10 [ 15.771830] ? ktime_get_ts64+0x86/0x230 [ 15.771856] kunit_try_run_case+0x1a5/0x480 [ 15.771881] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.771904] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.771930] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.771955] ? __kthread_parkme+0x82/0x180 [ 15.771975] ? preempt_count_sub+0x50/0x80 [ 15.772000] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.772026] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.772052] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.772078] kthread+0x337/0x6f0 [ 15.772097] ? trace_preempt_on+0x20/0xc0 [ 15.772123] ? __pfx_kthread+0x10/0x10 [ 15.772144] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.772166] ? calculate_sigpending+0x7b/0xa0 [ 15.772191] ? __pfx_kthread+0x10/0x10 [ 15.772213] ret_from_fork+0x116/0x1d0 [ 15.772232] ? __pfx_kthread+0x10/0x10 [ 15.772253] ret_from_fork_asm+0x1a/0x30 [ 15.772285] </TASK> [ 15.772296] [ 15.785892] Allocated by task 282: [ 15.786636] kasan_save_stack+0x45/0x70 [ 15.787294] kasan_save_track+0x18/0x40 [ 15.787457] kasan_save_alloc_info+0x3b/0x50 [ 15.787622] __kasan_kmalloc+0xb7/0xc0 [ 15.787757] __kmalloc_cache_noprof+0x189/0x420 [ 15.788415] kasan_atomics+0x95/0x310 [ 15.788638] kunit_try_run_case+0x1a5/0x480 [ 15.788805] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.789101] kthread+0x337/0x6f0 [ 15.789517] ret_from_fork+0x116/0x1d0 [ 15.789748] ret_from_fork_asm+0x1a/0x30 [ 15.790091] [ 15.790203] The buggy address belongs to the object at ffff8881029cd380 [ 15.790203] which belongs to the cache kmalloc-64 of size 64 [ 15.790677] The buggy address is located 0 bytes to the right of [ 15.790677] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 15.791222] [ 15.791316] The buggy address belongs to the physical page: [ 15.791545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 15.792012] flags: 0x200000000000000(node=0|zone=2) [ 15.792221] page_type: f5(slab) [ 15.792383] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.792671] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.792971] page dumped because: kasan: bad access detected [ 15.793177] [ 15.793713] Memory state around the buggy address: [ 15.793920] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.794198] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.794514] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.795122] ^ [ 15.795336] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.795720] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.796073] ================================================================== [ 16.033732] ================================================================== [ 16.034311] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 16.034539] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 16.035829] [ 16.036059] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.036240] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.036259] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.036282] Call Trace: [ 16.036302] <TASK> [ 16.036319] dump_stack_lvl+0x73/0xb0 [ 16.036352] print_report+0xd1/0x650 [ 16.036374] ? __virt_addr_valid+0x1db/0x2d0 [ 16.036445] ? kasan_atomics_helper+0x164f/0x5450 [ 16.036469] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.036493] ? kasan_atomics_helper+0x164f/0x5450 [ 16.036516] kasan_report+0x141/0x180 [ 16.036538] ? kasan_atomics_helper+0x164f/0x5450 [ 16.036565] kasan_check_range+0x10c/0x1c0 [ 16.036589] __kasan_check_write+0x18/0x20 [ 16.036620] kasan_atomics_helper+0x164f/0x5450 [ 16.036644] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.036669] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.036695] ? kasan_atomics+0x152/0x310 [ 16.036722] kasan_atomics+0x1dc/0x310 [ 16.036745] ? __pfx_kasan_atomics+0x10/0x10 [ 16.036770] ? __pfx_read_tsc+0x10/0x10 [ 16.036802] ? ktime_get_ts64+0x86/0x230 [ 16.036827] kunit_try_run_case+0x1a5/0x480 [ 16.036852] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.036876] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.036901] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.036926] ? __kthread_parkme+0x82/0x180 [ 16.036948] ? preempt_count_sub+0x50/0x80 [ 16.036973] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.036998] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.037023] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.037050] kthread+0x337/0x6f0 [ 16.037070] ? trace_preempt_on+0x20/0xc0 [ 16.037097] ? __pfx_kthread+0x10/0x10 [ 16.037119] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.037142] ? calculate_sigpending+0x7b/0xa0 [ 16.037168] ? __pfx_kthread+0x10/0x10 [ 16.037190] ret_from_fork+0x116/0x1d0 [ 16.037209] ? __pfx_kthread+0x10/0x10 [ 16.037230] ret_from_fork_asm+0x1a/0x30 [ 16.037262] </TASK> [ 16.037273] [ 16.051462] Allocated by task 282: [ 16.051855] kasan_save_stack+0x45/0x70 [ 16.052311] kasan_save_track+0x18/0x40 [ 16.052538] kasan_save_alloc_info+0x3b/0x50 [ 16.052696] __kasan_kmalloc+0xb7/0xc0 [ 16.052890] __kmalloc_cache_noprof+0x189/0x420 [ 16.053396] kasan_atomics+0x95/0x310 [ 16.053771] kunit_try_run_case+0x1a5/0x480 [ 16.054181] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.054695] kthread+0x337/0x6f0 [ 16.055075] ret_from_fork+0x116/0x1d0 [ 16.055429] ret_from_fork_asm+0x1a/0x30 [ 16.055703] [ 16.055787] The buggy address belongs to the object at ffff8881029cd380 [ 16.055787] which belongs to the cache kmalloc-64 of size 64 [ 16.056979] The buggy address is located 0 bytes to the right of [ 16.056979] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 16.057339] [ 16.057414] The buggy address belongs to the physical page: [ 16.057583] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 16.057952] flags: 0x200000000000000(node=0|zone=2) [ 16.058419] page_type: f5(slab) [ 16.058740] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.059415] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.060247] page dumped because: kasan: bad access detected [ 16.060922] [ 16.061097] Memory state around the buggy address: [ 16.061611] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.062300] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.063037] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.063787] ^ [ 16.064232] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.064491] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.064711] ================================================================== [ 16.507200] ================================================================== [ 16.507512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 16.508004] Read of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 16.508316] [ 16.508406] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.508451] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.508463] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.508485] Call Trace: [ 16.508505] <TASK> [ 16.508524] dump_stack_lvl+0x73/0xb0 [ 16.508555] print_report+0xd1/0x650 [ 16.508579] ? __virt_addr_valid+0x1db/0x2d0 [ 16.508616] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.508640] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.508664] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.508688] kasan_report+0x141/0x180 [ 16.508710] ? kasan_atomics_helper+0x4fa5/0x5450 [ 16.508738] __asan_report_load8_noabort+0x18/0x20 [ 16.508765] kasan_atomics_helper+0x4fa5/0x5450 [ 16.508800] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.508823] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.508851] ? kasan_atomics+0x152/0x310 [ 16.508877] kasan_atomics+0x1dc/0x310 [ 16.508901] ? __pfx_kasan_atomics+0x10/0x10 [ 16.508926] ? __pfx_read_tsc+0x10/0x10 [ 16.508948] ? ktime_get_ts64+0x86/0x230 [ 16.508975] kunit_try_run_case+0x1a5/0x480 [ 16.509001] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.509025] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.509051] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.509077] ? __kthread_parkme+0x82/0x180 [ 16.509099] ? preempt_count_sub+0x50/0x80 [ 16.509125] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.509150] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.509176] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.509203] kthread+0x337/0x6f0 [ 16.509222] ? trace_preempt_on+0x20/0xc0 [ 16.509247] ? __pfx_kthread+0x10/0x10 [ 16.509269] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.509291] ? calculate_sigpending+0x7b/0xa0 [ 16.509317] ? __pfx_kthread+0x10/0x10 [ 16.509339] ret_from_fork+0x116/0x1d0 [ 16.509358] ? __pfx_kthread+0x10/0x10 [ 16.509379] ret_from_fork_asm+0x1a/0x30 [ 16.509412] </TASK> [ 16.509423] [ 16.516876] Allocated by task 282: [ 16.517059] kasan_save_stack+0x45/0x70 [ 16.517218] kasan_save_track+0x18/0x40 [ 16.517413] kasan_save_alloc_info+0x3b/0x50 [ 16.517569] __kasan_kmalloc+0xb7/0xc0 [ 16.517784] __kmalloc_cache_noprof+0x189/0x420 [ 16.517998] kasan_atomics+0x95/0x310 [ 16.518189] kunit_try_run_case+0x1a5/0x480 [ 16.518374] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.518638] kthread+0x337/0x6f0 [ 16.518774] ret_from_fork+0x116/0x1d0 [ 16.518984] ret_from_fork_asm+0x1a/0x30 [ 16.519145] [ 16.519241] The buggy address belongs to the object at ffff8881029cd380 [ 16.519241] which belongs to the cache kmalloc-64 of size 64 [ 16.519719] The buggy address is located 0 bytes to the right of [ 16.519719] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 16.520210] [ 16.520307] The buggy address belongs to the physical page: [ 16.520482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 16.520734] flags: 0x200000000000000(node=0|zone=2) [ 16.520903] page_type: f5(slab) [ 16.521025] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.521260] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.521659] page dumped because: kasan: bad access detected [ 16.521942] [ 16.522035] Memory state around the buggy address: [ 16.522258] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.522576] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.522895] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.523110] ^ [ 16.523266] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.523484] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.523708] ================================================================== [ 15.258010] ================================================================== [ 15.258348] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 15.260110] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 15.260464] [ 15.260583] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.261792] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.261808] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.261833] Call Trace: [ 15.261854] <TASK> [ 15.261874] dump_stack_lvl+0x73/0xb0 [ 15.261910] print_report+0xd1/0x650 [ 15.261933] ? __virt_addr_valid+0x1db/0x2d0 [ 15.261958] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.261979] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.262004] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.262027] kasan_report+0x141/0x180 [ 15.262049] ? kasan_atomics_helper+0x4a0/0x5450 [ 15.262076] kasan_check_range+0x10c/0x1c0 [ 15.262100] __kasan_check_write+0x18/0x20 [ 15.262121] kasan_atomics_helper+0x4a0/0x5450 [ 15.262143] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.262167] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.262194] ? kasan_atomics+0x152/0x310 [ 15.262220] kasan_atomics+0x1dc/0x310 [ 15.262243] ? __pfx_kasan_atomics+0x10/0x10 [ 15.262268] ? __pfx_read_tsc+0x10/0x10 [ 15.262290] ? ktime_get_ts64+0x86/0x230 [ 15.262315] kunit_try_run_case+0x1a5/0x480 [ 15.262340] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.262368] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.262393] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.262418] ? __kthread_parkme+0x82/0x180 [ 15.262440] ? preempt_count_sub+0x50/0x80 [ 15.262465] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.262489] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.262515] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.262541] kthread+0x337/0x6f0 [ 15.262560] ? trace_preempt_on+0x20/0xc0 [ 15.262586] ? __pfx_kthread+0x10/0x10 [ 15.262620] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.262642] ? calculate_sigpending+0x7b/0xa0 [ 15.262667] ? __pfx_kthread+0x10/0x10 [ 15.262689] ret_from_fork+0x116/0x1d0 [ 15.262708] ? __pfx_kthread+0x10/0x10 [ 15.262730] ret_from_fork_asm+0x1a/0x30 [ 15.262787] </TASK> [ 15.262798] [ 15.276058] Allocated by task 282: [ 15.276229] kasan_save_stack+0x45/0x70 [ 15.276449] kasan_save_track+0x18/0x40 [ 15.276663] kasan_save_alloc_info+0x3b/0x50 [ 15.276993] __kasan_kmalloc+0xb7/0xc0 [ 15.277158] __kmalloc_cache_noprof+0x189/0x420 [ 15.277438] kasan_atomics+0x95/0x310 [ 15.277633] kunit_try_run_case+0x1a5/0x480 [ 15.277906] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.278368] kthread+0x337/0x6f0 [ 15.278622] ret_from_fork+0x116/0x1d0 [ 15.278778] ret_from_fork_asm+0x1a/0x30 [ 15.278929] [ 15.279056] The buggy address belongs to the object at ffff8881029cd380 [ 15.279056] which belongs to the cache kmalloc-64 of size 64 [ 15.280241] The buggy address is located 0 bytes to the right of [ 15.280241] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 15.280765] [ 15.281665] The buggy address belongs to the physical page: [ 15.282396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 15.283009] flags: 0x200000000000000(node=0|zone=2) [ 15.283273] page_type: f5(slab) [ 15.283440] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.283773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.284380] page dumped because: kasan: bad access detected [ 15.284623] [ 15.284714] Memory state around the buggy address: [ 15.285580] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.286218] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.286927] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.287355] ^ [ 15.287562] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.288182] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.289196] ================================================================== [ 15.484223] ================================================================== [ 15.484584] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 15.484944] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 15.485251] [ 15.485363] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.485407] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.485420] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.485441] Call Trace: [ 15.485457] <TASK> [ 15.485473] dump_stack_lvl+0x73/0xb0 [ 15.485500] print_report+0xd1/0x650 [ 15.485522] ? __virt_addr_valid+0x1db/0x2d0 [ 15.485545] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.485565] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.485588] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.485642] kasan_report+0x141/0x180 [ 15.485665] ? kasan_atomics_helper+0xa2b/0x5450 [ 15.485692] kasan_check_range+0x10c/0x1c0 [ 15.485716] __kasan_check_write+0x18/0x20 [ 15.485737] kasan_atomics_helper+0xa2b/0x5450 [ 15.485779] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.485804] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.485829] ? kasan_atomics+0x152/0x310 [ 15.485856] kasan_atomics+0x1dc/0x310 [ 15.485879] ? __pfx_kasan_atomics+0x10/0x10 [ 15.485904] ? __pfx_read_tsc+0x10/0x10 [ 15.485926] ? ktime_get_ts64+0x86/0x230 [ 15.485951] kunit_try_run_case+0x1a5/0x480 [ 15.485975] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.485999] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.486024] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.486049] ? __kthread_parkme+0x82/0x180 [ 15.486071] ? preempt_count_sub+0x50/0x80 [ 15.486097] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.486122] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.486148] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.486175] kthread+0x337/0x6f0 [ 15.486196] ? trace_preempt_on+0x20/0xc0 [ 15.486222] ? __pfx_kthread+0x10/0x10 [ 15.486243] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.486266] ? calculate_sigpending+0x7b/0xa0 [ 15.486292] ? __pfx_kthread+0x10/0x10 [ 15.486314] ret_from_fork+0x116/0x1d0 [ 15.486333] ? __pfx_kthread+0x10/0x10 [ 15.486355] ret_from_fork_asm+0x1a/0x30 [ 15.486386] </TASK> [ 15.486398] [ 15.493661] Allocated by task 282: [ 15.493839] kasan_save_stack+0x45/0x70 [ 15.493996] kasan_save_track+0x18/0x40 [ 15.494134] kasan_save_alloc_info+0x3b/0x50 [ 15.494285] __kasan_kmalloc+0xb7/0xc0 [ 15.494435] __kmalloc_cache_noprof+0x189/0x420 [ 15.494670] kasan_atomics+0x95/0x310 [ 15.494892] kunit_try_run_case+0x1a5/0x480 [ 15.495105] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.495363] kthread+0x337/0x6f0 [ 15.495533] ret_from_fork+0x116/0x1d0 [ 15.495722] ret_from_fork_asm+0x1a/0x30 [ 15.495886] [ 15.495957] The buggy address belongs to the object at ffff8881029cd380 [ 15.495957] which belongs to the cache kmalloc-64 of size 64 [ 15.496353] The buggy address is located 0 bytes to the right of [ 15.496353] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 15.496937] [ 15.497034] The buggy address belongs to the physical page: [ 15.497293] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 15.497632] flags: 0x200000000000000(node=0|zone=2) [ 15.497825] page_type: f5(slab) [ 15.497962] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.498311] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.498641] page dumped because: kasan: bad access detected [ 15.498891] [ 15.498984] Memory state around the buggy address: [ 15.499183] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.499451] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.499743] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.500038] ^ [ 15.500252] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.500488] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.500722] ================================================================== [ 15.715631] ================================================================== [ 15.715987] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 15.716448] Read of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 15.716771] [ 15.717215] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.717259] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.717273] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.717293] Call Trace: [ 15.717307] <TASK> [ 15.717323] dump_stack_lvl+0x73/0xb0 [ 15.717351] print_report+0xd1/0x650 [ 15.717374] ? __virt_addr_valid+0x1db/0x2d0 [ 15.717398] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.717419] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.717443] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.717466] kasan_report+0x141/0x180 [ 15.717488] ? kasan_atomics_helper+0x4a36/0x5450 [ 15.717516] __asan_report_load4_noabort+0x18/0x20 [ 15.717541] kasan_atomics_helper+0x4a36/0x5450 [ 15.717565] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.717589] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.717628] ? kasan_atomics+0x152/0x310 [ 15.717655] kasan_atomics+0x1dc/0x310 [ 15.717679] ? __pfx_kasan_atomics+0x10/0x10 [ 15.717704] ? __pfx_read_tsc+0x10/0x10 [ 15.717726] ? ktime_get_ts64+0x86/0x230 [ 15.717750] kunit_try_run_case+0x1a5/0x480 [ 15.717774] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.717813] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.717837] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.717863] ? __kthread_parkme+0x82/0x180 [ 15.717884] ? preempt_count_sub+0x50/0x80 [ 15.717909] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.717934] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.717960] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.717986] kthread+0x337/0x6f0 [ 15.718006] ? trace_preempt_on+0x20/0xc0 [ 15.718031] ? __pfx_kthread+0x10/0x10 [ 15.718052] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.718074] ? calculate_sigpending+0x7b/0xa0 [ 15.718099] ? __pfx_kthread+0x10/0x10 [ 15.718121] ret_from_fork+0x116/0x1d0 [ 15.718141] ? __pfx_kthread+0x10/0x10 [ 15.718162] ret_from_fork_asm+0x1a/0x30 [ 15.718194] </TASK> [ 15.718204] [ 15.725574] Allocated by task 282: [ 15.725778] kasan_save_stack+0x45/0x70 [ 15.725991] kasan_save_track+0x18/0x40 [ 15.726188] kasan_save_alloc_info+0x3b/0x50 [ 15.726408] __kasan_kmalloc+0xb7/0xc0 [ 15.726604] __kmalloc_cache_noprof+0x189/0x420 [ 15.726896] kasan_atomics+0x95/0x310 [ 15.727035] kunit_try_run_case+0x1a5/0x480 [ 15.727232] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.727489] kthread+0x337/0x6f0 [ 15.727630] ret_from_fork+0x116/0x1d0 [ 15.727765] ret_from_fork_asm+0x1a/0x30 [ 15.727974] [ 15.728074] The buggy address belongs to the object at ffff8881029cd380 [ 15.728074] which belongs to the cache kmalloc-64 of size 64 [ 15.728543] The buggy address is located 0 bytes to the right of [ 15.728543] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 15.729066] [ 15.729171] The buggy address belongs to the physical page: [ 15.729387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 15.729658] flags: 0x200000000000000(node=0|zone=2) [ 15.729991] page_type: f5(slab) [ 15.730157] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.730477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.730817] page dumped because: kasan: bad access detected [ 15.731005] [ 15.731103] Memory state around the buggy address: [ 15.731331] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.731614] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.731832] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.732045] ^ [ 15.732201] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.732518] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.733000] ================================================================== [ 15.796863] ================================================================== [ 15.798011] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 15.798447] Read of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 15.798779] [ 15.799040] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.799090] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.799103] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.799126] Call Trace: [ 15.799212] <TASK> [ 15.799286] dump_stack_lvl+0x73/0xb0 [ 15.799321] print_report+0xd1/0x650 [ 15.799345] ? __virt_addr_valid+0x1db/0x2d0 [ 15.799369] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.799391] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.799416] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.799438] kasan_report+0x141/0x180 [ 15.799461] ? kasan_atomics_helper+0x4a02/0x5450 [ 15.799488] __asan_report_load4_noabort+0x18/0x20 [ 15.799515] kasan_atomics_helper+0x4a02/0x5450 [ 15.799538] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.799561] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.799588] ? kasan_atomics+0x152/0x310 [ 15.799626] kasan_atomics+0x1dc/0x310 [ 15.799649] ? __pfx_kasan_atomics+0x10/0x10 [ 15.799674] ? __pfx_read_tsc+0x10/0x10 [ 15.799696] ? ktime_get_ts64+0x86/0x230 [ 15.799722] kunit_try_run_case+0x1a5/0x480 [ 15.799748] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.799771] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.799863] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.799888] ? __kthread_parkme+0x82/0x180 [ 15.799910] ? preempt_count_sub+0x50/0x80 [ 15.799936] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.799961] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.799986] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.800013] kthread+0x337/0x6f0 [ 15.800032] ? trace_preempt_on+0x20/0xc0 [ 15.800058] ? __pfx_kthread+0x10/0x10 [ 15.800080] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.800102] ? calculate_sigpending+0x7b/0xa0 [ 15.800128] ? __pfx_kthread+0x10/0x10 [ 15.800150] ret_from_fork+0x116/0x1d0 [ 15.800169] ? __pfx_kthread+0x10/0x10 [ 15.800191] ret_from_fork_asm+0x1a/0x30 [ 15.800223] </TASK> [ 15.800234] [ 15.809770] Allocated by task 282: [ 15.810120] kasan_save_stack+0x45/0x70 [ 15.810280] kasan_save_track+0x18/0x40 [ 15.810474] kasan_save_alloc_info+0x3b/0x50 [ 15.810679] __kasan_kmalloc+0xb7/0xc0 [ 15.810858] __kmalloc_cache_noprof+0x189/0x420 [ 15.811302] kasan_atomics+0x95/0x310 [ 15.811548] kunit_try_run_case+0x1a5/0x480 [ 15.811723] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.812174] kthread+0x337/0x6f0 [ 15.812422] ret_from_fork+0x116/0x1d0 [ 15.812613] ret_from_fork_asm+0x1a/0x30 [ 15.812818] [ 15.813079] The buggy address belongs to the object at ffff8881029cd380 [ 15.813079] which belongs to the cache kmalloc-64 of size 64 [ 15.813588] The buggy address is located 0 bytes to the right of [ 15.813588] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 15.814429] [ 15.814522] The buggy address belongs to the physical page: [ 15.814731] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 15.815306] flags: 0x200000000000000(node=0|zone=2) [ 15.815620] page_type: f5(slab) [ 15.815791] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.816233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.816550] page dumped because: kasan: bad access detected [ 15.816811] [ 15.816887] Memory state around the buggy address: [ 15.817287] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.817666] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.818101] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.818359] ^ [ 15.818689] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.819123] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.819484] ================================================================== [ 16.287454] ================================================================== [ 16.288096] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 16.288515] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 16.289126] [ 16.289239] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.289282] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.289379] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.289404] Call Trace: [ 16.289420] <TASK> [ 16.289435] dump_stack_lvl+0x73/0xb0 [ 16.289466] print_report+0xd1/0x650 [ 16.289488] ? __virt_addr_valid+0x1db/0x2d0 [ 16.289511] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.289534] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.289559] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.289581] kasan_report+0x141/0x180 [ 16.289616] ? kasan_atomics_helper+0x1d7a/0x5450 [ 16.289643] kasan_check_range+0x10c/0x1c0 [ 16.289668] __kasan_check_write+0x18/0x20 [ 16.289688] kasan_atomics_helper+0x1d7a/0x5450 [ 16.289712] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.289736] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.289765] ? kasan_atomics+0x152/0x310 [ 16.289804] kasan_atomics+0x1dc/0x310 [ 16.289828] ? __pfx_kasan_atomics+0x10/0x10 [ 16.289854] ? __pfx_read_tsc+0x10/0x10 [ 16.289877] ? ktime_get_ts64+0x86/0x230 [ 16.289904] kunit_try_run_case+0x1a5/0x480 [ 16.289929] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.289954] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.289980] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.290005] ? __kthread_parkme+0x82/0x180 [ 16.290026] ? preempt_count_sub+0x50/0x80 [ 16.290051] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.290077] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.290103] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.290130] kthread+0x337/0x6f0 [ 16.290151] ? trace_preempt_on+0x20/0xc0 [ 16.290174] ? __pfx_kthread+0x10/0x10 [ 16.290196] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.290218] ? calculate_sigpending+0x7b/0xa0 [ 16.290244] ? __pfx_kthread+0x10/0x10 [ 16.290266] ret_from_fork+0x116/0x1d0 [ 16.290286] ? __pfx_kthread+0x10/0x10 [ 16.290307] ret_from_fork_asm+0x1a/0x30 [ 16.290338] </TASK> [ 16.290350] [ 16.300475] Allocated by task 282: [ 16.300636] kasan_save_stack+0x45/0x70 [ 16.300800] kasan_save_track+0x18/0x40 [ 16.300938] kasan_save_alloc_info+0x3b/0x50 [ 16.301089] __kasan_kmalloc+0xb7/0xc0 [ 16.301223] __kmalloc_cache_noprof+0x189/0x420 [ 16.301382] kasan_atomics+0x95/0x310 [ 16.301518] kunit_try_run_case+0x1a5/0x480 [ 16.302499] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.304157] kthread+0x337/0x6f0 [ 16.304460] ret_from_fork+0x116/0x1d0 [ 16.304822] ret_from_fork_asm+0x1a/0x30 [ 16.305182] [ 16.305339] The buggy address belongs to the object at ffff8881029cd380 [ 16.305339] which belongs to the cache kmalloc-64 of size 64 [ 16.306994] The buggy address is located 0 bytes to the right of [ 16.306994] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 16.308089] [ 16.308252] The buggy address belongs to the physical page: [ 16.308854] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 16.309549] flags: 0x200000000000000(node=0|zone=2) [ 16.310037] page_type: f5(slab) [ 16.310359] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.311071] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.311329] page dumped because: kasan: bad access detected [ 16.311502] [ 16.311572] Memory state around the buggy address: [ 16.312027] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.312642] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.313255] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.313884] ^ [ 16.314282] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.314492] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.314710] ================================================================== [ 15.289956] ================================================================== [ 15.290274] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 15.290584] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 15.290822] [ 15.291197] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.291262] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.291275] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.291297] Call Trace: [ 15.291315] <TASK> [ 15.291335] dump_stack_lvl+0x73/0xb0 [ 15.291367] print_report+0xd1/0x650 [ 15.291390] ? __virt_addr_valid+0x1db/0x2d0 [ 15.291414] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.291436] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.291461] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.291484] kasan_report+0x141/0x180 [ 15.291508] ? kasan_atomics_helper+0x4b3a/0x5450 [ 15.291535] __asan_report_store4_noabort+0x1b/0x30 [ 15.291609] kasan_atomics_helper+0x4b3a/0x5450 [ 15.291659] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.291741] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.291777] ? kasan_atomics+0x152/0x310 [ 15.292036] kasan_atomics+0x1dc/0x310 [ 15.292063] ? __pfx_kasan_atomics+0x10/0x10 [ 15.292102] ? __pfx_read_tsc+0x10/0x10 [ 15.292127] ? ktime_get_ts64+0x86/0x230 [ 15.292152] kunit_try_run_case+0x1a5/0x480 [ 15.292178] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.292202] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.292227] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.292252] ? __kthread_parkme+0x82/0x180 [ 15.292274] ? preempt_count_sub+0x50/0x80 [ 15.292300] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.292324] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.292350] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.292376] kthread+0x337/0x6f0 [ 15.292396] ? trace_preempt_on+0x20/0xc0 [ 15.292420] ? __pfx_kthread+0x10/0x10 [ 15.292442] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.292465] ? calculate_sigpending+0x7b/0xa0 [ 15.292490] ? __pfx_kthread+0x10/0x10 [ 15.292512] ret_from_fork+0x116/0x1d0 [ 15.292531] ? __pfx_kthread+0x10/0x10 [ 15.292553] ret_from_fork_asm+0x1a/0x30 [ 15.292585] </TASK> [ 15.292606] [ 15.301605] Allocated by task 282: [ 15.301758] kasan_save_stack+0x45/0x70 [ 15.301913] kasan_save_track+0x18/0x40 [ 15.302179] kasan_save_alloc_info+0x3b/0x50 [ 15.302572] __kasan_kmalloc+0xb7/0xc0 [ 15.303292] __kmalloc_cache_noprof+0x189/0x420 [ 15.303523] kasan_atomics+0x95/0x310 [ 15.303765] kunit_try_run_case+0x1a5/0x480 [ 15.303995] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.304301] kthread+0x337/0x6f0 [ 15.304473] ret_from_fork+0x116/0x1d0 [ 15.304685] ret_from_fork_asm+0x1a/0x30 [ 15.304914] [ 15.305014] The buggy address belongs to the object at ffff8881029cd380 [ 15.305014] which belongs to the cache kmalloc-64 of size 64 [ 15.305575] The buggy address is located 0 bytes to the right of [ 15.305575] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 15.306133] [ 15.306271] The buggy address belongs to the physical page: [ 15.306518] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 15.306890] flags: 0x200000000000000(node=0|zone=2) [ 15.307246] page_type: f5(slab) [ 15.307378] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.307840] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.308098] page dumped because: kasan: bad access detected [ 15.308352] [ 15.308446] Memory state around the buggy address: [ 15.308659] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.309033] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.309283] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.309611] ^ [ 15.310000] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.310228] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.310646] ================================================================== [ 15.579518] ================================================================== [ 15.580005] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 15.580314] Read of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 15.580631] [ 15.580731] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.580775] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.580789] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.580813] Call Trace: [ 15.580832] <TASK> [ 15.580852] dump_stack_lvl+0x73/0xb0 [ 15.580881] print_report+0xd1/0x650 [ 15.580904] ? __virt_addr_valid+0x1db/0x2d0 [ 15.580942] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.580965] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.580991] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.581014] kasan_report+0x141/0x180 [ 15.581037] ? kasan_atomics_helper+0x4a84/0x5450 [ 15.581065] __asan_report_load4_noabort+0x18/0x20 [ 15.581092] kasan_atomics_helper+0x4a84/0x5450 [ 15.581118] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.581143] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.581170] ? kasan_atomics+0x152/0x310 [ 15.581197] kasan_atomics+0x1dc/0x310 [ 15.581221] ? __pfx_kasan_atomics+0x10/0x10 [ 15.581248] ? __pfx_read_tsc+0x10/0x10 [ 15.581271] ? ktime_get_ts64+0x86/0x230 [ 15.581297] kunit_try_run_case+0x1a5/0x480 [ 15.581322] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.581347] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.581373] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.581398] ? __kthread_parkme+0x82/0x180 [ 15.581421] ? preempt_count_sub+0x50/0x80 [ 15.581446] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.581471] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.581496] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.581522] kthread+0x337/0x6f0 [ 15.581542] ? trace_preempt_on+0x20/0xc0 [ 15.581566] ? __pfx_kthread+0x10/0x10 [ 15.581588] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.581621] ? calculate_sigpending+0x7b/0xa0 [ 15.581647] ? __pfx_kthread+0x10/0x10 [ 15.581670] ret_from_fork+0x116/0x1d0 [ 15.581689] ? __pfx_kthread+0x10/0x10 [ 15.581710] ret_from_fork_asm+0x1a/0x30 [ 15.581742] </TASK> [ 15.581753] [ 15.590022] Allocated by task 282: [ 15.590522] kasan_save_stack+0x45/0x70 [ 15.590734] kasan_save_track+0x18/0x40 [ 15.591092] kasan_save_alloc_info+0x3b/0x50 [ 15.591304] __kasan_kmalloc+0xb7/0xc0 [ 15.591481] __kmalloc_cache_noprof+0x189/0x420 [ 15.591704] kasan_atomics+0x95/0x310 [ 15.592200] kunit_try_run_case+0x1a5/0x480 [ 15.592372] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.592653] kthread+0x337/0x6f0 [ 15.593001] ret_from_fork+0x116/0x1d0 [ 15.593158] ret_from_fork_asm+0x1a/0x30 [ 15.593483] [ 15.593652] The buggy address belongs to the object at ffff8881029cd380 [ 15.593652] which belongs to the cache kmalloc-64 of size 64 [ 15.594339] The buggy address is located 0 bytes to the right of [ 15.594339] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 15.594991] [ 15.595096] The buggy address belongs to the physical page: [ 15.595494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 15.595862] flags: 0x200000000000000(node=0|zone=2) [ 15.596170] page_type: f5(slab) [ 15.596315] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.596742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.597196] page dumped because: kasan: bad access detected [ 15.597482] [ 15.597581] Memory state around the buggy address: [ 15.597800] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.598074] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.598360] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.598654] ^ [ 15.598878] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.599502] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.599953] ================================================================== [ 15.820314] ================================================================== [ 15.820641] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 15.821206] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 15.821677] [ 15.821785] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.821828] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.821841] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.821984] Call Trace: [ 15.822002] <TASK> [ 15.822021] dump_stack_lvl+0x73/0xb0 [ 15.822052] print_report+0xd1/0x650 [ 15.822074] ? __virt_addr_valid+0x1db/0x2d0 [ 15.822098] ? kasan_atomics_helper+0x1217/0x5450 [ 15.822120] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.822145] ? kasan_atomics_helper+0x1217/0x5450 [ 15.822169] kasan_report+0x141/0x180 [ 15.822192] ? kasan_atomics_helper+0x1217/0x5450 [ 15.822220] kasan_check_range+0x10c/0x1c0 [ 15.822244] __kasan_check_write+0x18/0x20 [ 15.822263] kasan_atomics_helper+0x1217/0x5450 [ 15.822287] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.822310] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.822337] ? kasan_atomics+0x152/0x310 [ 15.822363] kasan_atomics+0x1dc/0x310 [ 15.822386] ? __pfx_kasan_atomics+0x10/0x10 [ 15.822411] ? __pfx_read_tsc+0x10/0x10 [ 15.822433] ? ktime_get_ts64+0x86/0x230 [ 15.822458] kunit_try_run_case+0x1a5/0x480 [ 15.822483] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.822507] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.822531] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.822556] ? __kthread_parkme+0x82/0x180 [ 15.822577] ? preempt_count_sub+0x50/0x80 [ 15.822617] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.822643] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.822668] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.822694] kthread+0x337/0x6f0 [ 15.822714] ? trace_preempt_on+0x20/0xc0 [ 15.822738] ? __pfx_kthread+0x10/0x10 [ 15.822759] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.822795] ? calculate_sigpending+0x7b/0xa0 [ 15.822821] ? __pfx_kthread+0x10/0x10 [ 15.822847] ret_from_fork+0x116/0x1d0 [ 15.822867] ? __pfx_kthread+0x10/0x10 [ 15.822888] ret_from_fork_asm+0x1a/0x30 [ 15.822921] </TASK> [ 15.822933] [ 15.832334] Allocated by task 282: [ 15.832660] kasan_save_stack+0x45/0x70 [ 15.832873] kasan_save_track+0x18/0x40 [ 15.833049] kasan_save_alloc_info+0x3b/0x50 [ 15.833235] __kasan_kmalloc+0xb7/0xc0 [ 15.833413] __kmalloc_cache_noprof+0x189/0x420 [ 15.833625] kasan_atomics+0x95/0x310 [ 15.833794] kunit_try_run_case+0x1a5/0x480 [ 15.834306] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.834507] kthread+0x337/0x6f0 [ 15.834759] ret_from_fork+0x116/0x1d0 [ 15.835073] ret_from_fork_asm+0x1a/0x30 [ 15.835231] [ 15.835329] The buggy address belongs to the object at ffff8881029cd380 [ 15.835329] which belongs to the cache kmalloc-64 of size 64 [ 15.836037] The buggy address is located 0 bytes to the right of [ 15.836037] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 15.836716] [ 15.836874] The buggy address belongs to the physical page: [ 15.837101] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 15.837533] flags: 0x200000000000000(node=0|zone=2) [ 15.837758] page_type: f5(slab) [ 15.837940] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.838250] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.838549] page dumped because: kasan: bad access detected [ 15.839077] [ 15.839171] Memory state around the buggy address: [ 15.839358] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.839660] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.840113] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.840469] ^ [ 15.840646] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.841137] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.841435] ================================================================== [ 16.340606] ================================================================== [ 16.340982] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 16.341416] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 16.341884] [ 16.342001] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.342048] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.342060] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.342083] Call Trace: [ 16.342102] <TASK> [ 16.342121] dump_stack_lvl+0x73/0xb0 [ 16.342155] print_report+0xd1/0x650 [ 16.342179] ? __virt_addr_valid+0x1db/0x2d0 [ 16.342203] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.342226] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.342251] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.342274] kasan_report+0x141/0x180 [ 16.342297] ? kasan_atomics_helper+0x1eaa/0x5450 [ 16.342325] kasan_check_range+0x10c/0x1c0 [ 16.342349] __kasan_check_write+0x18/0x20 [ 16.342370] kasan_atomics_helper+0x1eaa/0x5450 [ 16.342394] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.342418] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.342444] ? kasan_atomics+0x152/0x310 [ 16.342471] kasan_atomics+0x1dc/0x310 [ 16.342494] ? __pfx_kasan_atomics+0x10/0x10 [ 16.342520] ? __pfx_read_tsc+0x10/0x10 [ 16.342542] ? ktime_get_ts64+0x86/0x230 [ 16.342569] kunit_try_run_case+0x1a5/0x480 [ 16.342606] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.342631] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.342656] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.342681] ? __kthread_parkme+0x82/0x180 [ 16.342704] ? preempt_count_sub+0x50/0x80 [ 16.342729] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.342756] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.342782] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.342809] kthread+0x337/0x6f0 [ 16.342834] ? trace_preempt_on+0x20/0xc0 [ 16.342860] ? __pfx_kthread+0x10/0x10 [ 16.342881] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.342903] ? calculate_sigpending+0x7b/0xa0 [ 16.342929] ? __pfx_kthread+0x10/0x10 [ 16.342951] ret_from_fork+0x116/0x1d0 [ 16.342969] ? __pfx_kthread+0x10/0x10 [ 16.342991] ret_from_fork_asm+0x1a/0x30 [ 16.343023] </TASK> [ 16.343034] [ 16.350361] Allocated by task 282: [ 16.350552] kasan_save_stack+0x45/0x70 [ 16.350754] kasan_save_track+0x18/0x40 [ 16.350943] kasan_save_alloc_info+0x3b/0x50 [ 16.351097] __kasan_kmalloc+0xb7/0xc0 [ 16.351281] __kmalloc_cache_noprof+0x189/0x420 [ 16.351523] kasan_atomics+0x95/0x310 [ 16.351758] kunit_try_run_case+0x1a5/0x480 [ 16.351945] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.352202] kthread+0x337/0x6f0 [ 16.352326] ret_from_fork+0x116/0x1d0 [ 16.352464] ret_from_fork_asm+0x1a/0x30 [ 16.352617] [ 16.352713] The buggy address belongs to the object at ffff8881029cd380 [ 16.352713] which belongs to the cache kmalloc-64 of size 64 [ 16.353223] The buggy address is located 0 bytes to the right of [ 16.353223] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 16.353668] [ 16.353742] The buggy address belongs to the physical page: [ 16.353917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 16.354297] flags: 0x200000000000000(node=0|zone=2) [ 16.354550] page_type: f5(slab) [ 16.354753] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.355134] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.355413] page dumped because: kasan: bad access detected [ 16.355587] [ 16.355690] Memory state around the buggy address: [ 16.355911] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.356252] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.356516] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.356754] ^ [ 16.357019] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.357350] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.357603] ================================================================== [ 16.488514] ================================================================== [ 16.489339] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 16.489682] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 16.490012] [ 16.490122] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.490164] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.490176] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.490198] Call Trace: [ 16.490215] <TASK> [ 16.490231] dump_stack_lvl+0x73/0xb0 [ 16.490260] print_report+0xd1/0x650 [ 16.490283] ? __virt_addr_valid+0x1db/0x2d0 [ 16.490307] ? kasan_atomics_helper+0x218a/0x5450 [ 16.490330] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.490354] ? kasan_atomics_helper+0x218a/0x5450 [ 16.490377] kasan_report+0x141/0x180 [ 16.490400] ? kasan_atomics_helper+0x218a/0x5450 [ 16.490427] kasan_check_range+0x10c/0x1c0 [ 16.490465] __kasan_check_write+0x18/0x20 [ 16.490486] kasan_atomics_helper+0x218a/0x5450 [ 16.490509] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.490533] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.490559] ? kasan_atomics+0x152/0x310 [ 16.490586] kasan_atomics+0x1dc/0x310 [ 16.490620] ? __pfx_kasan_atomics+0x10/0x10 [ 16.490646] ? __pfx_read_tsc+0x10/0x10 [ 16.490668] ? ktime_get_ts64+0x86/0x230 [ 16.490693] kunit_try_run_case+0x1a5/0x480 [ 16.490718] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.490741] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.490766] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.490792] ? __kthread_parkme+0x82/0x180 [ 16.490813] ? preempt_count_sub+0x50/0x80 [ 16.490846] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.490871] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.490897] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.490934] kthread+0x337/0x6f0 [ 16.490953] ? trace_preempt_on+0x20/0xc0 [ 16.490979] ? __pfx_kthread+0x10/0x10 [ 16.491001] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.491023] ? calculate_sigpending+0x7b/0xa0 [ 16.491049] ? __pfx_kthread+0x10/0x10 [ 16.491072] ret_from_fork+0x116/0x1d0 [ 16.491091] ? __pfx_kthread+0x10/0x10 [ 16.491114] ret_from_fork_asm+0x1a/0x30 [ 16.491146] </TASK> [ 16.491156] [ 16.498739] Allocated by task 282: [ 16.498969] kasan_save_stack+0x45/0x70 [ 16.499139] kasan_save_track+0x18/0x40 [ 16.499303] kasan_save_alloc_info+0x3b/0x50 [ 16.499464] __kasan_kmalloc+0xb7/0xc0 [ 16.499667] __kmalloc_cache_noprof+0x189/0x420 [ 16.499980] kasan_atomics+0x95/0x310 [ 16.500115] kunit_try_run_case+0x1a5/0x480 [ 16.500266] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.500520] kthread+0x337/0x6f0 [ 16.500698] ret_from_fork+0x116/0x1d0 [ 16.501035] ret_from_fork_asm+0x1a/0x30 [ 16.501189] [ 16.501259] The buggy address belongs to the object at ffff8881029cd380 [ 16.501259] which belongs to the cache kmalloc-64 of size 64 [ 16.501738] The buggy address is located 0 bytes to the right of [ 16.501738] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 16.502291] [ 16.502365] The buggy address belongs to the physical page: [ 16.502538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 16.502784] flags: 0x200000000000000(node=0|zone=2) [ 16.503544] page_type: f5(slab) [ 16.503749] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.504078] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.504312] page dumped because: kasan: bad access detected [ 16.504484] [ 16.504579] Memory state around the buggy address: [ 16.504846] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.505169] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.505490] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.505843] ^ [ 16.506032] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.506327] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.506627] ================================================================== [ 16.315318] ================================================================== [ 16.315553] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 16.316197] Write of size 8 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 16.316544] [ 16.316676] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.316723] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.316735] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.316758] Call Trace: [ 16.316777] <TASK> [ 16.316796] dump_stack_lvl+0x73/0xb0 [ 16.316826] print_report+0xd1/0x650 [ 16.316850] ? __virt_addr_valid+0x1db/0x2d0 [ 16.316874] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.316897] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.316921] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.316944] kasan_report+0x141/0x180 [ 16.316966] ? kasan_atomics_helper+0x1e12/0x5450 [ 16.316994] kasan_check_range+0x10c/0x1c0 [ 16.317018] __kasan_check_write+0x18/0x20 [ 16.317039] kasan_atomics_helper+0x1e12/0x5450 [ 16.317063] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.317087] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.317113] ? kasan_atomics+0x152/0x310 [ 16.317160] kasan_atomics+0x1dc/0x310 [ 16.317184] ? __pfx_kasan_atomics+0x10/0x10 [ 16.317210] ? __pfx_read_tsc+0x10/0x10 [ 16.317240] ? ktime_get_ts64+0x86/0x230 [ 16.317265] kunit_try_run_case+0x1a5/0x480 [ 16.317291] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.317315] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.317341] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.317366] ? __kthread_parkme+0x82/0x180 [ 16.317388] ? preempt_count_sub+0x50/0x80 [ 16.317413] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.317439] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.317465] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.317492] kthread+0x337/0x6f0 [ 16.317514] ? trace_preempt_on+0x20/0xc0 [ 16.317539] ? __pfx_kthread+0x10/0x10 [ 16.317560] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.317583] ? calculate_sigpending+0x7b/0xa0 [ 16.317619] ? __pfx_kthread+0x10/0x10 [ 16.317641] ret_from_fork+0x116/0x1d0 [ 16.317660] ? __pfx_kthread+0x10/0x10 [ 16.317681] ret_from_fork_asm+0x1a/0x30 [ 16.317713] </TASK> [ 16.317725] [ 16.328782] Allocated by task 282: [ 16.329346] kasan_save_stack+0x45/0x70 [ 16.329812] kasan_save_track+0x18/0x40 [ 16.330241] kasan_save_alloc_info+0x3b/0x50 [ 16.330707] __kasan_kmalloc+0xb7/0xc0 [ 16.331194] __kmalloc_cache_noprof+0x189/0x420 [ 16.331567] kasan_atomics+0x95/0x310 [ 16.332038] kunit_try_run_case+0x1a5/0x480 [ 16.332369] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.332548] kthread+0x337/0x6f0 [ 16.332682] ret_from_fork+0x116/0x1d0 [ 16.332834] ret_from_fork_asm+0x1a/0x30 [ 16.332982] [ 16.333057] The buggy address belongs to the object at ffff8881029cd380 [ 16.333057] which belongs to the cache kmalloc-64 of size 64 [ 16.333889] The buggy address is located 0 bytes to the right of [ 16.333889] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 16.334379] [ 16.334462] The buggy address belongs to the physical page: [ 16.334689] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 16.335305] flags: 0x200000000000000(node=0|zone=2) [ 16.335522] page_type: f5(slab) [ 16.335857] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.336252] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.336632] page dumped because: kasan: bad access detected [ 16.336926] [ 16.337026] Memory state around the buggy address: [ 16.337331] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.337711] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.338153] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.338425] ^ [ 16.338652] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.339102] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.339489] ================================================================== [ 15.356007] ================================================================== [ 15.356369] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 15.356737] Write of size 4 at addr ffff8881029cd3b0 by task kunit_try_catch/282 [ 15.357633] [ 15.357839] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.357898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.357910] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.357932] Call Trace: [ 15.357950] <TASK> [ 15.357968] dump_stack_lvl+0x73/0xb0 [ 15.357999] print_report+0xd1/0x650 [ 15.358022] ? __virt_addr_valid+0x1db/0x2d0 [ 15.358047] ? kasan_atomics_helper+0x697/0x5450 [ 15.358070] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.358094] ? kasan_atomics_helper+0x697/0x5450 [ 15.358117] kasan_report+0x141/0x180 [ 15.358139] ? kasan_atomics_helper+0x697/0x5450 [ 15.358167] kasan_check_range+0x10c/0x1c0 [ 15.358193] __kasan_check_write+0x18/0x20 [ 15.358214] kasan_atomics_helper+0x697/0x5450 [ 15.358238] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.358294] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.358321] ? kasan_atomics+0x152/0x310 [ 15.358358] kasan_atomics+0x1dc/0x310 [ 15.358381] ? __pfx_kasan_atomics+0x10/0x10 [ 15.358406] ? __pfx_read_tsc+0x10/0x10 [ 15.358429] ? ktime_get_ts64+0x86/0x230 [ 15.358455] kunit_try_run_case+0x1a5/0x480 [ 15.358480] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.358504] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.358557] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.358610] ? __kthread_parkme+0x82/0x180 [ 15.358632] ? preempt_count_sub+0x50/0x80 [ 15.358657] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.358683] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.358708] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.358734] kthread+0x337/0x6f0 [ 15.358753] ? trace_preempt_on+0x20/0xc0 [ 15.358788] ? __pfx_kthread+0x10/0x10 [ 15.358810] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.358836] ? calculate_sigpending+0x7b/0xa0 [ 15.358862] ? __pfx_kthread+0x10/0x10 [ 15.358884] ret_from_fork+0x116/0x1d0 [ 15.358903] ? __pfx_kthread+0x10/0x10 [ 15.358925] ret_from_fork_asm+0x1a/0x30 [ 15.358957] </TASK> [ 15.358969] [ 15.366707] Allocated by task 282: [ 15.367059] kasan_save_stack+0x45/0x70 [ 15.367297] kasan_save_track+0x18/0x40 [ 15.367442] kasan_save_alloc_info+0x3b/0x50 [ 15.367602] __kasan_kmalloc+0xb7/0xc0 [ 15.367736] __kmalloc_cache_noprof+0x189/0x420 [ 15.367894] kasan_atomics+0x95/0x310 [ 15.368112] kunit_try_run_case+0x1a5/0x480 [ 15.368340] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.368609] kthread+0x337/0x6f0 [ 15.368826] ret_from_fork+0x116/0x1d0 [ 15.369155] ret_from_fork_asm+0x1a/0x30 [ 15.369402] [ 15.369544] The buggy address belongs to the object at ffff8881029cd380 [ 15.369544] which belongs to the cache kmalloc-64 of size 64 [ 15.370062] The buggy address is located 0 bytes to the right of [ 15.370062] allocated 48-byte region [ffff8881029cd380, ffff8881029cd3b0) [ 15.370613] [ 15.370689] The buggy address belongs to the physical page: [ 15.370867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029cd [ 15.371481] flags: 0x200000000000000(node=0|zone=2) [ 15.371731] page_type: f5(slab) [ 15.371947] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.372305] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.372580] page dumped because: kasan: bad access detected [ 15.372900] [ 15.372994] Memory state around the buggy address: [ 15.373243] ffff8881029cd280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.373548] ffff8881029cd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.373897] >ffff8881029cd380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.374112] ^ [ 15.374272] ffff8881029cd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.374547] ffff8881029cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.375062] ==================================================================