Date
July 1, 2025, 11:08 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 21.501323] ================================================================== [ 21.501399] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 21.501463] Write of size 4 at addr fff00000c76da730 by task kunit_try_catch/266 [ 21.502205] [ 21.502733] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.502881] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.502914] Hardware name: linux,dummy-virt (DT) [ 21.502955] Call trace: [ 21.504009] show_stack+0x20/0x38 (C) [ 21.504189] dump_stack_lvl+0x8c/0xd0 [ 21.504247] print_report+0x118/0x608 [ 21.504302] kasan_report+0xdc/0x128 [ 21.504354] kasan_check_range+0x100/0x1a8 [ 21.504409] __kasan_check_write+0x20/0x30 [ 21.504461] kasan_atomics_helper+0xad4/0x4858 [ 21.504516] kasan_atomics+0x198/0x2e0 [ 21.504567] kunit_try_run_case+0x170/0x3f0 [ 21.504622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.504681] kthread+0x328/0x630 [ 21.504730] ret_from_fork+0x10/0x20 [ 21.504897] kasan_save_track+0x20/0x40 [ 21.506142] __kasan_kmalloc+0xd4/0xd8 [ 21.506187] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.506234] kasan_atomics+0xb8/0x2e0 [ 21.506708] kunit_try_run_case+0x170/0x3f0 [ 21.506798] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.506854] kthread+0x328/0x630 [ 21.506894] ret_from_fork+0x10/0x20 [ 21.506937] [ 21.506962] The buggy address belongs to the object at fff00000c76da700 [ 21.506962] which belongs to the cache kmalloc-64 of size 64 [ 21.507046] The buggy address is located 0 bytes to the right of [ 21.507046] allocated 48-byte region [fff00000c76da700, fff00000c76da730) [ 21.507124] [ 21.507526] The buggy address belongs to the physical page: [ 21.507570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.507640] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.507810] page_type: f5(slab) [ 21.507859] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.508405] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.508855] page dumped because: kasan: bad access detected [ 21.508947] [ 21.508970] Memory state around the buggy address: [ 21.509011] fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.509412] fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.509468] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.509716] ^ [ 21.510047] fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.510142] fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.510190] ================================================================== [ 21.668843] ================================================================== [ 21.668922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 21.669372] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266 [ 21.669455] [ 21.669498] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.669601] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.669955] Hardware name: linux,dummy-virt (DT) [ 21.670357] Call trace: [ 21.670421] show_stack+0x20/0x38 (C) [ 21.670524] dump_stack_lvl+0x8c/0xd0 [ 21.670583] print_report+0x118/0x608 [ 21.670636] kasan_report+0xdc/0x128 [ 21.670697] kasan_check_range+0x100/0x1a8 [ 21.670754] __kasan_check_write+0x20/0x30 [ 21.670804] kasan_atomics_helper+0x1058/0x4858 [ 21.670870] kasan_atomics+0x198/0x2e0 [ 21.670920] kunit_try_run_case+0x170/0x3f0 [ 21.670988] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.671047] kthread+0x328/0x630 [ 21.671094] ret_from_fork+0x10/0x20 [ 21.671390] [ 21.671416] Allocated by task 266: [ 21.671773] kasan_save_stack+0x3c/0x68 [ 21.671865] kasan_save_track+0x20/0x40 [ 21.672219] kasan_save_alloc_info+0x40/0x58 [ 21.672391] __kasan_kmalloc+0xd4/0xd8 [ 21.672493] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.673237] kasan_atomics+0xb8/0x2e0 [ 21.673308] kunit_try_run_case+0x170/0x3f0 [ 21.673352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.673785] kthread+0x328/0x630 [ 21.674196] ret_from_fork+0x10/0x20 [ 21.674314] [ 21.674399] The buggy address belongs to the object at fff00000c76da700 [ 21.674399] which belongs to the cache kmalloc-64 of size 64 [ 21.674826] The buggy address is located 0 bytes to the right of [ 21.674826] allocated 48-byte region [fff00000c76da700, fff00000c76da730) [ 21.675242] [ 21.675410] The buggy address belongs to the physical page: [ 21.675483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.675553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.675613] page_type: f5(slab) [ 21.675663] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.675724] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.675774] page dumped because: kasan: bad access detected [ 21.676187] [ 21.676306] Memory state around the buggy address: [ 21.676786] fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.676857] fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.677194] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.677272] ^ [ 21.677460] fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.677535] fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.677580] ================================================================== [ 21.460899] ================================================================== [ 21.460987] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 21.461143] Read of size 4 at addr fff00000c76da730 by task kunit_try_catch/266 [ 21.461581] [ 21.461650] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.461805] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.461846] Hardware name: linux,dummy-virt (DT) [ 21.462372] Call trace: [ 21.462497] show_stack+0x20/0x38 (C) [ 21.462861] dump_stack_lvl+0x8c/0xd0 [ 21.462999] print_report+0x118/0x608 [ 21.463205] kasan_report+0xdc/0x128 [ 21.466327] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.466476] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.466992] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.468970] ^ [ 21.472040] [ 21.473147] dump_stack_lvl+0x8c/0xd0 [ 21.473583] print_report+0x118/0x608 [ 21.473789] kasan_report+0xdc/0x128 [ 21.474106] kasan_check_range+0x100/0x1a8 [ 21.474361] __kasan_check_write+0x20/0x30 [ 21.474505] kasan_atomics_helper+0x934/0x4858 [ 21.474988] kasan_atomics+0x198/0x2e0 [ 21.475086] kunit_try_run_case+0x170/0x3f0 [ 21.475195] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.475256] kthread+0x328/0x630 [ 21.475597] ret_from_fork+0x10/0x20 [ 21.475704] [ 21.475730] Allocated by task 266: [ 21.475766] kasan_save_stack+0x3c/0x68 [ 21.475814] kasan_save_track+0x20/0x40 [ 21.475856] kasan_save_alloc_info+0x40/0x58 [ 21.475902] __kasan_kmalloc+0xd4/0xd8 [ 21.475943] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.476002] kasan_atomics+0xb8/0x2e0 [ 21.476053] kunit_try_run_case+0x170/0x3f0 [ 21.476105] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.476166] kthread+0x328/0x630 [ 21.476211] ret_from_fork+0x10/0x20 [ 21.476253] [ 21.476297] The buggy address belongs to the object at fff00000c76da700 [ 21.476297] which belongs to the cache kmalloc-64 of size 64 [ 21.476367] The buggy address is located 0 bytes to the right of [ 21.476367] allocated 48-byte region [fff00000c76da700, fff00000c76da730) [ 21.476441] [ 21.476466] The buggy address belongs to the physical page: [ 21.476504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.476592] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.476659] page_type: f5(slab) [ 21.476716] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.476781] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.476845] page dumped because: kasan: bad access detected [ 21.476895] [ 21.476927] Memory state around the buggy address: [ 21.476967] fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.477028] fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.477090] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.477644] ^ [ 21.478019] fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.478208] fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.478937] ================================================================== [ 21.680298] ================================================================== [ 21.680378] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 21.680447] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266 [ 21.680507] [ 21.680550] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.680646] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.680678] Hardware name: linux,dummy-virt (DT) [ 21.681335] Call trace: [ 21.681533] show_stack+0x20/0x38 (C) [ 21.681970] dump_stack_lvl+0x8c/0xd0 [ 21.682302] print_report+0x118/0x608 [ 21.682367] kasan_report+0xdc/0x128 [ 21.682510] kasan_check_range+0x100/0x1a8 [ 21.682568] __kasan_check_write+0x20/0x30 [ 21.682617] kasan_atomics_helper+0x10c0/0x4858 [ 21.682739] kasan_atomics+0x198/0x2e0 [ 21.682793] kunit_try_run_case+0x170/0x3f0 [ 21.683181] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.683318] kthread+0x328/0x630 [ 21.683720] ret_from_fork+0x10/0x20 [ 21.683902] [ 21.684005] Allocated by task 266: [ 21.684266] kasan_save_stack+0x3c/0x68 [ 21.684325] kasan_save_track+0x20/0x40 [ 21.684368] kasan_save_alloc_info+0x40/0x58 [ 21.684754] __kasan_kmalloc+0xd4/0xd8 [ 21.684832] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.685059] kasan_atomics+0xb8/0x2e0 [ 21.685420] kunit_try_run_case+0x170/0x3f0 [ 21.685507] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.685645] kthread+0x328/0x630 [ 21.685697] ret_from_fork+0x10/0x20 [ 21.685786] [ 21.685814] The buggy address belongs to the object at fff00000c76da700 [ 21.685814] which belongs to the cache kmalloc-64 of size 64 [ 21.685889] The buggy address is located 0 bytes to the right of [ 21.685889] allocated 48-byte region [fff00000c76da700, fff00000c76da730) [ 21.685970] [ 21.686005] The buggy address belongs to the physical page: [ 21.686055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.686140] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.686209] page_type: f5(slab) [ 21.686265] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.686327] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.686376] page dumped because: kasan: bad access detected [ 21.686415] [ 21.686452] Memory state around the buggy address: [ 21.686493] fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.686545] fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.686606] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.686670] ^ [ 21.686718] fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.686768] fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.686812] ================================================================== [ 21.584530] ================================================================== [ 21.585112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 21.585208] Read of size 4 at addr fff00000c76da730 by task kunit_try_catch/266 [ 21.585359] [ 21.585441] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.586000] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.586083] Hardware name: linux,dummy-virt (DT) [ 21.586361] Call trace: [ 21.586420] show_stack+0x20/0x38 (C) [ 21.586486] dump_stack_lvl+0x8c/0xd0 [ 21.586619] print_report+0x118/0x608 [ 21.586710] kasan_report+0xdc/0x128 [ 21.586863] __asan_report_load4_noabort+0x20/0x30 [ 21.586923] kasan_atomics_helper+0x3e04/0x4858 [ 21.587007] kasan_atomics+0x198/0x2e0 [ 21.587066] kunit_try_run_case+0x170/0x3f0 [ 21.587387] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.587694] kthread+0x328/0x630 [ 21.587763] ret_from_fork+0x10/0x20 [ 21.587919] [ 21.587974] Allocated by task 266: [ 21.588012] kasan_save_stack+0x3c/0x68 [ 21.588063] kasan_save_track+0x20/0x40 [ 21.588105] kasan_save_alloc_info+0x40/0x58 [ 21.588165] __kasan_kmalloc+0xd4/0xd8 [ 21.588207] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.588272] kasan_atomics+0xb8/0x2e0 [ 21.588315] kunit_try_run_case+0x170/0x3f0 [ 21.588359] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.588415] kthread+0x328/0x630 [ 21.588458] ret_from_fork+0x10/0x20 [ 21.588511] [ 21.588562] The buggy address belongs to the object at fff00000c76da700 [ 21.588562] which belongs to the cache kmalloc-64 of size 64 [ 21.588637] The buggy address is located 0 bytes to the right of [ 21.588637] allocated 48-byte region [fff00000c76da700, fff00000c76da730) [ 21.588720] [ 21.588753] The buggy address belongs to the physical page: [ 21.588803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.588867] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.588926] page_type: f5(slab) [ 21.588983] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.589053] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.589101] page dumped because: kasan: bad access detected [ 21.589874] [ 21.589926] Memory state around the buggy address: [ 21.589999] fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.590377] fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.590481] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.591091] ^ [ 21.591196] fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.591424] fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.591553] ================================================================== [ 21.564702] ================================================================== [ 21.564805] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 21.564876] Read of size 4 at addr fff00000c76da730 by task kunit_try_catch/266 [ 21.565209] [ 21.565471] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.565649] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.565722] Hardware name: linux,dummy-virt (DT) [ 21.565793] Call trace: [ 21.565830] show_stack+0x20/0x38 (C) [ 21.566145] dump_stack_lvl+0x8c/0xd0 [ 21.566230] print_report+0x118/0x608 [ 21.566380] kasan_report+0xdc/0x128 [ 21.566436] __asan_report_load4_noabort+0x20/0x30 [ 21.566500] kasan_atomics_helper+0x3dd8/0x4858 [ 21.566699] kasan_atomics+0x198/0x2e0 [ 21.566887] kunit_try_run_case+0x170/0x3f0 [ 21.567081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.567286] kthread+0x328/0x630 [ 21.567692] ret_from_fork+0x10/0x20 [ 21.567896] [ 21.567968] Allocated by task 266: [ 21.568114] kasan_save_stack+0x3c/0x68 [ 21.568320] kasan_save_track+0x20/0x40 [ 21.568365] kasan_save_alloc_info+0x40/0x58 [ 21.568411] __kasan_kmalloc+0xd4/0xd8 [ 21.568777] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.568853] kasan_atomics+0xb8/0x2e0 [ 21.568896] kunit_try_run_case+0x170/0x3f0 [ 21.569248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.569542] kthread+0x328/0x630 [ 21.569696] ret_from_fork+0x10/0x20 [ 21.569739] [ 21.569794] The buggy address belongs to the object at fff00000c76da700 [ 21.569794] which belongs to the cache kmalloc-64 of size 64 [ 21.570150] The buggy address is located 0 bytes to the right of [ 21.570150] allocated 48-byte region [fff00000c76da700, fff00000c76da730) [ 21.570390] [ 21.570527] The buggy address belongs to the physical page: [ 21.570700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.570838] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.570899] page_type: f5(slab) [ 21.570952] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.571011] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.571302] page dumped because: kasan: bad access detected [ 21.571534] [ 21.571567] Memory state around the buggy address: [ 21.571609] fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.572039] fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.572149] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.572585] ^ [ 21.572703] fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.572884] fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.573097] ================================================================== [ 21.785489] ================================================================== [ 21.785641] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 21.785742] Read of size 8 at addr fff00000c76da730 by task kunit_try_catch/266 [ 21.785880] [ 21.785926] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.786159] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.786206] Hardware name: linux,dummy-virt (DT) [ 21.786264] Call trace: [ 21.786388] show_stack+0x20/0x38 (C) [ 21.786456] dump_stack_lvl+0x8c/0xd0 [ 21.786586] print_report+0x118/0x608 [ 21.786691] kasan_report+0xdc/0x128 [ 21.786824] __asan_report_load8_noabort+0x20/0x30 [ 21.787019] kasan_atomics_helper+0x3db0/0x4858 [ 21.787092] kasan_atomics+0x198/0x2e0 [ 21.787270] kunit_try_run_case+0x170/0x3f0 [ 21.787498] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.787584] kthread+0x328/0x630 [ 21.787638] ret_from_fork+0x10/0x20 [ 21.787694] [ 21.787717] Allocated by task 266: [ 21.787750] kasan_save_stack+0x3c/0x68 [ 21.788037] kasan_save_track+0x20/0x40 [ 21.788188] kasan_save_alloc_info+0x40/0x58 [ 21.788238] __kasan_kmalloc+0xd4/0xd8 [ 21.788323] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.788400] kasan_atomics+0xb8/0x2e0 [ 21.788445] kunit_try_run_case+0x170/0x3f0 [ 21.788498] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.788548] kthread+0x328/0x630 [ 21.788596] ret_from_fork+0x10/0x20 [ 21.788648] [ 21.788686] The buggy address belongs to the object at fff00000c76da700 [ 21.788686] which belongs to the cache kmalloc-64 of size 64 [ 21.788759] The buggy address is located 0 bytes to the right of [ 21.788759] allocated 48-byte region [fff00000c76da700, fff00000c76da730) [ 21.788849] [ 21.788876] The buggy address belongs to the physical page: [ 21.788924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.789008] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.789084] page_type: f5(slab) [ 21.789141] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.789533] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.789585] page dumped because: kasan: bad access detected [ 21.789969] [ 21.790059] Memory state around the buggy address: [ 21.790413] fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.790542] fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.790766] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.790936] ^ [ 21.791086] fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.791232] fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.791325] ================================================================== [ 21.730451] ================================================================== [ 21.730584] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 21.730653] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266 [ 21.731126] [ 21.731431] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.731594] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.731737] Hardware name: linux,dummy-virt (DT) [ 21.731788] Call trace: [ 21.731882] show_stack+0x20/0x38 (C) [ 21.731968] dump_stack_lvl+0x8c/0xd0 [ 21.732026] print_report+0x118/0x608 [ 21.732078] kasan_report+0xdc/0x128 [ 21.732173] kasan_check_range+0x100/0x1a8 [ 21.732229] __kasan_check_write+0x20/0x30 [ 21.732544] kasan_atomics_helper+0x12d8/0x4858 [ 21.733048] kasan_atomics+0x198/0x2e0 [ 21.733452] kunit_try_run_case+0x170/0x3f0 [ 21.733636] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.733703] kthread+0x328/0x630 [ 21.733819] ret_from_fork+0x10/0x20 [ 21.734259] [ 21.734322] Allocated by task 266: [ 21.735033] kasan_save_stack+0x3c/0x68 [ 21.735314] kasan_save_track+0x20/0x40 [ 21.735366] kasan_save_alloc_info+0x40/0x58 [ 21.735414] __kasan_kmalloc+0xd4/0xd8 [ 21.735465] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.735634] kasan_atomics+0xb8/0x2e0 [ 21.735898] kunit_try_run_case+0x170/0x3f0 [ 21.735953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.736002] kthread+0x328/0x630 [ 21.736065] ret_from_fork+0x10/0x20 [ 21.736108] [ 21.736166] The buggy address belongs to the object at fff00000c76da700 [ 21.736166] which belongs to the cache kmalloc-64 of size 64 [ 21.736264] The buggy address is located 0 bytes to the right of [ 21.736264] allocated 48-byte region [fff00000c76da700, fff00000c76da730) [ 21.736351] [ 21.736378] The buggy address belongs to the physical page: [ 21.736417] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.736491] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.736561] page_type: f5(slab) [ 21.736610] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.737236] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.737311] page dumped because: kasan: bad access detected [ 21.737351] [ 21.737374] Memory state around the buggy address: [ 21.737791] fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.737890] fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.738373] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.738441] ^ [ 21.738493] fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.738557] fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.739209] ================================================================== [ 21.512118] ================================================================== [ 21.512209] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 21.512822] Hardware name: linux,dummy-virt (DT) [ 21.514237] __asan_report_load4_noabort+0x20/0x30 [ 21.515439] [ 21.516347] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.516396] kasan_atomics+0xb8/0x2e0 [ 21.516438] kunit_try_run_case+0x170/0x3f0 [ 21.516481] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.516707] The buggy address is located 0 bytes to the right of [ 21.516707] allocated 48-byte region [fff00000c76da700, fff00000c76da730) [ 21.517152] page dumped because: kasan: bad access detected [ 21.517249] fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.517495] fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.520635] Write of size 4 at addr fff00000c76da730 by task kunit_try_catch/266 [ 21.521445] kasan_check_range+0x100/0x1a8 [ 21.521867] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.522645] __kasan_kmalloc+0xd4/0xd8 [ 21.522758] kasan_atomics+0xb8/0x2e0 [ 21.522806] kunit_try_run_case+0x170/0x3f0 [ 21.523005] The buggy address belongs to the object at fff00000c76da700 [ 21.523005] which belongs to the cache kmalloc-64 of size 64 [ 21.524677] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.527834] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 21.528374] Hardware name: linux,dummy-virt (DT) [ 21.528607] kasan_report+0xdc/0x128 [ 21.528962] kthread+0x328/0x630 [ 21.529311] __kasan_kmalloc+0xd4/0xd8 [ 21.529447] kunit_try_run_case+0x170/0x3f0 [ 21.529491] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.529543] kthread+0x328/0x630 [ 21.529579] ret_from_fork+0x10/0x20 [ 21.529620] [ 21.529643] The buggy address belongs to the object at fff00000c76da700 [ 21.529643] which belongs to the cache kmalloc-64 of size 64 [ 21.529929] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.530304] fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.531268] fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.534740] Hardware name: linux,dummy-virt (DT) [ 21.537601] Allocated by task 266: [ 21.539225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.539424] kthread+0x328/0x630 [ 21.539666] ret_from_fork+0x10/0x20 [ 21.539841] [ 21.540067] The buggy address belongs to the object at fff00000c76da700 [ 21.540067] which belongs to the cache kmalloc-64 of size 64 [ 21.540325] The buggy address is located 0 bytes to the right of [ 21.540325] allocated 48-byte region [fff00000c76da700, fff00000c76da730) [ 21.540492] [ 21.540566] The buggy address belongs to the physical page: [ 21.540959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.541115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.541190] page_type: f5(slab) [ 21.541471] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.541654] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.541888] page dumped because: kasan: bad access detected [ 21.542057] [ 21.542180] Memory state around the buggy address: [ 21.542225] fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.542697] fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.542867] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.543009] ^ [ 21.543380] fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.545706] Hardware name: linux,dummy-virt (DT) [ 21.546792] kthread+0x328/0x630 [ 21.548472] __kasan_kmalloc+0xd4/0xd8 [ 21.549454] The buggy address belongs to the object at fff00000c76da700 [ 21.549454] which belongs to the cache kmalloc-64 of size 64 [ 21.549997] [ 21.550544] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.551289] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.551752] fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.554455] ================================================================== [ 21.798862] ================================================================== [ 21.798979] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 21.799093] Read of size 8 at addr fff00000c76da730 by task kunit_try_catch/266 [ 21.799266] [ 21.799450] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.799755] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.799960] Hardware name: linux,dummy-virt (DT) [ 21.800113] Call trace: [ 21.800212] show_stack+0x20/0x38 (C) [ 21.800376] dump_stack_lvl+0x8c/0xd0 [ 21.800456] print_report+0x118/0x608 [ 21.800508] kasan_report+0xdc/0x128 [ 21.800560] __asan_report_load8_noabort+0x20/0x30 [ 21.800615] kasan_atomics_helper+0x3df4/0x4858 [ 21.800670] kasan_atomics+0x198/0x2e0 [ 21.800845] kunit_try_run_case+0x170/0x3f0 [ 21.800972] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.801277] kthread+0x328/0x630 [ 21.801536] ret_from_fork+0x10/0x20 [ 21.801615] [ 21.801640] Allocated by task 266: [ 21.801712] kasan_save_stack+0x3c/0x68 [ 21.801779] kasan_save_track+0x20/0x40 [ 21.801861] kasan_save_alloc_info+0x40/0x58 [ 21.801907] __kasan_kmalloc+0xd4/0xd8 [ 21.801949] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.802006] kasan_atomics+0xb8/0x2e0 [ 21.802048] kunit_try_run_case+0x170/0x3f0 [ 21.802092] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.802174] kthread+0x328/0x630 [ 21.802221] ret_from_fork+0x10/0x20 [ 21.802262] [ 21.802301] The buggy address belongs to the object at fff00000c76da700 [ 21.802301] which belongs to the cache kmalloc-64 of size 64 [ 21.802371] The buggy address is located 0 bytes to the right of [ 21.802371] allocated 48-byte region [fff00000c76da700, fff00000c76da730) [ 21.802459] [ 21.802505] The buggy address belongs to the physical page: [ 21.802544] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.802606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.802666] page_type: f5(slab) [ 21.802710] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.802771] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.802839] page dumped because: kasan: bad access detected [ 21.802886] [ 21.802908] Memory state around the buggy address: [ 21.802973] fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.803032] fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.803098] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.803446] ^ [ 21.803495] fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.803544] fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.803600] ================================================================== [ 21.602065] ================================================================== [ 21.602229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 21.602434] Read of size 8 at addr fff00000c76da730 by task kunit_try_catch/266 [ 21.602500] [ 21.602544] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.602947] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.603335] Hardware name: linux,dummy-virt (DT) [ 21.603620] Call trace: [ 21.603776] show_stack+0x20/0x38 (C) [ 21.603961] dump_stack_lvl+0x8c/0xd0 [ 21.604039] print_report+0x118/0x608 [ 21.604091] kasan_report+0xdc/0x128 [ 21.604162] __asan_report_load8_noabort+0x20/0x30 [ 21.604216] kasan_atomics_helper+0x3f58/0x4858 [ 21.604617] kasan_atomics+0x198/0x2e0 [ 21.605117] kunit_try_run_case+0x170/0x3f0 [ 21.605262] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.605588] kthread+0x328/0x630 [ 21.605643] ret_from_fork+0x10/0x20 [ 21.606094] [ 21.606179] Allocated by task 266: [ 21.606226] kasan_save_stack+0x3c/0x68 [ 21.606290] kasan_save_track+0x20/0x40 [ 21.606346] kasan_save_alloc_info+0x40/0x58 [ 21.606402] __kasan_kmalloc+0xd4/0xd8 [ 21.606457] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.606520] kasan_atomics+0xb8/0x2e0 [ 21.606562] kunit_try_run_case+0x170/0x3f0 [ 21.606607] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.606670] kthread+0x328/0x630 [ 21.606717] ret_from_fork+0x10/0x20 [ 21.606759] [ 21.606799] The buggy address belongs to the object at fff00000c76da700 [ 21.606799] which belongs to the cache kmalloc-64 of size 64 [ 21.606888] The buggy address is located 0 bytes to the right of [ 21.606888] allocated 48-byte region [fff00000c76da700, fff00000c76da730) [ 21.606975] [ 21.607001] The buggy address belongs to the physical page: [ 21.607039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.607650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.607742] page_type: f5(slab) [ 21.608029] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.608150] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.608203] page dumped because: kasan: bad access detected [ 21.608241] [ 21.608262] Memory state around the buggy address: [ 21.608810] fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.608907] fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.609216] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.609515] ^ [ 21.609871] fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.609974] fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.610195] ================================================================== [ 21.574721] ================================================================== [ 21.574799] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 21.574867] Write of size 4 at addr fff00000c76da730 by task kunit_try_catch/266 [ 21.574926] [ 21.574967] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.575060] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.575092] Hardware name: linux,dummy-virt (DT) [ 21.575600] Call trace: [ 21.576127] show_stack+0x20/0x38 (C) [ 21.576396] dump_stack_lvl+0x8c/0xd0 [ 21.576520] print_report+0x118/0x608 [ 21.576635] kasan_report+0xdc/0x128 [ 21.576686] kasan_check_range+0x100/0x1a8 [ 21.576740] __kasan_check_write+0x20/0x30 [ 21.577006] kasan_atomics_helper+0xd3c/0x4858 [ 21.577404] kasan_atomics+0x198/0x2e0 [ 21.577845] kunit_try_run_case+0x170/0x3f0 [ 21.577948] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.578115] kthread+0x328/0x630 [ 21.578300] ret_from_fork+0x10/0x20 [ 21.578378] [ 21.578403] Allocated by task 266: [ 21.578438] kasan_save_stack+0x3c/0x68 [ 21.578546] kasan_save_track+0x20/0x40 [ 21.578787] kasan_save_alloc_info+0x40/0x58 [ 21.578884] __kasan_kmalloc+0xd4/0xd8 [ 21.578944] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.578992] kasan_atomics+0xb8/0x2e0 [ 21.579034] kunit_try_run_case+0x170/0x3f0 [ 21.579086] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.579368] kthread+0x328/0x630 [ 21.579705] ret_from_fork+0x10/0x20 [ 21.580237] [ 21.580273] The buggy address belongs to the object at fff00000c76da700 [ 21.580273] which belongs to the cache kmalloc-64 of size 64 [ 21.580349] The buggy address is located 0 bytes to the right of [ 21.580349] allocated 48-byte region [fff00000c76da700, fff00000c76da730) [ 21.580775] [ 21.580868] The buggy address belongs to the physical page: [ 21.580943] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.581029] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.581154] page_type: f5(slab) [ 21.581305] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.581507] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.581627] page dumped because: kasan: bad access detected [ 21.582124] [ 21.582231] Memory state around the buggy address: [ 21.582362] fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.582573] fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.582624] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.583056] ^ [ 21.583356] fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.583415] fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.583472] ================================================================== [ 21.492809] ================================================================== [ 21.492881] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 21.493264] Write of size 4 at addr fff00000c76da730 by task kunit_try_catch/266 [ 21.493629] [ 21.493675] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.493771] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.494418] Hardware name: linux,dummy-virt (DT) [ 21.494580] Call trace: [ 21.494709] show_stack+0x20/0x38 (C) [ 21.494783] dump_stack_lvl+0x8c/0xd0 [ 21.494840] print_report+0x118/0x608 [ 21.494907] kasan_report+0xdc/0x128 [ 21.494960] kasan_check_range+0x100/0x1a8 [ 21.495569] __kasan_check_write+0x20/0x30 [ 21.495651] kasan_atomics_helper+0xa6c/0x4858 [ 21.495776] kasan_atomics+0x198/0x2e0 [ 21.495830] kunit_try_run_case+0x170/0x3f0 [ 21.495892] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.496224] kthread+0x328/0x630 [ 21.496291] ret_from_fork+0x10/0x20 [ 21.496464] [ 21.496489] Allocated by task 266: [ 21.496523] kasan_save_stack+0x3c/0x68 [ 21.496580] kasan_save_track+0x20/0x40 [ 21.496796] kasan_save_alloc_info+0x40/0x58 [ 21.496929] __kasan_kmalloc+0xd4/0xd8 [ 21.497032] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.497086] kasan_atomics+0xb8/0x2e0 [ 21.497497] kunit_try_run_case+0x170/0x3f0 [ 21.497723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.497775] kthread+0x328/0x630 [ 21.497812] ret_from_fork+0x10/0x20 [ 21.497855] [ 21.497881] The buggy address belongs to the object at fff00000c76da700 [ 21.497881] which belongs to the cache kmalloc-64 of size 64 [ 21.497954] The buggy address is located 0 bytes to the right of [ 21.497954] allocated 48-byte region [fff00000c76da700, fff00000c76da730) [ 21.498296] [ 21.498384] The buggy address belongs to the physical page: [ 21.498493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.498678] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.498844] page_type: f5(slab) [ 21.499090] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.499169] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.499280] page dumped because: kasan: bad access detected [ 21.499318] [ 21.499342] Memory state around the buggy address: [ 21.499381] fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.499432] fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.499634] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.499705] ^ [ 21.499749] fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.499800] fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.499845] ================================================================== [ 21.741532] ================================================================== [ 21.741827] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 21.741905] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266 [ 21.742224] [ 21.742303] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.742446] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.742665] Hardware name: linux,dummy-virt (DT) [ 21.742703] Call trace: [ 21.742875] show_stack+0x20/0x38 (C) [ 21.742952] dump_stack_lvl+0x8c/0xd0 [ 21.743322] print_report+0x118/0x608 [ 21.743410] kasan_report+0xdc/0x128 [ 21.743572] kasan_check_range+0x100/0x1a8 [ 21.743700] __kasan_check_write+0x20/0x30 [ 21.743859] kasan_atomics_helper+0x1384/0x4858 [ 21.743916] kasan_atomics+0x198/0x2e0 [ 21.743966] kunit_try_run_case+0x170/0x3f0 [ 21.744020] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.744744] kthread+0x328/0x630 [ 21.744832] ret_from_fork+0x10/0x20 [ 21.745073] [ 21.745124] Allocated by task 266: [ 21.745184] kasan_save_stack+0x3c/0x68 [ 21.745332] kasan_save_track+0x20/0x40 [ 21.745400] kasan_save_alloc_info+0x40/0x58 [ 21.745458] __kasan_kmalloc+0xd4/0xd8 [ 21.745510] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.745558] kasan_atomics+0xb8/0x2e0 [ 21.745603] kunit_try_run_case+0x170/0x3f0 [ 21.745649] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.745698] kthread+0x328/0x630 [ 21.745747] ret_from_fork+0x10/0x20 [ 21.745789] [ 21.745829] The buggy address belongs to the object at fff00000c76da700 [ 21.745829] which belongs to the cache kmalloc-64 of size 64 [ 21.745902] The buggy address is located 0 bytes to the right of [ 21.745902] allocated 48-byte region [fff00000c76da700, fff00000c76da730) [ 21.745986] [ 21.746012] The buggy address belongs to the physical page: [ 21.746051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.746115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.746195] page_type: f5(slab) [ 21.746243] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.746304] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.746362] page dumped because: kasan: bad access detected [ 21.746401] [ 21.746435] Memory state around the buggy address: [ 21.746481] fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.746532] fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.746583] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.746653] ^ [ 21.746706] fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.746755] fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.746799] ================================================================== [ 21.771911] ================================================================== [ 21.771985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 21.772079] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266 [ 21.772226] [ 21.772267] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.772612] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.772696] Hardware name: linux,dummy-virt (DT) [ 21.772785] Call trace: [ 21.772815] show_stack+0x20/0x38 (C) [ 21.772987] dump_stack_lvl+0x8c/0xd0 [ 21.773066] print_report+0x118/0x608 [ 21.773197] kasan_report+0xdc/0x128 [ 21.773252] kasan_check_range+0x100/0x1a8 [ 21.773329] __kasan_check_write+0x20/0x30 [ 21.773410] kasan_atomics_helper+0x154c/0x4858 [ 21.773466] kasan_atomics+0x198/0x2e0 [ 21.773719] kunit_try_run_case+0x170/0x3f0 [ 21.773825] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.773897] kthread+0x328/0x630 [ 21.773945] ret_from_fork+0x10/0x20 [ 21.774068] [ 21.774094] Allocated by task 266: [ 21.774169] kasan_save_stack+0x3c/0x68 [ 21.774348] kasan_save_track+0x20/0x40 [ 21.774404] kasan_save_alloc_info+0x40/0x58 [ 21.774485] __kasan_kmalloc+0xd4/0xd8 [ 21.774553] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.774648] kasan_atomics+0xb8/0x2e0 [ 21.774694] kunit_try_run_case+0x170/0x3f0 [ 21.774826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.774882] kthread+0x328/0x630 [ 21.774920] ret_from_fork+0x10/0x20 [ 21.774960] [ 21.775046] The buggy address belongs to the object at fff00000c76da700 [ 21.775046] which belongs to the cache kmalloc-64 of size 64 [ 21.775252] The buggy address is located 0 bytes to the right of [ 21.775252] allocated 48-byte region [fff00000c76da700, fff00000c76da730) [ 21.775339] [ 21.775365] The buggy address belongs to the physical page: [ 21.775454] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.775519] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.775575] page_type: f5(slab) [ 21.775622] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.775722] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.775902] page dumped because: kasan: bad access detected [ 21.776148] [ 21.776250] Memory state around the buggy address: [ 21.776418] fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.776473] fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.776727] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.776788] ^ [ 21.776882] fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.776964] fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.777232] ================================================================== [ 21.710210] ================================================================== [ 21.710308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 21.710410] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266 [ 21.710470] [ 21.710508] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.710600] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.710632] Hardware name: linux,dummy-virt (DT) [ 21.710668] Call trace: [ 21.710696] show_stack+0x20/0x38 (C) [ 21.710751] dump_stack_lvl+0x8c/0xd0 [ 21.710805] print_report+0x118/0x608 [ 21.710855] kasan_report+0xdc/0x128 [ 21.710905] kasan_check_range+0x100/0x1a8 [ 21.710970] __kasan_check_write+0x20/0x30 [ 21.711021] kasan_atomics_helper+0x11f8/0x4858 [ 21.711075] kasan_atomics+0x198/0x2e0 [ 21.711519] kunit_try_run_case+0x170/0x3f0 [ 21.711869] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.711951] kthread+0x328/0x630 [ 21.711998] ret_from_fork+0x10/0x20 [ 21.712053] [ 21.712076] Allocated by task 266: [ 21.712109] kasan_save_stack+0x3c/0x68 [ 21.712170] kasan_save_track+0x20/0x40 [ 21.712587] kasan_save_alloc_info+0x40/0x58 [ 21.712991] __kasan_kmalloc+0xd4/0xd8 [ 21.713069] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.713504] kasan_atomics+0xb8/0x2e0 [ 21.713953] kunit_try_run_case+0x170/0x3f0 [ 21.714159] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.714358] kthread+0x328/0x630 [ 21.714438] ret_from_fork+0x10/0x20 [ 21.715019] [ 21.715235] The buggy address belongs to the object at fff00000c76da700 [ 21.715235] which belongs to the cache kmalloc-64 of size 64 [ 21.715447] The buggy address is located 0 bytes to the right of [ 21.715447] allocated 48-byte region [fff00000c76da700, fff00000c76da730) [ 21.715666] [ 21.715698] The buggy address belongs to the physical page: [ 21.715873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.715990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.716367] page_type: f5(slab) [ 21.716541] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.716793] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.716850] page dumped because: kasan: bad access detected [ 21.717074] [ 21.717315] Memory state around the buggy address: [ 21.717389] fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.717790] fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.717928] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.717980] ^ [ 21.718194] fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.718415] fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.718491] ================================================================== [ 21.766468] ================================================================== [ 21.766531] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 21.766582] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266 [ 21.766649] [ 21.766684] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.766783] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.766821] Hardware name: linux,dummy-virt (DT) [ 21.766859] Call trace: [ 21.766884] show_stack+0x20/0x38 (C) [ 21.766937] dump_stack_lvl+0x8c/0xd0 [ 21.766987] print_report+0x118/0x608 [ 21.767039] kasan_report+0xdc/0x128 [ 21.767087] kasan_check_range+0x100/0x1a8 [ 21.767944] __kasan_check_write+0x20/0x30 [ 21.768087] kasan_atomics_helper+0x14e4/0x4858 [ 21.768228] kasan_atomics+0x198/0x2e0 [ 21.768283] kunit_try_run_case+0x170/0x3f0 [ 21.768335] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.768394] kthread+0x328/0x630 [ 21.768441] ret_from_fork+0x10/0x20 [ 21.768493] [ 21.768514] Allocated by task 266: [ 21.768546] kasan_save_stack+0x3c/0x68 [ 21.768590] kasan_save_track+0x20/0x40 [ 21.768654] kasan_save_alloc_info+0x40/0x58 [ 21.768808] __kasan_kmalloc+0xd4/0xd8 [ 21.768903] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.769053] kasan_atomics+0xb8/0x2e0 [ 21.769196] kunit_try_run_case+0x170/0x3f0 [ 21.769352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.769534] kthread+0x328/0x630 [ 21.769673] ret_from_fork+0x10/0x20 [ 21.769744] [ 21.769770] The buggy address belongs to the object at fff00000c76da700 [ 21.769770] which belongs to the cache kmalloc-64 of size 64 [ 21.769837] The buggy address is located 0 bytes to the right of [ 21.769837] allocated 48-byte region [fff00000c76da700, fff00000c76da730) [ 21.769910] [ 21.769935] The buggy address belongs to the physical page: [ 21.769972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.770033] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.770088] page_type: f5(slab) [ 21.770143] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.770202] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.770332] page dumped because: kasan: bad access detected [ 21.770371] [ 21.770393] Memory state around the buggy address: [ 21.770431] fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.770481] fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.770531] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.770617] ^ [ 21.770835] fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.770958] fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.771422] ================================================================== [ 21.612265] ================================================================== [ 21.612496] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 21.612571] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266 [ 21.612922] [ 21.612980] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.613408] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.613482] Hardware name: linux,dummy-virt (DT) [ 21.613535] Call trace: [ 21.613590] show_stack+0x20/0x38 (C) [ 21.614149] dump_stack_lvl+0x8c/0xd0 [ 21.614250] print_report+0x118/0x608 [ 21.614309] kasan_report+0xdc/0x128 [ 21.614676] kasan_check_range+0x100/0x1a8 [ 21.614757] __kasan_check_write+0x20/0x30 [ 21.614811] kasan_atomics_helper+0xe44/0x4858 [ 21.614866] kasan_atomics+0x198/0x2e0 [ 21.615254] kunit_try_run_case+0x170/0x3f0 [ 21.615672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.615844] kthread+0x328/0x630 [ 21.615949] ret_from_fork+0x10/0x20 [ 21.616090] [ 21.616116] Allocated by task 266: [ 21.616164] kasan_save_stack+0x3c/0x68 [ 21.616214] kasan_save_track+0x20/0x40 [ 21.616259] kasan_save_alloc_info+0x40/0x58 [ 21.616303] __kasan_kmalloc+0xd4/0xd8 [ 21.616344] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.616391] kasan_atomics+0xb8/0x2e0 [ 21.616432] kunit_try_run_case+0x170/0x3f0 [ 21.616477] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.616528] kthread+0x328/0x630 [ 21.616567] ret_from_fork+0x10/0x20 [ 21.616621] [ 21.616662] The buggy address belongs to the object at fff00000c76da700 [ 21.616662] which belongs to the cache kmalloc-64 of size 64 [ 21.616756] The buggy address is located 0 bytes to the right of [ 21.616756] allocated 48-byte region [fff00000c76da700, fff00000c76da730) [ 21.616831] [ 21.616863] The buggy address belongs to the physical page: [ 21.616912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.616978] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.617050] page_type: f5(slab) [ 21.617098] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.617182] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.617240] page dumped because: kasan: bad access detected [ 21.617302] [ 21.617334] Memory state around the buggy address: [ 21.617390] fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.617453] fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.617502] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.617547] ^ [ 21.617595] fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.617646] fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.617693] ================================================================== [ 21.763618] ================================================================== [ 21.763680] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 21.763734] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266 [ 21.763792] [ 21.763828] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.763919] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.763950] Hardware name: linux,dummy-virt (DT) [ 21.763988] Call trace: [ 21.764029] show_stack+0x20/0x38 (C) [ 21.764102] dump_stack_lvl+0x8c/0xd0 [ 21.764168] print_report+0x118/0x608 [ 21.764222] kasan_report+0xdc/0x128 [ 21.764304] kasan_check_range+0x100/0x1a8 [ 21.764399] __kasan_check_write+0x20/0x30 [ 21.764470] kasan_atomics_helper+0x147c/0x4858 [ 21.764527] kasan_atomics+0x198/0x2e0 [ 21.764578] kunit_try_run_case+0x170/0x3f0 [ 21.764636] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.764728] kthread+0x328/0x630 [ 21.764777] ret_from_fork+0x10/0x20 [ 21.764829] [ 21.764870] Allocated by task 266: [ 21.764915] kasan_save_stack+0x3c/0x68 [ 21.764961] kasan_save_track+0x20/0x40 [ 21.765004] kasan_save_alloc_info+0x40/0x58 [ 21.765050] __kasan_kmalloc+0xd4/0xd8 [ 21.765092] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.765147] kasan_atomics+0xb8/0x2e0 [ 21.765188] kunit_try_run_case+0x170/0x3f0 [ 21.765230] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.765281] kthread+0x328/0x630 [ 21.765326] ret_from_fork+0x10/0x20 [ 21.765365] [ 21.765389] The buggy address belongs to the object at fff00000c76da700 [ 21.765389] which belongs to the cache kmalloc-64 of size 64 [ 21.765457] The buggy address is located 0 bytes to the right of [ 21.765457] allocated 48-byte region [fff00000c76da700, fff00000c76da730) [ 21.765532] [ 21.765557] The buggy address belongs to the physical page: [ 21.765595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.765676] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.765732] page_type: f5(slab) [ 21.765795] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.765868] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.765924] page dumped because: kasan: bad access detected [ 21.765963] [ 21.765984] Memory state around the buggy address: [ 21.766022] fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.766082] fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.766144] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.766190] ^ [ 21.766226] fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.766286] fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.766331] ================================================================== [ 21.826520] ================================================================== [ 21.826611] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 21.826670] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266 [ 21.826726] [ 21.826762] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.826853] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.827031] Hardware name: linux,dummy-virt (DT) [ 21.827077] Call trace: [ 21.827170] show_stack+0x20/0x38 (C) [ 21.827291] dump_stack_lvl+0x8c/0xd0 [ 21.827481] print_report+0x118/0x608 [ 21.827536] kasan_report+0xdc/0x128 [ 21.827613] kasan_check_range+0x100/0x1a8 [ 21.827681] __kasan_check_write+0x20/0x30 [ 21.827872] kasan_atomics_helper+0x17ec/0x4858 [ 21.827986] kasan_atomics+0x198/0x2e0 [ 21.828064] kunit_try_run_case+0x170/0x3f0 [ 21.828123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.828193] kthread+0x328/0x630 [ 21.828258] ret_from_fork+0x10/0x20 [ 21.828311] [ 21.828341] Allocated by task 266: [ 21.828376] kasan_save_stack+0x3c/0x68 [ 21.828421] kasan_save_track+0x20/0x40 [ 21.828476] kasan_save_alloc_info+0x40/0x58 [ 21.828521] __kasan_kmalloc+0xd4/0xd8 [ 21.828574] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.828628] kasan_atomics+0xb8/0x2e0 [ 21.828669] kunit_try_run_case+0x170/0x3f0 [ 21.828723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.828787] kthread+0x328/0x630 [ 21.828826] ret_from_fork+0x10/0x20 [ 21.828875] [ 21.828907] The buggy address belongs to the object at fff00000c76da700 [ 21.828907] which belongs to the cache kmalloc-64 of size 64 [ 21.828980] The buggy address is located 0 bytes to the right of [ 21.828980] allocated 48-byte region [fff00000c76da700, fff00000c76da730) [ 21.829073] [ 21.829097] The buggy address belongs to the physical page: [ 21.829145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.829214] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.829298] page_type: f5(slab) [ 21.829344] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.829401] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.829472] page dumped because: kasan: bad access detected [ 21.829512] [ 21.829534] Memory state around the buggy address: [ 21.829583] fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.829634] fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.829685] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.829730] ^ [ 21.829779] fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.829830] fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.829902] ================================================================== [ 21.803961] ================================================================== [ 21.804046] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 21.804215] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266 [ 21.804401] [ 21.804449] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.804804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.804931] Hardware name: linux,dummy-virt (DT) [ 21.805027] Call trace: [ 21.805209] show_stack+0x20/0x38 (C) [ 21.805319] dump_stack_lvl+0x8c/0xd0 [ 21.805672] print_report+0x118/0x608 [ 21.805774] kasan_report+0xdc/0x128 [ 21.805877] kasan_check_range+0x100/0x1a8 [ 21.805969] __kasan_check_write+0x20/0x30 [ 21.806061] kasan_atomics_helper+0x16d0/0x4858 [ 21.806119] kasan_atomics+0x198/0x2e0 [ 21.806182] kunit_try_run_case+0x170/0x3f0 [ 21.806234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.806293] kthread+0x328/0x630 [ 21.806343] ret_from_fork+0x10/0x20 [ 21.806564] [ 21.806598] Allocated by task 266: [ 21.806805] kasan_save_stack+0x3c/0x68 [ 21.806955] kasan_save_track+0x20/0x40 [ 21.807006] kasan_save_alloc_info+0x40/0x58 [ 21.807178] __kasan_kmalloc+0xd4/0xd8 [ 21.807421] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.807613] kasan_atomics+0xb8/0x2e0 [ 21.807779] kunit_try_run_case+0x170/0x3f0 [ 21.807827] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.807877] kthread+0x328/0x630 [ 21.808007] ret_from_fork+0x10/0x20 [ 21.808067] [ 21.808235] The buggy address belongs to the object at fff00000c76da700 [ 21.808235] which belongs to the cache kmalloc-64 of size 64 [ 21.808413] The buggy address is located 0 bytes to the right of [ 21.808413] allocated 48-byte region [fff00000c76da700, fff00000c76da730) [ 21.808609] [ 21.808958] The buggy address belongs to the physical page: [ 21.809082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.809248] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.809321] page_type: f5(slab) [ 21.809366] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.809617] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.809682] page dumped because: kasan: bad access detected [ 21.809742] [ 21.809817] Memory state around the buggy address: [ 21.809923] fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.810178] fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.810239] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.810294] ^ [ 21.810335] fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.810384] fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.810429] ================================================================== [ 21.656779] ================================================================== [ 21.657005] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 21.657197] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266 [ 21.657265] [ 21.657316] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.657410] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.657614] Hardware name: linux,dummy-virt (DT) [ 21.657721] Call trace: [ 21.658006] show_stack+0x20/0x38 (C) [ 21.658204] dump_stack_lvl+0x8c/0xd0 [ 21.658613] print_report+0x118/0x608 [ 21.658957] kasan_report+0xdc/0x128 [ 21.659045] kasan_check_range+0x100/0x1a8 [ 21.659100] __kasan_check_write+0x20/0x30 [ 21.659300] kasan_atomics_helper+0xff0/0x4858 [ 21.659518] kasan_atomics+0x198/0x2e0 [ 21.659580] kunit_try_run_case+0x170/0x3f0 [ 21.659639] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.659877] kthread+0x328/0x630 [ 21.659981] ret_from_fork+0x10/0x20 [ 21.660597] [ 21.660708] Allocated by task 266: [ 21.660782] kasan_save_stack+0x3c/0x68 [ 21.660942] kasan_save_track+0x20/0x40 [ 21.661092] kasan_save_alloc_info+0x40/0x58 [ 21.661195] __kasan_kmalloc+0xd4/0xd8 [ 21.661245] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.661304] kasan_atomics+0xb8/0x2e0 [ 21.661725] kunit_try_run_case+0x170/0x3f0 [ 21.661920] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.662153] kthread+0x328/0x630 [ 21.662293] ret_from_fork+0x10/0x20 [ 21.662341] [ 21.662365] The buggy address belongs to the object at fff00000c76da700 [ 21.662365] which belongs to the cache kmalloc-64 of size 64 [ 21.662628] The buggy address is located 0 bytes to the right of [ 21.662628] allocated 48-byte region [fff00000c76da700, fff00000c76da730) [ 21.663236] [ 21.663283] The buggy address belongs to the physical page: [ 21.663396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.663469] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.663843] page_type: f5(slab) [ 21.663937] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.664213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.664579] page dumped because: kasan: bad access detected [ 21.664647] [ 21.664670] Memory state around the buggy address: [ 21.664713] fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.665213] fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.665465] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.665549] ^ [ 21.665630] fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.665743] fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.665797] ================================================================== [ 21.758819] ================================================================== [ 21.758887] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 21.758945] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266 [ 21.759051] [ 21.759096] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.759222] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.759343] Hardware name: linux,dummy-virt (DT) [ 21.759460] Call trace: [ 21.759838] show_stack+0x20/0x38 (C) [ 21.760004] dump_stack_lvl+0x8c/0xd0 [ 21.760148] print_report+0x118/0x608 [ 21.760238] kasan_report+0xdc/0x128 [ 21.760304] kasan_check_range+0x100/0x1a8 [ 21.760357] __kasan_check_write+0x20/0x30 [ 21.760408] kasan_atomics_helper+0x1414/0x4858 [ 21.760463] kasan_atomics+0x198/0x2e0 [ 21.760513] kunit_try_run_case+0x170/0x3f0 [ 21.760566] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.760626] kthread+0x328/0x630 [ 21.760674] ret_from_fork+0x10/0x20 [ 21.760742] [ 21.760765] Allocated by task 266: [ 21.760797] kasan_save_stack+0x3c/0x68 [ 21.760844] kasan_save_track+0x20/0x40 [ 21.760948] kasan_save_alloc_info+0x40/0x58 [ 21.761222] __kasan_kmalloc+0xd4/0xd8 [ 21.761322] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.761369] kasan_atomics+0xb8/0x2e0 [ 21.761430] kunit_try_run_case+0x170/0x3f0 [ 21.761474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.761523] kthread+0x328/0x630 [ 21.761562] ret_from_fork+0x10/0x20 [ 21.761604] [ 21.761627] The buggy address belongs to the object at fff00000c76da700 [ 21.761627] which belongs to the cache kmalloc-64 of size 64 [ 21.761697] The buggy address is located 0 bytes to the right of [ 21.761697] allocated 48-byte region [fff00000c76da700, fff00000c76da730) [ 21.761903] [ 21.762020] The buggy address belongs to the physical page: [ 21.762101] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.762225] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.762391] page_type: f5(slab) [ 21.762474] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.762535] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.762583] page dumped because: kasan: bad access detected [ 21.762621] [ 21.762642] Memory state around the buggy address: [ 21.762681] fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.762732] fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.762783] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.762828] ^ [ 21.762865] fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.762915] fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.762959] ================================================================== [ 21.791922] ================================================================== [ 21.791989] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 21.792046] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266 [ 21.792335] [ 21.792416] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.792564] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.792649] Hardware name: linux,dummy-virt (DT) [ 21.792812] Call trace: [ 21.792875] show_stack+0x20/0x38 (C) [ 21.793002] dump_stack_lvl+0x8c/0xd0 [ 21.793115] print_report+0x118/0x608 [ 21.793182] kasan_report+0xdc/0x128 [ 21.793306] kasan_check_range+0x100/0x1a8 [ 21.793365] __kasan_check_write+0x20/0x30 [ 21.793655] kasan_atomics_helper+0x1644/0x4858 [ 21.793770] kasan_atomics+0x198/0x2e0 [ 21.793877] kunit_try_run_case+0x170/0x3f0 [ 21.794076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.794174] kthread+0x328/0x630 [ 21.794241] ret_from_fork+0x10/0x20 [ 21.794298] [ 21.794348] Allocated by task 266: [ 21.794423] kasan_save_stack+0x3c/0x68 [ 21.794534] kasan_save_track+0x20/0x40 [ 21.794581] kasan_save_alloc_info+0x40/0x58 [ 21.794777] __kasan_kmalloc+0xd4/0xd8 [ 21.794835] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.794980] kasan_atomics+0xb8/0x2e0 [ 21.795027] kunit_try_run_case+0x170/0x3f0 [ 21.795206] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.795372] kthread+0x328/0x630 [ 21.795577] ret_from_fork+0x10/0x20 [ 21.795782] [ 21.795954] The buggy address belongs to the object at fff00000c76da700 [ 21.795954] which belongs to the cache kmalloc-64 of size 64 [ 21.796071] The buggy address is located 0 bytes to the right of [ 21.796071] allocated 48-byte region [fff00000c76da700, fff00000c76da730) [ 21.796286] [ 21.796415] The buggy address belongs to the physical page: [ 21.796547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.796623] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.796681] page_type: f5(slab) [ 21.796737] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.796797] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.797080] page dumped because: kasan: bad access detected [ 21.797230] [ 21.797406] Memory state around the buggy address: [ 21.797511] fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.797942] fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.798011] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.798065] ^ [ 21.798106] fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.798216] fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.798280] ================================================================== [ 21.592376] ================================================================== [ 21.592487] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 21.592687] Read of size 8 at addr fff00000c76da730 by task kunit_try_catch/266 [ 21.592894] [ 21.593104] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.593227] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.593499] Hardware name: linux,dummy-virt (DT) [ 21.593570] Call trace: [ 21.593634] show_stack+0x20/0x38 (C) [ 21.593780] dump_stack_lvl+0x8c/0xd0 [ 21.594043] print_report+0x118/0x608 [ 21.594119] kasan_report+0xdc/0x128 [ 21.594350] kasan_check_range+0x100/0x1a8 [ 21.594511] __kasan_check_read+0x20/0x30 [ 21.594612] kasan_atomics_helper+0xdd4/0x4858 [ 21.594812] kasan_atomics+0x198/0x2e0 [ 21.594968] kunit_try_run_case+0x170/0x3f0 [ 21.595054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.595178] kthread+0x328/0x630 [ 21.595239] ret_from_fork+0x10/0x20 [ 21.595491] [ 21.595518] Allocated by task 266: [ 21.595552] kasan_save_stack+0x3c/0x68 [ 21.595754] kasan_save_track+0x20/0x40 [ 21.595944] kasan_save_alloc_info+0x40/0x58 [ 21.596000] __kasan_kmalloc+0xd4/0xd8 [ 21.596045] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.596095] kasan_atomics+0xb8/0x2e0 [ 21.596548] kunit_try_run_case+0x170/0x3f0 [ 21.596611] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.596954] kthread+0x328/0x630 [ 21.597152] ret_from_fork+0x10/0x20 [ 21.597554] [ 21.597626] The buggy address belongs to the object at fff00000c76da700 [ 21.597626] which belongs to the cache kmalloc-64 of size 64 [ 21.597915] The buggy address is located 0 bytes to the right of [ 21.597915] allocated 48-byte region [fff00000c76da700, fff00000c76da730) [ 21.598329] [ 21.598390] The buggy address belongs to the physical page: [ 21.598485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.598566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.598626] page_type: f5(slab) [ 21.598671] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.598730] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.598791] page dumped because: kasan: bad access detected [ 21.598842] [ 21.598878] Memory state around the buggy address: [ 21.598926] fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.598985] fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.599035] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.599080] ^ [ 21.599679] fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.599763] fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.599837] ================================================================== [ 21.748152] ================================================================== [ 21.748218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 21.748278] Read of size 8 at addr fff00000c76da730 by task kunit_try_catch/266 [ 21.748337] [ 21.748373] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.748679] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.749392] Hardware name: linux,dummy-virt (DT) [ 21.749476] Call trace: [ 21.749752] show_stack+0x20/0x38 (C) [ 21.750367] dump_stack_lvl+0x8c/0xd0 [ 21.750744] print_report+0x118/0x608 [ 21.750896] kasan_report+0xdc/0x128 [ 21.751081] __asan_report_load8_noabort+0x20/0x30 [ 21.751240] kasan_atomics_helper+0x3f04/0x4858 [ 21.751576] kasan_atomics+0x198/0x2e0 [ 21.751786] kunit_try_run_case+0x170/0x3f0 [ 21.751991] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.752484] kthread+0x328/0x630 [ 21.752669] ret_from_fork+0x10/0x20 [ 21.752881] [ 21.752970] Allocated by task 266: [ 21.755416] kasan_save_stack+0x3c/0x68 [ 21.755487] kasan_save_track+0x20/0x40 [ 21.755530] kasan_save_alloc_info+0x40/0x58 [ 21.756343] __kasan_kmalloc+0xd4/0xd8 [ 21.756386] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.756432] kasan_atomics+0xb8/0x2e0 [ 21.756474] kunit_try_run_case+0x170/0x3f0 [ 21.756518] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.756567] kthread+0x328/0x630 [ 21.756605] ret_from_fork+0x10/0x20 [ 21.756647] [ 21.756670] The buggy address belongs to the object at fff00000c76da700 [ 21.756670] which belongs to the cache kmalloc-64 of size 64 [ 21.756742] The buggy address is located 0 bytes to the right of [ 21.756742] allocated 48-byte region [fff00000c76da700, fff00000c76da730) [ 21.756817] [ 21.756844] The buggy address belongs to the physical page: [ 21.756883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.756948] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.757008] page_type: f5(slab) [ 21.757056] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.757117] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.757244] page dumped because: kasan: bad access detected [ 21.757307] [ 21.757339] Memory state around the buggy address: [ 21.757390] fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.757527] fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.757600] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.757695] ^ [ 21.757758] fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.757866] fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.757954] ================================================================== [ 21.700256] ================================================================== [ 21.700364] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 21.700817] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266 [ 21.700949] [ 21.700997] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.701093] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.701321] Hardware name: linux,dummy-virt (DT) [ 21.701466] Call trace: [ 21.701505] show_stack+0x20/0x38 (C) [ 21.701744] dump_stack_lvl+0x8c/0xd0 [ 21.701811] print_report+0x118/0x608 [ 21.701873] kasan_report+0xdc/0x128 [ 21.701922] kasan_check_range+0x100/0x1a8 [ 21.702354] __kasan_check_write+0x20/0x30 [ 21.702462] kasan_atomics_helper+0x1190/0x4858 [ 21.702945] kasan_atomics+0x198/0x2e0 [ 21.703046] kunit_try_run_case+0x170/0x3f0 [ 21.703111] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.703302] kthread+0x328/0x630 [ 21.703530] ret_from_fork+0x10/0x20 [ 21.703590] [ 21.703614] Allocated by task 266: [ 21.703867] kasan_save_stack+0x3c/0x68 [ 21.704060] kasan_save_track+0x20/0x40 [ 21.704279] kasan_save_alloc_info+0x40/0x58 [ 21.704473] __kasan_kmalloc+0xd4/0xd8 [ 21.704553] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.704633] kasan_atomics+0xb8/0x2e0 [ 21.704690] kunit_try_run_case+0x170/0x3f0 [ 21.704758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.704809] kthread+0x328/0x630 [ 21.704846] ret_from_fork+0x10/0x20 [ 21.704887] [ 21.704928] The buggy address belongs to the object at fff00000c76da700 [ 21.704928] which belongs to the cache kmalloc-64 of size 64 [ 21.705004] The buggy address is located 0 bytes to the right of [ 21.705004] allocated 48-byte region [fff00000c76da700, fff00000c76da730) [ 21.705079] [ 21.705122] The buggy address belongs to the physical page: [ 21.705563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.705929] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.706175] page_type: f5(slab) [ 21.706492] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.706629] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.706811] page dumped because: kasan: bad access detected [ 21.706935] [ 21.706980] Memory state around the buggy address: [ 21.707021] fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.707413] fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.707497] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.707827] ^ [ 21.707992] fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.708048] fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.708412] ================================================================== [ 21.629840] ================================================================== [ 21.630429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 21.630635] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266 [ 21.630709] [ 21.630871] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.631014] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.631164] Hardware name: linux,dummy-virt (DT) [ 21.631236] Call trace: [ 21.631271] show_stack+0x20/0x38 (C) [ 21.631333] dump_stack_lvl+0x8c/0xd0 [ 21.631388] print_report+0x118/0x608 [ 21.631441] kasan_report+0xdc/0x128 [ 21.631866] kasan_check_range+0x100/0x1a8 [ 21.632429] __kasan_check_write+0x20/0x30 [ 21.632799] kasan_atomics_helper+0xeb8/0x4858 [ 21.633101] kasan_atomics+0x198/0x2e0 [ 21.633338] kunit_try_run_case+0x170/0x3f0 [ 21.633420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.633522] kthread+0x328/0x630 [ 21.633946] ret_from_fork+0x10/0x20 [ 21.634040] [ 21.634153] Allocated by task 266: [ 21.634224] kasan_save_stack+0x3c/0x68 [ 21.634288] kasan_save_track+0x20/0x40 [ 21.634333] kasan_save_alloc_info+0x40/0x58 [ 21.634378] __kasan_kmalloc+0xd4/0xd8 [ 21.634422] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.634474] kasan_atomics+0xb8/0x2e0 [ 21.634514] kunit_try_run_case+0x170/0x3f0 [ 21.634558] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.634608] kthread+0x328/0x630 [ 21.634647] ret_from_fork+0x10/0x20 [ 21.634689] [ 21.634735] The buggy address belongs to the object at fff00000c76da700 [ 21.634735] which belongs to the cache kmalloc-64 of size 64 [ 21.634829] The buggy address is located 0 bytes to the right of [ 21.634829] allocated 48-byte region [fff00000c76da700, fff00000c76da730) [ 21.634904] [ 21.634955] The buggy address belongs to the physical page: [ 21.634996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.635070] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.635206] page_type: f5(slab) [ 21.635828] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.635895] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.635978] page dumped because: kasan: bad access detected [ 21.636017] [ 21.636041] Memory state around the buggy address: [ 21.636082] fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.636146] fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.636200] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.636245] ^ [ 21.636285] fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.637122] fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.637504] ================================================================== [ 21.815567] ================================================================== [ 21.815625] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 21.815679] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266 [ 21.815735] [ 21.815772] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.815864] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.815896] Hardware name: linux,dummy-virt (DT) [ 21.815932] Call trace: [ 21.815979] show_stack+0x20/0x38 (C) [ 21.816075] dump_stack_lvl+0x8c/0xd0 [ 21.816481] print_report+0x118/0x608 [ 21.816537] kasan_report+0xdc/0x128 [ 21.816588] kasan_check_range+0x100/0x1a8 [ 21.816723] __kasan_check_write+0x20/0x30 [ 21.816775] kasan_atomics_helper+0x175c/0x4858 [ 21.816830] kasan_atomics+0x198/0x2e0 [ 21.816879] kunit_try_run_case+0x170/0x3f0 [ 21.816933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.816992] kthread+0x328/0x630 [ 21.817038] ret_from_fork+0x10/0x20 [ 21.817091] [ 21.817113] Allocated by task 266: [ 21.817155] kasan_save_stack+0x3c/0x68 [ 21.817202] kasan_save_track+0x20/0x40 [ 21.817244] kasan_save_alloc_info+0x40/0x58 [ 21.817300] __kasan_kmalloc+0xd4/0xd8 [ 21.817342] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.817398] kasan_atomics+0xb8/0x2e0 [ 21.817461] kunit_try_run_case+0x170/0x3f0 [ 21.817601] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.817695] kthread+0x328/0x630 [ 21.817732] ret_from_fork+0x10/0x20 [ 21.817772] [ 21.817794] The buggy address belongs to the object at fff00000c76da700 [ 21.817794] which belongs to the cache kmalloc-64 of size 64 [ 21.817893] The buggy address is located 0 bytes to the right of [ 21.817893] allocated 48-byte region [fff00000c76da700, fff00000c76da730) [ 21.818109] [ 21.818251] The buggy address belongs to the physical page: [ 21.818290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.818351] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.818411] page_type: f5(slab) [ 21.818484] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.818573] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.818999] page dumped because: kasan: bad access detected [ 21.819040] [ 21.819081] Memory state around the buggy address: [ 21.819154] fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.819318] fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.819546] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.819640] ^ [ 21.819679] fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.819729] fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.819774] ================================================================== [ 21.618853] ================================================================== [ 21.618936] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 21.618996] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266 [ 21.619054] [ 21.619405] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.619722] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.619760] Hardware name: linux,dummy-virt (DT) [ 21.619853] Call trace: [ 21.619881] show_stack+0x20/0x38 (C) [ 21.620161] dump_stack_lvl+0x8c/0xd0 [ 21.620323] print_report+0x118/0x608 [ 21.620749] kasan_report+0xdc/0x128 [ 21.620850] __asan_report_store8_noabort+0x20/0x30 [ 21.621072] kasan_atomics_helper+0x3e5c/0x4858 [ 21.621328] kasan_atomics+0x198/0x2e0 [ 21.621387] kunit_try_run_case+0x170/0x3f0 [ 21.621470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.622171] kthread+0x328/0x630 [ 21.622254] ret_from_fork+0x10/0x20 [ 21.622499] [ 21.622573] Allocated by task 266: [ 21.622772] kasan_save_stack+0x3c/0x68 [ 21.622825] kasan_save_track+0x20/0x40 [ 21.622869] kasan_save_alloc_info+0x40/0x58 [ 21.623272] __kasan_kmalloc+0xd4/0xd8 [ 21.623360] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.623612] kasan_atomics+0xb8/0x2e0 [ 21.623667] kunit_try_run_case+0x170/0x3f0 [ 21.623712] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.623776] kthread+0x328/0x630 [ 21.623816] ret_from_fork+0x10/0x20 [ 21.624179] [ 21.624685] The buggy address belongs to the object at fff00000c76da700 [ 21.624685] which belongs to the cache kmalloc-64 of size 64 [ 21.624784] The buggy address is located 0 bytes to the right of [ 21.624784] allocated 48-byte region [fff00000c76da700, fff00000c76da730) [ 21.625509] [ 21.625639] The buggy address belongs to the physical page: [ 21.625693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.625861] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.625934] page_type: f5(slab) [ 21.626391] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.626487] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.627043] page dumped because: kasan: bad access detected [ 21.627117] [ 21.627285] Memory state around the buggy address: [ 21.627367] fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.627771] fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.628003] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.628054] ^ [ 21.628098] fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.628166] fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.628214] ================================================================== [ 21.777985] ================================================================== [ 21.778053] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 21.778110] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266 [ 21.778256] [ 21.778308] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.778434] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.778468] Hardware name: linux,dummy-virt (DT) [ 21.778506] Call trace: [ 21.778531] show_stack+0x20/0x38 (C) [ 21.778588] dump_stack_lvl+0x8c/0xd0 [ 21.778640] print_report+0x118/0x608 [ 21.778705] kasan_report+0xdc/0x128 [ 21.778755] kasan_check_range+0x100/0x1a8 [ 21.778809] __kasan_check_write+0x20/0x30 [ 21.778868] kasan_atomics_helper+0x15b4/0x4858 [ 21.778923] kasan_atomics+0x198/0x2e0 [ 21.778973] kunit_try_run_case+0x170/0x3f0 [ 21.779024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.779092] kthread+0x328/0x630 [ 21.779512] ret_from_fork+0x10/0x20 [ 21.779742] [ 21.779889] Allocated by task 266: [ 21.779937] kasan_save_stack+0x3c/0x68 [ 21.779991] kasan_save_track+0x20/0x40 [ 21.780035] kasan_save_alloc_info+0x40/0x58 [ 21.780079] __kasan_kmalloc+0xd4/0xd8 [ 21.780122] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.780395] kasan_atomics+0xb8/0x2e0 [ 21.780627] kunit_try_run_case+0x170/0x3f0 [ 21.780906] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.781048] kthread+0x328/0x630 [ 21.781090] ret_from_fork+0x10/0x20 [ 21.781359] [ 21.781531] The buggy address belongs to the object at fff00000c76da700 [ 21.781531] which belongs to the cache kmalloc-64 of size 64 [ 21.781839] The buggy address is located 0 bytes to the right of [ 21.781839] allocated 48-byte region [fff00000c76da700, fff00000c76da730) [ 21.781950] [ 21.782070] The buggy address belongs to the physical page: [ 21.782141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.782368] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.782568] page_type: f5(slab) [ 21.782669] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.783032] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.783118] page dumped because: kasan: bad access detected [ 21.783299] [ 21.783325] Memory state around the buggy address: [ 21.783366] fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.783426] fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.783478] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.783524] ^ [ 21.783562] fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.783871] fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.783934] ================================================================== [ 21.649308] ================================================================== [ 21.649527] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 21.649730] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266 [ 21.649880] [ 21.649929] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.650323] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.650399] Hardware name: linux,dummy-virt (DT) [ 21.650439] Call trace: [ 21.650469] show_stack+0x20/0x38 (C) [ 21.650659] dump_stack_lvl+0x8c/0xd0 [ 21.650735] print_report+0x118/0x608 [ 21.650914] kasan_report+0xdc/0x128 [ 21.650982] kasan_check_range+0x100/0x1a8 [ 21.651150] __kasan_check_write+0x20/0x30 [ 21.651215] kasan_atomics_helper+0xf88/0x4858 [ 21.651280] kasan_atomics+0x198/0x2e0 [ 21.651333] kunit_try_run_case+0x170/0x3f0 [ 21.651385] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.651821] kthread+0x328/0x630 [ 21.652275] ret_from_fork+0x10/0x20 [ 21.652426] [ 21.652493] Allocated by task 266: [ 21.652618] kasan_save_stack+0x3c/0x68 [ 21.652716] kasan_save_track+0x20/0x40 [ 21.652807] kasan_save_alloc_info+0x40/0x58 [ 21.653274] __kasan_kmalloc+0xd4/0xd8 [ 21.653341] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.653421] kasan_atomics+0xb8/0x2e0 [ 21.653485] kunit_try_run_case+0x170/0x3f0 [ 21.653530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.653582] kthread+0x328/0x630 [ 21.653629] ret_from_fork+0x10/0x20 [ 21.653688] [ 21.653723] The buggy address belongs to the object at fff00000c76da700 [ 21.653723] which belongs to the cache kmalloc-64 of size 64 [ 21.653808] The buggy address is located 0 bytes to the right of [ 21.653808] allocated 48-byte region [fff00000c76da700, fff00000c76da730) [ 21.653882] [ 21.653919] The buggy address belongs to the physical page: [ 21.653959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.654032] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.654102] page_type: f5(slab) [ 21.654165] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.654236] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.654293] page dumped because: kasan: bad access detected [ 21.654340] [ 21.654365] Memory state around the buggy address: [ 21.654405] fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.654467] fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.654521] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.654566] ^ [ 21.654624] fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.654673] fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.654720] ================================================================== [ 21.810640] ================================================================== [ 21.810699] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 21.810754] Read of size 8 at addr fff00000c76da730 by task kunit_try_catch/266 [ 21.810811] [ 21.810851] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.810944] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.810974] Hardware name: linux,dummy-virt (DT) [ 21.811013] Call trace: [ 21.811038] show_stack+0x20/0x38 (C) [ 21.811093] dump_stack_lvl+0x8c/0xd0 [ 21.813203] print_report+0x118/0x608 [ 21.813262] kasan_report+0xdc/0x128 [ 21.813321] __asan_report_load8_noabort+0x20/0x30 [ 21.813377] kasan_atomics_helper+0x3e10/0x4858 [ 21.813431] kasan_atomics+0x198/0x2e0 [ 21.813480] kunit_try_run_case+0x170/0x3f0 [ 21.813535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.813594] kthread+0x328/0x630 [ 21.813640] ret_from_fork+0x10/0x20 [ 21.813695] [ 21.813717] Allocated by task 266: [ 21.813750] kasan_save_stack+0x3c/0x68 [ 21.813798] kasan_save_track+0x20/0x40 [ 21.813839] kasan_save_alloc_info+0x40/0x58 [ 21.813885] __kasan_kmalloc+0xd4/0xd8 [ 21.813927] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.813971] kasan_atomics+0xb8/0x2e0 [ 21.814012] kunit_try_run_case+0x170/0x3f0 [ 21.814053] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.814104] kthread+0x328/0x630 [ 21.814150] ret_from_fork+0x10/0x20 [ 21.814261] [ 21.814285] The buggy address belongs to the object at fff00000c76da700 [ 21.814285] which belongs to the cache kmalloc-64 of size 64 [ 21.814366] The buggy address is located 0 bytes to the right of [ 21.814366] allocated 48-byte region [fff00000c76da700, fff00000c76da730) [ 21.814460] [ 21.814493] The buggy address belongs to the physical page: [ 21.814539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.814606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.814665] page_type: f5(slab) [ 21.814710] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.814786] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.814838] page dumped because: kasan: bad access detected [ 21.814885] [ 21.814907] Memory state around the buggy address: [ 21.814952] fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.815026] fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.815091] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.815155] ^ [ 21.815195] fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.815246] fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.815290] ================================================================== [ 21.689050] ================================================================== [ 21.689147] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 21.689400] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266 [ 21.689474] [ 21.689532] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.689638] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.690070] Hardware name: linux,dummy-virt (DT) [ 21.690437] Call trace: [ 21.690492] show_stack+0x20/0x38 (C) [ 21.690560] dump_stack_lvl+0x8c/0xd0 [ 21.690616] print_report+0x118/0x608 [ 21.690808] kasan_report+0xdc/0x128 [ 21.690923] kasan_check_range+0x100/0x1a8 [ 21.691286] __kasan_check_write+0x20/0x30 [ 21.691470] kasan_atomics_helper+0x1128/0x4858 [ 21.691656] kasan_atomics+0x198/0x2e0 [ 21.691722] kunit_try_run_case+0x170/0x3f0 [ 21.691778] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.692232] kthread+0x328/0x630 [ 21.692378] ret_from_fork+0x10/0x20 [ 21.692893] [ 21.693013] Allocated by task 266: [ 21.693206] kasan_save_stack+0x3c/0x68 [ 21.693370] kasan_save_track+0x20/0x40 [ 21.693417] kasan_save_alloc_info+0x40/0x58 [ 21.693771] __kasan_kmalloc+0xd4/0xd8 [ 21.694644] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.694760] kasan_atomics+0xb8/0x2e0 [ 21.694828] kunit_try_run_case+0x170/0x3f0 [ 21.694925] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.694980] kthread+0x328/0x630 [ 21.695018] ret_from_fork+0x10/0x20 [ 21.695369] [ 21.695456] The buggy address belongs to the object at fff00000c76da700 [ 21.695456] which belongs to the cache kmalloc-64 of size 64 [ 21.695875] The buggy address is located 0 bytes to the right of [ 21.695875] allocated 48-byte region [fff00000c76da700, fff00000c76da730) [ 21.696011] [ 21.696116] The buggy address belongs to the physical page: [ 21.696170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.696520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.696699] page_type: f5(slab) [ 21.696813] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.697302] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.697579] page dumped because: kasan: bad access detected [ 21.697670] [ 21.697750] Memory state around the buggy address: [ 21.697877] fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.698096] fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.698189] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.698245] ^ [ 21.698288] fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.698360] fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.698430] ================================================================== [ 21.639464] ================================================================== [ 21.639734] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 21.639901] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266 [ 21.640103] [ 21.640162] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.640268] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.640301] Hardware name: linux,dummy-virt (DT) [ 21.640339] Call trace: [ 21.640367] show_stack+0x20/0x38 (C) [ 21.640831] dump_stack_lvl+0x8c/0xd0 [ 21.641247] print_report+0x118/0x608 [ 21.641352] kasan_report+0xdc/0x128 [ 21.641536] kasan_check_range+0x100/0x1a8 [ 21.641698] __kasan_check_write+0x20/0x30 [ 21.641783] kasan_atomics_helper+0xf20/0x4858 [ 21.641860] kasan_atomics+0x198/0x2e0 [ 21.642177] kunit_try_run_case+0x170/0x3f0 [ 21.642318] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.642693] kthread+0x328/0x630 [ 21.642806] ret_from_fork+0x10/0x20 [ 21.642945] [ 21.643081] Allocated by task 266: [ 21.643196] kasan_save_stack+0x3c/0x68 [ 21.643328] kasan_save_track+0x20/0x40 [ 21.643375] kasan_save_alloc_info+0x40/0x58 [ 21.643420] __kasan_kmalloc+0xd4/0xd8 [ 21.644144] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.644432] kasan_atomics+0xb8/0x2e0 [ 21.644508] kunit_try_run_case+0x170/0x3f0 [ 21.644887] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.645021] kthread+0x328/0x630 [ 21.645230] ret_from_fork+0x10/0x20 [ 21.645325] [ 21.645404] The buggy address belongs to the object at fff00000c76da700 [ 21.645404] which belongs to the cache kmalloc-64 of size 64 [ 21.645483] The buggy address is located 0 bytes to the right of [ 21.645483] allocated 48-byte region [fff00000c76da700, fff00000c76da730) [ 21.645886] [ 21.645944] The buggy address belongs to the physical page: [ 21.646116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.646212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.646404] page_type: f5(slab) [ 21.646463] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.646558] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.646620] page dumped because: kasan: bad access detected [ 21.646668] [ 21.646692] Memory state around the buggy address: [ 21.646735] fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.646803] fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.646886] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.646950] ^ [ 21.646989] fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.647039] fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.647103] ================================================================== [ 21.820155] ================================================================== [ 21.820212] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 21.820694] Read of size 8 at addr fff00000c76da730 by task kunit_try_catch/266 [ 21.820752] [ 21.821028] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.821137] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.821171] Hardware name: linux,dummy-virt (DT) [ 21.821278] Call trace: [ 21.821324] show_stack+0x20/0x38 (C) [ 21.821546] dump_stack_lvl+0x8c/0xd0 [ 21.821744] print_report+0x118/0x608 [ 21.821813] kasan_report+0xdc/0x128 [ 21.821975] __asan_report_load8_noabort+0x20/0x30 [ 21.822061] kasan_atomics_helper+0x3e20/0x4858 [ 21.822117] kasan_atomics+0x198/0x2e0 [ 21.822210] kunit_try_run_case+0x170/0x3f0 [ 21.822303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.822364] kthread+0x328/0x630 [ 21.822411] ret_from_fork+0x10/0x20 [ 21.822507] [ 21.822551] Allocated by task 266: [ 21.822592] kasan_save_stack+0x3c/0x68 [ 21.822638] kasan_save_track+0x20/0x40 [ 21.822681] kasan_save_alloc_info+0x40/0x58 [ 21.822725] __kasan_kmalloc+0xd4/0xd8 [ 21.822767] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.822939] kasan_atomics+0xb8/0x2e0 [ 21.823192] kunit_try_run_case+0x170/0x3f0 [ 21.823264] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.823359] kthread+0x328/0x630 [ 21.823410] ret_from_fork+0x10/0x20 [ 21.823478] [ 21.823561] The buggy address belongs to the object at fff00000c76da700 [ 21.823561] which belongs to the cache kmalloc-64 of size 64 [ 21.823630] The buggy address is located 0 bytes to the right of [ 21.823630] allocated 48-byte region [fff00000c76da700, fff00000c76da730) [ 21.823897] [ 21.824040] The buggy address belongs to the physical page: [ 21.824105] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.824551] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.824641] page_type: f5(slab) [ 21.824796] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.824912] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.824981] page dumped because: kasan: bad access detected [ 21.825020] [ 21.825041] Memory state around the buggy address: [ 21.825081] fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.825278] fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.825342] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.825387] ^ [ 21.825425] fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.825673] fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.825791] ================================================================== [ 21.719855] ================================================================== [ 21.720283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 21.720365] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266 [ 21.720787] [ 21.720851] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.720948] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.721078] Hardware name: linux,dummy-virt (DT) [ 21.721224] Call trace: [ 21.721278] show_stack+0x20/0x38 (C) [ 21.721349] dump_stack_lvl+0x8c/0xd0 [ 21.721674] print_report+0x118/0x608 [ 21.721740] kasan_report+0xdc/0x128 [ 21.722214] kasan_check_range+0x100/0x1a8 [ 21.722295] __kasan_check_write+0x20/0x30 [ 21.722350] kasan_atomics_helper+0x126c/0x4858 [ 21.722415] kasan_atomics+0x198/0x2e0 [ 21.722518] kunit_try_run_case+0x170/0x3f0 [ 21.722575] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.722647] kthread+0x328/0x630 [ 21.722704] ret_from_fork+0x10/0x20 [ 21.722762] [ 21.722790] Allocated by task 266: [ 21.722824] kasan_save_stack+0x3c/0x68 [ 21.722874] kasan_save_track+0x20/0x40 [ 21.722925] kasan_save_alloc_info+0x40/0x58 [ 21.722971] __kasan_kmalloc+0xd4/0xd8 [ 21.723022] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.723069] kasan_atomics+0xb8/0x2e0 [ 21.723110] kunit_try_run_case+0x170/0x3f0 [ 21.723427] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.723479] kthread+0x328/0x630 [ 21.724052] ret_from_fork+0x10/0x20 [ 21.724413] [ 21.724584] The buggy address belongs to the object at fff00000c76da700 [ 21.724584] which belongs to the cache kmalloc-64 of size 64 [ 21.724715] The buggy address is located 0 bytes to the right of [ 21.724715] allocated 48-byte region [fff00000c76da700, fff00000c76da730) [ 21.725094] [ 21.725175] The buggy address belongs to the physical page: [ 21.725616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.725754] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.726476] page_type: f5(slab) [ 21.726569] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.726745] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.726848] page dumped because: kasan: bad access detected [ 21.727198] [ 21.727248] Memory state around the buggy address: [ 21.727373] fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.727433] fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.727534] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.727908] ^ [ 21.728000] fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.728196] fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.728247] ================================================================== [ 21.479863] ================================================================== [ 21.479936] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 21.480002] Write of size 4 at addr fff00000c76da730 by task kunit_try_catch/266 [ 21.480059] [ 21.481016] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.481204] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.481272] Hardware name: linux,dummy-virt (DT) [ 21.481338] Call trace: [ 21.481370] show_stack+0x20/0x38 (C) [ 21.481793] dump_stack_lvl+0x8c/0xd0 [ 21.481879] print_report+0x118/0x608 [ 21.481935] kasan_report+0xdc/0x128 [ 21.482505] kasan_check_range+0x100/0x1a8 [ 21.482737] __kasan_check_write+0x20/0x30 [ 21.482806] kasan_atomics_helper+0x99c/0x4858 [ 21.482884] kasan_atomics+0x198/0x2e0 [ 21.482959] kunit_try_run_case+0x170/0x3f0 [ 21.483017] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.483199] kthread+0x328/0x630 [ 21.483262] ret_from_fork+0x10/0x20 [ 21.483322] [ 21.483347] Allocated by task 266: [ 21.483383] kasan_save_stack+0x3c/0x68 [ 21.483432] kasan_save_track+0x20/0x40 [ 21.483474] kasan_save_alloc_info+0x40/0x58 [ 21.483521] __kasan_kmalloc+0xd4/0xd8 [ 21.483562] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.483607] kasan_atomics+0xb8/0x2e0 [ 21.483650] kunit_try_run_case+0x170/0x3f0 [ 21.483692] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.483743] kthread+0x328/0x630 [ 21.483779] ret_from_fork+0x10/0x20 [ 21.483821] [ 21.483844] The buggy address belongs to the object at fff00000c76da700 [ 21.483844] which belongs to the cache kmalloc-64 of size 64 [ 21.483916] The buggy address is located 0 bytes to the right of [ 21.483916] allocated 48-byte region [fff00000c76da700, fff00000c76da730) [ 21.483990] [ 21.484016] The buggy address belongs to the physical page: [ 21.484056] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.484118] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.484290] page_type: f5(slab) [ 21.484433] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.484598] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.484692] page dumped because: kasan: bad access detected [ 21.484740] [ 21.484762] Memory state around the buggy address: [ 21.484908] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.487301] kasan_check_range+0x100/0x1a8 [ 21.487831] [ 21.487853] Allocated by task 266: [ 21.487887] kasan_save_stack+0x3c/0x68 [ 21.488016] kasan_save_track+0x20/0x40 [ 21.488060] kasan_save_alloc_info+0x40/0x58 [ 21.488156] __kasan_kmalloc+0xd4/0xd8 [ 21.488200] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.488247] kasan_atomics+0xb8/0x2e0 [ 21.488289] kunit_try_run_case+0x170/0x3f0 [ 21.488332] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.488394] kthread+0x328/0x630 [ 21.488438] ret_from_fork+0x10/0x20 [ 21.488478] [ 21.488592] The buggy address belongs to the object at fff00000c76da700 [ 21.488592] which belongs to the cache kmalloc-64 of size 64 [ 21.488910] The buggy address is located 0 bytes to the right of [ 21.488910] allocated 48-byte region [fff00000c76da700, fff00000c76da730) [ 21.489234] [ 21.489259] The buggy address belongs to the physical page: [ 21.489391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.489596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.489743] page_type: f5(slab) [ 21.489887] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.489961] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.490047] page dumped because: kasan: bad access detected [ 21.490121] [ 21.490464] Memory state around the buggy address: [ 21.490511] fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.491017] fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.491334] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.491472] ^ [ 21.491553] fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.491613] fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.491659] ================================================================== [ 21.365674] ================================================================== [ 21.365834] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 21.366065] Write of size 4 at addr fff00000c76da730 by task kunit_try_catch/266 [ 21.366124] [ 21.366175] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.369327] page_type: f5(slab) [ 21.370269] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 21.374825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.379025] kasan_report+0xdc/0x128 [ 21.381353] [ 21.381575] page_type: f5(slab) [ 21.381962] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.386637] [ 21.387551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.388348] fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.391799] [ 21.392327] kthread+0x328/0x630 [ 21.392657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 21.394148] ^ [ 21.395469] [ 21.395669] Call trace: [ 21.397495] kthread+0x328/0x630 [ 21.399524] The buggy address is located 0 bytes to the right of [ 21.399524] allocated 48-byte region [fff00000c76da700, fff00000c76da730) [ 21.400290] page dumped because: kasan: bad access detected [ 21.404792] ==================================================================
[ 13.959825] ================================================================== [ 13.960059] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 13.960543] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 13.960936] [ 13.961026] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.961070] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.961083] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.961105] Call Trace: [ 13.961119] <TASK> [ 13.961135] dump_stack_lvl+0x73/0xb0 [ 13.961163] print_report+0xd1/0x650 [ 13.961186] ? __virt_addr_valid+0x1db/0x2d0 [ 13.961210] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.961231] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.961253] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.961275] kasan_report+0x141/0x180 [ 13.961298] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.961324] __asan_report_store4_noabort+0x1b/0x30 [ 13.961345] kasan_atomics_helper+0x4b6e/0x5450 [ 13.961368] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.961402] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.961428] ? kasan_atomics+0x152/0x310 [ 13.961454] kasan_atomics+0x1dc/0x310 [ 13.961476] ? __pfx_kasan_atomics+0x10/0x10 [ 13.961499] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 13.961527] ? __pfx_read_tsc+0x10/0x10 [ 13.961548] ? ktime_get_ts64+0x86/0x230 [ 13.961618] kunit_try_run_case+0x1a5/0x480 [ 13.961645] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.961669] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 13.961692] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.961715] ? __kthread_parkme+0x82/0x180 [ 13.961736] ? preempt_count_sub+0x50/0x80 [ 13.961760] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.961784] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.961807] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.961832] kthread+0x337/0x6f0 [ 13.961852] ? trace_preempt_on+0x20/0xc0 [ 13.961876] ? __pfx_kthread+0x10/0x10 [ 13.961897] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.961919] ? calculate_sigpending+0x7b/0xa0 [ 13.961943] ? __pfx_kthread+0x10/0x10 [ 13.961965] ret_from_fork+0x116/0x1d0 [ 13.961984] ? __pfx_kthread+0x10/0x10 [ 13.962004] ret_from_fork_asm+0x1a/0x30 [ 13.962035] </TASK> [ 13.962046] [ 13.970311] Allocated by task 282: [ 13.970528] kasan_save_stack+0x45/0x70 [ 13.970751] kasan_save_track+0x18/0x40 [ 13.970960] kasan_save_alloc_info+0x3b/0x50 [ 13.971424] __kasan_kmalloc+0xb7/0xc0 [ 13.971641] __kmalloc_cache_noprof+0x189/0x420 [ 13.971814] kasan_atomics+0x95/0x310 [ 13.971948] kunit_try_run_case+0x1a5/0x480 [ 13.972097] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.972348] kthread+0x337/0x6f0 [ 13.972558] ret_from_fork+0x116/0x1d0 [ 13.972887] ret_from_fork_asm+0x1a/0x30 [ 13.973064] [ 13.973138] The buggy address belongs to the object at ffff8881025a0d80 [ 13.973138] which belongs to the cache kmalloc-64 of size 64 [ 13.973504] The buggy address is located 0 bytes to the right of [ 13.973504] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 13.974563] [ 13.974675] The buggy address belongs to the physical page: [ 13.974936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 13.975268] flags: 0x200000000000000(node=0|zone=2) [ 13.975446] page_type: f5(slab) [ 13.975676] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.976118] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.976502] page dumped because: kasan: bad access detected [ 13.976678] [ 13.976748] Memory state around the buggy address: [ 13.976904] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.977152] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.977482] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.977808] ^ [ 13.978034] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.978495] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.978769] ================================================================== [ 14.316575] ================================================================== [ 14.317047] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 14.317440] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.317806] [ 14.318071] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.318125] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.318151] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.318175] Call Trace: [ 14.318196] <TASK> [ 14.318219] dump_stack_lvl+0x73/0xb0 [ 14.318279] print_report+0xd1/0x650 [ 14.318305] ? __virt_addr_valid+0x1db/0x2d0 [ 14.318360] ? kasan_atomics_helper+0xc70/0x5450 [ 14.318390] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.318413] ? kasan_atomics_helper+0xc70/0x5450 [ 14.318435] kasan_report+0x141/0x180 [ 14.318457] ? kasan_atomics_helper+0xc70/0x5450 [ 14.318484] kasan_check_range+0x10c/0x1c0 [ 14.318508] __kasan_check_write+0x18/0x20 [ 14.318527] kasan_atomics_helper+0xc70/0x5450 [ 14.318550] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.318583] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.318614] ? kasan_atomics+0x152/0x310 [ 14.318670] kasan_atomics+0x1dc/0x310 [ 14.318693] ? __pfx_kasan_atomics+0x10/0x10 [ 14.318727] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.318754] ? __pfx_read_tsc+0x10/0x10 [ 14.318777] ? ktime_get_ts64+0x86/0x230 [ 14.318831] kunit_try_run_case+0x1a5/0x480 [ 14.318857] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.318890] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.318913] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.318999] ? __kthread_parkme+0x82/0x180 [ 14.319024] ? preempt_count_sub+0x50/0x80 [ 14.319049] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.319074] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.319099] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.319121] kthread+0x337/0x6f0 [ 14.319143] ? trace_preempt_on+0x20/0xc0 [ 14.319170] ? __pfx_kthread+0x10/0x10 [ 14.319191] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.319213] ? calculate_sigpending+0x7b/0xa0 [ 14.319238] ? __pfx_kthread+0x10/0x10 [ 14.319259] ret_from_fork+0x116/0x1d0 [ 14.319279] ? __pfx_kthread+0x10/0x10 [ 14.319299] ret_from_fork_asm+0x1a/0x30 [ 14.319332] </TASK> [ 14.319345] [ 14.330450] Allocated by task 282: [ 14.330756] kasan_save_stack+0x45/0x70 [ 14.331110] kasan_save_track+0x18/0x40 [ 14.331314] kasan_save_alloc_info+0x3b/0x50 [ 14.331588] __kasan_kmalloc+0xb7/0xc0 [ 14.331781] __kmalloc_cache_noprof+0x189/0x420 [ 14.332165] kasan_atomics+0x95/0x310 [ 14.332321] kunit_try_run_case+0x1a5/0x480 [ 14.332607] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.332890] kthread+0x337/0x6f0 [ 14.333402] ret_from_fork+0x116/0x1d0 [ 14.333555] ret_from_fork_asm+0x1a/0x30 [ 14.333753] [ 14.334053] The buggy address belongs to the object at ffff8881025a0d80 [ 14.334053] which belongs to the cache kmalloc-64 of size 64 [ 14.334570] The buggy address is located 0 bytes to the right of [ 14.334570] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.335435] [ 14.335517] The buggy address belongs to the physical page: [ 14.335905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.336388] flags: 0x200000000000000(node=0|zone=2) [ 14.336653] page_type: f5(slab) [ 14.336847] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.337363] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.338208] page dumped because: kasan: bad access detected [ 14.338525] [ 14.338613] Memory state around the buggy address: [ 14.338999] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.339359] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.339649] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.340016] ^ [ 14.340449] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.340782] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.341194] ================================================================== [ 14.646953] ================================================================== [ 14.647629] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 14.648390] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.649102] [ 14.649476] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.649525] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.649538] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.649561] Call Trace: [ 14.649578] <TASK> [ 14.649629] dump_stack_lvl+0x73/0xb0 [ 14.649659] print_report+0xd1/0x650 [ 14.649683] ? __virt_addr_valid+0x1db/0x2d0 [ 14.649707] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.649731] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.649754] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.649778] kasan_report+0x141/0x180 [ 14.649800] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.649827] kasan_check_range+0x10c/0x1c0 [ 14.649851] __kasan_check_write+0x18/0x20 [ 14.649871] kasan_atomics_helper+0x12e6/0x5450 [ 14.649894] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.649916] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.649943] ? kasan_atomics+0x152/0x310 [ 14.649971] kasan_atomics+0x1dc/0x310 [ 14.649994] ? __pfx_kasan_atomics+0x10/0x10 [ 14.650015] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.650042] ? __pfx_read_tsc+0x10/0x10 [ 14.650065] ? ktime_get_ts64+0x86/0x230 [ 14.650090] kunit_try_run_case+0x1a5/0x480 [ 14.650115] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.650138] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.650160] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.650184] ? __kthread_parkme+0x82/0x180 [ 14.650205] ? preempt_count_sub+0x50/0x80 [ 14.650229] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.650253] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.650276] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.650300] kthread+0x337/0x6f0 [ 14.650320] ? trace_preempt_on+0x20/0xc0 [ 14.650345] ? __pfx_kthread+0x10/0x10 [ 14.650366] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.650399] ? calculate_sigpending+0x7b/0xa0 [ 14.650423] ? __pfx_kthread+0x10/0x10 [ 14.650445] ret_from_fork+0x116/0x1d0 [ 14.650464] ? __pfx_kthread+0x10/0x10 [ 14.650484] ret_from_fork_asm+0x1a/0x30 [ 14.650515] </TASK> [ 14.650528] [ 14.663556] Allocated by task 282: [ 14.663736] kasan_save_stack+0x45/0x70 [ 14.664126] kasan_save_track+0x18/0x40 [ 14.664434] kasan_save_alloc_info+0x3b/0x50 [ 14.664811] __kasan_kmalloc+0xb7/0xc0 [ 14.665243] __kmalloc_cache_noprof+0x189/0x420 [ 14.665486] kasan_atomics+0x95/0x310 [ 14.665946] kunit_try_run_case+0x1a5/0x480 [ 14.666428] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.666672] kthread+0x337/0x6f0 [ 14.666841] ret_from_fork+0x116/0x1d0 [ 14.667223] ret_from_fork_asm+0x1a/0x30 [ 14.667567] [ 14.667806] The buggy address belongs to the object at ffff8881025a0d80 [ 14.667806] which belongs to the cache kmalloc-64 of size 64 [ 14.668584] The buggy address is located 0 bytes to the right of [ 14.668584] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.669548] [ 14.669782] The buggy address belongs to the physical page: [ 14.670236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.670800] flags: 0x200000000000000(node=0|zone=2) [ 14.671216] page_type: f5(slab) [ 14.671495] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.672106] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.672425] page dumped because: kasan: bad access detected [ 14.672959] [ 14.673207] Memory state around the buggy address: [ 14.673483] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.674179] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.674486] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.674944] ^ [ 14.675370] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.675989] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.676355] ================================================================== [ 14.894427] ================================================================== [ 14.894804] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 14.895270] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.895582] [ 14.895665] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.895716] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.895763] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.895784] Call Trace: [ 14.895799] <TASK> [ 14.895815] dump_stack_lvl+0x73/0xb0 [ 14.895860] print_report+0xd1/0x650 [ 14.895883] ? __virt_addr_valid+0x1db/0x2d0 [ 14.895905] ? kasan_atomics_helper+0x1818/0x5450 [ 14.895937] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.895959] ? kasan_atomics_helper+0x1818/0x5450 [ 14.895981] kasan_report+0x141/0x180 [ 14.896003] ? kasan_atomics_helper+0x1818/0x5450 [ 14.896045] kasan_check_range+0x10c/0x1c0 [ 14.896069] __kasan_check_write+0x18/0x20 [ 14.896089] kasan_atomics_helper+0x1818/0x5450 [ 14.896112] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.896135] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.896160] ? kasan_atomics+0x152/0x310 [ 14.896187] kasan_atomics+0x1dc/0x310 [ 14.896209] ? __pfx_kasan_atomics+0x10/0x10 [ 14.896232] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.896258] ? __pfx_read_tsc+0x10/0x10 [ 14.896280] ? ktime_get_ts64+0x86/0x230 [ 14.896306] kunit_try_run_case+0x1a5/0x480 [ 14.896330] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.896353] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.896387] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.896414] ? __kthread_parkme+0x82/0x180 [ 14.896435] ? preempt_count_sub+0x50/0x80 [ 14.896459] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.896483] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.896507] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.896532] kthread+0x337/0x6f0 [ 14.896552] ? trace_preempt_on+0x20/0xc0 [ 14.896586] ? __pfx_kthread+0x10/0x10 [ 14.896627] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.896649] ? calculate_sigpending+0x7b/0xa0 [ 14.896673] ? __pfx_kthread+0x10/0x10 [ 14.896695] ret_from_fork+0x116/0x1d0 [ 14.896714] ? __pfx_kthread+0x10/0x10 [ 14.896735] ret_from_fork_asm+0x1a/0x30 [ 14.896764] </TASK> [ 14.896793] [ 14.904422] Allocated by task 282: [ 14.904641] kasan_save_stack+0x45/0x70 [ 14.904860] kasan_save_track+0x18/0x40 [ 14.905071] kasan_save_alloc_info+0x3b/0x50 [ 14.905286] __kasan_kmalloc+0xb7/0xc0 [ 14.905482] __kmalloc_cache_noprof+0x189/0x420 [ 14.905829] kasan_atomics+0x95/0x310 [ 14.906030] kunit_try_run_case+0x1a5/0x480 [ 14.906340] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.906581] kthread+0x337/0x6f0 [ 14.906705] ret_from_fork+0x116/0x1d0 [ 14.906836] ret_from_fork_asm+0x1a/0x30 [ 14.906971] [ 14.907042] The buggy address belongs to the object at ffff8881025a0d80 [ 14.907042] which belongs to the cache kmalloc-64 of size 64 [ 14.907551] The buggy address is located 0 bytes to the right of [ 14.907551] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.908004] [ 14.908079] The buggy address belongs to the physical page: [ 14.908252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.908563] flags: 0x200000000000000(node=0|zone=2) [ 14.908825] page_type: f5(slab) [ 14.908992] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.909350] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.909857] page dumped because: kasan: bad access detected [ 14.910111] [ 14.910202] Memory state around the buggy address: [ 14.910431] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.910807] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.911096] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.911416] ^ [ 14.911582] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.911796] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.912255] ================================================================== [ 15.119212] ================================================================== [ 15.119787] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 15.120545] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 15.120892] [ 15.121028] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.121071] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.121085] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.121106] Call Trace: [ 15.121121] <TASK> [ 15.121147] dump_stack_lvl+0x73/0xb0 [ 15.121179] print_report+0xd1/0x650 [ 15.121203] ? __virt_addr_valid+0x1db/0x2d0 [ 15.121237] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.121259] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.121281] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.121312] kasan_report+0x141/0x180 [ 15.121335] ? kasan_atomics_helper+0x1eaa/0x5450 [ 15.121362] kasan_check_range+0x10c/0x1c0 [ 15.121406] __kasan_check_write+0x18/0x20 [ 15.121426] kasan_atomics_helper+0x1eaa/0x5450 [ 15.121449] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.121479] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.121505] ? kasan_atomics+0x152/0x310 [ 15.121531] kasan_atomics+0x1dc/0x310 [ 15.121565] ? __pfx_kasan_atomics+0x10/0x10 [ 15.121598] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.121625] ? __pfx_read_tsc+0x10/0x10 [ 15.121647] ? ktime_get_ts64+0x86/0x230 [ 15.121680] kunit_try_run_case+0x1a5/0x480 [ 15.121705] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.121738] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.121761] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.121784] ? __kthread_parkme+0x82/0x180 [ 15.121805] ? preempt_count_sub+0x50/0x80 [ 15.121837] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.121861] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.121885] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.121920] kthread+0x337/0x6f0 [ 15.121939] ? trace_preempt_on+0x20/0xc0 [ 15.121963] ? __pfx_kthread+0x10/0x10 [ 15.121985] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.122015] ? calculate_sigpending+0x7b/0xa0 [ 15.122040] ? __pfx_kthread+0x10/0x10 [ 15.122062] ret_from_fork+0x116/0x1d0 [ 15.122090] ? __pfx_kthread+0x10/0x10 [ 15.122111] ret_from_fork_asm+0x1a/0x30 [ 15.122142] </TASK> [ 15.122154] [ 15.130057] Allocated by task 282: [ 15.130189] kasan_save_stack+0x45/0x70 [ 15.130341] kasan_save_track+0x18/0x40 [ 15.130576] kasan_save_alloc_info+0x3b/0x50 [ 15.130817] __kasan_kmalloc+0xb7/0xc0 [ 15.131007] __kmalloc_cache_noprof+0x189/0x420 [ 15.131231] kasan_atomics+0x95/0x310 [ 15.131431] kunit_try_run_case+0x1a5/0x480 [ 15.131704] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.131886] kthread+0x337/0x6f0 [ 15.132013] ret_from_fork+0x116/0x1d0 [ 15.132146] ret_from_fork_asm+0x1a/0x30 [ 15.132301] [ 15.132425] The buggy address belongs to the object at ffff8881025a0d80 [ 15.132425] which belongs to the cache kmalloc-64 of size 64 [ 15.133008] The buggy address is located 0 bytes to the right of [ 15.133008] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 15.133608] [ 15.133709] The buggy address belongs to the physical page: [ 15.133964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 15.134313] flags: 0x200000000000000(node=0|zone=2) [ 15.134566] page_type: f5(slab) [ 15.134735] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.135084] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.135423] page dumped because: kasan: bad access detected [ 15.135769] [ 15.135848] Memory state around the buggy address: [ 15.136004] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.136221] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.136586] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.136902] ^ [ 15.137090] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.137308] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.137660] ================================================================== [ 14.796788] ================================================================== [ 14.797272] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 14.797762] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.798100] [ 14.798201] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.798242] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.798255] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.798277] Call Trace: [ 14.798292] <TASK> [ 14.798309] dump_stack_lvl+0x73/0xb0 [ 14.798336] print_report+0xd1/0x650 [ 14.798359] ? __virt_addr_valid+0x1db/0x2d0 [ 14.798394] ? kasan_atomics_helper+0x151d/0x5450 [ 14.798415] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.798437] ? kasan_atomics_helper+0x151d/0x5450 [ 14.798480] kasan_report+0x141/0x180 [ 14.798516] ? kasan_atomics_helper+0x151d/0x5450 [ 14.798554] kasan_check_range+0x10c/0x1c0 [ 14.798596] __kasan_check_write+0x18/0x20 [ 14.798616] kasan_atomics_helper+0x151d/0x5450 [ 14.798639] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.798662] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.798686] ? kasan_atomics+0x152/0x310 [ 14.798713] kasan_atomics+0x1dc/0x310 [ 14.798735] ? __pfx_kasan_atomics+0x10/0x10 [ 14.798758] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.798803] ? __pfx_read_tsc+0x10/0x10 [ 14.798824] ? ktime_get_ts64+0x86/0x230 [ 14.798850] kunit_try_run_case+0x1a5/0x480 [ 14.798888] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.798911] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.798934] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.798957] ? __kthread_parkme+0x82/0x180 [ 14.798976] ? preempt_count_sub+0x50/0x80 [ 14.799001] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.799025] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.799048] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.799072] kthread+0x337/0x6f0 [ 14.799091] ? trace_preempt_on+0x20/0xc0 [ 14.799115] ? __pfx_kthread+0x10/0x10 [ 14.799135] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.799157] ? calculate_sigpending+0x7b/0xa0 [ 14.799181] ? __pfx_kthread+0x10/0x10 [ 14.799202] ret_from_fork+0x116/0x1d0 [ 14.799220] ? __pfx_kthread+0x10/0x10 [ 14.799242] ret_from_fork_asm+0x1a/0x30 [ 14.799271] </TASK> [ 14.799282] [ 14.807276] Allocated by task 282: [ 14.807463] kasan_save_stack+0x45/0x70 [ 14.807681] kasan_save_track+0x18/0x40 [ 14.807859] kasan_save_alloc_info+0x3b/0x50 [ 14.808065] __kasan_kmalloc+0xb7/0xc0 [ 14.808233] __kmalloc_cache_noprof+0x189/0x420 [ 14.808402] kasan_atomics+0x95/0x310 [ 14.808602] kunit_try_run_case+0x1a5/0x480 [ 14.808811] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.809085] kthread+0x337/0x6f0 [ 14.809275] ret_from_fork+0x116/0x1d0 [ 14.809456] ret_from_fork_asm+0x1a/0x30 [ 14.809682] [ 14.809801] The buggy address belongs to the object at ffff8881025a0d80 [ 14.809801] which belongs to the cache kmalloc-64 of size 64 [ 14.810297] The buggy address is located 0 bytes to the right of [ 14.810297] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.810883] [ 14.810984] The buggy address belongs to the physical page: [ 14.811179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.811447] flags: 0x200000000000000(node=0|zone=2) [ 14.811732] page_type: f5(slab) [ 14.811896] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.812174] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.812413] page dumped because: kasan: bad access detected [ 14.812759] [ 14.812876] Memory state around the buggy address: [ 14.813115] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.813466] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.813815] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.814101] ^ [ 14.814332] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.814694] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.814962] ================================================================== [ 14.618596] ================================================================== [ 14.618942] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 14.619267] Read of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.619756] [ 14.620124] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.620182] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.620199] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.620221] Call Trace: [ 14.620243] <TASK> [ 14.620272] dump_stack_lvl+0x73/0xb0 [ 14.620303] print_report+0xd1/0x650 [ 14.620330] ? __virt_addr_valid+0x1db/0x2d0 [ 14.620356] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.620387] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.620414] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.620435] kasan_report+0x141/0x180 [ 14.620459] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.620485] __asan_report_load4_noabort+0x18/0x20 [ 14.620510] kasan_atomics_helper+0x49e8/0x5450 [ 14.620533] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.620555] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.620628] ? kasan_atomics+0x152/0x310 [ 14.620655] kasan_atomics+0x1dc/0x310 [ 14.620677] ? __pfx_kasan_atomics+0x10/0x10 [ 14.620700] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.620727] ? __pfx_read_tsc+0x10/0x10 [ 14.620749] ? ktime_get_ts64+0x86/0x230 [ 14.620774] kunit_try_run_case+0x1a5/0x480 [ 14.620802] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.620825] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.620849] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.620872] ? __kthread_parkme+0x82/0x180 [ 14.620895] ? preempt_count_sub+0x50/0x80 [ 14.620940] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.620964] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.620988] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.621012] kthread+0x337/0x6f0 [ 14.621032] ? trace_preempt_on+0x20/0xc0 [ 14.621058] ? __pfx_kthread+0x10/0x10 [ 14.621080] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.621101] ? calculate_sigpending+0x7b/0xa0 [ 14.621126] ? __pfx_kthread+0x10/0x10 [ 14.621147] ret_from_fork+0x116/0x1d0 [ 14.621167] ? __pfx_kthread+0x10/0x10 [ 14.621187] ret_from_fork_asm+0x1a/0x30 [ 14.621219] </TASK> [ 14.621231] [ 14.634121] Allocated by task 282: [ 14.634503] kasan_save_stack+0x45/0x70 [ 14.634739] kasan_save_track+0x18/0x40 [ 14.635066] kasan_save_alloc_info+0x3b/0x50 [ 14.635327] __kasan_kmalloc+0xb7/0xc0 [ 14.635655] __kmalloc_cache_noprof+0x189/0x420 [ 14.635869] kasan_atomics+0x95/0x310 [ 14.636441] kunit_try_run_case+0x1a5/0x480 [ 14.636733] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.637340] kthread+0x337/0x6f0 [ 14.637647] ret_from_fork+0x116/0x1d0 [ 14.637839] ret_from_fork_asm+0x1a/0x30 [ 14.638186] [ 14.638428] The buggy address belongs to the object at ffff8881025a0d80 [ 14.638428] which belongs to the cache kmalloc-64 of size 64 [ 14.639443] The buggy address is located 0 bytes to the right of [ 14.639443] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.640330] [ 14.640581] The buggy address belongs to the physical page: [ 14.641109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.641687] flags: 0x200000000000000(node=0|zone=2) [ 14.642051] page_type: f5(slab) [ 14.642189] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.642509] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.643445] page dumped because: kasan: bad access detected [ 14.643885] [ 14.643961] Memory state around the buggy address: [ 14.644174] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.644405] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.644620] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.644828] ^ [ 14.644980] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.645192] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.645757] ================================================================== [ 13.920994] ================================================================== [ 13.921412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 13.921757] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 13.922125] [ 13.922214] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.922259] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.922271] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.922292] Call Trace: [ 13.922309] <TASK> [ 13.922325] dump_stack_lvl+0x73/0xb0 [ 13.922353] print_report+0xd1/0x650 [ 13.922388] ? __virt_addr_valid+0x1db/0x2d0 [ 13.922411] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.922430] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.922452] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.922473] kasan_report+0x141/0x180 [ 13.922494] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.922519] __asan_report_store4_noabort+0x1b/0x30 [ 13.922539] kasan_atomics_helper+0x4ba2/0x5450 [ 13.922561] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.922582] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.922606] ? kasan_atomics+0x152/0x310 [ 13.922631] kasan_atomics+0x1dc/0x310 [ 13.922653] ? __pfx_kasan_atomics+0x10/0x10 [ 13.922674] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 13.922700] ? __pfx_read_tsc+0x10/0x10 [ 13.922720] ? ktime_get_ts64+0x86/0x230 [ 13.922744] kunit_try_run_case+0x1a5/0x480 [ 13.922768] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.922790] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 13.922811] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.922835] ? __kthread_parkme+0x82/0x180 [ 13.922856] ? preempt_count_sub+0x50/0x80 [ 13.922880] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.922904] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.922926] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.922948] kthread+0x337/0x6f0 [ 13.922967] ? trace_preempt_on+0x20/0xc0 [ 13.922993] ? __pfx_kthread+0x10/0x10 [ 13.923012] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.923034] ? calculate_sigpending+0x7b/0xa0 [ 13.923057] ? __pfx_kthread+0x10/0x10 [ 13.923078] ret_from_fork+0x116/0x1d0 [ 13.923096] ? __pfx_kthread+0x10/0x10 [ 13.923116] ret_from_fork_asm+0x1a/0x30 [ 13.923146] </TASK> [ 13.923157] [ 13.931164] Allocated by task 282: [ 13.931302] kasan_save_stack+0x45/0x70 [ 13.931519] kasan_save_track+0x18/0x40 [ 13.931731] kasan_save_alloc_info+0x3b/0x50 [ 13.931959] __kasan_kmalloc+0xb7/0xc0 [ 13.932119] __kmalloc_cache_noprof+0x189/0x420 [ 13.932327] kasan_atomics+0x95/0x310 [ 13.932494] kunit_try_run_case+0x1a5/0x480 [ 13.932642] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.932860] kthread+0x337/0x6f0 [ 13.933025] ret_from_fork+0x116/0x1d0 [ 13.933211] ret_from_fork_asm+0x1a/0x30 [ 13.933623] [ 13.933705] The buggy address belongs to the object at ffff8881025a0d80 [ 13.933705] which belongs to the cache kmalloc-64 of size 64 [ 13.934321] The buggy address is located 0 bytes to the right of [ 13.934321] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 13.934810] [ 13.934885] The buggy address belongs to the physical page: [ 13.935058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 13.935297] flags: 0x200000000000000(node=0|zone=2) [ 13.935533] page_type: f5(slab) [ 13.935702] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.936305] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.936591] page dumped because: kasan: bad access detected [ 13.936841] [ 13.936944] Memory state around the buggy address: [ 13.937170] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.937488] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.938101] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.938411] ^ [ 13.938601] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.938905] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.939149] ================================================================== [ 15.244005] ================================================================== [ 15.244334] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 15.245508] Read of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 15.245757] [ 15.245854] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.245903] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.245916] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.245941] Call Trace: [ 15.245955] <TASK> [ 15.245974] dump_stack_lvl+0x73/0xb0 [ 15.246007] print_report+0xd1/0x650 [ 15.246033] ? __virt_addr_valid+0x1db/0x2d0 [ 15.246059] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.246082] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.246104] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.246128] kasan_report+0x141/0x180 [ 15.246151] ? kasan_atomics_helper+0x4fb2/0x5450 [ 15.246177] __asan_report_load8_noabort+0x18/0x20 [ 15.246202] kasan_atomics_helper+0x4fb2/0x5450 [ 15.246226] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.246247] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.246273] ? kasan_atomics+0x152/0x310 [ 15.246299] kasan_atomics+0x1dc/0x310 [ 15.246323] ? __pfx_kasan_atomics+0x10/0x10 [ 15.246344] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.246372] ? __pfx_read_tsc+0x10/0x10 [ 15.246406] ? ktime_get_ts64+0x86/0x230 [ 15.246432] kunit_try_run_case+0x1a5/0x480 [ 15.246457] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.246479] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.246503] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.246526] ? __kthread_parkme+0x82/0x180 [ 15.246547] ? preempt_count_sub+0x50/0x80 [ 15.246573] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.246597] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.246654] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.246677] kthread+0x337/0x6f0 [ 15.246697] ? trace_preempt_on+0x20/0xc0 [ 15.246726] ? __pfx_kthread+0x10/0x10 [ 15.246749] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.246773] ? calculate_sigpending+0x7b/0xa0 [ 15.246798] ? __pfx_kthread+0x10/0x10 [ 15.246820] ret_from_fork+0x116/0x1d0 [ 15.246839] ? __pfx_kthread+0x10/0x10 [ 15.246859] ret_from_fork_asm+0x1a/0x30 [ 15.246892] </TASK> [ 15.246905] [ 15.257681] Allocated by task 282: [ 15.258042] kasan_save_stack+0x45/0x70 [ 15.258467] kasan_save_track+0x18/0x40 [ 15.258874] kasan_save_alloc_info+0x3b/0x50 [ 15.259266] __kasan_kmalloc+0xb7/0xc0 [ 15.259663] __kmalloc_cache_noprof+0x189/0x420 [ 15.260074] kasan_atomics+0x95/0x310 [ 15.260429] kunit_try_run_case+0x1a5/0x480 [ 15.260829] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.261312] kthread+0x337/0x6f0 [ 15.261629] ret_from_fork+0x116/0x1d0 [ 15.261937] ret_from_fork_asm+0x1a/0x30 [ 15.262080] [ 15.262153] The buggy address belongs to the object at ffff8881025a0d80 [ 15.262153] which belongs to the cache kmalloc-64 of size 64 [ 15.262516] The buggy address is located 0 bytes to the right of [ 15.262516] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 15.262972] [ 15.263070] The buggy address belongs to the physical page: [ 15.263320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 15.263604] flags: 0x200000000000000(node=0|zone=2) [ 15.263875] page_type: f5(slab) [ 15.264049] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.264353] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.264673] page dumped because: kasan: bad access detected [ 15.264965] [ 15.265041] Memory state around the buggy address: [ 15.265225] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.265564] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.265841] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.266168] ^ [ 15.266384] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.266721] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.267004] ================================================================== [ 14.492987] ================================================================== [ 14.493212] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 14.493955] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.494286] [ 14.494401] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.494443] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.494455] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.494476] Call Trace: [ 14.494491] <TASK> [ 14.494508] dump_stack_lvl+0x73/0xb0 [ 14.494535] print_report+0xd1/0x650 [ 14.494571] ? __virt_addr_valid+0x1db/0x2d0 [ 14.494595] ? kasan_atomics_helper+0x1079/0x5450 [ 14.494623] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.494645] ? kasan_atomics_helper+0x1079/0x5450 [ 14.494667] kasan_report+0x141/0x180 [ 14.494690] ? kasan_atomics_helper+0x1079/0x5450 [ 14.494717] kasan_check_range+0x10c/0x1c0 [ 14.494742] __kasan_check_write+0x18/0x20 [ 14.494762] kasan_atomics_helper+0x1079/0x5450 [ 14.494786] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.494811] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.494836] ? kasan_atomics+0x152/0x310 [ 14.494864] kasan_atomics+0x1dc/0x310 [ 14.494888] ? __pfx_kasan_atomics+0x10/0x10 [ 14.494912] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.494950] ? __pfx_read_tsc+0x10/0x10 [ 14.494970] ? ktime_get_ts64+0x86/0x230 [ 14.494995] kunit_try_run_case+0x1a5/0x480 [ 14.495019] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.495043] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.495066] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.495089] ? __kthread_parkme+0x82/0x180 [ 14.495110] ? preempt_count_sub+0x50/0x80 [ 14.495135] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.495159] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.495185] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.495208] kthread+0x337/0x6f0 [ 14.495228] ? trace_preempt_on+0x20/0xc0 [ 14.495264] ? __pfx_kthread+0x10/0x10 [ 14.495285] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.495306] ? calculate_sigpending+0x7b/0xa0 [ 14.495342] ? __pfx_kthread+0x10/0x10 [ 14.495364] ret_from_fork+0x116/0x1d0 [ 14.495391] ? __pfx_kthread+0x10/0x10 [ 14.495412] ret_from_fork_asm+0x1a/0x30 [ 14.495443] </TASK> [ 14.495455] [ 14.505311] Allocated by task 282: [ 14.505560] kasan_save_stack+0x45/0x70 [ 14.505878] kasan_save_track+0x18/0x40 [ 14.506021] kasan_save_alloc_info+0x3b/0x50 [ 14.506429] __kasan_kmalloc+0xb7/0xc0 [ 14.506683] __kmalloc_cache_noprof+0x189/0x420 [ 14.506922] kasan_atomics+0x95/0x310 [ 14.507190] kunit_try_run_case+0x1a5/0x480 [ 14.507423] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.507700] kthread+0x337/0x6f0 [ 14.507896] ret_from_fork+0x116/0x1d0 [ 14.508132] ret_from_fork_asm+0x1a/0x30 [ 14.508422] [ 14.508571] The buggy address belongs to the object at ffff8881025a0d80 [ 14.508571] which belongs to the cache kmalloc-64 of size 64 [ 14.509183] The buggy address is located 0 bytes to the right of [ 14.509183] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.509808] [ 14.509920] The buggy address belongs to the physical page: [ 14.510205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.510585] flags: 0x200000000000000(node=0|zone=2) [ 14.510821] page_type: f5(slab) [ 14.511023] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.511406] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.511790] page dumped because: kasan: bad access detected [ 14.512245] [ 14.512337] Memory state around the buggy address: [ 14.512565] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.513244] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.513559] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.513775] ^ [ 14.513923] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.514129] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.514330] ================================================================== [ 14.291231] ================================================================== [ 14.291543] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 14.291887] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.292489] [ 14.292593] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.292641] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.292653] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.292676] Call Trace: [ 14.292696] <TASK> [ 14.292718] dump_stack_lvl+0x73/0xb0 [ 14.292750] print_report+0xd1/0x650 [ 14.292776] ? __virt_addr_valid+0x1db/0x2d0 [ 14.292799] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.292856] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.292895] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.292980] kasan_report+0x141/0x180 [ 14.293006] ? kasan_atomics_helper+0xb6a/0x5450 [ 14.293033] kasan_check_range+0x10c/0x1c0 [ 14.293057] __kasan_check_write+0x18/0x20 [ 14.293077] kasan_atomics_helper+0xb6a/0x5450 [ 14.293100] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.293122] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.293185] ? kasan_atomics+0x152/0x310 [ 14.293213] kasan_atomics+0x1dc/0x310 [ 14.293236] ? __pfx_kasan_atomics+0x10/0x10 [ 14.293270] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.293296] ? __pfx_read_tsc+0x10/0x10 [ 14.293347] ? ktime_get_ts64+0x86/0x230 [ 14.293389] kunit_try_run_case+0x1a5/0x480 [ 14.293415] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.293438] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.293460] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.293484] ? __kthread_parkme+0x82/0x180 [ 14.293505] ? preempt_count_sub+0x50/0x80 [ 14.293530] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.293555] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.293590] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.293613] kthread+0x337/0x6f0 [ 14.293634] ? trace_preempt_on+0x20/0xc0 [ 14.293659] ? __pfx_kthread+0x10/0x10 [ 14.293680] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.293702] ? calculate_sigpending+0x7b/0xa0 [ 14.293726] ? __pfx_kthread+0x10/0x10 [ 14.293748] ret_from_fork+0x116/0x1d0 [ 14.293767] ? __pfx_kthread+0x10/0x10 [ 14.293788] ret_from_fork_asm+0x1a/0x30 [ 14.293820] </TASK> [ 14.293834] [ 14.304302] Allocated by task 282: [ 14.304476] kasan_save_stack+0x45/0x70 [ 14.305033] kasan_save_track+0x18/0x40 [ 14.305249] kasan_save_alloc_info+0x3b/0x50 [ 14.305568] __kasan_kmalloc+0xb7/0xc0 [ 14.305728] __kmalloc_cache_noprof+0x189/0x420 [ 14.306050] kasan_atomics+0x95/0x310 [ 14.306266] kunit_try_run_case+0x1a5/0x480 [ 14.306521] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.306806] kthread+0x337/0x6f0 [ 14.307098] ret_from_fork+0x116/0x1d0 [ 14.307335] ret_from_fork_asm+0x1a/0x30 [ 14.307561] [ 14.307701] The buggy address belongs to the object at ffff8881025a0d80 [ 14.307701] which belongs to the cache kmalloc-64 of size 64 [ 14.308612] The buggy address is located 0 bytes to the right of [ 14.308612] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.309327] [ 14.309446] The buggy address belongs to the physical page: [ 14.309775] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.310296] flags: 0x200000000000000(node=0|zone=2) [ 14.310486] page_type: f5(slab) [ 14.310636] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.311095] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.311494] page dumped because: kasan: bad access detected [ 14.311867] [ 14.312101] Memory state around the buggy address: [ 14.312866] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.313341] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.314184] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.314916] ^ [ 14.315081] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.315300] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.315538] ================================================================== [ 14.514654] ================================================================== [ 14.514984] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 14.515315] Read of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.515989] [ 14.516099] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.516176] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.516189] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.516210] Call Trace: [ 14.516252] <TASK> [ 14.516281] dump_stack_lvl+0x73/0xb0 [ 14.516321] print_report+0xd1/0x650 [ 14.516358] ? __virt_addr_valid+0x1db/0x2d0 [ 14.516411] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.516456] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.516497] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.516530] kasan_report+0x141/0x180 [ 14.516553] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.516590] __asan_report_load4_noabort+0x18/0x20 [ 14.516614] kasan_atomics_helper+0x4a1c/0x5450 [ 14.516638] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.516661] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.516687] ? kasan_atomics+0x152/0x310 [ 14.516732] kasan_atomics+0x1dc/0x310 [ 14.516765] ? __pfx_kasan_atomics+0x10/0x10 [ 14.516788] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.516824] ? __pfx_read_tsc+0x10/0x10 [ 14.516846] ? ktime_get_ts64+0x86/0x230 [ 14.516870] kunit_try_run_case+0x1a5/0x480 [ 14.516895] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.516918] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.516941] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.516964] ? __kthread_parkme+0x82/0x180 [ 14.516985] ? preempt_count_sub+0x50/0x80 [ 14.517008] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.517032] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.517081] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.517105] kthread+0x337/0x6f0 [ 14.517125] ? trace_preempt_on+0x20/0xc0 [ 14.517158] ? __pfx_kthread+0x10/0x10 [ 14.517180] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.517202] ? calculate_sigpending+0x7b/0xa0 [ 14.517225] ? __pfx_kthread+0x10/0x10 [ 14.517247] ret_from_fork+0x116/0x1d0 [ 14.517265] ? __pfx_kthread+0x10/0x10 [ 14.517286] ret_from_fork_asm+0x1a/0x30 [ 14.517317] </TASK> [ 14.517329] [ 14.526342] Allocated by task 282: [ 14.526559] kasan_save_stack+0x45/0x70 [ 14.526882] kasan_save_track+0x18/0x40 [ 14.527228] kasan_save_alloc_info+0x3b/0x50 [ 14.527413] __kasan_kmalloc+0xb7/0xc0 [ 14.527608] __kmalloc_cache_noprof+0x189/0x420 [ 14.527811] kasan_atomics+0x95/0x310 [ 14.527986] kunit_try_run_case+0x1a5/0x480 [ 14.528286] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.528575] kthread+0x337/0x6f0 [ 14.528719] ret_from_fork+0x116/0x1d0 [ 14.529036] ret_from_fork_asm+0x1a/0x30 [ 14.529221] [ 14.529333] The buggy address belongs to the object at ffff8881025a0d80 [ 14.529333] which belongs to the cache kmalloc-64 of size 64 [ 14.529805] The buggy address is located 0 bytes to the right of [ 14.529805] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.530397] [ 14.530520] The buggy address belongs to the physical page: [ 14.530824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.531256] flags: 0x200000000000000(node=0|zone=2) [ 14.531518] page_type: f5(slab) [ 14.531681] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.532011] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.532336] page dumped because: kasan: bad access detected [ 14.532590] [ 14.532684] Memory state around the buggy address: [ 14.532899] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.533226] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.533501] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.533922] ^ [ 14.534071] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.534277] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.534732] ================================================================== [ 14.177804] ================================================================== [ 14.178159] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 14.178505] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.178903] [ 14.179047] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.179108] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.179122] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.179162] Call Trace: [ 14.179178] <TASK> [ 14.179196] dump_stack_lvl+0x73/0xb0 [ 14.179250] print_report+0xd1/0x650 [ 14.179275] ? __virt_addr_valid+0x1db/0x2d0 [ 14.179299] ? kasan_atomics_helper+0x860/0x5450 [ 14.179320] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.179343] ? kasan_atomics_helper+0x860/0x5450 [ 14.179364] kasan_report+0x141/0x180 [ 14.179397] ? kasan_atomics_helper+0x860/0x5450 [ 14.179424] kasan_check_range+0x10c/0x1c0 [ 14.179448] __kasan_check_write+0x18/0x20 [ 14.179468] kasan_atomics_helper+0x860/0x5450 [ 14.179508] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.179531] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.179575] ? kasan_atomics+0x152/0x310 [ 14.179602] kasan_atomics+0x1dc/0x310 [ 14.179625] ? __pfx_kasan_atomics+0x10/0x10 [ 14.179648] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.179674] ? __pfx_read_tsc+0x10/0x10 [ 14.179696] ? ktime_get_ts64+0x86/0x230 [ 14.179721] kunit_try_run_case+0x1a5/0x480 [ 14.179746] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.179768] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.179806] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.179842] ? __kthread_parkme+0x82/0x180 [ 14.179876] ? preempt_count_sub+0x50/0x80 [ 14.179901] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.179957] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.179993] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.180030] kthread+0x337/0x6f0 [ 14.180051] ? trace_preempt_on+0x20/0xc0 [ 14.180075] ? __pfx_kthread+0x10/0x10 [ 14.180096] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.180118] ? calculate_sigpending+0x7b/0xa0 [ 14.180142] ? __pfx_kthread+0x10/0x10 [ 14.180163] ret_from_fork+0x116/0x1d0 [ 14.180182] ? __pfx_kthread+0x10/0x10 [ 14.180203] ret_from_fork_asm+0x1a/0x30 [ 14.180233] </TASK> [ 14.180245] [ 14.189113] Allocated by task 282: [ 14.189348] kasan_save_stack+0x45/0x70 [ 14.189523] kasan_save_track+0x18/0x40 [ 14.189878] kasan_save_alloc_info+0x3b/0x50 [ 14.190234] __kasan_kmalloc+0xb7/0xc0 [ 14.190513] __kmalloc_cache_noprof+0x189/0x420 [ 14.190742] kasan_atomics+0x95/0x310 [ 14.190930] kunit_try_run_case+0x1a5/0x480 [ 14.191115] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.191290] kthread+0x337/0x6f0 [ 14.191464] ret_from_fork+0x116/0x1d0 [ 14.191654] ret_from_fork_asm+0x1a/0x30 [ 14.191851] [ 14.191937] The buggy address belongs to the object at ffff8881025a0d80 [ 14.191937] which belongs to the cache kmalloc-64 of size 64 [ 14.192317] The buggy address is located 0 bytes to the right of [ 14.192317] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.193047] [ 14.193138] The buggy address belongs to the physical page: [ 14.193312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.193577] flags: 0x200000000000000(node=0|zone=2) [ 14.193835] page_type: f5(slab) [ 14.194066] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.194554] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.195011] page dumped because: kasan: bad access detected [ 14.195289] [ 14.195361] Memory state around the buggy address: [ 14.195527] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.195791] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.196348] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.196758] ^ [ 14.196992] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.197462] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.197883] ================================================================== [ 14.736676] ================================================================== [ 14.736966] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 14.737390] Read of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.737698] [ 14.737789] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.737841] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.737855] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.737877] Call Trace: [ 14.737903] <TASK> [ 14.737924] dump_stack_lvl+0x73/0xb0 [ 14.737953] print_report+0xd1/0x650 [ 14.737976] ? __virt_addr_valid+0x1db/0x2d0 [ 14.738001] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.738023] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.738046] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.738068] kasan_report+0x141/0x180 [ 14.738090] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.738117] __asan_report_load8_noabort+0x18/0x20 [ 14.738142] kasan_atomics_helper+0x4eae/0x5450 [ 14.738165] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.738188] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.738213] ? kasan_atomics+0x152/0x310 [ 14.738240] kasan_atomics+0x1dc/0x310 [ 14.738264] ? __pfx_kasan_atomics+0x10/0x10 [ 14.738287] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.738314] ? __pfx_read_tsc+0x10/0x10 [ 14.738337] ? ktime_get_ts64+0x86/0x230 [ 14.738361] kunit_try_run_case+0x1a5/0x480 [ 14.738398] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.738421] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.738444] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.738467] ? __kthread_parkme+0x82/0x180 [ 14.738488] ? preempt_count_sub+0x50/0x80 [ 14.738513] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.738538] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.738562] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.738587] kthread+0x337/0x6f0 [ 14.738607] ? trace_preempt_on+0x20/0xc0 [ 14.738631] ? __pfx_kthread+0x10/0x10 [ 14.738652] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.738675] ? calculate_sigpending+0x7b/0xa0 [ 14.738699] ? __pfx_kthread+0x10/0x10 [ 14.738721] ret_from_fork+0x116/0x1d0 [ 14.738740] ? __pfx_kthread+0x10/0x10 [ 14.738762] ret_from_fork_asm+0x1a/0x30 [ 14.738792] </TASK> [ 14.738804] [ 14.749131] Allocated by task 282: [ 14.749321] kasan_save_stack+0x45/0x70 [ 14.749553] kasan_save_track+0x18/0x40 [ 14.749985] kasan_save_alloc_info+0x3b/0x50 [ 14.750450] __kasan_kmalloc+0xb7/0xc0 [ 14.750769] __kmalloc_cache_noprof+0x189/0x420 [ 14.751184] kasan_atomics+0x95/0x310 [ 14.751337] kunit_try_run_case+0x1a5/0x480 [ 14.751565] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.751877] kthread+0x337/0x6f0 [ 14.752216] ret_from_fork+0x116/0x1d0 [ 14.752372] ret_from_fork_asm+0x1a/0x30 [ 14.752571] [ 14.752793] The buggy address belongs to the object at ffff8881025a0d80 [ 14.752793] which belongs to the cache kmalloc-64 of size 64 [ 14.753410] The buggy address is located 0 bytes to the right of [ 14.753410] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.754098] [ 14.754196] The buggy address belongs to the physical page: [ 14.754426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.754945] flags: 0x200000000000000(node=0|zone=2) [ 14.755241] page_type: f5(slab) [ 14.755408] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.755879] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.756329] page dumped because: kasan: bad access detected [ 14.756568] [ 14.756746] Memory state around the buggy address: [ 14.757113] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.757422] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.757774] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.758229] ^ [ 14.758606] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.758865] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.759349] ================================================================== [ 14.815590] ================================================================== [ 14.815924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 14.816296] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.816600] [ 14.816740] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.816819] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.816832] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.816854] Call Trace: [ 14.816870] <TASK> [ 14.816887] dump_stack_lvl+0x73/0xb0 [ 14.816914] print_report+0xd1/0x650 [ 14.816938] ? __virt_addr_valid+0x1db/0x2d0 [ 14.816961] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.816982] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.817005] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.817027] kasan_report+0x141/0x180 [ 14.817050] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.817077] kasan_check_range+0x10c/0x1c0 [ 14.817112] __kasan_check_write+0x18/0x20 [ 14.817133] kasan_atomics_helper+0x15b6/0x5450 [ 14.817157] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.817180] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.817205] ? kasan_atomics+0x152/0x310 [ 14.817232] kasan_atomics+0x1dc/0x310 [ 14.817255] ? __pfx_kasan_atomics+0x10/0x10 [ 14.817278] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.817304] ? __pfx_read_tsc+0x10/0x10 [ 14.817326] ? ktime_get_ts64+0x86/0x230 [ 14.817352] kunit_try_run_case+0x1a5/0x480 [ 14.817386] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.817409] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.817433] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.817456] ? __kthread_parkme+0x82/0x180 [ 14.817478] ? preempt_count_sub+0x50/0x80 [ 14.817503] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.817528] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.817551] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.817576] kthread+0x337/0x6f0 [ 14.817596] ? trace_preempt_on+0x20/0xc0 [ 14.817621] ? __pfx_kthread+0x10/0x10 [ 14.817644] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.817666] ? calculate_sigpending+0x7b/0xa0 [ 14.817690] ? __pfx_kthread+0x10/0x10 [ 14.817712] ret_from_fork+0x116/0x1d0 [ 14.817731] ? __pfx_kthread+0x10/0x10 [ 14.817752] ret_from_fork_asm+0x1a/0x30 [ 14.817782] </TASK> [ 14.817815] [ 14.825951] Allocated by task 282: [ 14.826105] kasan_save_stack+0x45/0x70 [ 14.826300] kasan_save_track+0x18/0x40 [ 14.826492] kasan_save_alloc_info+0x3b/0x50 [ 14.826730] __kasan_kmalloc+0xb7/0xc0 [ 14.826973] __kmalloc_cache_noprof+0x189/0x420 [ 14.827249] kasan_atomics+0x95/0x310 [ 14.827464] kunit_try_run_case+0x1a5/0x480 [ 14.827677] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.827942] kthread+0x337/0x6f0 [ 14.828287] ret_from_fork+0x116/0x1d0 [ 14.828488] ret_from_fork_asm+0x1a/0x30 [ 14.828680] [ 14.828774] The buggy address belongs to the object at ffff8881025a0d80 [ 14.828774] which belongs to the cache kmalloc-64 of size 64 [ 14.829285] The buggy address is located 0 bytes to the right of [ 14.829285] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.829690] [ 14.829765] The buggy address belongs to the physical page: [ 14.829939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.830178] flags: 0x200000000000000(node=0|zone=2) [ 14.830354] page_type: f5(slab) [ 14.830563] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.830934] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.831321] page dumped because: kasan: bad access detected [ 14.831591] [ 14.831690] Memory state around the buggy address: [ 14.831925] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.832236] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.832591] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.832916] ^ [ 14.833104] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.833412] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.833752] ================================================================== [ 14.054414] ================================================================== [ 14.054851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 14.055179] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.055462] [ 14.055573] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.055616] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.055630] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.055652] Call Trace: [ 14.055667] <TASK> [ 14.055684] dump_stack_lvl+0x73/0xb0 [ 14.055711] print_report+0xd1/0x650 [ 14.055734] ? __virt_addr_valid+0x1db/0x2d0 [ 14.055760] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.055782] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.055805] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.055827] kasan_report+0x141/0x180 [ 14.055849] ? kasan_atomics_helper+0x4b3a/0x5450 [ 14.055875] __asan_report_store4_noabort+0x1b/0x30 [ 14.055896] kasan_atomics_helper+0x4b3a/0x5450 [ 14.055930] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.055953] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.055979] ? kasan_atomics+0x152/0x310 [ 14.056005] kasan_atomics+0x1dc/0x310 [ 14.056028] ? __pfx_kasan_atomics+0x10/0x10 [ 14.056050] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.056077] ? __pfx_read_tsc+0x10/0x10 [ 14.056098] ? ktime_get_ts64+0x86/0x230 [ 14.056124] kunit_try_run_case+0x1a5/0x480 [ 14.056147] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.056170] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.056193] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.056216] ? __kthread_parkme+0x82/0x180 [ 14.056236] ? preempt_count_sub+0x50/0x80 [ 14.056260] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.056283] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.056306] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.056330] kthread+0x337/0x6f0 [ 14.056349] ? trace_preempt_on+0x20/0xc0 [ 14.056384] ? __pfx_kthread+0x10/0x10 [ 14.056409] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.056430] ? calculate_sigpending+0x7b/0xa0 [ 14.056453] ? __pfx_kthread+0x10/0x10 [ 14.056475] ret_from_fork+0x116/0x1d0 [ 14.056494] ? __pfx_kthread+0x10/0x10 [ 14.056515] ret_from_fork_asm+0x1a/0x30 [ 14.056544] </TASK> [ 14.056557] [ 14.064773] Allocated by task 282: [ 14.065026] kasan_save_stack+0x45/0x70 [ 14.065230] kasan_save_track+0x18/0x40 [ 14.065432] kasan_save_alloc_info+0x3b/0x50 [ 14.066406] __kasan_kmalloc+0xb7/0xc0 [ 14.066795] __kmalloc_cache_noprof+0x189/0x420 [ 14.067296] kasan_atomics+0x95/0x310 [ 14.067563] kunit_try_run_case+0x1a5/0x480 [ 14.067772] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.068451] kthread+0x337/0x6f0 [ 14.068729] ret_from_fork+0x116/0x1d0 [ 14.069137] ret_from_fork_asm+0x1a/0x30 [ 14.069342] [ 14.069444] The buggy address belongs to the object at ffff8881025a0d80 [ 14.069444] which belongs to the cache kmalloc-64 of size 64 [ 14.070408] The buggy address is located 0 bytes to the right of [ 14.070408] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.071545] [ 14.071743] The buggy address belongs to the physical page: [ 14.072408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.073031] flags: 0x200000000000000(node=0|zone=2) [ 14.073393] page_type: f5(slab) [ 14.073560] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.073866] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.074434] page dumped because: kasan: bad access detected [ 14.074861] [ 14.075117] Memory state around the buggy address: [ 14.075295] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.075625] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.075869] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.076188] ^ [ 14.076422] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.076660] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.077086] ================================================================== [ 14.912888] ================================================================== [ 14.913401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 14.913831] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.914054] [ 14.914137] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.914180] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.914193] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.914215] Call Trace: [ 14.914230] <TASK> [ 14.914247] dump_stack_lvl+0x73/0xb0 [ 14.914276] print_report+0xd1/0x650 [ 14.914297] ? __virt_addr_valid+0x1db/0x2d0 [ 14.914324] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.914346] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.914369] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.914403] kasan_report+0x141/0x180 [ 14.914437] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.914464] kasan_check_range+0x10c/0x1c0 [ 14.914489] __kasan_check_write+0x18/0x20 [ 14.914510] kasan_atomics_helper+0x18b1/0x5450 [ 14.914534] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.914556] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.914581] ? kasan_atomics+0x152/0x310 [ 14.914636] kasan_atomics+0x1dc/0x310 [ 14.914660] ? __pfx_kasan_atomics+0x10/0x10 [ 14.914682] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.914708] ? __pfx_read_tsc+0x10/0x10 [ 14.914730] ? ktime_get_ts64+0x86/0x230 [ 14.914754] kunit_try_run_case+0x1a5/0x480 [ 14.914778] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.914800] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.914824] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.914863] ? __kthread_parkme+0x82/0x180 [ 14.914883] ? preempt_count_sub+0x50/0x80 [ 14.914908] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.914931] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.914955] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.914980] kthread+0x337/0x6f0 [ 14.915001] ? trace_preempt_on+0x20/0xc0 [ 14.915040] ? __pfx_kthread+0x10/0x10 [ 14.915062] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.915083] ? calculate_sigpending+0x7b/0xa0 [ 14.915107] ? __pfx_kthread+0x10/0x10 [ 14.915129] ret_from_fork+0x116/0x1d0 [ 14.915148] ? __pfx_kthread+0x10/0x10 [ 14.915168] ret_from_fork_asm+0x1a/0x30 [ 14.915199] </TASK> [ 14.915211] [ 14.922951] Allocated by task 282: [ 14.923088] kasan_save_stack+0x45/0x70 [ 14.923287] kasan_save_track+0x18/0x40 [ 14.923514] kasan_save_alloc_info+0x3b/0x50 [ 14.923665] __kasan_kmalloc+0xb7/0xc0 [ 14.923794] __kmalloc_cache_noprof+0x189/0x420 [ 14.924029] kasan_atomics+0x95/0x310 [ 14.924214] kunit_try_run_case+0x1a5/0x480 [ 14.924451] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.924686] kthread+0x337/0x6f0 [ 14.924851] ret_from_fork+0x116/0x1d0 [ 14.924990] ret_from_fork_asm+0x1a/0x30 [ 14.925124] [ 14.925193] The buggy address belongs to the object at ffff8881025a0d80 [ 14.925193] which belongs to the cache kmalloc-64 of size 64 [ 14.926623] The buggy address is located 0 bytes to the right of [ 14.926623] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.928784] [ 14.929085] The buggy address belongs to the physical page: [ 14.929492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.930179] flags: 0x200000000000000(node=0|zone=2) [ 14.930353] page_type: f5(slab) [ 14.930484] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.931097] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.931976] page dumped because: kasan: bad access detected [ 14.932403] [ 14.932482] Memory state around the buggy address: [ 14.932821] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.933451] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.933793] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.934011] ^ [ 14.934170] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.934397] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.934773] ================================================================== [ 14.935482] ================================================================== [ 14.935776] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 14.936095] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.936437] [ 14.936539] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.936583] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.936596] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.936618] Call Trace: [ 14.936634] <TASK> [ 14.936651] dump_stack_lvl+0x73/0xb0 [ 14.936676] print_report+0xd1/0x650 [ 14.936700] ? __virt_addr_valid+0x1db/0x2d0 [ 14.936723] ? kasan_atomics_helper+0x194a/0x5450 [ 14.936744] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.936765] ? kasan_atomics_helper+0x194a/0x5450 [ 14.936787] kasan_report+0x141/0x180 [ 14.936810] ? kasan_atomics_helper+0x194a/0x5450 [ 14.936836] kasan_check_range+0x10c/0x1c0 [ 14.936860] __kasan_check_write+0x18/0x20 [ 14.936879] kasan_atomics_helper+0x194a/0x5450 [ 14.936902] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.936924] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.936950] ? kasan_atomics+0x152/0x310 [ 14.936976] kasan_atomics+0x1dc/0x310 [ 14.936999] ? __pfx_kasan_atomics+0x10/0x10 [ 14.937021] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.937047] ? __pfx_read_tsc+0x10/0x10 [ 14.937069] ? ktime_get_ts64+0x86/0x230 [ 14.937093] kunit_try_run_case+0x1a5/0x480 [ 14.937118] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.937140] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.937162] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.937186] ? __kthread_parkme+0x82/0x180 [ 14.937206] ? preempt_count_sub+0x50/0x80 [ 14.937232] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.937256] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.937279] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.937302] kthread+0x337/0x6f0 [ 14.937322] ? trace_preempt_on+0x20/0xc0 [ 14.937347] ? __pfx_kthread+0x10/0x10 [ 14.937368] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.937716] ? calculate_sigpending+0x7b/0xa0 [ 14.937742] ? __pfx_kthread+0x10/0x10 [ 14.937779] ret_from_fork+0x116/0x1d0 [ 14.937799] ? __pfx_kthread+0x10/0x10 [ 14.937820] ret_from_fork_asm+0x1a/0x30 [ 14.937850] </TASK> [ 14.937862] [ 14.949220] Allocated by task 282: [ 14.949404] kasan_save_stack+0x45/0x70 [ 14.949578] kasan_save_track+0x18/0x40 [ 14.949753] kasan_save_alloc_info+0x3b/0x50 [ 14.949949] __kasan_kmalloc+0xb7/0xc0 [ 14.950106] __kmalloc_cache_noprof+0x189/0x420 [ 14.950310] kasan_atomics+0x95/0x310 [ 14.950593] kunit_try_run_case+0x1a5/0x480 [ 14.950768] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.951107] kthread+0x337/0x6f0 [ 14.951241] ret_from_fork+0x116/0x1d0 [ 14.951486] ret_from_fork_asm+0x1a/0x30 [ 14.951657] [ 14.951816] The buggy address belongs to the object at ffff8881025a0d80 [ 14.951816] which belongs to the cache kmalloc-64 of size 64 [ 14.952239] The buggy address is located 0 bytes to the right of [ 14.952239] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.952750] [ 14.952882] The buggy address belongs to the physical page: [ 14.953269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.954429] flags: 0x200000000000000(node=0|zone=2) [ 14.954741] page_type: f5(slab) [ 14.954954] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.955439] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.955772] page dumped because: kasan: bad access detected [ 14.956085] [ 14.956165] Memory state around the buggy address: [ 14.956386] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.956791] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.957203] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.957551] ^ [ 14.957719] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.958103] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.958423] ================================================================== [ 14.999806] ================================================================== [ 15.000741] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 15.001233] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 15.001599] [ 15.001758] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.001819] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.001833] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.001856] Call Trace: [ 15.001904] <TASK> [ 15.001925] dump_stack_lvl+0x73/0xb0 [ 15.001954] print_report+0xd1/0x650 [ 15.001989] ? __virt_addr_valid+0x1db/0x2d0 [ 15.002013] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.002034] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.002057] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.002079] kasan_report+0x141/0x180 [ 15.002101] ? kasan_atomics_helper+0x1b22/0x5450 [ 15.002127] kasan_check_range+0x10c/0x1c0 [ 15.002152] __kasan_check_write+0x18/0x20 [ 15.002171] kasan_atomics_helper+0x1b22/0x5450 [ 15.002226] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.002249] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.002286] ? kasan_atomics+0x152/0x310 [ 15.002313] kasan_atomics+0x1dc/0x310 [ 15.002363] ? __pfx_kasan_atomics+0x10/0x10 [ 15.002402] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.002429] ? __pfx_read_tsc+0x10/0x10 [ 15.002452] ? ktime_get_ts64+0x86/0x230 [ 15.002477] kunit_try_run_case+0x1a5/0x480 [ 15.002501] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.002524] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.002547] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.002570] ? __kthread_parkme+0x82/0x180 [ 15.002603] ? preempt_count_sub+0x50/0x80 [ 15.002628] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.002652] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.002676] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.002699] kthread+0x337/0x6f0 [ 15.002719] ? trace_preempt_on+0x20/0xc0 [ 15.002745] ? __pfx_kthread+0x10/0x10 [ 15.002766] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.002788] ? calculate_sigpending+0x7b/0xa0 [ 15.002813] ? __pfx_kthread+0x10/0x10 [ 15.002835] ret_from_fork+0x116/0x1d0 [ 15.002854] ? __pfx_kthread+0x10/0x10 [ 15.002875] ret_from_fork_asm+0x1a/0x30 [ 15.002906] </TASK> [ 15.002918] [ 15.011327] Allocated by task 282: [ 15.011576] kasan_save_stack+0x45/0x70 [ 15.011874] kasan_save_track+0x18/0x40 [ 15.012069] kasan_save_alloc_info+0x3b/0x50 [ 15.012219] __kasan_kmalloc+0xb7/0xc0 [ 15.012548] __kmalloc_cache_noprof+0x189/0x420 [ 15.012788] kasan_atomics+0x95/0x310 [ 15.012981] kunit_try_run_case+0x1a5/0x480 [ 15.013189] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.013373] kthread+0x337/0x6f0 [ 15.013515] ret_from_fork+0x116/0x1d0 [ 15.013870] ret_from_fork_asm+0x1a/0x30 [ 15.014089] [ 15.014190] The buggy address belongs to the object at ffff8881025a0d80 [ 15.014190] which belongs to the cache kmalloc-64 of size 64 [ 15.014836] The buggy address is located 0 bytes to the right of [ 15.014836] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 15.015381] [ 15.015483] The buggy address belongs to the physical page: [ 15.015768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 15.016110] flags: 0x200000000000000(node=0|zone=2) [ 15.016404] page_type: f5(slab) [ 15.016626] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.016878] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.017109] page dumped because: kasan: bad access detected [ 15.017305] [ 15.017418] Memory state around the buggy address: [ 15.017741] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.018142] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.018575] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.018796] ^ [ 15.018954] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.019320] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.019681] ================================================================== [ 14.006461] ================================================================== [ 14.007105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 14.007726] Read of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.008184] [ 14.008321] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.008364] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.008387] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.008412] Call Trace: [ 14.008430] <TASK> [ 14.008447] dump_stack_lvl+0x73/0xb0 [ 14.008475] print_report+0xd1/0x650 [ 14.008499] ? __virt_addr_valid+0x1db/0x2d0 [ 14.008522] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.008543] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.008565] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.008598] kasan_report+0x141/0x180 [ 14.008620] ? kasan_atomics_helper+0x4b54/0x5450 [ 14.008647] __asan_report_load4_noabort+0x18/0x20 [ 14.008672] kasan_atomics_helper+0x4b54/0x5450 [ 14.008695] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.008717] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.008743] ? kasan_atomics+0x152/0x310 [ 14.008770] kasan_atomics+0x1dc/0x310 [ 14.008792] ? __pfx_kasan_atomics+0x10/0x10 [ 14.008815] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.008840] ? __pfx_read_tsc+0x10/0x10 [ 14.008862] ? ktime_get_ts64+0x86/0x230 [ 14.008885] kunit_try_run_case+0x1a5/0x480 [ 14.008911] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.008935] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.008958] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.008981] ? __kthread_parkme+0x82/0x180 [ 14.009001] ? preempt_count_sub+0x50/0x80 [ 14.009026] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.009050] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.009073] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.009097] kthread+0x337/0x6f0 [ 14.009116] ? trace_preempt_on+0x20/0xc0 [ 14.009141] ? __pfx_kthread+0x10/0x10 [ 14.009163] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.009185] ? calculate_sigpending+0x7b/0xa0 [ 14.009209] ? __pfx_kthread+0x10/0x10 [ 14.009232] ret_from_fork+0x116/0x1d0 [ 14.009251] ? __pfx_kthread+0x10/0x10 [ 14.009271] ret_from_fork_asm+0x1a/0x30 [ 14.009302] </TASK> [ 14.009314] [ 14.021808] Allocated by task 282: [ 14.021944] kasan_save_stack+0x45/0x70 [ 14.022096] kasan_save_track+0x18/0x40 [ 14.022271] kasan_save_alloc_info+0x3b/0x50 [ 14.022474] __kasan_kmalloc+0xb7/0xc0 [ 14.022655] __kmalloc_cache_noprof+0x189/0x420 [ 14.022835] kasan_atomics+0x95/0x310 [ 14.023049] kunit_try_run_case+0x1a5/0x480 [ 14.023351] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.023546] kthread+0x337/0x6f0 [ 14.023726] ret_from_fork+0x116/0x1d0 [ 14.023907] ret_from_fork_asm+0x1a/0x30 [ 14.024049] [ 14.024122] The buggy address belongs to the object at ffff8881025a0d80 [ 14.024122] which belongs to the cache kmalloc-64 of size 64 [ 14.024712] The buggy address is located 0 bytes to the right of [ 14.024712] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.025476] [ 14.025554] The buggy address belongs to the physical page: [ 14.025917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.026257] flags: 0x200000000000000(node=0|zone=2) [ 14.026500] page_type: f5(slab) [ 14.026757] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.027058] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.027386] page dumped because: kasan: bad access detected [ 14.027682] [ 14.027772] Memory state around the buggy address: [ 14.027960] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.028180] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.028498] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.028815] ^ [ 14.029085] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.029390] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.029606] ================================================================== [ 15.322902] ================================================================== [ 15.323283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 15.323681] Read of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 15.324005] [ 15.324093] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.324134] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.324147] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.324168] Call Trace: [ 15.324185] <TASK> [ 15.324203] dump_stack_lvl+0x73/0xb0 [ 15.324230] print_report+0xd1/0x650 [ 15.324254] ? __virt_addr_valid+0x1db/0x2d0 [ 15.324276] ? kasan_atomics_helper+0x5115/0x5450 [ 15.324297] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.324410] ? kasan_atomics_helper+0x5115/0x5450 [ 15.324436] kasan_report+0x141/0x180 [ 15.324459] ? kasan_atomics_helper+0x5115/0x5450 [ 15.324485] __asan_report_load8_noabort+0x18/0x20 [ 15.324510] kasan_atomics_helper+0x5115/0x5450 [ 15.324532] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.324555] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.324580] ? kasan_atomics+0x152/0x310 [ 15.324606] kasan_atomics+0x1dc/0x310 [ 15.324654] ? __pfx_kasan_atomics+0x10/0x10 [ 15.324722] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.324793] ? __pfx_read_tsc+0x10/0x10 [ 15.324881] ? ktime_get_ts64+0x86/0x230 [ 15.324971] kunit_try_run_case+0x1a5/0x480 [ 15.324997] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.325019] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.325041] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.325065] ? __kthread_parkme+0x82/0x180 [ 15.325086] ? preempt_count_sub+0x50/0x80 [ 15.325110] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.325134] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.325157] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.325181] kthread+0x337/0x6f0 [ 15.325200] ? trace_preempt_on+0x20/0xc0 [ 15.325224] ? __pfx_kthread+0x10/0x10 [ 15.325245] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.325267] ? calculate_sigpending+0x7b/0xa0 [ 15.325290] ? __pfx_kthread+0x10/0x10 [ 15.325312] ret_from_fork+0x116/0x1d0 [ 15.325331] ? __pfx_kthread+0x10/0x10 [ 15.325352] ret_from_fork_asm+0x1a/0x30 [ 15.325391] </TASK> [ 15.325403] [ 15.333339] Allocated by task 282: [ 15.333559] kasan_save_stack+0x45/0x70 [ 15.333796] kasan_save_track+0x18/0x40 [ 15.333980] kasan_save_alloc_info+0x3b/0x50 [ 15.334124] __kasan_kmalloc+0xb7/0xc0 [ 15.334251] __kmalloc_cache_noprof+0x189/0x420 [ 15.334449] kasan_atomics+0x95/0x310 [ 15.334599] kunit_try_run_case+0x1a5/0x480 [ 15.334807] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.335042] kthread+0x337/0x6f0 [ 15.335158] ret_from_fork+0x116/0x1d0 [ 15.335286] ret_from_fork_asm+0x1a/0x30 [ 15.335429] [ 15.335498] The buggy address belongs to the object at ffff8881025a0d80 [ 15.335498] which belongs to the cache kmalloc-64 of size 64 [ 15.335998] The buggy address is located 0 bytes to the right of [ 15.335998] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 15.336548] [ 15.336668] The buggy address belongs to the physical page: [ 15.336913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 15.337180] flags: 0x200000000000000(node=0|zone=2) [ 15.337338] page_type: f5(slab) [ 15.337506] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.337869] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.338157] page dumped because: kasan: bad access detected [ 15.338323] [ 15.339497] Memory state around the buggy address: [ 15.340028] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.340938] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.341736] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.342122] ^ [ 15.342288] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.342806] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.343414] ================================================================== [ 14.385965] ================================================================== [ 14.386304] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 14.386646] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.386970] [ 14.387081] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.387124] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.387136] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.387159] Call Trace: [ 14.387173] <TASK> [ 14.387190] dump_stack_lvl+0x73/0xb0 [ 14.387280] print_report+0xd1/0x650 [ 14.387317] ? __virt_addr_valid+0x1db/0x2d0 [ 14.387355] ? kasan_atomics_helper+0xde0/0x5450 [ 14.387399] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.387438] ? kasan_atomics_helper+0xde0/0x5450 [ 14.387473] kasan_report+0x141/0x180 [ 14.387521] ? kasan_atomics_helper+0xde0/0x5450 [ 14.387588] kasan_check_range+0x10c/0x1c0 [ 14.387627] __kasan_check_write+0x18/0x20 [ 14.387660] kasan_atomics_helper+0xde0/0x5450 [ 14.387710] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.387748] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.387800] ? kasan_atomics+0x152/0x310 [ 14.387840] kasan_atomics+0x1dc/0x310 [ 14.387891] ? __pfx_kasan_atomics+0x10/0x10 [ 14.387940] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.387975] ? __pfx_read_tsc+0x10/0x10 [ 14.388009] ? ktime_get_ts64+0x86/0x230 [ 14.388034] kunit_try_run_case+0x1a5/0x480 [ 14.388060] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.388094] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.388116] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.388140] ? __kthread_parkme+0x82/0x180 [ 14.388162] ? preempt_count_sub+0x50/0x80 [ 14.388187] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.388211] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.388234] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.388258] kthread+0x337/0x6f0 [ 14.388278] ? trace_preempt_on+0x20/0xc0 [ 14.388303] ? __pfx_kthread+0x10/0x10 [ 14.388325] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.388347] ? calculate_sigpending+0x7b/0xa0 [ 14.388371] ? __pfx_kthread+0x10/0x10 [ 14.388407] ret_from_fork+0x116/0x1d0 [ 14.388425] ? __pfx_kthread+0x10/0x10 [ 14.388446] ret_from_fork_asm+0x1a/0x30 [ 14.388477] </TASK> [ 14.388489] [ 14.397328] Allocated by task 282: [ 14.397520] kasan_save_stack+0x45/0x70 [ 14.397780] kasan_save_track+0x18/0x40 [ 14.398031] kasan_save_alloc_info+0x3b/0x50 [ 14.398339] __kasan_kmalloc+0xb7/0xc0 [ 14.398588] __kmalloc_cache_noprof+0x189/0x420 [ 14.398839] kasan_atomics+0x95/0x310 [ 14.399144] kunit_try_run_case+0x1a5/0x480 [ 14.399324] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.399641] kthread+0x337/0x6f0 [ 14.399805] ret_from_fork+0x116/0x1d0 [ 14.400089] ret_from_fork_asm+0x1a/0x30 [ 14.400329] [ 14.400480] The buggy address belongs to the object at ffff8881025a0d80 [ 14.400480] which belongs to the cache kmalloc-64 of size 64 [ 14.401073] The buggy address is located 0 bytes to the right of [ 14.401073] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.401724] [ 14.401870] The buggy address belongs to the physical page: [ 14.402098] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.402506] flags: 0x200000000000000(node=0|zone=2) [ 14.402783] page_type: f5(slab) [ 14.403097] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.403453] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.403785] page dumped because: kasan: bad access detected [ 14.404078] [ 14.404183] Memory state around the buggy address: [ 14.404426] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.404803] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.405273] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.405638] ^ [ 14.405891] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.406294] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.406707] ================================================================== [ 13.893915] ================================================================== [ 13.894905] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 13.895949] Read of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 13.896449] [ 13.896546] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.896644] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.896657] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.896681] Call Trace: [ 13.896694] <TASK> [ 13.896713] dump_stack_lvl+0x73/0xb0 [ 13.896744] print_report+0xd1/0x650 [ 13.896768] ? __virt_addr_valid+0x1db/0x2d0 [ 13.896790] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.896812] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.896834] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.896856] kasan_report+0x141/0x180 [ 13.896878] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.896904] __asan_report_load4_noabort+0x18/0x20 [ 13.896976] kasan_atomics_helper+0x4bbc/0x5450 [ 13.897002] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.897023] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.897048] ? kasan_atomics+0x152/0x310 [ 13.897075] kasan_atomics+0x1dc/0x310 [ 13.897099] ? __pfx_kasan_atomics+0x10/0x10 [ 13.897119] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 13.897146] ? __pfx_read_tsc+0x10/0x10 [ 13.897167] ? ktime_get_ts64+0x86/0x230 [ 13.897193] kunit_try_run_case+0x1a5/0x480 [ 13.897217] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.897238] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 13.897261] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.897282] ? __kthread_parkme+0x82/0x180 [ 13.897303] ? preempt_count_sub+0x50/0x80 [ 13.897328] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.897352] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.897387] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.897411] kthread+0x337/0x6f0 [ 13.897429] ? trace_preempt_on+0x20/0xc0 [ 13.897453] ? __pfx_kthread+0x10/0x10 [ 13.897474] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.897495] ? calculate_sigpending+0x7b/0xa0 [ 13.897519] ? __pfx_kthread+0x10/0x10 [ 13.897539] ret_from_fork+0x116/0x1d0 [ 13.897557] ? __pfx_kthread+0x10/0x10 [ 13.897577] ret_from_fork_asm+0x1a/0x30 [ 13.897608] </TASK> [ 13.897620] [ 13.911917] Allocated by task 282: [ 13.912317] kasan_save_stack+0x45/0x70 [ 13.912748] kasan_save_track+0x18/0x40 [ 13.912984] kasan_save_alloc_info+0x3b/0x50 [ 13.913146] __kasan_kmalloc+0xb7/0xc0 [ 13.913280] __kmalloc_cache_noprof+0x189/0x420 [ 13.913450] kasan_atomics+0x95/0x310 [ 13.913597] kunit_try_run_case+0x1a5/0x480 [ 13.913788] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.913996] kthread+0x337/0x6f0 [ 13.914237] ret_from_fork+0x116/0x1d0 [ 13.914404] ret_from_fork_asm+0x1a/0x30 [ 13.914612] [ 13.914698] The buggy address belongs to the object at ffff8881025a0d80 [ 13.914698] which belongs to the cache kmalloc-64 of size 64 [ 13.915231] The buggy address is located 0 bytes to the right of [ 13.915231] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 13.915983] [ 13.916101] The buggy address belongs to the physical page: [ 13.916328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 13.916784] flags: 0x200000000000000(node=0|zone=2) [ 13.917060] page_type: f5(slab) [ 13.917188] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.917543] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.917829] page dumped because: kasan: bad access detected [ 13.918164] [ 13.918263] Memory state around the buggy address: [ 13.918434] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.918722] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.919220] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.919536] ^ [ 13.919776] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.920167] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.920458] ================================================================== [ 14.472190] ================================================================== [ 14.472480] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 14.473848] Read of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.474387] [ 14.474487] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.474531] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.474545] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.474567] Call Trace: [ 14.474581] <TASK> [ 14.474599] dump_stack_lvl+0x73/0xb0 [ 14.474628] print_report+0xd1/0x650 [ 14.474652] ? __virt_addr_valid+0x1db/0x2d0 [ 14.474676] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.474697] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.474720] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.474742] kasan_report+0x141/0x180 [ 14.474765] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.474791] __asan_report_load4_noabort+0x18/0x20 [ 14.474816] kasan_atomics_helper+0x4a36/0x5450 [ 14.474839] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.474861] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.474886] ? kasan_atomics+0x152/0x310 [ 14.474914] kasan_atomics+0x1dc/0x310 [ 14.474957] ? __pfx_kasan_atomics+0x10/0x10 [ 14.474980] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.475013] ? __pfx_read_tsc+0x10/0x10 [ 14.475035] ? ktime_get_ts64+0x86/0x230 [ 14.475062] kunit_try_run_case+0x1a5/0x480 [ 14.475086] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.475109] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.475131] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.475154] ? __kthread_parkme+0x82/0x180 [ 14.475175] ? preempt_count_sub+0x50/0x80 [ 14.475200] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.475224] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.475248] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.475272] kthread+0x337/0x6f0 [ 14.475292] ? trace_preempt_on+0x20/0xc0 [ 14.475317] ? __pfx_kthread+0x10/0x10 [ 14.475339] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.475360] ? calculate_sigpending+0x7b/0xa0 [ 14.475412] ? __pfx_kthread+0x10/0x10 [ 14.475434] ret_from_fork+0x116/0x1d0 [ 14.475454] ? __pfx_kthread+0x10/0x10 [ 14.475475] ret_from_fork_asm+0x1a/0x30 [ 14.475506] </TASK> [ 14.475518] [ 14.484124] Allocated by task 282: [ 14.484421] kasan_save_stack+0x45/0x70 [ 14.484771] kasan_save_track+0x18/0x40 [ 14.485002] kasan_save_alloc_info+0x3b/0x50 [ 14.485158] __kasan_kmalloc+0xb7/0xc0 [ 14.485293] __kmalloc_cache_noprof+0x189/0x420 [ 14.485460] kasan_atomics+0x95/0x310 [ 14.485593] kunit_try_run_case+0x1a5/0x480 [ 14.485746] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.486178] kthread+0x337/0x6f0 [ 14.486347] ret_from_fork+0x116/0x1d0 [ 14.486685] ret_from_fork_asm+0x1a/0x30 [ 14.487047] [ 14.487143] The buggy address belongs to the object at ffff8881025a0d80 [ 14.487143] which belongs to the cache kmalloc-64 of size 64 [ 14.487571] The buggy address is located 0 bytes to the right of [ 14.487571] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.488102] [ 14.488221] The buggy address belongs to the physical page: [ 14.488427] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.488909] flags: 0x200000000000000(node=0|zone=2) [ 14.489132] page_type: f5(slab) [ 14.489267] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.489627] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.489869] page dumped because: kasan: bad access detected [ 14.490042] [ 14.490112] Memory state around the buggy address: [ 14.490266] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.490512] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.491209] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.491710] ^ [ 14.492072] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.492407] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.492618] ================================================================== [ 14.853613] ================================================================== [ 14.854049] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 14.854476] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.854830] [ 14.854918] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.854963] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.854976] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.855000] Call Trace: [ 14.855015] <TASK> [ 14.855030] dump_stack_lvl+0x73/0xb0 [ 14.855057] print_report+0xd1/0x650 [ 14.855083] ? __virt_addr_valid+0x1db/0x2d0 [ 14.855106] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.855128] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.855152] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.855174] kasan_report+0x141/0x180 [ 14.855198] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.855224] kasan_check_range+0x10c/0x1c0 [ 14.855249] __kasan_check_write+0x18/0x20 [ 14.855270] kasan_atomics_helper+0x16e7/0x5450 [ 14.855294] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.855318] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.855344] ? kasan_atomics+0x152/0x310 [ 14.855372] kasan_atomics+0x1dc/0x310 [ 14.855407] ? __pfx_kasan_atomics+0x10/0x10 [ 14.855430] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.855458] ? __pfx_read_tsc+0x10/0x10 [ 14.855480] ? ktime_get_ts64+0x86/0x230 [ 14.855505] kunit_try_run_case+0x1a5/0x480 [ 14.855531] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.855554] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.855586] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.855632] ? __kthread_parkme+0x82/0x180 [ 14.855655] ? preempt_count_sub+0x50/0x80 [ 14.855694] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.855720] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.855758] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.855794] kthread+0x337/0x6f0 [ 14.855815] ? trace_preempt_on+0x20/0xc0 [ 14.855854] ? __pfx_kthread+0x10/0x10 [ 14.855890] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.855925] ? calculate_sigpending+0x7b/0xa0 [ 14.855962] ? __pfx_kthread+0x10/0x10 [ 14.855997] ret_from_fork+0x116/0x1d0 [ 14.856016] ? __pfx_kthread+0x10/0x10 [ 14.856036] ret_from_fork_asm+0x1a/0x30 [ 14.856067] </TASK> [ 14.856078] [ 14.864024] Allocated by task 282: [ 14.864210] kasan_save_stack+0x45/0x70 [ 14.864449] kasan_save_track+0x18/0x40 [ 14.864726] kasan_save_alloc_info+0x3b/0x50 [ 14.864936] __kasan_kmalloc+0xb7/0xc0 [ 14.865137] __kmalloc_cache_noprof+0x189/0x420 [ 14.865371] kasan_atomics+0x95/0x310 [ 14.865636] kunit_try_run_case+0x1a5/0x480 [ 14.865841] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.866050] kthread+0x337/0x6f0 [ 14.866167] ret_from_fork+0x116/0x1d0 [ 14.866296] ret_from_fork_asm+0x1a/0x30 [ 14.866469] [ 14.866566] The buggy address belongs to the object at ffff8881025a0d80 [ 14.866566] which belongs to the cache kmalloc-64 of size 64 [ 14.867131] The buggy address is located 0 bytes to the right of [ 14.867131] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.867678] [ 14.867794] The buggy address belongs to the physical page: [ 14.868014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.868411] flags: 0x200000000000000(node=0|zone=2) [ 14.868739] page_type: f5(slab) [ 14.868905] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.869231] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.869562] page dumped because: kasan: bad access detected [ 14.870214] [ 14.870356] Memory state around the buggy address: [ 14.870527] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.871178] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.871512] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.872089] ^ [ 14.872724] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.873430] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.874120] ================================================================== [ 14.198425] ================================================================== [ 14.198834] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 14.199293] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.199666] [ 14.199808] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.199854] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.199879] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.199900] Call Trace: [ 14.199956] <TASK> [ 14.199972] dump_stack_lvl+0x73/0xb0 [ 14.200001] print_report+0xd1/0x650 [ 14.200037] ? __virt_addr_valid+0x1db/0x2d0 [ 14.200061] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.200082] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.200105] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.200127] kasan_report+0x141/0x180 [ 14.200150] ? kasan_atomics_helper+0x8f9/0x5450 [ 14.200176] kasan_check_range+0x10c/0x1c0 [ 14.200200] __kasan_check_write+0x18/0x20 [ 14.200220] kasan_atomics_helper+0x8f9/0x5450 [ 14.200243] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.200292] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.200319] ? kasan_atomics+0x152/0x310 [ 14.200347] kasan_atomics+0x1dc/0x310 [ 14.200388] ? __pfx_kasan_atomics+0x10/0x10 [ 14.200414] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.200466] ? __pfx_read_tsc+0x10/0x10 [ 14.200489] ? ktime_get_ts64+0x86/0x230 [ 14.200513] kunit_try_run_case+0x1a5/0x480 [ 14.200548] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.200613] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.200636] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.200677] ? __kthread_parkme+0x82/0x180 [ 14.200708] ? preempt_count_sub+0x50/0x80 [ 14.200731] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.200755] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.200778] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.200802] kthread+0x337/0x6f0 [ 14.200822] ? trace_preempt_on+0x20/0xc0 [ 14.200869] ? __pfx_kthread+0x10/0x10 [ 14.200891] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.200952] ? calculate_sigpending+0x7b/0xa0 [ 14.200976] ? __pfx_kthread+0x10/0x10 [ 14.200998] ret_from_fork+0x116/0x1d0 [ 14.201017] ? __pfx_kthread+0x10/0x10 [ 14.201038] ret_from_fork_asm+0x1a/0x30 [ 14.201086] </TASK> [ 14.201097] [ 14.209973] Allocated by task 282: [ 14.210287] kasan_save_stack+0x45/0x70 [ 14.210508] kasan_save_track+0x18/0x40 [ 14.210709] kasan_save_alloc_info+0x3b/0x50 [ 14.210859] __kasan_kmalloc+0xb7/0xc0 [ 14.211015] __kmalloc_cache_noprof+0x189/0x420 [ 14.211215] kasan_atomics+0x95/0x310 [ 14.211485] kunit_try_run_case+0x1a5/0x480 [ 14.211804] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.212257] kthread+0x337/0x6f0 [ 14.212452] ret_from_fork+0x116/0x1d0 [ 14.212661] ret_from_fork_asm+0x1a/0x30 [ 14.212876] [ 14.212994] The buggy address belongs to the object at ffff8881025a0d80 [ 14.212994] which belongs to the cache kmalloc-64 of size 64 [ 14.213549] The buggy address is located 0 bytes to the right of [ 14.213549] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.214340] [ 14.214427] The buggy address belongs to the physical page: [ 14.214730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.215178] flags: 0x200000000000000(node=0|zone=2) [ 14.215426] page_type: f5(slab) [ 14.215613] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.216017] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.216331] page dumped because: kasan: bad access detected [ 14.216618] [ 14.216751] Memory state around the buggy address: [ 14.217044] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.217321] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.217545] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.217937] ^ [ 14.218268] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.218673] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.219125] ================================================================== [ 14.874664] ================================================================== [ 14.875519] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 14.876186] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.877092] [ 14.877339] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.877435] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.877451] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.877474] Call Trace: [ 14.877489] <TASK> [ 14.877506] dump_stack_lvl+0x73/0xb0 [ 14.877536] print_report+0xd1/0x650 [ 14.877562] ? __virt_addr_valid+0x1db/0x2d0 [ 14.877598] ? kasan_atomics_helper+0x177f/0x5450 [ 14.877620] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.877643] ? kasan_atomics_helper+0x177f/0x5450 [ 14.877666] kasan_report+0x141/0x180 [ 14.877690] ? kasan_atomics_helper+0x177f/0x5450 [ 14.877717] kasan_check_range+0x10c/0x1c0 [ 14.877741] __kasan_check_write+0x18/0x20 [ 14.877761] kasan_atomics_helper+0x177f/0x5450 [ 14.877785] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.877808] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.877834] ? kasan_atomics+0x152/0x310 [ 14.877862] kasan_atomics+0x1dc/0x310 [ 14.877886] ? __pfx_kasan_atomics+0x10/0x10 [ 14.877908] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.877936] ? __pfx_read_tsc+0x10/0x10 [ 14.877957] ? ktime_get_ts64+0x86/0x230 [ 14.877982] kunit_try_run_case+0x1a5/0x480 [ 14.878007] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.878030] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.878053] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.878077] ? __kthread_parkme+0x82/0x180 [ 14.878099] ? preempt_count_sub+0x50/0x80 [ 14.878123] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.878147] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.878171] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.878196] kthread+0x337/0x6f0 [ 14.878217] ? trace_preempt_on+0x20/0xc0 [ 14.878243] ? __pfx_kthread+0x10/0x10 [ 14.878264] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.878286] ? calculate_sigpending+0x7b/0xa0 [ 14.878310] ? __pfx_kthread+0x10/0x10 [ 14.878332] ret_from_fork+0x116/0x1d0 [ 14.878351] ? __pfx_kthread+0x10/0x10 [ 14.878372] ret_from_fork_asm+0x1a/0x30 [ 14.878414] </TASK> [ 14.878425] [ 14.886506] Allocated by task 282: [ 14.886693] kasan_save_stack+0x45/0x70 [ 14.886838] kasan_save_track+0x18/0x40 [ 14.886968] kasan_save_alloc_info+0x3b/0x50 [ 14.887149] __kasan_kmalloc+0xb7/0xc0 [ 14.887280] __kmalloc_cache_noprof+0x189/0x420 [ 14.887441] kasan_atomics+0x95/0x310 [ 14.887681] kunit_try_run_case+0x1a5/0x480 [ 14.887886] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.888142] kthread+0x337/0x6f0 [ 14.888314] ret_from_fork+0x116/0x1d0 [ 14.888519] ret_from_fork_asm+0x1a/0x30 [ 14.888666] [ 14.888736] The buggy address belongs to the object at ffff8881025a0d80 [ 14.888736] which belongs to the cache kmalloc-64 of size 64 [ 14.889429] The buggy address is located 0 bytes to the right of [ 14.889429] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.890079] [ 14.890154] The buggy address belongs to the physical page: [ 14.890322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.890564] flags: 0x200000000000000(node=0|zone=2) [ 14.890724] page_type: f5(slab) [ 14.890841] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.891121] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.891487] page dumped because: kasan: bad access detected [ 14.891737] [ 14.891832] Memory state around the buggy address: [ 14.892056] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.892391] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.892767] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.893098] ^ [ 14.893302] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.893613] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.893873] ================================================================== [ 13.939558] ================================================================== [ 13.939891] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 13.940251] Read of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 13.940491] [ 13.940574] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.940615] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.940626] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.940646] Call Trace: [ 13.940659] <TASK> [ 13.940674] dump_stack_lvl+0x73/0xb0 [ 13.940699] print_report+0xd1/0x650 [ 13.940721] ? __virt_addr_valid+0x1db/0x2d0 [ 13.940743] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.940763] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.940784] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.940805] kasan_report+0x141/0x180 [ 13.940825] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.940851] __asan_report_load4_noabort+0x18/0x20 [ 13.940874] kasan_atomics_helper+0x4b88/0x5450 [ 13.940896] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.940916] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.940941] ? kasan_atomics+0x152/0x310 [ 13.940967] kasan_atomics+0x1dc/0x310 [ 13.941162] ? __pfx_kasan_atomics+0x10/0x10 [ 13.941186] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 13.941212] ? __pfx_read_tsc+0x10/0x10 [ 13.941233] ? ktime_get_ts64+0x86/0x230 [ 13.941256] kunit_try_run_case+0x1a5/0x480 [ 13.941278] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.941301] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 13.941323] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.941345] ? __kthread_parkme+0x82/0x180 [ 13.941365] ? preempt_count_sub+0x50/0x80 [ 13.941402] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.941425] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.941447] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.941469] kthread+0x337/0x6f0 [ 13.941488] ? trace_preempt_on+0x20/0xc0 [ 13.941510] ? __pfx_kthread+0x10/0x10 [ 13.941530] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.941550] ? calculate_sigpending+0x7b/0xa0 [ 13.941583] ? __pfx_kthread+0x10/0x10 [ 13.941604] ret_from_fork+0x116/0x1d0 [ 13.941622] ? __pfx_kthread+0x10/0x10 [ 13.941642] ret_from_fork_asm+0x1a/0x30 [ 13.941671] </TASK> [ 13.941683] [ 13.950183] Allocated by task 282: [ 13.950355] kasan_save_stack+0x45/0x70 [ 13.950568] kasan_save_track+0x18/0x40 [ 13.951104] kasan_save_alloc_info+0x3b/0x50 [ 13.951415] __kasan_kmalloc+0xb7/0xc0 [ 13.951577] __kmalloc_cache_noprof+0x189/0x420 [ 13.951734] kasan_atomics+0x95/0x310 [ 13.952158] kunit_try_run_case+0x1a5/0x480 [ 13.952388] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.952644] kthread+0x337/0x6f0 [ 13.952794] ret_from_fork+0x116/0x1d0 [ 13.952927] ret_from_fork_asm+0x1a/0x30 [ 13.953067] [ 13.953138] The buggy address belongs to the object at ffff8881025a0d80 [ 13.953138] which belongs to the cache kmalloc-64 of size 64 [ 13.954299] The buggy address is located 0 bytes to the right of [ 13.954299] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 13.954823] [ 13.954900] The buggy address belongs to the physical page: [ 13.955075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 13.955472] flags: 0x200000000000000(node=0|zone=2) [ 13.955954] page_type: f5(slab) [ 13.956131] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.956505] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.956762] page dumped because: kasan: bad access detected [ 13.956957] [ 13.957104] Memory state around the buggy address: [ 13.957330] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.957676] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.958151] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.958449] ^ [ 13.958700] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.958921] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.959242] ================================================================== [ 15.060912] ================================================================== [ 15.061523] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 15.061914] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 15.062255] [ 15.062448] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.062491] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.062516] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.062537] Call Trace: [ 15.062553] <TASK> [ 15.062570] dump_stack_lvl+0x73/0xb0 [ 15.062598] print_report+0xd1/0x650 [ 15.062622] ? __virt_addr_valid+0x1db/0x2d0 [ 15.062645] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.062667] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.062721] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.062755] kasan_report+0x141/0x180 [ 15.062815] ? kasan_atomics_helper+0x1ce1/0x5450 [ 15.062853] kasan_check_range+0x10c/0x1c0 [ 15.062888] __kasan_check_write+0x18/0x20 [ 15.062908] kasan_atomics_helper+0x1ce1/0x5450 [ 15.062931] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.062954] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.062979] ? kasan_atomics+0x152/0x310 [ 15.063007] kasan_atomics+0x1dc/0x310 [ 15.063029] ? __pfx_kasan_atomics+0x10/0x10 [ 15.063052] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.063078] ? __pfx_read_tsc+0x10/0x10 [ 15.063100] ? ktime_get_ts64+0x86/0x230 [ 15.063125] kunit_try_run_case+0x1a5/0x480 [ 15.063150] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.063172] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.063196] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.063219] ? __kthread_parkme+0x82/0x180 [ 15.063240] ? preempt_count_sub+0x50/0x80 [ 15.063264] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.063289] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.063341] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.063366] kthread+0x337/0x6f0 [ 15.063400] ? trace_preempt_on+0x20/0xc0 [ 15.063451] ? __pfx_kthread+0x10/0x10 [ 15.063473] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.063496] ? calculate_sigpending+0x7b/0xa0 [ 15.063531] ? __pfx_kthread+0x10/0x10 [ 15.063553] ret_from_fork+0x116/0x1d0 [ 15.063583] ? __pfx_kthread+0x10/0x10 [ 15.063604] ret_from_fork_asm+0x1a/0x30 [ 15.063635] </TASK> [ 15.063647] [ 15.072110] Allocated by task 282: [ 15.072364] kasan_save_stack+0x45/0x70 [ 15.072589] kasan_save_track+0x18/0x40 [ 15.072788] kasan_save_alloc_info+0x3b/0x50 [ 15.072980] __kasan_kmalloc+0xb7/0xc0 [ 15.073157] __kmalloc_cache_noprof+0x189/0x420 [ 15.073352] kasan_atomics+0x95/0x310 [ 15.073537] kunit_try_run_case+0x1a5/0x480 [ 15.073801] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.074063] kthread+0x337/0x6f0 [ 15.074214] ret_from_fork+0x116/0x1d0 [ 15.074439] ret_from_fork_asm+0x1a/0x30 [ 15.074739] [ 15.074818] The buggy address belongs to the object at ffff8881025a0d80 [ 15.074818] which belongs to the cache kmalloc-64 of size 64 [ 15.075270] The buggy address is located 0 bytes to the right of [ 15.075270] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 15.075693] [ 15.075791] The buggy address belongs to the physical page: [ 15.076049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 15.076437] flags: 0x200000000000000(node=0|zone=2) [ 15.076797] page_type: f5(slab) [ 15.077029] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.077275] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.077512] page dumped because: kasan: bad access detected [ 15.077686] [ 15.077791] Memory state around the buggy address: [ 15.078048] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.078401] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.078728] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.079055] ^ [ 15.079293] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.079763] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.080045] ================================================================== [ 15.138962] ================================================================== [ 15.139393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 15.139841] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 15.140214] [ 15.140358] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.140421] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.140434] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.140458] Call Trace: [ 15.140473] <TASK> [ 15.140492] dump_stack_lvl+0x73/0xb0 [ 15.140523] print_report+0xd1/0x650 [ 15.140547] ? __virt_addr_valid+0x1db/0x2d0 [ 15.140570] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.140592] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.140614] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.140636] kasan_report+0x141/0x180 [ 15.140658] ? kasan_atomics_helper+0x1f43/0x5450 [ 15.140684] kasan_check_range+0x10c/0x1c0 [ 15.140720] __kasan_check_write+0x18/0x20 [ 15.140741] kasan_atomics_helper+0x1f43/0x5450 [ 15.140775] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.140798] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.140824] ? kasan_atomics+0x152/0x310 [ 15.140861] kasan_atomics+0x1dc/0x310 [ 15.140884] ? __pfx_kasan_atomics+0x10/0x10 [ 15.140906] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.140933] ? __pfx_read_tsc+0x10/0x10 [ 15.140955] ? ktime_get_ts64+0x86/0x230 [ 15.140981] kunit_try_run_case+0x1a5/0x480 [ 15.141005] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.141037] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.141060] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.141082] ? __kthread_parkme+0x82/0x180 [ 15.141114] ? preempt_count_sub+0x50/0x80 [ 15.141138] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.141162] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.141186] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.141210] kthread+0x337/0x6f0 [ 15.141230] ? trace_preempt_on+0x20/0xc0 [ 15.141255] ? __pfx_kthread+0x10/0x10 [ 15.141276] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.141298] ? calculate_sigpending+0x7b/0xa0 [ 15.141322] ? __pfx_kthread+0x10/0x10 [ 15.141343] ret_from_fork+0x116/0x1d0 [ 15.141362] ? __pfx_kthread+0x10/0x10 [ 15.141392] ret_from_fork_asm+0x1a/0x30 [ 15.141423] </TASK> [ 15.141435] [ 15.151463] Allocated by task 282: [ 15.151669] kasan_save_stack+0x45/0x70 [ 15.152047] kasan_save_track+0x18/0x40 [ 15.152400] kasan_save_alloc_info+0x3b/0x50 [ 15.152887] __kasan_kmalloc+0xb7/0xc0 [ 15.153246] __kmalloc_cache_noprof+0x189/0x420 [ 15.153664] kasan_atomics+0x95/0x310 [ 15.154010] kunit_try_run_case+0x1a5/0x480 [ 15.154413] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.155055] kthread+0x337/0x6f0 [ 15.155397] ret_from_fork+0x116/0x1d0 [ 15.155757] ret_from_fork_asm+0x1a/0x30 [ 15.156133] [ 15.156313] The buggy address belongs to the object at ffff8881025a0d80 [ 15.156313] which belongs to the cache kmalloc-64 of size 64 [ 15.157158] The buggy address is located 0 bytes to the right of [ 15.157158] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 15.157537] [ 15.157631] The buggy address belongs to the physical page: [ 15.157901] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 15.158572] flags: 0x200000000000000(node=0|zone=2) [ 15.159047] page_type: f5(slab) [ 15.159356] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.159617] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.160280] page dumped because: kasan: bad access detected [ 15.160896] [ 15.161062] Memory state around the buggy address: [ 15.161485] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.161745] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.162326] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.162550] ^ [ 15.162993] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.163594] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.164228] ================================================================== [ 15.303468] ================================================================== [ 15.303938] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 15.304212] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 15.304569] [ 15.304752] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.304793] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.304805] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.304827] Call Trace: [ 15.304840] <TASK> [ 15.304854] dump_stack_lvl+0x73/0xb0 [ 15.304881] print_report+0xd1/0x650 [ 15.304904] ? __virt_addr_valid+0x1db/0x2d0 [ 15.304927] ? kasan_atomics_helper+0x224c/0x5450 [ 15.304949] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.304970] ? kasan_atomics_helper+0x224c/0x5450 [ 15.304992] kasan_report+0x141/0x180 [ 15.305014] ? kasan_atomics_helper+0x224c/0x5450 [ 15.305041] kasan_check_range+0x10c/0x1c0 [ 15.305064] __kasan_check_write+0x18/0x20 [ 15.305084] kasan_atomics_helper+0x224c/0x5450 [ 15.305106] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.305128] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.305153] ? kasan_atomics+0x152/0x310 [ 15.305179] kasan_atomics+0x1dc/0x310 [ 15.305202] ? __pfx_kasan_atomics+0x10/0x10 [ 15.305225] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.305252] ? __pfx_read_tsc+0x10/0x10 [ 15.305272] ? ktime_get_ts64+0x86/0x230 [ 15.305296] kunit_try_run_case+0x1a5/0x480 [ 15.305345] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.305370] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.305403] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.305428] ? __kthread_parkme+0x82/0x180 [ 15.305449] ? preempt_count_sub+0x50/0x80 [ 15.305473] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.305497] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.305520] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.305543] kthread+0x337/0x6f0 [ 15.305563] ? trace_preempt_on+0x20/0xc0 [ 15.305594] ? __pfx_kthread+0x10/0x10 [ 15.305615] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.305637] ? calculate_sigpending+0x7b/0xa0 [ 15.305660] ? __pfx_kthread+0x10/0x10 [ 15.305682] ret_from_fork+0x116/0x1d0 [ 15.305700] ? __pfx_kthread+0x10/0x10 [ 15.305721] ret_from_fork_asm+0x1a/0x30 [ 15.305751] </TASK> [ 15.305762] [ 15.314105] Allocated by task 282: [ 15.314329] kasan_save_stack+0x45/0x70 [ 15.314523] kasan_save_track+0x18/0x40 [ 15.314896] kasan_save_alloc_info+0x3b/0x50 [ 15.315129] __kasan_kmalloc+0xb7/0xc0 [ 15.315328] __kmalloc_cache_noprof+0x189/0x420 [ 15.315562] kasan_atomics+0x95/0x310 [ 15.315745] kunit_try_run_case+0x1a5/0x480 [ 15.315974] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.316216] kthread+0x337/0x6f0 [ 15.316402] ret_from_fork+0x116/0x1d0 [ 15.316617] ret_from_fork_asm+0x1a/0x30 [ 15.316817] [ 15.316894] The buggy address belongs to the object at ffff8881025a0d80 [ 15.316894] which belongs to the cache kmalloc-64 of size 64 [ 15.317425] The buggy address is located 0 bytes to the right of [ 15.317425] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 15.317984] [ 15.318110] The buggy address belongs to the physical page: [ 15.318305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 15.318555] flags: 0x200000000000000(node=0|zone=2) [ 15.318821] page_type: f5(slab) [ 15.318984] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.319352] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.319739] page dumped because: kasan: bad access detected [ 15.319998] [ 15.320091] Memory state around the buggy address: [ 15.320314] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.320548] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.320805] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.321168] ^ [ 15.321456] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.321987] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.322298] ================================================================== [ 15.184777] ================================================================== [ 15.185705] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 15.186089] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 15.186451] [ 15.186557] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.186603] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.186616] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.186637] Call Trace: [ 15.186664] <TASK> [ 15.186682] dump_stack_lvl+0x73/0xb0 [ 15.186711] print_report+0xd1/0x650 [ 15.186747] ? __virt_addr_valid+0x1db/0x2d0 [ 15.186770] ? kasan_atomics_helper+0x2006/0x5450 [ 15.186791] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.186814] ? kasan_atomics_helper+0x2006/0x5450 [ 15.186835] kasan_report+0x141/0x180 [ 15.186857] ? kasan_atomics_helper+0x2006/0x5450 [ 15.186884] kasan_check_range+0x10c/0x1c0 [ 15.186907] __kasan_check_write+0x18/0x20 [ 15.186926] kasan_atomics_helper+0x2006/0x5450 [ 15.186950] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.186972] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.186998] ? kasan_atomics+0x152/0x310 [ 15.187026] kasan_atomics+0x1dc/0x310 [ 15.187050] ? __pfx_kasan_atomics+0x10/0x10 [ 15.187081] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.187108] ? __pfx_read_tsc+0x10/0x10 [ 15.187140] ? ktime_get_ts64+0x86/0x230 [ 15.187166] kunit_try_run_case+0x1a5/0x480 [ 15.187191] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.187214] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.187245] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.187269] ? __kthread_parkme+0x82/0x180 [ 15.187300] ? preempt_count_sub+0x50/0x80 [ 15.187325] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.187349] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.187389] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.187413] kthread+0x337/0x6f0 [ 15.187433] ? trace_preempt_on+0x20/0xc0 [ 15.187467] ? __pfx_kthread+0x10/0x10 [ 15.187488] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.187510] ? calculate_sigpending+0x7b/0xa0 [ 15.187535] ? __pfx_kthread+0x10/0x10 [ 15.187557] ret_from_fork+0x116/0x1d0 [ 15.187586] ? __pfx_kthread+0x10/0x10 [ 15.187615] ret_from_fork_asm+0x1a/0x30 [ 15.187646] </TASK> [ 15.187658] [ 15.195298] Allocated by task 282: [ 15.195441] kasan_save_stack+0x45/0x70 [ 15.195593] kasan_save_track+0x18/0x40 [ 15.195770] kasan_save_alloc_info+0x3b/0x50 [ 15.196032] __kasan_kmalloc+0xb7/0xc0 [ 15.196241] __kmalloc_cache_noprof+0x189/0x420 [ 15.196473] kasan_atomics+0x95/0x310 [ 15.196760] kunit_try_run_case+0x1a5/0x480 [ 15.196967] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.197213] kthread+0x337/0x6f0 [ 15.197389] ret_from_fork+0x116/0x1d0 [ 15.197585] ret_from_fork_asm+0x1a/0x30 [ 15.197782] [ 15.197862] The buggy address belongs to the object at ffff8881025a0d80 [ 15.197862] which belongs to the cache kmalloc-64 of size 64 [ 15.198211] The buggy address is located 0 bytes to the right of [ 15.198211] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 15.198804] [ 15.198900] The buggy address belongs to the physical page: [ 15.199155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 15.199530] flags: 0x200000000000000(node=0|zone=2) [ 15.199838] page_type: f5(slab) [ 15.199997] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.200237] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.200474] page dumped because: kasan: bad access detected [ 15.200819] [ 15.200933] Memory state around the buggy address: [ 15.201155] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.201458] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.201673] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.201886] ^ [ 15.202119] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.202460] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.203039] ================================================================== [ 15.166068] ================================================================== [ 15.166886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 15.167417] Read of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 15.167801] [ 15.167895] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.167941] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.167954] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.167976] Call Trace: [ 15.167995] <TASK> [ 15.168014] dump_stack_lvl+0x73/0xb0 [ 15.168043] print_report+0xd1/0x650 [ 15.168068] ? __virt_addr_valid+0x1db/0x2d0 [ 15.168091] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.168112] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.168135] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.168156] kasan_report+0x141/0x180 [ 15.168178] ? kasan_atomics_helper+0x4f71/0x5450 [ 15.168204] __asan_report_load8_noabort+0x18/0x20 [ 15.168229] kasan_atomics_helper+0x4f71/0x5450 [ 15.168251] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.168274] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.168300] ? kasan_atomics+0x152/0x310 [ 15.168328] kasan_atomics+0x1dc/0x310 [ 15.168351] ? __pfx_kasan_atomics+0x10/0x10 [ 15.168373] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.168415] ? __pfx_read_tsc+0x10/0x10 [ 15.168438] ? ktime_get_ts64+0x86/0x230 [ 15.168465] kunit_try_run_case+0x1a5/0x480 [ 15.168502] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.168525] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.168548] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.168584] ? __kthread_parkme+0x82/0x180 [ 15.168606] ? preempt_count_sub+0x50/0x80 [ 15.168631] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.168654] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.168677] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.168713] kthread+0x337/0x6f0 [ 15.168734] ? trace_preempt_on+0x20/0xc0 [ 15.168771] ? __pfx_kthread+0x10/0x10 [ 15.168792] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.168813] ? calculate_sigpending+0x7b/0xa0 [ 15.168838] ? __pfx_kthread+0x10/0x10 [ 15.168859] ret_from_fork+0x116/0x1d0 [ 15.168887] ? __pfx_kthread+0x10/0x10 [ 15.168908] ret_from_fork_asm+0x1a/0x30 [ 15.168939] </TASK> [ 15.168961] [ 15.176769] Allocated by task 282: [ 15.176965] kasan_save_stack+0x45/0x70 [ 15.177138] kasan_save_track+0x18/0x40 [ 15.177277] kasan_save_alloc_info+0x3b/0x50 [ 15.177469] __kasan_kmalloc+0xb7/0xc0 [ 15.177666] __kmalloc_cache_noprof+0x189/0x420 [ 15.177902] kasan_atomics+0x95/0x310 [ 15.178145] kunit_try_run_case+0x1a5/0x480 [ 15.178301] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.178570] kthread+0x337/0x6f0 [ 15.178760] ret_from_fork+0x116/0x1d0 [ 15.178926] ret_from_fork_asm+0x1a/0x30 [ 15.179071] [ 15.179179] The buggy address belongs to the object at ffff8881025a0d80 [ 15.179179] which belongs to the cache kmalloc-64 of size 64 [ 15.179720] The buggy address is located 0 bytes to the right of [ 15.179720] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 15.180238] [ 15.180356] The buggy address belongs to the physical page: [ 15.180551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 15.180932] flags: 0x200000000000000(node=0|zone=2) [ 15.181148] page_type: f5(slab) [ 15.181340] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.181746] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.182026] page dumped because: kasan: bad access detected [ 15.182306] [ 15.182406] Memory state around the buggy address: [ 15.182648] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.182934] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.183193] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.183415] ^ [ 15.183570] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.183784] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.184092] ================================================================== [ 14.219762] ================================================================== [ 14.220313] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 14.220725] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.221095] [ 14.221189] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.221232] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.221246] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.221267] Call Trace: [ 14.221281] <TASK> [ 14.221296] dump_stack_lvl+0x73/0xb0 [ 14.221326] print_report+0xd1/0x650 [ 14.221349] ? __virt_addr_valid+0x1db/0x2d0 [ 14.221418] ? kasan_atomics_helper+0x992/0x5450 [ 14.221440] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.221491] ? kasan_atomics_helper+0x992/0x5450 [ 14.221513] kasan_report+0x141/0x180 [ 14.221594] ? kasan_atomics_helper+0x992/0x5450 [ 14.221631] kasan_check_range+0x10c/0x1c0 [ 14.221655] __kasan_check_write+0x18/0x20 [ 14.221675] kasan_atomics_helper+0x992/0x5450 [ 14.221697] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.221719] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.221746] ? kasan_atomics+0x152/0x310 [ 14.221773] kasan_atomics+0x1dc/0x310 [ 14.221796] ? __pfx_kasan_atomics+0x10/0x10 [ 14.221819] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.221869] ? __pfx_read_tsc+0x10/0x10 [ 14.221890] ? ktime_get_ts64+0x86/0x230 [ 14.222015] kunit_try_run_case+0x1a5/0x480 [ 14.222045] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.222069] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.222104] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.222127] ? __kthread_parkme+0x82/0x180 [ 14.222176] ? preempt_count_sub+0x50/0x80 [ 14.222202] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.222238] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.222264] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.222313] kthread+0x337/0x6f0 [ 14.222333] ? trace_preempt_on+0x20/0xc0 [ 14.222357] ? __pfx_kthread+0x10/0x10 [ 14.222393] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.222417] ? calculate_sigpending+0x7b/0xa0 [ 14.222440] ? __pfx_kthread+0x10/0x10 [ 14.222488] ret_from_fork+0x116/0x1d0 [ 14.222507] ? __pfx_kthread+0x10/0x10 [ 14.222528] ret_from_fork_asm+0x1a/0x30 [ 14.222583] </TASK> [ 14.222596] [ 14.232501] Allocated by task 282: [ 14.232653] kasan_save_stack+0x45/0x70 [ 14.232803] kasan_save_track+0x18/0x40 [ 14.232995] kasan_save_alloc_info+0x3b/0x50 [ 14.233209] __kasan_kmalloc+0xb7/0xc0 [ 14.233414] __kmalloc_cache_noprof+0x189/0x420 [ 14.233650] kasan_atomics+0x95/0x310 [ 14.233845] kunit_try_run_case+0x1a5/0x480 [ 14.234028] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.234254] kthread+0x337/0x6f0 [ 14.234591] ret_from_fork+0x116/0x1d0 [ 14.234760] ret_from_fork_asm+0x1a/0x30 [ 14.234997] [ 14.235087] The buggy address belongs to the object at ffff8881025a0d80 [ 14.235087] which belongs to the cache kmalloc-64 of size 64 [ 14.235509] The buggy address is located 0 bytes to the right of [ 14.235509] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.236406] [ 14.236576] The buggy address belongs to the physical page: [ 14.236833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.237316] flags: 0x200000000000000(node=0|zone=2) [ 14.237633] page_type: f5(slab) [ 14.237809] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.238331] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.238715] page dumped because: kasan: bad access detected [ 14.238890] [ 14.238996] Memory state around the buggy address: [ 14.239333] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.239743] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.240302] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.240703] ^ [ 14.241082] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.241468] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.241851] ================================================================== [ 14.588835] ================================================================== [ 14.589361] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 14.589851] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.590367] [ 14.590499] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.590550] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.590565] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.590730] Call Trace: [ 14.590754] <TASK> [ 14.590776] dump_stack_lvl+0x73/0xb0 [ 14.590811] print_report+0xd1/0x650 [ 14.590837] ? __virt_addr_valid+0x1db/0x2d0 [ 14.590901] ? kasan_atomics_helper+0x1217/0x5450 [ 14.590939] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.590963] ? kasan_atomics_helper+0x1217/0x5450 [ 14.590985] kasan_report+0x141/0x180 [ 14.591007] ? kasan_atomics_helper+0x1217/0x5450 [ 14.591034] kasan_check_range+0x10c/0x1c0 [ 14.591057] __kasan_check_write+0x18/0x20 [ 14.591077] kasan_atomics_helper+0x1217/0x5450 [ 14.591099] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.591122] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.591148] ? kasan_atomics+0x152/0x310 [ 14.591175] kasan_atomics+0x1dc/0x310 [ 14.591198] ? __pfx_kasan_atomics+0x10/0x10 [ 14.591220] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.591248] ? __pfx_read_tsc+0x10/0x10 [ 14.591271] ? ktime_get_ts64+0x86/0x230 [ 14.591296] kunit_try_run_case+0x1a5/0x480 [ 14.591322] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.591345] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.591367] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.591405] ? __kthread_parkme+0x82/0x180 [ 14.591428] ? preempt_count_sub+0x50/0x80 [ 14.591453] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.591477] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.591502] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.591527] kthread+0x337/0x6f0 [ 14.591547] ? trace_preempt_on+0x20/0xc0 [ 14.591578] ? __pfx_kthread+0x10/0x10 [ 14.591600] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.591622] ? calculate_sigpending+0x7b/0xa0 [ 14.591647] ? __pfx_kthread+0x10/0x10 [ 14.591669] ret_from_fork+0x116/0x1d0 [ 14.591688] ? __pfx_kthread+0x10/0x10 [ 14.591709] ret_from_fork_asm+0x1a/0x30 [ 14.591740] </TASK> [ 14.591753] [ 14.604108] Allocated by task 282: [ 14.604280] kasan_save_stack+0x45/0x70 [ 14.604767] kasan_save_track+0x18/0x40 [ 14.604921] kasan_save_alloc_info+0x3b/0x50 [ 14.605073] __kasan_kmalloc+0xb7/0xc0 [ 14.605206] __kmalloc_cache_noprof+0x189/0x420 [ 14.605362] kasan_atomics+0x95/0x310 [ 14.606290] kunit_try_run_case+0x1a5/0x480 [ 14.606742] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.607190] kthread+0x337/0x6f0 [ 14.607386] ret_from_fork+0x116/0x1d0 [ 14.607769] ret_from_fork_asm+0x1a/0x30 [ 14.608140] [ 14.608392] The buggy address belongs to the object at ffff8881025a0d80 [ 14.608392] which belongs to the cache kmalloc-64 of size 64 [ 14.609153] The buggy address is located 0 bytes to the right of [ 14.609153] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.610050] [ 14.610162] The buggy address belongs to the physical page: [ 14.610683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.611502] flags: 0x200000000000000(node=0|zone=2) [ 14.611885] page_type: f5(slab) [ 14.612194] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.612523] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.613215] page dumped because: kasan: bad access detected [ 14.613703] [ 14.613810] Memory state around the buggy address: [ 14.614274] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.614889] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.615401] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.615900] ^ [ 14.616352] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.616877] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.617362] ================================================================== [ 15.080733] ================================================================== [ 15.081461] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 15.081902] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 15.082249] [ 15.082365] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.082448] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.082462] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.082484] Call Trace: [ 15.082511] <TASK> [ 15.082528] dump_stack_lvl+0x73/0xb0 [ 15.082556] print_report+0xd1/0x650 [ 15.082580] ? __virt_addr_valid+0x1db/0x2d0 [ 15.082604] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.082625] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.082648] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.082680] kasan_report+0x141/0x180 [ 15.082704] ? kasan_atomics_helper+0x1d7a/0x5450 [ 15.082731] kasan_check_range+0x10c/0x1c0 [ 15.082754] __kasan_check_write+0x18/0x20 [ 15.082806] kasan_atomics_helper+0x1d7a/0x5450 [ 15.082829] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.082874] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.082900] ? kasan_atomics+0x152/0x310 [ 15.082927] kasan_atomics+0x1dc/0x310 [ 15.082950] ? __pfx_kasan_atomics+0x10/0x10 [ 15.082972] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.082998] ? __pfx_read_tsc+0x10/0x10 [ 15.083020] ? ktime_get_ts64+0x86/0x230 [ 15.083044] kunit_try_run_case+0x1a5/0x480 [ 15.083068] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.083091] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.083114] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.083137] ? __kthread_parkme+0x82/0x180 [ 15.083158] ? preempt_count_sub+0x50/0x80 [ 15.083182] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.083206] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.083230] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.083255] kthread+0x337/0x6f0 [ 15.083275] ? trace_preempt_on+0x20/0xc0 [ 15.083298] ? __pfx_kthread+0x10/0x10 [ 15.083320] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.083342] ? calculate_sigpending+0x7b/0xa0 [ 15.083365] ? __pfx_kthread+0x10/0x10 [ 15.083397] ret_from_fork+0x116/0x1d0 [ 15.083424] ? __pfx_kthread+0x10/0x10 [ 15.083445] ret_from_fork_asm+0x1a/0x30 [ 15.083475] </TASK> [ 15.083498] [ 15.091435] Allocated by task 282: [ 15.091657] kasan_save_stack+0x45/0x70 [ 15.091837] kasan_save_track+0x18/0x40 [ 15.091976] kasan_save_alloc_info+0x3b/0x50 [ 15.092168] __kasan_kmalloc+0xb7/0xc0 [ 15.092383] __kmalloc_cache_noprof+0x189/0x420 [ 15.092606] kasan_atomics+0x95/0x310 [ 15.092823] kunit_try_run_case+0x1a5/0x480 [ 15.092984] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.093239] kthread+0x337/0x6f0 [ 15.093443] ret_from_fork+0x116/0x1d0 [ 15.093679] ret_from_fork_asm+0x1a/0x30 [ 15.093862] [ 15.093937] The buggy address belongs to the object at ffff8881025a0d80 [ 15.093937] which belongs to the cache kmalloc-64 of size 64 [ 15.094465] The buggy address is located 0 bytes to the right of [ 15.094465] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 15.095018] [ 15.095093] The buggy address belongs to the physical page: [ 15.095265] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 15.095512] flags: 0x200000000000000(node=0|zone=2) [ 15.095913] page_type: f5(slab) [ 15.096085] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.096442] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.096959] page dumped because: kasan: bad access detected [ 15.097134] [ 15.097207] Memory state around the buggy address: [ 15.097370] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.097874] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.098202] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.098472] ^ [ 15.098628] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.099204] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.099513] ================================================================== [ 15.041199] ================================================================== [ 15.042044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 15.042448] Read of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 15.042878] [ 15.043006] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.043064] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.043077] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.043101] Call Trace: [ 15.043117] <TASK> [ 15.043164] dump_stack_lvl+0x73/0xb0 [ 15.043193] print_report+0xd1/0x650 [ 15.043228] ? __virt_addr_valid+0x1db/0x2d0 [ 15.043252] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.043274] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.043296] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.043318] kasan_report+0x141/0x180 [ 15.043341] ? kasan_atomics_helper+0x4f30/0x5450 [ 15.043367] __asan_report_load8_noabort+0x18/0x20 [ 15.043401] kasan_atomics_helper+0x4f30/0x5450 [ 15.043424] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.043446] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.043503] ? kasan_atomics+0x152/0x310 [ 15.043530] kasan_atomics+0x1dc/0x310 [ 15.043564] ? __pfx_kasan_atomics+0x10/0x10 [ 15.043599] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.043626] ? __pfx_read_tsc+0x10/0x10 [ 15.043678] ? ktime_get_ts64+0x86/0x230 [ 15.043703] kunit_try_run_case+0x1a5/0x480 [ 15.043739] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.043762] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.043784] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.043808] ? __kthread_parkme+0x82/0x180 [ 15.043829] ? preempt_count_sub+0x50/0x80 [ 15.043854] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.043878] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.043901] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.043925] kthread+0x337/0x6f0 [ 15.043945] ? trace_preempt_on+0x20/0xc0 [ 15.043971] ? __pfx_kthread+0x10/0x10 [ 15.043992] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.044014] ? calculate_sigpending+0x7b/0xa0 [ 15.044038] ? __pfx_kthread+0x10/0x10 [ 15.044060] ret_from_fork+0x116/0x1d0 [ 15.044079] ? __pfx_kthread+0x10/0x10 [ 15.044100] ret_from_fork_asm+0x1a/0x30 [ 15.044132] </TASK> [ 15.044145] [ 15.052035] Allocated by task 282: [ 15.052274] kasan_save_stack+0x45/0x70 [ 15.052514] kasan_save_track+0x18/0x40 [ 15.052803] kasan_save_alloc_info+0x3b/0x50 [ 15.053038] __kasan_kmalloc+0xb7/0xc0 [ 15.053205] __kmalloc_cache_noprof+0x189/0x420 [ 15.053363] kasan_atomics+0x95/0x310 [ 15.053546] kunit_try_run_case+0x1a5/0x480 [ 15.053803] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.054127] kthread+0x337/0x6f0 [ 15.054337] ret_from_fork+0x116/0x1d0 [ 15.054482] ret_from_fork_asm+0x1a/0x30 [ 15.054627] [ 15.054711] The buggy address belongs to the object at ffff8881025a0d80 [ 15.054711] which belongs to the cache kmalloc-64 of size 64 [ 15.055328] The buggy address is located 0 bytes to the right of [ 15.055328] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 15.055896] [ 15.056027] The buggy address belongs to the physical page: [ 15.056418] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 15.056665] flags: 0x200000000000000(node=0|zone=2) [ 15.056894] page_type: f5(slab) [ 15.057065] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.057441] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.057817] page dumped because: kasan: bad access detected [ 15.058123] [ 15.058241] Memory state around the buggy address: [ 15.058448] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.058817] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.059131] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.059501] ^ [ 15.059853] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.060119] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.060412] ================================================================== [ 14.449164] ================================================================== [ 14.449672] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 14.450026] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.450425] [ 14.450597] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.450642] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.450655] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.450677] Call Trace: [ 14.450722] <TASK> [ 14.450739] dump_stack_lvl+0x73/0xb0 [ 14.450768] print_report+0xd1/0x650 [ 14.450802] ? __virt_addr_valid+0x1db/0x2d0 [ 14.450825] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.450847] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.450895] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.450942] kasan_report+0x141/0x180 [ 14.450972] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.450999] kasan_check_range+0x10c/0x1c0 [ 14.451023] __kasan_check_write+0x18/0x20 [ 14.451042] kasan_atomics_helper+0xfa9/0x5450 [ 14.451065] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.451088] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.451113] ? kasan_atomics+0x152/0x310 [ 14.451140] kasan_atomics+0x1dc/0x310 [ 14.451163] ? __pfx_kasan_atomics+0x10/0x10 [ 14.451186] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.451213] ? __pfx_read_tsc+0x10/0x10 [ 14.451235] ? ktime_get_ts64+0x86/0x230 [ 14.451259] kunit_try_run_case+0x1a5/0x480 [ 14.451284] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.451307] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.451331] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.451354] ? __kthread_parkme+0x82/0x180 [ 14.451386] ? preempt_count_sub+0x50/0x80 [ 14.451410] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.451434] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.451458] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.451483] kthread+0x337/0x6f0 [ 14.451503] ? trace_preempt_on+0x20/0xc0 [ 14.451527] ? __pfx_kthread+0x10/0x10 [ 14.451549] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.451618] ? calculate_sigpending+0x7b/0xa0 [ 14.451644] ? __pfx_kthread+0x10/0x10 [ 14.451665] ret_from_fork+0x116/0x1d0 [ 14.451696] ? __pfx_kthread+0x10/0x10 [ 14.451717] ret_from_fork_asm+0x1a/0x30 [ 14.451748] </TASK> [ 14.451760] [ 14.460803] Allocated by task 282: [ 14.461066] kasan_save_stack+0x45/0x70 [ 14.461311] kasan_save_track+0x18/0x40 [ 14.461486] kasan_save_alloc_info+0x3b/0x50 [ 14.461745] __kasan_kmalloc+0xb7/0xc0 [ 14.462007] __kmalloc_cache_noprof+0x189/0x420 [ 14.462278] kasan_atomics+0x95/0x310 [ 14.462513] kunit_try_run_case+0x1a5/0x480 [ 14.462781] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.463091] kthread+0x337/0x6f0 [ 14.463300] ret_from_fork+0x116/0x1d0 [ 14.463490] ret_from_fork_asm+0x1a/0x30 [ 14.463733] [ 14.463872] The buggy address belongs to the object at ffff8881025a0d80 [ 14.463872] which belongs to the cache kmalloc-64 of size 64 [ 14.464482] The buggy address is located 0 bytes to the right of [ 14.464482] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.465135] [ 14.465255] The buggy address belongs to the physical page: [ 14.465648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.465977] flags: 0x200000000000000(node=0|zone=2) [ 14.466234] page_type: f5(slab) [ 14.466453] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.466792] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.467287] page dumped because: kasan: bad access detected [ 14.467528] [ 14.467711] Memory state around the buggy address: [ 14.467968] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.468416] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.468768] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.469240] ^ [ 14.469484] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.471613] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.471845] ================================================================== [ 14.407236] ================================================================== [ 14.407630] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 14.407877] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.408115] [ 14.408201] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.408244] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.408257] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.408278] Call Trace: [ 14.408295] <TASK> [ 14.408311] dump_stack_lvl+0x73/0xb0 [ 14.408340] print_report+0xd1/0x650 [ 14.408364] ? __virt_addr_valid+0x1db/0x2d0 [ 14.408444] ? kasan_atomics_helper+0xe78/0x5450 [ 14.408467] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.408489] ? kasan_atomics_helper+0xe78/0x5450 [ 14.408523] kasan_report+0x141/0x180 [ 14.408546] ? kasan_atomics_helper+0xe78/0x5450 [ 14.408590] kasan_check_range+0x10c/0x1c0 [ 14.408625] __kasan_check_write+0x18/0x20 [ 14.408652] kasan_atomics_helper+0xe78/0x5450 [ 14.408675] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.408720] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.408745] ? kasan_atomics+0x152/0x310 [ 14.408773] kasan_atomics+0x1dc/0x310 [ 14.408806] ? __pfx_kasan_atomics+0x10/0x10 [ 14.408828] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.408855] ? __pfx_read_tsc+0x10/0x10 [ 14.408878] ? ktime_get_ts64+0x86/0x230 [ 14.408921] kunit_try_run_case+0x1a5/0x480 [ 14.408947] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.408970] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.408993] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.409017] ? __kthread_parkme+0x82/0x180 [ 14.409038] ? preempt_count_sub+0x50/0x80 [ 14.409063] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.409089] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.409112] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.409139] kthread+0x337/0x6f0 [ 14.409158] ? trace_preempt_on+0x20/0xc0 [ 14.409184] ? __pfx_kthread+0x10/0x10 [ 14.409205] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.409227] ? calculate_sigpending+0x7b/0xa0 [ 14.409252] ? __pfx_kthread+0x10/0x10 [ 14.409273] ret_from_fork+0x116/0x1d0 [ 14.409292] ? __pfx_kthread+0x10/0x10 [ 14.409313] ret_from_fork_asm+0x1a/0x30 [ 14.409344] </TASK> [ 14.409357] [ 14.418817] Allocated by task 282: [ 14.419069] kasan_save_stack+0x45/0x70 [ 14.419369] kasan_save_track+0x18/0x40 [ 14.419581] kasan_save_alloc_info+0x3b/0x50 [ 14.419746] __kasan_kmalloc+0xb7/0xc0 [ 14.419942] __kmalloc_cache_noprof+0x189/0x420 [ 14.420158] kasan_atomics+0x95/0x310 [ 14.420337] kunit_try_run_case+0x1a5/0x480 [ 14.420510] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.420763] kthread+0x337/0x6f0 [ 14.420929] ret_from_fork+0x116/0x1d0 [ 14.421086] ret_from_fork_asm+0x1a/0x30 [ 14.421220] [ 14.421291] The buggy address belongs to the object at ffff8881025a0d80 [ 14.421291] which belongs to the cache kmalloc-64 of size 64 [ 14.422261] The buggy address is located 0 bytes to the right of [ 14.422261] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.422654] [ 14.422743] The buggy address belongs to the physical page: [ 14.423106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.423642] flags: 0x200000000000000(node=0|zone=2) [ 14.423919] page_type: f5(slab) [ 14.424257] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.424513] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.424745] page dumped because: kasan: bad access detected [ 14.424915] [ 14.424984] Memory state around the buggy address: [ 14.425137] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.425429] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.425764] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.426073] ^ [ 14.426296] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.426776] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.427064] ================================================================== [ 14.077657] ================================================================== [ 14.077916] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 14.078272] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.078528] [ 14.078619] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.078666] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.078680] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.078706] Call Trace: [ 14.078726] <TASK> [ 14.078746] dump_stack_lvl+0x73/0xb0 [ 14.078776] print_report+0xd1/0x650 [ 14.078816] ? __virt_addr_valid+0x1db/0x2d0 [ 14.078840] ? kasan_atomics_helper+0x565/0x5450 [ 14.078862] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.078894] ? kasan_atomics_helper+0x565/0x5450 [ 14.078916] kasan_report+0x141/0x180 [ 14.078939] ? kasan_atomics_helper+0x565/0x5450 [ 14.078966] kasan_check_range+0x10c/0x1c0 [ 14.078990] __kasan_check_write+0x18/0x20 [ 14.079010] kasan_atomics_helper+0x565/0x5450 [ 14.079033] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.079055] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.079082] ? kasan_atomics+0x152/0x310 [ 14.079110] kasan_atomics+0x1dc/0x310 [ 14.079135] ? __pfx_kasan_atomics+0x10/0x10 [ 14.079157] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.079183] ? __pfx_read_tsc+0x10/0x10 [ 14.079205] ? ktime_get_ts64+0x86/0x230 [ 14.079230] kunit_try_run_case+0x1a5/0x480 [ 14.079254] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.079277] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.079300] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.079322] ? __kthread_parkme+0x82/0x180 [ 14.079344] ? preempt_count_sub+0x50/0x80 [ 14.079368] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.079403] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.079426] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.079450] kthread+0x337/0x6f0 [ 14.079469] ? trace_preempt_on+0x20/0xc0 [ 14.079495] ? __pfx_kthread+0x10/0x10 [ 14.079515] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.079537] ? calculate_sigpending+0x7b/0xa0 [ 14.079562] ? __pfx_kthread+0x10/0x10 [ 14.079593] ret_from_fork+0x116/0x1d0 [ 14.079613] ? __pfx_kthread+0x10/0x10 [ 14.079633] ret_from_fork_asm+0x1a/0x30 [ 14.079664] </TASK> [ 14.079677] [ 14.088120] Allocated by task 282: [ 14.088350] kasan_save_stack+0x45/0x70 [ 14.088527] kasan_save_track+0x18/0x40 [ 14.088733] kasan_save_alloc_info+0x3b/0x50 [ 14.088922] __kasan_kmalloc+0xb7/0xc0 [ 14.089109] __kmalloc_cache_noprof+0x189/0x420 [ 14.089268] kasan_atomics+0x95/0x310 [ 14.089456] kunit_try_run_case+0x1a5/0x480 [ 14.089780] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.089978] kthread+0x337/0x6f0 [ 14.090100] ret_from_fork+0x116/0x1d0 [ 14.090230] ret_from_fork_asm+0x1a/0x30 [ 14.090368] [ 14.090449] The buggy address belongs to the object at ffff8881025a0d80 [ 14.090449] which belongs to the cache kmalloc-64 of size 64 [ 14.090871] The buggy address is located 0 bytes to the right of [ 14.090871] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.091870] [ 14.091966] The buggy address belongs to the physical page: [ 14.092178] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.092509] flags: 0x200000000000000(node=0|zone=2) [ 14.092961] page_type: f5(slab) [ 14.093125] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.093435] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.093784] page dumped because: kasan: bad access detected [ 14.094044] [ 14.094120] Memory state around the buggy address: [ 14.094339] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.094758] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.094975] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.095187] ^ [ 14.095340] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.096783] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.097288] ================================================================== [ 14.708158] ================================================================== [ 14.708707] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 14.709477] Read of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.709873] [ 14.710135] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.710188] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.710202] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.710225] Call Trace: [ 14.710257] <TASK> [ 14.710278] dump_stack_lvl+0x73/0xb0 [ 14.710311] print_report+0xd1/0x650 [ 14.710336] ? __virt_addr_valid+0x1db/0x2d0 [ 14.710361] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.710392] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.710415] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.710438] kasan_report+0x141/0x180 [ 14.710460] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.710486] kasan_check_range+0x10c/0x1c0 [ 14.710511] __kasan_check_read+0x15/0x20 [ 14.710530] kasan_atomics_helper+0x13b5/0x5450 [ 14.710552] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.710605] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.710633] ? kasan_atomics+0x152/0x310 [ 14.710662] kasan_atomics+0x1dc/0x310 [ 14.710685] ? __pfx_kasan_atomics+0x10/0x10 [ 14.710708] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.710736] ? __pfx_read_tsc+0x10/0x10 [ 14.710759] ? ktime_get_ts64+0x86/0x230 [ 14.710785] kunit_try_run_case+0x1a5/0x480 [ 14.710811] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.710834] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.710857] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.710880] ? __kthread_parkme+0x82/0x180 [ 14.710902] ? preempt_count_sub+0x50/0x80 [ 14.710927] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.710952] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.710975] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.710999] kthread+0x337/0x6f0 [ 14.711019] ? trace_preempt_on+0x20/0xc0 [ 14.711044] ? __pfx_kthread+0x10/0x10 [ 14.711065] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.711087] ? calculate_sigpending+0x7b/0xa0 [ 14.711112] ? __pfx_kthread+0x10/0x10 [ 14.711133] ret_from_fork+0x116/0x1d0 [ 14.711152] ? __pfx_kthread+0x10/0x10 [ 14.711173] ret_from_fork_asm+0x1a/0x30 [ 14.711205] </TASK> [ 14.711218] [ 14.723524] Allocated by task 282: [ 14.723922] kasan_save_stack+0x45/0x70 [ 14.724346] kasan_save_track+0x18/0x40 [ 14.724716] kasan_save_alloc_info+0x3b/0x50 [ 14.725046] __kasan_kmalloc+0xb7/0xc0 [ 14.725240] __kmalloc_cache_noprof+0x189/0x420 [ 14.725459] kasan_atomics+0x95/0x310 [ 14.725882] kunit_try_run_case+0x1a5/0x480 [ 14.726216] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.726660] kthread+0x337/0x6f0 [ 14.726936] ret_from_fork+0x116/0x1d0 [ 14.727145] ret_from_fork_asm+0x1a/0x30 [ 14.727320] [ 14.727424] The buggy address belongs to the object at ffff8881025a0d80 [ 14.727424] which belongs to the cache kmalloc-64 of size 64 [ 14.728507] The buggy address is located 0 bytes to the right of [ 14.728507] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.729478] [ 14.729741] The buggy address belongs to the physical page: [ 14.729975] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.730497] flags: 0x200000000000000(node=0|zone=2) [ 14.730911] page_type: f5(slab) [ 14.731338] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.731886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.732316] page dumped because: kasan: bad access detected [ 14.732738] [ 14.732834] Memory state around the buggy address: [ 14.733192] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.733511] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.734076] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.734585] ^ [ 14.734802] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.735321] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.735988] ================================================================== [ 14.427444] ================================================================== [ 14.427678] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 14.427906] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.428129] [ 14.428214] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.428256] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.428269] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.428290] Call Trace: [ 14.428306] <TASK> [ 14.428321] dump_stack_lvl+0x73/0xb0 [ 14.428348] print_report+0xd1/0x650 [ 14.428371] ? __virt_addr_valid+0x1db/0x2d0 [ 14.428435] ? kasan_atomics_helper+0xf10/0x5450 [ 14.428457] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.428479] ? kasan_atomics_helper+0xf10/0x5450 [ 14.428501] kasan_report+0x141/0x180 [ 14.428523] ? kasan_atomics_helper+0xf10/0x5450 [ 14.428600] kasan_check_range+0x10c/0x1c0 [ 14.428625] __kasan_check_write+0x18/0x20 [ 14.428675] kasan_atomics_helper+0xf10/0x5450 [ 14.428725] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.428764] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.428826] ? kasan_atomics+0x152/0x310 [ 14.428854] kasan_atomics+0x1dc/0x310 [ 14.428940] ? __pfx_kasan_atomics+0x10/0x10 [ 14.428964] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.429000] ? __pfx_read_tsc+0x10/0x10 [ 14.429039] ? ktime_get_ts64+0x86/0x230 [ 14.429076] kunit_try_run_case+0x1a5/0x480 [ 14.429100] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.429123] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.429145] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.429169] ? __kthread_parkme+0x82/0x180 [ 14.429189] ? preempt_count_sub+0x50/0x80 [ 14.429214] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.429239] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.429262] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.429286] kthread+0x337/0x6f0 [ 14.429305] ? trace_preempt_on+0x20/0xc0 [ 14.429331] ? __pfx_kthread+0x10/0x10 [ 14.429352] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.429383] ? calculate_sigpending+0x7b/0xa0 [ 14.429408] ? __pfx_kthread+0x10/0x10 [ 14.429429] ret_from_fork+0x116/0x1d0 [ 14.429448] ? __pfx_kthread+0x10/0x10 [ 14.429468] ret_from_fork_asm+0x1a/0x30 [ 14.429525] </TASK> [ 14.429537] [ 14.439621] Allocated by task 282: [ 14.439793] kasan_save_stack+0x45/0x70 [ 14.440010] kasan_save_track+0x18/0x40 [ 14.440290] kasan_save_alloc_info+0x3b/0x50 [ 14.440534] __kasan_kmalloc+0xb7/0xc0 [ 14.440740] __kmalloc_cache_noprof+0x189/0x420 [ 14.441033] kasan_atomics+0x95/0x310 [ 14.441303] kunit_try_run_case+0x1a5/0x480 [ 14.441631] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.441899] kthread+0x337/0x6f0 [ 14.442067] ret_from_fork+0x116/0x1d0 [ 14.442253] ret_from_fork_asm+0x1a/0x30 [ 14.442459] [ 14.442573] The buggy address belongs to the object at ffff8881025a0d80 [ 14.442573] which belongs to the cache kmalloc-64 of size 64 [ 14.443448] The buggy address is located 0 bytes to the right of [ 14.443448] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.444075] [ 14.444172] The buggy address belongs to the physical page: [ 14.444500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.444775] flags: 0x200000000000000(node=0|zone=2) [ 14.444940] page_type: f5(slab) [ 14.445062] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.445410] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.445753] page dumped because: kasan: bad access detected [ 14.446010] [ 14.446106] Memory state around the buggy address: [ 14.446275] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.446868] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.447335] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.447626] ^ [ 14.447788] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.448005] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.448529] ================================================================== [ 14.557030] ================================================================== [ 14.557371] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 14.557889] Read of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.558446] [ 14.558560] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.558606] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.558620] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.558644] Call Trace: [ 14.558663] <TASK> [ 14.558684] dump_stack_lvl+0x73/0xb0 [ 14.558713] print_report+0xd1/0x650 [ 14.558736] ? __virt_addr_valid+0x1db/0x2d0 [ 14.558763] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.558784] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.558807] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.558829] kasan_report+0x141/0x180 [ 14.558851] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.558878] __asan_report_load4_noabort+0x18/0x20 [ 14.558903] kasan_atomics_helper+0x4a02/0x5450 [ 14.558925] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.558947] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.558973] ? kasan_atomics+0x152/0x310 [ 14.559000] kasan_atomics+0x1dc/0x310 [ 14.559023] ? __pfx_kasan_atomics+0x10/0x10 [ 14.559046] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.559074] ? __pfx_read_tsc+0x10/0x10 [ 14.559098] ? ktime_get_ts64+0x86/0x230 [ 14.559123] kunit_try_run_case+0x1a5/0x480 [ 14.559149] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.559172] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.559194] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.559217] ? __kthread_parkme+0x82/0x180 [ 14.559238] ? preempt_count_sub+0x50/0x80 [ 14.559263] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.559328] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.559372] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.559428] kthread+0x337/0x6f0 [ 14.559460] ? trace_preempt_on+0x20/0xc0 [ 14.559499] ? __pfx_kthread+0x10/0x10 [ 14.559533] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.559568] ? calculate_sigpending+0x7b/0xa0 [ 14.559620] ? __pfx_kthread+0x10/0x10 [ 14.559655] ret_from_fork+0x116/0x1d0 [ 14.559686] ? __pfx_kthread+0x10/0x10 [ 14.559708] ret_from_fork_asm+0x1a/0x30 [ 14.559739] </TASK> [ 14.559750] [ 14.574489] Allocated by task 282: [ 14.575079] kasan_save_stack+0x45/0x70 [ 14.575504] kasan_save_track+0x18/0x40 [ 14.575776] kasan_save_alloc_info+0x3b/0x50 [ 14.576204] __kasan_kmalloc+0xb7/0xc0 [ 14.576461] __kmalloc_cache_noprof+0x189/0x420 [ 14.576854] kasan_atomics+0x95/0x310 [ 14.577235] kunit_try_run_case+0x1a5/0x480 [ 14.577432] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.577865] kthread+0x337/0x6f0 [ 14.578296] ret_from_fork+0x116/0x1d0 [ 14.578565] ret_from_fork_asm+0x1a/0x30 [ 14.578759] [ 14.578858] The buggy address belongs to the object at ffff8881025a0d80 [ 14.578858] which belongs to the cache kmalloc-64 of size 64 [ 14.579724] The buggy address is located 0 bytes to the right of [ 14.579724] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.580468] [ 14.580566] The buggy address belongs to the physical page: [ 14.581120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.581420] flags: 0x200000000000000(node=0|zone=2) [ 14.581922] page_type: f5(slab) [ 14.582426] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.583062] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.583716] page dumped because: kasan: bad access detected [ 14.584068] [ 14.584161] Memory state around the buggy address: [ 14.584367] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.584893] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.585514] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.586168] ^ [ 14.586418] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.586879] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.587520] ================================================================== [ 14.363414] ================================================================== [ 14.363647] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 14.364146] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.364636] [ 14.364842] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.364891] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.364931] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.364971] Call Trace: [ 14.365004] <TASK> [ 14.365025] dump_stack_lvl+0x73/0xb0 [ 14.365057] print_report+0xd1/0x650 [ 14.365093] ? __virt_addr_valid+0x1db/0x2d0 [ 14.365116] ? kasan_atomics_helper+0xd47/0x5450 [ 14.365138] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.365161] ? kasan_atomics_helper+0xd47/0x5450 [ 14.365184] kasan_report+0x141/0x180 [ 14.365206] ? kasan_atomics_helper+0xd47/0x5450 [ 14.365233] kasan_check_range+0x10c/0x1c0 [ 14.365257] __kasan_check_write+0x18/0x20 [ 14.365276] kasan_atomics_helper+0xd47/0x5450 [ 14.365299] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.365340] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.365389] ? kasan_atomics+0x152/0x310 [ 14.365418] kasan_atomics+0x1dc/0x310 [ 14.365441] ? __pfx_kasan_atomics+0x10/0x10 [ 14.365464] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.365491] ? __pfx_read_tsc+0x10/0x10 [ 14.365513] ? ktime_get_ts64+0x86/0x230 [ 14.365540] kunit_try_run_case+0x1a5/0x480 [ 14.365565] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.365599] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.365622] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.365673] ? __kthread_parkme+0x82/0x180 [ 14.365694] ? preempt_count_sub+0x50/0x80 [ 14.365736] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.365771] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.365794] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.365818] kthread+0x337/0x6f0 [ 14.365837] ? trace_preempt_on+0x20/0xc0 [ 14.365862] ? __pfx_kthread+0x10/0x10 [ 14.365883] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.365905] ? calculate_sigpending+0x7b/0xa0 [ 14.365930] ? __pfx_kthread+0x10/0x10 [ 14.365951] ret_from_fork+0x116/0x1d0 [ 14.365971] ? __pfx_kthread+0x10/0x10 [ 14.365992] ret_from_fork_asm+0x1a/0x30 [ 14.366024] </TASK> [ 14.366037] [ 14.375699] Allocated by task 282: [ 14.375875] kasan_save_stack+0x45/0x70 [ 14.376532] kasan_save_track+0x18/0x40 [ 14.376774] kasan_save_alloc_info+0x3b/0x50 [ 14.377029] __kasan_kmalloc+0xb7/0xc0 [ 14.377258] __kmalloc_cache_noprof+0x189/0x420 [ 14.377518] kasan_atomics+0x95/0x310 [ 14.377828] kunit_try_run_case+0x1a5/0x480 [ 14.378116] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.378354] kthread+0x337/0x6f0 [ 14.378581] ret_from_fork+0x116/0x1d0 [ 14.378852] ret_from_fork_asm+0x1a/0x30 [ 14.379142] [ 14.379253] The buggy address belongs to the object at ffff8881025a0d80 [ 14.379253] which belongs to the cache kmalloc-64 of size 64 [ 14.379837] The buggy address is located 0 bytes to the right of [ 14.379837] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.380581] [ 14.380720] The buggy address belongs to the physical page: [ 14.381086] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.381518] flags: 0x200000000000000(node=0|zone=2) [ 14.381803] page_type: f5(slab) [ 14.381961] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.382348] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.382701] page dumped because: kasan: bad access detected [ 14.383056] [ 14.383129] Memory state around the buggy address: [ 14.383366] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.383829] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.384177] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.384635] ^ [ 14.384912] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.385133] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.385349] ================================================================== [ 14.030513] ================================================================== [ 14.030857] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 14.031304] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.031710] [ 14.031802] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.031847] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.031859] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.031881] Call Trace: [ 14.031897] <TASK> [ 14.031913] dump_stack_lvl+0x73/0xb0 [ 14.031942] print_report+0xd1/0x650 [ 14.031968] ? __virt_addr_valid+0x1db/0x2d0 [ 14.031992] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.032032] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.032056] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.032080] kasan_report+0x141/0x180 [ 14.032102] ? kasan_atomics_helper+0x4a0/0x5450 [ 14.032128] kasan_check_range+0x10c/0x1c0 [ 14.032152] __kasan_check_write+0x18/0x20 [ 14.032172] kasan_atomics_helper+0x4a0/0x5450 [ 14.032194] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.032217] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.032243] ? kasan_atomics+0x152/0x310 [ 14.032269] kasan_atomics+0x1dc/0x310 [ 14.032293] ? __pfx_kasan_atomics+0x10/0x10 [ 14.032316] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.032342] ? __pfx_read_tsc+0x10/0x10 [ 14.032363] ? ktime_get_ts64+0x86/0x230 [ 14.032402] kunit_try_run_case+0x1a5/0x480 [ 14.032426] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.032449] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.032473] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.032496] ? __kthread_parkme+0x82/0x180 [ 14.032517] ? preempt_count_sub+0x50/0x80 [ 14.032543] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.032567] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.032600] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.032623] kthread+0x337/0x6f0 [ 14.032644] ? trace_preempt_on+0x20/0xc0 [ 14.032667] ? __pfx_kthread+0x10/0x10 [ 14.032689] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.032710] ? calculate_sigpending+0x7b/0xa0 [ 14.032734] ? __pfx_kthread+0x10/0x10 [ 14.032756] ret_from_fork+0x116/0x1d0 [ 14.032775] ? __pfx_kthread+0x10/0x10 [ 14.032796] ret_from_fork_asm+0x1a/0x30 [ 14.032825] </TASK> [ 14.032838] [ 14.045262] Allocated by task 282: [ 14.045439] kasan_save_stack+0x45/0x70 [ 14.045869] kasan_save_track+0x18/0x40 [ 14.046319] kasan_save_alloc_info+0x3b/0x50 [ 14.046555] __kasan_kmalloc+0xb7/0xc0 [ 14.046708] __kmalloc_cache_noprof+0x189/0x420 [ 14.046902] kasan_atomics+0x95/0x310 [ 14.047194] kunit_try_run_case+0x1a5/0x480 [ 14.047392] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.047567] kthread+0x337/0x6f0 [ 14.047688] ret_from_fork+0x116/0x1d0 [ 14.047962] ret_from_fork_asm+0x1a/0x30 [ 14.048131] [ 14.048265] The buggy address belongs to the object at ffff8881025a0d80 [ 14.048265] which belongs to the cache kmalloc-64 of size 64 [ 14.048827] The buggy address is located 0 bytes to the right of [ 14.048827] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.049413] [ 14.049518] The buggy address belongs to the physical page: [ 14.049708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.050043] flags: 0x200000000000000(node=0|zone=2) [ 14.050244] page_type: f5(slab) [ 14.050363] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.050827] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.051143] page dumped because: kasan: bad access detected [ 14.051462] [ 14.051537] Memory state around the buggy address: [ 14.051929] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.052366] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.052607] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.053053] ^ [ 14.053227] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.053470] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.054021] ================================================================== [ 14.266864] ================================================================== [ 14.267367] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 14.267731] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.268149] [ 14.268435] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.268522] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.268536] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.268558] Call Trace: [ 14.268585] <TASK> [ 14.268602] dump_stack_lvl+0x73/0xb0 [ 14.268661] print_report+0xd1/0x650 [ 14.268686] ? __virt_addr_valid+0x1db/0x2d0 [ 14.268710] ? kasan_atomics_helper+0xac7/0x5450 [ 14.268741] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.268764] ? kasan_atomics_helper+0xac7/0x5450 [ 14.268786] kasan_report+0x141/0x180 [ 14.268808] ? kasan_atomics_helper+0xac7/0x5450 [ 14.268834] kasan_check_range+0x10c/0x1c0 [ 14.268884] __kasan_check_write+0x18/0x20 [ 14.268903] kasan_atomics_helper+0xac7/0x5450 [ 14.268947] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.268970] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.268995] ? kasan_atomics+0x152/0x310 [ 14.269023] kasan_atomics+0x1dc/0x310 [ 14.269046] ? __pfx_kasan_atomics+0x10/0x10 [ 14.269069] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.269168] ? __pfx_read_tsc+0x10/0x10 [ 14.269208] ? ktime_get_ts64+0x86/0x230 [ 14.269233] kunit_try_run_case+0x1a5/0x480 [ 14.269290] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.269312] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.269336] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.269369] ? __kthread_parkme+0x82/0x180 [ 14.269400] ? preempt_count_sub+0x50/0x80 [ 14.269424] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.269448] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.269472] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.269496] kthread+0x337/0x6f0 [ 14.269517] ? trace_preempt_on+0x20/0xc0 [ 14.269541] ? __pfx_kthread+0x10/0x10 [ 14.269561] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.269583] ? calculate_sigpending+0x7b/0xa0 [ 14.269608] ? __pfx_kthread+0x10/0x10 [ 14.269630] ret_from_fork+0x116/0x1d0 [ 14.269649] ? __pfx_kthread+0x10/0x10 [ 14.269670] ret_from_fork_asm+0x1a/0x30 [ 14.269700] </TASK> [ 14.269712] [ 14.279864] Allocated by task 282: [ 14.280136] kasan_save_stack+0x45/0x70 [ 14.280512] kasan_save_track+0x18/0x40 [ 14.280842] kasan_save_alloc_info+0x3b/0x50 [ 14.281018] __kasan_kmalloc+0xb7/0xc0 [ 14.281148] __kmalloc_cache_noprof+0x189/0x420 [ 14.281659] kasan_atomics+0x95/0x310 [ 14.281885] kunit_try_run_case+0x1a5/0x480 [ 14.282032] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.282201] kthread+0x337/0x6f0 [ 14.282500] ret_from_fork+0x116/0x1d0 [ 14.282784] ret_from_fork_asm+0x1a/0x30 [ 14.283142] [ 14.283244] The buggy address belongs to the object at ffff8881025a0d80 [ 14.283244] which belongs to the cache kmalloc-64 of size 64 [ 14.283825] The buggy address is located 0 bytes to the right of [ 14.283825] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.284883] [ 14.285049] The buggy address belongs to the physical page: [ 14.285393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.285840] flags: 0x200000000000000(node=0|zone=2) [ 14.286186] page_type: f5(slab) [ 14.286401] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.286848] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.287269] page dumped because: kasan: bad access detected [ 14.287744] [ 14.287886] Memory state around the buggy address: [ 14.288254] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.288739] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.289137] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.289476] ^ [ 14.289721] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.290022] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.290514] ================================================================== [ 14.098221] ================================================================== [ 14.098947] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 14.099612] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.100225] [ 14.100347] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.100410] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.100424] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.100447] Call Trace: [ 14.100464] <TASK> [ 14.100483] dump_stack_lvl+0x73/0xb0 [ 14.100513] print_report+0xd1/0x650 [ 14.100539] ? __virt_addr_valid+0x1db/0x2d0 [ 14.100583] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.100606] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.100629] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.100651] kasan_report+0x141/0x180 [ 14.100673] ? kasan_atomics_helper+0x5fe/0x5450 [ 14.100700] kasan_check_range+0x10c/0x1c0 [ 14.100725] __kasan_check_write+0x18/0x20 [ 14.100744] kasan_atomics_helper+0x5fe/0x5450 [ 14.100768] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.100790] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.100818] ? kasan_atomics+0x152/0x310 [ 14.100845] kasan_atomics+0x1dc/0x310 [ 14.100867] ? __pfx_kasan_atomics+0x10/0x10 [ 14.100890] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.100942] ? __pfx_read_tsc+0x10/0x10 [ 14.100969] ? ktime_get_ts64+0x86/0x230 [ 14.100996] kunit_try_run_case+0x1a5/0x480 [ 14.101021] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.101043] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.101066] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.101089] ? __kthread_parkme+0x82/0x180 [ 14.101110] ? preempt_count_sub+0x50/0x80 [ 14.101134] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.101158] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.101181] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.101205] kthread+0x337/0x6f0 [ 14.101224] ? trace_preempt_on+0x20/0xc0 [ 14.101250] ? __pfx_kthread+0x10/0x10 [ 14.101271] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.101292] ? calculate_sigpending+0x7b/0xa0 [ 14.101316] ? __pfx_kthread+0x10/0x10 [ 14.101337] ret_from_fork+0x116/0x1d0 [ 14.101357] ? __pfx_kthread+0x10/0x10 [ 14.101390] ret_from_fork_asm+0x1a/0x30 [ 14.101421] </TASK> [ 14.101433] [ 14.109459] Allocated by task 282: [ 14.109599] kasan_save_stack+0x45/0x70 [ 14.109744] kasan_save_track+0x18/0x40 [ 14.109880] kasan_save_alloc_info+0x3b/0x50 [ 14.110058] __kasan_kmalloc+0xb7/0xc0 [ 14.110247] __kmalloc_cache_noprof+0x189/0x420 [ 14.110480] kasan_atomics+0x95/0x310 [ 14.110675] kunit_try_run_case+0x1a5/0x480 [ 14.110887] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.111135] kthread+0x337/0x6f0 [ 14.111304] ret_from_fork+0x116/0x1d0 [ 14.111659] ret_from_fork_asm+0x1a/0x30 [ 14.111857] [ 14.111972] The buggy address belongs to the object at ffff8881025a0d80 [ 14.111972] which belongs to the cache kmalloc-64 of size 64 [ 14.112439] The buggy address is located 0 bytes to the right of [ 14.112439] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.112881] [ 14.112979] The buggy address belongs to the physical page: [ 14.113152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.113411] flags: 0x200000000000000(node=0|zone=2) [ 14.113671] page_type: f5(slab) [ 14.113834] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.114160] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.114603] page dumped because: kasan: bad access detected [ 14.114858] [ 14.114950] Memory state around the buggy address: [ 14.115339] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.115582] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.115799] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.116014] ^ [ 14.116234] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.116557] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.116867] ================================================================== [ 14.535316] ================================================================== [ 14.535780] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 14.536210] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.536455] [ 14.536548] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.536596] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.536608] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.536631] Call Trace: [ 14.536685] <TASK> [ 14.536719] dump_stack_lvl+0x73/0xb0 [ 14.536780] print_report+0xd1/0x650 [ 14.536807] ? __virt_addr_valid+0x1db/0x2d0 [ 14.536832] ? kasan_atomics_helper+0x1148/0x5450 [ 14.536853] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.536876] ? kasan_atomics_helper+0x1148/0x5450 [ 14.536898] kasan_report+0x141/0x180 [ 14.536921] ? kasan_atomics_helper+0x1148/0x5450 [ 14.536947] kasan_check_range+0x10c/0x1c0 [ 14.536971] __kasan_check_write+0x18/0x20 [ 14.537008] kasan_atomics_helper+0x1148/0x5450 [ 14.537031] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.537054] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.537080] ? kasan_atomics+0x152/0x310 [ 14.537107] kasan_atomics+0x1dc/0x310 [ 14.537130] ? __pfx_kasan_atomics+0x10/0x10 [ 14.537153] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.537179] ? __pfx_read_tsc+0x10/0x10 [ 14.537202] ? ktime_get_ts64+0x86/0x230 [ 14.537228] kunit_try_run_case+0x1a5/0x480 [ 14.537254] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.537277] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.537300] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.537323] ? __kthread_parkme+0x82/0x180 [ 14.537364] ? preempt_count_sub+0x50/0x80 [ 14.537411] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.537436] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.537470] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.537493] kthread+0x337/0x6f0 [ 14.537513] ? trace_preempt_on+0x20/0xc0 [ 14.537565] ? __pfx_kthread+0x10/0x10 [ 14.537596] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.537618] ? calculate_sigpending+0x7b/0xa0 [ 14.537653] ? __pfx_kthread+0x10/0x10 [ 14.537675] ret_from_fork+0x116/0x1d0 [ 14.537695] ? __pfx_kthread+0x10/0x10 [ 14.537742] ret_from_fork_asm+0x1a/0x30 [ 14.537774] </TASK> [ 14.537787] [ 14.547651] Allocated by task 282: [ 14.547851] kasan_save_stack+0x45/0x70 [ 14.548005] kasan_save_track+0x18/0x40 [ 14.548412] kasan_save_alloc_info+0x3b/0x50 [ 14.548745] __kasan_kmalloc+0xb7/0xc0 [ 14.548930] __kmalloc_cache_noprof+0x189/0x420 [ 14.549086] kasan_atomics+0x95/0x310 [ 14.549221] kunit_try_run_case+0x1a5/0x480 [ 14.549482] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.549732] kthread+0x337/0x6f0 [ 14.549929] ret_from_fork+0x116/0x1d0 [ 14.550120] ret_from_fork_asm+0x1a/0x30 [ 14.550357] [ 14.550498] The buggy address belongs to the object at ffff8881025a0d80 [ 14.550498] which belongs to the cache kmalloc-64 of size 64 [ 14.550958] The buggy address is located 0 bytes to the right of [ 14.550958] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.551545] [ 14.551718] The buggy address belongs to the physical page: [ 14.551976] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.552419] flags: 0x200000000000000(node=0|zone=2) [ 14.552711] page_type: f5(slab) [ 14.552893] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.553243] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.553624] page dumped because: kasan: bad access detected [ 14.553871] [ 14.554030] Memory state around the buggy address: [ 14.554247] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.554598] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.555797] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.556074] ^ [ 14.556225] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.556451] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.556658] ================================================================== [ 14.677440] ================================================================== [ 14.677940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 14.678589] Read of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.679056] [ 14.679174] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.679314] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.679330] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.679352] Call Trace: [ 14.679371] <TASK> [ 14.679426] dump_stack_lvl+0x73/0xb0 [ 14.679458] print_report+0xd1/0x650 [ 14.679482] ? __virt_addr_valid+0x1db/0x2d0 [ 14.679507] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.679529] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.679552] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.679583] kasan_report+0x141/0x180 [ 14.679606] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.679632] __asan_report_load4_noabort+0x18/0x20 [ 14.679657] kasan_atomics_helper+0x49ce/0x5450 [ 14.679680] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.679702] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.679728] ? kasan_atomics+0x152/0x310 [ 14.679754] kasan_atomics+0x1dc/0x310 [ 14.679778] ? __pfx_kasan_atomics+0x10/0x10 [ 14.679801] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.679828] ? __pfx_read_tsc+0x10/0x10 [ 14.679850] ? ktime_get_ts64+0x86/0x230 [ 14.679876] kunit_try_run_case+0x1a5/0x480 [ 14.679901] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.679924] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.679947] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.679969] ? __kthread_parkme+0x82/0x180 [ 14.679991] ? preempt_count_sub+0x50/0x80 [ 14.680015] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.680038] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.680062] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.680085] kthread+0x337/0x6f0 [ 14.680105] ? trace_preempt_on+0x20/0xc0 [ 14.680130] ? __pfx_kthread+0x10/0x10 [ 14.680151] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.680172] ? calculate_sigpending+0x7b/0xa0 [ 14.680197] ? __pfx_kthread+0x10/0x10 [ 14.680219] ret_from_fork+0x116/0x1d0 [ 14.680237] ? __pfx_kthread+0x10/0x10 [ 14.680258] ret_from_fork_asm+0x1a/0x30 [ 14.680289] </TASK> [ 14.680301] [ 14.693504] Allocated by task 282: [ 14.694042] kasan_save_stack+0x45/0x70 [ 14.694322] kasan_save_track+0x18/0x40 [ 14.694776] kasan_save_alloc_info+0x3b/0x50 [ 14.695096] __kasan_kmalloc+0xb7/0xc0 [ 14.695290] __kmalloc_cache_noprof+0x189/0x420 [ 14.695511] kasan_atomics+0x95/0x310 [ 14.696000] kunit_try_run_case+0x1a5/0x480 [ 14.696355] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.696805] kthread+0x337/0x6f0 [ 14.697059] ret_from_fork+0x116/0x1d0 [ 14.697526] ret_from_fork_asm+0x1a/0x30 [ 14.697748] [ 14.697843] The buggy address belongs to the object at ffff8881025a0d80 [ 14.697843] which belongs to the cache kmalloc-64 of size 64 [ 14.698815] The buggy address is located 0 bytes to the right of [ 14.698815] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.699783] [ 14.700009] The buggy address belongs to the physical page: [ 14.700419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.701007] flags: 0x200000000000000(node=0|zone=2) [ 14.701361] page_type: f5(slab) [ 14.701752] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.702357] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.703018] page dumped because: kasan: bad access detected [ 14.703260] [ 14.703355] Memory state around the buggy address: [ 14.703781] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.704322] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.704962] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.705262] ^ [ 14.705479] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.706232] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.706781] ================================================================== [ 14.242527] ================================================================== [ 14.242937] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 14.243403] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.243758] [ 14.243887] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.243978] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.243991] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.244014] Call Trace: [ 14.244138] <TASK> [ 14.244161] dump_stack_lvl+0x73/0xb0 [ 14.244191] print_report+0xd1/0x650 [ 14.244344] ? __virt_addr_valid+0x1db/0x2d0 [ 14.244391] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.244416] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.244439] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.244461] kasan_report+0x141/0x180 [ 14.244511] ? kasan_atomics_helper+0xa2b/0x5450 [ 14.244539] kasan_check_range+0x10c/0x1c0 [ 14.244588] __kasan_check_write+0x18/0x20 [ 14.244608] kasan_atomics_helper+0xa2b/0x5450 [ 14.244632] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.244671] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.244707] ? kasan_atomics+0x152/0x310 [ 14.244735] kasan_atomics+0x1dc/0x310 [ 14.244758] ? __pfx_kasan_atomics+0x10/0x10 [ 14.244790] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.244817] ? __pfx_read_tsc+0x10/0x10 [ 14.244839] ? ktime_get_ts64+0x86/0x230 [ 14.244864] kunit_try_run_case+0x1a5/0x480 [ 14.244888] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.244917] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.244939] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.244962] ? __kthread_parkme+0x82/0x180 [ 14.244984] ? preempt_count_sub+0x50/0x80 [ 14.245008] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.245033] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.245057] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.245080] kthread+0x337/0x6f0 [ 14.245101] ? trace_preempt_on+0x20/0xc0 [ 14.245126] ? __pfx_kthread+0x10/0x10 [ 14.245146] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.245168] ? calculate_sigpending+0x7b/0xa0 [ 14.245193] ? __pfx_kthread+0x10/0x10 [ 14.245214] ret_from_fork+0x116/0x1d0 [ 14.245233] ? __pfx_kthread+0x10/0x10 [ 14.245253] ret_from_fork_asm+0x1a/0x30 [ 14.245284] </TASK> [ 14.245296] [ 14.256184] Allocated by task 282: [ 14.256355] kasan_save_stack+0x45/0x70 [ 14.256519] kasan_save_track+0x18/0x40 [ 14.256803] kasan_save_alloc_info+0x3b/0x50 [ 14.257206] __kasan_kmalloc+0xb7/0xc0 [ 14.257659] __kmalloc_cache_noprof+0x189/0x420 [ 14.257903] kasan_atomics+0x95/0x310 [ 14.258101] kunit_try_run_case+0x1a5/0x480 [ 14.258334] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.258679] kthread+0x337/0x6f0 [ 14.259073] ret_from_fork+0x116/0x1d0 [ 14.259271] ret_from_fork_asm+0x1a/0x30 [ 14.259423] [ 14.259496] The buggy address belongs to the object at ffff8881025a0d80 [ 14.259496] which belongs to the cache kmalloc-64 of size 64 [ 14.260575] The buggy address is located 0 bytes to the right of [ 14.260575] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.261170] [ 14.261252] The buggy address belongs to the physical page: [ 14.261564] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.261945] flags: 0x200000000000000(node=0|zone=2) [ 14.262262] page_type: f5(slab) [ 14.262458] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.262862] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.263227] page dumped because: kasan: bad access detected [ 14.263517] [ 14.263653] Memory state around the buggy address: [ 14.263895] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.264391] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.264757] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.265072] ^ [ 14.265490] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.266053] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.266424] ================================================================== [ 15.100269] ================================================================== [ 15.101027] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 15.101399] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 15.101748] [ 15.101836] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.101879] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.101891] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.101913] Call Trace: [ 15.101928] <TASK> [ 15.101943] dump_stack_lvl+0x73/0xb0 [ 15.101970] print_report+0xd1/0x650 [ 15.101994] ? __virt_addr_valid+0x1db/0x2d0 [ 15.102015] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.102037] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.102060] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.102082] kasan_report+0x141/0x180 [ 15.102105] ? kasan_atomics_helper+0x1e12/0x5450 [ 15.102132] kasan_check_range+0x10c/0x1c0 [ 15.102156] __kasan_check_write+0x18/0x20 [ 15.102176] kasan_atomics_helper+0x1e12/0x5450 [ 15.102198] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.102221] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.102247] ? kasan_atomics+0x152/0x310 [ 15.102275] kasan_atomics+0x1dc/0x310 [ 15.102299] ? __pfx_kasan_atomics+0x10/0x10 [ 15.102332] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.102358] ? __pfx_read_tsc+0x10/0x10 [ 15.102397] ? ktime_get_ts64+0x86/0x230 [ 15.102422] kunit_try_run_case+0x1a5/0x480 [ 15.102446] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.102470] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.102493] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.102516] ? __kthread_parkme+0x82/0x180 [ 15.102536] ? preempt_count_sub+0x50/0x80 [ 15.102561] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.102594] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.102617] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.102641] kthread+0x337/0x6f0 [ 15.102661] ? trace_preempt_on+0x20/0xc0 [ 15.102695] ? __pfx_kthread+0x10/0x10 [ 15.102716] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.102738] ? calculate_sigpending+0x7b/0xa0 [ 15.102772] ? __pfx_kthread+0x10/0x10 [ 15.102794] ret_from_fork+0x116/0x1d0 [ 15.102813] ? __pfx_kthread+0x10/0x10 [ 15.102834] ret_from_fork_asm+0x1a/0x30 [ 15.102875] </TASK> [ 15.102886] [ 15.110862] Allocated by task 282: [ 15.110992] kasan_save_stack+0x45/0x70 [ 15.111135] kasan_save_track+0x18/0x40 [ 15.111316] kasan_save_alloc_info+0x3b/0x50 [ 15.111550] __kasan_kmalloc+0xb7/0xc0 [ 15.111749] __kmalloc_cache_noprof+0x189/0x420 [ 15.112061] kasan_atomics+0x95/0x310 [ 15.112239] kunit_try_run_case+0x1a5/0x480 [ 15.112400] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.112666] kthread+0x337/0x6f0 [ 15.112838] ret_from_fork+0x116/0x1d0 [ 15.113059] ret_from_fork_asm+0x1a/0x30 [ 15.113261] [ 15.113355] The buggy address belongs to the object at ffff8881025a0d80 [ 15.113355] which belongs to the cache kmalloc-64 of size 64 [ 15.113911] The buggy address is located 0 bytes to the right of [ 15.113911] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 15.114429] [ 15.114513] The buggy address belongs to the physical page: [ 15.114783] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 15.115073] flags: 0x200000000000000(node=0|zone=2) [ 15.115239] page_type: f5(slab) [ 15.115361] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.115606] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.116006] page dumped because: kasan: bad access detected [ 15.116269] [ 15.116366] Memory state around the buggy address: [ 15.116659] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.116977] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.117299] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.117645] ^ [ 15.117809] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.118028] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.118241] ================================================================== [ 15.203861] ================================================================== [ 15.204121] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 15.204353] Read of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 15.204588] [ 15.205131] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.205198] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.205211] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.205233] Call Trace: [ 15.205251] <TASK> [ 15.205270] dump_stack_lvl+0x73/0xb0 [ 15.205300] print_report+0xd1/0x650 [ 15.205324] ? __virt_addr_valid+0x1db/0x2d0 [ 15.205347] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.205369] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.205400] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.205422] kasan_report+0x141/0x180 [ 15.205444] ? kasan_atomics_helper+0x4f98/0x5450 [ 15.205470] __asan_report_load8_noabort+0x18/0x20 [ 15.205495] kasan_atomics_helper+0x4f98/0x5450 [ 15.205518] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.205540] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.205628] ? kasan_atomics+0x152/0x310 [ 15.205656] kasan_atomics+0x1dc/0x310 [ 15.205679] ? __pfx_kasan_atomics+0x10/0x10 [ 15.205711] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.205739] ? __pfx_read_tsc+0x10/0x10 [ 15.205762] ? ktime_get_ts64+0x86/0x230 [ 15.205799] kunit_try_run_case+0x1a5/0x480 [ 15.205824] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.205847] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.205878] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.205900] ? __kthread_parkme+0x82/0x180 [ 15.205922] ? preempt_count_sub+0x50/0x80 [ 15.205956] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.205981] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.206004] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.206028] kthread+0x337/0x6f0 [ 15.206048] ? trace_preempt_on+0x20/0xc0 [ 15.206073] ? __pfx_kthread+0x10/0x10 [ 15.206093] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.206116] ? calculate_sigpending+0x7b/0xa0 [ 15.206149] ? __pfx_kthread+0x10/0x10 [ 15.206172] ret_from_fork+0x116/0x1d0 [ 15.206191] ? __pfx_kthread+0x10/0x10 [ 15.206212] ret_from_fork_asm+0x1a/0x30 [ 15.206253] </TASK> [ 15.206266] [ 15.214206] Allocated by task 282: [ 15.214343] kasan_save_stack+0x45/0x70 [ 15.214558] kasan_save_track+0x18/0x40 [ 15.214941] kasan_save_alloc_info+0x3b/0x50 [ 15.215135] __kasan_kmalloc+0xb7/0xc0 [ 15.215269] __kmalloc_cache_noprof+0x189/0x420 [ 15.215475] kasan_atomics+0x95/0x310 [ 15.215752] kunit_try_run_case+0x1a5/0x480 [ 15.216124] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.216372] kthread+0x337/0x6f0 [ 15.216591] ret_from_fork+0x116/0x1d0 [ 15.216742] ret_from_fork_asm+0x1a/0x30 [ 15.216947] [ 15.217056] The buggy address belongs to the object at ffff8881025a0d80 [ 15.217056] which belongs to the cache kmalloc-64 of size 64 [ 15.217531] The buggy address is located 0 bytes to the right of [ 15.217531] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 15.218032] [ 15.218105] The buggy address belongs to the physical page: [ 15.218447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 15.218837] flags: 0x200000000000000(node=0|zone=2) [ 15.219094] page_type: f5(slab) [ 15.219241] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.219570] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.219891] page dumped because: kasan: bad access detected [ 15.220141] [ 15.220238] Memory state around the buggy address: [ 15.220475] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.220762] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.220975] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.221182] ^ [ 15.221335] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.221578] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.221916] ================================================================== [ 14.342121] ================================================================== [ 14.342442] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 14.342987] Read of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.343331] [ 14.343505] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.343554] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.343568] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.343602] Call Trace: [ 14.343623] <TASK> [ 14.343676] dump_stack_lvl+0x73/0xb0 [ 14.343707] print_report+0xd1/0x650 [ 14.343733] ? __virt_addr_valid+0x1db/0x2d0 [ 14.343791] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.343813] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.343835] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.343867] kasan_report+0x141/0x180 [ 14.343889] ? kasan_atomics_helper+0x4a84/0x5450 [ 14.343916] __asan_report_load4_noabort+0x18/0x20 [ 14.343959] kasan_atomics_helper+0x4a84/0x5450 [ 14.343982] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.344004] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.344031] ? kasan_atomics+0x152/0x310 [ 14.344057] kasan_atomics+0x1dc/0x310 [ 14.344081] ? __pfx_kasan_atomics+0x10/0x10 [ 14.344103] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.344130] ? __pfx_read_tsc+0x10/0x10 [ 14.344153] ? ktime_get_ts64+0x86/0x230 [ 14.344178] kunit_try_run_case+0x1a5/0x480 [ 14.344204] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.344227] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.344249] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.344272] ? __kthread_parkme+0x82/0x180 [ 14.344293] ? preempt_count_sub+0x50/0x80 [ 14.344340] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.344363] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.344409] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.344433] kthread+0x337/0x6f0 [ 14.344452] ? trace_preempt_on+0x20/0xc0 [ 14.344478] ? __pfx_kthread+0x10/0x10 [ 14.344498] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.344520] ? calculate_sigpending+0x7b/0xa0 [ 14.344545] ? __pfx_kthread+0x10/0x10 [ 14.344567] ret_from_fork+0x116/0x1d0 [ 14.344586] ? __pfx_kthread+0x10/0x10 [ 14.344606] ret_from_fork_asm+0x1a/0x30 [ 14.344639] </TASK> [ 14.344650] [ 14.353559] Allocated by task 282: [ 14.353873] kasan_save_stack+0x45/0x70 [ 14.354066] kasan_save_track+0x18/0x40 [ 14.354307] kasan_save_alloc_info+0x3b/0x50 [ 14.354639] __kasan_kmalloc+0xb7/0xc0 [ 14.354863] __kmalloc_cache_noprof+0x189/0x420 [ 14.355127] kasan_atomics+0x95/0x310 [ 14.355317] kunit_try_run_case+0x1a5/0x480 [ 14.355479] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.355953] kthread+0x337/0x6f0 [ 14.356153] ret_from_fork+0x116/0x1d0 [ 14.356291] ret_from_fork_asm+0x1a/0x30 [ 14.356472] [ 14.356572] The buggy address belongs to the object at ffff8881025a0d80 [ 14.356572] which belongs to the cache kmalloc-64 of size 64 [ 14.357187] The buggy address is located 0 bytes to the right of [ 14.357187] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.357562] [ 14.357639] The buggy address belongs to the physical page: [ 14.357814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.358509] flags: 0x200000000000000(node=0|zone=2) [ 14.358945] page_type: f5(slab) [ 14.359075] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.359308] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.359947] page dumped because: kasan: bad access detected [ 14.360194] [ 14.360266] Memory state around the buggy address: [ 14.360621] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.361060] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.361429] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.361748] ^ [ 14.362140] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.362554] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.362812] ================================================================== [ 15.223053] ================================================================== [ 15.223635] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 15.224005] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 15.224346] [ 15.224452] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.224498] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.224512] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.224534] Call Trace: [ 15.224552] <TASK> [ 15.224571] dump_stack_lvl+0x73/0xb0 [ 15.224600] print_report+0xd1/0x650 [ 15.224623] ? __virt_addr_valid+0x1db/0x2d0 [ 15.224647] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.224669] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.224691] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.224713] kasan_report+0x141/0x180 [ 15.224735] ? kasan_atomics_helper+0x20c8/0x5450 [ 15.224774] kasan_check_range+0x10c/0x1c0 [ 15.224798] __kasan_check_write+0x18/0x20 [ 15.224818] kasan_atomics_helper+0x20c8/0x5450 [ 15.224851] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.224874] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.224900] ? kasan_atomics+0x152/0x310 [ 15.224927] kasan_atomics+0x1dc/0x310 [ 15.224949] ? __pfx_kasan_atomics+0x10/0x10 [ 15.224972] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.224999] ? __pfx_read_tsc+0x10/0x10 [ 15.225021] ? ktime_get_ts64+0x86/0x230 [ 15.225045] kunit_try_run_case+0x1a5/0x480 [ 15.225071] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.225095] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.225118] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.225141] ? __kthread_parkme+0x82/0x180 [ 15.225162] ? preempt_count_sub+0x50/0x80 [ 15.225187] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.225211] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.225234] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.225258] kthread+0x337/0x6f0 [ 15.225278] ? trace_preempt_on+0x20/0xc0 [ 15.225304] ? __pfx_kthread+0x10/0x10 [ 15.225331] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.225353] ? calculate_sigpending+0x7b/0xa0 [ 15.225391] ? __pfx_kthread+0x10/0x10 [ 15.225412] ret_from_fork+0x116/0x1d0 [ 15.225432] ? __pfx_kthread+0x10/0x10 [ 15.225453] ret_from_fork_asm+0x1a/0x30 [ 15.225484] </TASK> [ 15.225495] [ 15.233331] Allocated by task 282: [ 15.233530] kasan_save_stack+0x45/0x70 [ 15.233854] kasan_save_track+0x18/0x40 [ 15.234051] kasan_save_alloc_info+0x3b/0x50 [ 15.234476] __kasan_kmalloc+0xb7/0xc0 [ 15.234625] __kmalloc_cache_noprof+0x189/0x420 [ 15.234781] kasan_atomics+0x95/0x310 [ 15.234945] kunit_try_run_case+0x1a5/0x480 [ 15.235175] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.235435] kthread+0x337/0x6f0 [ 15.235603] ret_from_fork+0x116/0x1d0 [ 15.235762] ret_from_fork_asm+0x1a/0x30 [ 15.235901] [ 15.235973] The buggy address belongs to the object at ffff8881025a0d80 [ 15.235973] which belongs to the cache kmalloc-64 of size 64 [ 15.236587] The buggy address is located 0 bytes to the right of [ 15.236587] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 15.237147] [ 15.237259] The buggy address belongs to the physical page: [ 15.237543] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 15.237885] flags: 0x200000000000000(node=0|zone=2) [ 15.238074] page_type: f5(slab) [ 15.238253] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.238592] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.238917] page dumped because: kasan: bad access detected [ 15.239179] [ 15.239279] Memory state around the buggy address: [ 15.239951] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.240531] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.241269] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.241744] ^ [ 15.241987] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.242281] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.242781] ================================================================== [ 14.760064] ================================================================== [ 14.760680] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 14.761068] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.761586] [ 14.761831] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.761886] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.761900] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.761934] Call Trace: [ 14.761949] <TASK> [ 14.761965] dump_stack_lvl+0x73/0xb0 [ 14.761997] print_report+0xd1/0x650 [ 14.762021] ? __virt_addr_valid+0x1db/0x2d0 [ 14.762045] ? kasan_atomics_helper+0x1467/0x5450 [ 14.762066] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.762089] ? kasan_atomics_helper+0x1467/0x5450 [ 14.762111] kasan_report+0x141/0x180 [ 14.762133] ? kasan_atomics_helper+0x1467/0x5450 [ 14.762159] kasan_check_range+0x10c/0x1c0 [ 14.762183] __kasan_check_write+0x18/0x20 [ 14.762203] kasan_atomics_helper+0x1467/0x5450 [ 14.762227] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.762249] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.762274] ? kasan_atomics+0x152/0x310 [ 14.762301] kasan_atomics+0x1dc/0x310 [ 14.762324] ? __pfx_kasan_atomics+0x10/0x10 [ 14.762347] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.762386] ? __pfx_read_tsc+0x10/0x10 [ 14.762408] ? ktime_get_ts64+0x86/0x230 [ 14.762434] kunit_try_run_case+0x1a5/0x480 [ 14.762458] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.762482] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.762505] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.762528] ? __kthread_parkme+0x82/0x180 [ 14.762549] ? preempt_count_sub+0x50/0x80 [ 14.762574] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.762605] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.762628] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.762653] kthread+0x337/0x6f0 [ 14.762673] ? trace_preempt_on+0x20/0xc0 [ 14.762697] ? __pfx_kthread+0x10/0x10 [ 14.762718] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.762739] ? calculate_sigpending+0x7b/0xa0 [ 14.762765] ? __pfx_kthread+0x10/0x10 [ 14.762786] ret_from_fork+0x116/0x1d0 [ 14.762805] ? __pfx_kthread+0x10/0x10 [ 14.762827] ret_from_fork_asm+0x1a/0x30 [ 14.762857] </TASK> [ 14.762868] [ 14.770157] Allocated by task 282: [ 14.770314] kasan_save_stack+0x45/0x70 [ 14.770475] kasan_save_track+0x18/0x40 [ 14.770613] kasan_save_alloc_info+0x3b/0x50 [ 14.770816] __kasan_kmalloc+0xb7/0xc0 [ 14.771007] __kmalloc_cache_noprof+0x189/0x420 [ 14.771355] kasan_atomics+0x95/0x310 [ 14.771499] kunit_try_run_case+0x1a5/0x480 [ 14.771687] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.771940] kthread+0x337/0x6f0 [ 14.772117] ret_from_fork+0x116/0x1d0 [ 14.772313] ret_from_fork_asm+0x1a/0x30 [ 14.772487] [ 14.772563] The buggy address belongs to the object at ffff8881025a0d80 [ 14.772563] which belongs to the cache kmalloc-64 of size 64 [ 14.772909] The buggy address is located 0 bytes to the right of [ 14.772909] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.773420] [ 14.773515] The buggy address belongs to the physical page: [ 14.773856] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.774179] flags: 0x200000000000000(node=0|zone=2) [ 14.774392] page_type: f5(slab) [ 14.774554] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.774814] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.775041] page dumped because: kasan: bad access detected [ 14.775263] [ 14.775357] Memory state around the buggy address: [ 14.775652] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.776014] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.776354] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.776725] ^ [ 14.776941] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.777280] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.777602] ================================================================== [ 14.117339] ================================================================== [ 14.117791] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 14.118228] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.118529] [ 14.118654] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.118699] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.118712] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.118736] Call Trace: [ 14.118754] <TASK> [ 14.118772] dump_stack_lvl+0x73/0xb0 [ 14.118801] print_report+0xd1/0x650 [ 14.118824] ? __virt_addr_valid+0x1db/0x2d0 [ 14.118848] ? kasan_atomics_helper+0x697/0x5450 [ 14.118870] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.118893] ? kasan_atomics_helper+0x697/0x5450 [ 14.118934] kasan_report+0x141/0x180 [ 14.118957] ? kasan_atomics_helper+0x697/0x5450 [ 14.118983] kasan_check_range+0x10c/0x1c0 [ 14.119007] __kasan_check_write+0x18/0x20 [ 14.119027] kasan_atomics_helper+0x697/0x5450 [ 14.119051] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.119072] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.119098] ? kasan_atomics+0x152/0x310 [ 14.119125] kasan_atomics+0x1dc/0x310 [ 14.119147] ? __pfx_kasan_atomics+0x10/0x10 [ 14.119169] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.119196] ? __pfx_read_tsc+0x10/0x10 [ 14.119218] ? ktime_get_ts64+0x86/0x230 [ 14.119243] kunit_try_run_case+0x1a5/0x480 [ 14.119267] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.119290] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.119312] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.119334] ? __kthread_parkme+0x82/0x180 [ 14.119356] ? preempt_count_sub+0x50/0x80 [ 14.119388] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.119413] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.119436] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.119460] kthread+0x337/0x6f0 [ 14.119480] ? trace_preempt_on+0x20/0xc0 [ 14.119504] ? __pfx_kthread+0x10/0x10 [ 14.119525] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.119546] ? calculate_sigpending+0x7b/0xa0 [ 14.119586] ? __pfx_kthread+0x10/0x10 [ 14.119607] ret_from_fork+0x116/0x1d0 [ 14.119626] ? __pfx_kthread+0x10/0x10 [ 14.119646] ret_from_fork_asm+0x1a/0x30 [ 14.119677] </TASK> [ 14.119688] [ 14.127585] Allocated by task 282: [ 14.127765] kasan_save_stack+0x45/0x70 [ 14.127950] kasan_save_track+0x18/0x40 [ 14.128110] kasan_save_alloc_info+0x3b/0x50 [ 14.128308] __kasan_kmalloc+0xb7/0xc0 [ 14.128475] __kmalloc_cache_noprof+0x189/0x420 [ 14.128664] kasan_atomics+0x95/0x310 [ 14.128827] kunit_try_run_case+0x1a5/0x480 [ 14.129034] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.129211] kthread+0x337/0x6f0 [ 14.129330] ret_from_fork+0x116/0x1d0 [ 14.129534] ret_from_fork_asm+0x1a/0x30 [ 14.129751] [ 14.129850] The buggy address belongs to the object at ffff8881025a0d80 [ 14.129850] which belongs to the cache kmalloc-64 of size 64 [ 14.130425] The buggy address is located 0 bytes to the right of [ 14.130425] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.130814] [ 14.130889] The buggy address belongs to the physical page: [ 14.131062] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.131299] flags: 0x200000000000000(node=0|zone=2) [ 14.131534] page_type: f5(slab) [ 14.131723] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.132055] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.132611] page dumped because: kasan: bad access detected [ 14.132858] [ 14.132951] Memory state around the buggy address: [ 14.133272] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.133699] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.133916] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.134127] ^ [ 14.134582] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.134933] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.135287] ================================================================== [ 14.959596] ================================================================== [ 14.959987] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 14.960339] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.960591] [ 14.960761] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.960836] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.960850] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.960873] Call Trace: [ 14.960901] <TASK> [ 14.960918] dump_stack_lvl+0x73/0xb0 [ 14.960947] print_report+0xd1/0x650 [ 14.960971] ? __virt_addr_valid+0x1db/0x2d0 [ 14.960994] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.961016] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.961038] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.961060] kasan_report+0x141/0x180 [ 14.961112] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.961139] kasan_check_range+0x10c/0x1c0 [ 14.961163] __kasan_check_write+0x18/0x20 [ 14.961194] kasan_atomics_helper+0x19e3/0x5450 [ 14.961217] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.961241] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.961266] ? kasan_atomics+0x152/0x310 [ 14.961293] kasan_atomics+0x1dc/0x310 [ 14.961316] ? __pfx_kasan_atomics+0x10/0x10 [ 14.961339] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.961366] ? __pfx_read_tsc+0x10/0x10 [ 14.961397] ? ktime_get_ts64+0x86/0x230 [ 14.961423] kunit_try_run_case+0x1a5/0x480 [ 14.961448] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.961472] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.961494] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.961518] ? __kthread_parkme+0x82/0x180 [ 14.961539] ? preempt_count_sub+0x50/0x80 [ 14.961563] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.961600] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.961624] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.961647] kthread+0x337/0x6f0 [ 14.961668] ? trace_preempt_on+0x20/0xc0 [ 14.961694] ? __pfx_kthread+0x10/0x10 [ 14.961715] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.961737] ? calculate_sigpending+0x7b/0xa0 [ 14.961762] ? __pfx_kthread+0x10/0x10 [ 14.961784] ret_from_fork+0x116/0x1d0 [ 14.961803] ? __pfx_kthread+0x10/0x10 [ 14.961824] ret_from_fork_asm+0x1a/0x30 [ 14.961855] </TASK> [ 14.961867] [ 14.970208] Allocated by task 282: [ 14.970426] kasan_save_stack+0x45/0x70 [ 14.970650] kasan_save_track+0x18/0x40 [ 14.970838] kasan_save_alloc_info+0x3b/0x50 [ 14.971045] __kasan_kmalloc+0xb7/0xc0 [ 14.971282] __kmalloc_cache_noprof+0x189/0x420 [ 14.971593] kasan_atomics+0x95/0x310 [ 14.971775] kunit_try_run_case+0x1a5/0x480 [ 14.971966] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.972177] kthread+0x337/0x6f0 [ 14.972354] ret_from_fork+0x116/0x1d0 [ 14.972541] ret_from_fork_asm+0x1a/0x30 [ 14.972763] [ 14.972869] The buggy address belongs to the object at ffff8881025a0d80 [ 14.972869] which belongs to the cache kmalloc-64 of size 64 [ 14.973386] The buggy address is located 0 bytes to the right of [ 14.973386] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.973806] [ 14.973906] The buggy address belongs to the physical page: [ 14.974213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.974569] flags: 0x200000000000000(node=0|zone=2) [ 14.974837] page_type: f5(slab) [ 14.975066] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.975333] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.975573] page dumped because: kasan: bad access detected [ 14.975857] [ 14.976031] Memory state around the buggy address: [ 14.976352] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.976827] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.977055] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.977274] ^ [ 14.977519] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.978188] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.978497] ================================================================== [ 14.135800] ================================================================== [ 14.136110] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 14.136599] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.136870] [ 14.136980] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.137024] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.137038] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.137061] Call Trace: [ 14.137075] <TASK> [ 14.137091] dump_stack_lvl+0x73/0xb0 [ 14.137119] print_report+0xd1/0x650 [ 14.137145] ? __virt_addr_valid+0x1db/0x2d0 [ 14.137188] ? kasan_atomics_helper+0x72f/0x5450 [ 14.137210] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.137232] ? kasan_atomics_helper+0x72f/0x5450 [ 14.137255] kasan_report+0x141/0x180 [ 14.137278] ? kasan_atomics_helper+0x72f/0x5450 [ 14.137305] kasan_check_range+0x10c/0x1c0 [ 14.137329] __kasan_check_write+0x18/0x20 [ 14.137349] kasan_atomics_helper+0x72f/0x5450 [ 14.137381] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.137405] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.137430] ? kasan_atomics+0x152/0x310 [ 14.137456] kasan_atomics+0x1dc/0x310 [ 14.137480] ? __pfx_kasan_atomics+0x10/0x10 [ 14.137502] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.137528] ? __pfx_read_tsc+0x10/0x10 [ 14.137549] ? ktime_get_ts64+0x86/0x230 [ 14.137593] kunit_try_run_case+0x1a5/0x480 [ 14.137617] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.137640] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.137662] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.137691] ? __kthread_parkme+0x82/0x180 [ 14.137712] ? preempt_count_sub+0x50/0x80 [ 14.137750] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.137775] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.137798] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.137821] kthread+0x337/0x6f0 [ 14.137841] ? trace_preempt_on+0x20/0xc0 [ 14.137865] ? __pfx_kthread+0x10/0x10 [ 14.137886] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.137920] ? calculate_sigpending+0x7b/0xa0 [ 14.137945] ? __pfx_kthread+0x10/0x10 [ 14.137966] ret_from_fork+0x116/0x1d0 [ 14.137985] ? __pfx_kthread+0x10/0x10 [ 14.138005] ret_from_fork_asm+0x1a/0x30 [ 14.138035] </TASK> [ 14.138046] [ 14.146085] Allocated by task 282: [ 14.146328] kasan_save_stack+0x45/0x70 [ 14.146488] kasan_save_track+0x18/0x40 [ 14.146704] kasan_save_alloc_info+0x3b/0x50 [ 14.146917] __kasan_kmalloc+0xb7/0xc0 [ 14.147121] __kmalloc_cache_noprof+0x189/0x420 [ 14.147299] kasan_atomics+0x95/0x310 [ 14.147487] kunit_try_run_case+0x1a5/0x480 [ 14.147705] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.147959] kthread+0x337/0x6f0 [ 14.148140] ret_from_fork+0x116/0x1d0 [ 14.148336] ret_from_fork_asm+0x1a/0x30 [ 14.148503] [ 14.148604] The buggy address belongs to the object at ffff8881025a0d80 [ 14.148604] which belongs to the cache kmalloc-64 of size 64 [ 14.148983] The buggy address is located 0 bytes to the right of [ 14.148983] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.149347] [ 14.149447] The buggy address belongs to the physical page: [ 14.149831] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.150240] flags: 0x200000000000000(node=0|zone=2) [ 14.150484] page_type: f5(slab) [ 14.150674] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.151005] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.151404] page dumped because: kasan: bad access detected [ 14.151602] [ 14.151673] Memory state around the buggy address: [ 14.151831] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.152070] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.152286] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.152914] ^ [ 14.153141] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.153470] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.153865] ================================================================== [ 14.979623] ================================================================== [ 14.980190] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 14.980588] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.980857] [ 14.980947] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.980992] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.981006] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.981028] Call Trace: [ 14.981045] <TASK> [ 14.981064] dump_stack_lvl+0x73/0xb0 [ 14.981093] print_report+0xd1/0x650 [ 14.981117] ? __virt_addr_valid+0x1db/0x2d0 [ 14.981140] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.981162] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.981184] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.981206] kasan_report+0x141/0x180 [ 14.981229] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.981255] kasan_check_range+0x10c/0x1c0 [ 14.981279] __kasan_check_write+0x18/0x20 [ 14.981299] kasan_atomics_helper+0x1a7f/0x5450 [ 14.981322] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.981345] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.981370] ? kasan_atomics+0x152/0x310 [ 14.981409] kasan_atomics+0x1dc/0x310 [ 14.981432] ? __pfx_kasan_atomics+0x10/0x10 [ 14.981455] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.981482] ? __pfx_read_tsc+0x10/0x10 [ 14.981504] ? ktime_get_ts64+0x86/0x230 [ 14.981530] kunit_try_run_case+0x1a5/0x480 [ 14.981554] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.981614] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.981637] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.981672] ? __kthread_parkme+0x82/0x180 [ 14.981693] ? preempt_count_sub+0x50/0x80 [ 14.981717] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.981741] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.981765] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.981789] kthread+0x337/0x6f0 [ 14.981809] ? trace_preempt_on+0x20/0xc0 [ 14.981834] ? __pfx_kthread+0x10/0x10 [ 14.981855] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.981878] ? calculate_sigpending+0x7b/0xa0 [ 14.981903] ? __pfx_kthread+0x10/0x10 [ 14.981925] ret_from_fork+0x116/0x1d0 [ 14.981944] ? __pfx_kthread+0x10/0x10 [ 14.981965] ret_from_fork_asm+0x1a/0x30 [ 14.981996] </TASK> [ 14.982008] [ 14.990428] Allocated by task 282: [ 14.990659] kasan_save_stack+0x45/0x70 [ 14.990920] kasan_save_track+0x18/0x40 [ 14.991120] kasan_save_alloc_info+0x3b/0x50 [ 14.991391] __kasan_kmalloc+0xb7/0xc0 [ 14.991573] __kmalloc_cache_noprof+0x189/0x420 [ 14.991809] kasan_atomics+0x95/0x310 [ 14.991975] kunit_try_run_case+0x1a5/0x480 [ 14.992267] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.992651] kthread+0x337/0x6f0 [ 14.992844] ret_from_fork+0x116/0x1d0 [ 14.992983] ret_from_fork_asm+0x1a/0x30 [ 14.993170] [ 14.993297] The buggy address belongs to the object at ffff8881025a0d80 [ 14.993297] which belongs to the cache kmalloc-64 of size 64 [ 14.993864] The buggy address is located 0 bytes to the right of [ 14.993864] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.994420] [ 14.994524] The buggy address belongs to the physical page: [ 14.995008] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.995258] flags: 0x200000000000000(node=0|zone=2) [ 14.995460] page_type: f5(slab) [ 14.995682] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.996034] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.996499] page dumped because: kasan: bad access detected [ 14.996762] [ 14.996837] Memory state around the buggy address: [ 14.996995] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.997300] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.997674] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.998057] ^ [ 14.998334] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.998724] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.999094] ================================================================== [ 15.285761] ================================================================== [ 15.286111] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 15.286350] Read of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 15.286868] [ 15.286978] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.287021] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.287033] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.287080] Call Trace: [ 15.287096] <TASK> [ 15.287114] dump_stack_lvl+0x73/0xb0 [ 15.287145] print_report+0xd1/0x650 [ 15.287168] ? __virt_addr_valid+0x1db/0x2d0 [ 15.287192] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.287214] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.287236] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.287258] kasan_report+0x141/0x180 [ 15.287280] ? kasan_atomics_helper+0x4fa5/0x5450 [ 15.287309] __asan_report_load8_noabort+0x18/0x20 [ 15.287332] kasan_atomics_helper+0x4fa5/0x5450 [ 15.287355] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.287388] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.287413] ? kasan_atomics+0x152/0x310 [ 15.287440] kasan_atomics+0x1dc/0x310 [ 15.287462] ? __pfx_kasan_atomics+0x10/0x10 [ 15.287485] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.287531] ? __pfx_read_tsc+0x10/0x10 [ 15.287553] ? ktime_get_ts64+0x86/0x230 [ 15.287578] kunit_try_run_case+0x1a5/0x480 [ 15.287609] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.287632] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.287654] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.287677] ? __kthread_parkme+0x82/0x180 [ 15.287699] ? preempt_count_sub+0x50/0x80 [ 15.287723] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.287746] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.287769] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.287812] kthread+0x337/0x6f0 [ 15.287832] ? trace_preempt_on+0x20/0xc0 [ 15.287856] ? __pfx_kthread+0x10/0x10 [ 15.287877] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.287899] ? calculate_sigpending+0x7b/0xa0 [ 15.287924] ? __pfx_kthread+0x10/0x10 [ 15.287945] ret_from_fork+0x116/0x1d0 [ 15.287963] ? __pfx_kthread+0x10/0x10 [ 15.287984] ret_from_fork_asm+0x1a/0x30 [ 15.288015] </TASK> [ 15.288026] [ 15.295349] Allocated by task 282: [ 15.295530] kasan_save_stack+0x45/0x70 [ 15.295723] kasan_save_track+0x18/0x40 [ 15.296062] kasan_save_alloc_info+0x3b/0x50 [ 15.296275] __kasan_kmalloc+0xb7/0xc0 [ 15.296459] __kmalloc_cache_noprof+0x189/0x420 [ 15.296727] kasan_atomics+0x95/0x310 [ 15.296914] kunit_try_run_case+0x1a5/0x480 [ 15.297062] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.297303] kthread+0x337/0x6f0 [ 15.297485] ret_from_fork+0x116/0x1d0 [ 15.297722] ret_from_fork_asm+0x1a/0x30 [ 15.297887] [ 15.297982] The buggy address belongs to the object at ffff8881025a0d80 [ 15.297982] which belongs to the cache kmalloc-64 of size 64 [ 15.298401] The buggy address is located 0 bytes to the right of [ 15.298401] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 15.298901] [ 15.298998] The buggy address belongs to the physical page: [ 15.299241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 15.299501] flags: 0x200000000000000(node=0|zone=2) [ 15.299955] page_type: f5(slab) [ 15.300084] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.300315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.300555] page dumped because: kasan: bad access detected [ 15.300821] [ 15.300915] Memory state around the buggy address: [ 15.301132] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.301459] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.301953] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.302164] ^ [ 15.302318] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.302595] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.302910] ================================================================== [ 13.979286] ================================================================== [ 13.979587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 13.979942] Read of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 13.980279] [ 13.980400] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.980441] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.980453] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.980474] Call Trace: [ 13.980490] <TASK> [ 13.980505] dump_stack_lvl+0x73/0xb0 [ 13.980532] print_report+0xd1/0x650 [ 13.980555] ? __virt_addr_valid+0x1db/0x2d0 [ 13.980633] ? kasan_atomics_helper+0x3df/0x5450 [ 13.980657] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.980680] ? kasan_atomics_helper+0x3df/0x5450 [ 13.980702] kasan_report+0x141/0x180 [ 13.980726] ? kasan_atomics_helper+0x3df/0x5450 [ 13.980753] kasan_check_range+0x10c/0x1c0 [ 13.980778] __kasan_check_read+0x15/0x20 [ 13.980797] kasan_atomics_helper+0x3df/0x5450 [ 13.980820] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.980843] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.980870] ? kasan_atomics+0x152/0x310 [ 13.980897] kasan_atomics+0x1dc/0x310 [ 13.980957] ? __pfx_kasan_atomics+0x10/0x10 [ 13.980982] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 13.981008] ? __pfx_read_tsc+0x10/0x10 [ 13.981030] ? ktime_get_ts64+0x86/0x230 [ 13.981055] kunit_try_run_case+0x1a5/0x480 [ 13.981080] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.981102] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 13.981125] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.981148] ? __kthread_parkme+0x82/0x180 [ 13.981169] ? preempt_count_sub+0x50/0x80 [ 13.981194] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.981218] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.981242] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.981266] kthread+0x337/0x6f0 [ 13.981285] ? trace_preempt_on+0x20/0xc0 [ 13.981310] ? __pfx_kthread+0x10/0x10 [ 13.981331] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.981353] ? calculate_sigpending+0x7b/0xa0 [ 13.981389] ? __pfx_kthread+0x10/0x10 [ 13.981411] ret_from_fork+0x116/0x1d0 [ 13.981430] ? __pfx_kthread+0x10/0x10 [ 13.981451] ret_from_fork_asm+0x1a/0x30 [ 13.981482] </TASK> [ 13.981494] [ 13.991599] Allocated by task 282: [ 13.991909] kasan_save_stack+0x45/0x70 [ 13.992327] kasan_save_track+0x18/0x40 [ 13.992761] kasan_save_alloc_info+0x3b/0x50 [ 13.993211] __kasan_kmalloc+0xb7/0xc0 [ 13.993577] __kmalloc_cache_noprof+0x189/0x420 [ 13.994013] kasan_atomics+0x95/0x310 [ 13.994412] kunit_try_run_case+0x1a5/0x480 [ 13.994820] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.995352] kthread+0x337/0x6f0 [ 13.995733] ret_from_fork+0x116/0x1d0 [ 13.995928] ret_from_fork_asm+0x1a/0x30 [ 13.996271] [ 13.996445] The buggy address belongs to the object at ffff8881025a0d80 [ 13.996445] which belongs to the cache kmalloc-64 of size 64 [ 13.997650] The buggy address is located 0 bytes to the right of [ 13.997650] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 13.998121] [ 13.998199] The buggy address belongs to the physical page: [ 13.998403] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 13.998681] flags: 0x200000000000000(node=0|zone=2) [ 13.999140] page_type: f5(slab) [ 13.999484] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.000204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.000993] page dumped because: kasan: bad access detected [ 14.001602] [ 14.001803] Memory state around the buggy address: [ 14.002295] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.002946] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.003626] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.004162] ^ [ 14.004647] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.005121] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.005693] ================================================================== [ 14.834512] ================================================================== [ 14.834915] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 14.835240] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.835689] [ 14.835831] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.835875] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.835888] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.836012] Call Trace: [ 14.836029] <TASK> [ 14.836046] dump_stack_lvl+0x73/0xb0 [ 14.836074] print_report+0xd1/0x650 [ 14.836106] ? __virt_addr_valid+0x1db/0x2d0 [ 14.836129] ? kasan_atomics_helper+0x164f/0x5450 [ 14.836153] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.836176] ? kasan_atomics_helper+0x164f/0x5450 [ 14.836199] kasan_report+0x141/0x180 [ 14.836221] ? kasan_atomics_helper+0x164f/0x5450 [ 14.836249] kasan_check_range+0x10c/0x1c0 [ 14.836273] __kasan_check_write+0x18/0x20 [ 14.836294] kasan_atomics_helper+0x164f/0x5450 [ 14.836317] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.836340] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.836367] ? kasan_atomics+0x152/0x310 [ 14.836414] kasan_atomics+0x1dc/0x310 [ 14.836438] ? __pfx_kasan_atomics+0x10/0x10 [ 14.836461] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.836488] ? __pfx_read_tsc+0x10/0x10 [ 14.836511] ? ktime_get_ts64+0x86/0x230 [ 14.836535] kunit_try_run_case+0x1a5/0x480 [ 14.836560] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.836592] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.836615] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.836640] ? __kthread_parkme+0x82/0x180 [ 14.836661] ? preempt_count_sub+0x50/0x80 [ 14.836686] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.836709] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.836734] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.836757] kthread+0x337/0x6f0 [ 14.836777] ? trace_preempt_on+0x20/0xc0 [ 14.836803] ? __pfx_kthread+0x10/0x10 [ 14.836824] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.836846] ? calculate_sigpending+0x7b/0xa0 [ 14.836870] ? __pfx_kthread+0x10/0x10 [ 14.836892] ret_from_fork+0x116/0x1d0 [ 14.836912] ? __pfx_kthread+0x10/0x10 [ 14.836933] ret_from_fork_asm+0x1a/0x30 [ 14.836964] </TASK> [ 14.836976] [ 14.845207] Allocated by task 282: [ 14.845335] kasan_save_stack+0x45/0x70 [ 14.845489] kasan_save_track+0x18/0x40 [ 14.845624] kasan_save_alloc_info+0x3b/0x50 [ 14.845806] __kasan_kmalloc+0xb7/0xc0 [ 14.846009] __kmalloc_cache_noprof+0x189/0x420 [ 14.846225] kasan_atomics+0x95/0x310 [ 14.846419] kunit_try_run_case+0x1a5/0x480 [ 14.846669] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.846927] kthread+0x337/0x6f0 [ 14.847092] ret_from_fork+0x116/0x1d0 [ 14.847277] ret_from_fork_asm+0x1a/0x30 [ 14.847479] [ 14.847585] The buggy address belongs to the object at ffff8881025a0d80 [ 14.847585] which belongs to the cache kmalloc-64 of size 64 [ 14.848074] The buggy address is located 0 bytes to the right of [ 14.848074] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.848732] [ 14.848832] The buggy address belongs to the physical page: [ 14.849076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.849429] flags: 0x200000000000000(node=0|zone=2) [ 14.849669] page_type: f5(slab) [ 14.849787] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.850011] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.850228] page dumped because: kasan: bad access detected [ 14.850410] [ 14.850507] Memory state around the buggy address: [ 14.850939] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.851300] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.851688] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.852020] ^ [ 14.852254] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.852519] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.853012] ================================================================== [ 14.778421] ================================================================== [ 14.778903] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 14.779262] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.779653] [ 14.779780] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.779825] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.779838] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.779861] Call Trace: [ 14.779875] <TASK> [ 14.779893] dump_stack_lvl+0x73/0xb0 [ 14.779921] print_report+0xd1/0x650 [ 14.779946] ? __virt_addr_valid+0x1db/0x2d0 [ 14.779969] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.779991] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.780014] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.780035] kasan_report+0x141/0x180 [ 14.780057] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.780083] __asan_report_store8_noabort+0x1b/0x30 [ 14.780105] kasan_atomics_helper+0x50d4/0x5450 [ 14.780127] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.780149] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.780175] ? kasan_atomics+0x152/0x310 [ 14.780202] kasan_atomics+0x1dc/0x310 [ 14.780248] ? __pfx_kasan_atomics+0x10/0x10 [ 14.780270] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.780297] ? __pfx_read_tsc+0x10/0x10 [ 14.780320] ? ktime_get_ts64+0x86/0x230 [ 14.780356] kunit_try_run_case+0x1a5/0x480 [ 14.780391] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.780417] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.780439] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.780462] ? __kthread_parkme+0x82/0x180 [ 14.780483] ? preempt_count_sub+0x50/0x80 [ 14.780508] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.780532] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.780555] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.780587] kthread+0x337/0x6f0 [ 14.780606] ? trace_preempt_on+0x20/0xc0 [ 14.780632] ? __pfx_kthread+0x10/0x10 [ 14.780653] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.780674] ? calculate_sigpending+0x7b/0xa0 [ 14.780698] ? __pfx_kthread+0x10/0x10 [ 14.780719] ret_from_fork+0x116/0x1d0 [ 14.780738] ? __pfx_kthread+0x10/0x10 [ 14.780759] ret_from_fork_asm+0x1a/0x30 [ 14.780790] </TASK> [ 14.780802] [ 14.788535] Allocated by task 282: [ 14.788731] kasan_save_stack+0x45/0x70 [ 14.788878] kasan_save_track+0x18/0x40 [ 14.789015] kasan_save_alloc_info+0x3b/0x50 [ 14.789164] __kasan_kmalloc+0xb7/0xc0 [ 14.789297] __kmalloc_cache_noprof+0x189/0x420 [ 14.789510] kasan_atomics+0x95/0x310 [ 14.789728] kunit_try_run_case+0x1a5/0x480 [ 14.789957] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.790205] kthread+0x337/0x6f0 [ 14.790403] ret_from_fork+0x116/0x1d0 [ 14.790586] ret_from_fork_asm+0x1a/0x30 [ 14.790812] [ 14.790912] The buggy address belongs to the object at ffff8881025a0d80 [ 14.790912] which belongs to the cache kmalloc-64 of size 64 [ 14.791451] The buggy address is located 0 bytes to the right of [ 14.791451] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.792031] [ 14.792126] The buggy address belongs to the physical page: [ 14.792429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.792977] flags: 0x200000000000000(node=0|zone=2) [ 14.793213] page_type: f5(slab) [ 14.793335] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.793589] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.793950] page dumped because: kasan: bad access detected [ 14.794220] [ 14.794321] Memory state around the buggy address: [ 14.794563] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.794809] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.795017] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.795220] ^ [ 14.795367] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.795711] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.796061] ================================================================== [ 15.267630] ================================================================== [ 15.268236] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 15.268601] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 15.268926] [ 15.269038] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.269083] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.269097] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.269119] Call Trace: [ 15.269137] <TASK> [ 15.269157] dump_stack_lvl+0x73/0xb0 [ 15.269184] print_report+0xd1/0x650 [ 15.269230] ? __virt_addr_valid+0x1db/0x2d0 [ 15.269254] ? kasan_atomics_helper+0x218a/0x5450 [ 15.269275] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.269297] ? kasan_atomics_helper+0x218a/0x5450 [ 15.269319] kasan_report+0x141/0x180 [ 15.269341] ? kasan_atomics_helper+0x218a/0x5450 [ 15.269397] kasan_check_range+0x10c/0x1c0 [ 15.269422] __kasan_check_write+0x18/0x20 [ 15.269441] kasan_atomics_helper+0x218a/0x5450 [ 15.269464] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.269486] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.269512] ? kasan_atomics+0x152/0x310 [ 15.269539] kasan_atomics+0x1dc/0x310 [ 15.269561] ? __pfx_kasan_atomics+0x10/0x10 [ 15.269592] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.269620] ? __pfx_read_tsc+0x10/0x10 [ 15.269642] ? ktime_get_ts64+0x86/0x230 [ 15.269668] kunit_try_run_case+0x1a5/0x480 [ 15.269692] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.269715] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.269758] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.269782] ? __kthread_parkme+0x82/0x180 [ 15.269804] ? preempt_count_sub+0x50/0x80 [ 15.269828] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.269852] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.269875] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.269899] kthread+0x337/0x6f0 [ 15.269919] ? trace_preempt_on+0x20/0xc0 [ 15.269944] ? __pfx_kthread+0x10/0x10 [ 15.269966] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.269988] ? calculate_sigpending+0x7b/0xa0 [ 15.270014] ? __pfx_kthread+0x10/0x10 [ 15.270036] ret_from_fork+0x116/0x1d0 [ 15.270055] ? __pfx_kthread+0x10/0x10 [ 15.270076] ret_from_fork_asm+0x1a/0x30 [ 15.270108] </TASK> [ 15.270119] [ 15.277628] Allocated by task 282: [ 15.277811] kasan_save_stack+0x45/0x70 [ 15.278030] kasan_save_track+0x18/0x40 [ 15.278362] kasan_save_alloc_info+0x3b/0x50 [ 15.278521] __kasan_kmalloc+0xb7/0xc0 [ 15.278653] __kmalloc_cache_noprof+0x189/0x420 [ 15.278869] kasan_atomics+0x95/0x310 [ 15.279057] kunit_try_run_case+0x1a5/0x480 [ 15.279331] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.279523] kthread+0x337/0x6f0 [ 15.279725] ret_from_fork+0x116/0x1d0 [ 15.279916] ret_from_fork_asm+0x1a/0x30 [ 15.280107] [ 15.280206] The buggy address belongs to the object at ffff8881025a0d80 [ 15.280206] which belongs to the cache kmalloc-64 of size 64 [ 15.280756] The buggy address is located 0 bytes to the right of [ 15.280756] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 15.281206] [ 15.281299] The buggy address belongs to the physical page: [ 15.281565] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 15.281830] flags: 0x200000000000000(node=0|zone=2) [ 15.281996] page_type: f5(slab) [ 15.282175] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.282526] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.283116] page dumped because: kasan: bad access detected [ 15.283383] [ 15.283478] Memory state around the buggy address: [ 15.283690] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.283905] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.284118] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.284357] ^ [ 15.284612] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.284929] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.285259] ================================================================== [ 15.020604] ================================================================== [ 15.020909] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 15.021886] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 15.022230] [ 15.022357] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.022447] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.022462] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.022485] Call Trace: [ 15.022515] <TASK> [ 15.022533] dump_stack_lvl+0x73/0xb0 [ 15.022564] print_report+0xd1/0x650 [ 15.022587] ? __virt_addr_valid+0x1db/0x2d0 [ 15.022611] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.022633] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.022656] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.022678] kasan_report+0x141/0x180 [ 15.022700] ? kasan_atomics_helper+0x1c18/0x5450 [ 15.022727] kasan_check_range+0x10c/0x1c0 [ 15.022751] __kasan_check_write+0x18/0x20 [ 15.022770] kasan_atomics_helper+0x1c18/0x5450 [ 15.022793] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.022816] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.022843] ? kasan_atomics+0x152/0x310 [ 15.022870] kasan_atomics+0x1dc/0x310 [ 15.022892] ? __pfx_kasan_atomics+0x10/0x10 [ 15.022915] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 15.022943] ? __pfx_read_tsc+0x10/0x10 [ 15.022965] ? ktime_get_ts64+0x86/0x230 [ 15.022990] kunit_try_run_case+0x1a5/0x480 [ 15.023015] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.023037] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 15.023060] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.023084] ? __kthread_parkme+0x82/0x180 [ 15.023105] ? preempt_count_sub+0x50/0x80 [ 15.023129] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.023153] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.023177] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.023201] kthread+0x337/0x6f0 [ 15.023221] ? trace_preempt_on+0x20/0xc0 [ 15.023246] ? __pfx_kthread+0x10/0x10 [ 15.023267] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.023289] ? calculate_sigpending+0x7b/0xa0 [ 15.023397] ? __pfx_kthread+0x10/0x10 [ 15.023425] ret_from_fork+0x116/0x1d0 [ 15.023445] ? __pfx_kthread+0x10/0x10 [ 15.023501] ret_from_fork_asm+0x1a/0x30 [ 15.023532] </TASK> [ 15.023555] [ 15.031948] Allocated by task 282: [ 15.032087] kasan_save_stack+0x45/0x70 [ 15.032296] kasan_save_track+0x18/0x40 [ 15.032544] kasan_save_alloc_info+0x3b/0x50 [ 15.032779] __kasan_kmalloc+0xb7/0xc0 [ 15.033006] __kmalloc_cache_noprof+0x189/0x420 [ 15.033362] kasan_atomics+0x95/0x310 [ 15.033568] kunit_try_run_case+0x1a5/0x480 [ 15.033791] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.033983] kthread+0x337/0x6f0 [ 15.034107] ret_from_fork+0x116/0x1d0 [ 15.034296] ret_from_fork_asm+0x1a/0x30 [ 15.034543] [ 15.034642] The buggy address belongs to the object at ffff8881025a0d80 [ 15.034642] which belongs to the cache kmalloc-64 of size 64 [ 15.035275] The buggy address is located 0 bytes to the right of [ 15.035275] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 15.036015] [ 15.036131] The buggy address belongs to the physical page: [ 15.036408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 15.036838] flags: 0x200000000000000(node=0|zone=2) [ 15.037106] page_type: f5(slab) [ 15.037235] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.037525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 15.037924] page dumped because: kasan: bad access detected [ 15.038352] [ 15.038499] Memory state around the buggy address: [ 15.038750] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.039090] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 15.039307] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.039594] ^ [ 15.039871] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.040201] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.040541] ================================================================== [ 14.154553] ================================================================== [ 14.154845] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 14.155123] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282 [ 14.155349] [ 14.155572] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.155620] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.155634] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.155656] Call Trace: [ 14.155676] <TASK> [ 14.155696] dump_stack_lvl+0x73/0xb0 [ 14.155725] print_report+0xd1/0x650 [ 14.155748] ? __virt_addr_valid+0x1db/0x2d0 [ 14.155772] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.155793] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.155816] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.155839] kasan_report+0x141/0x180 [ 14.155861] ? kasan_atomics_helper+0x7c7/0x5450 [ 14.155887] kasan_check_range+0x10c/0x1c0 [ 14.155931] __kasan_check_write+0x18/0x20 [ 14.155952] kasan_atomics_helper+0x7c7/0x5450 [ 14.155975] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.155998] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.156023] ? kasan_atomics+0x152/0x310 [ 14.156051] kasan_atomics+0x1dc/0x310 [ 14.156074] ? __pfx_kasan_atomics+0x10/0x10 [ 14.156097] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 14.156124] ? __pfx_read_tsc+0x10/0x10 [ 14.156145] ? ktime_get_ts64+0x86/0x230 [ 14.156171] kunit_try_run_case+0x1a5/0x480 [ 14.156196] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.156221] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.156246] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.156269] ? __kthread_parkme+0x82/0x180 [ 14.156289] ? preempt_count_sub+0x50/0x80 [ 14.156313] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.156338] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.156361] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.156399] kthread+0x337/0x6f0 [ 14.156419] ? trace_preempt_on+0x20/0xc0 [ 14.156444] ? __pfx_kthread+0x10/0x10 [ 14.156468] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.156489] ? calculate_sigpending+0x7b/0xa0 [ 14.156514] ? __pfx_kthread+0x10/0x10 [ 14.156535] ret_from_fork+0x116/0x1d0 [ 14.156554] ? __pfx_kthread+0x10/0x10 [ 14.156591] ret_from_fork_asm+0x1a/0x30 [ 14.156622] </TASK> [ 14.156633] [ 14.168539] Allocated by task 282: [ 14.168703] kasan_save_stack+0x45/0x70 [ 14.168853] kasan_save_track+0x18/0x40 [ 14.169019] kasan_save_alloc_info+0x3b/0x50 [ 14.169235] __kasan_kmalloc+0xb7/0xc0 [ 14.169469] __kmalloc_cache_noprof+0x189/0x420 [ 14.169782] kasan_atomics+0x95/0x310 [ 14.170203] kunit_try_run_case+0x1a5/0x480 [ 14.170424] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.170719] kthread+0x337/0x6f0 [ 14.170938] ret_from_fork+0x116/0x1d0 [ 14.171131] ret_from_fork_asm+0x1a/0x30 [ 14.171351] [ 14.171434] The buggy address belongs to the object at ffff8881025a0d80 [ 14.171434] which belongs to the cache kmalloc-64 of size 64 [ 14.171809] The buggy address is located 0 bytes to the right of [ 14.171809] allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0) [ 14.172351] [ 14.172484] The buggy address belongs to the physical page: [ 14.172842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0 [ 14.173202] flags: 0x200000000000000(node=0|zone=2) [ 14.173644] page_type: f5(slab) [ 14.173805] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.174086] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.174309] page dumped because: kasan: bad access detected [ 14.174551] [ 14.174692] Memory state around the buggy address: [ 14.174965] ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.175590] ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.175900] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.176383] ^ [ 14.176554] ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.176933] ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.177263] ==================================================================